The disaster recovery plan outlines strategies and procedures for recovering operations across three data centers in the event of a disruption or data center failure caused by zombies or other threats. The plan details response, resumption, and restoration phases and identifies dependencies and teams responsible for network, server, storage, backup software and systems. Appendices provide contact details, document maintenance procedures, data center diagrams, and a glossary.
MoreVRP is a database performance monitoring and acceleration tool, and offers DBAs the capability to have real-time monitoring and resource management and control.
New Features in PSP2 for SANsymphony™-V10 Software-defined Storage Platform and DataCore™ Virtual SAN. New enhancements include OpenStack support, deduplication and compression, veeam backup integration and random write accelerator.
MoreVRP is a database performance monitoring and acceleration tool, and offers DBAs the capability to have real-time monitoring and resource management and control.
New Features in PSP2 for SANsymphony™-V10 Software-defined Storage Platform and DataCore™ Virtual SAN. New enhancements include OpenStack support, deduplication and compression, veeam backup integration and random write accelerator.
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
Symantec AutoSupport is a set of infrastructure, process, and systems that enhance the support experience through proactive monitoring of Symantec Appliance hardware and software, as well as providing automated error reporting and support case creation.
Through automation, internet access, and case management integration, Symantec can vastly improve the support process and give our support engineers the tools to solve problems faster. The AutoSupport infrastructure within Symantec analyzes the Call Home data from each appliance to provide proactive customer support and incident response for hardware failures thus reducing the need for an administrator to initiate support cases. It also enables Symantec to better understand how customers configure and use appliances, and where improvements would be most beneficial.
AutoSupport can also correlate the Call Home data with other site configuration data held by Symantec, for technical support and error analysis. With AutoSupport, Symantec greatly improves the customer support experience.
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesSymantec
NetBackup Appliances Family
The NetBackup Appliance family offers complementary solutions to meet the data protection needs of modern enterprises, and includes solutions such as the NetBackup 5230 and NetBackup 5330 Appliances.
NetBackup 5230 Appliance
The NetBackup 5230 Backup Appliance includes master and media capabilities, alongside storage and deduplication features that will meet the needs of small, mid size, and even some large enterprises.
NetBackup 5330 Appliance
The NetBackup 5330 appliance offers media server capabilities, and is designed to meet the needs of large enterprise customers with demanding performance and scalability requirements across virtual and physical infrastructures.
The NetBackup 5330 Appliance is designed to supplement the NetBackup Appliance family by offering key enterprise customers a large-scale and performant offering. This includes sustainable performance over time and scale, predictable job success rates under heavy loads, and powerful deduplication capabilities.
Data protection architectures are, by necessity, complex in nature as they involve so many complex factors. There cannot be a “one size fits all” approach to data protection because the operational requirements of each organization dictate how data is used, and the local risk assessment process dictates to some extent how it will be protected.
When assessing backup software vendors, IT leaders must avoid being taken in by flashy new features. Backup software should really be called restore software as failure in backup is failure to meet recovery objectives. Always evaluate features in light of these objectives.
Use this research to:
•Understand new features and develop a strategy to meet new challenges to enterprise backup, such as ever-increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy.
•Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape.
•Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation and submit an RFP to vendors, score their responses, and prepare a backup software demo script.
•Assess implementation pitfalls in light of overall data management, security, and compliance requirements.
Ensure that you make the best-fit backup software decisions for enterprise availability and restore requirements, from strategy to selection to implementation.
VEEAM Backup & Replication vs. StarWind Virtual SAN: Business Continuity and Disaster Recovery Run Entirely by RTO / RPO Numbers
Find out how to pick the right tools to meet the business continuity challenges and take full control of your RTO and RPO.
You are welcomed to watch the webcast based on this slide presentation: http://www.starwindsoftware.com/veeam-backup-and-replication-vs-starwind-virtual-san-video
Recorded webinar presentation. E xigent Technologies of Mount Arlington, NJ / Manhattan, NY. "Managed Backup & Disaster Recovery service for Small Business".
PREVENT Webinar is hosted by Exigent Technologies President, Dan Haurey. March 3, 2009, 10:00AM.
