Auditing Non TMF Applications



Similar documents
New HP Solution for Replicating NonStop SQL DDL: SDR

White Paper: Using AutoTMF, TMF and RDF to Enable Disaster Recovery for BASE24 systems

Availability Digest. TANDsoft FileSync Adds Deduplication February 2014

HP Certified Professional

Shadowbase Data Replication VNUG - May 26, Dick Davis, Sales Manager Shadowbase Products Group Gravic, Inc.

Eloquence Training What s new in Eloquence B.08.00

features at a glance

Incremental Migration from Enscribe to SQL: The Database Gateway Solution

DiskPulse DISK CHANGE MONITOR

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level Copyrights, Trademarks, and Notices

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

SysPatrol - Server Security Monitor

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1

Enterprise-Class Virtualization with Open Source Technologies

Shadowbase Data Replication Solutions. William Holenstein Senior Manager of Product Delivery Shadowbase Products Group

High Availability Solutions for the MariaDB and MySQL Database

Database Administration

Gladinet Cloud Backup V3.0 User Guide

9/26/2011. What is Virtualization? What are the different types of virtualization.

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

Cloud Based Application Architectures using Smart Computing

Distributed Database Management Systems

Administration Guide - Documentum idataagent (DB2)

SyncBreeze FILE SYNCHRONIZATION. User Manual. Version 7.7. Aug Flexense Ltd.

Introduction. Part I: Finding Bottlenecks when Something s Wrong. Chapter 1: Performance Tuning 3

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999

Real Application Testing. Fred Louis Oracle Enterprise Architect

Features of AnyShare

How To Test For A Test On A Test Server

General DBA Best Practices

Stratusphere Solutions

Administering Microsoft SQL Server 2012 Databases

Availability Digest. Raima s High-Availability Embedded Database December 2011

Database FAQs - SQL Server

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

SEER Enterprise Shared Database Administrator s Guide

Cover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November Service & Support. Answers for industry.

Networking Best Practices Guide. Version 6.5

Outline. Failure Types

MySQL Cluster Deployment Best Practices

Securing Your Microsoft SQL Server Databases in an Enterprise Environment

Client/Server Computing Distributed Processing, Client/Server, and Clusters

In Memory Accelerator for MongoDB

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim

Stretching A Wolfpack Cluster Of Servers For Disaster Tolerance. Dick Wilkins Program Manager Hewlett-Packard Co. Redmond, WA dick_wilkins@hp.

Distributed File Systems

Chapter 3 Operating-System Structures

White Paper. Real-time Capabilities for Linux SGI REACT Real-Time for Linux

Mind Q Systems Private Limited

Chapter 14: Recovery System

Fault Tolerance & Reliability CDA Chapter 3 RAID & Sample Commercial FT Systems

Introduction to. NonStop SQL/MP D30

SQL Server 2012 Database Administration With AlwaysOn & Clustering Techniques

INDIA September 2011 virtual techdays

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

$99.95 per user. SQL Server 2008/R2 Database Administration CourseId: 157 Skill level: Run Time: 47+ hours (272 videos)

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

VERITAS Business Solutions. for DB2

Oracle 11g Database Administration

Contents. Chapter 1. Introduction

Backup with synchronization/ replication

3M Command Center. Installation and Upgrade Guide

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

Guideline for stresstest Page 1 of 6. Stress test

How to Implement Multi-way Active/Active Replication SIMPLY

vsphere 6.0 Advantages Over Hyper-V

<Insert Picture Here> Oracle In-Memory Database Cache Overview

Release Notes LS Retail Data Director August 2011

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Diagram 1: Islands of storage across a digital broadcast workflow

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Centralized Disaster Recovery using RDS

Advantages of Amanda over Proprietary Backup

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP

Novell Storage ServicesTM File System Administration Guide for Linux

Running a Workflow on a PowerCenter Grid

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

unisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April

SAP Sybase Replication Server What s New in SP100. Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing

Application Brief: Using Titan for MS SQL

SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1

PTC System Monitor Solution Training

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation

sndio OpenBSD audio & MIDI framework for music and desktop applications

Transcription:

Auditing Non TMF Applications Escort AutoTMF Product Overview www.carrscott.com

Carr Scott Software Inc. Founded in 1995 as Tandem spin-off company Founders: Dr. Richard Carr and Harry Scott R&D and support co-located in Compaq Cupertino campus Separate corporation - no financial ties to Compaq Continued very close working relationship with Compaq Growing customer base (approx. 50 NSK installations) Carr Scott Software is 100% Himalaya focused Both end-users and 3rd parties benefit from Escort technology 2 Four main products Escort SQL Escort AutoTMF Escort AutoSYNC Ranger

