Module 4: Data availability And Data Protection Flashcards
Importance of data availability
Data is a critical input to more business processes.
Protect against:
Host server failure
Network crash
Storage failure
Operation system failure
Remove Singe Points of Failure (SPoF)
What is High Availablity
The ability to provide redundant devices, components or objects in an environment so that you have a cover should have of the primary items fail.
NETAPP HA Pair
Made up of two nodes.
Connected by an internal interconnect. (HA Interconnect) for fault tolerance.
Each node in a HA pair requires an interconnect to the disks and controller of the other node.
Fault Tolerance
Business’s continuity of mission-critical applications
Continuation of operations at a reduce level rather than failing completely
Configuration for multiple paths (such as dual hbas to servers).
Traditional Reasons for Data Protection
Disasters (natural, human-made, technology or other failures)
External Threats (DDos, virus, ransomware, other external threats)
Regulatory Compliance (Sec 17a-4, HIPPA, Sarbanes-Oxley act, GDPR, and others)
Internal threats (rogue admins, malicious insiders, email theft and others.)
Business Continuity
Maintains essential functions during and after a disaster has occurred
Requires a business continuity plan (guard against future disasters, ensure generation of revenue during disaster)
Requires embedded flexibility and resilience into business continuity planning.
Business Continuity Key Metric
RPO- RecoverPoint objective - Max acceptable time that data can be lost if failure occurs.
RTO - Recovery Time objective - max acceptable time before data is made available after failure
MTTR - Mean time to recovery - average time that a device takes to recover from any failure
MTTF - Mean time to failure - Represents the length of time that an item is expected to last in operation until it fails.
MTBF - Mean time between failures - How long an asset can run before the next unplanned breakdown happens.
RTT - Round trip time - duration in ms it takes for a network request to from a starting point to a destination and back
Snapshot copies
A storage snapshot is a copy of the live storage volume which taken at a particular time.
Can be used to recover files/objects from that snapshot.
Recover files and volumes that were accidentally deleted
Restore corrupted files
Snapshot-based replication can be used for backup and DR.
Replication
Creating an exact copy of the data in another location or another device.
Local replication is within the same system or the same data Center. (Quick)
Remote replication is to a remote secondary site. (Covers site wide outages). Can be sync, a-sync semi-sync.
Sync - waits for the write to be written to remote before ack
A-sync - confirms before write to the client is written to the remote. This can create LAG
Netapp: ONTAP DR solutions
Snapmirror Asynchronous - You can use data protection mirror replications to protect volumes: within a SVM to another SVM in the same cluster or to another cluster.
Snapmirror Synchronous (SMS) - zero data lost, rapid recovery.
Metro cluster Software - provides zero data loss, failover protection and nondisruptive upgrades
Supports SAN and NAS. Available as MetroCluster FC or MetroCluster IP
Data Backups
A data backup is an additional copy of production data either cold or hot
Cold backup - requires complete shutdown of application - undesirable in a 24/7 business
Hot backup - application remains online, application must be designed to run in a hot backup mode.
Data backup types
Full - backs up everything
Cumulative incremental - backups up everything that has changed since the last full backup
Differential Incremental - backups up everything that has changed since the last incremental
Incremental forever - uses only 1 full backup for all incremental backups afterwards
Components in a backup environment
Primary backup server
Secondary backup server (storage node)
Backup target (disk or tape)
Backup Client software
Backup topologies
LAN-Based backup - data is sent over an IP network (either production LAN or backup LAN)
LAN-free backup - data is backed up over the san, backup catalog data over the LAN
SAN backup - same as LAN-free backup
NDMP backup - used for filesystem backups Network data management protocol. For NAS backups
Storage Security
Triangle of security: Confidentiality, integrity, availability
Confidentiality - data is accessible to only authorised users
Integrity - data is always accurate and complete
Availability - data is available to users when they require it.