Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/13/2008
11:01 AM
George Crump
George Crump
Commentary
50%
50%

Reducing Backup Windows, Part III

In this third segment on reducing backup windows, the focus will be on getting rid of the data that no longer needs to be backed up. If you're like most of the customers we speak with, well over 85% of the data that you backup during your full backup hasn't changed since the last backup and 70% hasn't changed in the last few years. Yet, every week, it's methodically backed up. If you could eliminate this data, that means in a 10 TB environment you could reduce your full backup set to 1.5 TBs, or

In this third segment on reducing backup windows, the focus will be on getting rid of the data that no longer needs to be backed up. If you're like most of the customers we speak with, well over 85% of the data that you backup during your full backup hasn't changed since the last backup and 70% hasn't changed in the last few years. Yet, every week, it's methodically backed up. If you could eliminate this data, that means in a 10 TB environment you could reduce your full backup set to 1.5 TBs, or worst case to 3 TBs. That will have a dramatic and positive impact on your backup window.The secret is archiving. There are two steps to achieve this goal. First, you have to identify and move this data. I went through some of the products that can move data in my entry on Data Keepage. In this entry we will talk about some of the targets available for archiving: Tape, Optical, or Disk.

To determine what kind of archive is best for you, think about what you would use the backup for in this new model. In most cases, 99% of the time you should be using your backups to recover the most recent copy of something; a deleted file or corrupted database, for example. Anything beyond the most recent copy should be in the archive. Then think about what you would use the archive for in this new model -- basically everything else.

If you think about times you've been asked to do a restore of data that is six months old or older, it was usually a specific piece of information. A key component of archive is search; you must be able to search the archive for an extended period of time. Most backup applications have decent search capabilities but don't hold that metadata information for very long. As a result, old restores become a challenge with backup.

Additionally, you may need to get to that information years, possibly decades, from now. You have to make sure that what you store that data on is going to be accessible, years or decades from now. Think about what you wrote data to 15 years ago ... Windows 95 was the hot OS, we thought the Red Sox would never win the World Series, and we were all complaining about the price of gas being $1.30 per gallon. Our tape backup / archive of choice was tape and it was probably DLT, 8MM, or even DDS formats. While not impossible, reading a DLT or DDS tape from 1995 would, at a minimum, certainly be a challenge, but I think I could do a pretty good job getting data off that Windows 95 box if I had to. Given the choice, I would pick the disk, for sure.

I think the same logic applies to disk as an archive. Disk is easy to access and tends to evolve more slowly from a file system format perspective. It is certainly easier to search for and retrieve information from. If disk can overcome the limitations of, well, disk (scalability, reliability and cost), then it could be the ideal target for these long-term archives and cause a significant and near-permanent reduction in the backup window.

Our next entry will examine the disk-based archive concept to see if it can overcome those challenges.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25414
PUBLISHED: 2021-06-17
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
CVE-2021-32078
PUBLISHED: 2021-06-17
An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
CVE-2021-31818
PUBLISHED: 2021-06-17
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
CVE-2021-34825
PUBLISHED: 2021-06-17
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
CVE-2021-32944
PUBLISHED: 2021-06-17
A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service c...