High Availability and Disaster Recovery with Libelle BusinessShadow

Size: px
Start display at page:

Download "High Availability and Disaster Recovery with Libelle BusinessShadow"

Transcription

1 High Availability and Disaster Recovery with Libelle BusinessShadow Libelle AG has been providing High Availability (HA) and Disaster Recovery (DR) Solutions to the enterprise market for over a decade. With more than 1,000 installations at almost 400 customer sites worldwide, Libelle demonstrated its ability to successfully serve the most complex requirements. This White Paper presents the basics of High Availability and Disaster Recovery and the technology that supports the flagship Libelle mirroring solution BusinessShadow for HA and DR. It includes an overview on how the solution is positioned in the enterprise market as well as important considerations for setting up replication solutions for the Enterprise IT. Libelle AG. All rights reserved.

2 1. Introduction High Availability and Disaster Recovery are often used as loose terms within IT specifications, designs and solutions. To level the playing field, this White Paper first outlines the framework of terms and our perspective of methods to give a better understanding of the information presented Terminology The terms High Availability (HA) and Disaster Recovery (DR) will be extensively used in this White Paper. The architectures we are developing throughout this document are presenting both, HA and DR scenarios. Our experience shows that even professionals are sometimes unclear about a terms reach or even mix them up altogether. As the terms define the scope of projects we want to be clear about the specifics: High Availability (HA) includes all tools, policies, and procedures to ensure local availability of computer systems including the protection against local hardware failures and software/user error. Tools to provide HA are typically Server or Database Clusters, redundant components, Storage Area Networks for hardware failures and backup/recover standby database for software errors, user errors, or data corruption. Disaster Recovery (DR) includes all tools, policies, and procedures to ensure IT operation after a total or partial site failure. Tools providing DR capabilities are typically backup and recovery with access to a new location ( cold standby ) or live data replication and failover to a pre-configured secondary site ( warm standby or hot standby ). In addition, the term Business Continuity Planning (BCP) is used as a term for the organizational side of Disaster Recovery: Roles, responsibility and the organizational model including a preceding Business Impact Analysis. The Libelle BusinessShadow software solution addresses both HA and DR requirements and we outline possible scenarios for each next High Availability Generally, High Availability scenarios can be categorized into two groups: Hardwarerelated issues and software/user related issues causing potential system downtime. On the hardware side, downtime became less of an issue as hardware technology evolved into providing nearly fault-tolerant systems. However, hardware availability has less to do with availability of the critical applications themselves. A hardware or database cluster may provide failover capabilities between systems within seconds, but the application might take a while to be fully available again. Software- and user-related incidents are a cause for concern as they often cause a majority of downtime incidents. Especially with growing complexity of inter-dependent hardware and software components, the overall availability of systems is constantly at risk. Based on our experience we say that IT systems are far from % available. Libelle AG. All rights reserved. July 14 2 / 22

3 1.3. Disaster Recovery In addition to local issues such as server issues or software/user issues, the Disaster Recovery Scenario is targeting events like fire, flood, terrorist attacks, or wide-spread telecommunication and power outages. Disaster Recovery and High Availability are seen as diametrically proportional in regards to their probability and impact: Local issues (HA) might happen quite often, but can be covered and fixed fairly quickly with minimum impacts. On the other hand, a Disaster Recovery incident has low probability, but presents tremendous impacts as the complete production site becomes unavailable. 2. Scoping HA and DR This White Paper focuses on the Technical Architecture of High Availability and Disaster Recovery Solutions. Before outlining the architecture, a clear project scope needs to be defined Enterprise IT Architecture Generally, Enterprise IT is the sum of a variety of infrastructure, networking, storage, and server components to support Enterprise Applications such as ERP solutions from SAP AG, Oracle, Microsoft, Infor and many more with typically hundreds or thousands of users. The foundation of these applications are mainly medium to high-end UNIX or Windows Server running databases such as IBM DB2, MaxDB, MySQL, Microsoft SQL Server, and Oracle. The Enterprise IT Architecture illustrates the critical components for both High Availability and Disaster Recovery. From a Disaster Recovery perspective, all components to support the business processes must be made partially or fully available at an alternate site. Except for infrastructure and the Business Components detailed different approaches on protecting each component will be presented later on. Libelle AG. All rights reserved. July 14 3 / 22

