xtium data gathering guide
TRANSCRIPT
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 1/13
Disaster Recovery Data Gathering GuideProvided by Xtium, Inc. © 2013
DISASTER RECOVERY
DATA GATHERING GUIDE
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 2/13
Data Gathering Template provided by Xtium © 2013
Introduction
In order to build a disaster recovery run book, you are going to need a full blueprint of your IT systems. But often there are
numerous teams that support your IT infrastructure or even individual applications or servers, and with the knowledge of
your IT ecosystem stored disparately between many minds, it may be difficult to build a run book by yourself.
So, even before tackling your run book, bring your teams’ knowledge together to create a full picture of your IT system
with this data gathering guide. Not only will it give multiple people and teams within your company the ability to create or
fill in missing pieces of your disaster recovery run book, but it will also help your IT teams understand how they interact
with each other and with your data.
The data gathering guide is used to create an overall blueprint of your business systems and applications. It will provide
the building blocks of your run book, which will also contain instructions for the order of restoration following a disasterscenario, roles and responsibilities, contact information, and standard operating procedures.
When developing your data gathering guide, start at the outside of your systems and work your way in. Begin at the outer
walls of your infrastructure, document your carriers, the location of your data lines, and their demarcation points into your
data center location(s). Next, capture networking layers including f irewalls, load balancers and virtual local area networks.
Finally, drill down to document your server infrastructure.
Once you have documented your entire primary production system, it is also critical to document your disaster recovery
system, sometimes referred to as a failover or backup system. When doing so, include details on the frequency with which
production systems are mirrored into your secondary (failover/backup) system.
Note: If your company has an existing configuration management database or a CMDB methodology in place, be sure to
align the information you collect here with the configuration item (CI) schema. The data gathering form and the run book
are also ways to validate and check existing CMDB systems.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 3/13
Data Gathering Template provided by Xtium © 2013
1. Connectivity
Begin by documenting your data carriers, demarcation points of your data lines, and connectivity gear. This is an “outside -in”
approach that follows your data from outside your data center through the networking layers and into your server infrastructure.
Examples are provided in the table below.
Service
Provider Circuit Type Bandwidth CPE
CPE Gear
Model Address
Switch/Telecom
Closet Notes
Level 3 Internet 100MB No 123 Address
Blvd
Floor 5
Frame 22.1
Rack 5
Primary
Internet circuit
Verizon MPLS 10MB Yes Cisco 3650 Connectivity to
remote office
ATT Internet 10MB No Backup Internet
connectivity
When noting each connection’s demarcation point,
include the address where the line terminates as well as
where the line continues inside the data center location.
Next, include the floor, server room, switch closet, rack
and frame information where the line terminates.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 4/13
Data Gathering Template provided by Xtium © 2013
2. Network Gear
Next, capture networking layers including firewalls, load balancers and virtual local area networks. Examples are provided
in the table below.
Make/Model Description for use Originating IP Destination IP
Switches
Juniper 4400 LAN connectivity 1.132.10.220 1.120.10.240
Cisco 3650 MPLS connectivity
Router
Cisco 7300 Internet Gatewayrouter
Cisco 891W Internet Gateway
router
Load Balancers
Citrix MPX-7500 Layer 4 load
balancing, session
persistence
Identify originating and destination
IP addresses for all network gear.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 5/13
Data Gathering Template provided by Xtium © 2013
VPNs
Juniper SRX 100 Remote user SSL
connectivity
Firewalls
Juniper SRX 100 Network security
segmentation
Network Security
Appliances
Cisco PIX 535 IP Firewall
Identify whether each of your virtual private networks
are IPSec VPNs, Point-to-Point VPNs, or internal VPNs.
Listing details for any Intrusion Detection Systems (IDS)
or Intrusion Protection Systems (IPS) helps provide
additional insight into the security measures currently in
play in your network.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 6/13
Data Gathering Template provided by Xtium © 2013
3. Server Inventory
It is useful to identify both your production and disaster recovery servers separately, as exemplified in the following two
charts. Doing so will provide a snapshot of your server landscape and delineate which servers are used in your production
environment as opposed to those used for disaster recovery in the event of an emergency.
One of the most important columns in the following two charts is the “priority” column, which specifies the relative
importance of your servers based on the applications or systems they support. In the event of a disaster scenario, it is
critical to know the priority for bringing up your servers. Typically, the most critical servers (marked “1” for “high priority”)
include those running your email systems and other business application servers. Level 2 priority servers often include
web servers, while file servers are usually classified as level 3. Of course, restoring data from all of these servers is
important, but restoring mission-critical business processes as quickly as possible should always be your priority.
