Data Integrity in Stateful Services. Percona Live, Santa Clara, 2017

Size: px
Start display at page:

Download "Data Integrity in Stateful Services. Percona Live, Santa Clara, 2017"

Transcription

1 Data Integrity in Stateful Services Percona Live, Santa Clara, 2017

2 Data Integrity Bringing Sexy Back

3 Protect the Data. -Every DBA who doesn t want to be fired

4 Breaking Integrity Down Physical Integrity - Help, my data files are gone! Logical Integrity - Help, my s disappeared!

5 Data Integrity is the mission of the entire organization.

6 When to plan for integrity?

7 If you are planning for recovery after your application and infrastructure is built You re guarding a henhouse that already has a fox in it.

8 Goals for Integrity Elimination Empowerment Detection Flexibility

9 Elimination Where possible, eliminate the potential for corruption and data loss. Optimize for durability based on your user needs Understand Isolation Levels Consistency vs Availability Velocity Levers

10 Elimination Case Study: Jepsen and Galera Impacts and Ambiguities of Isolation Levels Dirty Read : Prohibited by RC, RR, 1SR Fuzzy (non-repeatable) Read: Prohibited by RR, 1SR Phantom: Prohibited by 1SR

11 Elimination Snapshot Isolation in Galera Prevents Dirty Writes, Dirty Reads, and Lost Updates, and some types of Phantoms As of 2015, Galera Documentation claimed snapshot isolation. Jepsen tests proved this was not true, First Committer Wins was disabled due to performance reasons. Galera s recommendation of using leader only does not take into account data loss during leader transitions

12 Empowerment Help people and systems to recover rapidly from their own mistakes. don t trust destructive requests soft deletes w/recovery API data versioning

13 Detection Early detection of corruption is as important as the ability to recover from it. unit and regression testing data validation pipelines tools for investigation

14 Detection Case Study: Data Validation Pipelines Each DB Constraint should have validation tests running constantly on sample datasets to ensure that they are being enforced. Constraints can be disabled. Applications should have expected isolation levels. Running transactions regularly to ensure expected behaviors should be done. Databases without constraints, particularly federated ones require more rigorous tests to be run.

15 Flexibility You cannot predict all of the ways you can lose data. Focus on flexibility in your toolbox. Tiered Storage Replication and Data Portability

16 What could go wrong? Famous Last Words

17 Planned Recovery Production deployments Environment duplication Downstream services (analytics, compliance) Operational tests

18 Unplanned Recovery Google estimates 24 combinations of data integrity failures possible Scope Category Impact

19 Scenario Scope Small: Localized or single instance in redundant scenarios. Small subset of data (1000 customers) Medium: Cluster-Wide or a full Zone A full dataset (all customers in a shard) Large: Multiple clusters, or a full DC Multiple datasets (full data loss, all customers across shards)

20 Scenario Impact Small: Some features impacted, non-slo threatening. Small subset of users impacted. Medium: SLO threatening. Moderate subset of users impacted. Large: SLO impacting, application down. Majority of users impacted.

21 Operator Error Data Deletion Data Corruption Relaxed Constraints Storage removal

22 Application Errors Removing pointers to assets in external storage Character set mutilation Duplication of data

23 Infrastructure Services Orchestration got frisky? Configuration management change some durability parameters? Proxies or DNS points to the wrong node?

24 OS and Hardware Errors Silent corruption due to failed ECC error checks? Filesystem corruption Data loss during a power down

25 Hardware Failures Disk Failures Memory Failures Controller Failures

26 Datacenter Failures Catastrophic power loss Wiped out storage Fires, catastrophic events

27 Anatomy of a Recovery Strategy

28 Building Block 1 Early Detection, Bad Data Propagates A culture of unit and regression testing Data validation test suite Example: Storing external media Tools and analytics to investigate errors

29 Building Block 2 Tiered Storage Fast, expensive storage for dataset portability Slow, inexpensive storage for long-term backups Long-term storage (tape, offsite) Object storage for versioning Distributed logs (i.e. Kafka) for versioning and events

30 Building Block 3 Toolbox Full and incremental online backups Full and incremental offline/long-term backups APIs for soft deletion/undeletion APIs for version rollback/play forward Producers for event streams to recreate objects

31 Building Block 4 Testing Daily use as testing - incorporate recovery into daily work Continuous testing of less-used recovery methods Regular game days - team scenario testing

32 Final Considerations

33 Data Integrity is cultural Design, Build, Test, Deploy - each stage is an opportunity to think about data integrity Checks and balances between teams keeps us honest and focused on the goal Data becomes too complex for one person or team to understand it. We must help each other.

