Feeds

Application recovery: Whose job is it anyway?

A stitch in time saves the crying

Secure remote control for conventional and virtual desktops

When it comes to supporting business activities, the primary role of IT is to ensure that the applications on which the organisation depends are available and operating at an acceptable level of service. Beyond this there is the unsung, but absolutely essential, matter of protecting both the application and the data it collects, creates and stores over their collective lifetime.

Traditionally, more emphasis has been placed on the protection of data than applications, with the standard approach being backup to tape. This takes time to perform (the ‘backup window’) and, to ensure data consistency, it often requires that access to the data be suspended while the backup takes place.

This can be quite a challenge, particularly for transactional applications (i.e. most of them) – it requires stopping the application program, getting all transactions to complete and then initiating the protection process. Once completed, the application is restarted and thereafter the users can begin to use the software again as part of their business processes.

When recovery of data is required, the reverse process would take place with administrators seeking to restore data sets from one or more tapes. Both of these processes can take a considerable amount of time, even in the best of cases.

Today’s pressures for data to be available for longer have put additional constraints on the backup window, at the same time as reinforcing the need to recover data quickly. As a consequence, a number of alternative technologies have sprung up for use in data protection and recovery processes. These include backing up to disk, Continuous Data Protection Systems (CDP), point-in-time copies (snapshots), and replication solutions. Each of these offers different capabilities and will be suited to a range of data protection scenarios.

Despite these advances, the application still needs to be in a logically consistent state prior to the data protection process commencing, both to enable a recovery process to be operated and to leave users in a position to carry on work.

Today it is becoming unacceptable to bring down some applications to allow a backup, snapshot or replication process to take place, so another means must be found to ensure that a self-consistent data set is protected. This challenge is becoming further exacerbated as complex, composite applications are used that may run using data from multiple systems, some of which may extend beyond the borders of the enterprise.

This raises the question: who is responsible for ensuring application and data consistency in data protection and recovery scenarios? As applications become more complex architecturally, and in line with business demands for high availability, IT infrastructure administrators and application developers/implementation consultants need to find ways to work together to ensure that rapid application protection and recoverability are built into systems right from the word go.

From our research, we know how much of a challenge this can be. In a study conducted last year, it became clear just how much of a gamble organisations were prepared to take with the reliability of their IT systems. But more recent work has shown us the gulf between different factions in IT, which can only exacerbate the situation. We’re not going to attempt glib answers - although if you have any, do let us know - but we can say that all the tools in the world won’t help if the right pieces aren’t being put in place from the outset.

Where to start? Probably the developers themselves, who will need to know what the data protection/recovery solution needs from it so that the storage administrators can ensure that the desired quality of service is achieved with minimum risk and, naturally, the minimum of cost. It’s time to make the planning for recoverability an integral part of the system design and build process, and development is as good a place to start as any.

Freeform Dynamics Ltd

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.