Check out our companion blog!
Oct. 23, 2023

Is it a backup or just a copy?

In this episode of the Backup Wrap-Up, host W. Curtis Preston discusses the importance of distinguishing between a copy and a backup to ensure the protection of valuable data. He also explores key backup concepts such as multiplexing, incremental backups, block-level incremental backups, and source-side deduplication. The episode kicks off with a discussion on the recent MGM hack, highlighting the significant impact it had on the hotel chain and the potential for personal information leaks. Tune in to learn how to safeguard your data effectively and become a backup hero.

Articles mentioned in the episode:

https://www.reddit.com/r/vegas/comments/16hxwj0/explain_like_i_am_5_mgm_hacking/

https://www.reversinglabs.com/blog/what-we-know-about-blackcat-and-the-mgm-hack

Transcript

Speaker:

There are dozens of things that people do to protect their data

 

Speaker:

from loss, but many of them are worthless when you actually need them.

 

Speaker:

In this episode, we'll learn what turns a copy into a backup so that

 

Speaker:

you can make sure that anything you think is a backup actually is one.

 

Speaker:

We'll also talk about some important backup concepts like

 

Speaker:

multiplexing, incremental backups, block-level incremental backups

 

Speaker:

and source side deduplication.

 

Speaker:

Hi, I'm W.

 

Speaker:

Curtis Preston, AKA Mister backup.

 

Speaker:

And I've been specializing in backup and disaster recovery for over 30 years.

 

Speaker:

My podcast turns unappreciated backup admins into cyber recovery heroes.

 

Speaker:

This is the backup wrap up.

 

Speaker:

. Hi and welcome to the show.

 

Speaker:

and I have with me a guy who I think is super jelly of the new

 

Speaker:

toy that I put in yesterday.

 

Speaker:

Prasanna Malaiyandi.

 

Speaker:

How's it going, Prasanna?

 

Speaker:

I'm good Curtis, and yes, I am jealous of your toy, but I will have to start

 

Speaker:

sending you a bill for consulting fees, when you inevitably, or if

 

Speaker:

you inevitably run into issues.

 

Speaker:

Huh?

 

Speaker:

Yeah, because as you recall, I didn't, I purchased this like without even talking

 

Speaker:

to you, which is rather atypical of me.

 

Speaker:

because I, we talk about so much and, and basically what we're talking about

 

Speaker:

is a Firewalla, which I've had my eye on for a while and then after I realized,

 

Speaker:

so I've switched internet service providers and now they're telling me

 

Speaker:

that I'm hitting the bandwidth limit already and which is highly possible

 

Speaker:

given that I do, this, I realized that I had no bandwidth monitoring tools.

 

Speaker:

I have this really nice, mesh router system.

 

Speaker:

Wire, the wire, the wifi mesh, but that's put been put an access

 

Speaker:

point mode, which then of course offers no bandwidth monitoring.

 

Speaker:

And then I had this Cox router, which offered me nothing.

 

Speaker:

And so I replaced the Cox router with the Firewallet Purple SE and man.

 

Speaker:

Super simple to put in there.

 

Speaker:

And now I have these like super, stats.

 

Speaker:

And I get these, I'm going to, at some point I'm going to have to disable

 

Speaker:

the notifications because it's like Curtis is playing games on his phone.

 

Speaker:

Curtis is watching YouTube videos on MacBook Pro A, right?

 

Speaker:

It's literally, it's like Curtis has downloaded 3.

 

Speaker:

56 gigabytes of video on his, and I'm like, okay, this

 

Speaker:

is going to get old pretty

 

Speaker:

I have two questions for you.

 

Speaker:

Yeah,

 

Speaker:

The first question is, Did you figure out what was consuming

 

Speaker:

your data cap or data usage cap?

 

Speaker:

not yet.

 

Speaker:

Cause it's only, it hasn't even been 24 hours, but I do have a pretty good guess

 

Speaker:

and I think it's right in front of me.

 

Speaker:

we'll see what is weird.

 

Speaker:

And again, I didn't want to talk about this too much, but what is weird is I

 

Speaker:

get these, some of the notifications it's, Mac book pro uploaded 3.

 

Speaker:

5 megabytes of data to LinkedIn.

 

Speaker:

At 3 45 a.

 

Speaker:

m.

 

Speaker:

And I'm like, what, like, why is my laptop uploading three and a half

 

Speaker:

megabytes of anything while it's just sitting here and I'm sleeping somewhere?

 

Speaker:

that's weird.

 

Speaker:

weird.

 

Speaker:

Yeah.

 

Speaker:

So anyway, so yeah, go ahead.

 

Speaker:

Yeah.

 

Speaker:

since you've decided to get rid of the Cox router, can you not just

 

Speaker:

use your Wi Fi mesh as a router?

 

Speaker:

I could have, but then I would have to completely redo my

 

Speaker:

network architecture, which as you recall, was a really big thing.

 

Speaker:

That's true.

 

Speaker:

And I actually really liked the firewall features of this.

 

Speaker:

That's, that was what would, what really drew me to it.

 

Speaker:

And I'd been thinking about it and this was that final excuse to get it.

 

Speaker:

and, I'm really enjoying the security aspects

 

Speaker:

glad.

 

Speaker:

So there, for people, if Mr.

 

Speaker:

Backup can learn networking and firewalls, so can you.

 

Speaker:

Yeah.

 

Speaker:

It's certainly not my, my forte.

 

Speaker:

but I want to talk, it's time for the news of the week.

 

Speaker:

, the big news, I think, of the entire IG world, everybody seems to be

 

Speaker:

talking about it, is this MGM hack.

 

Speaker:

I can't, can you imagine?

 

Speaker:

if you've been living in a hole, They shut down MGM and Caesars and all

 

Speaker:

of the hotels attached to MGM and Caesars, which is like half the strip.

 

Speaker:

And they shut down like card keys, slot machines,

 

Speaker:

ATMs.

 

Speaker:

everything.

 

Speaker:

ATMs,

 

Speaker:

So for, so for our listeners, Who may not know about this,

 

Speaker:

MGM is a hotel chain, right?

 

Speaker:

They have a bunch of things as well, right?

 

Speaker:

Like various hotels like Caesars and MGM, and they are in Las Vegas

 

Speaker:

and there are casinos, right?

 

Speaker:

So you can stay there, you can gamble there, right?

 

Speaker:

They make lots and lots and lots and lots of money.

