SlideShare a Scribd company logo
1 of 36
Download to read offline
Create a backup site with opensource




Fabrizio Manfredi Furuholmen
                                Beolink.org
Agenda                            Beolink.org


           Introduction (Part I)
                Disaster Recovery Plan
                Business continuity Plan


           Disaster Recovery
            Components (Part II)
                Starting point
                Software list
                Design Pattern


           Case Studies (Part III)

                2
                                            8/23/09
Disaster Statistics & Potential
Implications
                                                                          Beolink.org
  90% of businesses that lose data from a disaster are forced to close
   down within 2 years since the disaster.

  80% of businesses without a well structured recovery plan are
   forced to close down within 12 months since the flood or fire.

  43% of companies experiencing disasters never recover.

  50% of companies experiencing a computer outage will be forced to
   close down within 5 years

  Companies experiencing a computer outage lasting longer than 10
   days will never recover its full financial capacity.

  Less than 50% of all organizations in the UK have a business
   continuity plan or disaster recovery plan.

  One out of 500 data centers experience a severe disaster every
   year.



                                              3
                                                                               8/23/09
What is a Disaster Recovery Plan ?      Beolink.org


                 Disaster recovery plan (DRP)
                    Disaster recovery plan
                    consists of the precautions
                    taken so that the effects of a
                    disaster will be minimized and
                    the organization will be able to
                    either maintain or quickly
                    resume mission critical
                    functions




                        4
                                              8/23/09
Classification of Risk                                Beolink.org

 Natural disasters 
   Such as tornadoes, floods, blizzards, earthquakes and
     fire
 Accidents
 Sabotage 
 Power and energy disruptions
 Service sector failure

 Such as communications, transportation …
 Environmental disasters 

 Such as pollution and hazardous materials spills
 Cyber attacks and hacker activity

                                   5
                                                           8/23/09
BIA 
                                                   Beolink.org
  How many transactions can be lost without
   significantly impacting revenue or productivity?
  Does a majority of the businesses depend upon
   one or more mission critical applications?
  How much revenue per hour would be lost
   when these critical applications remain
   unavailable?
  Are there periods of time, for example the end
   of fiscal quarters or holiday seasons, when an
   outage would cause a greater disruption?
  How will productivity be affected if critical
   applications become unavailable?
  In the event of an unexpected outage, how will
   your partners, vendors and customers be
   affected ?
  Historically, what has been the total cost of lost
   productivity and revenue during downtime?
                                      6
                                                             8/23/09
Business Continuity Plan
           Beolink.org


Disaster recovery planning (DRP)
  is a subset of a larger process
  known as Business Continuity
  Plan.



Business Continuity Plan (BCP)

 A business continuity plan
  enables critical services or
  products to be continually
  delivered to clients.
                            7
                                         8/23/09
Technology problem ? 
                                                           Beolink.org

                                 Understand your business
      Organizational Strategy
         Business Impacy Analysis
       Risk Assessment & Control




                                      BCM Strategies
     Organization BCM Strategy
       Process Level BCM Strategy
   Resource Recovery BCM Strategy




               Developing & Implementing BCM Response
        Crisis Management 
            Business Continuity Plans
         Business Unit Plan




                                  Developing BCM Culture
            Assessing
                  Designing and Delivery
           Measuring Results




                                 Exercise, Maintain & Audit
            Exercising
                     BCM Controls
                BS 25999 compliance

                                                   8
                                                                                                8/23/09
Disaster recovery starting point
               Beolink.org




    Recovery point objective (RPO)
      Maximum data you can loose


    Recovery time objective (RTO)
      The amount of time you need to restart from
      the RPO



                              9
                                                     8/23/09
Basic Steps
                    Beolink.org

  ystem Duplication
 S
     ardware
    H
     etwork
    N
     perating System
    O
     pplication
    A

  ata Replication
 D
     ilesystem
    F
     atabase
    D
     pplication Data
    A

  witch Procedure
 S
     Activation

  ollback
 R
     ow to switch back
    H
     ow to merge data
    H
                          10
                                     8/23/09
Disaster Recovery Components
             Beolink.org

