Categories
Restore

The criticality of RTO and RPO

Frequent readers of this blog know that I am obsessed with data protection in general and data restoration specifically.  Obviously these two elements are critical for today’s data-intensive businesses and there are a multitude of vendors providing solutions to address these challenges.  It can be difficult to assess the benefits of a given approach and the concepts of Recovery Time Objective(RTO) and Restore Point Objective(RPO) are useful metrics to consider when analyzing the benefits of different solutions.  In this blog entry, I will discuss these two measures and why they are relevant to your organization.

Recovery Time Objective

This is a critical metric for illustrating the risk of potential downtime.  SNIA defines the term as follows:

The maximum acceptable time period required to bring one or more applications and associated data back from an outage to a correct operational state

Categories
Restore

Why Recovery Matters: Two Case Studies

I started this blog over two years ago to focus on the criticality of data protection and specifically data recovery.  While technology continues to evolve, the importance of these two elements remains consistent.  Every company must have a recovery strategy to protect against data loss or corruption.  Some people may be inclined to de-emphasize backup and recovery based on the faulty assumption that today’s virtualized hardware and software is more reliable or flexible, but this is a mistake.  In the last month, we have seen two examples of why data recovery is critical, and both affected entities had large IT staffs and huge budgets.  Without an effective protection strategy, massive data loss would have been unavoidable in both cases.  The companies recovered the vast majority of their data but experienced an outage that was far longer and more damaging than either anticipated.

Categories
Backup Restore

Lessons learned from the COPAN acquisition

The rumors of the demise of COPAN were rampant in late 2009. There was broad speculation that general operations had wound down and that the company was maintaining a skeletal staff. It was clear that COPAN’s end was near and the management team was scrambling for an exit strategy. Most people assumed that the recent silence from COPAN suggested that the company had not survived.

It was in the context of this situation that I saw a tweet last night about COPAN being acquired. The first questions were who and for how much and the tweet suggested that the answers were SGI and $2 million dollars respectively. Wow, what an amazing decline. COPAN raised $124 million dollars in multiple financing rounds and they exit the market at a $2 million valuation.

COPAN focused on MAID (massive array of idle disks). The technology allowed them to spin down unused disks to reduce the power and cooling requirements. The design included proprietary highly dense disk packaging that provided the densest storage in the industry, and actually required some datacenters to specially reinforce their flooring. They focused on $/GB and said that they offered the lowest in the industry both from an acquisition and operational cost standpoint. All of this sounded compelling from a marketing perspective, but the reality was different.

Categories
Backup Restore

Protecting personal data

This blog primarily focuses on protecting corporate data, but I recently received a call from my father that reminded me of the criticality of protecting personal data. My father called expressing frustration that his laptop hard drive had failed and corrupted his data. Fortunately, he had backup copies of his most critical files on a USB stick; however, his email history and address book were not stored on the external device and were lost. I mention this story to remind you of the importance of personal data protection. What are you doing to backup your data?

There are many different approaches to protecting personal data. The two key concerns to consider are:

  1. What happens if I lose the hard drive where my data is stored or experience a software problem such as a virus?
  2. What happens if I suffer a more extreme data loss such as my house burning down?

Each question is critical, and the answer will vary depending on the data. For example, digital pictures of your family might have a different priority than your MP3 library. The former is irreplaceable and the latter is not. These priorities will impact the chosen data protection medium and methodology.

Categories
Backup Restore

Lessons from the Sidekick debacle

The latest scary backup story comes from a firm called Danger that makes the Sidekick PDA/phone. The Sidekick stores the majority of its data in a central data center and the data is loaded each time to the phone is restarted. The idea is that the data center provides protection if you lose your phone. A good idea, right?  Well yes, assuming that Danger adequately protects its customers’ data.

A number of outlets are reporting that Danger suffered a catastrophic data loss and all users’ data has been lost. I checked with a family friend who confirmed that her Sidekick was down for a week and is now finally working as a phone, but her data is inaccessible.  This is unacceptable; Sidekick users paid a monthly fee for this service and Danger should have maintained reasonable precautions to protect their customers data.  Clearly this is a bad situation for everyone, and lessons to be learned by all.

Here are some key takeaways from this event.

Categories
Deduplication Replication

Recent Comment

Recently an end user commented about how the replication performance on his DL3D 1500 was less than expected. As he retained more data online, his replication speed decreased substantially and EMC support responded that this is normal behavior. This is a major challenge since slow replication times increase replication windows and can make DR goals unachievable.

The key takeaway from the comment is that testing is vital. When considering any deduplication solution, you must thoroughly review it with limited and extended retention. In this case, the degradation appeared when data was retained and would not have been found if the solution was tested with limited retention. The key elements you should test include:

  1. Backup performance
    1. On the first backup
    2. With retention
  2. Restore performance
    1. On the first backup
    2. With retention
  3. Replication performance
    1. On the first backup
    2. With retention
Categories
Deduplication Restore

Deduplication, Restore Performance and the A-Team

I have posted in the past about the challenges of restoring data from a reverse referenced deduplication solution. In short, the impact can be substantial. You might wonder whether I am the only one pointing out this issue, and what the impact really is.

An EMC blogger recently posted on this topic and provided insights on the reduction in restore performance he sees from both the DL3D and Data Domain.  He said, “I will have to rely on what customers tell me: data reads from a DD [Data Domain] system are typically 25-33% of the speed of data writes.” He then goes on to confirm that “…the DL3D performs very similarly to a Data Domain box”. He is referring to restore performance on deduplicated data in reverse referenced environment. (Both Data Domain and EMC/Quantum rely on reverse referencing.) He recommends that you maintain a cache of undeduplicated on the DL3D to avoid this penalty. Of course, this brings up a range of additional questions such as how much extra storage will the holding area require, how many days should you retain and what does this do to deduplication ratios?

The simplest solution to the above problem is to use forward referencing, but neither DD nor EMC/Quantum support this technology. EMC’s workaround is to force the customer to use more disk to store undeduplicated data which adds to the management burden and cost.

This reminds me of a classic quote from John “Hannibal” Smith from the A-Team:

I love it when a plan comes together!

What more confirmation do you need?

Categories
Restore Virtual Tape

Data protection and natural disasters – Part 2

In part 1, I touched on four of the most common challenges with data restoration in a disaster scenario. In this post, I will review some other key considerations. These examples focus on the infrastructure required after a disaster has occurred.

Categories
Backup Restore

Data protection and natural disasters – Part 1

Hurricane Ike has been in the news lately and my sympathy goes out to all those affected. It is events like these that test IT resiliency. The damage can range from slight to severe and we invest in reliable and robust data protection processes to protect from disasters like this. The unfortunate reality is that, no matter how much you plan for it, the recovery process often takes longer and is more difficult than expected.

In many respects, data protection is an insurance policy. You hate to pay your homeowners premium every month, you do it because you know that it is your only protection if major damage ever happens to your house. In the case of data protection, you invest hours managing your backup environment to enable recovery from incidents like this. The unfortunate reality is that even with the best planning and policies things still may not turn out as expected. Four of the most common pitfalls I hear from customers include: