2.1. Data Recovery strategy determines Backup strategyYou are designing a backup strategy. If the data recovery needs and data recovery strategy starts. Each type of data recovery requires that you take the appropriate
This series of articles describes the relationship between cloud and backup, including:(1) VMware Virtual machine backup and recovery(2) KVM virtual machine backup and recovery(3) Cloud and backup(4) OpenStack and
RMAN recovery is divided into full recovery and Incomplete recovery. Full recovery, as its name implies, is to restore data based on full backup. However, in the real environment, such recovery is very useful.
RMAN
Example of using RMAN to create a backup set for Oracle11g backup and recovery
Oracle 11 GB backup and recovery example of using RMAN to create backup Sets
Homepage → Database Technology
Background:Read News
Or
The World Cup is the world each country in the football field the most coveted sacred glory, which national football team can get the champion, is the world first of the justified, and the whole worlds will be crazy boiling. The player who plays well in the World Cup will be remembered by the country as a national hero, so it represents the ultimate dream of every footballer.650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/2D/2A/wKiom1OVKieDKaKqAAHKFIUvzoc194.jpg "title=" 1402048866803
The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware or software). A well known RAID disk array (redundant array of independent disks) is a good way to protect data. In the case of SQL Server , a detailed data backup plan can be developed through a maintenance plan.
Data backup strategy (full backup, differential
I. Cold backup1. When the database is shut down normally, you must know the name and path of the backup file before performing the cold backup.Copy codeThe Code is as follows:SQL> select name from v $ datefile;SQL> select name from v $ controlfile;SQL> select member from v $ logfile;
2. files to be backed up for cold backup include:All data files, all control files, and all online redo log files3. Cold
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/87/F9/wKioL1fmI3vD8aEIAACH7C0ZO3w479.png "title=" Data recovery. png "alt=" Wkiol1fmi3vd8aeiaach7c0zo3w479.png "/>data recovery schematic diagramTest environment MySQL5.51 first create a new database Lampol data table testCreate Database Lampol;Use Lampol;CREATE TABLE test (ID int (ten), name varchar (10));2 Inserting data informationINSERT into tes
I. Overview
The simple recovery model and the bulk recovery model are described earlier, and this article continues to write backup and restore under the full recovery model. The biggest advantage in the full recovery model is that as long as the tail log can be successfully
The following articles mainly introduce the offline and online full backup of DB2 and the actual operation steps of Incremental backup and recovery, the following describes the offline and online full backup of DB2 and the actual operation steps of Incremental backup and
Major server hardware vendors (such as IBM and HP) provide good data protection policies (hardware or software ). redundant Array of Independent Disks is a good data protection method. for SQL Server, a detailed data backup plan can be developed through the maintenance plan.
Data backup policy (full backup, differential ba
Major server hardware vendors (such as IBM and HP) provide good data protection policies (hardware or software ). redundant Array of Independent Disks is a good data protection method. for SQL Server, a detailed data backup plan can be developed through the maintenance plan.
Data backup policy (full backup, differential ba
Mysql-12-mysql backup and recovery, mysql-12-mysql backup
1. Database Backup
Backup = copy and management to prevent data loss and record user operation records. The most effective backup is to back up the IT architecture.
Princip
MySQL backup and recovery-cold backup-What is cold backup-General cold backup is to stop database services, such as MySQL and Oracle, and then back up the data directory using the copy, package, or compression commands. If the data is abnormal, you can recover the data throu
I. OverviewThe simple recovery model and the bulk recovery model are described earlier, and this article continues to write backup and restore under the full recovery model. The biggest advantage in the full recovery model is that as long as the tail log can be successfully
1. How to Use Dell DataSafe Local Backup to create system recovery mediaDell DataSafe Local Backup is a secure, simple, and highly reliable Local Backup and recovery solution that helps Dell Computer users avoid software faults and hard disk damages.The latest factory Dell C
One-hot standby
In the last two articles (MySQL backup and recovery for cold backup, MySQL backup and recovery for the real environment for cold backup), we mentioned the use of cold backup
Backup of control files can be performed in two formats: Text backup and binary backup.
Backup text format
SQL> alterdatabase backup controlfile to trace as '/bk/con. SQL ';
Databasealtered.
Backup binary format
SQL> alterdatabas
2.1"Cloud Backup" feature introduction
2.1.1 uses the "Cloud Backup" feature on the computer side
Click the Pea pod in the lower right corner "backup"-"Backup to Cloud" and select what you need to back up.
Tip: This feature requires you to log into the Pea pod account.
2.1.2 uses the "Cloud
Note: 1 The experiment environment is the same platform, in the same byte order, in the same version. The directory structure of the source and target machines is the same. 2. You only need to install the oracle database software on the target machine. 3. Use backup for the first time to restore the test environment, copy the backup from the source machine to the target machine, and register it in the contr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.