Transcript
AppAssure 5.4.2.192
Advanced Training Webinars Data Protection / Retention Policies Granular Recoveries Bare Metal Restore
Agenda • Data Protection Settings • Protection Intervals • Retention policy – Basics and best practices • Granular recoveries – File / Exchange / SQL / SharePoint
• Bare Metal Restore • Resources and Additional information • Q&A
Data Protection
Data Protection Settings • Select and customers settings
3
Data Protection
1
Protection Intervals
Data Protection
New Scheduling Wizard • Access from the protected machine – Scheduling button – Drop down on “settings” button
• Select “Volumes” to create schedule/apply template − When using BMR, One Time Export, Virtual Standby, select all drives for consistency
Data Protection
5
Creating a Schedule • Select days of the week – Add periods to the default › Can slide bar (blue) or expand/ shrink as needed › Timeline bar to select time(s) › Add Schedule for Sat/Sun
• Always select Apply
6
Data Protection
2
Creating/Using Templates • Templates enable saved protection setting to be applied to protected machines • Drop down from “Apply Template” to select • Create New Template – Enter name and click “check” – Then “Apply” – Saved Templates can also be changed and saved to a new template
Data Protection
7
New Tabs at the top of the core • Protect – Can be used if Agent is already installed – Can be used if Agent was installed in previous version – Can be used if no Agent Software is installed › Will start Deploy machine wizard ( install software, reboot system, protect)
• Restore – Select Machines – Chose recovery point – Destination › Recover to Protected Machine › Recover to any Target using Boot CD
• Export – One-Time / Continuous(virtual standby) – Creates Powered-off Virtual Machine Data Protection
8
Protect Machine Wizard Settings • Click on the Protect Tab – New Options › Keep current Settings › Default (hourly) protection › Custom Protection
– Helpful when upgrading to 5.4.2.192 from 5.3.x – Choose customer for peak/offpeak and weekend scheduling – Option to delete existing Recovery Points
9
Data Protection
3
Steps to Deploy and Protect Machine
Data Protection
10
Protection Intervals –Base image taken after adding machine protection › Incremental backup/snapshot after base Image › Core Default Protection interval is every 60 minutes – Modified from protect machine Tab – Min - 5 minutes / Max – 24 hours › Determine Settings Interval
– Transactional servers – Daily Protection – Pause Protection – Keep all volumes checked › Consistency especially for Virtual Standby, and BMR Data Protection
11
Retention Policy Basics
Data Protection
4
Introduction to AppAssure Retention Policies – The retention policy allows control of how long snapshots, also known as recovery points, of a protected machine should be retained within the repository –
The more frequently an agent is backed up, the more granular the recovery point.
–
Whether one agent or many are backed up to a Core, they proliferate quickly in the repository
–
To conserve resources over time, this data is then generally rolled up to an incrementally less granular series of recovery points
– Backups that fall within the retention policy are automatically merged to form new recovery points. – The retention policies are rolled up as part of the nightly jobs – Roll ups can be forced from an Agent – Eliminates the backups that are older than the retention policy
Data Protection
13
Retention Policy Basics The retention policy acts as management for AppAssure recovery Points – Each recovery point represents the ability to restore the information as of the date and time stamp – Recovery points are compressed and deduplicated before they are committed – To conserve resources over time, this data is rolled up to incrementally less granular recovery points by combining backups into new recovery points that span a larger timeframe.
