citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment,...
Transcript of citrixready.citrix.com · Web viewIt provides a multi-node cluster disaster recovery environment,...
DBackup White Paper
Scuetch Corporation Co., Ltd.
Copyright NoticeCopyright© 2009-2018 Scutech Corporation All rights reserved.
Scutech has completed a detailed proofreading of this article. However, it is not
guaranteed that the content does not contain technical errors or typographical errors
or omissions, if any of which appears, Scutech does not undertake any liability.The Company reserve the exclusive right to update or revise the information on this
brochure without prior notice.
DBackup White Paper
Content1. Overview..............................................................................................................................12. System Architecture....................................................................................................3
2.1 Technical Architecture.......................................................................................................32.2 System Components.........................................................................................................3
2.2.1 Backup Server.........................................................................................................42.2.2 Storage Server........................................................................................................52.2.3 Agent.......................................................................................................................5
3. Data Protection...............................................................................................................73.1 Backup Protection.............................................................................................................7
3.1.1 File Protection.........................................................................................................73.1.2 Databases Protection..............................................................................................83.1.3 Applications Protection............................................................................................93.1.4 OS Protection........................................................................................................103.1.5 Virtual Machine Protection....................................................................................113.1.6 Enhanced Security................................................................................................113.1.7 Disaster Recovery Drill..........................................................................................12
3.2 Data Disaster Recovery..................................................................................................133.2.1 High Availability.....................................................................................................133.2.2 CDP.......................................................................................................................143.2.3 Data Replication....................................................................................................153.2.4 Zero Data Loss......................................................................................................163.2.5 Off-site Disaster Recovery....................................................................................17
3.3 Data Management...........................................................................................................173.3.1 Data Deduplication................................................................................................173.3.2 Data Encryption.....................................................................................................183.3.3 Data Compression................................................................................................193.3.4 D2T........................................................................................................................193.3.5 D2C.......................................................................................................................19
3.4 Operation and Maintenance Support..............................................................................203.4.1 Backup as a Service.............................................................................................203.4.2 Backup Speed Control..........................................................................................213.4.3 Backup Protection Approaches.............................................................................213.4.4 Backup Recovery Strategies.................................................................................223.4.5 Access Management.............................................................................................223.4.6 Poor Network Transmission..................................................................................223.4.7 LAN-Free Environment.........................................................................................223.4.8 Unified Monitoring.................................................................................................233.4.9 Multi-dimensional Statistics...................................................................................23
4. Distinctive Technologies.........................................................................................244.1 Storage Pool Management..............................................................................................244.2 Synthetic Backup of Files................................................................................................254.3 Synthetic Backup of Database........................................................................................264.4 Continuous Log Real-time Protection (CLRP)................................................................27
DBackup White Paper
4.5 OS Virtual Migration........................................................................................................274.6 Hot Backup of MySQL.....................................................................................................284.7 Hot backup of Informix....................................................................................................28
5. Supported Environment..........................................................................................295.1 Supported Backup and Storage Server Platforms..........................................................29
5.1.1 Windows OS.........................................................................................................295.1.2 Linux OS...............................................................................................................29
5.2 Supported Client Platforms.............................................................................................295.2.1 Windows OS.........................................................................................................295.2.2 Linux OS...............................................................................................................295.2.3 UNIX OS...............................................................................................................305.2.4 Domestic OS.........................................................................................................30
5.3 Supported Virtualization Platforms..................................................................................305.3.1 Popular International Virtual Platforms.................................................................305.3.2 Popular Domestic Virtual Platforms......................................................................31
5.4 Supported Databases......................................................................................................315.4.1 Popular International Database Software.............................................................315.4.2 Popular Domestic Database Software..................................................................31
5.5 Application Software........................................................................................................315.6 Supported Storage Object...............................................................................................32
6. About Scutech................................................................................................................33
DBackup White Paper
1. Overview
DBackup is enterprise-level security software that integrates data backup & disaster recovery and high availability all in one. It has built a backup cloud and features multi-tenancy and coordinates local and on-cloud data to deliver better protection. Data such as OSs, databases, applications, files and virtual machines of enterprises can be well protected and restored completely, accurately and instantly
in case of a disaster, minimizing economic loss.
Figure1-1 Product Overview Data BackupSupports full backup, differential backup, incremental backup, log backup,
synthetic backup, etc. Users can customize backup strategies for different types of data based on the usage of information resources in the enterprise production environment.
Data RecoverySupports full recovery such as OS and database, as well as recovery for a
specific file,mail or table. Enterprises can perform recovery for question files and achieve the rapid recovery of business operation.
Data Disaster RecoverySupports off-site disaster recovery, CDP (Continuous Data Protection), zero
data loss and data synchronization. It can build a comprehensive data disaster recovery program for enterprises.
