From the beginning of this article, we will introduce a series of solutions for disaster tolerance. First explore the application scenarios, and then delve into the technical architecture.
Scenario One:
In a virtualized environment for a small company, run 100 virtual machines on 5 ESXi servers. Use NFS storage. There are 10 virtual machines that need to be recovered offsite. For offsite disaster recovery RPO requirements are 30 minutes and RTO is 1
Restore)
Span lang= "Zh-chs" to revert to the past 7 a point in the day
restore past 14 a point in the day
revert past 35
Geo-restore (geo-restore)
rto hours rpo hour
rto hours rpo hours
rto hours rpo Hours
Standard offsite data replication redu
everyone, which makes data security an unprecedented level. In this way, if there is still a backup interval window for data backup, it will lead to data loss within the backup interval. The larger the interval, the more data is lost! This is not allowed in the Information Consumption Age.
This requires shortening the backup window and reducing the backup interval to reduce data loss. The ideal state is Zero loss, which means that the backup interval is 0, that is, there is no backup window.
To
Tags: com logging disk NES instead of 3.1 target other createdThe accidental DBA has recently been re-viewed, and the SQL Server Backup section has been slightly collated for later review.I. Understanding RTO and RPO1.1. RTO (Recovery time Objective), downtime, how much downtime is acceptable --downtime per year (24*365,5-nines means 99.999% up-time)
Select -* -*365*(1-0.99999)--5.25600 minutes
Select -* -*365*(1-0.9999)--52.5600 minutes
Select -*365*(1-0.999)--8.760 hours 1.2.
Backup is the last line of defense for data security. For any data loss scenario, although backup may not be able to restore of the data (depending on the backup cycle), it can at least minimize the loss. There are two important indicators for measuring Backup Recovery: recovery point objective (RPO) and recovery time objective (RTO). The former focuses on the extent to which recovery can be achieved, while the latter focuses on recovery.
Backup is th
regions and availability zones
Capacity design planning, equipment procurement, etc. face challenges
Elasticity: No need for detailed planning
2.2 What can cause a system outage?Including:-Artificial (more than 60% reasons)-Crash stop-Equipment failure-Natural disasters-Safety incidents- ...Typical man-made accidents: (although there is a A-b backup mechanism) someone with root permission to delete the file permissions in a (result rm-rf/). Although the B machine
between two points called RTO, after a disaster, from an IT system outage leading to a business standstill, until the IT system recovers to business recovery operations. 2.2.2 RPORecovery-point objectives (Recovery points objective, referred to as RPO) are for system and application data, referring to the amount of data loss that can be tolerated by the recovery business system. 3 Disaster Preparedness MethodologyDisaster tolerance system constructio
more than 5 minutes, 99.99% Availability means that the annual downtime is no more than 52.5 minutes, and 99.9% of the availability means that there is no more than 8.75 hours of downtime per year. It is worth noting that the method of calculating RTO is to consider whether the system is 24*365 or just 6 o'clock in the morning to 9 o'clock in the afternoon. You also need to be aware that the time to maintain Windows is within downtime and that it is easier to achieve higher availability if you
range of data management solutions to the industry, Gartner recently announced the "2008 Enterprise Backup Recovery Software marketscope market Research Report", CommVault received a "particularly positive" rating, once again establishing CommVault's leadership in the enterprise backup and recovery software market.
CommVault Recovery management is not only a call to the inherent functions of the storage device, but a unified service platform CTE to establish and invoke the functions of CommVau
.
Plan site recovery
More and more business personnel recognize that daily access to reliable and available email systems is the foundation for their success. For many organizations, the mail system is part of the business continuity plan and site recovery should be considered when designing the mail service deployment. Basically, many site recovery solutions involve deploying hardware in the second data center.
In the end, the overall design of the DAG includes the number of members of the DA
Major server hardware vendors (such as IBM and HP) provide good data protection policies (hardware or software ). redundant Array of Independent Disks is a good data protection method. for SQL Server, a detailed data backup plan can be developed through the maintenance plan.
Data backup policy (full backup, differential backup and transaction log backup)
Data backup is a data recovery service. Before establishing a data backup plan, you should first consider whether the backup can be used to
11.6 Designing High Availability SolutionsConsiderations for 11.6.1 PlanningThe following two factors need to be considered when planning for high availability:RTO (Recovery time Objective, i.e. target recovery times)RTO indicates how much downtime the business system tolerates each time. If the business stops too long, the loss will naturally increase. For particularly important business systems, it may be necessary to use multiple technologies at the same time to ensure rapid business recovery
event of a disaster, data can be quickly copied from a remote system to a local system to ensure business data integrity and consistency. Application Disaster Tolerance is higher than Data Disaster Tolerance, that is, a complete backup application system (which can be used to back up each other with the local application system) is established in a remote location, can also work with local application systems ).After a disaster occurs, the remote application system quickly takes over or underta
complexity of traditional disaster recovery systems, they are expensive, 80% of users' investment only protects 20% of servers, and does not guarantee service operation. Disaster recovery aims to restore the system immediately after a disaster occurs and put it into use as soon as possible. Therefore, disaster recovery uses various technologies, including data backup, data replication, and other technologies, will focus on the continuity of the business. The main indicators for measuring the
Major server hardware vendors (such as IBM and HP) provide good data protection policies (hardware or software ). redundant Array of Independent Disks is a good data protection method. for SQL Server, a detailed data backup plan can be developed through the maintenance plan.
Data backup policy (full backup, differential backup and transaction log backup)
Data backup is a data recovery service. Before establishing a data backup plan, you should first consider whether the backup can be used to
requires a very high level, using the highest security level of Database hardware and software settings and redundant equipment, the goal is not to lose any one transaction, this is because even one transaction may cause a lot of money loss and a decline in the company's reputation.
The "911" incident caused 1200 companies to be affected. More than half of the enterprises were declared to collapse because IT data was damaged and lost, leading to business failures. Financial giant Morgan Stanley
offices )?
What self-requirements do we have in terms of normal running time and reliability?
What are our requirements for RTO/RPO, that is, the recovery time and recovery target point?
After the configuration is completed, the configuration will be rich. What you need to do is to find answers to key questions that will guide us, even third parties, to design a new infrastructure that can bear the necessary load and meet the requirements of th
The data processing becomes more and more important in the modern enterprise operation, more and more crucial, may even become the enterprise development bottleneck. The importance of data protection is self-evident. If an enterprise does not have a good data protection program or strategy, once the important data loss, the consequences will be disastrous, along with the loss of economic benefits.
The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware o
disasters. Technically, there are two main indicators for measuring disaster tolerance systems: RPO (Recovery point object) and RTO (Recovery time object), where RPO represents the amount of data that is allowed to be lost when a disaster occurs, and RTO represents the timing of system recovery. 3. Disaster tolerance is not only a technology disaster tolerance is a project, not just technology. At presen
The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware or software). A well known RAID disk array (redundant array of independent disks) is a good way to protect data. In the case of SQL Server , a detailed data backup plan can be developed through a maintenance plan.
Data backup strategy (full backup, differential backup and transaction log backup)
Data backups are services for data recovery, so before you set up a data backup plan, consider whether
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.