CDL Database Administration Framework v. 1.1 August 2009
|
|
- Christian Lane
- 8 years ago
- Views:
Transcription
1 CDL Database Administration Framework v. 1.1 August 2009 Contents Purpose of the framework 1 Terminology 1 Database administration conventions 1 Summary Table 1 Database design, location, and naming 2 Default database configuration 3 DBMS version control, upgrades, and patching 5 Maintenance procedures and windows 6 Capacity planning 7 Security 7 Extant database environment 8 Change & review history: 1. Nov. 2008: Framework outline endorsed in principle by and comments from TechCouncil, et al. 2. March 19, 2009: First draft distributed to TechCouncil & DirCab for comment 3. March 27, 2009: Summary of conventions; extant environment tables complete 4. April 2, 2009: First draft feedback due 5. August 18, 2009 Feedback incorporated; shared with TechCouncil for final review & endorsement
2 Purpose of the framework: 1. To describe the conventions for CDL s database infrastructure, including: a. Design, configuration, and various other management practices b. responsibilities (as distinct or shared between IAS and program/service area). 2. To document the extant database environment. Note: In this document declarative statements describing the CDL database environment and practices are in regular font. Descriptions of responsibility, including initiation and follow through, are italicized. Terminology Database owner: the CDL program/service representative(s) who has responsibility for the service/application for which the database is a component, or their delegate. An owner s delegate may include a 3 rd party such as a vendor (e.g. as with OCLC for the VDX application; Ex Libris for the SFX and Aleph/Melvyl applications). DBA: the designated database systems administrator(s) [currently Annita Auyang], or her/his designate. Database components: the objects tables, indexes, stored queries comprising an entire database. Database engine: the DBMS software used to create, manage, and use the database. Currently CDL deploys Oracle, and MySQL database engines (see 1.3 below) 1. Host: the physical or virtual host under which a database runs and can be located. Each host will have a name (DNS entry) and an IP. Hosts may run one or more applications and/or databases. IAS: Infrastructure and Applications Support; the CDL unit responsible for supplying database systems support and in which the DBA reports. 1. Database administration conventions Summary of explicit conventions (see below for more information) MySQL Oracle Version i; 10g Name variant of app or service name version of app or service name Ports ; Users <dbname>ro Sys, system, user accounts <dbname>rw Password see DBA or IASmgr see DBA or IAS mgr Virtual hostname varies varies of db server Data filesystem name /database/mysql /database2/mysql /db,/dblog,/dbarlog /vdxdb,/vdxdblog,/vdxdbarlog Backup filesystem name /mydbbk, /mydbbk2 /net/sysad- /dbbk,/arbk /vdxdb/cdlbkdaily, /vdxdblog/cdlbkdaily, 1 The preservation program also uses and assumes responsibility for the Postgres DBMS as part of the Storage Resource Broker (SRB) component of its architecture. Infrastructure & Applications Support - 1 -
3 repo/export/flash_archive/mysql_bck /vdxdbarlog/cdlbkdaily Script names Varies (see database.xls) Varies (see database.xls) 1.1. Database design, location, and naming Initial design To the best of its ability the CDL industry standard or best practices for database design (e.g. fully normalized relational databases). Database owners are responsible for design. The DBA may be consulted for initial design or design improvements. The DBA may require design modifications before creating and populating a production instance of a database Development, stage, production instances Normally, an empty database instance will be created upon request as a development instance and released to the owner for the construction of database components and data population. The owner will inform the DBA when development is complete and request a staging/qa instance of the database. The stage database components can be created as a copy of development or reconstructed by the owner. The owner will inform the DBA when staging/qa is complete, and request a production instance of the data. Database owners are responsible for requesting development, stage, and production instances, and for populating development and stage instances. The DBA is responsible for creation of empty development, stage, and production instances and should be consulted during the population of stage instances. The production database and components must be created by the DBA and populated by, or in coordination with, the DBA Naming and location Location and naming of databases follows conventions which support ease of administration (setup, migration from development to stage to production, backups, performance monitoring, failover, replication, etc.) Database hosts Database hosts are selected/assigned in consultation between CDL programs and IAS. Assignment takes into consideration the administration and cost efficiencies (license and support/maintenance costs) of consolidating databases on servers or clusters dedicated to database hosting, and on application design. Oracle databases are assigned to hosts through consultation between the owner, DBA, and other IAS principals. MySQL development databases are normally hosted on hopper.cdlib.org MySQL stage/qa dbs are normally hosted on asawa.cdlib.org. MySQL production dbs are normally hosted on clio.ucop.edu or thalia.ucop.edu, which are set up for failover from one node to another to provide high availability Database names Infrastructure & Applications Support - 2 -
