Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide)

Size: px
Start display at page:

Download "Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide)"

Transcription

1 NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) IS027-18E

2 NEC Corporation No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this book may be modified without notice in the future.

3 Preface This manual is bundled with NEC Storage RemoteDataReplication/DisasterRecovery to explain, through descriptions and examples, how Disaster Recovery functions are used for data replication and how disaster recovery systems are introduced and operated. This manual is intended for readers who already possess the basic knowledge about data replication that is essential for using Disaster Recovery functions to introduce and operate a disaster recovery system. For description of data replication, refer to the NEC Storage Software Data Replication User s Manual (Function Guide) (IS015), NEC Storage Software Data Replication User s Manual (Installation and Operation Guide) (IS016 or IS020) in accordance with your OS in use, and NEC Storage Software ControlCommand Command Reference (IS041). Refer to the NEC Storage Software Manual Guide (IS901) for a general description of NEC Storage and related manuals. Remarks 1. This manual explains functions implemented by the following program products: NEC Storage Manager and NEC Storage BaseProduct NEC Storage ControlCommand (Note) NEC Storage DynamicDataReplication NEC Storage RemoteDataReplication NEC Storage RemoteDataReplication/DisasterRecovery Note: NEC Storage ControlCommand is a program product that has integrated the following five functions. ReplicationControl SnapControl ReplicationControl/DisasterRecovery ProtectControl PowerControl 2. This manual is applicable to the program products of the following versions: NEC Storage Manager Ver6.2 NEC Storage BaseProduct Ver6.2 NEC Storage ControlCommand Ver6.2

4 3. The NEC Storage Manager is referred to as ism or Storage Manager in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage software products. Term NEC Storage Software Product AccessControl BaseProduct ControlCommand DynamicDataReplication or DDR PathManager PerformanceMonitor PerformanceNavigator RemoteDataReplication or RDR RemoteDataReplication/DisasterRecovery NEC Storage AccessControl NEC Storage BaseProduct NEC Storage ControlCommand NEC Storage DynamicDataReplication NEC Storage PathManager NEC Storage PerformanceMonitor NEC Storage PerformanceNavigator NEC Storage RemoteDataReplication NEC Storage RemoteDataReplication/DisasterRecovery 4. The NEC Storage series disk array subsystem is referred to as a disk array in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage hardware products. Term NEC Storage Hardware Product D3 series D4 series D8 series xxx series or xxxx series Sxxx or Sxxxx * xxx and xxxx represent the model number. NEC Storage D3 series NEC Storage D4 series NEC Storage D8 series NEC Storage xxx series or NEC Storage xxxx series NEC Storage Sxxx or NEC Storage Sxxxx 5. The following terms in this manual refer to the NEC Storage software manuals. Term NEC Storage Software Manual User s Manual (UNIX) User s Manual Configuration Setting Tool User s Manual (GUI) Messages Handbook Data Replication User s Manual (Function Guide) Data Replication User s Manual (Installation and Operation Guide) ControlCommand Command Reference Partitioning User s Manual PathManager User s Manual (Linux) 6. Trademarks and registered trademarks NEC Storage Software NEC Storage Manager User s Manual (UNIX) (IS001) NEC Storage Software NEC Storage Manager User s Manual (IS004) NEC Storage Software Configuration Setting Tool User s Manual (GUI) (IS007) NEC Storage Software Messages Handbook (IS010) NEC Storage Software Data Replication User s Manual (Function Guide) (IS015) NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Windows) (IS016) NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Linux) (IS020) NEC Storage Software ControlCommand Command Reference (IS041) NEC Storage Software Partitioning User s Manual (IS043) NEC Storage Software PathManager User s Manual (Linux) (IS202) Microsoft, Windows, Windows Server, and Windows Vista are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. HP-UX is a registered trademark of Hewlett-Packard Co. in the United States.

5 UNIX is a registered trademark of The Open Group in the United States and other countries. VERITAS, VxVM, VxFS, NetBackup, VERITAS Volume Manager, VERITAS File System, and VERITAS NetBackup are trademarks or registered trademarks of VERITAS Software Corporation in the United States and other countries. Solaris is a trademark or a registered trademark of Sun Microsystems, Inc. in the United States and other countries. Linux is a trademark or registered trademark of Mr. Linus Torvalds in the United States and other countries. Other product names and company names, etc. are trademarks or registered trademarks of the associated companies. 7. This product includes the OSSs below. For details on the licenses, refer to Appendix A in this manual. Apache log4j ( flex ( OpenSSL ( 8. In this document, the capacity is calculated based on units of 1024 (for example 1 KB = 1024 bytes) unless otherwise specified. 9. In this document, matters to which careful attention needs to be paid will be described as follows: Be sure to observe the instructions. If the indications are ignored and the system is improperly operated, settings which have been already made might be affected. Type of Indication Type Description Describes contents which require users to pay special attention for operation. 1st Edition in November th Edition in January 2010

6 Contents Chapter 1 Overview of Disaster Recovery What is Disaster Recovery? Disaster Recovery Use Format Copy Mode Options for Disaster Recovery Systems Freshness (Up to Date) of Backup Data and Use Format Layout and Configuration of Disaster Recovery System Placement of Sites Selection of Configuration and Lines...10 Chapter 2 Disaster Recovery Functions Atomic Group (ATgroup) ATgroup Configuration Display and Setting Functions ATgroup State Display Function ATgroup Replication Control Functions Copy of Order Guarantee Function Atomic-break Function Semi-Synchronous Copy Mode of Order Guarantee and Atomic Break Simultaneous Replication of Serially Configured Pair Remote Pair Operations RDR Quick Sync Volume Update Prevention Volume Comparing/Identity Certified Swap Function for RDR Pair Operation of Partitioning Function...31 Chapter 3 Install Software and Build Environment System Configuration Hardware Software Placement of Management Servers Placement of Control Volume Software Installation Installation of RemoteDataReplication/DisasterRecovery ReplicationControl/DisasterRecovery Installation and Environment Setting Building an ATgroup Pairs Registered to an ATgroup Steps for Building an ATgroup...43 Chapter 4 Software Operation Methods Storage Manager s ATgroup Function Operation Method (GUI) ATgroup Information Screen Displaying the ATgroup Configuration and State Creating an ATgroup Deleting an ATgroup Creating/Deleting an ATgroup Volume Renaming an ATgroup Changing the Allowed Response Time of MV Replicating an ATgroup Separating an ATgroup Restoring an ATgroup Forced Separation of an ATgroup Recovery from Fault Separation Forced Deletion of an ATgroup Outputting the ATgroup Information List in CSV format Saving an ATgroup and Registered Pair Information ReplicationControl/DisasterRecovery Command Operation Methods (CLI) Replicating an ATgroup (ismrc_replicate) i

7 4.2.2 Separating an ATgroup (ismrc_separate) Restoring an ATgroup (ismrc_restore) Recovery from Fault Separation (ismrc_change) Waiting for the ATgroup Sync State to Change (ismrc_wait) Displaying the ATgroup Copy State (ismrc_query) Displaying the ATgroup List (ismrc_sense) Building an ATgroup (ismrc_atg) Remote Operation Commands Chapter 5 Operation Examples Backup Line Fault Recovery Use of RV when Disaster Occurs Copy Back Mode from RV to MV Restoration for Copy Back Mode Copy Back Mode by Pair Configuration Substitutions Copy Back Mode through Swap for Single RDR Pair Notes on Copy Back Mode Procedure through Swap for Single RDR Pair Recovery Procedure at Pair Swap Failure Copy Back Mode through Pair Swap in RDR/DR Configuration Copy Back Mode Procedure through Swap for RDR Pair Recovery Procedure at Pair Swap Failure Chapter 6 Notes Specifications of ATgroup Notes on Building an Environment Notes for Operations Appendix A License A.1 Apache log4j License A.2 Flex License A.3 OpenSSL License Index ii

