Sunteți pe pagina 1din 6

m Virtualization Economics DISCOVER Innovate Reliab

nformation Global Change Intelligent Technology Se


ght Opportunity Social Infrastructure Integrate Ana
SOLUTION PROFILE

Hitachis Approach to 3-Data-Center Business Continuity


and Disaster Recovery

New Form Factor Supports Top-Notch Protection The standard for disaster tolerance in most organi-
zations is a two-site disaster recovery architecture,
for Smaller Organizations with one production site and a secondary disaster
recovery location. The distance between these sites
The risk of permanent data loss is a growing problem for helps to determine the amount of data at risk of per-
organizations as the amount of data under management manent loss. The further the distance, the greater the
data transfer latency: the greater amount of data that
is growing at an annual compound rate of 40% or more. will not be in the secondary site at the time of a pro-
In addition, the complexity and interdependency of the duction site outage. However, having the two sites in
IT environment is increasing, and the number and size close proximity results in the risk of both of them being
impacted by a major regional event, such as a large
of risks to the organization continue to rise. Previously, earthquake or violent storm.
organizations had manual procedures and paper trails
For many organizations, these risks are becoming
they could utilize to recover data, but those are largely unacceptable, and reducing the probability of perma-
a thing of the past. Todays interconnected world can nent data loss is a business imperative.

create an illusion of business continuity; however, the risk Recent technological advances in storage-based data
to revenue and reputation from an extended outage has services, including active-active storage clustering and
highly efficient long-distance replication, have enabled
never been greater. the cost-effective implementation of three-site disaster
recovery architectures. These architectures dramati-
cally improve protection against permanent loss and
corruption of data. Moreover, this approach provides
the foundation for much faster system recovery, or can
even mitigate the need for recovery.
SOLUTION PROFILE

Hitachi has a long, successful history of TABLE 1. THREATS TO OPERATIONS


helping large enterprise organizations
with their disaster and business continuity Categories Threats
needs. These capabilities are now available System Events Hardware or software failures, network problems, corrupted
in a new midrange form factor, enabling data, viruses, glitches, bugs
smaller organizations to achieve levels of Internal Events Human error, fire, plumbing leaks, electrical spikes, construc-
protection that were previously unavailable tion defects, angry employee
to them.
External Events Utility interruptions, sabotage or terrorism, hacking, accidents
Introduction Acts of Nature Floods, hurricane or typhoon, tornados, earthquakes
When a disaster strikes, an organization Interdependence Threats Supply chain disruptions, partner failures, labor strikes
may lose data and access to data, and thus
the ability to function. Recovering from such
a catastrophe is a business imperative.
Leveraging techniques that focus on risk
quantification and mitigation is key: It will
help organizations to choose which tech-
nology to use, and balance that decision
against the determination of how much to
spend.

Specifically, this decision revolves around


three fundamental service level require-
ments for business-critical functions and
their associated applications:
Recovery point objective: How much
data loss can be tolerated during recov-
ery? For critical data, the ideal is usually
zero data loss.
Recovery time objective: What is the
acceptable time within which to recover Historically, the emphasis has been on Recovery decisions can no longer be made
systems and operations? The goal for reducing the time required to recover sys- in isolation. Within an organization, the
critical operations should be measured in tems. All recovered systems lose some failure of one system can quickly have a
seconds or minutes. data. Today, there is significant pressure domino effect and bring down other sys-
Return on investment: What is the right on organizations to implement recovery tems. Government agencies and business
balance between risk and mitigation? The solutions that give a very high probability groups are mandating increasingly stringent
total cost of disaster protection should of zero data loss; this has been a business recovery objectives to ensure that industries
be less than the anticipated impact of a imperative for the financial industry for and society can recover quickly from man-
potential major disruption. some time. More and more, organizations made and natural disasters. As the world
are finding it inordinately costly to recover of digital business evolves, the attributes of
Understand the Risks if data is lost, and the corresponding business continuity and disaster recovery
recovery time is significantly increased. The are transitioning from being highly desirable
What could possibly happen to disrupt your
business processes to recover lost data targets to being absolute must haves.
operations? Depending on your location, a
manually after a disaster become more
lot (see Table 1).
difficult as processes are increasingly com- Why Do You Need a 3DC
These decisions are not independent of one puterized. Automatic remote recovery for Architecture?
another. Data loss, and in particular loss all major IT systems can simplify business Part of these mandates is the requirement
of data integrity, can significantly increase processes and reduce costs. that at least one backup data site is located
recovery time. a significant distance, often more than 200
miles, from the primary data center.

