SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
Performing Sandboxed
Testing with PlateSpin Forge                            ®




Scott Nocent              Lubomyr Salamakha
scott.nocent@novell.com   lubomyr.salamkha@novell.com
Technology Overview
What is a Server Workload?

                                              Server


                                               Data

                                            Applications

                                          Operating System




     A workload is the operating system, applications and
     data that reside on a physical server or virtual host.


3   © Novell, Inc. All rights reserved.
Disaster Recovery
The Need for Protection

    76%                    of enterprises have declared a disaster or
                           experienced a major business disruption*
                           Power Failure 42% - Natural Disaster 33% - IT Hardware Failure 31%




    87% Disaster recovery capabilities was critical**
                           Of enterprises have indicated that improving

                           Cost of Downtime 56% - Improving Mission Critical Availability 52% -
                           Requirement to Stay Online 24/7 48% - Increased Risk 44%



    *April 3, 2008 – Building The Business Case for Disaster Recovery Spending – Forrester
    **June 5, 2008 – The Forrester Wave: Disaster Recovery Services Providers, Q2 2008 – Forrester


5   © Novell, Inc. All rights reserved.
Traditional Approaches
How to Be Protected




                                          DR by Duplication


                                          DR by Back-up
7   © Novell, Inc. All rights reserved.
DR by Duplication

    •   Focus is on protecting application
         –   Local cluster
         –   Duplicate hot site


    •   High performance, but at what price?
         –   Near zero RTO, RPO


    •   High cost
         –   Duplicate infrastructure
         –   Cost x2


8   © Novell, Inc. All rights reserved.
DR by Back-up

    •   Focus is on protecting data
         –   Tape back-up
         –   Imaging


    •   Poor performance
         –   Slow RTO, RPO (days)


    •   Cost effective, but at what price?
         –   How do we get the data back in to a useable state?
         –   How long to rebuild the server?


9   © Novell, Inc. All rights reserved.
Cost/Performance Creates a Gap

                   DR by                               DR by
                 Duplication                          Back-up

        Very High Cost                       Low Cost

        Duplicate Infrastructure             Tape Back-up or
                                             Imaging
        Near-zero Recovery is
        Crucial                              Recovery in Days is
                                             Tolerable
        Server/Application
        Protection                           Data Protection
                 Tier 1             Tier 2   Tier 4    Tier 3   Tier 5



10   © Novell, Inc. All rights reserved.
The Solution
Consolidated Recovery
     Leveraging Virtual Infrastructure for Protection of Physical servers


                                                            Solution
                                                             –   Inventory and monitor to
                                                                 plan recovery environment
                                                             –   Live replication of workload
                                                                 into an off-line virtual machine
                                                             –   One click test restore and failover

                                                            Benefits
                                                             –   Drastically reduce TCO and
                                              Virtual            RTO while achieving whole
                                           Recovery Hosts        workload protection
                                                             –   Improving RPO through
                                                                 incremental synchronization
                                                             –   Simplify testing with
                                                                 bootable backups
      Physical Production
           Servers
12   © Novell, Inc. All rights reserved.
PlateSpin Solves 3 Challenges         ®




                                           Cost                           Performance
                                   Protects more                                 Reduce recovery
                                   server for less                                time from days
                                                                                     to minutes
                                                       Consolidated
                                                         Disaster
                                                        Recovery



                                                             Risk
                                                         Test recovery plans
                                                     to ensure you're prepared



13   © Novell, Inc. All rights reserved.
Protection Candidates

     Protection for middle tier servers


                                           99.99% or better
                                           (less than 1 hour per year)
       cost




                                           97%-99.99%
                                           (between 1 hour and
                                           11 days per year)



                                           97% or worse
                                           (11 days per year)




14   © Novell, Inc. All rights reserved.
Workload Protection with PlateSpin Forge   ®
PlateSpin Forge Workload Protection:       ®



     A 4-Step Process

                                 Add Workload


                                 Configure Protection


                                           Prepare Replication


                                               Run Replication
16   © Novell, Inc. All rights reserved.
Step 1: Add Workload
Step 1: Add Workload

     Adding a Workload:                        Forge Server
     •   User connects to
         PlateSpin Forge                   ®