8 This page is intentionally left blank. iii

9 Chapter 1 Overview of Disaster Recovery Chapter 1 Overview of Disaster Recovery Given the increasingly important role of information systems in the context of business activities, disaster recovery support for such information systems are needed more than ever. RemoteDataReplication and DisasterRecovery provide functions that lay the foundation for disaster recovery. This chapter gives a general description of disaster recovery systems that use RemoteDataReplication and DisasterRecovery software What iis Diisaster Recovery? Disaster recovery is a solution that enables businesses to recover operations after a system fault has occurred due to a disaster, accident, etc. The types of disasters that disaster recovery is designed to anticipate include natural disasters such as earthquakes and floods as well as fires and other man-made disasters caused by human error. Main site Backup site Earthquake, flood, fire, etc. Recovery Figure 1-1 Disaster Recovery When constructing a disaster recovery system, the anticipated disasters and the system repair level differ according to the system s environment and requirements. When the scope of effects from anticipated disasters goes beyond a particular building, data must be stored at remote locations to enable configuration of a system that will take over the operations of the affected system. Typically, disaster recovery systems feature copying 1

10 Chapter 1 Overview of Disaster Recovery of data to remote sites as an essential component in anticipation of disasters whose effects transcend one building. RemoteDataReplication and DisasterRecovery provide various methods for copying data to remote sites. Table 1-1 Anticipated Disasters Scope of Disaster Wide area (in or between states, provinces, etc.) Specified districts (within a city) Specified building Specified system Cause of Disaster Earthquake, etc. Flood, power outage, etc. Fire, water damage, terrorist attacks, etc. Hardware fault Software fault Human error Virus, etc. Two indicators are used to determine the repair level of a system: the recovery point objective (RPO) and the recovery time objective (RTO). The RPO indicates from which point in time data will be recovered. In smaller systems, the RPO can recover data from a point just before the disaster occurred. A smaller RPO value is used when creating a disaster recovery system in which disaster-related data loss must be minimized. The RTO indicates the amount of time required to recover and resume operations. When this RTO value is low, recovery of operations following a disaster occurs more quickly, thus reducing the down time. A smaller RTO value is used when creating a disaster recovery system in which down time must be minimized. Generally, setting smaller RPO and RTO values entails higher costs and makes both the creation and the administration of the system more difficult. Consequently, both the RPO and RTO are determined based on the required repair level, then the type of disaster recovery system to create is selected in order to suit these RPO and RTO values. RemoteDataReplication and DisasterRecovery are software that supports the configuration of these various types of disaster recovery systems. 2

11 Chapter 1 Overview of Disaster Recovery RPO Now Several hours ago System in which data loss must be minimized Mission critical business system Yesterday System in which down time is allowed High repair level, high degree of difficulty, high costs Last month Client Next week Tomorrow Several hours later Mail server No down time RTO Recovery Point Objective: This indicates point in time from which system can be recovered Recovery Time Objective: This indicates amount of time until system operations can be resumed Figure 1-2 Relations among Recovery Point Objective, Recovery Time Objective, and Repair Level 3

12 Chapter 1 Overview of Disaster Recovery 1..2 Diisaster Recovery Use Format In disaster recovery systems, the use format is set by selecting options such as the repair point (the point in time from which data will be recovered), the maximum recovery time before data can be used again, the method used to copy data to remote sites (copy mode), and the type of synchronization (replication or separation) used while the system is operating. Copy mode options that can be selected for a disaster recovery system are described below, along with the freshness (up to date) of backup data and use formats Copy Mode Opttiions ffor Diisastter Recovery Systtems The disaster recovery system s copy mode options are synchronous mode, semi synchronous copy mode of order guarantee, and background copy mode. Different use formats can be implemented depending on the copy mode. The features of each copy mode are described below. 4

13 Chapter 1 Overview of Disaster Recovery Synchronous mode In this mode, business I/O operations are fully synchronized and copied to a remote site. Because copying is always synchronized with business I/O operations, the data being copied is always consistent and up to date. Completion of business I/O operations is held pending until the copy operation is completed, so the response to business I/O operations depends on the line speed. Main site Backup site Application server (iv) (i) (ii) (iii) Synchronization Master Replication Disk array Disk array Processing sequence Description of processing Processing request source or response source Processing request destination or response destination (i) Write request to master volume Application server Main site s disk array (ii) Write request to replication volume Main site s disk array Backup site s disk array (iii) Write request completion response to replication volume Backup site s disk array Main site s disk array (iv) Write request completion response to master volume Main site s disk array Application server Figure 1-3 Overview of Operations in Synchronous Mode 5

14 Chapter 1 Overview of Disaster Recovery Semi-synchronous copy mode of order guarantee Data is copied to a remote site without being synchronized with business I/O operations. Since data is copied to business I/O operations via the guaranteed sequence method, the data being copied is consistent. When a high-speed line is used, this has almost no impact on business I/O responses. Main site Backup site Application server (ii) (i) (iii) (1) (2) (iv) (1) (2) (3) Master Semi-synchronous guaranteed sequence (3) Replication Disk array Disk array Processing sequence Description of processing Processing request source or response source Processing request destination or response destination (i) Write request to master volume Application server Main site s disk array (ii) Write request completion response to master volume Main site s disk array Application server (iii) Write request to replication volume according to sequence of writing to master volume (Sequence is (1) (1), (2) (2), (3) (3) ) Main site s disk array Backup site s disk array (iv) Write request completion response according to sequence of writing to replication volume (Sequence is (1) (1), (2) (2), (3) (3)) Backup site s disk array Main site s disk array Figure 1-4 Overview of Operations in Semi-synchronous Copy Mode of Order Guarantee 6

15 Chapter 1 Overview of Disaster Recovery Background copy mode Copying is asynchronous in relation to business I/O. Since copying to a remote site is done in batches, there is no consistency in the data being copied. This has no impact on business I/O responses. Main site Backup site Application server (ii) (i) (iii) (iv) Background Master Replication Disk array Disk array Processing sequence Description of processing Processing request source or response source Processing request destination or response destination (i) Write request to master volume Application server Main site s disk array (ii) Write request completion response to master volume Main site s disk array Application server (iii) Write request to replication volume Main site s disk array Backup site s disk array (iv) Write request completion response to replication volume Backup site s disk array Main site s disk array Figure 1-5 Overview of Operations in Background Copy Mode Summary of copy mode features The following is a summary of each copy mode s features. Copy Mode Table1-2 Summary of Copy Mode Features Consistency of Data Freshness of Data Being Copied Business I/O Response Synchronous mode Consistent Same as master Depends on line speed Semi-synchronous copy mode of order guarantee Consistent Almost same as master Does not depend on line speed if high-speed line is used Background copy mode Not consistent Not the latest data Does not depend on line speed 7

