microsoft confidential anthony tyleranthony tyler storage & branch office technology...
Post on 21-Dec-2015
218 views
TRANSCRIPT
Microsoft Confidential
Anthony TylerAnthony TylerStorage & Branch Office Technology SpecialistStorage & Branch Office Technology Specialist
Microsoft Confidential
Customer pains with backup today
DPM 2006Quick overview of DPM 2006 for file protection & recoveryWhat is new in Service Pack 1
DPM 2007 AnnouncementFeature Overview Demo : Protecting Exchange and SQLDemo : Recovering Application DataUnder The CoversWhat else is coming in Beta 2
Q&A
Microsoft Confidential
Better nightly backups neededTape is inefficient Lack of application support WAN not feasible for centralized backupsDisk-based backup consumes large amounts of space Remote and branch-office data protection is expensive and cumbersome Customers want one vendor to manage everything
Microsoft Confidential
Better nightly backups neededTape is inefficient Lack of application support WAN not feasible for centralized backupsDisk-based backup consumes large amounts of space Remote and branch-office data protection is expensive and cumbersome Customers want one vendor to manage everything
Microsoft Confidential
Better nightly backups neededTape is inefficient Lack of application support WAN not feasible for centralized backupsDisk-based backup consumes large amounts of space Remote and branch-office data protection is expensive and cumbersome Customers want one vendor to manage everything
Microsoft Confidential
Agent on production servers capturing byte-level changes as they occur in real-time
Near continuous (hourly) protection of files
Multiple scheduled snapshots per day
Easy IT or End-User restore – fast from disk
2006
Microsoft Confidential
How Microsoft Data Protection Manager worksAgents are deployed on each production file serverCapture only byte level changesAgent logs all changes that occur on the production serversChanges are replicated and stored on DPM server based on IT Administrator policyProduction server not impactedDPM becomes first tier of data protection
Clients
ActiveDirectory®
File Servers Tape LibraryDPM Servers
Snapshots
2006
Microsoft Confidential
Building on DPM 2006's focus for disk-to-disk protection of file servers, service pack 1 broadens our protection capabilities in multiple ways:
Support for protecting File Server clusters
Support for SIS (single-instance storage) servers
Support for x64 Windows servers
Microsoft Update opt-in
Download SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=93B4745C-A10B-44A9-9117-06FC4865B9F4&displaylang=en
Microsoft Confidential
Customers are faced with a wide range of backup, replication and continuous data protection choices – and yet many customers are dissatisfied with whatever they are currently using either due to lack of application support, complexity, failures with current technology, cost, etc.
DPM V2 announcement on September 27th, 2006Microsoft is pleased to announce the beta availability of Data Protection Manger (DPM) version 2 – which combines the best aspects of advanced CDP and traditional tape backup into a single and reliable data protection solution that enables IT administrators and end-users to rapidly and reliably recover from seamlessly integrated disk and tape.
2007
Microsoft Confidential
Customers are faced with a wide range of backup, replication, and continuous data protection (CDP) choices – and yet many customers are dissatisfied with whatever they are currently using either due to lack of application support, complexity, failures with current technology, cost, etc.
DPM v2 announcement on September 27, 2006Microsoft is pleased to announce the beta availability of Data Protection Manger (DPM) version 2 – which combines the best aspects of advanced CDP and traditional tape backup into a single and reliable data protection solution that enables IT administrators and end-users to rapidly and reliably recover from seamlessly integrated disk and tape.
2007
Microsoft Confidential
DPM 2006Centralized Backup of Branch OfficesRapid & Reliable Recovery – from disk instead of tapeEnd User Recovery without IT intervention
Clients
ActiveDirectory
File Servers Tape LibraryDPM Servers
Snapshots
DPM v1 2006
Microsoft Confidential
DPM v2
Clients
ActiveActiveDirectoryDirectory
File Serverswith Tape Library
DPM Servers
Online Snapshots
Exchange ServersSQL Servers
SharePoint Serversincluding clusters
Disk-based Recovery
Offline tape
Tape-based Archive
DPM 2007Continuous Data Protection for Windows Application and File ServersRapid & Reliable Recovery from disk instead of tapeAdvanced Technology for enterprises of all sizes
2007
DPM 2006 sp1 DPM 2007
Protect File Servers and Shares YES YES
Protect Microsoft Exchange YESKB 909644
YESNative DPM
Protect Microsoft SQL Server YESKB 910401
YESNative DPM
Protect Microsoft SharePoint YESKB 915181
YESNative DPM / beta 2
Protect System State YESTechNet
YESNative DPM / beta 2
Protect R2 SIS Servers YES YES
Protect x64 Windows YES YES
Protect Clusters YES YES
Tape Media – in addition to disk -- YES
Time between Synchronizations 1 hour 15 minutes
Number of Shadow Copies 64 up to 512
Not a complete feature list – simply for comparison of DPM 2006 to DPM 2007
Microsoft Confidential
Data Protection Manager 2006Data Protection Manager 2006File Protection and Recovery Rapid and reliable disk-based data recovery Efficient, continuous data protection Designed to work with existing tape archive softwareCentralized Backup of Branch Office
Breadth of Support: Breadth of Support: Microsoft Exchange Microsoft SQL Server™ Microsoft SharePoint® Server File Servers
Depth of Support:Depth of Support: Tape Support System State Bare Metal Recovery Continuous Data Protection High Availability Environments
DPM 2007DPM 2007
DPM 2006DPM 2006
Microsoft Confidential
2007
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Father son schemeFather son scheme
Grandfather – father - Grandfather – father - son scheme son scheme
Great grandfather -Great grandfather -Grandfather – father - Grandfather – father -
son scheme son scheme
Great grandfather -Great grandfather -Grandfather – father - Grandfather – father -
son scheme son schemeJob# Frequency Retention1 Once per week 4 weeks
2 Once per month 12 months
3 Once per year 7 years
2007
DPM
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
How protection works
…or why you’ll never need to do a full backup on a production server again
Microsoft Confidential
E:\ + Exchange\ + ExecMail.EDB ExecMail.STM
L:\ + \Exchange\ + ExecMail.LOG ExecMail.CHK
Microsoft Confidential
DPM filter creates a volume map, to monitor whichdisk blocks contain portions of the files to be protected.