 

Speaker:

but not in the last week or so,

 

Speaker:

And they got hit by a cyber attack, on the week of September

 

Speaker:

20th or so, I'm guessing.

 

Speaker:

yeah, and The I think that's the saddest part about this and by the way as of

 

Speaker:

today There's been half a dozen lawsuits attached because there's, threat of a,

 

Speaker:

PII leak, personal information leak.

 

Speaker:

And so there's been all sorts of worries about that.

 

Speaker:

So there's, a half a dozen, what do you call it?

 

Speaker:

Class action or lawsuits that are attempting.

 

Speaker:

To achieve class action status that have been filed.

 

Speaker:

I think the saddest part here and the way I like and we'll put the

 

Speaker:

link to this particular article in the show description, the

 

Speaker:

heading here targeting layer eight.

 

Speaker:

I've heard of the seven layer networking model again With my extensive

 

Speaker:

networking experience, the OSI model.

 

Speaker:

What is Layer 8,

 

Speaker:

People?

 

Speaker:

it's people.

 

Speaker:

Yes.

 

Speaker:

So layer 8 is people, which is probably the weakest part

 

Speaker:

of the entire stack, I'd say.

 

Speaker:

Yeah.

 

Speaker:

You are the weakest link!

 

Speaker:

Yeah, so what, how did they get in?

 

Speaker:

So they basically targeted an employee, right?

 

Speaker:

Who had the right level of access and They basically were able to gain access into

 

Speaker:

their Okta environment as a super admin.

 

Speaker:

But how did they do that?

 

Speaker:

That's the

 

Speaker:

Oh, so how did they do that?

 

Speaker:

They basically tripped, tricked their IT help desk?

 

Speaker:

That is so bad, right?

 

Speaker:

they somehow got...

 

Speaker:

Access to a privileged account, right?

 

Speaker:

according to the powers that be that they stole a password or they

 

Speaker:

hacked Active Directory somehow.

 

Speaker:

So they were able to attempt to log in, but they were stopped by MFA

 

Speaker:

which is a good thing, Okta, but then

 

Speaker:

They were able to convince the help desk that they were the person in

 

Speaker:

question and get them to reset MFA.

 

Speaker:

Now here's a question.

 

Speaker:

Do you think that employee is still there at the company?

 

Speaker:

And

 

Speaker:

is one of those

 

Speaker:

you be blaming the person

 

Speaker:

so I'm going to fast forward like 30 years.

 

Speaker:

Okay.

 

Speaker:

so 20, what would that be?

 

Speaker:

2053.

 

Speaker:

There's a guy he's going to be called Mr.

 

Speaker:

MFA and he's going to have a podcast dedicated to security because like my

 

Speaker:

career started with a screw up of this.

 

Speaker:

not quite this magnitude, but my career started with this.

 

Speaker:

And so I, My personal opinion, I don't know if this person is, has been fired.

 

Speaker:

I think they should only be fired if they didn't follow the processes that had been,

 

Speaker:

established and they

 

Speaker:

set out for them.

 

Speaker:

Potentially they should be disciplined.

 

Speaker:

I don't know if firing, if.

 

Speaker:

If termination is the appropriate, they should be disciplined.

 

Speaker:

If they followed the procedures that had been laid out for

 

Speaker:

them, process, people, right?

 

Speaker:

Then technology.

 

Speaker:

If they had been, we just had a podcast about that.

 

Speaker:

If they followed the procedures.

 

Speaker:

have been given to them.

 

Speaker:

Then I think some massive leniency, then you update your procedures,

 

Speaker:

et cetera, et cetera, et cetera.

 

Speaker:

I think of a massive, outage that was caused at a major, software

 

Speaker:

vendor that I worked with.

 

Speaker:

I'm trying to be, I'm trying to be very cagey here, where the backup

 

Speaker:

operator followed his Procedure that they had two parts of the app

 

Speaker:

that had to be shut down in order to do a backup because they couldn't

 

Speaker:

synchronize the two backup systems.

 

Speaker:

And so every two weeks they would shut down these apps and,

 

Speaker:

and then do a backup offline.

 

Speaker:

And this person.

 

Speaker:

The backup operator just did what they were told to do and shut down these

 

Speaker:

apps at the most critical time of the year when the apps were needed, right?

 

Speaker:

The person was just doing their job.

 

Speaker:

That person should not be fired.

 

Speaker:

That person should be You know, you changed the procedure.

 

Speaker:

So I don't know what happened here.

 

Speaker:

Yeah.

 

Speaker:

You train.

 

Speaker:

Yeah.

 

Speaker:

I hope some leniency was there.

 

Speaker:

if the person was fired and, I'd love to have them on the podcast.

 

Speaker:

But anyway, what could we learn from this, from this news here?

 

Speaker:

Prasanna?

 

Speaker:

basically that, one is even if you have the greatest technologies in

 

Speaker:

place and the greatest processes in place, people will always exist

 

Speaker:

never underestimate the power of people to do dumb things.

 

Speaker:

I do think that perhaps what's in order here is an update to process.

 

Speaker:

And the process should be when, cause you have to be able to reset MFA.

 

Speaker:

When resetting MFA, it should require many more, bells and whistles

 

Speaker:

and levels of authentication.

 

Speaker:

And we need to identify, we need to identify that this person who

 

Speaker:

calls in that says that they're Steve, we need a way to identify

 

Speaker:

that Steve is actually Steve.

 

Speaker:

so you create a process around that, that really verifies that someone who they are,

 

Speaker:

and especially,

 

Speaker:

you reset MFA.

 

Speaker:

and especially when it's someone of, with that level of privilege.

 

Speaker:

Especially, super especially, that's not a word, but yeah,

 

Speaker:

that, oh, I feel for these guys.

 

Speaker:

keep, abreast of, this story because it is going to get worse before it gets better.

 

Speaker:

And that's the news for this week.

 

Speaker:

So what I thought we would talk about this week and the backup to basic series is,

 

Speaker:

I've got it defined as, backup methods that support a traditional restore.

 

Speaker:

So basically the backup methods that I grew up with that are still,

 

Speaker:

in

 

Speaker:

Relevant.

 

Speaker:

Yeah.

 

Speaker:

in, yeah, right?

 

Speaker:

we like to live in a world where everybody's using the

 

Speaker:

latest and greatest, right?

 

Speaker:

And nobody's doing this old, full and incremental backups and stuff.

 

Speaker:

Nobody's doing that.

 

Speaker:

And that's just not right.

