SlideShare a Scribd company logo
1 of 6
ZDLRA Copy to Cloud: Backup Workflow
This procedure for archive-to-cloud builds on the techniques used for copy-to-tape. The
difference is that it sends backups to cloud repositories for longer term storage. This procedure
includes configuring a credential wallet to store TDE master keys, because backups are
encrypted before they are archived to a cloud repository. The initial configuration tasks are
performed in the Oracle Key Vault to prepare the wallet. At the end, a job template is created
and run for archive-to-cloud.
Pre-requisites for Archive-to-Cloud
The following prerequisites must be met before starting to use cloud storage with the Recovery
Appliance.
 Protected database(s) should already be enrolled and backups taken to the Recovery
Appliance.
 The Recovery Appliance has been registered and enrolled at an Oracle Key Vault.
All backup objects archived to cloud storage are encrypted using a random Data Encryption Key
(DEK). A Transparent Data Encryption (TDE) master key for each protected database is used to
encrypt the DEK; the encrypted DEK is stored in the backup piece. The Oracle Key Vault (OKV)
contains the TDE master keys; it does not contain the individual DEKs used to encrypt backups
written to tape or cloud. A protected database may acquire many TDE master keys with time,
so restoration of an individual archived object requires the protected database's master key in
use at time of backup.
1. Incremental backupsentunencryptedtoZDLRA – Virtual Full iscreated
2. ZDLRA requestsencryptionkeyfromOKV server
3. OKV serversendsencryptionkeytoZDLRA
4. ZDLRA encryptsvirtual full backuppiecesandsendsthemtocloudstorage
5. ObjectLifecycle Rulesmove the backuppiecestoArchive Storage.
How Oracle Key vault works with Recovery appliance?
The Oracle Key Vault (OKV) stores the TDE master keys and also keeps track of all enrolled
endpoints.
Endpoints are the database servers, application servers, and computer systems where actual
cryptographic operations such as encryption or decryption are performed. Endpoints request
OKV to store and retrieve security objects.
Restore from Cloud Storage
1. Restore requestfromProtectedDatabase isinitiatedonZDLRA
2. ZDLRA requestsencryptionkeyfromOKV server
3. OKV serversendsencryptionkeytoZDLRA
4. ZDLRA requestsbackuppiecesfromcloudstorage
5. If backuppiecesare inArchive Storage,theyare firstrecalledtoObjectStorage
6. ZDLRA retrievesbackuppiecesfromObjectStorage,decryptsthemandsends themtoProtectedDB
Restore Directly to On-PremDatabase from CloudStorage
1. Restore requestfromCloudStorage isinitiatedbyProtectedDB
2. ProtectedDB (mustbe enrolledasOKV endpoint) requestsdecryptionkeytoOKV server
3. OKV serversendsdecryptionkeytoProtectedDB
4. ProtectedDB catalogsreadsbackup piecesfromCloudObjectStorage
EM Archive to CloudReporting
Cloud backup Cost and estimates:
Object storage and archive storage on the cloud will be based on Pay as you Go model.
Infrequently accessed data is a prime candidate to be archived to the cloud. You can store data
in the cloud for less than half a penny per GB of data. And, cloud storage infrastructure scales
infinitely, so you will never run out of storage. Moving infrequently accessed data to the cloud
will let you stretch your dollar to fit your storage budget! Oracle Cloud InfrastructureArchive
Storageis purpose-built to storeall your long living, infrequentlyaccessed data. Whether
you havea need to offload data from your primary storagearray, or you wish to archive
data for a long duration to stay compliant with governmentregulations, wehaveyou
covered. With prices as low as $0.003/GB per month, OracleArchiveStorageoffers a
compelling reason for you to archiveinfrequently accessed data to thecloud.
Why are we using OCI Object Storageand Archival storage?
UseObject Storageto store'hot' data that you need unrestricted and immediateaccess to
at all times. ArchiveStorageis ideal for storing 'cold' data that you do not need to access
instantaneously. To read data from ArchiveStorage, you need to first 'Restore' thedata
(using therestorework flow) to a staging area in Object Storage, where it can be read. Data
stays in Object Storagefor a fixed period of timeafter which thedata is returned back to
theArchiveStoragepool and becomes inaccessibleonceagain. Please notethat even
though you cannot instantaneouslyaccess data in theArchiveStorage, you can retrievethe
archived object's metadata at all times.You can use Object Storageto preservebackup and
archivedata that must bestored for an extended duration to adhereto various compliance
mandates.
How Oracle Key Vault Is Licensed?
Oracle Key Vault is comprised of the following components:
■ Oracle Key Vault server
■ Oracle Key vault okvutil command-line utility
■ Oracle Key Vault PKCS#11 library
■ Oracle Key Vault management console
The licensing is based on a per Oracle Key Vault server installation without per processor cost.
There are no license restrictions on the number of endpoints connecting to the Oracle Key Vault
server. This license includes restricted use licensing for the entire Oracle Key Vault stack. You
should deploy a pair of Oracle Key Vault servers as primary and standby servers for high
availability or network topology purposes.
Why Kaiser should incorporate copy-to-cloud feature?
Oracle’s Recovery Appliance copy-to-cloud feature represents the next leap forward in Oracle
database backup and recovery technology. It reduces system, storage and networking
overhead, while providing the full range of Oracle database backup & recovery functionality.
Copy-to-cloud feature addresses all major sources of data loss by providing superior protection
of database transaction logs, comprehensive database-aware block validation, policy based,
recovery-aware data retention. Data encryption protect the data at-rest and in-transit in a way
that allows to meet the security and compliance requirements with respect to cryptographic
algorithms and key management. With various Advantages of object storage, it also includes
Excellent for dealing with ransomware. With the ever-growing numbers of malware infections,
and specifically ransomware, there is a tremendous need for giving serious thought to data
security. Public cloud storage offers a few inherent ways to protect against and recover from
ransomware, including cloud IAM and version control.
Ransomware continued to dominate the world of cybersecurity. 6 out of 10 malware payloads
in Q1 were ransomware. Furthermore, we can safely assume that ransomware has become the
biggest security threat any organization or individual may face in the cyber realm.
Since an object is immutable (unchangeable), if ransomware encrypts an object, it becomes a
new version. A new object is stored while the previous object remains intact, if you have a
backup of it. When it comes to object storage and ransomware, object storage will not stop
ransomware from attacking, even if it is seldom the target of a ransomware attack. However,
what object storage can do is to help speed recovery from a ransomware attack.
Additional Data Protection Advantages with Object Storage:
Traditional architectures are coming under continual pressure as HDD sizes continue to
increase. RAID recovery times are growing, creating vulnerability windows for subsequent
failures that can lead to permanent data loss.
Object storage uses erasure coding to protect data. This is a data protection scheme that breaks
data into shards (fragments or symbols) that are encoded with parity (redundant data), and
then stored across multiple storage media. Only a subset of the shards is needed to rehydrate
the data and make it available so that in case of a failure, there is no rebuild involved, and no
down time.

