Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security.

Similar presentations


Presentation on theme: "Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security."— Presentation transcript:

1

2 Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security Team Lead, Dario TOP Consultant, Microsoft amit.g@dario.co.il

3 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

4 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

5 Backup And Recovery Is… Business necessity Information is most valuable asset Comprehensive backup strategy is essential infrastructure component Attractive target for cost reduction ~ 70% of total cost is manual labor Respond to backup market shift from tape to disk Becoming more and more painful Storage requirements growing at an exponential rate Regulation and Compliance Opportunity to improve customer satisfaction with the Windows Server platform

6 Industry Waves Backup and recovery evolution Majority of companies use tape Tape one size fits all Backup once per day Tape recoveries slow & unreliable Administrators do all recoveries Today Disk based backup becoming cost effective Recovery in minutes or seconds Continuous backup End user recovery Self healing backups Future

7 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

8

9 What does DPM do? Near continuous (hourly) protection DPM agent on file servers Byte-level changes transmitted to DPM server Multiple scheduled snapshots per day Easy IT or End-User restore – fast from disk

10 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

11 Rapid and Reliable Recovery Recovery is unreliable and painful Too slow and expensive to recover files Typical recovery takes hours or days (slow, expensive) Recoveries are unreliable 42% of companies had failed recovery in past year 50% of customers wish for online backup verification Data protection is labor intensive All recoveries go through the server admin Solution with DPM Designed for fast recovery Enables a whole new recovery scenario: End users - Files Admins - Servers Snapshots enable multiple recovery points Recoveries are assured through verification Customer Data Protection Pain Points Customer Needs: Faster Recovery

12 Continuous and efficient protection Backup is too complex, slow, and inefficient Shrinking backup window Growth in data makes it too difficult and time consuming to back up Backups too slow/lots of manual scheduling Mandated disaster recovery plans 24 hours of data loss assumed with tape Tape as one size fits all (file and server recovery, offsite protection and long term archive) Tape inconvenience and unreliability is #1 challenge Solution with DPM Faster and More Efficient Backup Never do a full backup from a production server again Avoid the shrinking backup window Customer Needs: Eliminating Backup Window Customer Data Protection Pain Points

13 Current backup products are too complex, costly Companies spend too much time and money on backup Labor is the majority of backup cost Branch office data protection is cumbersome Massive data growth increases costs Too many tapes Most disk-based backup solution are cost prohibitive Operational Simplicity Solution with DPM Allows end users to easily recover their own files Usability and easier management Integration into existing environment Industry standard hardware and software Customer Needs: Simpler Solution, Lower costs Customer Data Protection Pain Points

14 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

15 Ideal Customers DPM is a solution for customers of all sizes but the ideal customers are: Data centers Significant backup window issues Frequent file recoveries from tape Few IT staff Have a Recovery Point Objective (RPO) of approximately one hour Have a faster Recovery Time Objective (RTO) than tape can provide Lots of branch offices Many distributed branch office file servers Few or no dedicated IT staff in the branch Likely to currently use existing tape infrastructure High backup costs 

16 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

17 ActiveDirectory Data Centers - Disk to Disk to Tape Active Directory Scheduled auto-discovery job Queries AD for new servers Maintains ACL’s Redirects shadow copies Clients

18 Agents Protects Win2000, Win2003, WSS2003 (non-clustered) Agents track / synchronize data from production servers to DPM All agent communication initiated from DPM Each protected volume has sync log (10% of volume size) Agent overhead 3-5% Deployed via DPM UI Clients ActiveDirectory File Servers Data Centers - Disk to Disk to Tape

19 DPM Server Windows Server 2003 SP1 or Storage Server 2003 SP1 IIS, SQL, Reporting Services Lots of disks (2 to 3 times the size of the protected data) Clients ActiveDirectory File Servers DPM Servers Data Centers - Disk to Disk to Tape

20 Clients ActiveDirectory File Servers DPM Servers Snapshots Snapshots created for quick recovery Multiple, schedule driven point-in-time copies User-friendly, wizard driven set up and restore Data Centers - Disk to Disk to Tape

