Upload
scott-pelletier
View
1.222
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
Welcome to Lewan & Associates IT Solutions Division
Storage Training
Welcome to Lewan & Associates IT Solutions Division
Agenda
Lewan/Speaker Background Setting the Stage Data Classification and The Cube 4 Buckets of Storage Data Efficiency
Welcome to Lewan & Associates IT Solutions Division
Speaker Information
Scott Pelletier – VP Technology [email protected] @scottpelletier http://blog.lewan.com
Welcome to Lewan & Associates IT Solutions Division
WHY LEWAN
• Customer-‐focused
• Superb engineering talent
• Cross technology offerings and op9ons
• Local talent and solu9ons, global strength
• Process driven
• Sa9sfac9on guaranteed
Welcome to Lewan & Associates IT Solutions Division
TECHNOLOGY SOLUTIONS Innovative and reliable IT solutions are in our DNA.
Data Center blade systems, stand-‐alone servers, server virtualiza9on, range of opera9ng systems, informa9on lifecycle management, SAN/NAS, storage management, data de-‐duplica9on, backup/recovery, archival, tape libraries
Network voice over IP, call center, rou9ng/switching, telepresence/collabora9on, wan accelera9on, circuits, wireless, firewalls, VPN, access control, IDS/IPS
Applica2on Delivery & Applica2ons business produc9vity applica9ons, email, directory services, file/print, desktops, laptops, desktop virtualiza9on, thin clients, mobility, an9-‐virus, an9-‐spam
Welcome to Lewan & Associates IT Solutions Division
MANAGED SERVICE SOLUTIONS Ensure your technology is there when you need it.
Analyze & Plan technology analysis and recommenda9ons, refresh/upgrade planning, disaster recovery planning, ITIL assessments, technology strategy
Implement & Train architecture, detailed design, installa9on, configura9on, development, migra9on, documenta9on, policies/procedures and compliance, knowledge transfer, custom training
Manage & Maintain enhanced technology monitoring, reac9ve issue resolu9on, proac9ve preventa9ve maintenance, health checks, full (ITIL-‐based) technology lifecycle management, service desk
Staff staff augmenta9on to supplement your exis9ng team
Welcome to Lewan & Associates IT Solutions Division
KEY VENDORS
• Microsoft • Fortinet • Kaviza
• VMware • Citrix • Appsense • Cisco • NetApp • Dell • CommVault • HP
• Cisco • Lifesize
• N-Able • ConnectWise • Asigra • Microsoft
Welcome to Lewan & Associates IT Solutions Division
Today We Will Discuss 3 Things
Shred
Offline
Importance
Performance
File
Block
Lifecycle
Nearline
Online
Critical
Essential
Necessary
Desirable
Primary Backup / Recovery
Disaster Recovery
Archive
The Cube 4 Buckets Storage Efficiency
Welcome to Lewan & Associates IT Solutions Division
Setting the stage
What is data classification (high-level) How might classifying your data drive
infrastructure choices
Welcome to Lewan & Associates IT Solutions Division
Data Classification and The Cube
Shred
Offline
Importance
Performance
File
Block
Lifecycle
Nearline
Online
Critical
Essential
Necessary
Desirable
Welcome to Lewan & Associates IT Solutions Division
Data Classification Metrics
Importance – The importance of data to an organization is based on the impact of the data on the business functions it supports.
Performance – The performance requirement for data is important to an organization due to the competitive advantage gained by providing fast access to information the business and its users need.
Lifecycle – The lifecycle of information has a significant impact on how the information should be treated within a storage environment. Some criteria that impact lifecycle are compliance, legal exposure, long term reporting and reference of the data for business purposes.
Welcome to Lewan & Associates IT Solutions Division
Impacts on Architecture
Real-time Protection - Approach for protecting data against hardware failure of one (or more) physical components (e.g., disk, power supply, controller, etc.). This type of protection is more real-time in nature and is intended to protect against a physical problem.
Point-in-time Protection - Approaches for protecting data against both catastrophic hardware failures and corruption (due to hardware/software failure or human error).
Geographic - Approach for protecting data against site failure. Live data is copied, by some mechanism, over a network to a remote site. Various strategies exist from scheduled file copy to live, synchronous bit-by-bit replication.
Long Term Protection - Approach allowing for continued availability of data that is less likely to be accessed, but still has some importance to the business. Archived data is normally stored on lower performance media and is not as readily available to an end user.
Security – Approach for securing information from unauthorized access (accidental or intentional), modification, destruction, or disclosure.
Welcome to Lewan & Associates IT Solutions Division
Importance
Welcome to Lewan & Associates IT Solutions Division
RTO & RPO Defined
• The Recovery Time Objective (RTO) helps us understand the maximum time tolerated to recover a system to a functional state before experiencing extreme business impact.
• The Recovery Point Objective (RPO) determines how much data could be lost, before experiencing extreme business impact.
