Book description
Essential information on how to protect data in virtual environments!
Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a "good, better, best" approach, exploring best practices for backup, high availability, disaster recovery, business continuity, and more.
Covers best practices and essential information on protecting data in virtualized enterprise environments
Shows you how to approach, protect, and manage data while also meeting such challenges as return on investment, existing service level agreements (SLAs), and more
Helps system and design architects understand data protection issues and technologies in advance, so they can design systems to meet the challenges
Explains how to make absolutely critical services such as file services and e-mail more available without sacrificing protection
Offers best practices and solutions for backup, availability, disaster recovery, and others
This is a must-have guide for any Windows server and application administrator who is charged with data recovery and maintaining higher uptimes.
Table of contents
- Copyright
- Dear Reader,
- Acknowledgments
- About the Author
- Introduction
-
1. What Kind of Protection Do You Need?
- 1.1. In the Beginning, There Were Disk and Tape
- 1.2. Overview of Availability Mechanisms
- 1.3. Overview of Protection Mechanisms
- 1.4. Summary
-
2. Data Protection by the Numbers
- 2.1. The Technical Metrics: RPO and RTO
- 2.2. Business Metrics: RA and BIA
- 2.3. Risk Mitigation: Fixing It in Advance
- 2.4. Total Cost of Ownership
- 2.5. Return on Investment
- 2.6. Turning IT Needs into Corporate Initiatives
- 2.7. Summary
-
3. The Layers of Data Protection
- 3.1. What Data Looks Like from the Server's Perspective
-
3.2. Hardware-centric Protection
-
3.2.1. Storage Level 1: Protecting Against Spindle Failure
- 3.2.1.1. RAID 0: Striping
- 3.2.1.2. RAID 1: Mirroring or Duplexing
- 3.2.1.3. RAID 2, 3, and 4
- 3.2.1.4. RAID 5
- 3.2.1.5. RAID 6
- 3.2.1.6. Hot Spare, or Hot Standby, Disk
- 3.2.1.7. RAID 0+1, 1+0, and 10
- 3.2.1.8. RAID 50
- 3.2.1.9. Concurrent Drive Failures
- 3.2.1.10. Choosing a RAID Level
- 3.2.1.11. Slicing Arrays into LUNs
- 3.2.2. Storage Level 2: Protecting Against Array Failure
- 3.2.3. Storage Level 3: Protecting Against Storage Node Failure
- 3.2.4. Storage Level 4: Protecting Against SAN Fabric Failure
- 3.2.5. How Disk-Based Communication Works
- 3.2.6. Synchronous Replication in Storage
-
3.2.1. Storage Level 1: Protecting Against Spindle Failure
- 3.3. File-centric Protection
- 3.4. Application-centric Protection
- 3.5. Where to Store Your Protected Data
- 3.6. Summary
-
4. Better Backups
- 4.1. Solving the Problem from the Inside Out
- 4.2. Volume Shadow Copy Service (VSS)
- 4.3. The Windows Server Backup Utility
-
4.4. System Center Data Protection Manager
- 4.4.1. Why Did Microsoft Build a Backup Product?
- 4.4.2. How Does DPM Work?
- 4.4.3. Getting Started with DPM 2010
- 4.4.4. Configuring DPM 2010 Protection
-
4.4.5. Restoring Data with DPM 2010
- 4.4.5.1. How the DPM Storage Pool Restores Data
- 4.4.5.2. Overview of the DPM Restoration Process
- 4.4.5.3. Task 6: Restoring Files
- 4.4.5.4. Task 7: Enabling End-User Recovery of Files
- 4.4.5.5. How DPM Restores Transactional Data
- 4.4.5.6. Task 8: Restoring Exchange Mail
- 4.4.5.7. The Coolest Restore Time Is "Latest"
- 4.4.5.8. Task 9: Restoring SQL Databases
- 4.4.5.9. Task 10: Restoring SharePoint Items
- 4.4.5.10. Task 11: Restoring Virtual Machines
- 4.4.5.11. Task 12: Restoring Data on Client Workstations
- 4.4.6. Using DPM 2010 in Heterogeneous Environments
- 4.4.7. Disaster Recovery with DPM 2010
- 4.5. Summary
-
5. File Services
- 5.1. File System Availability and Protection in Windows Server
- 5.2. What Is the Distributed File System?