4 From a High Availability perspective, many factors come into play. First line of defense to provide 24/7 availability is the provision of redundancy. Many medium- and high end components can provide built-in redundancy so that a failure of a storage controller, a CPU, or a single disk, won t even be noticeable. The second step for High Availability is to provide the same component twice, even if they are already have redundancy built in. For example a Cluster Software Solutions provides server failover capabilities in case of a total server failure. Combining such a solution with locally mirrored storage and redundant paths between server and storage, the failover to new systems can happen within a relatively short period of time. Middleware, databases, and applications became relatively cluster-aware, so that an application can be made available on different hardware typically within less than five to ten minutes depending on the application. However, Hardware Redundancy will not protect against the number one downtime cause of user and software errors as data corruption and faulty operation/configurations will spread throughout the landscape Recovery Point Objectives Both, HA and DR projects start with the question of the potential data loss in case of an incident (Recovery Point Objective or RPO ) and the time necessary to have the systems up and running on the Mirror System (Recovery Time Objective or RTO ). The difference between HA and DR is that local failures have typically faster response and failover times as the servers are locally available and in the same network. Recovery Point Objectives can range from zero in a synchronous replication setup, to a couple of minutes in an asynchronous replication setup or with log shipping Recovery Time Objectives The Recovery Time Objective is the amount of time it takes until the application is made available after a component failure. Failover may happen automatically in HA settings or partially automated after a Disaster Declaration in DR settings. For an HA scenario, RTO s can be zero or near-zero, if the application allows redundant components such as multiple database servers in a RAC setting or multiple application servers where users log on to the next available server. However, many applications require a reboot after starting on a different server and RTO can range between 5 and 15 minutes. For a DR scenario, RTO s are typically higher because a complete data center with interdependent systems is moved to a new site and in many cases into a separate network segment. With hot-standby mirrors it is possible to reach 2-4 hours Recovery Time Objectives if the procedures and technologies are in place Recovery Consistency Objectives A third, more recent addition to traditional RTO and RPO goals, is the Recovery Consistency Objective. RCO applies data consistency objectives to the DR and HA architecture. Following the definitions for RPO and RTO, RCO defines a measurement for the consistency of distributed business data within interlinked systems after a disaster incident. The next illustration outlines the relation between RPO, RTO, and RCO. Libelle AG. All rights reserved. July 14 4 / 22

5 Recovery Point, Recovery Time, and Recovery Consistency Objectives compared 3. Replication Basics The general concept of any replication solution is to provide copies of critical production data and applications to one or multiple Mirror Systems in the same location (High Availability) or at a different location (Disaster Recovery). In an emergency situation, the Mirror Systems are taking over the applications and users can login to the Mirror System. Most replication solutions are setup to have one active and one passive node. There are active/active replication solutions, but as long as the application itself is not designed to support such a setup the requirement is active/passive. Libelle AG. All rights reserved. July 14 5 / 22

6 3.1. Database Layer, File Layer, and Storage Layer Applications are primarily based on databases and dedicated flat files (application binaries, configuration data, and any critical data not stored in a database). The database itself is again based on flat files which are managed by the database software. A layer below, a storage controller and/or storage systems are managing how these files are stored and retrieved from the storage systems. Different Methodologies mirror systems on different layers. Database Layers for example guarantee Database-Level Integrity while Storage-Layer only guarantee Storage-Level Integrity Next, we apply this layer model to synchronous and asynchronous replication and compare different layers of mirroring methods. It is crucial to understand how applications operate and store their data throughout the layers in order to have usable applications and application data upon failover. Replication can be done on any of these layers. A storage replication would focus on mirroring and integrity of Storage Blocks, while a File Replication would do the same for files, and a Database Replication Solution would focus on the database Synchronous Replication With a guaranteed 100% synchronous replication, the layer on which data gets replicated is relatively irrelevant as e.g. synchronicity on a storage level will propagate all the way to the application level. 1 This makes local High Availability Solutions such as Server Clusters with redundant storage a very popular solution. There are varying concepts such as Hardware Cluster (e.g. IBM HACMP, HP MC/SG, etc.), Database Cluster (Real Application Cluster, Direct Partitioning Features), Application-based dualwrites of data or a combination of them. For DR, 100% Synchronous Replication is many times neither achievable (because of high network latency and bandwidth restraints when mirroring over large distances) nor desirable (adding complex infrastructure and performance restraints on the Production System). DR architectures are typically based on Asynchronous Replication. 1 There are various, more detailed considerations for the local failover with synchronous replications which we do not elaborate on for simplicity reasons. Libelle AG. All rights reserved. July 14 6 / 22

7 As for High Availability, synchronous replication is not covering the software/user error, or data corruption. This is the reason why customers implement time-delayed mirroring to cover these incidents. The differences are illustrated in the following table: Covering Hardware Errors? Covering Software Errors? Covering User/ Operating Errors? Covering Data Corruptions? Synchronous Replication yes no no no Time-Delayed Replication yes yes yes Yes 3.3. Asynchronous Replication The moment we start to replicate data asynchronously, it is of uttermost importance on which layer (Application/Database/File/Storage Layer) the replication is operating and if any consistency considerations on the Application Level are in place. Asynchronously mirrored storage blocks for example won t make a file-consistent, database-consistent or application-consistent replication. With a block-based, asynchronous Replication the Mirror System is almost guaranteed to be in an inconsistent state from an Application Perspective: 1. Assume storage blocks are mirrored with storage-level consistency points. 2. Files consist of multiple storage blocks: Files might be inconsistent. 3. Databases consist of multiple files: Database is likely to be inconsistent. 4. Applications consist of multiple databases: Application is likely to be inconsistent. 5. Business Processes consist of multiple applications: Processes will be inconsistent. Bottom line is, no block-level consistent asynchronous replication will make an application-level consistent mirror. 4. BusinessShadow Overview Libelle BusinessShadow is a software solution to mirror applications on the Database Layer (DBShadow) and File Layer (FSShadow). It is extended with automating the Application Failover (SwitchApplication) and a special edition for WAN Replication (Option Long Distance). BusinessShadow is used for High Availability, Disaster Recovery, and various combinations of both Software Components Libelle BusinessShadow is a wrapper term for the core mirroring components. In detail, these components are: DBShadow provides dedicated Editions for IBM DB2, MaxDB, Microsoft SQL Server, MySQL, and Oracle. It is used to mirror the core Application Databases. Libelle AG. All rights reserved. July 14 7 / 22

