By attending this webinar you’ll learn how to:
* Implement service levels like RPO and RTO throughout the data center
* Establish NEW service levels for copy management and recovered performance
* Fix the disconnect between service levels and data protection applications
3. Why You Need Service Level Driven Data Protection
● No longer a few mission
critical applications
● Dozens if not hundreds of
applications
○ Mission Critical
○ Business Critical
○ Commonly Used
5. Understanding RPO
● RPO is the amount of data loss if a
recovery is required
● It is the time between backups
● Improved by increasing protection events
○ Replication
○ Snapshots (managed by backup process)
○ Block Level Incremental
○ On-line Backups
6. Understanding RTO
● Total time that user has to wait
to start using an application
● Recovery speed is critical
○ Recover from snapshots
○ Instantiate volume on backup
storage
7. ● Over 90% of recoveries are from
most recent backup
● Organization needs to decide how
long they will retain data in backup
set
● Longer retention requires:
○ Powerful search
○ Backup storage costs management
Understanding Retention
9. Setting Service Level
● IT should set service levels for each
application / data set in the
environment
● Create an application specific SLA
and communicate that to
stakeholders
10. Setting Service Level
● IT should set service levels for each
application / data set in the
environment
● Create an application specific SLA
and communicate that to
stakeholders
● Because of Application Explosion,
may want to create recovery zones
11. Recovery Zones for Application Sprawl
Tier 1 - Mission Critical
○ Sub 1 hour
○ Snapshots / Replication
Tier 2 - Business Critical
○ Sub 4 hour
○ Recovery from backup or recovery in place
Tier 3 - Commonly Used Applications
○ Sub 8 hour
○ Standard recovery from disk, tape or cloud
12. Service Levels vs. Backups
● Backups are static, Service Levels Dynamic
● Backups are Job-Based
● Ability to meet service levels impacted by other applications in
the data center
13. Backup Software Needs to Be SLA Driven
● Protection set by desired outcome
● Backup software automatically
uses most appropriate backup
technique and storage
● BU software automatically adjusts
based on changing data center
conditions
14. Micro Focus Data Protector
Comprehensive backup and disaster recovery for hybrid infrastructure and enterprise applications
• Enterprise class scalability and security
• Application-consistent recovery
• Advanced virtual environment protection
• Best-in-class platform and cloud
integrations
• Integrated disaster recovery
• Monitoring, automation and reporting
Dashboard, Reporting and Monitoring
Analytics Integration
Secure Multi-Tier Architecture
InfrastructureApplicationsPredictive AnalyticsMgmt Plug-in
Secure PeeringFour-tier design Rest APIs
Remote OfficesCore Data Center Cloud
Orchestration
15. Hybrid Backup and Recovery for Enterprises
Data Protector’s Heterogeneity
Unstructured
data Applications Hypervisors Operating systems
Storage Array Physical/Virtual Tape Cloud TargetBackup to Disk Disaster Recovery
16. Microsoft SQL Server
▪ Native SQL API support
▪ Always on availability
groups
▪ Full, incremental backup,
logs
Microsoft Exchage Microsoft SharePoint
▪ Backup entire or specific
site
▪ Single item recovery
MySQL
▪ Supports mysqlbackup
API
▪ Full, transaction logs
▪ Staged or in-place
restores
Oracle Database
▪ Integrated RMAN
▪ Complete/incomplete
recovery
▪ Automated or scheduled
backup
SAP and SAP HANA
▪ HANA appliance
integrated
▪ Point-in-time recoveries
▪ Online database backup
IBM DB2
▪ Online full and archive
log
▪ Point-in-time recovery
▪ Vendor or user exit
mode
PostgreSQL
▪ Full, transaction logs
▪ Redirected restores
▪ Point-in-time
restores
18. Monitoring, Automation and Reporting
Monitoring and analytics on a single dashboard with drill-down capabilities with Backup Navigator
Clear identification of
failed backup
sessions
Drill down to find the
root cause and
address proactively.
