Data Integrity in Stateful Services. Percona Live, Santa Clara, 2017
|
|
- Silvia Wilkinson
- 5 years ago
- Views:
Transcription
1 Data Integrity in Stateful Services Percona Live, Santa Clara, 2017
2 Data Integrity Bringing Sexy Back
3 Protect the Data. -Every DBA who doesn t want to be fired
4 Breaking Integrity Down Physical Integrity - Help, my data files are gone! Logical Integrity - Help, my s disappeared!
5 Data Integrity is the mission of the entire organization.
6 When to plan for integrity?
7 If you are planning for recovery after your application and infrastructure is built You re guarding a henhouse that already has a fox in it.
8 Goals for Integrity Elimination Empowerment Detection Flexibility
9 Elimination Where possible, eliminate the potential for corruption and data loss. Optimize for durability based on your user needs Understand Isolation Levels Consistency vs Availability Velocity Levers
10 Elimination Case Study: Jepsen and Galera Impacts and Ambiguities of Isolation Levels Dirty Read : Prohibited by RC, RR, 1SR Fuzzy (non-repeatable) Read: Prohibited by RR, 1SR Phantom: Prohibited by 1SR
11 Elimination Snapshot Isolation in Galera Prevents Dirty Writes, Dirty Reads, and Lost Updates, and some types of Phantoms As of 2015, Galera Documentation claimed snapshot isolation. Jepsen tests proved this was not true, First Committer Wins was disabled due to performance reasons. Galera s recommendation of using leader only does not take into account data loss during leader transitions
12 Empowerment Help people and systems to recover rapidly from their own mistakes. don t trust destructive requests soft deletes w/recovery API data versioning
13 Detection Early detection of corruption is as important as the ability to recover from it. unit and regression testing data validation pipelines tools for investigation
14 Detection Case Study: Data Validation Pipelines Each DB Constraint should have validation tests running constantly on sample datasets to ensure that they are being enforced. Constraints can be disabled. Applications should have expected isolation levels. Running transactions regularly to ensure expected behaviors should be done. Databases without constraints, particularly federated ones require more rigorous tests to be run.
15 Flexibility You cannot predict all of the ways you can lose data. Focus on flexibility in your toolbox. Tiered Storage Replication and Data Portability
16 What could go wrong? Famous Last Words
17 Planned Recovery Production deployments Environment duplication Downstream services (analytics, compliance) Operational tests
18 Unplanned Recovery Google estimates 24 combinations of data integrity failures possible Scope Category Impact
19 Scenario Scope Small: Localized or single instance in redundant scenarios. Small subset of data (1000 customers) Medium: Cluster-Wide or a full Zone A full dataset (all customers in a shard) Large: Multiple clusters, or a full DC Multiple datasets (full data loss, all customers across shards)
20 Scenario Impact Small: Some features impacted, non-slo threatening. Small subset of users impacted. Medium: SLO threatening. Moderate subset of users impacted. Large: SLO impacting, application down. Majority of users impacted.
21 Operator Error Data Deletion Data Corruption Relaxed Constraints Storage removal
22 Application Errors Removing pointers to assets in external storage Character set mutilation Duplication of data
23 Infrastructure Services Orchestration got frisky? Configuration management change some durability parameters? Proxies or DNS points to the wrong node?
24 OS and Hardware Errors Silent corruption due to failed ECC error checks? Filesystem corruption Data loss during a power down
25 Hardware Failures Disk Failures Memory Failures Controller Failures
26 Datacenter Failures Catastrophic power loss Wiped out storage Fires, catastrophic events
27 Anatomy of a Recovery Strategy
28 Building Block 1 Early Detection, Bad Data Propagates A culture of unit and regression testing Data validation test suite Example: Storing external media Tools and analytics to investigate errors
29 Building Block 2 Tiered Storage Fast, expensive storage for dataset portability Slow, inexpensive storage for long-term backups Long-term storage (tape, offsite) Object storage for versioning Distributed logs (i.e. Kafka) for versioning and events
30 Building Block 3 Toolbox Full and incremental online backups Full and incremental offline/long-term backups APIs for soft deletion/undeletion APIs for version rollback/play forward Producers for event streams to recreate objects
31 Building Block 4 Testing Daily use as testing - incorporate recovery into daily work Continuous testing of less-used recovery methods Regular game days - team scenario testing
32 Final Considerations
33 Data Integrity is cultural Design, Build, Test, Deploy - each stage is an opportunity to think about data integrity Checks and balances between teams keeps us honest and focused on the goal Data becomes too complex for one person or team to understand it. We must help each other.
34 Data Integrity Must be Continuous These processes are crucial and cannot be allowed to gather dust. Humans will not do this on their own, integration and automation is required. This must be put into project functional requirements.
35 You cannot plan for everything New and interesting things will occur that will challenge your plans. Flexibility and multiple options must be made available. Early detection is crucial for ensuring problems do not propagate out of control.
36 Good
37 Check out our book Laine Campbell and Charity Majors
Data Integrity in Stateful Services. Velocity, China, 2016
Data Integrity in Stateful Services Velocity, China, 2016 Data Integrity Bringing Sexy Back Protect the Data. -Every DBA who doesn t want to be fired Breaking Integrity Down Physical Integrity - Help,
More informationdatabase reliability engineering what. why. how. Percona Live, Dublin, 2017 Laine Campbell, Sr. Dir, Production Engineering, Fastly
database reliability engineering what. why. how. Percona Live, Dublin, 2017 Laine Campbell, Sr. Dir, Production Engineering, Fastly we made a book! yesterday s DBA gatekeeper master builder superhero siloed
More informationGoogle Cloud Whitepaper September Data deletion on Google Cloud Platform
Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion
More informationDatabase Engineering. Percona Live, Amsterdam, September, 2015
Database Engineering Percona Live, Amsterdam, 2015 September, 2015 engineering, not administration 2 yesterday s DBA gatekeeper master builder superhero siloed specialized 3 engineering quantitative interdisciplinary
More informationUsing MySQL for Distributed Database Architectures
Using MySQL for Distributed Database Architectures Peter Zaitsev CEO, Percona SCALE 16x, Pasadena, CA March 9, 2018 1 About Percona Solutions for your success with MySQL,MariaDB and MongoDB Support, Managed
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationWHITE PAPER: ENTERPRISE SOLUTIONS
WHITE PAPER: ENTERPRISE SOLUTIONS Integrating Network Appliance Snapshot and SnapRestore with Veritas NetBackup in an Oracle Backup Environment (Now from Symantec ) White Paper: Symantec Enterprise Solutions
More informationWhy Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard
Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.
More informationHow Microsoft Built MySQL, PostgreSQL and MariaDB for the Cloud. Santa Clara, California April 23th 25th, 2018
How Microsoft Built MySQL, PostgreSQL and MariaDB for the Cloud Santa Clara, California April 23th 25th, 2018 Azure Data Service Architecture Share Cluster with SQL DB Azure Infrastructure Services Azure
More informationInformation Systems. Data Protection Disaster recovery Backups
Information Systems Data Protection Disaster recovery Backups Data protection act 1998 - Rights The rights of data subjects People whose personal data is stored are called data subjects. The DPA sets uprights
More informationHadoop and HDFS Overview. Madhu Ankam
Hadoop and HDFS Overview Madhu Ankam Why Hadoop We are gathering more data than ever Examples of data : Server logs Web logs Financial transactions Analytics Emails and text messages Social media like
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationSTORAGECRAFT SHADOWPROTECT 5 DESKTOP
STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationReplication. Feb 10, 2016 CPSC 416
Replication Feb 10, 2016 CPSC 416 How d we get here? Failures & single systems; fault tolerance techniques added redundancy (ECC memory, RAID, etc.) Conceptually, ECC & RAID both put a master in front
More informationPhysical Storage Media
Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available
More informationPercona Software & Services Update
Percona Software & Services Update Q4 2016 Peter Zaitsev,CEO Percona Technical Webinars January 12, 2017 Why? Talking to Many Users and Customers Getting What have you been up to? Question This is a way
More informationPREPARING FOR DISASTER
PREPARING FOR DISASTER INTEGRATING BCDR PRINCIPLES INTO YOUR DEVOPS PRACTICE Jeremy Heffner SANS Secure DevOps Summit & Training October 2017 CODE SPACES Source: https://arstechnica.com/information-technology/2014/06/aws-console-breach-leads-to-demise-of-service-with-proven-backup-plan/
More informationMAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS
MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationBackUp Strategies. ApplePickers April 12, 2017
BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationDisaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop Info@RIAWorkSpace.com 877.361.3499 www.riaworkspace.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationECE Engineering Robust Server Software. Spring 2018
ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management
More informationArchitecting a Highly Available Infrastructure: An Overview SLN187. Mark Milow Mike DiPetrillo
Architecting a Highly Available Infrastructure: An Overview SLN187 Mark Milow Mike DiPetrillo Agenda Why? Solutions Q&A Quick Stats 2004 Gartner study found an average of $42,000 per hour of downtime Average
More informationAzure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft
Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer
More informationRisky Business. How Secure is Your Dealership s Information? By Robert Gibbs
I S S U E P A P E Risky Business By Robert Gibbs R 2 0 0 8 Risky Business Remember when information security meant locking your file cabinets at night? Unfortunately, those days are long gone. With the
More informationA Global In-memory Data System for MySQL Daniel Austin, PayPal Technical Staff
A Global In-memory Data System for MySQL Daniel Austin, PayPal Technical Staff Percona Live! MySQL Conference Santa Clara, April 12th, 2012 v1.3 Intro: Globalizing NDB Proposed Architecture What We Learned
More informationBuilding Durable Real-time Data Pipeline
Building Durable Real-time Data Pipeline Apache BookKeeper at Twitter @sijieg Twitter Background Layered Architecture Agenda Design Details Performance Scale @Twitter Q & A Publish-Subscribe Online services
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationSlashing Downtime from 24 Hours to 24 Minutes:
Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationDistributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju
Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale
More informationIntroduction to: The Architecture of the Internet
COMP 150-IDS: Internet Scale Distributed Systems (Spring 2016) Introduction to: The Architecture of the Internet Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationRELIABILITY & AVAILABILITY IN THE CLOUD
RELIABILITY & AVAILABILITY IN THE CLOUD A TWILIO PERSPECTIVE twilio.com To the leaders and engineers at Twilio, the cloud represents the promise of reliable, scalable infrastructure at a price that directly
More informationMySQL Backup Best Practices and Case Study:.IE Continuous Restore Process
MySQL Backup Best Practices and Case Study:.IE Continuous Restore Process Marcelo Altmann Senior Support Engineer - Percona Mick Begley Technical Service Manager - IE Domain Registry Agenda Agenda Why
More informationHow To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik
Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits
More informationDistributed Data Management Transactions
Felix Naumann F-2.03/F-2.04, Campus II Hasso Plattner Institut must ensure that interactions succeed consistently An OLTP Topic Motivation Most database interactions consist of multiple, coherent operations
More informationNext-Generation Cloud Platform
Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology
More informationIntroduction to: The Architecture of the Internet
COMP 117: Internet Scale Distributed Systems (Spring 2018) Introduction to: The Architecture of the Internet Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah
More informationWhite Paper BC/DR in the Cloud Era
BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to
More informationNetapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]
s@lm@n Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic
More informationDisaster Recovery Planning
Disaster Recovery Planning How to Ensure your IT systems are protected and your business keeps running should disaster strike. Benefits of Using Disaster Recovery as a Service DRaaS over Traditional Disaster
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationA Practical Guide to Cost-Effective Disaster Recovery Planning
White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the
More informationLast Class Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications
Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications Basic Timestamp Ordering Optimistic Concurrency Control Multi-Version Concurrency Control C. Faloutsos A. Pavlo Lecture#23:
More informationPercona XtraDB Cluster 5.7 Enhancements Performance, Security, and More
Percona XtraDB Cluster 5.7 Enhancements Performance, Security, and More Michael Coburn, Product Manager, PMM Percona Live Dublin 2017 1 Your Presenter Product Manager for PMM (Percona Monitoring and Management)
More informationSQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead
SQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead 1 Introduction Key features: -Shared nothing architecture -Log based replication -Support for full ACID properties -Consistency
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationAmazon AWS and RDS, moving towards it. Dimitri Vanoverbeke Solution Percona
Amazon AWS and RDS, moving towards it Dimitri Vanoverbeke Solution Engineer @ Percona Who am I? Solution engineer in Percona for almost 4 years Prior to Percona an open source system integrator MySQL,
More informationThis option lets you reset the password that you use to log in if you do not remember it. To change the password,
User s Guide Overview IDrive offers the most cost-effective BMR functionality with onsite disk image backup for SMBs. You can store entire data of hard disks including the operating system (OS) and application
More informationFive Common Myths About Scaling MySQL
WHITE PAPER Five Common Myths About Scaling MySQL Five Common Myths About Scaling MySQL In this age of data driven applications, the ability to rapidly store, retrieve and process data is incredibly important.
More informationCourse Content of MCSA ( Microsoft Certified Solutions Associate )
Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationMongoDB Backup and Recovery Field Guide. Tim Vaillancourt Sr Technical Operations Architect, Percona
MongoDB Backup and Recovery Field Guide Tim Vaillancourt Sr Technical Operations Architect, Percona `whoami` { name: tim, lastname: vaillancourt, employer: percona, techs: [ mongodb, mysql, cassandra,
More informationNext Generation Data Protection and Recovery Solution. Den Ng
Next Generation Data Protection and Recovery Solution Den Ng Agenda 1. 2. 3. Next Generation Data Protection Video TSM FastBack Overview + Value Proposition Deployment Scenario Visibility Control Automation
More informationVblock Infrastructure Packages: Accelerating Deployment of the Private Cloud
Vblock Infrastructure Packages: Accelerating Deployment of the Private Cloud Roberto Missana - Channel Product Sales Specialist Data Center, Cisco 1 IT is undergoing a transformation Enterprise IT solutions
More informationNS NetworkAppliance. Network Appliance Solution Architect-Backup and Restore (New)
NetworkAppliance NS0-310 Network Appliance Solution Architect-Backup and Restore (New) Download Full Version : http://killexams.com/pass4sure/exam-detail/ns0-310 QUESTION: 85 A customer wants to use SnapVault
More informationMariaDB MaxScale 2.0, basis for a Two-speed IT architecture
MariaDB MaxScale 2.0, basis for a Two-speed IT architecture Harry Timm, Business Development Manager harry.timm@mariadb.com Telef: +49-176-2177 0497 MariaDB FASTEST GROWING OPEN SOURCE DATABASE * Innovation
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More informationThe Best Storage for Virtualized Environments
The Best Storage for Virtualized Environments Paul Kessler Asia Pacific Solutions Marketing Alliances, NetApp Nov.4,2008 The Best Storage for Virtualized Environments Paul Kessler Solutions Marketing &
More informationThe Evolution of IT Resilience & Assurance
White Paper The Evolution of IT Resilience & Assurance Executive Summary Protection of business data and applications has evolved dramatically over the past several decades mostly driven by businesses
More informationBRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER
BRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER Written by: Image Advantage Solutions Inc. Addresss: 1-1354
More informationDevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY
DevOps Anti-Patterns Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! 31 Anti-Pattern: Throw it Over the Wall Development Operations 32 Anti-Pattern: DevOps Team Silo
More informationDistributed Systems
15-440 Distributed Systems 11 - Fault Tolerance, Logging and Recovery Tuesday, Oct 2 nd, 2018 Logistics Updates P1 Part A checkpoint Part A due: Saturday 10/6 (6-week drop deadline 10/8) *Please WORK hard
More informationConducted by Vanson Bourne Research
Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA
More informationTransforming your IT infrastructure Journey to the Cloud Mike Sladin
Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service
More information2014 Software Global Client Conference
WW HMI SCADA-10 Best practices for distributed SCADA Stan DeVries Senior Director Solutions Architecture What is Distributed SCADA? It s much more than a distributed architecture (SCADA always has this)
More informationWHAT IS SOFTWARE ARCHITECTURE?
WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is
More informationDell EMC Isolated Recovery
Dell EMC Isolated Recovery Andreas El Maghraby Advisory Systems Engineer DPS @andyem_si GLOBAL SPONSORS Incident Response: Categories of Cybercrime Activity April to June 2016 37% 27% 12% 9% 7% 7% 5% 2
More informationContingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Version: 7.2.x Written by: Product Knowledge, R&D Date: April 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International
More informationDisaster Recovery How to NOT do it. Derek Martin Senior TSP Azure
Disaster Recovery How to NOT do it Derek Martin Senior TSP Azure Infastructure @thebookofdoodle 1 A Bit About Me Derek Martin Senior TSP Azure Infrastructure @thebookofdoodle @doodlemania on Peepeth www.derekmartin.org
More informationTake Risks But Don t Be Stupid! Patrick Eaton, PhD
Take Risks But Don t Be Stupid! Patrick Eaton, PhD preaton@google.com Take Risks But Don t Be Stupid! Patrick R. Eaton, PhD patrick@stackdriver.com Stackdriver A hosted service providing intelligent monitoring
More informationThis option lets you reset the password that you use to log in if you do not remember it. To change the password,
User s Guide Overview IDrive offers the most cost effective BMR functionality with onsite disk image backup for SMBs. Store entire data of hard disks including the operating system (OS) and application
More informationOpenDrives storage solutions facilitate smart business continuity strategies.
Business Continuity Learn about smart strategies for planning for the unexpected events with an ironclad strategy to resume your business as quickly as possible with OpenDrives. Disaster Recovery is a
More informationDatabase Backup and Recovery Best Practices. Manjot Singh, Data & Infrastrustructure Architect
Database Backup and Recovery Best Practices (with a focus on MySQL) Manjot Singh, Data & Infrastrustructure Architect About Manjot Singh MySQL Fanatic Long time user (~16 years) Database and Systems Administrator
More informationRediffmail Enterprise High Availability Architecture
Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationPasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP
Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure
More informationLessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE
Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE #20655 @ecbanks Senior Network Architect, Carenection Co-founder, Packet Pushers Interactive http://ethancbanks.com http://packetpushers.net
More informationWhere s Your Third Copy?
Where s Your Third Copy? Protecting Unstructured Data 1 Protecting Unstructured Data Introduction As more organizations put their critical data on NAS systems, a complete, well thought out data protection
More informationThe Evolution of IT Resilience & Assurance
White Paper The Evolution of IT Resilience & Assurance Executive Summary Protection of business data and applications has evolved dramatically over the past several decades mostly driven by businesses
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationRapid Recovery from Logical Corruption
Rapid Recovery from Logical Corruption Brett Quinn DellEMC 1 Nov 2016 Session DD Topics Physical vs Logical Recovery SnapVX zdp: Data Protector for z Systems Isolated Recovery Solutions Logical vs Physical
More informationClustering In A SAN For High Availability
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002 Agenda What is High Availability? The differences between High Availability, System Availability
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationLogging, Monitoring, and Alerting
Logging, Monitoring, and Alerting Logs are a part of daily life in the DevOps world In security, we focus on particular logs to detect security anomalies and for forensic capabilities A basic logging pipeline
More informationVMWARE PROTECTION WITH DELL EMC NETWORKER 9
VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture
More informationCANVAS DISASTER RECOVERY PLAN AND PROCEDURES
CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...
More informationFUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports
More informationReliable Crash Detection and Failover with Orchestrator
1 Reliable Crash Detection and Failover with Orchestrator Shlomi Noach, PerconaLive 2016 " How people build software Agenda Orchestrator Topologies, crash scenarios Crash detection methods Promotion complexity
More informationAmazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction:
Amazon ElastiCache Introduction: How to improve application performance using caching. What are the ElastiCache engines, and the difference between them. How to scale your cluster vertically. How to scale
More information