Protecting exchange servers with dpm 2010 son vu
-
Upload
vncson -
Category
Technology
-
view
1.804 -
download
0
description
Transcript of Protecting exchange servers with dpm 2010 son vu
Protecting Exchange Servers with DPM 2010
Vu Nguyen Cao SonEPG Technical [email protected] www.CaoSonBlog.com
Agenda
Fast overview of DPM 2010How does data protection REALLY workExchangeQuestions and Answers
Data Protection Manager
Online Snapshots (up to 512)
Disk-based Recovery
Active Directory®
System State
Up to Every 15 minutes
Tape-based Backup
Disaster Recoverywith offsite replication & tape
Data Protection Manager
file services
Data Protection Manager
Online Snapshots (up to 512)
Disk-based Recovery
Active Directory®
System State
Up to Every 15 minutes
Tape-based Backup
file services
MirroredData Center
Data CenterData available for recovery
Iron Mountain Data Center
www.microsoft.com/DPM/cloud
DPM 2010 – Windows PlatformsWindows Server® 2008 R2Windows Server® 2008Windows Storage Server 2008
Windows Server® 2003 R2Windows Server® 2003 Service Pack 1+
Windows Storage Server 2003 R2Windows Unified Data Storage Server
Windows® 7Windows Vista® Business or higherWindows® XP Professional Service Pack 2+
DPM 2010 – Application PlatformsMicrosoft® SQL Server™ 2008Microsoft® SQL Server™ 2005Microsoft® SQL Server™ 2000 Service Pack 4+
SAP® running on Microsoft SQL Server
Microsoft® Exchange Server 2010 – including DAG
Microsoft® Exchange Server 2007 – including LCR, CCR, and SCR
Microsoft® Exchange Server 2003 Service Pack 2+
Microsoft® Office SharePoint® Server 2010 Microsoft® Office SharePoint® Server 2007 Microsoft® Office SharePoint® Portal Server 2003
Windows® SharePoint® Foundation Services 4.0 Windows® SharePoint® Services version 3.0 Windows® SharePoint® Services version 2.0
Microsoft® Dynamics® AX 2009
Windows® Essential Business Server 2008Windows® Small Business Server 2008
Enterprise DPML – “Application Agent” – per protected server
Unified support of Microsoft applications SQL, Exchange, SharePoint, & Virtualization – and files Protect DPM 2 DPM 4 DR – disaster recoveryBare Metal Recovery
Standard DPML = “File agent” per protected Windows Server
No additional “Open File” or add-on modules
file shares and directories
Client DPML“Desktop agent” XP Pro & Vista business
Up to Every 15 minutes
DPM 2010with integrated Disk & Tape
Windows Server 2008 or 2008 R2 x64
DPM Server
Active Directory®
System State
Pricing guidance posted on microsoft.com/DPM
file shares and directories
DPM 2010 – Express FullUsing the native application VSS writer
How DPM Protects Data
DPM Identifies Blocks That Compose Files
E:\ + ContentDB1.mdf + ContentDB1.ldf
F:\ + ContentDB2.mdf + ContentDB2.ldf
DPM filter creates a volume map to monitor which disk blocks contain portions of the files to be protected
DPM Filter – Volume Map
Start of Synchronization Window
Time = 10:00
DPM Filter – Volume Map
VOLUME (actual disk blocks)
1 2 3 4
Time = 10:01
File Write
Changed blocks noted
7
1 2 3 4
5
6
8 9
Time = 10:06
File Write
11 7
1 2 3 4
12
5
6
15
8 9
10 13 14
Time = 10:18
File Write
11 7
1 16 17 18 19 4
12
5
6
15
8 9
10 13 14
Time = 10:26
File Write
Time = 10:30 (At least weekly… usually daily … up to every 30 minutes)
1. VSS Snapshot taken on production volume to ensure consistent data
DPM Filter – Volume Map
Start of Synchronization Window
VOLUME (actual disk blocks) DPM Synchronization
11 7
1 16 17 18 19 4
12
5
6
15
8 9
10 13 14
Time = 10:30:01
1. VSS Snapshot taken on production volume to ensure consistent data
2. Cache of changed blocks is sent to DPM server
Block Order 111215101314 75689 14 16171819
DPM Filter – Volume Map
Start of Synchronization Window
VOLUME (actual disk blocks) DPM Synchronization
1. VSS Snapshot taken on production volume to ensure consistent data
2. Cache of changed blocks is sent to DPM server
Block Order
Time = 10:30:02
Transmit changed blocks from 10:00-10:30 to DPM server Data integrity preserved, since volume snapped
1912151617 210111314 38 4567
1 2
3 4 5 6 7 8
9
10
11
12
13 14
15 16 17
1. VSS Snapshot taken on production volume to ensure consistent data
2. Cache of changed blocks is sent to DPM server, while live disk continues.
1 2
3 4 5 6 7 8
9
10 18 19 20
11
21 12
13 22 14
15 16 17
Time = 10:30:03
And File IO continues
And the Process Continues…
Time = 10:30:04
DPM Filter – Volume Map
VOLUME (actual disk blocks)
