sc dpm2012 jbuff

Upload: mastersrikanth

Post on 03-Apr-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Sc Dpm2012 Jbuff

    1/35

    Jason Buffington

    Analyst & Lab EngineerEnterprise Strategy Group (ESG)[email protected] / @JBuff

    http://CentralizedBackup.comhttp://TechnicalOptimist.com

    DATA PROTECTION

    IN SYSTEM CENTER 2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    2/35

    ESG Trusted Advisors

    2011 Enterprise Strategy Group 2

    Vendor

    Channel

    End

    User

    Media

    Financial

  • 7/29/2019 Sc Dpm2012 Jbuff

    3/35

    ESG Strategy Cornerstones

    2011 Enterprise Strategy Group 3

  • 7/29/2019 Sc Dpm2012 Jbuff

    4/35

    ESG Coverage Taxonomy

    2011 Enterprise Strategy Group 4

    Universal Topics:

    Virtualization Cloud Green Application Trends GRC* IT Spending Midmarket Channel

    IT Infrastructure

    Servers

    Storage

    Networking

    Client Devices

    IT Operations

    IT Operations Automation

    IT Service Management

    Data Center Power &Cooling

    Data Center Strategy &Best Practices

    Information & RiskManagement

    Security & Privacy

    Data Protection

    Information ManagementSoftware & Services

    Data Management &Business Intelligence

    IT Professional Services, Outsourcing, Customer Service & Support

    Universal Topics:

    Virtualization Cloud Green Application Trends GRC* IT Spending Midmarket Channel

    *Governance, Risk, Management and Compliance

  • 7/29/2019 Sc Dpm2012 Jbuff

    5/35

    SESSION AGENDA

    How DPM fits in the Private Cloud

    How DPM fits in the backup world

    What is new in DPM 2012 Closing Q&A

  • 7/29/2019 Sc Dpm2012 Jbuff

    6/35

    2012 The Enterprise Strategy Group

    Enterprise Strategy Group | Getting to the bigger truth.TM

    2012 IT Spending Intentions

    Survey: Results Summary

    January 2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    7/35

    Most Important IT Priorities for 2012 (top ten)

    ESG Research Report: 2012 IT Spending Intentions Survey

    2012 Enterprise Strategy Group

  • 7/29/2019 Sc Dpm2012 Jbuff

    8/35

    2012 The Enterprise Strategy Group

    Enterprise Strategy Group | Getting to the bigger truth.TM

    Excerpts from

    2010 Data Protection Trends

    ESG Research Report

    http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/

  • 7/29/2019 Sc Dpm2012 Jbuff

    9/35

    Top Areas of Data Protection Investment for 2010

    Source: Research Report: 2010 Data Protection Trends

    2010 Enterprise Strategy Group, Inc. All Rights Reserved

    http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/
  • 7/29/2019 Sc Dpm2012 Jbuff

    10/35

    High Priority Applications from a Data Protection Perspective

    Source: Research Report: 2010 Data Protection Trends

    2010 Enterprise Strategy Group, Inc. All Rights Reserved

    http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/
  • 7/29/2019 Sc Dpm2012 Jbuff

    11/35

    Reasons Organizations Would Replace Current Backup Solution/Vendor

    Source: Research Report: 2010 Data Protection Trends

    2010 Enterprise Strategy Group, Inc. All Rights Reserved

    http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/
  • 7/29/2019 Sc Dpm2012 Jbuff

    12/35

    WITH SYS CTR 2012 YOU MAY ALREADY OWN IT

    Source: Research Report: 2010 Data Protection Trends 2010 Enterprise Strategy Group, Inc. All Rights Reserved

    http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/http://www.enterprisestrategygroup.com/2010/04/2010-data-protection-trends/
  • 7/29/2019 Sc Dpm2012 Jbuff

    13/35

    unofficially short-handed as DPM 2012

    The Data Protection Manager components of

    System Center 2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    14/35

    WHATS NEW IN 2012

    Centralized Management

    Infrastructure Enhancements

    Certificate Based Authentication Smarter Media Co-location

    Workload Enhancements SharePoint Optimized Item-Level Restore Hyper-V ILR with DPM running in a VM Generic Data Source Protection

