Extending MSCS Cluster High Availability Offsite

Size: px
Start display at page:

Download "Extending MSCS Cluster High Availability Offsite"

Transcription

1 Extending MSCS Cluster High Availability Offsite XOsoft solutions and MSCS technology February Trapelo Road Waltham, MA WANSync

2 Contents The Value Proposition... 1 Financial / Executive Impact... 2 Understanding the Options... 3 MSCS clusters with emulated shared storage... 4 MSCS majority node set clusters... 5 Cluster aware high availability software solutions... 7 Additional Layers of Protection / Added Value WANSyncHA provides exceptional added value Implementing the Solution Other XOsoft Products Contact Information... 13

3 The Value Proposition Traditional Microsoft Cluster Service (MSCS) clusters provide excellent protection from server failures and, in some cases, even application failures. Clusters also enable you to reduce planned downtime requirements via rolling maintenance or upgrades. These factors make MSCS shared storage clustering a critical layer of protection for many organizations. Due to the significant levels of protection provided by MSCS shared storage clusters it is easy to forget that such clusters are only one layer of protection in your overall high availability strategy. This type of clustering is unable to protect from data corruption, storage device failure or site/subnet level failures. Examples of such failures include virus outbreaks, human error, network failures, storage device failure, power outages, server room overheating, fire or flooding and natural disasters. Extending your MSCS cluster offsite with a cluster aware high availability solution can close this gap in protection. By using a solution that integrates continuous data protection (CDP) technology you can also protect from data corruption caused by software errors, human errors, or even viruses.

4 Financial / Executive Impact You have, or are seriously considering, Microsoft Cluster technology. Given the nontrivial expense associated with implementing and maintaining Microsoft Clusters, we can safely assume downtime is costly to your organization. With local high availability covered by MSCS shared storage clusters, the ability to quickly failover offsite is simply the next logical layer of protection to prevent downtime you have already identified as costly. A second and perhaps even more important benefit to extending protection offsite is that you now have true disaster recovery and business continuance capabilities. While the risk of such a major disaster might be relatively low, vs. the more common failures clusters typically protect against, the impact is also much higher. According to a study by accounting firm McGladrey and Pullen, 43% of companies that experience a disaster never re-open and 29% close within two years. Of those that do manage to survive, the long-term financial impact can be tremendous. As Figure 1 illustrates for publicly traded companies, an organization that does not respond effectively to a crisis faces a double penalty in the direct impact of the crisis and in a subsequent crisis of confidence by investors, dissatisfied customers, bad press or even legal ramifications. While this example illustrates impact to publicly traded companies keep in mind that privately held companies are no exception. Businesses of all sizes and types face the same core challenges and risks. Figure 1: Shareholder impact Page 2

5 Understanding the Options Traditional MSCS shared storage clusters are necessarily local solutions due to their use of shared storage. Since all nodes in the cluster use the same storage device they must all be in the same physical location. It is this which makes such clusters vulnerable to a variety of threats, including network failures, storage device failure, power outages, server room overheating, fire or flooding and even natural disasters. Figure 2: Shared storage clusters This inherent gap in protection can be overcome by using real time data replication in addition to, or instead of, shared storage. Real-time data replication allows two geographically distant storage devices, or servers, to hold mirror copies of the data at all times, which in turn enables additional offsite nodes which utilize the replicated data. Since the data replication is real-time, potential data loss is zero or at most only a few seconds, even under the most extreme circumstances. Microsoft alone does not provide a complete end-to-end geographically dispersed cluster solution, but it does work with hardware and software vendors to provide a complete solution. This guide presents solutions that use real-time replication to close the gap left by MSCS shared storage clusters. We will discuss the three most common technologies used to allow offsite failover for MSCS clusters: MSCS clusters with emulated shared storage MSCS majority node set clusters Cluster aware high availability software solutions Page 3