 

Speaker:

So we need to talk about these, these methods and see what we can get out there.

 

Speaker:

the first thing, I just have to, again, I'm, I'm, we're doing this based

 

Speaker:

on, my book, Modern Data Protection, There's a cover for those of you

 

Speaker:

watching via video, all, all three listeners that are watching via video.

 

Speaker:

I think it's 10.

 

Speaker:

There's maybe 10.

 

Speaker:

the number's actually gone up since we've been putting them on YouTube.

 

Speaker:

Oh, there you go.

 

Speaker:

the, I've got this thing in here.

 

Speaker:

so this is from chapter nine and talking about backup and

 

Speaker:

recovery software methods.

 

Speaker:

And the first thing I had in there was, is everything backup?

 

Speaker:

So there was a time when backup was well defined.

 

Speaker:

Backup was copy something to tape and then put that tape in a box,

 

Speaker:

right?

 

Speaker:

It was so simple back then.

 

Speaker:

Yeah, it was so simple back then.

 

Speaker:

Yes.

 

Speaker:

so I, as quote, Mr.

 

Speaker:

Backup, I see backup a lot broader than I think a lot of people do.

 

Speaker:

A lot of people, when they say backup, they go, Oh, this isn't backup.

 

Speaker:

This is, to me, backup is anything really that protects the data, the

 

Speaker:

way backup protects data, right?

 

Speaker:

And so I'm defining backup rather broadly as anything that is a copy of data

 

Speaker:

stored separately from the original.

 

Speaker:

that can be used to restore the original if it is damaged.

 

Speaker:

There's a lot of things that qualify for backup as backup under that

 

Speaker:

so let me just give you some examples and see if you think they qualify.

 

Speaker:

Okay.

 

Speaker:

So take a copy on tape,

 

Speaker:

Yes.

 

Speaker:

a copy in AWS S3.

 

Speaker:

A copy of the data that's in S3, which is separate from

 

Speaker:

The

 

Speaker:

your not.

 

Speaker:

Yeah.

 

Speaker:

yes.

 

Speaker:

okay?

 

Speaker:

a copy replicated from one storage system to another storage

 

Speaker:

system from the same vendor.

 

Speaker:

as long as...

 

Speaker:

there's a caveat here, because you used the word replication.

 

Speaker:

I need the ability, is it replicated in such a way that if

 

Speaker:

I damage production, so

 

Speaker:

that doesn't qualify as being stored separately.

 

Speaker:

Replicated with separate retention of the copies on the destination.

 

Speaker:

Okay.

 

Speaker:

Yes, I would call that a

 

Speaker:

Okay, snapshots on a production system, on a production storage

 

Speaker:

array that does not include AWS S3,

 

Speaker:

thank you for, yeah, so snapshots on the same array.

 

Speaker:

no, End of story, not a backup until it's copied somewhere

 

Speaker:

Okay, and then doing what you were recently doing when

 

Speaker:

editing the podcast, right?

 

Speaker:

Downloading a copy from the cloud onto your local system, copying it

 

Speaker:

to a different directory, and then copying it to yet a third directory.

 

Speaker:

On your local system.

 

Speaker:

Is that local system considered backups, each of those copies?

 

Speaker:

again, we're storing the data in a separate place that

 

Speaker:

has a separate risk profile.

 

Speaker:

Etc.

 

Speaker:

yes,

 

Speaker:

As long as the copy, the original

 

Speaker:

copy was in the, cloud.

 

Speaker:

it's also about, the purpose of why I'm doing it, right?

 

Speaker:

If the purpose of downloading that is to serve as possibly a backup, right?

 

Speaker:

Because there's a lot of times that we download data That

 

Speaker:

is not for backup purposes.

 

Speaker:

Now, it could accidentally become a backup if it's the only

 

Speaker:

copy that you have available.

 

Speaker:

But, just because I copy doesn't necessarily make it a backup.

 

Speaker:

It might be an archive.

 

Speaker:

And then the last example.

 

Speaker:

taking pictures on your iPhone and using iCloud to sync

 

Speaker:

your copies to iCloud photos.

 

Speaker:

Not a backup.

 

Speaker:

Because,

 

Speaker:

is that?

 

Speaker:

for two reasons.

 

Speaker:

One, which is really the primary.

 

Speaker:

And that is specifically in terms of Apple iCloud.

 

Speaker:

But the biggest thing is that it's synchronized.

 

Speaker:

that's the key.

 

Speaker:

That's, you're, you asked earlier, you delete a picture in your phone or some

 

Speaker:

app, delete, some like ransomware deletes a bunch of pictures in your phone.

 

Speaker:

It synchronizes that deletion up in the cloud and they go byebye, right?

 

Speaker:

It is a synchronized copy, not a backup.

 

Speaker:

it is stored separately, but if you delete it here and it gets deleted

 

Speaker:

there, that's not a backup, right?

 

Speaker:

Just like we were talking, before.

 

Speaker:

And that's one really important reason, possibly the most important reason.

 

Speaker:

But the other is that there's a feature in iPhone that...

 

Speaker:

It says we can store low res copies on the phone and the high res copies in

 

Speaker:

the cloud, which means that not only is it a synchronized copy, the only true

 

Speaker:

copy of your photo is in the cloud.

 

Speaker:

It's only one copy, which means you need to be backing up iCloud.

 

Speaker:

and by extension also, Google photos if you're an Android

 

Speaker:

person, so yeah, not a backup,

 

Speaker:

okay, no,

 

Speaker:

which we had a whole podcast episode about that.

 

Speaker:

How to properly back up your iCloud account.

 

Speaker:

yeah,

 

Speaker:

were good examples.

 

Speaker:

I think those are a lot of things, like you said, right?

 

Speaker:

It's not always easy to say, is it a backup or not?

 

Speaker:

Unless you dive into the next level of questions and ask, okay, is it really a

 

Speaker:

yeah,

 

Speaker:

Does it meet these

 

Speaker:

I think.

 

Speaker:

or not?

 

Speaker:

I think you did a good job of, the different categories, like that

 

Speaker:

thing of, if it's fully synchronized, whether synchronous or asynchronous,

 

Speaker:

if it's fully synchronized and if I delete the production and

 

Speaker:

it deletes the data, the copy,

 

Speaker:

that, That's not a backup.

 

Speaker:

right?

 

Speaker:

unless that copy has the ability to undo that.

 

Speaker:

If it does, then, I would change my answer, right?

