Preview only show first 10 pages with watermark. For full document please download

Appassure-data-protection-retention-policies-granular-recoveries-baremetal

   EMBED


Share

Transcript

AppAssure 5.4.2.192 Advanced Training Webinars Data Protection / Retention Policies Granular Recoveries Bare Metal Restore Agenda • Data Protection Settings • Protection Intervals • Retention policy – Basics and best practices • Granular recoveries – File / Exchange / SQL / SharePoint • Bare Metal Restore • Resources and Additional information • Q&A Data Protection Data Protection Settings • Select and customers settings 3 Data Protection 1 Protection Intervals Data Protection New Scheduling Wizard • Access from the protected machine – Scheduling button – Drop down on “settings” button • Select “Volumes” to create schedule/apply template − When using BMR, One Time Export, Virtual Standby, select all drives for consistency Data Protection 5 Creating a Schedule • Select days of the week – Add periods to the default › Can slide bar (blue) or expand/ shrink as needed › Timeline bar to select time(s) › Add Schedule for Sat/Sun • Always select Apply 6 Data Protection 2 Creating/Using Templates • Templates enable saved protection setting to be applied to protected machines • Drop down from “Apply Template” to select • Create New Template – Enter name and click “check” – Then “Apply” – Saved Templates can also be changed and saved to a new template Data Protection 7 New Tabs at the top of the core • Protect – Can be used if Agent is already installed – Can be used if Agent was installed in previous version – Can be used if no Agent Software is installed › Will start Deploy machine wizard ( install software, reboot system, protect) • Restore – Select Machines – Chose recovery point – Destination › Recover to Protected Machine › Recover to any Target using Boot CD • Export – One-Time / Continuous(virtual standby) – Creates Powered-off Virtual Machine Data Protection 8 Protect Machine Wizard Settings • Click on the Protect Tab – New Options › Keep current Settings › Default (hourly) protection › Custom Protection – Helpful when upgrading to 5.4.2.192 from 5.3.x – Choose customer for peak/offpeak and weekend scheduling – Option to delete existing Recovery Points 9 Data Protection 3 Steps to Deploy and Protect Machine Data Protection 10 Protection Intervals –Base image taken after adding machine protection › Incremental backup/snapshot after base Image › Core Default Protection interval is every 60 minutes – Modified from protect machine Tab – Min - 5 minutes / Max – 24 hours › Determine Settings Interval – Transactional servers – Daily Protection – Pause Protection – Keep all volumes checked › Consistency especially for Virtual Standby, and BMR Data Protection 11 Retention Policy Basics Data Protection 4 Introduction to AppAssure Retention Policies – The retention policy allows control of how long snapshots, also known as recovery points, of a protected machine should be retained within the repository – The more frequently an agent is backed up, the more granular the recovery point. – Whether one agent or many are backed up to a Core, they proliferate quickly in the repository – To conserve resources over time, this data is then generally rolled up to an incrementally less granular series of recovery points – Backups that fall within the retention policy are automatically merged to form new recovery points. – The retention policies are rolled up as part of the nightly jobs – Roll ups can be forced from an Agent – Eliminates the backups that are older than the retention policy Data Protection 13 Retention Policy Basics The retention policy acts as management for AppAssure recovery Points – Each recovery point represents the ability to restore the information as of the date and time stamp – Recovery points are compressed and deduplicated before they are committed – To conserve resources over time, this data is rolled up to incrementally less granular recovery points by combining backups into new recovery points that span a larger timeframe. Data Protection 14 Retention Policy settings • Retention Policy from the Core – Applies to all machines • Retention Policy from the Agent – Customized retention policy that applies only to that agent • Disparate Retention Policies – Used to establish different retention policies when replicating – Each source CORE can have a different retention policy than the Target Core – Useful for small branch offices/locations that may not require long retention policies( i.e. 3 months), and target Core is longer (i.e. 1 year) • Retention Policies are set under the configuration tab of the Core and Agent • View Jobs from the Configuration > Settings, or Configuration > Job Settings 15 Data Protection 5 Considerations for a Retention Policy Data Protection Considerations for a Retention Policy • Frequency of backups – How frequently you need to back up agent machines • Durability required for granular recovery points – How long you need to retain the data in discrete recovery points? – If your need to maintain granularity erodes quickly, this will affect how aggressively