0% found this document useful (0 votes)
26 views

ThomasRivera Introduction To Data Protection

Uploaded by

nicholassquare
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

ThomasRivera Introduction To Data Protection

Uploaded by

nicholassquare
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Introduction toTITLE

PRESENTATION Data Protection:


GOES HERE

Backup to Tape, Disk and Beyond

Thomas Rivera / Hitachi Data Systems

Author:
SNIA - Data Protection & Capacity Optimization (DPCO) Committee
SNIA Legal Notice

The material contained in this tutorial is copyrighted by the SNIA unless


otherwise noted.
Member companies and individual members may use this material in
presentations and literature under the following conditions:
Any slide or slides used must be reproduced in their entirety without modification
The SNIA must be acknowledged as the source of any material used in the body of
any document containing material from these presentations.
This presentation is a project of the SNIA Education Committee.
Neither the author nor the presenter is an attorney and nothing in this
presentation is intended to be, or should be construed as legal advice or an
opinion of counsel. If you need legal advice or a legal opinion please
contact your attorney.
The information presented herein represents the author's personal opinion
and current understanding of the relevant issues involved. The author, the
presenter, and the SNIA do not assume any responsibility or liability for
damages arising out of any reliance on or use of this information.
NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK.

Introduction to Data Protection 2


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
About the SNIA DPCO Committee

This tutorial has been developed, reviewed and approved by members


of the Data Protection and Capacity Optimization (DPCO) Committee
which any SNIA member can join for free
The mission of the DPCO is to foster the growth and success of the
market for data protection and capacity optimization technologies
Online DPCO Knowledge Base: www.snia.org/dpco/knowledge
Online Product Selection Guide: http://sniadataprotectionguide.org

2015 goals include educating the vendor and user communities,


market outreach, and advocacy and support of any technical work
associated with data protection and capacity optimization

Check out these SNIA Tutorials at www.snia.org/education/tutorials


• Advanced Data Reduction Concepts
• Data Protection in Transition to the Cloud
• Trends in Data Protection

Introduction to Data Protection 3


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Abstract

Introduction to Data Protection: Backup to Tape, Disk and Beyond


Extending the enterprise backup paradigm with disk-based technologies
allow users to significantly shrink or eliminate the backup time window.
This tutorial focuses on various methodologies that can deliver efficient
and cost effective solutions. This includes approaches to storage pooling
inside of modern backup applications, using disk and file systems within
these pools, as well as how and when to utilize Continuous Data
Protection, deduplication and virtual tape libraries (VTL) within these
infrastructures.

Learning Objectives:
Get a basic grounding in backup and restore technology including tape, disk,
snapshots, deduplication, virtual tape, and replication technologies
Compare and contrast backup and restore alternatives to achieve data
protection and data recovery
Identify and define backup and restore operations and terms

Introduction to Data Protection 4


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Agenda

Fundamental concepts in Data Protection


Overview of Backup Mechanisms
Backup Technologies
Appendix

Introduction to Data Protection 5


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Data Protection: Defined

Data protection is about data availability

SNIA definition of Data Protection: Assurance that data is not corrupted,


is accessible for authorized purposes only, and is in compliance with
applicable requirements

There are a wide variety of tools available to us to achieve data


protection, including backup, restoration, replication and disaster recovery

It is critical to stay focused on the actual goal -- availability of the data --


using the right set of tools for the specific job -- within time and budgets

Held in the balance are concepts like the value of the data (data
importance or business criticality), budget, speed, and cost of downtime

Introduction to Data Protection 6


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
The Process of Recovery

Detection
Corruption or failure reported
Diagnosis / Decision
What went wrong?
What recovery point should be used?
What method of recovery should be used -- overall strategy for the recovery?
Restoration
Moving the data from backup to primary location
From tape to disk, or disk to disk, or cloud to disk; Restore the lost or corrupted
information from the backup or archive (source), to the primary or production disks.
Recovery – Almost done!
Application environment - perform standard recovery and startup operations
Any additional steps
Replay log may be applied to a database
Journals may be replayed for a file system

Test and Verify

Introduction to Data Protection 7


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Traditional Recovery

Last Known- APPLICATION


Analyze Application
Good Image DOWNTIME
Restarted

Modifications Since Last Image Detect Restore* Recover

Recovery Point Objective Drives Recovery Time Objective


* Example: 10TB = 3 hours from disk, 5 hours from tape

Introduction to Data Protection 8


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Protection Based on Recovery

Years Days Hrs Mins Secs Secs Mins Hrs Days ????