16 Chapter 1 Overview of Disaster Recovery Freshness ((Up tto Datte)) off Backup Datta and Use Formatt The copy mode and sync state are selected based on how fresh (up to date) the backup data needs to be when used for recovery following a disaster, and this also helps determine the use format for operations. For example, if it is essential to have the latest data for recovery after a disaster, a high-speed line should be used to continually replicate in either synchronous mode or [semi synchronous copy mode of order guarantee], and the use format that copies consistent data with a guaranteed write order to a remote site should be selected. For cases where it is acceptable to recover using backup data after a disaster, the background copy mode that does not affect business I/O operations should be used and the use format that periodically copies data to a remote site via pause point backup should be selected. For cases where it is acceptable to simply store backup data to a remote site, the use format that periodically executes pause point backup to the remote site without placing a server at the backup site should be selected. Freshness of Backup Data (Up to Date) Recovery from replication during replicating Table 1-3 Freshness (Up to Date) of Backup Data and Use Format Copy Mode Synchronous mode Semi synchronous copy mode of order guarantee Use Format Synchronous Mode Continual replication using high-speed line Continual replication using high-speed line Repair Point Time Until Data Recovery Same as master Short (*1) Almost same as master Short (*1) Recovery from backup data Background copy mode Data is backed up at periodic pause points Backup point Long (*2) *1: Perform rollfoward, if necessary, when database has been configured. *2: Restoration from backup media is required. Rollback from log is required when database has been configured. 8

17 Chapter 1 Overview of Disaster Recovery 1..3 Layout and Confiiguratiion of Diisaster Recovery System Points to consider when placing and configuring a disaster recovery system are described below Pllacementt off Siittes In a disaster recovery system, the sites are placed at physically dispersed locations so that faults will not occur simultaneously at both the main site and backup site in the wake of any anticipated disaster. Anticipated Scope of Disaster Cause of Disaster Wide area (in or between states, provinces, etc.) Earthquake, etc. Table 1-4 Estimation of Distances between Sites (Examples) Specified districts (within a city) Flood, power outage, etc. Specified building Fire, water damage, terrorist attacks, etc. Scope of Disaster s Effects Halts economic activities in entire area Halts economic activities in specified area Halts economic activities in specified companies Distance between Sites Several hundred kilometers Several dozen kilometers Several hundred meters to several kilometers 9

18 Chapter 1 Overview of Disaster Recovery Sellecttiion off Conffiigurattiion and Liines To make sure that recovery is always possible in a disaster recovery system, hardware must be configured so that there are no single fault points whereby a single fault can stop the entire system s operations. This is why an independent, redundant configuration of servers, access paths, and power supplies are recommended. In a network that has a disaster recovery system, maintaining the quality of communication lines and redundancy is required. In particular, an independent and redundant configuration is recommended for the lines between the main site and backup site so that data can always be transferred to the backup site, even when a line fault has occurred. In addition, the line speed that is required varies according to the disaster recovery configuration and the amount of data updating that accompanies business tasks. Consequently, the required line speed must be estimated in advance. Terminal Terminal Terminal WAN Network equipment Network equipment Server Server Network equipment Network equipment Disk array Main site Disk array Backup site Figure 1-6 Network Configuration Example 10

19 Chapter 2 Disaster Recovery Functions Chapter 2 Disaster Recovery Functions This chapter describes the disaster recovery functions provided by RemoteDataReplication and RemoteDataReplication/DisasterRecovery Atomiic Group (ATgroup) Disaster recovery functions are able to create a group of volume pairs which require consistency. A group that has such consistency is called an Atomic Group (hereafter abbreviated as ATgroup). When several RDR pairs are registered to an ATgroup, data can be copied from the master volume (Master Volume: MV) to a replication volume (Replication Volume: RV) in the order in which each volume is updated. Preserving the order in which each volume is updated enables the consistency of data to be maintained in the RV to be used for recovery. For example, when using a database for business tasks, consistency must be maintained among the volumes that comprise the database. Accordingly, all pairs in the volumes that comprise a database are registered to ATgroups. When an ATgroup is created for each business task and each pair is registered, data consistency can be maintained in the RV for each business task. In addition since ATgroups can be used to manage the state of individual groups, it enables state displays and operations on a per-group basis, which means that the usability of RV data after a disaster can be determined on a per-group basis. Main site Backup site MV1 RV1 MV2 RV2 MV3 RV3 Disk array Disk array ATgroup * Consistency can be maintained among RV1, RV2, and RV3 that are included in an ATgroup. Figure 2-1 ATgroup 11

20 Chapter 2 Disaster Recovery Functions The following describes, in relation to ATgroups, (1) the ATgroup configuration display and setting functions, (2) the state display function, (3) replication control functions, (4) the copy of order guarantee function, and (5) the atomic-break function. The number of ATgroups that can be created, the number of pairs that can be registered to ATgroups, and the number of ATgroups to which replication can be executed in semi synchronous copy mode of order guarantee are limited. For further description of ATgroups, refer to 6.1 Specifications of ATgroup. 12

21 Chapter 2 Disaster Recovery Functions ATgroup Conffiigurattiion Diispllay and Settttiing Functtiions The elements that configure the ATgroup can be displayed and set. Any ATgroup name can be set for an ATgroup, and these names can be used to distinguish among the ATgroups. The MV side of ATgroups in a database group is called a concentrator, and the RV side is called the distributor. The disk array on the concentrator side (MV side) is used to create an ATgroup, which is built by registering RDR pairs. Main site Backup site DB_Group1 MV1 RV1 MV2 RV2 Concentrator Distributor DB_Group2 MV3 RV3 MV4 RV4 Concentrator Distributor Disk array Disk array MV1-RV1, MV2-RV2: ATgroup name of pair included in DB_Group1 s ATgroup MV3-RV3, MV4-RV4: ATgroup name of pair included in DB_Group2 s ATgroup Figure 2-2 Building of ATgroup (Example) 13

22 Chapter 2 Disaster Recovery Functions Any pair that is registered to an ATgroup must meet the following conditions. DDR pairs cannot be registered to an ATgroup. Only RDR pairs can be registered to an ATgroup. A pair that is not the top-level pair cannot be registered to an ATgroup. Only the top-level pair can be registered. If the MV of the pair to be registered includes several RDR pairs, it cannot be registered to an ATgroup. Each RDR pair must be set as a single pair registered to an ATgroup. A registered pair in an ATgroup and the pair to be registered to an ATgroup must be separated. An RDR pair that exists among different disk arrays cannot be registered to a single ATgroup. The RDR pair must be in the same disk array. If the RV is also used as a snapshot, it cannot be registered. It is required that the RV is not used as a snapshot. Pairs that can be registered to ATgroup are illustrated below. Main site Backup site (i) MV RV (ii) MV RV/MV RV RV Disk array Disk array [Description of pairs that can be registered to ATgroup] (i) Single RDR pairs are registered. (ii) A combination of the top-level single RDR pair and DDR pair can be registered as an RDR pair. Figure 2-3 Pairs that can be Registered to ATgroup 14

23 Chapter 2 Disaster Recovery Functions Pairs that cannot be registered to an ATgroup are illustrated below. Main site Backup site (1) Backup site (2) (i) MV RV MV (ii) RV/MV RV (iii) MV RV RV (iv) MV Replicate RV MV RV (v) MV RV (vi) MV RV/BV SV Disk array Disk array Disk array [Description of pairs that cannot be registered to an ATgroup] (i) Pair configured as a DDR pair. (ii) Pairs that is not the top-level pair. (iii) Several RDR pairs that are configured from a single MV. (iv) Pairs in an ATgroup that are not separate from pairs registered to an ATgroup. (v) Pairs in different disk arrays that are in a single ATgroup. (Each of these pairs can be registered to a separate ATgroup) (vi) RV is also used as a snapshot. Figure 2-4 Pairs that cannot be Registered to ATgroup 15

