You are on page 1of 42

Backup and Disaster Recovery

Security Level:
Objectives

• Understand the importance and challenges of business continuity.

• Describe the technologies related to the storage backup solution of the data center.

• Understand the definition, architecture and technologies of disaster recovery.

1 Huawei Confidential
Contents

1 Introduction to Business Continuity

2 Introduction to Backup Solution

3 Introduction to Disaster Recovery Solution

2 Huawei Confidential
Contents

1 Introduction to Business Continuity

• Why Do We Need Business Continuity?


• Key Concept

2 Introduction to Backup Solution

3 Introduction to Disaster Recovery Solution

3 Huawei Confidential
Why Do We Need Business Continuity?
Loss per hour due to system downtime

Costs of rebuilding 20 GB of data

Data Type Reconstruction Time Cost


(Unit: Day)

Sales and 19 US$17,000


648 marketing
280
200 Accounting 21 US$19,000
110 160
Unit: US$10,000 9 63
Engineering 42 US$98,000
Media Healthcare Retail Manufacturing Carrier Energy Finance

Source: Network Computing, the Meta Group and Contingency Planning Research
Source: Ontrack 2010
Data protection requirements of
Data security risks are everywhere.
regulatory compliance
System software and
Misoperation Virus/Hacker attacks Natural disasters
hardware faults

4 Huawei Confidential
Why Do We Need Business Continuity?
Disasters that undermine the service continuity of IT systems
Device failure
High
Data damage
Statistics show that:
Application interruption
Disk failure  97% of partial faults
Yearly frequency

Component failure cause interruption of


Network failure enterprises' external
Regional disaster services.
Air conditioner failure  3% of global faults
cause data loss or
Power failure Terrorist actions or
DC failure Fire
national turmoil even enterprise
bankruptcy.
Natural disaster
Low

Low Loss High

How to effectively address the disasters and faults that challenge service continuity — building
a disaster recovery (DR) system

5 Huawei Confidential
Why Do We Need Business Continuity?
Business Continuity Requirements

2 Requirements of 1 Policy and regulatory requirements Financial Institutions


customers and partners  State Administration of Quality Supervision, Inspection and
 Customers' requirements Quarantine: [GB/T 20988-2007] Disaster Recovery
for 24/7 services Specifications for Information Systems
 Partners' requirements for
 Industry information system disaster recovery specifications Associated Enterprise
business continuity (People's Bank of China, China Banking Regulatory
Commission)
 Requirements for
international operational
and financial cooperation 3 Business Objectives Regulatory Organization
Business Continuity  Continuously providing
products and services is
the foundation of enterprise
 More and more business operation relies existence. Governments at all levels
4 Requirements for
on IT systems.
business operation  Secure and stable service
methods  Information systems have faced disasters running
and failures that have never stopped. Publics
 Requirements for
 Complexity and effectiveness of strengthening risk
information system recovery management and control
6 Huawei Confidential
Key Concept – BC/IA
Business continuity (BC) is an integrated and enterprise-wide process that
includes all activities (internal and external to IT) that a business must perform to
mitigate the impact of planned and unplanned downtime.
The goal of a BC solution is to ensure the “information availability” required to conduct vital business
operations.

Information availability (IA) refers to the ability of an IT infrastructure to function


according to business expectations during its specified time of operation.
• Accessibility: Information should be accessible at the right place, to the right user.

• Reliability: Information should be reliable and correct in all aspects. It is "the same" as what was stored, and there is
no alteration or corruption to the information.

• Timeliness: Defines the exact moment or the time window (a particular time of the day, week, month, and year as
specified) during which information must be accessible. For example, if online access to an application is required
between 8:00 a.m. and 10:00 p.m. each day, any disruptions to data availability outside of this time slot are not
considered to affect timeliness.

