Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/9/2011
02:55 PM
George Crump
George Crump
Commentary
50%
50%

Establishing Tiered Recovery Points

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and

Our last entry introduced the concept of tiered recovery points. In this entry we will go into more detail about tiered recovery points. There are typically three types of recovery points you want; instant or close to it, also know as high availability. Within a few hours via some sort of disk or tape backup and finally recovering something old, an archive. Each of these tiers need to be established and understood when they should be used.These three tiers of recovery; high availability (HA), backup and archive should have almost equal priority with each other and each needs to be established for all data sets and applications. High availability can range from seconds to a few minutes to less than an hour. It depends on when that application or service is expected to be returned to the user and how important it is to the organization.

The primary requirement of an HA solution is to have the capability of returning an application to production rapidly, without a data transfer. This does not require clustering to accomplish however. Clustering is often thought of as expensive and complicated. Third party application availability and replication products can provide this as well. The important component is that the data is in a secondary disk system in a live (not backup format) state. As we discuss in our recent article "Achieving Application Aware Availability" the need for high availability is broader what it used to be. The problem is that applications can't be down for the few hours it may take to transfer data, because of its size, from the backup device (disk or tape) back into production.

To accomplish transfer less recovery, HA requires mirroring or at least very fast replication of data. In some cases this means that data corruption or deletion can occur on primary storage, be mirrored or replicated to the secondary device before someone realizes that the corruption or deletion has occurred. While some HA solutions also take snapshots of data on the target side not all do, and even if they do the snapshots may get corrupted as well before you realize that corruption or accidental deletion has occurred. In other words we need a second tier of data protection in case something happens to the mirrored or replicated data.

While transfer times may cause you to not meet your ideal recovery time objective, faced with the alternative, total data loss, you'll be glad to have the secondary recovery tier. This tier is typically going to be some form of backup application and device. A backup is designed to store many versions of a data set that will exceed the versioning capabilities of most replication technologies. Also backups happen less frequently so the potential of corruption sneaking into multiple backup data sets is less likely. Still this second tier of backup needs to be focused on rapid recovery. Most often this means a disk based recovery on a high speed network.

Finally there is the archive, often tape based but also disk based. Ideally this is not a "when all else has failed" recovery tier. This recovery tier should more often be used to recover old versions of data as part of a legal action or when a project is re-activated. However, if the two prior tiers have failed it is good to know that this tier is available for a last ditch recovery effort.

Moving data between these tiers can be a challenge as well. In an upcoming entry we will discuss some options to automate that movement and to minimize redundant data copies.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32094
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
CVE-2021-32095
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
CVE-2021-32096
PUBLISHED: 2021-05-07
The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
CVE-2021-32098
PUBLISHED: 2021-05-07
Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
CVE-2021-32099
PUBLISHED: 2021-05-07
A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.