Modern Data Protection: Ensuring Recoverability of All Modern Workloads
- Length: 370 pages
- Edition: 1
- Language: English
- Publisher: O'Reilly Media
- Publication Date: 2021-06-01
- ISBN-10: 1492094056
- ISBN-13: 9781492094050
- Sales Rank: #1479850 (See Top 100 Books)
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, andSalesforce; and persistent data created by Kubernetes and container workloads.
To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You’ll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software,and services available to protect these data sources, including the advantages and disadvantages of each approach.
- Learn the workload types that your organization should be backing up
- Explore the hardware, software, and services you can use to back up your systems
- Understand what’s wrong with your current data protection system
- Pair your backed-up workloads to the appropriate backup system
- Learn the adjustments that will make your backups better, without wasting money
Foreword Preface The Work Continues Conventions Used in This Book O’Reilly Online Learning How to Contact Us Acknowledgments 1. Risks to Your Data: Why We Back Up Human Disasters Accidents Bad Code Malicious Attacks Terrorism Electronic Attacks Ransomware Internal Threats Separation of powers Role-based administration Least privilege Multiperson authentication Mechanical or System Failure Power Disruptions There Is No Cloud System Failure Natural Disasters Floods Fires Earthquakes Hurricanes, Typhoons, and Cyclones Tornadoes Sinkholes Takeaways 2. Gathering and Determining Service Levels What Does Your Organization Do? Build Yourself a Framework Document Templates Review/Advisory Boards Collecting Requirements What Are RPO and RTO? Find the Subject Matter Experts Data creators Executives Compliance and governance Solicit Requirements Review Requirements Service-level agreements Talk about a charge-back model Data classification Wrapping up the requirements review Design and Build Your System Draw up Multiple Designs Review the Designs Select and Build the System Document and Implement the New System Defining Operational Responsibility Operations Review and Documentation Documentation Is Good Runbooks Implement the New System Takeaways 3. Backup and Archive Are Very Different Before We Get Started What Is Backup? “Copy” “Stored Separately from the Original” “For the Purposes of Restoring” What Is a Restore? How Does a Restore Work? The 3-2-1 Rule Three versions of your data On two different media “One of which is somewhere else” What Is an Archive? To Serve as a Reference Stored with Additional Metadata What Is a Retrieve? Protecting Backup and Archive Data Encryption Air Gaps Physical air gap Virtual air gap Immutability Takeaways 4. Backup and Recovery Basics Recovery Testing Backup Levels Traditional Full Backup Traditional Incremental Backup Typical incremental backup Cumulative incremental backup Incremental backup with levels Block-level incremental backup Source-side deduplication Synthetic full backups Synthetic full by copying Virtual synthetic full Incremental forever Do Backup Levels Matter? Metrics Recovery Metrics Recovery time objective (RTO) Recovery point objective (RPO) Negotiating your RPO and RTO Recovery time actual and recovery point actual Testing recoveries Capacity Metrics License/workload usage Storage capacity and usage Throughput capacity and usage Compute capacity and usage Backup Window Backup and Recovery Success and Failure Retention Using Metrics Backup and Archive Myths Item- Versus Image-Level Backups Item-Level Backup Image-Level Backups File-Level Recovery from an Image-Level Backup Combining Image- and File-Level Backups Backup Selection Methods Selective Inclusion Versus Selective Exclusion Tag-Based and Folder-Based Inclusion Takeaways 5. Using Disk and Deduplication for Data Protection Deduplication What Can Dedupe Do? How Dedupe Works Dedupe scope Do not compare dedupe ratios Chunk size matters File-level dedupe Target Deduplication The popularity of target dedupe Inline versus post-process deduplication Source Deduplication Target Versus Source Deduplication Hybrid Dedupe Selecting the Right Dedupe for You Using Disk in Your Backup System Disk Caching Disk-to-Disk-to-Tape (D2D2T) Disk-to-Disk-to-Disk (D2D2D) Direct-to-Cloud (D2C) Disk-to-Disk-to-Cloud (D2D2C) Recovery Concepts Image Recovery File-Level Recovery Direct restore Restoring with an SMB/NFS mount Restore via image mount Recovering SaaS data Instant Recovery Storage matters Use cases Choosing a Recovery Type Takeaways 6. Traditional Data Sources Physical Servers Standard Backup Bare-Metal Backup Backing Up NAS Using a proxy NDMP Snapshot replication Virtual Servers VM-Level Backups What Is VSS? Specialized Backups for Hypervisors VADP Hyper-V and VSS Snapshot-based backup Hyper-converged infrastructure (HCI) What about lesser-known hypervisors? Desktops and Laptops Laptops as a Cache Normal Desktop and Laptop Usage Desktop and Laptop Backup Options Portable hard drive backup File-level incremental backup File sync and share Source-side dedupe to a backup system or service Mobile Devices Cloud Sync Physical Sync Mobile Device Backup Mobile Device Management (MDM) Takeaways 7. Protecting Databases Database Delivery Models Traditional Database Software Platform-as-a-Service Serverless Databases Database Models Consistency Models Traditional Databases Running in Your Datacenter PaaS and Serverless Databases Traditional Database Terminology Instance Database Table Index Row Attribute Data File Tablespace Partition Master File Transaction Transaction Log Backing Up Traditionally Delivered Databases Cold Backup Split Replica Hot Backup Mode Snap and Sweep Dump and Sweep Stream-to-Backup Product Transaction Log Backup Master File Backing Up PaaS and Serverless Databases Dump and Sweep Integrated Backup-as-a-Service Test your backups 3-2-1 rule