Data Protection Strategies for Virtualization

32
www.doubletake.com Data Protection Strategies for Data Protection Strategies for Virtualization Virtualization Presented by Presented by Date Date

Transcript of Data Protection Strategies for Virtualization

Page 1: Data Protection Strategies for Virtualization

www.doubletake.com

Data Protection Strategies for VirtualizationData Protection Strategies for VirtualizationPresented byPresented byDateDate

Page 2: Data Protection Strategies for Virtualization

www.doubletake.com

AgendaAgenda

• Introduction to Double-Take Software

• Overview of Double-Take and the technology behind real-time replication

• The business case for virtualization

• Overview of

• Real-world examples

• Q & A

Page 3: Data Protection Strategies for Virtualization

www.doubletake.com

About UsAbout Us

• Headquartered in Southborough, MA• Worldwide Reach - North America, South America,

Europe, Pacific Rim and Japan• Over 26 patented technologies• Focused on the protection of business-critical applications

– 100,000 licenses of Double-Take in over 10,000 customers

– 20,000+ licenses protecting Exchange

– 20,000+ licenses to protecting SQL

• Comprehensive Professional Services Offerings• Prestigious Microsoft Certifications

Leading Provider of Disaster Recovery and High Availability Solutions

Page 4: Data Protection Strategies for Virtualization

www.doubletake.com

Award-Winning SolutionsAward-Winning Solutions

• Real-time data protection• Automatic server failover• Application Availability & Disaster Recovery• Windows NT4, 2000, WPNAS and 2003• 32-bit, 64-bit and “Itanium” IA-64 Support

• Provides redundancy of MSCS storage• Allows MSCS cluster to be separated over IP• Based on Double-Take replication engine• Windows NT4, 2000, WPNAS and 2003

Page 5: Data Protection Strategies for Virtualization

www.doubletake.com

Solutions OverviewSolutions Overview

Direct Off-Site Connection

Production “Source”Servers

High Availability“Target” Server

Centralized Backup

Server ConsolidationData Migration

Snapshot

Off-Site Disaster Recovery (DR)

WAN

WAN

Page 6: Data Protection Strategies for Virtualization

www.doubletake.com

High AvailabilityHigh Availability

WWW10.10.10.1

SQL10.10.10.2

FS110.10.10.3

MAIL10.10.10.4

DT-TARGET10.10.10.5

Direct Off-SiteConnection for DR

WAN

WWW10.10.10.1

SQL10.10.10.2

MAIL10.10.10.4

The “Target” continuously monitors the “Source” servers and initiates failover process.

Page 7: Data Protection Strategies for Virtualization

www.doubletake.com

The Technology – ReplicationThe Technology – Replication

Application LayerExchange services, Database engines,

File sharing, Web applications, etc.Applications

OperatingSystem

HardwareLayer

File System

Windows Operating SystemWindows Server 2000, Windows-Powered NAS,

Windows Server 2003 (including SSE)

File System or “Cache”An area of memory for disk transactions

to be stored before written to disk

Disk/Hardware LayerIncluding disk drivers, disk

controller and the actual hard drives

Page 8: Data Protection Strategies for Virtualization

www.doubletake.com

The Technology – ReplicationThe Technology – Replication

Applications

OperatingSystem

HardwareLayer

File System

Applications

OperatingSystem

HardwareLayer

File System

Any IP Network

Page 9: Data Protection Strategies for Virtualization

www.doubletake.com

Benefits of VirtualizationBenefits of Virtualization

• Compelling Value to IT– Server Consolidation

• Reduced hardware costs– Server Rationalization

• Efficient use of resources– Operational Flexibility

• Rapid provisioning and allocation– Easier and Less Costly DR

Virtualization Enables Reduced Costs and Complexity

Page 10: Data Protection Strategies for Virtualization

www.doubletake.com

Benefits of VirtualizationBenefits of Virtualization

• Reduce the number of physical servers– Savings on hardware acquisition/maintenance– Operational savings – power, cooling, real estate– 5:1 to 20:1 consolidation ratios

• Improve resource utilization– Utilization of standalone servers: 10%-20%– Increase capacity without more hardware