you roll up existing recovery points • Retention – Defining of up to 5 sets of rules that cause the system to “roll up” › Hour, Day, Week, Month , Year Data Protection 17 Rollup Process • Rollup occurs as part of the nightly jobs – Rules are applied designate how long that recovery point should exist before another rule applies – Defined retention policy is enforced by collapsing and eliminating dated recovery points – As data ages beyond the requirements defined in the retention policy, those recovery points are rolled up fewer, more comprehensive recovery points – This process is ongoing, trading off storage space required in the repository with granularity of your backups 18 Data Protection 6 Best Practices Data Protection Best Practices for Rollup Set the default Core retention policy for the largest number of machines –Set the default retention policy on the Core and apply to the majority of machines you want to protect –It is easier to differentiate a smaller number of protected machines that should have customized retention policies –Use custom policies for more critical machines 20 Data Protection l Best Practices for Rollup Consider compliance requirements, data type, or data source before establishing retention policy – Each organization has its own specific business rules and requirements regarding the retention of data – When defining a retention policy in your organization, ensure you consider regulations and compliance – Retention requirements may differ based on the type or source of data › Transactional data such as an Exchange Server may have a much more urgent requirement to back up in short intervals › Other data types or sources (for example, a low-traffic, seldomchanged web server) may require backups substantially less often, or may require a much lower granular retention of that data 21 Data Protection 7 Best Practices for Replication/ Cluster Rollup • Replication – Disparate Retention Policies provide primary Core(s) to maintain a different retention policy than the target core – Repository Integrity Check required the first time this is created • Rollup for clusters – You can establish rollup for clusters just as you can for individual machines – Follow the same process, but select the cluster in the Machines tab instead of an individual agent machine, and then define the appropriate retention policy 22 Data Protection l Linux Server Exchange Server 5 4 Core SQL Server Server Austin Newest RPs Disparate Retention Policies Linux Server 5 Last replicated time 3 Exchange Server 4 3,2,1 Core SQL Server Server Columbus 2 1 • • Ability to configure rollup on target core, removing unneeded RPs (recovery points). Result: different recovery point chains at target and source cores AppAssure tries to build RPs chain from newest RPs • If needed, missing RPs are added (excluding seed drive). guarantees chain integrity on target. • Now possible to fix orphaned RPs which are located below newest RPs – simply force replication with option “Fix orphans”. Data Protection 23 Best Practices for Rollup From time to time, you should monitor how long your nightly jobs take, to ensure the amount of rollup does not over take a peak period for your organization. To see how long your rollups take, follow the process below • Monitoring Rollup Time Requirements – Navigate to the AppAssure 5 Core Console and click the Machines tab, and then click the machine you want to view events › Click the Events Tab › A log of all events for current tasks and alerts appears › Scroll through the events to see the job “Rolling up ‘n’ protected machines,” where n is the number of machines protected in the Core – Note the start and end times to determine how long rollup is currently taking 24 Data Protection 8 Core Retention Policy settings for Agent Rollup The Newest Recovery Point text box displays the most recent recovery point. The oldest recovery point would be determined by the retention policy settings. Data Protection 25 Customized Retention Policy Rollup Data Protection How to Customize retention policy for Agent Rollup • Navigate to the AppAssure 5 Core Console and then click the Machines tab. • From the Machines tab, perform one of the following: o Click the hyperlink for the machine you want to modify. o Or, in the navigation pane, select the machine you want to modify. • Click the Configuration tab, and then click Retention Policy. o NOTE: To use the default retention policy configured for the Core, make sure the • Use Core default retention policy option is selected. • Select Use custom retention policy to set the customized policies. • The Custom Retention Policy screen expands to display the retention policy options 27 Data Protection 9 Custom Retention Policy Example Your organization is backing up every ten minutes, representing six recovery points per hour, or 144 recovery points in a day. At any point in that initial retention period, an agent machine can be restored to the exact state within a ten-minute threshold – Three days later it likely is less important to restore to a ten-minute period, but perhaps the organization wishes to retain one backup per hour – The first