SlideShare a Scribd company logo
Top Ten Private Cloud Risks 
Potential downtime and data loss causes
Introduction: Risk sources 
Copyright © 2014 Symantec Corporation 
2 
Enterprises routinely build Disaster Recovery and High Availability measures into their private cloud environments. So why do downtime and data loss risks still exist? 
The reality is that even the most robust Disaster Recovery and High Availability plans are only as good as your ability to monitor, test and maintain the environment against the plans. IT environments are dynamic in nature. Over time, changes made to the protected environment may not be reflected adequately in the recovery environment. Since manually testing for all the risks in an ongoing fashion is virtually impossible, such discrepancies can accumulate over time leading to configuration drift and associated increased risk of downtime and data loss. 
The risks outlined in this document are drawn from a database containing more than 5,000 known sources of risk gathered from a wide range of enterprise customers.
Risk framework 
Downtime and data loss risks can be found across three layers of a private cloud environment: 
Copyright © 2014 Symantec Corporation 
3 
The Virtual Infrastructure Layer 
•Storage devices 
•Networking 
•Virtualization servers 
•Virtualization management 
The Virtual Machine Layer 
•Storage allocation 
•Server image 
•High availability provisioning 
The Disaster Recovery Layer 
•Replication settings 
•Storage mapping 
•Recovery management
1. Infrastructure layer | Storage 
The typical ESX cluster spans several nodes. The problem shown in this example is that one of the nodes has no SAN path redundancy like we would expect from all nodes serving the cluster. What it means is that all virtual machines currently running on this particular node have a single point of failure and may suffer reduced performance. 
This could also cause certain virtual machines to exhibit intermittent performance degradation as they move to the under-provisioned servers. 
Copyright © 2014 Symantec Corporation 
4 
The Virtual Infrastructure Layer 
•Storage devices 
•Networking 
•Virtualization servers 
•Virtualization management 
Additional risks include: 
•LUN re-signature 
•Unmapped RDM 
•Different multi-path configurations 
Production
2. Infrastructure layer | Network 
What we see here is that one of the cluster nodes has only a single network connection to the shared or public network. The result is a single-point-of- failure and most likely poor performance for all the machines that are currently running on top of that particular server. Like in the previous example, the fact that virtual machines continually change locations makes it very difficult to pinpoint such performance fluctuation. 
Copyright © 2014 Symantec Corporation 
5 
The Virtual Infrastructure Layer 
•Storage devices 
•Networking 
•Virtualization servers 
•Virtualization management 
Additional risks include: 
•DNS discrepancies 
•Incorrect routing configurations 
•Time out of sync between nodes 
•Different default gateway 
•Inconsistent ESX network options 
Production
3. Infrastructure layer | Servers 
Certain discrepancies in the configuration of virtualized infrastructure cluster nodes present risks to the data residing on the virtual machines running on the cluster. 
For example, when running multiple ESX versions, some nodes might be using advanced VMFS options unsupported by earlier versions, leading to potential data loss or extended downtime. 
Copyright © 2014 Symantec Corporation 
6 
The Virtual Infrastructure Layer 
•Storage devices 
•Networking 
•Virtualization servers 
•Virtualization management 
Additional risks include: 
•Hardware discrepancies 
•Different firmware versions 
•Inconsistent configuration options 
Production
4. Infrastructure layer | Virtualization management 
A recommended best practice is to run the virtualization management application (e.g. vCenter) inside a virtual machine. 
A common mistake is configuring this virtual machine with fully automated Distributed Resource Scheduling (DRS), which means that we can’t tell in advance on which particular physical node vCenter will run at any given time. 
If vCenter stops functioning or exhibits any performance issues, we would not know where to go in order to restart it. In a very large virtualized environment, it can take an unpleasantly long time to figure out how to revive the application. 
Copyright © 2014 Symantec Corporation 
7 
The Virtual Infrastructure Layer 
•Storage devices 
•Networking 
•Virtualization servers 
•Virtualization management 
Additional risks include: 
•Cluster nodes missing NFS datastore access 
•Virtual datacenters misaligned with physical server/ storage licenses 
•Missing/ expired/ incompatible licenses 
Production
5. VM layer | Storage allocation 
To prevent slowing down the entire database, vendors recommend that temporary database files use the highest performance storage. However, the abstraction layer added by virtualization makes it difficult for the database administrator to know what physical storage tier is allocated to the database. 
In this example we see a virtual machine running an Oracle database on an ESX cluster with multi- tier RAID storage comprising high performance RAID 1 and lower performance RAID 5 datastores. 
While the intention was for the low-cost, low- performance RAID 5 to be used for archiving and staging, the DBA has no clear way to know which storage tier supports each VM file system. 
Copyright © 2014 Symantec Corporation 
8 
So, the temporary files of a particular database may end up on the lower performance datastore, leading to significant performance degradation. 
The Virtual Machine Layer 