8 FSShadow is used to mirror critical Application Data not held in the Database for example Application Binaries, profile data, EDI interface data, or other applicationspecific flat files. SwitchApplication is used to activate and de-activate application IP addresses, hostnames, and can automate other application-specific failover tasks. Option Long Distance extends the basic mirroring capabilities functionality of DBShadow and FSShadow to support Wide Area Network settings. Overview of the core BusinessShadow Components All components are available specific to the respective Operating System which can be HP-UX, IBM AIX, Solaris, Tru64 UNIX, most Linux Distributions, and all Windows Platforms. The majority of implementations by Libelle AG are mirroring applications by SAP AG with a special BusinessShadow Edition for SAP Solutions. Other implementations include Oracle, Microsoft Dynamics, ERP Solutions by Infor Global Solutions, and many other applications Solution Design DBShadow and FSShadow The architecture of the main BusinessShadow components DBShadow and FSShadow are designed that each single mirror consists of one Production System and one or more Mirror System. Libelle AG. All rights reserved. July 14 8 / 22

9 DBShadow and FSShadow Server Agents are communicating with each other and a GUI which allows central management and monitoring of operation. After a replication is built initially between the two systems with an Initial Copy, an Archiver process picks up database and flat file changes from the Production System and ships them to the Mirror System using the Libelle TCP/IP stacks. The Archiver is customized to application requirements and Recovery Point Objectives. It can be set to kick in e.g. every 5 or 10 minutes. A Recovery Process running on the Mirror System is applying the changes it receives from the Archiver process and applies them into a mirror database (DBShadow) or into a mirror file system (FSShadow). All processes can operating independently if one or the other system is temporarily unavailable and will pick up as soon as the link is re-established, but generally depend on each other for a coherent HA and DR operation. The software itself is based on low foot-print Server Agents (Shared Memory for UNIX, Services for Windows) residing on each host. The Agents are communicating with each other via specialized network sockets. A secure Libelle GUI can intercept the communication and manages one or multiple mirrors across an Application Landscape. The day-to-day replication operation is then based on the Archiver and Recover Processes running continuously which are monitored by the GUI. Irregularities in operation will be logged on the server and sent to GUI and/or other System Management tools Option Long Distance An additional component of BusinessShadow is the Option Long Distance to extend the basic TCP/IP compressed data transfer with additional compression, parallelism and packet configurations to suit large distances between a production and a mirror system with typically high network latency SwitchApplication Finally, the component SwitchApplication can manage the failover of IP-Addresses between the two systems, so that an additional virtual Hostname or IP Address on a Production System is moved seamlessly to a Mirror System as part of the failover process. Libelle AG. All rights reserved. July 14 9 / 22

10 SwitchApplication provides a solution to add and remove Virtual IPs and Hostnames automatically upon failover of DBShadow or FSShadow Graphical User Interface (GUI) Management Console To allow a single point of control for the administrator, Libelle provides a Graphical User Interface (GUI) which communicates to any number of Server Agents. The GUI is the central component to setup, control, and operate mirrors. It also provides a simple graphical interface to perform Emergency Failovers or Disaster Recovery Tests. As the Server Agents are doing the replication tasks, the GUI is only for monitoring and operation, but not an active part of the replication process. The Libelle Server Agents themselves act independently and can send out SMTP traps or other messages and are manageable by Command Line, as well. BusinessShadow GUI This example displays six system groups on the left, with the Production group in the middle. Each group holds multiple mirrors. The green checkmark an ok status. The red X illustrates errors (e.g. database down). Yellow explanation mark illustrate warnings (e.g. running out of disk space), Libelle AG. All rights reserved. July / 22

11 4.3. High Availability Scenarios BusinessShadow for High Availability can provide a locally replicated Mirror Systems for any Production System. The software can be used as a no-data loss failover solution to a Mirror System with a shared storage, or minimum data loss solution without a shared storage. The primary HA BusinessShadow implementation is the concept of a time-delayed mirror to protect against Software and User Errors. The architecture is based on an intentionally time-delayed mirror between the two systems. Changes of a Production System are applied to the Mirror System with a time-delay of e.g. 2 or 4 hours to allow a reaction window in case of corruption caused by Software Errors, User Errors, Configuration Errors, poorly planned or executed System Updates, and other situations leading to corrupt or unusable data. DBShadow and FSShadow during normal operation. Transactions are queued on the Mirror System before they are applied to allow a reaction window for corrupt data Now if a software or user error is corrupting e.g. the Production Database, the Mirror Database is still e.g. four hours behind and has a queue of four hours waiting in the Mirror System s File System. For a fast restore, the Administrator will use the BusinessShadow GUI or the Shell Interface for an automated recovery up to any timestamp before the error occurred. Four hours worth of transactions can typically be applied within less than 20 minutes depending on the hardware performance. Comparing this to the alternative of a full restore from tape, this methodology is the fastest possible way to restore a system after corruption. DBShadow and FSShadow during emergency operation caused by data corruption The Mirror System provides the Application with pre-corruption data in a consistent state. Generally we are targeting Recovery Time Objectives (failover time) which includes restarting the application of less than minutes in case of a corrupted Production Libelle AG. All rights reserved. July / 22

