Escolar Documentos
Profissional Documentos
Cultura Documentos
SAN Design
Module 4: Backup and Recovery
Date: 25 JAN 2011
1
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
ATTENTION
The information contained in this guide is intended for training use only. This guide contains information
and activities that, while beneficial for the purposes of training in a closed, non-production environment,
can result in downtime or other severe consequences and therefore are not intended as a reference guide. This guide is
not a technical reference and should not, under any circumstances, be used in production environments. To obtain
reference materials, please refer to the NetApp product documentation located at http://now.netapp.com/ for product
information.
COPYRIGHT
2011 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this book covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of the copyright owner.
NetApp reserves the right to change any products described herein at any time and without notice.
NetApp assumes no responsibility or liability arising from the use of products or materials described
herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product or
materials does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of
NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents,
or pending applications.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, Data ONTAP, Appliance Watch, ASUP, AutoSupport, Bolt Design, Centerto-Edge, ComplianceClock, ComplianceJournal, ContentDirector, Cryptainer, Data Motion, DataFabric, DataFort, Decru,
Decru DataFort, Evolution of Storage, Exec-Vault, FAServer, FilerView, FlexCache, FlexClone, FlexShare, FlexVol,
FPolicy, Get Successful, gFiler, LockVault, Manage ONTAP, MultiStore, NearStore, NetApp Availability Assurance,
NetApp IT As A Service, NetApp ProTech Expert, NetCache, NOW, NOW (NetApp on the Web), ONTAPI, Raid-DP,
Replicator-X, SANscreen, SecureAdmin, SecureShare, Shadow Tape, Simulate ONTAP, SmartClone, SnapCache,
SnapCopy, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover, SnapRestore, Snapshot, SnapStore,
SnapSuite, SnapValidator, SnapVault, Spinnaker Networks, Spinnaker Networks logo, SpinCluster, SpinFlex, SpinFS,
SpinHA, SpinMove, SpinServer, SpinStor, StoreVault, SyncMirror, Tech OnTap, Topio, vFiler, VFM, VFM (Virtual File
Manager), WAFL, and Web Filer are either trademarks, registered trademarks, or service marks of NetApp, Inc. in the
United States and/or other countries.
Not all common law marks used by NetApp are listed on this page.Failure of a common law mark to appear on this page
does not mean that NetApp does not use the mark nor does it mean that the product is not actively marketed or is not
significant within its relevant market.
Apple and QuickTime are either trademarks or registered trademarks of Apple Computer, Inc. in the United States and/or
other countries.
Microsoft and Windows Media are either trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries.
RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, RealVideo, RealMedia, RealProxy, and SureStream are
either trademarks or registered trademarks of RealNetworks, Inc. in the United States and/or other countries.
All other brands or products are either trademarks or registered trademarks of their respective holders and should be
treated as such.
2
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
TABLE OF CONTENTS
MODULE 4: BACKUP AND RECOVERY
MODULE OVERVIEW ............................................................................................................................... 4
MODULE OBJECTIVES............................................................................................................................ 4
SHARED OR SEPARATE SAN? .............................................................................................................. 4
SNAPSHOT COPY TOOLS....................................................................................................................... 5
BENEFITS OF IP SANS ............................................................................................................................ 5
RTO AND RPO .......................................................................................................................................... 6
BACKUP SCHEDULE EXAMPLE ............................................................................................................ 6
BACKUP BEST PRACTICES ................................................................................................................... 6
BACKUP BEST PRACTICES (CONT.)..................................................................................................... 7
BACKUP TO SECONDARY SYSTEM...................................................................................................... 7
DISASTER RECOVERY............................................................................................................................ 8
METROCLUSTER ..................................................................................................................................... 8
PLANNING A METROCLUSTER INSTALLATION .................................................................................. 9
SNAPMIRROR SOFTWARE ................................................................................................................... 10
SNAPMIRROR REPLICATION ............................................................................................................... 10
CHOOSING A REPLICATION MODE..................................................................................................... 11
LEARNING ACTIVITY INTRO................................................................................................................. 11
MODULE SUMMARY .............................................................................................................................. 11
3
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
1
MODULE OVERVIEW
Welcome to the Backup and Recovery module. This module discusses backup
methods and recovery procedures. This module should take approximately 30
minutes to complete.