24 Chapter 2 Disaster Recovery Functions ATgroup Sttatte Diispllay Functtiion The state of each pair in an ATgroup can be displayed per ATgroup. ATgroup states are displayed as ATgroup consistency states and ATgroup sync states. ATgroup consistency states The ATgroup consistency state indicates whether or not the data is consistent in all RVs included in the ATgroup. When the ATgroup consistency state is Atomic the data in the ATgroup s RVs is consistent and can be used to recover business operations. When the ATgroup consistency state is Non-atomic the RV data included in that ATgroup is not consistent data except when separation has been completed at a pause point in business operations. Thus, it is not normally used for recovery of business operations. ATgroup Consistency State Atomic Non-atomic Invalid Table 2-1 ATgroup Consistency States Description RV data is consistent as an ATgroup. RV can be accessed when ATgroup s sync state is separated. RV data is not consistent as an ATgroup. This state indicates that the ATgroup does not contain any pairs or has just been created. 16

25 Chapter 2 Disaster Recovery Functions ATgroup sync states These indicate the sync state of pairs in an ATgroup. The sync state of an ATgroup changes according to the sync state of each pair in the ATgroup. ATgroup Sync State Separated Separating (Sep/exec) Separate start (Sep/start) Fault separation (Fault) Fault recovering (Fault/recovering) Replicate synchronous (Rpl/sync) Replicating (Rpl/exec) Replicate start (Rpl/start) Replicate suspend (Rpl/suspend) Restoring (Rst/exec) Restore suspend (Rst/suspend) Invalid Table 2-2 ATgroup Sync States Description This state indicates that all pairs in the ATgroup have been separated. The state of pairs in the ATgroup is either separating or separated. In this state, separation has started for the ATgroup. This state indicates that the ATgroup contains a pair with a fault or a separated state caused by a forced operation. When the ATgroup consistency state is Atomic, RVs cannot be accessed. An operation that recovers from fault separation changes the ATgroup sync state to separated and enables RV access. This state indicates that the ATgroup is changing from fault separation to separated. This state indicates that all pairs in the ATgroup are synchronous due to replication. Pairs in the ATgroup are either being replicated or are synchronous. This state indicates that replication has started for an ATgroup. This state indicates that an abnormal suspend state has occurred for a pair in the ATgroup due to a fault while replicating. This state indicates that restoring will be or is being performed for an ATgroup. This state indicates that an abnormal suspend state has occurred for a pair in the ATgroup due to a fault while restoring. This state indicates that the ATgroup does not contain any pairs or has just been created. * The abbreviations have initial capital letters and are used to distinguish among the sync states of pairs. 17

26 Chapter 2 Disaster Recovery Functions ATgroup sync state when link fault occurs The ATgroup sync state is determined based on the state of the copy source, i.e., the concentrator side (MV side). If a link fault occurs, possibly due to a disk array fault or line fault, communication becomes disabled between the disk array on the concentrator side (MV side) and the disk array on the distributor side (RV side), so the state of the distributor side (RV side) immediately before the disaster occurred is maintained. Consequently, the ATgroup sync state of the concentrator side (MV side) does not match the ATgroup sync state of the distributor side (RV side). Therefore, the link state must be checked in order to confirm the ATgroup sync state. Line fault occurs during replicate synchronous state (Rpl/sync) Main site Backup site MV1 RV1 MV2 RV2 MV3 RV3 Disk array Disk array Access ATgroup sync state on concentrator side (MV side) State changes to fault separation (Fault) due to line fault Access ATgroup sync state on distributor side (RV side) Since state of concentrator side (MV side) cannot be obtained due to a line fault, the replicate synchronous state (Rpl/sync) before the fault occurred is maintained. Figure 2-5 ATgroup Sync State when Link Fault has Occurred 18

27 Chapter 2 Disaster Recovery Functions ATgroup Replliicattiion Conttroll Functtiions Replication control for pairs registered to ATgroups is performed for the entire ATgroup. Such control operations cannot be performed for specific pairs. ATgroup replication Replication is executed for all pairs within the ATgroup. Immediately after replication of the ATgroup, the ATgroup sync state becomes replicate start (Rpl/start). When replication is being executed for all pairs within the ATgroup, the ATgroup sync state is replicating (Rpl/exec). After all pairs in the ATgroup have been copied, the ATgroup sync state changes to replicate synchronous (Rpl/sync) as soon as the activity state has been replicated and the sync state is synchronous. The ATgroup s copy mode is specified when the ATgroup is being replicated. If ATgroup replication is performed during synchronous mode or semi synchronous copy mode of order guarantee, the ATgroup consistency state becomes Atomic as soon as the ATgroup sync state becomes replicate synchronous (Rpl/sync). If ATgroup replication is performed during a background copy mode, the ATgroup consistency state stays Non-atomic if the ATgroup sync state becomes replicate synchronous (Rpl/sync). During the replicate start (Rpl/start) or replicating (Rpl/exec) state, the RV data is not consistent, regardless of the copy mode. Accordingly, before replicating the ATgroup, the data should be backed up to another volume or other operations or steps should be implemented to prevent loss of data consistency. Separation of ATgroup Pairs in the ATgroup are separated. If the ATgroup consistency state is Non-atomic, separation of the ATgroup is performed specifically for each pair in the ATgroup. As soon as separation of the ATgroup is completed, the ATgroup sync state becomes separate start (Sep/start). Once separation is being executed for all pairs in the ATgroup, the ATgroup sync state becomes separating (Sep/exec). When all pairs in the ATgroup are separate, the ATgroup sync state becomes separated. At that time, the ATgroup consistency state becomes Non-atomic. If ATgroup separation is executed when the ATgroup consistency state is Atomic, the data consistency of RVs corresponding to all pairs in the ATgroup is maintained and separation is performed for all pairs at the same time. At that point, the ATgroup s consistency state is maintained as Atomic. Immediately after ATgroup separation, separate (immediate) cannot be used, which means the immediate separation of RVs. 19

28 Chapter 2 Disaster Recovery Functions Restoration of ATgroup Restoration is performed for each pair in the ATgroup. In order to maintain the RV data, this ATgroup restoration processing is only an RV store (protect) operation that does not include any updating of RVs. When an ATgroup is being restored, each pair in the ATgroup is restored and the ATgroup sync state changes to restoring (Rst/exec). When restoration of the ATgroup is completed, the ATgroup sync state becomes separated. Accordingly, if ATgroup restoration is performed when the ATgroup consistency state is Atomic, the RV data is maintained while also maintaining Atomic as the ATgroup consistency state. ATgroup replication control and state transitions Various types of ATgroup replication control and state changes are outlined below. Non-atomic RV protect restore execution state Atomic RV protect restore execution state Restoring Restoring Separated state Restoring Restored Separated while consistent Restoring Restored Separated Separated Replicating Separated due to fault. RV access disabled Recovery from fault separation Replicating Separating Fault separation When differences between MV and RV are reflected Replicating Synchronized via sync mode or semi synchronous copy mode of order guarantee Replication state Atomic break or forced separation Separating Synchronized via background copy mode Replication state Replication state during background copy mode Replication during sync mode or semi synchronous copy mode of order guarantee. Copy mode of order guarantee to RVs. Figure 2-6 Outline of Replication Control and State Transitions 20

