citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment,...

46
DBackup White Paper Scuetch Corporation Co., Ltd.

Transcript of citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment,...

Page 1: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Scuetch Corporation Co., Ltd.

Page 2: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

Copyright NoticeCopyright© 2009-2018 Scutech Corporation All rights reserved.

Scutech has completed a detailed proofreading of this article. However, it is not

guaranteed that the content does not contain technical errors or typographical errors

or omissions, if any of which appears, Scutech does not undertake any liability.The Company reserve the exclusive right to update or revise the information on this

brochure without prior notice.

Page 3: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Content1. Overview..............................................................................................................................12. System Architecture....................................................................................................3

2.1 Technical Architecture.......................................................................................................32.2 System Components.........................................................................................................3

2.2.1 Backup Server.........................................................................................................42.2.2 Storage Server........................................................................................................52.2.3 Agent.......................................................................................................................5

3. Data Protection...............................................................................................................73.1 Backup Protection.............................................................................................................7

3.1.1 File Protection.........................................................................................................73.1.2 Databases Protection..............................................................................................83.1.3 Applications Protection............................................................................................93.1.4 OS Protection........................................................................................................103.1.5 Virtual Machine Protection....................................................................................113.1.6 Enhanced Security................................................................................................113.1.7 Disaster Recovery Drill..........................................................................................12

3.2 Data Disaster Recovery..................................................................................................133.2.1 High Availability.....................................................................................................133.2.2 CDP.......................................................................................................................143.2.3 Data Replication....................................................................................................153.2.4 Zero Data Loss......................................................................................................163.2.5 Off-site Disaster Recovery....................................................................................17

3.3 Data Management...........................................................................................................173.3.1 Data Deduplication................................................................................................173.3.2 Data Encryption.....................................................................................................183.3.3 Data Compression................................................................................................193.3.4 D2T........................................................................................................................193.3.5 D2C.......................................................................................................................19

3.4 Operation and Maintenance Support..............................................................................203.4.1 Backup as a Service.............................................................................................203.4.2 Backup Speed Control..........................................................................................213.4.3 Backup Protection Approaches.............................................................................213.4.4 Backup Recovery Strategies.................................................................................223.4.5 Access Management.............................................................................................223.4.6 Poor Network Transmission..................................................................................223.4.7 LAN-Free Environment.........................................................................................223.4.8 Unified Monitoring.................................................................................................233.4.9 Multi-dimensional Statistics...................................................................................23

4. Distinctive Technologies.........................................................................................244.1 Storage Pool Management..............................................................................................244.2 Synthetic Backup of Files................................................................................................254.3 Synthetic Backup of Database........................................................................................264.4 Continuous Log Real-time Protection (CLRP)................................................................27

Page 4: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

4.5 OS Virtual Migration........................................................................................................274.6 Hot Backup of MySQL.....................................................................................................284.7 Hot backup of Informix....................................................................................................28

5. Supported Environment..........................................................................................295.1 Supported Backup and Storage Server Platforms..........................................................29

5.1.1 Windows OS.........................................................................................................295.1.2 Linux OS...............................................................................................................29

5.2 Supported Client Platforms.............................................................................................295.2.1 Windows OS.........................................................................................................295.2.2 Linux OS...............................................................................................................295.2.3 UNIX OS...............................................................................................................305.2.4 Domestic OS.........................................................................................................30

5.3 Supported Virtualization Platforms..................................................................................305.3.1 Popular International Virtual Platforms.................................................................305.3.2 Popular Domestic Virtual Platforms......................................................................31

5.4 Supported Databases......................................................................................................315.4.1 Popular International Database Software.............................................................315.4.2 Popular Domestic Database Software..................................................................31

5.5 Application Software........................................................................................................315.6 Supported Storage Object...............................................................................................32

6. About Scutech................................................................................................................33

Page 5: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

1. Overview

DBackup is enterprise-level security software that integrates data backup & disaster recovery and high availability all in one. It has built a backup cloud and features multi-tenancy and coordinates local and on-cloud data to deliver better protection. Data such as OSs, databases, applications, files and virtual machines of enterprises can be well protected and restored completely, accurately and instantly

in case of a disaster, minimizing economic loss.

Figure1-1 Product Overview Data BackupSupports full backup, differential backup, incremental backup, log backup,

synthetic backup, etc. Users can customize backup strategies for different types of data based on the usage of information resources in the enterprise production environment.

Data RecoverySupports full recovery such as OS and database, as well as recovery for a

specific file,mail or table. Enterprises can perform recovery for question files and achieve the rapid recovery of business operation.

Data Disaster RecoverySupports off-site disaster recovery, CDP (Continuous Data Protection), zero

data loss and data synchronization. It can build a comprehensive data disaster recovery program for enterprises.