Recovery Point Recovery Time

Protection Methods Recovery Methods

Tape Backups Capture on Write Synthetic Backup Instant Recovery Restore from Tape, Disk, Cloud
Vaults Disk Backups Data Replication Point-in-Time Recovery
Archival Snapshots Cloud Backup Roll Back Search & Retrieve

Introduction to Data Protection 9


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Backup Methodologies

Cold
Offline image of all data
As backup window shrinks & data size expands, cold backup becomes untenable
Cheapest and simplest way to backup data
Application Consistent
Application supports ability to take parts of data set offline during backup
Application knows how to recover from a collection of consistent pieces
Avoids downtime due to backup window
Crash Consistent or Atomic
Data copied or frozen at the exact same moment across entire dataset
Application recovery from an atomic backup similar to an application failover
Rebuilding may be needed
No backup window
Introduction to Data Protection 10
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Data Protection Design Trade-offs

Assessing your priorities


Backup window
Shorten or eliminate
Recovery Time Objective (RTO)
Speed of recovery
What is the cost of application downtime?
Recovery Point Objective (RPO)
Amount of data loss
How far back in time to recover data?
Move data offsite for DR
There are trade-offs everywhere
Newer technology improves but may not eliminate trade-offs
Cost, downtime, business impact
Need to identify the priority order, and establish SLA targets for each data type
What is the cost of a lost application?
Introduction to Data Protection 11
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Backup to Tape, Disk and Beyond

Fundamental concepts in Data Protection


Overview of Backup Mechanisms
Backup Technologies
Appendix

Introduction to Data Protection 12


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Backup Networking 101

LAN
Application Hosts Backup Hosts
Network Clients

Network Attached Storage


Direct Attached Storage SAN

SAN Attached Storage


Backup Targets

Introduction to Data Protection 13


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
“Cloud” Backup

CLOUD
LAN
Application Hosts Backup Hosts
Network Clients

WAN

Network Attached Storage


Direct Attached Storage SAN

SAN Attached Storage


Backup Targets

Introduction to Data Protection 14


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Typical Backup Topology Components

Backup Management Server


Could be a single server or on some clients, or server(s) in the cloud
Owns the Metadata catalog
Must protect the catalog
Storage Node or Media Server
Collects the data from the Agent
Read and writes to a secondary storage device
Agent
Manages the collection of the data and Metadata
Traditional thin client or modern intelligent client
Application Server
Server that owns (produces) the data
Maybe structured or unstructured data
Secondary Storage
Target media (destination) for the backup data
Introduction to Data Protection 15
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
LAN Backup

Media
AGENT LAN Server

CATALOG

SAN / SCSI
Application Backup
Server Server

Data
DATA Metadata

Secondary
Storage

Backup server receives data and Metadata from application


server across the LAN
LAN is impacted by both backup and restore requests
Application server may be impacted by storage I/O
CIFS, NFS, iSCSI, NDMP, or vendor specific
Introduction to Data Protection 16
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Server-free Backup (Application)

AGENT LAN
Media
Server CATALOG

Application SAN / SCSI Backup


Server Server

Data
DATA MIRROR Metadata
SAN
Secondary
Storage

The application server allocates a snapshot/mirror of the primary storage


volume to a media server that delivers the data over the LAN or SAN
Media server must understand the volume structure
Mirror: Application server impacted when creating the mirror
Snapshot: Application server impacted by volume access
Metadata over the LAN to the backup server

Introduction to Data Protection 17


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Server-free Backup (Server-less)

AGENT LAN
Media
Server CATALOG

Application Backup
Server Server
SAN / SCSI
Data
DATA Metadata
SNAPSHOT DATA
MOVER Secondary
Storage

Backup server delegates the data movement and I/O processing to a


“Data-mover” enabled on a device within the environment
Network Data Management Protocol (NDMP)
NDMP is a general open network protocol for controlling the exchange of data
between two parties

Introduction to Data Protection 18


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Cloud Backup

Media
CATALOG Server
Backup
Data Server
Metadata Secondary
Storage
WAN

LAN
CLOUD
AGENT

Intelligent host-based agent


Saves changes and unique blocks
Application
Server
Security and control issues
Secure VPN / IPsec Tunnel
DATA Encryption “in-flight” and “at-rest”
(-) WAN network performance
Can use local cache to mitigate (“hybrid cloud”)
(+) Low CAPEX
(+) Off-site protection
Introduction to Data Protection 19
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Traditional Backup Schedules

Full Backup
Everything copied to backup (cold or hot backup)
Full view of the volume at that point in time
Restoration straight-forward as all data is available in one backup image
Huge resource consumption (server, network, tapes)
Incremental Backup
Only the data that changed since last full or incremental
Change in the archive bit
Usually requires multiple increments and previous full backup to do full restore
Much less data is transferred
Differential backup
All of the data that changed from the last full backup
Usually less data is transferred than a full
Usually less time to restore full dataset than incremental