6 MSCS clusters with emulated shared storage When you hear geographically dispersed or stretch cluster, it usually refers to this type of cluster. In this case the Microsoft Cluster Service is unaware that replication is taking place and still believes a shared storage device is in use. There are no special features in the Microsoft Cluster Service specific to this kind of configuration. The network and storage devices must preserve the semantics that the cluster service expects. For example, both sites must be in the same IP subnet and the storage device must respond to SCSI commands as if it was a shared storage device. The extended nature of such a solution is the sole responsibility of the hardware vendor, not the Microsoft cluster service. Cluster quorum (internal cluster data) data must be replicated between nodes using synchronous replication. Although application data can be replicated using either asynchronous or synchronous methods, these cluster solutions will generally utilize synchronous replication for both quorum and application data. Synchronous replication means that an I/O is acknowledged on the server only when the change has been committed at both sites. The obvious advantage here is that zero data loss is guaranteed. The downside is that network latency directly affects application performance. The longer it takes to communicate between sites, the lower your disk performance becomes. In effect, this limits the distance over which synchronous replication is viable and it is generally used only between geographically close sites. Performance starts to degrade at around 20 miles and is generally unacceptable beyond 150 to 200 miles. In addition, a dedicated network link of exceptionally high quality and bandwidth is needed. A high-quality emulated shared storage MSCS cluster provides advanced business continuance capability, but it is a benefit that comes at a very steep price, both in terms of dollars to implement and maintain the solution, and in terms of overall complexity. Because of this, such clusters are used relatively infrequently compared to shared storage clustering, and only when exceptional data protection and availability requirements must be met. Page 4

7 Figure 3: Traditional stretch cluster using emulated shared storage MSCS majority node set clusters Majority node set clusters are a new type of cluster introduced in Windows Server Shared storage clusters locate the quorum (internal cluster data) on a shared disk. With majority node set clusters the cluster service uses internal replication to keep the quorum data located on local drives in sync between all nodes. Shared storage is not required for hosting the quorum. This makes majority node set clusters more appropriate for offsite failover. It is important to note, however, that the cluster service does NOT replicate application data this is handled by hardware replication. Keep in mind that the hardware vendor must offer specific support for majority node set clusters. Majority node set clusters still require that all nodes be in the same IP subnet. Synchronous replication is no longer required, although network latency must never exceed 500ms. With this restriction, more flexible asynchronous replication becomes a viable option. Asynchronous replication does not impose any distance limitations nor does it affect application performance. With asynchronous replication disk I/O is not delayed. Changes are simply copied and sent to the target as fast as bandwidth allows. Asynchronous replication gracefully handles minor network issues and even temporary disconnections without impacting application performance. The trade-off for this flexibility and performance is that the target data set can lag slightly behind data on the primary server. For planned switchovers this is not an issue. However, in the event of an unexpected storage device or site failure, you may lose up to a few seconds of data. Considering the relatively infrequent nature of such occurrences, and the many benefits of asynchronous replication, it is the preferred offsite replication method for most organizations. Page 5

8 While majority node clusters provide some attractive functionality, they do have serious design considerations. You may wonder what majority node set means. This is the method by which the cluster ensures that the same resource is not brought online by two nodes at once. This becomes a consideration when network connectivity is lost between nodes. With shared storage clusters the presence of a shared storage device prevents this since only one node may physically access the shared disk at a time. Majority node set clusters prevent two nodes from simultaneously hosting the same resource by allowing the cluster service to run only when a majority of the nodes can communicate. By doing this the cluster ensures that two disconnected nodes will never host the same resource simultaneously. For example, a 5 node cluster can lose up to 2 nodes without problems; failover to functional nodes can occur as needed. However, if 3 out of the 5 nodes fail the other 2 will take themselves offline, effectively bringing the entire cluster offline. While the frequency of such cluster-wide failures should be infrequent, they do add more complexity and require close monitoring to ensure such situations do not occur. Number of nodes in the cluster Number of node failures before entire cluster goes offline Many variations of this cluster type exist, with widely varying levels of protection and availability, depending on the specific features offered by the third-party replication product used. Majority node set clusters can provide high levels of availability with a slightly more Microsoft-centric approach. As with emulated shared storage, however, these benefits typically come with high levels of cost and complexity. This type of cluster is again used relatively infrequently compared to shared storage clustering, and only when specific data protection and availability requirements must be met. Page 6

