Pro Data Backup and Recovery - Nelson_ Steven.pdf

(6522 KB) Pobierz
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
The eXperT’s Voice ® in DaTa ManageMenT
Pro
Data Backup and
Recovery
Securing your information in the terabyte age
Steven Nelson
878784974.072.png 878784974.079.png 878784974.089.png 878784974.096.png 878784974.001.png 878784974.012.png 878784974.023.png 878784974.033.png 878784974.044.png
 
 
 
 
 
 
 
 
878784974.051.png 878784974.052.png 878784974.053.png 878784974.054.png 878784974.055.png 878784974.056.png 878784974.057.png 878784974.058.png 878784974.059.png
 
 
 
 
 
878784974.060.png 878784974.061.png 878784974.062.png 878784974.063.png 878784974.064.png 878784974.065.png 878784974.066.png 878784974.067.png 878784974.068.png
 
 
 
 
 
 
 
878784974.069.png 878784974.070.png 878784974.071.png
 
 
 
 
878784974.073.png
 
 
 
878784974.074.png 878784974.075.png 878784974.076.png 878784974.077.png 878784974.078.png 878784974.080.png 878784974.081.png 878784974.082.png 878784974.083.png 878784974.084.png 878784974.085.png 878784974.086.png 878784974.087.png 878784974.088.png
 
878784974.090.png
 
878784974.091.png
 
878784974.092.png
 
878784974.093.png
 
878784974.094.png 878784974.095.png 878784974.097.png 878784974.098.png 878784974.099.png 878784974.100.png 878784974.101.png 878784974.102.png 878784974.103.png 878784974.104.png 878784974.105.png
 
878784974.002.png 878784974.003.png 878784974.004.png 878784974.005.png 878784974.006.png 878784974.007.png 878784974.008.png 878784974.009.png 878784974.010.png 878784974.011.png 878784974.013.png 878784974.014.png 878784974.015.png 878784974.016.png 878784974.017.png 878784974.018.png 878784974.019.png 878784974.020.png 878784974.021.png 878784974.022.png 878784974.024.png 878784974.025.png 878784974.026.png 878784974.027.png
 
For your convenience Apress has placed some of the front
matter material after the index. Please use the Bookmarks
and Contents at a Glance links to access them.
878784974.028.png 878784974.029.png 878784974.030.png 878784974.031.png 878784974.032.png 878784974.034.png 878784974.035.png 878784974.036.png 878784974.037.png 878784974.038.png 878784974.039.png 878784974.040.png 878784974.041.png
Contents at a Glance
Contents ..................................................................................................................... v
About the Author ....................................................................................................... xi
About the Technical Reviewer.................................................................................. xii
Acknowledgments ................................................................................................... xiii
Chapter 1: Introduction to Backup and Recovery ................................................... 1
Chapter 2: Backup Software ................................................................................. 17
Chapter 3: Physical Backup Media ....................................................................... 37
Chapter 4: Virtual Backup Media .......................................................................... 67
Chapter 5: New Media Technologies ..................................................................... 87
Chapter 6: Software Architectures—CommVault ............................................... 111
Chapter 7: Software Architectures—NetBackup ................................................ 139
Chapter 8: Application Backup Strategies .......................................................... 169
Chapter 9: Putting It All Together: Sample Backup Environments...................... 203
Chapter 10: Monitoring and Reporting................................................................ 247
Chapter 11: Summary ......................................................................................... 261
Index ................................................................................................................... 265
iv
878784974.042.png 878784974.043.png 878784974.045.png 878784974.046.png 878784974.047.png 878784974.048.png
 