                               Elements
                                 Routing
                                 Application
                                 Data
                                 Infrastructures



                               Working mode
                                 Off-line
                                 Near on-line
                                 Online



                         11
                                                 8/23/09
Standby
                                                 Beolink.org

Type        OS        Database        Application                   Several
                                                                    minutes

Off Line
   OFF
      OFF
            OFF

Near        ON
       OFF/ON
         OFF
Online
Online 
    ON
       ON
             ON



Low Cost                                     High Cost



             Keep your DR site                                           Zero
             unreachable until switch

                                12
                                                              8/23/09
Bottlenecks
                    Beolink.org

 Latency (speed of light)
    Asynchronous operation
    MultiStream/Parallel




 Bandwidth
     Caching
     Compression (AVG 60%)
     Diffs transmission


                          13
                                     8/23/09
Build a Disaster recovery site
        Beolink.org

                 What do you need ?




                             14
                                            8/23/09
Infrastructure Software
                     Beolink.org


 Componets         Software

 Virtualization
   Vmware, XEN, KVM,
                   Cloud computing, jeos
 Firewall
         Pfsense, iptable

 System            Cfengine, puppet
 Configuration

 Snapshoot
        ZFS,LVM

 Montoring
        Nagios, Zenoss, Zabbix




                                       15
                                                  8/23/09
Data Layer
                                          Beolink.org

       Off-Line                                                      Days
       • Amanda, Bacula, tar :         Tape
         incremenetal, os dump         Backup



                                       Periodic                      Hours
                                       Replication
       Near on-line
       • rsync: compression,
         incremental
                                       Asynchronous                  Mins
                                       Replication


       On Line
       • GlousterFS, openAFS, DB
         Replication
                                       Synchronous                   Secs
                                       Replication

                                 16
                                                          8/23/09
Data Layer: Amanda
                                                  Beolink.org

Compression                  Amanda.conf:
                             inparallel 4      # maximum dumpers that will run in parallel (max 63)
  Client Fast/Best                           # this maximum can be increased at compile-time,
  Server Fast/Best                         # modifying MAX_DUMPERS in server-src/driverio.h


Multi Stream:                netusage 600 Kbps
                                  se
                                                     # maximum net bandwidth for Amanda, in KB per

  Number of parrells dump   …


Diskbase                     define dumptype comp-high {
                                global
  Holding disk                 comment "very important partitions on fast machines"
  changer file base            compress client best
                                kencrypt no

Bandwith
                                priority high
                             }
  Global
  Per interface             define interface lo0 {
                                comment "a local disk"

Encryption                   }
                                use 1000 kbps

  SSH
  KRB5                      DiskList:
                             Dbserver /dumps comp-user-tar
                             …
                                  17
                                                                                  8/23/09
Data Layer: rsync
                                                          Beolink.org
Diffs 
Only actual changed pieces of files are
transferred, rather than the whole file. 

Compression 
The tiny pieces of diffs are then compressed on
the fly, further saving you file transfer time and
reducing the load on the network.

                                                        rsync   --verbose --progress --stats 
Encryption
                                             
       --compress 
The stream from rsync is passed through the
                                                        
       --rsh=/usr/local/bin/ssh
ssh protocol to encrypt your session.
                                                           
    --recursive 
                                                        
       --times 
Latancy
                                                
       --perms 
Pipelining of file transfers to minimize latency         
       --links 
costs
                                                  
       --delete
                                                        
       --exclude "*bak" 
                                                        
       --exclude "*~” 
Simple Usage
                                           
         /www/* webserver:path_name
                                                  18
                                                                                      8/23/09
Data Layer: GlusterFS 
                        Beolink.org
                                Features
                                    Automatic Replication
                                    Aggregation
                                    Scalable Striping
                                    Distributed Locking
                                    Performance Modules
                                    Pluggable I/O Scheduler
                                    Pluggable Transport
                                    Pluggable Auth


                                Administration
                                  NFS-like Backend
                                  Self-healing
                                  Staking Vol/modules


