1 year, 11 months ago
All users can be separated into two groups: on those who regularly do backups and on those who did not begin to do them yet. If you belong to the second category, then it means only that you insufficiently well or not fully imagine quantity and scales of the troubles capable to damage your data – theft, the fire, a hurricane, viruses, bugs of the software, breakdown of iron, an error of users and all in such spirit. Well, or did not face passing of "quest" on data recovery after their loss yet (which, unfortunately, can not always be passed successfully). Anyway, it is better to know beforehand what errors should be avoided at backup therefore we present to yours eleven errors during creation of a backup. It even not so much errors, how many councils and the list of strategy which should not use (first of all, for users of Mac). Welcome under kat.
1 year, 11 months ago
Very long time ago – about four months ago – on corporate mail the "letter of happiness" suggesting to everyone to try the hand and to take part in VeeamON – global conference of our firm came. As a rule, heads of departments, the leading analysts and marketing specialists speak at similar actions, but it was this time decided to invite as experiment and directly programmers. Criteria for participation was, actually, only two: existence of unique knowledge of a product who want to share with the world, and ability to express this knowledge as not too clumsy phrases in English. As the venue of conference selected Las Vegas, in advance it would be for my part a little precipitate to refuse competition for the place on transatlantic run. So, the decision was made. Under a cat – the story about what followed it.
1 year, 12 months ago
Already it is more than a year at here. Within rebranding also the website www.acronis.com was updated. For creation of the website we selected CMS Drupal. The website turned out cool outside and difficult inside: 28 locales (!), sympathetic web-design, roundabouts, wizards, pop-up windows … as a result were necessary to involve a set of different modules of a drupal, some of them to customize and write own. During the work of such dynamic, complex system errors are inevitable. The command of control and ensuring quality of the website is engaged in their prevention and identification. In this article we want to share the successful recipe of test automation of our website.
ViPR – an element of the program defined data processing center
ViPR implements for a data storage segment approximately the same that VMware made for a segment of servers – creates a possibility of abstraction of resources, forming of pools and implementation of automation for infrastructure. By means of VMware API interfaces the storage pools created in EMC ViPR are presented in VMware vSphere in the form of a simple array. Besides, the ViPR controller provides integration with VMware vStorage API for Storage Awareness (VASA), vCOps, and also with control facilities and orkestration of VMware SDDC, vCloud Automation Center and vCenter Operations Manager. Thus, in ViPR control of storage can be exercised as independent object which is represented per se in virtual environments of Microsoft and OpenStack, and within the program defined VMware data processing center.
Main goal of development of EMC ViPR was simplification and reduction in cost of management of the existing heterogeneous infrastructures of storage, and also creation of a simple data management system and data access in the distributed clustered file systems, for example, based on hadoop-clusters, and also in cloudy environments.
2 years ago
In this article I will step by step describe work of service of backup of Acronis Backup Cloud (earlier known as "Acronis Backup as a Service"), developed by engineers of the Acronis company. I will tell what represents "backups as service" from within and as all this works. I pass directly to the description of work of the service.
Developing a subject of a backup and recovery on SHD with new architecture, we will consider nuances of work with deduplitsirovanny data in the scenario disaster recovery where SHD with own deduplication are protected, namely as this technology of effective storage can help or prevent to recover data.
2 years ago
One of the Redis developers published at himself in the blog article A few things about Redis security ("A little about safety of Redis") in which in details described banal, but as it appeared, for many a critical problem of data storage and safety of access to the server. For me everything would be not so sad if I did not face this problem and, as a result, did not lose data. Under a cat we will try to understand why it occurred and on my example to correct the happened situation.
2 years ago
Every time when the speech comes about backup, arises a set of questions, and the red thread through all these questions looks through cares of reliability. Reliability of recovery, reliability of storage, reliability of creation of backup copies. The good product on backup allows to be selected from situations when reliability questionable. The product, best in a class — allows not to appear in such situation in principle.
Not for nothing there is a popular wisdom "not to store all eggs in one basket". There is a set of examples with not the best endings when backup copies are written on the dying data storage system (DSS), and at times productive data are at all stored on the same SHD, as. Based on operating experience of products of Veeam of 168 000 customers and in order that users did not repeat an error of the colleagues, architects of Veeam advance idea of "ideal architecture of a backup system". In addition, "the ideal architecture" means separation of storage of backup copies for the purposes of a continuity of business and for the purposes of archiving of data on long terms.
There is a rule "3-2-1" which says that it in your infrastructure has to be:
3 copies of data
2 types of carriers for storage of backup copies
1 of copies has to is out of the main site
In the small and medium organizations the main questions, as a rule, arise with the last point — need to have a reserve site. Not at all the site for a katastrofoustoychivost is constructed or leased. Occasionally, construction or lease of the place in a data-center, with purchase of the equipment, a service fee and the accompanying expenses, is inexpedient economically.
In that case, it is a high time to address cloud computing which allow to reduce significantly as time of the organization of a notorious reserve site, and it is essential to reduce costs for its creation.
2 years ago
Recent series of articles ("Instruction of the evangelist of PostgreSQL: we criticize MySQL competently" 1,2,3) hooked for live.
So it turned out that my command inherited, isteorichesk the developed system, with 300+ objects where MySQL acts as one of key components of system. On some objects replication is also used. Software the using MySQL from the third-party developer.
Certainly, data protection methods from loss are defined both by the information volume, and the device on which they are stored. Both that, and another constantly evolves.
Therefore long ago disputes between supporters of traditional approach to backup and those who look for the new methods of data protection more convenient from the point of view of architecture of the used storage systems are conducted. Now this dispute escalated as recently a variety of types of storage systems sharply grew. Use of some of them demands to change approaches to usual problems of operation and ensuring availability, including backup about which I want to talk here.