• These metrics are measured in time and the worst-case data point for a system to be recovered is effectively the time for each measurement added together.
• Affect real-time, point-in-time and geographic protection strategy
Welcome to Lewan & Associates IT Solutions Division
Performance Metrics
Welcome to Lewan & Associates IT Solutions Division
Common Metrics
Response time – less is better • <1ms = excellent, <10ms=good, <25ms=usually acceptable
IOPS – IO’s per second • size of the IO matters • Number of disk spindles is critical • More important for general purpose apps (DB, file, Mail) • RAID adjusted IOPS
MB/s - Throughput measurement • Larger IO’s perform better • Number of spindles less critical • More important for streaming, D2D applications
Welcome to Lewan & Associates IT Solutions Division
Lifecycle
Time after creation
Bus
ines
s R
elev
ance
Immediate needs
accountability
seeking evidence
Re-use Future Reference
Source: Jan Möller, Ministry of Transport, NL
Welcome to Lewan & Associates IT Solutions Division
Data Lifecycle
• Long-term access to information, compliance and risk mitigation during legal discovery.
• Common for IT to use their backup systems as archival systems • Automatic archiving and data movement or placement is key • Providing eDicsovery
Welcome to Lewan & Associates IT Solutions Division
Impacts on Architecture
Long Term Protection - Approach allowing for continued availability of data that is less likely to be accessed, but still has some importance to the business. Archived data is normally stored on lower performance media and is not as readily available to an end user.
Security – Approach for securing information from unauthorized access (accidental or intentional), modification, destruction, or disclosure.
Media and Data Format – As retention time scales beyond a couple years, these two items become an issue
Welcome to Lewan & Associates IT Solutions Division
The 4 Buckets
Welcome to Lewan & Associates IT Solutions Division
Four Storage Containers
Primary Backup / Recovery
Disaster Recovery
Archive
10TB * $25,000 10TB * $25,000 10TB * $25,000
0TB * $25,000
Total Cost: $750,000 of cost over 3 years
• Every container of storage costs money.
• Each container is related to the size of the customers “primary” data
• If we can optimize the primary data, we also optimize the backup and DR data
• The prior slide showed two extremes of 10:1 and 2:1 of raw storage needed per application capacity
• These examples are assuming somewhere in the middle, e.g., 5:1, so 10TB of application capacity = 50TB needed raw * $5,000/TB = $250,000 or $25,000/TB for application data
Welcome to Lewan & Associates IT Solutions Division
Four Storage Containers
Primary Backup / Recovery
Disaster Recovery
Archive
5TB * $25,000 5TB * $25,000 5TB * $25,000
5TB * $25,000
Prior w/o data reduction: $750,000 Total Cost: $500,000 Total Savings: $250,000
• Data management analysis will uncover inefficient use of resources
• e.g., introducing a self protecting archive platform will help save the customer money and reclaim many of their resources for growth
Welcome to Lewan & Associates IT Solutions Division
Efficiency of Primary Online Storage
Welcome to Lewan & Associates IT Solutions Division
What’s a TB to ya
NetApp example of dealing with overhead of enterprise storage solutions and how they combat some of this.
Welcome to Lewan & Associates IT Solutions Division
Efficiency is Key
Efficiency Techniques: • Intelligent snaps and clones • De-duplication • Thin Provisioning • Granular storage blocks • Compression • Intelligent caching
Welcome to Lewan & Associates IT Solutions Division
How Much Storage Is Needed
1TB Application Data
5TB Application Snaps/Clones
1TB Headroom
3TB Array Functions
1TB Application Data
200GB Application Snaps/Clones
200GB Headroom
600GB Array Functions
No Efficiency = 1TB Requires = 10TB Raw Capacity W/ Efficiencies = 1TB Requires = 2TB Raw Capacity Efficiency Techniques: • Intelligent snaps and clones • De-duplication • Thin Provisioning • Granular storage blocks • Compression • Intelligent caching
Welcome to Lewan & Associates IT Solutions Division
How Much Does Storage Cost
1TB Application Data
5TB Application Snaps/Clones
1TB Headroom
3TB Array Functions
1TB Application Data
200GB Application Snaps/Clones
200GB Headroom
600GB Array Functions
10TB Raw Capacity * $5,000/TB = $50,000 for 3 years
2TB Raw Capacity * $5,000/TB = $10,000 for 3 years
Note: Calculations based on raw storage and no management costs, purely hardware, software and maintenance
Welcome to Lewan & Associates IT Solutions Division
Today We Discussed 3 Things
Shred
Offline
Importance
Performance
File
Block
Lifecycle
Nearline
Online
Critical
Essential
Necessary
Desirable
Primary Backup / Recovery
Disaster Recovery
Archive
The Cube 4 Buckets Storage Efficiency
Welcome to Lewan & Associates IT Solutions Division
Questions