21 Tape Library Allows for restore of DPM server itself (System State, Replicas) Enables restore of any file object on production servers from tape Solutions available: Yosemite, Veritas, CommVault, Windows Backup Clients ActiveDirectory File Servers Tape Library DPM Servers Data Centers - Disk to Disk to Tape

22 Backup process Agent deployed to branch office servers Agent captures data and replicates to DPM server in HQ DPM takes snapshots to enable recovery at multiple points in time Benefits Rapid & reliable recovery including end user recovery Less potential data loss Easy and efficient scheduling and management No trained staff needed in branch Reduce tape equipment requirements in the branch Corporate WAN Haifa Jerusalem Gaza Clients Headquarters DPM Server Branch Office Data Protection

23 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

24 Configuring File Server Protection

25

26

27

28  Easy-to-use graphical interface, all Wizard driven  Create Protection Group to apply back up policies to servers in group  Create a comprehensive data protection plan in minutes

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46 DPM Admin Recovery Screen  Easily find data to restore through simple browsing or searching  Restore data to any location with 2 clicks

47 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

48 DPM can only be installed on Windows 2003 SP1 or greater DPM cannot be installed on a domain controller Must be in the same Active Directory domain as the servers that it is protecting Only protects: Windows 2000 SP4 or greater Windows 2003 SP1 or greater On each protected volume on a Production Server, a minimum of 500 MB of free space is required for the synchronization log DPM “Under The Hood” So much prerequisites

49 All application state and configuration data stored in a SQL Server database Protected data stored in the following places Replica Area is a mounted volume that is made up of replica of protected volume and the diff area Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica. DPM “Under The Hood” DPM Server DPM Server File Servers Active DirectoryClients

50 Acts as a controller of job scheduling and launching SQL Server Standard Edition w/ Reporting Services Included with DPM license, limited to this use Setup “hardens” server to be secure but to only enable DPM required services Local Management Console Configuration, monitoring, reporting, recovery Footprint of 50-100 MB under normal operations Footprint of up to 400 MB under specific operations Overhead 5-15% expected DPM “Under The Hood” DPM Server: DPM Engine

51 Synchronously replicates synchronization logs to DPM server using two channels of communication: Control channel uses DCOM protocol TCP port 135 is the DCE endpoint resolution point used by DCOM By default, DCOM assigns ports dynamically from the TCP port range of 1024 through 65535. Data channel uses proprietary protocol and runs on port 3148/3149 All communications initiated by DPM Server DPM “Under The Hood” DPM Server: Replica Agent

52 Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering Each volume with protected object has synchronization log in hidden “System Volume Information” directory Synchronization log is by default 10% of volume size but can be adjusted Agent puts overhead of 3-5% on protected server File Servers Active DirectoryClients DPM Server DPM “Under The Hood” Agent

53 Same channels of communication as the DPM Server All communications initiated by DPM Server Max footprint of 15 MB, not persistent Overhead of 3-5% expected during normal operations Overhead similar to A/V filters Overhead of 80% expected during verification DPM “Under The Hood” Agent

54 “Pull” model, all synchronizations instigated by DPM server All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication” DPM “Under The Hood” Synchronization File Servers Active DirectoryClients DPM Server

55 Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow) Sync with Consistency Check does two things Checks file by file for more recent modified times then on replica If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server All open files are check summed irregardless Rolling process that traverses the entire directory tree. DPM “Under The Hood” Synchronization with Consistency Check File Servers Active DirectoryClients DPM Server

56 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

57 End-User Restore from Windows Explorer

58 Original Files

59 Overwritten

60 Right-click on any file or directory

61 PVC Previous Versions Client is an applet that extends Windows Explorer and Office applications with this simple new tab. Available since Windows Server 2003 and VSS. Usually installed silently via Group Policy