- 5.3. Enabling DFS on Your Windows File Servers
-
5.4. Getting Started with DFS-N
- 5.4.1. How a DFS Namespace Works
-
5.4.2. Configuring a DFS Namespace
- 5.4.2.1. DFS Namespace Task 1: Create Your Namespace
- 5.4.2.2. DFS Namespace Task 2: Adding a Second Namespace Server for Redundancy
- 5.4.2.3. DFS Namespace Task 3: Delegation of Management (Optional)
- 5.4.2.4. DFS Namespace Task 4: Adding Folders and Hierarchy
- 5.4.2.5. DFS Namespace Task 5: Target Referral Ordering (Optional)
- 5.5. Getting Started with DFS-R
- 5.6. Mixing DFS-R and DFS-N for Real-World Solutions
- 5.7. DFS Enhancements in Windows Server 2008 R2
- 5.8. Summary
-
6. Windows Clustering
- 6.1. Overview of Clustering in Windows Server 2008 and 2008 R2
-
6.2. Building Your First Cluster
- 6.2.1. Start with Shared Storage
- 6.2.2. Creating Your Virtual Hands-on Environment
-
6.2.3. Getting Started with MSCS in Windows Server 2008
- 6.2.3.1. Cluster A, Task 1: Installing MSCS in Windows Server 2008
- 6.2.3.2. Cluster A, Task 2: Prevalidating the Cluster Nodes in Windows Server 2008
- 6.2.3.3. Cluster A, Task 3: Creating the Cluster in Windows Server 2008
- 6.2.3.4. The Failover Cluster Management Console
- 6.2.3.5. Cluster A, Task 4: Create a Highly Available File Server
- 6.2.3.6. Cluster A, Task 5: Test It from a Windows Client
- 6.3. How Failover Clustering Works
- 6.4. Quorum Models
-
6.5. Windows Server 2008 R2 Failover Clustering
- 6.5.1. What's New in Failover Clustering (Windows Server 2008 R2)
- 6.5.2. Building Your Second Cluster Using Windows Server 2008 R2 in Hyper-V
-
6.5.3. Migrating to Windows Server 2008 R2 Failover Clusters
- 6.5.3.1. Optional Task: Building a Windows Server 2003 R2 Cluster Using Virtual Server 2005 R2
- 6.5.3.2. Step 1: Evict Node 2 from Your Existing Cluster
- 6.5.3.3. Step 2: Build a Single-Node Cluster out of Node2
- 6.5.3.4. Step 3: Migrate the Cluster Configuration
- 6.5.3.5. Step 4: Move the Data
- 6.5.3.6. Step 5: Decommission Node 1
- 6.5.3.7. Considerations That Make Migrations Easier
- 6.6. Summary
-
7. Microsoft Exchange
- 7.1. Exchange within Microsoft Cluster Services
-
7.2. Exchange 2007 Continuous Replication
- 7.2.1. How Does Continuous Replication Work?
- 7.2.2. Seeding a Database
- 7.2.3. Local Continuous Replication (LCR)
-
7.2.4. Cluster Continuous Replication
- 7.2.4.1. How CCR Works
- 7.2.4.2. Task 2: Preparing to Install CCR into a Windows Server 2008 Cluster
- 7.2.4.3. Task 3: Building the Windows Failover Cluster
- 7.2.4.4. Task 4: Installing CCR onto Windows Server 2008 Cluster Node 1
- 7.2.4.5. Task 5: Installing CCR onto Windows Server 2008 Cluster Node 2
- 7.2.4.6. Data Protection and Backup Considerations with CCR
- 7.2.4.7. When and How to Truncate Logs after the Backup
- 7.2.5. Standby Continuous Replication
- 7.3. Exchange 2010 Database Availability
- 7.4. Summary
-
8. Microsoft SQL Server
- 8.1. SQL Server Built-in Resiliency
- 8.2. SQL Failover Clustering
- 8.3. SQL Database Mirroring
- 8.4. SQL Database Failover
- 8.5. SQL Log Shipping and Replication
- 8.6. Which SQL Server HA Solution Should You Choose?