4 Database names normally are built as semantic indicators of the associated application/service (e.g. dpr for digital preservation repository. In the past the environment was included in the name (e.g. dprstg, or dprprod for stage, or production instances). The current convention is to use the same name in the different environments to ease the replication and management of stored procedures, scripts, etc. across environments. The loss of contextual information when the names are the same ( which environment am I in? ) is offset by database user names and passwords that are specific to the instance. Exceptions to this convention can be requested if necessary Database ports Server ports for MySQL databases are normally drawn from a pool of ports from Ports are selected to avoid conflicts, e.g. when production databases failover from the primary node to the secondary node (see 1.2.4). Where possible going forward, the dev, stage, and production database versions will use the same port, to ease management of the firewall and other configurations across environments. Oracle listener ports are conventionally 1521 or in the range of Ports also play a role in database (and general infrastructure) security in that firewalls protecting all environments must be configured to let network traffic through to only the designated database ports on database servers and, when possible, only from known and trusted origins Default database configuration Users/owners and passwords Normally each database has four associated users: 1. the [database] system/root user (with all privileges for the database instance, not just specific databases within the instance), 2. the read only (ro) user for a database (e.g. in MySQL grant select; execute on stored procedures); 3. the read/write (rw) user (e.g. in MySQL grant select, execute stored procedures, insert, update, delete); the db owner (grant all);. Users with intermediate privileges, e.g. select, insert, update, and delete only can be requested to run applications that need intermediate privileges on a database. Database user names are recorded and maintained by the DBA (see section 2 Extant Database Environment). Database owners are responsible for requesting additional users or privileges. Requests are made to cdldba@ucop.edu which creates a work ticket. The DBA and the IAS Manager know or have access to all database passwords. Passwords will be changed from initial vendor-supplied defaults and will meet CDL security standards. Infrastructure & Applications Support - 3 -
5 Filesystems Database filesystems are established and named to emphasize efficient server, storage, and database management, unless an application requires a particular convention. Filesystems are located on network-mounted storage (primarily Sun SAN storage managed as a ZFS filesystem) Default settings Oracle defaults are prescribed by the related vendor applications. MySQL defaults include: Storage engine: InnoDB Character set: Logging: Backup strategy(ies) By default the CDL backs up database content and configuration information in all environments to aid recovery from unanticipated system problems and database corruption. Where possible the backup approach is designed to recover a database to the state immediately prior to failure. Otherwise the approach attempts to recover a database to known points in time, i.e. in daily, weekly, or quarterly increments. Backup usually is performed in two steps: 1) a disk-based copy is created using cold (db locked or shutdown), hot (db online and usable), or snapshot (storage manager s point-in-time copy) backup strategy; 2) filesystem level backup to tape using Tivoli Storage Manager (TSM) of the disk image produced in step #1. Additional disk copies may be substituted for tape backup when database size makes tape backup impractical (e.g. when creating the tape backup consumes too many TSM resources or more time than available in the backup schedule). The appropriate backup strategy is dependent, among other factors, on the capability of the database engine, the service program s tolerance for database downtime, the size of the database, and the preferred length of time for a restoration when necessary. In combination these factors may suggest database replication to assist with backup goals (see below). The backup approach is designed by the DBA in consultation with the Database owner and tested in development and/or stage before production. For each database, the backup strategy is designed by the DBA in consultation with the service program. It is documented by the DBA (see section 2 Extant Database Environment). The DBA and Database owner consult on testing/practicing restoration, which is encouraged but not required. Database owners and the DBA are mutually responsible for alerting each other if a corruption is detected and a restoration is needed. Requests for restoration or adjustments to the backup strategy are made to cdldba@ucop.edu which creates a work ticket Failover (VCS) set up Infrastructure & Applications Support - 4 -