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
In a world of ever increasing data flow as well as globalization of data centers the effectiveness and utilization of the networks connecting sites is of the highest importance to end users. Even with network enhancement and improvement, the ability of the infrastructure to keep pace with the flow of data has proved not to be in lockstep. To optimize the flow of data verses increasing the pipe that is flows along is seen as critical to keeping operations running and costs minimal. This paper discusses the new WAN Optimization technology that has been introduced in the NetBackup 5220 and 5020 appliances.
This document outlines the WAN Optimization feature enhancements introduced on the NetBackup 5220 and NetBackup 5020 and applies to:
• NetBackup 5220 & 5230 appliances with version N2.5 and above installed
• NetBackup 5020 & 5030 appliances with version D1.4.2 and above installed
hpe manual data protector 9.07 granular extension guidesAndrey Karpov
Granular Recovery Extension User Guide for
Microsoft SharePoint Server, Exchange and
VMware
The HP Data Protector Granular Recovery Extension User Guide for Microsoft Exchange Server provides information specific to this extension:
l
For detailed information about Data Protector specifics, see the Data Protector Documentation set.
l
For detailed information about Microsoft Exchange Server specifics, refer to the official Microsoft Exchange Server documentation.
The project was performed on behalf of MPhasis Ltd (a Hewlett Packard Subsidiary). The project required understanding the client's existing data center infrastructure, analyzing the client's current and future needs and suggesting a low cost, optimized solution with 60% virtualization.
The Symantec NetBackup Platform is a complete backup and recovery solution that is optimized for virtually any workload, including physical, virtual, arrays, or big data infrastructures. NetBackup delivers flexible target storage options, such as tape, 3rd-party disk, cloud, or appliance storage devices, including the NetBackup Deduplication Appliances and Integrated Backup Appliances.
NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect virtualized deployments at scale – where thousands of Virtual Machines and petabytes of data are the norm today, and where software-defined data centers and IT-as-a-service become the norm tomorrow. Enterprises trust Symantec.
Microsoft SQL High Availability and ScalingJustin Whyte
This is a white paper that I wrote that explores the different options for Microsoft SQL Server High Availability. I explain the pros and cons of each technology, as well as important considerations like RTO and RPO.
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
Symantec AutoSupport is a set of infrastructure, process, and systems that enhance the support experience through proactive monitoring of Symantec Appliance hardware and software, as well as providing automated error reporting and support case creation.
Through automation, internet access, and case management integration, Symantec can vastly improve the support process and give our support engineers the tools to solve problems faster. The AutoSupport infrastructure within Symantec analyzes the Call Home data from each appliance to provide proactive customer support and incident response for hardware failures thus reducing the need for an administrator to initiate support cases. It also enables Symantec to better understand how customers configure and use appliances, and where improvements would be most beneficial.
AutoSupport can also correlate the Call Home data with other site configuration data held by Symantec, for technical support and error analysis. With AutoSupport, Symantec greatly improves the customer support experience.
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesSymantec
NetBackup Appliances Family
The NetBackup Appliance family offers complementary solutions to meet the data protection needs of modern enterprises, and includes solutions such as the NetBackup 5230 and NetBackup 5330 Appliances.
NetBackup 5230 Appliance
The NetBackup 5230 Backup Appliance includes master and media capabilities, alongside storage and deduplication features that will meet the needs of small, mid size, and even some large enterprises.
NetBackup 5330 Appliance
The NetBackup 5330 appliance offers media server capabilities, and is designed to meet the needs of large enterprise customers with demanding performance and scalability requirements across virtual and physical infrastructures.
The NetBackup 5330 Appliance is designed to supplement the NetBackup Appliance family by offering key enterprise customers a large-scale and performant offering. This includes sustainable performance over time and scale, predictable job success rates under heavy loads, and powerful deduplication capabilities.
Data protection architectures are, by necessity, complex in nature as they involve so many complex factors. There cannot be a “one size fits all” approach to data protection because the operational requirements of each organization dictate how data is used, and the local risk assessment process dictates to some extent how it will be protected.
When assessing backup software vendors, IT leaders must avoid being taken in by flashy new features. Backup software should really be called restore software as failure in backup is failure to meet recovery objectives. Always evaluate features in light of these objectives.
