Link Search Menu Expand Document

Elastio Overview

Table of Contents

Overview

Elastio enables businesses to accelerate application deployments by automating recovery from incidents and security threats from within your development pipeline. Elastio’s platform provides agile DevOps teams with protection against ransomware and malware exposure throughout the application lifecycle, from build through release and production. Our tooling is flexible enough to support data of any type from any application workflow.

Figure 1: Elastio overview Figure 1.1: Elastio overview

Figure 1: Elastio overview

Elastio Cloud Connector

The Elastio Cloud Connector is installed in your AWS account so your data never leaves your control. It is responsible for:

  • communication with your Elastio Tenant
  • backup and restore operations
  • scanning your application recovery points for security threats
  • monitoring the progress of jobs
  • storing the backed up data

For more technical details, see Under the Hood.

Figure 2: Elastio Cloud Connector

Figure 2: Elastio Cloud Connector

Data Services

Our CLI is placed inside of a pipeline, or terminal, for on demand protection and recovery of:

  • Files
  • Filesystems
  • Streams (S3 buckets, stdin)
  • Block devices
  • Databases and individual tables (Local, Amazon RDS, Google Cloud SQL, Azure SQL)
  • Containers
  • VM’s
  • EC2 instances
  • EBS volumes

Elastio integrates with serverless compute, container services, VMs and any Windows or Linux machine. We offer automation policies in the UI for EC2 and EBS backup and recovery.

ScaleZ Storage

Our ScaleZ storage engine stores data in a deduplicated and compressed form and tracks everything under protection for:

  • Files
  • Streams
  • Databases
  • Tables
  • Partitions
  • Disks

Multiple workflows can access the data concurrently for fast recoveries and concurrent access to data. Our backups are incremental forever for fast performance and space efficiency.

Cyber Resilience

Integrity scan (iscan) helps to defend your data from ransomware and malware attacks by detecting undetonated ransomware hiding in recovery points and monitoring changes over time to detect ransomware attacks in progress.

iscan can be run directly in your CI/CD pipelines to scan directories, files or devices for ransomware and malware and also as a scheduled protection policies against EC2 and EBS volumes. Policies are managed from the Elastio Tenant.

Figure 3: Cyber Resilience

Figure 3: Cyber Resilience

Tenant

The Elastio Tenant is used to deploy the Elastio service, manage team members, access the Elastio Tenant API, create and manage protection policies and view job status. Details on how to use the Elastio Tenant are here.

Sample use cases

Build recovery into your pipeline

$ elastio block backup <devices> –tag <git hash>
$ elastio stream backup <database> --tag <git hash>
$  	<deployment code>
$ on error
$  	elastio stream restore <database> –tag <git hash>

Run integrity scan and mount last known good recovery points

$ elastio block backup /dev/data –iscan
$ elastio iscan /home/artifacts /home/images
$ elastio mount /dev/data ( infected environment )
$ elastio mount /dev/data-lkg ( last known good data )

Recover files fast

$ elastio mount device @-1 /dev/sda1:/mnt
$ ls /mnt

Test with near-live data in different environments

$ on-GCP> elastio stream restore database –tag RDS-postgres-db

Supported Environments

CLI and API’s

Elastio has a full featured CLI. Our public API’s will be available soon. We will announce them in the Elastio Tenant when they are ready.

Cloud Environments

Elastio can be installed on any Windows or Linux machine in the following environments:

  • Amazon EC2 instances
  • Azure VMs
  • GCP VMs
  • Digital Ocean Droplets
  • Linode instances
  • Hetzner Bare-Metal servers
  • Hetzner cloud VMs
  • Local machines

Figure 3: Cloud environments

Figure 3: Cloud environments

Additionally, the Elastio CLI can be used from within the following environments:

  • AWS Fargate
  • AWS Lambda
  • AWS CodePipeline
  • GCP GKE
  • Google Cloud functions
  • Azure containers
  • Azure functions
  • GitHub actions
  • CircleCI
  • Ansible
  • Jenkins

Lastly, the Elastio CLI can be scripted in:

  • Bash
  • Python
  • Powershell

Linux-based systems

Elastio provides repositories for x86_64 editions of the RHEL/CentOS starting from version 7, Amazon Linux 2, Fedora 35 and newer, Debian 9 and newer, and Ubuntu LTS versions 18.04, 20.04, 22.04 and Ubuntu 21.10 Also Elastio provides repositories for aarch64 (arm64) editions of the RHEL/CentOS 8, Amazon Linux 2, Fedora 36, Debian 10 and 11, Ubuntu 20.04 and 22.04. These repositories contain the Elastio CLI package and packages for the Elastio Snap (Snapshot) kernel driver.

The Elastio CLI can be used without the Elastio Snapshot driver, but we recommend you to install it as well.

Note: The lack of the NBD kernel module on RHEL/CentOS 7, 8, Alma Linux/Rocky Linux 8 will lead to Elastio block mount failure. To perform block mount, launch an AWS EC2 instance with other supported Linux-based OS with the NBD kernel module installed.

Windows systems The Elastio install for Windows contains the packages to install the Elastio CLI and two needed drivers for Windows Server 2016, 2019, 2022, Windows 10, Windows 11. No reboot is necessary to install our CLI.

MacOS systems

The Elastio install for macOS contains the package to install the Elastio CLI for Sierra 10.12. We recommend you to install it with Homebrew.

Elastio supports both Intel and Apple Silicon architecture.

To Begin

Designate an existing AWS account or create a new one to install our service. Currently you are able to deploy the Cloud Connector(s) to the following AWS regions:

  • us-east-1
  • us-east-2
  • us-west-2
  • eu-central-1
  • ap-southeast-2

Proceed to elastio.com and sign-up.

You will receive an email with access to your Elastio Tenant which is needed to deploy the Elastio service. The deployment should take only 10 minutes.

More on the sign up process here.