9 Figure 4: Majority node set cluster Cluster aware high availability software solutions Up to this point we have discussed solutions that extend the actual clusters offsite by adding more nodes. These solutions are well suited for some situations but are too complex and costly for the majority of organizations to justify. This is especially true for organizations already using shared storage clustering since migrating to one of the above solutions frequently requires a total investment near, or even exceeding, that of the original cluster implementation. Other challenges exist on the technical side. Adding offsite nodes requires that you meet Microsoft cluster requirements across a WAN link. The following notable requirements and considerations apply to both of the solutions described above: All nodes in both sites must be in the same IP subnet Additional heartbeat network must be provided between all nodes Network latency must NEVER drop below 500ms All nodes must be of the same hardware type Windows Server 2003 only supports up to 8 nodes in all Windows 2000 Advanced Server only supports up to 2 nodes in all Windows 2000 Datacenter Server only supports up to 4 nodes in all Added hardware expense is required for data replication IT staff must be trained and equipped to support the implementation Generally, consulting services are required during implementation Page 7

10 Cluster-aware high availability software solutions provide an effective alternative at much lower complexity and cost. The concept behind such solutions is a bit different. Rather than adding nodes to the cluster, such software allows failover to a separate [backup] offsite shared storage cluster or even to a stand-alone machine. Replication of the application data is handled from each active host node to the corresponding backup node or server. If a node fails and the resource is moved to a different node the replication source is changed to be the new active node. This approach is referred to as cluster-aware host-based replication. Implementing a host-based software solution is generally the preferred and most cost effective method for extending MSCS cluster high availably offsite. With this type of solution, the offsite machines no longer have to meet Microsoft Cluster requirements, such as those listed above. Failover between different IP subnets is allowed, which reduces network infrastructure complexity and cost. Further cost savings are now possible since the offsite hardware can be completely different from the local machines, so long as they are powerful enough to host the applications in question. For example, you may failover to offsite shared storage clusters, standalone servers or even virtual servers using VMWare or Microsoft Virtual Server. The application failover is handled entirely by the cluster-aware software and can be fully automatic should all available local cluster nodes fail. Generally, the level of automation is configurable and includes several levels, from manual failover, to push-button failover, to automatically triggered failover. Figure 5: Cluster to cluster Page 8

11 Figure 6: Cluster to standalone Figure 7: Cluster to virtual server Software solutions of this type utilize asynchronous replication, which imposes no distance limitations and does not affect application performance. There are many hostbased software solutions available with varying levels of complexity and protection. Some solutions are more intrusive to install, others install with zero downtime. Some require the source cluster to be reconfigured, others do not. Some require that the target machine be a cluster identical to the production system, others have no restrictions. With such a wide variety of capabilities, it is critical that you carefully evaluate and test the solution before selecting and implementing it. Page 9

12 Additional Layers of Protection / Added Value A major advantage to extending protection offsite comes in the form of added value from the software or hardware solution you choose. Ensure that you close as many gaps in protection as possible and that you get the most value possible for your money. For example, in addition to protecting you from loss of your production server, will it also offer protection from corruption via scheduled snapshots, or better yet, true CDP (Continuous Data Protection) technology, which allows you to roll back to a previous point in time should a corruption event occur. Such technology can preserve hours of data compared to restoration from traditional backups. What about testing? Your replica clusters, or servers, are using different Domain Controllers and DNS servers which are located offsite. In addition, a replica server typically sits idle for weeks or even months. Are you really comfortable failing over to a system which has been idle and untested for so long? Clearly offsite replica application and database testing is very important, but is traditionally performed all too infrequently. This is primarily due to the amount of administrative involvement required and the fact that replication must be stopped. Stopping replication leaves you unprotected both during the test and while resynchronization is performed. Ensure that your chosen solution offers the ability to easily test and validate the replica application and data. Offsite backups and/or snapshots offer an additional and cost effective method to add a final layer of protection. Your selected solution should support the ability to perform such operations in a way that ensures the integrity of the backed up data. Example Scenario We consider XOsoft s WANSyncHA as an example of a cluster-aware high availability software solution. WANSyncHA is a typical solution in that it uses host-based asynchronous replication, but is unique in many of its more advanced features and value-add capabilities. WANSyncHA supports push-button or fully automatic offsite failover to another cluster, standalone servers, or virtual servers, as shown in the above diagrams. In addition, completely transparent replica server testing, true CDP and supplemental validated offsite backups are also fully integrated into the product. Rather than a fictitious example, we will review a real-world implementation by one of XOsoft s large legal customers, Locke Liddell & Sapp LLP. Locke Liddell & Sapp are failing over from clusters to standalone servers. By supporting this type of failover across different IP subnets, WANSyncHA provided Locke Liddell & Sapp a cost-effective and low-impact solution. WANSyncHA is deployed on Exchange 2003 and SQL 2000 clusters located at Locke Liddell s Dallas and Houston offices, enabling both sites to serve as standbys for each other. Thus, the passive standalone servers R1/2 in the Dallas office serve as remote standby replicas for the C5/6 Exchange server clusters in the Houston office, while the passive standalone servers R7/8 in the Houston office ensure high availability of the C3/4 SQL server clusters in the Dallas office. Continuous, real-time replication and automated failover together with integrated CDP technology to protect against corruption provide Locke Liddell with complete immunity to disasters of any magnitude. Page 10

