Operations Management Key processes that support operations management

  • Slides: 44
Download presentation

Operations Management Вовлекает текущие управленческие действия для поддержки инфраструктуры защиты данных и развернутых служб

Operations Management Вовлекает текущие управленческие действия для поддержки инфраструктуры защиты данных и развернутых служб Key processes that support operations management activities Monitoring Change Management Configuration Management Capacity Management © Copyright 2016 EMC Corporation. All rights reserved. Performance Management Availability Management Incident Management Problem Management Security Management Module 13: Managing the Data Protection Environment 12

Lesson 2: Operations Management – I This lesson covers the following topics: • Мониторинг

Lesson 2: Operations Management – I This lesson covers the following topics: • Мониторинг • Оповещение • Составление отчетов © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 14

Monitoring Configuration Отслеживает изменения конфигурации и развертывание компонентов и служб защиты × Обнаруживает ошибки

Monitoring Configuration Отслеживает изменения конфигурации и развертывание компонентов и служб защиты × Обнаруживает ошибки конфигурации, несоблюдение политик защиты и несанкционированные изменения конфигурации © Copyright 2016 EMC Corporation. All rights reserved. Backup Client (VM) VM Type CPU (GHz) Memory (GB) Compliance Breach VM 49 Windows Server 2003 (64 -bit) 4. 8 2. 0 Not backed up since last week VM 50 Windows Server 2003 (32 -bit) 3. 2 2. 0 VM 51 Windows Server 2003 (32 -bit) 4. 8 2. 0 VM 52 Windows Server 2003 (32 -bit) 3. 2 2. 0 _ _ Not backed up since last week Module 13: Managing the Data Protection Environment 17

Monitoring Availability Идентифицирует отказ любого компонента или операции защиты, которые могут привести к недоступности

Monitoring Availability Идентифицирует отказ любого компонента или операции защиты, которые могут привести к недоступности данных и обслуживания или снижению производительности Application Servers/ Backup Clients Отсутствие избыточности из-за отказа коммутатора SW 1 H 1 SW 2 H 2 SW 1 Backup Storage System → Unavailable H 3 Storage Node © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 18

Monitoring Capacity 0 1 1 1 0 0 0 1 0 Отслеживает количество используемых

Monitoring Capacity 0 1 1 1 0 0 0 1 0 Отслеживает количество используемых ресурсов инфраструктуры и свободных 0 Уведомление: пул заполнен на 80% Расширенный пул Уведомление: пул заполнен на 66% CAS Free Capacity Storage Pool Used Capacity Storage Added © Copyright 2016 EMC Corporation. All rights reserved. Storage Pool Module 13: Managing the Data Protection Environment 19

Monitoring Performance Отслеживает, насколько эффективны различные компоненты и службы защиты, и помогает выявлять узкие

Monitoring Performance Отслеживает, насколько эффективны различные компоненты и службы защиты, и помогает выявлять узкие места Storage Node Backup Storage System H 1 SW 1 Application Servers/ Backup Clients H 2 H 3 New Backup Clients © Copyright 2016 EMC Corporation. All rights reserved. Port Utilization % SW 2 100% H 1 + H 2 + H 3 Module 13: Managing the Data Protection Environment 20

Reporting Example – Chargeback Report Payroll_1 Backup Data Client 11 Engg_1 Client 20 Storage

Reporting Example – Chargeback Report Payroll_1 Backup Data Client 11 Engg_1 Client 20 Storage Node Backup Storage System Sales_1 Client 36 Chargeback Details by Business Unit for Last Month Backup Client Business Unit Number of Backups Backup Size (TB) Number of Restores Restore Size (GB) Data Retained (MB) Number of Tapes Chargeback Cost Client 11 Payroll_1 156 1 14 16 0 0 $754 Client 20 Engg_1 662 3 8 8 0 0 $1, 836 Client 36 Sales_1 346 2 15 11 0 0 $1, 298 © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 24

Check Your Knowledge Match the following activities with their descriptions: 1. Monitoring capacity A.

Check Your Knowledge Match the following activities with their descriptions: 1. Monitoring capacity A. Identifies the failure of any infrastructure component 2. Monitoring availability B. Notifies administrators about various events, threats, or issues 3. Monitoring security C. Tracks the amount of infrastructure resources used and free 4. Alerting D. Tracks unauthorized access and configuration changes Click Here 1. C © Copyright 2016 EMC Corporation. All rights reserved. 2. A 3. D 4. B Module 13: Managing the Data Protection Environment 25

Capacity Management Example Expand CAS System Storage Pool Administrator Orchestrator Start Рассширить пул хранения

Capacity Management Example Expand CAS System Storage Pool Administrator Orchestrator Start Рассширить пул хранения до определенного размера Портал управления Approval Required ? Configuration Management Замена CMS Request for Approval Yes Request Approved ? Expand Storage Pool No Discover and Update CMS Update Portal (Operation Rejected) Interaction Update Portal (Operation Completed) End © Copyright 2016 EMC Corporation. All rights reserved. Review and Approve/Reject Change Request No SDS Controller Добавить требуемое хранилище в пул хранения Change Management Yes End Module 13: Managing the Data Protection Environment 30

