2 Industry Waves Backup and recovery evolution Version 1.0 Majority of companies use tape Tape one size fits all Backup once per day Tape recoveries slow.

Slides:



Advertisements
Similar presentations
Christian Schwartz-Sørensen
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Microsoft System Center Data Protection Manager Mat Young – Storage Technology Architect, Microsoft EMEA Justin Alderson – Storage Specialists Manager,
The System Center Family Microsoft. Mobile Device Manager 2008.
Ivo Pekař ELBACOM CZ Ivo Pekař ELBACOM CZ
Complete Event Log Viewing, Monitoring and Management.
Orin
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Active Directory Disaster Recovery Paul Simmons Support Engineer Directory Services Microsoft Corporation.
Introduction to: System Center Data Protection Manager Raj Natarajan Infrastructure Architect Enterprise Group Microsoft Australia BI206.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Microsoft Confidential Anthony TylerAnthony Tyler Storage & Branch Office Technology SpecialistStorage & Branch Office Technology Specialist.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Calvin Keaton Product Planner- Storage Solutions Microsoft Corporation Microsoft Confidential – NDA Use only.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Why build DPM ? Introducing DPM 2010 and partner solutions Demo – Protecting Data How Does DPM work ? Demo – Rapid & Reliable Recovery Protected Platforms.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Data Protection Manager - From The Customer Perspective Jason Buffington Sr. Product Manager Data Protection Manager Microsoft Corporation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
SharePoint native backup/restore capabilities Configuration settings Service Applications Unattached content database recovery SQL Snapshot support.
Maintaining Windows Server 2008 File Services
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
© 2010 IBM Corporation Kelly Beavers Director, IBM Storage Software Changing the Economics of Storage.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Introduction to Data Protection Manager Damir Bersinic IT Pro Advisor Microsoft Canada
Module 16: Software Maintenance Using Windows Server Update Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Walter Pitrof Technology Solution Professional Microsoft Switzerland Backup, Restore und Disaster Recovery mit Data Protection Manager 2012 Philipp Witschi.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
15 Copyright © 2005, Oracle. All rights reserved. Performing Database Backups.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
4/23/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Online Snapshots (up to 512) Disk-based Recovery Tape-based Backup Data Protection Manager Up to Every 15 minutes Disaster Recovery with offsite replication.
Protecting SharePoint with System Center Data Protection Manager 2007 Chris Whitehead Premier Field Engineer Microsoft UK.
Make VMs Resilient to Failures with Availability Sets.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
ChairatJuengmongkolwong Technology Specialist- Enterprise Management Solution MCTS SCCM, SCOM Microsoft Thailand.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Storage Netværk Mød Microsoft Feb 2005, Agenda Data Protection Server (opdatering) Microsoft og iSCSI Demo.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Solving Today’s Data Protection Challenges with NSB 1.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
Business Continuity & Disaster Recovery
InGenius Connector Enterprise Microsoft Dynamics CRM
Maintaining Windows Server 2008 File Services
Agenda Statistics & Customer Pains that Microsoft is focused on
Storage Virtualization
Business Continuity & Disaster Recovery
System Center Data Protection Manager 2007
TechEd /28/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

2 Industry Waves Backup and recovery evolution Version 1.0 Majority of companies use tape Tape one size fits all Backup once per day Tape recoveries slow & unreliable Administrators do all recoveries Today Disk based backup becoming cost effective Archive and Backup diverge Recovery in minutes or seconds Continuous backup End user recovery Self healing backups Future

3 Rapid and Reliable Recovery Recovery is unreliable and painful Too slow and expensive to recover files typical recovery takes hours or days (slow, expensive) Recoveries and unreliable 42% of companies had failed recovery in past year 50% of customers wish for online backup verification Data protection is labor intensive All recoveries go through the server admin Solution with DPM Designed for fast recovery Enables a whole new recovery scenario–end users: files, Admins: servers Snapshots enable multiple recovery points Recoveries are assured through verification Customer Data Protection Pain Points Customer Needs: Faster Recovery

4 Continuous and efficient protection Backup is too complex, slow, and inefficient Shrinking backup window Growth in data makes it too difficult and time consuming to back up Backups too slow/lots of manual scheduling Mandated disaster recovery plans 24 hours of data loss assumed with tape Tape as one size fits all (file and server recovery, offsite protection and long term archive) Tape inconvenience and unreliability of is # 1 challenge Solution with DPM Faster and More Efficient Backup Never do a full backup from a production server again Avoid the shrinking backup window Customer Needs: Eliminating Backup Window Customer Data Protection Pain Points

