white paper the four steps to a tapeless backup

Transcription

white paper the four steps to a tapeless backup
THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT:
YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS
WHITE PAPER
INTRODUCTION
CONTENTS
1
INTRODUCTION
You live in a world of constant data growth. In fact, IDC estimates that data
will continue to double approximately every two years until 2020.1 This puts
tremendous pressure on IT as new resources must be added to manage
your ever expanding storage volumes and, by extension, your data backup,
recovery, and disaster recovery (DR) infrastructure.
2 ASSESSMENT
3 EVALUATION
6 IMPLEMENTATION
7 MANAGEMENT
Yet while your data is growing, your business service level agreements (SLAs)
pertaining to data backup, recovery, DR, and compliance are staying flat,
and in many cases becoming more stringent. Backup hardware, however,
has not remained stagnant, and there is an abundance of new technologies
available whether tape-based, disk-based, or even cloud-centric. Finally,
your applications have also evolved with many new technologies being
implemented including virtualization, cloud computing, backup applications,
and more advanced application functionality.
8 CONCLUSION
DATA GROWTH
SLAs
Applications
Hardware
The collision of these elements has left IT administrators in a bind. Failure to
meet business SLAs is not an option, but it has become progressively harder
to meet requirements as IT complexity continues to increase. As a result, many
companies are looking to technology advancements to address their business
needs with the hope of spending less time, money, and energy on data backup,
recovery, and DR.
IDC. “The Digital Universe In 2020: Big Data, Bigger Digital Shadows, and Biggest Growth inthe Far East.”
December 2012.
1
One of the most common strategies to enhance
your data backup, recovery, and DR suggests moving
your system to a tapeless environment. It’s not the
economics or reliability of the technology that’s causing
organizations to search for alternatives, but rather the
manageability and level of expertise the technology
requires. But how exactly can you do this? What are the
critical considerations and decisions you must make to
effectively and reliably migrate to a new medium? This
white paper addresses these questions and provides a
four-step outline for you to follow to start moving away
from tape technology.
DEFINITIONS
RTO: A recovery time objective
(RTO) is the duration of time
within which a computer, system,
network, or application must
be restored after a failure or
disaster occurs without crippling
consequences.
STEP 1: ASSESSMENT
The first step in migrating to a tapeless strategy is to
assess all of your business and product needs for a data
backup, recovery, and DR solution. After you nail down
your requirements you can begin to compare features
and functions of potential alternatives. Today’s numerous
data backup, recovery, and DR solutions offer varying
combinations of budgetary, recovery time objective
(RTO), and recovery point objective (RPO) options.
RPO: A recovery point objective
(RPO) is the maximum period
that data must be recovered
from backup storage for normal
operations to resume if a
computer, system, or network
goes down.
Copy Data/Continuous Data Protection
Snapshots
Replication
Cost
Disk
Cloud
Tape
Seconds
Minutes
Hours
Days
RTO/RPO
2
Hardware
Share this document
800.899.IRON | ironmountain.com
However, understanding RTO and RPO alone isn’t enough; you must also look at your environment in the context of the
following considerations.
ASSESSING YOUR CURRENT ENVIRONMENT
Considerations
Questions to Ask Yourself
Why This Matters to You
Backup Windows
Do you have a defined backup window?
What is that today and how will it
change in the future?
Speed is critical for backup windows. You need a solution that can meet
the backup windows you have today and will have in the future.
Growth Expectations
How do you anticipate your
environment growing over the
coming months and years?
Growth is a fact of life. You need to consider how a solution will scale
with your environment. You should think about both performance and
capacity scalability.
Disaster Recovery
What are your DR requirements today?
And what will they look like in the
future?
DR is a critical component of data protection. The problem gets
exponentially more difficult as data grows. Think carefully about your
current and future DR requirements and how a given solution supports
those models.
Retention
Requirements
What are your current retention
requirements? How do you envision
those changing over time?
Retention is typically driven by business SLAs and compliance. Different
protection systems offer varying retention options and some solutions
can limit flexibility.
Application-specific
Needs
What applications (i.e. Oracle, SQL,
Exchange, etc.) and environments
(physical, virtual, or both) are you
operating in your infrastructure?
Do they have different protection
requirements?
Backup solutions vary from point solutions that support certain
environments like VMware, for example, to massively heterogeneous
offerings that support the most complex corporate environments. You
need to ensure that you choose the right offering to align with your
business objectives.
