Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.
To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.
• Learn the workload types that your organization should be backing up
• Explore the hardware, software, and services you can use to back up your systems
• Understand what's wrong with your current data protection system
• Pair your backed-up workloads to the appropriate backup system
• Learn the adjustments that will make your backups better, without wasting money
Author(s): W. Curtis Preston
Edition: 1
Publisher: O'Reilly Media
Year: 2021
Language: English
Commentary: Vector PDF
Pages: 386
City: Sebastopol, CA
Tags: Cloud Computing; Databases; Information Security; Internet of Things; Risk; Relational Databases; Software as a Service; Platform as a Service; Infrastructure as a Service; System Administration; Docker; Database Administration; Incident Response; Kubernetes; Serverless Applications; Disaster Recovery; Backups; Data Protection; Metrics; Continuous Data Protection; Data Protection as a Service; Recovery Time Objective; Recovery Point Objective
Copyright
Table of Contents
Foreword
Preface
The Work Continues
Conventions Used in This Book
O’Reilly Online Learning
How to Contact Us
Acknowledgments
Chapter 1. Risks to Your Data: Why We Back Up
Human Disasters
Accidents
Bad Code
Malicious Attacks
Terrorism
Electronic Attacks
Ransomware
Internal Threats
Mechanical or System Failure
Power Disruptions
There Is No Cloud
System Failure
Natural Disasters
Floods
Fires
Earthquakes
Hurricanes, Typhoons, and Cyclones
Tornadoes
Sinkholes
Takeaways
Chapter 2. Gathering and Determining Service Levels
What Does Your Organization Do?
Build Yourself a Framework
Document Templates
Review/Advisory Boards
Collecting Requirements
What Are RPO and RTO?
Find the Subject Matter Experts
Solicit Requirements
Review Requirements
Design and Build Your System
Draw up Multiple Designs
Review the Designs
Select and Build the System
Document and Implement the New System
Defining Operational Responsibility
Operations Review and Documentation
Documentation Is Good
Runbooks
Implement the New System
Takeaways
Chapter 3. Backup and Archive Are Very Different
Before We Get Started
What Is Backup?
“Copy”
“Stored Separately from the Original”
“For the Purposes of Restoring”
What Is a Restore?
How Does a Restore Work?
The 3-2-1 Rule
What Is an Archive?
To Serve as a Reference
Stored with Additional Metadata
What Is a Retrieve?
Protecting Backup and Archive Data
Encryption
Air Gaps
Immutability
Takeaways
Chapter 4. Backup and Recovery Basics
Recovery Testing
Backup Levels
Traditional Full Backup
Traditional Incremental Backup
Do Backup Levels Matter?
Metrics
Recovery Metrics
Capacity Metrics
Backup Window
Backup and Recovery Success and Failure
Retention
Using Metrics
Backup and Archive Myths
Item- Versus Image-Level Backups
Item-Level Backup
Image-Level Backups
File-Level Recovery from an Image-Level Backup
Combining Image- and File-Level Backups
Backup Selection Methods
Selective Inclusion Versus Selective Exclusion
Tag-Based and Folder-Based Inclusion
Takeaways
Chapter 5. Using Disk and Deduplication for Data Protection
Deduplication
What Can Dedupe Do?
How Dedupe Works
Target Deduplication
Source Deduplication
Target Versus Source Deduplication
Hybrid Dedupe
Selecting the Right Dedupe for You
Using Disk in Your Backup System
Disk Caching
Disk-to-Disk-to-Tape (D2D2T)
Disk-to-Disk-to-Disk (D2D2D)
Direct-to-Cloud (D2C)
Disk-to-Disk-to-Cloud (D2D2C)
Recovery Concepts
Image Recovery
File-Level Recovery
Instant Recovery
Choosing a Recovery Type
Takeaways
Chapter 6. Traditional Data Sources
Physical Servers
Standard Backup
Bare-Metal Backup
Backing Up NAS
Virtual Servers
VM-Level Backups
What Is VSS?
Specialized Backups for Hypervisors
Desktops and Laptops
Laptops as a Cache
Normal Desktop and Laptop Usage
Desktop and Laptop Backup Options
Mobile Devices
Cloud Sync
Physical Sync
Mobile Device Backup
Mobile Device Management (MDM)
Takeaways
Chapter 7. Protecting Databases
Database Delivery Models
Traditional Database Software
Platform-as-a-Service
Serverless Databases
Database Models
Consistency Models
Traditional Databases Running in Your Datacenter
PaaS and Serverless Databases
Traditional Database Terminology
Instance
Database
Table
Index
Row
Attribute
Data File
Tablespace
Partition
Master File
Transaction
Transaction Log
Backing Up Traditionally Delivered Databases
Cold Backup
Split Replica
Hot Backup Mode
Snap and Sweep
Dump and Sweep
Stream-to-Backup Product
Transaction Log Backup
Master File
Backing Up PaaS and Serverless Databases
Dump and Sweep
Integrated Backup-as-a-Service
Recovering Traditional Databases
Recovering Modern Databases
Takeaways
Chapter 8. Modern Data Sources
The Public Cloud
Infrastructure-as-a-Service (IaaS)
Platform-as-a-Service (PaaS)
Serverless Services
Software-as-a-Service (SaaS)
You Need to Protect the Cloud
Hybrid Cloud Configurations
NFS/SMB Gateway
The Cloud in a Box
Docker and Kubernetes
How Containers Break Backups
Dockerfiles
Docker Images
Kubernetes etcd
Persistent Volumes
Databases
Kubernetes: A New Path
The Internet of Things (IoT)
Making Backup Decisions
Criticality to the Organization
Consider the Source
Takeaways
Chapter 9. Backup and Recovery Software Methods
Is Everything Backup?