7 Huawei Confidential
Key Concept – MTBF/ MTTR
Relations Among Metrics of Extended Reliability
Failure rate λ = 1/MTBF, 1 FITs = 10-9 (1/h)
Reliability
Return repair rate F(t) = λ x t
Mean time between Annual return repair rate = λ x 8760
failures (MTBF)
Repair rate μ = 1/MTTR
Maintainability

Mean time to Downtime refers to a period of


repair (MTTR) time that a system fails to provide
or perform its primary function.

MTBF Downtime DT = (1 – A) x 8760 x 60 minutes/year


IA =
MTBF + MTTR
Downtime DT
Expressed in 0.9999… or x nines Availability A
Result (minutes/year)
0.999999 0.5
System reliability indicators: MTBF, 0.99999 5
MTTR, and availability
8 Huawei Confidential
Key Concept – RPO/RTO
Key indicators for measuring the DR system: RPO / RTO
week day hour min sec sec min hour day week

RPO RTO

Recovery Point Objective Recovery Time Objective


RPO: This is the point in time to which RTO: The time within which systems and
systems and data must be recovered after applications must be recovered after an
an outage. It defines the amount of data outage. It defines the amount of downtime
loss that a business can endure. that a business can endure and survive.

RPO Loss Data RTO

Switch
time

Production Center DR Center Production Center DR Center


9 Huawei Confidential
Key Concept
Information availability (IA) refers to the ability of an IT infrastructure to function
according to business expectations during its specified time of operation.

UPTIME (%) DOWNTIME (%) DOWNTIME PER YEAR DOWNTIME PER WEEK
IA = MTBF/(MTBF + MTTR)
98 2 7.3 days 3 hours, 22 minutes
99 1 3.65 days 1 hour, 41 minutes
99.8 0.2 17 hour, 31 minutes 20 minutes, 10 seconds
99.9 0.1 8 hour, 45 minutes 10 minutes, 5 seconds
99.99 0.01 52.5 minutes 1 minute
99.999 0.001 5.25 minutes 6 seconds
99.9999 0.0001 31.5 seconds 0.6 seconds

10 Huawei Confidential
Contents

1 Introduction to Business Continuity

2 Introduction to Backup Solution

• Basic knowledge of Backup


• Backup Strategy
• Backup Solution

3 Introduction to Disaster Recovery Solution

11 Huawei Confidential
Data Protection Faces Great Challenges

Data is distributed in diversified data


environments.

Data protection is especially difficult during the


current data explosion.
Challenges
Service protection requirements are
increasingly high.

Governments attach great importance to data


security and have issued laws to regulate data.

12 Huawei Confidential
Basic knowledge of Backup
Definition
• A backup is an additional copy of production data, created and
retained for the sole purpose of recovering lost or corrupted data. With
growing business and regulatory demands for data storage, retention,
and availability, organizations are faced with the task of backing up an
ever-increasing amount of data.

Database
Hard disks
Operation system
Disks
Application Backup
Tapes
Document
… …

13 Huawei Confidential
Basic knowledge of Backup – Comparison
Backup vs Disaster Recovery vs Archive
Backup Disaster Recovery
 Data loss can be resolved  Data loss cannot be resolved Backup focuses on
 Data corruption can be resolved  Data corruption cannot be data recoverability,
resolved while disaster recovery
 Retrieving historical data
 Can be restored to the nearest focuses on business
 Cannot be directly taken over.
running time continuity.
 Can be directly taken over.

Backup Archive
 Used to restore data due to  Used to store information for a
Backup is used for
damage or loss long time.
data restoration, and
 SLA compliance (RTO/RPO)  Meet regulatory compliance and archiving is used for
enterprise efficiency requirements. regulatory compliance.
 The original data is retained in the
original location  Retain only data copies and
delete original data.