Budget
What monetary considerations do your
business objectives require?
Prices for various backup solutions can vary widely from pennies to
hundreds of dollars per GB and the prices depend on the other criteria
described above.
Regardless of the type of technology you choose, there are multiple delivery and hardware options you must consider as
well. Be it service, hardware, software, or a hybrid configuration, you should keep your business objectives in mind to make
the right selection for you and your organization. Finally, you need to know where and how you’re going to back up your
data. If you’re moving away from tape, will you be backing up to disk, the cloud, or perhaps a combination of the two?
STEP 2: EVALUATION
Once you understand your business objectives, you can start evaluating all of your technology options. As you consider
these options, remember that you don’t have to choose just one and, in fact, you may choose to operate multiple
technologies simultaneously to address various RTO, RPO, and business requirements.
800.899.IRON | ironmountain.com
Share this document
3
TECHNOLOGIES TO CONSIDER
Technology
What It Is
Why It’s Worth Considering
Drawbacks
Disk-based
backup with
deduplication
Backing up data to a disk target
instead of a tape solution.
Disk systems provide strong performance,
reliability, and efficiency. Deduplication extends
this benefit by delivering a reduced dollar per
gigabyte cost.
Companies often need to retain data for extended periods of time.
With a typical five-year span, deduplication systems will need to be
updated frequently. Additionally, the cost per GB of these solutions,
while better than non-deduplicated disk, is typically 5–10x more than
tape. This is amplified as data is stored for extended periods of time.
Cloud backup
With cloud backup, core data is
backed up over the Internet to a
remote data center using advanced
bandwidth reduction technologies
like deduplication and compression.
Since data is protected and is located
at a remote site, the resulting
solution provides both an effective
data backup and DR solution.
It can help simplify the backup process by
automating both data backup and DR. Additionally,
since the remote storage and servers are managed
by the cloud provider, the process of managing
backup and retention is dramatically simplified.
These services are typically charged on a monthly
basis and so capital costs are minimized.
Cloud backup depends on the availability of sufficient bandwidth for
data backup and, more importantly, recovery. A lack of sufficient
bandwidth can significantly impact RTOs. These solutions can also
get expensive as data volumes grow and typically offer limited
retention options.
Snapshots
A snapshot is a copy of your data
at any particular point in time that
is typically created on your primary
storage array. A snapshot can be
used to return your storage to a
previous state after a failure.
It offers zero impact backup with minimal or
no application downtime, frequent backups for
reduced recovery time, efficient backup of large
data volumes, and reduced exposure to data loss.
Snapshots are typically created on primary storage and often use
expensive disk capacity. Additionally, storage system performance
can be impacted by the number of snapshots retained on a system;
therefore long-term snapshot storage can impact storage operations
and drive up costs.
Copy Data
Management
A system that centralizes redundant
copies of corporate data created
by the various point tools, and is
used to protect, share, and analyze
information.
Copy data solutions provide a number of advanced
features including snapshots, replication,
and compression that are independent of the
underlying storage infrastructure.
Since copy data systems are independent of the existing
infrastructure, you will typically have to purchase and manage these
systems separately from existing hardware and software.
Continuous
Data Protection
(CDP)
CDP is a technology that
automatically backs up selected data
whenever any change is made. A
record is kept each time data changes
and is stored on a disk system.
Since it preserves a record of every transaction
that takes place in your enterprise, CDP allows for
extremely granular RPOs.
Since CDP systems store large quantities of transactions, they
often need significant storage capacity. This requirement grows
exponentially as data retention increases. Additionally, CDP
technologies are often specialized for certain applications and
environments.
Replication
Replication duplicates stored or
archived data in real time across
a network to a duplicate system
typically in a remote location. The
technology enhances data reliability
and accessibility.
Replication provides redundancy that can be
invaluable if the main storage backup system fails.
It can minimize downtime and streamline disaster
recovery processes by generating duplicate copies
of all backed-up files on a continuous basis. It can
also speed up and simplify recovery in the wake of
a disaster.
Replication systems typically require two storage systems of the
same type, thus doubling the potential cost. Additionally, by instantly
replicating data changes between sites, a data corruption event in
one site could be instantly duplicated to the second, therefore data
protection cannot be guaranteed.
General-purpose
Backup
Applications
General-purpose backup applications
were built to perform most common
These applications fulfill the core requirements
of any data backup, recovery, and DR strategy.
