minimum switching time is about 15 seconds, or even shorter.
Introduction of the disaster-tolerant solution in the same city
The DS8000 Metro Mirror (MM) technology is a storage-level disaster-tolerant solution that meets the Recovery point Object (RPO) of 0. In this scheme, the data is replicated to the disaster-tolerant site synchronously by storing the underlying I/O to achieve the corresponding disaster-tolerant purpose. The DS8000 storage inte
transmitted only when the user is manually synchronizing.
8. On the target side, refresh the first checkpoint of the target segment ckpt to establish a common foundation with the source checkpoint.
9. After the common Foundation is established, refresh the second checkpoint at the source and ckpt the difference (increment) between the source-side checkpoint and the most recent point-in-time copy. Only increments between the current tag's internal checkpoint and the previously replicated inter
The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware or software). A well known RAID disk array (redundant array of independent disks) is a good way to protect data. In the case of SQL Server , a detailed data backup plan can be developed through a maintenance plan.
Data backup strategy (full backup, differential backup and transaction log backup)
Data backups are services for data recovery, so before you set up a data backup plan, consider whether
Customer profile
A Life Insurance Co., Ltd. is a joint venture of foreign insurance Company and state-owned large-scale investment operation Enterprise, its business develops rapidly, 05-06 years respectively in Beijing, Shenyang, Shandong set up a branch. Its plans for the next 3-5 years in the northern part of China to open branches in several cities, gradually expanded into medium-sized insurance companies. With the rapid development of its business and the increasing number of branches, the
whether they will be used in the future. If you want to leave a backend for possible needs, consider using free tools such as VeeamZIP launched by Veeam. VeeamZIP can create a set of archive copies for the virtual machine system, but it also ensures that the copy cannot be enabled freely in the virtual environment and main storage reservoir. All in all, retaining a system that remains idle for a long time will not only cause waste of resources, but a
and replication capabilitiesTo a single software solution, its support for VMware VSphere and Microsoft Hyper-V virtual environments is highly respected.Veeam.one.v9.0-iso 1DVD Monitoring, reporting, and capacity planning toolsVeeam? One? is a powerful monitoring, reporting, and Capacity planning tool for Veeam backup infrastructure and VMwareVSphere and Microsoft Hyper-V virtual environments. This tool gives you full visibility into your IT environm
Ghost Cry Home Data Center VSAN (storage) +NSX (network) +horizon (application) +vrealize (monitoring) +veeam (Backup) +ossim (listening) +PRTG (OPS)Suppose you have a living room with a bedroom, living room and bedroom with a small lattice, living room lattice inside you can put the Cisco Asa5506x+cisco 2960X, three Desert Eagle II (MINI-ITX, built-in c236 chipset, I5,DDR4,SSD+HHD, dual network card) ,And the bedroom also has a small lattice, inside
need to reduce the file system size, here to 120M650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/58/9C/wKioL1S15nPDNJ6WAAI_OtSIp0k668.jpg "style=" float: none; "title=" 32.PNG "alt=" Wkiol1s15npdnj6waai_otsip0k668.jpg "/>Then reduce the size of the LVM and reduce the 70M650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/58/9D/wKioL1S18QCz1GRoAAM8v-vyhHk876.jpg "style=" float: none; "title=" 33.PNG "alt=" Wkiol1s18qcz1groaam8v-vyhhk876.jpg "/>In addition to being able to incre
Because Veeam backs up a few tib things, and Veeam's best platform is 2012, try 2012 storage poolsI have a couple of options.Plan one, a physical machine 3650, 2 disk RAID1 do system disk, 5 disk RAID0 Do data disk, and then storage pool configuration can see 5 disk, 4 block automatic, 1 block hot standby ...Scenario two, a physical machine 3650, 2 disk RAID1 do system disk, 5 disk RAID5 Do data disk, and then storage pool configuration can see 1 disk
Veeam Backup error:6/12/2016 3:29:01 PM:: Processing vm-01 error:vddk error:1 (Unknown Error). value:0x0000000000000001Failed to read from a virtual diskFailed to upload disk.Agent failed to process method {Datatransfer.syncdisk}.Exception from SERVER:VDDK error:1 (Unknown error). value:0x0000000000000001Failed to read from a virtual diskUnable to retrieve next block transmission command. Number of already processed blocks: [10].Failed to download dis