Typical ROI is 6-12 Months

Reduce TCO by up to 60%

Page 11: Data Protection Strategies for Virtualization

www.doubletake.com

Benefits of VirtualizationBenefits of Virtualization

• Streamline and standardize deployments– Server provisioning goes from weeks to days– Virtual machines share common/standardized

configurations

• Reduce DR costs without sacrificing capabilities– Less hardware required at DR site– Simplified operations at DR site

• Virtual machines are hardware agnostic

• Virtual machines are “portable”

Page 12: Data Protection Strategies for Virtualization

www.doubletake.com

Using Virtualization for DRUsing Virtualization for DR

Configure Hardware

Rebuild OS Configure OS for New

Hardware

Install Backup Agent

Recover from Tape/Disk

Restore VM Configuration

Recover from Tape/Disk

Page 13: Data Protection Strategies for Virtualization

www.doubletake.com

Double-Take for Virtual SystemsDouble-Take for Virtual Systems

• Supported in and tested for virtual machine environments• Flexible configuration options:

– Virtualized source or target – or both

• Full Compliment of Double-Take features:– High Availability and Disaster Recovery– LAN and WAN Support

• One license of Double-Take for Virtual Systems supports running on up to 5 virtual machines– Must be on the same physical host– $7,995 includes 1 year of maintenance

Page 14: Data Protection Strategies for Virtualization

www.doubletake.com

Double-Take for Virtual Systems Double-Take for Virtual Systems

What’s Special About Replicating Virtual

Machines?

Page 15: Data Protection Strategies for Virtualization

www.doubletake.com

Double-Take Replication ModelDouble-Take Replication Model

Application LayerExchange services, Database engines,

File sharing, Web applications, etc.Applications

OperatingSystem

HardwareLayer

File System

Windows Operating SystemWindows Server 2000, Windows-Powered NAS,

Windows Server 2003 (including SSE)

File System or “Cache”An area of memory for disk transactions

to be stored before written to disk

Disk/Hardware LayerIncluding disk drivers, disk

controller and the actual hard drives

Page 16: Data Protection Strategies for Virtualization

www.doubletake.com

Applications

OperatingSystem

HardwareLayer

File SystemWin32 ApplicationWin32

ApplicationWin32 Application

VMWare Server Microsoft Virtual Server

FS1 SQL LINUX

NTFS file system containing .vmdk and .vhd

files

Virtualization ModelsVirtualization Models

Page 17: Data Protection Strategies for Virtualization

www.doubletake.com

VirtualMachine

Hypervisor

“Thin” OS

HardwareLayer

File System

FS SQL LINUX

ClusterFS on Proprietary Host OS

VMware ESX Server

FS SQL

BSD WEB

MAIL

MAIL

Virtualization ModelsVirtualization Models

Page 18: Data Protection Strategies for Virtualization

www.doubletake.com

Applications

OperatingSystem

HardwareLayer

File System

Applications

OperatingSystem

HardwareLayer

File System

Any IP Network

Double-Take Replication ModelDouble-Take Replication Model

Page 19: Data Protection Strategies for Virtualization

www.doubletake.com

HardwareLayer

OperatingSystem

File System

VMWare Server Microsoft Virtual Server

FS1 SQL LINUXApplications

D:\VMs\FS2-SYSTEMDRIVE.VHD

D:\VMs\FS1-SYSTEMDRIVE.VMDK

Replicating from the Host OSReplicating from the Host OS

Page 20: Data Protection Strategies for Virtualization

www.doubletake.com

HardwareLayer

OperatingSystem

File System

VMWare Server Microsoft Virtual Server

FS1 SQL LINUXApplications

REPLICATED

Any IP Network

D:\VMs\FS2-SYSTEMDRIVE.VHD

D:\VMs\FS1-SYSTEMDRIVE.VMDK

Replicating from the Host OSReplicating from the Host OS

Page 21: Data Protection Strategies for Virtualization

www.doubletake.com

HardwareLayer

OperatingSystem

File System

FS1 SQLVirtual Machines

Microsoft Virtual Server, VMware Server/ESX Server

FS2

Replicating from the Guest OSReplicating from the Guest OS

MAIL

Page 22: Data Protection Strategies for Virtualization

www.doubletake.com

HardwareLayer

OperatingSystem

File System

FS1 SQL

Virtual Machines REPLICATED

Microsoft Virtual Server, VMware Server/ESX Server

FS2

Replicating from the Guest OSReplicating from the Guest OS

MAIL

Page 23: Data Protection Strategies for Virtualization

www.doubletake.com

DR/HA for Virtual HostsDR/HA for Virtual Hosts

• Virtual hosts have a high protection need– “All Your Eggs In One Basket”– Multiple critical workloads on the same server

