VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA
VERITAS Confidential
Disaster Recovery – Beyond Backup
Jason Phippen – Director Product and Solutions Marketing, EMEA
VERITAS Confidential
Agenda
• Disaster Recovery Concepts• Backup – Last Line of Defence• Enhancing Backup with Replication• Remote Site Replication and Mirroring• Clustering for Disaster Recovery• Questions
VERITAS Confidential
• Recovery Point Objective (RPO) –Point in time to which applications data must be recovered to resume business transactions
• Recovery Time Objective (RTO) –Maximum elapsed time allowed before lack of business function severely impacts an organization
Disaster Recovery ConceptsDisaster Recovery Concepts
Days MinsHrsWks Secs
Recovery PointRecovery Point
Mins DaysHrsSecs Wks
Recovery TimeRecovery Time
VERITAS Confidential
• How much data loss can you endure?
Recovery Point Objective (RPO)Recovery Point Objective (RPO)
Tape Backup w/ Offsite Vaulting
Replication
Mins DaysHrsSecs WksDays MinsHrsWks Secs
Recovery PointRecovery Point Recovery TimeRecovery Time
VERITAS Confidential
• How much downtime can you endure?
Recovery Time Objective (RTO)Recovery Time Objective (RTO)
Recovery from Tape
Geographic Clustering
Mins DaysHrsSecs WksDays MinsHrsWks Secs
Recovery PointRecovery Point Recovery TimeRecovery Time
VERITAS Confidential
• “Far Enough” away– How far away from the main site?– What resources should it have?
• Site Strategies (Hot, Warm, Cold)• Considerations
– Fault zones– Flood plains– Power grids– Climate zones– Locality relative to other sites
(e.g., airport)– Remote customers and employees
Choosing a Recovery SiteChoosing a Recovery Site
VERITAS Confidential
Backup – Your last line of Defense
• Redundant systems replicate user errors, viruses and data corruption
• System or component redundancy (RAID, mirroring) cannot replace backup
• Backup tapes may represent the last valid copy of data
• Backups are your last line of defense against total data loss
VERITAS Confidential
• Replicating the Backup Catalog server– Shave hours off a tape restore strategy– No need to re-catalog tapes– No need to rebuild the backup/restore server– Tape restores can begin immediately
Backup Tape Copies
Sent to Offsite
Site A Site B
Backup Clients
Backup Master/Media
Server
Replicate Backup Catalogs
Replication-enhanced Backup
VERITAS Confidential
Replication and Mirroring
Key Requirements…• Must be “far enough” away• No windows of data
corruption at secondary
Synchronous
Asynchronous
Recovery PointRecovery Point
MinutesDays Hours SecondsWeeks
VERITAS Confidential
4
1
2
3
Strengths
• Maximum data currency (RPO)
• Data available immediately at secondary (RTO)
Weaknesses
• Potential to impact application performance
• Data writes lag by network latency
• Write commit latency across nodes
Primary Site Secondary Site
Synchronous ReplicationSynchronous Replication
VERITAS Confidential
Strengths
• Maximum performance
• May have less application impact
• Data available immediately at secondary (RTO)
Weaknesses
• Secondary may lag primary (RPO)
• Potential for data corruption (not a weakness for VERITAS)
2
1
3
4
Primary Site Secondary Site
Asynchronous ReplicationAsynchronous Replication
VERITAS Confidential
Secondary Site
Application
Volume Manager
SAN Fabric
• Lower hardware costs– Groups physical disks into logical volumes– Hardware Independence,
• Greater IT productivity– Simplified administration of heterogeneous environments – Proactive management of applications
• Increased application ROI
• Can mirror over SAN distances
Primary Site
Logical Volume ManagementLogical Volume ManagementRemote MirroringRemote Mirroring
VERITAS Confidential
Campus / MAN Disaster Recovery WAN Disaster Recovery
Clustering for Disaster Recovery
WAN
Clustering, Replication, Global Clustering
MAN
Clustering , Replication
Clustering, Remote Mirroring
OR
VERITAS Confidential
Campus / MAN Disaster Recovery St-r-e-t-c-h Cluster Over A SAN
* Distance may vary depending upon infrastructure
VERITAS Confidential
Global Global Clustering
• Geographically dispersed sites linked by public carrier wide area network
• Each site aware of the configuration and state of all of the sites
• Direct site level migration in event of catastrophe
• Global Availability Management
• Single point of monitoring and administration
VERITAS Confidential
Replication
Site Migration
Wide Area Availability
Application
ClusteringGlobal
Clustering
Application
ClusteringGlobal
Clustering
Application
ClusteringGlobal
Clustering
Failover
VERITAS Confidential
VERITASCluster Server
Volume Manager/ Foundation Suite
NetBackup/Backup Exec
VERITAS Global Cluster Manager
VERITAS Volume Replicator
- NetBackup Vault- BMR / IDR
LocalLocal Multi-siteMulti-siteA
va
ilab
ility
Req
uir
eme
nts
Av
aila
bili
ty R
equ
irem
en
ts
VERITAS: Uniquely Qualified (HA and DR)