pro_data_backup_and_recovery.pdf

(22221 KB) Pobierz
Pro Data Backup and
Recovery
■■■
Steven Nelson
www.it-ebooks.info
Pro Data Backup and Recovery
Copyright © 2011 by Steven Nelson
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage or retrieval
system, without the prior written permission of the copyright owner and the publisher.
ISBN-13 (pbk): 978-1-4302-2662-8
ISBN-13 (electronic): 978-1-4302-2663-5
Printed and bound in the United States of America (POD)
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol
with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only
in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of
the trademark.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are
not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject
to proprietary rights.
Publisher and President: Paul Manning
Lead Editors: Frank Pohlmann and Michelle Lowman
Technical Reviewer: Russell Brown
Editorial Board: Steve Anglin, Mark Beckner, Ewan Buckingham, Gary Cornell, Jonathan Gennick,
Jonathan Hassell, Michelle Lowman, Matthew Moodie, Jeff Olson, Jeffrey Pepper, Frank
Pohlmann, Douglas Pundick, Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh
Coordinating Editor: Mary Tobin
Copy Editor: Nancy Sixsmith
Compositor: MacPS, LLC
Indexer: Carol Burbo
Artist: April Milne
Cover Designer: Anna Ishchenko
Distributed to the book trade worldwide by Springer Science+Business Media, LLC., 233 Spring
Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax 201-348-4505, e-mail
orders-ny@springer-sbm.com,
or visit
www.springeronline.com.
For information on translations, please e-mail
rights@apress.com,
or visit
www.apress.com.
Apress and friends of ED books may be purchased in bulk for academic, corporate, or promotional use.
eBook versions and licenses are also available for most titles. For more information, reference our
Special Bulk Sales–eBook Licensing web page at
www.apress.com/info/bulksales.
The information in this book is distributed on an
“as
is” basis, without warranty. Although every
precaution has been taken in the preparation of this work, neither the author(s) nor Apress shall have
any liability to any person or entity with respect to any loss or damage caused or alleged to be caused
directly or indirectly by the information contained in this work.
www.it-ebooks.info
Contents
Contents at a Glance ................................................................................................. iv
About the Author ....................................................................................................... xi
About the Technical Reviewer .................................................................................. xii
Acknowledgments ................................................................................................... xiIi
■Chapter
1: Introduction to Backup and Recovery ................................................... 1
Who Should Read this Book? .............................................................................................1
Backup and Recovery Concepts.........................................................................................2
Backups .................................................................................................................................................... 2
Archives .................................................................................................................................................... 9
Service and Recovery Objectives: Definitions ......................................................................................... 13
Summary ..........................................................................................................................16
■Chapter
2: Backup Software ................................................................................. 17
Software: CommVault Simpana .......................................................................................17
History and Background .......................................................................................................................... 17
Terminology ............................................................................................................................................ 17
Symantec NetBackup .......................................................................................................28
History and Background .......................................................................................................................... 28
NetBackup Master Servers ..................................................................................................................... 29
Media Servers ......................................................................................................................................... 32
Clients ..................................................................................................................................................... 32
Data Flow within the NetBackup Environments ...................................................................................... 33
Summary ..........................................................................................................................35
v
www.it-ebooks.info
CONTENTS
■Chapter
3: Physical Backup Media ....................................................................... 37
Tape .................................................................................................................................37
Digital Linear Tape (DLT) ......................................................................................................................... 38
Linear Tape Open (LTO) ........................................................................................................................... 38
Sun/StorageTek T10000 (T10k) .............................................................................................................. 38
Tape Storage Characteristics .................................................................................................................. 38
Disk ..................................................................................................................................50
RAID 10 ................................................................................................................................................... 50
RAID 5 ..................................................................................................................................................... 51
RAID 6 ..................................................................................................................................................... 52
RAID Implementation and Disk Performance .......................................................................................... 52
Network Attached Storage (NAS) ............................................................................................................ 59
Summary ..........................................................................................................................65
■Chapter
4: Virtual Backup Media .......................................................................... 67
Virtual Tape Libraries .......................................................................................................67
VTL Types ................................................................................................................................................ 74
Virtual Tape Allocation Models ................................................................................................................ 77
Why VTL? ................................................................................................................................................ 78
Other Virtualized Media and a Look Ahead ............................................................................................. 85
■Chapter
5: New Media Technologies ..................................................................... 87
Deduplication ...................................................................................................................87
Fixed-Block Deduplication ...................................................................................................................... 92
Variable-Block Deduplication .................................................................................................................. 93
Data Type Limitations: Media, Mystery, and Mother Nature ................................................................... 93
Deduplication Types and Terms .............................................................................................................. 94
Continuous Data Protection/Remote Replication .................................................................................. 105
Summary ........................................................................................................................110
■Chapter
6: Software Architectures—CommVault ............................................... 111
General Configuration ....................................................................................................111
Disk and MagLib types .......................................................................................................................... 111
vi
www.it-ebooks.info
CONTENTS
Disk Writers........................................................................................................................................... 112
Multiplexing .......................................................................................................................................... 113
Fill/Spill versus Spill/Fill ........................................................................................................................ 114
Storage Policies .................................................................................................................................... 115
Data Interface Pairs .............................................................................................................................. 116
CommCell with Single Target .........................................................................................116
CommCell with Single MediaAgent ................................................................................116
Advanced Storage Connectivity ............................................................................................................ 121
CommCell with Multiple MediaAgents ...........................................................................124
Network Resources ............................................................................................................................... 125
Storage Resources ................................................................................................................................ 130
Multiple CommCells .......................................................................................................136
Summary ........................................................................................................................138
■Chapter
7: Software Architectures—NetBackup ................................................ 139
General Configuration ....................................................................................................139
Multiplexing/Multistreaming ................................................................................................................. 140
Inline Deduplication (Twinning)............................................................................................................. 140
Buffer Tuning Parameters ..................................................................................................................... 142
SIZE_DATA_BUFFERS/NUMBER_DATA_BUFFERS ................................................................................. 142
NET_BUFFER_SZ ................................................................................................................................... 143
Creating Secondary Copies (Vault/bpduplicate) .................................................................................... 143
Generic Configurations...................................................................................................144
NetBackup Master with a Single Target ............................................................................................... 144
NetBackup Master with a Single Media Server .................................................................................... 144
NetBackup Master with multiple Media Servers................................................................................... 151
Multiple Storage Domains ..............................................................................................166
Summary ........................................................................................................................168
■Chapter
8: Application Backup Strategies .......................................................... 169
General Strategies .........................................................................................................169
vii
www.it-ebooks.info
Zgłoś jeśli naruszono regulamin