Data High AvailabilityIntegrates shared storage HA with mirroring HA to ensure HA data protection in
different operating environments; Integrates CDP solution to achieve the overall protection of business system and data.
PAGE \* MERGEFORMAT17
DBackup White Paper
DBackup has received ISCCC by China Information Security Certification Center, complies with relevant Chinese legal requirements, is currently one of the few nationally certified data backup products.
PAGE \* MERGEFORMAT17
DBackup White Paper
2. System Architecture
2.1 Technical Architecture
The architecture design of DBackup based on B/S system, gives full consideration of development status and future development needs of informatization, and is an open, scalable, and strongly adaptable infrastructure.
On the construction of business module, multi-layer architecture is fully taken into consideration, and based on the concept of “high cohesion&low coupling”, modular design is realized including: backup/recovery, CDP, high availability, job management, resource management, monitoring management, data management and storage management module. Data backup and recovery on any internal and external platform is achieved to meet the needs of enterprises. Relevant technologies at home and abroad are in a leading position.
DBackup supports distributed deployment of backup system in multiple regions, and achieves centralized monitoring and management of the whole enterprise backup system through unified management and monitoring at multiple levels.
Figure2-2 DBackup Architecture
PAGE \* MERGEFORMAT17
DBackup White Paper
2.2 System Components
DBackup consists of one backup server, one or multiple storage servers, and one or multiple agents.
Figure2-3 System Components and Management
The backup server will manage all data from agents and storage servers. Users can configure job information on the backup server through WEB
management interface, and then the server will deliver the job order to the agent. The agent executes backup/restore operation, and stores data directly to the
storage server. The agent executes data synchronization operation, and then data
synchronization of databases will be realized between clients. The storage server follows the backup server’s pool copy instruction, and
backup data replication between storage pools on the same storage server or on different servers is implemented.
Supports backup data, catalog and other data’s backup to the remote storage server to achieve remote disaster recovery.
2.2.1 Backup Server
Provides DBackup management platform to manage the backup agent and storage server access, monitors and manages the client resource backup, recovery, data high availability and other business information, and saves the backup set catalog information.
PAGE \* MERGEFORMAT17
DBackup White Paper
Figure2-4 Backup ConsoleDBackup management platform adopts stylish design concept, and integrates
resource management, business management as well as user management, which includes the following main features:
Adopts the cutting-edge design concept of the planar interface, combines APP design style of the mobile terminal and improves the interface interactive ability, service response speed and fashion aesthetic experience of the product.
Integrates backup and disaster recovery functions such as data backup, CDP, High Availability, data synchronization to implement full-scale management of backup and disaster recovery.
Adopts wizards to configure various types of backup jobs to greatly simplify business configuration and makes it user friendly.
2.2.2 Storage Server
The storage server is responsible for receiving and storing the backup data(backup set, CDP data, etc.) pushed by the client. Main storage media supported by Storage Server:
SSD,SAS, NLSAS, and STAT. Supports popular tape libraries, virtual tape libraries and optical disk storage
systems like IBM, Quantum, Tandberg and Amethystum. Supports AWS, Alibaba Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud,
Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.
2.2.3 Agent
Deployed on the client server for the integration of backup resources in order to
PAGE \* MERGEFORMAT17
DBackup White Paper
realize unified operation and management once the agent is connected to the backup server.
The agent, which is directly connected to the storage server, supports deployment in different environment such as physical machines and virtual machines, receives job schedules of backup servers, executes backup and recovery tasks, reduces bandwidth utilization percentage of data transmission and improves the backup efficiency by collecting, de-duplicating, compressing and limiting speed of backup data.
PAGE \* MERGEFORMAT17
DBackup White Paper
3. Data Protection
3.1 Backup Protection
3.1.1 File Protection
Supports backup, synchronization and recovery on various OS platforms including Windows, Linux, AIX, Solaris, HP-UX, and NeoKylin OS system under Loongson, FT,and Shenwei architectures, etc.
File protection is based on file block backup on system level, and in case of massive small files, it applies multi-level indexing and multi-thread paralleling processing for data acquisition to accelerate the backup speed by 10 to 20 times.
Figure3-5 Efficient Protection of Massive Files Supports the following backup types: full backup, incremental backup and
synthetic backup. Supports data filtering by means of including, excluding, etc., to realize the
refined extraction of file data. Supports custom processing operation of file data before and after backup
through configuring pre and post scripts. Adopts breakpoint resume technology to ensure the complete and efficient
transmission of file data in a weak network environment.
PAGE \* MERGEFORMAT17
DBackup White Paper
Supports recovery of single or multiple files in original or custom path. Stores file backup data directly from the client to tape libraries with D2T
technology, and extract backup set data from tape libraries for client recovery. Stores file backup data directly from the client to public cloud platforms with
D2C technology, and extract backup set data from cloud platforms for client recovery.