line under the primary setting, you can specify a number of days for which snapshots will be rolled up into recovery points representing a one-hour period – Each successive line in the custom retention policy period allows older backups to be rolled up into less granular recovery points, retaining the ability to recover the agent state but for a longer period of time Data Protection 28 Reviewing Retention Policy Options Text Box Description Specifies the primary retention period for all recovery points. Enter a number to represent the retention period and then select the time period. The default is 3 Days. Provides a more granular level of retention. It is used …and then keep one Recovery Point per hour as a building block with the primary setting to further define how long recovery points are for n [retention time period] maintained.Enter a number to represent the retention period and then select the time period. Provides a more granular level of retention. It is used …and then keep one Recovery Point per day as a building block to further define how long recovery points are maintained. Enter a number to for n [retention time period] represent the retention period and then select the time period. Provides a more granular level of retention. It is used as a building block to further define how long …and then keep one Recovery Point per recovery points are maintained. Enter a number to week for n [retention time period] represent the retention period and then select the time period. Provides a more granular level of retention. It is used as a building block to further define how long …and then keep one Recovery Point per recovery points are maintained. Enter a number to month for n [retention time period] represent the retention period and then select the time period. 29 Protectionperiod …and then keep one Recovery Point per year Enter a number to represent theData retention and then select the time period (years). for n [retention time period] Keep all Recovery Points for n [retention time period] Resources Data Protection 10 Resources • Understanding Retention Policy and Rollup – Simplified – http://www.appassure.com/support/KB/understanding-retention-policyand-rollup-simplified/ • How to Enable Rollup by Applying the Core Default Retention Policy to an Agent – http://www.appassure.com/support/KB/how-to-enable-rollup-byapplying-the-core-default-retention-policy-to-an-agent/ • Customizing Retention Policy Settings for Agent Rollup – http://www.appassure.com/support/KB/customizing-retention-policysettings-for-agent-rollup/ • Understanding Retention Policy and Rollup – http://www.appassure.com/support/KB/understanding-retention-policyand-rollup/ Data Protection 31 Resources • How to Disable Rollup Using a Custom Retention Policy – http://www.appassure.com/support/KB/how-to-disable-rollup-using-acustom-retention-policy/ • Best Practices for Rollup – http://www.appassure.com/support/KB/best-practices-for-rollup/ • How to Force Rollup on an Agent Machine – http://www.appassure.com/support/KB/how-to-force-rollupon-an-agent-machine/ • How to Disable Rollup Using a Custom Retention Policy – http://www.appassure.com/support/KB/how-to-disable-rollupusing-a-custom-retention-policy/ 32 Data Protection AppAssure Advanced Training Webinars Granular Recoveries File/Exchange/SQL/SharePoint 11 Introduction Exchange / SQL and Sharepoint are three of the most business-critical elements within your IT infrastructure. They are focal points for your company’s communications and data for your employees, partners and clients. Losing email or data can be a disaster, so getting it back in a hurry – all of it – is crucial • AppAssure answers the need with advanced four-way protection – No-impact backups - Dell AppAssure 5 hot backups don’t require you to take a server offline, nor do they slow it down. – Near-zero recovery point objective (RPO) - With backups every five minutes, AppAssure delivers outstanding recovery point granularity – for up to 288 recovery points over 24 hours. – Near-zero recovery time objective (RTO) - AppAssure’s Live Recovery feature allows users to begin using Exchange in 15 minutes or less after a failure regardless of how much data is involved. For even faster recoveries, AppAssure’s powerful replication function allows you to simply turn on a preconfigured, up-todate spare VM machine if your Exchange Server goes down. – Certain recovery - AppAssure ensures reliable and transactionally consistent backups of Exchange 2003/2007 SP1 Rollup 5 through to Exchange 2010. If AppAssure says a backup is good, you can be certain it’s recoverable. Data Protection 34 How to access recovery points • Restore Tab • Protected Machines Bar • Click Protected Agent – Recovery Points Tab • Mouse over Protected agent – Drop down menu › Recovery Points Data Protection 35 File / Folder Recovery Data Protection 12 How to Mount a Recovery Point • Select Protected Machine • Select Recovery point and expand • Select Mount • Mount Recovery Point Wizard – Choose Mount Location › Tip: Change to c:\MPmmddyyyy – Select Volumes within RP to load – Chose Mount Type › Read – Read only permissions, no