SlideShare a Scribd company logo
1 of 26
Basic principles of backup policies
         Andrea Mauro
         vExpert and VCDX

         http://vinfrastructure.it/en
         Twitter: @Andrea_Mauro
About the speaker
 17 years of experience in IT
 Working for Assyrus Srl – Italy
   ● Server, Storage, Networking, Security & Virtualization

 Certifications and accreditations




 Italian VMUG founder and board member
 VMTN Community Moderator
 Blogger http://virtual-infrastructure.it/
Agenda
 What is a backup policy
 Design a backup plan
 What defines a backup policy
 What is a backup policy
 Where do backups go
 How will backups be performed
What is a backup policy?

Amount of data
1 principle or rule to guide decisions and achieve results
2 procedure or protocol

Backup policy
1 set of rules to achieve the required backup goals
2 several aspects: • technical
                    • non technical
Input of backup policies
                                                               Requirements
       Risk analysis




                            Backup/Business Continuity Plan
                                                                ● Recovery Point Objective
                                                                  (RPO)
 Requirements/Constraints                                       ● Recovery Time Objective
                                                                  (RTO)

     Backup policies                                           Constraints
                                                                ●   Business needs
                                                                ●   Budget
   Backup      Procedures                                       ●   Max backup window
  solutions                                                     ●   Technical aspects
     and
  products
                                                               Business Continuity Plan
                                                                (BCP)
Properties & parameters & dependencies
   What
   Where
   How, How much, How often
   Several dependencies

     Wks    Days Hrs       Mins    Secs   Secs    Mins    Hrs    Days    Wks



           Recovery Point                        Recovery Time
           Protection Methods                    Recovery Methods


              Synthetic Backup
                                          Disk Restores         Tape Restores
            Real Time Replication
        Tape Backups Vaults Archival      Instant Recovery      Search & Retrieve
        Disk Backups Staging Off-Host     Bare Metal Recovery
Backup as a process



            Selection
               list

                        Backup   Backup
 Analysis      +          job     data

            Backup
            policies
What – Define the sources of the backup
 Required protection level
 Way to handle the backup tasks
 Type of sources
                                       Virtual
                        Files          machines



                 Applications
                                   Systems

 Type of “transport” at source side
   ● Full copy
   ● Incremental transfer
   ● Size of the sources
Way to handle the backup tasks
 Agent vs. Agent-less
   ● Application level
   ● VM level

 Hot vs. Cold
   ● Usually agent or specific API are needed for hot-backup

 Push vs. Pull
   ● Also other models

Data transfer options important
Type of sources

  Files ● Windows
           ● Linux / Unix

  Application data – Not a simple collection of files

  Systems ● A system is not just a set of files
               ● It may include also files and applications backup

  Virtual Machines – It may include also system, files
                         and applications backup

  For details see specific lessons on Backup Academy
  Which level of consistency?
Consistency and integrity
 Different levels
 Files
   ● Open files dilemma
   ● Windows provide VSS
 Application data
   ● Application that are VSS-aware
   ● Application specific solutions
 Systems
   ● Problem with the system state
 Virtual Machines
   ● Specific hypervisor functions are recommended
 For details see specific lessons on Backup Academy
Type of “transport” at source side
 Full copy vs. incremental copy
 LAN based vs. LAN-free
Size of the sources
 Amount of data
Type of data           How data changes           Backup consistency


 How data can be transferred from the source
   ● Full copy vs. incremental
   ● Using of compression and/or de-duplication at source side


Data transfer options important
Where – Which kind of backup destination

            Disk based
              ● D2D
              ● Logical disk or network shares

            Tape based
              ● D2T
              ● Real or “Virtual” tape

            Multi-level backup
              ● D2D2T
              ● Other levels

            Cloud
D2D
 Different type of solutions
   ● DAS or SAN
   ● NAS
   ● Backup Appliance
        − Most NAS (and sometime VTL) based

 Pros of D2D
   ●   Great capacity: 1,5 TB (LTO5) vs. 2-3 TB (SATA disk)
   ●   Speed: disks IOPS could scale with RAID
   ●   Bigger scalability
   ●   Replication and disaster recovery
   ●   More flexible
D2T
 Type of tape based solutions
   ●   Tape unit: DAS with SAS or SCSI cables
   ●   Autoloader: DAS or SAN
   ●   Tape library: SAN
   ●   Virtual Tape Library (VTL): an appliance (hardware or software)
       that can be used as an autoloader or tape library but it works
       usually with disk instead of tapes

 Pros of D2T
   ● Speed: throughput of 140MBps for LTO5
   ● Removable support with long life?
VTL
 A tape that is a disk
   ● Can be used as an autoloader or tape library but it works usually
     with disk instead of tapes
 Implementation
   ● Gateway appliance
   ● Implemented in D2D appliances
   ● But could also implemented with software based products
        − Virtual appliance

 Pros of VTL
   ●   Migration from D2T to D2D
   ●   Could be used to scale a D2T solution
   ●   Could export to physical tape
   ●   Backup over SAN
How – Save to sources to the destinations
 Multi-tier (hierarchy backup)
   ● how data are distributed using different type of destinations

 Destination “format”:
   ● how data are saved in which format
   ● with which kind of relations with previous data
     (full, incremental, differential, de-duplicated, …)

 Backup frequency
   ● how often are performed the backup jobs

 Backup retention
   ● how old data are removed from the destination
   ● how much data must remain
Multi-tier backup strategies
 More techniques, levels or hierarchy organization
 D2DT
 Storage Snapshots as a first level
   ● But not a true backup!

 Offline media
 Replication as an additional level of protection
Destination “format”
 Format of the backup data depends on the backup program
 Common way to store the data
   ●   Full
   ●   Differential (Cumulative)
   ●   Incremental
   ●   Reverse incremental
   ●   Synthetic

 Other aspects
   ● Compression
   ● De-duplication
   ● Encryption
Backup frequency
 How much
   ● Job scheduling

 Defined by
   ● RPO and business requirements

 Different schedules for different format
Backup retention
 How much data must be stored?
 Depends on
   ● Source type and its size
   ● Frequency
      − more backup could mean more data that could limit the retention)
   ● “Format” type
      − by using deduplication or incremental backup and/or compression
        we can reduce the amount of backup and increase the retention
   ● Destination type
      − that could define the amount of data that could be stored)
   ● Required Recovery Point Objective (RPO)

 Reclaim of expired data
Retention on D2D and D2T
 D2D
  ● Incremental model
  ● Retention vs. Space
      − More disks
      − Compression and/or deduplication
  ● Reclaim mean usually delete old files

 D2T
  ● Full/differential/incremental models
  ● Retention vs. Space
      − Using off-line tapes
  ● Reclaim with media rotation policies
Media rotation policy
 Round Robin (FIFO)
 Grandfather, Father, Son (GFS)
 Tower Of Hanoi
 More info on
 ● http://en.wikipedia.org/wiki/Backup_rotation_scheme
 ● http://www.computer-repair.com/Backup.htm
What we covered
 What is a backup policy
 What make a backup policy
 ● What
 ● Where
 ● How
 Why is important
 ● To design a backup solution
      − Consider the backup as an entire IT process
 ● Could be used as a documentation of the backup procedures
   and jobs
 ● Could be part of a BCP
 ● High level policy can be adapted to different type of backup products
Enjoy and share this material

 Feel free to promote this material
 Recommend your peers to pass certification
 Blog, Tweet and share this material and your experience on Facebook
 You’re an Expert? We will be happy to have you as Backup Academy
  contributor. Apply here.