14 Huawei Confidential
Basic knowledge of Backup – Comparison
Comparison of Data Protection Methods
RAID Replication Snapshot Backup
Physical error Natural disaster Yes Yes
(47%) Hardware failure Yes Yes Yes Yes
Human error Yes Yes
Logical error
Software failure Yes Yes
(53%)
Virus Yes Yes
Recovery point seconds, minutes,
Acceptable amount of lost data No data loss hours days
objective (RPO) or hours

Recovery time
Data recovery period Real-time minutes or hours minutes hours or days
objective (RTO)
How far back can the data be Cannot be Cannot be Several hours Several weeks,
Data retention period recovered to recovered recovered or days months, or years

The objectives of data protection are to prevent physical and logical errors, meet the
RPO and RTO requirements, and meet the data retention time needs.
No single data protection algorithm can serve all these purposes. Therefore, a complete
data protection system consists of multiple algorithms.

15 Huawei Confidential
Basic knowledge of Backup – Backup Operations
When a backup operation is initiated, significant network communication takes place between the different
components of a backup infrastructure. The backup operation is typically initiated by a server, but it can
also be initiated by a client.
Application Server/ 1 Backup server initiates scheduled backup process.
Backup Clients
2 Backup server retrieves backup-related information
from backup catalog.
File
server
Database Mail
server server
3 Backup server instructs storage node to load backup
media in backup device.

4 Backup server instructs backup clients to send data


to be backed up to storage node.
4 5 Backup clients send data to storage node and update
5
the backup catalog on the backup server.

1 6 Storage node sends data to backup device.


3 6
2 7 Storage node sends metadata and media information to
backup server.
8
Backup 7 Media Backup 8 Backup server updates the backup catalog.
Server Server Device
16 Huawei Confidential
Basic knowledge of Backup – Restore Operations
Upon receiving a restore request, an administrator opens the restore application to view the list of clients
that have been backed up.

Application Server/
Backup Clients
1 The backup client requests the backup server for data
restore.
File
server
Database Mail
server server
2 The backup server scans the backup catalog to identify
data to be restored and the client that will receive data.

1 3 The backup server instructs the storage node to load


backup media in the backup device.
4
4 Data is then read and sent to the backup client.

5 The storage node sends restore metadata to the


3 4 backup server.
2
6 6 The backup server updates the backup catalog.

Backup 5 Media Backup


Server Server Device
17 Huawei Confidential
Backup Strategy – Component
A backup system commonly uses the client-server architecture with a backup server
and multiple backup clients.
Backup client/ Backup server Media server
Application client Functions Functions
Functions • The backup Index • It is responsible for
CommCell
server manages Cache writing the data to
• The role of a Console
the backup MA the backup device.
backup client is
CS operations and • In many cases, the
to gather the
Application maintains the media server is
Data
data that is to
be backed up Metadata • backup catalog, integrated with the
and send it to which contains backup server, and
the storage information about both are hosted on
node. the backup the same physical
• It sends the configuration and Data Storage platform.
tracking backup metadata. • A backup device is
Security & Licensing Backup metadata
File System Data information to attached directly
contains
the backup • or through a network
information about
server. to the storage node’s
the backed-up
host platform.
data.

18 Huawei Confidential
Backup Strategy – Granularity
Backup window
The period during which a source is available to perform a data backup is called a backup window. Performing a
backup from the source sometimes requires the production operation to be suspended because the data being backed
up is exclusively locked for the use of the backup process.

Full backup Cumulative backup Incremental backup

Full backup is a backup of the Cumulative backup copies the Incremental backup copies the
complete data on the data that has changed since the data that has changed since the
production volumes. It provides last full backup. This method last full or incremental backup. The
a faster recovery but requires takes longer than an incremental volume of data backed up is
more storage space and also backup but is faster to restore. restricted to the changed data only.
takes more time to back up.