changes can be made › Read with previous writes- If you mount a database in write mode and make changes such as in database testing and the like, you can re mount that same database later and view the previous changes in a read only mode › Write- Clears any previous changes and makes the Recovery point available for manipulation again – Create windows share › Provides end-user ability to recover Data Protection 37 File/Folder Recoveries • Open Windows Explorer – Navigate to folder with mounted recovery point – Select Files(s) – Navigate to folder with file(s) – Copy/paste/etc. Data Protection 38 Exchange Data Protection 13 Exchange Support and Considerations • AppAssure 5.4 supports the following versions of the Exchange databases (all types: CCR, DAG, SCC): – Exchange 2007 – Exchange 2010 – Exchange 2013 • Uses the Microsoft VSS writer(s) • Outlook Required on Core Server – Outlook must be run one time to setup the local profile prior to any restores • Mail Retriever Tool installed as default with Core Installation – Default location (C:\Program Files\AppRecovery\Core\ CoreService\MR) – DSM_UI.exe (create shortcut on desktop, and rename (i.e.. Mail Restore) • AppAssure 5.4.x-All mountability, attachibility, checksum checks, and simple mode log truncation checks are disabled by default for new installations Data Protection How to Access the Mail Restore Tool • Create Desktop Shortcut – Open Windows Explorer and navigate to: C:\Program Files\AppRecovery\Core\ CoreService\MR – Select DSM_UI.exe and create shortcut Data Protection 41 How to Launch Mail Restore Tool and Recover • Open Mail Restore Tool • Select Open Database – Browse to the location of the mount point and click open › Log File Path will auto fill › Database System Path will auto fill – Select “Open” 42 Data Protection 14 Different ways to recover Exchange Data • Mail Restore Tool Displays User data files – Expand to Drill down – Results Shown on Left, Preview, Including attachments in Right panes • Review email • Open/save attachments • Select one/many messages recover to Data Protection 43 How to use the Restore Wizard • Select Restore Messages • Select where to restore – Redirect to recovery folder – Redirect to a PST file – Redirect restored items to PST file(s) (separate file for each mailbox) – Restore to original location • Profile • Mailbox • Restore Type – Restore only differences – Create duplicate entries – Overwrite if more recent 44 Data Protection Mailbox Restore Verification and Error Handling 45 Data Protection 15 How to use Search / Advanced Search Features • Search – Search one or many conditions – And / Or – From/To – CC:/BCC: – Subject/Body – Attachment • Advanced Search – Query Search – Customized search criteria Data Protection 46 Mail Restore Clean Up • Close Database from Mail Restore Tool • Dismount all Mounts when complete – Protected Machine > Tools > Mounts > Dismount All › Mounts are stored in main memory Data Protection 47 SQL Data Protection 16 SQL Prerequisites • Install a licensed copy of Microsoft SQL on the Core – If there are multiple versions of SQL installed on different protected machines install the most recent version Data Protection 49 How to Download and Install Local Mount Utility The Local Mount Utility provides the ability to mount an AppAssure recovery point to any system on the local network • Download the Local Mount Utility – Core • Core > Tools > Downloads • Once Downloaded double click • LocalMountUtility – 5.4.x • LMU Wizard is displayed • License Portal • 32 and 64 bit versions available • 64 bit version includes Mail Restore Data Protection Attachability/Log Truncation • SQL Attachability checks are part of the nightly jobs – By default run at 12:00 AM – Accessed from Agent > Configuration > Settings > – Not every SQL Recovery point is mounted for attachability check › Mounted Recovery Points have a “Green” Status light › Last recovery point of the day will be run for attachability check – You can force a mount check – ONLY simple mode databases have log truncation › AppAssure will not truncate Full Mode database logs – Data in the logs not yet written to disk 51 Data Protection 17 How to load a Mount Point from Local Mount Utility • Open the Local Mount utility Tool • Expand the Core to locate the protected machine • Select Recovery Point to Mount and RIGHT click on Status indicator – If status isn’t green no attachability check was run, however it is still a good backup • Select Type of mount – Read only – With previous writes – Writeable – Advanced Mount › Other than local drive › Designate location Data Protection 52 SQL Mount Complete • Once SQL Mount Complete windows explorer will open and display the mount location along with the volumes mounted • E:\ Databases • F:\ Log files • G:\ Files Data Protection 53 SQL Mount DB and Logs and Attach • Open SQL • Attach Database – Navigate to C:\Mounts folder – Select DB to Attach • Click on “Attach As” and rename Mount • dbname_COPY • Click on Logs and navigate to C:\mounts and locate log folder • Select OK 54 Data Protection 18 SQL Recovery Mounted and Attached • Expand Databases • Mounted Recovery point (dbname_COPY) in the list • Continue to use DB tools to recover from the Mounted Recovery Data Protection 55 SQL Cleanup • From SQL – Right Click on attached database_copy – Click Tasks / Detach • From Local Mount Utility • Select Active mounts • Select Dismount All • Confirm Dismount Data Protection 56 SharePoint Data Protection 19 DocRetriever for SharePoint DocRetriever is a SharePoint recovery and migration tool offering administrators the ability to restore SharePoint object at the item-level eliminating the need to rely on SQL Server or other backups to restore SharePoint content • Download latest release from www.appassure.com – Product on download site is a trial version – To purchase a license copy please work with your AppAssure Sales Team for a customer key • Download DocRetriever 5.4.2 User Guide • Complete Initial Configuration – DocRetriever for Sharepoint Install Guide › http://www.appassure.com/server-backupreplication-and-recovery/docretriever-installguide/ • Ensure Systems Hardware/Operating System/Software requirements are completed Data Protection 58 Share Point Support and Considerations • Ensure you have a License for DocRetriever • You must be backing up the SQL server that houses the Share Point databases, and you must have a docretriever agent running on the sharepoint front end server • The following versions of SQL Server are currently supported by AppAssure: – Microsoft SQL Server 2005, SQL Server 2008, or SQL Server 2008 R2, 2012, 2014 – Microsoft SQL Server Express with Advanced Services 2005, 2008, or 2008 R2, 2012, 2014 • The following versions of SharePoint Server are currently supported by AppAssure: – Windows SharePoint Services 3.0 – Microsoft Office SharePoint Server 2007, 2010, 2013, 2013 SP1 Data Protection – Microsoft Office SharePoint Foundation 2010, 2013, 2013 SP1 Sharepoint 60 Data Protection 20 Mount Recovery Point from Core • Navigate from the Core – Select Sharepoint protected Machine – Select and Mount Recovery Point Data Protection DocRetriever for Sharepoint • Select File > Open > Recovery Source • Chose Configuration database path • Click the “+” sign button to add the logs file path • Click OK 62 Data Protection DocRetriever for SharePoint Restore 63 Data Protection 21 Sharepoint Restore Wizard • Complete Agent Log in fields – Restore Direction – Port Number – Front-End Server • Complete Destination fields Data Protection 64 Sharepoint Restore Wizard • Review Restore Parameters – Duplicate actions – Container Actions – Object Types – Restore Destination – Restore Objects 65 l Data Protection 66 Confidential Data Protection 22 Data Integrity Checks Data Protection Data Integrity Checks/Nightly Jobs • All Data Integrity Checks are unchecked by default − Protected Machine Settings allows selection − Exchange Mountability occurs after each snapshot − Nightly Jobs default is 12:00am − Core > Configuration > Settings Data Protection 68 Job Settings • Granular Access to Jobs – Modify Settings – Select by Protected machine 69 Data Protection 23 Q&A Data Protection Resources Data Protection Resources • AppAssure Getting Started Website – www.appassure.com/getting-started • Dell Software Group AppAssure home page – http://software.dell.com/products/appassure/ • Release Notes and Support Guides – https://support.software.dell.com/appassure/release-notes-guides – Click on the Dell Logo from the AppAssure Core (Home) • Submit and online AppAssure Support ticket – https://support.software.dell.com/appassure/5.4.1/ • Knowledge Base Search – https://support.software.dell.com/appassure/kb • License Portal – https://appassure.licenseportal.com/User/LogOn – Please email [email protected] for all licensing questions • Dell Techcenter – IT Administrator Community – http://en.community.dell.com/techcenter/data-protection/ Data Protection 72 Data Protection 24 Resources - Exchange • Local Mount Utility : Exploring a Mounted Recovery Point - AppAssure • Dell AppAssure Local Mount Utility • Mounting a Recovery Point Using the Local Mount Utility - AppAssure • AppAssure 5 Local Mount Utility • Exchange Server: Granular Recovery – AppAssure Video • Powerful Microsoft Application Protection - AppAssure Data Protection Resources - SQL • Dell AppAssure Backup, Replication & Recovery Product Demo • • • • • • • SQL Server: Granular Recovery - AppAssure Backup for SQL Server | Data Protection - AppAssure SQL Server Backup - AppAssure AppAssure SQL Log Truncation Support Managing SQL Attachability - AppAssure Configuring SQL Attachability Settings - AppAssure Configuring Nightly SQL Attachability Checks and Log Truncation 74 Data Protection Resources - Sharepoint • Recovering SharePoint Objects with DocRetriever • Doc Retriever for SharePoint for AppAssure 5 User Guide • Doc Retriever Install Guide - AppAssure 75 Data Protection 25 AppAssure 5 Integrity Check Process • Block-by-block hash key verification for backups and replication; Microsoft Exchange mountability checks, log truncation, and checksum checks; and Microsoft SQL Server attachability checks. – http://www.appassure.com/support/KB/appassure-5-integrity-checkprocess-2/ 76 Data Protection 26