Business white paper. environments. The top 5 challenges and solutions for backup and recovery



Similar documents
Brochure. Data Protector 9: Nine reasons to upgrade

Integrated Data Protection for VMware infrastructure

Enable unified data protection

How To Use Hp Backup Navigator

Why cloud backup? Top 10 reasons

How To Use Hp Vertica Ondemand

HP Data Protector software. Assuring Business Continuity in Virtualised Environments

IBM Tivoli Storage Manager

FLASH STORAGE SOLUTION

How to Manage Critical Data Stored in Microsoft Exchange Server By Hitachi Data Systems

Protect Microsoft Exchange databases, achieve long-term data retention

Table of contents

HP Data Protector software Zero Downtime Backup and Instant Recovery. Data sheet

HP Data Protector software Zero Downtime Backup and Instant Recovery

Redefining Microsoft SQL Server Data Management. PAS Specification

HP StorageWorks Data Protection Strategy brief

HP Data Protector software and HP StoreOnce backup systems for federated deduplication and flexible deployment

HP 3PAR storage technologies for desktop virtualization

A complete platform for proactive data management

SQL Server Storage Best Practice Discussion Dell EqualLogic

EMC DATA PROTECTION ADVISOR

HP Data Protection. Business challenge: Resulting pain points: HP technology solutions:

Protecting enterprise servers with StoreOnce and CommVault Simpana

Native Data Protection with SimpliVity. Solution Brief

IBM Tivoli Storage Manager Suite for Unified Recovery

How To Protect Data On Network Attached Storage (Nas) From Disaster

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

HP Software, Big Data Rethinking Data Protection

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

HP SiteScope software

HP Private Cloud Solutions

Microsoft Private Cloud Fast Track

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments

the limits of your infrastructure. How to get the most out of virtualization

Monitoring and Operating a Private Cloud with System Center 2012 (10750) H7G37S

How To Backup With Ec Avamar

Nutanix Tech Note. Data Protection and Disaster Recovery

Business white paper. Lower risk and cost with proactive information governance

ABSTRACT. February, 2014 EMC WHITE PAPER

HP Server Automation Standard

Top 5 reasons to choose HP Information Archiving

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Dell Data Protection Point of View: Recover Everything. Every time. On time.

IBM Tivoli Storage Manager 6

Reduce your data storage footprint and tame the information explosion

Symantec NetBackup 7 Clients and Agents

Using HP StoreOnce Backup systems for Oracle database backups

Vodacom Managed Hosted Backups

Business white paper Top 10 reasons to choose Cloud-based Archiving

Self-Service Provisioning and the Private Cloud

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Nutanix Solution Note

Symantec Backup Exec 2012

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

VMware Solutions for Small and Midsize Business

HP ProLiant Storage Server family. Radically simple storage

Intelligent document management for the legal industry

CA Workload Automation

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief

I D C V E N D O R S P O T L I G H T

A CommVault Business Value & Technology White Paper. Snapshot Management & Source-side Deduplication are Vital to Modern Data Protection

ENTERPRISE STORAGE WITH THE FUTURE BUILT IN

HP-UX 11i software deployment and configuration tools

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions

Redefining Microsoft Exchange Data Management

VMware vsphere Data Protection

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

How To Get A Storage And Data Protection Solution For Virtualization

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

Data Protection as Part of Your Cloud Journey

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

Managing storage in the virtual data center. A white paper on HP Storage Essentials support for VMware host virtualization

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Access to easy-to-use tools that reduce management time with Arcserve Backup

Virtual Machine Environments: Data Protection and Recovery Solutions

WHY CLOUD BACKUP: TOP 10 REASONS

The evolution of data archiving

W H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c a l A p p l i c a t i o n s

Redefining Microsoft SQL Server Data Management

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

IBM Tivoli Netcool network management solutions for enterprise

Best Practices for Managing Storage in the Most Challenging Environments

Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

ACCELERATING YOUR IT TRANSFORMATION WITH EMC NEXT-GENERATION UNIFIED STORAGE AND BACKUP

Transcription:

Business white paper Protecting missioncritical application environments The top 5 challenges and solutions for backup and recovery

Table of contents 3 Executive summary 3 Key facts about mission-critical application backup and recovery 3 Top five challenges and solutions 6 The future according to HP: Adaptive Backup and Recovery 6 HP s Adaptive Backup and Recovery approach 2

