Modern Data Protection: Ensuring Recoverability of All Modern Workloads

Паперова книга
155413
Modern Data Protection: Ensuring Recoverability of All Modern Workloads - фото 1
  • ISBN
    978-1492094050
  • Видавництво
  • Автор
  • Рік
    2021
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
11.04
3'300

Все про “Modern Data Protection: Ensuring Recoverability of All Modern Workloads”

Від видавця

 Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365,  Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.

To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.

 Learn the workload types that your organization should be backing up

Explore the hardware, software, and services you can use to back up your systems

Understand what's wrong with your current data protection system

Pair your backed-up workloads to the appropriate backup system

Learn the adjustments that will make your backups better, without wasting money

 W. Curtis Preston, also known as "Mr. Backup,” is the author of three O'Reilly books and the founder/webmaster of backupcentral.com, a site dedicated to backup & recovery for over 20 years. He is also the host of the independent Restore it All podcast. He is currently the Chief Technical Evangelist at Druva, Inc, a data protection as a service company.

Зміст

 Foreword

Preface

The Work Continues

Conventions Used in This Book

O’Reilly Online Learning

How to Contact Us

Acknowledgments

1. Risks to Your Data: Why We Back Up

Human Disasters

Accidents

Bad Code

Malicious Attacks

Terrorism

Electronic Attacks

Ransomware

Internal Threats

Mechanical or System Failure

Power Disruptions

There Is No Cloud

System Failure

Natural Disasters

Floods

Fires

Earthquakes

Hurricanes, Typhoons, and Cyclones

Tornadoes

Sinkholes

Takeaways

2. Gathering and Determining Service Levels

What Does Your Organization Do?

Build Yourself a Framework

Document Templates

Review/Advisory Boards

Collecting Requirements

What Are RPO and RTO?

Find the Subject Matter Experts

Solicit Requirements

Review Requirements

Design and Build Your System

Draw up Multiple Designs

Review the Designs

Select and Build the System

Document and Implement the New System

Defining Operational Responsibility

Operations Review and Documentation

Documentation Is Good

Runbooks

Implement the New System

Takeaways

3. Backup and Archive Are Very Different

Before We Get Started

What Is Backup?

“Copy”

“Stored Separately from the Original”

“For the Purposes of Restoring”

What Is a Restore?

How Does a Restore Work?

The 3-2-1 Rule

What Is an Archive?

To Serve as a Reference

Stored with Additional Metadata

What Is a Retrieve?

Protecting Backup and Archive Data

Encryption

Air Gaps

Immutability

Takeaways

4. Backup and Recovery Basics

Recovery Testing

Backup Levels

Traditional Full Backup

Traditional Incremental Backup

Do Backup Levels Matter?

Metrics

Recovery Metrics

Capacity Metrics

Backup Window

Backup and Recovery Success and Failure

Retention

Using Metrics

Backup and Archive Myths

Item- Versus Image-Level Backups

Item-Level Backup

Image-Level Backups

File-Level Recovery from an Image-Level Backup

Combining Image- and File-Level Backups

Backup Selection Methods

Selective Inclusion Versus Selective Exclusion

Tag-Based and Folder-Based Inclusion

Takeaways

5. Using Disk and Deduplication for Data Protection

Deduplication

What Can Dedupe Do?

How Dedupe Works

Target Deduplication

Source Deduplication

Target Versus Source Deduplication

Hybrid Dedupe

Selecting the Right Dedupe for You

Using Disk in Your Backup System

Disk Caching

Disk-to-Disk-to-Tape (D2D2T)

Disk-to-Disk-to-Disk (D2D2D)

Direct-to-Cloud (D2C)

Disk-to-Disk-to-Cloud (D2D2C)

Recovery Concepts

Image Recovery

File-Level Recovery

Instant Recovery

Choosing a Recovery Type

Takeaways

6. Traditional Data Sources

Physical Servers

Standard Backup

Bare-Metal Backup

Backing Up NAS

Virtual Servers

VM-Level Backups

What Is VSS?

Specialized Backups for Hypervisors

Desktops and Laptops

Laptops as a Cache

Normal Desktop and Laptop Usage

Desktop and Laptop Backup Options

Mobile Devices

Cloud Sync

Physical Sync

Mobile Device Backup

Mobile Device Management (MDM)

Takeaways

7. Protecting Databases

Database Delivery Models

Traditional Database Software

Platform-as-a-Service

Serverless Databases

Database Models

Consistency Models

Traditional Databases Running in Your Datacenter

PaaS and Serverless Databases

Traditional Database Terminology

Instance

Database

Table

Index

Row

Attribute

Data File

Tablespace

Partition

Master File

Transaction

Transaction Log

Backing Up Traditionally Delivered Databases

Cold Backup

Split Replica

Hot Backup Mode

Snap and Sweep

Dump and Sweep

Stream-to-Backup Product

Transaction Log Backup

Master File

Backing Up PaaS and Serverless Databases

Dump and Sweep

Integrated Backup-as-a-Service

Recovering Traditional Databases

Recovering Modern Databases

Takeaways

8. Modern Data Sources

The Public Cloud

Infrastructure-as-a-Service (IaaS)