    Disclaimer: DPM2012 is not yet shippingFeatures/Taxonomy subject to change

  • 7/29/2019 Sc Dpm2012 Jbuff

    15/35

    DPM CENTRALIZED MANAGEMENT

    A single console for the datacenterthat reduces management costs and

    canfit into the existing environmentReduce Management Costs

    Centrally Monitor and manage

    Reduce time for resolving issues

    Work on important issues

    Extensibility

    Single Console for the Datacenter

    Fits into my Environment

    Ticketing System

    Runbooks

  • 7/29/2019 Sc Dpm2012 Jbuff

    16/35

    DPM 2012 CENTRAL CONSOLE

    DEMO

  • 7/29/2019 Sc Dpm2012 Jbuff

    17/35

    REMOTE ADMINISTRATION ANDCHANGE MANAGEMENT

    Too much time spent on establishing RDP connection - RDP connection time is typically 1-2 minutes, if we are lucky to get afree session

    Currently able to monitor and manage customer's onsite deployment entirely using SCOM, SCVMM etc. DPM is the onlyproduct forcing us to persist with RDP access for day to day operations and maintenance.

    Customer Speak

    With DPM 2012 Central Console

    Remotely administer DPM Servers

    Integrated into central console Select and press Manage

    From any Server or Client

    Windows XP, Windows 7 orWindows Server 2008 andabove

    Remotely manage protection for datasources and protection groups fromCentral Console

  • 7/29/2019 Sc Dpm2012 Jbuff

    18/35

    ROLE BASED MANAGEMENT

    DPM mustallow a broad team to access the DPM console in a secure wayeach with their own responsibilities & privileges

    How else can we manage securely?

    I had to request for a security process exception as some members of monitoring team are now DPM admins.

    With DPM 2012 Central Console

    Control operations available to each user.

    Create User Roles (using SCOM) &associate & validate operation privilegesof each role using Claim Based TokenService.

    Designed for the Backup Service Team &not for the consumers of the backupservice

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    19/35

    REMOTE CORRECTIVE ACTIONS

    I do not want to leave the Central Console pane for my frequent tasks

    Please provide the abilityto select a Alert and trigger the Corrective action from the Central Console. If a disk is out of space, allow me to grow it remotely. If my customer needs an ad-hoc Recovery Point, allow me to create one remotely.

    Individually selecting each data source or alerts and triggering the recommended action is a manual overload. DPM needs the ability toselect multiple items and trigger the "recommended action."

    With DPM 2012 Central Console

    You can now run corrective actions onmultiple alerts, without leaving the DPMCentral Console.

    WPF Dialogs are integrated into the

    Centralized management SCOM pack. They talk to the AM service of the

    appropriate DPM Server (usingSCOM SDK) & populates the UIdialog.

    On Click, a SCOM agent task istriggered on the DPM server.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    20/35

    SCOPED TROUBLESHOOTING

    More than half my team spends 75% of their time troubleshooting issues. DPM 2010 has is really stable; but there are various environment &infrastructure issues that need a quick root cause diagnosis.

    In my environment, I have 82 DPM servers with 15 really scaled up DPM servers (1000+ data sources). DPM Central Console should help mequickly find the needle, not just in the hay stack, but in the entire barn.

    With DPM 2012 Central Console

    You can now troubleshoot using a light weightscoped DPM Management Console.

    You can get a scoped troubleshooting viewbased on the context (alert type & error id).

    The user can quickly jump between alerts,

    affected items and the related backup jobs.

    The user can swiftly identify patterns or trends

    Users can now work on multiple issues andswitch context easily.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    21/35

    PUSH TO RESUME BACKUPS

    Once the external/environmental issue causing backups failure is understood and fixed, it takes a lot of effort to look into each failure &invoke the appropriate corrective action.

    With DPM 2012 Central Console

    You dont spend any time to identify & invokethe appropriate Corrective action. Just Click onPush To Resume .

    You are isolated from the complexity of the typeof data source ; type of recovery point ; state of

    replica etc.