12 System caused by software or user errors with a typical 4 hours delay. For no-time delay implementations, Recovery Time Objectives are typically less than minutes. Recovery Point Objectives (data loss) are again varying depending on the time-delay. For a Software Error, our intention is to go back in time, so it can range from up to the last e.g. five minutes to up to 4 hours. Whatever the Libelle Administrator wants or does not want to recover. Once the administrator decided on the time-stamp, all database related tasks (recovery, database rename, locally managed tablespaces, etc.) are fully automated. For a no-data-loss failover, the last 5 or 10 minutes of Online Logs which may not be shipped are located on a shared storage which the Mirror System can access Disaster Recovery Scenarios The second application of BusinessShadow is to serve as a full-fledged Disaster Recovery solution. The low-impact Server Agents and low network requirement makes the solution suitable to mirror any size environment to a remote location. Libelle installations for Disaster Recovery range from a single Application Mirror with e.g. 400 GB mirrored over a 3Mbit/s VPN network to large TB landscapes with dozens of applications mirrored across a dedicated 100 Mbit/s WAN link. The methodology is similar to a High Availability Implementation except that the timedelay is less significant. The Archiver is usually set low enough to meet given Recovery Point Objectives (e.g. maximum data loss of minutes in case of a site failure), but also high enough not to impact performance on the Production System (synchronously updating the mirror system would require too much performance overhead on Network and Server). Either way, with BusinessShadow mirroring the Application Landscape for any number of Systems, a comprehensive Disaster Recovery Standby System is in place and constantly updated with fresh production data. Failover during emergencies and yearly Disaster Recovery tests are highly automated Integration in SAP Solutions Libelle s Commitment to the SAP Market Libelle has been providing its software solutions to the SAP market since the late 90s. The very first supported database has been Oracle 6 and as a company located in Germany we had always access to a large base of SAP customers early on. After adding support for IBM s DB2, MaxDB, and Microsoft s SQL Server, Libelle supports all common SAP environments. SAP Applications now make 80% of Libelle s customer base. In 2009, Libelle acquired a majority interest in a Germany-based SAP Basis Consulting firm to boost its exposure in the SAP Basis market SAP Landscape Requirements With the latest NetWeaver architecture, SAP AG provides a highly sophisticated Service Oriented Architecture. Additional functionalities added a high degree of complexity in technical design and operating, especially when comparing it to earlier SAP R/3 based on single-stack ABAP installation with one or two SAP instances. Unless we implement a 100% synchronous replication, any application-agnostic replication solution (e.g. block-based replication) which is not tightly integrated into the SAP Netweaver Architecture, will cause issues upon failover. Also database-only solutions Libelle AG. All rights reserved. July / 22

13 (Log Shipping) will omit the large amount of data stored in flat files and have issues getting a replicated solution up and running on a Mirror System. The following illustration shows how Libelle BusinessShadow is typically integrated into a single SAP Instance. While the illustration shows a single-node Production System, most customer systems are based on two-node cluster systems. BusinessShadow Integration into typical SAP Instance Finally, most SAP Installations are based on multiple systems. Part of the replication project is to develop and extensively test a blueprint for one installation and then replicate the blueprint across the landscape either by repeating the installation or with an automated deployment process depending on the project size. 5. BusinessShadow Technology 5.1. Core Server Agents The core components of Libelle BusinessShadow are based on low foot-print Server Agents running on the Production and Mirror System. The Libelle Agents are hard-coded in C and C++ and run as Shared Memory Process in UNIX environments and as Service for Windows Systems. The agents came to live as basic TCP/IP socket daemons in DBShadow Version 1.0 for Oracle in Today s code in Versions 4.5, 4.8, and 5.x are containing over 14 years of development, enhancements, and have been deployed and operating in over 1000 small, medium-sized and high-end installations. Today, they are actively mirroring environments from smaller 100GB database mirrors up to single 18TB database mirrors in either single-instance installations or multi-system landscapes with 50+ servers in all imaginable UNIX and Windows settings. Libelle AG. All rights reserved. July / 22