2
MODULE OBJECTIVES
PAGE#
PAGE TITLE
TRANSCRIPT
3
SHARED OR SEPARATE SAN?
4
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
4
SNAPSHOT COPY TOOLS
You should already be familiar with the concept of Snapshot copies. There are
several things you must know about the environment in relation to Snapshot
copies to be able to design a SAN configuration. First, you must determine if
SnapDrive software will be used to create and manage Snapshot copies. NetApp
recommends using SnapDrive software for Snapshot copy creation and
maintenance because SnapDrive software creates consistent Snapshot copies.
Next, you should determine if any SnapManager software is currently being used
or if it should be used in the new design. SnapManager organizes information
into profiles and repositories. The profiles hold the information about the
database, including its credentials, backups, and clones. Repositories hold data
about the operations performed on the profiles. SnapManager software enables
efficient backups in a matter of seconds, providing application administrators
with greater flexibility to assign more frequent backups without disruption.
SnapManager also initiates full recovery to bring data back in minutes rather
than hours or days. Since data on NetApp storage remains online, adding
capacity and expanding volumes are more efficient, available, and streamlined.
5
BENEFITS OF IP SANS
The RTO, or Recovery Time Objective, and RPO, or Recovery Point Objective,
help identify both the storage space requirements and the application availability
requirements. RTO defines, for a specific data center application, how quickly
the application must be back online in the event of an outage. This value can
range from zero minutes, to several minutes, to several hours. Think of the RTO
as the acceptable amount of downtime. The RPO defines, for a specific data
center application, how much data loss can be tolerated in the event of an
outage. These values range from no data loss, to a few minutes of lost
transactions, to hours of lost transactions. Think of the RPO as the acceptable
amount of data loss. These two measurements directly affect backup strategies,
which can directly affect storage space utilization. To meet shorter RTOs, the
most recent set of backups must be available immediately. To meet shorter
RPOs, frequent Snapshot copies are required to assure the most recent data is
backed up. When Snapshot copies are created frequently, and multiple versions
are being retained, storage utilization quickly increases.
5
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
6
RTO AND RPO
First, you must determine how many Snapshot copies are needed. The number
of Snapshot copies needed is determined by the configuration and your
requirements for the RPO. Next, you must determine a Backup Schedule for the
Snapshot copies. This will be based on the RTO. A sample backup schedule is
shown here. Notice that the backup schedule is separated by data set. It states
RPO and RTO times for each age of data. Based on these values, backup
methods are recommended. The final column lists an inventory of threats from
which the data set is protected. For example, data in home directories up to
seven days old is expected to be recoverable in five minutes. The acceptable
amount of data loss is one day. For this situation, a backup method of local
Snapshot copies with off-site SnapVault software is recommended.
7
BACKUP SCHEDULE EXAMPLE
8
BACKUP BEST PRACTICES
Other backup best practices include the use of separate NetApp FlexVol
volumes to store Snapshot copies for separate applications. If possible, you can
help ensure consistency by placing all LUNs for an application in one NetApp
FlexVol volume. This may not be possible due to the RTO and RPO
requirements and the size of the LUNs. Dont make the volume too large or
performance will suffer.
6
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
9
BACKUP BEST PRACTICES (CONT.)
10
BACKUP TO SECONDARY SYSTEM
7
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
11
DISASTER RECOVERY
12
METROCLUSTER
8
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
13
PLANNING A METROCLUSTER INSTALLATION
9
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
TRANSCRIPT
14
SNAPMIRROR SOFTWARE
15
SNAPMIRROR REPLICATION
10
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
PAGE#
PAGE TITLE
TRANSCRIPT
PAGE#
PAGE TITLE
16
CHOOSING A REPLICATION MODE
17
LEARNING ACTIVITY INTRO
This learning activity reinforces the concepts that you learned in this module.
TRANSCRIPT
PAGE#
PAGE TITLE
20
MODULE SUMMARY
11
SANDesign
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.