Professional Documents
Culture Documents
01 Business Continuity Intro
01 Business Continuity Intro
1-1
1-2
1-3
1-4
1-5
1-6
1-7
1-8
1-9
1-10
1-11
1-12
1-13
1-14
1-15
A good copy is one that is: Consistent captures all relevant data as a coordinated snapshot
Near Current
1-16
The Disaster Recovery timeline is defined around two key objectives: Recovery Point Objective How much data loss can you tolerate? 30 minutes 60 minutes 24 hours 1 week Zero is a valid answer! Recovery Time Objective How long can you tolerate being off-line? Time is defined as not just the time to recover the data, but the time to bring business operations back online
1-17
Procedures should be written so that secondary personnel are able to follow them In a disaster situation, primary personnel may not be able to reach the recovery site For example, persons other than the primary email administrator should be able to recover the email servers and confirm operation Business leaders and IT personnel must agree on Recovery Time Objectives and Recovery Point Objectives. RPO and RTO are essentially service level agreements disaster recovery Frequent review and updates to the plan are necessary to accommodate Changes to server or application software Additions to the IT environment, such as a new database or application server Deployment of new IT tools, such as Dell EqualLogic Auto-Snapshot Manager Periodic testing of the plan is necessary to ensure: that: The plan covers all necessary IT Infrastructure
1-19
Each of the following plans are described in more detail later in this lesson.
1-20
1-21
1-22
1. On the Backup Server, the backup process starts, which can be initiated manually or through a schedule:
The Backup Server notifies VSS on the target server that the data should be backed up.
VSS notifies NTFS to prepare for the backup (for example, quiesce and flush the buffer cache). VSS notifies the PS Series group to create a snapshot.
1-23
The server recover plan specifies how to return the processing infrastructure to service following either a physical disaster or data disaster May also include application recovery (recover both servers and applications in a single step) Email stores Databases Specifies processes for recovery at both the local site (for example, after a hardware failure or software failure) and the remote site (fire, flood, etc.) Specifies return to normal operation at either the original site, or at a new site if original site is permanently lost Dell EqualLogic Enhances the Plan by: Enabling frequent snapshots/replications of the system volume (Boot from SAN) Local recovery, remote recovery, fast-failback to primary site, multiple recovery points
1-24
The database recovery plan specifies restoration processes to recover specific databases that are critical to business operations. Recovery processes for the both local site and the remote (DR) site are defined In-place recovery/rollback
1-25
1-26
1-27
Cold Systems are idled and are not available for use during backup operation Application recovery is the same as normal system startup Good old backup Crash Consistent A copy of all relevant data is captured at a single point in time Application recovery is as if power was lost Application Consistent Application supports the ability to create a coordinated snapshot of its data set. Application supports recovery from the coordinated snapshot Inconsistent Data are not coordinated; usefulness is limited (but may be better than nothing)
1-28
Different types of backup offer varying degrees of: Impact to the server being backed up
Heavy burden on the server is undesirable, because it necessitates doing backups during a specified maintenance window
At worst case, access to the server is completely restricted during the backup operation (Cold backup) Impact to users who are using the server Will the users see poor performance when backup is running? Ease of recovery The manner in which the backup is captured will impact both Recovery Time and Recovery Point objectives Application Consistent copies offer the easiest and fastest recovery
Crash Consistent copies are easy create, but recovery may be more time-consuming and laborious.
1-29
Cold backups are what most people think of when they think of backup
Backed-up data is not immediately accessible. The data will be in a format defined by the backup application, and must be restored using the same software used to perform the backup
1-30
1-31
Crash consistent copies are point-in-time copies of a volume or a set of related volumes
1-32
Current technology enables the creation of application consistent data copies Point-in-time snapshot capture is coordinated with the application Application is momentarily paused (quiesced) just prior to the snapshot being taken
All buffers and cache are flushed, so no data remains unwritten to disk
Snapshot is captured of volume or volume set associated with the application Application is un-paused
1-33
Inconsistent snapshots are snapshots that span multiple volumes, but which are not captured in a coordinated manner
For example, a database resides on 3 separate volumes, but the volumes are backed up individually at different points in time
Applications cannot recover from inconsistent snapshots It may be possible to manually recover pieces of data For example, recovery of an accidentally deleted file
Inconsistent snapshots should be avoided (but they may be better than nothing)
1-34
1-35
1-36
Crash-consistent snapshots are easier to implement, but require more effort during a recovery
Application-consistent snapshots involve more planning and setup, but offer faster recovery Locally stored snapshots support favorable RTO and RPO times, but they do NOT protect against a site outage Snapshot Techniques Copy-on-write Allocate-on write Snapshot considerations include The time that it takes to perform the snapshot The amount of storage space used by the snapshot The burden placed on the application server by the snapshot operation
1-37
Typical replication solutions are often time-consuming and require you to back up data and manually transport the backups to a different location. Through Dell EqualLogics Snapshots and Auto-Replication capability, end-toend data protection capability is now possible for customers. At the primary site, snapshots are use to provide quick recovery, based on Volume changes Snapshot schedule Risk Need to recover At the Remote site
1-38
1-39
1-40
1-41
1-42