1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.

Slides:



Advertisements
Similar presentations
1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
Advertisements

NetApp Confidential - Limited Use
© 2014 Vicom Infinity Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services
S&T Bulgaria Lyubomir Yanchev Storage Solutions Consultant INTERNATIONAL NUCLEAR FORUM BULGARIAN NUCLEAR ENERGY – NATIONAL, REGIONAL AND WORLD SAFETY 28.
BCM and Security ROGSI/DMS Präsentation ROGSI/DMS Suite for Corporate Survival ROGSI/Business Impact Analysis TOP 7 Best Practices for Business Continuity.
© 2014 Persistent Systems Ltd Enabling DraaS on OpenStack Speakers: Haribabu Kasturi, Amitabh Shukla.
© 2010 IBM Corporation ® Tivoli Storage Productivity Center for Replication Billy Olsen.
Skyward Disaster Recovery Options
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC RECOVERPOINT FAMILY Protecting Your Data.
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Data protection and disaster recovery.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
Information Means The World.. Enhanced Data Recovery Agenda EDR defined Backup to Disk (DDT) Tape Emulation (Tape Virtualization) Point-in-time Copy Replication.
Leaders Have Vision™ visionsolutions.com 1 Double-Take for Hyper-V Overview.
Module – 11 Local Replication
Module – 12 Remote Replication
Business Continuity and DR
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
1© Copyright 2012 EMC Corporation. All rights reserved. November 2013 Oracle Continuous Availability – Technical Overview.
National Manager Database Services
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
November 2009 Network Disaster Recovery October 2014.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
Implementing Multi-Site Clusters April Trần Văn Huệ Nhất Nghệ CPLS.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
© Novell, Inc. All rights reserved. 1 PlateSpin Protect Virtualize your Disaster Recovery.
Data Management Services AssuredSnap. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
David N. Wozei Systems Administrator, IT Auditor.
Virtualization for Storage Efficiency and Centralized Management Genevieve Sullivan Hewlett-Packard
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
Protect and Recover Presented by:Toby Bishop, Senior UK Account Manager Date:Friday, 09 October 2015Friday, 09 October 2015Friday, 09.
Data Center Back-up: Data Sustainability on a Budget Mike DeNapoli Enterprise Systems Engineer Double-Take Software.
Continuous Access Overview Damian McNamara Consultant.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Storage 101: Bringing Up SAN Garry Moreau Senior Staff Alliance Consultant Ciena Communications (763)
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Hosted by Why You Need a Storage Management Organization Ray Paquet Vice President & Research Director Gartner.
Virtualization for Disaster Recovery Panel Discussion May 19, 2010 Ed Walsh EMC vSpecialist EMC Corporation Cell Chris Fox.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Remote Data Mirroring Solutions for High Availability David Arrigo EMC Corporation
High Availability in DB2 Nishant Sinha
Peter Mattei HP Storage Consultant 16. May 2013
Ashish Prabhu Douglas Utzig High Availability Systems Group Server Technologies Oracle Corporation.
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
Virtual Machine Movement and Hyper-V Replica
© 2009 IBM Corporation Statements of IBM future plans and directions are provided for information purposes only. Plans and direction are subject to change.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Virtual Workload Mobility: Benefits and Considerations Tim Brunner Enterprise Account Advisor.
Azure Site Recovery For Hyper-V, VMware, and Physical Environments
Planning for Application Recovery
Business Continuity for Virtual SQL Servers
Providing Application High Availability
Determining BC/DR Methods
Maximum Availability Architecture Enterprise Technology Centre.
2018 Huawei H Real Questions Killtest
Microsoft Azure P wer Lunch
Business Continuity Technology
Clouds & Containers: Case Studies for Big Data
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE

Agenda  Planning for a Disaster  Using Local Copies for Protection  Using Remote Mirroring for Protection  Conclusion

Agenda  Planning for a Disaster  Using Local Copies for Protection  Using Remote Mirroring for Protection  Conclusion

Disaster Jon William Toigo Chairman, Data Management Institute 2005 any interruption in the normal access to a valid set of data used by applications and end users to execute mission critical business processes for an unacceptable period of time.

Source: Ontrack Data Report 2007

The threat of data loss can’t be ignored Risks: > High cost of data loss and downtime > Insufficient data recovery plans and procedures > 70% of businesses fail after major data loss > Recovery overextends limited staffs and financial resources Needs: > High availability and fast data recovery > Seamless integration with existing IT infrastructures > Interoperability with current and future storage and computing systems

The Cost of Downtime Forrester Consulting Interviewed 138 companies Estimated cost of 1 hour downtime > Less than $10,000 / hr – 25% > $10,000 to $100,000 / hr – 33% > $100,000 to $500,000 – 25% > $500,000 to $1 million – 13% > Greater than $1 million – 4% 67% - could not estimate the financial cost of downtime