14 DBShadow and FSShadow Server Agents are communicating with own TCP/IP sockets. Illustration shows core processes Initial Copy, Archiver, and Structure Processes on Production and Recover Process running on mirror. After fail-over, the roles are reversed and replication goes into the opposite direction. The Server agents are managing communication between the two systems and are controlled by a Command Line or Graphical User Interface. They hold information about the current activities in the Shared Memory which can be accessed from both sides. Every process contains main processes which are starting, stopping, and managing Son Processes that execute dedicated tasks. For example: DBShadow for HP-UX Archiver Process starts, stops, and monitors the copy of an Oracle 11i log file to its Mirror System. DBShadow for Windows Recover Process applies and monitors the recovery of Transaction Log Files Backups with a certain time-delay into its Mirror System. FSShadow for IBM AIX Archiver Process checks the defined flat file list on a Production System every 20 minutes and copies the changes to a its Mirror System. DBShadow for Solaris Structure Process checks the Oracle database for no-logging transaction, new data files - or new directories - and updates the Mirror accordingly. DBShadow for IBM AIX Recover Process performs a Point-In-Time Recovery for a DB2 database upon failover. Libelle AG. All rights reserved. July / 22

15 Illustration shows a GUI screenshot of Shared Memory retrieved from a Mirror System. The same information can be retrieved from the server via a shell command. As the name implies, the information it is held in memory of both Production and Mirror System. This allows continuing Mirror Operation after any interruption as information is held in both systems. Key to the operation of the Server Agents is their robustness as they run 24/7, 365 days a week and are designed to survive server reboots, extended network outages, or other typical disturbances in a LAN or WAN operation. In the following paragraphs, we will look in detail into the processes and how they interact with the environment to enable a replication setup Database Mirroring Database Replication with Libelle DBShadow is based on the following steps: Create an Initial Copy of a Production Database from the Production System to its Mirror System. In customizable intervals, for example every 10 minutes, check the Production Database for changes in form of Offline Log Files and ship changes to the Mirror System with an Archiver Process. Continuously apply the changes from the Production Database into the Mirror Database with a customizable time delay. In customizable intervals, for example every 2 hours, check the Production Database for new data files, no-logging transactions, new directories, and update the Mirror Database with the changes. Libelle AG. All rights reserved. July / 22

16 The Core Processes Initial Copy, Archiver, and Recover Process interacting with a Production and Mirror System An additional Structure Process checks the Production Database and coordinates Structure Updates for the Mirror Database with the Recover Process.. All DBShadow Processes can tie into different databases and communicate and function according to the database. An Archiver Process for Oracle works different than an Archiver Process for MS SQL Server, etc. The same applies for the Initial Copy, Recover, and Structure Process in Normal Replication Operation and Emergency Failover Operation where the Mirror System is activated by BusinessShadow. This Illustration shows the DBShadow Archiver for Oracle Databases. DBShadow supports Oracle 8i-11g, all MS SQL Server from 2000 to 2008, most MaxDB Versions, DB2 V7-9, and MySQL. Each database has their own distinct methods and special considerations and DBShadow reflect these in the respective edition Flat File Mirroring The flat file mirroring functions analogue to the database mirroring. The component FSShadow is maintaining flat file mirrors for all files defined in the mirroring process or added later. Initially, an Initial Copy is creating an identical copy of the files on the Mirror System. Next, a Flat File Archiver Process is checking the Production File System in Libelle AG. All rights reserved. July / 22

17 customizable intervals, for example every 30 minutes or every 5 minutes, depending on the project, customer requirements, and performance considerations. Finally, a Recover Process is managing the recovery of the files into the mirror File System. As with DBShadow the architecture has a designated time-delay. Flat files won t be applied immediately as they reach the Mirror System, but after a designated period of e.g. 4 hours. This allows a reaction window in case of corrupted flat file data for both High Availability and Disaster Recovery. FSShadow mirrors complete directories or single flat files. Entries can be defined via GUI or a simple ASCII file directly on the server. Once setup, the FSShadow initializes the replication, manages data transfer to the Mirror System, and monitors operation Wide Area Network Enhancements: Option Long Distance Both components, DBShadow for databases and FSShadow for flat files, allow an extension of the basic communication services with special features for Wide Area Networks called Option Long Distance. General challenges with a Wide Area Network replication setup compared to a Local Area Network mirrors are typically (1) drastically reduced available bandwidth, (2) generally unstable networks with multiple minor line drops during the day, and (3) very high Network Latency with distances larger than 50 miles. To address these issues, the Option Long Distance adjusts the basic Libelle TCP/IP stacks with customizable extensions which include: Libelle AG. All rights reserved. July / 22