According to the U.S. National Archives and Records Recovery solutions have an important tech-
nology constraint: Zero data loss cannot be
Administration, 93% of companies that lost their data for
achieved over long distances. The practical
10 days or more filed for bankruptcy within one year of the limitation is usually less than 50 miles, or
disaster, and 50% filed for bankruptcy immediately. whatever latency the application will tolerate
when its data is synchronously replicated.
3

If your critical applications and data require TABLE 2. HITACHI TECHNOLOGIES FOR MULTIPLE DATA CENTER
always-on access, you will need an active- ARCHITECTURES
active high-availability topology between sites.
However, if you cant get two sites within Architecture Technologies
acceptable synchronous distance that meet Cascade: Synchronous + Hitachi TrueCopy + Hitachi Universal Replicator
the requirements for geographic dispersion, Asynchronous
you will need a third site to protect against a
Multitarget: Synchronous TrueCopy + Universal Replicator + Universal Replicator
major disaster that impacts the first two.
+ Asynchronous
By introducing a three-site architecture with Storage Clustering + Global-Active Device Feature + Universal Replicator
two data recovery nodes (one at close dis- Asynchronous
tance and one at long distance), a very high
probability of zero data loss and fast recov-
ery times can be achieved.

Types of 3DC Architectures


The architectures of 3-data-center (3DC)
disaster recovery solutions can consist of a
combination of technologies to enable very
high probabilities of zero data loss at local and
long distances. They combine synchronous
Figure 1. Cascade 3DC Architecture
replication (local recovery node) with asyn-
chronous replication (remote recovery node).
There are two main options within this
The local recovery node can accommodate
Business continuity and topology:
very rapid recovery with a high probability
of zero permanent data loss. Active-active disaster recovery, using a The local recovery node can be a minimal
storage clustering adds even greater disk-only bunker whose primary func-
resilience to the design. Testing of this envi-
3-data-center topology, will
tion is to ensure that data can continue
ronment is simplified, and IT personnel can be essential contributors to flowing to bring the remote recovery node
be shared between the primary node and sustaining brand loyalty and completely up to date should the primary
the local backup nodes. node go down. The local recovery node
brand value, especially in
is often an unmanned storage site. This
The remote recovery node provides for a world in which changing configuration is the most cost-effective
recovery with low permanent data loss in
the unlikely event that both the primary and vendors can be as simple as way of providing a high probability of zero
data loss at a remote recovery node with
local recovery nodes are impacted. going to a different website.
very good recovery time characteristics.
As is the case in many IT decisions, choices Less frequently, the local recovery node
available for 3DC protection can be deployed can be a full data center (often with
and even combined to meet an organizations failover and failback systems). This
specific needs for various business continuity Typically, Hitachi TrueCopy remote syn-
provides zero data loss and very rapid
and disaster recovery scenarios. Hitachi Data chronous replication is used between the
recovery for disasters at the primary
Systems offers the following options, among production and local recovery sites to
node. Going forward, this configuration
other combinations, with Hitachi Virtual minimize data loss, with Hitachi Universal
is less likely, as the multitarget topology
Storage Platform (VSP) G1000 and VSP Replicator used to copy the data asynchro-
discussed in the next section is a cost-
G800 storage systems. These models use nously from the local recovery site to the
effective option that gives better
the remote replication technologies in Hitachi remote recovery site. Alternatively, Universal
protection.
Storage Virtualization Operating System Replicator can be used for both links.
(SVOS), as shown in Table 2. One trade-off with cascade topology is
Recovery time depends on various factors:
seen in the following example. In the event
the speed of the long-distance link between
Cascade 3DC Disaster Recovery that the local recovery node goes down,
the local and remote recovery nodes, what
Architecture the remote recovery node is frozen with
time of day or year the primary node goes
This approach (see Figure 1) is sometimes the data it has received at that point in
down, and the complexity of the recovery pro-
known as multihop, and it combines time. The organization then has to decide
cess. Recovery can be made at the remote
technologies to provide a high probability of whether to continue to run the IT produc-
node in under an hour or within a few hours.
zero permanent data loss for the majority of tion systems without ongoing protection.
disaster scenarios over a long distance.
SOLUTION PROFILE

If it does, the remote recovery node gets


further behind, and if a rolling disaster takes
out the primary node as well, significant
permanent data loss can occur. It can close
down the systems at the primary node
until the secondary node is recovered or
a communications link can be established
between the primary node and the remote
recovery node. In this case, the recovery
time is elongated, but the probability of per-
manent data loss is minimized.

For organizations within a small geographical


area, the cascade three-node topology makes
good business sense. A disaster that takes
down both the primary and local recovery
sites is likely to affect most local customers.
Figure 2. Multitarget 3DC Architecture
For interstate and international business, and
especially for organizations that provide critical
infrastructure services, this topology may not
meet more exacting requirements.

Multitarget 3DC Disaster Recovery


Architecture
The difference between the cascade
topology and the multitarget is that in the
multitarget topology, the primary data node
backs up data to both nodes simultane-
ously. See Figure 2.