     •   User executes
         “Add Workload” command                     H
                                                    T
     •   Forge connects to the primary              T    WMI/Remote Registry
         workload using WMI and                     P
         remote registry queries and                S
         obtains inventory information
     •   The primary workload                  Add Workload
         information is compiled by
         Forge and stored in its SQL
         database
                                                                         Primary
                                               Forge User
                                                                         Workload
18   © Novell, Inc. All rights reserved.
Step 1: Add Workload

     •   Click on ‘Add Workload’ button from Forge Dashboard or
         Workload Page
     •   Enter Local Admin or Domain Admin credentials and click ‘Submit’
     •   WMI must be enabled and running on the source




19   © Novell, Inc. All rights reserved.
Step 1: Add Workload

     •   PlateSpin Forge will validate the provided
                                           ®



         credentials against the Primary Workload




20   © Novell, Inc. All rights reserved.
Step 1: Add Workload

     •   The Add Workload screen will redirect you to the main Workloads
         Page and the ‘Adding Workload’ status will be displayed



     •   Clicking on the workload name will display a progress bar of
         the job




21   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
Step 2: Configure Protection

     Configure Protection:
     •   User executes “Configure Protection” command
     •   Workload Protection Details page appear and filled by the user
     •   Clicking on Save will assign the protection settings to the primary
         workload object in the Forge database




23   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Tier Settings
     •   In this section, configure the workload protection schedule for incremental
         replications and define the workload failure detection interval settings
     •   Either select from existing tiers (Hourly, Nightly, or Weekly),
         user-created Tiers or create a one-time tier by selecting Custom
     •   Tiers can be changed at any time




24   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Replication Settings
     •   In this section, select the transfer method, the network
         to use for replication, and which volumes to copy




25   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Replication Settings – Transfer Methods
     •   PlateSpin Forge provides three live transfer
                                           ®



         methods for replicating workloads:
          –   File based
          –   Snapshot based (VSS)
          –   Block based




26   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Source Credentials
     •   This section prompts for administrative credentials
         for the Primary Workload




27   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Replication Settings – Replication Network

     •   In this section, configure the network settings which
         will be used during replication




28   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Replication Settings – Protected Volumes
     •   In this section, select which volumes on the
         Primary Workload should be protected
     •   System Volume cannot be unchecked




     •   The Non-Volume Partition section displays all
         non-volume partitions detected on the workload. For
         example, vendor partitions



29   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Replication Settings – Services to Stop
     During Replication
     •   This section allows one to define which services to
         stop on the Primary Workload during the replication




30   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Failover Settings
     •   In the Failover Settings section users define the
         configuration of the Recovery Workload during a Failover




31   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Failover Settings – Target Services
     •   In this section, specify the virtual network the Recovery
         Workload will use during the Prepare for Failover stage




32   © Novell, Inc. All rights reserved.
Step 2: Configure Protection
     Test Failover Settings
     •   Test Failover Settings define which settings the
         recovery workload will use during a ‘Test Failover’ job




33   © Novell, Inc. All rights reserved.
Step 2: Configure Protection

     •   Three commands are available at the bottom of the Workload
         Configuration page



     •   Once the workload protection settings have been saved, an overview
         screen will be displayed with three actionable workload commands




     •   To change the protection settings scroll up and click on Edit




34   © Novell, Inc. All rights reserved.
Step 3: Prepare Replication
Step 3: Prepare Replication

     Prepare Replication:                        Forge Server

     •   User executes “Prepare
         Replication” command
     •   A PlateSpin Controller is®


                                                       H
         deployed to the                               T
         Primary Workload                              T
                                                       P
     •   PlateSpin Replication                         S
         software is deployed to
         the Primary Workload
                                               Prepare Replication
     •   The Recovery Workload shell
         is built and stored on the
         PlateSpin Forge Appliance         ®

                                                                     Primary
                                                  Forge User
                                                                     Workload
36   © Novell, Inc. All rights reserved.
Step 3: Prepare Replication

     •   To start the preparation, click on Prepare Replication
         and Execute in the Command Confirmation screen
         Prepare Replication

     •   The WUI will switch to
         the Workloads Page
         displaying “Preparing
         Replication” under the
         Replication Status column




37   © Novell, Inc. All rights reserved.
Step 4: Run Replication
Step 4: Run Replication
                                             Forge Server
     Run Replication:

     •   User executes “Run
         Replication” command
                                                   H
     •   The Recovery Workload boots               T
         and a local controller is created         T
                                                   P
                                                   S
     •   Data replication between the
         Primary Workload and the
         Recovery Workload is initiated.
                                             Run Replication
         Both controllers report the
         replication metrics (transfer
         speed, total files, etc.) to the
                                                               Primary
         Forge Management VM                  Forge User
                                                               Workload

39   © Novell, Inc. All rights reserved.
Step 4: Run Replication

     •   To start the replication, click on Run Replication and
         Execute in the Command Confirmation screen




     Upon executing the command the WUI
     will switch to the main Workloads page
     displaying “Running First Replication”
     under Replication Status column




40   © Novell, Inc. All rights reserved.
Sandboxed Testing – Test Failover
Test Failover
                                                Forge Server
     Test Failover Process:
     •   User executes
         “Test Failover” command
     •   PlateSpin Forge boots and     ®



         configures the Recovery workload            H
         and connects it to the internal             T
         test network                                T
                                                     P
     •   User connects to the workload               S
         using VMware Virtual
         Infrastructure client and validates
                                                Test Failover
         the workload functionality
     •   User marks the test result and shuts
         down the Recovery Workload
                                                                Primary
                                                Forge User
     •   PlateSpin Forge restores the                           Workload
         recovery workload to its last
         “known good state”

42   © Novell, Inc. All rights reserved.
Test Failover

                    Test Failover




     •   Clicking on the
         workload name will
         display the job
         progress indicator

     •   Email is sent when the
         workloadis ready for
         inspection

43   © Novell, Inc. All rights reserved.
Test Failover




44   © Novell, Inc. All rights reserved.
Test Failover – Reporting

     •   Current Protection Status report provides a comprehensive
         view of workloads’ failover test




45   © Novell, Inc. All rights reserved.
Demo
Where Forge Fits
How Novell Delivers Intelligent           ®



     Workload Management
     Build                           Secure                  Manage                  Measure
     SUSE Linux
             ®                       Novell Identity
                                           ®                 PlateSpin Migrate
                                                                      ®              Novell Business Service
                                                                                           ®



     Enterprise Server               Manager                                         Manager
                                                             PlateSpin Orchestrate
                                                                      ®



     SUSE Studio                     Novell Access
                                           ®                                         Novell Business Service
                                                                                           ®



                                     Manager                 ZENworks     ®
                                                                                     Level Manager  ™


     SUSE Linux                                              Configuration
     Enterprise JeOS                 Novell Roles Based
                                           ®                 Management              Novell Business
                                                                                           ®



                                     Provisioning Module                             Experience Manager      ™


     ZENworks       ®                                        PlateSpin Recon
                                                                      ®



     Configuration                   Novell Access
                                           ®                                         Novell myCMDB
                                                                                           ®
                                                                                                         ™



     Management                      Governance Suite        PlateSpin Protect
                                                                      ®



                                                                                     Novell Sentinel
                                                                                           ®
                                                                                                     ™



     SUSE Appliance                  Novell Privileged       PlateSpin Forge  ®




     Toolkit                         User Manager                                    Novell Sentinel Log
                                                                                           ®
                                                                                                     ™


                                                             PlateSpin “Atlantic”
                                                                      ®
                                                                                     Manager
     Novell Workshop
             ®                       Novell SecureLogin
                                           ®             ®


                                                             PlateSpin “BlueStar”
                                                                      ®
                                                                                     Novell Compliance
                                     Novell Cloud
                                           ®                                         Automation
                                     Security Service        ZENworks “Workbench”
                                                                          ®




                                                                                     * Available by end of 2010

48   © Novell, Inc. All rights reserved.
Performing Sandboxed Testing with PlateSpin Forge
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcaststefriche0199
 
ttec infortrend ds
ttec infortrend dsttec infortrend ds
ttec infortrend dsTTEC
 
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1IBM India Smarter Computing
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony VTTEC
 
Best Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxBest Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxNovell
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un pptGerardo Lema
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesNovell
 
Manage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarManage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarHitachi Vantara
 
IBM System z - zEnterprise a future platform for enterprise systems
IBM System z - zEnterprise a future platform for enterprise systemsIBM System z - zEnterprise a future platform for enterprise systems
IBM System z - zEnterprise a future platform for enterprise systemsIBM Sverige
 
SAP Virtualization Week 2012 - The Lego Cloud
SAP Virtualization Week 2012 - The Lego CloudSAP Virtualization Week 2012 - The Lego Cloud
SAP Virtualization Week 2012 - The Lego Cloudaidanshribman
 
Nevmug Left Hand Tower Publishing January 2009
Nevmug  Left Hand  Tower Publishing January 2009Nevmug  Left Hand  Tower Publishing January 2009
Nevmug Left Hand Tower Publishing January 2009csharney
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Novell
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availabilityxmeteorite
 
Tivoli Storage Productivity Center... What’s new in v4.2.2?
Tivoli Storage Productivity Center... What’s new in v4.2.2?Tivoli Storage Productivity Center... What’s new in v4.2.2?
Tivoli Storage Productivity Center... What’s new in v4.2.2?IBM India Smarter Computing
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
 
Vspp summary master_presentation_june_13,_2011
Vspp summary master_presentation_june_13,_2011Vspp summary master_presentation_june_13,_2011
Vspp summary master_presentation_june_13,_2011Matthieu DEMOOR
 

La actualidad más candente (19)

Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
 
ttec infortrend ds
ttec infortrend dsttec infortrend ds
ttec infortrend ds
 
102 1600-1630
102 1600-1630102 1600-1630
102 1600-1630
 
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1
Linux on System z Optimizing Resource Utilization for Linux under z/VM - Part1
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony V
 
Best Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on LinuxBest Practices for Novell GroupWise on Linux
Best Practices for Novell GroupWise on Linux
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un ppt
 
XS Oracle 2009 PVOps
XS Oracle 2009 PVOpsXS Oracle 2009 PVOps
XS Oracle 2009 PVOps
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
Manage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinarManage rising disk prices with storage virtualization webinar
Manage rising disk prices with storage virtualization webinar
 
IBM System z - zEnterprise a future platform for enterprise systems
IBM System z - zEnterprise a future platform for enterprise systemsIBM System z - zEnterprise a future platform for enterprise systems
IBM System z - zEnterprise a future platform for enterprise systems
 
SAP Virtualization Week 2012 - The Lego Cloud
SAP Virtualization Week 2012 - The Lego CloudSAP Virtualization Week 2012 - The Lego Cloud
SAP Virtualization Week 2012 - The Lego Cloud
 
Nevmug Left Hand Tower Publishing January 2009
Nevmug  Left Hand  Tower Publishing January 2009Nevmug  Left Hand  Tower Publishing January 2009
Nevmug Left Hand Tower Publishing January 2009
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availability
 
Tivoli Storage Productivity Center... What’s new in v4.2.2?
Tivoli Storage Productivity Center... What’s new in v4.2.2?Tivoli Storage Productivity Center... What’s new in v4.2.2?
Tivoli Storage Productivity Center... What’s new in v4.2.2?
 
Adv prod tools-assgn4
Adv prod tools-assgn4Adv prod tools-assgn4
Adv prod tools-assgn4
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 
Vspp summary master_presentation_june_13,_2011
Vspp summary master_presentation_june_13,_2011Vspp summary master_presentation_june_13,_2011
Vspp summary master_presentation_june_13,_2011
 

Similar a Performing Sandboxed Testing with PlateSpin Forge

Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with PlatespinAdvanced Logic Industries
 
Learn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinarLearn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinarHitachi Vantara
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201Michael Hudak
 
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAndrew Miller
 
Virtualizing Mission-critical Workloads: The PlateSpin Story
Virtualizing Mission-critical Workloads: The PlateSpin StoryVirtualizing Mission-critical Workloads: The PlateSpin Story
Virtualizing Mission-critical Workloads: The PlateSpin StoryNovell
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012asedha
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solutionmuralis3
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the CouchNovell
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM1CloudRoad.com
 
The fantastic 12 of sql server 2012
The fantastic 12 of sql server 2012The fantastic 12 of sql server 2012
The fantastic 12 of sql server 2012Medyasoft
 
Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2종필 김
 
Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333종필 김
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage VirtualizationIBM Danmark
 
