data protection manager – rescue data like a hero! inf313 level 300 data protection manager –...
Post on 15-Jan-2016
223 views
TRANSCRIPT
INF313Level 300
Data Protection Manager – Data Protection Manager – Rescue data like a hero!Rescue data like a hero!Amit GatenyoInfrastructure & Security Team Lead, DarioTOP Consultant, [email protected]
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Backup And Recovery Is…Backup And Recovery Is…Backup And Recovery Is…Backup And Recovery Is…
Business necessityBusiness necessityInformation is most valuable assetInformation is most valuable asset
Comprehensive backup strategy is essential Comprehensive backup strategy is essential infrastructure componentinfrastructure component
Attractive target for cost reduction Attractive target for cost reduction ~ 70% of total cost is manual labor ~ 70% of total cost is manual labor
Respond to backup market shift from tape to diskRespond to backup market shift from tape to disk
Becoming more and more painful Becoming more and more painful Storage requirements growing at an exponential rateStorage requirements growing at an exponential rate
Regulation and Compliance Regulation and Compliance
Opportunity to improve customer satisfaction with the Opportunity to improve customer satisfaction with the Windows Server platformWindows Server platform
Industry WavesIndustry WavesBackup and recovery evolutionBackup and recovery evolution
Industry WavesIndustry WavesBackup and recovery evolutionBackup and recovery evolution
Majority of companies use tape
Tape one size fits all Backup once per day Tape recoveries slow
& unreliable Administrators do all
recoveries
TodayToday
Disk based backup becoming cost effective
Recovery in minutes or seconds
Continuous backup End user recovery Self healing backups
FutureFuture
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
What does DPM do?What does DPM do?What does DPM do?What does DPM do?
Near continuous (hourly) protectionNear continuous (hourly) protectionDPM agent on file serversDPM agent on file servers
Byte-level changes transmitted to DPM serverByte-level changes transmitted to DPM server
Multiple scheduled snapshots per dayMultiple scheduled snapshots per day
Easy IT or End-User restore – fast from Easy IT or End-User restore – fast from diskdisk
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Rapid and Reliable Recovery
Recovery is unreliable and painfulRecovery is unreliable and painfulToo slow and expensive to recover filesToo slow and expensive to recover files
Typical recovery takes hours or days (slow, expensive)Typical recovery takes hours or days (slow, expensive)
Recoveries are unreliableRecoveries are unreliable42% of companies had failed recovery in past year42% of companies had failed recovery in past year
50% of customers wish for online backup verification50% of customers wish for online backup verification
Data protection is labor intensiveData protection is labor intensive
All recoveries go through the server adminAll recoveries go through the server admin
Solution with DPMSolution with DPMDesigned for fast recoveryDesigned for fast recovery
Enables a whole new recovery scenario:Enables a whole new recovery scenario:End users - FilesEnd users - Files
Admins - ServersAdmins - Servers
Snapshots enable multiple recovery pointsSnapshots enable multiple recovery points
Recoveries are assured through verification Recoveries are assured through verification
Customer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain Points
Customer Needs: Faster RecoveryCustomer Needs: Faster Recovery
Continuous
and efficient
protection
Backup is too complex, slow, and inefficientBackup is too complex, slow, and inefficientShrinking backup windowShrinking backup window
Growth in data makes it too difficult and time Growth in data makes it too difficult and time consuming to back upconsuming to back up
Backups too slow/lots of manual schedulingBackups too slow/lots of manual scheduling
Mandated disaster recovery plansMandated disaster recovery plans
24 hours of data loss assumed with tape24 hours of data loss assumed with tape
Tape as one size fits all (file and server recovery, offsite Tape as one size fits all (file and server recovery, offsite protection and long term archive)protection and long term archive)
