network VirusWallTrend Micro ServerProtectTrend Micro Control Manager
Ville software companyVeritas Software CorporationHttp://www.veritas.com/cn
Veritas Backup Exec 9.1Backup solutionBackup Exec 9.1 for Windows Server
[Hardware solution]
Brocade Communication System (China) Co., Ltd.Brocade Communications System (China) LtdHttp://www.brocade.com/china
Brocade silkworm serie
cache. This option contains one or more table names. Only the specified table is refreshed. Like the reset query cache statement, flush tables also cancels all QUERY results from the query cache.
· TABLES WITH READ LOCK
For all databases with read locks, close all open TABLES and lock all TABLES until you execute the unlock tables command. If you have a file system that can take snapshots in a timely manner, such as Veritas, this is a very convenient
source code
Installing Oracle 11g R2 using RHEL6 ASM
Oracle 10g manual creation of the ASM Database
2. Advantages of ASM
Disk increase: it is very easy to add disks. No downtime is required and the file area is automatically reassigned.
I/O allocation: I/O is automatically distributed across all available Disks without manual intervention. This reduces the possibility of hot spots.
Band Width: segments in the redo log file can be subdivided (K for faster transmission rate). For data files, the
runs on Windows Server 2000/Server 2003 or NT Server. LifeKeeper for Linux runs on SuSE Linux, Red Hat, and TurboLinux operating systems.Similar Products in the city include Storage Foundation of Veritas, Microsoft Cluster Services, and Matrix Server of PolyServe.LifeKeeper was initially designed and developed by ATT Bell lab to protect its voice network running on Unix-based Star Sever. SteelEye acquired the technology when ATT sold the LifeKeeper d
allocation: I/O is automatically distributed across all available Disks without manual intervention. This reduces the possibility of hot spots.3 Band Width: segments in the redo log file can be subdivided (K for faster transmission rate). For data files, the band width is slightly larger (MB, to transmit a large number of data blocks at a time ).4 Buffer: the ASM file system directly performs input/output without buffering.5 Image: If the hardware image is unavailable, you can easily create a s
file before being written to the actual file or directory. This has a particularly significant impact on the Web cache, because the Web cache tends to perform more disk write operations first.
Journaling file systems are available for many operating systems. On Linux, you can select ext3fs, reiserfs, XFS, and others. XFS is also available in SGI/Irix, which was originally developed here. Solaris users can use the Veritas File System product. Tru64 (f
Today, I was performing a RAC backup and recovery test (using Veritas). My test colleague said that RMAN could not be used. After I joined the test, I found the following problems:[Oracle @ racdb01 ~] $ Srvctl stop database-D RAC[Oracle @ racdb01 ~] $ Srvctl start database-D Rac-O nomount[Oracle @ racdb01 ~] $ RMANRMAN> connect target sys/Orale @ Rac1RMAN-00571: ========================================================== ==============================R
Backup cannot be simply copied. Backup should be performed using backup tools under the database, you can also use dedicated backup software, such as Veritas, IBM, CA, netapp, and other company Backup management software.
2. Operating System Installation
If the hard disk was previously installed with Unix, the hard disk partition is not a FAT partition, but a partition such as VFS, e2fs, and e3fs; or the hard disk is raid, the first 16 K bytes of the
):
Heartbeat (Linux)
High Availability cluster multiprocessing-hacmp (Aix)
IBM Tivoli System Automation for multiplatforms (Aix, Linux)
Legato AAM 5.1 (Aix, HP-UX, Solaris, Linux, and Windows)
Steeleye lifekeeper (Linux and Windows)
Veritas Cluster Server (Aix, HP-UX, Solaris, Linux, and Windows)
This series introduces the open-source ha software heartbeat. However, you can apply the concepts learned here to any of the above software systems.