    Lesser skilled operators, who are not specialistsin DPM, can now handle most frequent failurescaused by environmental issues, outages ormisconfigurations.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    22/35

    ALERT REDUCTION

    A large number of alerts get generated due to a single root cause like Production Server not available Network, SQL Connection or Storage Outage No Free TapesFor each alert , a ticket gets raised. Each ticket increases the TCO.

    With DPM 2012 Central Console

    You will see substantial reduction in the numberof alerts due to

    Root Cause consolidation: Infra goes badcausing backup failures. Ex: Agent is notresponding : 10 alerts in DPM. Only one inSCOM.

    Logical consolidation: Backup failures sharingsimilar corrective actions. Ex: SQL Connectionrefused.

    SLA consolidation: Alert only when SLAspecific to a type of data source is broken.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    23/35

    ALERT CATEGORIZATION

    In my scaled environment, alerts need to be categorized and associated with the appropriate Admin teams. The Infra Team is responsible for ensuring the core moving parts like, Network, Servers & Libraries up & running. The Monitoring team is responsible for ensuring that the backups succeed

    DPM Central Console should provide easy views to ensure alerts reach the appropriate team ASAP.

    With DPM 2012 Central Console

    Alerts will reach the appropriate team ASAP.

    DPM Admin can create out of the box views tocategorize alerts and also customizable itwithout writing code.

    The Admin can create their own customizableworkspace.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    24/35

  • 7/29/2019 Sc Dpm2012 Jbuff

    25/35

    REMOTE RECOVERY

    Recovery is not necessarily an infrequent operation especially in a scaled environment, such as ours. We have 2 recovery operators in our team & todaytoo much time is spent on

    Finding the DPM Server associated with the data source to be recovered Establishing RDP connection - RDP connection time is typically 2 minutes

    Searching for the data source in DPM Recovery pane.Please make this easier & quickerWe recover all HBI data sources once every 2 weeks for compliance.

    With DPM 2012 Central Console

    Point

    Click

    Recover

    Simply select the data-source and pressRecover

    DPM Central Console transparentlyidentifies the associated DPM Server

    DPM Central console launches the RemoteManagement Console of the associatedDPM server, directly into the Recovery tab,with the data source pre-selected.

    The Recovery Operator selects the PIT &performs the recovery.

    Customer Speak

  • 7/29/2019 Sc Dpm2012 Jbuff

    26/35

    DPM ACTIONS IN OPS-MGR

    Management Tasks

    Manage DPM Server

    Modify Disk Allocation

    Recover Datasource

    Troubleshoot

    scoped console for alert, DS, PS, PG,

    Library, Disk

    Backup Tasks

    Create Recovery Point

    Run Consistency Check

    Resume Backups

    Disk, TAPE Library , PS, PG,

    DPMserver

    Agent Tasks

    Disable, Enable, Refresh

    TAPE Library tasks

    Enable , Disable

    Run Detailed Inventory

    Run fast Inventory

    TAPE Drive tasks

    Clean

    Enable, Disable

    DPM Server Tasks Ping DPM Server

    Rescan disk, library

    Refresh library

    Take Recommended Action

    maps to multiple actions

    Works with

    DPM 2010

    too!

  • 7/29/2019 Sc Dpm2012 Jbuff

    27/35

    CERTIFICATE BASED PROTECTION

    DPM 2010 supported protection of ProductionServers, not in a 2-way trust relationship with domainof DPM Server, using local accounts and NTLM.