13 Figure 8: Example scenario WANSyncHA provides exceptional added value Protects from data corruption via integrated Rewind technology (CDP - continuous data protection) This means you can literally go back to your last consistent state if corruption should occur, instead of potentially losing the hours of data changes since the last backup or snapshot. Corruption could be a logical corruption such as a user who deleted files or database tables accidentally or it could be a physical file level corruption which causes the file or database to be unreadable. It might even be restoring a file or entire folder structure that was accidentally deleted. Because data changes are captured at the file level, rewind can be used to restore individual files or an entire server. The same concept applies to databases as well. In fact WANSync is application-aware for Exchange, SQL and Oracle which means Rewind can take you back to the last consistent database checkpoint or log rotation should a file or logical corruption occur. Assured Recovery enables transparent testing of your replica server Replica server application and database testing is very important but is traditionally performed all too infrequently. This is primarily due to the amount of administrative involvement required and the fact that replication must be stopped. Stopping replication leaves you unprotected both during the test and even longer after the test while resynchronization is performed. Testing has always been important but is becoming even more critical as systems become more complex and compliance requirements are rolled out. Page 11

14 XOsoft s patented Assured Recovery technology will transparently bring your replica MS Exchange, MS SQL or Oracle application services and databases online for automated (or manual) testing on a scheduled basis. Not only does Assured Recovery require no admin staff involvement but replication continues so you are still protected during the test. Assured Recovery is the only testing solution able to actually bring replica application and databases online for full testing without stopping replication or affecting the primary server in any way. Daily or even more frequent replica testing is now feasible. Assured Recovery adds additional layers of protection via offsite backups and snapshots After testing your databases Assured Recovery can trigger backups or VSS snapshots to provide added layers of offsite protection from server failures or data corruption. This does not replace primary site backups or snapshots but does provide key layers of offsite or off-server protection. Quick comparison Feature #1: XOsoft Solution #2: Hardware solutions * #3: Majority node set Asynchronous replication with no distance limitation ** Able to support synchronous replication Able to support automatic, push button or manual failover Does not affect existing local cluster failover behavior Does not require cluster reconfiguration to implement Zero downtime required to implement Allows failover to different server hardware or even virtual servers Able to failover across subnets Minimal IT staff training required Integrated true CDP technology to protect from data corruption Automated offsite server testing/validation Able to support supplemental offsite backups/snapshots *** * Varies depending on the hardware vendor. ** Latency must be under 500ms at all times. *** Depends on replication and/or hardware device functionality. Page 12

15 Implementing the Solution Implementing WANSyncHA on a cluster is refreshingly clear-cut process, and is thoroughly documented in XOsoft s application-specific operations guides. No cluster reconfiguration or reboots are required, which means, honestly, zero downtime to implement. Potential customers are encouraged to experience WANSyncHA first-hand. Full-featured trial versions of WANSyncHA can be downloaded from XOsoft s web site. To further ease the implementation process presales technical support and demos are provided free of charge. Other XOsoft Products XOsoft offers several other products to protect access to your critical data and applications, as well as to add value through fast and completely flexible content delivery. Please check out our website or contact a XOsoft representative for more information. WANSync for Disaster Recovery WANSync for Content Delivery Enterprise Rewinder A 14 day trial evaluation of the software is available for download at: Contact Information North America (1.866.WANSync) International Headquarters New York West Coast Israel 1601 Trapelo Road Waltham, MA Tel: Fax: th floor 250 West 34th Street New York, NY Tel: Fax: Stevens Creek Blvd. Cupertino, CA Tel: Fax: Menahem Begin Ave. P.O. Box 31 Beit Dagan 50250, Israel Tel: Fax: Tinfo@xosoft.comT Web: Thttp:// Page 13

