SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
APPASSURE REPLICATION
TECHNICAL OVERVIEW
Table of Contents
 What is AppAssure?

 AppAssure Product Architecture

 AppAssure Replication

 How it Works
  • Terms
  • Snapshots
  • Implementation Details
  • Replication Topologies          What AppAssure
  • Replication Schedules          Customers Say
What is AppAssure?
 AppAssure Backup and Replication is the world’s fastest
 and easiest backup and disaster recovery software for
 Windows application servers and desktops.

 The only complete “all-in-one” backup and disaster recovery
 software solution, AppAssure enables local recoveries from
 any type of failure in just minutes, with the added assurance of
 offsite application and data backup and recovery from a total
 site disaster.
AppAssure Product Architecture
AppAssure can be deployed as a single-server or a multi-server architecture.
Single-server architecture consists of AppAssure Server and Agent running on
the same server typically seen in small environments where as a multi- server
architecture consists of a dedicated AppAssure Server protecting one or multiple
Agents running different application workloads.
AppAssure Replication
This presentation describes the Replication feature of AppAssure. Replication
is designed to replicate recovery points between AppAssure Cores in an efficient
and safe manner to enable off-site backup and off-site disaster recovery.

AppAssure Replication option can be
enabled or disabled on a per protected
server basis. This option is available in
single server and multi-server
implementations.

The cool thing about AppAssure
Replication is that it replicates the
compressed and de-duplicated recovery
points over the WAN so its bandwidth
efficiently saves storage on the LAN and
at the DR location.                               Figure 1 – Off-Site Disaster Recovery
How It Works
The following slides describe how AppAssure Replication
works by:
 defining our terminology

 reviewing our approach
Terms
                   A Windows workload, physical or virtual,
Protected Server   that is protected by a AppAssure Agent.
                   Supported environments include
                   Windows® Server 2008 R2, Windows®
                   2008 Server, Windows® 2003 Server,
                   Windows 7, Windows Vista, Windows XP
                   (SP3).
Terms
                 Processes and stores compressed and
AppAssure Core   deduplicated recovery points as incremental
                 forever images of the protected servers. Cores
                 can be installed on the protected server or on a
                 dedicated server or worker virtual machine. This
                 role performs many functions including creating
                 virtual standby environments, application
                 validation, restores & replication.
                                          recovery
                                            point


                                                      recovery
                                                        point
                             AppAssure
                               Core
                                                      recovery
                                                        point



                                           recovery
                                             point
Terms
                  Represents a point-in-time image of the protected
Recovery Points   server. They are stored as compressed and
                  deduplicated files on storage available to the
                  AppAssure Core, DAS, NAS, SAN.


                  The server from where the replication of the
Replication       recovery points is initiated. Replication is always
                  performed between two AppAssure Cores.
Source
Terms
    Replication Target


  The server that is the destination
  of the replicated recovery points.
Snapshots
AppAssure creates point-in-time snapshots of the protected servers and they
are stored as compressed and deduplicated recovery points in a directory
accessible from the AppAssure Core.

The recovery points are maintained on a per protected server basis in a
directory structure as follows:
Drive:TevoRepositoryProtectedServerName1
recoverypoint4Incremental
recoverypoint3Incremental
recoverypoint2Incremental
recoverypoint1Base                                                AppAssure
                                                                    Core
ShareNameTevoRepositoryProtectedServerName2
recoverypoint4Incremental
recoverypoint3Incremental
recoverypoint2Incremental
recoverypoint1Base
Replication
                         Replication copies the recovery points from a
                         replication source to replication target on a per
                         protected server basis.

                         As recovery points are replicated, all recovery point
                         files and registry settings are replicated to the
                         secondary AppAssure Core, such that the loss of the
                         replication source won’t mean the loss of all recovery
                         points and protection settings.


