Database high availability

Size: px
Start display at page:

Download "Database high availability"

Transcription

1 Database high availability Seminar in Data and Knowledge Engineering Viktorija Šukvietytė December 27, Introduction The contemporary world is overflowed with data. In 2010, Eric Schmidt one of the Google executive chairman described this information flow as follows: these days all information that people have developed until 2003 can be created in just two days. Imagine what would happen if all this information flow stops. We usually use databases to collect knowledge and it is very important that these sources of knowledge would be accessible all the time, i.e. database high availability is very important for us. Using various technologies, database developers in all possible ways try to protect their databases from failures. In such occasions, they try to make them work again as soon as possible with the lowest possible loss of data. Developers require quite a lot of additional resources and knowledge in the specific database technologies to maintain the high availability (HA). We will show other checkpoint-based replication method for DB HA assurance on live migration (the ability to migrate virtual machines from one physical host to another while they are running). We will discuss advantages and disadvantages of this approach and compare it with database itself methods used to ensure high availability. This paper describes the DB high availability assurance ways in such a way in order to clearly show the evolution of ideas. In Sections 2.1 and 2.2, we present Active Data Guard [1] and Real Application Cluster [2]. These solutions applied to ensure the HA DB by DB developers. Sections intended to describe the assurance of DB HA by using VM technologies. These would be ReVirt system [3], Remus DB [4] and SecondSite [5] approaches. In principle, this is totally different manner to ensure the DB HA. However, the idea is borrowed from DBMS methods, but in other environment. 2. High availability assurance by applying DBMS technologies These capabilities take care of most scenarios that might impact the availability of a database. Many reasons may cause that we will not be able to access the resources of database. It can be administrator, human mistakes, data corruption caused by system, software faults, complete site failure, system maintenance operations and the data maintenance operations. It can be also malicious activity into database by hackers. Developers of databases are interested in the protection of these or similar scenarios. So, they use a variety of technologies to ensure the DB high availability. We will examine some used solutions (methods) that ensure DB high availability, such as Active Data Guard and Real Application Cluster. These methods use many DB technologies that help to solve encountered problems. Also, we will provide an overall assessment according to the HA assurance. 2.1 Active Data guard (DB technology) Active Data Guard is the most compact high-level solution to ensure the DB high availability if DB crashes. This solution prevents from the loss of data, ensures the minimal downtime and the minimal DB unavailability for the user. 1

2 The principal schema of Active Data Guard is shown in the Figure 1. It consists of primary database and one or more standby databases. The primary database generates the log files. The latter are transferred over the network to the standby database, which is always in recovery mode, i.e. the standby database adapts these transferred files. Active Data Guard is responsible for: Both primary and standby DB performance monitoring. Log files transferring from the primary DB to the standby DB. Standby DB conversation to the primary DB if this crashes. Also, it provides as fast as possible access to the database. Fig. 1 Principal schema of Active Data Guard. Intensive working with DB (especially executing operations like insert, delete and update), it generates a lot of changes in the log files of DB. Created DBMS technologies are applied to reduce this amount of information because all of this need to transfer over a network to standby DB. As an example reduction of amount of data, which need to be transferred to standby DB, we can provide Oracle DB applied methods: In the DB or session level can be set LOGGING/NOLOGGING option. This allows turn off/on of some operation logging. This is usually applied to temporary, easily rebuilt or generated data. Log files contains not the changed records of tables, but only those records changed blocks. Log files are archived and only then are transferred to standby DB. 2.2 Real application cluster (DB technology) Real application cluster (RAC) is premier shared disk database clustering technology. RAC provides customers with the highest database availability by removing the single database server as a single point of failure. In a clustered server environment, the database itself is shared across a pool of servers, which means that if any server in the server pool fails, the database continues to run on surviving servers. RAC principal schema is shown in Figure 2. RAC consists of several or more DB servers connected to one cluster. These servers are serving the same shared disk database. Among the DB servers participating in the cluster must be good bandwidth and fast interconnect, because all of these servers use the shared cache. Users transparent connect to the cluster and thus gain access to the DB. If any DB server fails, the client-server communication can survive. All connections automatically are taken over by other less loaded DB server from the cluster. Users can continue their work with no breaks. It is worth to note that technology used in RAC lets to use the shared cache. This technology allows taking over ones server running work to other server, when the first one fails. 2

