Hello everyone! This is Daya Patil back with the next part of our series on business continuity with ABCC. In our last session, we delved into using ABCC to understand the protectable resources inventory. Today, we're going deeper into exploring the inventory of protected items within ABCC.
Tailwind Traders case study
Tailwind trader has also recently configured Azure Site Recovery solution to protect their 40 VMware virtual machines to Azure. In this segment, we'll explore how John, Tailwind's BCDR admin, can achieve his upcoming objectives:
View protected items (protection status)
John heads to the Protected Items view in ABCC. Alternatively, he can access this view by clicking on the "Protection Status" tile located on the ABCC overview page. John is happy to see centralized & at scale view for overseeing their protection landscape, offering a unified perspective across various solutions. He sees a list of all the protected items across the supported solution across the subscription, resource groups, location, type, and so on, along with their protection status.
Within the protected items view, John can find the protection details for each resource using the following information:
The protection status values can be: Pending protection (protection is triggered and is in-progress), Protection disabled (protection has been disabled, for example, protection is in soft-deleted state like in the case of Azure Backup) or Protection paused (protection is stopped; however, the protection data will be retained as per solution provider), or Protected. When the datasource is protected by multiple solutions (that is, Configured solutions >= 2), the Protection Status for an item is computed in the following order:
John finds all his 5 Azure Virtual machines protected with Azure Backup in primary region. John is curious about the protection status details in both the primary and secondary regions. He's uncertain if simply enabling backup for his resources is sufficient for adequate protection. Surprisingly, he discovers a best practice guideline that addresses all his uncertainties and doubts.
He comprehends the significance of securing resources in both primary and secondary regions and acknowledges their direct impact on RPO (Recovery Point Objective) and RTO (Recovery Time Objective), as given below:
Protect your data and applications
To determine how often to back up data and where to store backups, you consider the cost of downtime and impact of access loss to data and applications for any duration, as well as the cost of replacing or recreating the lost data. To determine the backup frequency and availability decisions, determine recovery time objectives (RTOs) and recovery point objectives (RPOs) for each data source and application to guide frequency.
RTOs and RPOs might vary depending on the business and the individual applications data. Mission-critical applications mostly require microscopic RTOs and RPOs since, downtime could cost millions per minute.
A datasource is an Azure resource or an item hosted in Azure resource (e.g. SQL database in Azure VM, SAP Hana database in Azure Virtual Machine, and etc.). A datasource belonging to a critical business application should be recoverable in both primary and secondary region in case of any malicious attack or operational disruptions.
Customize the view
John notices similar couple of other options on the page to customize view like:
John is excited to discover that ABCC extends beyond Azure resources, providing protection data for non-Azure / hybrid resources as well. This revelation significantly eases his task of managing these resources, eliminating the need for separate management tools. With enthusiasm, John narrows down the scope to non-Azure resources and witnesses VMware virtual machines successfully replicating to Azure through Azure Site Recovery.
View protected items (retention details)
John aims to ensure that the retention of the protection data is configured as per the organization rules based on the compliance standards that they follow. Seeking to understand the configured retention on each item, he identifies an option within the scope to obtain comprehensive retention information for all items at once. Opting for the retention details view from the scope, he can now efficiently review this data without delving into each individual policy used for protection configuration.
He chooses the retention details view from scope, and on select, the view loads the retention information for protected items. The Protected items retention table shows the retention details for each protected item in the primary and secondary regions.
View protected item details
John wants to explore further details for protection by each solution used to protect the resource. He clicks the item name or can select the more icon … > View details action menu to navigate and view further details for an item.
On the item details view, John gets to see more information for item, coming from provider as is like protection state, latest recovery point in both regions etc.
The view also allows John to add more columns using the “select columns” along with the option to change the default view using the scope picker from Currently showing: Protection status details, select Change.
To change the scope for item details view from the scope-picker, select the required options:
Perform actions
John is delighted to find all protection-related information consolidated in one location, along with the flexibility to switch between options seamlessly. As he explores further, he discovers the array of core actions available within the protected items view, allowing him to execute various operations:
Learn about the view
Like other view, John sees the presence of built-in assistance within ABCC under the "Help" menu. Upon clicking, he discovers that it covers:
John is excited to discover direct guidance on utilizing ABCC within the portal, removing the necessity of constantly referring to documentation for minor queries.
Completing his exploration of protection inventory, John leverages the protectable and protected items view in ABCC. In the next article, we'll delve into John's journey of comprehending the security coverage for the protected items utilizing ABCC.
Stay tuned………………
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.