Data High AvailabilityIntegrates shared storage HA with mirroring HA to ensure HA data protection in

different operating environments; Integrates CDP solution to achieve the overall protection of business system and data.

PAGE \* MERGEFORMAT17

Page 6: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

DBackup has received ISCCC by China Information Security Certification Center, complies with relevant Chinese legal requirements, is currently one of the few nationally certified data backup products.

PAGE \* MERGEFORMAT17

Page 7: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

2. System Architecture

2.1 Technical Architecture

The architecture design of DBackup based on B/S system, gives full consideration of development status and future development needs of informatization, and is an open, scalable, and strongly adaptable infrastructure.

On the construction of business module, multi-layer architecture is fully taken into consideration, and based on the concept of “high cohesion&low coupling”, modular design is realized including: backup/recovery, CDP, high availability, job management, resource management, monitoring management, data management and storage management module. Data backup and recovery on any internal and external platform is achieved to meet the needs of enterprises. Relevant technologies at home and abroad are in a leading position.

DBackup supports distributed deployment of backup system in multiple regions, and achieves centralized monitoring and management of the whole enterprise backup system through unified management and monitoring at multiple levels.

Figure2-2 DBackup Architecture

PAGE \* MERGEFORMAT17

Page 8: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

2.2 System Components

DBackup consists of one backup server, one or multiple storage servers, and one or multiple agents.

Figure2-3 System Components and Management

The backup server will manage all data from agents and storage servers. Users can configure job information on the backup server through WEB

management interface, and then the server will deliver the job order to the agent. The agent executes backup/restore operation, and stores data directly to the

storage server. The agent executes data synchronization operation, and then data

synchronization of databases will be realized between clients. The storage server follows the backup server’s pool copy instruction, and

backup data replication between storage pools on the same storage server or on different servers is implemented.

Supports backup data, catalog and other data’s backup to the remote storage server to achieve remote disaster recovery.

2.2.1 Backup Server

Provides DBackup management platform to manage the backup agent and storage server access, monitors and manages the client resource backup, recovery, data high availability and other business information, and saves the backup set catalog information.

PAGE \* MERGEFORMAT17

Page 9: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Figure2-4 Backup ConsoleDBackup management platform adopts stylish design concept, and integrates

resource management, business management as well as user management, which includes the following main features:

Adopts the cutting-edge design concept of the planar interface, combines APP design style of the mobile terminal and improves the interface interactive ability, service response speed and fashion aesthetic experience of the product.

Integrates backup and disaster recovery functions such as data backup, CDP, High Availability, data synchronization to implement full-scale management of backup and disaster recovery.

Adopts wizards to configure various types of backup jobs to greatly simplify business configuration and makes it user friendly.

2.2.2 Storage Server

The storage server is responsible for receiving and storing the backup data(backup set, CDP data, etc.) pushed by the client. Main storage media supported by Storage Server:

SSD,SAS, NLSAS, and STAT. Supports popular tape libraries, virtual tape libraries and optical disk storage

systems like IBM, Quantum, Tandberg and Amethystum. Supports AWS, Alibaba Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud,

Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.

2.2.3 Agent

Deployed on the client server for the integration of backup resources in order to

PAGE \* MERGEFORMAT17

Page 10: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

realize unified operation and management once the agent is connected to the backup server.

The agent, which is directly connected to the storage server, supports deployment in different environment such as physical machines and virtual machines, receives job schedules of backup servers, executes backup and recovery tasks, reduces bandwidth utilization percentage of data transmission and improves the backup efficiency by collecting, de-duplicating, compressing and limiting speed of backup data.

PAGE \* MERGEFORMAT17

Page 11: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

3. Data Protection

3.1 Backup Protection

3.1.1 File Protection

Supports backup, synchronization and recovery on various OS platforms including Windows, Linux, AIX, Solaris, HP-UX, and NeoKylin OS system under Loongson, FT,and Shenwei architectures, etc.

File protection is based on file block backup on system level, and in case of massive small files, it applies multi-level indexing and multi-thread paralleling processing for data acquisition to accelerate the backup speed by 10 to 20 times.

Figure3-5 Efficient Protection of Massive Files Supports the following backup types: full backup, incremental backup and

synthetic backup. Supports data filtering by means of including, excluding, etc., to realize the

refined extraction of file data. Supports custom processing operation of file data before and after backup

through configuring pre and post scripts. Adopts breakpoint resume technology to ensure the complete and efficient

transmission of file data in a weak network environment.

PAGE \* MERGEFORMAT17

Page 12: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Supports recovery of single or multiple files in original or custom path. Stores file backup data directly from the client to tape libraries with D2T

technology, and extract backup set data from tape libraries for client recovery. Stores file backup data directly from the client to public cloud platforms with

D2C technology, and extract backup set data from cloud platforms for client recovery.