62

63

64 Open document

65 Keep the new one AND Restore the old one

66

67

68

69

70 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

71 Monitoring & Reporting

72 MonitorMonitor  Monitor the health and status of your DPM server easily  Set up automatic alerts via email

73 ReportReport  Comprehensive reports show all data protection activity on the network

74 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

75 Release Roadmap Broad application integration: Microsoft Exchange Microsoft SQL Server Microsoft SharePoint Server Longhorn Server Advanced data protection features Bare Metal Recovery High Availability SAN integration Increased scalability Centralized management 2007 and Beyond System Center Data Protection Manager 2006 File Protection and Recovery Efficient, continuous data protection Rapid and reliable disk-based data recovery Designed to work with current tape archive software Today

76 DPM Protection Options DPM v1 DPM v1-SP1 DPM v2 Protect File Servers & Shares YESYESYES Protect Exchange YESKB909644YESKB909644YES Native DPM Protect SQL Server YESKB910401YESKB910401YES Native DPM Protect System State YESTechNetYESTechNetYES Native DPM Protect R2 SIS Servers YES March QFE YESYES Protect x64 Windows --YESYES Protect Clusters --YESYES Beta Q2-06

77 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

78 Pricing and Availability Data Protection Manager Server License Data Protection Management License (Agent) Pricing FPP Full Packaged Product $950 = Server + 3 agents $559 = 3 agents Open & Select Approx $424 = Server $147 = Agent Available through all channels OEM, Volume FPP, SA

79 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

80 Software Industry Partners Hardware

81 Featured OEM Partners FibreCAT ® N40-DPM Based on market leading PRIMERGY server hardware, the FibreCAT N40-DPM is a fully pre- installed and pre-configured device that is designed to be easy to deploy. It is prepared for Back End integration in the data center, with Fujitsu Siemens Computers’ unique Virtual Tape Appliance CentricStor. N40-DPM is based on windows storage server and offers market leading price efficiency. Extremely scalable. Designed for 0,9 TB / 6 fileservers Expandable to 50 TB / 99 fileservers www.fujitsu-siemens.com/storage A family of pre-configured and easy to deploy disk-based backup solutions built on the reliable ProLiant Storage Server NAS platform and powered by Microsoft DPM. These NAS appliances are designed to have customers up and running in minutes and include full hardware, O/S, and DPM support from HP. Available in SATA and SCSI configurations ranging from 1TB to 9TB with SCSI HBA support to connect to HP StorageWorks tape drives and FC support for SAN connection. Learn more at www.hp.com/go/dpmwww.hp.com/go/dpm Cost effective and easy to deploy Includes one full year of support for Microsoft DPM. Complemented by other HP StorageWorks data protection products HP ProLiant Data Protection Storage Server

82 AgendaAgenda Why backup and recovery is important What does DPM do? Is DPM really needed? Who needs DPM? DPM Overview Implementation Scenarios Demo – Configuring Protection DPM “Under The Hood” Demo – End-User Restore Demo – Monitoring & Reporting Roadmap Pricing / Licensing Partners Call to action

83 DPM Shortcomings Allows no overwrite protection for backed-up data Each volume can only be in one protection group Allows a maximum of 64 shadow copies per volume (oldest shadow copies are overwritten) Allows a maximum of 8 shadow copies per volume per day A bit strict prerequisites Can’t protect the System State Can’t protect non-file servers Protects up to 6TB of data, from as many as 30 file servers

84 DPM Advantages Recover files in minutes instead of hours Eliminate the backup window of your production servers Shrink potential data loss down to 1 hour No more failed recoveries Get easy instant backup verification Enable end users to perform their own recoveries Setup and protect your file servers in minutes Advanced functionality at low cost Remove tapes from branch offices and centralize backups at datacenter Rich out-of-box reporting and monitoring functionality Return to the exact state (tracks deleted files)

85 Resources/ToolsResources/Tools Data Protection Manager Website www.microsoft.com/DPM Data sheet: http://go.microsoft.com/fwlink/?LinkId=52420 Introduction to DPM whitepaper: http://go.microsoft.com/fwlink/?LinkId=52421 Introduction to DPM webcast: http://go.microsoft.com/fwlink/?LinkId=52422 Evaluation Download Evaluation Downloadhttp://go.microsoft.com/fwlink/?LinkId=52423