Data Protection
14
Retention Policy settings • Retention Policy from the Core – Applies to all machines
• Retention Policy from the Agent – Customized retention policy that applies only to that agent
• Disparate Retention Policies – Used to establish different retention policies when replicating – Each source CORE can have a different retention policy than the Target Core – Useful for small branch offices/locations that may not require long retention policies( i.e. 3 months), and target Core is longer (i.e. 1 year)
• Retention Policies are set under the configuration tab of the Core and Agent • View Jobs from the Configuration > Settings, or Configuration > Job Settings 15
Data Protection
5
Considerations for a Retention Policy
Data Protection
Considerations for a Retention Policy • Frequency of backups – How frequently you need to back up agent machines
• Durability required for granular recovery points – How long you need to retain the data in discrete recovery points? – If your need to maintain granularity erodes quickly, this will affect how aggressively you roll up existing recovery points
• Retention – Defining of up to 5 sets of rules that cause the system to “roll up” › Hour, Day, Week, Month , Year
Data Protection
17
Rollup Process • Rollup occurs as part of the nightly jobs – Rules are applied designate how long that recovery point should exist before another rule applies – Defined retention policy is enforced by collapsing and eliminating dated recovery points – As data ages beyond the requirements defined in the retention policy, those recovery points are rolled up fewer, more comprehensive recovery points – This process is ongoing, trading off storage space required in the repository with granularity of your backups
18
Data Protection
6
Best Practices
Data Protection
Best Practices for Rollup Set the default Core retention policy for the largest number of machines –Set the default retention policy on the Core and apply to the majority of machines you want to protect –It is easier to differentiate a smaller number of protected machines that should have customized retention policies –Use custom policies for more critical machines
20
Data Protection
l
Best Practices for Rollup Consider compliance requirements, data type, or data source before establishing retention policy – Each organization has its own specific business rules and requirements regarding the retention of data – When defining a retention policy in your organization, ensure you consider regulations and compliance – Retention requirements may differ based on the type or source of data › Transactional data such as an Exchange Server may have a much more urgent requirement to back up in short intervals › Other data types or sources (for example, a low-traffic, seldomchanged web server) may require backups substantially less often, or may require a much lower granular retention of that data
21
Data Protection
7
Best Practices for Replication/ Cluster Rollup • Replication – Disparate Retention Policies provide primary Core(s) to maintain a different retention policy than the target core – Repository Integrity Check required the first time this is created
• Rollup for clusters – You can establish rollup for clusters just as you can for individual machines – Follow the same process, but select the cluster in the Machines tab instead of an individual agent machine, and then define the appropriate retention policy
22
Data Protection
l
Linux Server Exchange Server
5 4
Core
SQL Server Server
Austin
Newest RPs
Disparate Retention Policies Linux Server
5
Last replicated time
3
Exchange Server
4 3,2,1
Core SQL Server Server
Columbus
2 1 • •
Ability to configure rollup on target core, removing unneeded RPs (recovery points). Result: different recovery point chains at target and source cores AppAssure tries to build RPs chain from newest RPs • If needed, missing RPs are added (excluding seed drive). guarantees chain integrity on target. • Now possible to fix orphaned RPs which are located below newest RPs – simply force replication with option “Fix orphans”. Data Protection
23
Best Practices for Rollup From time to time, you should monitor how long your nightly jobs take, to ensure the amount of rollup does not over take a peak period for your organization. To see how long your rollups take, follow the process below • Monitoring Rollup Time Requirements – Navigate to the AppAssure 5 Core Console and click the Machines tab, and then click the machine you want to view events › Click the Events Tab › A log of all events for current tasks and alerts appears › Scroll through the events to see the job “Rolling up ‘n’ protected machines,” where n is the number of machines protected in the Core
– Note the start and end times to determine how long rollup is currently taking
24
Data Protection
8
Core Retention Policy settings for Agent Rollup The Newest Recovery Point text box displays the most recent recovery point. The oldest recovery point would be determined by the retention policy settings.
Data Protection
25
Customized Retention Policy Rollup
Data Protection
How to Customize retention policy for Agent Rollup • Navigate to the AppAssure 5 Core Console and then click the Machines tab. • From the Machines tab, perform one of the following: o
Click the hyperlink for the machine you want to modify.
o
Or, in the navigation pane, select the machine you want to modify.