DBackup applies variable-length partitioning technology partitions based on attributes of file data to optimize Deduplication ratio.
According to the client's resource, users can transfer file information after the slicing, and customize transmission channel of data backup to improve its transmission efficiency.
Figure3-6 Data Transmission Using Multiple Channels
3.1.2 Databases Protection
Supports backup and recovery of different databases on different OS platforms including major databases like Oracle, SQL Server, MySQL, Sybase, DB2, Informix, MongoDB and PostgreSQL on Windows, Linux, AIX, Solaris and HP-UX as well as domestic databases like DM, Kingbase, GBase, ShenTong.
Figure3-7 Comprehensive Databases ProtectionDBackup Comprehensive data protection aimed at major databases at home
and abroad. Data Synchronization: For databases such as Oracle, SQL Server, MySQL
in a homogeneous environment, it provides data real-time synchronization protection in the master/standby database environment and supports
PAGE \* MERGEFORMAT17
DBackup White Paper
master/standby database switching. Zero Data Loss: Adopts log synchronization mechanism to achieve zero
data loss of Oracle database. Database Disaster Recovery Drill: supports the verification of the
availability of backup data by setting up a routine disaster recovery drill. Database used in a drill can be leveraged for data analysis, testing and development in a non-production environment.
Hot Backup of Database: DBackup provides hot backup in which no interference will happen to the usage of database during data backup period to guarantee the continuity of business.
Data Encryption: Supports backup data encryption to ensure security of data storage.
Data High Availability: Supports high availability protection of shared/ mirrored database cluster.
3.1.3 Applications Protection
Supports backup and recovery of popular office applications in different OSs including: Microsoft Exchange Server, Lotus Domino, Microsoft SharePoint, Microsoft Active Directory.
Figure3-8 Application Support Hot Backup: Supports hot backup for application data, business will not be
disturbed during the backup process. Backup Types: For application database, it provides full backup,
incremental backup, log backup, etc.
PAGE \* MERGEFORMAT17
DBackup White Paper
Email Backup: Supports email data backup. DAOS Backup: For Lotus Domino, it supports file data backup which
includes DAOS file backup. Data Recovery: Supports recovery of the original machine or the alter
machine. Supports designated recovery of a single mail.
3.1.4 OS Protection
Quick backup for popular operating systems including Linux and Windows by simple graphical interface operations. In case of corrupt OS due to software or hardware failures, users can recover the system with the latest backup through various protocols like P2P, P2V and V2V.
Figure3-9 OS Protection Module Instant Recovery: Supports the backup data of Windows OS to be directly
converted into data supported by virtual platforms such as VMWare, KVM, H3C, etc. and real-time recovery through the mount mode.
Boot Recovery: Supports OS Bare-Matel Recovery to reduce the time to configure application environment after redeployment.
Driver Replacement: A driver replacement interface is provided during OS recovery, allowing customers to adjust according to different drivers.
Smooth Migration of Servers: Supports recovery models such as P2P, P2V, V2V for OS recovery. A complete solution for system upgrades, migration and
PAGE \* MERGEFORMAT17
DBackup White Paper
large-scale deployment. Recovery for Specific Files: Supports data backup based on file level.
3.1.5 Virtual Machine Protection
Supports backup of virtual machines on virtual platforms like VMware, Hyper-V, Xen, Xen Server, KVM, FusionSphere, H3C CAS, OpenStack Newton, CNware etc., including virtual machines in multi-homed host cluster environment. Users can instantly recover it to a certain backup checkpoint in case of VM failures, data loss, corrupted applications and host damages.
Figure3-10 Efficient Protection of VMDBackup provides a complete VM protection program for the major
virtualization platform at home and abroad. Agentless Backup: Supports agentless VM backup to reduce the
consumption of host computing resources. Parallel Backup: Supports backup of multiple VMs on the same host
computer at the same time to improve backup efficiency. Effective Data Backup: Only backs up valid data on VMs to reduce data
storage space and the bandwidth occupied by data transmission. Cluster Backup: Supports VMs backup in cluster environment. When a VM
is drifted, DBackup automatically tracks the location of the VM and accesses the information of the new host computer to ensure the correct execution of VM backup.
3.1.6 Enhanced Security
Apply multiple authentications like USB-Key and account-password verification
PAGE \* MERGEFORMAT17
DBackup White Paper
to ensure legitimate access and identify access source servers with machine fingerprint. It has built a strict role management system controlling the approval process of backup and recovery. In the meantime, it extracts characteristic information from the backup data to prevent unauthorized tampering and provides users with a high level of data security.
1. Roles Collaboration: Establish mutual supervision and management among the
following roles: system administrators, security administrators, auditors, operators,
and etc.