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection Best practice: Simultaneously upgrade your Exchange and disaster recovery protection March 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition... 1 Description

More information

Centralized and Offsite Backup

Centralized and Offsite Backup Centralized and Offsite Backup Mitigate Risk and Lower Costs - Let Your DR Replica Perform Offsite Backups December 2005 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value

More information

Consolidation of Disaster Recovery Replica Servers

Consolidation of Disaster Recovery Replica Servers Consolidation of Disaster Recovery Replica Servers WANSync and Virtual Server Technologies January 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition...

More information

EBOOK: XOSOFT. CA XOsoft A solution that offers Disaster Recovery, High Availability and Continuous Data Protection

EBOOK: XOSOFT. CA XOsoft A solution that offers Disaster Recovery, High Availability and Continuous Data Protection EBOOK: XOSOFT CA XOsoft A solution that offers Disaster Recovery, High Availability and Continuous Data Protection Responding to a growing need The data behind every enterprise is vital not only to its

More information

CA XOsoft Continuous Data Protection Solo V4

CA XOsoft Continuous Data Protection Solo V4 PRODUCT BRIEF: CA XOSOFT CDP SOLO CA XOsoft Continuous Data Protection Solo V4 PROVIDING YOU THE CAPABILITY TO EASILY REWIND DATA BACK TO A SINGLE POINT IN TIME, CA XOSOFT CONTINUOUS DATA PROTECTION (CDP)

More information

CA XOsoft Replication and CA XOsoft High Availability to Support Flexible Business Continuity Over Any Distance

CA XOsoft Replication and CA XOsoft High Availability to Support Flexible Business Continuity Over Any Distance PRODUCT FAMILY BRIEF: CA XOSOFT CA XOsoft Replication and CA XOsoft High Availability to Support Flexible Business Continuity Over Any Distance CA Recovery Management Backup Replication and High Availability

More information

VMware System, Application and Data Availability With CA ARCserve High Availability

VMware System, Application and Data Availability With CA ARCserve High Availability Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing

More information

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Applied Technology Abstract Microsoft SQL Server includes a powerful capability to protect active databases by using either

More information

Continuous Data Replicator 7.0

Continuous Data Replicator 7.0 DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

Integrated Application and Data Protection. NEC ExpressCluster White Paper

Integrated Application and Data Protection. NEC ExpressCluster White Paper Integrated Application and Data Protection NEC ExpressCluster White Paper Introduction Critical business processes and operations depend on real-time access to IT systems that consist of applications and

More information

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Windows Server Failover Clustering April 2010

Windows Server Failover Clustering April 2010 Windows Server Failover Clustering April 00 Windows Server Failover Clustering (WSFC) is the successor to Microsoft Cluster Service (MSCS). WSFC and its predecessor, MSCS, offer high availability for critical

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 FREQUENTLY ASKED QUESTIONS: CA XOSOFT REPLICATION AND CA XOSOFT HIGH AVAILABILITY CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 Q: What are CA XOsoft Replication and CA XOsoft High

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

CA XOsoft r12.5 Product Family Enables Business Continuity and Disaster Recovery

CA XOsoft r12.5 Product Family Enables Business Continuity and Disaster Recovery PRODUCT FAMILY BRIEF: CA XOSOFT CA XOsoft r12.5 Product Family Enables Business Continuity and Disaster Recovery CA Recovery Management CA ARCserve Backup CA XOsoft Replication and High Availability CA

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is

More information

WHITE PAPER: TECHNICAL. Enhancing Microsoft SQL Server 2005 Availability with Veritas Storage Foundation for Windows

WHITE PAPER: TECHNICAL. Enhancing Microsoft SQL Server 2005 Availability with Veritas Storage Foundation for Windows WHITE PAPER: TECHNICAL Enhancing Microsoft SQL Server 2005 Availability with Veritas Storage Foundation for Windows Saveen Pakala, Product Manager Paul Belk, Technical Product Manager Storage and Availability

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Deploying Exchange Server 2007 SP1 on Windows Server 2008 Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Enhancing Microsoft SQL Server 2005 availability with Veritas Storage Foundation HA for Windows from Symantec