Tape inconvenience and unreliability is #1 challengeTape inconvenience and unreliability is #1 challenge
Solution with DPMSolution with DPMFaster and More Efficient BackupFaster and More Efficient Backup
Never do a full backup from a production server againNever do a full backup from a production server again
Avoid the shrinking backup windowAvoid the shrinking backup window
Customer Needs: Eliminating Backup Customer Needs: Eliminating Backup Window Window
Customer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain Points
Current backup products are too complex, costlyCurrent backup products are too complex, costlyCompanies spend too much time and money on backupCompanies spend too much time and money on backup
Labor is the majority of backup costLabor is the majority of backup cost
Branch office data protection is cumbersomeBranch office data protection is cumbersome
Massive data growth increases costs Massive data growth increases costs
Too many tapesToo many tapes
Most disk-based backup solution are cost prohibitiveMost disk-based backup solution are cost prohibitive
Operational
Simplicity
Solution with DPMSolution with DPMAllows end users to easily recover their own filesAllows end users to easily recover their own files
Usability and easier managementUsability and easier management
Integration into existing environmentIntegration into existing environment
Industry standard hardware and software Industry standard hardware and software
Customer Needs: Simpler Solution, Lower Customer Needs: Simpler Solution, Lower costscosts
Customer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain PointsCustomer Data Protection Pain Points
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Ideal CustomersIdeal CustomersIdeal CustomersIdeal Customers
DPM is a solution for DPM is a solution for customers of all sizescustomers of all sizes but the ideal but the ideal customers are: customers are:
Data centersData centersSignificant backup window issues Significant backup window issues Frequent file recoveries from tape Frequent file recoveries from tape Few IT staffFew IT staffHave a Recovery Point Objective (RPO) of approximately one Have a Recovery Point Objective (RPO) of approximately one hour hour Have a faster Recovery Time Objective (RTO) than tape can Have a faster Recovery Time Objective (RTO) than tape can provide provide
Lots of branch offices Lots of branch offices Many distributed branch office file servers Many distributed branch office file servers Few or no dedicated IT staff in the branch Few or no dedicated IT staff in the branch Likely to currently use existing tape infrastructureLikely to currently use existing tape infrastructureHigh backup costsHigh backup costs
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation ScenariosImplementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
ActiveActiveDirectoryDirectory
Data Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to Tape
Active Directory Active Directory Scheduled auto-discovery jobQueries AD for new serversMaintains ACL’sRedirects shadow copies
ClientsClients
AgentsAgentsProtects Win2000, Win2003, WSS2003 (non-clustered)Agents track / synchronize data from production servers to DPMAll agent communication initiated from DPMEach protected volume has sync log (10% of volume size) Agent overhead 3-5% Deployed via DPM UI
ClientsClients
ActiveActiveDirectoryDirectory
File ServersFile Servers
Data Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to Tape
DPM ServerDPM ServerWindows Server 2003 SP1 or Storage Server 2003 SP1IIS, SQL, Reporting ServicesLots of disks (2 to 3 times the size of the protected data)
ClientsClients
ActiveActiveDirectoryDirectory
File ServersFile Servers DPM ServersDPM Servers
Data Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to Tape
ClientsClients
ActiveActiveDirectoryDirectory
File ServersFile Servers DPM ServersDPM Servers
SnapshotsSnapshotsSnapshots created for quick recovery Multiple, schedule driven point-in-time copiesUser-friendly, wizard driven set up and restore
Data Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to Tape
Tape LibraryTape LibraryAllows for restore of DPM server itself (System State, Replicas)Enables restore of any file object on production servers from tapeSolutions available: Yosemite, Veritas, CommVault, Windows Backup
ClientsClients
ActiveActiveDirectoryDirectory