In the case of a AppAssure Core outage, the AppAssure Core can be rebuilt,
and resynchronized with a mirror, though until resync is complete the primary
AppAssure Core won’t be able to accept new snapshots.
AppAssure Replication Facts
 New snapshots taken on the replication source will be replicated to replication
  target.
 Replication is performed on a per protected server basis.
 Recovery points are replicated oldest-first, to ensure the replication target always
  has a valid and mountable epoch chain.
 Recovery point changes due to rollup will not be replicated reducing the amount of
  data that needs to be transferred or the WAN. The replication target will perform its
  own rollup on the replicated recovery points.
 Rollup and replication will not conflict with one another.

 It is assumed that the replication target is on a
  different subnet and behind a different firewall than
  replication source, thus the replication target will
  only communicate with the agents protected by
  replication source for rollback purposes.
AppAssure Replication Facts
 The replication target is able to perform all normal
  AppAssure restore functions such as BMR, instant
  rollback, VM export, even if the replication source is down.
 If Exchange is being protected, Exchange and system
  DLLs from the replication source will be propagated to the
  replication target so features such as force mountability
  check, MR, and P2V are available on the replication target.
 Mismatched versions between replication source and replication target are detected.
 The replication source and replication target can be any combination of supported
  operating systems.
 In the event of a link failure or transfer error, when the link comes back up, the
  transfer is resumed from where it was interrupted.
 All recovery points that are replicated are verified for integrity.
Replication Implementation Details
 Internally, the AppAssure Cores communicate over HTTP.
  The target listens on port 8080 for HTTP connections from
  the source. All communications are initiated by the source
  to the target.
 AppAssure uses the adler-32 checksum algorithm to verify
  the integrity of transferred files, and detect when a
  partially-transferred file can be resumed without data loss.
 To determine what files to replicate, AppAssure chooses all source files not yet
  on the target, and those files on both which have not yet been rolled up but have
  different metadata between the two sides.
 Each file is transferred in a separate HTTP PUT operation. Once an entire epoch
  is transferred, it is loaded into AppAssure and available for use. Thus, some
  replicated recovery points are available for use even before all recovery points
  have replicated.
Replication Topologies
AppAssure supports various replication
topologies to meet your business needs.


1 : 1 Configuration


The 1 : 1 configuration is that standard
configuration and is useful for protection
of a single server or group of servers
from one site to another.
Replication Topologies

Many : 1
Configuration
Replication Topologies

Many : Many
Configuration
AppAssure Replication
supports replication on a
per protected server
basis. This means that
you can replicate
different protected
server’s recovery points
to different replication
targets in different
locations as shown in the
figure.
Replication Schedules
AppAssure Replication can be scheduled to run during certain times during
the day. Any time outside of this window, replication will be suspended. The
schedule is specified as a start and stop time for weekdays, and a start and
stop time for weekends.

 Users can, on an ad-hoc basis,
  pause a currently running replication
  for an hour, a day, or until resumed.
 Users can configure VM export,
  recovery point export, or continuous
  rollback on the replication target for
  recovery points replicated from the
  replication source.
Replication Schedules
Recovery Point Copy and Consume
The copying feature is useful when
the WAN link is insufficient to move
large amounts of data. It copies the
existing recovery points including
the base image from the replication
source to a local removable device.
Once the copy is complete, the
removable drive can be inserted in
the replication target and
consumed. The replication target is
seeded with the recovery points
from the replication source including
the base image. The replication will
resume by replicating the new
recovery points only.
Replication Schedules
Authentication between AppAssure Cores

AppAssure uses NTLM authentication over HTTP. Once authenticated between
the replication source and the replication target, AppAssure generates a one-
time-use key, which it exchanges via RSA over HTTP.

Each request sent to the replication target over
HTTP is authenticated with a separate one-time
key.
Thus, authentication is hardened against
AppAssure attacks, but potentially
vulnerable to a man-in-the-middle attack
since we have no way of authenticating the
identity of the remote server.
What AppAssure Customers Say
Brendan Hourihan – Technology Services Network Engineer, Flagler College:
                  “With AppAssure, I thought I entered into a dreamland! Finally I’m
                  talking with somebody who has a philosophy about backups that
                  makes sense – a more logical approach to how data is backed up
                  AND what you can do with the backed-up data: you can replicate it,
                  synchronize it, and more!”

