DR Automation
DR Product Specification
Use of this document
This document is the functional specification definition of the product's functionality, including what the product can do, what it cannot do, operating instructions and functional use cases describing how it works.
Overview
The DR product automates failover steps, reports on replication, cluster configuration, syncs critical configuration between clusters to smb, nfs shares, quotas, snapshot schedules, access zones, nfs aliases, and dedupe settings. Automated failover testing features, closed network DR testing features, data migration, controlled and unplanned failover modes. 4 failover modes access zonem ip pool, DFS based, or synciq policy failover. Each offers automation and granularity of data to failover. Advanced options on how to sync configuration and scheduling of sync and DR readiness analysis jobs and cluster inventory. A report engine also has scheduled jobs along with AD SId to user and group collection tasks.
Terms
Eyeglass GUI - User monitoring, alarms and user interface to interact with product configuration and threats raised.
ECA VM’s - These are VM that process audit data and determine threats to production data.
Functional Specification Description
Dependencies
Cluster REST API
SSH access to cluster CLI
NTP
AD is responsible by the cluster
DNS
VMware , hyper-v, RHEL (extra license required not included in base license)
Installation
This product is recommended to be configured by professional services for complex DR requirements.
Functional Description
Sync critical configuration data
Shares
Exports
Nfs aliases
Quotas
Snapshot schedules
Dedupe settings
Access zone user mappings
Access zones
Automates the following failover steps
AD spn’s
Smartconnect and aliases
DNS redirection
Shares, exports
Quotas
DFS shares
Synciq steps
Run policy
Allow writes
Resync prep
Run mirror
Customer host scripts pre, post or unified scripts
Logging and retry of key steps
Phased failover log
Parallel failover
Failover modes
Zone
Policy
Dfs
Ip pool
Types of failover
Full failover
Rehearsal partial failover production stays online
Options for failovers
Data synchronization
Config replication
Data integrity on source
Disable resync step
Disable policy post failover
Quota optional
Warning override
Automation
Automated failover mode on schedule with data create validation step
3rd copy access zone cloned data testing mode
Reporting
Cluster report of configuration including diff feature to compare
RPO report synciq 24 hour 30 and 60 day trending
Ondemand reporting
Automated reports
Alarms
Email
Webhook
Syslog
Snmp
Twitter
Data migration
Data plus configuration between access zones or clusters for data migration to new clusters or between zones
Sync options for config
Sync always
Skip configuration
Hide shares
Change prefix on shares
Change pool mapping prefix name
Diagnostics
Builtin log parsing
Lights out logs
Patching
Auto matching OS
Security
Encrypted all credentials with aes256
Allow signed certificates
No root process ownership
Sudo only to root
Random root password per appliance
Random encryption keys
RBAC
Hardening options for TLS and http headers
OS firewall
Os proxy support
Remote support
Phonehome option with opt in
Outbound ports only over 443 https
Encrypt in flight and at rest
Auto purge support data
Operational Expectations for all deployments
Run the latest release for all planned failovers. Recent releases address known issues in failover and prevent more scenarios
Follow all operating procedures or you can risk data loss scenarios, understand data loss is possible in all failover modes
Ensure all sizing guidelines are for memory cpu and disk are at or above published requirements, if not followed product functionality will be impaired
Understand that data loss is expected when not stopping user application IO before starting a failover
Review all release notes
Follow all operational and planning guides
Deploy warm standby eyeglass appliance to create off site backup of appliance backup
Practice failover with runbook robot feature
Train any new staff with free hands on training on supernaeyeglass.com
Read all pre failover planning guides, checklists and practise data access guides for windows and links
Always have SME for AD, DNS, OS, networking/firewall, cluster administrator and application teams available during failover
Remaining logged into the support site for rapid support
Monitor alarms daily and act on them to resolution for DR readiness
Local users are not synced by design due to passwords (affects ACL’s and SMB shares with local users, DR requiures AD security in place.
No failover time is guaranteed due to external factors to the product
Data access is a mandatory requirement post failover to be carried out by application or NAS administrator.
Failover errors may require manual steps to be executed by customers, if api calls fail it is design intent for manual steps to recover as provided by support. Customers must have the required administrative access to complete these steps.
If an uncontrolled failover is executed, recovery back to a normal working state is expected to be a manual custom procedure demanding on the nature of the failure. Not all recovery options are documented.
The product attempts to detect many pre-failover conditions. It is expected that many more conditions exist that will or could affect failover operations and this is expected. Customers should plan on a recovery plan if failover does not execute as planned.
After failover successful data access has many external dependencies some of which are AD, vmware, hosts, networking, firewalls, DNS, NTP. If all post failover access dependencies are not available data access outage will occur. This is external to the product and is a customer planning requirement.
- Patching
- The product does not support hotfix patching and requires and complete upgrade of the software version or build number to apply any patch
- Operating system patches are not provided and must be downloaded directly from online official open suse repositories
- Compatibility
- The product does not support forward compatibility with target devices and will require a software upgrade to support a forward version of a target device. This includes minor or build number changes of the target device.
- Appliance Modifications
- Modifying the operating system packages, removing or adding packages, changing the OS configuration and support of these changes is not covered by support and customers must support OS modifications and perform necessary testing. No support for customer modifications with the exception of applying open suse OS package patches that shipped with the original appliance or published procedure in documentation.
- Operational Procedures
- If documentation does not list a procedure, it is explicitly unsupported unless support provides a procedure.
© Superna Inc