Use this research to:
•Understand new features and develop a strategy to meet new challenges to enterprise backup, such as ever-increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy.
•Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape.
•Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation and submit an RFP to vendors, score their responses, and prepare a backup software demo script.
•Assess implementation pitfalls in light of overall data management, security, and compliance requirements.
Ensure that you make the best-fit backup software decisions for enterprise availability and restore requirements, from strategy to selection to implementation.
VEEAM Backup & Replication vs. StarWind Virtual SAN: Business Continuity and Disaster Recovery Run Entirely by RTO / RPO Numbers
Find out how to pick the right tools to meet the business continuity challenges and take full control of your RTO and RPO.
You are welcomed to watch the webcast based on this slide presentation: http://www.starwindsoftware.com/veeam-backup-and-replication-vs-starwind-virtual-san-video
Recorded webinar presentation. E xigent Technologies of Mount Arlington, NJ / Manhattan, NY. "Managed Backup & Disaster Recovery service for Small Business".
PREVENT Webinar is hosted by Exigent Technologies President, Dan Haurey. March 3, 2009, 10:00AM.
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
In a world of ever increasing data flow as well as globalization of data centers the effectiveness and utilization of the networks connecting sites is of the highest importance to end users. Even with network enhancement and improvement, the ability of the infrastructure to keep pace with the flow of data has proved not to be in lockstep. To optimize the flow of data verses increasing the pipe that is flows along is seen as critical to keeping operations running and costs minimal. This paper discusses the new WAN Optimization technology that has been introduced in the NetBackup 5220 and 5020 appliances.
This document outlines the WAN Optimization feature enhancements introduced on the NetBackup 5220 and NetBackup 5020 and applies to:
• NetBackup 5220 & 5230 appliances with version N2.5 and above installed
• NetBackup 5020 & 5030 appliances with version D1.4.2 and above installed
hpe manual data protector 9.07 granular extension guidesAndrey Karpov
Granular Recovery Extension User Guide for
Microsoft SharePoint Server, Exchange and
VMware
The HP Data Protector Granular Recovery Extension User Guide for Microsoft Exchange Server provides information specific to this extension:
l
For detailed information about Data Protector specifics, see the Data Protector Documentation set.
l
For detailed information about Microsoft Exchange Server specifics, refer to the official Microsoft Exchange Server documentation.
The project was performed on behalf of MPhasis Ltd (a Hewlett Packard Subsidiary). The project required understanding the client's existing data center infrastructure, analyzing the client's current and future needs and suggesting a low cost, optimized solution with 60% virtualization.
The Symantec NetBackup Platform is a complete backup and recovery solution that is optimized for virtually any workload, including physical, virtual, arrays, or big data infrastructures. NetBackup delivers flexible target storage options, such as tape, 3rd-party disk, cloud, or appliance storage devices, including the NetBackup Deduplication Appliances and Integrated Backup Appliances.
NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect virtualized deployments at scale – where thousands of Virtual Machines and petabytes of data are the norm today, and where software-defined data centers and IT-as-a-service become the norm tomorrow. Enterprises trust Symantec.
Microsoft SQL High Availability and ScalingJustin Whyte
This is a white paper that I wrote that explores the different options for Microsoft SQL Server High Availability. I explain the pros and cons of each technology, as well as important considerations like RTO and RPO.