2. Identity Authentication: Multi-layer identity authentication mechanism is adopted
to review the legitimacy of logged in users, and finger prints are required to verify
identities in case of accessing servers.
3. Approval Process: Implement strict security-administrator-approval system for
system personnel and business process management.
4. Digital Signature: The auditor confirms the approval information and uses digital
signatures to protect the data from tampering.
Figure3-11 High Level Data Security Protection
3.1.7 Disaster Recovery Drill
DBackup can realize periodic disaster recovery drills of backup data for major databases. Users can restore backup data to the designated standby machine with
PAGE \* MERGEFORMAT17
DBackup White Paper
a scheduled recovery to verify the availability of database backup set, and conduct disaster recovery drills for rapid data recovery in the event of data disaster.
Figure3-12 High Level Data Security Protection Supports regular automatic disaster recovery drills. Supports disaster recovery drills with the newest backup cluster. Recovery drills adopts various recovery means such as drills based on full
data recovery, incremental data recovery and so on.Through data recovery drill, staff management skills can be improved,
correctness of backup data can be verified, and data security management system can be optimized to ensure a smooth recovery operation and to minimize the loss of enterprises in case of a real data disaster.
3.2 Data Disaster Recovery
3.2.1 High Availability
DBackup HAC (High Availability Cluster) is a solution adopting shared storage and mirroring HAC for customers' computer application system and core business data. It provides a multi-node cluster disaster recovery environment, establishes a fast server takeover mechanism to ensure 7x24 business continuity and to avoid irreversible data and financial losses brought by a single point of failure in the business.
High Availability Based on Shared StorageBased on shared storage HAC solution, Active server and Standby Server can
be combined in various HA forms such as one to one and one to many. Once the main node fails, the standby node can be started quickly to strengthen the core
PAGE \* MERGEFORMAT17
DBackup White Paper
business system and realize its high availability. Mirroring High AvailabilityDBackup builds high availability cluster for enterprise core application through
mirroring if shared storage cannot be built. DBackup can detect any change of data through real-time monitoring of active server and activate the standby server in case active server fails.
Figure3-13 High Availability Cluster
Compatible with major OSs such as Windows and Linux. Supports various cluster nodes construction models such as one master
one standby, one master multiple standbys and so on. Protects major applications such as Oracle, SQL Server, MySQL and
Dameng, and protects more application softwares in a customized way. In order to support HA protection for more applications, DBackup provides
customized settings that users can configure appropriate data synchronization command processing according to different applications, and provide mirroring HA protection and shared HA protection for business applications.
Supports comprehensive real-time automatic fault monitoring including system failure, hardware failure, service failure and so on.
The quorum disk detection mechanism is provided to effectively prevent brain-splitting problems brought by incorrect switching caused by network malfunction.
Various detection modes such as special quorum disk, multi-link network monitoring, and multi-judgment are provided. Meanwhile, service can be automatically switched after malfunction is detected.
PAGE \* MERGEFORMAT17
DBackup White Paper
3.2.2 CDP
CDP (Continuous Data Protection) supports continuous protection of volume-level data. Through continuous monitoring of volume data changes, acquiring data log changes at the system level and storing them in the backup server in real time, when data disaster happens, it can rollback to any point based on data logs to meet enterprises' higher requirements on RTO and RPO.
Figure3-14 Continuous Data Protection (CDP) Real-time Monitoring: Build system-level monitoring system, and use
volume-level data I/O message triggering as the driver to achieve real-time monitoring of the changing data.
Instant Backup: With real-time monitoring, the capturing of volume-level changing data can reach the second-level, and backup window will be down to the minimum value that volume-level synchronization can realize.
Instant Recovery: Create recovery virtual volume, rapidly build metadata bitmap in the virtual volume using data logs backed up in real time, and instantly restore them to the designated recovery server by volume mount technology to ensure business continuity.
3.2.3 Data Replication
DBackup builds master/slave database environment, and provides regular as well as quasi real-time data synchronous replication protection for Oracle, SQL Server, MySQL, and Dameng. When the maintenance personnel confirm malfunction of the master database, it can trigger the master/slave database switching service. DBackup will automatically switch the master database with the slave database to ensure the business continuity.
PAGE \* MERGEFORMAT17
DBackup White Paper
Figure3-15Database Replication
3.2.4 Zero Data Loss
Zero data loss protection for Oracle databases. DBackup can be used for data backup protection as well as data synchronization for business takeover to meet enterprise data protection requirements at any level.
Figure3-16 Zero Data Loss Based on real-time online log replication technology, the master database
synchronizes new data to DBackup. Continuous rolling forward of logs on the emergency active server to ensure
data synchronization between the standby server and the active server.
PAGE \* MERGEFORMAT17
DBackup White Paper
Rolling forward based on redo logs to achieve zero data loss and real zero RPO.
