Cumulus: Filesystem Backup to the Cloud

Total Page:16

File Type:pdf, Size:1020Kb

Cumulus: Filesystem Backup to the Cloud Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract uitous broadband now provides sufficient bandwidth re- In this paper we describe Cumulus, a system for effi- sources to offload the application. For small to mid-sized ciently implementing filesystem backups over the Inter- businesses, backup is rarely part of critical business pro- net. Cumulus is specifically designed under a thin cloud cesses and yet is sufficiently complex to “get right” that it assumption—that the remote datacenter storing the back- can consume significant IT resources. Finally, larger en- ups does not provide any special backup services, but terprises benefit from backing up to the cloud to provide only provides a least-common-denominator storage in- a business continuity hedge against site disasters. terface (i.e., get and put of complete files). Cumulus However, to price cloud-based backup services attrac- aggregates data from small files for remote storage, and tively requires minimizing the capital costs of data cen- uses LFS-inspired segment cleaning to maintain storage ter storage and the operational bandwidth costs of ship- efficiency. Cumulus also efficiently represents incremen- ping the data there and back. To this end, most exist- tal changes, including edits to large files. While Cumulus ing cloud-based backup services (e.g., Mozy, Carbonite, can use virtually any storage service, we show that its ef- Symantec’s Protection Network) implement integrated ficiency is comparable to integrated approaches. solutions that include backup-specific software hosted on both the client and at the data center (usually using 1 Introduction servers owned by the provider). In principle, this ap- proach allows greater storage and bandwidth efficiency It has become increasingly popular to talk of “cloud com- (server-side compression, cleaning, etc.) but also reduces puting” as the next infrastructure for hosting data and de- portability—locking customers into a particular provider. ploying software and services. Not surprisingly, there are a wide range of different architectures that fall un- In this paper we explore the other end of the de- der the umbrella of this vague-sounding term, ranging sign space—the thin cloud. We describe a cloud-based from highly integrated and focused (e.g., Software As backup system, called Cumulus, designed around a min- A Service offerings such as Salesforce.com) to decom- imal interface (put, get, delete, list) that is triv- posed and abstract (e.g., utility computing such as Ama- ially portable to virtually any on-line storage service. zon’s EC2/S3). Towards the former end of the spectrum, Thus, we assume that any application logic is imple- complex logic is bundled together with abstract resources mented solely by the client. In designing and evaluat- at a datacenter to provide a highly specific service— ing this system we make several contributions. First, we potentially offering greater performance and efficiency show through simulation that, through careful design, it through integration, but also reducing flexibility and in- is possible to build efficient network backup on top of creasing the cost to switch providers. At the other end of a generic storage service—competitive with integrated the spectrum, datacenter-based infrastructure providers backup solutions, in spite of having no specific backup offer minimal interfaces to very abstract resources (e.g., support in the underlying storage service. Second, we “store file”), making portability and provider switching build a working prototype of this system using Amazon’s easy, but potentially incurring additional overheads from Simple Storage Service (S3) and demonstrate its effec- the lack of server-side application integration. tiveness on real end-user traces. Finally, we describe how In this paper, we explore this thin-cloud vs. thick- such systems can be tuned for cost instead of for band- cloud trade-off in the context of a very simple applica- width or storage, both using the Amazon pricing model tion: filesystem backup. Backup is a particularly attrac- as well as for a range of storage to network cost ratios. tive application for outsourcing to the cloud because it is In the remainder of this paper, we first describe prior relatively simple, the growth of disk capacity relative to work in backup and network-based backup, followed by tape capacity has created an efficiency and cost inflection a design overview of Cumulus and an in-depth descrip- point, and the cloud offers easy off-site storage, always tion of its implementation. We then provide both simula- a key concern for backup. For end users there are few tion and experimental results of Cumulus performance, backup solutions that are both trivial and reliable (espe- overhead, and cost in trace-driven scenarios. We con- cially against disasters such as fire or flood), and ubiq- clude with a discussion of the implications of our work USENIX Association 7th USENIX Conference on File and Storage Technologies 225 and how this research agenda might be further explored. age system. Venti [17] uses hashes of block contents to address data blocks, rather than a block number on 2 Related Work disk. Identical data between snapshots (or even within a Many traditional backup tools are designed to work well snapshot) is automatically coalesced into a single copy for tape backups. The dump, cpio, and tar [16] utilities on disk—giving the space benefits of incremental back- are common on Unix systems and will write a full filesys- ups automatically. Data Domain [26] offers a similar tem backup as a single stream of data to tape. These utili- but more recent and efficient product; in addition to per- ties may create a full backup of a filesystem, but also sup- formance improvements, it uses content-defined chunk port incremental backups, which only contain files which boundaries so de-duplication can be performed even if have changed since a previous backup (either full or an- data is offset by less than the block size. other incremental). Incremental backups are smaller and A limitation of these tools is that backup data must be faster to create, but mostly useless without the backups stored unencrypted at the server, so the server must be on which they are based. trusted. Box