The first Technology driven reality competition showcasing the incredible virtualization community members and their talents. Virtually Everywhere · virtualdesignmaster.com
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMaryJWilliams2
Discover the essential strategies and tools for effective backup and disaster recovery. Learn how to safeguard your data against unexpected events and ensure business continuity. Explore the latest technologies and best practices in backup and disaster recovery management. To Know more:https://stonefly.com/white-papers/backup-disaster-recovery-solutions-governments/
COMPANY
Disaster Recovery Plan (DRP) for [PRODUCT]
(Note: this DRP document is somewhat specific to SharePoint, but can be adapted for other products/technologies as
needed)
Plan and related Business Processes
Business Process Feature Relevant Technical Components
December 29, 2014
Table of Contents
1. Purpose and Objective ............................................................................................................................................ 3
Scope ............................................................................................................................................................................ 3
2. Dependencies .......................................................................................................................................................... 3
3. Disaster Recovery Strategies ................................................................................................................................... 5
4. Disaster Recovery Procedures ................................................................................................................................ 5
Response Phase ............................................................................................................................................................ 5
Resumption Phase ........................................................................................................................................................ 6
Data Center Recovery ............................................................................................................................................... 6
Internal or External Dependency Recovery .............................................................................................................. 8
Significant Network or Other Issue Recovery (Defined by quality of service guidelines) ........................................ 8
Restoration Phase ........................................................................................................................................................ 9
Data Center Recovery ............................................................................................................................................... 9
Internal or External Dependency Recovery ............................................................................................................ 10
Significant Network or Other Issue Recovery (Defined by quality of service guidelines) ...................................... 10
Appendix A: Disaster Recovery Contacts - Admin Contact List ..................................................................................... 12
Appendix B: Document Maintenance Responsibilities and Revision History ............................................................... 12
Appendix C: Server Farm Details ..................................
Investments in High Availability and Disaster Recovery tools to support business continuity objectives can fall short of the mark when not managed well. Indeed, the presence of such tools can lead to a false sense of security, resulting in complacency in the face of insidious
challenges until it is too late. IT professionals responsible for providing highly available environments to support critical business operations will do well to understand how causes such as configuration drift come about rendering the their plans ineffective and what to do about them.
Xd planning guide - storage best practicesNuno Alves
The Citrix Storage planning guide provides a list of best practices, recommendations and
performance related tips that cover the most critical areas of storage integration with Citrix
XenDesktop. It is not intended as a comprehensive guide for planning and configuring storage
infrastructures, nor as a storage training handbook.
Due to scope, this guide provides some device-specific information. For additional device- specific
configuration, Citrix suggests reviewing the storage vendor’s documentation, the storage vendor’s
hardware compatibility list, and contacting the vendor’s technical support if necessary
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
Disaster Recovery (DR)
Provides the technical ability to maintain critical services in the event of any unplanned incident that threatens these services or the technical infrastructure required to maintain them.
Data Protection and Disaster Recovery Solutions: Ensuring Business ContinuityMaryJWilliams2
In today's digital landscape, data protection and disaster recovery are critical components of any robust IT strategy. This article delves into various solutions designed to safeguard your data against loss, corruption, and cyber threats. Explore the latest technologies and best practices for effective data protection, from backup strategies to comprehensive disaster recovery plans. To know more: https://stonefly.com/white-papers/data-protection-disaster-recovery-solution/
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
Delve into comprehensive data protection and disaster recovery strategies with our detailed PDF submission. Discover best practices, methodologies, and technologies to safeguard critical data and ensure operational continuity in the face of unforeseen events. Gain insights into designing resilient backup plans, implementing disaster recovery solutions, and mitigating risks effectively. Equip yourself with the knowledge needed to protect your organization's data assets and maintain business continuity. To Know more: https://stonefly.com/white-papers/data-protection-disaster-recovery-solution/
When it comes to backup and recovery, backup performance numbers rule the roost. It’s understandable really: far more data gets backed up than ever gets restored, and backup length is one of most difficult problems facing administrators today. But a reliance on backup numbers alone is dangerous. Recovery may not happen as frequently as daily backup but recovery is the entire reason for backup. Backing up because everyone does it isn’t good enough.
Overview of Faandotech\'s business continuity solution geared to the SMB space. Includes offsite backup and restoration on our Grid computing system in the event of a client site disaster.
A comprehensive guide to Bluelock's IT Recovery Suite
The key to having a high-performing IT disaster recovery plan is having the right mix of solutions to achieve our organization's need for speedy recovery an maximum value. Achieve your ultimate goal of IT service availability and data protection.