18 High Compression: Adding additional compression to standard compression before data is shipped. Parallel Archive Shipping: Single Log Files are shipped in parallel. For example, a single 200 MB Log File can be split up in multiple data packets which are then shipped in parallel to the Mirror System and then handed to the Mirror Database. Very Large Packets Technology: The option bumps up the default TCP/IP packet size. Standard packet sizes are geared towards Local Area Networks and often unsuitable for WAN replication Application Failover Libelle BusinessShadow provides three core components for the Application Failover in case of an emergency: Libelle DBShadow and FSShadow Recover Process in Emergency Mode to automatically complete all database and flat file related failover tasks. Libelle SwitchApplication to automatically add or remove server hostnames and IP addresses from/to a Mirror System or Production System Libelle DBShadow, FSShadow, and SwitchApplication User Interfaces to automate pre-defined tasks during failover Recover Process in Emergency Mode During normal replication procedure, the DBShadow and FSShadow Recover Processes are both applying changes they receive from the Archiver Process into the Mirror Database or into the Mirror File System. During an emergency situation where a failover and activation of the Mirror System is necessary, the same Recover Process will operate in Emergency Mode and automatically ensures that the Mirror System is in the proper state to take over production. For the database failover with DBShadow, this includes all database related tasks and includes for example the automated Point-In-Time Recovery to a customizable timestamp. DBShadow would then apply all log files which are not yet applied. The Recover Process also allows an automated role-switch between a Production- and a Mirror System in case of a planned failover for most databases (for Oracle it would for example fetch the remaining Online Logs from Production and open the mirror with option no reset logs). Finally the process automatically renames the database to the name of the Production Database and performs additional tasks as necessary. The flat file failover with FSShadow operates similar. With a time-delay configured, customers can specify a time-stamp up to which the flat files should be recovered and then provides the Mirror System with the exact file structure as desired. Libelle AG. All rights reserved. July / 22

19 BusinessShadow GUI with the failover option for DBShadow for MS SQL Server. The bottom of the screen shows the failover options and the image above reflects Production and Mirror System. The green bullets represents log files in the configured time funnel with the percentage of disk space used. The GUI displays current system time of each server and the list of mirrors on the left Libelle SwitchApplication Another essential part of failing over one or multiple systems from a production landscape to a mirror landscape is to automatically activate IP-Addresses and Hostnames on the Mirror System and if desired remove the same from the Production System before. Libelle SwitchApplication is a software product based on Server Agents and a Graphical User Interface to manage multiple systems. The Server Agents can interact with a system in a way that they add or remove additional virtual hostnames and virtual IP addresses to both UNIX and Windows server. The process of adding and removing those names/addresses will not require rebooting e.g. a Windows Server. The tool compares to a basic form of a Server Cluster but is managed and triggered by the customer or by the DBShadow and FSShadow failover process. SwitchApplication can be installed on both Production Systems and Mirror Systems. Most customers however do already have Cluster Software implemented on their production systems where SwitchApplication would then only be installed on the Mirror System and activate the Cluster Resource s IP address on the Mirror System once the same becomes unavailable on Production. For operating SwitchApplication, it is required, that both Production System and Mirror System are in the same network, as SwitchApplication executes no control over routing or DNS tables. For Disaster Recovery, the customer could either implement a Virtual LAN with the same subnet. If that is not possible, the systems can stay in separate networks and Application Failover is performed by updating DNS entries or by other means. Libelle AG. All rights reserved. July / 22

20 The illustration below shows a landscape implementation of BusinessShadow with SwitchApplication implemented on Production- and Mirror System for the Standalone Systems and implemented on the Mirror Systems only for the Clustered Production Systems. BusinessShadow Integration into a multisystem SAP landscape. SCM shows two DBShadow instances, as the application has typically one MaxDB and one Oracle database Failover- and Other User Interfaces All BusinessShadow components come with an extensive set of customizable User Interfaces which are empty at the beginning of an implementation. A standard singlemirror installation is typically requiring only minor additional integrations like failover automation. A multi-mirror implementation however is often extended with a framework of User Interfaces where one main mirror can initiate failover of a group of related applications or other systems automatically. User Interfaces can execute Offline Tasks (e.g. executing a script) or Online Tasks (executing a script with feedback options), and can reside on both Production Systems and Mirror Systems. Tasks can be executed as Local Tasks (operate on the same server where they are defined) or Remote Tasks (trigger actions on their mirroring partner). For the failover itself, a central User Interface triggered during, before, or after DBShadow, or FSShadow completed their failover tasks. Integrations can be as simple as triggering other system failovers up to running through a sophisticated multi-step plan of checking and executing failover tasks which used to be performed manually Graphical User Interface (GUI) The Libelle BusinessShadow GUI is the central point where all DBShadow and FSShadow configurations of a landscape are setup, controlled, monitored, and managed. The GUI is a JAVA application and is typically installed on a workstation. The GUI provides a central interface to set up, configure, and activate one or multiple mirrors. Libelle AG. All rights reserved. July / 22

21 BusinessShadow Configure Menu is intended to support an easy setup and configuration for each mirror. The example shows the setup of a MS SQL Server Mirror. The lower part of the screenshot shows the actual configuration setup divided into Copy, Archiver, Recovery, and Structure options as detailed in earlier chapters. Alarm is the configuration how the Server Agents should react to disturbances and if Errors or Warnings should be send out by or SMTP traps. After mirror configurations have been set up, the next step is then to allow monitoring of multiple systems, as shown in the next illustration. BusinessShadow Monitoring allows a per-mirror view, group-view, or list view. In larger deployments, filter features with green (ok), yellow (warning), or red (error) flags allows easy identification of irregularities in Mirroring Operation. The GUI also collects and displays server messages for the selected system. Libelle AG. All rights reserved. July / 22