Availability Management Example Designing for Multi-site Protection Site Replication Compute Systems Site B Site

Availability Management Example Designing for Multi-site Protection Site Replication Compute Systems Site B Site D Site A CDP Appliance SAN Replication WAN Site C Site E Storage System Write I/O © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 33

Incident Management Возвращает услуги пользователям как можно быстрее при незапланированных событиях, называемых «инцидентами» ,

Incident Management Возвращает услуги пользователям как можно быстрее при незапланированных событиях, называемых «инцидентами» , прерываниях сервисов или ухудшении качества обслуживания Обнаруживает и записывает все инциденты в среде защиты данных с помощью инструментов, портала самообслуживания, электронной почты и службы поддержки Расследует инциденты и предоставляет решения для разрешения инцидентов Key Functions ----- Документирование истории инцидентов Examples of Incidents Detected by Incident Management Tool Severity Event Summary Type Device Priority Status Last Updated Fatal Pool A usage is 95% Incident CAS 1 None New 2016/03/07 12: 38: 34 Fatal Database 1 is down Incident DB server 1 High WIP 2016/03/07 10: 11: 03 L. John Warning Port 3 utilization is 85% Incident Switch A Medium WIP 2016/03/07 09: 48: 14 P. Kim © Copyright 2016 EMC Corporation. All rights reserved. Owner _ Escalation No Support Group 2 Support Group 1 Module 13: Managing the Data Protection Environment 34

Problem Management Example Resolving Network Bandwidth Problem Management Team Incident and Problem Management Tool

Problem Management Example Resolving Network Bandwidth Problem Management Team Incident and Problem Management Tool Correlate Incidents on Replication Performance Determine Remedial Steps Change Management Request for a New Network Link Approve Change Request Identify Root Cause (Insufficient Bandwidth) Add a New Network Link Log Problem Close Problem Interaction © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 36

Concepts in Practice • EMC Data Protection Advisor • EMC Replication Manager • EMC

Concepts in Practice • EMC Data Protection Advisor • EMC Replication Manager • EMC Vi. PR SRM • EMC UIM • VMware v. Realize Operations • VMware v. Realize Orchestrator © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 39

EMC Data Protection Advisor, EMC Replication Manager, EMC Vi. PR SRM Data Protection Advisor

EMC Data Protection Advisor, EMC Replication Manager, EMC Vi. PR SRM Data Protection Advisor Replication Manager • Offers comprehensive, end -to-end data protection environment visibility in a single, unified product. • Automated data replication on any EMC array from a single console for simplified management. • Reduce administrative efforts, accelerate problem resolution, and forecast resource and capacity planning. • Creates application consistent replicas for Microsoft Exchange, SQL Server, Share. Point, VMware, Oracle, custom file systems, and more. • Efficient, risk-managed, and simplified environment. • Use an automated, unified approach to manage the data protection environment. © Copyright 2016 EMC Corporation. All rights reserved. Vi. PR SRM • Shows relationships and topology of components • Shows capacity utilization and configuration compliance • Helps in capacity planning and chargeback reporting • User assignable replication privileges provides five levels of access, ideal for both array managers and applications administrators. Module 13: Managing the Data Protection Environment 40

EMC UIM, VMware v. Realize Operations, VMware v. Realize Orchestrator UIM • Discovers Vblock

EMC UIM, VMware v. Realize Operations, VMware v. Realize Orchestrator UIM • Discovers Vblock and VSPEX components and shows topology • Provisions resources automatically and based on policy • Correlates alerts to identify root cause v. Realize Operations • Identifies performance, capacity, and configuration issues, and helps remediate them • Optimizes the usage of capacity and performs capacity trend analysis • Verifies configuration compliance and recommends/triggers actions • Provides end-to-end visibility in a single console © Copyright 2016 EMC Corporation. All rights reserved. v. Realize Orchestrator • Orchestrates service delivery and operational functions • Enables administrators to: - Use pre-defined workflows from library - Create customized workflows • Can execute hundreds or thousands of workflows concurrently Module 13: Managing the Data Protection Environment 41

Module 13: Summary Key points covered in this module: • Characteristics and functions of

Module 13: Summary Key points covered in this module: • Characteristics and functions of data protection management • Key management processes that support data protection operations © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 42

Course Summary Key points covered in this course: • Data protection architecture and its

Course Summary Key points covered in this course: • Data protection architecture and its building blocks • Fault tolerance techniques in a data center • Data backup methods and data deduplication • Data replication, data archiving, and data migration methods • Data protection process in a software-defined data center • Cloud-based data protection techniques • Solutions for protecting Big Data and mobile device data • Security controls and management processes in a data protection environment © Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 43

© Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection

© Copyright 2016 EMC Corporation. All rights reserved. Module 13: Managing the Data Protection Environment 44