Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Big Data Strategies Data is ubiquitous, but success apparently isn’t. Companies using big data strategies are running headlong into an 85 percent failure rate as a result of resistance from management, a lack of adequate training, and an inability to integrate the new strategies with existing business
Secure Business Agility

Contrary to popular belief, a pro-privacy stance is good for business

Pro-Privacy Stance Right now privacy is a hot topic on LinkedIn posts, especially as it pertains to compliance with the General Data Protection Regulation. As a board advisor at Universal Patient Key, we've often talked about why being pro-privacy is good for today’s organizations. Here's why:
Vishwa Nigam

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate

According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing across various tiers of data centers. This impacts datacenters heavily on revenue loss, SLA-based penalties, and customer experience. Furthermore, loss of important data alienates customers and leads to low NPS (net promoter score).

Below image shows the current datacenter landscape with success rate and failure rate across various tiers. [Source: Gartner]

It is clear that the backup failure rate is least for tier 1 data centers at 5% and highest for tier 2 remote offices at 25%.

To reduce backup failure, it is necessary to find the root cause of the failure.

Following are a few frequent causes identified after monitoring some of the top datacenters.

Once the reason for failure is identified, the next step is to create a solution strategy to eliminate the problem and create successful backups. Below are some of the proven strategies to minimize backup failure.

Backup Audit tool

An audit tool helps data centers to conduct automated periodic audits of target systems and backup servers. Some of the features of audit tools are:

Firewall Configuration Audit: The audit tool runs a script at regular intervals to test the accessibility of the selected range of IP subnets, ports, target systems and backup servers. If any issue is found in the bidirectional communication, a ticket is raised automatically and sent to the concerned team.

Server Decommissioning: For servers that are consistently “inaccessible” and lead to backup failure, the audit tool automatically checks with the relevant internal application (Contract Management) for contractual information. If the application responds with a “contract expiry” message, the tool will initiate a ticket for decommissioning the server, disable further backups on it, and release the attached backup resources.

Backup Agent Audit: The audit tool runs a script on target systems and backup servers periodically to check if there is any mismatch in agent versions. If it finds a mismatch, a ticket gets generated automatically and sent to the admin team for customer approvals.

Database Permission Audit: Before running backup jobs, audit tool checks for access permission levels for the target system. If the tool identifies any gap, a ticket gets triggered to the admin team to get required permission from the customer for the associated target system.

Proactive capacity management

In order to effectively manage capacity and solve storage-related issues, data centers should focus on important areas to track and analyze various parameters such as location, libraries, media used, and storage-related information. Following measures would help data centers to reduce backup failures due to storage mismanagement.

Archival strategy for backup data

Primary storage is expensive as storage arrays are required to produce a sufficient level of input/output operations per second (IOPS) to meet operational requirements for user read/write activity. The data archives serve as an effective way for reducing primary storage consumption and related costs.

Cloud storage is a possible backup solution as it is cheaper and offers flexibility with an ongoing investment. Some solutions include Amazon Glacier, Microsoft StorSimple, and Google Drive.

Recommended archival strategy

Data classification: Classify the data with the most legal and regulatory exposure risk and update archival policy regularly for better compliance.

Well-defined retention policy: Align archival policy with different departments and BUs to retain information for varying time periods.

Tools for structuring the data: Use automation tools to structure data — indexing, auto-classification, text and content analytics helps to extract more value from data and store it efficiently.

Data centers can reduce approximately 25% of their storage costs by implementing an effective archival strategy. For instance, focusing on applications that accumulate unstructured data such as audiovisuals or images and archiving them into the cloud will reduce the load on the primary storage.

Parallel processing of backup jobs

The following diagrams illustrate the difference between serial backup processing and parallel backup processing. In parallel processing, the same storage is logically divided into different instances. This makes parallel processing of jobs more effective and faster than the serial backup processing.

Conclusion

This article provides insights on how having a customized backup tool can minimize failure, improve storage performance, and achieve 99% successful backup.

By Vishwa Nigam, Manager – Business Analysis & Insights, Prodapt

Vishwa is an experienced business manager with a demonstrated history of building & delivering actionable insights on DevOps, IoT, and robotic process automation. His areas of interest are analytics, process improvement, and business model innovation.

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

Turn to the Cloud as Part of Your Data Breach Strategy

Turn to the Cloud as Part of Your Data Breach Strategy

Data Breach Strategy The latest Verizon Data Breach Investigations Report is out, and the verdict is in: data breaches are ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Istio 1.0: Making It Easier To Develop and Deploy Microservices

Istio 1.0: Making It Easier To Develop and Deploy Microservices

With the recent availability of Istio 1.0 it is not surprising that it continues to capture much attention from the ...
Podcast #1: Most Efficient Way To Transport Mega-petabytes Of Data

Podcast #1: Most Efficient Way To Transport Mega-petabytes Of Data

CloudTweaks Podcast Discussing Cloud Security with Zohar Alon, CEO of Dome9. Also what is the fastest and most efficient way ...

"Top 100 Brand Influencer, Cloud”
-ONALYTICA

"Best Cloud Computing Blog"
-SYSADMIN MAGAZINE

"Top 10 Sites For Cloud Computing"
-DIGITALISTMAG SAP

"Top 10 Cloud Computing Blogs”
-MARKETING ENVY

"Top 25 Must Read Cloud Blogs"
-CLOUDENDURE