 

Speaker:

And so like a NetApp synchronized filer, I would consider that

 

Speaker:

other copy, that would be backup,

 

Speaker:

other things that are not a backup, one that you didn't mention would be,

 

Speaker:

the recycle bin in your Microsoft 365.

 

Speaker:

That is not a backup, right?

 

Speaker:

It's not stored separately.

 

Speaker:

it's just, records in a database that have been flagged as deleted.

 

Speaker:

They haven't gone anywhere.

 

Speaker:

They're sitting right next to the production data.

 

Speaker:

So yeah,

 

Speaker:

Okay.

 

Speaker:

And then the other one is,

 

Speaker:

So in your opinion, does backup require you to always be able to go

 

Speaker:

back to a point in time that could plausibly have existed in the system?

 

Speaker:

And the reason I'm asking this is if I look at, I know email archiving comes

 

Speaker:

up a lot and sometimes people are like, oh, that's the same as backup.

 

Speaker:

But with email archive, you're just getting all the data that's there,

 

Speaker:

whether or not your mailbox actually looked like that, your inbox looked

 

Speaker:

like that or not at any point in time.

 

Speaker:

Yeah.

 

Speaker:

So backup.

 

Speaker:

requires restore, right?

 

Speaker:

For it to be a backup, you need to be able to restore it to the way it

 

Speaker:

looked at some point in time, right?

 

Speaker:

yeah, that's a really good question, Prasanna.

 

Speaker:

it's one thing to say a file, but, if you cannot, if you cannot bring

 

Speaker:

the thing that's been damaged back to its You know, back to before it

 

Speaker:

was damaged and that it comes back to the same way as it was before it was

 

Speaker:

damaged, then you don't have a backup.

 

Speaker:

You copy of the data, right?

 

Speaker:

And an email archive is a perfect example of that.

 

Speaker:

You have a copy of the data, but it was stored for a different purpose.

 

Speaker:

It was stored for archive, which means it wasn't designed to be put back into the,

 

Speaker:

the state it was in,

 

Speaker:

yeah, the state that it was in,

 

Speaker:

right?

 

Speaker:

so you might be able to restore all the email, but you won't be able to

 

Speaker:

restore folders and things like that.

 

Speaker:

A good backup should bring the thing back to the way it was before it was damaged,

 

Speaker:

however it let's go back to a time when tape drive started getting, so here,

 

Speaker:

we're going to talk about a feature that is now for many people, passe, right?

 

Speaker:

it's not really necessary because they no longer use tape as their primary target

 

Speaker:

or their initial target of backups.

 

Speaker:

and that is this concept of multiplexing.

 

Speaker:

And it goes back to, there was a time when we

 

Speaker:

Way back in the days.

 

Speaker:

right back in the day.

 

Speaker:

So multiplexing, do you want to define multiplexing or explain it?

 

Speaker:

Yeah, multiplexing.

 

Speaker:

Yeah, I, let me attempt to, I know I wasn't aware of this before we started

 

Speaker:

doing the podcast and you explained everything about tape and I know we've

 

Speaker:

had a bunch of folks, tape experts on the podcast as well, but multiplexing is...

 

Speaker:

to solve an issue where tape requires you to write at a certain speed.

 

Speaker:

If you don't, it's bad.

 

Speaker:

And tapes got faster and faster, but the problem was pumping data into the tape

 

Speaker:

device itself wasn't going as quickly as the tape speeds were increasing.

 

Speaker:

And so in order to solve that, what they decided to do was say, okay, Let's have

 

Speaker:

multiple clients feed data into the tape device at the same time, and we will

 

Speaker:

multiplex or basically write all those streams into the tape drive at the same

 

Speaker:

time, keeping the tape device happy.

 

Speaker:

While still being able to do all the backups.

 

Speaker:

Yeah, another word for it would be interleaving.

 

Speaker:

You did great.

 

Speaker:

basically putting all, chopping them up into pieces and then

 

Speaker:

putting together into one, turning a bunch of streams into one stream.

 

Speaker:

And when we first started, we used multiplexing settings of four

 

Speaker:

Which means four different

 

Speaker:

turn and.

 

Speaker:

Yeah, four different clients being combined into a stream to

 

Speaker:

make a tape drive happy, but tape drives got faster and faster.

 

Speaker:

The clients didn't get faster.

 

Speaker:

And so by the time I left, by the time I used my last tape drive in

 

Speaker:

production, we were up to 36, right?

 

Speaker:

We were up to 36 streams together to, to make an individual tape drive happy.

 

Speaker:

And the reason,

 

Speaker:

I was gonna ask why.

 

Speaker:

Yeah.

 

Speaker:

Why were clients not fast enough

 

Speaker:

yeah.

 

Speaker:

So the reason that this was bad is that, what, why is the only reason we back up,

 

Speaker:

to restore

 

Speaker:

right?

 

Speaker:

So when you

 

Speaker:

go to

 

Speaker:

do a restore,

 

Speaker:

Yeah.

 

Speaker:

yeah.

 

Speaker:

When you go to do a restore, you have to read all 36 streams

 

Speaker:

and throw 35 of them away.

 

Speaker:

So your tape drive, the speed of your restore is going to be 1 35th.

 

Speaker:

Of what it could potentially be if it hadn't been multiplexed,

 

Speaker:

But if you're never doing restore tests, it doesn't really matter.

 

Speaker:

Until you actually need to restore the data.

 

Speaker:

yeah, if you're You're killing me you're killing me yeah, so it was one

 

Speaker:

of these things where it was a Cut your nose off to to spite your face, right?

 

Speaker:

So We felt that it was But it was a necessary evil.

 

Speaker:

We, you could only restore if you've got backups done and we could only get

 

Speaker:

backups done reliably if we were using multiplexing, but we knew that it was

 

Speaker:

creating this problem and ultimately this was the undoing of tape from

 

Speaker:

a backup and recovery perspective.

 

Speaker:

We switched to destaging and.

 

Speaker:

these other things to undo this, necessary evil.

 

Speaker:

But, it, it was a mess.

 

Speaker:

But that's what multiplexing is.

 

Speaker:

So if you've heard about multiplexing, you don't need to do multiplexing

 

Speaker:

if you're backing up to disk.

 

Speaker:

Because disk can write at whatever speed you tell it to write at.

 

Speaker:

And it can write a bunch of things at the same time.

 

Speaker:

And you can give it 36 streams and it can write them all at the same time in

 

Speaker:

separate places of the disk in such a way that when you go to do a restore,

 

Speaker:

you don't, you're not, you don't have to read all of them to read one of them.