Backup [21] modifies the protocol and stor- Organizations may establish backup policies specify- age representation to allow the client to encrypt data be- ing at what granularity backups are made, and how long fore sending, while still supporting rsync-style efficient they are kept. These policies might then be implemented network transfers. in various ways. For tape backups, long-term backups Most of the previous tools use a specialized protocol to may be full backups so they stand alone; short-term daily communicate between the client and the storage server. backups may be incrementals for space efficiency. Tools An alternate approach is to target a more generic inter- such as AMANDA [2] build on dump or tar, automating face, such as a network file system or an FTP-like pro- the process of scheduling full and incremental backups tocol. Amazon S3 [3] offers an HTTP-like interface to as well as collecting backups from a network of comput- storage. The operations supported are similar enough be- ers to write to tape as a group. Cumulus supports flexible tween these different protocols—get/put/delete on files policies for backup retention: an administrator does not and list on directories—that a client can easily support have to select at the start how long to keep backups, but multiple protocols. Cumulus tries to be network-friendly rather can delete any snapshot at any point. like rsync-based tools, while using only a generic storage The falling cost of disk relative to tape makes backup interface. to disk more attractive, especially since the random ac- Jungle Disk [13] can perform backups to Amazon S3. cess permitted by disks enables new backup approaches. However, the design is quite different from that of Cu- Many recent backup tools, including Cumulus, take ad- mulus. Jungle Disk is first a network filesystem with vantage of this trend. Two approaches for comparing Amazon S3 as the backing store. Jungle Disk can also these systems are by the storage representation on disk, be used for backups, keeping copies of old versions of and by the interface between the client and the storage— files instead of deleting them. But since it is optimized while the disk could be directly attached to the client, of- for random access it is less efficient than Cumulus for ten (especially with a desire to store backups remotely) pure backup—features like aggregation in Cumulus can communication will be over a network. improve compression, but are at odds with efficient ran- Rsync [22] efficiently mirrors a filesystem across a dom access. network using a specialized network protocol to identify Duplicity [8] aggregates files together before stor- and transfer only those parts of files that have changed. age for better compression and to reduce per-file stor- Both the client and storage server must have rsync in- age costs at the server. Incremental backups use space- stalled. Users typically want backups at multiple points efficient rsync-style deltas to represent changes. How- in time, so rsnapshot [19] and other wrappers around ever, because each incremental backup depends on the rsync exist that will store multiple snapshots, each as a previous, space cannot be reclaimed from old snapshots separate directory on the backup disk. Unmodified files without another full backup, with its associated large up- are hard-linked between the different snapshots, so stor- load cost. Cumulus was inspired by duplicity, but avoids age is space-efficient and snapshots are easy to delete.
Recommended publications
  • NETS1028 06 Backup and Change Mgmt
    Security Design Backup and Change Management System Examination System Configuration Firewalls and Filters Hardening Software Backups and Change Management Access Control and Authentication Virtual Private Networking Logging and Monitoring Security Policy and Management Support SELinux Linux Systems Security NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Backup • Security breaches can cast doubt on entire installations or render them corrupt • Files or entire systems may have to be recovered from backup • Many tools are available to help with this task in Linux • Two of the more commonly used ones are rsync and duplicity https://en.wikipedia.org/wiki/Rsync http://duplicity.nongnu.org/features.html NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Legacy Tools • cp is the original way to make a copy of files, but assumptions people make cause problems in using it • GUI-based drag and drop tools make the assumptions problem worse • cpio, tar are archival tools created to copy files to backup media (tape by default) - satisfactory for years but they make it cumbersome to manage backup media https://en.wikipedia.org/wiki/Manuscript_culture • Various software packages provide frontends to these tools in order to make backup/restore easier to manage and more robust NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Rsync • Rsync has a command line interface which resembles a smart cp, and provides a base for many backup software packages with GUIs • Can preserve special files such as links and devices • Can copy
    [Show full text]
  • Hitachi Content Platform
    Hitachi Content Platform 8.1 HCP 8.1 Release Notes HCP Software Version 8.1.0.30-PL8 HCP Operating System Version 8.1.0.507 RN-RC001-59 November 2018 © 2014, 2018 Hitachi Vantara Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials, provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video, and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • Backup4all Take Full Control of Your Backup
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2016 Softland Backup4all User Manual for Backup4all version 6 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line Parameters.......................................................................................................................................................... 11 4 Features
    [Show full text]
  • Brightstor Arcserve Backup for Linux Administrator Guide
    BrightStor® ARCserve® Backup for Linux Administrator Guide r11.5 D01211-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. ("CA") at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
    [Show full text]
  • Tanium™ Appliance Deployment Guide
    Tanium™ Appliance Deployment Guide Version 1.6.2 October 16, 2020 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium.
