business continuity using netware ® services mark gonnelly att engineer novell, inc. mitchell smith...
TRANSCRIPT
Business Continuity Using NetWare® Services
Mark GonnellyATT EngineerNovell, Inc.
Mitchell SmithSr Technical TrainerNovell, Inc.
© March 9, 2004 Novell Inc.2
one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions.
The one Net vision
Novell exteNd™
Novell Nsure™
Novell Nterprise™
Novell NgageSM
:
:
:
:
© March 9, 2004 Novell Inc.3
The one Net vision
Novell Nterprise is an innovative family of products which gives you the power to enable and manage the constant interaction of people with your business systems — regardless of who they are or where they are.
Novell Nterprise™
Novell exteNd™
Novell Nsure™
Novell Nterprise™
Novell NgageSM
:
:
:
:
© March 9, 2004 Novell Inc, Confidential & Proprietary4
The Problem
40% of enterprises that experience a disaster will go out of business in five years.
Only 15% of enterprises have a full-fledged business continuity plan that goes beyond core technology and infrastructure
(Source: Gartner)
© March 9, 2004 Novell Inc, Confidential & Proprietary5
The Implications
High availability of critical business systems is no longer a luxury restricted to large businesses ― it is a competitive business requirement for everyone.
© March 9, 2004 Novell Inc, Confidential & Proprietary6
How We Are Going to Help You
You may feel that you don’t have the budget for proper disaster recovery solutions but…
Start with what you have…iFolder®
Archive ServicesSnapshotsBackupsClustering
Go to where you need to be…Business Continuance Clustering
© March 9, 2004 Novell Inc, Confidential & Proprietary7
Before we start…
Don’t try to make a square peg fit into a round hole.
© March 9, 2004 Novell Inc, Confidential & Proprietary8
Problems of Personal Data Availability
A disk failure on one of your personal systems could be a serious disaster.
Sensitive Company data is often stored on employee’s computers/laptops and not backed up regularly.
You don’t dare store your sensitive data on the Internet.
1 out of 1,000 laptops are stolen; 10% are targeted for their data.
© March 9, 2004 Novell Inc, Confidential & Proprietary9
What’s in iFolder 2.1?
iFolder 2.1 is bundled in NetWare 6.5 and includes:
Automatically and transparently synchronize files to iFolder server and your other machines through any standard Internet connection
Encrypt files delivered to, and stored on, the server to protect them from unauthorized access
Secure access to your files from a Web browser
Scale to millions of users - Cluster multiple iFolder servers under a single DNS name
PDA access to iFolder files
Ability to choose location of local iFolder
© March 9, 2004 Novell Inc, Confidential & Proprietary10
Novell iFolder®
Backup
Synchronize
Access
Instant access to your files— online, offline, anytime
© March 9, 2004 Novell Inc, Confidential & Proprietary11
Novell iFolder Summary
Novell iFolder lets your files follow you—everywhere
Automatically backs up your local data
No matter where you are, your files are always with you
Simplifies the way files are used across the Net
Files are always safe, secure, and up-to-date
Secures and protects corporate digital assets
Accelerates the productivity of today’s mobile professionals
© March 9, 2004 Novell Inc, Confidential & Proprietary12
Backing Up User Data
When users store data on servers there are still problems
Users generate a LOT of data
You don’t want to backup up some of what they create – for example, MP3s
Restoring individual files is time consuming and costly
Your time between backups affects your ability to recover from user errors
© March 9, 2004 Novell Inc, Confidential & Proprietary13
File Archiving
Built on Novell’s File based Epoch Event File System Technologies in NetWare® 6.5Takes scheduled file level (not block) snapshots
Keeps Archives on Archive volume or separate Archive server
– Archive server can be any OS platformCan designate which subdirectories and/or file types to archive and when
– Great flexibility for shared user foldersNetStorage Interface for User self restore of previous file versions
– Users can view previous versions and decide which to restore
– Indicates the user who last modified the particular version
© March 9, 2004 Novell Inc, Confidential & Proprietary14
How Does Archiving Work?