          Web: http://www.backupacademy.com
          E-mail: feedback@backupacademy.com
          Twitter: BckpAcademy
          Facebook: backup.academy

More Related Content

What's hot

Data Mesh @ Yelp - 2019
Data Mesh @ Yelp - 2019Data Mesh @ Yelp - 2019
Data Mesh @ Yelp - 2019Steven Moy
 
Object Storage 1: The Fundamentals of Objects and Object Storage
Object Storage 1: The Fundamentals of Objects and Object StorageObject Storage 1: The Fundamentals of Objects and Object Storage
Object Storage 1: The Fundamentals of Objects and Object StorageHitachi Vantara
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architectureVimlendu Kumar
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARE
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARELIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARE
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWAREOs Fantasmas !
 
Governança de Dados e Big Data_v02
Governança de Dados e Big Data_v02Governança de Dados e Big Data_v02
Governança de Dados e Big Data_v02Carlos Barbieri
 
Intro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on KubernetesIntro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on KubernetesKublr
 
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsIBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsUlf Troppens
 
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Simplilearn
 
Oracle EPM - Life cycle management
Oracle EPM - Life cycle managementOracle EPM - Life cycle management
Oracle EPM - Life cycle managementnking821
 
Data Lakehouse Symposium | Day 1 | Part 2
Data Lakehouse Symposium | Day 1 | Part 2Data Lakehouse Symposium | Day 1 | Part 2
Data Lakehouse Symposium | Day 1 | Part 2Databricks
 
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...Spark Summit
 
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...Simplilearn
 

What's hot (20)

Data Mesh @ Yelp - 2019
Data Mesh @ Yelp - 2019Data Mesh @ Yelp - 2019
Data Mesh @ Yelp - 2019
 
Object Storage 1: The Fundamentals of Objects and Object Storage
Object Storage 1: The Fundamentals of Objects and Object StorageObject Storage 1: The Fundamentals of Objects and Object Storage
Object Storage 1: The Fundamentals of Objects and Object Storage
 
Cloudera Hadoop Distribution
Cloudera Hadoop DistributionCloudera Hadoop Distribution
Cloudera Hadoop Distribution
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Shadow forensics print
Shadow forensics printShadow forensics print
Shadow forensics print
 
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARE
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARELIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARE
LIVRO PROPRIETÁRIO - QUALIDADE DE SOFTWARE
 
Governança de Dados e Big Data_v02
Governança de Dados e Big Data_v02Governança de Dados e Big Data_v02
Governança de Dados e Big Data_v02
 
Intro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on KubernetesIntro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on Kubernetes
 
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine WorkloadsIBM Spectrum Scale Best Practices for Genomics Medicine Workloads
IBM Spectrum Scale Best Practices for Genomics Medicine Workloads
 
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
 
Oracle EPM - Life cycle management
Oracle EPM - Life cycle managementOracle EPM - Life cycle management
Oracle EPM - Life cycle management
 
Hadoop and Big Data
Hadoop and Big DataHadoop and Big Data
Hadoop and Big Data
 
Data Lakehouse Symposium | Day 1 | Part 2
Data Lakehouse Symposium | Day 1 | Part 2Data Lakehouse Symposium | Day 1 | Part 2
Data Lakehouse Symposium | Day 1 | Part 2
 
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...
Fault Tolerance in Spark: Lessons Learned from Production: Spark Summit East ...
 
NetApp against ransomware
NetApp against ransomwareNetApp against ransomware
NetApp against ransomware
 
What's New in Apache Hive
What's New in Apache HiveWhat's New in Apache Hive
What's New in Apache Hive
 
Architecting a datalake
Architecting a datalakeArchitecting a datalake
Architecting a datalake
 
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...
Hadoop Ecosystem | Hadoop Ecosystem Tutorial | Hadoop Tutorial For Beginners ...
 

