6. jason phippen - veritas

21
7/28/2019 6. Jason Phippen - Veritas http://slidepdf.com/reader/full/6-jason-phippen-veritas 1/21 VERITAS Confidential Disaster Recovery  – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA

Upload: sreenivas-reddy-g

Post on 03-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 1/21

VERITAS Confidential

Disaster Recovery  – Beyond

Backup

Jason Phippen – Director Product and

Solutions Marketing, EMEA

Page 2: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 2/21

VERITAS Confidential

Agenda

• Disaster Recovery Concepts• Backup – Last Line of Defence

• Enhancing Backup with Replication

• Remote Site Replication and Mirroring• Clustering for Disaster Recovery

• Questions

Page 3: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 3/21

VERITAS Confidential

• Recovery Point Objective (RPO)  – 

Point in time to which applications data must be recovered to resumebusiness transactions

• Recovery Time Objective (RTO)  – 

Maximum elapsed time allowed before lack of business function severelyimpacts an organization

Disaster Recovery Concepts

Days MinsHrsWks Secs

Recovery Point

Mins DaysHrsSecs Wks

Recovery Time

Page 4: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 4/21

VERITAS Confidential

• How much data loss can you endure?

Recovery Point Objective (RPO)

Tape Backup w/

Offsite Vaulting

Replication

Mins DaysHrsSecs WksDays MinsHrsWks Secs

Recovery Point Recovery Time

Page 5: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 5/21

VERITAS Confidential

• How much downtime can you endure?

Recovery Time Objective (RTO)

Recovery from Tape

Geographic Clustering

Mins DaysHrsSecs WksDays MinsHrsWks Secs

Recovery Point Recovery Time

Page 6: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 6/21

VERITAS Confidential

• “Far Enough” away 

 – How far away from the main site? – What resources should it have?

• Site Strategies (Hot, Warm, Cold)

• Considerations

 – Fault zones – Flood plains

 – Power grids

 – Climate zones

 – Locality relative to other sites

(e.g., airport) – Remote customers and employees

Choosing a Recovery Site

Page 7: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 7/21

VERITAS Confidential

Backup  – Your last line of Defense

• Redundant systems replicate user errors, virusesand data corruption

• System or component redundancy (RAID,

mirroring) cannot replace backup

• Backup tapes may represent the last valid copy

of data

• Backups are your last line of defense against

total data loss

Page 8: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 8/21

VERITAS Confidential

Enhancing Backup with

Replication

Page 9: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 9/21

VERITAS Confidential

• Replicating the Backup Catalog server 

 – Shave hours off a tape restore strategy

 – No need to re-catalog tapes

 – No need to rebuild the backup/restore server 

 – Tape restores can begin immediately

Backup Tape Copies

Sent to Offsite

Site A Site B

Backup

Clients

Backup

Master/Media

Server 

Replicate Backup Catalogs

Replication-enhanced Backup

Page 10: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 10/21

VERITAS Confidential

Remote Site Replication and

Mirroring

Page 11: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 11/21

VERITAS Confidential

Replication and Mirroring

Key Requirements… • Must be “far enough” away 

• No windows of datacorruption at secondary

Synchronous

Asynchronous

Recovery Point

MinutesDays Hours SecondsWeeks

Page 12: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 12/21

VERITAS Confidential

Strengths

• Maximum data currency (RPO)

• Data available immediately at secondary (RTO)

Weaknesses

• Potential to impact application performance

• Data writes lag by network latency

• Write commit latency across nodes

Primary Site Secondary Site

Synchronous Replication

Page 13: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 13/21

VERITAS Confidential

Strengths

• Maximum performance

• May have less application impact

• Data available immediately at secondary (RTO)

Weaknesses

• Secondary may lag primary (RPO)

• Potential for data corruption

(not a weakness for VERITAS)

Primary Site Secondary Site

Asynchronous Replication

Page 14: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 14/21

VERITAS Confidential

Secondary Site

Application

Volume Manager  

SAN Fabric 

• Lower hardware costs

 – Groups physical disks into logical volumes

 – Hardware Independence,

• Greater IT productivity

 – Simplified administration of heterogeneousenvironments

 – Proactive management of applications• Increased application ROI

• Can mirror over SAN distances

Primary Site

Logical Volume ManagementRemote Mirroring 

Page 15: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 15/21

VERITAS Confidential

Clustering for Disaster 

Recovery

Page 16: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 16/21

VERITAS Confidential

Campus / MAN Disaster Recovery WAN Disaster Recovery

Clustering for Disaster Recovery

WAN

Clustering, Replication, Global Clustering

MAN

Clustering ,

Replication

Clustering,

Remote Mirroring

OR 

Page 17: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 17/21

VERITAS Confidential

Campus / MAN Disaster RecoverySt-r-e-t-c-h Cluster Over A SAN 

* Distance may varydepending upon

infrastructure 

Page 18: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 18/21

VERITAS Confidential

Global Clustering

• Geographically dispersed sites linked by public carrier wide areanetwork

• Each site aware of the configuration and state of all of the sites

• Direct site level migration in event of catastrophe

• Global Availability Management

• Single point of monitoring and administration

Page 19: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 19/21

VERITAS Confidential

Replication

Site Migration

Wide Area Availability 

Application

ClusteringGlobal

Clustering

Application

ClusteringGlobal

Clustering

Application

ClusteringGlobal

Clustering

Failover  

Page 20: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 20/21

VERITAS Confidential

VERITAS

Cluster Server 

Volume Manager/

Foundation Suite

NetBackup/

Backup Exec

VERITAS Global

Cluster Manager 

VERITAS Volume

Replicator 

- NetBackup Vault

- BMR / IDR

Local Multi-site

   A  v  a   i   l  a

   b   i   l   i   t  y   R  e  q  u   i  r  e

  m  e  n   t  s

VERITAS: Uniquely Qualified (HA and DR)

Page 21: 6. Jason Phippen - Veritas

7/28/2019 6. Jason Phippen - Veritas

http://slidepdf.com/reader/full/6-jason-phippen-veritas 21/21

VERITAS Confidential

Questions