19 Huawei Confidential
Backup Strategy – Topology: LAN-Base

Description Production center Backup center


LAN
 Backup data flows are transferred
over a LAN. ...
MA CS

Advantages Application Database File Application Backup Backup


server server server server media server
 The existing network is fully utilized, server
SAN
reducing costs.
 The device requirements are low.
Backup storage
Disadvantages Production storage

 Occupies existing network bandwidth CS AnyBackup server

LAN-base network MA AnyBackup media server


 Limited backup performance
 Some impact on host applications IP
Fibre Channel

20 Huawei Confidential
Backup Strategy – Topology: LAN-Free

Description Production center Backup center


LAN
 Backup data flows are transferred
over a SAN. ...
MA CS
Advantages Application Database File Application Backup Backup
server server server server media server
 Minor impact on the existing service server
SAN
network
 Excellent backup performance

Production storage Backup storage


Disadvantages
CS AnyBackup server
 High investment in the network LAN-free network MA AnyBackup media server

 High requirements for devices IP


Fibre Channel

21 Huawei Confidential
Backup Strategy – Topology: Server-Free

Description Production center Backup center


LAN
 Backup data flows are transferred
over an independent network instead
of through the production server. ... MA CS
File Application Backup Backup
Application
Advantages server
server server media server
server
 Negligible impact on service hosts SAN
 Negligible impact on the existing
service network
 Excellent backup performance
Production storage Backup storage

Disadvantages
CS AnyBackup server
MA AnyBackup media server
 High investment in the network Server-Free Network
 High requirements for devices IP
Fibre Channel

22 Huawei Confidential
Backup Topology Comparison

Backup Topology Advantage Disadvantage

• Need for manually managing backup


• No resource occupation to the LAN
Host-Based • Fast backup and restore
media
• High backup fee

• Backup data flows affect network


• Take full use of the existing LAN
LAN-Based • Flexible scaling
performance.

• Low server load • High SAN implementation fee


LAN-Free • Optimized data transmission efficiency • SAN compatibility

• High SAN implementation fee


• Lowest server load
Server-Free • SAN compatibility
• Better data transmission efficiency
• Need for support from 3rd party

23 Huawei Confidential
Backup Strategy – Data Deduplication
Traditional backup processes back up a lot of duplicate data. Backing up duplicate data significantly
increases the backup window size requirements and results in unnecessary consumption of resources,
such as storage space and network bandwidth.

Data deduplication is the process of identifying and eliminating redundant data. When duplicate data
is detected during backup, the data is discarded and only the pointer is created to refer the copy of the
data that is already backed up.
File-level deduplication detects and removes redundant copies of identical files.
----File-level deduplication is simple and fast but does not address the problem of duplicate content
inside the files.

Sub-file deduplication breaks the file into smaller chunks and then uses a specialized
algorithm to detect redundant data within and across the file.
• Fixed-length block deduplication
----Using hash algorithm, for block boundary, it might miss many opportunities to discover
redundant data.
• Variable-length segment deduplication
----Complex but effective
24 Huawei Confidential
Source-Based Data Deduplication
Source-based data deduplication eliminates redundant data at the source before it transmits to
the backup device. Source-based data deduplication can dramatically reduce the amount of backup
data sent over the network during backup processes. It provides the benefits of a shorter backup
window and requires less network bandwidth. There is also a substantial reduction in the capacity
required to store the backup images.

New data block and


Source Target
old data block pointer

Source-based deduplication increases the overhead on the backup client, which impacts the
performance of the backup and application running on the client. Source-based deduplication might
also require a change of backup software if it is not supported by backup software.

25 Huawei Confidential
Target-Based Data Deduplication
Target-based data deduplication occurs at the backup device, which offloads the backup client
from the deduplication process. The backup client sends the data to the backup device and the data is
deduplicated at the backup device, either immediately (inline) or at a scheduled time (post-process).

New data block and


Source Target Target
old data block

• Inline deduplication performs deduplication on the backup data before it is stored on the backup
device.
• This method reduces the storage capacity needed for the backup but needs a large backup window.
• Post-process deduplication enables the backup data to be stored or written on the backup device
first and then deduplicated later.
----This method is suitable for situations with tighter backup windows and large storage capacity.