22 6. Summary This White Paper points out in detail different mirroring methods for both High Availability and Disaster Recovery. Libelle BusinessShadow allows the highest possible grade of Database/Application Level Consistency, as data is mirrored on a database level for all major database technologies. On the other hand it provides a complete solution to mirror different databases on different platforms and provides a sophisticated solution to mirror flat files. Libelle hits a unique spot between application-agnostic storage/block-based replication and database-centric log shipping solutions. All Libelle solutions come with a sophisticated Implementation Concept and Operating Model to suit any size and any grade of complexity from a single mirror installation up to 100+ server landscapes. There are a large number of features, advantages and concepts not mentioned in this White Paper. Please contact us and we can have our Solution Architects and Consultants review your landscape to outline a specific solution, implementation, and operational approach for your requirements. More Information Headquarter Americas Libelle AG Libelle LLC Gewerbestr Cumberland Blvd. Suite Stuttgart, Germany Atlanta, GA 30339, USA T / T / [email protected] [email protected] Libelle does not guarantee that the information in this presentation is error-free. The liability for consequential or indirect damages arising out of the reading or the use of this information is not warranted by Libelle AG within legal limits. All copyrights, especially distribution, reproduction and translation, are reserved. No part of this presentation may be reproduced, processed, reproduced or transmitted by electronic means without explicit approval of Libelle. Under no circumstances, including, but not limited to, negligence, shall Libelle, its agents or assignees, including but not limited to its parent, subsidiary, or affiliate companies, be liable for any direct, indirect, incidental, special or consequential damages that result from the use of the information provided herein. Libelle, the Libelle Logo, BusinessShadow, DBShadow and FSShadow are trademarks of Libelle AG in Germany and other countries. SnapMirror, and Snapshot are trademarks or registered trademarks of NetApp, Inc. Windows, Microsoft and SQL Server are registered trademarks of Microsoft Corporation. Oracle is a registered trademark of Oracle Corporation. DB2 is a trademark or registered trademark of IBM Corp. MaxDB is a trademark of MySQL AB, Sweden. UNIX is a registered trademark of The Open Group. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. V4 Libelle AG. All rights reserved. July / 22

Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications

Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications While real disaster incidents are rare, the impacts are dramatic. What if your business-critical Application becomes

More information

Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity Disaster Recovery and Business Continuity Basics Both Business Continuity and Disaster Recovery are very important business issues for every organization. Global businesses cannot simply stop operating,

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Constant Replicator: An Introduction

Constant Replicator: An Introduction Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Disaster Recovery Solution Achieved by EXPRESSCLUSTER Disaster Recovery Solution Achieved by EXPRESSCLUSTER http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Contents 1. Clustering system and disaster recovery 2. Disaster

More information

VERITAS NetBackup 6.0 Database and Application Protection

VERITAS NetBackup 6.0 Database and Application Protection VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity

More information

Veritas Replicator from Symantec

Veritas Replicator from Symantec Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data

More information

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database

More information

Secure Web Gateway 11.7 Upgrade Release Notes

Secure Web Gateway 11.7 Upgrade Release Notes Secure Web Gateway 11.7 Upgrade Release Notes August 2015 Trustwave is pleased to announce that the upgrade path for Secure Web Gateway to version 11.7 is now available. For more information on SWG 11.7,

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical

More information

SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery

SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery Dr. Ralf Czekalla/SAP HANA Product Management May 09, 2014 Customer Disclaimer This presentation outlines our general product

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

Module 14: Scalability and High Availability

Module 14: Scalability and High Availability Module 14: Scalability and High Availability Overview Key high availability features available in Oracle and SQL Server Key scalability features available in Oracle and SQL Server High Availability High

More information

VERITAS Cluster Server v2.0 Technical Overview

VERITAS Cluster Server v2.0 Technical Overview VERITAS Cluster Server v2.0 Technical Overview V E R I T A S W H I T E P A P E R Table of Contents Executive Overview............................................................................1 Why VERITAS

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage FlashCopy Manager IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal

More information

Tushar Joshi Turtle Networks Ltd

Tushar Joshi Turtle Networks Ltd MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering

More information

MySQL Enterprise Backup

MySQL Enterprise Backup MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...

More information

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become

More information

High Availability & Disaster Recovery. Sivagopal Modadugula/SAP HANA Product Management Session # 0506 May 09, 2014

High Availability & Disaster Recovery. Sivagopal Modadugula/SAP HANA Product Management Session # 0506 May 09, 2014 High Availability & Disaster Recovery Sivagopal Modadugula/SAP HANA Product Management Session # 0506 May 09, 2014 Legal Disclaimer The information in this document is confidential and proprietary to SAP

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Microsoft SQL Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")

More information

WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure

WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure Abstract This Solution Brief discusses how WFT Disaster Recovery Services helps a customer

More information

High Availability Solutions for the MariaDB and MySQL Database

High Availability Solutions for the MariaDB and MySQL Database High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name

NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name NetApp SnapMirror Protect Your Business at a 60% lower TCO Name Title Disaster Recovery Market Trends Providing disaster recovery remains critical Top 10 business initiative #2 area for storage investment