                                And much more ..
                          19
                                                      8/23/09
Data Layer: GlusterFS
                                                          Beolink.org
Replication        volume posix 
                         volume remote1 
                                                          
           type protocol/client 
      
  Client side     
   type storage/posix 
                                                          
           option transport-type tcp 
 
  Server side     
   option directory /data/export
     
           option remote-host 
                   end-volume
                            
           storage1.example.com 
 
                                                          
           option remote-subvolume brick
Raid               volume locks 
                                                          end-volume

  Raid 1          
   type features/locks 
              volume remote2 
                   
   subvolumes posix
  Stripe                                                  …
                   end-volume
                            end-volume
  Raid 10
                   Volume brick 
                         volume replicate 
Performance        
    type performance/io-threads 
                                                          
                                                          
                                                                       type cluster/replicate
                                                                        subvolumes remote1 remote2
  I/O modules     
    option thread-count 8 
  Cache modules   
    subvolumes locks
                 end-volume
                   end-volume
                                                          volume writebehind 
                                                          
            type performance/write-behind
                   volume server 
                        
            option window-size 1MB 
                   
   type protocol/server 
             
            subvolumes replicate
                   
   option transport-type tcp 
        end-volume
                   
   option auth.addr.brick.allow * 
                   
   subvolumes brick
                  volume cache 
                                                          
           type performance/io-cache
                   end-volume
                            
           option cache-size 512MB 

                                                          
           subvolumes writebehind
                                                          end-volume
                                               20
                                                                                             8/23/09
Data Layer: Database 
             Beolink.org

 Builtin
     Mysql Master – Slave
     Mysql Multi-Master




 External
     Tungsten Replicator
     Slony-I (postgresql)




                             21
                                        8/23/09
Application Layer 
                      Beolink.org

 Data replication
    Cluster JDBC
    Group messaging (spread,
     jgroup, ..)
    Custom protocol


 Distributed Application
  Design
    Data must be Unique
    Primary key unique for all
     sites (hash, mixing key ..)




                                   22
                                              8/23/09
Application Layer: spread 
                                  Beolink.org
    
 Spread 

    functions as a unified message bus for
     distributed applications, and provides highly
     tuned application-level multicast, group
     communication, and point to point support.

  Reliable and scalable messaging and group communication
  Easy to use, deploy and maintain.
  Highly scalable from one local area network to complex wide
   area networks.
  Supports thousands of groups with different sets of
   members.
  Enables message reliability in the presence of machine
   failures, process crashes and recoveries, and network
   partitions and merges.
  Provides a range of reliability, ordering and stability
   guarantees for messages.
  .Completely distributed algorithms with no central point of
   failure.
                                       23
                                                                      8/23/09
Application Layer: Example 
         Beolink.org
Session

    Distributed file system

    Replicated Database

    AppServer Cluster




                                24
                                           8/23/09
Routing Layer
                              Beolink.org

 DNS: Bind                            Several
                                       minutes
    keep low value of TTL
    dynamic update


 MPLS
    Change MPLS configuration, keep
     the same ip configuration


 Routing Table : quagga
    OSPF/BGP announce new routing
     for your side
                                                       Seconds




                             25
                                                 8/23/09
Routing Layer: Quagga
                                   Beolink.org

 Quagga
    CISCO IOS syntax
    All routing protocol
    Device base interface

                               Quagga.conf:

                               interface eth0
                               
           ip address XXX.XXX.XXX.XXX
                               !
! Work only for !              …
                               Ospf.conf
    Autonomous System
    Large network             router ospf 
                               
           ospf router-id XXX.XXX.XXX.XX
                               
           log-adjacency-changes 
                               
           compatible rfc1583
                               
           auto-cost reference-bandwidth 10000 
                               
           network XXX.XXX.XXX.XXX/XX area …
                             26
                                                                    8/23/09
Routing Layer: Heart
               Beolink.org

Monitoring System (outside)
 Probe/check external
 Remote Invocation scripts
 Manual/Automatic



Linux HA (inside)
 Cluster definition with Quorum
  Server
 Local Scripts / Fencing script
 Manual/Automatic 
                              27
                                         8/23/09
Important Things
                             Beolink.org


      Business                        How the service
                     Which order to
       critical                         is linked to
                      do things
     Application
                          others




     Keep close
                      When to run      When to run
      disaster
                       them (2)
        them (1)
    recovery site




    Where have
      you put
    employees ? 