Similar to Basic principles of backup policies by Andrea Mauro, Backup Academy

Webinar: Is Your Storage Ready for Disaster?
Webinar: Is Your Storage Ready for Disaster?Webinar: Is Your Storage Ready for Disaster?
Webinar: Is Your Storage Ready for Disaster?Storage Switzerland
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarStorage Switzerland
 
Meeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO ObjectivesMeeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO ObjectivesStarWind Software
 
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...Storage Switzerland
 
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...Severalnines
 
Logical Architecture for Protection
Logical Architecture for ProtectionLogical Architecture for Protection
Logical Architecture for ProtectionSunita Shrivastava
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
Veeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRVeeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRJoep Piscaer
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageStorage Switzerland
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...WiLS
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsStorage Switzerland
 
Don’t give up, You can... Cache!
Don’t give up, You can... Cache!Don’t give up, You can... Cache!
Don’t give up, You can... Cache!Stefano Fago
 
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-WarWebinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-WarStorage Switzerland
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksStorage Switzerland
 
Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesJoep Piscaer
 
Webinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection ChallengesWebinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection ChallengesStorage Switzerland
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesYusuf Hadiwinata Sutandar
 
Optimizing Flash Storage for SQL Databases
Optimizing Flash Storage for SQL DatabasesOptimizing Flash Storage for SQL Databases
Optimizing Flash Storage for SQL DatabasesStorage Switzerland
 

Similar to Basic principles of backup policies by Andrea Mauro, Backup Academy (20)

Webinar: Is Your Storage Ready for Disaster?
Webinar: Is Your Storage Ready for Disaster?Webinar: Is Your Storage Ready for Disaster?
Webinar: Is Your Storage Ready for Disaster?
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage Webinar
 
Meeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO ObjectivesMeeting Your Virtual RTO / RPO Objectives
Meeting Your Virtual RTO / RPO Objectives
 
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
Webinar: Application Explosion - Rediscovering the Lost Art of Protection Ser...
 
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...
Webinar slides: Backup Management for MySQL, MariaDB, PostgreSQL & MongoDB wi...
 
Logical Architecture for Protection
Logical Architecture for ProtectionLogical Architecture for Protection
Logical Architecture for Protection
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
Veeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRVeeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DR
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
Don’t give up, You can... Cache!
Don’t give up, You can... Cache!Don’t give up, You can... Cache!
Don’t give up, You can... Cache!
 
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-WarWebinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
 
Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practices
 
Webinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection ChallengesWebinar: Overcoming the Five Distributed Data Protection Challenges
Webinar: Overcoming the Five Distributed Data Protection Challenges
 
Choose the Right Container Storage for Kubernetes
Choose the Right Container Storage for KubernetesChoose the Right Container Storage for Kubernetes
Choose the Right Container Storage for Kubernetes
 
Optimizing Flash Storage for SQL Databases
Optimizing Flash Storage for SQL DatabasesOptimizing Flash Storage for SQL Databases
Optimizing Flash Storage for SQL Databases
 

More from Veeam Software

The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...Veeam Software
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Software
 
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideTHE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideVeeam Software
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016Veeam Software
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Software
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysVeeam Software
 
Always-On Business Demands
Always-On Business DemandsAlways-On Business Demands
Always-On Business DemandsVeeam Software
 
Veeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Software
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8Veeam Software
 
Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Software
 
Managing your exchange architecture
Managing your exchange architectureManaging your exchange architecture
Managing your exchange architectureVeeam Software
 
Protecting Exchange with Veeam
Protecting Exchange with VeeamProtecting Exchange with Veeam
Protecting Exchange with VeeamVeeam Software
 
Defining availability for the modern data center
Defining availability for the modern data centerDefining availability for the modern data center
Defining availability for the modern data centerVeeam Software
 
Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Veeam Software
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsVeeam Software
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideVeeam Software
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Veeam Software
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Software
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCsVeeam Software
 
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowPreparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowVeeam Software
 

More from Veeam Software (20)

The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...The Voice of the Customer - How to enable Availability for the Always-On Ente...
The Voice of the Customer - How to enable Availability for the Always-On Ente...
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5
 
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study GuideTHE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
THE UNOFFICIAL OFFICIAL VCP6-DCV Study Guide
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arrays
 
Always-On Business Demands
Always-On Business DemandsAlways-On Business Demands
Always-On Business Demands
 
Veeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-VVeeam Backup & Replication v8 for Hyper-V
Veeam Backup & Replication v8 for Hyper-V
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8
 
Veeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Backup & Replication v8 for VMware — General Overview
Veeam Backup & Replication v8 for VMware — General Overview
 
Managing your exchange architecture
Managing your exchange architectureManaging your exchange architecture
Managing your exchange architecture
 
Protecting Exchange with Veeam
Protecting Exchange with VeeamProtecting Exchange with Veeam
Protecting Exchange with Veeam
 
Defining availability for the modern data center
Defining availability for the modern data centerDefining availability for the modern data center
Defining availability for the modern data center
 
Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)Five questions for every Modern Data Center (Infographic)
Five questions for every Modern Data Center (Infographic)
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backups
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study Guide
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and Tricks
 
12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs12 best practices for virtualizing active directory DCs
12 best practices for virtualizing active directory DCs
 
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask NowPreparing for Server 2012 Hyper-V: Seven Questions to Ask Now
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Basic principles of backup policies by Andrea Mauro, Backup Academy

  • 1. Basic principles of backup policies Andrea Mauro vExpert and VCDX http://vinfrastructure.it/en Twitter: @Andrea_Mauro
  • 2. About the speaker  17 years of experience in IT  Working for Assyrus Srl – Italy ● Server, Storage, Networking, Security & Virtualization  Certifications and accreditations  Italian VMUG founder and board member  VMTN Community Moderator  Blogger http://virtual-infrastructure.it/
  • 3. Agenda What is a backup policy Design a backup plan What defines a backup policy What is a backup policy Where do backups go How will backups be performed
  • 4. What is a backup policy? Amount of data 1 principle or rule to guide decisions and achieve results 2 procedure or protocol Backup policy 1 set of rules to achieve the required backup goals 2 several aspects: • technical • non technical
  • 5. Input of backup policies  Requirements Risk analysis Backup/Business Continuity Plan ● Recovery Point Objective (RPO) Requirements/Constraints ● Recovery Time Objective (RTO) Backup policies  Constraints ● Business needs ● Budget Backup Procedures ● Max backup window solutions ● Technical aspects and products  Business Continuity Plan (BCP)
  • 6. Properties & parameters & dependencies  What  Where  How, How much, How often  Several dependencies Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Recovery Point Recovery Time Protection Methods Recovery Methods Synthetic Backup Disk Restores Tape Restores Real Time Replication Tape Backups Vaults Archival Instant Recovery Search & Retrieve Disk Backups Staging Off-Host Bare Metal Recovery
  • 7. Backup as a process Selection list Backup Backup Analysis + job data Backup policies
  • 8. What – Define the sources of the backup  Required protection level  Way to handle the backup tasks  Type of sources Virtual Files machines Applications Systems  Type of “transport” at source side ● Full copy ● Incremental transfer ● Size of the sources
  • 9. Way to handle the backup tasks  Agent vs. Agent-less ● Application level ● VM level  Hot vs. Cold ● Usually agent or specific API are needed for hot-backup  Push vs. Pull ● Also other models Data transfer options important
  • 10. Type of sources  Files ● Windows ● Linux / Unix  Application data – Not a simple collection of files  Systems ● A system is not just a set of files ● It may include also files and applications backup  Virtual Machines – It may include also system, files and applications backup  For details see specific lessons on Backup Academy  Which level of consistency?
  • 11. Consistency and integrity  Different levels  Files ● Open files dilemma ● Windows provide VSS  Application data ● Application that are VSS-aware ● Application specific solutions  Systems ● Problem with the system state  Virtual Machines ● Specific hypervisor functions are recommended  For details see specific lessons on Backup Academy
