Security Correlation Server Redundancy And Failover Guide

Size: px
Start display at page:

Download "Security Correlation Server Redundancy And Failover Guide"

Transcription

1 CorreLog Security Correlation Server Redundancy And Failover Guide This document provides a discussion of techniques to implement CorreLog Server redundancy and failover, for high-availability usage of the system. The information presented here will be useful to administrators responsible for maintaining the CorreLog system, as well as backup operators, developers, and IT managers, with application in disaster recovery and other areas. CorrreLog Server provides various options to provide high availability of the system. These options range from implementation of CorreLog in a Microsoft Cluster, to simpler options where data and configuration is kept synchronized using several built-in techniques of the server architecture. These features and configuration activities are described here, to permit easy integration with existing backup software and enterprise operations, and to assist sites in the considerations and options necessary to support failover requirements.

2 Redundancy Using Microsoft Clustering CorreLog Server, as a windows application, is completely agreeable to implementation within a Microsoft Cluster Server. For those sites with clustering capability, two or more copies of CorreLog Server can be installed on clustered servers employing failover and load balancing to both extend the capacity, and increase the reliability of the CorreLog implementation. As a first step in evaluating failover and redundancy requirements, organizations should consider the cost and implementation trade-offs of simply deploying CorreLog in a clustered environment. Microsoft Clustering, in addition to increasing reliability and availability, has important implications in scalability issues. However, Microsoft Clustering can be a highly expensive proposition, with steep implementation and maintenance costs, which may make this approach undesirable for small or even medium sized organizations. Further information on Clustering, Windows Failover Clustering, and Component Load Balancing is available directly from Microsoft. Redundancy and Failover Guide, Page 2

3 Redundancy Using Multiple Syslog Destinations At Agent The most basic type of redundancy can achieved in the special case where syslog sources (such as CorreLog Windows Agents) can be configured to have multiple destination addresses. This type of redundancy simply has each syslog source forward the data to two different addresses. This requires that syslog sources can be configured to send data to more than one syslog receiver / client (which may not always be the case.) For those sites that are using the CorreLog Windows and UNIX agents, the user configures the agent "AuxAddress" value (in the agent configuration file) so that syslog data is sent to two different servers. As shown above, both servers receive the same data. Using this technique, the two different servers can be in different data centers, and one server can be optionally designated as the "Master" server. All data is reflected in both servers, so that no data is lost. This type of configuration is especially suitable for Disaster Recovery situations, where a disaster at one data center does not affect the security posture of another data center, and all log data is completely recoverable (since the data is reflected at a completely different site.) Redundancy and Failover Guide, Page 3

4 Redundancy Using Single Forwarding At CorreLog Server At many sites, it will be sufficient to provide elemental redundancy and failover to assist with high-availability execution of the program, without the expense of Microsoft Clustering, such as by simply forwarding information to a "hot backup" system as described here. 1. The user configures a "Relay" type forward on the "Messages > Config > Forwarding" screen. This is sufficient to forward all messages from one CorreLog Server to a backup server, preserving the device names that appear in the original CorreLog Server. 2. As an additional step, the user can implement a "Scheduler" program in the Backup Server, which periodically pulls all the configuration data from the main server, preserving any changes to the main server. (This is documented in the next section.) This technique is depicted below. As shown above, "CorreLog Server "A" receives all the messages on the network, and immediately forwards these messages to a second server. Additionally, a scheduled program on CorreLog Server "B" periodically pulls configuration data from the main server and installs this in the backup server. Redundancy and Failover Guide, Page 4

5 Redundancy Using Cross Forwarding A site can easily achieve redundancy, where two CorreLog servers both reflect the same message information and configuration data, by having each of two CorreLog Servers forward messages between themselves. This type of operation is depicted below: As shown above, each CorreLog server receives data from its own message sources. The messages appear in both CorreLog servers. Each server contains specific elements to insure that messages forwarded to a CorreLog server are not immediately forwarded back (creating a loop.) The above diagram can be used to keep all the messages in both servers synchronized, so that any message arriving to either server is immediately reflected in the other server. This particular implementation has application in both load balancing and redundancy. Redundancy and Failover Guide, Page 5

6 Synchronizing Configuration Data via HTTP Using the above technique, messages are stored in a separate server, which can be quickly switched (through manual methods) for the main server in the case of disastrous hardware failure. In addition to backing up the main server message data, one CorreLog server can pull the configuration data from a backup server using HTTP and a simple utility such as the "wget.exe" program. This allows changes, made at a primary server, to be replicated in a backup server, further safeguarding the configuration of the server, preserving the current management strategy of the organization. The steps needed to accomplish this are as follows: 1. The user configures the HTTP server of the main CorreLog platform to allow access to the "C:\CorreLog\config" directory. The following is added to the standard HTTP configuration file residing in the "CorreLog\apache\srm.conf" file of the installation: Alias /config "C:/CorreLog/config/" The pathname C:/CorreLog/config" may be substituted with the actual location of the CorreLog configuration file. After making the above change at the main CorreLog platform, the CorreLog services must be stopped and restarted for the change to take affect. 2. The user obtains the "wget.exe" program (available in the public domain) and copies this program to the "system" directory of the backup CorreLog Server. (This freely distributed utility is available from a number of different sources on the web.) 3. The user creates the "HTTP_SYNC_CONFIG.bat" batch file program to pull configuration data from the primary machine. An example of this batch file (suitable for cut and paste to a file) is provided below. The batch file is placed in the "system" directory of the backup CorreLog Server. 4. The user accesses the CorreLog "System > Schedule" screen, and adds the HTTP_SYNC_CONFIG.bat file as a program that is executed each hour. The above steps are sufficient to periodically fetch (at the start of each hour) any configuration changes that have been made to the main CorreLog Server, and copy these changes to the backup server. Redundancy and Failover Guide, Page 6

7 An Example HTTP Sync Config File The actual batch file, which copies configuration data from the main CorreLog Server to the backup server (referenced in steps 3 & 4 above) can take many forms. The actual batch file depends upon which files are required for redundancy, and which utility the user has selected for web access. If the site is using "wget.exe" to get the configuration data, a batch file suitable for use is available below, which may be cut and pasted to the HTTP_SYNC_CONFIG.bat file for immediate OFF REM: # HTTP_SYNC_CONFIG.bat REM: # Copy configuration files from a remote CorreLog server to the REM: # local CorreLog server using the external "wget.exe" utility. REM: # This script uses the "wget.exe" utility, in the system directory REM: # of this CorreLog installation, to copy and install configuration REM: # data of a remote CorreLog server, thereby syncronizing this REM: # server's configuration with another server. REM: # At the remote server, the "apache\conf\srm.conf" file should REM: # be modified to contain the following directive, to permit HTTP REM: # access to the remote configuation data: (Substitute the value REM: # of "C:/CorreLog/config" with the actual pathname of the CorreLog REM: # config folder.) REM: # Alias /config "C:/CorreLog/config/" REM: # Set the value of the primary CorreLog Server below: set SVR=remote-server-name REM: # The remainder of the script file does not need to be modified. REM: # Create a temporary directory to hold the files, and make sure REM: # this temporary directory is empty. if not exist wgettmp mkdir wgettmp del /q /f /s wgettmp REM: # Execute the wget command for each remote config file. On a bad REM: # status indication, bypass further processing by jumping to the REM: # handle_error routine. wget -q wget -q -O wgettmp/actions.new -O wgettmp/alerts.new Redundancy and Failover Guide, Page 7

8 wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q -O wgettmp/alertd.new -O wgettmp/calerts.new -O wgettmp/color.cnf -O wgettmp/devgrp.new -O wgettmp/devinfo.cnf -O wgettmp/excel.cnf -O wgettmp/facdef.cnf -O wgettmp/filt.new -O wgettmp/file.cnf -O wgettmp/fmula.new -O wgettmp/ipadd.new -O wgettmp/latch.new -O wgettmp/learn.cnf -O wgettmp/macros.new -O wgettmp/muekey.new -O wgettmp/muexcl.new -O wgettmp/muser.new -O wgettmp/mumask.new Redundancy and Failover Guide, Page 8

9 wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q wget -q -O wgettmp/otext.new -O wgettmp/pass.cnf -O wgettmp/passx.cnf -O wgettmp/patts.new -O wgettmp/pivot.cnf -O wgettmp/pivparm.cnf -O wgettmp/rss.cnf -O wgettmp/sever.new -O wgettmp/slparms.cnf -O wgettmp/smtp.cnf -O wgettmp/sparms.cnf wget -q -O wgettmp/t-actions.new wget -q wget -q -O wgettmp/threads.new -O wgettmp/ticparm.cnf REM: # All the files were successfully fetched. Copy the files from REM: # The "wgettmp" folder to the actual configuration folder. This REM: # is sufficient to install the configuration data at this site. REM: # when finished, send a syslog message and exit. copy /y.\wgettmp\*..\config sendlog.exe %SVR% "HTTP_SYNC_CONFIGbat - Files synchronized." 6 5 goto exit Redundancy and Failover Guide, Page 9

10 :handle_error REM: # An error was encountered. The "wget.exe" program returned a REM: # bad status when getting files. The remote server may be down REM: # or otherwise misconfigured. The batch file can be manually REM: # executed at a command prompt with ECHO ON in order to determine REM: # the error. REM: # Send a syslog message to indicate the error condition and exit. sendlog.exe %SVR% "HTTP_SYNC_CONFIG.bat Errors Detected. Bypassed." 3 5 :exit REM: # Normal exit. The above batch file can be cut and paste into a file, and the "wget.exe" program installed in the system directory, to periodically pull configuration data from one CorreLog Server to another. Redundancy and Failover Guide, Page 10

11 Alternate HTTP Sync Capability Using Backup and Restore The above script is useful if a failover box is to be synced with configuration changes, but the above script does not necessarily copy over ALL configuration data that may exist on the remote system. For example, the above script does not replicate dashboards, user preferences, and reports. As an alternative, a system can be configured where the "Master" CorreLog server generates a backup (using the "Remote Backup" capability documented in the "CorreLog Backup and Recovery Guide".) REM: # SYNC_FULL_BACKUP.bat REM: # Fetch, and install remote data via HTTP and ZIP. REM: # See "CorreLog Backup and Recovery Manual" for a REM: # working example of the R-BACKUP.bat file below. REM: # Location of the main CorreLog Server set MAIN_SERVER=main-correlog-server REM: # Generate the BACKUP.zip via the R-BACKUP.bat file. REM: # This script must be configured on the remote system REM: # including adjustments to the "x-cgi\htaccess.txt" REM: # file to limit and permit access. del /f BACKUP.log wget -q -O BACKUP.log REM: # Now fetch the BACKUP.zip to the local directory. del /f BACKUP.zip wget -q REM: # Stop the local CorreLog Server, unzip files, and restart REM: # The correlog server. net stop correlog unzip -o BACKUP.zip -d../ net start correlog REM: # Finished: Data was synchronized. The above file can be cut and paste to the "system" directory, and executed at midnight each night to perform a full sync of data from a primary machine to a backup machine. The script can be used in conjunction with (or as a replacement for) the HTTP_SYNC_CONFIG.bat file discussed previously. Redundancy and Failover Guide, Page 11

12 Dedicated Service Link It is important to note that, for the schemes described above, it will be useful (but not always necessary) to employ a dedicated, and isolated network connection between the two CorreLog Servers. Although this may require extra NIC hardware and a cable, this keeps message traffic (which may be voluminous) off of the main service network, preventing any degradation of bandwidth due to the extra message traffic. During configuration of the failover system, communications between the two servers can exist through an isolated network, with different network interface numbers and IP addresses. No special consideration exists in the configuration; the administrator simply sends information to the appropriate interface card of the backup CorreLog Server, configuring the forwarding address to be the address associated with the secondary network interface card. The decision whether to implement a separate network for the backup traffic will be made based upon the capacity of the primary NIC, and other bandwidth considerations. Note that, if the organization elects NOT to use a separate service network, the nature of UDP may cause excessive collisions if messages are received and immediately forwarded from the same network card. Given the low cost of network interface hardware and cabling, this small investment can preclude large problems with network message congestion, and should be considered carefully. Redundancy and Failover Guide, Page 12

13 Auto-Detection Of Failover As part of the CorreLog failover strategy, the user may wish to automatically detect the failover condition. This technique can be implemented using a simple "heartbeat" mechanism, installed as part of the CorreLog "Custom Alert" facility (or potentially other alternate locations.) For example, on the backup CorreLog server, a custom alert script (configured via the "Alerts > Custom" screen) can be configured as follows: 1. Every 30 seconds, the backup server pings the primary CorreLog server to determine its state (either online and responding to ping requests, or offline.) This is accomplished via the configuration of a simple "Custom Alert" script. (See notes below.) 2. If the ping returns an offline status, the backup server enables ticket actions to be performed on the backup server, such as notifications. 3. When the ping returns an online status, the backup server can indicate this shut off its notification interface, preventing further notifications from the backup server. An example of a custom alert script, capable of performing the actions described above, is included below. The user can cut and paste this to the "CorreLog\c-alert" directory, and then configure this script for execution via the "Alerts > Custom" tab of CorreLog. The script provided below provides an elemental example of how one copy of CorreLog can manage another copy, and assume the duties of the second copy of CorreLog. This technique can be further generalized to perform other actions (when the primary server fails) such as performing corrective action, or even assuming the IP address of the main CorreLog Server. Redundancy and Failover Guide, Page 13

14 @ECHO OFF REM: # Ping the primary IP address. If the ping fails, REM: # enable ticket notifications. REM: # This is the IP address of the main CorreLog Server SET IP_ADDRESS= REM: Ping the main address. SET COUNT=0 PING.exe %IP_ADDRESS% FIND /C "timed out" >..\temp\ping.tmp SET /P COUNT=<..\temp\ping.tmp DEL..\temp\ping.tmp IF NOT %COUNT% == 4 GOTO STATUS_OKAY REM: # Main CorreLog Server IP address is not responding. REM: # Enable ticket actions ECHO master_enable Enabled >..\config\ticparm.cnf ECHO _per_minute 20 >>..\config\ticparm.cnf ECHO hdesk_per_minute 20 >>..\config\ticparm.cnf ECHO epo_per_minute 10 >>..\config\ticparm.cnf ECHO throttle_sev warning >>..\config\ticparm.cnf ECHO auto_close_dupl Disabled >>..\config\ticparm.cnf ECHO Failover Exists. Switchover complete. GOTO EXIT :STATUS_OKAY REM: # The Main CorreLog Server IP Address is responding. REM: # Disable further ticket actions. ECHO master_enable Disabled >..\config\ticparm.cnf ECHO _per_minute 20 >>..\config\ticparm.cnf ECHO hdesk_per_minute 20 >>..\config\ticparm.cnf ECHO epo_per_minute 10 >>..\config\ticparm.cnf ECHO throttle_sev warning >>..\config\ticparm.cnf ECHO auto_close_dupl Disabled >>..\config\ticparm.cnf ECHO Ping Successful. :EXIT Redundancy and Failover Guide, Page 14

15 Professional Services CorreLog, Inc. provides professional services to assist in all phases of deployment activities, and assists with all deployment and operational issues through its support division. Prior to deploying CorreLog Server (whether a small single-tier deployment or a large multi-tier deployment) licensed users are encouraged to contact CorreLog for a detailed discussion of options and capabilities. Further information on installation is available from the "Home" page of each CorreLog installation, and is contained in the comprehensive documentation accompanying the product. Refer to the "Installation and Quick Start Guide" for additional information For Additional Help Detailed specifications regarding the CorreLog Server, add-on components, and resources are available from our corporate website. Test software may be downloaded for immediate evaluation. Additionally, CorreLog is pleased to support proof-ofconcepts, and provide technology proposals and demonstrations on request. CorreLog, Inc., a privately held corporation, has produced software and framework components used successfully by hundreds of government and private operations worldwide. We deliver security information and event management (SIEM) software, combined with deep correlation functions, and advanced security solutions. CorreLog markets its solutions directly and through partners. We are committed to advancing and redefining the state-of-art of system management, using open and standards-based protocols and methods. Visit our website today for more information. CorreLog, Inc. mailto:support@correlog.com Redundancy and Failover Guide, Page 15

Security Correlation Server Backup and Recovery Guide

Security Correlation Server Backup and Recovery Guide CorreLog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog

More information

Security Correlation Server System Deployment and Planning Guide

Security Correlation Server System Deployment and Planning Guide CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices

More information

CorreLog. Ping Monitor Adapter Software Users Manual

CorreLog. Ping Monitor Adapter Software Users Manual CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part

More information

White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo)

White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) orrelogtm White Paper Integrating The CorreLog Security Correlation Server with McAfee epolicy Orchestrator (epo) This white paper provides a detailed discussion of objectives and methodologies for integrating

More information

CorreLog. SNMP Trap Monitor Software Users Manual

CorreLog. SNMP Trap Monitor Software Users Manual CorreLog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No

More information

CorreLog. SQL Table Monitor Adapter Users Manual

CorreLog. SQL Table Monitor Adapter Users Manual CorreLog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved. No

More information

CorreLog. LDAP Interface Software Toolkit Users Manual

CorreLog. LDAP Interface Software Toolkit Users Manual CorreLog LDAP Interface Software Toolkit Users Manual http://www.correlog.com mailto:support@correlog.com CorreLog, LDAP Interface Software Toolkit Manual Copyright 2008-2018, CorreLog, Inc. All rights

More information

CorreLog IP Block List and Reputation Database Application Notes

CorreLog IP Block List and Reputation Database Application Notes CorreLog IP Block List and Reputation Database Application Notes As a standard feature of the CorreLog Server software, CorreLog Inc. synthesizes and maintains a robust list of IP address subnets with

More information

Technical Response Logging and Monitoring Requirements December 23, 2010

Technical Response Logging and Monitoring Requirements December 23, 2010 Technical Response Logging and Monitoring Requirements December 23, 2010 This technical response documents the capabilities of CorreLog, Inc., Logging and Monitoring Summary and Recommendations. A high-level

More information

High Availability for Oracle 8i Using Double-Take

High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take High Availability for Oracle 8i Using Double-Take Revision number 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

Arcserve Replication and High Availability

Arcserve Replication and High Availability Arcserve Replication and High Availability Microsoft SQL Server Operation Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

WANSyncHA Microsoft Exchange Server. Operations Guide

WANSyncHA Microsoft Exchange Server. Operations Guide WANSyncHA Microsoft Exchange Server Operations Guide About This Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user

More information

Carbonite Availability. Technical overview

Carbonite Availability. Technical overview Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably

More information

VERITAS Volume Replicator Successful Replication and Disaster Recovery

VERITAS Volume Replicator Successful Replication and Disaster Recovery VERITAS Replicator Successful Replication and Disaster Recovery Introduction Companies today rely to an unprecedented extent on online, frequently accessed, constantly changing data to run their businesses.

More information

GR Reference Models. GR Reference Models. Without Session Replication

GR Reference Models. GR Reference Models. Without Session Replication , page 1 Advantages and Disadvantages of GR Models, page 6 SPR/Balance Considerations, page 7 Data Synchronization, page 8 CPS GR Dimensions, page 9 Network Diagrams, page 12 The CPS solution stores session

More information

Common Management Database Database Definition & User Guide

Common Management Database Database Definition & User Guide orrelog Common Management Database Database Definition & User Guide This guide provides brief information on the tables accompanying the Common Management Database (CMDB) Adapter of the CorreLog Server.

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002 Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network

More information

High Availability for Oracle 9i Using Double-Take

High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take High Availability for Oracle 9i Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists,

More information

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Multinode Scalability and WAN Deployments

Multinode Scalability and WAN Deployments Multinode Scalability Feature, page 1 Cluster-Wide DNS SRV, page 3 Local Failover, page 3 Subcluster Failure Detection, page 3 Method Event Routing, page 4 External Database Recommendations, page 4 Clustering

More information

orrelog File Integrity Monitor (FIM) User Reference Manual

orrelog File Integrity Monitor (FIM) User Reference Manual orrelog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com Section 1: Introduction This document contains installation and application notes regarding the

More information

Office and Express Print Release High Availability Setup Guide

Office and Express Print Release High Availability Setup Guide Office and Express Print Release High Availability Setup Guide Version 1.0 2017 EQ-HA-DCE-20170512 Print Release High Availability Setup Guide Document Revision History Revision Date May 12, 2017 September

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

Virtual protection gets real

Virtual protection gets real Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce

More information

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4 Configure Failover 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners. TC:1/4/2019

More information

HP StoreVirtual Storage Multi-Site Configuration Guide

HP StoreVirtual Storage Multi-Site Configuration Guide HP StoreVirtual Storage Multi-Site Configuration Guide Abstract This guide contains detailed instructions for designing and implementing the Multi-Site SAN features of the LeftHand OS. The Multi-Site SAN

More information

Configuring Failover

Configuring Failover Configuring Failover 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

CorreLog. File Integrity Monitor (FIM) User Reference Manual

CorreLog. File Integrity Monitor (FIM) User Reference Manual CorreLog File Integrity Monitor (FIM) User Reference Manual http://www.correlog.com mailto:info@correlog.com CorreLog FIM, User Reference Manual Copyright 2008-2018, CorreLog, Inc. All rights reserved.

More information

Replication. Version

Replication. Version Replication Version 2018.3 Contents Before you start... 3 Principles... 4 Prerequisites... 5 Initial Steps... 6 Post Setup... 7 Supported Operating Systems... 7 Perform the Setup... 8 Read Committed Snapshot

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...

More information

Configuring ApplicationHA in VMware SRM 5.1 environment

Configuring ApplicationHA in VMware SRM 5.1 environment Configuring ApplicationHA in VMware SRM 5.1 environment Windows Server 2003 and 2003 R2, Windows Server 2008 and 2008 R2 6.0 September 2013 Contents Chapter 1 About the ApplicationHA support for VMware

More information

Failover Configuration Bomgar Privileged Access

Failover Configuration Bomgar Privileged Access Failover Configuration Bomgar Privileged Access 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Intellicus Cluster and Load Balancing- Linux. Version: 18.1

Intellicus Cluster and Load Balancing- Linux. Version: 18.1 Intellicus Cluster and Load Balancing- Linux Version: 18.1 1 Copyright 2018 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not

More information

Privileged Remote Access Failover Configuration

Privileged Remote Access Failover Configuration Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of

More information

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3 Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and

More information

Designing Data Protection Strategies for Lotus Domino

Designing Data Protection Strategies for Lotus Domino WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 9.0 for Windows Servers Agent for Lotus Domino VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3

More information

Configure DHCP for Failover Step-by-Step.

Configure DHCP for Failover Step-by-Step. Configure DHCP for Failover Step-by-Step https://technet.microsoft.com/en-us/library/hh831385.aspx Dynamic Host Configuration Protocol (DHCP) failover in Windows Server 2012 is a new method for ensuring

More information

Configuring Network Load Balancing

Configuring Network Load Balancing Configuring Network Load Balancing LESSON 1 70-412 EXAM OBJECTIVE Objective 1.1 Configure Network Load Balancing (NLB). This objective may include but is not limited to: Install NLB nodes; configure NLB

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v Administration Guide

SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v Administration Guide SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v8.0.1 Administration Guide March 2014 This document and the information herein is the property of SIOS Technology

More information

orrelog McAfee epolicy Orchestrator (epo) Adapter Software Installation And Users Manual

orrelog McAfee epolicy Orchestrator (epo) Adapter Software Installation And Users Manual orrelog McAfee epolicy Orchestrator (epo) Adapter Software Installation And Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, epo Adapter Users Manual Copyright 2008-2015, CorreLog,

More information

version 5.4 Installation Guide

version 5.4 Installation Guide version 5.4 Installation Guide Document Release Date: February 9, 2012 www.phdvirtual.com Legal Notices PHD Virtual Backup for Citrix XenServer Installation Guide Copyright 2010-2012 PHD Virtual Technologies

More information

Replication Solutions with Open-E Data Storage Server (DSS) April 2009

Replication Solutions with Open-E Data Storage Server (DSS) April 2009 Replication Solutions with Open-E Data Storage Server (DSS) April 2009 Replication Solutions Supported by Open-E DSS Replication Mode s Synchronou Asynchronou us Source/Destination Data Transfer Volume

More information

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES

More information

8x8 Virtual Office Government

8x8 Virtual Office Government Brochure 8x8 Virtual Office Government Fully Integrated Hosted IP PBX for Government Hosted IP PBX solutions are quickly becoming the preferred choice for government agencies seeking cost-effective ways

More information

DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS

DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS WHITE PAPER DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS Maximize the efficiency of multiple network interfaces Abstract Dell EMC delivers dynamic interface groups to simplify the use of multiple

More information

Set Up Cisco ISE in a Distributed Environment

Set Up Cisco ISE in a Distributed Environment Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy

More information

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Benefits. Introduction. Best-in-class offering. Easy-to-use Backup and Recovery solution DeltaV Distributed Control System Product Data Sheet Backup and Recovery Best-in-class offering Easy-to-use Backup and Recovery solution Data protection and disaster recovery in a single solution Scalable

More information

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0 ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Guidelines for Using MySQL with Double-Take

Guidelines for Using MySQL with Double-Take Guidelines for Using MySQL with Double-Take Guidelines for Using MySQL with Double-Take Revision 1.0.0 published September 2007 Double-Take, GeoCluster, and NSI are registered trademarks of Double-Take

More information

Set Up Cisco ISE in a Distributed Environment

Set Up Cisco ISE in a Distributed Environment Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Failover Solutions with Open-E Data Storage Server (DSS V6)

Failover Solutions with Open-E Data Storage Server (DSS V6) Failover Solutions with Open-E Data Storage Server (DSS V6) Software Version: DSS ver. 6.00 up85 Presentation updated: September 2011 Failover Solutions Supported by Open-E DSS Open-E DSS supports two

More information

Lesson Objectives. Benefits of Using DPM. After completing this lesson, you will be able to:

Lesson Objectives. Benefits of Using DPM. After completing this lesson, you will be able to: Protecting Virtualization Infrastructure by Using DPM Building a robust protection solution for your virtualization infrastructure is as import ant as building the solution itself. This lesson provides

More information

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012

SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments. Last Updated: May 23, 2012 SAS 9.2 Enterprise Business Intelligence Audit and Performance Measurement for Windows Environments Last Updated: May 23, 2012 Copyright Notice The correct bibliographic citation for this manual is as

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

Seagate Info Architecture Planning and Deployment for ASPs

Seagate Info Architecture Planning and Deployment for ASPs Seagate Info Architecture Planning and Deployment for ASPs Overview Contents This document is a guide to help customers prepare for their implementation of Seagate Info. It helps you to successfully implement

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

Installation Guide Worksoft Certify Execution Suite

Installation Guide Worksoft Certify Execution Suite Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version

More information

Virtualization And High Availability. Howard Chow Microsoft MVP

Virtualization And High Availability. Howard Chow Microsoft MVP Virtualization And High Availability Howard Chow Microsoft MVP Session Objectives And Agenda Virtualization and High Availability Types of high availability enabled by virtualization Enabling a highly

More information

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008 Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008 Windows Server 2003 Windows Server 2008 5.1 Application Pack 1 Veritas Storage Foundation

More information

Configuring VIP and Virtual Interface Redundancy

Configuring VIP and Virtual Interface Redundancy CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this

More information

Table of Contents [ClusterReplica SQL v2.1 User Manual]

Table of Contents [ClusterReplica SQL v2.1 User Manual] i Table of Contents [ClusterReplica SQL v2.1 User Manual] CHAPTER 1...1 Introduction... 1 1.1 What is ClusterReplica MSSQL Edition...1 1.2 Who is ClusterReplica MSSQL Edition Designed For...1 1.3 How Does

More information

Hitless Failover and Hitless Upgrade User Guide

Hitless Failover and Hitless Upgrade User Guide Hitless Failover and Hitless Upgrade User Guide This guide describes hitless failover and hitless upgrade, including: Causes and Behaviors of MSM Failover on page 1 Summary of Supported Features on page

More information

OL Connect Backup licenses

OL Connect Backup licenses OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers

More information

High Availability for Lotus Domino Using Double-Take

High Availability for Lotus Domino Using Double-Take High Availability for Lotus Domino Using Double-Take High Availability for Lotus Domino Using Double-Take Revision 2.0.0 published July 2003 NSI and Double-Take are registered trademarks of Network Specialists

More information

CA ARCserve Replication and High Availability

CA ARCserve Replication and High Availability CA ARCserve Replication and High Availability Virtualized Server Environments Operation Guide for Windows r16 This Documentation, which includes embedded help systems and electronically distributed materials,

More information

Creating a Multi-data Center (MDC) System

Creating a Multi-data Center (MDC) System , page 1 About Multi-data Centers The Multi-data Center (MDC) licensed feature is available in version 2.5 and higher. It allows two CWMS systems to be joined into a single MDC system. One license must

More information

Designing Data Protection Strategies for Lotus Domino

Designing Data Protection Strategies for Lotus Domino WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 10 for Windows Servers Agent for Lotus Domino 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Introduction to Lotus

More information

M20742-Identity with Windows Server 2016

M20742-Identity with Windows Server 2016 M20742-Identity with Windows Server 2016 Course Number: M20742 Category: Technical Microsoft Duration: 5 days Certification: 70-742 Overview This five-day instructor-led course teaches IT Pros how to deploy

More information

Implementing an Advanced Server Infrastructure

Implementing an Advanced Server Infrastructure Implementing an Advanced Server Infrastructure Course 20414C 5 Days Instructor-led, Hands-on Introduction Get hands-on instruction and practice planning, designing and deploying a physical and logical

More information

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version : HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Virtualized Server Environments Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to

More information

MSMQ-MQSeries Bridge Configuration Guide White Paper

MSMQ-MQSeries Bridge Configuration Guide White Paper MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...

More information

Alfresco 2.1. Backup and High Availability Guide

Alfresco 2.1. Backup and High Availability Guide Copyright (c) 2007 by Alfresco and others. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic

More information

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as

More information

Using Double-Take in a Network Address Translation (NAT) Environment

Using Double-Take in a Network Address Translation (NAT) Environment Using Double-Take in a Network Address Translation (NAT) Environment Using Double-Take in a Network Address Translation (NAT) Environment published October 2002 NSI and Double-Take are registered trademarks

More information

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Upgrading to Parallels Virtuozzo Containers 4.0 for Windows. Contents. About This Document

Upgrading to Parallels Virtuozzo Containers 4.0 for Windows. Contents. About This Document Upgrading to Parallels Virtuozzo Containers 4.0 for Windows About This Document This document familiarizes you with the way to upgrade the following versions of the Virtuozzo for Windows software to Parallels

More information

Veritas NetBackup Read This First Guide for Secure Communications

Veritas NetBackup Read This First Guide for Secure Communications Veritas NetBackup Read This First Guide for Secure Communications Contents... 3 NetBackup Read This First for Secure Communications... 3 About secure communications in NetBackup... 3 How host ID-based

More information

Copyri g h t 2012 OSIso f t, LLC. 1

Copyri g h t 2012 OSIso f t, LLC. 1 1 Architecture and Best Practices (Recommendation for PI Systems) Presented by John Daniels Customer Support Engineer Agenda PI System High Availability PI Server level (such as PI Server HA, AF HA, PI

More information

White Paper. How to select a cloud disaster recovery method that meets your requirements.

White Paper. How to select a cloud disaster recovery method that meets your requirements. How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page

More information

StarWind iscsi Target for Microsoft Windows: StarWind and Double-Take

StarWind iscsi Target for Microsoft Windows: StarWind and Double-Take Rocket Division Software Technical Reference Series StarWind iscsi Target for Microsoft Windows: StarWind and Double-Take May 1, 2007 Rocket Division Software www.rocketdivision.com Copyright Rocket Division

More information

Failover Clustering failover node cluster-aware virtual server one

Failover Clustering failover node cluster-aware virtual server one Failover Clustering Microsoft Cluster Service (MSCS) is available for installation on Windows 2000 Advanced Server, Windows 2000 Datacenter Server, and Windows NT Enterprise Edition with Service Pack 5

More information

High Availability Deployment

High Availability Deployment April 18, 2005 Overview Introduction This addendum provides connectivity and configuration task overviews for connecting two M appliances as a high availability (HA) cluster pair. For detailed configuration

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

20742: Identity with Windows Server 2016

20742: Identity with Windows Server 2016 Course Content Course Description: This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement

More information

Synology High Availability (SHA)

Synology High Availability (SHA) Synology High Availability (SHA) Based on DSM 5.1 Synology Inc. Synology_SHAWP_ 20141106 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability

More information

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring

More information

Identity with Windows Server 2016

Identity with Windows Server 2016 Identity with Windows Server 2016 Course 20742B - 5 Days - Instructor-led, Hands on Introduction This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes

More information

Brocade Virtual Traffic Manager and Parallels Remote Application Server

Brocade Virtual Traffic Manager and Parallels Remote Application Server White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4

More information

Microsoft Office SharePoint Server 2007

Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC

More information

Cisco TelePresence VCS Cluster Creation and Maintenance

Cisco TelePresence VCS Cluster Creation and Maintenance Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster

More information