                              28
                                                        8/23/09
Case Studies
                  Beolink.org



                Case Studies




                      29
                                    8/23/09
Case study
                              Beolink.org

 Company type:    Heavy industry
 Location:        Single production site
 Web Farm/IT:     Inside the production site
 APPS:            Order management,
                  production control
 RPO/RTO:         2h
 DR site:         distance 400 km
 Cost:            a Lot

 Disaster Event: Flooding of the production site

                GOOD Solution ?
                         30
                                               8/23/09
Case study
                               Beolink.org

What happened ?
Perfect plan, everything OK

But…
Production restart after 6 months …

WRONG SOLUTION
  Disaster not related to Business
  Misunderstanding between BCP and DRP


IT Manager was Fired

                               31
                                               8/23/09
Base Solution: small-middle companies
   Beolink.org

 Switch by hand
     Configuration
     Restore
     Starting point


 RTO/RPO Hours
     Linear to storage
      dimension


 Synchronization
     Backup


 No more licenses
  needed
                           32
                                              8/23/09
Medium/High Solution: Enterprise
   Beolink.org

 Automatic Switch
     IP migration (one IP
      per service)
     Change Firewall role


 RTO/RPO seconds

 Synchronization
     Multi-master FS
     Database Replication
     Configuration
      Management


 Double licenses
  needed                     33
                                         8/23/09
Conclusion
                                           Beolink.org


 “Everything
                Only Business          Right RTO/
right now” is                                           Keep it Simple
                 Application
             RPO
     hard




                Are you sure
   Manual       the data is on
                                         Latency
         Bandwidth
  rollback
          the
                 filesystem ?




                                       Donʼt forget
  Periodic       Donʼt forget                            How Far Away
                                       the power of
  Testing
        your time
                            is Far Enough?
                                          rsync


                                 34
                                                            8/23/09
I look forward to meeting you…                             Beolink.org

                  XVI European AFS meeting 2009 
                      Rome: September 28-30

           Who should attend:
               Everyone interested in deploying a globally accessible file
                system
               Everyone interested in learning more about real world usage
                of Kerberos authentication in single realm and federated
                single sign-on environments
               Everyone who wants to share their knowledge and
                experience with other members of the AFS and Kerberos
                communities
               Everyone who wants to find out the latest developments
                affecting AFS and Kerberos

           More Info:
                www.openafs.it
                                 35
                                                                    8/23/09
Thank you
manfred@freemails.ch
www.beolink.org




                        Beolink.org

More Related Content

Similar to Disaster recovery

Scale-on-Scale : Part 3 of 3 - Disaster Recovery
Scale-on-Scale : Part 3 of 3 - Disaster RecoveryScale-on-Scale : Part 3 of 3 - Disaster Recovery
Scale-on-Scale : Part 3 of 3 - Disaster RecoveryScale Computing
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCSteve Meek
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Jessica Legg
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
DSS ITSEC Conference 2012 - Radware WAF
DSS ITSEC Conference 2012 - Radware WAFDSS ITSEC Conference 2012 - Radware WAF
DSS ITSEC Conference 2012 - Radware WAFAndris Soroka
 
ESG Lab Validation Report on IBM Real-time Compression
ESG Lab Validation Report on IBM Real-time CompressionESG Lab Validation Report on IBM Real-time Compression
ESG Lab Validation Report on IBM Real-time CompressionIBM India Smarter Computing
 
Fusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & AutomationFusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & Automationjegasu
 
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eS014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eTony Pearson
 
S016386 business-continuity-melbourne-v1708c
S016386 business-continuity-melbourne-v1708cS016386 business-continuity-melbourne-v1708c
S016386 business-continuity-melbourne-v1708cTony Pearson
 
