Anda di halaman 1dari 7

1 1 1 1 1 0 1 1 1 1 1 0 1 1 1 1 1 0 1 0 1 0 1 1 1 0 1 1 1 0

0 1 0 1 0 1 0 1 0 0 1 1 0 1 1

0 1 1 1 1

0 1 1 1 1 1 0 1 1 1 1

1 1 1 0 1 1 1 0

1 1 1 0 0 1

01 01
0 0 0

0 1 1 1 0

1 1 1

1 1 1 1 1 0 1 1 1

1 1 1 1 1 0 0

BusinessShadow

11 0
1

1 0 0

0 1

1 1 0 0 1 0 1

High Availability and Disaster Recovery. Two Challenges. One Solution.

1 1 1
0 1 1 0 0 1

1 1 1 1
1

Scenarios from the World of Corporate IT


Scenario 1: Faulty Software Upgrade The current application software is expected to be upgraded over the weekend. The subsequent tests indicate a malfunction and thus leaves a useless system. The only option to resume operation is a time-intensive process restoring data from tape to disk image, extending the planned maintenance window. Take a deep breath: It can be so much easier.

How much Downtime and Loss of Data can you afford? How fast can your Business be Up and Running after a Disaster?

00
1 1 0

One or the other scenarios on the previous page might sound familiar to you. Furthermore, additional business requirements lead to a large degree of inter-dependency and overall complexity of IT architectures. The availability of application landscapes and their underlying databases are critical. Changing global paradigms and legal requirements add the need of providing full Disaster Recovery protection, including site failure protection. Only very large distances of several hundred miles between production and backup site provide true protection. Traditional mirroring concepts based on storage or blocklevel come with too much complexity, impact productive landscape and generate tremendous costs. Prepare for the Future! IT systems are constantly threatened by application downtime and loss of data. The threats are real and come from many directions. Not all of the threats can be avoided. The important question is: are you ready and prepared? How fast can you be back in business? Can you provide a Plan B which gets you back in business within a few minutes with no or minimum damage? If you experience a major incident, this becomes a challenging race against time.

001 1 1 0 0 0 1 0 0 1 1 1

11
1

01
0 1 1 0 0 1 1

Scenario 2: Physical Destruction or Disaster Incident Lightning strikes the central power supply and/or damages the centralized IT system. Floods, severe weather, earthquakes or terrorist attacks interrupt the application systems or access to the same. Data and applications need to be restored at an off-site location a race against time. Stay calm: You will win the race.

Traditional Methods are not enough Todays replication tools are inadequate to provide full data and application protection. Synchronous or near-synchronous data replication tools only protect against local hardware failures (Hardware High Availability), but do not protect against software or user errors. Stretching the data replication tools to mirror over large distances help to cover site failures (Disaster Recovery), but offer low data integrity and typically a poor Return on Investment (ROI). Manual Backup and Restore procedures provide the data integrity but lack reasonable Recovery Point and Recovery Time Objectives. In addition, the complexity of todays application landscapes requires in-depth know-how of the detailed system architecture to get the systems back to life.

0 1 1 0 0 1
0 1
1 1

Scenario 3: Accidental Deletion of Data It happens quickly: critical data is irrevocably deleted. The administrator drops the wrong database. Important files or directories are deleted. Backups must be available and an immediate and flawless manual restore is necessary to keep your business operational. Lean back and relax: Your data is available.

Comprehensive High Availability and Disaster Recovery Protection. Many Challenges. One Solution.
Libelle creates Leeway for Availability and Disaster Prevention We make it easy to handle these challenges. Read on, and learn how you can recover your data quickly, easily and consistently when it comes to the worst case.

0 1 1 0 1 1

00 10 1 0 1

1 0

Other Scenarios: 4. Malicious manipulation by own staff or hackers 5. Hardware problems 6. Server move without downtime 7. Or simply: your business dictates you to comply with current legislation which requires a functioning risk management. A Business Continuity Plan is necessary to comply with SOX and other regulations. We will make sure that you are ready in any case. BusinessShadow is there for you. 02

11 01 1 0 0

0 0

BusinessShadow protects your data, your applications and entire production sites. The solution reduces potential downtime and retrieves lost data within minutes easy to use and cost-effective.
03

1 1

01 11 0 0

1 1 1
0

1
Reasons for Downtime
Application downtimes and data loss are less than ever caused by hardware problems. More than 80% of all downtime incidents are actually caused by software or user errors instead.
1

1 1
1 0 0 1

1 1 01 0
1 0

BusinessShadow makes your High Availability and Disaster Recovery Architecture Safe and Sound.

001 1 1 0 0 0 1 0 0 1 1 1

11
1

These are exactly the areas where traditional concepts will fail in providing protection. Redundancy will be of no help in case of corrupt or deleted data. In this case, resuming business operation will require a manual restore from tape or disk image. This is not only annoying, but also very timeconsuming.