Escort Technology Benefits Upgrade existing applications without rewriting No source code required Low risk, fast implementation using User Library intercept technology Advanced use of existing technology Use only Himalaya standard interfaces and products No privileged code, no SUPER access required Not OS version dependent (any OS that is D30 or higher) Any RISC platform (K or S-series S Himalaya) Proven approach Over 50 application environments 3

The Problem Non or Partially Audited Applications 4 NonStop TM/MP (a.k.a. TMF) has great advantages Online backups for 24 X 7 availability Data recovery Improved application performance Efficient and reliable replication with RDF, Shadowbase,, etc. Nearly half of the existing applications on Himalaya systems are not coded to use TMF Even most TMF-aware applications do not protect all files Incomplete replication and disaster protection Re-programming to use TMF is daunting and risky Development $$ better used for new features

TMF / RDF Himalaya to Himalaya replication Primary node APP DB Duplicate node DB AutoTMF DP2 Extractor Compaq NonStop TM/MP M.A.T. Expand Updaters Receiver Image trails I/Os done block at a time, direct to DP2 (not record by record thru file system) Low overhead, implemented near the metal (TMF, RDF & DP2 all low level) High-performance, real-time update to backup (2.5MB per second updaters) Compaq +25 years of data integrity experience 5

Loosely coupled replication (replication not bound to application) Extremely low latency (no extract file or intermediate data store) Flexible, application level replication (heterogeneous source/target support) Bi-directional replication (NSK/NSK, NSK/Oracle, Oracle/Oracle) 6 TMF / Shadowbase3 Loosely coupled, low latency, flexible data replication. NSK Source APP AutoTMF Consumer Collector DB TM/MP M.A.T. TCP/IP Auxiliary ADT Expand or TCP/IP Open Server Open Target NSK Target DB Collector DB

The Solution AutoTMF 7 AutoTMF enables applications for TMF quickly A few minutes to install A few minutes to prepare object files No programming or re-compiling or binding A few minutes to audit desired files Low overhead and minimal operations requirements Gain TMF benefits immediately Replication, online dumping and performance Data consistency same or better than pre-autotmf application Transaction boundaries are not business transactions but locking behaviour tends to align that way Business transactions can be implemented incrementally

AutoTMF Technical attributes 8 Not privileged, requires no sysgen Looks like an application program to TMF Uses standard APIs Distributed & supported by Compaq NonStop AutoTMF (SA45V1) Supports NonStop Kernel releases D38 to Gxx Requires no changes to programs Requires no changes to Pathway configurations or batch scripts Simple set of configuration parameters to adapt to particular environments or special requirements Fault tolerant, scaleable and high performance

Migration Process 9 Programs One command (Prepare) Operates on object file only No changes to source or logic No recompile, SQL compile, bind or axcelerate Database Turn on audit Incrementally migrate files Non-TMF Program Disk Process Non-Audited Files PREPARE ALTER..., AUDIT Prepared Non-TMF Program AutoTMF Disk Process Audited Files Non-Audited Files

AutoTMF Runtime User library intercepts file system and TMF calls Keeps a state of program Automatic transactions are triggered by operations that require a transaction Operations are then passed through to the file system Designed for performance With Transaction Non TMF Program TMF Operation WRITE AUTOTMF Non-TMF Operation Disk Process Passthrough 10 Many updates per transaction Files are buffered Efficient block splits Audited Files Non-Audited Files

Automatic Transactions AutoTMF tracks all audited file accesses Intercepts OPEN, READLOCK, WRITEUPDATEUNLOCK, etc. Intercepts BEGIN/ END/ ABORTTRANSACTION Maintains logical (i.e, unaudited) ) lock state AutoTMF assumes correct unaudited unaudited program logic Consistent locking and unlocking behavior No sharing of locks with servers Issues BEGINTRANSACTION when required Locks and updates when application has no Transaction 11 Issues ENDTRANSACTION when appropriate Preserve updates and lock protocols Maximize performance

Automatic Transactions Rules All AutoTMF transactions must be committed AutoTMF never ABORTs automatic transactions Emulates file operations on a unaudited database A program cannot stop without committing automatic transactions Automatic transactions preserve locking protocol Cannot commit an automatic transaction if unaudited file access still has a record / file locked Automatic transactions are local to one process Cannot be exported or inherited 12