DBackup applies variable-length partitioning technology partitions based on attributes of file data to optimize Deduplication ratio.

According to the client's resource, users can transfer file information after the slicing, and customize transmission channel of data backup to improve its transmission efficiency.

Figure3-6 Data Transmission Using Multiple Channels

3.1.2 Databases Protection

Supports backup and recovery of different databases on different OS platforms including major databases like Oracle, SQL Server, MySQL, Sybase, DB2, Informix, MongoDB and PostgreSQL on Windows, Linux, AIX, Solaris and HP-UX as well as domestic databases like DM, Kingbase, GBase, ShenTong.

Figure3-7 Comprehensive Databases ProtectionDBackup Comprehensive data protection aimed at major databases at home

and abroad. Data Synchronization: For databases such as Oracle, SQL Server, MySQL

in a homogeneous environment, it provides data real-time synchronization protection in the master/standby database environment and supports

PAGE \* MERGEFORMAT17

Page 13: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

master/standby database switching. Zero Data Loss: Adopts log synchronization mechanism to achieve zero

data loss of Oracle database. Database Disaster Recovery Drill: supports the verification of the

availability of backup data by setting up a routine disaster recovery drill. Database used in a drill can be leveraged for data analysis, testing and development in a non-production environment.

Hot Backup of Database: DBackup provides hot backup in which no interference will happen to the usage of database during data backup period to guarantee the continuity of business.

Data Encryption: Supports backup data encryption to ensure security of data storage.

Data High Availability: Supports high availability protection of shared/ mirrored database cluster.

3.1.3 Applications Protection

Supports backup and recovery of popular office applications in different OSs including: Microsoft Exchange Server, Lotus Domino, Microsoft SharePoint, Microsoft Active Directory.

Figure3-8 Application Support Hot Backup: Supports hot backup for application data, business will not be

disturbed during the backup process. Backup Types: For application database, it provides full backup,

incremental backup, log backup, etc.

PAGE \* MERGEFORMAT17

Page 14: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Email Backup: Supports email data backup. DAOS Backup: For Lotus Domino, it supports file data backup which

includes DAOS file backup. Data Recovery: Supports recovery of the original machine or the alter

machine. Supports designated recovery of a single mail.

3.1.4 OS Protection

Quick backup for popular operating systems including Linux and Windows by simple graphical interface operations. In case of corrupt OS due to software or hardware failures, users can recover the system with the latest backup through various protocols like P2P, P2V and V2V.

Figure3-9 OS Protection Module Instant Recovery: Supports the backup data of Windows OS to be directly

converted into data supported by virtual platforms such as VMWare, KVM, H3C, etc. and real-time recovery through the mount mode.

Boot Recovery: Supports OS Bare-Matel Recovery to reduce the time to configure application environment after redeployment.

Driver Replacement: A driver replacement interface is provided during OS recovery, allowing customers to adjust according to different drivers.

Smooth Migration of Servers: Supports recovery models such as P2P, P2V, V2V for OS recovery. A complete solution for system upgrades, migration and

PAGE \* MERGEFORMAT17

Page 15: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

large-scale deployment. Recovery for Specific Files: Supports data backup based on file level.

3.1.5 Virtual Machine Protection

Supports backup of virtual machines on virtual platforms like VMware, Hyper-V, Xen, Xen Server, KVM, FusionSphere, H3C CAS, OpenStack Newton, CNware etc., including virtual machines in multi-homed host cluster environment. Users can instantly recover it to a certain backup checkpoint in case of VM failures, data loss, corrupted applications and host damages.

Figure3-10 Efficient Protection of VMDBackup provides a complete VM protection program for the major

virtualization platform at home and abroad. Agentless Backup: Supports agentless VM backup to reduce the

consumption of host computing resources. Parallel Backup: Supports backup of multiple VMs on the same host

computer at the same time to improve backup efficiency. Effective Data Backup: Only backs up valid data on VMs to reduce data

storage space and the bandwidth occupied by data transmission. Cluster Backup: Supports VMs backup in cluster environment. When a VM

is drifted, DBackup automatically tracks the location of the VM and accesses the information of the new host computer to ensure the correct execution of VM backup.

3.1.6 Enhanced Security

Apply multiple authentications like USB-Key and account-password verification

PAGE \* MERGEFORMAT17

Page 16: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

to ensure legitimate access and identify access source servers with machine fingerprint. It has built a strict role management system controlling the approval process of backup and recovery. In the meantime, it extracts characteristic information from the backup data to prevent unauthorized tampering and provides users with a high level of data security.

