摘要:
A method for duplicating transactions in a disaster recover system is disclosed. In this method, transactions and queries input to a primary database system are copied to a secondary database system and both database systems execute the queries and save the results permanently to each database, thereby maintaining duplicated data. When executing a query on the primary database system, if the query is a commit, the primary system simultaneously copies uncopied queries placed in a queue to the secondary database system and then executes the query. By using this processing procedure, the invention realizes a disaster recovery system which carries out copying transactions from one site to another site without losing the transactions, while reducing the influence of copy operation on the transaction processing performance.
摘要:
A high availability database system, subject to a failure causing data corruption in the active server system, may recover valid data prior to the corruption, and use the protected and recovered data to effect a failover. At the time T1 when a stand-by computer system detects the occurrence of a failure, a pair split is done to the data area to protect the data area time T0, just before the occurrence of the failure, and another pair split is done to the log area at the time, where the log area is corrupted or a time T3, where the failover is to take effect without corrupting data, to protect the log area containing data at a given time between time TO and time T3. By using the data and log areas thus protected, the stand-by computer system may take over valid data and log areas of the given time to perform a failover.
摘要:
A method for duplicating transactions in a disaster recover system is disclosed. In this method, transactions and queries input to a primary database system are copied to a secondary database system and both database systems execute the queries and save the results permanently to each database, thereby maintaining duplicated data. When executing a query on the primary database system, if the query is a commit, the primary system simultaneously copies uncopied queries placed in a queue to the secondary database system and then executes the query. By using this processing procedure, the invention realizes a disaster recovery system which carries out copying transactions from one site to another site without losing the transactions, while reducing the influence of copy operation on the transaction processing performance.
摘要:
A method for duplicating transactions in a disaster recover system is disclosed. In this method, transactions and queries input to a primary database system are copied to a secondary database system and both database systems execute the queries and save the results permanently to each database, thereby maintaining duplicated data. When executing a query on the primary database system, if the query is a commit, the primary system simultaneously copies uncopied queries placed in a queue to the secondary database system and then executes the query. By using this processing procedure, the invention realizes a disaster recovery system which carries out copying transactions from one site to another site without losing the transactions, while reducing the influence of copy operation on the transaction processing performance.
摘要:
A high availability database system, subject to a failure causing data corruption in the active server system, may recover valid data prior to the corruption, and use the protected and recovered data to effect a failover. At the time when a stand-by computer system detects occurrence of a failure, a pair split is done to the data area to protect the data area data of time T0, just before the occurrence of the failure, and another pair split is done to the log area at the time, where the log area is corrupted or a time T3, where the failover is to take effect without corrupting data, to protect the log area containing data at a given time between time T0 and time T3. By using the data and log areas thus protected, the stand-by computer system may take over valid data and log areas to perform a failover.
摘要:
In a high available clustered computer system, a standby computer starts up takeover preparation procedures at a time when occurrence of a failure is watched in an active computer and failover procedures will be started up from the takeover preparation completion status when the failure is detected in the active computer. Thus, speeding up of failover preparation procedures is realized.With such arrangement, it is possible to realize failover procedures by the hot-standby procedures when a failure occurs in an active computer.
摘要:
In a high available clustered computer system, a standby computer starts up takeover preparation procedures at a time when occurrence of a failure is watched in an active computer and failover procedures will be started up from the takeover preparation completion status when the failure is detected in the active computer. Thus, speeding up of failover preparation procedures is realized. With such arrangement, it is possible to realize failover procedures by the hot-standby procedures when a failure occurs in an active computer.
摘要:
Provided is a backup method including a step (S1) of reading a log which is a data update difference, and identifying a data storage area (page) of backup data, a step (S2) of determining high/low reusability of the identified data storage area, a step (S3) of storing a log corresponding to a data storage area determined to be low in reusability in a log storage area preset on a memory, and a step (S4) of applying a log corresponding to a data storage area determined to be high in reusability to the identified data storage area in a cache area set on the memory, and updating the data storage area. Thus, by further reducing the number of I/O times in an external storage system of a standby system which backs up data by log transfer, it is possible to reduce introduction costs of a backup system and its normal-time operation's costs at normal times.
摘要:
Provided is a technique of setting up a disaster recovery system. In a log-based disaster recovery system including a first site for processing data and a second site for storing a backup of the first site, the first site has a volume where data is stored and a volume that is made quiescent. The disaster recovery system accepts data updates while sequentially copying initial data from the quiescent volume to the second site. A copy of a log of the first site is kept in the second site and is synchronized with the original log. When data of the first site is updated and corresponding initial data has not been copied to the second site, the data to be updated is preferentially copied to the second site. A log is applied to the copied data, thereby matching data of the second site with data of the first site.
摘要:
A recovery of a secondary DB is executed by a log including a update difference of a primary DB, and a command is executed by adding the command to the log and analyzing the log by a secondary site. An operation command execution in the secondary site is applied to the DB having the consistency in the transaction at the same timing as a primary site or an intended timing, by transferring and executing the operation command via the log. In the case that the command is constituted by a snap shot generating instruction, a plurality of volumes of a mirror set forming a secondary storage apparatus are set to a pair state and the secondary DB is written in each of the volumes and synchronized, and the mirror set is set to a split state after the synchronization is finished, whereby a secondary DB is stored.