File ServersFile Servers Tape LibraryTape LibraryDPM ServersDPM Servers
Data Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to TapeData Centers - Disk to Disk to Tape
Backup process Agent deployed to branch
office servers Agent captures data and
replicates to DPM server in HQ
DPM takes snapshots to enable recovery at multiple points in time
Benefits Rapid & reliable recovery
including end user recovery
Less potential data loss Easy and efficient
scheduling and management
No trained staff needed in branch
Reduce tape equipment requirements in the branch
Corporate WAN
Haifa
Jerusalem
Gaza
Clients
Clients
Clients
Headquarters
DPM Server
Branch Office Data ProtectionBranch Office Data ProtectionBranch Office Data ProtectionBranch Office Data Protection
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Configuring File Server ProtectionConfiguring File Server ProtectionConfiguring File Server ProtectionConfiguring File Server Protection
Easy-to-use graphical interface, all Wizard driven Create Protection Group to apply back up policies to servers in group Create a comprehensive data protection plan in minutes
DPM Admin Recovery ScreenDPM Admin Recovery ScreenDPM Admin Recovery ScreenDPM Admin Recovery Screen
Easily find data to restore through simple browsing or searching Restore data to any location with 2 clicks
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
DPM can only be installed on Windows 2003 SP1 or DPM can only be installed on Windows 2003 SP1 or greatergreaterDPM cannot be installed on a domain controllerDPM cannot be installed on a domain controllerMust be in the same Active Directory domain as the Must be in the same Active Directory domain as the servers that it is protectingservers that it is protectingOnly protects:Only protects:
Windows 2000 SP4 or greaterWindows 2000 SP4 or greaterWindows 2003 SP1 or greaterWindows 2003 SP1 or greater
On each protected volume on a Production Server, a On each protected volume on a Production Server, a minimum of 500 MB of free space is required for the minimum of 500 MB of free space is required for the synchronization logsynchronization log
DPM “Under The Hood” DPM “Under The Hood” So much prerequisitesSo much prerequisites
DPM “Under The Hood” DPM “Under The Hood” So much prerequisitesSo much prerequisites
All application state and configuration data stored in a SQL Server database
Protected data stored in the following places Replica Area is a mounted volume that is
made up of replica of protected volume and the diff area
Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica.
DPM “Under The Hood” DPM “Under The Hood” DPM ServerDPM Server
DPM “Under The Hood” DPM “Under The Hood” DPM ServerDPM Server
DPM Server
File Servers
Active DirectoryClients
Acts as a controller of job scheduling and launchingActs as a controller of job scheduling and launchingSQL Server Standard Edition w/ Reporting ServicesSQL Server Standard Edition w/ Reporting Services
Included with DPM license, limited to this useIncluded with DPM license, limited to this use
Setup “hardens” server to be secure but to only Setup “hardens” server to be secure but to only enable DPM required servicesenable DPM required servicesLocal Management Console Local Management Console
Configuration, monitoring, reporting, recoveryConfiguration, monitoring, reporting, recovery
Footprint of 50-100 MB under normal operationsFootprint of 50-100 MB under normal operationsFootprint of up to 400 MB under specificFootprint of up to 400 MB under specificoperationsoperationsOverhead 5-15% expectedOverhead 5-15% expected
DPM “Under The Hood” DPM “Under The Hood” DPM Server: DPM EngineDPM Server: DPM EngineDPM “Under The Hood” DPM “Under The Hood” DPM Server: DPM EngineDPM Server: DPM Engine
Synchronously replicates synchronization Synchronously replicates synchronization logs to DPM server using two channels of logs to DPM server using two channels of communication:communication:
Control channel uses DCOM protocolControl channel uses DCOM protocolTCP port 135 is the DCE endpoint resolution point used by TCP port 135 is the DCE endpoint resolution point used by DCOMDCOM
By default, DCOM assigns ports dynamically from the TCP port By default, DCOM assigns ports dynamically from the TCP port range of 1024 through 65535. range of 1024 through 65535.