1. Roles Collaboration: Establish mutual supervision and management among the

following roles: system administrators, security administrators, auditors, operators,

and etc.

2. Identity Authentication: Multi-layer identity authentication mechanism is adopted

to review the legitimacy of logged in users, and finger prints are required to verify

identities in case of accessing servers.

3. Approval Process: Implement strict security-administrator-approval system for

system personnel and business process management.

4. Digital Signature: The auditor confirms the approval information and uses digital

signatures to protect the data from tampering.

Figure3-11 High Level Data Security Protection

3.1.7 Disaster Recovery Drill

DBackup can realize periodic disaster recovery drills of backup data for major databases. Users can restore backup data to the designated standby machine with

PAGE \* MERGEFORMAT17

Page 17: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

a scheduled recovery to verify the availability of database backup set, and conduct disaster recovery drills for rapid data recovery in the event of data disaster.

Figure3-12 High Level Data Security Protection Supports regular automatic disaster recovery drills. Supports disaster recovery drills with the newest backup cluster. Recovery drills adopts various recovery means such as drills based on full

data recovery, incremental data recovery and so on.Through data recovery drill, staff management skills can be improved,

correctness of backup data can be verified, and data security management system can be optimized to ensure a smooth recovery operation and to minimize the loss of enterprises in case of a real data disaster.

3.2 Data Disaster Recovery

3.2.1 High Availability

DBackup HAC (High Availability Cluster) is a solution adopting shared storage and mirroring HAC for customers' computer application system and core business data. It provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and to avoid irreversible data and financial losses brought by a single point of failure in the business.

High Availability Based on Shared StorageBased on shared storage HAC solution, Active server and Standby Server can

be combined in various HA forms such as one to one and one to many. Once the main node fails, the standby node can be started quickly to strengthen the core

PAGE \* MERGEFORMAT17

Page 18: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

business system and realize its high availability. Mirroring High AvailabilityDBackup builds high availability cluster for enterprise core application through

mirroring if shared storage cannot be built. DBackup can detect any change of data through real-time monitoring of active server and activate the standby server in case active server fails.

Figure3-13 High Availability Cluster

Compatible with major OSs such as Windows and Linux. Supports various cluster nodes construction models such as one master

one standby, one master multiple standbys and so on. Protects major applications such as Oracle, SQL Server, MySQL and

Dameng, and protects more application softwares in a customized way. In order to support HA protection for more applications, DBackup provides

customized settings that users can configure appropriate data synchronization command processing according to different applications, and provide mirroring HA protection and shared HA protection for business applications.

Supports comprehensive real-time automatic fault monitoring including system failure, hardware failure, service failure and so on.

The quorum disk detection mechanism is provided to effectively prevent brain-splitting problems brought by incorrect switching caused by network malfunction.

Various detection modes such as special quorum disk, multi-link network monitoring, and multi-judgment are provided. Meanwhile, service can be automatically switched after malfunction is detected.

PAGE \* MERGEFORMAT17

Page 19: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

3.2.2 CDP

CDP (Continuous Data Protection) supports continuous protection of volume-level data. Through continuous monitoring of volume data changes, acquiring data log changes at the system level and storing them in the backup server in real time, when data disaster happens, it can rollback to any point based on data logs to meet enterprises' higher requirements on RTO and RPO.

Figure3-14 Continuous Data Protection (CDP) Real-time Monitoring: Build system-level monitoring system, and use

volume-level data I/O message triggering as the driver to achieve real-time monitoring of the changing data.

Instant Backup: With real-time monitoring, the capturing of volume-level changing data can reach the second-level, and backup window will be down to the minimum value that volume-level synchronization can realize.

Instant Recovery: Create recovery virtual volume, rapidly build metadata bitmap in the virtual volume using data logs backed up in real time, and instantly restore them to the designated recovery server by volume mount technology to ensure business continuity.

3.2.3 Data Replication

DBackup builds master/slave database environment, and provides regular as well as quasi real-time data synchronous replication protection for Oracle, SQL Server, MySQL, and Dameng. When the maintenance personnel confirm malfunction of the master database, it can trigger the master/slave database switching service. DBackup will automatically switch the master database with the slave database to ensure the business continuity.

PAGE \* MERGEFORMAT17

Page 20: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Figure3-15Database Replication

3.2.4 Zero Data Loss

Zero data loss protection for Oracle databases. DBackup can be used for data backup protection as well as data synchronization for business takeover to meet enterprise data protection requirements at any level.

Figure3-16 Zero Data Loss Based on real-time online log replication technology, the master database

synchronizes new data to DBackup. Continuous rolling forward of logs on the emergency active server to ensure

data synchronization between the standby server and the active server.