34 Data Integrity Must be Continuous These processes are crucial and cannot be allowed to gather dust. Humans will not do this on their own, integration and automation is required. This must be put into project functional requirements.

35 You cannot plan for everything New and interesting things will occur that will challenge your plans. Flexibility and multiple options must be made available. Early detection is crucial for ensuring problems do not propagate out of control.

36 Good

37 Check out our book Laine Campbell and Charity Majors

Data Integrity in Stateful Services. Velocity, China, 2016

Data Integrity in Stateful Services. Velocity, China, 2016 Data Integrity in Stateful Services Velocity, China, 2016 Data Integrity Bringing Sexy Back Protect the Data. -Every DBA who doesn t want to be fired Breaking Integrity Down Physical Integrity - Help,

More information

database reliability engineering what. why. how. Percona Live, Dublin, 2017 Laine Campbell, Sr. Dir, Production Engineering, Fastly

database reliability engineering what. why. how. Percona Live, Dublin, 2017 Laine Campbell, Sr. Dir, Production Engineering, Fastly database reliability engineering what. why. how. Percona Live, Dublin, 2017 Laine Campbell, Sr. Dir, Production Engineering, Fastly we made a book! yesterday s DBA gatekeeper master builder superhero siloed

More information

Google Cloud Whitepaper September Data deletion on Google Cloud Platform

Google Cloud Whitepaper September Data deletion on Google Cloud Platform Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion

More information

Database Engineering. Percona Live, Amsterdam, September, 2015

Database Engineering. Percona Live, Amsterdam, September, 2015 Database Engineering Percona Live, Amsterdam, 2015 September, 2015 engineering, not administration 2 yesterday s DBA gatekeeper master builder superhero siloed specialized 3 engineering quantitative interdisciplinary

More information

Using MySQL for Distributed Database Architectures

Using MySQL for Distributed Database Architectures Using MySQL for Distributed Database Architectures Peter Zaitsev CEO, Percona SCALE 16x, Pasadena, CA March 9, 2018 1 About Percona Solutions for your success with MySQL,MariaDB and MongoDB Support, Managed

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

WHITE PAPER: ENTERPRISE SOLUTIONS

WHITE PAPER: ENTERPRISE SOLUTIONS WHITE PAPER: ENTERPRISE SOLUTIONS Integrating Network Appliance Snapshot and SnapRestore with Veritas NetBackup in an Oracle Backup Environment (Now from Symantec ) White Paper: Symantec Enterprise Solutions

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

How Microsoft Built MySQL, PostgreSQL and MariaDB for the Cloud. Santa Clara, California April 23th 25th, 2018

How Microsoft Built MySQL, PostgreSQL and MariaDB for the Cloud. Santa Clara, California April 23th 25th, 2018 How Microsoft Built MySQL, PostgreSQL and MariaDB for the Cloud Santa Clara, California April 23th 25th, 2018 Azure Data Service Architecture Share Cluster with SQL DB Azure Infrastructure Services Azure

More information

Information Systems. Data Protection Disaster recovery Backups

Information Systems. Data Protection Disaster recovery Backups Information Systems Data Protection Disaster recovery Backups Data protection act 1998 - Rights The rights of data subjects People whose personal data is stored are called data subjects. The DPA sets uprights

More information

Hadoop and HDFS Overview. Madhu Ankam

Hadoop and HDFS Overview. Madhu Ankam Hadoop and HDFS Overview Madhu Ankam Why Hadoop We are gathering more data than ever Examples of data : Server logs Web logs Financial transactions Analytics Emails and text messages Social media like

