Module 5 San Local Repli
Module 5 San Local Repli
LOCAL REPLICATION
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 1
Module 11: Local Replication
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 2
Module 11: Local Replication
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 3
What is Replication?
Replication
REPLICATION
EMC Proven Professional
Source Replica (Target)
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 4
Replication terminologies
• Source
• Target
• PIT
• Recoverability and Restartatblity
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 5
Uses of Local Replica
• Alternate source for backup
• Fast recovery
• Decision support activities
• Testing platform
• Data Migration
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 6
Replica Characteristics
• Recoverability/Restartability
Replica should be able to restore data on the source device
Restart business operation from replica
• Consistency
Replica must be consistent with the source
• Choice of replica tie back into RPO
Point-in-Time (PIT)
Non-zero RPO
Continuous
Near-zero RPO
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 7
Understanding Consistency
• Consistency ensures the usability of replica
• Consistency can be achieved in various ways for file system and
database
Offline Online
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 8
File System Consistency: Flushing Host Buffer
Application
Source Replica
EMC Proven Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 9
Database Consistency: Dependent Write I/O Principle
Source Replica Source Replica
1 1 1
2 2 2
3 3 3 3
4 4 4 4
CC
EMC Proven Professional
Consistent D Inconsistent
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 10
Module 11: Local Replication
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 11
Host-based Replication: LVM-based Mirroring
Physical
Volume 1
Logical Volume
Physical
Volume 2
Host
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 12
Host-based Replication: File System Snapshot
• Pointer-based replication FS Snapshot
• Uses Copy on First Write Metadata
(CoFW) principle Production FS Bit BLK
• Uses bitmap and block map Metadata 1-0 1-0
2 Data c
3 no data
EMC Proven Professional N Data N 4 no data
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 13
Storage Array-based Local Replication
• Replication performed by the array operating environment
• Source and replica are on the same array
• Types of array-based replication
Full-volume mirroring
Pointer-based full-volume replication
Pointer-based virtual replication
Source Replica
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 14
Full-Volume Mirroring
Attached
Source Target
Detached - PIT
Read/Write Read/Write
Source Target
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 15
Pointer-based Full-Volume Replication
• Provides full copy of source data on the target
• Target device is immediately accessible by the BC host after the
replication session is activated
• PIT is determined by time of session activation
• Target device is at least as large as the source device
• Two modes
Full copy mode
After session starts, all the data from source is copied to the target in
the background
Copy on First Access (deferred)
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 16
Copy on First Access: Write to the Source
Write to
Source
C’ A C
B
C’ C
Source Target
• When a write is issued to the source for the first time after replication
session activation:
Original data at that address is copied to the target
Then the new data is updated on the source
This ensures that original data at the point-in-time of activation is preserved
EMC Proven
on Professional
the target
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 17
Copy on First Access: Write to the Target
Write to
Target
A B B’
B B’
C’ C
Source Target
• When a write is issued to the target for the first time after replication
session activation:
The original data is copied from the source to the target
Then the new data is updated on the target
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 18
Copy on First Access: Read from Target
Read
request for
data “A”
A A A A
B B’
C’ C
Source Target
• When a read is issued to the target for the first time after replication
session activation:
The original data is copied from the source to the target and is made
available to the BC host
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 19
Pointer-based Virtual Replication
• Targets do not hold data, but hold pointers to where the data is
located
At the start of the session the target device holds pointers to data
on source device
Target requires a small fraction of the size of the source volumes
• Target devices are accessible immediately when the session is
started
• Uses CoFW principle
• This method is recommended, if the changes to the source are
typically less than 30%
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 20
Pointer-based Virtual Replication (CoFW): Write to Source
Save Location
Source
Target
Virtual Device
A
B C
C’
C’ C
Write to Source
• When a write is issued to the source for the first time after replication
session activation:
Original data at that address is copied to save location
The pointer in the target is updated to point to this data in the save
location
EMC Proven Professional
Finally, the new write is updated on the source
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 21
Pointer-based Virtual Replication (CoFW): Write to Target
A’ Write to Target
Save Location
Source
Target
Virtual Device
A
A’
A
B A
C’ C
• When a write is issued to the target for the first time after replication
session activation:
Original data from the source device is copied to the save location
The pointer is updated to the data in save location
Another
EMC Proven copy
Professional of the original data is created in the save location before