Executive summary The number one job of today s IT organizations is to protect applications, their data, and the entire infrastructure from the risk of data loss, corruption, and application malfunction and to do so in an integrated manner, with minimal disruption. Mission critical application environments are comprised of the software and hardware essential to the survival of an organization. This means that when a critical environment fails, is interrupted, or experiences data corruption, the business operations are significantly affected. While most organizations combine hardware, hypervisor, and applications such as SAP, Oracle, Microsoft Exchange, Microsoft SQL Server, the tendency is to have a data protection strategy that looks solely at the data. However, to handle this complexity more effectively, it s important to shift to a more intelligent and adaptive backup and recovery framework one that looks beyond just data recovery and incorporates application awareness, storage integration, and operational analytics. This white paper identifies the top five backup and recovery challenges in mission-critical environments and offers key considerations and solutions for your backup and recovery strategy. What are your organization s RTOs for high-priority applications and normal production workloads? (Percent of respondents, N=325) High priority applications Normal production workloads 25% 10% 24% 13% 20% 16% 18% 19% 7% 15% 6% 18% 5% 5% No ever Up to 15 minutes of Less than 1 hour of 1 hour to less than 3 hours of 3 hours to less than 10 hours of 10 hours to 24 hours of Don t know Source: Enterprise Strategy Group 2014. A 2014 Enterprise Strategy Group survey reveals that tolerance for Tier-1 applications is getting increasingly strict. The survey result shows 83% of respondent organizations reported a tolerance of just three hours or less for their high-priority applications. This includes 25% of respondents that report no is ever tolerated. Key facts about mission-critical application backup and recovery Protecting and recovering application data is different from protecting unstructured data (such as documents, emails, instant messages, video, and audio files). Here are key things you need to know about application data: Application files are referred to as open files because they are frequently updated and accessed. The backup process must coordinate with the application before performing a backup of its data. An application can consist of a set of files; for example data files, redo/transaction logs, control files, and cache files. All of these files need to be captured in a consistent manner because failure to do so can lead to backup data corruption and restore inconsistencies. Each application has a unique architecture and method to read and write data files. This also applies to the backup and restore process; each application needs to be backed up and restored in a unique way. 3

Top five challenges and solutions The following outlines key challenges for protecting your mission-critical workloads: Challenges 1. Protecting varying and complex application workloads You rely on multiple applications for day-to-day operations. Regardless of how they are classified independently (mission-critical, operational, supportive, and so on), they each have their own level of importance and must be protected in a manner that matches their value to the organization. For those classified as critical to the business, with little to no toleration for performance degradation and, you must take a more strategic approach to setting application recovery objectives. The reality is that traditional backup and recovery solutions and procedures fail to meet this challenge and often result in an attempt to apply a onesize-fits-all approach. 2. Protecting virtualized applications Today, virtualization is just as commonplace as servers, storage, and networking. With many application vendors supporting virtualization platforms, it is not uncommon for organizations to virtualize their mission-critical applications. But protecting virtualized applications adds an additional layer of complexity to the backup process, requiring the backup and recovery solution to work in tandem with the hypervisor to ensure that none of the workloads are resource-starved in the process. Traditional backup and recovery approaches, however, are not practical for virtual environments, offering minimal support and burdening the virtual machine administrator with complex restore processes. Because traditional approaches are not designed for virtualized applications, attempting them proves costly with complex scripting, inconsistent backups, data corruption/loss, and more importantly, an unstable virtual infrastructure. 3. Inconsistent and complex application recovery Application owners define backup and recovery needs in terms of service level agreements (SLAs). Administrators use Recovery Time Objectives (RTOs) to marry the SLA to a backup configuration that matches the targeted duration of time the application is restored. During a recovery operation, the complexity of the process and the number of staff involved are the key inhibitors to meeting RTOs. In environments with distributed responsibilities (for example, application, virtual machine, backup, and infrastructure administrators) restore operations require multiple roles, with each administrator capable of completing only a partial restore operation. This results in a time-consuming and complex approach that leads to inconsistent recovery operations and failure to meet aggressive SLAs. 4. Dynamic and agile data center infrastructure As IT organizations continue to rely on a combination of physical, virtual, cloud (private, public, and hybrid), and distributed data centers, the boundaries of IT are increasingly transparent. This means that there is not always a need for an application to reside in the same place and on the same infrastructure: with some applications remaining on physical servers, some virtualized, and others that can operate outside the core data center. With this kind of application mix and mobility, a traditional data protection approach results in a complex collection of backup and recovery tools that are specialized for the application and/or infrastructure it runs on. Having multiple backup and recovery tools at each location results in a heavy OPEX cost and equally complex and costly restore operations. 5. Infrastructure saturation from application performance and growth requirements Traditional backup and recovery solutions provide the level of infrastructure management required to balance the resource demands of the infrastructure and the performance requirements of the mission-critical applications being protected. However, attempting to force-fit a traditional solution often means the transmission of redundant information, underutilization of the backup infrastructure, and inefficient capacity management for backup operations. Data protection solutions that lack the ability to effectively schedule, balance resource loads, compress information, deduplicate redundant data, and offer intelligent insight and forecasting often result in mission-critical application disruptions, unreliable recovery efforts, inconsistent backup operations, and failure to effectively plan for future infrastructure needs. 4