 

Speaker:

What?

 

Speaker:

That was my yes.

 

Speaker:

disk is fast enough, but

 

Speaker:

Yeah.

 

Speaker:

Well, it's not,

 

Speaker:

a disk

 

Speaker:

drive has a certain

 

Speaker:

number of IOPS it could handle.

 

Speaker:

And therefore, as long as your system is big enough.

 

Speaker:

To handle all of them in peril.

 

Speaker:

yes.

 

Speaker:

they're, disk drives are not, Unlimited bandwidth, unlimited IO,

 

Speaker:

et cetera, et cetera, et cetera.

 

Speaker:

Yes.

 

Speaker:

but the point of the way that it lays the data, you don't have to lay the,

 

Speaker:

you can lay the data however you want and then read it however you want.

 

Speaker:

there are, again, there are limits to everything depending on how

 

Speaker:

much you fragment the data and all that kind of stuff, right?

 

Speaker:

But it's still way better than tape from that perspective.

 

Speaker:

All right, next one's a whole lot easier.

 

Speaker:

What comes next?

 

Speaker:

What's the first type of, what's

 

Speaker:

let you tackle

 

Speaker:

what, no, I'll let you tackle this, Curtis.

 

Speaker:

So what's the, what is it?

 

Speaker:

The first type of backup that everyone should cut their teeth on.

 

Speaker:

what a full backup?

 

Speaker:

Is that

 

Speaker:

Yeah.

 

Speaker:

what you're saying?

 

Speaker:

Yeah.

 

Speaker:

so basically we're just going to talk about this concept of

 

Speaker:

full and incremental backups.

 

Speaker:

And probably everybody knows this, but this is a backup to basic series.

 

Speaker:

So a full backup backs up everything, an incremental backup

 

Speaker:

backs up things that have changed.

 

Speaker:

And the, there are different types of incremental backups, right?

 

Speaker:

And different people have different names for these different types, right?

 

Speaker:

terms you've probably heard, incremental, differential, cumulative incremental.

 

Speaker:

For a lot of people, cumulative incremental and

 

Speaker:

differential are the same thing.

 

Speaker:

for people that got stuck in Windows land, not necessarily so what's the

 

Speaker:

difference between an incremental and these other two things?

 

Speaker:

A cumulative incremental.

 

Speaker:

So an incremental is basically, Typically, Sunday you do a full backup, right?

 

Speaker:

Monday you need to do another backup.

 

Speaker:

Now, you don't want to do necessarily the entire full backup again,

 

Speaker:

because maybe that's too much data, you don't have enough time, etc.

 

Speaker:

So you'll do an incremental, which is basically whatever has

 

Speaker:

changed since the last full.

 

Speaker:

So since Sunday.

 

Speaker:

Sorry, since the last time you did a backup, I should say.

 

Speaker:

exactly, whatever's changed since the last time you did a

 

Speaker:

Yeah, so in that case, it was Sunday, so then Monday you get the incrementals,

 

Speaker:

now Tuesday you're going to do backup, and so you do another incremental, which

 

Speaker:

is whatever has changed since Monday,

 

Speaker:

Exactly,

 

Speaker:

and we just keep doing that, right?

 

Speaker:

Yeah, and

 

Speaker:

then if it's, yeah, if it's Sunday, right?

 

Speaker:

And now it's Saturday, how many tapes do I need to do a restore?

 

Speaker:

do you need...

 

Speaker:

The previous Sunday, plus the Monday, plus the Tuesday, plus

 

Speaker:

the Wednesday, Thursday, Friday.

 

Speaker:

You basically need to replay

 

Speaker:

by the way, by the way, I really, I really channeled the old Curtis there.

 

Speaker:

I did it without even meaning to, I said tapes, right?

 

Speaker:

Cause

 

Speaker:

that was the problem back then.

 

Speaker:

We literally had to grab for seven tapes, right?

 

Speaker:

Nowadays, we don't have to grab for seven tapes, but,

 

Speaker:

but you still have to do all those restores though, right?

 

Speaker:

So even in the case of, if a file existed Sunday, and then was deleted Monday,

 

Speaker:

and then came back on Tuesday, you would still end up having to do all of those

 

Speaker:

data, like basically you're replaying like a log, all the data that would

 

Speaker:

have existed on each of those days.

 

Speaker:

right.

 

Speaker:

The real problem is a file that was changed every single day.

 

Speaker:

You would actually restore that file seven times.

 

Speaker:

It's a lot of wasted effort.

 

Speaker:

That's just the idea of a increment or regular incremental.

 

Speaker:

Then we have a differential or a cumulative incremental.

 

Speaker:

And the difference between that is that it's going to, it's going to do

 

Speaker:

the thing that you said earlier, which is it's going to back up everything

 

Speaker:

that's changed since the fall.

 

Speaker:

And so what some people do is that they've stopped, they stopped doing

 

Speaker:

incrementals and they switched to differentials or cumulative incrementals

 

Speaker:

every day, and that way at the end of the week, I would need at most two tapes.

 

Speaker:

Right now, this whole thing has pretty much gone away in the world of.

 

Speaker:

disk based backups, right?

 

Speaker:

Because the whole reason that we did backups this way, is

 

Speaker:

that, first off, let me back up.

 

Speaker:

We used to do weekly fulls followed by daily incrementals.

 

Speaker:

Then we switched for, because when we went to automated tape libraries,

 

Speaker:

the whole process of managing the different tapes wasn't as a big.

 

Speaker:

Big of a deal.

 

Speaker:

So we went to monthly folds followed by daily incrementals or maybe

 

Speaker:

a weekly cumulative and right?

 

Speaker:

So you'd still need a maximum of seven tapes to do a restore But when

 

Speaker:

we switched to this this whole thing just became Kind of silly and moot and

 

Speaker:

whatever and you could back up, however, you wanted to back up and dedupe,

 

Speaker:

which we're going to talk about in a minute, dedupe really changed the game.

 

Speaker:

And, because it didn't matter whether you backed up full or incremental or whatever,

 

Speaker:

you still stored the same amount of data.

 

Speaker:

go

 

Speaker:

before we jump though, one thing that I think people might also hear in addition

 

Speaker:

to fulls, incrementals, differentials, and cumulative incrementals is also levels.

 

Speaker:

So maybe you could talk about levels.

 

Speaker:

I know sometimes it's specific to like Oracle.