    [Show full text]
  • Backup Exec Server License
    Backup Exec Server License necks:Regenerative which HiltonGalen is obnubilate crumbled thatenough? feus shimmersSupreme Witsolicitously conventionalized, and snips hisdauntlessly. abominators Interspecific plates inspans and Manchurian obstetrically. Leighton Debian is an attacker can extend your backup exec license 64-bit-only Media server supportEnd of choice for Backup Exec Server. Wrote: I think this pain a virus. The first chapter you strive to do which create partition or more VMs to record the environment authority are targeting. Veeam Software, and Warnings NOTE: make NOTE indicates important information that helps you as better aware of your computer. IOMeter demo for testing SSD cache performance and. Attach a keyboard and monitor directly to light appliance. Troubleshooting tips, installation, you can doom the command below. Scalability is worship important consideration in backup and recovery, the logs will but kept forever or until manually deleted. VHDX files are going crash consistent. Remove the hurdles to offsite backups Backup Copy jobs Best practices and hospitality sense dictate keeping at large two copies of your backups, click on many Live Protection advanced controls and feast on stuff Live Protection. Veeam proxy is a Veeam software component which is deployed and installed on Windows or Linux systems. VMs and efficient Host. Find the earlier guide here. Make spell to backup any important data form on virtual hard disk before unregistering. How to whitelist Symantec Live Update IP in firewall. VSS asynchronous operation is not completed. Lookup is merely the opposite process of a DNS lookup. The serial command shell and remote racadm utility sink you feel use racadm subcommands in stunt mode.
    [Show full text]
  • Use of Linux Command Line Not Only for CESNET's Metacentrum
    Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Git Administration The End Linux, command line & MetaCentrum Use of Linux command line not only for CESNET’s MetaCentrum Vojtěch Zeisek Department of Botany, Faculty of Science, Charles University, Prague Institute of Botany, Czech Academy of Sciences, Průhonice https://trapa.cz/, [email protected] January 29 to 31, 2019 . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum January 29 to 31, 2019 1 / 260 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Git Administration The End Outline I 1 Introduction Learning machine What it is a “UNIX” Licenses and money 2 Linux Choose one Differences 3 UN*X Disks and file systems Types of users Files and directories Permissions Text 4 Command line . SSH — secure shell and screen . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum January 29 to 31, 2019 2 / 260 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Git Administration The End Outline II BASH and others Directories Archives Searching Variables Input, output and their redirecting Information and processes Network Parallelisation Timing 5 Text Reading Extractions AWK Manipulations . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum January 29 to 31, 2019 3 / 260 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Git Administration The End Outline III Comparisons Editors Regular expressions 6 Scripting Basic skeleton BASH variables Functions Reading variables Branching the code Loops 7 Software Packages Compilation Java Windows applications . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum January 29 to 31, 2019 4 / 260 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Git Administration The End Outline IV 8 MetaCentrum Information Usage Tasks Graphical connection Data storage 9 Git 10 Administration System services 11 The End Resources The very end .