EMC: Business Continuity a Disaster Recovery pre virtuálne prostredia
EMC: Business Continuity a Disaster Recovery pre virtuálne prostrediaEMC: Business Continuity a Disaster Recovery pre virtuálne prostredia
EMC: Business Continuity a Disaster Recovery pre virtuálne prostrediaASBIS SK
 

Similar a Performing Sandboxed Testing with PlateSpin Forge (20)

Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization Initiative
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
 
Learn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinarLearn the facts about replication in mainframe storage webinar
Learn the facts about replication in mainframe storage webinar
 
The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201The Best Storage For V Mware Environments Customer Presentation Jul201
The Best Storage For V Mware Environments Customer Presentation Jul201
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + TechnologyAITP July 2012 Presentation - Disaster Recovery - Business + Technology
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
 
VMworld 2011 (BCO3276)
VMworld 2011 (BCO3276)VMworld 2011 (BCO3276)
VMworld 2011 (BCO3276)
 
CS_10_DR_CFD
CS_10_DR_CFDCS_10_DR_CFD
CS_10_DR_CFD
 
Streamline it & save with virtualization
Streamline it & save with virtualizationStreamline it & save with virtualization
Streamline it & save with virtualization
 
Virtualizing Mission-critical Workloads: The PlateSpin Story
Virtualizing Mission-critical Workloads: The PlateSpin StoryVirtualizing Mission-critical Workloads: The PlateSpin Story
Virtualizing Mission-critical Workloads: The PlateSpin Story
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the Couch
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
The fantastic 12 of sql server 2012
The fantastic 12 of sql server 2012The fantastic 12 of sql server 2012
The fantastic 12 of sql server 2012
 
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
 
Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2
 
Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage Virtualization
 
EMC: Business Continuity a Disaster Recovery pre virtuálne prostredia
EMC: Business Continuity a Disaster Recovery pre virtuálne prostrediaEMC: Business Continuity a Disaster Recovery pre virtuálne prostredia
EMC: Business Continuity a Disaster Recovery pre virtuálne prostredia
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Performing Sandboxed Testing with PlateSpin Forge

