0%

Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.

To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.

  • Learn the workload types that your organization should be backing up
  • Explore the hardware, software, and services you can use to back up your systems
  • Understand what's wrong with your current data protection system
  • Pair your backed-up workloads to the appropriate backup system
  • Learn the adjustments that will make your backups better, without wasting money

Table of Contents

  1. Foreword
  2. Preface
    1. The Work Continues
    2. Conventions Used in This Book
    3. O’Reilly Online Learning
    4. How to Contact Us
    5. Acknowledgments
  3. 1. Risks to Your Data: Why We Back Up
    1. Human Disasters
    2. Accidents
    3. Bad Code
    4. Malicious Attacks
    5. Terrorism
    6. Electronic Attacks
    7. Ransomware
    8. Internal Threats
    9. Mechanical or System Failure
    10. Power Disruptions
    11. There Is No Cloud
    12. System Failure
    13. Natural Disasters
    14. Floods
    15. Fires
    16. Earthquakes
    17. Hurricanes, Typhoons, and Cyclones
    18. Tornadoes
    19. Sinkholes
    20. Takeaways
  4. 2. Gathering and Determining Service Levels
    1. What Does Your Organization Do?
    2. Build Yourself a Framework
    3. Document Templates
    4. Review/Advisory Boards
    5. Collecting Requirements
    6. What Are RPO and RTO?
    7. Find the Subject Matter Experts
    8. Solicit Requirements
    9. Review Requirements
    10. Design and Build Your System
    11. Draw up Multiple Designs
    12. Review the Designs
    13. Select and Build the System
    14. Document and Implement the New System
    15. Defining Operational Responsibility
    16. Operations Review and Documentation
    17. Documentation Is Good
    18. Runbooks
    19. Implement the New System
    20. Takeaways
  5. 3. Backup and Archive Are Very Different
    1. Before We Get Started
    2. What Is Backup?
    3. “Copy”
    4. “Stored Separately from the Original”
    5. “For the Purposes of Restoring”
    6. What Is a Restore?
    7. How Does a Restore Work?
    8. The 3-2-1 Rule
    9. What Is an Archive?
    10. To Serve as a Reference
    11. Stored with Additional Metadata
    12. What Is a Retrieve?
    13. Protecting Backup and Archive Data
    14. Encryption
    15. Air Gaps
    16. Immutability
    17. Takeaways
  6. 4. Backup and Recovery Basics
    1. Recovery Testing
    2. Backup Levels
    3. Traditional Full Backup
    4. Traditional Incremental Backup
    5. Do Backup Levels Matter?
    6. Metrics
    7. Recovery Metrics
    8. Capacity Metrics
    9. Backup Window
    10. Backup and Recovery Success and Failure
    11. Retention
    12. Using Metrics
    13. Backup and Archive Myths
    14. Item- Versus Image-Level Backups
    15. Item-Level Backup
    16. Image-Level Backups
    17. File-Level Recovery from an Image-Level Backup
    18. Combining Image- and File-Level Backups
    19. Backup Selection Methods
    20. Selective Inclusion Versus Selective Exclusion
    21. Tag-Based and Folder-Based Inclusion
    22. Takeaways
  7. 5. Using Disk and Deduplication for Data Protection
    1. Deduplication
    2. What Can Dedupe Do?
    3. How Dedupe Works
    4. Target Deduplication
    5. Source Deduplication
    6. Target Versus Source Deduplication
    7. Hybrid Dedupe
    8. Selecting the Right Dedupe for You
    9. Using Disk in Your Backup System
    10. Disk Caching
    11. Disk-to-Disk-to-Tape (D2D2T)
    12. Disk-to-Disk-to-Disk (D2D2D)