• Click the Configuration tab, and then click Retention Policy. o
NOTE: To use the default retention policy configured for the Core, make sure the
• Use Core default retention policy option is selected. • Select Use custom retention policy to set the customized policies. • The Custom Retention Policy screen expands to display the retention policy options
27
Data Protection
9
Custom Retention Policy Example Your organization is backing up every ten minutes, representing six recovery points per hour, or 144 recovery points in a day. At any point in that initial retention period, an agent machine can be restored to the exact state within a ten-minute threshold – Three days later it likely is less important to restore to a ten-minute period, but perhaps the organization wishes to retain one backup per hour – The first line under the primary setting, you can specify a number of days for which snapshots will be rolled up into recovery points representing a one-hour period – Each successive line in the custom retention policy period allows older backups to be rolled up into less granular recovery points, retaining the ability to recover the agent state but for a longer period of time
Data Protection
28
Reviewing Retention Policy Options Text Box
Description
Specifies the primary retention period for all recovery points. Enter a number to represent the retention period and then select the time period. The default is 3 Days. Provides a more granular level of retention. It is used …and then keep one Recovery Point per hour as a building block with the primary setting to further define how long recovery points are for n [retention time period] maintained.Enter a number to represent the retention period and then select the time period. Provides a more granular level of retention. It is used …and then keep one Recovery Point per day as a building block to further define how long recovery points are maintained. Enter a number to for n [retention time period] represent the retention period and then select the time period. Provides a more granular level of retention. It is used as a building block to further define how long …and then keep one Recovery Point per recovery points are maintained. Enter a number to week for n [retention time period] represent the retention period and then select the time period. Provides a more granular level of retention. It is used as a building block to further define how long …and then keep one Recovery Point per recovery points are maintained. Enter a number to month for n [retention time period] represent the retention period and then select the time period. 29 Protectionperiod …and then keep one Recovery Point per year Enter a number to represent theData retention and then select the time period (years). for n [retention time period]
Keep all Recovery Points for n [retention time period]
Resources
Data Protection
10
Resources • Understanding Retention Policy and Rollup – Simplified – http://www.appassure.com/support/KB/understanding-retention-policyand-rollup-simplified/
• How to Enable Rollup by Applying the Core Default Retention Policy to an Agent – http://www.appassure.com/support/KB/how-to-enable-rollup-byapplying-the-core-default-retention-policy-to-an-agent/
• Customizing Retention Policy Settings for Agent Rollup – http://www.appassure.com/support/KB/customizing-retention-policysettings-for-agent-rollup/
• Understanding Retention Policy and Rollup – http://www.appassure.com/support/KB/understanding-retention-policyand-rollup/ Data Protection
31
Resources • How to Disable Rollup Using a Custom Retention Policy – http://www.appassure.com/support/KB/how-to-disable-rollup-using-acustom-retention-policy/
• Best Practices for Rollup – http://www.appassure.com/support/KB/best-practices-for-rollup/
• How to Force Rollup on an Agent Machine – http://www.appassure.com/support/KB/how-to-force-rollupon-an-agent-machine/
• How to Disable Rollup Using a Custom Retention Policy – http://www.appassure.com/support/KB/how-to-disable-rollupusing-a-custom-retention-policy/
32
Data Protection
AppAssure
Advanced Training Webinars
Granular Recoveries
File/Exchange/SQL/SharePoint
11
Introduction Exchange / SQL and Sharepoint are three of the most business-critical elements within your IT infrastructure. They are focal points for your company’s communications and data for your employees, partners and clients. Losing email or data can be a disaster, so getting it back in a hurry – all of it – is crucial
• AppAssure answers the need with advanced four-way protection – No-impact backups - Dell AppAssure 5 hot backups don’t require you to take a server offline, nor do they slow it down. – Near-zero recovery point objective (RPO) - With backups every five minutes, AppAssure delivers outstanding recovery point granularity – for up to 288 recovery points over 24 hours. – Near-zero recovery time objective (RTO) - AppAssure’s Live Recovery feature allows users to begin using Exchange in 15 minutes or less after a failure regardless of how much data is involved. For even faster recoveries, AppAssure’s powerful replication function allows you to simply turn on a preconfigured, up-todate spare VM machine if your Exchange Server goes down. – Certain recovery - AppAssure ensures reliable and transactionally consistent backups of Exchange 2003/2007 SP1 Rollup 5 through to Exchange 2010. If AppAssure says a backup is good, you can be certain it’s recoverable. Data Protection
34
How to access recovery points • Restore Tab • Protected Machines Bar • Click Protected Agent – Recovery Points Tab
• Mouse over Protected agent – Drop down menu › Recovery Points
Data Protection
35
File / Folder Recovery
Data Protection
12
How to Mount a Recovery Point • Select Protected Machine • Select Recovery point and expand • Select Mount • Mount Recovery Point Wizard – Choose Mount Location › Tip: Change to c:\MPmmddyyyy
– Select Volumes within RP to load – Chose Mount Type ›
Read – Read only permissions, no changes can be made
›
Read with previous writes- If you mount a database in write mode and make changes such as in database testing and the like, you can re mount that same database later and view the previous changes in a read only mode
›
Write- Clears any previous changes and makes the Recovery point available for manipulation again
– Create windows share › Provides end-user ability to recover
Data Protection
37
File/Folder Recoveries • Open Windows Explorer – Navigate to folder with mounted recovery point – Select Files(s) – Navigate to folder with file(s) – Copy/paste/etc.