The first Technology driven reality competition showcasing the incredible virtualization community members and their talents. Virtually Everywhere · virtualdesignmaster.com
The first Technology driven reality competition showcasing the incredible virtualization community members and their talents. Virtually Everywhere · virtualdesignmaster.com
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Joe Graziano – Challenge 2 Design Solution (Part 1)
1. Disaster Recovery Plan (DRP)
September 8, 2013
After the Outbreak: Rebuilding the World
Original Date: 08/18/13
Revision Date: 08/22/13
Written By: Joe Graziano
Sr. Infrastructure Engineer
W.R.O – World Rebuild Organization
2. Table of Contents
1. Purpose and Objective............................................................................................................................................3
Scope............................................................................................................................................................................5
2. Dependencies..........................................................................................................................................................6
3. Disaster Recovery Strategies...................................................................................................................................7
4. Disaster Recovery Procedures ................................................................................................................................7
Response Phase............................................................................................................................................................8
Resumption Phase........................................................................................................................................................9
Data Center Recovery...............................................................................................................................................9
Restoration Phase ......................................................................................................................................................11
Data Center Recovery.............................................................................................................................................11
Appendix A: Disaster Recovery Contacts - Admin Contact List .....................................................................................12
Appendix B: Document Maintenance Responsibilities and Revision History ...............................................................13
Appendix C: Server Farm Details ...................................................................................................................................14
Appendix D: Glossary/Terms.........................................................................................................................................15
3. 1. Purpose and Objective
Life as we know it has changed, daily tasks now involve cleaning up the streets of the undead that were put down in the
wake of the most devastating virus mankind has ever seen. With the help of Mr Phil N. Thropist we have built up 3
buildings with the task of re-establishing an infrastructure to support this new world.
The World Recovery Organization hasdeveloped this disaster recovery plan (DRP) to be used in the event of a significant
disruption to the features listed in the table above. The goal of this plan is to outline the key recovery steps to be
performed during and after a disruption to return to normal operations as soon as possible. With the daily threat of the
undead and other factions of humans vying for supplies and dominance this plan is vital to our survival and adaptability.
While the plans for building the 3 datacenters were underway we considered what would happen if any of our
datacenters were compromised. After all, the zombie population is still out there. While we have stopped the spread of
the deadly virus those already affected pose a real threat to the survivors. A disaster recovery/business continuity plan
was needed. Using the specifications for the datacenters being built we calculated what additional hardware and
software would be needed to support any one datacenter should it be compromised. This new plan would mean adding
the following to each datacenter. The premise is should any datacenter fail the surviving datacenters would shoulder
the load that Site Recovery Manager would send to them while the restoration phase is activated and completed.
In order to ensure that any failed datacenter could be recovered we made workload calculations based on the number
of virtual servers and virtual desktops in each datacenter. With this information we added the following hardware and
software to each datacenter:
Hardware:
Datacenter 1
10x Dell Poweredge R905 servers
2x 48 port 1gb modules for Nexus 7000
Additional bricks for the Pillar SAN to accommodate backups
Datacenter 2
40x Dell Poweredge R905 servers
1x Nexus 7000
5x 48 port 1gb modules for Nexus 7000
Additional bricks for the Pillar SAN to accommodate backups
Datacenter 3
10xDell Poweredge R905 servers
2x 48 port 1gb modules for Nexus 7000
Additional bricks for the Pillar SAN to accommodate backups
4. Software
Syncsort DPX Backup Software
The Syncsort backup software modernizes data protection through highly efficient snapshot and replication
technology, integration with VMware and applications, resulting in dramatically faster backup and recovery operations
Oracle’s Pillar Axiom MaxRep Replication for SAN
This offering from Oracle allows the Pillar SAN to replicate to its partners in the secondary and tertiary
datacenters. With replication we can preserve all of our valuable data in multiple locations so that any failures,
attacks, or catastrophes can be recovered from in a timely manner
This new hardware and software introduces additional costs for the support team and for the organizations
stakeholders.
46% increase in server and network port density (more time required for rack/install/configure)
Addition of Syncsort DPX Backup software
o Syncsort Integrated Backup License ($7600 per 1TB) $2,280,000 for 300TB
o Exchange Mailbox Recovery (500 per license)x6 $3,000 for 3000 users
o Sharepoint Object Recovery $1,900
o Data protection Reporter $4,275
o Maintenance License $17,500
Addition of Axiom MaxRep SAN replication (increase time to create/configure multi-site SAN replication)
o
5. Scope
The scope of this DRP document addresses technical recovery in the event of a significant disruption. The intent of the
DRP is to be used in conjunction with the business continuity plan (BCP) W.R.O has. A DRP is a subset of the overall
recovery process contained in the BCP. Plans for the recovery of people, infrastructure, and internal and external
dependencies not directly relevant to the technical recovery outlined herein are included in the Business Continuity Plan
and/or the Corporate Incident Response and Incident Management plansW.R.O has in place.
