Key Steps for Disaster Recovery Scheme Design (Reposted)

xiaoxiao2021-03-06  108

For a company, the most serious problem is not from how to recover the data from the tape, but from:

1, lack, or even complete recovery plans and measures;

2. When reconfiguring the hardware, you can't find the original system configuration and setup document;

3, tape document, archiving, and tracking the lack of related materials, or incomplete tape archive strategies;

4. It is not sufficient to protect the department-level server protection.

# 1 - Documentation and Archive System Configuration

Successful business applications and data recovery, starting with a complete system configuration record document, including over time, system configuration is changed logging. Once these documents are created, at least one copy must be stored in the same place to prevent local documents and their copies are damaged or destroyed.

Create a document and archive the document in all places, which is a key step in reconstructing the system quickly and effectively. If there is a scheme that can be restored by bare devices, you can directly load the recorded system configuration on the disk, providing automatic reconstruction for new devices, will provide higher value for the rebuild of critical application servers.

# 2 - Procedure for documentation and archiving disaster recovery

In order to ensure the successful recovery of the business, a simple-effective disaster recovery procedure must be established, and the document is established in strict accordance with the established procedure, and safely saved safely with the business critical data. This avoids the repeated recovery test of "touching the stone crossing the river".

# 3 - Safety measures, documentation and tape media tracking

A successful plan for business disasters, should include strategies and procedures for deploying tape and document their tape contents. If there is no document that records tape content, you need a large amount of time to index and read these tapes in recovery to find important data hidden in it. This will greatly delay the recovery of the system and data.

Depending on the needs of the business, the frequency of the tape is stored is required; the tape content must be set; the document must be safe and easy to remove; at the same time, the tape must be tracked.

All these steps are required for data security and ensure effective recovery.

# 4 - Discount and protect all business critical servers

For the uninterrupted business, all department-level servers running business, including Email servers, small database servers, and other servers running special applications, the same as the infrastructure of the data center, must be quickly recovered.

Sadly, in most cases, companies do not consider protecting these systems. In fact, these portions should be exactly the same as the enterprise data center, and file their protection procedures and implementations in the same plan.

Any server in use, as well as each desktop and carrier system, is worth protection from a sense. The most basic data protection guarantees some degree of recovery. Further, bare equipment recovery can ensure that the critical application server is restored and rebuild with the least worker and experience, and only a small amount of trace device recovered the document of the disk itself.

# 5 - Online data protection is more resilient

Online data protection is an important supplement to data tape protection, which is especially critical to ensure business operation in the process of recovery from disasters. To recover your business within hours after the disaster, there must be an online, off-site production data available copies. As long as there is such a second, third copies, the data is transferred to the off-site storage device via the network, depending on whether it is embedded in the storage hardware, or hooks the replication technology running on the storage server, Maintain interruptions are restored within a few minutes. Since this data is real-time and online, the business host is redirected is immediate available. This approach can separate the area of ​​business operations and disasters, with lower pressures, and reconstruct the data center and their business operations.

Automation tools that ensure continuous monitoring, data coherence, and availability are critical. By important experience gained from a large number of disaster events, we believe that the above means can protect the business operations of the company.

Successful recovery

In order to better deal with any disaster, ensure successful recovery, business operation requires a data protection plan including policies, programs, and related technologies. In addition to classic data backup technologies, the solution to "Prespive Buddha" is guaranteed quickly, avoiding recovery of "Holding Buddha", including:

* Media management scheme, including tape tracking technology,

* Solutions for bare equipment recovery

* Real-time data replication scheme

* Wide area cluster technical solution

转载请注明原文地址:https://www.9cbs.com/read-126038.html

New Post(0)