The beans today want to add VMware ESXi monitoring to Nagios as well. There are many ways to monitor ESXi, the first reaction of beans is to use POWERSHELLCLI, the second is SNMP, and the third response is to find out if there is no ready-made script, you don't have to make the wheel again ~ ~First look at how powershellcli is monitored?The script itself is easy enough to get the corresponding information by Get-stat. For example, I intend to check the memory status of a host, the first is the s
, Symantec Backup Exec Small Business Edition only 10 minutes less than the time, you can through three simple steps to simplify: Let your enterprise critical data to achieve complete protection.13. Symantec Backup Exec Small Business Edition integrates Symantec's industry-leading technologies into affordable solutions that are designed for growing businesses.VMware VCP Virtualization Engineer Remote Implementation, installation deployment, troubleshooting, technical consultingAccording to the u
efficiency is very low. However, in the case of multi-stream concurrency, because the original stream is not associated with the stream, i/O executed at the source end may be transferred to the peer end but then executed. In this case, more complex logic needs to be introduced to ensure that the data synchronized to the past is executed in sequence. There are two ways to consider this. One is to ensure RPO, maintain strong consistency among multiple
terms of normal running time and reliability?
What are our requirements for RTO/RPO (recovery time and recovery target point?
After the configuration is completed, the configuration will be rich. What you need to do is to find answers to key questions that will guide us (or even third parties) design a new infrastructure that can bear the necessary load and meet the enterprise's own policy requirements. If you do not provide all the information for
application.The captured data is then copied to the remote location.The remote node processes a copy of the data and delays the return acknowledgment to the source copy.Because replication performance is no longer in the application IO path, the response speed and distance of the remote site are less important factors. If the source data is lost and the destination copy of the data is still in the buffer without leaving the source, there is a risk of data loss.With a higher version than zero
is not counted as downtime.RPO (Recovery point Objective, target recovery points)RPO indicates how much data loss is tolerated. Typically, you can make your data non-lost by just doing a backup. However, when a disaster occurs, recovering from a backup causes the database to be unavailable at this stage, and if the recovery time is particularly long, the loss may be more severe than the loss of a small amount of data. Especially for databases with ve
Data processing becomes more and more important and critical in modern enterprise operations, and may even become a bottleneck of enterprise development. the importance of data protection is self-evident. if an enterprise does not have a good data protection solution or strategy, once important data is lost, the consequences will be disastrous, with economic losses.
Major server hardware vendors (such as IBM and HP) provide good data protection policies (hardware or software ). redundant Ar
)
Data backup is a data recovery service. Before establishing a data backup plan, you should first consider whether the backup can be used to effectively restore data (within the time range allowed by downtime ). the RPO (Recovery Point Objective) and RTO (Recovery Time Objective) permitted by the system should also be considered, the system recovery tool or solution used allows the system or data to be restored to a normal state, the time required ).
, this is related to the cost, the more redundancy, the higher the cost.
Disaster backup and recovery have two indicators: RPO (rediscoveryPoint Objective), One is RTO (recoveryTime Objective), That is, the data loss rate and the recovery interval. For traditional SANOr remote backup, these two indicators basically depend on the cost, the better the indicator, the higher the cost, Google in this regard, the use of synchronous replication technology, s
storage space, restore timeliness.(8) Data GuardDG, is one of the data storage disaster solution, through the construction of the same-city disaster preparedness and remote disaster preparedness environment, and thus achieve real-time protection database.Professional terminology:(1) RPOThe RPO (Recovery point Objective, Recovery points target) refers to the point at which the recovered data corresponds when the service is restored.(2) RTOThe RTO (Rec
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.