But what about... High availability: Using high availability (HA) as a means to protect mission-critical applications and have them readily available in the event of disruption improves RPO. However, the tradeoff is that HA creates a vulnerability by requiring continual replication of the application data to support a restart. If the application becomes corrupted, the corruption is replicated to the HA pair. Without the ability to restore the application to the point-in-time before the corruption occurred, the organization is at risk. Combining HA with an application-aware data protection solution delivers the best of both worlds. Application clustering: Application clustering is a technique that aims to reduce to zero by instituting an automatic response to failure without the need for intervention when a node fails and can be used to increase the scalability of an application. Clustering and HA are often used in tandem, and like HA, without a data protection solution that understands the application cluster, the restore operation will be both time-consuming and error prone. Distributing applications: By distributing applications, you can select specific and groupspecific parts of an application to run in different locations and divide tasks or resources among the groups. While this approach addresses application scale and resilience, like clustering and HA, the approach does not address the long-term data restoration needs that are required in the event of data corruption or loss. So it s essential that the backup solution be aware of HA, clustering, and distributed application configurations to ensure both success and integrity in the backup and restore operations. Solutions The increased business risks in mission-critical environments can seem daunting, but when you utilize today s advanced technologies and backup and recovery techniques, you can reduce your risk and enable the success, integrity, and security of your end-to-end business processes. Here are five elements of a consistent, efficient, and policy-based approach to data protection for mission-critical environments: 1. Protecting varying and complex application workloads Because each application has its own unique characteristics and importance to the business, the backup and recovery strategy should be just as unique and aligned to the application s criticality to the business. The more expensive the loss of data, the higher the rate of change; and for more critical applications, the backup and recovery policy should be more aggressive. This means the backup and recovery solution must provide support for non-disruptive backup and instant recovery, regardless of the complexity of the application. Achieving this requires a solution that is not only application-aware, but also integrated with the infrastructure. Integrating with the infrastructure enables the backup and recovery solution to balance resource utilization by offloading certain aspects of the process to the device best suited to complete the task. For example, non-disruptive backups can be achieved when the solution relies on integration with the primary storage array to create snapshots or space-efficient, point-in-time copies of the production data as the source for the backup operation. This reduces the operational impact on the application while still providing a means to manage how aggressive the backup and recovery policy should be. 2. Protecting virtualized applications Application-aware, hypervisor-integrated, and capable of utilizing the advanced features of the physical infrastructure are key to protecting your virtualized applications. Hardware and software vendors offer application programming interfaces (APIs) that cooperatively work with external applications to complete a joint task; for example, backup and recovery. However, to ensure optimum protection for current and future mission-critical applications you will require flexible protection approaches that include: Agentless: Backups coordinated via the hypervisor APIs Agent: Guest-level services for application and operating system combinations that do not support hypervisor utilities A combination of the two: a lightweight agent to prep the application and operating system, and agentless approach to offload the backup operation to underlying infrastructure 3. Inconsistent and complex application recovery Simplifying recovery operations should begin with instituting a data protection solution that offers application-awareness and provides application owners with direct visibility and ownership over the backup and recovery process. This enables your IT staff to focus on infrastructure tasks and places the responsibility of backup management and granular recovery in the hands of the application owner. With the owner s specialized application knowledge and access to application-aware protection tools, the backup and recovery process greatly reduces the time-consuming and error-prone conditions that occur when multiple IT roles are required to complete the restore operation. Additionally, your IT staff can focus on building the data protection infrastructure to meet the aggressive SLAs and be assured that the actions taken by the application owner are within the scope of the greater data protection strategy. 4. Dynamic and agile data center infrastructure Transparent IT boundaries and the fluid characteristics of the data center mean point-based backup and recovery solutions will only address the data protection challenges you currently face. More importantly, narrowing the data protection solution to a specific fit criteria increases the need to adopt multiple solutions. Instead, IT should be enabled to build a service-defined, rather than hardware-specific, backup infrastructure. With a service-defined approach, the focus is placed on the workload being protected, with the data protection solution managing the physical and virtual requirements (storage, backup target, network load, and so on) as resource pools. This approach allows you to align your SLA and RPO requirements with the data protection resource pool that has the features and capability mix to meet the requirements. 5