Easy tracking of RPOs and RTOs for
mission critical applications
Management
view:
How good is
our backup?
Are we
getting our
ROI?
Percentage of
successful
backups is
critical for
mgmt. reviews
Capacity planning for
required storage
based on built-in
analytics
20. Application-consistent Recovery
Monitoring of SLAs for applications and databases
RPO and RTO have been
breached for this client. Drill
down to see detail and address
the problem
See the RPO/RTO
configuration for a
specific client and
application
21. Monitoring, Automation and Reporting
Operations orchestration for automation of backup tasks
Deploy
DP agents
to client
Step 1
Configure
the client
agent
Step 2
Create
backup
specs
Step 3
Create
schedules
Step 4
Run first
backup
Step 5
Without orchestration ▪ Set up each step manually
▪ Check documentation for specifications
▪ Apply patches
▪ Wait for each step to complete
▪ Resolve error messages
▪ Engage the next step
With orchestration
Minutes
per client*
Seconds
per client*
Backup file system
workflow example
Build omnib
Command
Run DP
Command
CheckNull
“sessionKey”
Set
sessionid
Resolved
success
Get Session
Status
Error:
failure*Based on internal testing
22. Dashboard for CIO
Key backup
KPIs brought
forward to
provide a fast
and easy
overview
• Accessible from
anywhere
• Customizible
• Available from
ITOM
Marketplace
23. More on Micro Focus Data Protection
www.microfocus.com/dataprotectorWebsite
Data Protection BlogsData Protection Blogs
Customer SupportData Protection Support
Flex Care SupportFlex Care Support
Data Protection CommunitySupport Forum
24. Thank you!
Micro Focus
https://www.microfocus.com/dataprotector
Micro Focus on Twitter:
https://twitter.com/microfocus
Micro Focus on FaceBook:
https://www.facebook.com/MicroFocus
Storage Switzerland
http://www.storageswiss.com
georgeacrump@storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
25. Application Explosion - Rediscovering
the Lost Art of Protection Service Levels
For complete audio and Q&A please register for the On Demand Version:
bit.ly/AppExplosion
Editor's Notes
Group discussion starts
George solo
George solo
George solo
DP supports mission-critical applications by using dedicated agents to offer application level data consistency. Note that additional apps are supported, check the Compatibility Matrix.
By using backup APIs for applications DP is aware of the internal features such as clustering, replication, active-passive availability groups, and can react appropriately during backup and recovery.
This approach offers indepedance of how and where applications are deployed such as physical, virtual or cloud deployments.
List of key business applications supported by DP.
Integration with leading applications
Automatically groom transaction logs
No need to manage application integration
Common interface for different applications
Full and incremental backup process
Diverse secondary storage options
Easy to manage restore
Native access is best for smaller capacities where the ammount of data is in the hundreds of GB range.
Also for ROBO envirnment where additinal Gateway hardware is not wanted because of maintenance efforts.
Native access can be easily deployed with DP agents and any client can use it directly if needed. Usually
the Cloud access is concentrated on one or a few dedicated clients which organize upload/download
as a background task.
Data is always compressed and encrypted for general security and space optimization. DP makes a cloud
backup device look like any other backup target. It is usable in the same kind of way during backup job
setup. A simple mouse-click sends data to the cloud cloud instead to a local device. Anyway if you decide to
move some of your data to the cloud later you can always use the DP Object Coyp feature to accomplish
that in an easy way.
Data Protector supports various Cloud providers e.g. for use as direct backup
devices or to offload (copy) data for archiving purposes.
IT departments are required to consistently track/manage/meet SLAs. Manual processes to do that are error prone and time-consuming; automated, intelligent dashboards can provide this information in a reliable and predictable way.
Backup Navigator, a companion product to Data Protector, provides IT staff with an intuitive and interactive dashboard and over 100 out of box reports based on 75+ key performance indicators. Using this dashboard, IT staff can immediately identify inefficiencies within the backup operations and the unbalanced use of backup resources, and uncover failures before they are exposed in the recovery process. an embedded analytics capability which helps maximize backup infrastructure and plan for future needs with advanced operational analytics.