Traditional backup applications are mature and robust, but the
same maturity can lead to applications that lack the flexibility and
backup tasks including, copying,
archiving, and restoring data in the
event of data loss.
They are typically highly mature and support
heterogeneous environments. They also natively
support current technologies such as disk, tape,
and cloud.
advanced functionality of the newest technologies.
Specialized
Backup
Applications
Specialized backup applications are
more focused adaptations of their
general-purpose predecessors and
are generally focused on specific
operating environments, such as
VMware or Hyper-V.
The specialized nature of these solutions means
that they integrate tightly with their supported
environments. For example, VMware solutions will
typically leverage the newest VMware APIs and
management tools.
Many organizations have a range of technologies including multiple
applications and physical and virtual servers. These specialized
applications, while powerful for protecting specific environments,
offer limited breadth. Therefore, users will typically have to
purchase alternate, redundant heterogeneous backup solutions to
protect those servers that are not supported by these specialized
applications.
Applicationspecific
Backups
Application-specific backups were
designed to work with specific
applications. A classic example would
be Oracle RMAN, which is commonly
used to protect Oracle databases.
By tightly integrating with production applications,
these backup solutions often provide the most
consistent, robust, reliable, and application-aware
protection model.
The application-specific nature of this technology is its biggest
weakness because you would need multiple of these to protect a
typical heterogeneous environment. The breadth of these solutions
could rapidly become complex and unmanageable.
4
Share this document
800.899.IRON | ironmountain.com
After you have evaluated all of your data backup, recovery, and DR options,
you can narrow those down to a select few that align with your organization
and business objectives. The next step in moving away from a tape strategy is
to test your new alternatives. When it comes to data backup and recovery, it’s
the recovery that really matters. Therefore, when considering a new backup
solution, it’s critical to test it, but what processes do you need to go through
when evaluating and testing these various solutions to ensure you can truly
recover all of your data?
The following practices can and should be used to evaluate your potential new
solution(s). It’s also essential to note that you should use as much real-world
data as possible throughout this process. The best way to test a solution is to
simulate real-world data loss scenarios to see how you can react to them in
real-time. These practices include:
BEST PRACTICES FOR TESTING A NEW SOLUTION
Best Practice
Why You Should Test It
Test data backup,
recovery, and DR
You need to understand how the solution meets your basic
data backup, recovery, and DR requirements. Remember, you
should test these same functions across the range of servers
you have, including both physical and virtual and OS options
such as Windows®, Linux®, or Unix®. Not all solutions handle
these challenges equally, so it’s critical to know the strength
and weakness of each chosen option.
Test applicationspecific functionality
Your environment likely has multiple applications. You
should test how the selected options support your databases,
Virtual Machines, and email. Some solutions can support all
of these applications in a robust and consistent fashion, and
others are more limited.
Test system and
physical reliability
You will be running this environment for years to come and
could be storing data for decades or more, so it’s critical
that your system is reliable and consistent. You should test
the system by purposefully introducing hardware and/or
software faults to see how the system responds.
Test system
expansion
Growth is a common challenge because your backup system
must grow with your production storage. As part of your
evaluation, you must understand how the selected systems
will grow and test those systems to ensure they can be
completed consistently and reliably.
800.899.IRON | ironmountain.com
Share this document
When it comes to
data backup and
recovery, it’s the
recovery that really
matters. Therefore,
when considering
a new backup
solution, it’s critical
to test it.
5
It’s essential to
allow enough
time to effectively
initiate your
migration. In
addition to the
migration itself,
you should also
take into account
time to test and be
prepared to wait
for problems to
be resolved.
STEP 3: IMPLEMENTATION
Now that you’ve chosen and tested your new data backup, recovery, and DR
solution, the next logical step is implementation. And in order to effectively
and compliantly implement this new solution, there are critical steps you
should take to ensure success. Therefore, before jumping right in, you need
to develop a plan for the migration to your new solution. You must also take
today’s increasingly stringent government regulations and constantly evolving
security concerns into account when building this plan.
With this plan you should take the following steps:
STEPS FOR IMPLEMENTATION
Steps
Tips for Success
Prioritize
applications you
want to migrate
Deciding which applications you’re going to migrate is a
crucial step. Make sure to determine which applications
are mission-critical to your business before beginning your
migration to save time, money, and resources. You might
want to start by migrating less critical applications since the
initial migrations could be more complex and disruptive. You
can move to the more critical applications once you have the
migration process refined and documented.