Data channel uses proprietary protocol and runs on Data channel uses proprietary protocol and runs on port 3148/3149port 3148/3149
All communications initiated by DPM ServerAll communications initiated by DPM Server
DPM “Under The Hood” DPM “Under The Hood” DPM Server: Replica AgentDPM Server: Replica AgentDPM “Under The Hood” DPM “Under The Hood”
DPM Server: Replica AgentDPM Server: Replica Agent
Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering
Each volume with protected object has synchronization log in hidden “System Volume Information” directory
Synchronization log is by default 10% of volume size but can be adjusted
Agent puts overhead of 3-5% on protected server
File Servers
Active DirectoryClients
DPM Server
DPM “Under The Hood” DPM “Under The Hood” AgentAgent
DPM “Under The Hood” DPM “Under The Hood” AgentAgent
Same channels of communication as the DPM ServerSame channels of communication as the DPM Server
All communications initiated by DPM ServerAll communications initiated by DPM Server
Max footprint of 15 MB, not persistentMax footprint of 15 MB, not persistent
Overhead of 3-5% expected during normal operationsOverhead of 3-5% expected during normal operations
Overhead similar to A/V filtersOverhead similar to A/V filters
Overhead of 80% expected during verificationOverhead of 80% expected during verification
DPM “Under The Hood” DPM “Under The Hood” AgentAgent
DPM “Under The Hood” DPM “Under The Hood” AgentAgent
“Pull” model, all synchronizations instigated by DPM server
All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication”
DPM “Under The Hood” DPM “Under The Hood” SynchronizationSynchronization
DPM “Under The Hood” DPM “Under The Hood” SynchronizationSynchronization
File Servers
Active DirectoryClients
DPM Server
Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow)
Sync with Consistency Check does two things Checks file by file for more recent modified
times then on replica If changed, all blocks associated with file
are check summed and appropriate blocks are replicated to DPM server
All open files are check summed irregardless Rolling process that traverses the entire
directory tree.
DPM “Under The Hood” DPM “Under The Hood” Synchronization with Consistency CheckSynchronization with Consistency Check
DPM “Under The Hood” DPM “Under The Hood” Synchronization with Consistency CheckSynchronization with Consistency Check
File Servers
Active DirectoryClients
DPM Server
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
End-User Restore from Windows ExplorerEnd-User Restore from Windows ExplorerEnd-User Restore from Windows ExplorerEnd-User Restore from Windows Explorer
Original Files
Overwritten
Right-click on any file or directory
PVCPrevious Versions Client
is an applet that extends Windows
Explorer and Office applications with
this simple new tab.
Available since Windows Server 2003
and VSS.
Usually installed silently via
Group Policy
Open document
Keep the new oneAND
Restore the old one
Restore the old one
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Monitoring & ReportingMonitoring & ReportingMonitoring & ReportingMonitoring & Reporting
MonitorMonitorMonitorMonitor
Monitor the health and status of your DPM server easily Set up automatic alerts via email
Report Report Report Report
Comprehensive reports show all data protection activity on the network
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Release Release RoadmapRoadmap
Broad application integration: Microsoft Exchange Microsoft SQL Server Microsoft SharePoint Server Longhorn Server
Advanced data protection features Bare Metal Recovery High Availability SAN integration Increased scalability Centralized management
2007 and 2007 and BeyondBeyond
System Center Data Protection Manager 2006 File Protection and Recovery Efficient, continuous data protection Rapid and reliable disk-based data recovery Designed to work with current tape archive software
TodayToday
DPM Protection OptionsDPM Protection OptionsDPM Protection OptionsDPM Protection Options
DPM v1DPM v1DPM v1-SP1DPM v1-SP1DPM v2DPM v2
Protect File Servers & SharesProtect File Servers & SharesYESYESYESYESYESYES
Protect Exchange Protect Exchange YESYESKB909644KB909644
YESYESKB909644KB909644
YESYESNative DPMNative DPM
Protect SQL ServerProtect SQL ServerYESYESKB910401KB910401
YESYESKB910401KB910401
YESYESNative DPMNative DPM
Protect System StateProtect System StateYESYESTechNetTechNet
YESYESTechNetTechNet
YESYESNative DPMNative DPM
Protect R2 SIS ServersProtect R2 SIS ServersYESYESMarch QFEMarch QFE
YESYESYESYES
Protect x64 WindowsProtect x64 Windows----YESYESYESYES
Protect ClustersProtect Clusters----YESYESYESYES
Beta Q2-06
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Pricing and AvailabilityPricing and AvailabilityPricing and AvailabilityPricing and Availability
Data Protection Manager Server License
Data Protection Management
License (Agent)
PricingPricing
FPPFPP Full Packaged Product Full Packaged Product $950 = Server + 3 $950 = Server + 3 agentsagents$559 = 3 agents$559 = 3 agents
Open & Select Open & Select ApproxApprox
$424 = Server$424 = Server$147 = Agent$147 = Agent
Available through all Available through all channelschannels
OEM, VolumeOEM, VolumeFPP, SAFPP, SA
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
Software
Industry PartnersIndustry PartnersIndustry PartnersIndustry Partners
Hardware
Featured OEM PartnersFeatured OEM PartnersFeatured OEM PartnersFeatured OEM Partners
FibreCATFibreCAT®® N40-DPM N40-DPM Based on market leading PRIMERGY server hardware, the FibreCAT N40-DPM is a fully pre-installed and pre-configured device that is designed to be easy to deploy. It is prepared for Back End integration in the data center, with Fujitsu Siemens Computers’ unique Virtual Tape Appliance CentricStor.