6 In partnership with UCOP s IR&C and Unix systems units, CDL attempts to place production systems into high availability (aka HA ) status, normally using Veritas Cluster Server (VCS) software. Beginning in April 2009, production databases on the clio/thalia MySQL database servers are under VCS HA control. MySQL Database VCS conventions include: Databases and related resources (e.g. network storage on which they reside) are designated as either critical or non-critical. VCS scripts attempt to bring critical and non-critical resources back online three times before initiating any failover (move to the backup node) action. If non-critical resources cannot be brought online they are left in their faulted state for manual intervention the next business day. If critical resources cannot be brought online after three times, VCS scripts attempt to move all resources on that node (e.g. on clio) to the backup node (e.g. thalia). (This is done because 1) the number of databases involved makes scripting/managing separate failover for each one costly; 2) in many or most cases the underlying cause of failure (e.g. hardware failure of the host server) would require that all resources be failed over anyway.) The DBA works with the Database owner to determine if a database or related resource is critical, i.e. belongs to the pool of HA resources. As part of production implementation, the DBA is responsible for ensuring that a critical database is under HA control, and that HA is working Replication Database replication (a master and synchronized slave ) is available for MySQL databases in stage and production environments. A database replicant is established when necessary to address, in priority order, db activity load balancing (e.g. where querying/reporting would otherwise interfere with additions or updates), and/or disaster recovery, and/or backups; and/or ease of maintenance. The DBA works with the Database owner to determine if replication is needed and viable. The DBA sets up replication Monitoring, tuning, query optimization IAS makes available and the DBA manages tools for monitoring and analyzing performance of databases. MySQL Enterprise Monitor and Oracle Enterprise Manager are currently used. The DBA monitors the databases for high impact errors and error conditions. Database owners are responsible for requesting DBA consultation on performance, including query optimization and, in most cases, implementing associated database changes (see section 1.1) DBMS version control, upgrades, and patching Versions Infrastructure & Applications Support - 5 -
7 The CDL attempts to standardize the DBMS version in use for all databases using the same database engine. Exceptions are made when the DBMS is specified by or bundled into a vendor product. Currently CDL uses MySQL version and Oracle 9.i or 10g. New DBMS engines or upgrades to the in-use standard, and destined for production deployment, are determined on a case-by-case basis balancing the following factors: Availability of informal and formal (i.e. purchased) support Functional improvements and their match to business requirements Administrative considerations including security, staff impact, ease of backups, etc. In consultation with IAS principals and database owners, the DBA recommends and implements new DBMS engines or upgrades to in-use DBMS engines. Implementation schedules are arranged in consultation with all affected parties. Database owners and CDL program developers are responsible for alerting the IAS/DBA to out-of-cycle upgrade and feature possibilities. IAS will make best efforts to provide infrastructure resources for programs/developers to conduct sand-box explorations and pre-development work Patching The DBA regularly examines DBMS vendor announcements about bug fixes, security fixes and other changes made through the release of software patches. Bug patches are applied when relevant to CDL applications as determined by the DBA, Database owner, or Vendor whose application interacts with the DBMS. Security patches are always applied when the associated risk is moderate to high 2 and relevant to CDL implementations, and otherwise within 1 year of release. In consultation with IAS principals and database owners, the DBA recommends and applies patches Maintenance procedures and windows Work Requests Specific work requests are initiated and tracked using CDL s ticketing system (Footprints), specifically the cdldb ticket queue and address (cdldb@ucop.edu). CDL Programs and database owners are strongly encouraged to discuss activities with large database components with the IAS Manager and DBA before any tickets are submitted. Requests for new databases would normally start with a request for a development instance and should minimally include: Brief description of the purpose/business need for the database 2 In general security risk is summarized by the DBMS vendor, often using the Common Vulnerability Scoring Standard (CVSS) Infrastructure & Applications Support - 6 -