        Peter Hammerl – IT Administrator, Hamilton Port Authority:
                  AppAssure is working great. I’ve tested restoring files and databases,
                  and everything has gone smoothly. The application is pretty granular
                  so we can choose what to backup, at what time intervals, etc. We
                  can get exactly what we want when we want it.”

                Eric Sagerdahl – IT Analyst, Walden House:
                  “We’ve always been happy with the support … if you really need to
                  talk to somebody right away, there’s always someone right there for
                  you... I honestly don’t know how we would have recovered all the
                  data before AppAssure.”
Questions
If you have questions about AppAssure Backup & Replication software,
please select an option below to contact us:
     Sales:                sales@appassure.com
     Support:              support@appassure.com
     Phone:                +1 (703) 547-8686
     Web:                  www.appassure.com



Download a FREE trial of AppAssure Backup & Replication at

                 www.appassure.com

Weitere ähnliche Inhalte

Was ist angesagt?

AWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS CloudAWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
Amazon Web Services
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
Jo Verstappen
 
googlecluster-ieee
googlecluster-ieeegooglecluster-ieee
googlecluster-ieee
Hiroshi Ono
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
mcini
 
Postgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guidePostgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guide
ice1oog
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
jpo1974
 

Was ist angesagt? (19)

HADRFINAL13112016
HADRFINAL13112016HADRFINAL13112016
HADRFINAL13112016
 
Disaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureDisaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft Azure
 
Using VMTurbo to boost performance
Using VMTurbo to boost performanceUsing VMTurbo to boost performance
Using VMTurbo to boost performance
 
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
 
Boosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for DatabasesBoosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for Databases
 
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS CloudAWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
 
White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum  White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum
 
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
 
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
 
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCSDBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
 
googlecluster-ieee
googlecluster-ieeegooglecluster-ieee
googlecluster-ieee
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
 
Postgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guidePostgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guide
 
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
 
Storage craft shadowprotect_server
Storage craft shadowprotect_serverStorage craft shadowprotect_server
Storage craft shadowprotect_server
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisation
 

Ähnlich wie App assure replication

Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
Seth David
 
Wwc disaster solution
Wwc disaster solutionWwc disaster solution
Wwc disaster solution
Seth David
 
How can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docxHow can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docx
hamblymarta
 
App assure unique_features
App assure unique_featuresApp assure unique_features
App assure unique_features
georgegaudi
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...
EMC Forum India
 

Ähnlich wie App assure replication (20)

Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrix
 
snapshot vs backup
snapshot vs backupsnapshot vs backup
snapshot vs backup
 
Wwc disaster solution
Wwc disaster solutionWwc disaster solution
Wwc disaster solution
 
OpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceOpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection Service
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0
 
How can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docxHow can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docx
 
App assure unique_features
App assure unique_featuresApp assure unique_features
App assure unique_features
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
 
DR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesDR-to-the-Cloud Best Practices
DR-to-the-Cloud Best Practices
 
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
 
Excellent VEEAM VMCE_v12 Dumps (V10.02) to Obtain 100% Achievement - DumpsBase
Excellent VEEAM VMCE_v12 Dumps (V10.02) to Obtain 100% Achievement - DumpsBaseExcellent VEEAM VMCE_v12 Dumps (V10.02) to Obtain 100% Achievement - DumpsBase
Excellent VEEAM VMCE_v12 Dumps (V10.02) to Obtain 100% Achievement - DumpsBase
 
VMware Site Recovery Manager 6
VMware Site Recovery Manager 6VMware Site Recovery Manager 6
VMware Site Recovery Manager 6
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...
 