On this summary dashboard the backup administrator can see at a glance (1) the success rate of daily backups; (2) percentage of failed backup sessions (3) tracking of RTOs and RPOs for mission applications, and (4) overview of the backup environment. The administrator can click on each of these metrics to drill down to find more information and address proactively if required.
More background on BN: Backup Navigator delivers
Simplified use of Data Protector in multi-cell deployments— centralized management of large or geographically dispersed implementations that require more than one Data Protector Cell Manager.
Multi-tenant support—support for multiple tenants in deployments that require secure access to back up operations by multiple customers such as large enterprises or Service Providers.
Intelligent dashboards—dashboard reports provide valuable insights into KPIs of the backup and recovery process, and more importantly, they’re interactive and customizable—allowing the IT administrator to filter, change, and modify views.
Real-time predictive analytics—visual foresight into the backup and recovery process based on daily use, along with trending and forecasting algorithms reveal future performance and capacity gaps and requirements specific to your data set characteristics, infrastructure capabilities, and organizational requirements.
Rapid root-cause analysis and problem solving—potential resource conflicts and systematic/systemic issues can be proactively detected and addressed before they cascade into outages and data loss that negatively impact business operations.
Collaboration and cross-system support—report creation can be automated, scheduled, and shared with stakeholders within the organization, or securely isolated and made available to external customers who rely on the backup and recovery service. The same information can be exported in a variety of formats for inclusion into other organizational systems.
Flexible, personalized reporting—extensible reports can be customized and tailored to match the specific needs of the operator, organization, or customer relying on the details to enable decision-making and trigger appropriate actions.
“What-if” scenario evaluation—intelligent insights into current backup and recovery operations before new data sets are included in the process. These insights can identify whether or not service-level agreements (SLAs) would remain achievable, identify impacts to the backup infrastructure (physical capacity, network load, device utilization, etc.), and reveal the best ways to balance the demands of new data sets within the existing infrastructure.
This application overview is perfect to show what the individual RPO/RTO ooks like per backups done. Customers can assign categories to reflect their own needs and to catch systems which are out of spec very fast.
The performance of critical applications and databases needs to be monitored constantly. Backup Navigator gathers analytical data in parallel to backup to track and manage SLAs, performance and capacity data as well as predictive information for future planning and optimization.
Backup Navigator provides some specialized dashboards to manage and track SLAs. Here you see the application overview dashboard which allows to set default and worst case recovery points for specific clients and applications. The Max RPO and Max RTO are precalcuated based on the average RPO and RTO at the time of first data collecion. Each application is added to specific group (Gold, Silver, Bronze) based on the precalculated RPO and RTO.
When RPO and/or RTO have been breached for this application, the dashboard alerts the administrator about it who can now drill down to see more detail and can address the problem.
A special „monitor“ can also be set up to alert when an RPO or RTO of an application such as Oracle database is missed. An email alert is immediately sent to the administrator about this occurance.
Operations Orchestration was annoucend with Data Protector 10.04. Our first Content Pack is available from ITOM Marketplace at https://marketplace.microfocus.com/itom/content/oo-micro-focus-solutions-content
Orchestration is the coordination of automated tasks and activities across teams, tools, and environments. Orchestration strings together disparate processes and proceduralizes essentially any process. Automation is the engine that allows the wheels of orchestration to turn. In an orchestrated IT environment, the majority of steps are automated, and manual interventions are the exception.
Here you see an example of a backup process. Traditional approach without OO will take approximately 15min/server to set up a backup process. An automated process with OO will take a few seconds.
Customer value: fewer manual tasks save time, improve productivity of the IT team and improve backup performance due to standardized workflows and less error-prone manual work.
BVD was introduced with DP 10.03. BVD is an executive dashboard which brings forward key KPIs. DP BVD integration pack is available from the ITOM Marketplace.