Budget enough
time for the initial
migration
It’s essential to allow enough time to effectively initiate your
migration. In addition to the migration itself, you should also
take into account time to test and be prepared to wait for
problems to be resolved.
Create a repeatable
migration process
It’s important to simplify your migration as much as
possible to create consistent migration documentation.
Consistency will enable you to implement an easily
repeatable process that can lead to enhanced efficiency and
minimize the risk of data loss.
Decide what you
will do with retained
information
Before you finalize your migration plan, take some time to
think about what you’ll do with your retained information.
Will you include it in your migration? Or will you keep it on
your existing media?
When your plan is solid, you can finally begin to execute your migration away
from tape technology. Be sure to run your existing system and your new
solution in parallel throughout the process to ensure recovery from either
system in case problems should arise. Also, verify that your migration was
successful by testing your data backup, recovery, and DR again after the
process has been completed.
6
Share this document
800.899.IRON | ironmountain.com
STEP 4: MANAGEMENT
You’ve done it. You’ve migrated from your legacy tape system.
So what’s next? What’s the final piece to this puzzle? It’s time
to think about how you will manage your new infrastructure.
But what about the data that’s still retained on legacy
hardware and is managed by your legacy systems? How can
you maintain and operate your legacy processes while you’re
simultaneously looking to innovate with your new technology?
Your core challenge then becomes balancing your needs
of today while planning, testing, and implementing new
innovations for the future. In reality, these competing
initiatives can be difficult to balance and many
organizations spend far too much time and money
on maintaining older systems that are rarely, if ever,
accessed. However, when thinking about your legacy
hardware and software, you have two options to maintain
the information stored on this older media. You can
either manage your legacy media in-house or leverage
a third-party partner to do it for you. Regardless of the
method you choose, it’s important to carefully consider
both of these options.
IN-HOUSE VS. THIRD-PARTY MANAGEMENT OF LEGACY DATA
Manage Legacy Media In-house
Leverage a Third-Party Partner
Pros
Choosing to maintain your own legacy systems
gives you control of and instant visibility into your
infrastructure. It allows you to ensure secure and
proper management of your legacy backup systems.
Additionally, by keeping your system management
in-house, you can maintain consistent and compliant
processes throughout your infrastructure.
Outsourcing the management of your legacy media to a third-party
partner helps you balance all of your competing initiatives by enabling
you to accelerate innovation by focusing more time on your new
technology and less on traditional operational matters. It also allows
you to store and retrieve your information securely and removes your
burden of license, hardware, and software cost. Operational complexity
is also simplified by enabling you to either automate or outsource
traditional time consuming operational activities such as data backup,
recovery, and DR.
Cons
Maintaining legacy infrastructures can be extremely
complex and costly. Not only must you maintain
the expertise and knowledge of your retired
environments, but you also must pay a premium
for hardware and software maintenance on your
older systems to ensure access to support in case of a
recovery failure. Finally, your infrastructure will
also have to bear the burden of required power,
cooling, and data center space for these infrequently
accessed systems.
With this model, you give up your control and are reliant on a third
party for access to your data. Additionally, the challenges that are
created with outsourcing services can possibly put unnecessary strain
on your organization and ultimately your infrastructure.
800.899.IRON | ironmountain.com
Share this document
7
CONCLUSION
There’s no doubt data backup, recovery, and DR are three critical components of today’s IT infrastructure. These
technologies serve to protect your data center by delivering consistent and reliable functionality and support in case of
data loss, corruption, or disaster. As you continue to think about moving to a tapeless backup environment, it’s essential to
keep all of the decisions and considerations from this white paper in mind to enhance your data backup, recovery, and DR
processes now and for generations to come.
ABOUT IRON MOUNTAIN
Iron Mountain Incorporated (NYSE: IRM) provides information management services that help organizations lower the costs, risks, and inefficiencies of
managing their physical and digital data. Founded in 1951, Iron Mountain manages billions of information assets, including backup and archival data,
electronic records, document imaging, business records, secure shredding, and more, for organizations around the world. Visit the company website at
www.ironmountain.com for more information.
© 2015 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other
trademarks and registered trademarks are the property of their respective owners.
US-DM-EXT-WP-060614-001
800.899.IRON | ironmountain.com