86 Have you seen Chip?

87 Amit Gatenyo Infrastructure & Security Team Lead, Dario TOP Consultant, Microsoft amit.g@dario.co.il 054-2492499

88 New York! New York! איך ממלאים משוב? ב - email בסוף כל יום ב -Beat Center מה מקבלים? חולצת Feel The Beat השתתפות בהגרלת כרטיסי טיסה מכשירי i-mate ועוד.. (לממלאים משוב כל יום)

89 202 Cafe 75 Ninth Ave. New York, NY 646-638-1173 הבראנץ' הכי טוב בעיר נקודה! ויש גם ארוחת בוקר אנגלית מצוינת.

90

91 DFS or DPM? DFS Replication in R2 Data Protection Manager Delivery In Windows OS Application Primary Solution Availability of File Shares Centralized Backup & Fast Restore Platform Support Windows Server R2 only Windows 2000, 2003 and R2 Data Frequency Every 15 minutes Up to Hourly - plus past iterations Data Granularity Byte-level differences Whatever application writes (bytes or whole file)

92 DPM = Backup & Restore (2000, 2003, and R2) Centralized Backup of branch offices Disk-based backup of recent data (7-30 days) prior to tape solution from ISV Fast restore from disk – by IT or End-User Separate purchased product DFS = Availability of Files (R2 only) Near current redundant copy available Transparent redirection / failover to alternate copy Part of Windows Server 2003 R2 DFS or DPM?

93 DPM Data Protection Manager Agent on file server, captures “whatever application writes” (bytes or whole-file) in real-time - Even open files are protected. Journals changes to file. Up to hourly transmits to DPM server Periodic snapshots End-User and IT restore Low CPU / Uses disk-journal DFS Replication & Namespaces Replicate (every 15 min) between copies of files RDC comparison algorithm actively compares changes within and between files to minimize bytes transferred over WAN Failover to alternate copy via DFS Namespaces Higher CPU for comparison logic DFS or DPM?

94 Storage Pool Sizing Protected data size + (Daily shadow copy size × # of Shadow Copies) Protected data size Sum (ReplicaA, ReplicaB, ….,ReplicaLast) Sum the capacity or expected size of all protected volumes (not the current size) Daily shadow copy size Size of diff area of Volume Shadow Copy Service Shadow Copies/snapshots Sum current incremental backup size as a very rough estimate # of Shadow copies Max # of Shadow Copies/Snapshots = 64 Choose either recovery range or recovery point objective as primary goal and backfill other to optimize equation No good reason for 64 limit but will be addressed in future versions

95 Synchronization Log Sizing Hourly Data Change Rate × Maximum Hours of DPM/Network Outage #1 sizing consideration is the impact of a log overflow Would a log overflow put you into a position you can’t catch up from? Verification is a high CPU impact operation on the protected server No Shadow Copies/Snapshots after log overflow and before completion of verification

96 Replica Creation What: Creation of replica seed that enables migration to delta only replication When: Now or Later How: Over the wire, media load, over the SAN Data Size Over the Wire Network Speed 100 Mbps 32 Mbps 8 Mbps 2 Mbps 512 Kbps 1 GB < 1 1.56 50 GB 1.551871284 200 GB 618712841137 500 GB 15451787112844 Time in Hours

97 Replica Verification What: File by file check that brings replica in sync with source When: After initial creation of replica, server dirty shutdown, synchronization log overflow How: Checksum comparison of every file’s meta info, if difference found then checksum comparison of every file block Size of Daily Changes Over the Wire Network Speed 100 Mbps 32 Mbps 8 Mbps 2 Mbps 512 Kbps 100 MB < 1 1 5 GB < 1 12728 20 GB 12729111 50 GB 351972279 Time in Hours

98 Protecting DPM with BackupExec

99


Download ppt "Data Protection Manager – Rescue data like a hero! INF313 Level 300 Data Protection Manager – Rescue data like a hero! Amit Gatenyo Infrastructure & Security."

Similar presentations


Ads by Google