 

Speaker:

And some databases, but maybe it might

 

Speaker:

no, that's a good point.

 

Speaker:

Yeah, thanks.

 

Speaker:

so the concept of a backup level, literally, this goes

 

Speaker:

back to the days of dump, right?

 

Speaker:

which was the command to backup Unix file systems.

 

Speaker:

A level zero was a full, a level one, And if you wanted to do increment, if you

 

Speaker:

want to do what we call the incremental backups, the way we, you would do a zero

 

Speaker:

followed by a one, followed by a two, followed by a three, followed by a four.

 

Speaker:

And, it got interesting because if you then lowered the number.

 

Speaker:

It would behave like a,

 

Speaker:

cumulative incremental, right?

 

Speaker:

so like you could do a zero and then you do a one.

 

Speaker:

If you then did another one, if you kept doing ones, you would get a differential.

 

Speaker:

You would get a cumulative incremental every day.

 

Speaker:

If you did a 0, a 1, and then a 2, and then a 1 again, it's just, it

 

Speaker:

basically, it always pointed back to the number that was the most recent

 

Speaker:

number that was lower than itself, and so it got complicated, and so

 

Speaker:

there were actually some people that

 

Speaker:

Is it they prefer

 

Speaker:

called Towers of

 

Speaker:

Hanoi, Yeah, which is based on the game, and I've got it in the book,

 

Speaker:

the Towers of Hanoi progressive thing, but I can't, it's like 0, 3, 2, 4, so

 

Speaker:

basically every backup, without doing cumulative incrementals, every backup,

 

Speaker:

every file that was changed would end up being on two tapes, which was just

 

Speaker:

an interesting way to, To minimize tape, again, this is all because we're doing

 

Speaker:

tapes, but nobody has tapes anymore.

 

Speaker:

So nobody cares.

 

Speaker:

But that's what levels were.

 

Speaker:

It was all the way up to nine.

 

Speaker:

and they still have this concept in, in things like Oracle Backup.

 

Speaker:

So the next thing to talk about is this concept called file

 

Speaker:

level incremental forever.

 

Speaker:

And the company that really put this out there was IBM with their product TSM.

 

Speaker:

And back in the day,

 

Speaker:

has been renamed,

 

Speaker:

idea is you

 

Speaker:

do one full, what's that?

 

Speaker:

Hasn't it been renamed?

 

Speaker:

It has, but I'm just saying they came out with it when they

 

Speaker:

came out, it was called TSM.

 

Speaker:

It's now like IBM spectrum protect, but, the idea was you do one full and then

 

Speaker:

everything is an incremental forever.

 

Speaker:

we never again do a full and this really saved a lot of

 

Speaker:

bandwidth and saved a lot of tape.

 

Speaker:

It came with a mess and that was over time and again, tape over time,

 

Speaker:

you could end up needing hundreds of tapes to restore a single file system.

 

Speaker:

you would need just one file from this tape and one file from that tape.

 

Speaker:

And since the hardest part of a tape is like, it was like

 

Speaker:

two and a half minutes just to get a tape in and, get it loaded and seek

 

Speaker:

to So the average point in a tape.

 

Speaker:

So I was not a fan of doing backups this way when we were talking about tape.

 

Speaker:

Was there a reason?

 

Speaker:

what was the use case at the time for that?

 

Speaker:

it was about saving tape, saving

 

Speaker:

storage.

 

Speaker:

It was about saving bandwidth.

 

Speaker:

the idea, there's nothing wrong with the idea of incremental forever.

 

Speaker:

It's just that their implementation.

 

Speaker:

Back in the day when it was all tape, even when they had disk staging.

 

Speaker:

So they would stage the disk.

 

Speaker:

So they wouldn't multiplex, by the way, they wouldn't multiplex.

 

Speaker:

They would stage the disk and then they would, do the backups to tape.

 

Speaker:

And this only applied to file system backups.

 

Speaker:

It didn't apply to database backups.

 

Speaker:

And, but literally you would need hundreds and hundreds of tapes

 

Speaker:

to restore a single file system.

 

Speaker:

And it just, I was never a fan of doing backups that way.

 

Speaker:

As long as we were backing up to tape and they had ways to they had, co location

 

Speaker:

and these various, and this thing called reclamation, because when you're doing

 

Speaker:

backups that way, you end up with a lot of tapes that have files on them that have

 

Speaker:

expired that are no longer needed, but you have other files on there that are needed.

 

Speaker:

And so you'd have to copy forward.

 

Speaker:

Yeah.

 

Speaker:

so that you could reclaim that whole tape and then reuse it.

 

Speaker:

And

 

Speaker:

That sounds like a

 

Speaker:

management nightmare.

 

Speaker:

An interesting engineering problem, but...

 

Speaker:

yeah, I was never a fan of doing backups that way.

 

Speaker:

and I'm even less of a fan now that we don't have to worry about tape.

 

Speaker:

Now we can just do incremental forever and just do it without all that

 

Speaker:

co location and reclamation stuff.

 

Speaker:

Cause on disk, to reclaim, you just delete a file, right?

 

Speaker:

On tape, you delete a file in the middle of a tape.

 

Speaker:

You have to reclaim the tape.

 

Speaker:

so that's file level incremental forever.

 

Speaker:

And then, with the advent of backing up to disk, Which finally

 

Speaker:

happened, I don't know, 20 years ago.

 

Speaker:

It's so funny.

 

Speaker:

We, we say the advent of something that happened 20 years ago.

 

Speaker:

When we finally started doing it, and once everybody finally went to, and by

 

Speaker:

the way, everybody still is not backing up the desk, it's still, there's still

 

Speaker:

a small contingent of people to back up the tape, so those people will really

 

Speaker:

enjoy the first half of this episode.

 

Speaker:

Now we have this concept of block level incremental forever.

 

Speaker:

Would you like to explain that?

 

Speaker:

Yeah, with block level incremental, I guess where I think of block level

 

Speaker:

incremental, I know there's various places you can think about it, is

 

Speaker:

when it applies to virtual machines and other sort of larger objects.

 

Speaker:

where it doesn't make sense, to back up an entire VM, doing full, or, incremental

 

Speaker:

backups away, if you think about how you would have done file level backups, right?

 

Speaker:

Why would I

 

Speaker:

Now, what, why would that be?

 

Speaker:

because I have a file which represents a disk, the entire file

 

Speaker:

doesn't change every time, right?