This is a recent technological capability,


and very-high-performance controllers
are required to manage this process. This
approach ensures that there is no perma-
nent data loss if either the primary or local
recovery node is lost.
Figure 3. Storage Clustering With Asynchronous Replication 3DC Architecture
Either node can communicate data to the
remote recovery node to ensure zero data
loss. To ensure rapid recovery, the storage the backup sites to enable secondary pro- Universal Replicator asynchronous repli-
controller technology has to be able to cesses. These include operations such as cation is used to copy the data from either
resynchronize the controllers at the remote backing up to tape, refreshing development production site to the remote recovery site.
recovery node with either the primary or systems, or enabling recovery testing with- All of the additional benefits of the multitar-
local node, and pass just the changed data out impacting the performance or availability get configuration described above apply to
(delta resynchronization). In the cascade of the production systems. this architecture. See Figure 3.
topology, if the local recovery node is down, The storage clustering 3DC model provides
Storage Clustering With Asynchronous
no data can be transferred to the remote the greatest levels of data availability and
Replication
recovery node, as discussed above. resiliency with zero data loss.
The most recent advances in storage
The major disadvantage of the multitarget resiliency and data availability are found in
architecture is the higher cost of telecom-
Simplify Your Business
global-active device storage clustering tech-
munication lines. A major advantage is Continuity and Disaster
nology. This feature is part of the Storage
that if there are backup servers in the local Recovery Plan and Operations
Virtualization Operating System of Hitachi
recovery node, there can be failover and fail- Virtual Storage Platform G series systems. Many disaster recovery strategies consist
back between the primary and local nodes. With global-active device, there are two pro- of a collection of application-specific point
This significantly enhances recovery times. duction sites, each with an active copy of all solutions that must be individually main-
data. If a failure occurs at either site, its data tained and managed. These must then
Additionally, remote snapshots or clones
is transparently available at the other site, be individually executed at the time of a
can be created and mounted in either of
with no need to fail over or fail back.
53

disaster. This situation results in hidden their ability to recover from a disaster of their Evaluate the technology choices available
costs and risks to the organization. These own to ensure continuous availability of your that mitigate the risks, and balance the
hidden costs and risks are a function of the data, if that is even part of the service. costs and the benefits to arrive at the right
recovery complexity that only gets worse as solution for each requirement. The invest-
Their low pay-as-you-go pricing models
the organization scales up, provisioning new ment should also be balanced across the
may be attractive today as the service
applications and/or data. business process, including servers, stor-
providers seek to gain market share at the
age, networking and people.
HDS storage can consolidate all of your busi- expense of profit margins, but as the service
ness continuity and data recovery processes industry consolidates those prices will likely
Take advantage of automation and
using a flexible combination of in-system rise. And, as has been demonstrated several orchestration tools to simplify configura-
and remote replication capabilities. Hitachi times, with such companies as Nirvanix and tion and management.
Replication Manager and Hitachi Data Instance Symantec with Backup Exec.cloud, the busi- Public or shared cloud services may be
Director software also dramatically simplify the ness failure of a service provider can make it an attractive disaster recovery option, but
configuration, management, automation and very challenging to retrieve or move the data understand the operational and security
orchestration of these modern data protection they have been storing for their customers. risks associated with entrusting your data
technologies. Easily combine local snapshots to a third party.
HDS continues to develop and provide
with remote replication and then remote snap-
cost-effective data storage, business resil- Next Steps
shots into a single policy-based workflow to
iency and disaster recovery solutions for
overcome a wide variety of copy data man- Hitachis solution consultants and profes-
organizations that prefer to maintain total
agement challenges. sional services experts are ready to help
control of their data assets. Equipment
you transform your legacy infrastructure
leasing options are available that provide
What About Using the Cloud and evolve it to meet your current and
an attractive alternative to pay-as-you-go
for the Third Site? future IT needs. Available services include
services from third parties. Other solutions,
Many organizations are considering the assessment, planning, design, installation,
such as managed or hosted services,
use of a third-party disaster-recovery-as- implementation, transition, migration, man-
can be tailored to meet specific customer
a-service (DRaaS) solution as an option agement, optimization and support.
requirements.
for storing a copy of their data, either in a To learn more, please visit hds.com/go/
3
vault or in the cloud. The primary benefits Summary protect, or contact DP-Sales@hds.com
of these services are cost reduction and or your local HDS sales office or Hitachi
Understand your risks,
replacing large equipment capital costs How Will TrueNorth Partner to schedule an initial
the likelihood of them
with smaller monthly operating expenses. You Protect
occurring, and what their conversation with our business continuity
However, trusting your data with a third Data
financial impact may be. and disaster recovery experts.
party exposes the organization to several WATCH
potential risks.
Prioritize your systems,
applications and data,
The most obvious risk is data security. based on service level agreement (SLA)
The service providers may employ more requirements, including operational
advanced security protection than a typical resilience, operational recovery, disaster
business can. However, they are potentially recovery and regulatory compliance.
a much bigger target for hackers, and you
have no direct control of their employees and
contractors. You also have to put your faith in
SOLUTION PROFILE

Corporate Headquarters Regional Contact Information


2845 Lafayette Street Americas: +1 866 374 5822 or info@hds.com
Santa Clara, CA 95050-2639 USA Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com
www.HDS.com community.HDS.com Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com

HITACHI is a trademark or registered trademark of Hitachi, Ltd. TrueCopy and TrueNorth are trademarks or registered trademarks of Hitachi Data Systems. All other trademarks, service
marks, and company names are properties of their respective owners.
SP-212-A DG December 2015

S-ar putea să vă placă și