N40-DPM is based on windows storage server and offers market leading price efficiency. Extremely scalable.Designed for 0,9 TB / 6 fileserversExpandable to 50 TB / 99 fileserverswww.fujitsu-siemens.com/storage
A family of pre-configured and easy to deploy disk-based backup solutions built on the reliable ProLiant Storage Server NAS platform and powered by Microsoft DPM. These NAS appliances are designed to have customers up and running in minutes and include full hardware, O/S, and DPM support from HP. Available in SATA and SCSI configurations ranging from 1TB to 9TB with SCSI HBA support to connect to HP StorageWorks tape drives and FC support for SAN connection. Learn more at www.hp.com/go/dpm
• Cost effective and easy to deploy • Includes one full year of support for Microsoft DPM. • Complemented by other HP StorageWorks data protection products
HP ProLiant Data Protection Storage Server HP ProLiant Data Protection Storage Server
AgendaAgendaAgendaAgenda
Why backup and recovery is importantWhy backup and recovery is importantWhat does DPM do?What does DPM do?Is DPM really needed?Is DPM really needed?Who needs DPM?Who needs DPM?DPM OverviewDPM Overview
Implementation Scenarios Implementation Scenarios Demo – Configuring ProtectionDemo – Configuring ProtectionDPM “Under The Hood”DPM “Under The Hood”Demo – End-User RestoreDemo – End-User RestoreDemo – Monitoring & ReportingDemo – Monitoring & ReportingRoadmapRoadmapPricing / LicensingPricing / LicensingPartnersPartners
Call to actionCall to action
DPM ShortcomingsDPM ShortcomingsDPM ShortcomingsDPM Shortcomings
Allows no overwrite protection for backed-up dataAllows no overwrite protection for backed-up dataEach volume can only be in one protection group Each volume can only be in one protection group Allows a maximum of 64 shadow copies per Allows a maximum of 64 shadow copies per volume (oldest shadow copies are overwritten)volume (oldest shadow copies are overwritten)Allows a maximum of 8 shadow copies per volume Allows a maximum of 8 shadow copies per volume per dayper dayA bit strict prerequisitesA bit strict prerequisitesCan’t protect the System StateCan’t protect the System StateCan’t protect non-file serversCan’t protect non-file serversProtects up to 6TB of data, from as many as 30 file Protects up to 6TB of data, from as many as 30 file serversservers
DPM AdvantagesDPM AdvantagesDPM AdvantagesDPM Advantages
Recover files in minutes instead of hoursRecover files in minutes instead of hoursEliminate the backup window of your production Eliminate the backup window of your production serversserversShrink potential data loss down to 1 hourShrink potential data loss down to 1 hourNo more failed recoveriesNo more failed recoveriesGet easy instant backup verificationGet easy instant backup verificationEnable end users to perform their own recoveriesEnable end users to perform their own recoveriesSetup and protect your file servers in minutesSetup and protect your file servers in minutesAdvanced functionality at low costAdvanced functionality at low costRemove tapes from branch offices and centralize Remove tapes from branch offices and centralize backups at datacenterbackups at datacenterRich out-of-box reporting and monitoring Rich out-of-box reporting and monitoring functionalityfunctionalityReturn to the exact state (tracks deleted files)Return to the exact state (tracks deleted files)
