SlideShare a Scribd company logo
Disaster Recovery
Business & Technology
        Varrow Madness
        March 15, 2012

          Andrew Miller
       Technical Consultant
t: @andriven w:www.thinkmeta.net
One Big Reason to Do This



Expectations for Disaster
       Recovery
                            ≠       IT Capabilities
                                for Disaster Recovery
What is a Disaster?
• Disaster: An event that affects a service or system such
  that significant effort is required to restore the original
  performance level.
               » IT Service Management Forum


                                   But what does that look like IN
                                    OUR ENVIRONMENT?
                                   What disaster and recovery
                                    scenarios should we plan for?
                                   Where do we begin?
                                   How do we do it?
Example of a Disaster
Disaster Recovery vs. Operational Recovery
• Disaster Recovery
   – To cope with & recover from an IT crisis that moves work to an
     alternative system in a non-routine way.
   – A real “disaster” is large in scope and impact
   – DR typically implies failure of the primary data center and recovery to an
     alternate site
• Operational Recovery
   – Addresses more “routine” types of failures (server, network, storage,
     etc.)
   – Events are smaller in scope and impact than a full “disaster”
   – Typically implies recovering to alternate equipment within the primary
     data center
• Business expectations for recovery timeframe is typically
  shorter for “operational recovery” issues than a true “disaster”
• Each should have its own clearly defined objectives
Risks, Threats and Vulnerabilities

Risk is a function of the likelihood of a given threat
acting upon a particular potential vulnerability,
and the resulting impact of that adverse event on
the organization.
Some threats that can cause Disasters…
• Human Error
• Localized IT systems /
  network failure
• Extended power outage
• Telecommunications outage
• Storm / Weather damage
• Earthquake / Volcano
• Fire in the facility
• Facility flooding
• Local evacuation
• Cyber attack
• Sabotage
(Varrow) Disaster Recovery Approach
• Interviews with key personnel to understand Business Process priorities
  and establish Business Impact Analysis (BIA).
• Review existing IT production infrastructure, including applications,
  servers, storage, network, and external connectivity. Identify Risks and
  Gaps.
• Establish Disaster Impact Scenarios and Disaster Recovery strategies to
  meet requirements.
• Recommend Roadmap for establishing recovery capabilities and
  documenting plans.
• Implement required recovery capabilities.
• Develop framework and content for IT DR Plan.
• Develop maintenance and test procedures for IT DR Plan.
• Address Business Continuity requirements and planning as appropriate.
What is the Business Impact Analysis?
• A conversation between IT and key stakeholders to
  understand:
   – What are the most time-critical and information-critical
     business processes?
   – How does the business REALLY rely upon IT Service and
     Application availability?
   – What are the Student, Financial, Regulatory, Reputational,
     and other impacts of IT Service and Application
     unavailability?
   – What availability or recoverability capabilities are justifiable
     based on these requirements, potential impact, and costs?
Disaster Recovery: Key Measures

          Recovery Point Objectives Recovery Time Objectives
                            (RPO) (RTO)




                  5      6      7      8      9     10     11     12      1      2      3      4      5      6      7
                a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   p.m.   p.m.   p.m.   p.m.   p.m.   p.m.   p.m.


RPO: Amount of data lost from                 DECLARE             RTO: Targeted amount of time
failure, measured as the amount               DISASTER            to restart a business service
                                               10 a.m.
of time from a disaster event                                     after a disaster event
Disaster Recovery: Key Measures
• Recovery Time Objective (RTO)
   Maximum duration of disruption of service
• Recovery Point Objective (RPO)
   Point in time to which application data is recovered / Maximum data loss


         Weeks   Days   Hours   Minutes   Seconds     Seconds    Minutes   Hours   Days   Weeks




            Recovery Point                                      Recovery Time

                                               Real Time


                                            Cost
BIA - Example Priority Tiers
     Priority Tier                                           Description
Priority 1               Services whose unavailability more than a brief period can have a severe impact on
High Availability /      customers or time-critical business operations.
Immediate Recovery
Priority 2               Services whose unavailability significantly impacts customers or business
1-2 day recovery         operations.
Priority 3               Services which can tolerate up to five days of disruption in a disaster.
3-5 day recovery
Priority 4               Services which can tolerate up to ten days of disruption in a disaster.
6-10 day recovery
                         Priority 3 and 4 systems may be restored in less time, depending on the situation.
                         However, higher priority functions will be restored first.
Priority 5               Non-critical services which can tolerate two weeks or more of disruption in a
“Best effort” recovery   disaster. These systems will be restored on a best-effort basis, after other more
                         critical systems have been restored and ongoing operations have resumed.