Introduction to Data Protection 20


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Synthetic Backup & Incremental Forever

Synthetic Full Backups


Incremental backups are performed each day
Full backups are constructed from incrementals typically weekly or
monthly
Less application server and network overhead

INC INC INC INC INC

Incremental Forever
FULL

Incremental backups are performed every day


Primary backups are often sent to disk-based targets
Collections of combined incrementals used for offsite copies
Usually consolidate images from clients or application and create tapes
May construct synthetic full in the cloud

Introduction to Data Protection 21


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
What gets Backed Up and How

File-level backups
Any change to a file will cause entire file to be backed up
Open files often require special handling SW
Open files may get passed over – measure the risks
PRO: Ease of BU and restore CON: Moves tons of data
Block-level backups
Only the blocks that change in a file are saved
Requires client-side processing to discover changed blocks
PRO: Smaller backups, Less network impact, Faster
CON: Client-side impact, increased complexity
Client-side backups
Intelligent agent monitors changes and protects only new blocks
Agent enables advanced technology, granular backups and user policies
Deduplication can enable network efficiency, reduce BU data volume
PRO: Efficiently distributes work CON: Complex client/server
Introduction to Data Protection 22
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Backup to Tape, Disk and Beyond

Fundamental concepts in Data Protection


Overview of Backup Mechanisms
Backup Technologies
Appendix

Introduction to Data Protection 23


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to Tape

Sequential access technology


Versus random access
Can be removed and stored on a shelf or offsite
Disaster Recovery
Encrypted, Archived for compliance?
Reduce power consumption
Media replacement costs Tape Library
Tape life, reusability
Performance and Utilization
Can accept data at very high speeds, if you can push it
Streaming and multiplexing
Typically Managed by backup and recovery software
Controls robotics (Inventory)
Media management
Tape is not Dead!
Introduction to Data Protection 24
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Tape Based Backup: Considerations

Tape drives run faster than most backup jobs – Is this good?
Matching backup speed is more important than exceeding it
Avoid shoe-shining
Slower hosts can tie up an expensive drive
It’s a shame to waste a drive on these hosts
Slower tapes can tie up expensive (important) servers
It is a shame to let the tape drive throttle backup servers
Slow backup can impact production servers as well
Replacing your tapes may not solve your backup challenges
A well designed backup architecture is the best answer
If backup target speed is your issue:
Consider alternates such as virtual tape (VTL) or D2D2T
Security, security, security……..

Introduction to Data Protection 25


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to B2D / D2D

What?
Backup to Disk / Disk to Disk Backup
Disk as a primary backup target LAN
Why?
Performance and reliability
Reduced backup window Disk
Target
Greatly improved restores Backup
Server SAN
RAID protection
Eliminate mechanical interfaces
More effective sharing of backup targets
Considerations
Fibre Channel Disks versus SATA versus SAS
Tape
I/O random access vs. MB/s sequential Library
SAN, NAS or DAS
VTL or mirroring
Consider a mix of Disk and Tape (D2D2T)
Consider a capacity-optimized appliance

Introduction to Data Protection 26


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to VTL

What:
Virtual Tape Libraries emulate traditional tape
Fits within existing backup environment Backup

Easy to deploy and integrate


Server

VTL
Reduce / eliminate tape handling

Why: IP / FC
SAN

Improved performance and reliability (see B2D)


Reduced complexity versus straight B2D or tape Tape
Library

Unlimited tape drives reduce device sharing, improve backup times


Enables technologies such as remote replication, deduplication

Considerations:
Easy to manage in traditional backup software environment
Can extend the life of current physical tape investment
Introduction to Data Protection 27
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to CDP

What:
Continuous Data Protection
App
Capture every change as it occurs Server

May be host-based, SAN-based, array-based


Protected copy in a secondary location Capture
Point
“Roll back” to any point in time Normal
Path
How: Backup

Block-based Path

File-based
Application-based Protect
Record of
Updates

Why: Storage Object

Implementations of true CDP today are delivering zero data loss, zero backup
window and simple recovery; CDP customers can protect all data at all times and
recover directly to any point in time
“Near CDP” (Snapshots, checkpoints) may also help but will not catch every change

Introduction to Data Protection 28


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Contrasting CDP and Replication

Replication is not CDP (Synchronous)


Replica or mirror is a single PIT copy of the data
Multiple replicas plus logs can create multiple points in time

Snapshots are not CDP (Asynchronous)


Data loss possible if crash or corruption happens between snaps
Snapshots frequently to same system as primary
Lack continuous index with embedded knowledge of relationship of
data to files, folders, application and server

Backups (even multiple backups) are not CDP:


Schedule frequency
Database logging can provide additional granularity but still not CDP

Introduction to Data Protection 29


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to Snapshots

What?
A disk based “instant copy” that captures the original data at a specific point in time
Snapshots can be read-only or read-write.
Also known as Checkpoint, Point-in-Time, Stable Image, Clone
Often handled at the storage level
May be done at application server, hypervisor, and/or in cloud

Why?
Allows for complete backup or restore
With application downtime measured in minutes (or less)
May be able to be combined with replication
Most vendors: Image only = (entire Volume)
Backup/Restore of individual files is possible
If conventional backup is done from snapshot
Or, if file-map is stored with Image backup

Introduction to Data Protection 30


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Snapshot Considerations

Full Copy Snapshots Differential (or “Delta”) Copy


Snapshots
Upsides Minimal performance impact Less storage consumption
Independent copy available for DR Often takes advantage of cheaper disk

Downsides High disk utilization Performance may be impacted


No GEO-redundant protection Dependent on primary copy

Applications Disaster Recovery Backup source


Near zero backup window Near zero backup window
Fastest restore
Valuable for data repurposing Fast restore
Can help with data repurposing
Beware performance impact

Introduction to Data Protection 31


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Introduction to Data Deduplication

What?
The process of examining a data-set or I/O stream at the sub-file level and
storing and/or sending only unique data
Cleint-side SW, Target-side HW or SW, can be both client and target
Why?
Check out SNIA Tutorial:
Reduction in cost per terabyte stored
Advanced Deduplication
Significant reduction in storage footprint Concepts
Less network bandwidth required
Considerations
Greater amount of data stored in less physical space
Suitable for backup, archive and (maybe) primary storage
Enables lower cost replication for offsite copies
Store more data for longer periods
Beware 1000:1 dedupe claims – Know your data and use case
Multiple performance trade-offs

Introduction to Data Protection 32


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Factors Impacting Space Savings

More Effective Deduplication Less Effective Deduplication

Data created by users Data captured from mother nature


Low change rates High change rates
Active data, encrypted data, compressed
Reference data and inactive data
data
Applications with lower data transfer Applications with higher data transfer
rates rates
Use of full backups Use of incremental backups
Longer retention of deduplicated data Shorter retention of deduplicated data
Continuous business process
Business as usual operational procedures
improvement
Format awareness No format awareness
Temporal data deduplication Spatial data deduplication

Don’t forget about compression!


Introduction to Data Protection 33
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Next Steps in Data Protection

Choose the appropriate level of protection


Assess risk versus cost versus complexity
Include your “customers” in your decisions
Match RPO, RTO goals with technology
Consider resources required to support your decisions
Consider centralized versus distributed solutions
Performance is ALWAYS a consideration
Assess your system today for strengths and weaknesses
A new box or new SW may NOT be the answer
Use archive to reduce the volume of data to be backed up
When in doubt, call in the experts

Introduction to Data Protection 34


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Where to Get More Information

Related tutorials
Active Archive – Data Protection for the Data Center
Advanced Deduplication Concepts
Trends in Data Protection and Restoration Technologies
Understanding Data Deduplication
Retaining Information for 100 Years
Visit the Data Protection and Capacity Optimization
Committee website http://www.snia.org/dpco/
DPCO online Product Selection Guide
http://sniadataprotectionguide.org/

Introduction to Data Protection 35


Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Attribution & Feedback

The SNIA Education Committee thanks the following


individuals for their contributions to this Tutorial:
Authorship History Additional Contributors
Original Author: DPCO Committee, 8/2010 David A. Chapa
Kevin Dudak
Updates: Mike Dutch
DPCO Committee, 9/2010 Mike Fishman
DPCO Committee, 2/2012 Larry Freeman
DPCO Committee, 8/2012 David Hill
DPCO Committee, 2/2013 Jason Iehl
DPCO Committee, 8/2013 Tom McNeal
DPCO Committee, 3/2015 Gene Nagle
Ronald Pagani
Thomas Rivera
Tom Sas
Gideon Senderov
Paul Talbut
SW Worth

Please send any questions or comments regarding this SNIA


Tutorial to [email protected]
Introduction to Data Protection 36
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.
Local Data Mover for Performance

AGENT LAN
Media
Server CATALOG

Application Backup
SAN / SCSI Server
Server

Data
DATA Metadata

Secondary
Storage

Sometimes known as LAN-Free backup


Application server reads and writes the data locally
Application server acts as a media server
Storage is accessible by the application server
Minimal LAN impact
Significant application server impact
Introduction to Data Protection 37
Approved SNIA Tutorial © 2015 Storage Networking Industry Association. All Rights Reserved.

You might also like