3 Fig. 2 Principal schema of RAC. To use the shared cache, developers have to solve a problem related with changing large memory bandwidth and its transmission. For this purpose, they use various data compressions, filtrations, etc. As a requirement is fast and high-bandwidth interconnect between cluster servers. 2.3 Evaluation of HA assurance by applying the DBMS technologies Pros: Database developers use the DBMS technologies in order to ensure the high availability. Therefore, it is effective, flexible and helps to save resources. As an example of flexibility, we can mention the Active Data Guard possibility to have not only physical but also the logical standby DB. Both of them have the same log shipping technology. The difference between physical and logical standby DB is that in case of physical, the changes made in the primary DB will be replicated in the block level of standby DB, and in case of logical, the changes will be replicated in DDL (Data Definition Language), DML (Data Manipulation Language), DCL (Data Control Language) and TCL (Transaction Control) statements level. In RAC case, the effective system load distribution/imbalance is ensured through the DB instances. However, developers try to reduce overhead of resources in Data Active Guard by deploying standby DB (allows to open DB in read-only (RO) mode, generate reports, etc.). Also, users practically do not even notice if DB instance crashes in RAC case. Meanwhile, Active Data Guard terminates user sessions until users will be able to connect to the DB. It takes not so long, but it is necessary time period. During that time, while users cannot to connect, standby DB takes over the failed DB work Cons: Need to have the good specialists, who have good knowledge in the specific DBMS technologies, which we need to ensure high availability. This is costly. Tools, which usually ensure DB high availability, are licensed separately and their price is similar to the productive DB license price. 3. DB HA assurance, using the VM technologies There is another approach demonstrated by developers of ReVirt, Remus DB and SecondSite systems. Their solutions were based on virtual-machine technologies. We will examine the principles of these systems below and will discuss their advantages and disadvantages. 3

4 3.1 ReVirt: enabling intrusion analysis through virtual- machine logging and replay Revirt system was intended not only to support the DB high availability, but also to analyse an intrusion to the operations system actions. VM utilization and their action logging allows to move away from the target OS, lets the replication its status at any time and its action replay. Developers of ReVirt system use VM technologies (Live Migration of Virtual Machines, Virtual-Machine Logging and Replay) that are very similar as technology used in the Data Guard, called log shipping with time shipping, i.e. log files are applied not immediately upon receipt, but with a certain time lag. 3.2 Remus DB transparent high availability for database system (VM technology) Developers of Remus DB were one of the first, who took a look at the DB HA assurance from a different angle. They were eager to raise discussions, what is better: the HA is best implemented within the DBMS, or as a service by the infrastructure below it. The first ideas for Remus DB came from the predecessor ReVirt and VM life migration technology was chosen for DB HA assurance. The principal schema of Remus DB is shown in Figure 3. The basis of Remus DB system is consisted of two servers, which used to provide HA for a DBMS. One server hosts the active VM, which handle the DB and all client requests. The second one hosts the standby VM in the active mode. While active VM runs, the entire its state including memory, disk, and active network connections are continuously check-pointed to a standby VM on a second physical server. If the Active VM failure occurs, client connections on primary DB are connected to the DB in the standby VM. In such a way, clients can continue work with DB with a minimum delay and a minimum loss of data. Fig. 3 Principal schema of Remus DB. Here developers face to the challenges such as very large amount of data passing from Active VM to standby VM. This flow is due to the necessary transfer of entire Active VM state to standby VM. Developers of Remus DB set their sights on the DBMS technologies ensuring HA such as RAC and Active Data Guard that were mentioned above in order to cope with these problems. The idea to reduce the amount of required memory to pass on standby VM was borrowed from RAC. Transmitted data compression from Active Data Guard. Developers of RemusDB system mention, that their decision requires not so much additional system resources, i.e. overhead of system resources is 10-15%. 4