                         Priority 5 systems may be restored in less time, depending on the situation.
                         However, higher priority functions will be restored first. In some cases, systems
                         deemed to not be required for continued operations may not be restored.
What does it take to RECOVER
                 from an IT Disaster?
•   Data Protection
     – Backups, Replication
•   Recovery Facility
     – Location to rebuild IT infrastructure or provision services
•   Data Recovery & Storage
     – Get Data into a form that is usable
•   Servers / Compute Capacity
     – Sufficient servers or virtual compute capacity to actually run the applications
•   Network, Voice, and Data Communications
     –   Connect servers, storage and workers
     –   Connect the recovery site to work sites
     –   Communicate with customers
     –   Includes network, telecom, demarcation equipment; cabling; telecom provisioning
•   DR Plan
     – Documented and tested procedures for what to do, and how to do it
•   People
Example Disaster Recovery Strategies
    Priority          Disaster Recovery Strategy                     Data Protection Approach

Priority 1       Establish hot site for systems and data in a     Replicate / remote mirror / short
4 hour RTO or        secondary data center at a remote               interval remote disk-to-disk
    less             location that is unlikely to be impacted        backup
                     by a local or regional event.


Priority 2       Maintain sufficient remote physical or virtual   Remote disk-to-disk backup
24-48 hour RTO       infrastructure for restoration. Ensure
                     sufficient space/power in recovery
                     facility.
Priority 3       Ensure ability to quickly acquire                Tape (with sufficient off-site rotation)
72 hour RTO         infrastructure for restoration. Ensure            or remote disk-to-disk backup
                    sufficient space/power in recovery
                    facility.
Priority 4       Ensure ability to quickly acquire                Tape (with sufficient off-site rotation)
1-2 week RTO        infrastructure for restoration. Ensure            or remote disk-to-disk backup
                    sufficient space/power in recovery
                    facility.
Storage Arrays + Replication
               PRODUCTION SITE                                         OPTIONAL DISASTER RECOVERY SITE


Application                        Local      RecoverPoint bi-directional   Remote                   Standby
 servers                           copy          replication/recovery        copy                    servers
                 RecoverPoint                                                         RecoverPoint
                  appliance                                                            appliance
                                             Production and
                                             local journals

                                    Prod             Fibre   Remote
                          SAN       LUN           Channel/WAN journal                 SAN
                                     s

                                   Storage                                  Storage
   Host-based write splitter        arrays                                   arrays
   Fabric-based write splitter
   Symmetrix VMAXe, VNX-, and
   CLARiiON-based write splitter
Site A (Primary)                                            Site B (Recovery)
                      Site                                                          Site
vCenter Server      Recovery                                 vCenter Server       Recovery
                    Manager                                                       Manager




          vSphere                                                      vSphere
                                      vSphere
                                     Replication



                                    Storage-based
                                      replication
   vSphere Replication
   Simple, cost-efficient replication for Tier 2 applications and smaller sites

   Storage-based Replication
   High-performance replication for business-critical applications in larger sites
Discussion / Q&A

More Related Content

What's hot

Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
introduction to sql server by moamen hany
introduction to sql server by moamen hanyintroduction to sql server by moamen hany
introduction to sql server by moamen hany
Moamen Hany ELNASHAR
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
Nayanrai14
 