•Storage allocation 
•Server image 
•High availability provisioning 
Additional risks include: 
•Mixed RDM and non-RDM drivers 
•VM data configured with different persistence nodes 
•Mapping remote storage to VMs 
•RDS cluster nodes with very different performance levels 
Production 
Poor performance
6. VM layer | Server image 
Over time, as the virtual environment grows larger and larger, it becomes more of a challenge to make sure that all of the virtual machines running the same application are consistently provisioned based on the same base image. 
For example, a new virtual machine may be provisioned with a different version of the operating system, which may result in security risks, performance issues, and other unexpected behavior. 
Copyright © 2014 Symantec Corporation 
9 
The Virtual Machine Layer 
•Storage allocation 
•Server image 
•High availability provisioning 
Additional risks include: 
•Inconsistent patches on virtual machines 
•Selection of different startup options 
•Application of different locale configs 
•Virtual machines not synced on time 
Production
7. VM layer | High availability 
To achieve higher availability and performance than offered by ESX HA and DRS, it is common to use more than one virtual machines located on separate physical nodes. 
As a result of routine maintenance or unplanned outage, one of the virtual machines might fail over or relocate to a different node, which could end up being the same one running the second virtual machine for our application. With the two virtual application servers running on a single physical node, we now have a single point of failure. 
Copyright © 2014 Symantec Corporation 
10 
The Virtual Machine Layer 
•Storage allocation 
•Server image 
•High availability provisioning 
Additional risks include: 
•Virtual machines not configured with HA 
•VM team definitions not aligned with supported business applications 
•VM config allows failover to ESX nodes lacking access to required resources 
Production
8. Disaster recovery layer | Replication 
Incorrect replication settings are a common occurrence. In a simple case, a data store may not be fully replicated. Obviously, all the virtual machines that are dependent on that data store will not be able to recover. 
A more complex scenario could be one in which everything is replicated, but not using the same storage consistency group for all the devices on the data store. While the copy is now complete, it may very likely be corrupted, a problem which is more difficult to detect. 
Copyright © 2014 Symantec Corporation 
11 
The Disaster Recovery Layer 
•Replication settings 
•Storage mapping 
•Recovery management 
Additional risks include: 
•Replication failure 
•Data store using more than one array 
•Misaligned VM storage
9. Disaster recovery layer | Storage mapping 
Even when data is correctly replicated to the disaster recovery environment, it is still not guaranteed to be accessible in case a failover is attempted. 
Incorrect replica mapping is a common issue. For example, one of the designated disaster recovery hosts may not have a path configured correctly to one of the storage replicas. In this case, all the virtual machines that depend on that particular data store will not function properly in a failover attempt. 
Copyright © 2014 Symantec Corporation 
12 
The Disaster Recovery Layer 
•Replication settings 
•Storage mapping 
•Recovery management 
Additional risks include: 
•Locked devices 
•Mismatched devices 
•SRA misconfiguration
10. Disaster recovery layer | Recovery management 
Automated recovery management tools (e.g. VMWare’s SRM) help streamline the disaster recovery process and are definitely recommended for any private cloud environment. 
With that said, it is important to note that such tools are also vulnerable to configuration changes. Keeping the configuration of the recovery manager aligned with the production configuration is an ongoing challenge. 
For example, we may have created a Data Store group and a Protection group that contains the VMs on that particular Data Store group. 
Over time, however, new VMs have been added to the Protection Group. 
Copyright © 2014 Symantec Corporation 
13 
Unless we manually refresh the recovery manager configuration, it will not be aware of these additions. In case of a failover, we may experience a partial or failed recovery. 
The Disaster Recovery Layer 
•Replication settings 
•Storage mapping 
•Recovery management 
Additional risks include: 
•Misaligned recovery plans 
•Missing components 
•Unprotected non-virtualized components (e.g. DNS, NAS)
Symantec™ Disaster Recovery Advisor (DRA) 
Helps you “stay on top of” your environment 
Copyright © 2014 Symantec Corporation 
14 
Automated discovery of HA/DR risks 
• Scans the entire infrastructure to find risks – Over 5000 checks 
• Scans take place on a scheduled basis defined by the user 
Actionable reports/tickets 
•Risks (what and where) are reported with steps to fix the problem 
•Automatic report scheduling defined by the user 
Unobtrusive scanning and analysis 
•Agentless technology collects data unobtrusively 
•Collects read-only configuration information from target systems
Find out how Symantec™ Disaster Recovery Advisor can help you reduce risk 
•Test your environment against a database of 5,000+ vulnerabilities 
•Discover what risks lurk undetected and what to do about them 
•DRA reports include: 
–Detailed assessment of risks 
–Resolution guidelines 
–Opportunities for optimization 
Copyright © 2014 Symantec Corporation 
15 
Learn more: http://www.symantec.com/disaster-recovery-advisor
Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com 
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