Orange County Container Group Featured in Uptime Magazine
Orange County Container Group Featured in Uptime MagazineOrange County Container Group Featured in Uptime Magazine
Orange County Container Group Featured in Uptime MagazineeMaint Enterprises
 
Scalable service architectures @ VDB16
Scalable service architectures @ VDB16Scalable service architectures @ VDB16
Scalable service architectures @ VDB16Zoltán Németh
 
2013 storage prediction hds hong kong
2013 storage prediction hds hong kong2013 storage prediction hds hong kong
2013 storage prediction hds hong kongAndrew Wong
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosOK2OK
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Update Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationUpdate Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationJason Dea
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster RecoveryAmazon Web Services
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingEdureka!
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloudJason Dea
 

Similar to Disaster recovery (20)

Scale-on-Scale : Part 3 of 3 - Disaster Recovery
Scale-on-Scale : Part 3 of 3 - Disaster RecoveryScale-on-Scale : Part 3 of 3 - Disaster Recovery
Scale-on-Scale : Part 3 of 3 - Disaster Recovery
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
DSS ITSEC Conference 2012 - Radware WAF
DSS ITSEC Conference 2012 - Radware WAFDSS ITSEC Conference 2012 - Radware WAF
DSS ITSEC Conference 2012 - Radware WAF
 
ESG Lab Validation Report on IBM Real-time Compression
ESG Lab Validation Report on IBM Real-time CompressionESG Lab Validation Report on IBM Real-time Compression
ESG Lab Validation Report on IBM Real-time Compression
 
Fusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & AutomationFusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & Automation
 
S014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705eS014072 business-continuity-orlando-v1705e
S014072 business-continuity-orlando-v1705e
 
S016386 business-continuity-melbourne-v1708c
S016386 business-continuity-melbourne-v1708cS016386 business-continuity-melbourne-v1708c
S016386 business-continuity-melbourne-v1708c
 
Orange County Container Group Featured in Uptime Magazine
Orange County Container Group Featured in Uptime MagazineOrange County Container Group Featured in Uptime Magazine
Orange County Container Group Featured in Uptime Magazine
 
Scalable service architectures @ VDB16
Scalable service architectures @ VDB16Scalable service architectures @ VDB16
Scalable service architectures @ VDB16
 
2013 storage prediction hds hong kong
2013 storage prediction hds hong kong2013 storage prediction hds hong kong
2013 storage prediction hds hong kong
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Update Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationUpdate Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with Virtualization
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster Recovery
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 

More from Manfred Furuholmen (19)

Pisa
PisaPisa
Pisa
 
Samba4 Introduction
Samba4 IntroductionSamba4 Introduction
Samba4 Introduction
 
Restfs internals
Restfs internalsRestfs internals
Restfs internals
 
Introduction to message_queue
Introduction to message_queueIntroduction to message_queue
Introduction to message_queue
 
Restfs
RestfsRestfs
Restfs
 
Winbind as Identity Management Connector
Winbind as Identity Management ConnectorWinbind as Identity Management Connector
Winbind as Identity Management Connector
 
Use Distributed Filesystem as a Storage Tier
Use Distributed Filesystem as a Storage TierUse Distributed Filesystem as a Storage Tier
Use Distributed Filesystem as a Storage Tier
 
Managing OpenAFS users with OpenIDM
Managing OpenAFS users with OpenIDMManaging OpenAFS users with OpenIDM
Managing OpenAFS users with OpenIDM
 
Afs manager
Afs managerAfs manager
Afs manager
 
Pt server ng
Pt server ngPt server ng
Pt server ng
 
Best Practices to create High Load Websites
Best Practices to create High Load WebsitesBest Practices to create High Load Websites
Best Practices to create High Load Websites
 
Be lazy... make automation
Be lazy... make automationBe lazy... make automation
Be lazy... make automation
 
Inexpensive storage
Inexpensive storageInexpensive storage
Inexpensive storage
 
Samba management Console
Samba management ConsoleSamba management Console
Samba management Console
 
