www.doubletake.com double-take software overview a platform for recoverability
TRANSCRIPT
www.doubletake.com
Double-Take Software OverviewDouble-Take Software Overview
A Platform for Recoverability A Platform for Recoverability
www.doubletake.com
AgendaAgenda
• Introduction to Double-Take Software
• Double-Take Software Products and Technology
• Client testomonial
• Q & A
www.doubletake.com
About Double-Take Software, Inc.About Double-Take Software, Inc.
• Headquartered in Southborough, MA• Worldwide Reach - North America, South America,
Europe, Pacific Rim• Focused on the protection of business-critical applications
– 125,000 licenses of Double-Take in over 10,000 customers
– 35,000+ licenses protecting Exchange
– 35,000+ licenses to protecting SQL
• Comprehensive Professional Services Offerings• Prestigious Microsoft Certifications
Leading Provider of Software Solutions for Recoverability Including Continuous Data Replication, Application Availability and System State Protection.
www.doubletake.com
Your Solution NeedsYour Solution Needs
• What challenges are you facing in your DR plan?
• What types of servers do you want to protect?
• About how much data do you have to protect?
• Have you chosen a DR Site?
• What kind of connection will you have?
• Do you have an RTO and RPO defined?
www.doubletake.com
The Keys to RecoverabilityThe Keys to Recoverability
ReplicationHost-based, real-time, byte-level, asynchronous replication across any distance with WAN optimization to minimize bandwidth usage and requirements
FailoverReal-time monitoring for automatic or manual failover for individual applications, file shares, and whole servers - locally or remotely
RecoveryRecover data or entire servers over any distance while users remain online, with minimum downtime
www.doubletake.com
Data ProtectionData Protection
• System Friendly Asynchronous Replication– Low CPU Overhead– Defined Memory and Disk Usage– Write Order Intact Replication
• Bandwidth Friendly Data Movement– User-definable Replication Sets– Compression, Scheduling, Scheduled Bandwidth
Throttling capabilities
• Point-in-Time Recovery– Integration w/Volume Shadow Copy Services
www.doubletake.com
Double-Take – Technology OverviewDouble-Take – Technology Overview
Applications
OS
Disk Systems
Source
Applications
OS
Disk Systems
Target
Double -Take Filter
www.doubletake.com
Double-Take – Technology OverviewDouble-Take – Technology Overview
Protected File?
Write or Change?
Applications
OS
Disk Systems
Source
Yes
No
I/O Operations examined in Kernel Memory
www.doubletake.com
Double-Take – Technology OverviewDouble-Take – Technology Overview
Applications
OS
Disk Systems
TargetAlways:
Same I/O order
Same Data
Same File
Option:
Different Directory
www.doubletake.com
Double-Take – Queuing and Error CorrectionDouble-Take – Queuing and Error Correction
Applications
OS
Disk Systems
Source
Applications
OS
Disk Systems
Target
Double-Take Filter
RcvQueue
AckQueue
SendQueue
www.doubletake.com
Failover SolutionsFailover Solutions
• Application-Level Failover (RTO = ~30min)– Applications like Exchange, SQL and File Servers using
the Application Manager capabilities– Works with Cluster-based Deployments
• Full-Server Failover (RTO = ~30min)– Custom-developed applications or applications
dependent on system state information– Replicate and Failover OS, Applications and Data– Works for all stand-alone Windows Servers– Assists in One-to-One Server Migrations
www.doubletake.com
How Application Failover WorksHow Application Failover Works
Failover Monitoring
Replication
• IP ICMP or Heartbeat Monitoring
• Detect Failure in Seconds or Minutes
• Application Services Started
• Failover Name, IP and/or DNS Records
• Failover Active Directory Hostname
• Users can reconnect within minutes of failure
• Failover can occur across a LAN, WAN and even NAT
• Failover more than one Server Identity to the Same Target Server
• Failover Scripting for Custom Configurations
Source Target
www.doubletake.com
How Application Failback WorksHow Application Failback Works
Failover Monitoring
Restoration
Source Target
• Recover or Replace Source Server
• Restore Data to the Source Server
• Failback Source Identity
• Bring Source Application Online
• Users Reconnect Within Minutes
• Start Replication and Resume Failover Monitoring for Continued Protection
Replication
www.doubletake.com
How Full-Server Failover WorksHow Full-Server Failover Works
OS and Applications
Data Volumes
User and Application Data
Staging Area
www.doubletake.com
Server Recovery OptionServer Recovery Option
• Tier 2/Tier 3 Server Recovery (RTO = 4-24 hours)• Same Recovery Type as FFO• Local, Remote or Both• Restore to Physical or Virtual Systems• Assists with “Swing-Server” Migrations
www.doubletake.com
Double-Take Server Recovery OptionDouble-Take Server Recovery Option
Protect Multiple Production Servers With One SRO
Image Server
Recover Back to the Original Server, to New Hardware, or to a
Virtual Machine
www.doubletake.com
Double-Take Virtual Recovery AssistantDouble-Take Virtual Recovery Assistant
• Protect physical or virtual servers directly into VMWare .VMDK files with real-time replication
• Protect the entire server including the OS, applications and data
• Protect multiple source servers with a single virtual target server
• Failover automatically or manually within minutes
• Lower TCO with virtualization and many-to-one consolidation.
www.doubletake.com
Virtual Recovery AssistantVirtual Recovery Assistant
FS-System.vmdk
FS-Data.vmdk
EX-System.vmdk
EX-Data.vmdk
DB-System.vmdk
DB-Data.vmdk
C: System.vmdk
DT-VRAFS-System
FS-Data
File Server
Exchange
Database
C:
E:
EX-System.vmdk
EX-Data.vmdk
DB-System.vmdk
DB-Data.vmdk
C: System.vmdk
DT-VRA
FS-System.vmdk
FS-Data.vmdkFile Server
C:
E:EX-System
EX-Data
C:
E:
DB-System
DB-Data
C:
E:
www.doubletake.com
How DTVI WorksHow DTVI Works
• Must be running ESX Server 3.0.0 and VMware VirtualCenter 2.0.0
• Leverages VMware APIs for virtual machine snapshot functionality
• Snapshots include the entire VM (OS, Apps, Data) and can be used with a non-Windows Guest OS
• Snapshots are time-coherent across all virtual disks configured for a protected virtual machine
• Extends staging of virtual machines across geographical boundaries (WAN replication)
www.doubletake.com
*-delta.vmdk*.vmsd
*-delta.vmdk*.vmsd
Replicating (SCP)*-delta.vmdk*.vmsd
How DTVI WorksHow DTVI Works
*.vmdk*-flat.vmdk*.vmx
Synchronizing (SCP)
Committing (remove_snapshot)
Source VM Files Replica VM Files
AdministrativeClient
Source ESX Server
Datastore (Source)
Target ESX Server
Datastore (Target)
SSH SSH
WebServices
*.vmdk*-flat.vmdk*.vmx
Monitoring (Time/Size)
www.doubletake.com
Greg SaraydarianGreg Saraydarian
Financial Services OrganizationFinancial Services Organization
www.doubletake.com
Customer SolutionCustomer Solution
• Solution set for data protection and availability
• Used:– Double-Take Replication
– Double-Take Application Manager
• Protecting/has protected several versions of Exchange Server