7 Must-Know Disaster Recovery Strategies
7 MUST-KNOW DISASTER RECOVERY STRATEGIES J A M I E G R U E N E R S E N I O R A N A L Y S T , E N T E R P R I S E I N F R A S T R U C T U R E T H E Y A N K E E G R O U P S U M B E R D A R I : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N : WHAT YOU WILL LEARN IN THIS SESSION . .
1.The Main Goal: Bullet-proofng Disaster Recovery Strategies
2.Remote Replication vs. Mirroring Strategies
3.Disaster Recovery and Virtualization: A New Angle
4.Integrating Mirroring and Replication into Disaster Recovery Strategies
5. Metro SANs: Options for Remote Mirroring And Replication
6.Your Network Options: Questions to Guide You
7.The Outsourcing Alternatives: Things to Consider C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N :
THE GOAL: BULLET-PROOFING DISASTER RECOVERY STRATEGIES You’ve heard the statistics
tragedy Close to 100 businesses declaring disasters in NYC
~ $5 billion in computing infrastructure lost in 9-11
You’re here for a reason
9-11 was a call to action for all of us Disaster Recovery and Business Continuity Strategies
must be done – this is only one leg of a multi-leg strategy
You’re entering a new era
Management
It is now about Business Continuance and Risk
Preserving data is an imperative C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N : DEFINING TERMS: REMOTE MIRRORING AND DATA REPLICATION Checklist Remote Mirroring generates a mirrored image of data on two or more disks Data Replication scans data periodically for changes and copies new data to the other disk or fle system on another system Factors to consider
Costs for network bandwidth and software
Value of data (and lost data) being backed up
Your existing infrastructure Product features (OS, File System, Disk or
Application) C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N : MEASURING DATA PROTECTION: POINT-IN-TIME TO SYNCHRONOUS Tip There will be a need for More
Synchronous multiple tools to protect data Semi-Synchronous Data Protection Lost Transactions Line of Tolerance Asynchronous Point In Time S U M B E R K E P U S T A K A A N : Less C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T More
Network Bandwidth Consumed QUESTIONS TO CONSIDER WHEN LOOKING AT REMOTE MIRRORING AND REPLICATION
What are you protecting? (applications, transactions, fles, disks)
What level of protection do you need? (We’ll come back to this!)
What are your network requirements?
What is your expected budget for this project?
Is the ROI greater than acquisition costs?
What will best ft your larger business continuity strategy? S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T Best Practice THE LUXURY SEDAN: DISK-TO-DISK REMOTE COPY Key advantages
Can be (not always) less complex to set up and
Operates at the disk level
administer than host-based approaches Can ofer the beneft of capturing all application changes.
. .
Key Disadvantages: Costly
Can be wasteful of network bandwidth if not properly set
Lacks transaction knowledge or what the data represents
up If operating in synchronous mode, can degrade
application performance S U M B E R K E P U S T A K A A N :
C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T THE RISING ALTERNATIVE: BLOCK-AND-FILE REPLICATION Fundamentals
level) Key Advantages
Makes comparisons and only copies changes (at disk or fle
Can be fexible to replicate all enterprise data regardless of
Can be less expensive
disk system Copies only the most important fles/data
Many-to-one replication architectures available
Limits amount of data transferred, reducing network load and
cost Key Disadvantages
C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N :
Isn’t 100% availability of data BLOCK AND FILE REPLICATION DETAILS YOU NEED TO CONSIDER File WAN Replication Block WAN Replication Less expensive, host-based (or array-based) fle and block replication C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N : Specifc to storage vendor, OS or fle
DATABASE REPLICATION
Typically done by replicating or mirroring log fles A number of variations:
Continuous Mirroring: updates DBMS as changes(adds, updates, deletes) occur
Change Data Capture: captures DBMS changes and stores them until a predetermined replication time Full Copy Refresh: replicates entire DBMS copy to target
systems (done to resynchronize DBMS after outage)
Trigger-based native DBMS is not usually appropriate for DR because of high system and network overhead S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T
SNAPSHOTS: THE HOTSHOTS OF BACKUP Establishes a separate identifable storage entity and run operations against it
Primary purpose: backup, testing, conversion and batch process Is dependent on OS, host and array support… Advantage: it takes up less network bandwidth than mirroring Disadvantage: resynchronization of data is an art
If you do not resynchronize, you must build snapshot mirror totally from scratch S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T NEW KID ON THE BLOCK: VIRTUALIZATION AND DISASTER RECOVERY Virtualization software ofers a new alternative
Data replication (over both IP and Fibre Channel)
Snapshot
High Availability Fail-over
A cost-efective approach to disaster recovery
Key Challenges
Recreating the virtualization system can be difcult
Specifying fle level information for replication can be difcult
Still a relatively new technology, so test well
Research virtualization players thoroughly
Ask hard questions about number of customers doing this How are issues of network performance and security handled?