DPM Filter – Volume Map
E:\ + Exchange\ + ExecMail.EDB ExecMail.STM
L:\ + \Exchange\ + ExecMail.LOG ExecMail.CHK
Microsoft Confidential
DPM Filter – Volume Map
VOLUME (actual disk blocks)
Time = 10:00
Microsoft Confidential
1 2 3 4
DPM Filter – Volume MapChanged blocks noted
Time = 10:02
VOLUME (actual disk blocks)
File Write
Microsoft Confidential
7
1 2 3 4
5
6
8 9
DPM Filter – Volume MapChanged blocks noted
Time = 10:05
VOLUME (actual disk blocks)
File Write
Microsoft Confidential
11 7
1 2 3 4
12
5
6
15
8 9
10 13 14
DPM Filter – Volume MapChanged blocks noted
Time = 10:08
VOLUME (actual disk blocks)
File Write
Microsoft Confidential
11 7
1 16 17 18 19 4
12
5
6
15
8 9
10 13 14
DPM Filter – Volume MapChanged blocks noted
Time = 10:11
VOLUME (actual disk blocks)
File Write
Microsoft Confidential
11 7
1 16 17 18 19 4
12
5
6
15
8 9
10 13 14
VOLUME (actual disk blocks)
DPM Filter – Volume Map
1)VSS Snapshot taken on production volume to ensure consistent data
Time = 10:15 (every 15 minutes)DPM Synchronization
Microsoft Confidential
11 7
1 16 17 18 19 4
12
5
6
15
8 9
10 13 14
VOLUME (actual disk blocks)
DPM Filter – Volume Map
1)VSS Snapshot taken on production volume to ensure consistent data
Time = 10:15 (every 15 minutes)DPM Synchronization
117116171819412561589101314Block Order
Microsoft Confidential
1 2
3 4 5 6 7 8
9
10
11
12
13 14
15 16 17
VOLUME (actual disk blocks)
DPM Filter – Volume Map
1)VSS Snapshot taken on production volume to ensure consistent data
2) Cache of changed blocks is sent to DPM server
Time = 10:15:01Transmit changed blocks from 10:00-10:15 to DPM serverData integrity preserved, since volume snapped
1234567891011121314151617Block Order
Microsoft Confidential
Transmit changed blocks from 10:00-10:15 to DPM serverData integrity preserved, since volume snapped
1 2
3 4 5 6 7 8
9
10 18 19 20
11
21 12
13 22 14
15 16 17
VOLUME (actual disk blocks)
DPM Filter – Volume Map
1)VSS Snapshot taken on production volume to ensure consistent data
2) Cache of changed blocks is sent to DPM server, while live disk continues
Time = 10:15:02
And File IO continues
Microsoft Confidential
18 19 20
21
22
VOLUME (actual disk blocks)
DPM Filter – Volume Map
1)VSS Snapshot taken on production volume to ensure consistent data
2) Cache of changed blocks is sent to DPM server, while live disk continues
Time = 10:15:03 +
And File IO continues
Microsoft Confidential
‘Express Full’ & Transaction logs
Microsoft Confidential
Exch.Data
0:00
Exch.Data
DPM ReplicaProduction Server
Microsoft Confidential
Exch.Data
0:00
Exch.Data
0:00Baseline Initial Mirror
DPM ReplicaProduction Server
Microsoft Confidential
Exch.Data
0:XX
Exch.Data
0:00
15 minute Sync’s
DPM ReplicaProduction Server
Every 15 minutes, closed transaction logs are sent to the DPM server
Microsoft Confidential
Exch.Data
0:XX
Exch.Data
0:00
15 minute Sync’s
DPM ReplicaProduction Server
Every 15 minutes, closed transaction logs are sent to the DPM server
Microsoft Confidential
Exch.Data
0:XX
Exch.Data
0:00
15 minute Sync’s
DPM ReplicaProduction Server
Every 15 minutes, closed transaction logs are sent to the DPM server
Microsoft Confidential
Exch.Data
0:XX
Exch.Data
0:00
DPM ReplicaProduction Server
DPM can restore server to any 15 minute point in time- Exch.Data 0:00- roll forward to 0:XX with transaction logs
Microsoft Confidential
Exch.Data
1:00
Exch.Data
0:00Express Full
DPM ReplicaProduction Server
At least weekly, a DPM Express Full re-synchronizes the DPM Replica
Microsoft Confidential
Exch.Data
1:00
Exch.Data
1:00Express Full
DPM ReplicaProduction Server
At least weekly, a DPM Express Full re-synchronizes the DPM Replica 0:0
0
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
1:XX
Exch.Data
1:0015 minutes
DPM ReplicaProduction Server
Week 1 : Data changes0:00
