21
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA

VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA

Embed Size (px)

Citation preview

VERITAS Confidential

Disaster Recovery – Beyond Backup

Jason Phippen – Director Product and Solutions Marketing, EMEA

VERITAS Confidential

Agenda

• Disaster Recovery Concepts• Backup – Last Line of Defence• Enhancing Backup with Replication• Remote Site Replication and Mirroring• Clustering for Disaster Recovery• Questions

VERITAS Confidential

• Recovery Point Objective (RPO) –Point in time to which applications data must be recovered to resume business transactions

• Recovery Time Objective (RTO) –Maximum elapsed time allowed before lack of business function severely impacts an organization

Disaster Recovery ConceptsDisaster Recovery Concepts

Days MinsHrsWks Secs

Recovery PointRecovery Point

Mins DaysHrsSecs Wks

Recovery TimeRecovery Time

VERITAS Confidential

• How much data loss can you endure?

Recovery Point Objective (RPO)Recovery Point Objective (RPO)

Tape Backup w/ Offsite Vaulting

Replication

Mins DaysHrsSecs WksDays MinsHrsWks Secs

Recovery PointRecovery Point Recovery TimeRecovery Time

VERITAS Confidential

• How much downtime can you endure?

Recovery Time Objective (RTO)Recovery Time Objective (RTO)

Recovery from Tape

Geographic Clustering

Mins DaysHrsSecs WksDays MinsHrsWks Secs

Recovery PointRecovery Point Recovery TimeRecovery Time

VERITAS Confidential

• “Far Enough” away– How far away from the main site?– What resources should it have?

• Site Strategies (Hot, Warm, Cold)• Considerations

– Fault zones– Flood plains– Power grids– Climate zones– Locality relative to other sites

(e.g., airport)– Remote customers and employees

Choosing a Recovery SiteChoosing a Recovery Site

VERITAS Confidential

Backup – Your last line of Defense

• Redundant systems replicate user errors, viruses and data corruption

• System or component redundancy (RAID, mirroring) cannot replace backup

• Backup tapes may represent the last valid copy of data

• Backups are your last line of defense against total data loss

VERITAS Confidential

Enhancing Backup with Replication

VERITAS Confidential

• Replicating the Backup Catalog server– Shave hours off a tape restore strategy– No need to re-catalog tapes– No need to rebuild the backup/restore server– Tape restores can begin immediately

Backup Tape Copies

Sent to Offsite

Site A Site B

Backup Clients

Backup Master/Media

Server

Replicate Backup Catalogs

Replication-enhanced Backup

VERITAS Confidential

Remote Site Replication and Mirroring

VERITAS Confidential

Replication and Mirroring

Key Requirements…• Must be “far enough” away• No windows of data

corruption at secondary

Synchronous

Asynchronous

Recovery PointRecovery Point

MinutesDays Hours SecondsWeeks

VERITAS Confidential

4

1

2

3

Strengths

• Maximum data currency (RPO)

• Data available immediately at secondary (RTO)

Weaknesses

• Potential to impact application performance

• Data writes lag by network latency

• Write commit latency across nodes

Primary Site Secondary Site

Synchronous ReplicationSynchronous Replication

VERITAS Confidential

Strengths

• Maximum performance

• May have less application impact

• Data available immediately at secondary (RTO)

Weaknesses

• Secondary may lag primary (RPO)

• Potential for data corruption (not a weakness for VERITAS)

2

1

3

4

Primary Site Secondary Site

Asynchronous ReplicationAsynchronous Replication

VERITAS Confidential

Secondary Site

Application

Volume Manager

SAN Fabric

• Lower hardware costs– Groups physical disks into logical volumes– Hardware Independence,

• Greater IT productivity– Simplified administration of heterogeneous environments – Proactive management of applications

• Increased application ROI

• Can mirror over SAN distances

Primary Site

Logical Volume ManagementLogical Volume ManagementRemote MirroringRemote Mirroring

VERITAS Confidential

Clustering for Disaster Recovery

VERITAS Confidential

Campus / MAN Disaster Recovery WAN Disaster Recovery

Clustering for Disaster Recovery

WAN

Clustering, Replication, Global Clustering

MAN

Clustering , Replication

Clustering, Remote Mirroring

OR

VERITAS Confidential

Campus / MAN Disaster Recovery St-r-e-t-c-h Cluster Over A SAN

* Distance may vary depending upon infrastructure

VERITAS Confidential

Global Global Clustering

• Geographically dispersed sites linked by public carrier wide area network

• Each site aware of the configuration and state of all of the sites

• Direct site level migration in event of catastrophe

• Global Availability Management

• Single point of monitoring and administration

VERITAS Confidential

Replication

Site Migration

Wide Area Availability

Application

ClusteringGlobal

Clustering

Application

ClusteringGlobal

Clustering

Application

ClusteringGlobal

Clustering

Failover

VERITAS Confidential

VERITASCluster Server

Volume Manager/ Foundation Suite

NetBackup/Backup Exec

VERITAS Global Cluster Manager

VERITAS Volume Replicator

- NetBackup Vault- BMR / IDR

LocalLocal Multi-siteMulti-siteA

va

ilab

ility

Req

uir

eme

nts

Av

aila

bili

ty R

equ

irem

en

ts

VERITAS: Uniquely Qualified (HA and DR)

VERITAS Confidential

Questions