Data Protection for Virtual Data Centers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Essential information on how to protect data in virtual environments!

Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a "good, better, best" approach, exploring best practices for backup, high availability, disaster recovery, business continuity, and more.

  • Covers best practices and essential information on protecting data in virtualized enterprise environments
  • Shows you how to approach, protect, and manage data while also meeting such challenges as return on investment, existing service level agreements (SLAs), and more
  • Helps system and design architects understand data protection issues and technologies in advance, so they can design systems to meet the challenges
  • Explains how to make absolutely critical services such as file services and e-mail more available without sacrificing protection
  • Offers best practices and solutions for backup, availability, disaster recovery, and others

This is a must-have guide for any Windows server and application administrator who is charged with data recovery and maintaining higher uptimes.

Author(s): Jason Buffington
Edition: 1
Publisher: Sybex
Year: 2010

Language: English
Pages: 530

Data Protection for Virtual Data Centers......Page 5
Acknowledgments......Page 9
About the Author......Page 10
Contents......Page 12
Introduction......Page 20
In the Beginning, There Were Disk and Tape......Page 27
Overview of Availability Mechanisms......Page 28
Overview of Protection Mechanisms......Page 38
Summary......Page 42
The Technical Metrics: RPO and RTO......Page 45
Business Metrics: RA and BIA......Page 50
Risk Mitigation: Fixing It in Advance......Page 59
Total Cost of Ownership......Page 62
Return on Investment......Page 63
Turning IT Needs into Corporate Initiatives......Page 67
Summary......Page 68
What Data Looks Like from the Server’s Perspective......Page 69
Hardware-centric Protection......Page 70
File-centric Protection......Page 86
Application-centric Protection......Page 92
Where to Store Your Protected Data......Page 93
Summary......Page 99
Solving the Problem from the Inside Out......Page 101
Volume Shadow Copy Service (VSS)......Page 103
The Windows Server Backup Utility......Page 108
System Center Data Protection Manager......Page 113
Summary......Page 167
File System Availability and Protection in Windows Server......Page 169
What Is the Distributed File System?......Page 170
Enabling DFS on Your Windows File Servers......Page 173
Getting Started with DFS-N......Page 176
Getting Started with DFS-R......Page 186
Mixing DFS-R and DFS-N for Real-World Solutions......Page 200
DFS Enhancements in Windows Server 2008 R2......Page 206
Summary......Page 207
Overview of Clustering in Windows Server 2008 and 2008 R2......Page 209
Building Your First Cluster......Page 213
How Failover Clustering Works......Page 229
Quorum Models......Page 230
Windows Server 2008 R2 Failover Clustering......Page 236
Summary......Page 245
Exchange within Microsoft Cluster Services......Page 247
Exchange 2007 Continuous Replication......Page 253
Exchange 2010 Database Availability......Page 276
Summary......Page 291
SQL Server Built-in Resiliency......Page 293
SQL Failover Clustering......Page 295
SQL Database Mirroring......Page 307
SQL Database Failover......Page 318
SQL Log Shipping and Replication......Page 328
Which SQL Server HA Solution Should You Choose?......Page 333
Backing Up SQL Server......Page 335
Summary......Page 341
Protecting Virtual Machines......Page 343
Availability of Virtual Machines......Page 353
How Virtualization Makes Data Protection and Availability Better......Page 369
Disaster Recovery Staging......Page 370
Bare Metal Recovery......Page 375
Server Rollback......Page 376
Summary......Page 378
Well-Managed Systems for Higher Uptime......Page 379
Large Enterprise Deployment and Manageability......Page 380
Virtualization Management......Page 409
Midsized Management: Physical and Virtual......Page 424
Summary......Page 435
The Need for Monitoring......Page 437
Challenges in Monitoring......Page 438
Enterprise End-to-End Monitoring......Page 439
Monitoring the Health and Performance of Key Workloads......Page 454
Monitoring in Midsized Organizations Using System Center Essentials......Page 460
Summary......Page 467
What Makes BC and DR So Special?......Page 469
Get Your Data Out of the Building......Page 489
BC = DR + HA......Page 491
BC/DR Solution Alternatives......Page 498
Using Virtualization to Achieve Business Continuity......Page 500
Planning for BC/DR to Get Better Backups and Availability......Page 508
Summary......Page 509
Topical Resources......Page 511
The Author......Page 516
Index......Page 517