8 Brief description of whether this database is expected to have dev, stage, and production instances, and the approximate timing to establish those instances. A proposed name (see above). An initial size required and growth estimate. A need by date. A proposed back up strategy/schedule (see above) Stop/start scripts Scripts that gracefully stop and start databases are made available for all databases. The location of the scripts is documented (see section 2, below). Normally the DBA is responsible for the creation and all uses of start/stop scripts (e.g. pre and post cold backup; for VCS offline and online). Other uses of the scripts are negotiated as necessary Maintenance windows To the extent possible, database maintenance windows follow CDL conventions: Dev/stage: 7am-7pm M-F with advance notice and calendaring Production: as defined in the CDL-IR&C Production Systems Support SLA ( Every effort twill be made to notify Database owners of urgent and emergency database maintenance, but that maintenance will proceed when key infrastructure is in jeopardy Capacity planning Database growth and additions are included in annual capacity planning initiated by the IAS Manager with contributions from each CDL program and service (via TechCouncil). Infrastructure changes and gating factors for growth are discussed through regular communication between IAS and the organization, especially TechCouncil and Director s Cabinet Security The CDL administers its databases in compliance with UC, UCOP, and CDL technology security policies and practices ( Relevant security practices e.g. account management, password protection, firewall and other access/perimeter control are developed with database impact in mind and by default apply to database management. Specific practices are mentioned in the relevant sections of this document. UC and UCOP guidelines make clear that IT security is a shared responsibility of all who use IT resources. Within that context, IAS consults with CDL s TechCouncil and Director s Cabinet to create and manage IT security practices for the CDL. The IAS manager works with the DBA and Database owners to assess and implement database-centric security practices. Infrastructure & Applications Support - 7 -
9 2. Extant database environment. [Note: the first official version of this spreadsheet will be complete by 3/27/09] See which records: Database name, size and growth estimates, filesystem, user names, script locations, and backup details by physical host and virtual host. Other associated databse administration documents, e.g. upgrade project plans, are available at The DBA is responsible for documenting and maintaining information about the extant database environment. Database owners should inform the DBA if they notice inaccuracies in the documentation. Infrastructure & Applications Support - 8 -
Oracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
More informationExternal Data Connector (EMC Networker)
Page 1 of 26 External Data Connector (EMC Networker) TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS INSTALLATION (WINDOWS) INSTALLATION (UNIX) GETTING STARTED Perform a Discovery Perform a Migration ADVANCED
More informationIntroduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationMySQL Enterprise Backup
MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationCisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
More informationDeployment Topologies
, page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,
More informationState of Wisconsin Database Hosting Services Roles and Responsibilities
State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services
More informationDatabase as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
More informationNetezza PureData System Administration Course
Course Length: 2 days CEUs 1.2 AUDIENCE After completion of this course, you should be able to: Administer the IBM PDA/Netezza Install Netezza Client Software Use the Netezza System Interfaces Understand
More informationCompliance Procedure
Old Dominion University Compliance Procedure Title: Reference Number: System Backups and Restoration (Non- Db) Procedure 3.4.2.2 Purpose The purpose of this compliance procedure is to define the methods
More informationTushar Joshi Turtle Networks Ltd
MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering
More informationContents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
More informationBlackboard Managed Hosting SM Disaster Recovery Planning Document
BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...
More informationCalifornia Digital Library Computing and Storage Resource Center. Infrastructure Description
California Digital Library Computing and Storage Resource Center Infrastructure Description Version 2.0 September 26, 2008 Table of Contents 1 Overview... 1 1.1 Introduction... 1 1.2 Purpose of this Document...