29 Chapter 2 Disaster Recovery Functions Copy off Order Guaranttee Functtiion When the ATgroup consistency state is Atomic, the order of updating from MVs to RVs per ATgroup is guaranteed in order to maintain RV data consistency. Data is written from concentrator (MV side) to the distributor (RV side) according to the order in which data was written to the MVs that comprise the ATgroup. This guaranteeing of the update order occurs only when the copy mode is either synchronous mode or semi synchronous copy mode of order guarantee and the ATgroup consistency state is Atomic. No such guaranteeing of the update order can occur when the copy mode is background copy mode or when the ATgroup consistency state is Non-atomic. Main site Backup site Application server Standby server (i) (ii) (iii) DB_Group1 MV1 (iii) RV1 MV2 (ii) RV2 MV3 (i) RV3 ATgroup s consistency state is Atomic Disk array Disk array * (i), (ii), and (iii) indicate the write order Figure 2-7 Copy of Order Guarantee Function 21

30 Chapter 2 Disaster Recovery Functions Attomiic--break Functtiion The atomic-break function forcibly separates all pairs in the ATgroup and forcibly separates the RVs in order to maintain the consistency of RV data when the order of copying to RV cannot be guaranteed. This function is executed when the ATgroup consistency state is Atomic and the ATgroup sync state is replicate synchronous (Rpl/sync) but forced separation is required since the RV copy order cannot be guaranteed due to a disaster, line fault, or other fault problem. If data is written far beyond the line capacity, data copying performed in synchronization with RV is delayed. If this delay also causes substantial delay in MV writing, an atomic break is generated to stop copying to the replication volume in order to give priority to writing to MV. Execution of an atomic-break stops all copying to RVs, but the consistency of the RV data is maintained. After RVs are forcibly separated by an atomic-break, the option of enabling access to MVs can be specified as enabled or disabled during ATgroup replication. This MV Access after Atomic-break setting is described below. MV Access Continue (default) MV access can be continued even after an atomic-break has been executed. When an atomic-break is executed after a fault that does not affect business tasks (such as a line fault or RV fault), it does not affect business task access either. Since updating of MVs is enabled even after an atomic-break is executed, differences occur between the MV data and RV data after an atomic-break. For example, if a disaster causes a line fault to occur, a fault may later occur in the application server, which would result in loss of data updated after the line fault occurred. When an atomic-break is executed without a link fault such as an RV fault, the ATgroup sync state becomes fault separation (Fault). When changing from this state to RV use, an operation to recover from fault separation is executed on the distributor side (RV side) to enable RV use. Also, when an atomic-break is executed following a link fault such as a line fault, the distributor side (RV side) s ATgroup sync state remains replicate synchronous (Rpl/sync), as it was before the link fault occurred. When changing from this state to RV use, forced separation is executed on the distributor side (RV side), followed by an operation to recover from fault separation in order to enable RV use. MV Access Stop When an atomic-break is executed, MV access is stopped. In fact, execution of an atomic-break stops all business access, even when the fault that has occurred is a line fault or RV-related fault that does not affect business tasks. Since updating of MVs is not possible after an atomic-break, no differences will occur between MV data and RV data after the atomic-break is executed. For example, even if a disaster causes a line fault to occur first and an application server fault to occur later, no data loss will occur as long as the copy 22

31 Chapter 2 Disaster Recovery Functions mode is synchronous mode. To enable RV use after executing an atomic-break, a forced separation is first performed on the distributor side (RV side) to change to fault separation (Fault). Next, an operation to recover from fault separation is performed to enable RV use. When an MV access stop is specified, business tasks may be stopped without prior warning, so MV access stop should not be used ordinarily. 23

32 Chapter 2 Disaster Recovery Functions Semii--Synchronous Copy Mode off Order Guaranttee and Attomiic Break Semi-synchronous copy mode of order guarantee temporarily retains data in a buffer to copy write data to the master volume to a replication volume. However, if a large amount of data are written beyond the line capacity in a short time, free space in the buffer may become insufficient because disaster recovery cannot catch up with buffer data copying to the replication volume. In this case, even in semi-synchronous copy mode of order guarantee, data write to the subsequent master volume is delayed because disaster recovery waits for buffer vacancy. If this write delay to MV continues for a given length of time, an atomic break occurs to stop data copying to the replication volume so that priority is given to data write to the master volume. Some disk array models can adjust maintenance of replication volume copying and write priority to the master volume by setting the delay time (referred to as an allowed response time of MV) for judging this atomic break occurrence per ATgroup in semi-synchronous copy mode of order guarantee. To make this adjustment, use the performance monitoring function that is an option. Environment design 1. If MV write capacity is greater than line transfer capacity at the business peak of copying, a buffer write overflow occurs to delay the write response because the transfer capacity is exceeded. To avoid this delay, it is prerequisite to estimate the necessary line transfer capacity and prepare lines. 2. Determine the time (number of seconds, 18 seconds or less) allowed as the delay of the MV write I/O response time from the business requirements. Note, however, that if a value less than 10 seconds is specified as the allowance time, an atomic break may be determined to have occurred even if a link single-system failure is recovered via link switching. This is because disaster recovery cannot catch up with this failure recovery. Operation evaluation At the evaluation stage, perform measurement and analysis to check if estimation is correct in the same environment as the production environment. 3. Set the following statistical information and threshold using the performance monitoring function: Accumulation of maximum buffer usage on the log (accumulation by default) Accumulation of buffer wait time on the log (addition as LD information, maximum value/mean value) (accumulation by default) Setting of time (1 second) during which the threshold of the buffer wait time (maximum value) is treated as MV write delay occurrence Also set the allowed response time of MV for atomic break occurrence. 4. Check atomic break occurrence and the threshold reporting condition by performing the job simultaneously while copying data. 24

33 Chapter 2 Disaster Recovery Functions Analysis and countermeasures 5. Check if copy processing is enough for business write from the atomic break conditions, threshold excess report, and gathered performance statistical information. If no atomic break has occurred and the buffer wait time is not exceeded, the line capacity is enough. Check and store the vacancy condition of the maximum buffer usage as the original vacancy condition. The timing of atomic break operation when a copy error occurs serves as the allowed response time of MV. If no atomic break has occurred but the buffer wait time threshold is exceeded, judge whether to continue processing as is or whether to take appropriate countermeasures for the delay. If an atomic break has occurred, appropriate countermeasures are required because the line capacity is insufficient. 6. Select a method that meets the requirements from the following methods: Method 1: Enhance the line capacity to increase the transfer capacity. Method 2: If the line capacity is insufficient only in a specific time zone, consider to avoid the MV delay by performing separate operation in that time zone. Method 3: Consider memory purchase to increase the semi-synchronous buffer size. Method 4: Review the allowance time as the MV write I/O response. Production operation 7. Even in the production operation, the monitoring objects are the same as in the settings in step 3. However, the line capacity may become insufficient due to increase in the amount of business although it is sufficient at operation start. For this reason, monitor the portent and take the countermeasures on the preceding page as required. Use the threshold of the maximum buffer wait time as the threshold of the time when a write I/O delay begins to occur due to a buffer overflow. If the buffer has not still overflowed but the buffer usage is gradually increasing as compared to statistical information for the maximum buffer usage, you can reference this statistical information to determine if it is necessary to take appropriate countermeasures for the future buffer overflow. 25