Link Samba to Cloud Storage
Link Samba to Cloud StorageLink Samba to Cloud Storage
Link Samba to Cloud Storage
 
Samba as a gateway to OpenAFS
Samba as a gateway to OpenAFSSamba as a gateway to OpenAFS
Samba as a gateway to OpenAFS
 
Samba distributed env
Samba distributed envSamba distributed env
Samba distributed env
 
AFS introduction
AFS introductionAFS introduction
AFS introduction
 
AFS case study
AFS case studyAFS case study
AFS case study
 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Disaster recovery

  • 1. Create a backup site with opensource Fabrizio Manfredi Furuholmen Beolink.org
  • 2. Agenda Beolink.org   Introduction (Part I)   Disaster Recovery Plan   Business continuity Plan   Disaster Recovery Components (Part II)   Starting point   Software list   Design Pattern   Case Studies (Part III) 2 8/23/09
  • 3. Disaster Statistics & Potential Implications Beolink.org   90% of businesses that lose data from a disaster are forced to close down within 2 years since the disaster.   80% of businesses without a well structured recovery plan are forced to close down within 12 months since the flood or fire.   43% of companies experiencing disasters never recover.   50% of companies experiencing a computer outage will be forced to close down within 5 years   Companies experiencing a computer outage lasting longer than 10 days will never recover its full financial capacity.   Less than 50% of all organizations in the UK have a business continuity plan or disaster recovery plan.   One out of 500 data centers experience a severe disaster every year. 3 8/23/09
  • 4. What is a Disaster Recovery Plan ? Beolink.org Disaster recovery plan (DRP) Disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized and the organization will be able to either maintain or quickly resume mission critical functions 4 8/23/09
  • 5. Classification of Risk Beolink.org  Natural disasters Such as tornadoes, floods, blizzards, earthquakes and fire  Accidents  Sabotage  Power and energy disruptions  Service sector failure Such as communications, transportation …  Environmental disasters Such as pollution and hazardous materials spills  Cyber attacks and hacker activity 5 8/23/09
  • 6. BIA Beolink.org   How many transactions can be lost without significantly impacting revenue or productivity?   Does a majority of the businesses depend upon one or more mission critical applications?   How much revenue per hour would be lost when these critical applications remain unavailable?   Are there periods of time, for example the end of fiscal quarters or holiday seasons, when an outage would cause a greater disruption?   How will productivity be affected if critical applications become unavailable?   In the event of an unexpected outage, how will your partners, vendors and customers be affected ?   Historically, what has been the total cost of lost productivity and revenue during downtime? 6 8/23/09
  • 7. Business Continuity Plan Beolink.org Disaster recovery planning (DRP) is a subset of a larger process known as Business Continuity Plan. Business Continuity Plan (BCP) A business continuity plan enables critical services or products to be continually delivered to clients. 7 8/23/09
  • 8. Technology problem ? Beolink.org Understand your business Organizational Strategy Business Impacy Analysis Risk Assessment & Control BCM Strategies Organization BCM Strategy Process Level BCM Strategy Resource Recovery BCM Strategy Developing & Implementing BCM Response Crisis Management Business Continuity Plans Business Unit Plan Developing BCM Culture Assessing Designing and Delivery Measuring Results Exercise, Maintain & Audit Exercising BCM Controls BS 25999 compliance 8 8/23/09
  • 9. Disaster recovery starting point Beolink.org  Recovery point objective (RPO) Maximum data you can loose  Recovery time objective (RTO) The amount of time you need to restart from the RPO 9 8/23/09
  • 10. Basic Steps Beolink.org   ystem Duplication S   ardware H   etwork N   perating System O   pplication A   ata Replication D   ilesystem F   atabase D   pplication Data A   witch Procedure S   Activation   ollback R   ow to switch back H   ow to merge data H 10 8/23/09
  • 11. Disaster Recovery Components Beolink.org Elements  Routing  Application  Data  Infrastructures Working mode  Off-line  Near on-line  Online 11 8/23/09
  • 12. Standby Beolink.org Type OS Database Application Several minutes Off Line OFF OFF OFF Near ON OFF/ON OFF Online Online ON ON ON Low Cost High Cost Keep your DR site Zero unreachable until switch 12 8/23/09
  • 13. Bottlenecks Beolink.org  Latency (speed of light)  Asynchronous operation  MultiStream/Parallel  Bandwidth   Caching   Compression (AVG 60%)   Diffs transmission 13 8/23/09
  • 14. Build a Disaster recovery site Beolink.org What do you need ? 14 8/23/09
  • 15. Infrastructure Software Beolink.org Componets Software Virtualization Vmware, XEN, KVM, Cloud computing, jeos Firewall Pfsense, iptable System Cfengine, puppet Configuration Snapshoot ZFS,LVM Montoring Nagios, Zenoss, Zabbix 15 8/23/09
  • 16. Data Layer Beolink.org Off-Line Days • Amanda, Bacula, tar : Tape incremenetal, os dump Backup Periodic Hours Replication Near on-line • rsync: compression, incremental Asynchronous Mins Replication On Line • GlousterFS, openAFS, DB Replication Synchronous Secs Replication 16 8/23/09
  • 17. Data Layer: Amanda Beolink.org Compression Amanda.conf: inparallel 4 # maximum dumpers that will run in parallel (max 63)   Client Fast/Best # this maximum can be increased at compile-time,   Server Fast/Best # modifying MAX_DUMPERS in server-src/driverio.h Multi Stream: netusage 600 Kbps se # maximum net bandwidth for Amanda, in KB per   Number of parrells dump … Diskbase define dumptype comp-high { global   Holding disk comment "very important partitions on fast machines"   changer file base compress client best kencrypt no Bandwith priority high }   Global   Per interface define interface lo0 { comment "a local disk" Encryption } use 1000 kbps   SSH   KRB5 DiskList: Dbserver /dumps comp-user-tar … 17 8/23/09
  • 18. Data Layer: rsync Beolink.org Diffs Only actual changed pieces of files are transferred, rather than the whole file. Compression The tiny pieces of diffs are then compressed on the fly, further saving you file transfer time and reducing the load on the network. rsync --verbose --progress --stats Encryption --compress The stream from rsync is passed through the --rsh=/usr/local/bin/ssh ssh protocol to encrypt your session. --recursive --times Latancy --perms Pipelining of file transfers to minimize latency --links costs --delete --exclude "*bak" --exclude "*~” Simple Usage /www/* webserver:path_name 18 8/23/09
  • 19. Data Layer: GlusterFS Beolink.org Features   Automatic Replication   Aggregation   Scalable Striping   Distributed Locking   Performance Modules   Pluggable I/O Scheduler   Pluggable Transport   Pluggable Auth Administration   NFS-like Backend   Self-healing   Staking Vol/modules And much more .. 19 8/23/09
  • 20. Data Layer: GlusterFS Beolink.org Replication volume posix volume remote1 type protocol/client   Client side type storage/posix option transport-type tcp   Server side option directory /data/export option remote-host end-volume storage1.example.com option remote-subvolume brick Raid volume locks end-volume   Raid 1 type features/locks volume remote2 subvolumes posix   Stripe … end-volume end-volume   Raid 10 Volume brick volume replicate Performance type performance/io-threads type cluster/replicate subvolumes remote1 remote2   I/O modules option thread-count 8   Cache modules subvolumes locks end-volume end-volume volume writebehind type performance/write-behind volume server option window-size 1MB type protocol/server subvolumes replicate option transport-type tcp end-volume option auth.addr.brick.allow * subvolumes brick volume cache type performance/io-cache end-volume option cache-size 512MB subvolumes writebehind end-volume 20 8/23/09
  • 21. Data Layer: Database Beolink.org Builtin  Mysql Master – Slave  Mysql Multi-Master External  Tungsten Replicator  Slony-I (postgresql) 21 8/23/09
  • 22. Application Layer Beolink.org  Data replication  Cluster JDBC  Group messaging (spread, jgroup, ..)  Custom protocol  Distributed Application Design  Data must be Unique  Primary key unique for all sites (hash, mixing key ..) 22 8/23/09
  • 23. Application Layer: spread Beolink.org Spread functions as a unified message bus for distributed applications, and provides highly tuned application-level multicast, group communication, and point to point support.   Reliable and scalable messaging and group communication   Easy to use, deploy and maintain.   Highly scalable from one local area network to complex wide area networks.   Supports thousands of groups with different sets of members.   Enables message reliability in the presence of machine failures, process crashes and recoveries, and network partitions and merges.   Provides a range of reliability, ordering and stability guarantees for messages.   .Completely distributed algorithms with no central point of failure. 23 8/23/09
  • 24. Application Layer: Example Beolink.org Session   Distributed file system   Replicated Database   AppServer Cluster 24 8/23/09
  • 25. Routing Layer Beolink.org  DNS: Bind Several minutes  keep low value of TTL  dynamic update  MPLS  Change MPLS configuration, keep the same ip configuration  Routing Table : quagga  OSPF/BGP announce new routing for your side Seconds 25 8/23/09
  • 26. Routing Layer: Quagga Beolink.org  Quagga  CISCO IOS syntax  All routing protocol  Device base interface Quagga.conf: interface eth0 ip address XXX.XXX.XXX.XXX ! ! Work only for ! … Ospf.conf  Autonomous System  Large network router ospf ospf router-id XXX.XXX.XXX.XX log-adjacency-changes compatible rfc1583 auto-cost reference-bandwidth 10000 network XXX.XXX.XXX.XXX/XX area … 26 8/23/09
  • 27. Routing Layer: Heart Beolink.org Monitoring System (outside)  Probe/check external  Remote Invocation scripts  Manual/Automatic Linux HA (inside)  Cluster definition with Quorum Server  Local Scripts / Fencing script  Manual/Automatic 27 8/23/09
  • 28. Important Things Beolink.org Business How the service Which order to critical is linked to do things Application others Keep close When to run When to run disaster them (2) them (1) recovery site Where have you put employees ? 28 8/23/09
  • 29. Case Studies Beolink.org Case Studies 29 8/23/09
  • 30. Case study Beolink.org Company type: Heavy industry Location: Single production site Web Farm/IT: Inside the production site APPS: Order management, production control RPO/RTO: 2h DR site: distance 400 km Cost: a Lot Disaster Event: Flooding of the production site GOOD Solution ? 30 8/23/09
  • 31. Case study Beolink.org What happened ? Perfect plan, everything OK But… Production restart after 6 months … WRONG SOLUTION   Disaster not related to Business   Misunderstanding between BCP and DRP IT Manager was Fired 31 8/23/09
  • 32. Base Solution: small-middle companies Beolink.org  Switch by hand   Configuration   Restore   Starting point  RTO/RPO Hours   Linear to storage dimension  Synchronization   Backup  No more licenses needed 32 8/23/09
  • 33. Medium/High Solution: Enterprise Beolink.org  Automatic Switch   IP migration (one IP per service)   Change Firewall role  RTO/RPO seconds  Synchronization   Multi-master FS   Database Replication   Configuration Management  Double licenses needed 33 8/23/09
  • 34. Conclusion Beolink.org “Everything Only Business Right RTO/ right now” is Keep it Simple Application RPO hard Are you sure Manual the data is on Latency Bandwidth rollback the filesystem ? Donʼt forget Periodic Donʼt forget How Far Away the power of Testing your time is Far Enough? rsync 34 8/23/09
  • 35. I look forward to meeting you… Beolink.org XVI European AFS meeting 2009 Rome: September 28-30 Who should attend:   Everyone interested in deploying a globally accessible file system   Everyone interested in learning more about real world usage of Kerberos authentication in single realm and federated single sign-on environments   Everyone who wants to share their knowledge and experience with other members of the AFS and Kerberos communities   Everyone who wants to find out the latest developments affecting AFS and Kerberos More Info: www.openafs.it 35 8/23/09