1. VSS Snapshot taken on production volume to ensure consistent data
2. Cache of changed blocks is sent to DPM server, while live disk continues.
3. Frozen blocks from snapshot are released
18 19 20
21
22
And File IO continues
1 2
3 4 5 6 7 8
9
10 18 19 20
11
21 12
13 22 14
15 16 17
Transactional Log backups
How DPM protects data
DPM ReplicaProduction Server
Database
0:00
Efficient Protection Beyond De-duplicationBaseline initial mirror
Baseline Initial MirrorDatabase
0:00
Production Server
Database15 minute Syncs
Every 15 minutes, closed transaction logs are sent to the DPM server
Database
0:00Database
0:XX
DPM Replica
Efficient Protection Beyond De-duplicationDay 0: Transaction logs
Production Server
DatabaseRestore
DPM can restore server to any 15 minute point in time• Database 0:00• Roll forward to 0:XX with transaction logs
Database
0:00
DPM Replica
Database
0:XX
Efficient Protection Beyond De-duplicationDay 0: Transaction logs
Efficient Protection Beyond De-duplication Day 1: DPM express full
Production Server
Database
1:00
At least weekly but usually daily, a DPM Express Full re-synchronizes the DPM Replica
Express FullDatabase
0:00Database
1:00
0:00
Shadow Copyof 0:00 to 1:00
+Transaction logs
Day 0
Database
1:XX
Day 1 : Data changes
Efficient Protection Beyond De-duplicationDay 1: Transaction logs
15 Minutes
DPM Replica
Production Server
Database
1:00Database
1:00
0:00
Shadow Copyof 0:00 to 1:00
+Transaction logs
Day 0
15 MinutesRestore
DPM can restore to Today at 2:15
Use existing 1:00 replicaRoll forward logs to 2:15
DPM can restore to Yesterday at 10:45
Shadow copy 0:00 to rebuild day 0Roll forward logs to yesterday at 10:45
DPM Replica
Database
1:XX
Efficient Protection Beyond De-duplicationDay 1: Transaction logs
0:001:00
Efficient Protection Beyond De-duplicationDay 2: DPM express full
Production Server
Database
2:00Database
1:00
Week 2 : Express Full - resynchronization
Shadow Copyof 0:00 to 1:00
+Transaction logs
Day 0
Express FullDatabase
2:00
Up to 512 shadow copies, plus their logs
512w x 7d x 24h x 4(15m) = 344,000 Recovery Points
DPM Replica
Exchange Server protection specifics
Exchange
Exchange
Storage Groups
Database
Exchange Recovery – Restore Data
Restore Storage Groups
Restore Database
Restores Specific Item
Exchange ToolsThird Party Utilities
Exchange 2007 – LCR
Local Continuous Replication
One exchange server with redundant copy of databaseFailover to redundant copy in case of database corruption or drive lossBackup from Active DB drive
Exchange 2007
DPM
Exchange 2007 – CCR
Cluster Continuous ReplicationRedundant exchange servers and redundant databasesCan be geo-diverseDatabases logs are replicated
Exchange 2007 CCR
Exchange2007
Active
DPM
Exchange2007Passive
Role Preferred Backup• Active – most current data• Passive – least production impact
Node Preferred backup• Protect node closest to DPM server
Standby Node
E3
SCR ProtectionFailover across sites of current data
ExchangeSCR
Disk-based for fast recoveryDPM 2010
Exchange 2007 SP1- SCR
CCRExchange
Active Node
E1
Exchange
Passive Node
E2
Backup
with integrated Disk & TapeDPM 2010
Tertiary Disk – and Offsite TapeDPM 2010
DPM 2 DPM 4 DR
DPM 2010
Disaster Recovery / Offsite DataRecovery previous points of data
Exchange 2007 SP1- SCR
Standby Node
E3
SCR ProtectionFailover across sites of current data
CCRExchange
Active Node
E1
Exchange
Passive Node
E2
Backup
Disk-based for fast recoveryDPM 2010
ExchangeSCR
Tertiary Disk – and Offsite TapeDPM 2010
No Bandwidth duplicated
DPM 2010Offsite Tape & Previous Recovery Points
DPM
Exchange 2010 DPM 2010
DAG node 3
E3
DAG node 1
E1
DAG node 2
E2
Exchange
Tertiary Disk – and Offsite TapeDPM 2010
FULLBACKUP
ExchangeExchange
DAG “copy”, instead of “full backup”
Exchange 2010 Mail Item Recovery
demo
Resources & Tools for DPMWeb Site www.microsoft.com/DPM
blogs.technet.com/DPM
Info DPM 2010 overview datasheet and webcastDatasheets, technical white papers, and on-demand webcasts:
How to Protect SQL Server with DPM 2010How to Protect Microsoft Exchange with DPM 2010
How to Protect SharePoint with DPM 2010How to Protect Virtualized Environments with DPM 2010TechNet virtual labs - for hands-on learning with DPM
DPM 2010 overview information and webcast
E-mail [email protected]
Summary
DPM is designed for Microsoft Application Servers
Uses only supported (VSS) backup and recovery mechanisms
Enterprise Ready
Up to 100 servers or 2,000 databases per DPM server
Auto-protection, Auto-grow, Auto-heal
When deploying a new application, ask yourself one question:
How are you going to back that up?
Q & A
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions,
it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.