Platform-as-a-Service (PaaS)

Serverless Services

Software-as-a-Service (SaaS)

You Need to Protect the Cloud

Hybrid Cloud Configurations

NFS/SMB Gateway

The Cloud in a Box

Docker and Kubernetes

How Containers Break Backups

Dockerfiles

Docker Images

Kubernetes etcd

Persistent Volumes

Databases

Kubernetes: A New Path

The Internet of Things (IoT)

Making Backup Decisions

Criticality to the Organization

Consider the Source

Takeaways

9. Backup and Recovery Software Methods

Is Everything Backup?

Backup Methods Supporting a Traditional Restore

Multiplexing

Traditional Full and Incremental Backups

File-Level Incremental Forever

Block-Level Incremental Forever

Source Deduplication

Methods Supporting Instant Recovery

Replication

Continuous Data Protection (CDP)

Snapshots

Near-Continuous Data Protection (Near-CDP)

Copy Data Management

Other Software with Instant Recovery

Leveraging Backups for More

Deciding on a Backup Method

Does What You Have Meet Your Needs?

Advantages and Disadvantages of Different Approaches

Complete Solution

Takeaways

10. Archive Software Methods

A Deeper Dive into Archive

Retrieval Versus Restore

Types of Archive Systems

Traditional Batch Archive

Real-Time Archive

HSM-Style Archive

Deciding on an Archive System

Do You Need One?

Requirements

Takeaways

11. Disaster Recovery Methods

Disaster Recovery Becomes Paramount

Ransomware Changed Everything

An Overview of Disaster Recovery

What Is in a DR Plan?

A Box of Tapes Isn’t a DR Plan

A Replicated Dedupe Appliance Isn’t Much Better

It’s All About the RTA

Building a Recovery Site

Roll Your Own DR Site

Recovery-Site-as-a-Service

The Public Cloud Was Born for DR

Keeping the DR Site Up to Date

Cold, Hot, and Warm Sites

Choosing Hot, Warm, or Cold

Recovery Mechanisms

Software or Service

Commercial DR Software

DR-as-a-Service

All-in-One or Best of Breed?

Choosing a Plan

Creating a DR Runbook

Runbook Goals

Overview

Technology Inventory

Contact Information

Procedures

Exception Processing with Escalation

Takeaways

12. Data Protection Targets

Tape Drives

What Tape Is Good At

What Tape Is Bad At

How Did This Happen?

Tape Drive Technologies

Optical Media

Individual Disk Drives

Standard Disk Arrays

Object Storage

Target Deduplication Appliances

Virtual Tape Libraries

NAS Appliances

Public Cloud Storage

Choosing and Using a Backup Target

Optimize the Performance of What You Have

Select a More Appropriate Device

Takeaways

13. Commercial Data Protection Challenges

A Brief History of Backup

Challenges with Commercial Backup Solutions

Size the Backup System

Maintain Backup Server OS

Maintain Backup Software

Manage Multiple Vendors

Separate System for DR

Separate System for E-Discovery

Tape-Related Challenges

Disk-Related Challenges

Large Up-Front Capital Purchases

Overprovisioning Is Required

Difficult to Scale

Difficulty of Changing Backup Products

Let Them Expire

Use a Service

Restore and Backup

Takeaways

14. Traditional Data Protection Solutions

Not Naming Names

Traditional Backup Solutions

Advantages of Traditional Backup

Challenges with Traditional Backup

Analysis

Target Deduplication Backup Appliances

Advantages of Target Dedupe

Challenges with Target Dedupe

Analysis

Takeaways

15. Modern Data Protection Solutions

Virtualization-Centric Solutions

Advantages of Virtualization-Centric Solutions

Challenges of Virtualization-Centric Backup

Analysis

Hyper-Converged Backup Appliances

Advantages of Hyper-Converged Backup Appliances

Challenges with HCBAs

Analysis

Data-Protection-as-a-Service (DPaaS)

Advantages of DPaaS

Challenges of DPaaS

Analysis

Fully Managed Service Providers

Advantages of Using an MSP

Challenges of Using an MSP

Analysis

Adapting to the Market

Traditional Backup Appliances

Subscription Pricing

Responding to the Cloud

Takeaways

16. Replacing or Upgrading Your Backup System

Which Solution Is Best for You?

Your Responsibilities

Before You Do Anything

This Is Your Backup System

Consider TCO, Not Just Acquisition Cost

Picking a Solution

Find Any Showstoppers

Prioritize Ease of Use

Prioritize Scalability

Prioritize Future Proofing

Takeaways

Index

Рецензії

0

Всі характеристики

  • Видавництво
  • Автор
  • Категорія
  • Рік
    2021
  • Сторінок
    386
  • Формат
    170х240 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
  • Термін поставки
    25-30 дней

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Доставка поштовими сервісами - тарифи перевізника