 

Speaker:

Parts of the file

 

Speaker:

it's, so we're talking to a VMDK file or VDK, For, for,

 

Speaker:

Hyper V, VDDK, that can't say VDDK.

 

Speaker:

I think it's VDDK.

 

Speaker:

Yeah,

 

Speaker:

I think you're right.

 

Speaker:

so you're saying if anything changes on there,

 

Speaker:

you're backing up the entire whole

 

Speaker:

do an incremental, exactly.

 

Speaker:

You're going

 

Speaker:

it's the entire file change, right?

 

Speaker:

So you're backing up the entire thing, but that doesn't make sense when

 

Speaker:

you have files which are say 10, 50, 100, 200 gigabytes and you're backing

 

Speaker:

that up every single time and so with block level incrementals What they

 

Speaker:

basically have done is say, okay What blocks have changed in this VMDK?

 

Speaker:

Let me just back those up, right?

 

Speaker:

Oracle also for databases, they do something similar, right?

 

Speaker:

Where it's hey Let me only back up the blocks within an Oracle data

 

Speaker:

file that have changed rather than backing up the entire Oracle database.

 

Speaker:

And how does the backup product know which blocks have changed?

 

Speaker:

Usually you have to rely on that vendor to tell you.

 

Speaker:

So in the case of Oracle, right?

 

Speaker:

You're usually integrating with Oracle RMAN via SBT or some other

 

Speaker:

mechanism where Oracle knows, okay, I keep track of the database blocks.

 

Speaker:

I know which ones are new.

 

Speaker:

Here is a list of blocks that you need to care about.

 

Speaker:

Same thing with VMware, when you have their, what is their SDK called?

 

Speaker:

VADP.

 

Speaker:

Yeah.

 

Speaker:

they've changed

 

Speaker:

the name.

 

Speaker:

Yeah.

 

Speaker:

They've changed the name, but basically they're, they have an API to talk to,

 

Speaker:

and they maintain a bitmap, right?

 

Speaker:

And then they just give you, here's a map of the bits that you need to go get.

 

Speaker:

These are the bits that have changed.

 

Speaker:

They maintain that.

 

Speaker:

And then the, there's an API for asking for those blocks,

 

Speaker:

now this is great for disk based systems because if you think about these are

 

Speaker:

all random spots in a file and so you can dump it out now It's up to figure

 

Speaker:

out like how you want to do this and I know we'll talk a little bit later

 

Speaker:

about deduplicated storage, but In the case of Oracle, typically you would just

 

Speaker:

dump it out as incremental blocks, and just dump it into a file, and now you

 

Speaker:

have all those blocks captured together.

 

Speaker:

In the case of VMware, they started doing that.

 

Speaker:

A lot of back up vendors would just dump it out as raw blocks, which makes sense.

 

Speaker:

but then, there are other optimizations you can do to do smarter things with

 

Speaker:

it, because with incremental block based backups, you still have to

 

Speaker:

restore from multiple files in order to stitch together the final actual image.

 

Speaker:

Yeah.

 

Speaker:

And you still have that problem.

 

Speaker:

That we talked about earlier where you may restore an individual block multiple

 

Speaker:

times if it changes multiple times, right?

 

Speaker:

the advantage is it's incredibly efficient.

 

Speaker:

And the, like when we talk about backing up VMs, I agree with you.

 

Speaker:

That's where this really shines.

 

Speaker:

Because back in the day, if we backed up VMs, And we just pretended they were,

 

Speaker:

physical machines and we were running full and incremental backups on them.

 

Speaker:

We were beating the crap out of these VMs.

 

Speaker:

So this is much more IO friendly, to the VMs, right?

 

Speaker:

So it's much friendlier on the VMs.

 

Speaker:

That's why we want to talk to the VMware API and get just

 

Speaker:

the blocks that have changed.

 

Speaker:

And it doesn't really come with any major downside compared to.

 

Speaker:

The alternative is because we're storing the data on disk.

 

Speaker:

Can I

 

Speaker:

ask one

 

Speaker:

yeah,

 

Speaker:

sure.

 

Speaker:

So we've talked about using block level incrementals for VMware, for databases.

 

Speaker:

Is there a reason it hasn't really caught on for files?

 

Speaker:

Because if I take a file and kind of split it up into blocks, right?

 

Speaker:

Could I get the same benefit?

 

Speaker:

Or is there a reason that it makes a lot more sense for

 

Speaker:

like VMs or virtual machines?

 

Speaker:

the benefit will be relative to the size of the file, right?

 

Speaker:

The bigger the file, the bigger the benefit that you're going to get.

 

Speaker:

And I would say that the reason it hasn't caught on is because of the next

 

Speaker:

thing we're going to discuss, right?

 

Speaker:

That solved that problem.

 

Speaker:

But yeah, I think about like files like PST files or maybe a big access

 

Speaker:

database or backing up like MySQL.

 

Speaker:

That's not file.

 

Speaker:

I mean, it is a file, but it's, it's actually a database.

 

Speaker:

Right.

 

Speaker:

I'd say the reason they didn't put a lot of effort is deduplication, which,

 

Speaker:

why don't we just talk about that now?

 

Speaker:

I know we've covered dedupe, just really quickly for those that don't

 

Speaker:

understand what dedupe is, the idea is that we're going to identify duplicate

 

Speaker:

segments of the data, and duplicate means that we've seen this data before.

 

Speaker:

we've done a full backup or we've done an incremental backup and we've

 

Speaker:

seen this part of the data before.

 

Speaker:

And for it to be truly considered ddu, you've gotta look at,

 

Speaker:

it's gotta be subfile, right?

 

Speaker:

It's gotta be part of, like we were talking about the V M D K

 

Speaker:

or the V D D K or a P S T file.

 

Speaker:

We've gotta be looking inside the file, slicing that up into chunks,

 

Speaker:

and then deciding this chunk.

 

Speaker:

We've seen it before, this chunk, we have not, And so there are two

 

Speaker:

different places that dedupe happens.

 

Speaker:

One is at the target, which is, like a box, like a data domain

 

Speaker:

or a quantum box or ExaGrid.

 

Speaker:

these boxes are target dedupe.

 

Speaker:

And then there's this thing called source dedupe, which.

 

Speaker:

really took off from a company that was called Avamar.

 

Speaker:

That company got sold to EMC, which I know you spent a little

 

Speaker:

time with, back in the day.

 

Speaker:

And, both of our previous employer did a source side deduplication.