• Disaster Recovery for virtual machines– Real-time replication of virtual machine data– Use DR data to rebuild virtual machines

• Replicate from within the virtual machine

• Replicate from the virtual host server

• High Availability for virtual machines– Real-time replication of virtual machine data– Monitoring/Failover of the virtual host server

Page 24: Data Protection Strategies for Virtualization

www.doubletake.com

Many-to-One Disaster RecoveryMany-to-One Disaster Recovery

FS1

SQL

FS2

WWW

WAN

VS, GSX, ESX VMs

MAIL

Page 25: Data Protection Strategies for Virtualization

www.doubletake.com

DR/HA for Virtual HostsDR/HA for Virtual Hosts

HA and DR solutions Full failover capabilities for all virtual sessions

LAN & WAN support for regional DR protection Lower TCO with minimized hardware requirements

FS1

SQL

FS2

WWW

WAN

FS1

SQL

FS2

WWW

VS, GSX, ESX VMs VS, GSX, ESX VMs

MAIL MAIL

Page 26: Data Protection Strategies for Virtualization

www.doubletake.com

Virtualized TargetVirtualized Target

• Single physical target server– Lower costs, easier management

• Full Double-Take capabilities– High/Remote Availability, Disaster Recovery– LAN/WAN support– Monitoring and Failover– Enterprise Management

• Centralized Backup– Improved protection/availability of remote data

Page 27: Data Protection Strategies for Virtualization

www.doubletake.com

Virtual Target – Lower TCOVirtual Target – Lower TCO

FS1

SQL

MAIL

FS2

WWW

FS1

SQL

FS2

WWW

VS, GSX, ESX VMs

MAIL

Page 28: Data Protection Strategies for Virtualization

www.doubletake.com

Virtual Target – Hybrid ScenarioVirtual Target – Hybrid Scenario

FS1

SQL

FS2

WWW

FS1

SQL

FS2

WWW

VS, GSX, ESX VMs

VS, GSX, ESX VMs

MAIL

MAIL

Page 29: Data Protection Strategies for Virtualization

www.doubletake.com

“We have 25 Windows servers including 5 SQL servers in production in San Francisco, replicating with Double-Take to a VMware server in New York.

I can’t imagine how we could have implemented anything else as effective for disaster recovery.

Double-Take and VMware are true solution providers, not just software companies. Our executives demanded the best in disaster protection for our organization.

This combination was it.”

Kenny TamNetwork Manager

Shorenstein Realty Services, LP

Customer - “Virtualized Target for DR”Customer - “Virtualized Target for DR”

Page 30: Data Protection Strategies for Virtualization

www.doubletake.com

“Currently, we have nine production servers replicating data to four ESX hosted virtual servers for disaster recovery purposes.

Utilizing Double-Take in conjunction with VMware enabled us to consolidate our disaster recovery environment and ensure a cost-effective approach to protecting our systems and data.”

Thad DarcyUser Support Specialist

Massachusetts Housing Financing Agency

Customer - “Virtualized Target for DR”Customer - “Virtualized Target for DR”

Page 31: Data Protection Strategies for Virtualization

www.doubletake.com

“The performance of Double-Take has enabled us to go about business as usual so that system outages – if they occur – are essentially transparent to the students and faculty who use our online platform. If a primary server goes down in Boston, we now have the capability to minimize the disruption to seconds.

Double-Take provides a much needed buffer for our small IT staff.”

Dr. Praneeth MachettiraOnline Technical Director

Suffolk University Business School

Customer – “Protect Production VMs"Customer – “Protect Production VMs"

Page 32: Data Protection Strategies for Virtualization

www.doubletake.com

Q&ATo request a demo or for more information:To request a demo or for more information:

http://www.doubletake.comhttp://www.doubletake.com