Versioning Server MySQL
Server1
Server2
VOL1:
VOL1:
\\Server1\VOL1 Job
\\Server2\VOL1 JobVERSIONING VOLUME WITH MySQLDATABASE
© March 9, 2004 Novell Inc, Confidential & Proprietary15
Archiving Summary
The Novell Archive / Version Services allows individual users to restore previous versions of modified, lost, or deleted files.
This feature is great for workgroups working on files in shared folders or personal files on the server
Provide a lower cost of management for IT departments by allowing users to self restore files.
Provide a means to allow users to be more productive by allowing them to correct their own mistakes.
© March 9, 2004 Novell Inc, Confidential & Proprietary16
Backing Up Databases
How do you backup up applications like databases and mail systems?
There is usually a requirement to stop the application to get a consistent backup.
This conflicts with application availability requirements.
© March 9, 2004 Novell Inc, Confidential & Proprietary17
Snapshot Technology
Creates a virtual image of the pool at that moment
Not a full copy of the pool
Cannot be used to restore a deleted original pool
Uses Copy On Write to save changes
Main purpose is to allow backup of open files
Can be used to restore deleted or corrupted files
© March 9, 2004 Novell Inc, Confidential & Proprietary18
How snapshot works
Stored-on PoolData Pool
At creation time, all the data for a Snapshot Pool comes from the original Data Pool. No data is actually stored in the Snapshot.
Snapshot
= +
© March 9, 2004 Novell Inc, Confidential & Proprietary19
How snapshot works
Stored-on PoolData Pool
Changes to the Data Pool causes the old data to be copied to the Stored-on Pool. The Snapshot Pool gets its data from both.
Snapshot
= +
© March 9, 2004 Novell Inc, Confidential & Proprietary20
Snapshot Summary
© March 9, 2004 Novell Inc, Confidential & Proprietary21
Snapshot Summary
Snapshot is independent of hardware vendor,even mix of vendors.
Snapshot tools integrated into console
Anytime backup
View & select file versions
© March 9, 2004 Novell Inc, Confidential & Proprietary22
Data Vulnerability
Data is usually in one location, even on one server
How do you deal with the loss of that location – for example, fire or flood?
© March 9, 2004 Novell Inc, Confidential & Proprietary23
RAID1 (Mirroring)
Mirroring completely rewritten for NetWare 6.5
Faster Remirroring - Saves blocks mirrored on the disk. Remirrors only necessary blocks after an Abend or power down.
Add mirroring at any time - No need to set up mirror objects at partition creation time.
Mirrored pools can be seen by all nodes in a cluster.
Fully multi-processor enabled.
Scalable – Same size memory for all size partitions
RAID1
© March 9, 2004 Novell Inc, Confidential & Proprietary24
iSCSI Value
Storage Frames(FC, SCSI, or ATA)
~$20,000 to $1,000,000 ea
GigabitEthernet Switches
~$10,000 ea.
Servers.Gigabit Ethernet
Built-in
4 to 10 times less expensive than Fiber Channel
SAN Deployment using iSCSI Solutions
© March 9, 2004 Novell Inc, Confidential & Proprietary25
iSCSI SAN Fundamentals
File System
TCP/IP TCP/IP
Hard DisksServer
Standard Ethernet Adapter
Standard Ethernet Adapter
Standard Ethernet Switch
SCSI “Initiator” SCSI “Target” or Disk Server
A simple iSCSI SAN
Read Block Request
SCSI Block Request
iSCSI Packet
SCSI Block Request
iSCSI Packet
SCSI Disk Request
SCSI Protocol
SCSI Protocol
© March 9, 2004 Novell Inc, Confidential & Proprietary26
Novell iSCSI Summary
Target • An inexpensive way to turn your existing direct attached
storage (DAS) server hardware into a flexible and manageable SAN solution for your Net Services
• NetWare 6.5 only• Integrated with LDAP for Directory based management
Initiator• Ensure NetWare works with open standards
and standard Storage Solutions• NetWare 5.1 and above• Offer direct and indirect SAN benefits to customers who
typically would not purchase expensive Fibre Channel SANs
• Makes server to server mirroring affordable
© March 9, 2004 Novell Inc, Confidential & Proprietary27
The Down Time Problem
How much are your network services worth?