the new write is updated on the save location
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 22
Tracking Changes to Source and Target
Source 0 0 0 0 0 0 0 0
At PIT
Target 0 0 0 0 0 0 0 0
Source 1 0 0 1 0 1 0 0
After PIT…
Target 0 0 1 1 0 0 0 1
For resynchronization/restore
Logical OR 1 0 1 1 0 1 0 1
unchanged
0 changed
1
EMC Proven Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 23
Restore and Restart Considerations
• Source has a failure
Logical corruption or physical failure of source devices
• Solution
Restore data from target to source
Restore would typically be done incrementally
Applications can be restarted even before synchronization is
complete
-----OR------
Start production on target
Create a “Gold” copy of target device before restarting on target
Resolve issues with source while continuing operations on target
After resolving the issue, restore latest data on target to source
EMC Proven Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 24
Comparison of Local Replication Technologies
Pointer-based
Full-Volume Pointer-based Full-Volume
Factor Virtual
Mirroring Replication
Replication
Performance
Full copy mode – no impact
impact on source No impact High impact
CoFA mode – some impact
due to replica
At least the same At least the same as the Small fraction
Size of target
as the source source of the source
Availability of Full copy mode – not
source for Not required required Required
restoration CoFA mode – required
Only after
Accessibility to synchronization Immediately
Immediately accessible
target and detachment accessible
from the source
EMC Proven Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 25
Network-based Local Replication: Continuous Data
Protection
• Replication occurs at the network layer between the hosts and
storage arrays
Ideal for highly heterogeneous environment
• Typically provides the ability to restore data to any previous
point-in-time
RPOs are random and do not need to be defined in advance
• Data changes are continuously captured and stored in a separate
location from the production data
• CDP is implemented by using
Journal volume
CDP appliance
EMC Write
Proven splitter
Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 26
CDP Local Replication Operation
Host
Write
Splitter
SAN
CDP Appliance
Storage Array
EMC Proven Professional
Production Replica CDP Journal
Volume
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 27
Module 11: Local Replication
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 28
Local Replication in Virtualized Environment
• Local replication (mirroring) of a virtual volume assigned to a
host
Mirroring is performed by a virtualization appliance
• Replication of virtual machines
VM snapshot
VM clone
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 29
Local Replication of Virtual Volume
Data Center
Host
I/Os
Mirrored
Virtualization Virtual Volume
Appliance
Storage
Pool
SAN
LUN LUN
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 30
VM Snapshot
• Captures the state and data of a running VM at a specific PIT
• Uses a separate delta file to record all the changes to the virtual
disk since the snapshot session is activated
• Restores all settings configured in a guest OS to the PIT
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 31
VM Clone
• An identical copy of an existing VM
Clones are created for different use such as testing
Changes made to a clone VM do not affect the parent VM and vice
versa
• Clone VM is assigned a separate network identity
Clone has its own separate MAC address
• Useful when multiple identical VMs need to deploy
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 32
Module 11: Local Replication
Concept in Practice
• EMC SnapView
• EMC TimeFinder
• EMC RecoverPoint
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 33
EMC SnapView
• SnapView Snapshot Full image
copy
Logical view of the production volume
Uses CoFW principle
• SnapView Clone Clone
Snap
Logical point-
EMC Proven Professional in-time view
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 34
EMC TimeFinder
• TimeFinder/Snap
Creates space-saving, logical PIT (snapshots)
Allows creating multiple snapshots from a single source
• TimeFinder/Clone
Creates PIT copy of the source volume
Uses pointer-based full-volume replication technology
Allows creating multiple clones from a single source device
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 35
EMC RecoverPoint
• Provides continuous data protection and recovery to any PIT
• Uses splitting technology at server, fabric, or array to mirror a
write to a RecoverPoint appliance
• Provides automatic RecoverPoint appliance failover
• Family of product includes
RecoverPoint/CL
RecoverPoint/EX
RecoverPoint/SE
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 36
Module 11: Summary
Key points covered in this module:
• Uses of local replicas
• Consistency in file system and database replication
• Host-based, storage array-based, and network-based replication
• Restore and restart considerations
• Local replication of a virtual volume
• VM snapshot and VM clone
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 37
Exercise: Local Replication
• Scenario
Organization’s mission critical data is stored on RAID 1 volumes
Database application uses 1TB storage
Average data that changes in 24 hours is 60 GB
• Requirements
Need solution to address logical corruption of database
Maximum RPO of 1 hour
Solution should support restore request for up to 8 hours old data
Minimize the amount of storage used for data protection
• Task
Suggest an appropriate local replication solution to meet RPO
requirement with minimum amount of storage
Estimate the physical storage required by this solution
EMC Proven Professional
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 11: Local Replication 38