WHITE PAPER: ENTERPRISE SOLUTIONS. Enhancing Microsoft SQL Server 2005 availability with Veritas Storage Foundation HA for Windows from Symantec WHITE PAPER: ENTERPRISE SOLUTIONS Enhancing Microsoft SQL Server 2005 availability with Veritas Storage Foundation HA for Windows from Symantec White Paper: Symantec Enterprise Solutions Enhancing Microsoft

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Microsoft SQL Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

CA XOsoft High Availability for Windows

CA XOsoft High Availability for Windows CA XOsoft High Availability for Windows Microsoft File Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

High availability and disaster recovery with Microsoft, Citrix and HP

High availability and disaster recovery with Microsoft, Citrix and HP High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Site-Wide Disaster Recovery and Business Continuity Solutions

Site-Wide Disaster Recovery and Business Continuity Solutions Site-Wide Disaster Recovery and Business Continuity Solutions Enterprises need an effective disaster recovery and business continuity plan to safeguard critical business processes. This article presents

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

How To Backup To Cloud

How To Backup To Cloud Disaster Recovery to the Cloud 3 December 2014 Copyright 2014 Arcserve (USA), LLC and its affiliates and subsidiaries. All rights reserved. Prepared & Presented by Andrew Martin CEO Asia Online Publishing

More information

Protecting SQL Server in Physical And Virtual Environments

Protecting SQL Server in Physical And Virtual Environments Protecting SQL Server in Physical And THE NEED TO PROTECT SQL SERVER AND RELATED APPLICATIONS Microsoft SQL Server is the preferred database management system for a large number of Windows-based applications.

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Business and IT Requirements for Continuous Data Protection. Protecting Information Assets with Enterprise Rewinder

Business and IT Requirements for Continuous Data Protection. Protecting Information Assets with Enterprise Rewinder Business and IT Requirements for Continuous Data Protection Protecting Information Assets with Enterprise Rewinder April 2006 Table of Contents Executive Summary... 3 Protecting Applications Today... 4

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Mastering Disaster Recovery: Business Continuity and Virtualization Best Practices W H I T E P A P E R

Mastering Disaster Recovery: Business Continuity and Virtualization Best Practices W H I T E P A P E R Mastering Disaster Recovery: Business Continuity and Virtualization Best Practices W H I T E P A P E R Table of Contents Introduction.......................................................... 3 Challenges

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Exchange DAG backup and design best practices

Exchange DAG backup and design best practices Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting

More information

Microsoft Exchange 2013 on VMware Availability and Recovery Options

Microsoft Exchange 2013 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

WANSync SQL Server. Operations Guide

WANSync SQL Server. Operations Guide WANSync SQL Server Operations Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information

Server Clusters : Geographically Dispersed Clusters For Windows 2000 and Windows Server 2003

Server Clusters : Geographically Dispersed Clusters For Windows 2000 and Windows Server 2003 Server Clusters : Geographically Dispersed Clusters For Windows 2000 and Windows Server 2003 Microsoft Corporation Published: November 2004 Abstract This document describes what a geographically dispersed

More information

EMC CLARiiON Guidelines for VMware Site Recovery Manager with EMC MirrorView and Microsoft Exchange

EMC CLARiiON Guidelines for VMware Site Recovery Manager with EMC MirrorView and Microsoft Exchange EMC CLARiiON Guidelines for VMware Site Recovery Manager with EMC MirrorView and Microsoft Exchange Best Practices Planning Abstract This white paper presents guidelines for the use of Microsoft Exchange

More information

Perforce Disaster Recovery at Google. ! Google's mission is to organize the world's information and make it universally accessible and useful.

Perforce Disaster Recovery at Google. ! Google's mission is to organize the world's information and make it universally accessible and useful. Perforce Disaster Recovery at Google Plans and Experiences Rick Wright Perforce Administrator Google, Inc. About Google! Google's mission is to organize the world's information and make it universally

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

Rose Business Technologies

Rose Business Technologies Virtualization and Consolidation vs. Application Performance and WAN Optimization Virtualization and infrastructure consolidation can offer significant benefits for both IT and business operations. The

More information

End-to-End Availability for Microsoft SQL Server

End-to-End Availability for Microsoft SQL Server WHITE PAPER VERITAS Storage Foundation HA for Windows End-to-End Availability for Microsoft SQL Server January 2005 1 Table of Contents Executive Summary... 1 Overview... 1 The VERITAS Solution for SQL

