data protection

8
Data Protection for Virtual Data Centers Jason Buffington WILEY Wiley Publishing, Inc.

Upload: others

Post on 24-Dec-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Data Protection for Virtual Data Centers

Jason Buffington

WILEY

Wiley Publishing, Inc.

Contents Introduction xix

Chapter l • What Kind of Protection Do You Need? l

In the Beginning, There Were Disk and Tape 1 Overview of Availability Mechanisms 2

Storage Availability 3 Asynchronous Replication 7 Clustering 9 Application Built-in Availability 10 Decision Question: How Asynchronous? 11

Overview of Protection Mechanisms 12 Let's Talk Tape 12 Disk vs. Tape 14 Microsoft Improvements for Windows Backups 15

Summary 16

Chapter 2 • Data Protection by the Numbers 19

The Technical Metrics: RPO and RTO 19 Recovery Point Objective 19 Recovery Time Objective 20 Putting RPO and RTO Together 21 Making RPO and RTO Real with SLAs 21

Business Metrics: RA and BIA 24 Risk Analysis (RA): The Science of Worrying 24 Business Impact Analysis (BIA): How Much Will It Cost? 26

Risk Mitigation: Fixing It in Advance 33 Protection or Productivity? 34 Availability 34 Protection 35

Total Cost of Ownership 36 Return on Investment 37

Calculating ROI 38 Which ROI Method Is Most Accurate? 39 The Credibility Challenge of ROI 39

Turning IT Needs into Corporate Initiatives 41 Summary 42

Chapter 3 • The Layers of Data Protection 43

What Data Looks Like from the Server's Perspective 43 Hardware-centric Protection 44

Storage Level 1: Protecting Against Spindle Failure 45

Storage Level 2: Protecting Against Array Failure 51 Storage Level 3: Protecting Against Storage Node Failure 52 Storage Level 4: Protecting Against SAN Fabric Failure 54 How Disk-Based Communication Works 55 Synchronous Replication in Storage 57

File-centric Protection 60 Application-Agnostic Replication 60 How Application-Agnostic Replication Works 60 Protection and Availability 63 When to Use Application-Agnostic Availability 65

Application-centric Protection 66 Where to Store Your Protected Data 67

Tape-Based Protection 67 Disk-Based Protection 67 Cloud-Based Protection 70 Use Each Media Type for What It Does Best 72

Summary 73

Chapter 4 • Better Backups 75

Solving the Problem from the Inside Out 75 Supportability and Reliability in Legacy Backup Solutions 76 How Microsoft Addressed the Issue 77

Volume Shadow Copy Service (VSS) 77 VSS Writer 78 VSS Requestor 78 VSS Provider 78 How VSS Backups Work 79

The Windows Server Backup Utility 82 Getting Started with WSB 83 Restoring with WSB 85

System Center Data Protection Manager 87 Why Did Microsoft Build a Backup Product? 87 How Does DPM Work? 90 Getting Started with DPM 2010 96 Configuring DPM 2010 Protection 102 Restoring Data with DPM 2010 116 Using DPM 2010 in Heterogeneous Environments 135 Disaster Recovery with DPM 2010 138

Summary 141

Chapter 5 • File Services 143

File System Availability and Protection in Windows Server 143 What Is the Distributed File System? 144

Distributed File System Namespace 144 Distributed File System Replication 145 DFS Terminology 146

CONTENTS j XIII

Enabling DFS on Your Windows File Servers 147 Infrastructure Prerequisites 147 Installing DFS on Windows Server 2003 and 2003 R2 147 Installing DFS on Windows Server 2008 and 2008 R2 149

Getting Started with DFS-N 150 How a DFS Namespace Works 150 Configuring a DFS Namespace 153

Getting Started with DFS-R 160 Before DFS-R, There Was FRS 161 Key Concepts in DFS Replication 162 How DFS-R Works: Remote Differential Compression 162 How Initial Replication Works 164 Configuring DFS Replication 165 DFS Replication Options 171

Mixing DFS-R and DFS-N for Real-World Solutions 174 File Distribution 176 Branch Office Availability and Centralized Backup 177 Collaboration Between Branches 179 Migration and Growth 179

DFS Enhancements in Windows Server 2008 R2 180 Summary 181

Chapter 6 • Windows Clustering 183

Overview of Clustering in Windows Server 2008 and 2008 R2 183 Scale Out with Network Load Balancing 183 Scale Up with Failover Clustering 185 Failover Clustering Terms and Concepts 185 The Anatomy of a Failover Cluster 186

Building Your First Cluster 187 Start with Shared Storage 187 Creating Your Virtual Hands-on Environment 191 Getting Started with MSCS in Windows Server 2008 193

How Failover Clustering Works 203 The Cluster Heartbeat 203 When Failover Occurs 203

Quorum Models 204 Witness Disk (Only) 205 Node and Disk Majority 205 Node and File Share Majority 206 Node Majority 206 What Changes with the Third Node and Beyond 208

Windows Server 2008 R2 Failover Clustering 210 What's New in Failover Clustering (Windows Server 2008 R2) 211 Building Your Second Cluster Using Windows Server 2008 R2 in Hyper-V 212 Migrating to Windows Server 2008 R2 Failover Clusters 213

Summary 219

XIV CONTENTS

Chapter 7 • Microsoft Exchange 221

Exchange within Microsoft Cluster Services 221 Single Copy Clusters 221 Getting Started with SCCs 222 Failover Behavior 223 Challenges with SCC 224

Exchange 2007 Continuous Replication 227 How Does Continuous Replication Work? 227 Seeding a Database 228 Local Continuous Replication (LCR) 228 Cluster Continuous Replication 232 Standby Continuous Replication 244