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationMicrosoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions
Microsoft Hyper-V Powered by Rackspace & Microsoft Cloud Platform Powered by Rackspace Support Services Terms & Conditions Your use of the Microsoft Hyper-V Powered by Rackspace or Microsoft Cloud Platform
More informationSymantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server
Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions
More informationCalifornia Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17.
Table of Contents 1.0 GENERAL... 3 1.1 SUMMARY... 3 1.2 REFERENCES... 3 1.3 SUBMITTALS... 3 1.3.1 General... 3 1.3.2 Service Request Criteria... 4 1.4 EXPECTATIONS... 4 1.4.1 OTech... 4 1.4.2 Customer...
More informationThe Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant
The Future of PostgreSQL High Availability Robert Hodges - Continuent, Inc. Simon Riggs - 2ndQuadrant Agenda / Introductions / Framing the High Availability (HA) Problem / Hot Standby + Log Streaming /
More informationHow To Fix A Powerline From Disaster To Powerline
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir 1 Why This Topic? Case study on large Perforce installation Something for smaller sites to ponder as they grow Stress
More informationReal World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com
Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)
More informationA SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
More information1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
More informationIBM Sterling Control Center
IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise
More informationDivision of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
More informationVERITAS and HP A LONG-TERM COMMITMENT
VERITAS and HP A LONG-TERM COMMITMENT Hewlett-Packard holds the respect and trust of enterprises worldwide that depend on HP servers, storage, printers, and other equipment to run their businesses. HP
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationCalifornia Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
More informationSubmitted to: Service Definition Document for Database Management for IT Infrastructure Management
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationSurround SCM Backup and Disaster Recovery Solutions
and Disaster Recovery Solutions by Keith Vanden Eynden Investing in a source code management application, like, protects your code from accidental overwrites, deleted versions, and other common errors.
More informationManaged Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
More informationSQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery
SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationData Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
More informationSQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER
WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationAttachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
More informationOracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
More informationExam Name: Fundamentals of Applying Tivoli Storage
Vendor: IBM Exam Code: 000-564 Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3 Version: DEMO 1.Which difference is reflected in a gap analysis? A. between software versions B. between expected
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationTechniques for implementing & running robust and reliable DB-centric Grid Applications
Techniques for implementing & running robust and reliable DB-centric Grid Applications International Symposium on Grid Computing 2008 11 April 2008 Miguel Anjo, CERN - Physics Databases Outline Robust
More informationCreating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
More informationModule 14: Scalability and High Availability
Module 14: Scalability and High Availability Overview Key high availability features available in Oracle and SQL Server Key scalability features available in Oracle and SQL Server High Availability High
More informationAbout Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
More informationVirtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationTABLE OF CONTENTS. Administration Guide - SAP for MAXDB idataagent. Page 1 of 89 OVERVIEW SYSTEM REQUIREMENTS - SAP FOR MAXDB IDATAAGENT
Page 1 of 89 Administration Guide - SAP for MAXDB idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Full Range of Backup and Recovery Options SnapProtect Backup Command Line Support Backup
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Windows Release 6.5 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Copyright 2002-2007 Symantec Corporation.
More informationAttachment 4-E Service Tier Matrix
Attachment to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-003 Between The State of Texas, acting by and through the Texas Department of Information
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More informationImplementing High-Availability (HA) Solutions for Siebel ebusiness Applications
Implementing High-Availability (HA) Solutions for Siebel ebusiness Applications Agenda Overview of High Availability for Siebel Web Servers Application Object Manager Servers Gateway NS & Non-Object Manager
More informationDeploy App Orchestration 2.6 for High Availability and Disaster Recovery
Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Qiang Xu, Cloud Services Nanjing Team Last Updated: Mar 24, 2015 Contents Introduction... 2 Process Overview... 3 Before you begin...