More information

SanDisk ION Accelerator High Availability

SanDisk ION Accelerator High Availability WHITE PAPER SanDisk ION Accelerator High Availability 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Introduction 3 Basics of SanDisk ION Accelerator High Availability 3 ALUA Multipathing

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information

DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led

DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led Course Description Gain a deeper understanding of the advanced features of DB2 9 for Linux, UNIX, and Windows database environments

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker

EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker Reference Architecture EMC Global Solutions Operations

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Maximum Availability Architecture. Oracle Best Practices For High Availability

Maximum Availability Architecture. Oracle Best Practices For High Availability Preventing, Detecting, and Repairing Block Corruption: Oracle Database 11g Oracle Maximum Availability Architecture White Paper May 2012 Maximum Availability Architecture Oracle Best Practices For High

More information

Strategies to Solve and Optimize Management of Multi-tiered Business Services

Strategies to Solve and Optimize Management of Multi-tiered Business Services WHITE PAPER: STRATEGIES TO SOLVE AND OPTIMIZE MGMT OF... MULTI-TIERED............. BUSINESS......... SERVICES............... Strategies to Solve and Optimize Management of Multi-tiered Business Services

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Monitoring Microsoft Exchange to Improve Performance and Availability

Monitoring Microsoft Exchange to Improve Performance and Availability Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations

More information

Oracle Database 10g: Backup and Recovery 1-2

Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed

More information

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Getting Started with Endurance FTvirtual Server

Getting Started with Endurance FTvirtual Server Getting Started with Endurance FTvirtual Server Marathon Technologies Corporation Fault and Disaster Tolerant Solutions for Windows Environments Release 6.1.1 June 2005 NOTICE Marathon Technologies Corporation

More information

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5F2 The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

Reference Architecture. EMC Global Solutions. 42 South Street Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com

Reference Architecture. EMC Global Solutions. 42 South Street Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com EMC Backup and Recovery for SAP with IBM DB2 on IBM AIX Enabled by EMC Symmetrix DMX-4, EMC CLARiiON CX3, EMC Replication Manager, IBM Tivoli Storage Manager, and EMC NetWorker Reference Architecture EMC

More information

Continuous Data Replicator 7.0

Continuous Data Replicator 7.0 DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management

More information

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability?

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability? Best Practices to Ensure SAP Availability Abstract Ensuring the continuous availability of mission-critical systems is a high priority for corporate IT groups. This paper presents five best practices that

More information

Active-Active and High Availability

Active-Active and High Availability Active-Active and High Availability Advanced Design and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: July 2015 2015 Perceptive Software. All rights reserved. Lexmark

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015 What You Need to Know NOW about Next Generation Data Protection Kenny Wong Senior Consultant June 2015 The Changing Face of Data Protection Changing computing infrastructure Data protection silos Application

More information

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software

More information

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions

NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.

Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document

More information

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability

More information

Oracle Recovery Manager 10g. An Oracle White Paper November 2003

Oracle Recovery Manager 10g. An Oracle White Paper November 2003 Oracle Recovery Manager 10g An Oracle White Paper November 2003 Oracle Recovery Manager 10g EXECUTIVE OVERVIEW A backup of the database may be the only means you have to protect the Oracle database from

More information

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This

More information

Pulse Redundancy. User Guide

Pulse Redundancy. User Guide Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation

More information

IBM PROTECTIER: FROM BACKUP TO RECOVERY

IBM PROTECTIER: FROM BACKUP TO RECOVERY SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It s understandable really: far more data gets backed

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Sanovi DRM for Oracle Database

Sanovi DRM for Oracle Database Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview

More information

IBM SAP International Competence Center. The Home Depot moves towards continuous availability with IBM System z

IBM SAP International Competence Center. The Home Depot moves towards continuous availability with IBM System z IBM SAP International Competence Center The Home Depot moves towards continuous availability with IBM System z Continous availability and manageability are the design principles of our IT architecture.

More information

Storage Based Replications

Storage Based Replications Storage Based Replications Miroslav Vraneš EMC Technology Group [email protected] 1 Protecting Information Is a Business Decision Recovery point objective (RPO): How recent is the point in time for

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Microsoft Exchange Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the

More information

Application Continuity with BMC Control-M Workload Automation: Disaster Recovery and High Availability Primer

Application Continuity with BMC Control-M Workload Automation: Disaster Recovery and High Availability Primer Application Continuity with BMC Control-M Workload Automation: Disaster Recovery and High Availability Primer TABLE OF CONTENTS Introduction... 3 Document Purpose... 3 What is Application Continuity?...

More information

The syslog-ng Premium Edition 5LTS

The syslog-ng Premium Edition 5LTS The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

VMware vsphere Data Protection

VMware vsphere Data Protection VMware vsphere Data Protection Replication Target TECHNICAL WHITEPAPER 1 Table of Contents Executive Summary... 3 VDP Identities... 3 vsphere Data Protection Replication Target Identity (VDP-RT)... 3 Replication

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information