S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T Warning
PRIORITIZING DATA: INTEGRATING MIRRORING OR
REPLICATION TO YOUR STRATEGY Tool More Hot Site Remote Disk Mirroring Data Replication SnapshotImportance Of Data Campus Disk Mirroring Electronic Vaulting Tape Onsite Less Tape-Backup Offsite More
Less Amount Of Recovery Time C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N : Immediate Data OK, NOW WHAT? IT’S THE NETWORK, STUPID Long-distance Remote Mirroring/Replication requires signifcant network integration
Mission: Connecting two or more islands of storage
Could be SANs, hot sites, remote disk or tape
Myriad of network transport choices boil down to two fundamentals (from the POP out)
Fibre
IP
Where to Start: Evaluate Network Requirements
Ask storage vendors for requirements
Map that to service provider bandwidth services
S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T SPECIFIC NETWORK CHALLENGES FOR REMOTE MIRRORING AND REPLICATION Enterprise network performance is many times slower than storage performance Things You Could Consider
What tools do the remote mirroring/replication vendor provide for performance on a Metro SAN? Network throttling – adjusting data amounts sent over wire Compression – compressing data to take up less network bandwidth Time-stamping – marking data at time saved or accessed
Latency isn’t your friend Measurable time it takes for an I/O transaction to reach destination
Distance is a factor – especially when extending data native limit
Storage trafc requires high bandwidth, low latency connections not typical of IPS U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T Tip
METRO SAN PUZZLE PIECES
Headquarter Key Features Remote Site s Remote Tape Library Primary
Remote Disk Storage Disk Storage ATM, T3/E3, OC3+ or Fibre Optic (DWDM) Service Provider Connectivity Services Mirroring/Replication Software
Edge of Network Equipment (Director, Router or DWDM) S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T METRO SAN NETWORK TRANSPORT OPTIONS S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T
Network Protocol Performance Length of Distance
ESCON Full performance (200-M bits/sec. unidirectional) 8 km for full performance, 50% performance @ 20 km
FICON Bi-directional channel protocol, runs over at 1.063 G bit/sec.
100 km distance limitation Dark Fibre Dedicated Fibre (depends on transport) 10 km without long-wave transceivers iSCSI, iFCP, FCIP Still in proof-of-concept stage, but promise of 1 TB per hour over IP
Depends on applications, service, connection points – FCIP - primary for Metro SANs
DWDM - Gigabit (Optical) Ethernet Requires high-speed IP network to connect
Depends on applications, service, connection points and Key Features
IP NETWORK OPTIONS
Private Router Backbones
Leased, dedicated lines Optimized for performance (racing the sun)
xSP VPNs Customer purchases edge routers and ISP
provides shared backbone Leverages Multiprotocol Layer Switching (MPLS)
for better Quality of Service Internet . . .
C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M I E _ G R U E N E R . P P T S U M B E R K E P U S T A K A A N :
Not a disaster recovery tactic I would trust
TIPS TO CONSIDER WHEN SPEAKING Checklist WITH YOUR SERVICE PROVIDER Ask your xSP to provide you what their expertise is in storage services
services to establish a cost-efective service contract for your
backup services
Consider how you could leverage your existing connectivity
Ask for a latency/network performance SLA
Your primary xSP should have partners to assist with storage services if they don’t Consider leveraging storage vendor relationships to fnd service providers that can do integration Do or have done a network analysis to determine requirements for your backup services Determine if outsourcing is an option C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M S U M B E R K E P U S T A K A A N : METRO SAN CHALLENGES: THINGS YOU NEED TO ASK ABOUT IP Checklist Latency and Bandwidth Security Complexity Quality of Service (QoS) Dropped Packets Manageability NOTE: IP storage switch vendors are trying to solve these things – so gauge them based on this C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M S U M B E R K E P U S T A K A A N :
DOES OUTSOURCING MAKE SENSE?
Determine if outsourcing disaster recovery services for Data Mirroring and Replication services
Do I have the skills, personnel and infrastructure? Outsourcing provides a number of advantages
Enables enterprise to focus on core competence
Speeds IT’s ability to maintain and return to business operations
Leverages expertise and more plentiful specialized resources
Ofers mirrored solutions for immediate recovery
Provides problem resolution expertise that speeds delivery of
services related to backup, security and performance monitoring
Delivers professional services to assist in design of a customized
business continuity plan S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M Best PracticeASK FOR HELP FROM A PROFESSIONAL . . .
This is a complex proposition Storage vendors will assist with best backup technologies Service Providers will ofer options for services Integrators with storage and networking practices are best candidates for additional implementation
they are still rare in the world S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M
EVALUATE ROI FOR DISASTER RECOVERY
Come up with a ROI calculation for your data protection strategy Guidelines to remember
Calculated over three-year term
The higher the ROI, the more favorable the project
TCO vs. ROI – ROI wins out Key factors to be included in ROI analysis
Costs: downtime, personnel, assets
Reliability: data replication, mirroring, backups
System performance: how is systems and software utilized
Calculate savings: improved performance, revenue, processes S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M Best Practice
CONCLUSIONS Don’t forget the fundamental goal: Disaster Recovery Consider your options for mirroring/replication and make a metric to measure them by
ROI analysis is one way of measuring options
Be cautious of new technologies
New IP storage networking technologies and software ofer new options – but you need to be savvy in deployment
There’s not one solution – strategize on ways to prioritize your data protection S U M B E R K E P U S T A K A A N : C D N . T T G T M E D I A . C O M / . . . / S T O R A G E _ M A N A G E M E N T _ J A M