Disaster Key definitions Last safe Backup Resumption of normal business Recovery Point Objective (RPO)‏ The time between the last safe backup and the point of time of the disaster Recovery Time Objective (RTO)‏ The time elapsed from when the disaster occurred to the resumption of normal business activities

Business Continuity Planning to never go down Always have access to information Needs more than a good data recovery strategy A disaster can be something as simple as a deleted file Use disk duplication strategies > Mirroring > Snapshot > Remote replication

Seconds Minutes Hours Days Regional Disaster Local Disaster Operator error Hardware failure Application Department Data Center Enterprise Risk Disruption Scale Complete data protection requires personalized and practical solutions Business goals Threats Budget realities Existing assets

Seven Key Planning Steps 1.Business impact assessment  How long can I live without data? 2.Discovery  What data do I need first? 3.Budget  What is my data worth? 4.Role-based teams  Who are the key people? 5.Data protection  How do I protect what I need? 6.Logistics  What are the physical requirements? 7.Testing  Will my plan work?

Agenda  Planning for a Disaster  Using Local Copies for Protection  Using Remote Mirroring for Protection  Conclusion

Volume Copy Terms Complete point in time replication of one Volume (source) to another (target) within a Storage Subsystem Source = Volume that accepts host I/O and stores application data Target = Volume that maintains a copy of the data from the source Target or Copy or Clone Copy Pair

How Volume Copy Works

Snapshot - a logical point-in- time image of another volume. Logical equivalent of a complete physical copy Logical Disk Space Snapshot Terms Storage System Base Volume - the volume from which the Snapshot will be created Physical Disk Space Repository – stores original blocks from Base before they are overwritten with new data Physical Disk Space A point-in-time (PiT) image of a volume > Logical equivalent of a physical copy

Snapshot Flow Chart

Using Volume Copy and Snapshot together Copying the Snapshot creates a full PiT clone copy while I/O continues to base volume (LUN) ‏

Agenda  Planning for a Disaster  Using Local Copies for Protection  Using Remote Mirroring for Protection  Conclusion

Remote Volume Mirroring Ongoing, real-time replication of a volume from one storage system to another

Remote Volume Mirroring Components Primary volume: accepts read and write host I/O Secondary volume: accepts read host I/O. accepts remote writes of data from controller owner of Primary volume. Primary Secondary Primary

Remote Volume Mirroring Components Mirror Repository volume: Stores mirroring data, such as info about remote writes that have not completed Primary Secondary Primary Mirror Repositories Mirror Repositories Mirror Pairs V1 -> V1M V2 -> V2M V3 -> V3M

Synchronous Replication The primary disk system acknowledges a host write when the data has been successfully mirrored Primary benefit > Ensures remote data is an exact replicate of the local data Note: only effective for campus area replication

Primary benefits > Reduces impact of latency when replicating over longer distances > Provides performance improvement – compared to synchronous – for primary site I/O (disk system and application) ‏ > Enables effective replication over longer distances (WAN) ‏ Allows the primary disk system to acknowledge a host write request before the data has been successfully mirrored Asynchronous Write Mode

Write operations to the secondary disk system matches I/O completion order on the local disk system > Also referred to as a consistency group Primary benefit > Maintains data integrity in multi-LUN applications (databases) by eliminating out-of-order updates at the remote side that can cause logical corruption Preserved Write Order

Remote Volume Mirroring Mirror Management Role Reversal (from secondary to primary or vice versa) is user-initiated > If primary is also base volume for snapshots, role reversal will cause associated snapshots to fail > It is possible to force role change for the local volume if communication to the remote volume is down > Used in disaster recovery scenarios > Can prepare by mapping secondary volumes to hosts using Storage Partitions before they are promoted

DR / HA Architecture Cluster 1 Cluster 2 Volume 3 replication Volume 1 & 2 replication Site ASite B * M = mirror

Architecture Description Site A and Site B each contain a copy of critical data Critical data is copied in real time using the disk controllers minimal impact on server processing power OS and key applications are clustered across both sites If either site fails application transparently fails over to remote Customers notices minimal disruption 2 way Disaster Protection Cluster 1 uses volume V1 and V2 – primary business is at Site A, Mirrored to Site B for protection Cluster 2 uses volume V3 - primary business is at Site B, Mirrored to Site A for protection Sites are connected by Fibre Channel network for performance Could be connected by long distance IP network – will be performance impact on replication.

Agenda  Planning for a Disaster  Using Local Copies for Protection  Using Remote Mirroring for Protection  Conclusion

Could you survive a disaster? 35% of companies have a plan 60% of plans are never tested Half the companies that suffer losses never recover $10 – $50 K per MB to re-create data

Seven Key Planning Steps 1.Business impact assessment HHow long can I live without data? 2.Discovery WWhat data do I need first? 3.Budget WWhat is my data worth? 4.Role-based teams WWho are the key people? 5.Data protection HHow do I protect what I need? 6.Logistics WWhat are the physical requirements? 7.Testing WWill my plan work?

32 Thank You Gavin Cole Disaster Recovery Planning