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationInformatica MDM High Availability Solution
Informatica MDM High Availability Solution 1 Executive Summary Informatica MDM Hub supports a number of different approaches to providing a highly available solution. Our use of the term highly available
More informationAdministering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationEMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
More informationEnd-to-End Availability for Microsoft SQL Server
WHITE PAPER VERITAS Storage Foundation HA for Windows End-to-End Availability for Microsoft SQL Server January 2005 1 Table of Contents Executive Summary... 1 Overview... 1 The VERITAS Solution for SQL
More informationHow To Backup At Qmul
TSM Backup and Restore Strategy and Overview (Draft) Prepared by: Trevor Leigh Version: 1.1 Page 1 of 13 Document Owner: Name/Position Steve Wicks, Servers & Storage Manager Revision History Version Description
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationWould-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
More informationD12CBR Oracle Database 12c: Backup and Recovery Workshop NEW
D12CBR Oracle Database 12c: Backup and Recovery Workshop NEW What you will learn This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Enterprise Option for SAP R/3 for Oracle Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are
More informationMigration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with
More informationDatabase Mirroring: High Availability (HA) and Disaster Recovery (DR) Technology
Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle
More informationHigh Availability Implementation for JD Edwards EnterpriseOne
High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation
More informationRecover a CounterPoint Database
Recover a CounterPoint Database Webinar: Radiant Webinar Mini-Series for Implementation Technicians To connect to phone conference, please call: 1.800.375.2612, and then enter Participant Code: 397670
More informationArchitectures Haute-Dispo Joffrey MICHAÏE Consultant MySQL
Architectures Haute-Dispo Joffrey MICHAÏE Consultant MySQL 04.20111 High Availability with MySQL Higher Availability Shared nothing distributed cluster with MySQL Cluster Storage snapshots for disaster
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationHigh Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
More informationVeritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault
Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationData Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.
Open-E Data Storage Server (DSS ) Data Replication INSTALATION GUIDE Integrated Data Replication reduces business downtime. Open-E DSS Data Replication Open-E Data Server Storage (DSS) offers enterprise-class
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationAdministering a Microsoft SQL Server 2000 Database
Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge
More informationService Level Agreement. Server Hosting
Service Level Agreement Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard MIT Data Center (HMDC) 15 October 2009 1. Overview This service level agreement defines the baseline
More informationSEP Disaster Recovery and Backup Restore: Best
SEP Disaster Recovery and Backup Restore: Best Practices Who We Are Established, HW Development Development of Logistics SW Logistic Software Relag Develop Backup and Data Protection Software -- VMS (92)
More informationData Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationAdministration Guide - Documentum idataagent (DB2)
Page 1 of 65 Administration Guide - Documentum idataagent (DB2) TABLE OF CONTENTS OVERVIEW Introduction Key Features Supported Environments Full Range of Backup and Recovery Options Scheduling Efficient
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationPostgres Plus xdb Replication Server with Multi-Master User s Guide
Postgres Plus xdb Replication Server with Multi-Master User s Guide Postgres Plus xdb Replication Server with Multi-Master build 57 August 22, 2012 , Version 5.0 by EnterpriseDB Corporation Copyright 2012
More informationMapGuide Open Source Repository Management Back up, restore, and recover your resource repository.
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline
More informationDisaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software
Technical Paper Disaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software The Sun Cobalt RaQ 3 server appliance supports the use of third-party backup solutions for performing
More informationHigh Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
More informationAppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationFileCruiser Backup & Restoring Guide
FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the
More informationSQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1
SQL Server 2008 Designing, Optimizing, and Maintaining a Database Course The SQL Server 2008 Designing, Optimizing, and Maintaining a Database course will help you prepare for 70-450 exam from Microsoft.
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationUnderstanding Disk Storage in Tivoli Storage Manager
Understanding Disk Storage in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer Unless otherwise noted, functions and behavior
More informationADSMConnect Agent for Oracle Backup on Sun Solaris Installation and User's Guide
ADSTAR Distributed Storage Manager ADSMConnect Agent for Oracle Backup on Sun Solaris Installation and User's Guide IBM Version 2 SH26-4063-00 IBM ADSTAR Distributed Storage Manager ADSMConnect Agent
More information