Namos openstack-manager
Namos openstack-managerNamos openstack-manager
Namos openstack-manager
 
Redis vs Aerospike
Redis vs AerospikeRedis vs Aerospike
Redis vs Aerospike
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Technical track 1: arcserve UDP deep dvie
Technical track 1: arcserve UDP deep dvieTechnical track 1: arcserve UDP deep dvie
Technical track 1: arcserve UDP deep dvie
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Kürzlich hochgeladen (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

App assure replication

  • 2. Table of Contents  What is AppAssure?  AppAssure Product Architecture  AppAssure Replication  How it Works • Terms • Snapshots • Implementation Details • Replication Topologies  What AppAssure • Replication Schedules Customers Say
  • 3. What is AppAssure? AppAssure Backup and Replication is the world’s fastest and easiest backup and disaster recovery software for Windows application servers and desktops. The only complete “all-in-one” backup and disaster recovery software solution, AppAssure enables local recoveries from any type of failure in just minutes, with the added assurance of offsite application and data backup and recovery from a total site disaster.
  • 4. AppAssure Product Architecture AppAssure can be deployed as a single-server or a multi-server architecture. Single-server architecture consists of AppAssure Server and Agent running on the same server typically seen in small environments where as a multi- server architecture consists of a dedicated AppAssure Server protecting one or multiple Agents running different application workloads.
  • 5. AppAssure Replication This presentation describes the Replication feature of AppAssure. Replication is designed to replicate recovery points between AppAssure Cores in an efficient and safe manner to enable off-site backup and off-site disaster recovery. AppAssure Replication option can be enabled or disabled on a per protected server basis. This option is available in single server and multi-server implementations. The cool thing about AppAssure Replication is that it replicates the compressed and de-duplicated recovery points over the WAN so its bandwidth efficiently saves storage on the LAN and at the DR location. Figure 1 – Off-Site Disaster Recovery
  • 6. How It Works The following slides describe how AppAssure Replication works by:  defining our terminology  reviewing our approach
  • 7. Terms A Windows workload, physical or virtual, Protected Server that is protected by a AppAssure Agent. Supported environments include Windows® Server 2008 R2, Windows® 2008 Server, Windows® 2003 Server, Windows 7, Windows Vista, Windows XP (SP3).
  • 8. Terms Processes and stores compressed and AppAssure Core deduplicated recovery points as incremental forever images of the protected servers. Cores can be installed on the protected server or on a dedicated server or worker virtual machine. This role performs many functions including creating virtual standby environments, application validation, restores & replication. recovery point recovery point AppAssure Core recovery point recovery point
  • 9. Terms Represents a point-in-time image of the protected Recovery Points server. They are stored as compressed and deduplicated files on storage available to the AppAssure Core, DAS, NAS, SAN. The server from where the replication of the Replication recovery points is initiated. Replication is always performed between two AppAssure Cores. Source
  • 10. Terms Replication Target The server that is the destination of the replicated recovery points.
  • 11. Snapshots AppAssure creates point-in-time snapshots of the protected servers and they are stored as compressed and deduplicated recovery points in a directory accessible from the AppAssure Core. The recovery points are maintained on a per protected server basis in a directory structure as follows: Drive:TevoRepositoryProtectedServerName1 recoverypoint4Incremental recoverypoint3Incremental recoverypoint2Incremental recoverypoint1Base AppAssure Core ShareNameTevoRepositoryProtectedServerName2 recoverypoint4Incremental recoverypoint3Incremental recoverypoint2Incremental recoverypoint1Base
  • 12. Replication Replication copies the recovery points from a replication source to replication target on a per protected server basis. As recovery points are replicated, all recovery point files and registry settings are replicated to the secondary AppAssure Core, such that the loss of the replication source won’t mean the loss of all recovery points and protection settings. In the case of a AppAssure Core outage, the AppAssure Core can be rebuilt, and resynchronized with a mirror, though until resync is complete the primary AppAssure Core won’t be able to accept new snapshots.
  • 13. AppAssure Replication Facts  New snapshots taken on the replication source will be replicated to replication target.  Replication is performed on a per protected server basis.  Recovery points are replicated oldest-first, to ensure the replication target always has a valid and mountable epoch chain.  Recovery point changes due to rollup will not be replicated reducing the amount of data that needs to be transferred or the WAN. The replication target will perform its own rollup on the replicated recovery points.  Rollup and replication will not conflict with one another.  It is assumed that the replication target is on a different subnet and behind a different firewall than replication source, thus the replication target will only communicate with the agents protected by replication source for rollback purposes.
