View
1.204
Download
1
Category
Tags:
Preview:
DESCRIPTION
How can maximize your storage capabilities by using IBM backup & restore solutions
Citation preview
© 2010 IBM Corporation
How can maximize your storage capabilities by using IBM backup & restore solutions
Marius Vasile – STG System Storage Manager27 ianuarie 2010Hotel Intercontinental, Sala Ronda
© 2010 IBM Corporation
IBM System Storage
2
The world is changing, enabling organizations to make faster, better-informed decisions as their systems can be madeinstrumented, interconnected and intelligent.
Instrumented
Interconnected
Intelligent
This is an opportunity for the world to get smarter.
© 2010 IBM Corporation
IBM System Storage
3
Is your critical application data adequately protected?
� Traditional once-a-night backup leaves up to 24 hours of your most recent data at risk
– How much data will you lose if your database server crashes at 5 PM?
– How much will it cost you to re-create those transactions?
� It can take many hours or days to perform a full restore from traditional backup systems
– How much application downtime can your business tolerate?
Recovery Point Objective:How much data can you afford to lose?
Recovery Time Objective:How much downtime can you afford?
© 2010 IBM Corporation
IBM System Storage
4
With this change comes an explosion in information …
… Yet organizations are operating with blind spots
Inefficient Access1 in 2 don’t have access to the information across their organization needed to do their jobs
Lack of Insight1 in 3 managers frequently make critical decisions without the information they need
Inability to Predict3 in 4 business leaders say more predictive information would drive better decisions
Variety of Information
Volume of Digital Data
Velocity of Decision MakingSource: IBM Institute for Business Value
© 2010 IBM Corporation
IBM System Storage
5
Building the infrastructure for a Smarter Planet
Support your information retention policies
Retention
Reduce reputation risks and audit deficiencies
Compliance
Protect and enable secure sharing of information
Security
AvailabilityDeliver continuous and reliable access to information
© 2010 IBM Corporation
IBM System Storage
6
Themes for Information Infrastructure 3Q09
6
Positive Negative Neutral
© 2010 IBM Corporation
IBM System Storage
7
Business continuity depends on data recovery
� Business-critical data exists throughout the enterprise:
– Application servers in the data center– Remote and branch offices
– Employee workstations
– Disaster recovery sites� Businesses of all types are facing unprecedented
challenges to keep more information available, all the time
– They can’t afford to lose any data, and they can’t afford to be without it for very long
– Losing access to data causes downtime
� The costs of downtime and lost data are escalating:– Lost revenue streams and customer confidence
– Embarrassment in the marketplace
– Contract penalties, regulatory fines, legal action
What can go wrong?� Deleted files� Corrupted database� Virus/hacker attack� Disk crash� Server crash� Local disaster� Regional disaster
Can you quickly recovery from each?
© 2010 IBM Corporation
IBM System Storage
8
IBM System Storage – Offering Matrix
Storage Solutions� DR550 archive and compliance storage� Grid Access Manager, GMAS� Smart Business Storage Cloud (SBSC)� Storage Encryption Solutions (TKLM) � Comprehensive Data Protection Solution (CDPS)
Storage Software� SAN Volume Controller� Tivoli Storage Productivity Center� IBM Tivoli Storage Manager� IBM Tivoli Storage ManagerFastback� IBM Tivoli Storage FlashCopy Manager
Disk Systems� IBM XIV – Grid Storage� DS8000 - Enterprise Class� DS5000 - MidRange� DS3000 - Entry
Tape Systems� Tape Virtualization� Tape Libraries� LTO Tape Drives� Enterprise Tape Drives
Network Attached Storage (NAS)
� N series
Networking� Fibre Channel� Ethernet� Fibre Channel over Ethernet
Deduplication� ProtecTIER Deduplication Appliances� ProtecTIER Deduplication Gateway
© 2010 IBM Corporation
IBM System Storage
9
� Integrated target-side data deduplication
� Built-in ‘selective replication’� Comprehensive reporting,
leverages Tivoli Common Reporting
� Tight integration with Tivoli Storage Manager
� TSM FastBack for Workstations: optional protection for laptops & desktops
Introducing Tivoli Storage Manager FastBack v6.1
� Block-level, incremental-forever, continuous or scheduled backup for Windows and Linux servers