Data Protection
38
Exchange
Data Protection
13
Exchange Support and Considerations • AppAssure 5.4 supports the following versions of the Exchange databases (all types: CCR, DAG, SCC): – Exchange 2007 – Exchange 2010 – Exchange 2013
• Uses the Microsoft VSS writer(s) • Outlook Required on Core Server – Outlook must be run one time to setup the local profile prior to any restores
• Mail Retriever Tool installed as default with Core Installation – Default location (C:\Program Files\AppRecovery\Core\ CoreService\MR) – DSM_UI.exe (create shortcut on desktop, and rename (i.e.. Mail Restore)
• AppAssure 5.4.x-All mountability, attachibility, checksum checks, and simple mode log truncation checks are disabled by default for new installations Data Protection
How to Access the Mail Restore Tool • Create Desktop Shortcut – Open Windows Explorer and navigate to: C:\Program Files\AppRecovery\Core\ CoreService\MR
– Select DSM_UI.exe and create shortcut
Data Protection
41
How to Launch Mail Restore Tool and Recover • Open Mail Restore Tool • Select Open Database – Browse to the location of the mount point and click open › Log File Path will auto fill › Database System Path will auto fill
– Select “Open”
42
Data Protection
14
Different ways to recover Exchange Data • Mail Restore Tool Displays User data files – Expand to Drill down – Results Shown on Left, Preview, Including attachments in Right panes
• Review email • Open/save attachments • Select one/many messages recover
to
Data Protection
43
How to use the Restore Wizard • Select Restore Messages • Select where to restore – Redirect to recovery folder – Redirect to a PST file – Redirect restored items to PST file(s) (separate file for each mailbox) – Restore to original location
• Profile • Mailbox • Restore Type – Restore only differences – Create duplicate entries – Overwrite if more recent 44
Data Protection
Mailbox Restore Verification and Error Handling
45
Data Protection
15
How to use Search / Advanced Search Features • Search – Search one or many conditions – And / Or – From/To – CC:/BCC: – Subject/Body – Attachment
• Advanced Search – Query Search – Customized search criteria
Data Protection
46
Mail Restore Clean Up • Close Database from Mail Restore Tool • Dismount all Mounts when complete – Protected Machine > Tools > Mounts > Dismount All › Mounts are stored in main memory
Data Protection
47
SQL
Data Protection
16
SQL Prerequisites • Install a licensed copy of Microsoft SQL on the Core – If there are multiple versions of SQL installed on different protected machines install the most recent version
Data Protection
49
How to Download and Install Local Mount Utility The Local Mount Utility provides the ability to mount an AppAssure recovery point to any system on the local network
• Download the Local Mount Utility – Core • Core > Tools > Downloads • Once Downloaded double click
• LocalMountUtility – 5.4.x • LMU Wizard is displayed • License Portal • 32 and 64 bit versions available • 64 bit version includes Mail Restore
Data Protection
Attachability/Log Truncation • SQL Attachability checks are part of the nightly jobs – By default run at 12:00 AM – Accessed from Agent > Configuration > Settings > – Not every SQL Recovery point is mounted for attachability check › Mounted Recovery Points have a “Green” Status light › Last recovery point of the day will be run for attachability check
– You can force a mount check – ONLY simple mode databases have log truncation › AppAssure will not truncate Full Mode database logs – Data in the logs not yet written to disk
51
Data Protection
17
How to load a Mount Point from Local Mount Utility
• Open the Local Mount utility Tool
• Expand the Core to locate the protected machine • Select Recovery Point to Mount and RIGHT click on Status indicator – If status isn’t green no attachability check was run, however it is still a good backup
• Select Type of mount – Read only – With previous writes – Writeable – Advanced Mount › Other than local drive › Designate location
Data Protection
52
SQL Mount Complete • Once SQL Mount Complete windows explorer will open and display the mount location along with the volumes mounted • E:\ Databases • F:\ Log files • G:\ Files
Data Protection
53
SQL Mount DB and Logs and Attach • Open SQL • Attach Database – Navigate to C:\Mounts folder – Select DB to Attach
• Click on “Attach As” and rename Mount • dbname_COPY • Click on Logs and navigate to C:\mounts and locate log folder • Select OK 54
Data Protection
18
SQL Recovery Mounted and Attached • Expand Databases • Mounted Recovery point (dbname_COPY) in the list • Continue to use DB tools to recover from the Mounted Recovery
Data Protection
55
SQL Cleanup • From SQL – Right Click on attached database_copy – Click Tasks / Detach
• From Local Mount Utility • Select Active mounts • Select Dismount All • Confirm Dismount