PAGE \* MERGEFORMAT17

Page 21: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Rolling forward based on redo logs to achieve zero data loss and real zero RPO.

3.2.5 Off-site Disaster Recovery

Based on the “Two Places & Three Centers” model and synchronous replication among storage pools, DBackup stores backup sets in various servers and nodes, and both on site and off site. When disaster happens in the on-site production environment, off-site backup sets could be used for recovery in multiple sites & multiple servers environment to realize off-site disaster recovery as well as automatic business takeover.

Figure3-17 Off-site Protection in Backup Environment

3.3 Data Management

3.3.1 Data Deduplication

The accurate Deduplication of DBackup is based on Deduplication on the source system and integration of variable-length & fixed-length partitioning technologies, reduces redundancy among backup sets to the maximum amount through accurate data fingerprint comparison and efficiently utilize enterprise storage space.

In the implementation of data Deduplication, hash algorithm is adopted after the data chunking process. “Fingerprint” is established for each chunk, and the system will check these data fingerprints and identify the “metadata” duplication.

If the duplication is identified, only “metadata” pointer will be kept.

PAGE \* MERGEFORMAT17

Page 22: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

If the “fingerprint” shows a chunk(or a file) is brand-new, the chunk will be kept and its relevant information will be stored as “metadata” for the future use.

Figure3-18 Accurate DeduplicationDBackup integrates variable-length & fixed-length partitioning technologies for

different types of backup targets. Meanwhile, variable-length partitioning technology can improve pairing probability and efficiency of data chunks by dynamic partitioning of data objects in different scopes.

Supports variable-length partitioning technology selected by users. Supports chunk size such as 4KiB, 128KiB, 256KiB, 512KiB by customized

fixed-length partitioning technology. Provides users with effective partitioning technologies based on industry

experience. Supports storage encryption for backup data after Deduplication. Provides life cycle management for backup data after Deduplication. Supports both source-side Deduplication and target-side de-duplcation.

3.3.2 Data Encryption

DBackup provides a wide array of data encryption algorithms to ensure data security during network transfer and storage. Users can encrypt data during transfer and in the storage pool with an encryption algorithm of their own choice.

Supports AES encryption algorithm. Users can choose different key lengths based on their security classification requirements.

Supports Blowfish encryption algorithm.

PAGE \* MERGEFORMAT17

Page 23: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

3.3.3 Data Compression

DBackup uses high-density data compression for backup data to reduce bandwidth occupation, improve backup efficiency and decrease the use of storage space.

3.3.4 D2T

Backup data transmission via LAN-based or LAN-Free network to physical or virtual tape libraries. When data recovery is required, backup data stored in tape libraries could be used for instant data recovery to target server.

Figure3-19 Disk to Tape Storage Supports direct backup data archiving of source-side to physical or virtual

tap library. Supports media recycling in tape library. Supports direct recovery of backup sets from the tape library to the source

terminal.

3.3.5 D2C

The Cloud Gateway combines our disaster recovery software with cloud computing platform technology and stores local backup data directly to public clouds by means of D2C, D2D2C, D2T2C, and D2C2C. It currently supports AWS, Alibaba

PAGE \* MERGEFORMAT17

Page 24: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud, Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.

Figure3-20 Local-to-Cloud Coordination Supports various data transmission models such as D2C, D2D2C and

D2T2C. Users can complete the cloud storage space link by configuring cloud

storage access information provided by cloud service providers in DBackup, which reduces investment on local storage infrastructure and makes the most of cloud space.

Supports regular data backup from clients or storage servers to cloud through job configuration to realize on-site and off-site data protection.

Supports breakpoint-resume. When interruption happens during data transmission, it can continue processing again from the break point.

3.4 Operation and Maintenance Support

3.4.1 Backup as a Service

The Multi-tenant is a backup cloud system based on DBackup which establishes an account mechanism for business units. Each account is for one tenant. A private backup space is created for multiple tenants in a shared backup environment to provide tenants with personalized business. It realizes the unified management of the backup system, reduces the investment in the construction of data security protection, and greatly simplifies the management of backup operation and maintenance in enterprises with complicated organization hierarchy.

All tenants share the same physical backup environment. Tenants are provided with personalized business based on their backup and

PAGE \* MERGEFORMAT17

Page 25: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

recovery needs. Independent data storage capacity is allocated to tenants and separate

management can be achieved. Data isolation among tenants guarantees there is no interference among

them.

Figure3-21 Backup Cloud Service

3.4.2 Backup Speed Control

To avoid massive transmission bandwidth taken up by data backup to affect users’ core business, DBackup provides customized speed limit setting that users can customize the maximum data transmission speed in different time periods.

Supports customized data transmission speed between clients and storage servers.