; SELECT SUM(value) FROM trans WHERE customer_id=some_id;
· mysql> UPDATE customer
· -> SET total_value=sum_from_previous_statement
· -> WHERE customer_id=some_id;
· mysql> UNLOCK TABLES;
If no lock tables exists, another thread may Insert a new row in the Trans table between the select and update statements.
By using the relative Update (update customer set value = value + new_value) or last_insert_id () function, you can avoid using lock tables in many cases.
You can also avoid locking tables
1. Obtain the machine ID and type commands
# Hostid
# Uname-I
2. Add the license command
# Vxlicense-C
3. view the license command
# Vxlicense-P
Iv. Glossary
Vrtsvxvm ESX Software
Vrtslic ESX licensing utilities
Vrtsvmdoc
Vrtsvmman ESX help manual
Vrtsvmdev ESX developer's package
Vrtsvxsa SCSI graphic Management Interface
Vrtsvxfs vxfs Software
Vrtsfsdoc vxfs document
5. Add a command to the command output file of the command output file and the command output file of the command output file.
#
(Sentinel), Compaq standbyserver
2. Application-switched Cluster
The feature is that when a node in the cluster fails, other nodes can perform application-level switching, so all nodes can provide their own services under normal conditions, it is also a static load balancing method.
High performance and price, but it cannot achieve seamless switching, and it cannot achieve Load Balancing for a single application itself.
Typical market products: legato (Vinca) co-standbyserver for NT, Nov
Oracle is divided into archive and non-archive modes. The difference between the two is the redo log processing. In archive mode, when a redo log is fully written, the content in the redo log is written to the archive file. After the redo log is written, the redo log can continue to be used, in non-archive mode, redo logs are overwritten directly. Archive files are generally required for restoration. database operations are recorded here, So production databases generally run in archive mode.
T
software such as Veritas), the solution is also very unordered, it is to execute two RMAN commands:1. Enter rman2. connect target/3. crosscheck archivelog all;4. delete expired archivelog all;======================================What are the principles of these two commands. It is described below:Each archivelog information is recorded in the controlfile. When we delete these physical files or perform abnormal changes under the OS, the archivelog in
Introduction to Oracle RAC clusters, processes, and logs
In a single-host environment, Oracle runs on the OS Kernel. OS Kernel manages hardware devices and provides hardware access interfaces. Oracle does not directly operate the hardware, but has an OS Kernel instead to complete the hardware call request.
In a cluster environment, storage devices are shared. The OS Kernel is designed for a single machine and can only control access between multiple processes on a single machine. If you still re
disk array. Figure 1. Three interconnection modes of data centers two-layer network interconnection scenarios are as follows. 1.1 high-availability Cluster server Cluster is a logical server that uses Cluster software to associate multiple servers on the network to provide consistent services. Cluster software of most vendors (such as HP, IBM, Microsoft, and Veritas) requires layer-2 network interconnection between servers. Deploy servers in clusters
unit number to one LUN for each controller, interactive, as we suggested last time, your host will be able to use half of the logical unit number successfully. The host can create a file system and successfully use each logical unit number, but it can only use the preferred controller. A controller or switch failure may occur unless half of the volumes disappear. What we really want is to abstract the device path and mount the abstract device. Using a multi-path device node means that the "real
solution to this problem is Incremental backup. After a full backup, only the changed data is backed up. This is what Susman created. "It's just a low-level buzz, not a pulse flooding the traffic ."
5. Search for data with a dramatic increase in storage space.
"There will be a large amount of data growth, from 50% to 100%. When the size increases by double or triple, you must focus on backup and recovery, "says Mike Adams, product marketing manager at Verit
: Provides an interface to the application to access the Drfs, fix it when the read file is found to be corrupted, and the entire operation is transparent to the application
RaidNode: Creation, maintenance of inspection filesdaemon
BlockFixer: Periodically checks files, recalculates checksums, and repairs files.
RaidShell: Similar to hadoop shell .
ErasureCode: The algorithm used by Drfs to generate the checksum, which can be an XOR or an Reed-Solomon algorithm. XOR can only crea
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.