  • 1. Performing Sandboxed Testing with PlateSpin Forge ® Scott Nocent Lubomyr Salamakha scott.nocent@novell.com lubomyr.salamkha@novell.com
  • 3. What is a Server Workload? Server Data Applications Operating System A workload is the operating system, applications and data that reside on a physical server or virtual host. 3 © Novell, Inc. All rights reserved.
  • 5. The Need for Protection 76% of enterprises have declared a disaster or experienced a major business disruption* Power Failure 42% - Natural Disaster 33% - IT Hardware Failure 31% 87% Disaster recovery capabilities was critical** Of enterprises have indicated that improving Cost of Downtime 56% - Improving Mission Critical Availability 52% - Requirement to Stay Online 24/7 48% - Increased Risk 44% *April 3, 2008 – Building The Business Case for Disaster Recovery Spending – Forrester **June 5, 2008 – The Forrester Wave: Disaster Recovery Services Providers, Q2 2008 – Forrester 5 © Novell, Inc. All rights reserved.
  • 7. How to Be Protected DR by Duplication DR by Back-up 7 © Novell, Inc. All rights reserved.
  • 8. DR by Duplication • Focus is on protecting application – Local cluster – Duplicate hot site • High performance, but at what price? – Near zero RTO, RPO • High cost – Duplicate infrastructure – Cost x2 8 © Novell, Inc. All rights reserved.
  • 9. DR by Back-up • Focus is on protecting data – Tape back-up – Imaging • Poor performance – Slow RTO, RPO (days) • Cost effective, but at what price? – How do we get the data back in to a useable state? – How long to rebuild the server? 9 © Novell, Inc. All rights reserved.
  • 10. Cost/Performance Creates a Gap DR by DR by Duplication Back-up Very High Cost Low Cost Duplicate Infrastructure Tape Back-up or Imaging Near-zero Recovery is Crucial Recovery in Days is Tolerable Server/Application Protection Data Protection Tier 1 Tier 2 Tier 4 Tier 3 Tier 5 10 © Novell, Inc. All rights reserved.
  • 12. Consolidated Recovery Leveraging Virtual Infrastructure for Protection of Physical servers Solution – Inventory and monitor to plan recovery environment – Live replication of workload into an off-line virtual machine – One click test restore and failover Benefits – Drastically reduce TCO and Virtual RTO while achieving whole Recovery Hosts workload protection – Improving RPO through incremental synchronization – Simplify testing with bootable backups Physical Production Servers 12 © Novell, Inc. All rights reserved.
  • 13. PlateSpin Solves 3 Challenges ® Cost Performance Protects more Reduce recovery server for less time from days to minutes Consolidated Disaster Recovery Risk Test recovery plans to ensure you're prepared 13 © Novell, Inc. All rights reserved.
  • 14. Protection Candidates Protection for middle tier servers 99.99% or better (less than 1 hour per year) cost 97%-99.99% (between 1 hour and 11 days per year) 97% or worse (11 days per year) 14 © Novell, Inc. All rights reserved.
  • 15. Workload Protection with PlateSpin Forge ®
  • 16. PlateSpin Forge Workload Protection: ® A 4-Step Process Add Workload Configure Protection Prepare Replication Run Replication 16 © Novell, Inc. All rights reserved.
  • 17. Step 1: Add Workload
  • 18. Step 1: Add Workload Adding a Workload: Forge Server • User connects to PlateSpin Forge ® • User executes “Add Workload” command H T • Forge connects to the primary T WMI/Remote Registry workload using WMI and P remote registry queries and S obtains inventory information • The primary workload Add Workload information is compiled by Forge and stored in its SQL database Primary Forge User Workload 18 © Novell, Inc. All rights reserved.
  • 19. Step 1: Add Workload • Click on ‘Add Workload’ button from Forge Dashboard or Workload Page • Enter Local Admin or Domain Admin credentials and click ‘Submit’ • WMI must be enabled and running on the source 19 © Novell, Inc. All rights reserved.
  • 20. Step 1: Add Workload • PlateSpin Forge will validate the provided ® credentials against the Primary Workload 20 © Novell, Inc. All rights reserved.
  • 21. Step 1: Add Workload • The Add Workload screen will redirect you to the main Workloads Page and the ‘Adding Workload’ status will be displayed • Clicking on the workload name will display a progress bar of the job 21 © Novell, Inc. All rights reserved.
  • 22. Step 2: Configure Protection
  • 23. Step 2: Configure Protection Configure Protection: • User executes “Configure Protection” command • Workload Protection Details page appear and filled by the user • Clicking on Save will assign the protection settings to the primary workload object in the Forge database 23 © Novell, Inc. All rights reserved.
  • 24. Step 2: Configure Protection Tier Settings • In this section, configure the workload protection schedule for incremental replications and define the workload failure detection interval settings • Either select from existing tiers (Hourly, Nightly, or Weekly), user-created Tiers or create a one-time tier by selecting Custom • Tiers can be changed at any time 24 © Novell, Inc. All rights reserved.
  • 25. Step 2: Configure Protection Replication Settings • In this section, select the transfer method, the network to use for replication, and which volumes to copy 25 © Novell, Inc. All rights reserved.
  • 26. Step 2: Configure Protection Replication Settings – Transfer Methods • PlateSpin Forge provides three live transfer ® methods for replicating workloads: – File based – Snapshot based (VSS) – Block based 26 © Novell, Inc. All rights reserved.