    Some organizations dont permit the use of

    local accounts

    DPM

    2010

    DPM 2012 can use Certificates forauthentication for computers in untrusted

    domainsMore Secure also supports protection ofClustered Workloads

    DPM2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    28/35

    TAPE MEDIA CO-LOCATION

    DPM 2010 Supported MediaCo-location at a DPM Server Level

    DPM

    2010

    DPM 2012 has a much simplified

    Media Co-location feature at amore granular (Protection Group)Level

    DPM2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    29/35

    SHAREPOINT ITEM-LEVEL RECOVERY

    DPM 2010 did not require setting up aSharePoint Recovery Farm but mountedSQL Content dB to support for Item LevelRecovery (ILR) of SharePoint backup data

    DPM 2010

    DPM 2012, restore of a 1 MB documenttakes less than 20 secondsDPM 2012

    DPM 2007 used SharePoint Recovery Farmbefore restoring to production farmDPM 2007

  • 7/29/2019 Sc Dpm2012 Jbuff

    30/35

    VIRTUAL PROTECTION

    DPM 2010 protected VMs bycomparing VHD blocks, typicallyonce or twice per day

    DPM

    2010

    DPM 2012 uses normal changed-

    block tracking for blocks, and canbe run more frequently during theday.

    DPM2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    31/35

    VIRTUAL DPM ENHANCEMENTS

    Hyper-V Item Level Recovery (ILR)

    even when DPM is running inside aVM!

  • 7/29/2019 Sc Dpm2012 Jbuff

    32/35

    GENERIC DATA SOURCE PROTECTION

    Generic Framework to support VSS writer-based apps Similar workflow as other DPM workloads

    Capability to use XML to support applications which do nothave a VSS writer

    Supported features Full and Express Full backup,

    incl. replication & consistency checks

    Restore to Original-Location or Recover-as-Files

    Referential Data Sourcese.g. SQL is a referential data source for SharePoint Shared Disk Cluster

    Multi-Domain

    Tape

  • 7/29/2019 Sc Dpm2012 Jbuff

    33/35

    SUPPORTABILITY

    Selectively Kill Jobs In DPM 2010, if a Protection Group had multiple tape jobs running at a

    point of time, the user had to cancel all the tape jobs

    DPM 2012 provides you the capability to selectively pick a tape job and

    cancel it Improved Tape Reliability

    If a tape job fails when DPM tries to write to a Write-Protected tape or aBad tape, DPM 2012 will automatically fire a replacement job by pickingup a different tape

    Smarter Media Co-Location Allows multiple protection groups to share a tape

    Co-locate remote-SQL DBs between DPM servers

  • 7/29/2019 Sc Dpm2012 Jbuff

    34/35

    bit.ly/ESGonDPM2012

  • 7/29/2019 Sc Dpm2012 Jbuff

    35/35

    FOR MORE INFO

    System Center 2012

    blogs.technet.com/SystemCenter

    @System_Center

    Data Protection Manager

    www.microsoft.com/DPM

    blogs.technet.com/DPM

    technet.microsoft.com/DPMsocial.technet.microsoft.com/Forums/en-US/category/DPM

    Enterprise Strategy Group

    www.EnterpriseStrategyGroup.com

    @ESG_Global or #ESGglobal

    Jason Buffington

    Blog CentralizedBackup.com

    Book DataProtectionBible.com

    Email [email protected]

    Twitter @JBuff

    bit.ly/ESGonDPM2012

    http://blogs.technet.com/SystemCenterhttp://twitter.com/System_Centerhttp://www.microsoft.com/DPMhttp://blogs.technet.com/DPMhttp://technet.microsoft.com/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://www.enterprisestrategygroup.com/http://twitter.com/ESG_globalhttp://twitter.com/http://centralizedbackup.com/http://dataprotectionbible.com/mailto:[email protected]://twitter.com/JBuffhttp://bit.ly/ESGonDPM2012http://bit.ly/ESGonDPM2012http://twitter.com/JBuffhttp://twitter.com/JBuffmailto:[email protected]:[email protected]:[email protected]://dataprotectionbible.com/http://centralizedbackup.com/http://twitter.com/http://twitter.com/http://twitter.com/ESG_globalhttp://twitter.com/ESG_globalhttp://www.enterprisestrategygroup.com/http://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://social.technet.microsoft.com/Forums/en-US/category/DPMhttp://technet.microsoft.com/DPMhttp://blogs.technet.com/DPMhttp://www.microsoft.com/DPMhttp://twitter.com/System_Centerhttp://twitter.com/System_Centerhttp://blogs.technet.com/SystemCenterhttp://blogs.technet.com/SystemCenter