5 3.3 SecondSite disaster tolerance as a service (VM technologies) SecondSite, a high-availability and disaster tolerance service for virtual machines running in cloud environments. This service runs based on Remus DB system. All VM containing DBs are replicated to a backup image at an alternate geographic location. SecondSite service tracks the entire process and in the event of any VM failure, takes care of all the work that has been done on the failed VM would be transferred to the standby VM. Further, ensures that standby VM clone is made and Live Migration of Virtual Machines is restored. In such a way, SecondSite allows completely transparent process to ensure the HA of DBs located in cloud. Fig. 4 Principal scheme of SecondSite. In Figure 4, we can see a principal scheme of SecondSite service and Network Failover without Service Interruption. SecondSite has the ability to regulate the amount of data transferred from the primary site to Backup site. This is a compromise to a possible small data loss, but it is very important, because data are transferred to the geographically remote servers over the WAN. 3.4 Evaluation of HA assurance by using VM technologies Pros: DB HA assurance by using VM technologies allows moving away from DB itself. We do not need to care what kind of DB do we have and what tools to ensure the HA has it. Time taken to access DB after failure is relatively short. Using VM technologies to ensure DB HA requires only about 10-15% performance overhead. Cons: Using VM technologies for DB HA does not ensure such as diversity and flexibility as using DBMS technologies. There is no any logical standby DB. It is not possible to deploy standby DB in any other way than for its direct purpose. There are strict restrictions for a virtualization layer. It should meet the captured changes in the state of the whole VM at the active host. There is always performance overhead, although a small. It cannot distribute overhead through the several instances like in RAC. 5

6 4. Conclusion Step by step, we have looked at ways to ensure the DB HA. One of these ways is provided by DBMS. Supporters of VM technologies can offer alternatives. It was common that only DBMS can offer how to ensure the HA of databases. However, it can be stated that methods offered by supporters of VM technologies do not give in to first ones. DBMS methods can be more flexible, more optimal, but they are more expensive and require specific and good knowledge in databases. Meanwhile, another ones are versatile (it does not matter what kind of DB we have), can be relatively cheaper, but also have a greater variety of restrictions. These VM technologies ensuring DB HA has strong future perspective and this is the best proof of SecondSite system applied for DB in clouds. REFERENCES 1. Technical Comparison of Oracle Database 12c vs. Microsoft SQL Server 2012 Focus on High Availability, An Oracle White Paper, November 2013, 2. Oracle Real Application Clusters (RAC), An Oracle White Paper, June 2013, pdf?ssSourceSiteId=ocomen. 3. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen, ReVirt: Enabling intrusion analysis through virtual-machine logging and replay, in Proceedings of the 5th Symposium on Operating Systems Design and Implementation, December 09 11, 2002, Boston, Massachusetts, ACM New York, pp , 4. Umar Farooq Minhas, Shriram Rajagopalan, Brendan Cully, Ashraf Aboulnaga, Kenneth Salem, Andrew Warfield, RemusDB: transparent high availability for database systems, The VLDB Journal, 2(1):29 45, Shriram Rajagopalan, Brendan Cully, Ryan O'Connor, Andrew Warfield, SecondSite: disaster tolerance as a service, ACM SIGPLAN Notices, 47(7):97 107,

High Availability for Database Systems in Cloud Computing Environments. Ashraf Aboulnaga University of Waterloo

High Availability for Database Systems in Cloud Computing Environments. Ashraf Aboulnaga University of Waterloo High Availability for Database Systems in Cloud Computing Environments Ashraf Aboulnaga University of Waterloo Acknowledgments University of Waterloo Prof. Kenneth Salem Umar Farooq Minhas Rui Liu (post-doctoral

