SlideShare a Scribd company logo
1 of 16
David Strebel
Cloud Architect – CenturyLink Cloud
@vStrebel
colocationcloud managed
services
network
+ + +
Disaster Strikes
9
Disasters Happen
• 2010 truck crash brings down regional service
provider
• 2012 lightning takes down cloud provider
datacenter
• 1997 squirrels shutdown NASDAQ
10
On-Prem Cloud
Protected
VM
Protected
VM
Proxy
Recovery VM
SafeHaven: How it works . . .
SRN
CMS
On-Prem CenturyLink Cloud
Control Traffic Central Mgmt. Server
Local I/O Traffic Production VMVM
Replication Traffic SafeHaven Rep NodeSRN
Failover Traffic Recovery VMVM
CMS
Legend
Console
Local Disk
Remote
Replicas
Protected VMs
Physical
Servers
Rollback
Images
MIRROR MIRROR
LAN
SRN
DRaaS and Centurylink Cloud
DRaaS and Centurylink Cloud
DRaaS and Centurylink Cloud

More Related Content

More from David Strebel (6)

DevOps In Action
DevOps In ActionDevOps In Action
DevOps In Action
 
Docker Swarm Overview
Docker Swarm OverviewDocker Swarm Overview
Docker Swarm Overview
 
Cloud Foundry on Azure
Cloud Foundry on Azure Cloud Foundry on Azure
Cloud Foundry on Azure
 
Twin Cities Code Camp - DevOps In Action
Twin Cities Code Camp - DevOps In ActionTwin Cities Code Camp - DevOps In Action
Twin Cities Code Camp - DevOps In Action
 
Introduction To Microsoft Windows Containers
Introduction To Microsoft Windows ContainersIntroduction To Microsoft Windows Containers
Introduction To Microsoft Windows Containers
 
12 Factor Apps and Cloud Foundry - Twin Cities Code Camp
12 Factor Apps and Cloud Foundry - Twin Cities Code Camp12 Factor Apps and Cloud Foundry - Twin Cities Code Camp
12 Factor Apps and Cloud Foundry - Twin Cities Code Camp
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

DRaaS and Centurylink Cloud

Editor's Notes

  1. Introduction
  2. Give the history
  3. Ask question of who experienced a disaster before Give my story
  4. Time to update resume, but resume was on shared drive
  5. DR plans does anyone have one? Probe because everyone lies Bet they never tested
  6. Scare the shit out of them
  7. Capital cost vs opex cost
  8. Wont pay for disaster recovery till it happens to them and talk about sharknado
  9. Note that disasters do happen and even squirrels suck
  10. Even a star wars dude has a bad day. DR plan is the most important, we give you the hammer, but it’s what you do with that hammer
  11. Talk about how DR planning is the most critical step
  12. How DR to Cloud is fucking awsome
  13. At this point we have covered how SafeHaven benefits customers, now we will go into a deeper explanation of how the technology works. Before we delve into the weeds on the technology, this is good place to pause for questions and comments. Recall that we said each subscribing organization receives a SafeHaven cluster dedicated for them. This slide represents aSafeHaven Cluster with just two data centers: a private data center on-site at the customer premises anda recovery data center in the CenturyLink Cloud. The slide will build gradually to help us understand how SafeHaven works. First, we download a “SafeHaven Replication Node” or “SRN” into the production data center. This is a light-weight virtual appliance that is responsible for replicating data into the CenturyLink Cloud. It is normally provisioned with 2 vCPU, 4 GB RAM and 15 GB disk space. With these allocations, it normally protects about ten VMs. The SRN acts as a virtual storage appliance and presents iSCSI targets to the guest fabric. To get data onto the SRN, we then install a driver on the protected servers. The driver performs two functions. First, it copies the base images of the protected VMs onto the SRN. And while it is doing this it also writes all new updates onto the SRN as well. The SRN can keep a local copy of the protected VMs in the production data center for local protection, but it can also just buffer the changes there and asynchronously transmit the data into the CenturyLink Cloud. There, a sister SRN receives the data and stores persistent copies in the cloud. In addition to the persistent copies, the SRN also maintains a scrolling log of up to 2048 checkpoint for Continuous Data Protection. The purpose of these checkpoints is to ensure that you can roll back to previous points in time if your production VMs get corrupted or infected with a virus. Many disruption events will involve some data corruption. If SafeHaven merely faithfully copied this corrupted data into the cloud, it wouldn’t be doing you much good. You need the ability to rollback in time to the instant before the corruption event occurred. The interval between checkpoints can be set differently for each “protection group” (a concept that we will explain further in the next slide). The interval can be as little as 30 seconds or as much as several hours. While SafeHaven can keep up to 2048 checkpoints in its scrolling log, the actual number it will retain is determined by the amount of storage that you allocated to the checkpoint pool. The replica disk copies that SRN maintains in the cloud are presented to “proxy recovery servers”. For every protected VM you have in the production data centerSafeHaven maintains a corresponding “Proxy” in the cloud. But the proxy is kept powered off and you will not be charged for any memory or CPU unless a disruption event occurs that causes you to failover into the cloud. Even so, the disk images of the Proxies are kept up to date by the SRN so that they are current replicas of the VMs in your production data center. There are just a couple more components and then we are done on the architecture. There is a “SafeHaven Console” that you use to manage your disaster protection environment. This is a rich java application that is installed on one or more administrative clients that you use to manage your data center. Commands from this console are sent to a “Central Management Server” or “CMS”. The CMS plays a role analogous to that of Vmware’s vCenter Server. It is like a quarterback or a clearing house issuing commands from the management console to the SafeHaven Cluster. The CMS sends commands to the appropriate SRNs in the appropriate data centers, they execute the commands locally and then report back to the CMS. The CMS then reports back to the SafeHaven management console. This is how the SafeHaven system works. The SRN is the workhorse responsible for replicating data to the cloud; the mirroring driver gets data onto the SRN; the CMS is like a quarterback in charge of the entire Cluster; and the whold system is managed through the SafeHaven console.
  14. This shit is awesome. Talk about financeial benefits are awesome and flexibility is awesome!
  15. Demo that DR, but make sure the wireless you are on doesn't block outgoing ports.
  16. Finish with jokes and Charisma