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

STORAGECRAFT SHADOWPROTECT 5 DESKTOP

STORAGECRAFT SHADOWPROTECT 5 DESKTOP STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

Replication. Feb 10, 2016 CPSC 416

Replication. Feb 10, 2016 CPSC 416 Replication Feb 10, 2016 CPSC 416 How d we get here? Failures & single systems; fault tolerance techniques added redundancy (ECC memory, RAID, etc.) Conceptually, ECC & RAID both put a master in front

More information

Physical Storage Media

Physical Storage Media Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available

More information

Percona Software & Services Update

Percona Software & Services Update Percona Software & Services Update Q4 2016 Peter Zaitsev,CEO Percona Technical Webinars January 12, 2017 Why? Talking to Many Users and Customers Getting What have you been up to? Question This is a way

More information

PREPARING FOR DISASTER

PREPARING FOR DISASTER PREPARING FOR DISASTER INTEGRATING BCDR PRINCIPLES INTO YOUR DEVOPS PRACTICE Jeremy Heffner SANS Secure DevOps Summit & Training October 2017 CODE SPACES Source: https://arstechnica.com/information-technology/2014/06/aws-console-breach-leads-to-demise-of-service-with-proven-backup-plan/

More information

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability

More information

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices

More information

BackUp Strategies. ApplePickers April 12, 2017

BackUp Strategies. ApplePickers April 12, 2017 BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files

More information

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar

More information

Disaster Recovery (DR) Planning with the Cloud Desktop

Disaster Recovery (DR) Planning with the Cloud Desktop with the Cloud Desktop Info@RIAWorkSpace.com 877.361.3499 www.riaworkspace.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

ECE Engineering Robust Server Software. Spring 2018

ECE Engineering Robust Server Software. Spring 2018 ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management

More information

Architecting a Highly Available Infrastructure: An Overview SLN187. Mark Milow Mike DiPetrillo

Architecting a Highly Available Infrastructure: An Overview SLN187. Mark Milow Mike DiPetrillo Architecting a Highly Available Infrastructure: An Overview SLN187 Mark Milow Mike DiPetrillo Agenda Why? Solutions Q&A Quick Stats 2004 Gartner study found an average of $42,000 per hour of downtime Average

More information

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer

More information

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs I S S U E P A P E Risky Business By Robert Gibbs R 2 0 0 8 Risky Business Remember when information security meant locking your file cabinets at night? Unfortunately, those days are long gone. With the

More information

A Global In-memory Data System for MySQL Daniel Austin, PayPal Technical Staff

A Global In-memory Data System for MySQL Daniel Austin, PayPal Technical Staff A Global In-memory Data System for MySQL Daniel Austin, PayPal Technical Staff Percona Live! MySQL Conference Santa Clara, April 12th, 2012 v1.3 Intro: Globalizing NDB Proposed Architecture What We Learned

More information

Building Durable Real-time Data Pipeline

Building Durable Real-time Data Pipeline Building Durable Real-time Data Pipeline Apache BookKeeper at Twitter @sijieg Twitter Background Layered Architecture Agenda Design Details Performance Scale @Twitter Q & A Publish-Subscribe Online services

More information

Controlling Costs and Driving Agility in the Datacenter

Controlling Costs and Driving Agility in the Datacenter Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,

More information

Slashing Downtime from 24 Hours to 24 Minutes:

Slashing Downtime from 24 Hours to 24 Minutes: Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

University Information Technology Data Backup and Recovery Policy

University Information Technology Data Backup and Recovery Policy University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery

More information

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale

More information

Introduction to: The Architecture of the Internet

Introduction to: The Architecture of the Internet COMP 150-IDS: Internet Scale Distributed Systems (Spring 2016) Introduction to: The Architecture of the Internet Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

RELIABILITY & AVAILABILITY IN THE CLOUD

RELIABILITY & AVAILABILITY IN THE CLOUD RELIABILITY & AVAILABILITY IN THE CLOUD A TWILIO PERSPECTIVE twilio.com To the leaders and engineers at Twilio, the cloud represents the promise of reliable, scalable infrastructure at a price that directly