Resources/ToolsResources/ToolsResources/ToolsResources/Tools
Data Protection Manager WebsiteData Protection Manager Websitewww.microsoft.com/DPMwww.microsoft.com/DPM
Data sheet: Data sheet: http://go.microsoft.com/fwlink/?http://go.microsoft.com/fwlink/?LinkId=52420LinkId=52420
Introduction to DPM whitepaper: Introduction to DPM whitepaper:
http://go.microsoft.com/fwlink/?http://go.microsoft.com/fwlink/?LinkId=52421LinkId=52421
Introduction to DPM webcast:Introduction to DPM webcast:
http://go.microsoft.com/fwlink/?http://go.microsoft.com/fwlink/?LinkId=52422LinkId=52422
Evaluation DownloadEvaluation Download
http://go.microsoft.com/fwlink/?http://go.microsoft.com/fwlink/?LinkId=52423LinkId=52423
Have you seen Chip?Have you seen Chip?Have you seen Chip?Have you seen Chip?
Amit GatenyoAmit GatenyoInfrastructure & Security Team Lead, DarioInfrastructure & Security Team Lead, Dario
TOP Consultant, MicrosoftTOP Consultant, Microsoft
[email protected]@dario.co.il054-2492499054-2492499
Amit GatenyoAmit GatenyoInfrastructure & Security Team Lead, DarioInfrastructure & Security Team Lead, Dario
TOP Consultant, MicrosoftTOP Consultant, Microsoft
[email protected]@dario.co.il054-2492499054-2492499
New York! New York!New York! New York!New York! New York!New York! New York!
איך ממלאים משוב?איך ממלאים משוב?
בסוף כל יום בסוף כל יום emailemailב - ב -
Beat CenterBeat Centerב -ב -
מה מקבלים?מה מקבלים?
Feel The BeatFeel The Beatחולצת חולצת
השתתפות בהגרלת כרטיסי טיסההשתתפות בהגרלת כרטיסי טיסה(לממלאים משוב כל יום)(לממלאים משוב כל יום) ועוד.. ועוד..i-matei-mateמכשירי מכשירי
202 Cafe202 Cafe 202 Cafe202 Cafe
75 Ninth Ave. New York, NY 646-638-1173
הבראנץ' הכי טוב בעיר נקודה!
ויש גם ארוחת בוקר אנגלית מצוינת.
DFS or DPM?DFS or DPM?DFS or DPM?DFS or DPM?
DFS Replication in R2DFS Replication in R2Data Protection ManagerData Protection Manager
DeliveryDeliveryIn Windows OSIn Windows OSApplicationApplication
Primary SolutionPrimary SolutionAvailability of File SharesAvailability of File SharesCentralized Backup & Fast RestoreCentralized Backup & Fast Restore
Platform SupportPlatform SupportWindows Server R2 onlyWindows Server R2 onlyWindows 2000, 2003 and R2Windows 2000, 2003 and R2
Data FrequencyData FrequencyEvery 15 minutesEvery 15 minutesUp to Hourly - plus past iterationsUp to Hourly - plus past iterations
Data GranularityData GranularityByte-level differencesByte-level differencesWhatever application writes Whatever application writes (bytes or whole file)(bytes or whole file)
DPM = Backup & Restore DPM = Backup & Restore (2000, 2003, and R2)(2000, 2003, and R2)
Centralized Backup of branch officesCentralized Backup of branch offices
Disk-based backup of recent data (7-30 days) Disk-based backup of recent data (7-30 days) prior to tape solution from ISVprior to tape solution from ISV
Fast restore from disk – by IT or End-UserFast restore from disk – by IT or End-User
Separate purchased productSeparate purchased product
DFS = Availability of Files DFS = Availability of Files (R2 only)(R2 only)
Near current redundant copy availableNear current redundant copy available
Transparent redirection / failover to alternate copyTransparent redirection / failover to alternate copy
Part of Windows Server 2003 R2Part of Windows Server 2003 R2
DFS or DPM?DFS or DPM?DFS or DPM?DFS or DPM?