Exchange 2010 Database Availability 250 Database Availability Group 250 Getting Started with DAG 255 Data Protection Considerations with DAG 262

Summary 265

Chapter 8 • Microsoft SQL Server 267

SQL Server Built-in Resiliency 267 SQL Terminology 267 Clustering or Mirroring? 268

SQL Failover Clustering 269 Preparing to Cluster SQL Server 269 Task 1: Installing SQL Server onto the First Clustered Node 272 Task 2: Installing SQL Server onto the Second Clustered Node 276 What Happens When a Database Changes Nodes? 278 Should You Cluster SQL Server? 280

SQL Database Mirroring 281 Starting the Mirror Session 282 How Mirroring Works 283 Task 3: Preparing the Database Mirror 287 Task 4: Getting Started with Database Mirroring 291

SQL Database Failover 292 Can I Get a Witness? 293 Task 5: Adding a Witness to the Mirroring Configuration 294 SQL Quorum 295 Automatic Failover 297 Manual Failover 298 Other Recovery Methods 300 Forcing Service 300 Client Connectivity 301

SQL Log Shipping and Replication 302 Introducing SQL Log Shipping 303 Task 6: Getting Started with SQL Log Shipping 303 Introducing SQL Replication 307

CONTENTS I XV

Which SQL Server HA Solution Should You Choose? 307 Backing Up SQL Server 309

The Most Important Rule in Backing Up SQL Server 309 The Other Most Important Rule in SQL Server Backups 310 Restoring Databases with DPM 2010 311

Summary 315

Chapter 9 • Virtualization 317 Virtualization Changes Everything 317 Protecting Virtual Machines 317

Challenges in Virtual Machine Protection 318 VSS-Based Backups of Virtual Machines 319 Host-Based vs. Guest-Based Backups 323 Restoring Virtual Machines 326

Availability of Virtual Machines 327 How Live Migration Works 329 Defining Clustered Shared Volumes 330 Requirements for LM and CSV 332 Getting Started with CSV 333 Backing Up CSV Configurations 342

How Virtualization Makes Data Protection and Availability Better 343 Disaster Recovery Staging 344

Legacy Options for Physical ВС/DR sites 344 Using Virtualization for Physical Server Business Continuity 345 Using Virtualization for Virtual Server Business Continuity 349

Bare Metal Recovery 349 Server Rollback 350 Summary 352

Chapter 10 • Management and Deployment 353 Well-Managed Systems for Higher Uptime 353 Large Enterprise Deployment and Manageability 354

Introducing Microsoft Systems Management 354 System Center Configuration Manager 2007 R2 and R3 355 Configuration Manager Site System Roles 356 The Configuration Manager Console 358 Asset Identification and Agent Installation 359 Centralized Software Deployment 362 Securing Resources with Software Update Management 368 Identifying Desired State Compliance 373 Deploying Operating Systems 376 Preventing Unsecure System Access 382

Virtualization Management 383 Overview of VMM 2008 R2 384 Key Features of VMM 2008 R2 387 Intelligent Placement for VMs 388 Integration with Operations Manager 389

XVI CONTENTS

Midsized Management: Physical and Virtual 398 Introducing SCE 2010 399 Getting Started with SCE 2010 399

Summary 409

Chapter n • Monitoring Systems 411 The Need for Monitoring 411 Challenges in Monitoring 412 Enterprise End-to-End Monitoring 413

Introducing Operations Manager 2007 R2 415 Getting Started with Operations Manager 418

Monitoring the Health and Performance of Key Workloads 428 Monitoring Data Protection Manager 429 Monitoring Distributed File Services 429 Monitoring Windows Failover Clustering 430 Monitoring Exchange Replication 431 Monitoring SQL Mirroring 431 Monitoring Virtualization 432

Monitoring in Midsized Organizations Using System Center Essentials 434 Introducing SCE 2010 434 Discovering Midsized Resources 435 Monitoring Midsized Environments 436 Knowledge Applied to Midsized Scenarios 438 Virtualization Monitored in Midsized Datacenters 440

Summary 441

Chapter 12 • Business Continuity and Disaster Recovery 443 What Makes ВС and DR So Special? 443

Real Business Continuity Planning 443 Regulatory Compliance 446 The Real Reason to Do Disaster Recovery 462

Get Your Data Out of the Building 463 Don't Cry "I Wasn't Ready Yet" 464 Tactical DR vs. Strategic Disaster Preparedness 465

ВС = DR + НА 465 Multiple Datacenters 466 Branch Offices' BCDR 468 Branch Offices for DR 470 Hosted Providers 470 Service Providers 471

ВС/DR Solution Alternatives 472 Application- or Workload-Specific Features 472 Application-Agnostic Replication and Failover,, 473

Using Virtualization to Achieve Business Continuity 474 Challenges with Traditional Disaster Recovery Staging 474 Disaster Recovery Staging, Virtually 475

CONTENTS XVII

Restoring Your Infrastructure within Hyper-V 478 Additional Notes on Virtualized BC/DR Sites 481

Planning for BC/DR to Get Better Backups and Availability 482 Summary 483

Where BC/DR is today 483 Where BC/DR is heading 483

Appendix • Links and Resources 485 Microsoft Software 485 Topical Resources 485

Chapter 4: Data Protection Manager 486 Chapters 4, 5, and 6: Windows Server 486 Chapter 7: Exchange 487 Chapter 8: SQL Server 488 Chapter 9: Virtualization 488 Chapters 10 and 11: System Center 488 Chapter 12: ВС and DR 489

The Author 490

Index 491