C H A P T E R 1
■ ■ ■
Introduction to Backup and
Recovery
Who Should Read this Book?
Pro Data Backup and Recovery has come from the many views of people that I have interacted with
during my career as a systems administrator, systems engineer, and consultant. This book is primarily
geared toward the systems engineers and architects within an organization, but it will also be useful for
the day-to-day functions of systems administrators and line managers of both teams. System
administrators will find it useful for understanding the issues that are involved in protecting the data
that they are responsible for providing on their systems, as well as helping to fashion systems and
methods that will help protect that data against inevitable systems failures. Systems administrators can
also use the information in this book to influence users of their systems to protect their data, create data
structures that are easy to back up, and identify data that is most critical to be backed up and how it
should be protected.
Line managers will find this book useful for understanding some of the technical trade-offs in data
protection, helping them make better decisions regarding the recommendations that their systems
engineers are making and system administrators are implementing for backup and recovery. The book
will also help these line managers interact with the various vendors of backup products, giving the
manager help to ask the hard questions and be able to answer them when their team asks them.
Backup systems have several characteristics:
They are not inexpensive over the life cycle of the backup solution
Large amounts of resources can be consumed in terms of:
People time
Operational and capital expenses
Additionally, the value of backup systems is difficult to express in terms of direct organizational
mission contribution. This book will help the line manager show that the organization’s data is being
protected based on the criticality of the data, the cost of the backup platform, and the availability of the
data for recovery.
Pro Data Backup and Recovery is primarily for systems engineers and architects (and administrators,
in many cases) who are responsible for the design, implementation, and operation of backup and
recovery systems. Backup is the one of those “invisible” jobs in systems—if people know who you are it
is because bad things have happened. The main goal of this book is to help those who are in this
sometimes thankless role to design, modify, and optimize your backup systems; to make those times
where you are visible as short as possible; and to give you the tools to help make the recoveries
successful. Within the pages of this book, you will find various configurations of both hardware and
1
878784974.049.png
CHAPTER 1 INTRODUCTION TO BACKUP AND RECOVERY
software that will allow you to build or upgrade backup systems to grow and meet the changing needs of
your organization. Although these configurations can be applied to many different brands of backup
software, this book focuses only on the two major backup vendors: Symantec NetBackup and
CommVault Simpana. These two vendors represent similar approaches to performing backups, but for
different customer organizational sizes.
What this book is not is a tutorial on the specific commands and day-to-day operational functions
that are executed directly by system administrators. I make some assumptions about the familiarity of
engineers and/or architects with the backup software being used with regard to commands and options.
This book is more concerned with the “why” of using various components as well as the “how” of
putting them together, but not with specific command sets used to do it. There are command examples
within this book as necessary to illustrate particular use cases, but there is an assumption that the
commands used will already be familiar to the reader.
Backup and Recovery Concepts
Backup and recovery is a topic that might seem basic at first glance, but it seems to be a little confusing
to many people. Backups and archives tend to be used interchangeably, representing some type of data
protection that spans a period of time. Adding to the confusion is the fact that many organizations group
the functions together in a single group, with the emphasis more on the data backup side, thus giving
the illusion of being a single function. Let’s look at this in a little more detail to get a common language
and understanding of the functions and roles of both backups and archives.
Note Where the difference between backups and archives gets particularly confusing is when backups are
stored for long periods of time, on the order of years. Such backups can be mistakenly referred to as archives
because the data the backup contains might indeed be the only copy of the data in existence at any particular
point in time. This is particularly common in organizations that contain both open systems (UNIX/Linux and
Windows) and mainframe environments because of terminology differences between the two platforms.
Backups
Backups are snapshot copies of data taken at a particular point in time, stored in a globally common
format, and tracked over some period of usefulness, with each subsequent copy of the data being
maintained independently of the first. Multiple levels of backups can be created. Full backups represent
a complete snapshot of the data that is intended to be protected. Full backups provide the baseline for
all other levels of backup.
In addition, two different levels of backups capture changes relative to the full backup. The
differential backup , also known as the cumulative incremental backup , captures backups that have
occurred since the last full backup. This type of backup is typically used in environments that do not
have a lot of change.
The differential backup (see Figure 1–1) must be used with care because it can grow quickly to
match or exceed the size of the original full backup. Consider the following: An environment has 20 TB of
data to back up. Each day 5 percent or 1 TB of data changes in the environment. Assuming that this is a
traditional backup environment, if a differential backup methodology is used, the first day 1TB of data is
backed up (the first day’s change rate against the previous full backup). The second day, 2 TB is backed
2
878784974.050.png
 
Zgłoś jeśli naruszono regulamin