More information

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

CA GREEN BOOKS. CA XOsoft WANSyncHA for BlackBerry Enterprise Server

CA GREEN BOOKS. CA XOsoft WANSyncHA for BlackBerry Enterprise Server CA GREEN BOOKS CA XOsoft WANSyncHA for BlackBerry Enterprise Server LEGAL NOTICE This publication is based on current information and resource allocations as of its date of publication and is subject to

More information

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle

Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

Virtual Server System and Data Protection, Recovery and Availability with CA ARCserve r16

Virtual Server System and Data Protection, Recovery and Availability with CA ARCserve r16 Virtual Server System and Data Protection, Recovery and Availability with CA ARCserve r16 1 Table of Contents Introduction... 3 Key challenges for protecting virtual servers... 3 Backup and recovery...

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Business Continuity and Disaster Recovery with CA Recovery Management and VMware Infrastructure

Business Continuity and Disaster Recovery with CA Recovery Management and VMware Infrastructure TECHNOLOGY BRIEF: CA RECOVERY MANAGEMENT AND VMWARE INFRASTRUCTURE Business Continuity and Disaster Recovery with CA Recovery Management and VMware Infrastructure CA Recovery Management Team Table of Contents

More information

Enterprise Linux Business Continuity Solutions for Critical Applications

Enterprise Linux Business Continuity Solutions for Critical Applications Enterprise Linux Business Continuity Solutions for Critical Applications Introducing SteelEye Protection Suite for Linux Multi-site Cluster May 15 2009 EMEA DataKeeper Our Expanding Family of Solutions

More information

Fault Tolerant Servers: The Choice for Continuous Availability

Fault Tolerant Servers: The Choice for Continuous Availability Fault Tolerant Servers: The Choice for Continuous Availability This paper discusses today s options for achieving continuous availability and how NEC s Express5800/ft servers can provide every company

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

(Formerly Double-Take Backup)

(Formerly Double-Take Backup) (Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)

More information

Cloud Backup and Recovery

Cloud Backup and Recovery 1-888-674-9495 www.doubletake.com Cloud Backup and Recovery Software applications and electronic data are the life blood of a business. When they aren t available due to a disaster or outage, business

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint

More information

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,

More information

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL SCHOONER WHITE PAPER Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL About Schooner Information Technology Schooner Information Technology provides

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability?

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability? Best Practices to Ensure SAP Availability Abstract Ensuring the continuous availability of mission-critical systems is a high priority for corporate IT groups. This paper presents five best practices that

More information

UBDR and Microsoft Cluster Server

UBDR and Microsoft Cluster Server WHITE PAPER UBDR and Microsoft Cluster Server UltraBac Version 8.x OVERVIEW UltraBac Software, author of award-winning backup and storage management software, is proud to announce enhanced support for

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Achieving Zero Downtime for Apps in SQL Environments

Achieving Zero Downtime for Apps in SQL Environments White Paper Achieving Zero Downtime for Apps in SQL Environments 2015 ScaleArc. All Rights Reserved. Introduction Whether unplanned or planned, downtime disrupts business continuity. The cost of downtime

More information

Disaster Recover Challenges Today

Disaster Recover Challenges Today S O L U T I O N S O V E R V I E W Disaster Recovery Solutions from VMware Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery Disaster Recover

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Administering and Managing Failover Clustering

Administering and Managing Failover Clustering 24_0672329565_ch18.qxd 9/7/07 8:37 AM Page 647 CHAPTER 18 Administering and Managing Failover Clustering Failover clustering is one of four SQL Server 2005 highavailability alternatives. Other SQL Server

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Microsoft SQL Server 2005 Database Mirroring

Microsoft SQL Server 2005 Database Mirroring Microsoft SQL Server 2005 Database Mirroring Applied Technology Guide Abstract This document reviews the features and usage of SQL Server 2005, Database Mirroring. May 2007 Copyright 2007 EMC Corporation.

More information

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Disaster Recovery Solution Achieved by EXPRESSCLUSTER Disaster Recovery Solution Achieved by EXPRESSCLUSTER http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Contents 1. Clustering system and disaster recovery 2. Disaster

More information