26 Huawei Confidential
Backup Solutions – AnyBackup
All-in-one backup Hybrid cloud backup
HUAWEI
(S3) Only version x86 in China
Local backup CLOUD  Supported in version x86 in China:
supports cloud-based backup.
HUAWEI CLOUD S3 storage is
used as level-2 backup media,
(S3) Only version x86 in China storing data for a long time.
All-in-one backup node
Deduplication supports cloud-based backup.
(Supported in the ARM
and replication
and x86 versions)
Centralized backup
Available for Sales Centralized backup in a
x86 version: The matching software is AnyBackup 6.0. The typical data center Remote backup center
hardware configuration can be sold in China. Outside China, only
software resale is provided, and hardware is purchased by Backup node
customers.
All-in-one
ARM version: The matching software is AnyBackup 7.0. Typical
backup Deduplication
configurations are provided for hardware. Software can be sold from
June 30, 2019. and
No software is preinstalled. Onsite backup software installation replication
service is provided by EISOO and quoted on a man-day basis.
x86 version. The matching software is AnyBackup 6.0. Only software
Centralized resale is provided. The hardware is purchased by customers. Backup node
backup Onsite backup software installation service is provided by EISOO and OceanStor 2600 V3/ OceanStor 2600 V3/
quoted on a man-day basis. 5500 V5/9000 5500 V5/9000
Backup storage Backup storage Physical/Virtual
Sold in China. Only version x86 supports this backup solution. Works
Hybrid cloud resource pool resource pool tape library
with centralized backup and all-in-one backup. Data is stored in
backup
HUAWEI CLOUD.

27 Huawei Confidential
Contents

1 Introduction to Business Continuity

2 Introduction to Backup Solution

3 Introduction to Disaster Recovery Solution


• What Is Disaster Recovery?
• Architecture and Technology
• Disaster Recovery Solution

28 Huawei Confidential
What Is Disaster Recovery?

• Disaster recovery: This is the coordinated process of restoring systems, data, and the
infrastructure required to support ongoing business operations after a disaster occurs. It is the
process of restoring a previous copy of the data and applying logs or other necessary processes
to that copy to bring it to a known point of consistency. After all recovery efforts are completed,
the data is validated to ensure that it is correct.

Power failure Virus outbreak Fire Device failure

29 Huawei Confidential
Service Interruption May Cause Great Losses to Customers

Hacker
Misoperation attacks Building
Network fire Terrorist
Software problems attacks
Power
faults failures Natural
Device faults
Data disasters
corruption Air conditioner
problems

! Service
interruption
Disaster recovery (DR) focuses on application continuity. Backup focuses on data recoverability.
30 Huawei Confidential A good BC&DR system must properly provide both functions.
Two Indicators About DR Construction
RPO: Recovery Point Objective (amount of lost data caused by downtime) RTO: Recovery Time Objective (downtime)

China Standard International Standard


Disaster recovery specifications RPO RTO Huawei BC&DR Solutions
for information systems Share78, UK

Tier 6 - Zero data loss and Tier 7 - Zero data loss and
0 < 15 minutes Active-active/DPA
automated service recovery automated service recovery

Tier 5 - Zero data loss Tier 6 - Zero data loss 0 < 2 hours Active-passive/DPA

Tier 5 - Two-site two-phase


2 to 12 hours < 24 hours Active-passive/DPA
Tier 4 - Electronic transmission commit
and full device support
Tier 4 - Active secondary site 2 to 24 hours < 24 hours Active-passive/DPA/Backup solution

Tier 3 - Electronic transmission 12 to 24


and partial device support
Tier 3 - Electronic vaulting
hours 24 hours Backup solution

24 hours to 24 hours to
Tier 2 - Backup site support Tier 2 - PTAM + hot site
days days Backup solution

Tier 1 - Pickup Truck Access Backup solution


Method (PTAM)
Days Days
Tier 1 - Basic support
Tier 0 - No off-site data Days to? Days to? Backup solution