  • 27. Step 2: Configure Protection Source Credentials • This section prompts for administrative credentials for the Primary Workload 27 © Novell, Inc. All rights reserved.
  • 28. Step 2: Configure Protection Replication Settings – Replication Network • In this section, configure the network settings which will be used during replication 28 © Novell, Inc. All rights reserved.
  • 29. Step 2: Configure Protection Replication Settings – Protected Volumes • In this section, select which volumes on the Primary Workload should be protected • System Volume cannot be unchecked • The Non-Volume Partition section displays all non-volume partitions detected on the workload. For example, vendor partitions 29 © Novell, Inc. All rights reserved.
  • 30. Step 2: Configure Protection Replication Settings – Services to Stop During Replication • This section allows one to define which services to stop on the Primary Workload during the replication 30 © Novell, Inc. All rights reserved.
  • 31. Step 2: Configure Protection Failover Settings • In the Failover Settings section users define the configuration of the Recovery Workload during a Failover 31 © Novell, Inc. All rights reserved.
  • 32. Step 2: Configure Protection Failover Settings – Target Services • In this section, specify the virtual network the Recovery Workload will use during the Prepare for Failover stage 32 © Novell, Inc. All rights reserved.
  • 33. Step 2: Configure Protection Test Failover Settings • Test Failover Settings define which settings the recovery workload will use during a ‘Test Failover’ job 33 © Novell, Inc. All rights reserved.
  • 34. Step 2: Configure Protection • Three commands are available at the bottom of the Workload Configuration page • Once the workload protection settings have been saved, an overview screen will be displayed with three actionable workload commands • To change the protection settings scroll up and click on Edit 34 © Novell, Inc. All rights reserved.
  • 35. Step 3: Prepare Replication
  • 36. Step 3: Prepare Replication Prepare Replication: Forge Server • User executes “Prepare Replication” command • A PlateSpin Controller is® H deployed to the T Primary Workload T P • PlateSpin Replication S software is deployed to the Primary Workload Prepare Replication • The Recovery Workload shell is built and stored on the PlateSpin Forge Appliance ® Primary Forge User Workload 36 © Novell, Inc. All rights reserved.
  • 37. Step 3: Prepare Replication • To start the preparation, click on Prepare Replication and Execute in the Command Confirmation screen Prepare Replication • The WUI will switch to the Workloads Page displaying “Preparing Replication” under the Replication Status column 37 © Novell, Inc. All rights reserved.
  • 38. Step 4: Run Replication
  • 39. Step 4: Run Replication Forge Server Run Replication: • User executes “Run Replication” command H • The Recovery Workload boots T and a local controller is created T P S • Data replication between the Primary Workload and the Recovery Workload is initiated. Run Replication Both controllers report the replication metrics (transfer speed, total files, etc.) to the Primary Forge Management VM Forge User Workload 39 © Novell, Inc. All rights reserved.
  • 40. Step 4: Run Replication • To start the replication, click on Run Replication and Execute in the Command Confirmation screen Upon executing the command the WUI will switch to the main Workloads page displaying “Running First Replication” under Replication Status column 40 © Novell, Inc. All rights reserved.
  • 41. Sandboxed Testing – Test Failover
  • 42. Test Failover Forge Server Test Failover Process: • User executes “Test Failover” command • PlateSpin Forge boots and ® configures the Recovery workload H and connects it to the internal T test network T P • User connects to the workload S using VMware Virtual Infrastructure client and validates Test Failover the workload functionality • User marks the test result and shuts down the Recovery Workload Primary Forge User • PlateSpin Forge restores the Workload recovery workload to its last “known good state” 42 © Novell, Inc. All rights reserved.
  • 43. Test Failover Test Failover • Clicking on the workload name will display the job progress indicator • Email is sent when the workloadis ready for inspection 43 © Novell, Inc. All rights reserved.
  • 44. Test Failover 44 © Novell, Inc. All rights reserved.
  • 45. Test Failover – Reporting • Current Protection Status report provides a comprehensive view of workloads’ failover test 45 © Novell, Inc. All rights reserved.
  • 46. Demo
  • 48. How Novell Delivers Intelligent ® Workload Management Build Secure Manage Measure SUSE Linux ® Novell Identity ® PlateSpin Migrate ® Novell Business Service ® Enterprise Server Manager Manager PlateSpin Orchestrate ® SUSE Studio Novell Access ® Novell Business Service ® Manager ZENworks ® Level Manager ™ SUSE Linux Configuration Enterprise JeOS Novell Roles Based ® Management Novell Business ® Provisioning Module Experience Manager ™ ZENworks ® PlateSpin Recon ® Configuration Novell Access ® Novell myCMDB ® ™ Management Governance Suite PlateSpin Protect ® Novell Sentinel ® ™ SUSE Appliance Novell Privileged PlateSpin Forge ® Toolkit User Manager Novell Sentinel Log ® ™ PlateSpin “Atlantic” ® Manager Novell Workshop ® Novell SecureLogin ® ® PlateSpin “BlueStar” ® Novell Compliance Novell Cloud ® Automation Security Service ZENworks “Workbench” ® * Available by end of 2010 48 © Novell, Inc. All rights reserved.
  • 50. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.