Backup Methods Supporting a Traditional Restore
Multiplexing
Traditional Full and Incremental Backups
File-Level Incremental Forever
Block-Level Incremental Forever
Source Deduplication
Methods Supporting Instant Recovery
Replication
Continuous Data Protection (CDP)
Snapshots
Near-Continuous Data Protection (Near-CDP)
Copy Data Management
Other Software with Instant Recovery
Leveraging Backups for More
Deciding on a Backup Method
Does What You Have Meet Your Needs?
Advantages and Disadvantages of Different Approaches
Complete Solution
Takeaways
Chapter 10. Archive Software Methods
A Deeper Dive into Archive
Retrieval Versus Restore
Types of Archive Systems
Traditional Batch Archive
Real-Time Archive
HSM-Style Archive
Deciding on an Archive System
Do You Need One?
Requirements
Takeaways
Chapter 11. Disaster Recovery Methods
Disaster Recovery Becomes Paramount
Ransomware Changed Everything
An Overview of Disaster Recovery
What Is in a DR Plan?
A Box of Tapes Isn’t a DR Plan
A Replicated Dedupe Appliance Isn’t Much Better
It’s All About the RTA
Building a Recovery Site
Roll Your Own DR Site
Recovery-Site-as-a-Service
The Public Cloud Was Born for DR
Keeping the DR Site Up to Date
Cold, Hot, and Warm Sites
Choosing Hot, Warm, or Cold
Recovery Mechanisms
Software or Service
Commercial DR Software
DR-as-a-Service
All-in-One or Best of Breed?
Choosing a Plan
Creating a DR Runbook
Runbook Goals
Overview
Technology Inventory
Contact Information
Procedures
Exception Processing with Escalation
Takeaways
Chapter 12. Data Protection Targets
Tape Drives
What Tape Is Good At
What Tape Is Bad At
How Did This Happen?
Tape Drive Technologies
Optical Media
Individual Disk Drives
Standard Disk Arrays
Object Storage
Target Deduplication Appliances
Virtual Tape Libraries
NAS Appliances
Public Cloud Storage
Choosing and Using a Backup Target
Optimize the Performance of What You Have
Select a More Appropriate Device
Takeaways
Chapter 13. Commercial Data Protection Challenges
A Brief History of Backup
Challenges with Commercial Backup Solutions
Size the Backup System
Maintain Backup Server OS
Maintain Backup Software
Manage Multiple Vendors
Separate System for DR
Separate System for E-Discovery
Tape-Related Challenges
Disk-Related Challenges
Large Up-Front Capital Purchases
Overprovisioning Is Required
Difficult to Scale
Difficulty of Changing Backup Products
Let Them Expire
Use a Service
Restore and Backup
Takeaways
Chapter 14. Traditional Data Protection Solutions
Not Naming Names
Traditional Backup Solutions
Advantages of Traditional Backup
Challenges with Traditional Backup
Analysis
Target Deduplication Backup Appliances
Advantages of Target Dedupe
Challenges with Target Dedupe
Analysis
Takeaways
Chapter 15. Modern Data Protection Solutions
Virtualization-Centric Solutions
Advantages of Virtualization-Centric Solutions
Challenges of Virtualization-Centric Backup
Analysis
Hyper-Converged Backup Appliances
Advantages of Hyper-Converged Backup Appliances
Challenges with HCBAs
Analysis
Data-Protection-as-a-Service (DPaaS)
Advantages of DPaaS
Challenges of DPaaS
Analysis
Fully Managed Service Providers
Advantages of Using an MSP
Challenges of Using an MSP
Analysis
Adapting to the Market
Traditional Backup Appliances
Subscription Pricing
Responding to the Cloud
Takeaways
Chapter 16. Replacing or Upgrading Your Backup System
Which Solution Is Best for You?
Your Responsibilities
Before You Do Anything
This Is Your Backup System
Consider TCO, Not Just Acquisition Cost
Picking a Solution
Find Any Showstoppers
Prioritize Ease of Use
Prioritize Scalability
Prioritize Future Proofing
Takeaways
Index
About the Author
Colophon