- 8.7. Backing Up SQL Server
- 8.8. Summary
-
9. Virtualization
- 9.1. Virtualization Changes Everything
-
9.2. Protecting Virtual Machines
- 9.2.1. Challenges in Virtual Machine Protection
- 9.2.2. VSS-Based Backups of Virtual Machines
-
9.2.3. Host-Based vs. Guest-Based Backups
- 9.2.3.1. Benefit: Deployment and Manageability
- 9.2.3.2. Benefit: Heterogeneous Backups
- 9.2.3.3. Benefit: Whole Server Recovery
- 9.2.3.4. Challenge: Whole-Server Recovery
- 9.2.3.5. Challenge: Whole-Server Protection
- 9.2.3.6. Challenge: iSCSI Storage Within Guest OSs
- 9.2.3.7. Guidance: Deciding Whether to Protect from Guest or Host
- 9.2.4. Restoring Virtual Machines
- 9.3. Availability of Virtual Machines
- 9.4. How Virtualization Makes Data Protection and Availability Better
-
9.5. Disaster Recovery Staging
-
9.5.1. Legacy Options for Physical BC/DR sites
- 9.5.1.1. Legacy Option 1: Physical One-to-One (1:1) Replication
- 9.5.1.2. Legacy Option 2: Physical Many-to-One (M:1) Replication with Total Failover
- 9.5.1.3. Legacy Option 3: Physical Many-to-One Replication with Partial Failover
- 9.5.1.4. Potential Option 4: Application-Specific Replication with Failover
- 9.5.2. Using Virtualization for Physical Server Business Continuity
- 9.5.3. Using Virtualization for Virtual Server Business Continuity
-
9.5.1. Legacy Options for Physical BC/DR sites
- 9.6. Bare Metal Recovery
- 9.7. Server Rollback
- 9.8. Summary
-
10. Management and Deployment
- 10.1. Well-Managed Systems for Higher Uptime
-
10.2. Large Enterprise Deployment and Manageability
- 10.2.1. Introducing Microsoft Systems Management
- 10.2.2. System Center Configuration Manager 2007 R2 and R3
- 10.2.3. Configuration Manager Site System Roles
- 10.2.4. The Configuration Manager Console
- 10.2.5. Asset Identification and Agent Installation
-
10.2.6. Centralized Software Deployment
- 10.2.6.1. Task 2: Creating a Package from a Definition File (MSI File Based)
- 10.2.6.2. Task 3: Viewing the Programs Created from Importing a Definition File (MSI File Based)
- 10.2.6.3. Task 4: Distributing the Package Source Files to a Distribution Point
- 10.2.6.4. Task 5: Creating an Advertisement
- 10.2.6.5. Task 6: Forcing the Client to Check for Policies More Quickly
- 10.2.6.6. Task 7: Running an Optional Advertised Program
- 10.2.6.7. Task 8: Validating Advertisement Success
- 10.2.7. Securing Resources with Software Update Management
- 10.2.8. Identifying Desired State Compliance
- 10.2.9. Deploying Operating Systems
- 10.2.10. Preventing Unsecure System Access
- 10.3. Virtualization Management
-
10.4. Midsized Management: Physical and Virtual
- 10.4.1. Introducing SCE 2010
-
10.4.2. Getting Started with SCE 2010
- 10.4.2.1. Task 25: Taking Inventory of Assets with SCE
- 10.4.2.2. Task 26: Patching PCs with SCE Software Updates
- 10.4.2.3. Task 27: Deploying Software with SCE
- 10.4.2.4. Building a Software Package
- 10.4.2.5. Approving Packages for Deployment
- 10.4.2.6. Task 28: Performing SCE Virtualization Tasks
- 10.4.2.7. Designating a New Virtualization Host
- 10.4.2.8. Physical-to-Virtual Migration
- 10.4.2.9. Creating a New VM from a Template
- 10.5. Summary
-
11. Monitoring Systems
- 11.1. The Need for Monitoring
- 11.2. Challenges in Monitoring
- 11.3. Enterprise End-to-End Monitoring
- 11.4. Monitoring the Health and Performance of Key Workloads
- 11.5. Monitoring in Midsized Organizations Using System Center Essentials
- 11.6. Summary
-
12. Business Continuity and Disaster Recovery
-
12.1. What Makes BC and DR So Special?
- 12.1.1. Real Business Continuity Planning
-
12.1.2. Regulatory Compliance
- 12.1.2.1. Regulations That Everyone Points to but Nobody Knows
- 12.1.2.2. The E-SIGN Law
- 12.1.2.3. CO-OP, the Government's Continuous Operations Mandate
- 12.1.2.4. DoD 5015.2-STD for Federal Agencies and Contractors
- 12.1.2.5. US Food and Drug Administration: 21 CFR 11
- 12.1.2.6. Health Insurance Portability and Accountability Act (HIPAA)
- 12.1.2.7. The Joint Commission, formerly JCAHO
- 12.1.2.8. SEC, NYSE, and NASD
- 12.1.2.9. SEC and US Treasury Guidance (Post-9/11)
- 12.1.2.10. Gramm-Leach-Bliley for Financial Institutions
- 12.1.2.11. Sarbanes-Oxley (SOX)
- 12.1.3. The Real Reason to Do Disaster Recovery
- 12.2. Get Your Data Out of the Building
- 12.3. BC = DR + HA
- 12.4. BC/DR Solution Alternatives
- 12.5. Using Virtualization to Achieve Business Continuity
- 12.6. Planning for BC/DR to Get Better Backups and Availability
- 12.7. Summary
-
12.1. What Makes BC and DR So Special?
-
A. Links and Resources
- A.1. Microsoft Software
- A.2. Topical Resources
- A.3. The Author
Product information
- Title: Data Protection for Virtual Data Centers
- Author(s):
- Release date: August 2010
- Publisher(s): Sybex
- ISBN: 9780470572146
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Endpoint Security
A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology …
book
Securing Cloud Services - A pragmatic approach, second edition
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …