Disaster recovery and Business continuance - Have a plan of attack ...

13
1 IBM Software Group 10 September 2003 | IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement © 2002 IBM Corporation Have a Plan of ATTACK Not a panic attack IBM Software Group | Tivoli software Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation Abstract This session will show the difference between Business continuance and Disaster recovery and how both can be achieved by using the different levels of protection. The first half of this session will deal with disaster recover and business continuance from a hardware and software vendor agnostic way. The second half will show how IBM/Tivoli can address the levels of protection. To wrap up we will cover some resources you have available to you with the IBM Tivoli Hardware and software.

Transcript of Disaster recovery and Business continuance - Have a plan of attack ...

Page 1: Disaster recovery and Business continuance - Have a plan of attack ...

1

IBM Software Group

10 September 2003 | IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

© 2002 IBM Corporation

Have a Plan of ATTACK

Not a panic attack

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Abstract

This session will show the difference between Business continuance and Disaster recovery and how both can be achieved by using the different levels of protection. The first half of this session will deal with disaster recover and business continuance from a hardware and software vendor agnostic way. The second half will show how IBM/Tivoli can address the levels of protection. To wrap up we will cover some resources you have available to you with the IBM Tivoli Hardware and software.

Page 2: Disaster recovery and Business continuance - Have a plan of attack ...

2

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

AgendaDefinitions

– Disaster recovery

– Business continuance

– Levels of recovery

– Levels of data

Planning– Discover you data

– Rank your data

– SLA based Recover tiers

Putting it all together

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

DefinitionsWhat is disaster recovery?

–Disaster recovery is the process of recovering an environment after a major failure or disaster to the point at which business can be conducted

What is Business continuance?

–Business continuance is the act of recovering your environment while still being open for business. Little to zero downtime to affect the business transactions.

Page 3: Disaster recovery and Business continuance - Have a plan of attack ...

3

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

6

Tiers5 and 6

Tiers 3 and 4

Tiers 1 and 2

M ore costly

Faster Recovery

S HAR E 7 8 R e c o ve r y Tie r s

Business Recovery Options

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 0 - No offsite data

Time to recover is unpredictable - may be never

Tiers of Recovery

Standard data backup process, NOT DRM

Tier 0 - Nothing

Page 4: Disaster recovery and Business continuance - Have a plan of attack ...

4

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 1 - Pickup truck access method (PTAM)

Daily

Typically 1 week or more to recover

Tiers of Recovery

MUST have a written plan to be DRM, otherwise this is just an archive

Tier 1- Vaulting only

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 2 -PTAM + Hot site

Typically more than 1 day to recover

Daily at Recovery Time

Tiers of Recovery

Available using TSM/DRM today

Tier 2 – Vaulting to Hotsite

Page 5: Disaster recovery and Business continuance - Have a plan of attack ...

5

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 3 - Electronic vaulting

Typically 1 day to recover

Daily at Recovery Time

Daily

Tiers of Recovery

Fully integrated/automated with TSM/DRM

Tier 3 – Electronic Vaulting

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 4 - Active secondary site

Typically up to 1 day to recover

at Recovery Time

High Bandwidth connections

Daily

Tiers of Recovery

Available using TSM/DRM and high availability products

Tier 4 - Electronic Vaulting to Hotsite

Page 6: Disaster recovery and Business continuance - Have a plan of attack ...

6

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 5 - Two site two phase commit

Typically less than 12 hours to recover

High Bandwidth connections

Tiers of Recovery

Two phase commit is standard in TSM data movement transactions

Tier 5 - Hardware + TSM

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tier 6 - Zero data loss

Typically a few m inutes to recover

High Bandw idth connections

Data Sharing

Advanced Systems

o upled C

T iers of Recovery

Available using TSM/DRM and high availability products

Tier 6 – Hardware + TSM

Page 7: Disaster recovery and Business continuance - Have a plan of attack ...

7

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Successful Disaster Recovery

A Documented Process for RecoveryUpdated and exercised regularly

A system environment in which to recoverHotsite; dedicated equipment, combinationIncluding a network environment

A protected repository for informationSystem, database, control, synchronization

Accurate, available, trusted data updatesDatabase software facilities play a key role

Skilled, experienced people to perform recovery

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Underlined items part of TSM/DRM

Recovery plan

•Mission Statements •Disaster Definition •Team Responsibilities•Contact Information •Critical Documentation •Unique Procedures•Media Plan •Recovery Site Inventory •Backup/Recovery Process •Implementation Plan •Test Plan •Maintenance Plan •Relocation/Migration Plan

Dynamic recovery plan

The Recovery plan must have the following

Page 8: Disaster recovery and Business continuance - Have a plan of attack ...

8

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Planning

The key to any successful recovery is planning you must:

–Be prepared by know exactly what is on each computer and who owns the data.

–Be aware of what type of data you are restoring.

–Be secure that your data can be retrieved from backup media

–Be educated on what exactly you must do to restore the data

–Be able to verify the restore

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Before your backup

Know your data

Page 9: Disaster recovery and Business continuance - Have a plan of attack ...

9

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Why protect, store, and pay for……data that isn’t needed, used, or business-critical?

Remaining 10% capacity

Valid Data

Non Business Files

Duplicate data

Stale Data

Trash data, such as log files, dump files, temporary files

Protect this.

Archive this. Often

Clean this. Often

Delete this.

Delete this.

Get more of this.

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Classify your data

Valid Data

Level 1 – Must have

Level 2 –Need to have

Level 3 – Should have

Level 4 – Don’t need

Important for backup and restore

Page 10: Disaster recovery and Business continuance - Have a plan of attack ...

10

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

How much data protection is enough for each of your computers?

15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Days

Tier 4 - Batch/Online database shadowing and journaling, repetitive PiT copies, fuzzy copy disk mirroring, TSM-DRM

Tier 3 - Electronic Vaulting, TSM

Tier 1 - PTAM*

Tier 2 - PTAM, Hot Site, TSMPoint-in-Time Backup

Active Secondary Site

Dedicated Remote Hot Site

Cos

t

Tier 7 - Near zero or zero Data Loss: Highly automated takeover on a complex wide or business-wide basis, using remote disk mirroring & data sharing

Tier 6 - Near zero or zero Data Loss remote disk mirroring helping with data integrity and data consistency

Tier 5 - software two site, two phase commit (transaction integrity); or repetitive PiT copies with small data loss

MissionCriticalApplications

MostlyCriticalApplications

Non-CriticalApplications

Typically

< 4 hrs to recover

4-8 hours to recover

< 12 hours to recover

Up to 1 day to recover

1 day to recover

> 1 day to recover

1 week or more to recover

IBM Software Group

10 September 2003 | IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

© 2002 IBM Corporation

How IBM can get you there!

Page 11: Disaster recovery and Business continuance - Have a plan of attack ...

11

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tivoli Storage ManagerEnsures application availability by protecting data

Simplifies storage administration

Improves ROI through efficient use of storage media

Provides backup and restore; archive and retrieval; space management; disaster recovery; autonomic storage management

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tivoli Storage Resource Manager

Monitor storage resources to ensure application availability through policy-based automation

Optimize storage capacity utilization

Create and manage with storage policies

Page 12: Disaster recovery and Business continuance - Have a plan of attack ...

12

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

Tivoli SAN Manager

Visualize SAN resources just as you visualize network resources

Automatically detect SAN composition

Detect errors and isolate faults within the SAN

IBM Software Group | Tivoli software

Intelligent Management Software for an on demand world | IBM Internal Use Only | 9/10/2003 © 2002 IBM Corporation

IBM Tivoli Storage Solutions in ActionServer & Storage recovery

Stage 1: Planning

Stage 3: Recovery • TSM: Backup, archive and restore / recovery

• SAN Mgr: Identify and troubleshoot new environment (RCA)

• SRM: Monitor storage, correct problems, forecast needs

Stage 2: Steady State • SAN Mgr: Monitor SAN, avoid / fix problems

• TSM: Move stale data, backup systems

• SRM: Track how the changes are effecting the environment

• SAN Mgr: Identify bottleneck and single point of failure

• TSM: Backup applications & critical data

• SRM: Analyze storage, identify critical / non-critical data

Page 13: Disaster recovery and Business continuance - Have a plan of attack ...

13

IBM Software Group

10 September 2003 | IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

© 2002 IBM Corporation

Thank you

Be aware of what type of data you are restoring