5. Infrastructure saturation from application performance and growth requirements The goal for meeting this challenge is to create a data protection solution capable of scaling in lock step with both the data growth characteristics of the organization and the aggressiveness of the backup and recovery strategy. This enables maximum infrastructure utilization while addressing the performance and growth requirements of mission-critical applications. Combining a scalable and application-aware solution with the use of operational analytics is the key to transitioning data protection from a reactive IT operation into a strategic system that facilitates data-driven decision-making. When your data protection solution uses realtime analytics and monitoring, you can: Narrow the issue scope to improve resolution speed Provide recommendations to achieve maximum utilization Introduce corporate foresight to understand future mission-critical application needs based on how the infrastructure is being used HP s Adaptive Backup and Recovery approach HP is driving a new and innovative data protection approach by shifting to a more intelligent and adaptive backup and recovery framework, incorporating application awareness, storage integration, and operational analytics. This adaptive framework delivers real-time usage with real-world workloads, to optimize your data protection needs so that you can make datadriven decisions. By applying operational analytics, HP Adaptive Backup and Recovery enables you to: Power your backup solution leveraging a scalable, extensible, and robust architecture Protect your workload - any type, in any place and on any backup target Predict backup and recovery needs with realtime operational analytics Proactively address issues through assistive remediation Personalize reporting with a highly intuitive and interactive dashboard The future according to HP: Adaptive Backup and Recovery HP Backup and Recovery solutions deliver a combination of backup, restore, and disaster recovery capabilities with real-time monitoring and operational analytics to meet the scale and flexibility requirements of your most challenging data protection needs. With a robust architecture that enables the offloading of data protection processing to different points in the infrastructure, along with a comprehensive approach to tiering your backup and restore operations, HP Data Protector, and its companion solutions HP Backup Navigator and HP Data Management Pack, optimizes backup and restore for the often resource-constrained data protection process found in mixed environments. The result is a service-defined data protection solution that gives your administrators the capability to organize, manage, schedule, and execute protection strategies by SLAs, without being tied to the physical or virtual components the workload is running on. The solution ensures business continuity and resiliency for mission-critical environments. HP Backup and Recovery solutions offer core capabilities for protecting mission critical environments: Comprehensive integrations enable backup, restore, and disaster recovery responsibilities to extend into the data protection process. Application-awareness allows backup and restore operations to focus on restorability. Hypervisor extensions support low-level interface integrations to enhance the backup operation and extend protection operations into virtual environment management tools. Hardware-acceleration means the management and orchestration of snapshots accelerate the backup and restore process. Granular options provide the ability to instantly restore single items, objects, or whole images. Distributed granular recovery enables administrators and application owners to recover single items directly from the application console, without requiring assistance from the backup administrator. The single-item recovery process is streamlined to allow application administrators to recover from disk or tape backups. Enhanced automated disaster recovery, also known as bare metal recovery, is the ability to centrally recover virtual or physical servers from a single backup. Unique to HP Data Protector, this recovery option enables you to create disaster recovery images from an existing file system or image backup, including object copies, without the need to create a separate backup for system recovery. HP Data Protector automatically rebuilds the application, the system, and the underlying infrastructure provisioning. Integrated deduplication ensures that only unique information is transferred from pointto-point using a deduplication algorithm prioritized by the backup target in use. This enables optimal capacity utilization and manageable network bandwidth consumption at varying levels of the backup infrastructure at the source, the backup server, or the backup target. To learn how your organization can optimize its backup and recovery environment for missioncritical applications visit http://autonomy.com/adaptivebackup/use-cases/mission-critical.

Learn more at http://autonomy.com/offerings/data-protection/ About HP Autonomy HP Autonomy is a global leader in software that processes unstructured human information, including social media, email, video, audio, text and web pages. Using HP Autonomy s information management and analytics technologies, organizations can extract meaning in real time from data in virtually any format or language, including structured data. A range of purpose-built market offerings helps organizations drive greater value through information analytics, unified information access, archiving, ediscovery, enterprise content management, data protection and marketing optimization. Additional information is available at http://autonomy.com. Sign up for updates hp.com/go/getupdated Share with colleagues Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Http://autonomy.com 20140926_IT_WP_HP_Data Protector_for_mission_critical_apps