3.2.5 Off-site Disaster Recovery
Based on the “Two Places & Three Centers” model and synchronous replication among storage pools, DBackup stores backup sets in various servers and nodes, and both on site and off site. When disaster happens in the on-site production environment, off-site backup sets could be used for recovery in multiple sites & multiple servers environment to realize off-site disaster recovery as well as automatic business takeover.
Figure3-17 Off-site Protection in Backup Environment
3.3 Data Management
3.3.1 Data Deduplication
The accurate Deduplication of DBackup is based on Deduplication on the source system and integration of variable-length & fixed-length partitioning technologies, reduces redundancy among backup sets to the maximum amount through accurate data fingerprint comparison and efficiently utilize enterprise storage space.
In the implementation of data Deduplication, hash algorithm is adopted after the data chunking process. “Fingerprint” is established for each chunk, and the system will check these data fingerprints and identify the “metadata” duplication.
If the duplication is identified, only “metadata” pointer will be kept.
PAGE \* MERGEFORMAT17
DBackup White Paper
If the “fingerprint” shows a chunk(or a file) is brand-new, the chunk will be kept and its relevant information will be stored as “metadata” for the future use.
Figure3-18 Accurate DeduplicationDBackup integrates variable-length & fixed-length partitioning technologies for
different types of backup targets. Meanwhile, variable-length partitioning technology can improve pairing probability and efficiency of data chunks by dynamic partitioning of data objects in different scopes.
Supports variable-length partitioning technology selected by users. Supports chunk size such as 4KiB, 128KiB, 256KiB, 512KiB by customized
fixed-length partitioning technology. Provides users with effective partitioning technologies based on industry
experience. Supports storage encryption for backup data after Deduplication. Provides life cycle management for backup data after Deduplication. Supports both source-side Deduplication and target-side de-duplcation.
3.3.2 Data Encryption
DBackup provides a wide array of data encryption algorithms to ensure data security during network transfer and storage. Users can encrypt data during transfer and in the storage pool with an encryption algorithm of their own choice.
Supports AES encryption algorithm. Users can choose different key lengths based on their security classification requirements.
Supports Blowfish encryption algorithm.
PAGE \* MERGEFORMAT17
DBackup White Paper
3.3.3 Data Compression
DBackup uses high-density data compression for backup data to reduce bandwidth occupation, improve backup efficiency and decrease the use of storage space.
3.3.4 D2T
Backup data transmission via LAN-based or LAN-Free network to physical or virtual tape libraries. When data recovery is required, backup data stored in tape libraries could be used for instant data recovery to target server.
Figure3-19 Disk to Tape Storage Supports direct backup data archiving of source-side to physical or virtual
tap library. Supports media recycling in tape library. Supports direct recovery of backup sets from the tape library to the source
terminal.
3.3.5 D2C
The Cloud Gateway combines our disaster recovery software with cloud computing platform technology and stores local backup data directly to public clouds by means of D2C, D2D2C, D2T2C, and D2C2C. It currently supports AWS, Alibaba
PAGE \* MERGEFORMAT17
DBackup White Paper
Cloud, Baidu Cloud, Microsoft Azure, Huawei Cloud, Tencent Cloud, Sina Cloud and other mainstream cloud platform storage.
Figure3-20 Local-to-Cloud Coordination Supports various data transmission models such as D2C, D2D2C and
D2T2C. Users can complete the cloud storage space link by configuring cloud
storage access information provided by cloud service providers in DBackup, which reduces investment on local storage infrastructure and makes the most of cloud space.
Supports regular data backup from clients or storage servers to cloud through job configuration to realize on-site and off-site data protection.
Supports breakpoint-resume. When interruption happens during data transmission, it can continue processing again from the break point.
3.4 Operation and Maintenance Support
3.4.1 Backup as a Service
The Multi-tenant is a backup cloud system based on DBackup which establishes an account mechanism for business units. Each account is for one tenant. A private backup space is created for multiple tenants in a shared backup environment to provide tenants with personalized business. It realizes the unified management of the backup system, reduces the investment in the construction of data security protection, and greatly simplifies the management of backup operation and maintenance in enterprises with complicated organization hierarchy.
All tenants share the same physical backup environment. Tenants are provided with personalized business based on their backup and
PAGE \* MERGEFORMAT17
DBackup White Paper
recovery needs. Independent data storage capacity is allocated to tenants and separate
management can be achieved. Data isolation among tenants guarantees there is no interference among
them.
Figure3-21 Backup Cloud Service
3.4.2 Backup Speed Control
To avoid massive transmission bandwidth taken up by data backup to affect users’ core business, DBackup provides customized speed limit setting that users can customize the maximum data transmission speed in different time periods.
Supports customized data transmission speed between clients and storage servers.