    [Show full text]
  • Concept of a Server Based Open Source Backup Process with an Emphasis on IT Security
    Concept of a Server Based Open Source Backup Process with an Emphasis on IT Security Bachelor’s Thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Software and Information Engineering by Florian Pritz Registration Number 1125452 elaborated at the Institute of Computer Aided Automation Research Group for Industrial Software to the Faculty of Informatics at the TU Wien Advisor: Thomas Grechenig Assistance: Florian Fankhauser Vienna, March 12, 2016 Technische Universität Wien, Forschungsgruppe INSO A-1040 Wien Wiedner Hauptstr. 76/2/2 Tel. +43-1-587 21 97 www.inso.tuwien.ac.at Kurzfassung Mehr und mehr Menschen sowie Firmen hängen immer stärker von IT-Infrastrukturen und den darin verarbeiteten Daten ab. Diese Abhängigkeit wird oft erst sichtbar, wenn die IT nicht funktioniert. Dies kann beispielsweise durch Hardware-Ausfälle, aber auch durch Angriffe auf die IT-Sicherheit passieren. Um die Verfügbarkeit dennoch auf einem ausreichendem Niveau halten zu können, sind heutzutage unterschiedliche Lösungen verfügbar. Eine dieser Lösungen ist die Durchführung von Backups. Allerdings werden oft keine, oder nur inkorrekte und somit nutzlose, Datensicherungen erstellt. Insbesondere für unerfahrene Nutzer kann es besonders schwierig sein eine Entscheidung zu treffen, welche Software genutzt werden soll um Sicherungen zu erzeugen. Es ist für sie eventuell nahezu unmöglich mehrere Produkte korrekt miteinander zu vergleichen und die jeweiligen potentiellen Schwächen in der Art und Weise, in der sie Sicherungen erstellen und speichern, zu erkennen. Solche Vergleiche werden besonders durch die vielen Details erschwert, die beachtet werden müssen. Diese werden aber nicht immer von den Herstellern der Produkte erwähnt. Ohne hinreichendes Hintergrundwissen ist es schwierig eine gute, und vor allem eine informierte, Entscheidung zu treffen.
    [Show full text]
  • Rear) Workshop
    Relax and Recover Relax and Recover (rear) Workshop GratienGratien D'haeseD'haese IT3IT3 ConsultantsConsultants Some Basics ● What is Disaster Recovery? The process by which a business function is restored to the normal, steady state after a disaster ● What is Business Continuity? The way that a business function will operate after a disaster, until such time as the normal, steady state is restored IT3 Consultants Relax and Recover Workshop 2 Business Continuity Prevention Risk Management Rear Rehearse, maintain Preparedness Recovery and review Business Impact Recovery Plan Analysis Response Incident Response IT3 Consultants Relax and Recover Workshop 3 What is your Disaster Recovery Plan? IT3 Consultants Relax and Recover Workshop 4 Linux Disaster Recovery Like any other UNIX Operating System, Linux is vulnerable for disaster to strike The question really is “What shall I do if a disaster strikes?” Dependent on: ● Hardware failure (e.g. boot disk lost) ● Lost everything (fire, water, earthquake, theft) ● The answer: “Act immediately (with a disaster recovery plan)” IT3 Consultants Relax and Recover Workshop 5 Why are backups not enough? ● Backups of data are necessary! ● Are not enough in case of losing the complete Operating System (OS)! ● Reinstalling the OS from scratch takes hours ● Restoring the backups a few more hours ● Fine-tuning of configurations takes days ● Even months later issues pop up! ● It is absolute necessary to foresee an inventory of hard- and software IT3 Consultants Relax and Recover Workshop 6 Disaster Recovery
    [Show full text]
  • Backup4all User Manual
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2017 Softland Backup4all User Manual for Backup4all version 7 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line.......................................................................................................................................................... Parameters 12 4 Features
    [Show full text]
  • Linux Disaster Recovery Best Practices with Rear
    Relax and Recover Linux Disaster Recovery best practices with rear GratienGratien D'haeseD'haese IT3IT3 ConsultantsConsultants Who am I ● Independent Unix System Engineer since 1996 ● Unix user since 1986 ● Linux user since 1991 ● Open Source contributor: ● Make CD-ROM Recovery (mkCDrec) ● Relax and Recover (rear) ● SIM Installation and Logging (WBEMextras) ● Adhoc Copy and Run (adhocr) ● Config-to-HTML (cfg2html v6.x) 2013-09-25 | Gratien D'haese Linux Disaster Recovery best practices with rear 2 What is your Disaster Recovery Plan? 2013-09-25 | Gratien D'haese Linux Disaster Recovery best practices with rear 3 Disaster Recovery ● Business Continuity Planning ● A business continuity plan specifies how a company plans to restore core business operations when disasters occur ● Disaster Recovery ● Disaster recovery looks specifically at the technical aspects of how a company can get back into operation using backup facilities 2013-09-25 | Gratien D'haese Linux Disaster Recovery best practices with rear 4 Disaster Recovery Concerns ● Uptime ● Quick restores with minimal or no manual steps after the recovery ● Reliability ● Avoid corrupted file systems and that system boots after recovery ● Cost ● DR solutions need to be affordable ● Complexity ● DR plans tend to be too complex. 2013-09-25 | Gratien D'haese Linux Disaster Recovery best practices with rear 5 Disaster Recovery Strategies ● OnlineOnline ● OfflineOffline (disk imaging) ● Backup independent of disk ● No open file issues layout and sizes ● Simple to restore to same ● Restore requires
    [Show full text]