Supports customized speed of backup data replication among storage servers.

Supports speed limit setting for multiple time periods. The minimum unit of transmission speed limit is MiB/s.

PAGE \* MERGEFORMAT17

Page 26: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

3.4.3 Backup Protection Approaches

Supports various backup approaches including full backup, incremental backup, differential backup, log backup and synthetic backup; supports various recovery approaches including mount recovery, media recovery, checkpoint recovery and automatic disaster recovery.

3.4.4 Backup Recovery Strategies

The flexible backup strategy management platform allows users to have their backup scheduled to be done immediately or every minute, hour, week or month. Backup strategy could be customized according to enterprise information security requirements and backup/recovery will be carried out at a pre-set time or periodically.

Supports immediate execution. Supports pre-set job running and executes the job only once. Supports periodical job running per hour/minute. Supports periodical job running daily or every N days. Supports periodical job running weekly or every N weeks. Supports periodical job running every month at a specified time.

3.4.5 Access Management

It allows creating multiple users with specific authorizations assigned by the administrator to ensure users have the appropriate access or authorization. Based on close relationship of roles and clear authorization, users are divided into system users and audit users.

System Users: System administrators, administrators,Operators, monitors, multi-tenant account administrators, multi-tenant operators, multi-tenant monitors.

Audit Users: Audit administrator and auditor.

3.4.6 Poor Network Transmission

With DBackup’s unique poor network support technology, enterprises can enjoy reliable data protection service under restricted network condition. Under unstable network condition, efficient off-site backup and recovery could be achieved by breakpoint resume through local caching, which avoids heavy reliability on the

PAGE \* MERGEFORMAT17

Page 27: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

costly, proprietary, high-speed, and fiber-optic network.

3.4.7 LAN-Free Environment

It supports not only LAN-Basebut also LAN-Free backup of files, operating systems, databases, application softwares and virtual machines to significantly improve backup speed and reduce IP network occupation.

3.4.8 Unified Monitoring

DBackup can construct a distributed multi-layer backup system and allows independent backup management for each section. It also provides a unified monitoring platform to manage data resources in every backup system and monitor job executing information, alerting information, resource occupation information and host connection information, which greatly reduces the difficulty of OAM of multi-sites backup.

Figure3-22 Distributed Multi-layer Management and Unified Monitoring

PAGE \* MERGEFORMAT17

Page 28: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

3.4.9 Multi-dimensional Statistics

Supports multi-dimensional statistics displayed with figures. The administrator can either run statistics on system data or on some tenant’s data though an account. Storage size, hosts, resources, job speed, job time and other dimensions can be chosen, and export of statistical results will be supported to help users comprehensively understand the health condition of backup environment.

4. Distinctive Technologies

4.1 Storage Pool Management

Creates a unified storage pool management system based on hyper convergence technology by incorporating all available enterprise storage spaces into the system. The convergence technology processes and virtualizes all available spaces, then redistribute them into different pools. The storage pool can provide a wide array of data services such as data archive, data deduplication and data replication.

Users can create different pools of various sizes and types (local pool/Deduplication pool/tape pool/synthetic pool/object pool) upon different demands to utilize available storage spaces in a better way and improve utilization ratio in enterprises.

PAGE \* MERGEFORMAT17

Page 29: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Figure4-23 Integrate Efficient Storage Resources of Enterprises Supports SSD, SAS, NLSAS, and STAT; Supports popular tape libraries, virtual tape libraries and optical disk storage

systems like IBM, Quantum, Tandberg and Amethystum. Supports storage space expansion of multiple storage servers in the same

storage pool. Establishes various types of storage pools including standard storage pool,

Deduplication storage pool, tape library pool, local storage pool, synthetic pool (file synthetic pool, database synthetic pool), real-time backup pool, and object storage pool.

Supports storage data configuration of life cycle management based on the capacity usage setting.

Supports storage data configuration of life cycle management through effective retention time.

Supports customized numbers of permanent full backup data in the storage pool.

PAGE \* MERGEFORMAT17

Page 30: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

4.2 Synthetic Backup of Files

Index point relocation technology is adopted during DBackup file synthetic process. File index pointer is relocated to the new file data and the space occupied by the old file data will be reclaimed. A brand new virtual full backup data is established by the indication of file index pointer and associating new data.

Synthetic backup of files supports any platform and environment, especially file backup through NFS and CIFS mount disks.

Figure4-24 File Backup ProcessIndex point relocation synthetic technology solves traditional synthetic problems

and improves synthetic backup efficiency. By modifying the file index pointer, disk movement with a large amount of

blocks can be avoided during the synthetic process and server’s I/O load can be reduced at the same time.

Through virtual full backup to reduce backup recovery time and improve recovery efficiency.