Supports customized speed of backup data replication among storage servers.
Supports speed limit setting for multiple time periods. The minimum unit of transmission speed limit is MiB/s.
PAGE \* MERGEFORMAT17
DBackup White Paper
3.4.3 Backup Protection Approaches
Supports various backup approaches including full backup, incremental backup, differential backup, log backup and synthetic backup; supports various recovery approaches including mount recovery, media recovery, checkpoint recovery and automatic disaster recovery.
3.4.4 Backup Recovery Strategies
The flexible backup strategy management platform allows users to have their backup scheduled to be done immediately or every minute, hour, week or month. Backup strategy could be customized according to enterprise information security requirements and backup/recovery will be carried out at a pre-set time or periodically.
Supports immediate execution. Supports pre-set job running and executes the job only once. Supports periodical job running per hour/minute. Supports periodical job running daily or every N days. Supports periodical job running weekly or every N weeks. Supports periodical job running every month at a specified time.
3.4.5 Access Management
It allows creating multiple users with specific authorizations assigned by the administrator to ensure users have the appropriate access or authorization. Based on close relationship of roles and clear authorization, users are divided into system users and audit users.
System Users: System administrators, administrators,Operators, monitors, multi-tenant account administrators, multi-tenant operators, multi-tenant monitors.
Audit Users: Audit administrator and auditor.
3.4.6 Poor Network Transmission
With DBackup’s unique poor network support technology, enterprises can enjoy reliable data protection service under restricted network condition. Under unstable network condition, efficient off-site backup and recovery could be achieved by breakpoint resume through local caching, which avoids heavy reliability on the
PAGE \* MERGEFORMAT17
DBackup White Paper
costly, proprietary, high-speed, and fiber-optic network.
3.4.7 LAN-Free Environment
It supports not only LAN-Basebut also LAN-Free backup of files, operating systems, databases, application softwares and virtual machines to significantly improve backup speed and reduce IP network occupation.
3.4.8 Unified Monitoring
DBackup can construct a distributed multi-layer backup system and allows independent backup management for each section. It also provides a unified monitoring platform to manage data resources in every backup system and monitor job executing information, alerting information, resource occupation information and host connection information, which greatly reduces the difficulty of OAM of multi-sites backup.
Figure3-22 Distributed Multi-layer Management and Unified Monitoring
PAGE \* MERGEFORMAT17
DBackup White Paper
3.4.9 Multi-dimensional Statistics
Supports multi-dimensional statistics displayed with figures. The administrator can either run statistics on system data or on some tenant’s data though an account. Storage size, hosts, resources, job speed, job time and other dimensions can be chosen, and export of statistical results will be supported to help users comprehensively understand the health condition of backup environment.
4. Distinctive Technologies
4.1 Storage Pool Management
Creates a unified storage pool management system based on hyper convergence technology by incorporating all available enterprise storage spaces into the system. The convergence technology processes and virtualizes all available spaces, then redistribute them into different pools. The storage pool can provide a wide array of data services such as data archive, data deduplication and data replication.
Users can create different pools of various sizes and types (local pool/Deduplication pool/tape pool/synthetic pool/object pool) upon different demands to utilize available storage spaces in a better way and improve utilization ratio in enterprises.
PAGE \* MERGEFORMAT17
DBackup White Paper
Figure4-23 Integrate Efficient Storage Resources of Enterprises Supports SSD, SAS, NLSAS, and STAT; Supports popular tape libraries, virtual tape libraries and optical disk storage
systems like IBM, Quantum, Tandberg and Amethystum. Supports storage space expansion of multiple storage servers in the same
storage pool. Establishes various types of storage pools including standard storage pool,
Deduplication storage pool, tape library pool, local storage pool, synthetic pool (file synthetic pool, database synthetic pool), real-time backup pool, and object storage pool.
Supports storage data configuration of life cycle management based on the capacity usage setting.
Supports storage data configuration of life cycle management through effective retention time.
Supports customized numbers of permanent full backup data in the storage pool.
PAGE \* MERGEFORMAT17
DBackup White Paper
4.2 Synthetic Backup of Files
Index point relocation technology is adopted during DBackup file synthetic process. File index pointer is relocated to the new file data and the space occupied by the old file data will be reclaimed. A brand new virtual full backup data is established by the indication of file index pointer and associating new data.
Synthetic backup of files supports any platform and environment, especially file backup through NFS and CIFS mount disks.
Figure4-24 File Backup ProcessIndex point relocation synthetic technology solves traditional synthetic problems
and improves synthetic backup efficiency. By modifying the file index pointer, disk movement with a large amount of
blocks can be avoided during the synthetic process and server’s I/O load can be reduced at the same time.
Through virtual full backup to reduce backup recovery time and improve recovery efficiency.
No need for a large amount of temporary storage space for file data synthesis.