More information

MySQL Backup Best Practices and Case Study:.IE Continuous Restore Process

MySQL Backup Best Practices and Case Study:.IE Continuous Restore Process MySQL Backup Best Practices and Case Study:.IE Continuous Restore Process Marcelo Altmann Senior Support Engineer - Percona Mick Begley Technical Service Manager - IE Domain Registry Agenda Agenda Why

More information

How To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik

How To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits

More information

Distributed Data Management Transactions

Distributed Data Management Transactions Felix Naumann F-2.03/F-2.04, Campus II Hasso Plattner Institut must ensure that interactions succeed consistently An OLTP Topic Motivation Most database interactions consist of multiple, coherent operations

More information

Next-Generation Cloud Platform

Next-Generation Cloud Platform Next-Generation Cloud Platform Jangwoo Kim Jun 24, 2013 E-mail: jangwoo@postech.ac.kr High Performance Computing Lab Department of Computer Science & Engineering Pohang University of Science and Technology

More information

Introduction to: The Architecture of the Internet

Introduction to: The Architecture of the Internet COMP 117: Internet Scale Distributed Systems (Spring 2018) Introduction to: The Architecture of the Internet Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah

More information

White Paper BC/DR in the Cloud Era

White Paper BC/DR in the Cloud Era BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to

More information

Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]

Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ] s@lm@n Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic

More information

Disaster Recovery Planning

Disaster Recovery Planning Disaster Recovery Planning How to Ensure your IT systems are protected and your business keeps running should disaster strike. Benefits of Using Disaster Recovery as a Service DRaaS over Traditional Disaster

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

A Practical Guide to Cost-Effective Disaster Recovery Planning

A Practical Guide to Cost-Effective Disaster Recovery Planning White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the

More information

Last Class Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications

Last Class Carnegie Mellon Univ. Dept. of Computer Science /615 - DB Applications Last Class Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB Applications Basic Timestamp Ordering Optimistic Concurrency Control Multi-Version Concurrency Control C. Faloutsos A. Pavlo Lecture#23:

More information

Percona XtraDB Cluster 5.7 Enhancements Performance, Security, and More

Percona XtraDB Cluster 5.7 Enhancements Performance, Security, and More Percona XtraDB Cluster 5.7 Enhancements Performance, Security, and More Michael Coburn, Product Manager, PMM Percona Live Dublin 2017 1 Your Presenter Product Manager for PMM (Percona Monitoring and Management)

More information

SQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead

SQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead SQL Azure as a Self- Managing Database Service: Lessons Learned and Challenges Ahead 1 Introduction Key features: -Shared nothing architecture -Log based replication -Support for full ACID properties -Consistency

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Amazon AWS and RDS, moving towards it. Dimitri Vanoverbeke Solution Percona

Amazon AWS and RDS, moving towards it. Dimitri Vanoverbeke Solution Percona Amazon AWS and RDS, moving towards it Dimitri Vanoverbeke Solution Engineer @ Percona Who am I? Solution engineer in Percona for almost 4 years Prior to Percona an open source system integrator MySQL,

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost-effective BMR functionality with onsite disk image backup for SMBs. You can store entire data of hard disks including the operating system (OS) and application

More information

Five Common Myths About Scaling MySQL

Five Common Myths About Scaling MySQL WHITE PAPER Five Common Myths About Scaling MySQL Five Common Myths About Scaling MySQL In this age of data driven applications, the ability to rapidly store, retrieve and process data is incredibly important.