Preferred backup methods Recovering Traditional Databases Recovering Modern Databases Takeaways 8. Modern Data Sources The Public Cloud Infrastructure-as-a-Service (IaaS) Block storage in the cloud Object storage in the cloud Platform-as-a-Service (PaaS) Serverless Services Software-as-a-Service (SaaS) Salesforce Microsoft 365 Google Workspace Slack GitHub You Need to Protect the Cloud Hybrid Cloud Configurations NFS/SMB Gateway The Cloud in a Box Docker and Kubernetes How Containers Break Backups Dockerfiles Docker Images Kubernetes etcd Persistent Volumes Databases Kubernetes: A New Path The Internet of Things (IoT) Making Backup Decisions Criticality to the Organization Consider the Source Takeaways 9. Backup and Recovery Software Methods Is Everything Backup? Backup Methods Supporting a Traditional Restore Multiplexing Traditional Full and Incremental Backups File-Level Incremental Forever Block-Level Incremental Forever Source Deduplication Methods Supporting Instant Recovery Replication Synchronous replication Asynchronous replication Hybrid replication Database replication Limitations of replication Continuous Data Protection (CDP) Snapshots Copy-on-write Redirect-on-write Hold all writes Pros and cons of snapshots Near-Continuous Data Protection (Near-CDP) Copy Data Management Other Software with Instant Recovery Leveraging Backups for More Deciding on a Backup Method Does What You Have Meet Your Needs? Advantages and Disadvantages of Different Approaches Complete Solution Takeaways 10. Archive Software Methods A Deeper Dive into Archive Retrieval Versus Restore Types of Archive Systems Traditional Batch Archive Real-Time Archive HSM-Style Archive Deciding on an Archive System Do You Need One? Requirements Data format issues Storage media Other concerns Separate system or integrated? Takeaways 11. Disaster Recovery Methods Disaster Recovery Becomes Paramount Ransomware Changed Everything An Overview of Disaster Recovery What Is in a DR Plan? A Box of Tapes Isn’t a DR Plan A Replicated Dedupe Appliance Isn’t Much Better It’s All About the RTA Building a Recovery Site Roll Your Own DR Site Recovery-Site-as-a-Service The Public Cloud Was Born for DR Keeping the DR Site Up to Date Cold, Hot, and Warm Sites Choosing Hot, Warm, or Cold Recovery Mechanisms Primary data replication Primary data replication methods Replication of backups Platform format issues Choosing between these two methods Software or Service Commercial DR Software DR-as-a-Service All-in-One or Best of Breed? Choosing a Plan Creating a DR Runbook Runbook Goals Overview Technology Inventory Contact Information Procedures Exception Processing with Escalation Takeaways 12. Data Protection Targets Tape Drives What Tape Is Good At Cost Reliably writing data Long-term retention What Tape Is Bad At How Did This Happen? Tape Drive Technologies Linear Tape File System Robotic tape libraries Optical Media Individual Disk Drives Standard Disk Arrays Object Storage Target Deduplication Appliances Virtual Tape Libraries NAS Appliances Public Cloud Storage Choosing and Using a Backup Target Optimize the Performance of What You Have Performance-tuning tape Performance-tuning RAID Performance-tuning target dedupe array Select a More Appropriate Device Pick your backup software or service first Pick what works for you On-premises disk Cloud disk All tape Hybrid Takeaways 13. Commercial Data Protection Challenges A Brief History of Backup Challenges with Commercial Backup Solutions Size the Backup System Maintain Backup Server OS Maintain Backup Software Manage Multiple Vendors Separate System for DR Separate System for E-Discovery Tape-Related Challenges Tape drives are difficult to tune Tapes can be lost Manage an off-site vaulting vendor Disk-Related Challenges Disk has no air gap Bit rot Large Up-Front Capital Purchases Overprovisioning Is Required Difficult to Scale Difficulty of Changing Backup Products Let Them Expire Use a Service Restore and Backup Takeaways 14. Traditional Data Protection Solutions Not Naming Names Traditional Backup Solutions Advantages of Traditional Backup Challenges with Traditional Backup Analysis Target Deduplication Backup Appliances Advantages of Target Dedupe Challenges with Target Dedupe Analysis Takeaways 15. Modern Data Protection Solutions Virtualization-Centric Solutions Advantages of Virtualization-Centric Solutions Challenges of Virtualization-Centric Backup Analysis Hyper-Converged Backup Appliances Advantages of Hyper-Converged Backup Appliances Challenges with HCBAs Analysis Data-Protection-as-a-Service (DPaaS) Advantages of DPaaS Challenges of DPaaS Analysis Fully Managed Service Providers Advantages of Using an MSP Challenges of Using an MSP Analysis Adapting to the Market Traditional Backup Appliances Subscription Pricing Responding to the Cloud Copy backups to cloud storage On-premises software in the cloud Takeaways 16. Replacing or Upgrading Your Backup System Which Solution Is Best for You? Your Responsibilities Before You Do Anything This Is Your Backup System Understand your requirements Understand what you already have Understand what you don’t like about your solution Consider TCO, Not Just Acquisition Cost Cost of tweaking the current system Cost of upgrading or enhancing the new system Cost of a new on-premises system Cost of an on-premises system in the cloud Cost of a SaaS or MSP system Picking a Solution Find Any Showstoppers Prioritize Ease of Use Prioritize Scalability Prioritize Future Proofing Takeaways Index
Donate to keep this site alive
How to download source code?
1. Go to: https://www.oreilly.com/
2. Search the book title: Modern Data Protection: Ensuring Recoverability of All Modern Workloads
, sometime you may not get the results, please search the main title
3. Click the book title in the search results
3. Publisher resources
section, click Download Example Code
.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.