Resource Management in Cloud Computing
Resource Management in Cloud ComputingResource Management in Cloud Computing
Resource Management in Cloud Computing
Cristian Klein
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
zOSCommserver
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentIamPe Khamkhum
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
Cloud sim report
Cloud sim reportCloud sim report
Cloud sim report
Jiachen Yang
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
Dr. Vardhan choubey
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
mhdpaknejad
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
Aakash Panchal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Compiler design
Compiler designCompiler design
Compiler design
renukarenuka9
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
Ankit Gupta
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
가상화 기반 재해복구 솔루션(Zerto)
가상화 기반 재해복구 솔루션(Zerto)가상화 기반 재해복구 솔루션(Zerto)
가상화 기반 재해복구 솔루션(Zerto)
영철 현
 
VMware vSphere Storage Enhancements
VMware vSphere Storage EnhancementsVMware vSphere Storage Enhancements
VMware vSphere Storage Enhancements
Anne Achleman
 

What's hot (20)

Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
introduction to sql server by moamen hany
introduction to sql server by moamen hanyintroduction to sql server by moamen hany
introduction to sql server by moamen hany
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Resource Management in Cloud Computing
Resource Management in Cloud ComputingResource Management in Cloud Computing
Resource Management in Cloud Computing
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
Cloud sim report
Cloud sim reportCloud sim report
Cloud sim report
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Compiler design
Compiler designCompiler design
Compiler design
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
가상화 기반 재해복구 솔루션(Zerto)
가상화 기반 재해복구 솔루션(Zerto)가상화 기반 재해복구 솔루션(Zerto)
가상화 기반 재해복구 솔루션(Zerto)
 
VMware vSphere Storage Enhancements
VMware vSphere Storage EnhancementsVMware vSphere Storage Enhancements
VMware vSphere Storage Enhancements
 

Similar to Disaster Recovery - Business & Technology

AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
Andrew Miller
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
Andrew Miller
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentationmcini
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014Kevin McDaniel
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
muralis3
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
RapidScale
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM India Smarter Computing
 
Zerto for dr migration to cloud overview
Zerto for dr migration to cloud overviewZerto for dr migration to cloud overview
Zerto for dr migration to cloud overview
Morgan Davidson
 
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Andrew Miller
 
Disaster recovery - What, Why, and How
Disaster recovery - What, Why, and HowDisaster recovery - What, Why, and How
Disaster recovery - What, Why, and How
Manish Pandit
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
asedha
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
CloudSmartz
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practicesInterop
 
Learn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinarLearn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinar
Hitachi Vantara
 
Disaster Recovery and Reliability
Disaster Recovery and ReliabilityDisaster Recovery and Reliability
Disaster Recovery and Reliability
Manish Pandit
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster Recovery
Amazon Web Services
 
Business Track Session 1: The Power of udp
Business Track Session 1: The Power of udpBusiness Track Session 1: The Power of udp
Business Track Session 1: The Power of udparcserve data protection
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
iland Cloud
 

Similar to Disaster Recovery - Business & Technology (20)

AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
 
CS_10_DR_CFD
CS_10_DR_CFDCS_10_DR_CFD
CS_10_DR_CFD
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
 
Zerto for dr migration to cloud overview
Zerto for dr migration to cloud overviewZerto for dr migration to cloud overview
Zerto for dr migration to cloud overview
 
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
Disaster recovery - What, Why, and How
Disaster recovery - What, Why, and HowDisaster recovery - What, Why, and How
Disaster recovery - What, Why, and How
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 
Learn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinarLearn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinar
 
Disaster Recovery and Reliability
Disaster Recovery and ReliabilityDisaster Recovery and Reliability
Disaster Recovery and Reliability
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster Recovery
 
Business Track Session 1: The Power of udp
Business Track Session 1: The Power of udpBusiness Track Session 1: The Power of udp
Business Track Session 1: The Power of udp
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 

More from Andrew Miller

The Golden Hammer
The Golden HammerThe Golden Hammer
The Golden Hammer
Andrew Miller
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
Andrew Miller
 
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoLQ2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Andrew Miller
 
Varrow Madness Sneak Peek
Varrow Madness Sneak PeekVarrow Madness Sneak Peek
Varrow Madness Sneak Peek
Andrew Miller
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Andrew Miller
 
Virtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowVirtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowAndrew Miller
 

More from Andrew Miller (6)

The Golden Hammer
The Golden HammerThe Golden Hammer
The Golden Hammer
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoLQ2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
 
Varrow Madness Sneak Peek
Varrow Madness Sneak PeekVarrow Madness Sneak Peek
Varrow Madness Sneak Peek
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
 
Virtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowVirtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - Varrow
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Disaster Recovery - Business & Technology

  • 1. Disaster Recovery Business & Technology Varrow Madness March 15, 2012 Andrew Miller Technical Consultant t: @andriven w:www.thinkmeta.net
  • 2. One Big Reason to Do This Expectations for Disaster Recovery ≠ IT Capabilities for Disaster Recovery
  • 3. What is a Disaster? • Disaster: An event that affects a service or system such that significant effort is required to restore the original performance level. » IT Service Management Forum  But what does that look like IN OUR ENVIRONMENT?  What disaster and recovery scenarios should we plan for?  Where do we begin?  How do we do it?
  • 4. Example of a Disaster
  • 5. Disaster Recovery vs. Operational Recovery • Disaster Recovery – To cope with & recover from an IT crisis that moves work to an alternative system in a non-routine way. – A real “disaster” is large in scope and impact – DR typically implies failure of the primary data center and recovery to an alternate site • Operational Recovery – Addresses more “routine” types of failures (server, network, storage, etc.) – Events are smaller in scope and impact than a full “disaster” – Typically implies recovering to alternate equipment within the primary data center • Business expectations for recovery timeframe is typically shorter for “operational recovery” issues than a true “disaster” • Each should have its own clearly defined objectives
  • 6. Risks, Threats and Vulnerabilities Risk is a function of the likelihood of a given threat acting upon a particular potential vulnerability, and the resulting impact of that adverse event on the organization.
  • 7. Some threats that can cause Disasters… • Human Error • Localized IT systems / network failure • Extended power outage • Telecommunications outage • Storm / Weather damage • Earthquake / Volcano • Fire in the facility • Facility flooding • Local evacuation • Cyber attack • Sabotage
  • 8. (Varrow) Disaster Recovery Approach • Interviews with key personnel to understand Business Process priorities and establish Business Impact Analysis (BIA). • Review existing IT production infrastructure, including applications, servers, storage, network, and external connectivity. Identify Risks and Gaps. • Establish Disaster Impact Scenarios and Disaster Recovery strategies to meet requirements. • Recommend Roadmap for establishing recovery capabilities and documenting plans. • Implement required recovery capabilities. • Develop framework and content for IT DR Plan. • Develop maintenance and test procedures for IT DR Plan. • Address Business Continuity requirements and planning as appropriate.
  • 9. What is the Business Impact Analysis? • A conversation between IT and key stakeholders to understand: – What are the most time-critical and information-critical business processes? – How does the business REALLY rely upon IT Service and Application availability? – What are the Student, Financial, Regulatory, Reputational, and other impacts of IT Service and Application unavailability? – What availability or recoverability capabilities are justifiable based on these requirements, potential impact, and costs?
  • 10. Disaster Recovery: Key Measures Recovery Point Objectives Recovery Time Objectives (RPO) (RTO) 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 a.m. a.m. a.m. a.m. a.m. a.m. a.m. a.m. p.m. p.m. p.m. p.m. p.m. p.m. p.m. RPO: Amount of data lost from DECLARE RTO: Targeted amount of time failure, measured as the amount DISASTER to restart a business service 10 a.m. of time from a disaster event after a disaster event
  • 11. Disaster Recovery: Key Measures • Recovery Time Objective (RTO) Maximum duration of disruption of service • Recovery Point Objective (RPO) Point in time to which application data is recovered / Maximum data loss Weeks Days Hours Minutes Seconds Seconds Minutes Hours Days Weeks Recovery Point Recovery Time Real Time Cost