Data Protection
56
SharePoint
Data Protection
19
DocRetriever for SharePoint DocRetriever is a SharePoint recovery and migration tool offering administrators the ability to restore SharePoint object at the item-level eliminating the need to rely on SQL Server or other backups to restore SharePoint content
• Download latest release from www.appassure.com
– Product on download site is a trial version – To purchase a license copy please work with your AppAssure Sales Team for a customer key
• Download DocRetriever 5.4.2 User Guide
• Complete Initial Configuration – DocRetriever for Sharepoint Install Guide › http://www.appassure.com/server-backupreplication-and-recovery/docretriever-installguide/
• Ensure Systems Hardware/Operating System/Software requirements are completed Data Protection
58
Share Point Support and Considerations • Ensure you have a License for DocRetriever • You must be backing up the SQL server that houses the Share Point databases, and you must have a docretriever agent running on the sharepoint front end server • The following versions of SQL Server are currently supported by AppAssure: – Microsoft SQL Server 2005, SQL Server 2008, or SQL Server 2008 R2, 2012, 2014 – Microsoft SQL Server Express with Advanced Services 2005, 2008, or 2008 R2, 2012, 2014
• The following versions of SharePoint Server are currently supported by AppAssure: – Windows SharePoint Services 3.0 – Microsoft Office SharePoint Server 2007, 2010, 2013, 2013 SP1 Data Protection – Microsoft Office SharePoint Foundation 2010, 2013, 2013 SP1
Sharepoint
60
Data Protection
20
Mount Recovery Point from Core • Navigate from the Core – Select Sharepoint protected Machine – Select and Mount Recovery Point
Data Protection
DocRetriever for Sharepoint • Select File > Open > Recovery Source • Chose Configuration database path • Click the “+” sign button to add the logs file path • Click OK
62
Data Protection
DocRetriever for SharePoint Restore
63
Data Protection
21
Sharepoint Restore Wizard • Complete Agent Log in fields – Restore Direction – Port Number – Front-End Server
• Complete Destination fields
Data Protection
64
Sharepoint Restore Wizard • Review Restore Parameters – Duplicate actions – Container Actions – Object Types – Restore Destination – Restore Objects
65
l
Data Protection
66
Confidential
Data Protection
22
Data Integrity Checks
Data Protection
Data Integrity Checks/Nightly Jobs • All Data Integrity Checks are unchecked by default − Protected Machine Settings allows selection − Exchange Mountability occurs after each snapshot − Nightly Jobs default is 12:00am − Core > Configuration > Settings
Data Protection
68
Job Settings • Granular Access to Jobs – Modify Settings – Select by Protected machine
69
Data Protection
23
Q&A
Data Protection
Resources
Data Protection
Resources
• AppAssure Getting Started Website
– www.appassure.com/getting-started
• Dell Software Group AppAssure home page
– http://software.dell.com/products/appassure/
• Release Notes and Support Guides
– https://support.software.dell.com/appassure/release-notes-guides – Click on the Dell Logo from the AppAssure Core (Home)
• Submit and online AppAssure Support ticket
– https://support.software.dell.com/appassure/5.4.1/
• Knowledge Base Search
– https://support.software.dell.com/appassure/kb
• License Portal
– https://appassure.licenseportal.com/User/LogOn – Please email
[email protected] for all licensing questions
• Dell Techcenter – IT Administrator Community
– http://en.community.dell.com/techcenter/data-protection/
Data Protection 72
Data Protection
24
Resources - Exchange • Local Mount Utility : Exploring a Mounted Recovery Point - AppAssure • Dell AppAssure Local Mount Utility • Mounting a Recovery Point Using the Local Mount Utility - AppAssure • AppAssure 5 Local Mount Utility • Exchange Server: Granular Recovery – AppAssure Video • Powerful Microsoft Application Protection - AppAssure
Data Protection
Resources - SQL • Dell AppAssure Backup, Replication & Recovery Product Demo • • • • • • •
SQL Server: Granular Recovery - AppAssure Backup for SQL Server | Data Protection - AppAssure SQL Server Backup - AppAssure AppAssure SQL Log Truncation Support Managing SQL Attachability - AppAssure Configuring SQL Attachability Settings - AppAssure Configuring Nightly SQL Attachability Checks and Log Truncation
74
Data Protection
Resources - Sharepoint • Recovering SharePoint Objects with DocRetriever • Doc Retriever for SharePoint for AppAssure 5 User Guide • Doc Retriever Install Guide - AppAssure
75
Data Protection
25
AppAssure 5 Integrity Check Process • Block-by-block hash key verification for backups and replication; Microsoft Exchange mountability checks, log truncation, and checksum checks; and Microsoft SQL Server attachability checks. – http://www.appassure.com/support/KB/appassure-5-integrity-checkprocess-2/
76
Data Protection
26