More Related Content

What's hot

Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Paula Koziol
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Rishikese MR
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
Aidan Finn
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
Symantec
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
VMworld
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About Virtualization
EMC
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
 
VMware Virtualization 27 09 07
VMware Virtualization  27 09 07VMware Virtualization  27 09 07
VMware Virtualization 27 09 07
Oliver Barreto Rodríguez
 
E tech vmware presentation
E tech vmware presentationE tech vmware presentation
E tech vmware presentationjpenney
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
Chetna Purohit
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part TwoVMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld
 
Virtualization
Virtualization Virtualization
Virtualization
Ydel Capales
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
AJIT NEGI
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
Datapath Consulting
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
Shahbaz Sidhu
 
ESX Server from VMware
ESX Server from VMwareESX Server from VMware
ESX Server from VMware
Ahmet Bulut
 

What's hot (20)

Webinar presentation
Webinar presentationWebinar presentation
Webinar presentation
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
VMworld 2013: Operating and Architecting a vSphere Metro Storage Cluster base...
 
All About Virtualization
All About VirtualizationAll About Virtualization
All About Virtualization
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
 
VMware Virtualization 27 09 07
VMware Virtualization  27 09 07VMware Virtualization  27 09 07
VMware Virtualization 27 09 07
 
E tech vmware presentation
E tech vmware presentationE tech vmware presentation
E tech vmware presentation
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part TwoVMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
VMworld 2013: Implementing a Holistic BC/DR Strategy with VMware - Part Two
 
Virtualization
Virtualization Virtualization
Virtualization
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
ESX Server from VMware
ESX Server from VMwareESX Server from VMware
ESX Server from VMware
 

Similar to Top Ten Private Cloud Risks

Build your private cloud with paa s using linuxz cover story enterprise tech ...
Build your private cloud with paa s using linuxz cover story enterprise tech ...Build your private cloud with paa s using linuxz cover story enterprise tech ...
Build your private cloud with paa s using linuxz cover story enterprise tech ...
Elena Nanos
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
Bob Roudebush
 
VMworld 2013: Virtualizing Highly Available SQL Servers
VMworld 2013: Virtualizing Highly Available SQL Servers VMworld 2013: Virtualizing Highly Available SQL Servers
VMworld 2013: Virtualizing Highly Available SQL Servers
VMworld
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
Michael Hudak
 
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
Best Practices of HA and Replication of PostgreSQL in Virtualized EnvironmentsBest Practices of HA and Replication of PostgreSQL in Virtualized Environments
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
Jignesh Shah
 
Virtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric VanderburgVirtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric Vanderburg
Eric Vanderburg
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011
solarisyourep
 
Virtualisation.pptx
Virtualisation.pptxVirtualisation.pptx
Virtualisation.pptx
RavinderSingh704945
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld
 
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differencesHyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
SolarWinds
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome ways
Tanawit Chansuchai
 
Solution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with VeeamSolution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with Veeam
Atlantix Global Systems LLC
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Tokyo azure meetup #12 service fabric internals
Tokyo azure meetup #12   service fabric internalsTokyo azure meetup #12   service fabric internals
Tokyo azure meetup #12 service fabric internals
Tokyo Azure Meetup
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs
Veeam Software
 
Accelerating and Protecting your Virtualize Environment
Accelerating and Protecting your Virtualize EnvironmentAccelerating and Protecting your Virtualize Environment
Accelerating and Protecting your Virtualize Environment
CTI Group
 
Hyper-V’s Virtualization Enhancements - EPC Group
Hyper-V’s Virtualization Enhancements - EPC GroupHyper-V’s Virtualization Enhancements - EPC Group
Hyper-V’s Virtualization Enhancements - EPC Group
EPC Group
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Andrew Miller
 

Similar to Top Ten Private Cloud Risks (20)

Build your private cloud with paa s using linuxz cover story enterprise tech ...
Build your private cloud with paa s using linuxz cover story enterprise tech ...Build your private cloud with paa s using linuxz cover story enterprise tech ...
Build your private cloud with paa s using linuxz cover story enterprise tech ...
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
VMworld 2013: Virtualizing Highly Available SQL Servers
VMworld 2013: Virtualizing Highly Available SQL Servers VMworld 2013: Virtualizing Highly Available SQL Servers
VMworld 2013: Virtualizing Highly Available SQL Servers
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
 
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
Best Practices of HA and Replication of PostgreSQL in Virtualized EnvironmentsBest Practices of HA and Replication of PostgreSQL in Virtualized Environments
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
 
Virtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric VanderburgVirtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric Vanderburg
 
David_Bermingham
David_BerminghamDavid_Bermingham
David_Bermingham
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011
 
Virtualisation.pptx
Virtualisation.pptxVirtualisation.pptx
Virtualisation.pptx
 
Virtulization
VirtulizationVirtulization
Virtulization
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
 
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differencesHyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome ways
 
Solution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with VeeamSolution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with Veeam
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Tokyo azure meetup #12 service fabric internals
Tokyo azure meetup #12   service fabric internalsTokyo azure meetup #12   service fabric internals
Tokyo azure meetup #12 service fabric internals
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs
 
Accelerating and Protecting your Virtualize Environment
Accelerating and Protecting your Virtualize EnvironmentAccelerating and Protecting your Virtualize Environment
Accelerating and Protecting your Virtualize Environment
 
Hyper-V’s Virtualization Enhancements - EPC Group
Hyper-V’s Virtualization Enhancements - EPC GroupHyper-V’s Virtualization Enhancements - EPC Group
Hyper-V’s Virtualization Enhancements - EPC Group
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Top Ten Private Cloud Risks

