www.doubletake.com double-take software overview a platform for recoverability

24
www.doubletake.com Double-Take Software Overview Double-Take Software Overview A Platform for Recoverability A Platform for Recoverability

Upload: cornelius-holt

Post on 23-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

www.doubletake.com

Double-Take Software OverviewDouble-Take Software Overview

A Platform for Recoverability A Platform for Recoverability

www.doubletake.com

AgendaAgenda

• Introduction to Double-Take Software

• Double-Take Software Products and Technology

• Client testomonial

• Q & A

www.doubletake.com

About Double-Take Software, Inc.About Double-Take Software, Inc.

• Headquartered in Southborough, MA• Worldwide Reach - North America, South America,

Europe, Pacific Rim• Focused on the protection of business-critical applications

– 125,000 licenses of Double-Take in over 10,000 customers

– 35,000+ licenses protecting Exchange

– 35,000+ licenses to protecting SQL

• Comprehensive Professional Services Offerings• Prestigious Microsoft Certifications

Leading Provider of Software Solutions for Recoverability Including Continuous Data Replication, Application Availability and System State Protection.

www.doubletake.com

Your Solution NeedsYour Solution Needs

• What challenges are you facing in your DR plan?

• What types of servers do you want to protect?

• About how much data do you have to protect?

• Have you chosen a DR Site?

• What kind of connection will you have?

• Do you have an RTO and RPO defined?

www.doubletake.com

The Keys to RecoverabilityThe Keys to Recoverability

ReplicationHost-based, real-time, byte-level, asynchronous replication across any distance with WAN optimization to minimize bandwidth usage and requirements

FailoverReal-time monitoring for automatic or manual failover for individual applications, file shares, and whole servers - locally or remotely

RecoveryRecover data or entire servers over any distance while users remain online, with minimum downtime

www.doubletake.com

Data ProtectionData Protection

• System Friendly Asynchronous Replication– Low CPU Overhead– Defined Memory and Disk Usage– Write Order Intact Replication

• Bandwidth Friendly Data Movement– User-definable Replication Sets– Compression, Scheduling, Scheduled Bandwidth

Throttling capabilities

• Point-in-Time Recovery– Integration w/Volume Shadow Copy Services

www.doubletake.com

Double-Take – Technology OverviewDouble-Take – Technology Overview

Applications

OS

Disk Systems

Source

Applications

OS

Disk Systems

Target

Double -Take Filter

www.doubletake.com

Double-Take – Technology OverviewDouble-Take – Technology Overview

Protected File?

Write or Change?

Applications

OS

Disk Systems

Source

Yes

No

I/O Operations examined in Kernel Memory

www.doubletake.com

Double-Take – Technology OverviewDouble-Take – Technology Overview

Applications

OS

Disk Systems

TargetAlways:

Same I/O order

Same Data

Same File

Option:

Different Directory

www.doubletake.com

Double-Take – Queuing and Error CorrectionDouble-Take – Queuing and Error Correction

Applications

OS

Disk Systems

Source

Applications

OS

Disk Systems

Target

Double-Take Filter

RcvQueue

AckQueue

SendQueue

www.doubletake.com

Failover SolutionsFailover Solutions

• Application-Level Failover (RTO = ~30min)– Applications like Exchange, SQL and File Servers using

the Application Manager capabilities– Works with Cluster-based Deployments

• Full-Server Failover (RTO = ~30min)– Custom-developed applications or applications

dependent on system state information– Replicate and Failover OS, Applications and Data– Works for all stand-alone Windows Servers– Assists in One-to-One Server Migrations

www.doubletake.com

How Application Failover WorksHow Application Failover Works

Failover Monitoring

Replication

• IP ICMP or Heartbeat Monitoring

• Detect Failure in Seconds or Minutes

• Application Services Started

• Failover Name, IP and/or DNS Records

• Failover Active Directory Hostname

• Users can reconnect within minutes of failure

• Failover can occur across a LAN, WAN and even NAT

• Failover more than one Server Identity to the Same Target Server

• Failover Scripting for Custom Configurations

Source Target

www.doubletake.com

How Application Failback WorksHow Application Failback Works

Failover Monitoring

Restoration

Source Target

• Recover or Replace Source Server

• Restore Data to the Source Server

• Failback Source Identity

• Bring Source Application Online

• Users Reconnect Within Minutes

• Start Replication and Resume Failover Monitoring for Continued Protection

Replication

www.doubletake.com

How Full-Server Failover WorksHow Full-Server Failover Works

OS and Applications

Data Volumes

User and Application Data

Staging Area

www.doubletake.com

Server Recovery OptionServer Recovery Option

• Tier 2/Tier 3 Server Recovery (RTO = 4-24 hours)• Same Recovery Type as FFO• Local, Remote or Both• Restore to Physical or Virtual Systems• Assists with “Swing-Server” Migrations

www.doubletake.com

Double-Take Server Recovery OptionDouble-Take Server Recovery Option

Protect Multiple Production Servers With One SRO

Image Server

Recover Back to the Original Server, to New Hardware, or to a

Virtual Machine

www.doubletake.com

Double-Take Virtual Recovery AssistantDouble-Take Virtual Recovery Assistant

• Protect physical or virtual servers directly into VMWare .VMDK files with real-time replication

• Protect the entire server including the OS, applications and data

• Protect multiple source servers with a single virtual target server

• Failover automatically or manually within minutes

• Lower TCO with virtualization and many-to-one consolidation.

www.doubletake.com

Virtual Recovery AssistantVirtual Recovery Assistant

FS-System.vmdk

FS-Data.vmdk

EX-System.vmdk

EX-Data.vmdk

DB-System.vmdk

DB-Data.vmdk

C: System.vmdk

DT-VRAFS-System

FS-Data

File Server

Exchange

Database

C:

E:

EX-System.vmdk

EX-Data.vmdk

DB-System.vmdk

DB-Data.vmdk

C: System.vmdk

DT-VRA

FS-System.vmdk

FS-Data.vmdkFile Server

C:

E:EX-System

EX-Data

C:

E:

DB-System

DB-Data

C:

E:

www.doubletake.com

How DTVI WorksHow DTVI Works

• Must be running ESX Server 3.0.0 and VMware VirtualCenter 2.0.0

• Leverages VMware APIs for virtual machine snapshot functionality

• Snapshots include the entire VM (OS, Apps, Data) and can be used with a non-Windows Guest OS

• Snapshots are time-coherent across all virtual disks configured for a protected virtual machine

• Extends staging of virtual machines across geographical boundaries (WAN replication)

www.doubletake.com

*-delta.vmdk*.vmsd

*-delta.vmdk*.vmsd

Replicating (SCP)*-delta.vmdk*.vmsd

How DTVI WorksHow DTVI Works

*.vmdk*-flat.vmdk*.vmx

Synchronizing (SCP)

Committing (remove_snapshot)

Source VM Files Replica VM Files

AdministrativeClient

Source ESX Server

Datastore (Source)

Target ESX Server

Datastore (Target)

SSH SSH

WebServices

*.vmdk*-flat.vmdk*.vmx

Monitoring (Time/Size)

www.doubletake.com

Greg SaraydarianGreg Saraydarian

Financial Services OrganizationFinancial Services Organization

www.doubletake.com

Customer SolutionCustomer Solution

• Solution set for data protection and availability

• Used:– Double-Take Replication

– Double-Take Application Manager

• Protecting/has protected several versions of Exchange Server

www.doubletake.com

Q&AQ&A

www.doubletake.com

Thanks!Thanks!For More InformationFor More Information

http://www.double-take.com

You may close the webinar window at You may close the webinar window at any time.any time.