More information

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become

More information

Module 14: Scalability and High Availability

Module 14: Scalability and High Availability Module 14: Scalability and High Availability Overview Key high availability features available in Oracle and SQL Server Key scalability features available in Oracle and SQL Server High Availability High

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

Scalable and Highly Available Database Systems in the Cloud

Scalable and Highly Available Database Systems in the Cloud Scalable and Highly Available Database Systems in the Cloud by Umar Farooq Minhas A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

The Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant

The Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant The Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant Agenda / Introductions / Framing the High Availability (HA) Problem / Hot Standby + Log Streaming /

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison

DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison Document Control Change Record 3 Date Author Version Change Reference 15-Aug-2007 Ravi

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Windows Small Business Server Backup and Recovery Software Replay for Small Business Server Developed by AppAssure Software an industry-leading manufacturer of application backup and recovery solutions

More information

High Availability Databases based on Oracle 10g RAC on Linux

High Availability Databases based on Oracle 10g RAC on Linux High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database

More information

Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption

More information

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

SQL Server on Azure An e2e Overview. Nosheen Syed Principal Group Program Manager Microsoft

SQL Server on Azure An e2e Overview. Nosheen Syed Principal Group Program Manager Microsoft SQL Server on Azure An e2e Overview Nosheen Syed Principal Group Program Manager Microsoft Dedicated Higher cost Shared Lower cost SQL Server Cloud Continuum Hybrid SQL Server in Azure VM Virtualized Machines

More information

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2

More information

ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS

ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS DOAG Nuremberg - 17/09/2013 Kirill Loifman Oracle Certified Professional DBA www: dadbm.com Twitter: @loifmkir ELEMENTS OF HIGH AVAILABILITY

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Eliminate SQL Server Downtime Even for maintenance

Eliminate SQL Server Downtime Even for maintenance Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Remus: : High Availability via Asynchronous Virtual Machine Replication

Remus: : High Availability via Asynchronous Virtual Machine Replication Remus: : High Availability via Asynchronous Virtual Machine Replication Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley,, Norm Hutchinson, and Andrew Warfield Department of Computer Science

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server

More information

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey Beginning SQL Server 2012 Administration Rob Walters Grant Fritchey Apress Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments Introduction xv xvi xvii xviii Chapter 1:

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

Publication Date: April 2007

Publication Date: April 2007 white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created

More information

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media

More information

be architected pool of servers reliability and

be architected pool of servers reliability and TECHNICAL WHITE PAPER GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR MICROSOFT SQL SERVER Typical enterprise applications are heavily reliant on the availability of data. Standard architectures of enterprise

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Considerations for Enterprise Cloud Computing

<Insert Picture Here> Considerations for Enterprise Cloud Computing Considerations for Enterprise Cloud Computing Kew Yoke Ling Cloud Computing and Oracle EC2 Cloud Computing today: Developers are the primary users Infrastructure not enterprise ready

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

Techniques for implementing & running robust and reliable DB-centric Grid Applications

Techniques for implementing & running robust and reliable DB-centric Grid Applications Techniques for implementing & running robust and reliable DB-centric Grid Applications International Symposium on Grid Computing 2008 11 April 2008 Miguel Anjo, CERN - Physics Databases Outline Robust

More information

SERVER VIRTUALIZATION IN MANUFACTURING

SERVER VIRTUALIZATION IN MANUFACTURING SERVER VIRTUALIZATION IN MANUFACTURING White Paper 2 Do s and Don ts for Your Most Critical Manufacturing Systems Abstract While the benefits of server virtualization at the corporate data center are receiving

More information

SQL Server for Database Administrators Course Syllabus

SQL Server for Database Administrators Course Syllabus SQL Server for Database Administrators Course Syllabus 1. Description This course teaches the administration and maintenance aspects of Microsoft SQL Server. It covers all the roles performed by administrative