  • 1. Top Ten Private Cloud Risks Potential downtime and data loss causes
  • 2. Introduction: Risk sources Copyright © 2014 Symantec Corporation 2 Enterprises routinely build Disaster Recovery and High Availability measures into their private cloud environments. So why do downtime and data loss risks still exist? The reality is that even the most robust Disaster Recovery and High Availability plans are only as good as your ability to monitor, test and maintain the environment against the plans. IT environments are dynamic in nature. Over time, changes made to the protected environment may not be reflected adequately in the recovery environment. Since manually testing for all the risks in an ongoing fashion is virtually impossible, such discrepancies can accumulate over time leading to configuration drift and associated increased risk of downtime and data loss. The risks outlined in this document are drawn from a database containing more than 5,000 known sources of risk gathered from a wide range of enterprise customers.
  • 3. Risk framework Downtime and data loss risks can be found across three layers of a private cloud environment: Copyright © 2014 Symantec Corporation 3 The Virtual Infrastructure Layer •Storage devices •Networking •Virtualization servers •Virtualization management The Virtual Machine Layer •Storage allocation •Server image •High availability provisioning The Disaster Recovery Layer •Replication settings •Storage mapping •Recovery management
  • 4. 1. Infrastructure layer | Storage The typical ESX cluster spans several nodes. The problem shown in this example is that one of the nodes has no SAN path redundancy like we would expect from all nodes serving the cluster. What it means is that all virtual machines currently running on this particular node have a single point of failure and may suffer reduced performance. This could also cause certain virtual machines to exhibit intermittent performance degradation as they move to the under-provisioned servers. Copyright © 2014 Symantec Corporation 4 The Virtual Infrastructure Layer •Storage devices •Networking •Virtualization servers •Virtualization management Additional risks include: •LUN re-signature •Unmapped RDM •Different multi-path configurations Production
  • 5. 2. Infrastructure layer | Network What we see here is that one of the cluster nodes has only a single network connection to the shared or public network. The result is a single-point-of- failure and most likely poor performance for all the machines that are currently running on top of that particular server. Like in the previous example, the fact that virtual machines continually change locations makes it very difficult to pinpoint such performance fluctuation. Copyright © 2014 Symantec Corporation 5 The Virtual Infrastructure Layer •Storage devices •Networking •Virtualization servers •Virtualization management Additional risks include: •DNS discrepancies •Incorrect routing configurations •Time out of sync between nodes •Different default gateway •Inconsistent ESX network options Production
  • 6. 3. Infrastructure layer | Servers Certain discrepancies in the configuration of virtualized infrastructure cluster nodes present risks to the data residing on the virtual machines running on the cluster. For example, when running multiple ESX versions, some nodes might be using advanced VMFS options unsupported by earlier versions, leading to potential data loss or extended downtime. Copyright © 2014 Symantec Corporation 6 The Virtual Infrastructure Layer •Storage devices •Networking •Virtualization servers •Virtualization management Additional risks include: •Hardware discrepancies •Different firmware versions •Inconsistent configuration options Production
  • 7. 4. Infrastructure layer | Virtualization management A recommended best practice is to run the virtualization management application (e.g. vCenter) inside a virtual machine. A common mistake is configuring this virtual machine with fully automated Distributed Resource Scheduling (DRS), which means that we can’t tell in advance on which particular physical node vCenter will run at any given time. If vCenter stops functioning or exhibits any performance issues, we would not know where to go in order to restart it. In a very large virtualized environment, it can take an unpleasantly long time to figure out how to revive the application. Copyright © 2014 Symantec Corporation 7 The Virtual Infrastructure Layer •Storage devices •Networking •Virtualization servers •Virtualization management Additional risks include: •Cluster nodes missing NFS datastore access •Virtual datacenters misaligned with physical server/ storage licenses •Missing/ expired/ incompatible licenses Production
  • 8. 5. VM layer | Storage allocation To prevent slowing down the entire database, vendors recommend that temporary database files use the highest performance storage. However, the abstraction layer added by virtualization makes it difficult for the database administrator to know what physical storage tier is allocated to the database. In this example we see a virtual machine running an Oracle database on an ESX cluster with multi- tier RAID storage comprising high performance RAID 1 and lower performance RAID 5 datastores. While the intention was for the low-cost, low- performance RAID 5 to be used for archiving and staging, the DBA has no clear way to know which storage tier supports each VM file system. Copyright © 2014 Symantec Corporation 8 So, the temporary files of a particular database may end up on the lower performance datastore, leading to significant performance degradation. The Virtual Machine Layer •Storage allocation •Server image •High availability provisioning Additional risks include: •Mixed RDM and non-RDM drivers •VM data configured with different persistence nodes •Mapping remote storage to VMs •RDS cluster nodes with very different performance levels Production Poor performance