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
1:XX
Exch.Data
1:0015 minutes
DPM ReplicaProduction Server
Week 1 : Data changes0:00
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
1:XX
Exch.Data
1:00
DPM ReplicaProduction Server
Week 1 : Data changes0:00
15 minutes
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
1:XX
Exch.Data
1:00
DPM ReplicaProduction Server
DPM can restore to Week 1 : Wednesday : 2:15
Use existing 1:00 replica Roll forward logs to Wednesday 2:15
0:00
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
1:XX
Exch.Data
1:00
DPM ReplicaProduction Server
DPM can restore to Week 0 : Thursday : 10:45
Shadow copy 0:00 to rebuild week 0 Roll forward logs to Thursday 1:45
0:00
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
2:00
Exch.Data
1:00weekly
DPM ReplicaProduction Server
Week 2 : Express Full - resynchronization0:00
Shadow Copyof 0:00 to 1:00 +Transaction logsWeek 0
Microsoft Confidential
Exch.Data
2:00
Exch.Data
2:00weekly
DPM ReplicaProduction Server
Week 2 : Express Full - resynchronization1:00
0:00
Microsoft Confidential
Exch.Data
2:00
Exch.Data
2:00
DPM ReplicaProduction Server
Up to 512 shadow copies, plus their logs
512 x 7d x 24h x 4(15m) = 344,000 Recovery Points
1:00
0:00
Microsoft Confidential
2007
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Microsoft Confidential
Exchange ServerSG, database, mailbox & public folder recovery
SQL Database protection & recovery
SharePoint -- Beta2 feature
System State & Bare Metal Recovery -- Beta2 feature
Microsoft Applicationand File Servers with Tape Library
DPM Servers
2007
Microsoft Confidential
Disk to Disk to Tape (D2D2T) in addition to D2D & D2T
Local agent install, SMS/SUS integration
Command Line Interface and PowerShell commandlets
Support for protecting servers across trusted domains
File/folder exclusions, encrypted files…
Media Encryption
Other Key Enhancements
Microsoft Applicationand File Servers with Tape Library
DPM Servers
Online Snapshots
Disk-based Recovery
Offline tape
Tape-based Archive
2007
Microsoft Confidential
BETA 1 – September 27, 2006
Exchange
SQL
Integrated Tape functionality
BETA 2 – May 2007
SharePoint
Virtual Servers
Windows XP & Vista Desktops
DPM-2-DPM for Disaster Recovery
System State & Bare Metal Recovery
SCCM / SMS / SUS deployment of client
Command-line & Windows PowerShell control
RTM & General Availability – 2007 H2
Microsoft Confidential
All data protectedSync / 15minFile RPO = 2hrs (12d)App RP = 512 days with 15m RP’s
Important DataSync / 4 hoursFile RPO = daily (63d)App RP = 512 weeks with 15m RP’s
dpm2dpm4dr
Microsoft Confidential
Windows 2003 File Services
Exchange 2003Exchange 2007
SQL Server 2005
DPM 2007
Microsoft Confidential
Windows 2003 File ServicesWindows 2008 File Services
Exchange 2003Exchange 2007
SQL Server 2005
SharePoint 2007
XP DesktopsVista Desktops
LinuxNetWare
Oracle Notes
NT42000
Virtual Server 2005 R2
DPM 2007
Microsoft Confidential
Windows 2003 File ServicesWindows 2008 File Services
Exchange 2003Exchange 2007
SQL Server 2005
Virtual Server 2005 R2
VSSVR
Guest OS instances
Linux02
NetWare52-Groupwise
NT4-CustomApp
Microsoft Confidential
1. No more failed recoveries
2. Near zero data loss for Exchange, SQL, and SharePoint
3. Seamless Disk-to-Disk-to-Tape for backups
4. Recoveries within minutes instead of hours
5. Unified policy allows protection of multiple data types to any media – in one schedule and with common tuning options
6. Eliminate the backup window of your production servers
7. Shrink potential data loss down to 15 minutes
8. Application recovery direct from backup UI – no pre-staging
9. Enable end-users to perform their own recoveries
10. Remove tapes from branch offices and centralize backups at the datacenter
2007
Microsoft Confidential
Microsoft Confidential
Website www.microsoft.com/DPM