Overview - Backup replication with SnapVault

Contributors

In our lab setup, we use a second FSX for ONTAP file system in a second AWS availability zone to showcase the backup replication for the HANA data volume.

As discussed in chapter “Data protection strategy”, the replication target must be a second FSx for ONTAP file system in another availability zone to be protected from a failure of the primary FSx for ONTAP file system. Also, the HANA shared volume should be replicated to the secondary FSx for ONTAP file system.

Error: Missing Graphic Image

Overview of configuration steps

There are a couple of configuration steps that you must execute on the FSx for ONTAP layer. You can do this either with NetApp Cloud Manager or the FSx for ONTAP command line.

  1. Peer FSx for ONTAP file systems. FSx for ONTAP file systems must be peered to allow replication between each other.

  2. Peer SVMs. SVMs must be peered to allow replication between each other.

  3. Create a target volume. Create a volume at the target SVM with volume type DP. Type DP is required to be used as a replication target volume.

  4. Create a SnapMirror policy. This is used to create a policy for replication with type vault.

    1. Add a rule to policy. The rule contains the SnapMirror label and the retention for backups at the secondary site. You must configure the same SnapMirror label later in the SnapCenter policy so that SnapCenter creates Snapshot backups at the source volume containing this label.

  5. Create a SnapMirror relationship. Defines the replication relationship between the source and target volume and attaches a policy.

  6. Initialize SnapMirror. This starts the initial replication in which the complete source data is transferred to the target volume.

When volume replication configuration is complete, you must configure the backup replication in SnapCenter as follows:

  1. Add the target SVM to SnapCenter.

  2. Create a new SnapCenter policy for Snapshot backup and SnapVault replication.

  3. Add the policy to HANA resource protection.

  4. You can now execute backups with the new policy.

The following chapters describe the individual steps in more detail.