31 Huawei Confidential
Architecture and Technology
Overview of Huawei DR solutions
Remote DR solutions
Intra-city DR solutions
Local HA solutions  Disaster Recovery Data Center
 Disaster Recovery Data Center Solution (Geo-Redundant Mode)
Solution (Active-Active Mode)  Disaster Recovery Data Center
 Local HA Solution  Disaster Recovery Data Center Solution (Active-Passive Mode)
Solution (Active-Passive Mode)  Cloud Disaster Recovery Solution

> 100 km

≤ 100 km

Local production center Intra-city DR center Remote DR center


32 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR

Local HA Solution
Highlights
 Application-level local HA is
FusionSphere VM VM VM VM VM VM FusionSphere achieved.
VMware VMware
 In a DC, storage is hardened
to eliminate the risks of a
single storage device.
 No data is lost, and services
are not interrupted (RPO = 0,
Oracle/SQL Server Oracle/SQL Server RTO = 0).
 This solution can be smoothly
expanded to Disaster
SAN
Recovery Data Center
Solution (Active-Passive
Third-party
storage system
Synchronous OceanStor 18000 V5 Mode).
mirroring

33 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR

Disaster Recovery Data Center Solution (Active-Active Mode)


WAN

Production center 1 Production center 2


Highlights
GSLB
 The active-active high-reliability service
cluster architecture ensures zero data loss and service
V V V V V V (F5/L2800) V V V V V V interruption upon a DC failure (RPO = 0, RTO = 0).
M M M M M M M M M M M M

FusionSphere,
 Two DCs provide services concurrently, service
VMware, loads are balanced, and resources are accessed
WebLogic, or based on the proximity access principle.
WAS cluster
 Virtualization deployment is implemented, and
Oracle, DB2, middleware clusters are automatically expanded
or SQL Server and scaled down.
cluster  Storage, databases, virtualization, networks, and
transmission are jointly optimized, ensuring the
same service experience between the local site
SAN SAN
and a site at a distance of 100 km.
 The physical active-active topology and logical
service topology are visually presented, and the
HyperMetro
operating status of the active-active DCs is
monitored.

34 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR

Disaster Recovery Data Center Solution SAN&NAS Virtualization Database

(Active-Passive Mode) – SAN&NAS


WAN Highlights
Production center DR center
 Integrated SAN&NAS DR (active-passive
mode) ensures quick service recovery in the
V
M
V
M
V
M
V
M
V
M
V
M
DR V
M
V
M
V
M
V
M
V
M
V
M
DR center when the production center fails.
management  Heterogeneous storage resources are
Virtualization integrated in the production center,
/Middleware/ improving utilization of original storage
Applications arrays and preventing storage brand
monopoly in DR systems.
 High-end, mid-range, and entry-level storage
Database
systems can communicate with each other
and heterogeneous server virtualization is
supported, reducing the investment in
SAN SAN devices in the DR center.
 I/O-based data replication enables the RPO
Synchronous/
to be approximately 0.
Asynchronous  Visualized DR management and one-click
replication DR test and recovery are supported.

35 Huawei Confidential
Active-active Active-passive Geo-redundant Cloud DR Local HA

Disaster Recovery Data Center Solution SAN&NAS Virtualization Database

(Active-Passive Mode) – Virtualization


Production center WAN DR center
Highlights
 FusionSphere I/O-level virtualization host DR is
UltraVR implemented (RPO ≥ 10 seconds).
V V V V V V V V V V V V
M M M M M M asynchronous M M M M M M  Heterogeneous storage systems and servers are
replication
supported, preventing brand monopoly.
 VMs do not need proxy software.

FusionSphere FusionSphere
 System volumes and data volumes of VMs can be
recovered.
 One-click DR switchover, rehearsal, and planned
migration simplify management and maintenance.