More information

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the

More information

Pervasive PSQL Meets Critical Business Requirements

Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive

More information

SQL Server 2012/2014 AlwaysOn Availability Group

SQL Server 2012/2014 AlwaysOn Availability Group SQL Server 2012/2014 AlwaysOn Availability Group Part 1 - Introduction v1.0-2014 - G.MONVILLE Summary SQL Server 2012 AlwaysOn - Introduction... 2 AlwaysOn Features... 2 AlwaysOn FCI (Failover Cluster

More information

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system. DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Library Recovery Center

Library Recovery Center Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery

More information

Always On: Unitrends Disaster Recovery Services (DRaaS)

Always On: Unitrends Disaster Recovery Services (DRaaS) Solution Brief Always On: Unitrends Disaster Recovery Services (DRaaS) What keeps you up at night? Are you thinking about about what would happen to your business in the event of a disaster? Are you worrying

More information

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER

Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Table of contents INTRODUCTION...1 BMC REMEDY AR SYSTEM ARCHITECTURE...2 BMC REMEDY AR SYSTEM TIER DEFINITIONS...2 > Client Tier...

More information

Evaluation of disaster recovery in cloud computing

Evaluation of disaster recovery in cloud computing Volume: 2, Issue: 6, 300-304 June 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 S. Suganya M.phil Full Time Research Scholar, Department of Computer Science, S.

More information

Microsoft SQL Database Administrator Certification

Microsoft SQL Database Administrator Certification Microsoft SQL Database Administrator Certification Training for Exam 70-432 Course Modules and Objectives www.sqlsteps.com 2009 ViSteps Pty Ltd, SQLSteps Division 2 Table of Contents Module #1 Prerequisites

More information

Backups and Maintenance

Backups and Maintenance Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Nutanix Tech Note. Data Protection and Disaster Recovery

Nutanix Tech Note. Data Protection and Disaster Recovery Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter) Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Ingres Replicated High Availability Cluster

Ingres Replicated High Availability Cluster Ingres High Availability Cluster The HA Challenge True HA means zero total outages Businesses require flexibility, scalability and manageability in their database architecture & often a Single Point of

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Protecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02

Protecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02 Protecting your SQL database with Hybrid Cloud Backup and Recovery Session Code CL02 ARCserve True Hybrid Data Protection ARCserve Backup Data protection for complex environments Disk to Disk to-tape Disk

More information

Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM

Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM Introduction to Virtualization Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM 1 Data Center Transformation 2 Scope of Virtualization Services 3 Virtualization Evolution 4

More information

Simplified HA/DR Using Storage Solutions. Tom Tyler, Perforce Software Agnes Jacob, NetApp

Simplified HA/DR Using Storage Solutions. Tom Tyler, Perforce Software Agnes Jacob, NetApp Simplified HA/DR Using Storage Solutions Tom Tyler, Perforce Software Agnes Jacob, NetApp 1 Introduction Major League Requirements Review: Perforce Server Storage Profile HA vs. DR Fault Tree Analysis,

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,

More information

Oracle Database Concepts

Oracle Database Concepts Oracle Database Concepts Database Structure The database has logical structures and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed

More information

Server Virtualization with Windows Server Hyper-V and System Center

Server Virtualization with Windows Server Hyper-V and System Center Course 20409B: Server Virtualization with Windows Server Hyper-V and System Center Course Details Course Outline Module 1: Evaluating the Environment for Virtualization This module provides an overview

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

NETAPP SYNCSORT INTEGRATED BACKUP. Technical Overview. Peter Eicher Syncsort Product Management

NETAPP SYNCSORT INTEGRATED BACKUP. Technical Overview. Peter Eicher Syncsort Product Management NETAPP SYNCSORT INTEGRATED BACKUP Technical Overview Peter Eicher Syncsort Product Management Current State of Data Protection Production Data Protection Storage Physical & VM App Servers Backup Servers