  • 12. Type of “transport” at source side  Full copy vs. incremental copy  LAN based vs. LAN-free
  • 13. Size of the sources  Amount of data Type of data How data changes Backup consistency  How data can be transferred from the source ● Full copy vs. incremental ● Using of compression and/or de-duplication at source side Data transfer options important
  • 14. Where – Which kind of backup destination  Disk based ● D2D ● Logical disk or network shares  Tape based ● D2T ● Real or “Virtual” tape  Multi-level backup ● D2D2T ● Other levels  Cloud
  • 15. D2D  Different type of solutions ● DAS or SAN ● NAS ● Backup Appliance − Most NAS (and sometime VTL) based  Pros of D2D ● Great capacity: 1,5 TB (LTO5) vs. 2-3 TB (SATA disk) ● Speed: disks IOPS could scale with RAID ● Bigger scalability ● Replication and disaster recovery ● More flexible
  • 16. D2T  Type of tape based solutions ● Tape unit: DAS with SAS or SCSI cables ● Autoloader: DAS or SAN ● Tape library: SAN ● Virtual Tape Library (VTL): an appliance (hardware or software) that can be used as an autoloader or tape library but it works usually with disk instead of tapes  Pros of D2T ● Speed: throughput of 140MBps for LTO5 ● Removable support with long life?
  • 17. VTL  A tape that is a disk ● Can be used as an autoloader or tape library but it works usually with disk instead of tapes  Implementation ● Gateway appliance ● Implemented in D2D appliances ● But could also implemented with software based products − Virtual appliance  Pros of VTL ● Migration from D2T to D2D ● Could be used to scale a D2T solution ● Could export to physical tape ● Backup over SAN
  • 18. How – Save to sources to the destinations  Multi-tier (hierarchy backup) ● how data are distributed using different type of destinations  Destination “format”: ● how data are saved in which format ● with which kind of relations with previous data (full, incremental, differential, de-duplicated, …)  Backup frequency ● how often are performed the backup jobs  Backup retention ● how old data are removed from the destination ● how much data must remain
  • 19. Multi-tier backup strategies  More techniques, levels or hierarchy organization  D2DT  Storage Snapshots as a first level ● But not a true backup!  Offline media  Replication as an additional level of protection
  • 20. Destination “format”  Format of the backup data depends on the backup program  Common way to store the data ● Full ● Differential (Cumulative) ● Incremental ● Reverse incremental ● Synthetic  Other aspects ● Compression ● De-duplication ● Encryption
  • 21. Backup frequency  How much ● Job scheduling  Defined by ● RPO and business requirements  Different schedules for different format
  • 22. Backup retention  How much data must be stored?  Depends on ● Source type and its size ● Frequency − more backup could mean more data that could limit the retention) ● “Format” type − by using deduplication or incremental backup and/or compression we can reduce the amount of backup and increase the retention ● Destination type − that could define the amount of data that could be stored) ● Required Recovery Point Objective (RPO)  Reclaim of expired data
  • 23. Retention on D2D and D2T  D2D ● Incremental model ● Retention vs. Space − More disks − Compression and/or deduplication ● Reclaim mean usually delete old files  D2T ● Full/differential/incremental models ● Retention vs. Space − Using off-line tapes ● Reclaim with media rotation policies
  • 24. Media rotation policy  Round Robin (FIFO)  Grandfather, Father, Son (GFS)  Tower Of Hanoi  More info on ● http://en.wikipedia.org/wiki/Backup_rotation_scheme ● http://www.computer-repair.com/Backup.htm
  • 25. What we covered What is a backup policy What make a backup policy ● What ● Where ● How Why is important ● To design a backup solution − Consider the backup as an entire IT process ● Could be used as a documentation of the backup procedures and jobs ● Could be part of a BCP ● High level policy can be adapted to different type of backup products
  • 26. Enjoy and share this material  Feel free to promote this material  Recommend your peers to pass certification  Blog, Tweet and share this material and your experience on Facebook  You’re an Expert? We will be happy to have you as Backup Academy contributor. Apply here. Web: http://www.backupacademy.com E-mail: feedback@backupacademy.com Twitter: BckpAcademy Facebook: backup.academy