More information

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Course Content of MCSA ( Microsoft Certified Solutions Associate ) Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs

More information

HYCU and ExaGrid Hyper-converged Backup for Nutanix

HYCU and ExaGrid Hyper-converged Backup for Nutanix HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches

More information

MongoDB Backup and Recovery Field Guide. Tim Vaillancourt Sr Technical Operations Architect, Percona

MongoDB Backup and Recovery Field Guide. Tim Vaillancourt Sr Technical Operations Architect, Percona MongoDB Backup and Recovery Field Guide Tim Vaillancourt Sr Technical Operations Architect, Percona `whoami` { name: tim, lastname: vaillancourt, employer: percona, techs: [ mongodb, mysql, cassandra,

More information

Next Generation Data Protection and Recovery Solution. Den Ng

Next Generation Data Protection and Recovery Solution. Den Ng Next Generation Data Protection and Recovery Solution Den Ng Agenda 1. 2. 3. Next Generation Data Protection Video TSM FastBack Overview + Value Proposition Deployment Scenario Visibility Control Automation

More information

Vblock Infrastructure Packages: Accelerating Deployment of the Private Cloud

Vblock Infrastructure Packages: Accelerating Deployment of the Private Cloud Vblock Infrastructure Packages: Accelerating Deployment of the Private Cloud Roberto Missana - Channel Product Sales Specialist Data Center, Cisco 1 IT is undergoing a transformation Enterprise IT solutions

More information

NS NetworkAppliance. Network Appliance Solution Architect-Backup and Restore (New)

NS NetworkAppliance. Network Appliance Solution Architect-Backup and Restore (New) NetworkAppliance NS0-310 Network Appliance Solution Architect-Backup and Restore (New) Download Full Version : http://killexams.com/pass4sure/exam-detail/ns0-310 QUESTION: 85 A customer wants to use SnapVault

More information

MariaDB MaxScale 2.0, basis for a Two-speed IT architecture

MariaDB MaxScale 2.0, basis for a Two-speed IT architecture MariaDB MaxScale 2.0, basis for a Two-speed IT architecture Harry Timm, Business Development Manager harry.timm@mariadb.com Telef: +49-176-2177 0497 MariaDB FASTEST GROWING OPEN SOURCE DATABASE * Innovation

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

The Best Storage for Virtualized Environments

The Best Storage for Virtualized Environments The Best Storage for Virtualized Environments Paul Kessler Asia Pacific Solutions Marketing Alliances, NetApp Nov.4,2008 The Best Storage for Virtualized Environments Paul Kessler Solutions Marketing &

More information

The Evolution of IT Resilience & Assurance

The Evolution of IT Resilience & Assurance White Paper The Evolution of IT Resilience & Assurance Executive Summary Protection of business data and applications has evolved dramatically over the past several decades mostly driven by businesses

More information

BRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER

BRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER BRINGING YOUR DOCUMENTS INTO THE DIGITAL AGE REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER REMOTE DATA BACKUP: THE SOLUTION TO DATA DISASTER Written by: Image Advantage Solutions Inc. Addresss: 1-1354

More information

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY DevOps Anti-Patterns Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! 31 Anti-Pattern: Throw it Over the Wall Development Operations 32 Anti-Pattern: DevOps Team Silo

More information

Distributed Systems

Distributed Systems 15-440 Distributed Systems 11 - Fault Tolerance, Logging and Recovery Tuesday, Oct 2 nd, 2018 Logistics Updates P1 Part A checkpoint Part A due: Saturday 10/6 (6-week drop deadline 10/8) *Please WORK hard

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Transforming your IT infrastructure Journey to the Cloud Mike Sladin Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service

More information

2014 Software Global Client Conference

2014 Software Global Client Conference WW HMI SCADA-10 Best practices for distributed SCADA Stan DeVries Senior Director Solutions Architecture What is Distributed SCADA? It s much more than a distributed architecture (SCADA always has this)

More information

WHAT IS SOFTWARE ARCHITECTURE?