  • 14. AppAssure Replication Facts  The replication target is able to perform all normal AppAssure restore functions such as BMR, instant rollback, VM export, even if the replication source is down.  If Exchange is being protected, Exchange and system DLLs from the replication source will be propagated to the replication target so features such as force mountability check, MR, and P2V are available on the replication target.  Mismatched versions between replication source and replication target are detected.  The replication source and replication target can be any combination of supported operating systems.  In the event of a link failure or transfer error, when the link comes back up, the transfer is resumed from where it was interrupted.  All recovery points that are replicated are verified for integrity.
  • 15. Replication Implementation Details  Internally, the AppAssure Cores communicate over HTTP. The target listens on port 8080 for HTTP connections from the source. All communications are initiated by the source to the target.  AppAssure uses the adler-32 checksum algorithm to verify the integrity of transferred files, and detect when a partially-transferred file can be resumed without data loss.  To determine what files to replicate, AppAssure chooses all source files not yet on the target, and those files on both which have not yet been rolled up but have different metadata between the two sides.  Each file is transferred in a separate HTTP PUT operation. Once an entire epoch is transferred, it is loaded into AppAssure and available for use. Thus, some replicated recovery points are available for use even before all recovery points have replicated.
  • 16. Replication Topologies AppAssure supports various replication topologies to meet your business needs. 1 : 1 Configuration The 1 : 1 configuration is that standard configuration and is useful for protection of a single server or group of servers from one site to another.
  • 17. Replication Topologies Many : 1 Configuration
  • 18. Replication Topologies Many : Many Configuration AppAssure Replication supports replication on a per protected server basis. This means that you can replicate different protected server’s recovery points to different replication targets in different locations as shown in the figure.
  • 19. Replication Schedules AppAssure Replication can be scheduled to run during certain times during the day. Any time outside of this window, replication will be suspended. The schedule is specified as a start and stop time for weekdays, and a start and stop time for weekends.  Users can, on an ad-hoc basis, pause a currently running replication for an hour, a day, or until resumed.  Users can configure VM export, recovery point export, or continuous rollback on the replication target for recovery points replicated from the replication source.
  • 20. Replication Schedules Recovery Point Copy and Consume The copying feature is useful when the WAN link is insufficient to move large amounts of data. It copies the existing recovery points including the base image from the replication source to a local removable device. Once the copy is complete, the removable drive can be inserted in the replication target and consumed. The replication target is seeded with the recovery points from the replication source including the base image. The replication will resume by replicating the new recovery points only.
  • 21. Replication Schedules Authentication between AppAssure Cores AppAssure uses NTLM authentication over HTTP. Once authenticated between the replication source and the replication target, AppAssure generates a one- time-use key, which it exchanges via RSA over HTTP. Each request sent to the replication target over HTTP is authenticated with a separate one-time key. Thus, authentication is hardened against AppAssure attacks, but potentially vulnerable to a man-in-the-middle attack since we have no way of authenticating the identity of the remote server.
  • 22. What AppAssure Customers Say Brendan Hourihan – Technology Services Network Engineer, Flagler College: “With AppAssure, I thought I entered into a dreamland! Finally I’m talking with somebody who has a philosophy about backups that makes sense – a more logical approach to how data is backed up AND what you can do with the backed-up data: you can replicate it, synchronize it, and more!” Peter Hammerl – IT Administrator, Hamilton Port Authority: AppAssure is working great. I’ve tested restoring files and databases, and everything has gone smoothly. The application is pretty granular so we can choose what to backup, at what time intervals, etc. We can get exactly what we want when we want it.” Eric Sagerdahl – IT Analyst, Walden House: “We’ve always been happy with the support … if you really need to talk to somebody right away, there’s always someone right there for you... I honestly don’t know how we would have recovered all the data before AppAssure.”
  • 23. Questions If you have questions about AppAssure Backup & Replication software, please select an option below to contact us:  Sales: sales@appassure.com  Support: support@appassure.com  Phone: +1 (703) 547-8686  Web: www.appassure.com Download a FREE trial of AppAssure Backup & Replication at www.appassure.com