    13. Direct-to-Cloud (D2C)
    14. Disk-to-Disk-to-Cloud (D2D2C)
    15. Recovery Concepts
    16. Image Recovery
    17. File-Level Recovery
    18. Instant Recovery
    19. Choosing a Recovery Type
    20. Takeaways
  8. 6. Traditional Data Sources
    1. Physical Servers
    2. Standard Backup
    3. Bare-Metal Backup
    4. Backing Up NAS
    5. Virtual Servers
    6. VM-Level Backups
    7. What Is VSS?
    8. Specialized Backups for Hypervisors
    9. Desktops and Laptops
    10. Laptops as a Cache
    11. Normal Desktop and Laptop Usage
    12. Desktop and Laptop Backup Options
    13. Mobile Devices
    14. Cloud Sync
    15. Physical Sync
    16. Mobile Device Backup
    17. Mobile Device Management (MDM)
    18. Takeaways
  9. 7. Protecting Databases
    1. Database Delivery Models
    2. Traditional Database Software
    3. Platform-as-a-Service
    4. Serverless Databases
    5. Database Models
    6. Consistency Models
    7. Traditional Databases Running in Your Datacenter
    8. PaaS and Serverless Databases
    9. Traditional Database Terminology
    10. Instance
    11. Database
    12. Table
    13. Index
    14. Row
    15. Attribute
    16. Data File
    17. Tablespace
    18. Partition
    19. Master File
    20. Transaction
    21. Transaction Log
    22. Backing Up Traditionally Delivered Databases
    23. Cold Backup
    24. Split Replica
    25. Hot Backup Mode
    26. Snap and Sweep
    27. Dump and Sweep
    28. Stream-to-Backup Product
    29. Transaction Log Backup
    30. Master File
    31. Backing Up PaaS and Serverless Databases
    32. Dump and Sweep
    33. Integrated Backup-as-a-Service
    34. Recovering Traditional Databases
    35. Recovering Modern Databases
    36. Takeaways
  10. 8. Modern Data Sources
    1. The Public Cloud
    2. Infrastructure-as-a-Service (IaaS)
    3. Platform-as-a-Service (PaaS)
    4. Serverless Services
    5. Software-as-a-Service (SaaS)
    6. You Need to Protect the Cloud
    7. Hybrid Cloud Configurations
    8. NFS/SMB Gateway
    9. The Cloud in a Box
    10. Docker and Kubernetes
    11. How Containers Break Backups
    12. Dockerfiles
    13. Docker Images
    14. Kubernetes etcd
    15. Persistent Volumes
    16. Databases
    17. Kubernetes: A New Path
    18. The Internet of Things (IoT)
    19. Making Backup Decisions
    20. Criticality to the Organization
    21. Consider the Source
    22. Takeaways
  11. 9. Backup and Recovery Software Methods
    1. Is Everything Backup?
    2. Backup Methods Supporting a Traditional Restore
    3. Multiplexing
    4. Traditional Full and Incremental Backups
    5. File-Level Incremental Forever
    6. Block-Level Incremental Forever
    7. Source Deduplication
    8. Methods Supporting Instant Recovery
    9. Replication
    10. Continuous Data Protection (CDP)
    11. Snapshots
    12. Near-Continuous Data Protection (Near-CDP)
    13. Copy Data Management
    14. Other Software with Instant Recovery
    15. Leveraging Backups for More
    16. Deciding on a Backup Method
    17. Does What You Have Meet Your Needs?
    18. Advantages and Disadvantages of Different Approaches
    19. Complete Solution
    20. Takeaways
  12. 10. Archive Software Methods
    1. A Deeper Dive into Archive
    2. Retrieval Versus Restore
    3. Types of Archive Systems
    4. Traditional Batch Archive
    5. Real-Time Archive
    6. HSM-Style Archive
    7. Deciding on an Archive System
    8. Do You Need One?
    9. Requirements
    10. Takeaways
  13. 11. Disaster Recovery Methods
    1. Disaster Recovery Becomes Paramount
