Your SlideShare is downloading. ×
Performing Sandboxed Testing with PlateSpin Forge
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Performing Sandboxed Testing with PlateSpin Forge

1,461
views

Published on

Learn how to create a safe, virtual sandbox and to perform all of your disaster recovery validation testing with PlateSpin Forge.

Learn how to create a safe, virtual sandbox and to perform all of your disaster recovery validation testing with PlateSpin Forge.


0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,461
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
85
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Performing Sandboxed Testing with PlateSpin Forge ® Scott Nocent Lubomyr Salamakha scott.nocent@novell.com lubomyr.salamkha@novell.com
  • 2. Technology Overview
  • 3. What is a Server Workload? Server Data Applications Operating System A workload is the operating system, applications and data that reside on a physical server or virtual host. 3 © Novell, Inc. All rights reserved.
  • 4. Disaster Recovery
  • 5. The Need for Protection 76% of enterprises have declared a disaster or experienced a major business disruption* Power Failure 42% - Natural Disaster 33% - IT Hardware Failure 31% 87% Disaster recovery capabilities was critical** Of enterprises have indicated that improving Cost of Downtime 56% - Improving Mission Critical Availability 52% - Requirement to Stay Online 24/7 48% - Increased Risk 44% *April 3, 2008 – Building The Business Case for Disaster Recovery Spending – Forrester **June 5, 2008 – The Forrester Wave: Disaster Recovery Services Providers, Q2 2008 – Forrester 5 © Novell, Inc. All rights reserved.
  • 6. Traditional Approaches
  • 7. How to Be Protected DR by Duplication DR by Back-up 7 © Novell, Inc. All rights reserved.
  • 8. DR by Duplication • Focus is on protecting application – Local cluster – Duplicate hot site • High performance, but at what price? – Near zero RTO, RPO • High cost – Duplicate infrastructure – Cost x2 8 © Novell, Inc. All rights reserved.
  • 9. DR by Back-up • Focus is on protecting data – Tape back-up – Imaging • Poor performance – Slow RTO, RPO (days) • Cost effective, but at what price? – How do we get the data back in to a useable state? – How long to rebuild the server? 9 © Novell, Inc. All rights reserved.
  • 10. Cost/Performance Creates a Gap DR by DR by Duplication Back-up Very High Cost Low Cost Duplicate Infrastructure Tape Back-up or Imaging Near-zero Recovery is Crucial Recovery in Days is Tolerable Server/Application Protection Data Protection Tier 1 Tier 2 Tier 4 Tier 3 Tier 5 10 © Novell, Inc. All rights reserved.
  • 11. The Solution
  • 12. Consolidated Recovery Leveraging Virtual Infrastructure for Protection of Physical servers Solution – Inventory and monitor to plan recovery environment – Live replication of workload into an off-line virtual machine – One click test restore and failover Benefits – Drastically reduce TCO and Virtual RTO while achieving whole Recovery Hosts workload protection – Improving RPO through incremental synchronization – Simplify testing with bootable backups Physical Production Servers 12 © Novell, Inc. All rights reserved.
  • 13. PlateSpin Solves 3 Challenges ® Cost Performance Protects more Reduce recovery server for less time from days to minutes Consolidated Disaster Recovery Risk Test recovery plans to ensure you're prepared 13 © Novell, Inc. All rights reserved.
  • 14. Protection Candidates Protection for middle tier servers 99.99% or better (less than 1 hour per year) cost 97%-99.99% (between 1 hour and 11 days per year) 97% or worse (11 days per year) 14 © Novell, Inc. All rights reserved.
  • 15. Workload Protection with PlateSpin Forge ®
  • 16. PlateSpin Forge Workload Protection: ® A 4-Step Process Add Workload Configure Protection Prepare Replication Run Replication 16 © Novell, Inc. All rights reserved.
  • 17. Step 1: Add Workload
  • 18. Step 1: Add Workload Adding a Workload: Forge Server • User connects to PlateSpin Forge ® • User executes “Add Workload” command H T • Forge connects to the primary T WMI/Remote Registry workload using WMI and P remote registry queries and S obtains inventory information • The primary workload Add Workload information is compiled by Forge and stored in its SQL database Primary Forge User Workload 18 © Novell, Inc. All rights reserved.
  • 19. Step 1: Add Workload • Click on ‘Add Workload’ button from Forge Dashboard or Workload Page • Enter Local Admin or Domain Admin credentials and click ‘Submit’ • WMI must be enabled and running on the source 19 © Novell, Inc. All rights reserved.
  • 20. Step 1: Add Workload • PlateSpin Forge will validate the provided ® credentials against the Primary Workload 20 © Novell, Inc. All rights reserved.
  • 21. Step 1: Add Workload • The Add Workload screen will redirect you to the main Workloads Page and the ‘Adding Workload’ status will be displayed • Clicking on the workload name will display a progress bar of the job 21 © Novell, Inc. All rights reserved.
  • 22. Step 2: Configure Protection
  • 23. Step 2: Configure Protection Configure Protection: • User executes “Configure Protection” command • Workload Protection Details page appear and filled by the user • Clicking on Save will assign the protection settings to the primary workload object in the Forge database 23 © Novell, Inc. All rights reserved.
  • 24. Step 2: Configure Protection Tier Settings • In this section, configure the workload protection schedule for incremental replications and define the workload failure detection interval settings • Either select from existing tiers (Hourly, Nightly, or Weekly), user-created Tiers or create a one-time tier by selecting Custom • Tiers can be changed at any time 24 © Novell, Inc. All rights reserved.
  • 25. Step 2: Configure Protection Replication Settings • In this section, select the transfer method, the network to use for replication, and which volumes to copy 25 © Novell, Inc. All rights reserved.
