You are on page 1of 16

Infrastructure Documentation

Version 1












2

Table of Contents
Cverv|ew of operat|ng env|ronment and conf|gurat|on management part 1 34
laLform ConflguraLlon 3
SysLem 8ecovery procedures backup lnLroducLlon 67

System recovery Gu|de 811
CperaLlon Manuel and proLocol execuLlon 1213
lmplemenLaLlon and besL pracLlces 1413



















3

The vision oI inIrastructure optimization is to build an eIIicient, secure and optimized
inIormation technology (IT) inIrastructure and services in a logical sequence. An optimized IT
inIrastructure is built upon IT standards and ensures conIormation to those standards. With each
level oI optimization, the IT inIrastructure also brings about signiIicant cost reduction, increased
security, and improved availability and manageability.
This is the Iirst oI three resource guides explaining key IT capabilities necessary to move Irom
one oI Iour deIined levels oI IT services to the next more eIIicient and streamlined level oI
services. This document brieIly describes each oI the Iour levels, and explains each capability in
the MicrosoIt Core InIrastructure Optimization Model. It then introduces high-level concepts Ior
planning, building, deploying, and managing these capabilities and provides links to relevant
resources where more detailed and actionable content can be Iound. You can use the inIormation
contained in this guide to help you move Irom the Basic level to the Standardized level.

BPM Solutions InIrastructure Optimization (IO) is structured around three inIormation
technology models: Core InIrastructure Optimization, Application PlatIorm InIrastructure
Optimization, and Business Productivity InIrastructure Optimization. Each oI these IO models
contains Iour levels oI process maturity and capability classiIications as logical groupings oI
requirements Ior each level oI maturity. Core IO Iocuses on the Ioundational elements oI IT
services and components, Application PlatIorm IO Iocuses on best practices Ior soItware
development, and Business Productivity IO Iocuses on the inIrastructure required to maximize
communication, collaboration, and end-user productivity. The Iollowing table highlights the
capabilities oI each IO model.
4

Model CapablllLles

Core lnfrasLrucLure CpLlmlzaLlon Model (Core lCM)
Identity and Access Management
Desktop, Device and Server Management
Data Protection and Recovery
Security and Networking
IT and Security Process



Application PlatIorm InIrastructure Optimization
Model
(AP IOM)

User Experience
SOA and Business Process
Data Management
Development
Business Intelligence



Business Productivity InIrastructure Optimization
Model
(BP IOM)

Collaboration and Communication
Enterprise Content Management
Business Intelligence


The InIrastructure Optimization concept helps customers realize dramatic cost savings Ior their
IT inIrastructure by moving toward a secure, deIined, and highly automated environment. It
prescribes capabilities in a logical sequence to help organizations advance up the levels at a
3

measurable and achievable pace. As a basic IT inIrastructure matures, security improves Irom
vulnerable to dynamically proactive, and administrative and managerial processes change Irom
highly manual and reactive to highly automated and proactive.
BPM Solutions and its partners provide the technologies, processes, and procedures to help
customers move along the inIrastructure optimization path. Processes move Irom Iragmented or
nonexistent to optimized and repeatable. Customers' ability to use technology to improve their
business agility and to deliver business value increases as they move Irom the Basic level to the
Standardized level, to the Rationalized level, and Iinally to the Dynamic level.










6

System backup Introduction
Data Protection and Recovery is the Iourth Core InIrastructure Optimization capability within the
solution that we are oIIering to the Jamaican Customs Department WIS/POS solution.
Challenges Solutions BeneIits

usiness Challenges
No standard data
management policy, which
creates isolated islands oI
data throughout the network
on Iile shares, nonstandard
servers, personal proIiles,
Web sites, and local PCs
Poor or non-existent
archiving and backup
services makes achieving
regulatory compliance
diIIicult
Lack oI disaster recovery
plan could result in loss oI
data and critical systems
IT Challenges
Hardware Iailure or
corruption equates to
catastrophic data loss
Server administration is
expensive
IT lacks tools Ior backup and
restore management