Automatic Transactions Start First transactional access determines use of automatic transactions for the open: The first access occurs when the application has not started or inherited its own transaction (default) Or when automatic transactions are configured for the file Well-known operations on an audited file which start an automatic transaction READLOCK WRITE LOCKFILE 13

Automatic Transactions Commit 14 Application must have released locks Logical points in the processing READUPDATE $RECEIVE REPLY File close and process stop Isolation driven (configurable) Server SEND Other external communication (spooler e.g.) Activity-driven (configurable) Elapsed time Number of updates Balance performance and consistency

Automatic Transactions Abort AutoTMF never aborts an automatic transaction Emulates non-audited behavior Prevents process termination with outstanding automatic transactions Does not export automatic transactions External events could cause a unilateral abort Cannot be prevented but rare (CPU failure, TMF autoaborts,, etc.) Rollback limited to the recent updates Effects can be controlled with configuring isolation levels 15

Automatic Transaction Configuration 16 Typical non-tmf application requires no special configuration Audit the files AutoTMF generates the transactions when needed Parallel transactions (separate or common) For TMF applications with some non-audited files Parallel transactions configured for newly audited files Program still manages transactions for the previously audited files NOWAIT transactions Automatic transaction commit happens nowait nowait Isolation Controls outside awareness of uncommitted automatic transactions Processes, non audited files and devices

Creating and Renaming Audited Files Files created programmatically can be audited automatically AUTOTMF emulates RENAME operations on audited files If the file is not opened by another process Normally not possible with audited files Rename is currently not replicated 17

TMF / AutoTMF Performance AutoTMF is optimized No additional processes; no extra I/O One configuration message on process start and audited file opens Configuration cached in memory Automatic transaction generation requires very little processing Passthrough is virtually free (a few microseconds) AutoTMF performance is TMF performance TMF activity is optimized Several inserts/updates per transaction Parallelism when multiple transactions are configured 18 Nowait transactions User configurable

Escort Tools Tracing and debugging Configured via a simple command without altering process startup No changes to Pathway server configuration needed Shows every procedure call Show process startup and termination state (defines, assigns, startup message) Shows all AutoTMF operations Optionally shows input and output data Lock management tools One command to display all record and file locks (reworked LISTLOCK command) Deadlock detection Long transaction detection 19

AutoTMF Futures Implementation dates subject to customer commitments AutoTMF support for unaudited SQL tables Super-fast takeover support (Wait_for_RDF) AutoTMF support for native mode applications RDF/TMF Lock-step transaction support (eliminate reprogramming) RDF file RENAME and PURGE support 20

Replication of non-database files Escort AutoSYNC Product Overview www.carrscott.com

Non-Database File Replication Database replication does not provide complete disaster recovery How do you manage the Application Environment? TACL macros and Edit files Configuration files (Pathway, Batch, Spooler, etc...) Object / Source files Report files, BLOBs,, etc... Non-audited Enscribe files / SQL tables Auditing of such files is either impractical or impossible 22

EscortvAutoSYNC Overview Synchronizes filesets between Himalaya systems Replication of entire files, not individual records Complements RDF and other replication products Easy to install; easy to configure and manage Completely automatic; set it and forget it Fault tolerant; highly reliable Uses standard security facilities Primary uses: Complete Disaster Recovery preparation Automated Operations support (SW distribution) 23

AutoSYNC for non-database file replication Transactions \PRIMARY \REMOTE RDF Online Users Database Transaction Replication for Disaster Recovery Duplicate Database New Programs Config Updates Escort AutoSYNC Operators, Developers, Production Control Application Environment File Replication for Disaster Recovery Duplicate Application Environment 24

AutoSYNC for Software Distribution \PARIS New Programs Config Updates \HQ Escort AutoSYNC Escort AutoSYNC Duplicate Application Environment \ROME Operators, Developers, Production Control Application Environment Escort AutoSYNC Duplicate Application Environment \TOKYO Duplicate Application Environment 25

AutoSYNC Technical attributes Not privileged, requires no sysgen Looks like an application program Uses standard APIs and Compaq facilities Supports NonStop Kernel releases D38 to Gxx Requires no changes to programs or environment Scaleable and high performance Simple, yet flexible configuration 26