34 Chapter 2 Disaster Recovery Functions 2..2 Siimulltaneous Replliicatiion of Seriialllly Confiigured Paiir Remote data replication functions can be used to simultaneously replicate serially configured pairs. When replication is performed simultaneously, replication at the second and lower levels is enabled only when the copy mode is background copy mode. Also, replication control cannot be performed when copying is performed in different directions at the same time (such as when executing replication for the former and latter serially configured pairs), when the former and latter pair s activity state is separate, or when its sync state is separating. Main site Backup site ATgroup s sync state is replicate state or pair s sync state is synchronous (synchronous, semisynchronous, or background copy) MV1 RV1/MV2 Pair s sync state is synchronous (background copy) RV2 Disk array Disk array Combination of RDR + DDR pairs Main site Backup site (1) Backup site (2) ATgroup s sync state is replicate state or pair s sync state is synchronous (synchronous, semisynchronous, or background copy) Pair s sync state is synchronous (background copy) MV1 RV1/MV2 RV2 Disk array Disk array Disk array Combination of RDR + RDR pairs Figure 2-8 Example of Replication Implemented for Serially Configured Pairs 26

35 Chapter 2 Disaster Recovery Functions 2..3 Remote Paiir Operatiions Remote data replication functions are able to control replication from the main site to a DDR pair at the backup site. They are also able to control replication from an RDR pair at the backup site to a DDR pair at the main site. Using these functions, backup operations using the backup site s DDR can be controlled from the main site. Main site Backup site Application server Standby server Operation instruction MV RV/MV Replicate, separate, restore Replication of serially configured DDR pairs can be controlled from MV side RV MV Replication of serially configured RDR and DDR pairs can be controlled from RV side Operation instruction Replicate, separate, restore RV/MV Disk array Replicate separate restore RV Disk array Figure 2-9 Example of Remote Control 27

36 Chapter 2 Disaster Recovery Functions 2..4 RDR Quiick Sync The RDR quick sync is a function to eliminate differences from the RDR pair to establish the sync state without copying data from MV to RV when the MV and RV data in the RDR pair is already the same. For RDR operation, it is necessary to reflect all data in MV to RV through the RDR link line at startup, making the data state the same (replicate synchronous). If a low-speed line is used as the RDR link line in the configuration, it takes significant time to transfer a lot of data in batch. The RDR quick sync quickly realizes the sync state without putting load on the low-speed RDR link line by other means than the RDR link line (such as transfer using tape) when MV and RV are the same data. The RDR quick sync function is offered only for ACOS-4.only for ACOS-4. This version only supports the function to display the RDR quick sync state in the ism replication management Vollume Updatte Preventtiion To perform the RDR quick sync operation, the data in the MV and RV data in the RDR pair must be the same. To make the MV and RV data the same, execute RAW backup of the MV data to tape using the backup software, transfer it from the main site to the backup site, and execute RAW restore from tape to RV. The RDR quick sync function cannot be used when MV data is updated while tape is transferred to the main site to the backup site. To prevent this situation, use the volume update prevention function and protect the target volume from the operations that causes differences. Update Prevention State Update prevention (Prevent) Table 2-3 Volume Update Prevention State Description State where the volume update prevention function protects a volume from the operations that cause differences. - Since the access right to the target volume is Read Only, write operation from the server cannot be performed. - Replication cannot be performed when the target volume is RV. - Restore cannot be performed when the target volume is MV. - Snapshot restore cannot be performed when the target volume is BV. - The logical disk cannot be deleted from the target volume. - The target volume cannot be changed to the reserve attribute. 28

37 Chapter 2 Disaster Recovery Functions Vollume Compariing//IIdenttiitty Certtiiffiied Volume comparing verifies that the MV and RV data is identical on the bit level using the volume update prevention function. If MV and RV data is identical, MV and RV can be made the same by certifying the identity. The state where volumes were compared and the identity was certified is called the identity state. Identity State Not Certified Comparing Identical Certifying Certified Different Fault(Comparing) Fault(Certifying) Table 2-4 Identity State Description MV and RV have not been compared and the identity of them has not been certified. The state is not Certified. Not Certified is also displayed when MV is in the Prevent state and RV is not in the Prevent state. MV and RV are being compared. Volume comparing found that data of MV and RV were identical. The identity between MV and RV is being certified. The identity between MV and RV has been certified and there are no differences. Volume comparing found that data of MV and RV were not identical. A fault occurred while MV and RV were being compared. A fault occurred while the identity between MV and RV was being certified. 29

Data Replication User s Manual (Function Guide)

Data Replication User s Manual (Function Guide) NEC Storage Software Data Replication User s Manual (Function Guide) IS015-23E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission

More information

Performance Monitoring User s Manual

Performance Monitoring User s Manual NEC Storage Software Performance Monitoring User s Manual IS025-15E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

NEC Storage Manager Data Replication User's Manual (Function Guide)

NEC Storage Manager Data Replication User's Manual (Function Guide) NEC Storage Manager Data Replication User's Manual (Function Guide) NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Manager Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-5E NEC Corporation 2001-2004 No part of the contents of this book may be reproduced or transmitted

More information

Snapshot User s Manual (Installation and Operation Guide for Linux)

Snapshot User s Manual (Installation and Operation Guide for Linux) NEC Storage Software Snapshot User s Manual (Installation and Operation Guide for Linux) IS035-17E NEC Corporation 2004-2012 No part of the contents of this book may be reproduced or transmitted in any

More information

NEC Storage Manager Data Replication Command Reference

NEC Storage Manager Data Replication Command Reference NEC Storage Manager Data Replication Command Reference NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage Performance Monitor/Optimizer User s Manual

NEC Storage Performance Monitor/Optimizer User s Manual NEC Storage Performance Monitor/Optimizer User s Manual NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Snapshot Command Reference

Snapshot Command Reference NEC Storage Manager Snapshot Command Reference IS036-1E NEC Corporation 2004 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The

More information

Disaster Recovery Feature of Symfoware DBMS

Disaster Recovery Feature of Symfoware DBMS Disaster Recovery Feature of Symfoware MS V Teruyuki Goto (Manuscript received December 26, 2006) The demands for stable operation of corporate information systems continue to grow, and in recent years

More information

MIMIX Availability. Version 7.1 MIMIX Operations 5250

MIMIX Availability. Version 7.1 MIMIX Operations 5250 MIMIX Availability Version 7.1 MIMIX Operations 5250 Notices MIMIX Operations - 5250 User Guide January 2014 Version: 7.1.19.00 Copyright 1999, 2014 Vision Solutions, Inc. All rights reserved. The information

More information

Huawei OceanStor Backup Software Technical White Paper for NetBackup

Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Disaster Recovery Solution Achieved by EXPRESSCLUSTER Disaster Recovery Solution Achieved by EXPRESSCLUSTER http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Contents 1. Clustering system and disaster recovery 2. Disaster

More information

Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide

Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide MK-95RD280-03 2006 Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

Overland Storage. SnapSAN CLI Command Reference Linux. User Guide S3000/S5000. May 2013 10400425-002

Overland Storage. SnapSAN CLI Command Reference Linux. User Guide S3000/S5000. May 2013 10400425-002 Overland Storage SnapSAN CLI Command Reference Linux User Guide S3000/S5000 May 2013 10400425-002 SnapSAN CLI Command Reference Linux User Guide 2013 Overland Storage, Inc. All rights reserved. Overland,

More information

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Application Notes Abstract: This document describes how to apply global clusters in site disaster

More information

Stretching A Wolfpack Cluster Of Servers For Disaster Tolerance. Dick Wilkins Program Manager Hewlett-Packard Co. Redmond, WA dick_wilkins@hp.