  • 9. 6. VM layer | Server image Over time, as the virtual environment grows larger and larger, it becomes more of a challenge to make sure that all of the virtual machines running the same application are consistently provisioned based on the same base image. For example, a new virtual machine may be provisioned with a different version of the operating system, which may result in security risks, performance issues, and other unexpected behavior. Copyright © 2014 Symantec Corporation 9 The Virtual Machine Layer •Storage allocation •Server image •High availability provisioning Additional risks include: •Inconsistent patches on virtual machines •Selection of different startup options •Application of different locale configs •Virtual machines not synced on time Production
  • 10. 7. VM layer | High availability To achieve higher availability and performance than offered by ESX HA and DRS, it is common to use more than one virtual machines located on separate physical nodes. As a result of routine maintenance or unplanned outage, one of the virtual machines might fail over or relocate to a different node, which could end up being the same one running the second virtual machine for our application. With the two virtual application servers running on a single physical node, we now have a single point of failure. Copyright © 2014 Symantec Corporation 10 The Virtual Machine Layer •Storage allocation •Server image •High availability provisioning Additional risks include: •Virtual machines not configured with HA •VM team definitions not aligned with supported business applications •VM config allows failover to ESX nodes lacking access to required resources Production
  • 11. 8. Disaster recovery layer | Replication Incorrect replication settings are a common occurrence. In a simple case, a data store may not be fully replicated. Obviously, all the virtual machines that are dependent on that data store will not be able to recover. A more complex scenario could be one in which everything is replicated, but not using the same storage consistency group for all the devices on the data store. While the copy is now complete, it may very likely be corrupted, a problem which is more difficult to detect. Copyright © 2014 Symantec Corporation 11 The Disaster Recovery Layer •Replication settings •Storage mapping •Recovery management Additional risks include: •Replication failure •Data store using more than one array •Misaligned VM storage
  • 12. 9. Disaster recovery layer | Storage mapping Even when data is correctly replicated to the disaster recovery environment, it is still not guaranteed to be accessible in case a failover is attempted. Incorrect replica mapping is a common issue. For example, one of the designated disaster recovery hosts may not have a path configured correctly to one of the storage replicas. In this case, all the virtual machines that depend on that particular data store will not function properly in a failover attempt. Copyright © 2014 Symantec Corporation 12 The Disaster Recovery Layer •Replication settings •Storage mapping •Recovery management Additional risks include: •Locked devices •Mismatched devices •SRA misconfiguration
  • 13. 10. Disaster recovery layer | Recovery management Automated recovery management tools (e.g. VMWare’s SRM) help streamline the disaster recovery process and are definitely recommended for any private cloud environment. With that said, it is important to note that such tools are also vulnerable to configuration changes. Keeping the configuration of the recovery manager aligned with the production configuration is an ongoing challenge. For example, we may have created a Data Store group and a Protection group that contains the VMs on that particular Data Store group. Over time, however, new VMs have been added to the Protection Group. Copyright © 2014 Symantec Corporation 13 Unless we manually refresh the recovery manager configuration, it will not be aware of these additions. In case of a failover, we may experience a partial or failed recovery. The Disaster Recovery Layer •Replication settings •Storage mapping •Recovery management Additional risks include: •Misaligned recovery plans •Missing components •Unprotected non-virtualized components (e.g. DNS, NAS)
  • 14. Symantec™ Disaster Recovery Advisor (DRA) Helps you “stay on top of” your environment Copyright © 2014 Symantec Corporation 14 Automated discovery of HA/DR risks • Scans the entire infrastructure to find risks – Over 5000 checks • Scans take place on a scheduled basis defined by the user Actionable reports/tickets •Risks (what and where) are reported with steps to fix the problem •Automatic report scheduling defined by the user Unobtrusive scanning and analysis •Agentless technology collects data unobtrusively •Collects read-only configuration information from target systems
  • 15. Find out how Symantec™ Disaster Recovery Advisor can help you reduce risk •Test your environment against a database of 5,000+ vulnerabilities •Discover what risks lurk undetected and what to do about them •DRA reports include: –Detailed assessment of risks –Resolution guidelines –Opportunities for optimization Copyright © 2014 Symantec Corporation 15 Learn more: http://www.symantec.com/disaster-recovery-advisor
  • 16. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.