The link to the specific BCP document related to this DRP can be found here: LINK TO BCP
This disaster recovery plan provides:
- Guidelines for determining plan activation;
- Technical response flow and recovery strategy;
- Guidelines forrecovery procedures;
- References to key Business Resumption Plans and technical dependencies;
- Rollback procedures that will be implemented to return to standard operating state;
- Checklists outlining considerations for escalation, incident management, and plan activation.
The specific objectives of thisdisaster recovery plan are to:
- Immediately mobilize a core group of leaders to assess the technical ramifications of a situation;
- Set technical priorities for the recovery team during the recovery period;
- Minimize the impact of the disruption to the impacted features and business groups;
- Stage the restoration of operations to full processing capabilities;
- Enable rollback operations once the disruption has been resolved if determined appropriate by the recovery
team.
- Arm all teams with ample weapons, armor and supplies to handle any Zombie issues that arise.
Within the recovery procedures there are significant dependencies between and supporting technical groups within and
outside W.R.O. This plan is designed to identify the steps that are expected to take to coordinate with other groups /
vendors to enable their own recovery.
6. 2. Dependencies
This section outlines the dependencies made during the development of this disaster recovery plan. If and when needed
theDR TEAM will coordinate with their partner groups as needed to enable recovery.
Dependency Assumptions
User Interface Users (end users, power users, administrators) are unable to access the system
through any part of the instance (e.g. client or server side, web interface or
downloaded application).
Infrastructure and back-end services are still assumed to be active/running.
Business Intelligence /
Reporting
The collection, logging, filtering, and delivery of reported information to end users
is not functioning (with or without the user interface layer also being impacted).
Standardbackup processes are not impacted, but the active / passive or mirrored
processes are not functioning.
Specific types of disruptions could include components that process, match and
transforms information from the other layers. This includes business transaction
processing, report processing and data parsing.
Network Layers Connectivity to network resources is compromised and/or significant latency
issues in the network exist that result in lowered performance in other layers.
Assumption is that terminal connections, serially attached devices and inputs are
still functional.
Storage Layer Loss of SAN, local area storage, or other storage component.
Database Layer Data within the data stores is compromised and is either inaccessible, corrupt, or
unavailable
Hardware/Host Layer Physical components are unavailable or affected by a given event
Virtualizations (VM's) Virtual components are unavailable
Hardware and hosting services are accessible
Administration Support functions are disabled such as management services, backup services,
and log transfer functions.
Other services are presumed functional
In addition assumptions within the Business Continuity Plan for this work stream still apply.
7. 3. Disaster Recovery Strategies
The overall DR strategy of W.R.O.is summarized in the table below and documented in more detail in the supporting
sections. These scenarios and strategies are consistent across the technical layers (user interface, reporting, etc.)
4. Disaster Recovery Procedures
A disaster recovery event can be broken out into three phases, the response, the resumption, and the restoration.
These phases are also managed in parallel with any corresponding business continuity recovery procedures summarized
in the business continuity plan.
Data Center Disruption
Failover to alternate Data Center
Reroute core processes to another Data
Center (without full failover)
Operate at a deprecated service level
Take no action
Significant network or
other issues
Reroute operations to backup processing
unit / service (load balancing, caching)
Wait for service to be restored,
communicate with core stakholders as
needed
•On call personnel paged
•Decision made around recovery strategies to be taken
•Full recovery team identified
Response Phase: The immediate actions following a significant event.
•Recovery procedures implemented
•Coordination with other departments executed as needed
Resumption Phase: Activities necessary to resume services after team has
been notified.
•Rollback procedures implemented
•Operations restored
Restoration Phase: Tasks taken to restore service to previous levels.
8. Response Phase
The following are the activities, parties and items necessary for a DR response in this phase. Please note these
procedures are the same regardless of the triggering event (e.g. whether caused by a Data Center disruption or other
scenario).