Stretching A Wolfpack Cluster Of Servers For Disaster Tolerance. Dick Wilkins Program Manager Hewlett-Packard Co. Redmond, WA dick_wilkins@hp. Stretching A Wolfpack Cluster Of Servers For Disaster Tolerance Dick Wilkins Program Manager Hewlett-Packard Co. Redmond, WA dick_wilkins@hp.com Motivation WWW access has made many businesses 24 by 7 operations.

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later

NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later 856-127900-613-G 7th Edition Jun. 2015 Copyright NEC Corporation 2015. Trademarks NEC EXPRESSBUILDER is trademarks of NEC Corporation.

More information

NEC Storage Manager User's Manual

NEC Storage Manager User's Manual NEC Storage Manager User's Manual NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this

More information

This chapter explains how to update device drivers and apply hotfix.

This chapter explains how to update device drivers and apply hotfix. MegaRAID SAS User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an overview

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online

More information

AX4 5 Series Software Overview

AX4 5 Series Software Overview AX4 5 Series Software Overview March 6, 2008 This document presents an overview of all software you need to configure and monitor any AX4 5 series storage system running the Navisphere Express management

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Overland Storage. SnapSAN Data Migration. User Guide S5000. May 2013 10400414-002

Overland Storage. SnapSAN Data Migration. User Guide S5000. May 2013 10400414-002 Overland Storage SnapSAN Data Migration User Guide S5000 May 2013 10400414-002 SnapSAN Data Migration User Guide 2013 Overland Storage, Inc. All rights reserved. Overland, Overland Data, Overland Storage,

More information

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)

More information

JP1/IT Desktop Management 2 - Agent (For UNIX Systems)

JP1/IT Desktop Management 2 - Agent (For UNIX Systems) JP1 Version 11 JP1/IT Desktop Management 2 - Agent (For UNIX Systems) 3021-3-B62(E) Notices Relevant program products JP1/IT Desktop Management 2 - Additional License for Linux P-8142-7GBL JP1/IT Desktop

More information

Running Successful Disaster Recovery Tests

Running Successful Disaster Recovery Tests Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,

More information

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Applied Technology Abstract Microsoft SQL Server includes a powerful capability to protect active databases by using either

More information

Areas Covered. Chapter 1 Features (Overview/Note) Chapter 2 How to Use WebBIOS. Chapter 3 Installing Global Array Manager (GAM)

Areas Covered. Chapter 1 Features (Overview/Note) Chapter 2 How to Use WebBIOS. Chapter 3 Installing Global Array Manager (GAM) PRIMERGY RX300 S2 Onboard SCSI RAID User s Guide Areas Covered Chapter 1 Features (Overview/Note) This chapter explains the overview of the disk array and features of the SCSI array controller. Chapter

More information

Title Goes Asset Management

Title Goes Asset Management Title Goes Asset Management MAXIMIZING UPTIME: BUILDING A FAULT-TOLERANT FACTORYTALK ASSETCENTRE SYSTEM WITH NEC EXPRESS5800/320F SERIES FAULT TOLERANT SERVERS ASSET MANAGEMENT Introduction FactoryTalk

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Oracle VM Server Recovery Guide. Version 8.2

Oracle VM Server Recovery Guide. Version 8.2 Oracle VM Server Recovery Guide Version 8.2 Oracle VM Server for x86 Recovery Guide The purpose of this document is to provide the steps necessary to perform system recovery of an Oracle VM Server for

More information

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Contact Us: (616) 875-4060 HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Length: Classroom: 5 days Virtual: 6 hrs/day - 5 days Prerequisite: System Administration

More information

Windows Server Failover Clustering April 2010

Windows Server Failover Clustering April 2010 Windows Server Failover Clustering April 00 Windows Server Failover Clustering (WSFC) is the successor to Microsoft Cluster Service (MSCS). WSFC and its predecessor, MSCS, offer high availability for critical

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd.

Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd. Doc. Code OceanStor VTL6900 Technical White Paper Issue 1.1 Date 2012-07-30 Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Attunity RepliWeb Event Driven Jobs

Attunity RepliWeb Event Driven Jobs Attunity RepliWeb Event Driven Jobs Software Version 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

Hitachi Essential NAS Platform, NAS Gateway with High Cost Performance

Hitachi Essential NAS Platform, NAS Gateway with High Cost Performance , NAS Gateway with High Cost Performance 80, NAS Gateway with High Cost Performance Katsumi Hirezaki Seiichi Higaki Hiroki Kanai Toru Kawasaki OVERVIEW: Over recent years, within the changing business

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

VMware and VSS: Application Backup and Recovery

VMware and VSS: Application Backup and Recovery Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP

More information

Westek Technology Snapshot and HA iscsi Replication Suite

Westek Technology Snapshot and HA iscsi Replication Suite Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication

More information

System Infrastructure Non-Functional Requirements Related Item List

System Infrastructure Non-Functional Requirements Related Item List System Infrastructure Non-Functional Requirements Related Item List April 2013 Information-Technology Promotion Agency, Japan Software Engineering Center Copyright 2010 IPA [Usage conditions] 1. The copyright

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

Storage System: Management of Explosively Increasing Data in Mission-Critical Systems

Storage System: Management of Explosively Increasing Data in Mission-Critical Systems Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring Hardware Platforms Storage System: Management of Explosively Increasing Data in Mission-Critical Systems By Toshiro NAKAJIMA,*

More information

Abhi Rathinavelu Foster School of Business

Abhi Rathinavelu Foster School of Business Abhi Rathinavelu Foster School of Business What is Disaster? A disaster is considered any incident or event that results in a major interruption of business operations Major: Earthquake >5.0, Volcanic

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Disaster Recovery with EonStor DS Series &VMware Site Recovery Manager

Disaster Recovery with EonStor DS Series &VMware Site Recovery Manager Disaster Recovery with EonStor DS Series &VMware Site Recovery Manager Application Note Version: 1.0 Updated: July, 2015 Abstract: This application note provides information about Infortrend Storage Replication

More information

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv.

WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers. by Dan Sullivan. Think Faster. Visit us at Condusiv. WHITE PAPER Achieving Continuous Data Protection with a Recycle Bin for File Servers by Dan Sullivan 01_20131025 Think Faster. Visit us at Condusiv.com WITH A RECYCLE BIN FOR FILE SERVERS 2 Article 1:

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. HUAWEI OceanStor 18000 Series Enterprise Storage System Issue 01 Date 2013-12-30 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any

More information

Versant High Availability Backup Usage Manual. Release 7.0.1.4

Versant High Availability Backup Usage Manual. Release 7.0.1.4 Versant High Availability Backup Usage Manual Release 7.0.1.4 Table of Contents CHAPTER 1: Introduction... 3 Overview... 4 Habackup Features... 5 Ability to Perform Split... 5 Level 1 and Level 2 Backups...7

More information

Best practices for fully automated disaster recovery of Microsoft SQL Server 2008 using HP Continuous Access EVA with Cluster Extension EVA

Best practices for fully automated disaster recovery of Microsoft SQL Server 2008 using HP Continuous Access EVA with Cluster Extension EVA Best practices for fully automated disaster recovery of Microsoft SQL Server 2008 using HP Continuous Access EVA with Cluster Extension EVA Subtitle Table of contents Overview... 2 Key findings... 3 Solution

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Configure Cisco Emergency Responder Disaster Recovery System

Configure Cisco Emergency Responder Disaster Recovery System Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,

More information

Centralized Disaster Recovery using RDS

Centralized Disaster Recovery using RDS Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used

More information

Integrating Data Protection Manager with StorTrends itx

Integrating Data Protection Manager with StorTrends itx Integrating Data Protection Manager with StorTrends itx INTEGRATING DATA PROTECTION MANAGER WITH STORTRENDS ITX 2 1. Introduction 2 2. Test Environment 2 Requirements 2 3. Setting up the Application Servers

More information

SnapSAN Performance Monitor. Overland Storage. User Guide. for SnapSAN S5000 Disk Arrays. November 2012 10400407-002

SnapSAN Performance Monitor. Overland Storage. User Guide. for SnapSAN S5000 Disk Arrays. November 2012 10400407-002 Overland Storage SnapSAN Performance Monitor User Guide for SnapSAN S5000 Disk Arrays November 2012 10400407-002 SnapSAN Performance Monitor User Guide 2012 Overland Storage, Inc. All rights reserved.

More information

Mirror File System for Cloud Computing

Mirror File System for Cloud Computing Mirror File System for Cloud Computing Twin Peaks Software Abstract The idea of the Mirror File System (MFS) is simple. When a user creates or updates a file, MFS creates or updates it in real time on

More information

VSS installation and application

VSS installation and application VSS installation and application Sam Lee Version 1.0 (DEC, 2010) 1 QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201010-P300H lntroduction This document introduces how to perform

More information

Interstage Application Server V7.0 Single Sign-on Operator's Guide

Interstage Application Server V7.0 Single Sign-on Operator's Guide Interstage Application Server V7.0 Single Sign-on Operator's Guide Single Sign-on Operator's Guide - Preface Trademarks Trademarks of other companies are used in this user guide only to identify particular

More information

User's Guide. System Monitor - Performance Monitoring Services 5.0

User's Guide. System Monitor - Performance Monitoring Services 5.0 User's Guide System Monitor - Performance Monitoring Services 5.0 Preface System Monitor - Performance Monitoring Services (hereafter referred to as "System Monitor - Performance Monitoring Services")

More information

NEC Storage NV Series

NEC Storage NV Series NEC Storage NV Series Guide to Oracle Storage Compatibility Program Network Attached File Server Snapshot Technologies is-wp-04-001 Rev-1.00 February, 2005 NEC Corporation. - 1 - Copyright 2005 NEC Corporation.

More information

ServerView ROR Express XOC Pack

ServerView ROR Express XOC Pack Introducing ServerView Resource Orchestrator Express/Cloud Edition XOC Pack V1 Version 1.0 June 2013 Fujitsu Limited Copyright 2013 FUJITSU LIMITED Positioning of the ROR Express/Cloud Edition XOC Pack

More information

Simplifying Online Backup Operations for Microsoft Exchange, SQL and Oracle with Hitachi Protection Manager Software

Simplifying Online Backup Operations for Microsoft Exchange, SQL and Oracle with Hitachi Protection Manager Software Simplifying Online Backup Operations for Microsoft Exchange, SQL and Oracle with Hitachi Protection Manager Software Craig Chan: Product Manager Bobby Crouch: Product Marketing Manager Hitachi Data Systems

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions Oracle Database Disaster Recovery Using Dell Storage Replication Solutions This paper describes how to leverage Dell storage replication technologies to build a comprehensive disaster recovery solution

More information

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2 HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery

More information

SnapManager 1.0 for Virtual Infrastructure Best Practices

SnapManager 1.0 for Virtual Infrastructure Best Practices NETAPP TECHNICAL REPORT SnapManager 1.0 for Virtual Infrastructure Best Practices John Lockyer, NetApp January 2009 TR-3737 LEVERAGING NETAPP DATA ONTAP FOR VMWARE BACKUP, RESTORE, AND DISASTER RECOVERY

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

How VERITAS Storage Foundation TM for Windows Compliments Microsoft Windows Server 2003

How VERITAS Storage Foundation TM for Windows Compliments Microsoft Windows Server 2003 White Paper VERITAS Storage Foundation TM 4.1 for Windows How VERITAS Storage Foundation TM for Windows Compliments Microsoft Windows Server 2003 9/14/2004 1 Introduction...3 Storage Technologies In Windows

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Configuring Apache Derby for Performance and Durability Olav Sandstå

Configuring Apache Derby for Performance and Durability Olav Sandstå Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell PowerVault storage solutions, based on the Microsoft

More information

Outline. Failure Types

Outline. Failure Types Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten

More information

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

Sanovi DRM for Oracle Database

Sanovi DRM for Oracle Database Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview

More information

Netezza PureData System Administration Course

Netezza PureData System Administration Course Course Length: 2 days CEUs 1.2 AUDIENCE After completion of this course, you should be able to: Administer the IBM PDA/Netezza Install Netezza Client Software Use the Netezza System Interfaces Understand

More information

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:

More information

Microsoft SQL Server 2005 Database Mirroring

Microsoft SQL Server 2005 Database Mirroring Microsoft SQL Server 2005 Database Mirroring Applied Technology Guide Abstract This document reviews the features and usage of SQL Server 2005, Database Mirroring. May 2007 Copyright 2007 EMC Corporation.

More information

Site-Wide Disaster Recovery and Business Continuity Solutions

Site-Wide Disaster Recovery and Business Continuity Solutions Site-Wide Disaster Recovery and Business Continuity Solutions Enterprises need an effective disaster recovery and business continuity plan to safeguard critical business processes. This article presents

More information

Storage System High-Availability & Disaster Recovery Overview [638]

Storage System High-Availability & Disaster Recovery Overview [638] Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services jwolfgang@vicominfinity.com 26 June 2014 Agenda Background Application-Based

More information

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance

More information

Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD

Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD In order to fulfil the operational needs, different web hosting providers offer different models of hard drives. While some web hosts provide Enterprise HDDs, which although comparatively expensive, offer

More information

VMware vcloud Air - Disaster Recovery User's Guide

VMware vcloud Air - Disaster Recovery User's Guide VMware vcloud Air - Disaster Recovery User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Getting Started with Endurance FTvirtual Server

Getting Started with Endurance FTvirtual Server Getting Started with Endurance FTvirtual Server Marathon Technologies Corporation Fault and Disaster Tolerant Solutions for Windows Environments Release 6.1.1 June 2005 NOTICE Marathon Technologies Corporation

More information

Microsoft SQL Server Always On Technologies

Microsoft SQL Server Always On Technologies Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Compellent Source Book

Compellent Source Book Source Book Remote Instant Replay Thin Replication Compellent Corporate Office Compellent Technologies 12982 Valley View Road Eden Prairie, Minnesota 55344 www.compellent.com Contents Contents...2 Document

More information

Acronis Disk Director 11 Advanced Server. Quick Start Guide

Acronis Disk Director 11 Advanced Server. Quick Start Guide Acronis Disk Director 11 Advanced Server Quick Start Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc. "Acronis Compute

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information