Foresight in assessing potential threats is the basis for your risk avoidance strategy. BusinessShadow is the ideal software solution which enables you to reduce the risk of data loss, minimize application downtime, and provide amazingly fast error recovery. BusinessShadow provides protection independent from the cause and independent from the consequence of the incident: hardware failure, corrupt data, software error or human error. BusinessShadow supports both homogeneous and heterogeneous system landscapes with a single standardized interface. Also the distance and network between your production and backup system means no boundary. Data is mirrored with minimum bandwidth requirements. Any major incident is a race against time where every second counts. We provide a simplified way to handle the administration and failover without requiring specific in-depth know-how. 15 % Hardware Error

1 0 1 1 0 0 1 1

45 % Software Error

40 % Human Error

Graphic Data Source: Gartner Group

The BusinessShadow Software lets you stay in business whatever the incident may be.
04

BusinessShadow provides uncompromised and true distance independence.

05

0 1 1 0 1 1 0 1 0 1 1 0 0 1 1 1
1 1 0 1 1 1 1 1 0 0 0 1 0 1 0 0 1 1

The Libelle Principle Brilliantly Simplified Simply Brilliant. The Time-Delayed Data Mirror!
Take an example: your application crashes at 2:00 pm and critical data is irrevocably deleted. With BusinessShadow your application and data can be back where it was at 1:59:59 pm literally at the push of a button and a short wait time of typically a couple of minutes.

Highest Level of Protection Based on a simple Principle


Regardless of the Distance: Data Protection in another building, another city, another country, another continent. Easy to manage without in-depth Know-how

GUI

Step 1: Initial Copy During initial setup, all data from the production system is copied to a secondary system (mirror system) in a LAN or WAN setting. This system can be located in another building, another city, another country or on another continent. Proprietary data transmission techniques based on standard network protocols optimize the data transfer. Step 2: Updating Changes All changes in the production system are being identified and transferred directly into the timefunnel of the mirror system. With the optimized data transmission techniques, even limited WAN links will be used to maximum efficiently. Step 3: Time-Funnel Transactions on the production system reside in the time-funnel on the mirror system for a certain amount of time, which can be set to any value desired. The time-funnel value can be adjusted during production just as needed. Only after the end of the defined period, the transactions in the time-funnel are applied to the mirror system.

1.
Production System

The time-delayed data mirror provides a manageable buffer between the production and its mirror system called the time-funnel. This time-funnel receives current transactions from the production database or file system. The time-funnel and all data is physically stored on the mirror system and current transactions are available on the mirror system in case the production system becomes unavailable or corrupted. In the case of a disruption, applications can simply be switched to the mirror system. Instead of working with the same corrupted data which caused the downtime on the production site, only the good transactions are applied to the mirror system. Typically up to the point before the data corruption on production occurred. And all this happens within a few minutes without restoring backup media.

2.

Mirror System

Data Transfer via TCP/IP-Sockets LAN or WAN

4. 3. 5.

Step 4: Failover to the Mirror System In the case of an error on the production system, time can literally be turned back to any time-stamp prior to the occurrence of the error. Within a few minutes, in which the time-funnel is emptied to the desired point-in-time, the last consistent set of data is used for running production on the mirror system. The host name and IP-address are automatically failing over to the mirror system, so that application server and users are able to reconnect to the mirror system without any changes. Step 5: Failback to the Production System The crashed production system is rebuilt while production is running on the former mirror system (which is now acting as the current production). Normal operation is reestablished by changing roles at the push of a button.

BusinessShadow is based on the Libelle patent to mirror data time-delayed using a time-funnel.
06 07

0 1 1

0 1 1 0 1 1

1-2-3 1 2
DBShadow

0 0

BusinessShadow

1 0 1 1 0
DBShadow for Database Protection The easiest way to create and manage a shadow database is offered by Libelle with DBShadow , a product that protects against the consequences of physical and user/software errors. The creation of the database mirror, the shipping of archive files, and the time-delayed recovery are automated by DBShadow . The mirror operation can be monitored either through a Graphical User Interface (GUI) or a Command Line Interface (CLI) with user exits. It is a perfect fit to be integrated with existing High Availability concepts and strategies. Production and mirror system, as well as all processes are monitoring each other constantly. Trouble tickets are issued automatically for system monitoring.

Three in One
BusinessShadow is the integrated Libelle solution for complete protection of systems (databases, file systems, communication) and combines three unique components in a holistic way.

0 1 1 0

1 0 1 1 1 0 1 1 1 0 1 1 0 1 0 1 1 0 for your Disaster Recovery The perfect Solution 1 1 and High Availability needs 1 0 1 1 1 1 0 0 1 1 Best in its Class Protection from the Protect your Business regardless of: 1 Consequences of: 0 Distance between production and mirror system 1 0 or deleted data Corrupt Size of the systems 0 Faulty software updates Hardware and Applications in use 1 1 error Human 1 Hardware problems 1 Disasters and sabotage 1 1 0 Your Benefits: Other Implementation Scenarios:
0
0 0 1 1 0 1 0 0 1 1 0 0 1 0 0 1 1 1 0 1 0 0
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

FSShadow

FSShadow for File System Protection Software/User Errors and physical problems are not only a threat to the availability of databases, but also threaten the availability of file systems. The same way DBShadow protects databases; FSShadow mirrors transactions time-delayed on a flat file level (create, modify, and delete). All changes are copied instantly to the mirror system, but stay in the time-funnel before they are applied to the actual mirror file system.