No need for a large amount of temporary storage space for file data synthesis.

4.3 Synthetic Backup of Database

Synthetic backup of database is based on its backup features and integrates

PAGE \* MERGEFORMAT17

Page 31: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

file snapshot, mounting and other technologies. After the data file is copied to the backup server, the first step is to consolidate the backup data, and then generate a snapshot of the data, which can be instantly restored by mounting after the production data has failed.

Figure4-25 Database Synthetic Backup Process Supports SQL Server, Oracle 10g and higher version databases including

single instances and RAC environment. The synthetic backup is based on backup features of Oracle and SQL

Server to ensure backup stability. The block device and snapshot technologies are adopted to save full

backup data at multiple backup time points. Instant recovery of backup data at every time point is realized through

mounting.

4.4 Continuous Log Real-time Protection (CLRP)

CLRP is our independently developed technology targeting Oracle/Oracle RAC and MySQL database protection and meanwhile improving real-time data protection. It is a kind of block-based data backup technology. By monitoring messages in the

PAGE \* MERGEFORMAT17

Page 32: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

file system and capturing change of redo and archive logs, it performs real-time continuous backup of log files.

Figure4-26 Continuous Log Real-time Protection (CLRP)

DBackup CLRP realizes backup protection of changing data within the second, which pushes database protection technology to a new height.

Main Advantages of CLRP: Reduce RPO to the second level, and the average RPO is 0.2 second. Real-time replicated changing data blocks are quite small and resource

occupancy is superior to CDP. No soft or hard drivers are required and business system won't be affected. Recovery to any time point or SCN, and no standby emergency machine is

required.

4.5 OS Virtual Migration

Users can transform Windows OS backup sets into virtual disk formats that are supported by VMware, KVM, H3C and CAS, and use such data for recovery if needed, which realizes the P2V and V2V fast migration of Windows OS platform.

4.6 Hot Backup of MySQL

Hot backup of the MySQL database without interfering with its functionalities can perform instant data recovery to any point-in-time. Based on backup log, MySQL hot backup is much better than logical backup in application:

The Hot backup is carried out while the database is operating to ensure business continuity

Supports incremental backup and only backs up changed data. Backup efficiency has been greatly improved and disk space has been saved by smaller

PAGE \* MERGEFORMAT17

Page 33: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

size of backup data. Almost all database entities can be recovered. Can perform recovery to any point-in-time and back to any state of the

database to retrieve accidentally deleted or damaged data and ensure data completeness.

4.7 Hot backup of Informix

Hot backup of the Informix database without interfering with its functionalities using ON-Bar can perform data recovery to any point-in-time.

Supports data recovery to any point-in-time. Supports automatic setting using ON-Bar and no manual setting is needed. Can be easily integrated into the existing storage manager solutions.

PAGE \* MERGEFORMAT17

Page 34: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

5. Supported Environment

5.1 Supported Backup and Storage Server Platforms

5.1.1 Windows OS

Windows 2003/2008/2012 series

5.1.2 Linux OS

Ubuntu Server 12.04/14.04 Red Flag Asianux 2/3 series CentOS 4/5/6/7 series Red Hat Enterprise Linux 4/5/6/7 series NeoKylin 6.0 (Loongson) YHKylin 4.0 (FT 1500A) Kylin 4.02 (FT 1500A) NeoKylin 4.0 (FT 1000) iSoft Server OS 4.0 iSoft Server OS 3.0/5.0 (Loongson)

5.2 Supported Client Platforms

5.2.1 Windows OS

Windows 2000/2003/2008/2012 series Windows XP SP3/7/8/10 series

5.2.2 Linux OS

Red Flag Asianux 2/3 series Red Flag DC 4.1/5.0 series Red Hat Enterprise Linux 3/4/5/6/7 series Oracle Enterprise Linux 4/5/6/7 series CentOS 3/4/5/6/7 series openSUSE 10.3/11.4 series SUSE Linux Enterprise Server 9/10/11 series Neokylin Linux Server 5/6 series

PAGE \* MERGEFORMAT17

Page 35: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

Ubuntu Server 12.04/14.04 Debian 6.0/7.0/8.0 series IBM Power Linux Scientific Linux 4/5/6 series

5.2.3 UNIX OS

AIX 5.1/5.3/6.1/7.1 series Solaris 9/10/11 series HP-UX 11.11/11.23/11.31series

5.2.4 Domestic OS

NeoKylin 4 (FT 1000) YHKylin 4 (FT 1500A) Kylin 4.02 (FT 1500A) NeoKylin 6/7 (Loongson) NeoKylin 4/6 (Shenwei) Linux Rocky Secure Operating System Linux Secure Operating System iSoft Server OS 3.0、5.0 (Loongson) iSoft Server OS 4.0 Inspur K1 UNX