Building blocks An Administrator adds SyncUsers SyncUsers can schedule fileset synchronizations Each SyncUser (user id) can be assigned priority and cpus for the synchronizing processes Administrator can SUSPEND and ACTIVATE a SyncUser 27 A SyncUser specifies Sync Filesets Source file pattern (ex. $DATA.SRV*.ACCT*) Destination file pattern (\REMOTE.$BACK.*.*)( Security and ownership options Scheduling options Compression and performance options Destination file purge option

AutoSYNC Processing Architecture AutoSYNC 1. Send sync command Sync DATA.SRV*.*, \REMOTE.$BACK.*.* 3. Transmit file signatures ESCSYNC ESCSYNC 2. Fetch local file signatures 5. Transmit sync file list 4. Fetch remote file signatures $DATA.SRV.* 6. Synchronize files \REMOTE.$BACK 28

Selecting Files for Synchronization AutoSYNC synchronizes files in the Fileset that: Do not exist on the remote system Are older on the remote system User may update files on the remote system to change system/volume names, etc. Difference in system clocks is factored in Exact synchronization can be specified Are not open for exclusive or update access Are not TMF audited Are not ZZ files (unless specified) 29

Synchronization Modes Online Synchronization Immediate, command-driven driven synchronization Employs current user s local and remote access rights Same security requirements as a FUP DUP Scheduled Synchronization Multiple users can configure synchronization Automatic; no user intervention Reliable, fault-tolerant tolerant Requires security authorization 30

Online Sync Architecture USER.JOE Escort CI ESCSYNC SYNC $DATA.JOE.* TO \REMOTE.$DATA.*.*; User issues command for each sync operation Uses standard security for file access Could be performed by BATCH scheduler Does not require configuration or user setup USER.JOE Local Access USER.JOE Remote Access $DATA.JOE.* \REMOTE.$DATA 31

Scheduled Sync Architecture $ZESC (monitor) $ZESC SYNCUSER AutoSYNC Monitor Fault-tolerant Process pair USER.JOE Joe s SyncFiles USER.SAM Sam s SyncFiles ESCSYNCP Joe s Local Access $DATA.JOE.* Joe s Remote Access \REMOTE.$DATA Executes as USER.JOE ESCSYNCP Sam s Local Access $DATA.SAM.* Sam s Remote Access \REMOTE.$DATA 32 Executes as USER.SAM

Fileset Scheduling Options Default is every 5 minutes User can specify interval from 1 minute to n days. Daily START and STOP times Can specify sync every day starting at 6PM until midnight SUSPEND and ACTIVATE Can temporarily suspend synchronization without deleting fileset configuration 33

Compression Uses LZW algorithm Eliminates 60% to 80% of network traffic CPU-intensive Compression may not increase throughput if lines are fast AutoSYNC uses compression if it improves throughput (dynamic calculation) Compression can be enabled/disabled to fit customer 34

Performance Options Automatic synchronization parallelism for different users and/or different remote systems Configured parallelism by specifying batchid Priority and Throttling Synchronization should not affect ongoing production work User can specify process priority User can specify maximum percentage of busy time 35

Destination File Purge Option Files that do not exist in the source fileset can be purged in the t destination fileset Used to maintain subvolumes in parallel Does not purge files in a destination subvolume if the source subvolume does not exist 36

Security and Ownership Options 37 Automatic upgrade to network security Local security could prevent access after remote sync Local security changed to network security ( A becomes N ) Can be disabled with NO NETWORKSECURE option SyncUser can specify owner of replicated files SyncUser can specify security of replicated files Purge security could prevent repeated syncs Changed to allow sync user to purge file Example: N security if SyncUser and file owner are in different groups Might allow anyone to purge a replicated file Does not allow any new access to file contents

Synchronization Security Scheduled Synchronization Security Individual users configure synchronization but AutoSYNC monitor process manages ESCSYNC processes Ensures that SYNCs are performed under SyncUser's user id Requires authorization Prevents users from accessing files without authorization Online Synchronization Security All operations use current user s file access rights 38

AutoSYNC Futures Implementation dates subject to customer commitments Triggers Execute a user-specified specified program or macro when file is synchronized Examples of functions that Triggers could perform: Execute EDIT scripts to adjust system / volume names SQLCOMP programs Run batch jobs or other user-defined processes etc... OSS support (investigation) 39

Want More Information? Product Information http://www.carrscott CarrScott.com/products_.com/products_autotmf.html http://www.carrscott CarrScott.com/products_.com/products_autosync.html info@carrscott carrscott.com Contact Information Harry Scott, Co-founder +1.781.934.0989 harry.scott scott@carrscott.com 40