4.3 Synthetic Backup of Database
Synthetic backup of database is based on its backup features and integrates
PAGE \* MERGEFORMAT17
DBackup White Paper
file snapshot, mounting and other technologies. After the data file is copied to the backup server, the first step is to consolidate the backup data, and then generate a snapshot of the data, which can be instantly restored by mounting after the production data has failed.
Figure4-25 Database Synthetic Backup Process Supports SQL Server, Oracle 10g and higher version databases including
single instances and RAC environment. The synthetic backup is based on backup features of Oracle and SQL
Server to ensure backup stability. The block device and snapshot technologies are adopted to save full
backup data at multiple backup time points. Instant recovery of backup data at every time point is realized through
mounting.
4.4 Continuous Log Real-time Protection (CLRP)
CLRP is our independently developed technology targeting Oracle/Oracle RAC and MySQL database protection and meanwhile improving real-time data protection. It is a kind of block-based data backup technology. By monitoring messages in the
PAGE \* MERGEFORMAT17
DBackup White Paper
file system and capturing change of redo and archive logs, it performs real-time continuous backup of log files.
Figure4-26 Continuous Log Real-time Protection (CLRP)
DBackup CLRP realizes backup protection of changing data within the second, which pushes database protection technology to a new height.
Main Advantages of CLRP: Reduce RPO to the second level, and the average RPO is 0.2 second. Real-time replicated changing data blocks are quite small and resource
occupancy is superior to CDP. No soft or hard drivers are required and business system won't be affected. Recovery to any time point or SCN, and no standby emergency machine is
required.
4.5 OS Virtual Migration
Users can transform Windows OS backup sets into virtual disk formats that are supported by VMware, KVM, H3C and CAS, and use such data for recovery if needed, which realizes the P2V and V2V fast migration of Windows OS platform.
4.6 Hot Backup of MySQL
Hot backup of the MySQL database without interfering with its functionalities can perform instant data recovery to any point-in-time. Based on backup log, MySQL hot backup is much better than logical backup in application:
The Hot backup is carried out while the database is operating to ensure business continuity
Supports incremental backup and only backs up changed data. Backup efficiency has been greatly improved and disk space has been saved by smaller
PAGE \* MERGEFORMAT17
DBackup White Paper
size of backup data. Almost all database entities can be recovered. Can perform recovery to any point-in-time and back to any state of the
database to retrieve accidentally deleted or damaged data and ensure data completeness.
4.7 Hot backup of Informix
Hot backup of the Informix database without interfering with its functionalities using ON-Bar can perform data recovery to any point-in-time.
Supports data recovery to any point-in-time. Supports automatic setting using ON-Bar and no manual setting is needed. Can be easily integrated into the existing storage manager solutions.
PAGE \* MERGEFORMAT17
DBackup White Paper
5. Supported Environment
5.1 Supported Backup and Storage Server Platforms
5.1.1 Windows OS
Windows 2003/2008/2012 series
5.1.2 Linux OS
Ubuntu Server 12.04/14.04 Red Flag Asianux 2/3 series CentOS 4/5/6/7 series Red Hat Enterprise Linux 4/5/6/7 series NeoKylin 6.0 (Loongson) YHKylin 4.0 (FT 1500A) Kylin 4.02 (FT 1500A) NeoKylin 4.0 (FT 1000) iSoft Server OS 4.0 iSoft Server OS 3.0/5.0 (Loongson)
5.2 Supported Client Platforms
5.2.1 Windows OS
Windows 2000/2003/2008/2012 series Windows XP SP3/7/8/10 series
5.2.2 Linux OS
Red Flag Asianux 2/3 series Red Flag DC 4.1/5.0 series Red Hat Enterprise Linux 3/4/5/6/7 series Oracle Enterprise Linux 4/5/6/7 series CentOS 3/4/5/6/7 series openSUSE 10.3/11.4 series SUSE Linux Enterprise Server 9/10/11 series Neokylin Linux Server 5/6 series
PAGE \* MERGEFORMAT17
DBackup White Paper
Ubuntu Server 12.04/14.04 Debian 6.0/7.0/8.0 series IBM Power Linux Scientific Linux 4/5/6 series
5.2.3 UNIX OS
AIX 5.1/5.3/6.1/7.1 series Solaris 9/10/11 series HP-UX 11.11/11.23/11.31series
5.2.4 Domestic OS
NeoKylin 4 (FT 1000) YHKylin 4 (FT 1500A) Kylin 4.02 (FT 1500A) NeoKylin 6/7 (Loongson) NeoKylin 4/6 (Shenwei) Linux Rocky Secure Operating System Linux Secure Operating System iSoft Server OS 3.0、5.0 (Loongson) iSoft Server OS 4.0 Inspur K1 UNX