Storage Pool SizingStorage Pool SizingStorage Pool SizingStorage Pool Sizing
Protected data size + (Daily shadow copy size Protected data size + (Daily shadow copy size × # of Shadow Copies)× # of Shadow Copies)
Protected data sizeProtected data sizeSum (ReplicaA, ReplicaB, ….,ReplicaLast)Sum (ReplicaA, ReplicaB, ….,ReplicaLast)Sum the capacity or expected size of all protected volumes (not Sum the capacity or expected size of all protected volumes (not the current size)the current size)
Daily shadow copy sizeDaily shadow copy sizeSize of diff area of Volume Shadow Copy Service Shadow Size of diff area of Volume Shadow Copy Service Shadow Copies/snapshotsCopies/snapshotsSum current incremental backup size as a very rough estimateSum current incremental backup size as a very rough estimate
# of Shadow copies # of Shadow copies Max # of Shadow Copies/Snapshots = 64Max # of Shadow Copies/Snapshots = 64Choose either recovery range or recovery point objective as Choose either recovery range or recovery point objective as primary goal and backfill other to optimize equationprimary goal and backfill other to optimize equationNo good reason for 64 limit but will be addressed inNo good reason for 64 limit but will be addressed infuture versionsfuture versions
Synchronization Log SizingSynchronization Log SizingSynchronization Log SizingSynchronization Log Sizing
Hourly Data Change Rate × Maximum Hours Hourly Data Change Rate × Maximum Hours of DPM/Network Outageof DPM/Network Outage
#1 sizing consideration is the impact of a log overflow#1 sizing consideration is the impact of a log overflow
Would a log overflow put you into a position you can’t Would a log overflow put you into a position you can’t catch up from?catch up from?
Verification is a high CPU impact operation on the Verification is a high CPU impact operation on the protected serverprotected server
No Shadow Copies/Snapshots after log overflow and No Shadow Copies/Snapshots after log overflow and before completion of verificationbefore completion of verification
Replica CreationReplica CreationReplica CreationReplica Creation
WhatWhat: Creation of replica seed that enables : Creation of replica seed that enables migration to delta only replicationmigration to delta only replication
WhenWhen: Now or Later: Now or Later
HowHow: Over the wire, media load, over the SAN: Over the wire, media load, over the SAN
Data SizeData Size
Over the Wire Network SpeedOver the Wire Network Speed
100 Mbps100 Mbps32 Mbps32 Mbps8 Mbps8 Mbps2 Mbps2 Mbps512 Kbps512 Kbps
1 GB1 GB< 1< 1< 1< 1< 1< 11.51.566
50 GB50 GB1.51.55518187171284284
200 GB200 GB661818717128428411371137
500 GB500 GB1515454517817871171128442844
Time in Hours
Replica VerificationReplica VerificationReplica VerificationReplica VerificationWhat: File by file check that brings replica in sync with source When: After initial creation of replica, server dirty shutdown, synchronization log overflowHow: Checksum comparison of every file’s meta info, if difference found then checksum comparison of every file block
Size of DailySize of DailyChangesChanges
Over the Wire Network SpeedOver the Wire Network Speed
100 Mbps100 Mbps32 Mbps32 Mbps8 Mbps8 Mbps2 Mbps2 Mbps512 Kbps512 Kbps
100 MB100 MB< 1< 1< 1< 1< 1< 1< 1< 111
5 GB5 GB< 1< 11122772828
20 GB20 GB1122772929111111
50 GB50 GB335519197272279279Time in Hours
Protecting DPM with BackupExecProtecting DPM with BackupExecProtecting DPM with BackupExecProtecting DPM with BackupExec
Protecting DPM with BackupExecProtecting DPM with BackupExecProtecting DPM with BackupExecProtecting DPM with BackupExec