5 Current backup products are too complex, costly Companies spend too much time and money on backup Labor is the majority of backup cost Branch office data protection is cumbersome Massive data growth increases costs Too many tapes Most disk-based backup solution are cost prohibitive Operational Simplicity Solution with DPM Designed to reduce TCO via continuous, disk-based backup Automatic protection schedules = reduce operational costs, increase efficiency Allows end users to easily recover their own files Usability and easier management Integration into existing environment Industry standard hardware and software Customer Needs: Simpler Solution, Lower costs Customer Data Protection Pain Points

Microsoft – NDA Only 6 What does DPM do? Near continuous (hourly) protection of files DPM agent on file servers Byte-level changes transmitted to DPM server Multiple scheduled snapshots per day Easy IT or End-User restore – fast from disk

7 DPM Server DPM “Under The Hood” Agent components: File System Filter: runs in kernel mode File Agent service runs in user mode Requires reboot of file server Each protected volume has synchronization log Synchronization log 10% of volume size Agent overhead 3-5% Synchronization “Pull” model, synchronizations instigated by DPM Asynchronous replication Two communication channels Control commands - DCOM Data movement - DPM proprietary protocol Replication unit of operation is protected volume Check points: 2 min/10 MBs Byte level replication Consistency Check Unexpected events create need to resync replica Consistency Check does two things Checks file by file for more recent modified times If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server All open files are check summed irregardless DPM Engine.NET application (managed code) Application state and configuration data stored in SQL Protected data stores: Replica Area is a mounted volume that is made up of replica of protected volume and the diff area Transfer Area is an unmounted volume that contains the spill log Non-blocking, distributed architecture

8.NET application (managed code) All application state and configuration data stored in full SQL Server database Protected data stored in the following places Replica Area is a mounted volume that is made up of replica of protected volume and the diff area Transfer Area is an unmounted volume that contains the spill log. Spill log holds data transferred from protected server but yet to be applied to replica. Non-blocking, distributed architecture. All operations are autonomous of each other thus allowing system to scale to limits of hardware DPM – Technology Overview DPM Engine DPM Server File Servers Active DirectoryClients

9 Agent components: File System Filter: runs in kernal mode, implemented as mini-filter per W2K3 SP1 File Agent service runs in user mode Requires reboot of file server before operating due to legacy (non-mini filters) to assure correct ordering Each volume with protected object has synchronization log in hidden Volume System Information directory Synchronization log is by default 10% of volume size but can be adjusted Agent puts overhead of 3-5% on processor protected server DPM – Technology Overview Agent File Servers Active DirectoryClients DPM Server

10 “Pull” model, all synchronizations instigated by DPM server Asynchronous replication Two separate channels for communication Control commands sent over DCOM Data movement sent over TCP/IP using DPM proprietary protocol Replication unit of operation is the protected volume Check points the lesser of 2 min or 10 MBs for resumption of incomplete operations All file operations are replicated (rename, delete, copy) along with all changed blocks, this is most similar to “byte level replication” DPM – Technology Overview Synchronization File Servers Active DirectoryClients DPM Server

11 Various unexpected events create need to resync replica with source data (hard reboot of protected server, synchronization log overflow) Sync with Consistency Check does two things Checks file by file for more recent modified times then on replica If changed, all blocks associated with file are check summed and appropriate blocks are replicated to DPM server All open files are check summed irregardless Rolling process that traverses the entire directory tree, not a snapshot that freezes volume at point in time DPM– Technology Overview Synchronization with Consistency Check File Servers Active DirectoryClients DPM Server

12 Monitor   Monitor the health and status of your DPM server easily   Set up automatic alerts via

13 Report   Comprehensive reports show all data protection activity on the network

14 DPM/MOM Integration   Control and monitor multiple DPM Servers   All alerts and events uploaded to MOM

15 Top 10 Reasons To Deploy DPM Recover files in minutes instead of hours Eliminate the backup window of your production servers Shrink potential data loss down to 1 hour No more failed recoveries Get easy instant backup verification Enable end users to perform their own recoveries Setup and protect your file servers in minutes Advanced functionality at low cost Remove tapes from branch offices and centralize backups at datacenter Rich out-of-box reporting and monitoring functionality

16 DPM Demo Task : Configure Protection

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36 DPM Walkthru Task : End-User Restore from Windows Explorer

37 Original Files

38 Overwritten

39 Right-click on any file or directory

40 PVC Previous Versions Client is an applet that extends Windows Explorer and Office applications with this simple new tab. Available since Windows Server 2003 and VSS. Usually installed silently via Group Policy

41

42

43 Open document

44 Keep the new one AND Restore the old one

45 Restore the old one

46

47

48 Software Industry Partners Hardware

49 © Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.