SAN SAN

36 Huawei Confidential
Active-active Active-passive Geo-redundant Cloud DR Local HA

Disaster Recovery Data Center Solution SAN&NAS Virtualization Database

(Active-Passive Mode) – Database


Production center DR center
Highlights
WAN
 I/O-level Oracle database DR is implemented
(RPO ≥ 0).
V V V V V V V V V V V V
M M M M M M M M M M M M  Heterogeneous storage systems, servers,
databases, and operating systems are supported,
preventing brand monopoly.
 Databases in the DR center are readable, and
reports are analyzed, improving resource
utilization of the DR center.
OGG/ODG
Synchronous/
Asynchronous
Oracle Oracle
replication
SAN SAN

37 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR

Disaster Recovery Data Center Solution (Geo-Redundant Mode)


Cascaded architecture Highlights
Production center Intra-city DR center Replication interoperability among high-end, mid-range, and
Remote DR center entry-level storage arrays
HyperMetro/
 The unified storage operating system platform ensures
A Synchronous/ the replication interoperability among high-end, mid-
Asynchronous
Asynchronous range, and entry-level storage arrays.
replication
replication
SAN
 You can flexibly select storage arrays for the remote DR
SAN SAN center, remarkably increasing the return on investment
A" (ROI).
A A'
Second-level RPO and minute-level RTO for asynchronous
replication
 Asynchronous remote replication that adopts multi–time
stamp cache technology supports a 3-second replication
period.
Parallel architecture  The one-click DR test and switchover functions of eSight
Production center Intra-city DR center enable the databases in the DR center to recover in
several minutes.
HyperMetro/
A Synchronous/ Visualized management of DR services and topologies
Asynchronous Remote DR center
 Devices in the production and DR centers are centrally
replication managed and monitored, simplifying device maintenance.
SAN SAN  The visualized management supports one-click DR test
A A' and switchover and enables you to customize scripts to
Asynchronous recover the standby service system by one click,
replication SAN simplifying the management and maintenance of the DR
system.
A"

38 Huawei Confidential
Local HA Active-active Active-passive Geo-redundant Cloud DR

Cloud Disaster Recovery Solution


Highlights
Cloud DR  Scale-out with a 32:1
center replication ratio and two-
level vertical cascading
WAN enable users to build
simplified and sharable
DR systems.
Level-1 DR
center …  Rights- and domain-based
management ensures
WAN WAN WAN
high security of DR data.
 The unified management
platform and one-click DR
rehearsal simplify
Migration
Mirroring … management and
Migration
maintenance of DR
systems.
DR access user 1 DR access user 2 DR access user 3 DR access user 4 DR access user N

39 Huawei Confidential
Disaster Recovery Solution
Disaster Recovery Data Center Solution (Active-Active Mode) assisting with CPP cloud platform construction
Customer requirements
 As services develop quickly and IT system investment increases remarkably, the
customer wants to reduce the investment in servers, implement fast deployment and
on-demand allocation, and construct a service-layer virtual platform.
 The customer requires that no data is lost upon a disaster of core service data.
 The customer needs automatic fault detection and switchover of database services
and VM services without increasing manpower for easy O&M.
 The customer wants to obtain continuous and fast service response, achieve local
and remote backup of service data, and correct logical data errors.

Huawei solution
 Use Huawei virtualization gateways and enterprise storage systems to construct a
cross-DC active-active storage platform and enable active-active applications.
Services can be switched to the other DC upon a disaster. RPO = 0, RTO = 0
 Remote arbitration mechanism: The remote arbitration mechanism cooperates with
active-active DCs to achieve the reliable active-active solution.
 Active-active and traditional backup integration: Integrate active-active backup and
traditional backup and correct logical data errors.
 Combine virtualization services, Oracle RAC database services, and active-active
storage platform to construct an IT active-active platform.

Customer benefits
 The active-active platform enables zero data loss and protects information assets.
 The failover of the active-active platform enables hour-level RTO to become
minute-level RTO. The efficiency is improved by 60 times.
After 1-year consideration and detailed tests, the customer finally chooses  On-demand allocation, deployment, and online migration are available. DC
Huawei solution to construction the active-active DC with the cloud platform. maintenance and upgrade do not interrupt production services.
 Automatic fault detection and switchover reduce manual interventions and save
O&M costs.
40 Huawei Confidential
Thank you. Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright © 2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like