Response Phase Recovery Procedures – All DR Event Scenarios
Step Owner Duration Components
Identify issue, page on call /
Designated Responsible
Individual (DR TEAM)
DR TEAM 15 minutes Issue communicated / escalated
Priority set
Identify the team members
needed for recovery
DR TEAM 15 minutes Selection of core team members required for restoration
phase from among the following groups:
Operations
Establish a conference line for
a bridge call to coordinate next
steps
DR TEAM 10 minutes Primary bridge line: 555-123-9876
Secondary bridge line: 555-123-7485
Alternate / backup communication tools: email,
communicator
Communicate the specific
recovery roles and determine
which recovery strategy will be
pursued.
DR TEAM 60 minutes Documentation / tracking of timelines and next
decisions
Creation of disaster recovery event command center /
“war room” as needed
This information is also summarized by feature in Appendix A: Disaster Recovery Contacts - Admin Contact List.
9. Resumption Phase
During the resumption phase, steps will be taken to enable recovery to one or more surviving sites. VMware’s Site
Recovery Manager will be at the heart of the tasks required to resume service.
Data Center Recovery
Full Data Center Failover
Step Owner Duration Components
Initiate Failover DR TEAM /
SRM
TBD Restoration procedures identified
Risks assessed for each procedure
Coordination points between groups defined
Complete Failover DR TEAM /
SRM
TBD Recovery steps executed, including handoffs between
key dependencies
Test Recovery DR TEAM /
SRM
TBD Tests assigned and performed
Results summarized and communicated to group
Failover deemed successful DR TEAM TBD Signoff by DR TEAM
In the event of a Full Datacenter Failover the following processes should be followed to implement failover to the
surviving datacenters and to start the process of recovering the failed datacenter.
Connect remotely to the failed/compromised datacenter
Examine backup logs from previous night’s jobs for completion
Confirm replication of SAN LUN’s to secondary and tertiary datacenters
Restore required Tier 1 servers
Restore additional Virtual Desktop servers to manage user workloads
Gracefully shutdown servers at compromised datacenter
Below is a timeline for recovery actions associated with the failover the technical components between different data
centers to provide geo-redundant operations. Coordination of recovery actions is crucial. A timeline is necessary in
order to manage recovery between different groups and layers.
10. Reroute critical processes to alternate Data Center
Step Owner Duration Components
Identify and agree on failover Mr. Thropist 1 hour Meet with datacenter administration team
Assess outage and options for mitigation
Declare disaster
Remote access to Datacenter Joe Graziano
Backup Admin
SAN Admin
30min Ensure safe location, either other datacenter or mobile
access location
Make VPN connection to datacenter
Examine Backup Logs and SAN
Replication
Backup Admin
SAN Admin
1 hour Review Syncsort logs to ensure successful backups
Review SAN replication logs to ensure current
replication
Instant Virtualize (IV) Tier 1
Servers
Joe Graziano
Server Admin
8 hours Instant virtualize (IV) Tier 1 servers
Full Recover Tier 1 Servers
(RRP)
Joe Graziano
Server Admin
16 hours Kick off Rapid Return to Production on Tier 1 servers
Instant Virtualize (IV) Virtual
Desktop Servers
Joe Graziano
Virtual Desktop
Admin
4 hours Instant virtualize (IV) Virtual Desktop servers
Full Recover Virtual Desktop
Servers (RRP)
Joe Graziano
Virtual Desktop
Admin
8 hours Kick off Rapid Return to Production on Virtual Desktop
servers
Shutdown servers at failed
Datacenter
Joe Graziano 2 hours Power down all servers at failed datacenter
Power down SAN and ESX hosts
11. Restoration Phase
During the restoration phase, the steps taken to enable recovery will vary based on the type of issue. The procedures for
each recovery scenario are summarized below.