More information

Comparing TCO for Mission Critical Linux and NonStop

Comparing TCO for Mission Critical Linux and NonStop Comparing TCO for Mission Critical Linux and NonStop Iain Liston-Brown EMEA NonStop PreSales BITUG, 2nd December 2014 1 Agenda What do we mean by Mission Critical? Mission Critical Infrastructure principles

More information

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT

Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT Experimental Investigation Decentralized IaaS Cloud Architecture Open Stack with CDT S. Gobinath, S. Saravanan PG Scholar, CSE Dept, M.Kumarasamy College of Engineering, Karur, India 1 Assistant Professor,

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection

More information

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)

More information

Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks

Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 85 Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks Yingwei Wang 1 and Yi Pan 2 1 Department

More information

OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni

OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni OLTP Meets Bigdata, Challenges, Options, and Future Saibabu Devabhaktuni Agenda Database trends for the past 10 years Era of Big Data and Cloud Challenges and Options Upcoming database trends Q&A Scope

More information

Server Virtualization in Manufacturing

Server Virtualization in Manufacturing W H I T E P A P E R Server Virtualization in Manufacturing Do s and Don ts for Business- and Mission-critical Manufacturing Systems Uptime. All the time. 1 Abstract While the benefits of server virtualization

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

One Solution for Real-Time Data protection, Disaster Recovery & Migration

One Solution for Real-Time Data protection, Disaster Recovery & Migration One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

Relational Databases in the Cloud

Relational Databases in the Cloud Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

Storage and Disaster Recovery

Storage and Disaster Recovery Storage and Disaster Recovery Matt Tavis Principal Solutions Architect The Business Continuity Continuum High Data Backup Disaster Recovery High, Storage Backup and Disaster Recovery form a continuum of

More information

DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led

DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led Course Description Gain a deeper understanding of the advanced features of DB2 9 for Linux, UNIX, and Windows database environments

More information

High Availability Solutions for the MariaDB and MySQL Database

High Availability Solutions for the MariaDB and MySQL Database High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus

More information

Oracle Active Data Guard Far Sync Zero Data Loss at Any Distance

Oracle Active Data Guard Far Sync Zero Data Loss at Any Distance Oracle Active Data Guard Far Sync Zero Data Loss at Any Distance Oracle Maximum Availability Architecture Best Practices O R A C L E W H I T E P A P E R A U G U S T 2 0 1 4 Table of Contents Introduction

More information

Key Considerations and Major Pitfalls

Key Considerations and Major Pitfalls : Key Considerations and Major Pitfalls The CloudBerry Lab Whitepaper Things to consider before offloading backups to the cloud Cloud backup services are gaining mass adoption. Thanks to ever-increasing

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Study concluded that success rate for penetration from outside threats higher in corporate data centers

Study concluded that success rate for penetration from outside threats higher in corporate data centers Auditing in the cloud Ownership of data Historically, with the company Company responsible to secure data Firewall, infrastructure hardening, database security Auditing Performed on site by inspecting

More information

Microsoft s Advantages and Goals for Hyper-V for Server 2016

Microsoft s Advantages and Goals for Hyper-V for Server 2016 Virtualization is a bedrock of modern cloud environments. Hypervisors manage the virtual machines in a cloud environments, providing six fundamental features, as shown in the table below. 1 Hypervisors

More information

Database as a Service (DaaS) Version 1.02

Database as a Service (DaaS) Version 1.02 Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...

More information

Outline. MCSA: Server Virtualization

Outline. MCSA: Server Virtualization MCSA: Server Virtualization Description Get hands-on instruction and practice implementing Microsoft Server Virtualization with Windows Server 2012 R2 Hyper-V and System Center 2012 R2 Virtual Machine

More information

Case Study: Oracle E-Business Suite with Data Guard Across a Wide Area Network

Case Study: Oracle E-Business Suite with Data Guard Across a Wide Area Network Case Study: Oracle E-Business Suite with Data Guard Across a Wide Area Network Data Guard is a complete, reliable, DR solution for the mission critical 5.5TB database that supports Oracle s global business

More information