5.3 Supported Virtualization Platforms

5.3.1 Popular International Virtual Platforms

VMware vSphere 4.1/5.0/5.1/5.5/6.0/6.5 KVM (qemu 1.0.0 ~ 2.8.0,libvirt 0.98 ~ 3.00) Xen 4.0 or above,libvirt 1.2.8 or above Citrix XenServer 6.2/6.5/7.0/7.1 Hyper-V (Windows 8.1/Windows Server 2008 SP2/2008 R2 SP1/2012/2012

R2) ~ Hosted Architecture Hyper-V Server 2012/2012 R2 ~ Bare Metal Architecture OpenStack Newton/Liberty

5.3.2 Popular Domestic Virtual Platforms

FusionSphere V100R005/V100R006 (5.0/5.1/6.0)

PAGE \* MERGEFORMAT17

Page 36: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

CNware 6.0 H3C CAS E0222/E0225/E0301/E0303/E0306

5.4 Supported Databases

5.4.1 Popular International Database Software

Oracle 8i/9i/10g/11g/12c SQL Server 2000/2005/2008/2012/2014/2016 MySQL 4/5/6 Sybase 12.5/15.5/15.7/16.0 PostgreSQL 8.1/8.4/9.2/9.3/9.4/9.5 DB2 8.1/9.1/9.5/9.7/10.1/10.5/11.1 Informix 11.5/11.7/ 12.1 MongoDB 2.4/2.6/3.0/3.2/3.4

5.4.2 Popular Domestic Database Software

ShenTong 7.0 DM 7.1 Kingbase 7.1/8.0 GBase 8a/8s/8t

5.5 Application Software

Exchange 2000/2003/2007/2010/2013 Lotus Domino 8.0/8.5/9.0 MS SharePoint 2007/2010

5.6 Supported Storage Object

Amazon (AWS S3) Alibaba Cloud (OSS) Baidu Cloud (BOS) Huawei Cloud (OBS) Tencent Cloud (COS) Sina Cloud (SCS) KSYUN (KS3) Qiniu (Qiniu S3) e Cloud (CT-OOS)

PAGE \* MERGEFORMAT17

Page 38: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

6. About Scutech

Scutech Corporation (Scutech), is a nationally certified high-tech enterprise with internationally advanced data backup technology. Scutech is devoted to the R&D and marketing of operation-and-maintenance-level storage and backup hardware-software products with independent intellectual property rights. Upholding the notion of “Develop Chinese Software, Innovate Top Technology” and the enterprise spirit of “Focus, Innovation, Cooperation, and Perseverance”, Scutech has been gradually introducing made-in-China backup & DR hardware-software solutions to the world, stepping towards its goal as an international storage backup brand.

A National Brand Devoted to National Data SecurityChina Electronics Corporation (CEC) is a state-owned conglomerate formed on

the basis of a research facility directly under the administration of the former MII (Ministry of Information Industry) and high-tech enterprises. As a strategic investment enterprise of CEC, Scutech has shouldered the responsibility of guarding national data security.

To get rid of technological suppression from foreign products, Scutech and other related CEC subsidiaries worked together and successfully developed the first completely home-bred, autonomous and controllable backup and disaster recovery hardware-software integration platform based on domestic chips and operating systems, fundamentally solving the future problems of national information security.

Comprehensive Development and Continuous InnovationScuetch Corporation with complete industrial chain involving autonomous and

controllable storage, data management, backup, disaster recovery and information system can provide customers with comprehensive solution which consists of advanced disaster recovery backup, HA information system as well as cloud backup DR center design, implementation and services.

Scutech data protection products with cost-effective feature and user-friendly interface achieve effective data protection. DBackup is a completely autonomous and controllable backup and DR platform which includes file backup, database backup, OS backup, virtual backup and etc. with unique functions such as zero data loss, business takeover, and disaster recovery drill. At the same time, it realizes hierarchical management, alarms, reports and other enterprise management functions.

As the only information security and backup & DR management base of production, education and research, authorized by the Ministry of Industry and Information Technology, Scuetch Corporation undertakes a number of significant national information security projects. With strong technology, rigorous attitude,

PAGE \* MERGEFORMAT17

Page 39: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

DBackup White Paper

professional services, Scuetch Corporation will offer you trustworthy data protection.

PAGE \* MERGEFORMAT17

Page 40: citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and

Address:Floor. 9 Building A5,Guangzhou Science City Headquarters Economic Zone, No. 243 Kexue Avenue, Guangzhou City,  Guangdong Province, ChinaCode:510670Tel:+86 020 32053160Customer Service:400-995-1106Website:www.scutech.com