Projects
Implement backup and
restore solutions Ior
critical servers
Consolidate and migrate
Iile and print servers to
simpliIy backup and
restoration
Deploy data protection
tools Ior critical servers












usiness enefits
EIIective data management
strategy drives stability in the
organization and improves
productivity
Standards Ior data management
enable policy enIorcement and
deIine SLAs, improving the
business relationship to IT
Strategic approach to data
management enables better data
recovery procedures, supporting
the business with a robust
platIorm
Organization is closer to
implementing regulatory
compliance
IT enefits
Mission-critical application data
are kept in a saIe place outside oI
the IT location
Basic policies have been
established to guarantee access to
physical media (tapes, optical
devices) when necessary

7





































The Standardized Level in the InIrastructure Optimization Model addresses key areas oI Data
Protection and Recovery, including DeIined Backup and Restore Services Ior Critical Servers. It
requires that your organization has procedures place to manage backup and recovery oI data on
critical servers iI not we will be providing that Iull and complete backup solution.



equirement: Defined Backup and estore Services for Critical Servers
Overvlew
Backup and recovery technologies provide a cornerstone oI data protection strategies that will
help your organization to meet its requirements Ior data availability and accessibility. Storing,
restoring, and recovering data are key storage management operational activities surrounding one
oI the most important business assets: corporate data.
Our Data centers will use redundant components and Iault tolerance technologies (such as server
clustering, soItware mirroring, and hardware mirroring) to replicate crucial data to ensure high
availability. However, these technologies alone cannot solve issues caused by data corruption or
deletion, which can occur due to application bugs, viruses, security breaches, or user errors.
Currently there is a requirement Ior retaining inIormation in an archival Iorm; such; this
requirement will extend to transactional data, documents, and collaborative inIormation such as
e-mail. ThereIore, it is necessary that we have a data protection strategy that includes a
comprehensive backup and recovery scheme to protect data Irom any kind oI unplanned outage
or disaster, or to meet industry requirements Ior data retention.


Phuxe : Axxexx
During the Assess Phase we will continuously examine the business need Ior backup and
recovery and takes inventory oI the current backup and recovery processes in place. Backup
activities ensure that data are stored properly and available Ior both restore and recovery,
according to business requirements. The design oI backup and recovery solutions will take into
account business requirements oI the organization as well as its operational environment.


Phuxe : IJentlfy
The goal oI the IdentiIy Phase oI your backup and recovery solution is to identiIy the targeted
data repositories and prioritize the critical nature oI the data. Critical data should be deIined as
data required Ior keeping the business running and to comply with applicable laws or
regulations. Any backup and recovery solutions that we deployed must be predictable, reliable,
and capable oI complying with regulations and processing data as quickly as possible.
Challenges that we will address in managing data include:
O Managing growth in the volumes oI data.
O Managing storage inIrastructure to improve the quality oI service (QoS) as deIined by
service level agreements (SLAs), while reducing complexity and controlling costs.
O Integrating applications with storage and data management requirements.
O Operating within short, or nonexistent, data backup windows.
O Supporting existing IT systems that cannot run the latest technologies.
O Managing islands oI technology that have decentralized administration.
O Assessing data value so that the most appropriate strategies can be applied to each type oI
data.
While the backup and restoring oI all organizational data oI the Jamaica Customs Department is
important, these next topics addresses the backup and restore policies and procedures we shall
implement Ior critical services to successIully move Irom a Basic level to a Standardized level.
10

Phuxe : Fvuluute unJ Plun
In the Evaluate and Plan Phase, we take into account several data points to determine the
appropriate backup and recovery solution Ior your organization. These requirements can include:
O How much data to store.
O Projected data growth.
O Backup and restore perIormance.
O Database backup and restore needs.
O E-mail backup requirements.
O Tables Ior backups and restores.
O Data archiving (oII-site storage) requirements.
O IdentiIication oI constraints.
O Select and acquire storage inIrastructure components.
O Storage monitoring and management plan.
O Testing the backup strategy.
Backup Plan
In developing a backup and recovery plan Ior critical servers we consider these Iactors:
O Backup mode
O Backup type
O Backup topology
O Service plan
11

BPM Solutions` Data Protection Manager (BDPM) is a server soItware application that enables
disk-based data protection and recovery Ior Iile servers in the network.

Bockup HoJes
The backup mode determines how the backup is carried out in relation to the data that is being
backed up. There are two ways in which data backups can take place:
O nline ackups. Backups are made while data is still accessible to users.
O ffline ackups. Backups are made oI data that is Iirst rendered inaccessible to users.
Bockup Types
'arious types oI backups can be used Ior online and oIIline backups. An individual
environment`s SLA, backup window, and recovery time requirement determine which method or
combination oI methods is optimal Ior that environment.
O ull ackup. Will capture all Iiles on all disks.
O Incremental ackup. Will captures Iiles that have been added or changed since the last
incremental backup.
O ifferential ackup. Will captures Iiles that have been added or changed since the last
Iull backup.
12

Bockup Topoloqies
Originally, the only type oI storage technology that required backup involved hard disks
connected directly to storage adapters on servers. Today, this kind oI storage is known as direct-
attached storage, or DAS. The backup and recovery landscape has changed markedly with the
development oI technologies such as Storage Area Network (SAN) and Network Attached
Storage (NAS). SAN environments in particular provide a signiIicant opportunity to optimize
and simpliIy the backup and recovery process.
O ocal Server ackup and Recovery (S). Each server is connected to its own backup
device.
O ased ackup and Recovery (S). This is a multi-tier architecture in which
some backup servers kick oII jobs and collect metadata about the backed-up data (also
known as control data) while other servers (designated as media servers) perIorm the
actual job oI managing the data being backed up.

13

O Sased ackup and Recovery. In this topology you have the ability to move the
actual backup copy operation Irom the production host to a secondary host system.

ervice Plon
We consider many Iactors when designing your backup and recovery service. Among the Iactors
we consider are:
O ast backup and Iast recovery priorities Recovery Time Objective (RTO).
O The Irequency with which data changes.
O Time constraints on the backup operation.
O Storage media.
O Data retention requirements.
O Currency oI recovered data Recovery Point Objective (RPO).
14

WcovW^ Plan
Even the best backup plan can be ineIIective iI we don`t have a recovery plan in place.
ollowing are some oI the elements oI our data recovery plan.
erify Bockups
'eriIying backups is a critical step in disaster recovery. We can't recover data unless we have a
valid backup.
We olwoys bock up Fxistinq loq Iiles before Performinq Any Restorotion
A good saIeguard we deploy is to back up any existing log Iiles beIore we restore a server. II
data is lost or an older backup set is restored by mistake, the logs help us recover.
We Perform PerioJic Iire Brill on our systems
A drill measures our ability to recover Irom a disaster and certiIies our disaster recovery plans.
We create a test environment and attempt a complete recovery oI data. We make sure to use data
Irom production backups, and we record how long it takes to recover the data. This includes
retrieving data Irom oII-site storage.
Creotinq o Bisoster Kit
We plan ahead by building disaster kits that includes an operating system conIiguration sheet, a
hard disk partition conIiguration sheet, a redundant array oI independent disks (RAID)
conIiguration, a hardware conIiguration sheet, and so Iorth. This material is easy enough to
13

compile, and it can minimize recovery timemuch oI which can be spent trying to locate
inIormation or disks needed to conIigure the recovery system.

Phuxe 4: eploy
AIter the appropriate storage inIrastructure components are in place and the backup and recovery
service plan is deIined, your organization can install the storage solution and associated
monitoring and management tools into the IT environment.
Operutlonx
Monitoring and managing storage management resources Ior backup and recovery used in the
production environment are extremely important tasks. Whether the process is centralized or
distributed, the technologies and procedures Ior backup and recovery must be managed. In the
end, the capability to easily monitor and analyze the storage management systems availability,
capacity, and perIormance should be available.
Storage resource management (SRM) is a key storage management activity Iocused on ensuring
that important storage devices, such as disks, are Iormatted and installed with the appropriate
Iiles systems.
Typically, the tools used in the production environment to monitor and manage storage resources
consist oI Iunctions provided as part oI installed operating systems and/or those oIIered with
other solutions.
Using a storage resource management system requires proper training and skills which our
Company posses. An understanding oI some oI the basic concepts necessary Ior monitoring and
16

managing storage resources successIully, and analyzing the results, is required. In addition,
selecting the right tool Ior the right job increases the operations group`s ability to ensure data and
storage resource availability, capacity, and perIormance.

You might also like