12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Highly Available StorageFigure 8. Array-based (top) and server-based (bottom) disk mirroringAlthough simple mirroring accomplishes the goal of protecting dataagainst disk failure, additional utilities are required to reconstitute theprimary disk set and re-establish the mirror operation. Once the failedprimary has been serviced, <strong>for</strong> example, the data on the primary mustbe rebuilt and synchronized to the new production mirror. For arraybasedmirroring, this is typically per<strong>for</strong>med as an automatic backgroundoperation and once synchronization has been achieved, theprimary is reinstated. This automated process, however, can haveunintended consequences. In one customer case study, a service callto replace a drive on a mirror inadvertently resulted in a drive on theprimary being swapped. Instead of failing over to the mirror image, themirror was rebuilt to the now-corrupted primary image. It is no greatmystery that tape backup endures as a data protection insurance policyagainst potential array failures.The primary drawback to mirroring within an array is that the entirearray is subject to failure or outage. Consequently, data centers mayphysically isolate primary and mirror arrays, placing them in separateareas with separate power sources.<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!