File transfers and file storage
Calendaring and collaboration
Web hosting
Critical databases
How much does down time cost?
© March 9, 2004 Novell Inc, Confidential & Proprietary28
Novell Cluster Services
Highly-scalable, load-balancing, directory-enabled clustering environment
Up to 32 servers in an all-active cluster
Fan-out failover for load balancing on failover
Transparent failover
Enhanced cluster resource management
Integrated with NDS®
Intelligent cluster volume operations
Built in cluster volume manager allows for dynamic volume changes in the SAN without rebooting any servers
© March 9, 2004 Novell Inc, Confidential & Proprietary29
Novell Cluster Services™
NetWare 6.5Cluster
Ethernet Switch
Shared Storage
Public Network
iSCSI Network
SBD PartitionHow it Works
© March 9, 2004 Novell Inc, Confidential & Proprietary30
Novell Cluster Services™
Public Network
iSCSI Network
How it Works
NetWare 6.5Cluster
Ethernet Switch
Shared Storage
SBD Partition
Cluster Resource Data
Cluster Resource
© March 9, 2004 Novell Inc, Confidential & Proprietary31
Novell Cluster Services™
Public Network
iSCSI Network
How it Works
NetWare 6.5Cluster
Ethernet Switch
Shared Storage
SBD Partition
Cluster Resource Data
Cluster Resource
© March 9, 2004 Novell Inc, Confidential & Proprietary32
Clustering Summary
1. Complete SAN solution, 32 nodes of clustering, iSCSI support
2. High Availability becomes a reality-right out of the box
3. Ability to setup a SAN at low cost
4. Ability to do maintenance without impacting service availability
© March 9, 2004 Novell Inc, Confidential & Proprietary33
Are You Ready for This?
© March 9, 2004 Novell Inc, Confidential & Proprietary34
Business Continuance Cluster
Powered by NetWare®, Novell Cluster Services, and Novell DirXML®
Fails over network services from one cluster to another, geographically, separate cluster
Provides high availability to your mission critical resources in the event of a disaster
Supports up to four clusters
© March 9, 2004 Novell Inc, Confidential & Proprietary35
Cluster 1Cluster n
Business Continuance Cluster
replicate
How it Works
© March 9, 2004 Novell Inc, Confidential & Proprietary36
Business Continuance Cluster
Cluster 1Cluster n
How it Works
© March 9, 2004 Novell Inc, Confidential & Proprietary37
Business Continuance Cluster
Cluster 1Cluster n
How it Works
© March 9, 2004 Novell Inc, Confidential & Proprietary38
Replicating the Data
Things to consider:
Host-based vs. Disk-based replication
Asynchronous vs. Synchronous
Distance: 100 m, 1k, 100k, … around the world
Required bandwidth for replication?
Latency of the link? Latency tolerance of the application?
© March 9, 2004 Novell Inc, Confidential & Proprietary39
Business Continuance Clustering Summary
Novell Business Continuance Cluster Services is the premier disaster recovery solution for the Intel platform.
Provides failover of mission critical services to a secondary cluster
Integration with various SAN hardware devices for an automated failover process
Synchronizes and transforms cluster related eDirectory objects using Novell’s DirXML technology
Provides for < 5 minute failover based on administrator intervention
Failover of one or all cluster resources
Support for Novell’s new Virtual IP Address (VIPA) technology
© March 9, 2004 Novell Inc, Confidential & Proprietary40
Final Summary
Start a disaster recovery plan based on what you have right now.
Plan to grow to a complete business continuity solution a step at a time.
But remember…
Each solution has it’s own niche; don’t try to make a square peg fit into a round hole.
© March 9, 2004 Novell Inc, Confidential & Proprietary42
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.