WHAT IS SOFTWARE ARCHITECTURE? WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is

More information

Dell EMC Isolated Recovery

Dell EMC Isolated Recovery Dell EMC Isolated Recovery Andreas El Maghraby Advisory Systems Engineer DPS @andyem_si GLOBAL SPONSORS Incident Response: Categories of Cybercrime Activity April to June 2016 37% 27% 12% 9% 7% 7% 5% 2

More information

Contingency Planning and Disaster Recovery

Contingency Planning and Disaster Recovery Contingency Planning and Disaster Recovery Best Practices Version: 7.2.x Written by: Product Knowledge, R&D Date: April 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International

More information

Disaster Recovery How to NOT do it. Derek Martin Senior TSP Azure

Disaster Recovery How to NOT do it. Derek Martin Senior TSP Azure Disaster Recovery How to NOT do it Derek Martin Senior TSP Azure Infastructure @thebookofdoodle 1 A Bit About Me Derek Martin Senior TSP Azure Infrastructure @thebookofdoodle @doodlemania on Peepeth www.derekmartin.org

More information

Take Risks But Don t Be Stupid! Patrick Eaton, PhD

Take Risks But Don t Be Stupid! Patrick Eaton, PhD Take Risks But Don t Be Stupid! Patrick Eaton, PhD preaton@google.com Take Risks But Don t Be Stupid! Patrick R. Eaton, PhD patrick@stackdriver.com Stackdriver A hosted service providing intelligent monitoring

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost effective BMR functionality with onsite disk image backup for SMBs. Store entire data of hard disks including the operating system (OS) and application

More information

OpenDrives storage solutions facilitate smart business continuity strategies.

OpenDrives storage solutions facilitate smart business continuity strategies. Business Continuity Learn about smart strategies for planning for the unexpected events with an ironclad strategy to resume your business as quickly as possible with OpenDrives. Disaster Recovery is a

More information

Database Backup and Recovery Best Practices. Manjot Singh, Data & Infrastrustructure Architect

Database Backup and Recovery Best Practices. Manjot Singh, Data & Infrastrustructure Architect Database Backup and Recovery Best Practices (with a focus on MySQL) Manjot Singh, Data & Infrastrustructure Architect About Manjot Singh MySQL Fanatic Long time user (~16 years) Database and Systems Administrator

More information

Rediffmail Enterprise High Availability Architecture

Rediffmail Enterprise High Availability Architecture Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of

More information

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic

More information

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure

More information

Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE

Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE Lessons Learned Operating Active/Active Data Centers Ethan Banks, CCIE #20655 @ecbanks Senior Network Architect, Carenection Co-founder, Packet Pushers Interactive http://ethancbanks.com http://packetpushers.net

More information

Where s Your Third Copy?

Where s Your Third Copy? Where s Your Third Copy? Protecting Unstructured Data 1 Protecting Unstructured Data Introduction As more organizations put their critical data on NAS systems, a complete, well thought out data protection

More information

The Evolution of IT Resilience & Assurance

The Evolution of IT Resilience & Assurance White Paper The Evolution of IT Resilience & Assurance Executive Summary Protection of business data and applications has evolved dramatically over the past several decades mostly driven by businesses

More information

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

IPMA State of Washington. Disaster Recovery in. State and Local. Governments IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to

More information

Rapid Recovery from Logical Corruption

Rapid Recovery from Logical Corruption Rapid Recovery from Logical Corruption Brett Quinn DellEMC 1 Nov 2016 Session DD Topics Physical vs Logical Recovery SnapVX zdp: Data Protector for z Systems Isolated Recovery Solutions Logical vs Physical

More information

Clustering In A SAN For High Availability

Clustering In A SAN For High Availability Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002 Agenda What is High Availability? The differences between High Availability, System Availability

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Logging, Monitoring, and Alerting

Logging, Monitoring, and Alerting Logging, Monitoring, and Alerting Logs are a part of daily life in the DevOps world In security, we focus on particular logs to detect security anomalies and for forensic capabilities A basic logging pipeline

More information

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

VMWARE PROTECTION WITH DELL EMC NETWORKER 9 VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture

More information

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports

More information

Reliable Crash Detection and Failover with Orchestrator

Reliable Crash Detection and Failover with Orchestrator 1 Reliable Crash Detection and Failover with Orchestrator Shlomi Noach, PerconaLive 2016 " How people build software Agenda Orchestrator Topologies, crash scenarios Crash detection methods Promotion complexity

More information

Amazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction:

Amazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction: Amazon ElastiCache Introduction: How to improve application performance using caching. What are the ElastiCache engines, and the difference between them. How to scale your cluster vertically. How to scale

More information