� Near-instant restore of any type / amount of Windows application data– Near-instant access to Linux data via FastBack Mount
Central Control Station
HQ / Data CenterRemote Office(s)
IBM Tivoli Storage Manager FastBack
Exchange SQL/DB2 Oracle/SAP File/Print
Tivoli Storage Manager
Disaster Recovery Site
Central Control Station
HQ / Data CenterRemote Office(s)
IBM Tivoli Storage Manager FastBack
Exchange SQL/DB2 Oracle/SAP File/Print
Tivoli Storage Manager
Disaster Recovery Site
New
New
New
New
New
© 2010 IBM Corporation
IBM System Storage
10
FastBack for Workstations
FastBack Server
FastBack Server
Tivoli Storage Manager Server
Tiers of Storage
Application Servers File Servers
VMware Servers
Application Servers File Servers
VMware Servers
WAN
FastBack Clients
FastBack Clients
Remote Office(s) Data Center D/R Site
TSM B/A Clients
TSM FastBack is part of IBM’s Unified Recovery Management solution suite
� Tivoli Storage Manager : enterprise-class data management includes backup, archive, HSM, support for hundreds of devices and a broad range of operating systems
� Tivoli Storage Manager FastBack : next-generation backup and near-instant restore for critical servers; backup consolidation & disaster recovery for remote offices; and more …
� Tivoli Storage Manager FastBack for Workstations : continuous data protection (CDP) for desktop and laptop systems with centralized management
New
© 2010 IBM Corporation
IBM System Storage
11
Scalable Capacity and Performance
Highest PerformanceHighest PerformanceLargLargest CapacityHigh AvailabilityHigh Availability
Better Performance
Larger Capacity
Scalable
Better Performance
Larger Capacity
Scalable
Good PerformanceGood Performance
Highly ScalableHighly Scalable
Low costLow cost
Highest Performance
Largest Capacity
Highest Performance
Largest Capacity
Up to 500 MB/secUp to 500 MB/sec
36 TB useable36 TB useable
Up to 100 MB/secUp to 100 MB/sec
7 TB useable7 TB useable
Up to 250 MB/secUp to 250 MB/sec
18 TB useable18 TB useable
ActiveActive --Active ClusterActive Cluster
Up to 500 MB/secUp to 500 MB/sec
36 TB useable36 TB useable
IBM TS7650 ProtecTIER® Deduplication Family
High PerformanceHigh PerformanceHigh CapacityHigh Capacity
Flexible StorageFlexible Storage
Highest PerformanceHighest Performancelargest Capacitylargest CapacityHigh AvailabilityHigh Availability
Single NodeSingle Node
Up to 500 MB/secUp to 500 MB/sec
1 PB useable1 PB useable
ActiveActive --Active ClusterActive Cluster
Up to 1000 MB/secUp to 1000 MB/sec
1 PB useable1 PB useable
TS7650G GatewaysTS7650G Gateways
TS7650 ApplianceTS7650 Appliance
© 2010 IBM Corporation
IBM System Storage
12
� Pre-configured for rapid deployment into existing backup environments
� Extremely powerful solutions, featuring:
� IBM ProtecTIER software with patented HyperFactor™ deduplication technology
� IBM System x Server – multi-core server for enterprise-level performance
� IBM Storage Controller with Fibre Channel drives - Proven reliability and performance
� Complete solution that includes rack, cables, switches, and everything that is needed
IBM TS7650 ProtecTIER® Deduplication Appliance
© 2010 IBM Corporation
IBM System Storage
13
� Powerful and Flexible solution, featuring:
� IBM ProtecTIER software with patented HyperFactor™ deduplication technology
� IBM System x Server – multi-core server for enterprise-level performance
� Supports both IBM & Non-IBM disk
� IBM DS4000, DS5000, DS8000 and XIV
� HDS, EMC and others
� And delivers:
� Up to 500 MB/sec
� Up to 25 times or more data reduction
� Scalable to 1PB physical capacity
� Enterprise-class data integrity
TS7650G ProtecTIER Deduplication Gateway
TS7650G ProtecTIER Deduplication Gateway
© 2010 IBM Corporation
IBM System Storage
14
� Our most Powerful and Flexible solution:
� IBM ProtecTIER software with patented HyperFactor™ deduplication technology
� 2 IBM System x Servers – multi-core servers for maximum performance & availability
� Supports both IBM & Non-IBM disk
� IBM DS4000, DS5000, DS8000 and XIV
� HDS, EMC and others
� And delivers:
� Up to 1000 MB/sec
� Active-active cluster technology
� Two nodes working together as one repository
� Easily manageable yet highly scalable
TS7650G ProtecTIER Deduplication Cluster
TS7650G ProtecTIER Deduplication Cluster
© 2010 IBM Corporation
IBM System Storage
15
Repository
Backup Servers
ProtecTIER™Server
HyperFactor™
New Data Stream
“Filtered” data
MemoryResident Index
Only 4GB needed to map 1PB of physical disk!