 

Speaker:

Yeah, so with the target site is great because you could take it and

 

Speaker:

plug it in and place anywhere, right?

 

Speaker:

Because as long as it supports whatever the protocol your client is using, right?

 

Speaker:

You could just ingest the data and you get all the benefits of deduplication.

 

Speaker:

So data domain was.

 

Speaker:

Very popular initially for in virtual tape libraries, right?

 

Speaker:

So you had tapes, right?

 

Speaker:

People are constantly doing fulls and incremental backups.

 

Speaker:

That's perfect to deduplicate.

 

Speaker:

you plug in a data domain, it emulates the tape interface.

 

Speaker:

And now you just, your clients still continue writing to there and then all

 

Speaker:

your data gets deduplicated, right?

 

Speaker:

And so it doesn't matter if it's NFS or if it's SMB or if it's tape, right?

 

Speaker:

It just works.

 

Speaker:

yeah, it's like that firewalla box that I

 

Speaker:

bought, right?

 

Speaker:

It just, it just, it goes in and then it just works, right?

 

Speaker:

You didn't have to change anything.

 

Speaker:

With source dedupe, the idea is that, there's three parts

 

Speaker:

of the deduplication process.

 

Speaker:

There's the slicing and dicing, right?

 

Speaker:

There's the creation of a hash.

 

Speaker:

You run the chunk of data through Some sort of cryptographic algorithm, like SHA,

 

Speaker:

something, and then that gives you a value

 

Speaker:

and then that value, you have to look up that value in some

 

Speaker:

sort of hash table, right?

 

Speaker:

with target deduplication, all three of those actions happen on the

 

Speaker:

target, which is why it works so well.

 

Speaker:

You just send the backups the way you're used to sending them,

 

Speaker:

and then it does the magic.

 

Speaker:

It slices and dices, it hashes, and it does the lookup, and it figures out which

 

Speaker:

chunks of data are new based on that hash.

 

Speaker:

Source side, the first two happen on the source, right?

 

Speaker:

We slice up the data before we back it up.

 

Speaker:

We slice up the data We create a hash of the data, and then we ask

 

Speaker:

some magic person in the cloud, has this hash been seen before?

 

Speaker:

And the decision is made on the other end.

 

Speaker:

Yes, we've seen this, or we haven't seen this, and then we

 

Speaker:

send Or don't send the data.

 

Speaker:

To me, source dedupe is much more efficient than target dedupe.

 

Speaker:

The difficulty is that it is a much, it's a little bit baby in

 

Speaker:

a bathwater situation, right?

 

Speaker:

Because in order to get it.

 

Speaker:

You've got to do a forklift upgrade.

 

Speaker:

You've got to stop using, let's say, again, this is things have changed, but

 

Speaker:

back in the day, you had to stop using NetBackup and start using Avamar, right?

 

Speaker:

Stop using Networker or TSM and switch to, Druva, right?

 

Speaker:

You had to change your backup product to get this done.

 

Speaker:

Things change a little bit over time, right?

 

Speaker:

A lot of these products now support source dedupe.

 

Speaker:

But that was the main downside or still is the main downside.

 

Speaker:

If you want source dedupe, you've got to change your backup product,

 

Speaker:

uh, or you've got to change how you use your backup product,

 

Speaker:

assuming it starts supporting

 

Speaker:

yeah, and I would say at this point, probably a good chunk of products

 

Speaker:

either have their own source ID deduplication mechanism or they

 

Speaker:

work with deduplicated targets which allow for source ID deduplication.

 

Speaker:

for instance, integrating with ExaGrid or Data Domain from like TSM, Veeam,

 

Speaker:

Exactly.

 

Speaker:

Yeah, there are some that criticize it saying that, the slicing and

 

Speaker:

dicing and the creation of the hash puts a load on the client.

 

Speaker:

I have always argued that if done properly, that load created by the

 

Speaker:

slicing and dicing and hashing is offset by the significant reduction

 

Speaker:

of the load of transporting or not transporting 99 percent of the data,

 

Speaker:

right?

 

Speaker:

Yeah.

 

Speaker:

Other critiques of it have been that the restore speed wasn't great because of

 

Speaker:

how the data was stored on the other end.

 

Speaker:

And I would argue that's a implementation problem.

 

Speaker:

it's not a problem with the concept.

 

Speaker:

It's a problem with the implementation of the

 

Speaker:

And then the other thing to also mention about source side deduplication is

 

Speaker:

typically these are also using proprietary protocols, so you don't end up with a

 

Speaker:

lot of security issues you have around, say, having a target dedupe appliance

 

Speaker:

with NFS or SMB open to the world.

 

Speaker:

Yep.

 

Speaker:

Yep.

 

Speaker:

Agreed.

 

Speaker:

Yes.

 

Speaker:

Agreed that there is a security advantage to having the data sliced

 

Speaker:

and diced way before and then encrypted before you send it to the other

 

Speaker:

system instead of doing it over an unsecured protocol like NFS or SMB.

 

Speaker:

Exactly.

 

Speaker:

All right.

 

Speaker:

this episode, I think, got a little longer than we had intended for it to

 

Speaker:

get, but we covered a lot.

 

Speaker:

We covered a lot in this episode.

 

Speaker:

so basically, we learned about.

 

Speaker:

what is and is not a backup.

 

Speaker:

We learned about, multiplexing, full and incremental backups,

 

Speaker:

file level incremental backups, and source side deduplication.

 

Speaker:

Uh, it's a big episode.

 

Speaker:

what do you think?

 

Speaker:

Yeah, no, that covers a lot of what everyone talks about when you...

 

Speaker:

Do you ever refer to backup and restore, You gotta know these backup

 

Speaker:

technologies in order to be able to restore and protect your company.

 

Speaker:

These are things that you need to know.

 

Speaker:

All right.

 

Speaker:

And with that, I once again want to thank our listeners.

 

Speaker:

you are why we do this in Prasanna.

 

Speaker:

Once again.

 

Speaker:

great at your insights and questions as well.

 

Speaker:

Thank you, sir.

 

Speaker:

Thank you, sir.

 

Speaker:

Keeping me honest.

 

Speaker:

And, remember this show, the backup wrap up is an independent podcast and

 

Speaker:

the opinions that you hear are ours.

 

Speaker:

Not anyone else's, and also this is a production of BackupCentral.

 

Speaker:

com and, uh, produced and edited by yours truly.

 

Speaker:

And I just want to say, that's a wrap.