  • 26. Step 2: Configure Protection Replication Settings – Transfer Methods • PlateSpin Forge provides three live transfer ® methods for replicating workloads: – File based – Snapshot based (VSS) – Block based 26 © Novell, Inc. All rights reserved.
  • 27. Step 2: Configure Protection Source Credentials • This section prompts for administrative credentials for the Primary Workload 27 © Novell, Inc. All rights reserved.
  • 28. Step 2: Configure Protection Replication Settings – Replication Network • In this section, configure the network settings which will be used during replication 28 © Novell, Inc. All rights reserved.
  • 29. Step 2: Configure Protection Replication Settings – Protected Volumes • In this section, select which volumes on the Primary Workload should be protected • System Volume cannot be unchecked • The Non-Volume Partition section displays all non-volume partitions detected on the workload. For example, vendor partitions 29 © Novell, Inc. All rights reserved.
  • 30. Step 2: Configure Protection Replication Settings – Services to Stop During Replication • This section allows one to define which services to stop on the Primary Workload during the replication 30 © Novell, Inc. All rights reserved.
  • 31. Step 2: Configure Protection Failover Settings • In the Failover Settings section users define the configuration of the Recovery Workload during a Failover 31 © Novell, Inc. All rights reserved.
  • 32. Step 2: Configure Protection Failover Settings – Target Services • In this section, specify the virtual network the Recovery Workload will use during the Prepare for Failover stage 32 © Novell, Inc. All rights reserved.
  • 33. Step 2: Configure Protection Test Failover Settings • Test Failover Settings define which settings the recovery workload will use during a ‘Test Failover’ job 33 © Novell, Inc. All rights reserved.
  • 34. Step 2: Configure Protection • Three commands are available at the bottom of the Workload Configuration page • Once the workload protection settings have been saved, an overview screen will be displayed with three actionable workload commands • To change the protection settings scroll up and click on Edit 34 © Novell, Inc. All rights reserved.
  • 35. Step 3: Prepare Replication
  • 36. Step 3: Prepare Replication Prepare Replication: Forge Server • User executes “Prepare Replication” command • A PlateSpin Controller is® H deployed to the T Primary Workload T P • PlateSpin Replication S software is deployed to the Primary Workload Prepare Replication • The Recovery Workload shell is built and stored on the PlateSpin Forge Appliance ® Primary Forge User Workload 36 © Novell, Inc. All rights reserved.
  • 37. Step 3: Prepare Replication • To start the preparation, click on Prepare Replication and Execute in the Command Confirmation screen Prepare Replication • The WUI will switch to the Workloads Page displaying “Preparing Replication” under the Replication Status column 37 © Novell, Inc. All rights reserved.
  • 38. Step 4: Run Replication
  • 39. Step 4: Run Replication Forge Server Run Replication: • User executes “Run Replication” command H • The Recovery Workload boots T and a local controller is created T P S • Data replication between the Primary Workload and the Recovery Workload is initiated. Run Replication Both controllers report the replication metrics (transfer speed, total files, etc.) to the Primary Forge Management VM Forge User Workload 39 © Novell, Inc. All rights reserved.
  • 40. Step 4: Run Replication • To start the replication, click on Run Replication and Execute in the Command Confirmation screen Upon executing the command the WUI will switch to the main Workloads page displaying “Running First Replication” under Replication Status column 40 © Novell, Inc. All rights reserved.
  • 41. Sandboxed Testing – Test Failover
  • 42. Test Failover Forge Server Test Failover Process: • User executes “Test Failover” command • PlateSpin Forge boots and ® configures the Recovery workload H and connects it to the internal T test network T P • User connects to the workload S using VMware Virtual Infrastructure client and validates Test Failover the workload functionality • User marks the test result and shuts down the Recovery Workload Primary Forge User • PlateSpin Forge restores the Workload recovery workload to its last “known good state” 42 © Novell, Inc. All rights reserved.
  • 43. Test Failover Test Failover • Clicking on the workload name will display the job progress indicator • Email is sent when the workloadis ready for inspection 43 © Novell, Inc. All rights reserved.
  • 44. Test Failover 44 © Novell, Inc. All rights reserved.
  • 45. Test Failover – Reporting • Current Protection Status report provides a comprehensive view of workloads’ failover test 45 © Novell, Inc. All rights reserved.
  • 46. Demo
  • 47. Where Forge Fits
  • 48. How Novell Delivers Intelligent ® Workload Management Build Secure Manage Measure SUSE Linux ® Novell Identity ® PlateSpin Migrate ® Novell Business Service ® Enterprise Server Manager Manager PlateSpin Orchestrate ® SUSE Studio Novell Access ® Novell Business Service ® Manager ZENworks ® Level Manager ™ SUSE Linux Configuration Enterprise JeOS Novell Roles Based ® Management Novell Business ® Provisioning Module Experience Manager ™ ZENworks ® PlateSpin Recon ® Configuration Novell Access ® Novell myCMDB ® ™ Management Governance Suite PlateSpin Protect ® Novell Sentinel ® ™ SUSE Appliance Novell Privileged PlateSpin Forge ® Toolkit User Manager Novell Sentinel Log ® ™ PlateSpin “Atlantic” ® Manager Novell Workshop ® Novell SecureLogin ® ® PlateSpin “BlueStar” ® Novell Compliance Novell Cloud ® Automation Security Service ZENworks “Workbench” ® * Available by end of 2010 48 © Novell, Inc. All rights reserved.
  • 49. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.