SwitchApplication

SwitchApplication for Automation of Failover SwitchApplication adds an additional virtual IP-address/hostname to the production system. Part of the failover process is to activate the virtual IP-address/hostname on the mirror system and remove them on the production system. DBShadow and FSShadow are continuing the mirror operation and manage the failover using the actual IP-addresses/host-names of the production and of the mirror system. The system can thus always be accessed with the same IP-address. The failback is done the same way. The automatic restart of applications are implemented through user interfaces which offer event-based triggers to automate environment-specific actions.

Continuous and consistent backup of your databases and file systems Automated failover process of applications and databases Quick error recovery after failover to the mirror system Continue to work with the last consistent set of data after a corruption Automatic allocation of virtual IP-addresses/ hostnames Holistic protection even in heterogeneous environments Minimum manual intervention on an application level Very simplistic solution and extremely easy to operate

Simplistic approach for building backup data centers Transparent monitoring of critical IT processes Automation of system refreshes by creating test databases/environments Planned failover to minimize planned downtime Backup from the mirror system without affecting production systems Reporting with production data on the mirror system Server relocation without downtime

In a Nutshell: Minimum Downtime Higher Productivity Reduced Costs.


08 09

1 1 0 1 1 0 1 1 1

1 1
0 1 1 0 0 1 0 1 1 0 0 0 1

1 1 1 1 1 0 0 1 0 0 0 0 1 1

You determine the Level of Protection you need and we provide the Service for it.

Questions? More Information?

0 0 1 1 1 0 0

Implementation The implementation of BusinessShadow and User Training is performed by Senior Libelle Consultants or by a Certified Libelle Partner. In the run-up we determine the optimal configuration for your particular landscape followed by the actual implementation typically without any downtime.

Support Expect expert support: We will provide you with dedicated Libelle Consultants to deliver support services for your installation. Your primary contacts are typically the Senior Consultants or Solution Architects who implemented the solution with you from the start. Depending on your requirements, you can benefit from different tiers of software support. Our Software Support range from basic weekday support up to pro-active 24/7 monitoring for highly critical environments.

Libelle is there for you! Our mission is to provide more stability to your business processes at any time and under any and every circumstance. How to contact us: T +49 (0)711 / 78335-0 or sales@libelle.com

1 1 1 1 0 0 0 1

For more information, please visit our website: www.Libelle.com

0 0

Libelle AG Gewerbestr. 42 I 70565 Stuttgart I Germany I Quality you can rely on When it comes to High Availability, a high standard of quality is essential. Libelle is certified according to DIN EN ISO 9001:2008. High Availability must meet the highest requirements BusinessShadow exceeds the high standards of integrating into a variety of user applications. Among many certifications, BusinessShadow comes with a SAP certified integration.

1 1 1 1 0 0 0 1 1

It doesnt matter whether or not you can predict the future. What does matter is that you are prepared for it. Perikles
10 11

0 1 0 1 0 1 0 1 0 0 1 1 0 1 1 0 0 0 1 1 1 1

11
1 1

1 1 0

11
1 1

1 1 1 0 0 0 1 0 1 0 1 0 1 0 0 1 1 1 0 1 1 0 1 1

10 11
1 1

BusinessShadow

1 1 0 1 1 0 0 0 1 0 1 0

10 10 11
0 0 1

10
1

10
0

11
1 0

Protect your Business against Crashes.


Libelle is an established software specialist for Disaster Recovery and High Availibility solutions since 1994. Medium and large sized businesses rely on our software solutions when it comes to backing up and restoring their data. You will benefit from the best possible service from a single source. Our support, distribution and software development are centralized in our Headquarters in Stuttgart, Germany. With an extensive distribution network of our business partners we have been serving customers all across the world for many years. Our solutions are complemented with a wide portfolio of professional services from designing high-end Disaster Recovery and High Availability concepts to implementation with a proactive service and support concept 24 hours a day, 7 days a week. The proximity to our customers and the high standard of quality of our solutions are important to us. This is shown by the fact that Libelle is certified with DIN EN ISO 9001:2008. Years of experience and competence and a decade of hands on experience, know how and a comprehensive portfolio of solutions and services have brought us where we are today.

0 0 1 1 0 1 1 1 1 1

00 00 10
1 1 0

00
1 0

10 01 0 1 1 1
1

1 1
Libelle AG I Gewerbestr. 42 I 70565 Stuttgart I Germany I T + 49 711 / 78335-0 I F + 49 711 / 78335-148 I www.Libelle.com

Libelle, the Libelle Logo, BusinessShadow , DBShadow and FSShadow are registered trademarks of Libelle AG. All other brand and product names mentioned are terms and in some cases registered trademarks belonging to the respective companies. Libelle AG, December 2009. Subject to change. Design and Production: bro punkt. for visual design, www.buero-punkt.de

Anda mungkin juga menyukai