    2. Ransomware Changed Everything
    3. An Overview of Disaster Recovery
    4. What Is in a DR Plan?
    5. A Box of Tapes Isn’t a DR Plan
    6. A Replicated Dedupe Appliance Isn’t Much Better
    7. It’s All About the RTA
    8. Building a Recovery Site
    9. Roll Your Own DR Site
    10. Recovery-Site-as-a-Service
    11. The Public Cloud Was Born for DR
    12. Keeping the DR Site Up to Date
    13. Cold, Hot, and Warm Sites
    14. Choosing Hot, Warm, or Cold
    15. Recovery Mechanisms
    16. Software or Service
    17. Commercial DR Software
    18. DR-as-a-Service
    19. All-in-One or Best of Breed?
    20. Choosing a Plan
    21. Creating a DR Runbook
    22. Runbook Goals
    23. Overview
    24. Technology Inventory
    25. Contact Information
    26. Procedures
    27. Exception Processing with Escalation
    28. Takeaways
  14. 12. Data Protection Targets
    1. Tape Drives
    2. What Tape Is Good At
    3. What Tape Is Bad At
    4. How Did This Happen?
    5. Tape Drive Technologies
    6. Optical Media
    7. Individual Disk Drives
    8. Standard Disk Arrays
    9. Object Storage
    10. Target Deduplication Appliances
    11. Virtual Tape Libraries
    12. NAS Appliances
    13. Public Cloud Storage
    14. Choosing and Using a Backup Target
    15. Optimize the Performance of What You Have
    16. Select a More Appropriate Device
    17. Takeaways
  15. 13. Commercial Data Protection Challenges
    1. A Brief History of Backup
    2. Challenges with Commercial Backup Solutions
    3. Size the Backup System
    4. Maintain Backup Server OS
    5. Maintain Backup Software
    6. Manage Multiple Vendors
    7. Separate System for DR
    8. Separate System for E-Discovery
    9. Tape-Related Challenges
    10. Disk-Related Challenges
    11. Large Up-Front Capital Purchases
    12. Overprovisioning Is Required
    13. Difficult to Scale
    14. Difficulty of Changing Backup Products
    15. Let Them Expire
    16. Use a Service
    17. Restore and Backup
    18. Takeaways
  16. 14. Traditional Data Protection Solutions
    1. Not Naming Names
    2. Traditional Backup Solutions
    3. Advantages of Traditional Backup
    4. Challenges with Traditional Backup
    5. Analysis
    6. Target Deduplication Backup Appliances
    7. Advantages of Target Dedupe
    8. Challenges with Target Dedupe
    9. Analysis
    10. Takeaways
  17. 15. Modern Data Protection Solutions
    1. Virtualization-Centric Solutions
    2. Advantages of Virtualization-Centric Solutions
    3. Challenges of Virtualization-Centric Backup
    4. Analysis
    5. Hyper-Converged Backup Appliances
    6. Advantages of Hyper-Converged Backup Appliances
    7. Challenges with HCBAs
    8. Analysis
    9. Data-Protection-as-a-Service (DPaaS)
    10. Advantages of DPaaS
    11. Challenges of DPaaS
    12. Analysis
    13. Fully Managed Service Providers
    14. Advantages of Using an MSP
    15. Challenges of Using an MSP
    16. Analysis
    17. Adapting to the Market
    18. Traditional Backup Appliances
    19. Subscription Pricing
    20. Responding to the Cloud
    21. Takeaways
  18. 16. Replacing or Upgrading Your Backup System
    1. Which Solution Is Best for You?
    2. Your Responsibilities
    3. Before You Do Anything
    4. This Is Your Backup System
    5. Consider TCO, Not Just Acquisition Cost
    6. Picking a Solution
    7. Find Any Showstoppers
    8. Prioritize Ease of Use
    9. Prioritize Scalability
    10. Prioritize Future Proofing
    11. Takeaways
  19. Index
18.217.144.32