  • 12. BIA - Example Priority Tiers Priority Tier Description Priority 1 Services whose unavailability more than a brief period can have a severe impact on High Availability / customers or time-critical business operations. Immediate Recovery Priority 2 Services whose unavailability significantly impacts customers or business 1-2 day recovery operations. Priority 3 Services which can tolerate up to five days of disruption in a disaster. 3-5 day recovery Priority 4 Services which can tolerate up to ten days of disruption in a disaster. 6-10 day recovery Priority 3 and 4 systems may be restored in less time, depending on the situation. However, higher priority functions will be restored first. Priority 5 Non-critical services which can tolerate two weeks or more of disruption in a “Best effort” recovery disaster. These systems will be restored on a best-effort basis, after other more critical systems have been restored and ongoing operations have resumed. Priority 5 systems may be restored in less time, depending on the situation. However, higher priority functions will be restored first. In some cases, systems deemed to not be required for continued operations may not be restored.
  • 13. What does it take to RECOVER from an IT Disaster? • Data Protection – Backups, Replication • Recovery Facility – Location to rebuild IT infrastructure or provision services • Data Recovery & Storage – Get Data into a form that is usable • Servers / Compute Capacity – Sufficient servers or virtual compute capacity to actually run the applications • Network, Voice, and Data Communications – Connect servers, storage and workers – Connect the recovery site to work sites – Communicate with customers – Includes network, telecom, demarcation equipment; cabling; telecom provisioning • DR Plan – Documented and tested procedures for what to do, and how to do it • People
  • 14. Example Disaster Recovery Strategies Priority Disaster Recovery Strategy Data Protection Approach Priority 1 Establish hot site for systems and data in a Replicate / remote mirror / short 4 hour RTO or secondary data center at a remote interval remote disk-to-disk less location that is unlikely to be impacted backup by a local or regional event. Priority 2 Maintain sufficient remote physical or virtual Remote disk-to-disk backup 24-48 hour RTO infrastructure for restoration. Ensure sufficient space/power in recovery facility. Priority 3 Ensure ability to quickly acquire Tape (with sufficient off-site rotation) 72 hour RTO infrastructure for restoration. Ensure or remote disk-to-disk backup sufficient space/power in recovery facility. Priority 4 Ensure ability to quickly acquire Tape (with sufficient off-site rotation) 1-2 week RTO infrastructure for restoration. Ensure or remote disk-to-disk backup sufficient space/power in recovery facility.
  • 15. Storage Arrays + Replication PRODUCTION SITE OPTIONAL DISASTER RECOVERY SITE Application Local RecoverPoint bi-directional Remote Standby servers copy replication/recovery copy servers RecoverPoint RecoverPoint appliance appliance Production and local journals Prod Fibre Remote SAN LUN Channel/WAN journal SAN s Storage Storage Host-based write splitter arrays arrays Fabric-based write splitter Symmetrix VMAXe, VNX-, and CLARiiON-based write splitter
  • 16. Site A (Primary) Site B (Recovery) Site Site vCenter Server Recovery vCenter Server Recovery Manager Manager vSphere vSphere vSphere Replication Storage-based replication vSphere Replication Simple, cost-efficient replication for Tier 2 applications and smaller sites Storage-based Replication High-performance replication for business-critical applications in larger sites

Editor's Notes

  1. Note to Presenter: View in Slide Show mode for animation. When EMC or its partners talk about remote replication, they usually mean between storage at two locations. The source and target are physically separated to reduce the risks associated with co-location. Remote replicated systems could be across a campus, across a town, or across the globe. Their physical distance and technology selected can affect how quickly you recover from a disruption and how much data is lost.Organizations normally set requirements for how much lost data and how much time to come back online is acceptable. The recovery point objective (RPO) is the amount of data that can be lost, measured in terms of time without being catastrophic to the business. The recovery time objective (RTO) is the amount of time that it takes to recover the data and restart your business services from the recovered data. Remote replication provides much lower RPOs (at or close to zero) and very small RTOs, depending on implementation. The bottom line is that replication is appropriate for all types of data, and the RPO and RTO you target are going to affect your implementation.For multiple RPOs and for remote replication with either zero or low RPO—and near-instant to instant recovery with DVR-like technology, EMC offers the RecoverPoint family.