Data Center Recovery
Full Data Center Restoration
Step Owner Duration Components
Determine whether failback to
original Data Center will be
pursued
DR TEAM 1 Week Define Restoration procedures
Recon the failed datacenter
Map out entry points
Reinforce arms, weapons and supplies for raid
Clear failed datacenter of
Zombies
Daryl Dixon
Rick Grimes
Glen Rhee
Swat Team
5 hours Establish a perimeter
Lock down escape routes
Enter datacenter
Take no prisoners / Kill Zombies
Original data center restored DR TEAM 1 week Examine Network
Examine Servers / SAN
Repair/replace any damaged equipment
Burn bodies
Clean all building floors for repopulation
Complete Failback DR TEAM 16 hours Shutdown Tier 1 server at secondary and tertiary
datacenters
Power up Tier 1 servers in recovered datacenter
Test Failback DR TEAM TBD Tests assigned and performed
Results summarized and communicated to group
Issues (if any) communicated to group
Determine whether failback
was successful
DR TEAM TBD Declaration of successful failback and communication
to stakeholder group.
Disaster recovery procedures closed.
Results summarized, post mortem performed, and DRP
updated (as needed).
12. Appendix A: Disaster Recovery Contacts - Admin Contact List
The critical team members who would be involved in recovery procedures for feature sets are summarized below.
Feature Name Contact Lists
Oracle’s Pillar Axiom MaxRep Replication for SAN SAN TEAM
Syncsort DPX backup software for VMware Backup Admin Team
Failed Datacenter Recovery Team SWAT Team
Tier 1 Server failover and testing Server Admin Team
Virtual Desktop Server failover and testing Virtual Desktop Admin Team
SAN Team
Joe Graziano
Chris Wahl
Charles Bartowski
Backup Admin Team
Jonathan Frapier
Scott Lowe
Luther Stickell
SWAT Team
Daryl Dixon
Rick Grimes
Glen Rhee
Eric Wright
Server Admin Team
Akmal Waheed
Mike Laverick
Dade Murphy
Virtual Desktop Admin Team
Josh Atwell
Angelo Luciani
Emanuel Goldstein
13. Appendix B: Document Maintenance Responsibilities and Revision History
This section identifies the individuals and their roles and responsibilities for maintaining this Disaster Recovery Plan.
Primary Disaster Recovery Plan document owner is:Joe Graziano
Primary Designee: Joe Graziano
Alternate Designee #1: Jonathan Frapier
Alternate Designee #2: Akmal Waheed
Name of Person
Updating Document
Date Update Description Version # Approved By
Joe Graziano 8/20/2013 Added VMware SRM
documentation
1.1 Phil N. Thropist
Joe Graziano 8/21/2103 Added Alternate Designee’s
Jonathan and Akmal
1.2 Phil N. Thropist
Joe Graziano 8/22/2103 Completed final draft for release
to Virtual Design Master
1.3 Phil N. Thropist
15. Appendix D: Glossary/Terms
Standard Operating State: Production state where services are functioning at standard state levels. In contrast to
recovery state operating levels, this can support business functions at minimum but deprecated levels.
Presentation Layer: Layer which users interact with. This typically encompasses systems that support the UI, manage
rendering, and captures user interactions. User responses are parsed and system requests are passed for processing
and data retrieval to the appropriate layer.
Processing Layer: System layer which processes and synthesizes user input, data output, and transactional operations
within an application stack. Typically this layer processes data from the other layers. Typically these services are folded
into the presentation and database layer, however for intensive applications; this is usually broken out into its own
layer.
Database Layer:The database layer is where data typically resides in an application stack. Typically data is stored in a
relational database such as SQL Server, Microsoft Access, or Oracle, but it can be stored as XML, raw data, or tables.
This layer typically is optimized for data querying, processing and retrieval.
Network Layer: The network layer is responsible for directing and managing traffic between physical hosts. It is
typically an infrastructure layer and is usually outside the purview of most business units. This layer usually supports
load balancing, geo-redundancy, and clustering.
Storage Layer:This is typically an infrastructure layer and provides data storage and access. In most environments this is
usually regarded as SAN or NAS storage.
Hardware/Host Layer: This layer refers to the physical machines that all other layers are reliant upon. Depending on
the organization, management of the physical layer can be performed by the stack owner or the purview of an
infrastructure support group.
Virtualization Layer: In some environments virtual machines (VM's) are used to partition/encapsulate a machine's
resources to behave as separate distinct hosts. The virtualization layer refers to these virtual machines.
Administrative Layer: The administrative layer encompasses the supporting technology components which provide
access, administration, backups, and monitoring of the other layers.