Inline deduplicationUp to 500MB/sec per server or
1000MB/sec with 2 node cluster!
How ProtecTIER works
© 2010 IBM Corporation
IBM System Storage
16
Physical capacity
ProtecTIERGateway
Backup Server
Backup Server
Represented capacityPrimary Site
Physical capacity
ProtecTIER GatewayBackup
Server
Secondary Site
IP-based WAN link
Tape library
Virtual cartridges can be cloned to
tape at DR site
New Reality with ProtecTIER Native Replication Solution
Deduplication enables a large amounts of data to be replicated with significantly less bandwidth
© 2010 IBM Corporation
IBM System Storage
17
� One-to-one replication from primary to a DR-site� Flexible policy driven replication
– Choose which cartridges to replicate – one, some or all– Assign priorities and schedule when replication should occur
� Define cartridge “visibility”– Determine “where” virtual cartridges “exist” from ProtecTIER and/or backup
application standpoint– ProtecTIER native replication will emulate moving tapes in & out of VTL’s
import/export slots– Allows users to use the VTL export/import slots via backup app to “move”
cartridges from one library/site to another
� Manage and monitor operations during disaster– Fail-over (when Disaster occurs) & Fail-back (to normal operation)
IBM ProtecTIER Native Replication Features
© 2010 IBM Corporation
IBM System Storage
18
Primary-site Backup Servers
Primary site TS7650 ProtecTIER
Data is de-Duped & backed-up into repository
2
1
3
5
4
6
8
7
9
Per policy:Tapes7, 8, 9 are replicated into DR repository – only unique data is transferred
2
1
3
2
1
3
2
1
3
2
1
3
IP connection
8
7
9
Create your policy (per library) Choose which tapes (7, 8, 9) should be replicated to DR site
Choose the time frame for replication to take placeAnd the priority among policies
Primary site backup disk
DR-site Backup Server
DR-site TS7650 ProtecTIER
DR-site backup disk
Tape library
8
7
9
DR-site NBU server is scanning the library & updating its catalogue
OR The catalogue could be replicated as well, thus allow immediate use of the library if/when needed
User may decide to clone cartridges to physical tape
8
7
9
The DR site can become Primary-site (can backup new data) until….
Primary site comes back on line
(new cartridges are being replicated to primary repository)
In case a disaster hit the Primary site…
Note that in this config the DR-site B/U server shou ld be stand alone and only become part of the Primary dom ain when IT becomes the Primary server (during a “disa ster”)
Tape clones receive new
barcode through B/U app
Any cartridge(s) can be
replicated back when needed
Native Replication Functionality (Example)
© 2010 IBM Corporation
IBM System Storage
19
� Data Growth Straining Backup & Disaster Recovery En vironments� Reliability and Manual Intervention:
– Current methods require too much manual intervention– Human intervention increases opportunities for failure
� Security Risks:
– Transporting data on tape poses a significant risk to data security
– Handling tapes creates additional “failure” opportunities• Human error is culprit 24 percent of the time*
� Disaster Recovery Planning & Testing Challenges:
– Difficult to test DR plans using physical tape media
– Restoring data from tape too slow to enable adequate testing
� Costs:– Seven of 10 IT administrators struggling with increased costs of off-site data
storage– Complexity and growth greatly increasing cost of operations
Challenges Associated with Today’s Reality
* According to recent survey by Symantec Corporatio n
© 2010 IBM Corporation
IBM System Storage
20
Themes for Information Infrastructure 3Q09
20
Positive Negative Neutral
© 2010 IBM Corporation
IBM System Storage
21
© 2010 IBM Corporation
IBM System Storage
22
Thank You!
Marius Vasile – STG Storage Sales Managermarius.vasile@ro.ibm.com
Lucian Vlaicu – Field Technical Sales Support - Storage lucian.vlaicu@ro.ibm.com
IBM Website: www.ibm.com/ro
IBM Innovation Center – Bucharest Business Park
© 2010 IBM Corporation
IBM System Storage
23
Disclaimers
� Copyright © 2009 by International Business Machines Corporation.� This publication is provided “AS IS.” IBM product in formation is subject to change without notice.� No part of this document may be reproduced or trans mitted in any form without written permission from I BM Corporation. Product data has been
reviewed for accuracy as of the date of initial pub lication. Product data is subject to change withou t notice. � This document could include technical inaccuracies or typographical errors. IBM may make changes, impr ovements or alterations to the products,
programs and services described in this document, i ncluding termination of such products, programs and services, at any time and without notice. Any statements regarding IBM’s future direction and int ent are subject to change or withdrawal without not ice, and represent goals and objectives only. The information contained in this document is current a s of the initial date of publication only and is su bject to change without notice. IBM shall have no responsibility to update such information.
� Information concerning non-IBM products was obtaine d from the suppliers of those products, their publi shed announcements or other publicly available sources. IBM has not tested those products in conn ection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products.
� IBM makes no representations or warranties, express ed or implied, regarding non-IBM products and servi ces, including those designated as ServerProven.
� IBM is not responsible for the performance or inter operability of any non-IBM products discussed herei n. Performance data for IBM and non-IBM products and services contained in this document wa s derived under specific operating and environmenta l conditions. The actual results obtained by any party implementing such products or services wi ll depend on a large number of factors specific to such party’s operating environment and may vary significantly. IBM makes no representation that the se results can be expected or obtained in any imple mentation of any such products or services.
� MB, GB and TB equal 1,000,000, 1,000,000,000 and 1, 000,000,000,000 bytes, respectively, where referrin g to storage capacity. Actual storage capacity will vary based upon many factors and may be less than s tated. Some numbers given for storage capacities gi ve capacity in native mode followed by capacity using data compression technology.
� THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS-IS ” WITHOUT ANY WARRANTY, EITHER EXPRESSED OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNES S FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreem ents (e.g., IBM Customer Agreement, Statement of Li mited Warranty, International Program License Agreement, etc.) under which they are provided.
� References in this document to IBM products, progra ms or services does not imply that IBM intends to m ake such products, programs or services available in all countries in which IBM operates or does business. Consult your local IBM business con tact for information on the product or services available in your area. Any reference to an IBM pro gram or product in this document is not intended to state or imply that only that program may be used. Any functionally equivalent program or produc t that does not infringe IBM’s intellectual propert y rights may be used instead. It is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program or service.
� IBM's customer is responsible for ensuring its own compliance with legal requirements. It is the custo mer's sole responsibility to obtain advice of competent legal counsel as to the identification an d interpretation of any relevant laws and regulator y requirements that may affect the customer's business and any actions the customer may need to t ake to comply with such laws. IBM does not provide l egal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
� The provision of the information contained herein i s not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses sh ould be made, in writing, to:
IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785U.S.A.
© 2010 IBM Corporation
IBM System Storage
24
Trademarks� IBM, the IBM logo and ibm.com are trademarks or regi stered trademarks of International Business Machine s Corporation in the United
States, other countries, or both. If these and othe r IBM trademarked terms are marked on their first o ccurrence in this information with a trademark symbol (® or ™), these symbols indicate U. S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be register ed or common law trademarks in other countries. A c urrent list of IBM trademarks is available on the Web at "Copyright and trademark in formation" at www.ibm.com/legal/copytrade.shtml
� Java and all Java-based trademarks are trademarks o f Sun Microsystems, Inc. in the United States, other countries, or both.� Microsoft, Windows, Windows NT, and the Windows log o are trademarks of Microsoft Corporation in the Un ited States, other countries, or
both.� Intel, Intel Inside (logos), MMX and Pentium are tr ademarks of Intel Corporation in the United States, other countries, or both.� UNIX is a registered trademark of The Open Group in the United States and other countries.� Linux is a trademark of Linus Torvalds in the United States, other countries, or both.� Linear Tape Open, LTO and Ultrium are trademarks of Hewlett Packard, IBM and Certance in the United St ates, other countries or both."� Cisco and IOS are registered trademarks of Cisco Sy stems, Inc. and/or its affiliates in the U.S. and c ertain other countries.� Other company, product, or service names may be tra demarks or service marks of others.
Recommended