Backup & Recovery. Inexpensive Backup Solutions for Open Systems
- Autor:
- W. Curtis Preston
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 760
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Backup & Recovery. Inexpensive Backup Solutions for Open Systems
Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.
Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so.
For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to:
- Automate the backup of popular databases without a commercial utility
- Perform bare metal recovery of any popular open systems platform, including your PC or laptop
- Utilize valuable but often unknown open source backup products
- Understand the state of commercial backup software, including explanations of CDP and data de-duplication software
- Access the current state of backup hardware, including Virtual Tape Libraries (VTLs)
Wybrane bestsellery
-
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobil...(161.35 zł najniższa cena z 30 dni)
161.30 zł
209.00 zł(-23%) -
"Archiwizacja i odzyskiwanie danych" to przewodnik po darmowych narzędziach do archiwizacji i odzyskiwania danych, przeznaczony głównie dla administratorów. W. Curtis Preston, specjalista w dziedzinie ochrony danych, zwrócił uwagę, że środki przeznaczone na system archiwizacji są często zbyt małe...(49.50 zł najniższa cena z 30 dni)
49.50 zł
99.00 zł(-50%) -
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their life...(68.34 zł najniższa cena z 30 dni)
68.24 zł
99.90 zł(-32%) -
This book will help you explore HashiCorp Terraform and prepare for Associate (003) certification, from understanding core concepts to advanced modules. You'll gain hands-on expertise, troubleshoot with confidence, and more.
-
Discover the potential of ChatGPT, harness cloud platforms for security and scalability, maximize the efficiency of your AI apps, and explore industry use cases to gain practical insights with the help of Generative AI for Cloud Solutions.
-
Технологія Java сьогодні використовується ск&...(84.16 zł najniższa cena z 30 dni)
84.16 zł
103.90 zł(-19%) -
Ця книжка познайомить вас з особливостями Jav...(84.16 zł najniższa cena z 30 dni)
84.16 zł
103.90 zł(-19%) -
«Патерни проєктування» 2014 ваша книжка, якщо C...(84.16 zł najniższa cena z 30 dni)
84.16 zł
103.90 zł(-19%)
Kup polskie wydanie:
Archiwizacja i odzyskiwanie danych
- Autor:
- W. Curtis Preston
49,50 zł
99,00 zł
(49.50 zł najniższa cena z 30 dni)
Ebooka "Backup & Recovery. Inexpensive Backup Solutions for Open Systems" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Backup & Recovery. Inexpensive Backup Solutions for Open Systems" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Backup & Recovery. Inexpensive Backup Solutions for Open Systems" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5504-7, 9780596555047
- Data wydania ebooka:
- 2007-01-03 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 4.8MB
- Rozmiar pliku Mobi:
- 4.8MB
Spis treści ebooka
- Backup & Recovery
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- I Wish Id Had This Book
- Only the Recovery Matters
- Products Change
- Backing Up Databases Is Not That Hard
- Bare-Metal Recovery Is Not That Hard
- I Wish Id Had This Book
- How This Book Is Organized
- Part I
- Part II
- Part III
- Part IV
- Part V
- Part VI
- Whats New in This Book
- Whats Missing?
- Speaking of BackupCentral.com
- Conventions Used in This Book
- How to Contact Us
- Safari Enabled
- This Book Was a Team Effort
- Contributors
- Technical Editors
- Horror Stories
- Special Mention
- I Dont Know It All
- How Can I Say Thanks?
- 1. Introduction
- 1. The Philosophy of Backup
- Champagne Backup on a Beer Budget
- Why Should I Read This Book?
- Schadenfreude
- You Never Want to Say These Words
- Youre Curious About Open-Source Backup Products
- You Want to Learn About Disk-Based Backup
- Why Back Up?
- What Will Lost Data Cost You?
- What Will Downtime Cost You?
- 1. The Philosophy of Backup
- Wax On, Wax Off: Finding a Balance
- Dont Go Overboard
- Get the Coverage That You Need
- Why the Word Volume Instead of Tape?
- 2. Backing It All Up
- Dont Skip This Chapter!
- The Impossible Job That No One Wants
- Dont Skip This Chapter!
- Deciding Why You Are Backing Up
- Deciding What to Back Up
- Plan for the Worst
- Take an Inventory
- Are You Backing Up What You Think Youre Backing Up?
- Back Up All or Part of the System?
- Backing up only selected drives or filesystems
- Backing up the entire system
- Deciding When to Back Up
- Backup Levels
- Which Levels Do You Run and When?
- Weekly schedule: All full/level 0 backups
- Weekly schedule: Weekly full, daily level differentials/level 1s
- Weekly schedule: Weekly full, daily leveled backups
- Weekly schedule: Monthly full, daily Tower of Hanoi incrementals
- In the Middle of the Night...
- Deciding How to Back Up
- Be Ready for Anything: 10 Types of Disasters
- Automate Your Backup
- Plan for Expansion
- Dont Forget Unix mtime, atime, and ctime
- Backups change atime
- The atime can be resetwith a penalty
- Dont Forget ACLs
- Dont Forget Mac OS Resource Forks
- Keep It Simple, SA
- Storing Your Backups
- Storage in General
- On-Site Storage
- 12,000 gold pieces
- Off-Site Storage
- Choosing a media vaulting vendor
- Testing your chosen vendor
- Electronic vaulting
- Testing Your Backups
- Test Everything!
- Test Often
- Monitoring Your Backups
- You Can Always Make It Better
- If Its Not Baroque, Dont Fix It
- Following Proper Development Procedures
- Unrelated Miscellanea
- Protect Your Career
- Self-preservation: Document, document, document
- Strategy: Make backups an integral part of the installation process
- Protect Your Career
- Get the Money Your Backups Need
- Be ready
- Make a formal presentation
- Good Luck
- 2. Open-Source Backup Utilities
- 3. Basic Backup and Recovery Utilities
- An Overview
- How Mac OS Filesystems Are Different
- cpio
- Why isnt cpio more popular?
- ditto
- dd
- dump and restore
- ntbackup
- rsync
- System Restore
- tar
- Other Utilities
- asr
- pax
- psync, rsyncx, hfstar, xtar, and hfspax
- An Overview
- 3. Basic Backup and Recovery Utilities
- Backing Up and Restoring with ntbackup
- Creating a Simple Backup Configuration
- Executing Your Simple Backup
- Restoring with ntbackup
- Using System Restore in Windows
- Creating Restore Points
- Recovering Windows Using a Restore Point
- Backing Up with the dump Utility
- Syntax of the dump Command
- The Options to the dump Command
- Specifying a complete or incremental backup (09)
- Specifying a blocking factor (b)
- Updating the dumpdates file (u)
- Notifying your backup operators (n)
- Specifying density and size (d and s)
- Do I have to use the s and d options?
- Specifying a backup device file (f)
- Displaying which filesystems need to be backed up (W and w)
- Interesting options for Solariss ufsdump utility
- What a dump Backup Looks Like
- dump records an index on the volume
- Using the index to create a table of contents
- Restoring with the restore Utility
- Is the Backup Volume Readable?
- Blocking Factor
- Byte-Order Differences
- Different Versions of dump
- Syntax of the restore Command
- The Options to the restore Command
- Determining the type of restore
- Determining how the restore behaves
- Creating a dump volume table of contents (t)
- Performing a complete (recursive) filesystem restore (r)
- Restoring files by name (x)
- Restoring files interactively (i)
- Restoring files to another location
- Requesting verbose output (v)
- Skipping files (s)
- Specifying a blocking factor (b)
- Specifying a backup drive or file (f)
- Specifying no query during restore (y)
- Limitations of dump and restore
- Features to Check For
- Backing Up and Restoring with the cpio Utility
- The Syntax of cpio When Backing Up
- The Options to the cpio Command
- Specifying the output mode (o)
- Restoring access times (a)
- Specifying the ASCII format (c)
- Requesting verbose output (v)
- Specifying a blocking factor of 5,120 (B)
- Specifying an I/O block size (C)
- Specifying an output device or file (O)
- Backing up to a remote device (piping to an rsh or ssh command)
- Restoring with cpio
- Different versions of cpio
- Byte-order problems
- Wrong header type
- Strange block size
- Full or partial restore, or table of contents only?
- cpios Restore Options
- Telling cpio Which Device to Use
- Examples of a cpio Restore
- Listing the files on a cpio volume
- Doing an entire filesystem restore
- Doing a pattern-match restore
- Renaming files interactively
- Other useful options
- Restoring to a different directory
- Using cpios Directory Copy Feature
- Backing Up and Restoring with the tar Utility
- The Syntax of tar When Backing Up
- The Options to the tar Command
- Listing files on standard input
- Syntax of tar When Restoring
- Restoring selected parts of the archive
- Tricking tar into using wildcards during a restore
- Changing ownership, permissions, and attributes during a restore
- Some Other Neat Things About tar
- Finding everything thats under the directory
- Using tar to move a directory
- Restoring to an alternate location
- Backing Up and Restoring with the dd Utility
- Basic dd Options
- Specifying the input file
- Specifying the output file
- Specifying the block size
- Specifying the input and output block sizes separately
- Specifying the number of records to read
- Basic dd Options
- Using dd to Copy a File or Raw Device
- Using dd to Convert Data
- Converting data to go into another command
- Converting data that is in the wrong format
- Using dd to Determine the Block Size of a Tape
- Using dd to Figure out the Backup Format
- Using rsync
- Basic rsync Syntax
- A few twists
- rsync on Windows
- rsync on Mac OS
- Basic rsync Syntax
- Restoring with rsync
- Backing Up and Restoring with the ditto Utility
- Syntax of ditto When Backing Up
- The Options to the ditto Command
- Syntax of ditto when Restoring
- Listing the files in a ditto archive
- Comparing tar, cpio, and dump
- Using ssh or rsh as a Conduit Between Systems
- 4. Amanda
- Summary of Important Features
- Client/Server Architecture Using Nonproprietary Tools
- Amanda Security
- Holding Disk
- Backup Scheduling
- Tape Management
- Device Management
- Summary of Important Features
- Configuring Amanda
- Backing Up Clients via NFS or Samba
- Backing Up Using NFS
- Backing Up via Samba
- Amanda Recovery
- Community and Support Options
- Future Plans
- 5. BackupPC
- BackupPC Features
- How BackupPC Works
- Installation How-To
- Security Versus Ease of Use
- Basic Sizing
- Installing BackupPC
- Installation packages
- Starting BackupPC
- Using the CGI Interface
- Configuration Files
- Per-Client Configuration
- The BackupPC Community
- The Future of BackupPC
- 6. Bacula
- Bacula Architecture
- Bacula Components
- Interaction Between Components
- Authentication
- Configuration
- Bacula Architecture
- Bacula Features
- An Example Configuration
- Setting Up the Server
- Initial Backup (Linux Client)
- Initial Restore (Linux Client)
- Windows Backup
- Mac OS X Backup
- Advanced Features
- Bare-Metal Recovery
- Backup Traffic and Storage Encryption
- Python Script Support
- Client Script Support
- Autochanger Support
- ANSI and IBM Tape Labels
- File-Based Intrusion Detection
- Future Directions
- Pool Migration
- Tracking Deleted/Renamed Files
- Python-Based GUI Tool
- Base Job Support
- Client-Initiated Backups
- Plug-in Support for File Daemons
- 7. Open-Source Near-CDP
- rsync with Snapshots
- An Example
- Beyond the Example
- Understanding Hard Links
- Hard-Link Copies
- A simple example script
- Restoring from the Backup
- Things to Consider
- How large is each backup?
- A brief word about mail formats
- Other useful rsync flags
- Backing up databases or other large files that keep changing
- Backing up Windows systems
- Large filesystems and rsyncs memory scaling
- Atomicity and partial transfers
- rsync with Snapshots
- rsnapshot
- Platform Support
- When Not to Use rsnapshot
- Setting Up rsnapshot
- The rsnapshot Community
- rdiff-backup
- Advantages
- Disadvantages
- Quick Start
- Windows, Mac OS X, and the Future
- 3. Commercial Backup
- 8. Commercial Backup Utilities
- What to Look For
- Full Support of Your Platforms
- Should You Back Up Special Files?
- Backup of Raw Partitions
- Backup of Very Large Filesystems and Files
- Aggressive Requirements
- LAN-Free Backup
- Server-Free (or Serverless) Backup
- De-Duplication Backup Systems
- Snapshots
- Replication
- Near-Continuous Data Protection Systems
- Continuous Data Protection Systems
- Remote Office Backup
- 8. Commercial Backup Utilities
- Simultaneous Backup of Many Clients to One Drive
- Disk-to-Disk-to-Tape Backup
- Simultaneous Backup of One Client to Many Drives
- Data Requiring Special Treatment
- Network-Mounted Filesystems
- Custom User Scripts
- Databases
- Storage Management Features
- Archives
- Backups make lousy archives
- Satisfy electronic discovery requests
- Other backup bugaboos
- True archiving
- Two types of archivers
- Archives
- Hierarchical Storage Management
- Information Lifecycle Management
- Reduction in Network Traffic
- Keep Backup Traffic at the Subnet Level
- Use Client-Side Compression
- Incorporate Throttling
- Storage Area Networks
- Support of a Standard or Custom Backup Format
- Standard Backup Formats
- The dump utility
- The tar, ditto, and cpio utilities
- Standard Backup Formats
- Custom Backup Formats
- What happened to SIDF?
- A Reality Check
- Ease of Administration
- Security
- Ease of Recovery
- Protection of the Backup Index
- Robustness
- Automation
- Volume Verification
- Cost
- Vendor
- Final Thoughts
- 9. Backup Hardware
- Decision Factors
- Reliability
- Duty Cycle
- Transfer Speed
- Flexibility
- Tape drives: Not so flexible
- Optical drives: A little more flexible
- Disk drives: Very flexible
- Time-to-Data
- Capacity
- Removability
- Cost
- Summary
- Decision Factors
- Using Backup Hardware
- Compression
- Density Versus Compression
- How Often Should I Change My Media?
- Cartridge Care
- Drive Care
- Nearline and Offline Storage
- Tape Drives
- Tape Drives Must Be Streamed
- Compression Makes It Harder to Stream Drives
- Variable Speed Tape Drives
- Helical and Linear Tape Drives Are Different
- Cartridges Versus Cassettes
- Midrange Tape Drive Types
- 3480 (end-of-lifed)
- 3590
- 3592
- TS1120
- 3570 drive (a.k.a. Magstar MP)
- 8 mm (8x0x) drives (end-of-lifed)
- 9840 drives
- 9940 drives
- T10000 drives
- AIT drive
- DDS drive
- DLT drives (end-of-lifed)
- DLT-S drives (aka Super DLT)
- DLT-V drives (aka Value DLT)
- DTF drive
- LMS NCTP drive
- LTO drives
- Mammoth drive (end-of-lifed)
- MLR 1-3 drives
- VXA
- Optical Drives
- Optical Recording Methods
- Magneto-optical recording method
- Phase change recording method
- Dye polymer recording method
- WORM recording methods
- Optical Recording Methods
- Optical Recording Formats
- CD recording formats
- DVD recording formats
- Magneto-optical recording format
- UDO recording format
- Automated Backup Hardware
- Disk Targets
- Disk-As-Disk Targets
- Advantages of disk-as-disk targets
- Disadvantages of disk-as-disk targets
- SAN disk-as-disk targets
- NAS disk-as-disk targets
- Disk-As-Disk Targets
- Disk-As-Tape: Virtual Tape Libraries
- Advantages of VTLs
- Disadvantages of VTLs
- How do you eject virtual tapes?
- Disk Features to Consider
- Packaging
- De-duplication
- Replication
- Content-awareness
- Re-presentation
- Stacking
- Notification
- Disk-As-Tape: Virtual Tape Cartridges
- 4. Bare-Metal Recovery
- 10. Solaris Bare-Metal Recovery
- Using Flash Archive
- Backup and Recovery Overview
- Perform the backup
- Perform the restore
- Backup and Recovery Overview
- Initial Considerations
- System requirements
- Frequency of backup
- Back up to disk or tape?
- Restore from tape or disk?
- Interactive or noninteractive restore?
- Other environmental constraints
- Using Flash Archive
- 10. Solaris Bare-Metal Recovery
- Preparing for an Interactive Restore
- Creating Flash Archive Images
- Determining filesystems to back up
- Using flar create
- Creating a flash archive tape
- Creating Flash Archive Images
- Bare-Metal Recovery with Flash Archive
- An interactive recovery example
- Setup of a Noninteractive Restore
- Noninteractive Setup Files
- profile
- The rules file
- The sysidcfg file
- Noninteractive Setup Files
- Creating a Noninteractive Tape Image
- Creating a Noninteractive Disk Image
- Post-Recovery Procedures
- Final Thoughts
- 11. Linux and Windows
- How It Works
- If Then GOTO
- Choosing Backup Methods
- Live or alternate boot?
- Image level or filesystem level?
- Complete disk or separate partitions?
- Four backup options
- How It Works
- The Steps in Theory
- Step 1: Back Up Important Metadata
- Linux, FreeBSD, and Solaris x86
- Windows
- Step 1: Back Up Important Metadata
- Step 2: Back Up the OS with a Native Utility
- Linux, FreeBSD, Solaris X86
- Windows
- Step 3: Boot the System from Alternate Media
- Step 4: Restore the Boot Block Information
- Step 5: Partition and Format the New Root Drive
- Linux, FreeBSD, and Solaris X86
- Windows
- Step 6: Restore the OS to the New Root Drive
- Assumptions
- Alt-Boot Full Image Method
- Create the Bare-Metal Backup
- Back up the important metadata
- Boot the system from alternate media
- Back up the operating system with a native utility
- Create the Bare-Metal Backup
- Perform a Bare-Metal Recovery
- Boot the system from alternate media
- Restore the boot block information
- Prepare the new root drive
- Restore the operating system
- Alt-Boot Partition Image Method
- Create the Bare-Metal Backup
- Back up the important metadata
- Boot the system from alternate media
- Back up the operating system with a native utility
- Create the Bare-Metal Backup
- Perform a Bare-Metal Recovery
- Boot the system from alternate media
- Restore the boot block and prepare the new root drive
- Restore the operating system
- Live Method
- Create the Bare-Metal Backup
- Back up the important metadata
- Back up the operating system with a native utility
- Create the Bare-Metal Backup
- Perform a Bare-Metal Recovery
- Boot the system from alternate media
- Restore the boot block information and prepare the new root drive
- Restore the operating system
- Alt-Boot Filesystem Method
- Create the Bare-Metal Backup
- Back up the important metadata
- Boot the system from alternate media
- Back up the operating system with a native utility
- Create the Bare-Metal Backup
- Perform a Bare-Metal Recovery
- Boot the system from alternate media
- Restore the boot block and prepare the new root drive
- Restore the operating system
- Automate Bare-Metal Recovery with G4L
- Advantages of G4L
- Drawbacks of G4L
- Setting Up G4L
- Using G4L
- Customizing G4L
- Commercial Solutions
- 12. HP-UX Bare-Metal Recovery
- System Recovery with Ignite-UX
- Ignite-UX Overview
- Network Services and Remote Boot Protocols
- Differences Between HP Integrity and HP9000 Clients
- System Recovery with Ignite-UX
- Planning for Ignite-UX Archive Storage and Recovery
- Considerations for the Remote Booting of Clients
- Sizing the Recovery Archive
- Configuring an Ignite-UX Network Server
- Recovery Archive Management
- Implementation Example
- Command-Line Examples
- Verifying Archive Contents
- Troubleshooting Recovery Operations
- System Cloning
- Security
- System Recovery and Disk Mirroring
- 13. AIX Bare-Metal Recovery
- IBMs mksysb and savevg Utilities
- mksysb and savevg Format
- Preparing to Use mksysb and savevg
- Preparing for the restore
- IBMs mksysb and savevg Utilities
- Backing Up with mksysb
- mksysb Summary
- Backing Up rootvg to Locally Attached Tape
- Backing Up rootvg to a Remote Tape Drive
- Backing Up to Disk
- Making a Bootable DVD/CD from an Existing mksysb
- Creating a CD/DVD Backup in One Step
- Setting Up NIM
- Setting Up a NIM Server
- Adding a Client Definition to NIM
- Setting a mksysb Definition for a Client
- savevg Operations
- Using savevg to Back Up a Volume Group
- Verifying a mksysb or savevg Backup
- Restoring an AIX System with mksysb
- System Cloning
- AIX 4.x Operating System
- AIX 5.x Operating System
- 14. Mac OS X Bare-Metal Recovery
- How It Works
- Preparing for a Bare-Metal Recovery
- Performing a Bare-Metal Recovery
- How It Works
- A Sample Bare-Metal Recovery
- Perform the Backup
- Recover the System
- 5. Database Backup
- 15. Backing Up Databases
- Can It Be Done?
- Confusion: The Mysteries of Database Architecture
- The Muck Stops Here: Databases in Plain English
- Whats the Big Deal?
- Database Structure
- The Power Users View: Logical Elements of a Database
- Instance
- Database
- Table
- Index
- LOBs
- Object
- Row
- Attribute
- The Power Users View: Logical Elements of a Database
- The DBAs View: Physical Elements of a Database Environment
- Page
- Datafile
- Extents
- Tablespace
- Partition
- Master database
- Transaction
- Rollback log
- Transaction log
- Checkpoint
- 15. Backing Up Databases
- An Overview of a Page Change
- ACID Compliance
- What Can Happen to an RDBMS?
- Backing Up an RDBMS
- Physical and Logical Backups
- Get Every Instance
- Transaction Log Dumps Are Not Incremental Backups
- Do It Yourself: Creating Your Own Backup Utility
- Intermediary disk
- Dedicated tape drive
- Shell/batch scripts
- Calling a Professional
- DB2
- Exchange
- Informix
- MySQL
- Oracle
- PostgreSQL
- Sybase
- SQL Server
- Restoring an RDBMS
- Loss of Any Nondata Disk
- Loss of a Data Disk
- Online Partial Restores
- Documentation and Testing
- Unique Database Requirements
- 16. Oracle Backup and Recovery
- Two Backup Methods
- rman
- User-Managed Backups
- Two Backup Methods
- Oracle Architecture
- The Power Users View
- Instance
- Database
- Table
- Index
- Large object datatypes
- Object
- Row
- Attribute
- The Power Users View
- The DBAs View
- Blocks
- Extents
- Segment
- Datafile
- Tablespace
- Partition
- Control file
- Transaction
- Undo tablespace
- Checkpoint
- Flash recovery area
- Redo log
- Initialization parameters
- Restore versus recover
- Finding All Instances
- Physical Backups Without rman
- Cold Backup
- Hot Backup
- Debunking Hot-Backup Myths
- Physical Backups with rman
- Important New rman Features
- Automating rman
- Create a recovery catalog
- Create persistent parameters
- Create rman scripts
- The database.inc.rman command file (level 1 backups)
- Flashback
- Other Commercial Backup Methods
- Managing the Archived Redo Logs
- Recovering Oracle
- Using This Recovery Guide
- Seriously, Think About rman
- Step 1: Try Startup Mount
- Step 2: Are All Control Files Missing?
- Step 3: Replace Missing Control File
- But I dont have a good control file!
- Step 4: Are All Datafiles and Redo Logs OK?
- Step 5: Restore Damaged Datafiles or Redo Logs
- Step 6: Is There a Backup to Trace of the Control File?
- Step 7: Run the create controlfile Script
- Step 8: Restore Control Files and Prepare the Database for Recovery
- 1) Restore control files from backup
- 2) Start up mount
- Step 9: Recover the Database
- Recover and open the database with rman
- Attempt to recover database manually
- Alter database open resetlogs
- Step 10: Does alter database open Work?
- Big shortcut for rman users
- User-managed backups: Read on
- Damaged datafile
- Damaged log group
- Damaged required tablespace
- Damaged rollback segment
- Before going any farther...
- How media recovery works
- Step 11: Are There Damaged Datafiles for Required Tablespaces?
- Step 12: Restore All Datafiles in Required Tablespaces
- Step 13: Damaged Nonrequired Datafile?
- Step 14: Take Damaged Datafile Offline
- Step 15: Were Any Datafiles Taken Offline?
- Step 16: Restore and Recover Offline Datafiles
- Restore the damaged datafiles
- Datafile recovery
- Tablespace recovery
- Database recovery
- Step 17: Is There a Damaged Online Log Group?
- Step 18: Are Any Rollback Segments Unavailable?
- Step 19: Recover Tablespace Containing Unavailable Rollback Segment
- Step 20: Is the Current Online Log Damaged?
- Step 21: Restore and Recover All Database Files from Backup
- Step 22: Run alter database open resetlogs
- Step 23: Is an Active Online Redo Log Damaged?
- Step 24: Perform a Checkpoint
- Step 25: Is an Inactive Online Redo Log Damaged?
- Step 26: Drop/Add a Damaged, Inactive Log Group
- Youre Done!
- Logical Backups
- Performing a Logical Backup
- Recovering with a Logical Backup
- A Broken Record
- 17. Sybase Backup and Recovery
- Sybase Architecture
- Overview of the Sybase Architecture
- Sybase Command-Line Utilities
- isql
- bcp
- dsedit
- Required Environment Variables
- Sybase Architecture
- The Power Users View
- Server
- Engine
- Database
- Transaction
- Table
- System Table
- Index
- Stored Procedures
- The DBAs View
- Page
- Extent
- Datafiles and Devices
- Segment
- Configuration File
- Transaction Log
- What Happens When Transaction Logs Fill Up?
- Transaction log sizing
- The interfaces File
- The SYBASE.sh and SYBASE.csh Files
- Backup Server
- Dump Device
- Hot and Cold Backups
- Protecting Your Database
- dbcc: The Database Consistency Checker
- Standard/nightly dbcc checks
- dbcc: The Database Consistency Checker
- Reorgs
- Update Statistics
- Configuration Audits
- Implement Mirroring and Disk Striping
- How to Back Up Your Servers
- Syntax of the dump statement
- Backup striping and compression
- Have a Run Book
- Backup Automation Through Scripting
- Backup Automation Basics
- A simple update stats script
- A sample transaction logfiles backup script
- Schedule backups
- Mailing crontab results
- Backup Automation Basics
- Logical Backups
- Performing a logical backup
- Performing a logical restore
- Auditing using bcp
- Physical Backups with a Storage Manager
- Recovering Your Database
- Recovering from a Disaster
- Restoring from Backups
- The online database command
- Restoring to a specific time
- Restoring from compressed backups
- Common Sybase Procedures
- Procedure 1: How to Start Sybase
- Procedure 2: How to See Whether Your Server Is Alive
- Procedure 3: How to Shut Down Your Server
- The first thing to trynormal shutdown
- The second thing to tryshutdown with nowait
- The third thing to trykill -15 on the dataserver
- What you should NEVER dokill -9 on the dataserver
- On Windows
- Procedure 4: How to Set Server Configuration Options
- Procedure 5: How to Set Database-Level Options
- Procedure 6: How to Run a Query
- Sybase Recovery Procedure
- Step 1: Can You Connect to Your Server Using isql?
- Step 2: Run the Stored Procedure sp_who
- Step 3: Blocked Processes
- Step 4: Log Suspend
- Step 5: You Cant Connect Using isql
- Step 6: Check the Sybase Server Error Log
- Step 7: Check Whether Your Server Is Running
- Step 8: Running Server but Cant Connect Remotely
- Step 9: Restart Your Server
- Step 10: Startup Failure
- Step 11: Contact Sybase Support Immediately
- Step 12: Able to Get Shared Memory?
- Step 13: Master Device Failure
- Step 14: Disk Device Failure
- Get a list of the databases that failed to load
- Check your available free space
- Get database recreation information
- Drop the broken database
- Recreate the database
- Reload your database
- Bring the database online
- 18. IBM DB2 Backup and Recovery
- DB2 Architecture
- The Power Users View
- Instance
- Databases
- Schemas
- Tables
- Views
- Indexes
- DB2 engine dispatch units
- The Power Users View
- The DBAs View
- Connecting to a DB2 database
- System catalog tables
- Database partition
- Containers
- Tablespaces
- Large objects (LOBs)
- Transaction logs
- Managing archive logs
- DB2 Architecture
- The backup, restore, rollforward, and recover Commands
- The backup Command
- Backup levels
- Backup path and filenaming convention
- Discovering the history of your backup operations
- Automatic maintenance
- Using db2look
- The backup Command
- Recovery Types
- Crash recovery
- Version recovery
- Rollforward recovery
- The restore Command
- The rollforward Command
- The recover Command
- Recovering Your Database
- Performing an In-Place Version Recovery
- Step 1: Gather your database backups
- Step 2: Make sure the containers that existed during your backup are still around
- Step 3: Issue the restore or recover database command
- Step 4: Perform rollforward recovery
- Step 5: Reorganize the data and collect statistics
- Performing an In-Place Version Recovery
- Performing a Redirected Version Recovery
- Step 1: Restore the database backup and specify the redirect option
- Step 2: Define appropriate tablespace containers for the target database
- Step 3: Continue the redirected restore operation
- Step 4: Perform rollforward recovery
- Step 5: Reorganize the data and collect statistics
- Performing a Rollforward Recovery
- Step 1: Gather your logfiles
- Step 2: Determine the minimum PIT
- Step 3: Issue the rollforward command
- Step 4: Set constraints (if necessary)
- Step 5: Perform a database backup (if necessary)
- Step 6: Reorganize data and collect statistics
- Reorganizing Data and Collecting Statistics
- 19. SQL Server
- Overview of SQL Server
- Connecting to and Administering SQL Server
- SQL Server Authentication
- User authentication
- Service authentication
- Overview of SQL Server
- The Power Users View
- Instance
- Databases
- System databases
- User databases
- Viewing information about databases
- Tables
- System tables
- Temporary tables
- Index
- Partitioned tables
- Partitioned indexes
- Stored Procedures
- Memory Management
- The DBAs View
- Database Files
- Filegroups
- Transaction Log
- Monitoring logfile size with dbcc
- Reducing the size of the physical log
- Pages
- Extents
- Partitions
- Table and Index Specifics
- Snapshot Backups (2005)
- Backups
- Backup Devices
- Logical and physical devices
- Backup Devices
- Recovery Models
- SQL Server 2005
- SQL Server 2000
- Backup Types
- Full
- Differential
- Transaction log
- Copy-only backup
- Partial backups
- File and filegroup
- Backup/Restore of System Databases
- Viewing Information About the Backup
- Verify Backups
- Backup Expiration Date
- How to Back Up
- Command-line backup with Transact-SQL
- Transaction Log Backups
- Log truncation
- Master Database Backups
- Scheduling a Backup
- Logical (Table-Level) Backups
- Restore and Recovery
- Components of a Restore
- Recovery Roadmap
- Step 1: Check for obvious hardware errors or server problems
- Step 2: Can you connect to the instance using a GUI or T-SQL?
- Step 3: Can you connect to the master database?
- Step 4: Can you connect to a specific, nonsystem database?
- Step 5: Initial checks
- Step 6: Are any datafiles missing?
- Step 7: Is the transaction log full?
- Step 8: Is it possible to repair the DB?
- Step 9: Before you begin the restore process
- Step 10: Restore under the simple recovery model
- Step 11: Restore under the full or bulk logged recovery model
- Database Restore
- Command-line restore with Transact-SQL
- Master Database Restore
- 20. Exchange
- Exchange Architecture
- Database Structure
- Extensible Storage Engine
- Stores
- Exchange Architecture
- Storage Groups
- Transaction Logfiles
- Checkpoint Files
- Reserve Logfiles
- General Logfile Info
- Circular Logging
- Other Files
- Single Instance Storage
- Automatic Database Maintenance
- Storage Limits
- Backup
- Backup Strategy
- Backup Types
- Normal
- Copy
- Incremental
- Differential
- Daily
- Determining What to Back Up
- Exchange-specific
- Windows-specific
- What not to back up when backing up Windows
- Backup Methods
- Online backups
- Offline backups
- Streaming backups
- Shadow copy backups
- Verifying backups
- Using ntbackup to Back Up
- Making a Basic Backup
- Verifying the Backup
- Restore
- Repair or Restore?
- Common Tasks for Repair or Restore
- Exchange Repair
- Repairing Exchange databases
- Repairing by reinstalling
- Exchange Restore
- Overview
- Restoring Exchange Mailbox or Public Folder Stores
- Online database restore
- Incremental and differential backups
- Hard recovery versus soft recovery
- Offline Database Restore
- Recovery Storage Group
- Example of RSG
- When to use RSG: Dial-tone restore
- Overlooked (and Often Easy) Restore Methods
- Restoring deleted mailboxes
- Restoring deleted items
- Using ntbackup to Restore
- Performing a basic restore
- 21. PostgreSQL
- PostgreSQL Architecture
- Clusters
- Tablespace
- Pagefile/Datafile
- Startup Scripts
- System Tables
- Large Objects
- Rollback Process
- Write Ahead Log
- PostgreSQL Architecture
- Backup and Recovery
- Using pg_dump with pg_restore
- Backing up with pg_dump
- Restoring with pg_restore
- Using pg_dump with pg_restore
- Using pg_dump with psql
- Using pg_dumpall with psql
- Point-in-Time Recovery
- Creating a Backup to Use with Point-in-Time Recovery
- Restoring from a Point-in-Time Backup
- 22. MySQL
- MySQL Architecture
- Shared Architectural Elements
- The power users view
- Instances
- Startup scripts
- Databases and tablespaces
- Large objects
- Binary log
- Shared Architectural Elements
- MyISAM Storage Engine
- InnoDB Storage Engine
- Concerns about InnoDB
- Transactions
- Tablespace
- Datafile
- Rollback segment or log group
- Transaction log
- MySQL Architecture
- Other Storage Engines
- MySQL Backup and Recovery Methodologies
- SQL-Level Backup and Recovery
- Backing up MyISAM tables
- Backing up InnoDB tables
- Repairing corrupted MyISAM tables
- SQL-level MySQL restores
- SQL-Level Backup and Recovery
- File-Level Backup and Recovery
- Build your own file-level backup
- File-level backup with mysqlhotcopy
- Restoring from file-level backups
- Using Point-in-Time Recovery
- Directly applying binary logs
- Applying binary logs via temporary SQL files
- Applying binary logs using date ranges
- MySQL Cluster Hot Backup and Recovery
- Initial configuration
- Performing a backup of MySQL cluster
- Restoring a MySQL cluster
- 6. Potpourri
- 23. VMware and Miscellanea
- Backing Up VMware Servers
- VMware Architecture
- VMware Backups
- Back up virtual machines as physical machines
- Back up suspended virtual machine files
- Copy/export a running virtual machine using VMwares tools (ESX only)
- Using Bare-Metal Recovery to Migrate to VMware
- Backing Up VMware Servers
- 23. VMware and Miscellanea
- Volatile Filesystems
- Missing or Corrupted Files
- Referential Integrity Problems
- Corrupted or Unreadable Backup
- Torture-Testing Backup Programs
- Other warnings
- Conclusions
- Using Snapshots to Back Up a Volatile Filesystem
- How do snapshots work?
- Available snapshot software
- Demystifying dump
- Dumpster Diving
- Pass I
- Pass IIa
- Pass IIb
- Pass IIc
- Pre-Pass III
- Pass III
- Pass IV
- Post-Pass IV
- Summary of dump steps
- Dumpster Diving
- Answers to Our Questions
- Question 1
- Question 2
- Question 3
- Question 4
- Question 5
- A Final Analysis of dump
- How Do I Read This Volume?
- Prepare in Advance
- Wrong Media Type
- Bad or Dirty Drive or Tape
- Different Drive Types
- Wrong Compression Setting/Type
- The Little Endian That Couldnt
- Block Size (Tape Volumes Only)
- Determine the Blocking Factor
- AIX and Its 512-Byte Block Size
- Unknown Backup Format
- Different Backup Format
- Damaged Volume
- Reading a Flaky Tape
- Multiple Partitions on a Tape
- If at First You Dont Succeed...
- Gigabit Ethernet
- Disk Recovery Companies
- Yesterday
- Trust Me About the Backups
- 24. Its All About Data Protection
- Business Reasons for Data Protection
- Mitigating Risk
- Data availability
- Internal/external security
- Regulatory compliance
- Mitigating Risk
- Reducing Costs
- Downtime costs
- Electronic discovery
- Security breaches
- Data classification
- Business Reasons for Data Protection
- Improving Service Levels
- Technical Reasons for Data Protection
- Device Issues
- Disk failures
- Tape media wear, stolen/misplaced tapes
- Networked storage risks
- Device Issues
- External Threats
- Viruses
- Worms
- Trojan horses
- Accidental deletion
- Intentional deletion
- Backup and Archive
- What Needs to Be Backed Up?
- What Needs to Be Archived?
- Examples of Backup and Archive
- Can Open-Source Backup Do the Job?
- Very Active Filesystems
- Very Large Filesystems
- Filesystems with Too Many Files
- Information Stored in Databases
- Information Stored on Shared Storage
- SAN-based filesystems
- NAS-based filesystems
- Disaster Recovery
- Everything Starts with the Business
- Define the Core Competency of the Organization
- Prioritize the Business Functions Necessary to Continue the Core Competency
- Correlate Each System to a Business Function, and Prioritize
- Define RPO and RTO for Each Critical System
- Create Consistency Groups
- Determine for Each Critical System What to Protect from
- Determine the Costs of an Outage
- Plan for All Types of Disasters
- Prepare for Cost Justification
- Storage Security
- Plain-Text Communication
- Poor Authentication and Authorization Systems
- Backup Flaws
- Conclusion
- Index
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
This concise yet comprehensive guide explains how to adopt a data lakehouse architecture to implement modern data platforms. It reviews the design considerations, challenges, and best practices for implementing a lakehouse and provides key insights into the ways that using a lakehouse can impact ...(193.69 zł najniższa cena z 30 dni)
193.19 zł
249.00 zł(-22%) -
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use PowerApps, Microsoft's no-code/low-code application framework that helps developer...(162.47 zł najniższa cena z 30 dni)
162.27 zł
209.00 zł(-22%) -
Welcome to the systems age, where software professionals are no longer building software&emdash;we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need t...(152.21 zł najniższa cena z 30 dni)
152.01 zł
209.00 zł(-27%) -
This book provides an ideal guide for Python developers who want to learn how to build applications with large language models. Authors Olivier Caelen and Marie-Alice Blete cover the main features and benefits of GPT-4 and GPT-3.5 models and explain how they work. You'll also get a step-by-step g...(155.41 zł najniższa cena z 30 dni)
155.36 zł
209.00 zł(-26%) -
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain—Kubernetes, c...(212.59 zł najniższa cena z 30 dni)
212.39 zł
279.00 zł(-24%) -
Geared to intermediate- to advanced-level DBAs and IT professionals looking to enhance their MySQL skills, this guide provides a comprehensive overview on how to manage and optimize MySQL databases. You'll learn how to create databases and implement backup and recovery, security configurations, h...(221.43 zł najniższa cena z 30 dni)
221.33 zł
279.00 zł(-21%) -
Get the details, examples, and best practices you need to build generative AI applications, services, and solutions using the power of Azure OpenAI Service. With this comprehensive guide, Microsoft AI specialist Adrián González Sánchez examines the integration and utilization of Az...(162.23 zł najniższa cena z 30 dni)
162.18 zł
209.00 zł(-22%) -
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 hand...(214.77 zł najniższa cena z 30 dni)
214.57 zł
239.00 zł(-10%) -
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(189.29 zł najniższa cena z 30 dni)
188.79 zł
239.00 zł(-21%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(227.19 zł najniższa cena z 30 dni)
227.14 zł
279.00 zł(-19%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Backup & Recovery. Inexpensive Backup Solutions for Open Systems W. Curtis Preston (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.