Tip: Throughout the entire data gathering guide, there will always be the opportunity to include admin login information.
While it might be useful to associate login information with the appropriate servers or applications, make sure to not
break any security policies by documenting authentication elements in an open document. As an alternative, you might
opt to include a user ID but not the password (which you may keep in some other user access control program).
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 7/13
Data Gathering Template provided by Xtium © 2013
1. Production
Server
Name Priority Type
Physical/
Virtual
DB
Server Cores
RAM
GB
T1
Storage
GB
T2
Storage
GB
T3
Storage
GB
BU
Disk
GB OS Version
Application /
System Connections
Mail01 1 Exchange
2013
V
VM 10.2
4 8 1000 1500 Win
Std
Win
2012
Mail Server
App01 2 App
Server
V 2 4 300 450 Win
Std
Win
2012
Accounting Web01
Web15
DB01
SQL01 2 SQL
2012
V 1 4 8 500 1500 Win
Std
Win
SQL8
Accounting
Database
Web01 3 Web
Server
P 2 4 100 150 Win
Std
Win
2012
IIS
Xtium recommends allocating 1.5 times the production storage size for your backup
infrastructure. This is the standard we use for our customers and within our own
company. We use this standard to account for daily rate of change and any variability
in daily workloads. Providing this additional buffer will always ensure that your
backups run completely and your production server’s protection level is complete.
Specify all related upstream (web) and downstream
(database) connections in this column in order to better
understand the servers that are one connection away
from the server in each column. When building your run
book, this will help provide a visual of your overall
environment.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 8/13
Data Gathering Template provided by Xtium © 2013
2. Disaster Recovery
Server
Name Priority
Server
Type
Physical/
Virtual
DB
Server Cores
RAM
GB
T1
Storage
GB
T2
Storage
GB
T3
Storage
GB
BU
Disk
GB OS Version
Application /
System Connections
Mail01 1Exchange
2013V 4 8 1000 1500
Win
Std
Win
2012Mail Server
App01
2 App
ServerV 2 4 300 450
Win
Std
Win
2012 Accounting
Web01
Web15
DB01
SQL012 SQL
2012
V 1 4 8 1000 1500Win
Std
Win
SQL8
Accounting
Database
Web01 3 Web
ServerP 2 4 100 150
Win
Std
Win
2012IIS
It is helpful to list your servers in their order ofimportance/restoration priority so that, during
disaster recovery testing or in the event of a real
disaster, you have an easy snapshot of servers to
focus on first.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 9/13
Data Gathering Template provided by Xtium © 2013
3. Totals
Use this table to keep track of your servers from the previous two tables. This will provide a good at-a-glance
understanding of your overall environment to ensure you are not missing any items.
Production Secondary / Failover / DR Total
Physical
Virtual
DB Server
Cores
RAM
Storage Total
Tip: This table can also serve as a sanity check for your infrastructure and licensing. For example, sometimes the
footprint of an infrastructure environment looks larger than individual systems. If so, ask: did you actually expand, or did
you realize a particular system encompassed more than you thought? Whatever the scenario, it is important to
understand what is happening in your environment and be ready to use this data in your disaster recovery run book.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 10/13
Data Gathering Template provided by Xtium © 2013
T1 Disk
T2 Disk
T3 Disk
Back Up
Windows
Standard
Enterprise
Linux
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 11/13
Data Gathering Template provided by Xtium © 2013
4. Application Info
Keep detailed records on all of your critical business applications so the information is available for your run book. This
section provides an example that Xtium uses when hosting solutions for Microsoft Exchange and Active Directory, both
very common (and critical) business applications.
Regardless of the application, be sure to list and understand connection points, versions, configurations and users.
Exchange:
Exchange mail
server Version of Exchange Configuration Items of note
Size of message
store
Mail01 Exchange 2013 Release 1, Service
Pack 3
35 2 TB
These application tables are not meant to diagram the system but, rather, to capture
what applications are running on your infrastructure with specific information about
each application stack. Your run book will tie together your physical server inventory
and application inventory. These tables simply house the data that will be brought
together in your run book to show the overall system architecture and restoration
processes within that architecture.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 12/13
Data Gathering Template provided by Xtium © 2013
Active Directory server:
Server Name
Software
version/build/release Standalone or System? Role
Directory01 5.1 Standalone
Include group roles managed by each directory.
8/13/2019 Xtium Data Gathering Guide
http://slidepdf.com/reader/full/xtium-data-gathering-guide 13/13
Data Gathering Template provided by Xtium © 2013
Questions about this guide or about disaster preparedness for your business?
Contact Us! [email protected]
800-707-9116