5.3 Supported Virtualization Platforms
5.3.1 Popular International Virtual Platforms
VMware vSphere 4.1/5.0/5.1/5.5/6.0/6.5 KVM (qemu 1.0.0 ~ 2.8.0,libvirt 0.98 ~ 3.00) Xen 4.0 or above,libvirt 1.2.8 or above Citrix XenServer 6.2/6.5/7.0/7.1 Hyper-V (Windows 8.1/Windows Server 2008 SP2/2008 R2 SP1/2012/2012
R2) ~ Hosted Architecture Hyper-V Server 2012/2012 R2 ~ Bare Metal Architecture OpenStack Newton/Liberty
5.3.2 Popular Domestic Virtual Platforms
FusionSphere V100R005/V100R006 (5.0/5.1/6.0)
PAGE \* MERGEFORMAT17
DBackup White Paper
CNware 6.0 H3C CAS E0222/E0225/E0301/E0303/E0306
5.4 Supported Databases
5.4.1 Popular International Database Software
Oracle 8i/9i/10g/11g/12c SQL Server 2000/2005/2008/2012/2014/2016 MySQL 4/5/6 Sybase 12.5/15.5/15.7/16.0 PostgreSQL 8.1/8.4/9.2/9.3/9.4/9.5 DB2 8.1/9.1/9.5/9.7/10.1/10.5/11.1 Informix 11.5/11.7/ 12.1 MongoDB 2.4/2.6/3.0/3.2/3.4
5.4.2 Popular Domestic Database Software
ShenTong 7.0 DM 7.1 Kingbase 7.1/8.0 GBase 8a/8s/8t
5.5 Application Software
Exchange 2000/2003/2007/2010/2013 Lotus Domino 8.0/8.5/9.0 MS SharePoint 2007/2010
5.6 Supported Storage Object
Amazon (AWS S3) Alibaba Cloud (OSS) Baidu Cloud (BOS) Huawei Cloud (OBS) Tencent Cloud (COS) Sina Cloud (SCS) KSYUN (KS3) Qiniu (Qiniu S3) e Cloud (CT-OOS)
PAGE \* MERGEFORMAT17
DBackup White Paper
MTYUN (MSS) UCloud (UFile) QingCloud (QingStor) OStorage (OStorage) Microsoft Azure (Blob Storage) BC-oNest
PAGE \* MERGEFORMAT17
DBackup White Paper
6. About Scutech
Scutech Corporation (Scutech), is a nationally certified high-tech enterprise with internationally advanced data backup technology. Scutech is devoted to the R&D and marketing of operation-and-maintenance-level storage and backup hardware-software products with independent intellectual property rights. Upholding the notion of “Develop Chinese Software, Innovate Top Technology” and the enterprise spirit of “Focus, Innovation, Cooperation, and Perseverance”, Scutech has been gradually introducing made-in-China backup & DR hardware-software solutions to the world, stepping towards its goal as an international storage backup brand.
A National Brand Devoted to National Data SecurityChina Electronics Corporation (CEC) is a state-owned conglomerate formed on
the basis of a research facility directly under the administration of the former MII (Ministry of Information Industry) and high-tech enterprises. As a strategic investment enterprise of CEC, Scutech has shouldered the responsibility of guarding national data security.
To get rid of technological suppression from foreign products, Scutech and other related CEC subsidiaries worked together and successfully developed the first completely home-bred, autonomous and controllable backup and disaster recovery hardware-software integration platform based on domestic chips and operating systems, fundamentally solving the future problems of national information security.
Comprehensive Development and Continuous InnovationScuetch Corporation with complete industrial chain involving autonomous and
controllable storage, data management, backup, disaster recovery and information system can provide customers with comprehensive solution which consists of advanced disaster recovery backup, HA information system as well as cloud backup DR center design, implementation and services.
Scutech data protection products with cost-effective feature and user-friendly interface achieve effective data protection. DBackup is a completely autonomous and controllable backup and DR platform which includes file backup, database backup, OS backup, virtual backup and etc. with unique functions such as zero data loss, business takeover, and disaster recovery drill. At the same time, it realizes hierarchical management, alarms, reports and other enterprise management functions.
As the only information security and backup & DR management base of production, education and research, authorized by the Ministry of Industry and Information Technology, Scuetch Corporation undertakes a number of significant national information security projects. With strong technology, rigorous attitude,
PAGE \* MERGEFORMAT17
DBackup White Paper
professional services, Scuetch Corporation will offer you trustworthy data protection.
PAGE \* MERGEFORMAT17
Address:Floor. 9 Building A5,Guangzhou Science City Headquarters Economic Zone, No. 243 Kexue Avenue, Guangzhou City, Guangdong Province, ChinaCode:510670Tel:+86 020 32053160Customer Service:400-995-1106Website:www.scutech.com