More Related Content

What's hot

DOAG Oracle Unified Audit in Multitenant Environments
DOAG Oracle Unified Audit in Multitenant EnvironmentsDOAG Oracle Unified Audit in Multitenant Environments
DOAG Oracle Unified Audit in Multitenant EnvironmentsStefan Oehrli
 
Direct SGA access without SQL
Direct SGA access without SQLDirect SGA access without SQL
Direct SGA access without SQLKyle Hailey
 
Oracle data guard for beginners
Oracle data guard for beginnersOracle data guard for beginners
Oracle data guard for beginnersPini Dibask
 
Exadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedExadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedUmair Mansoob
 
Optane DC Persistent Memory(DCPMM) 성능 테스트
Optane DC Persistent Memory(DCPMM) 성능 테스트Optane DC Persistent Memory(DCPMM) 성능 테스트
Optane DC Persistent Memory(DCPMM) 성능 테스트SANG WON PARK
 
Exadata master series_asm_2020
Exadata master series_asm_2020Exadata master series_asm_2020
Exadata master series_asm_2020Anil Nair
 
Proxysql use case scenarios fosdem17
Proxysql use case scenarios    fosdem17Proxysql use case scenarios    fosdem17
Proxysql use case scenarios fosdem17Alkin Tezuysal
 
Building Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon RedshiftBuilding Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon RedshiftAmazon Web Services
 
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018Amazon Web Services
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsZohar Elkayam
 
Solving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaSolving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaRandy Goering
 
Snowflake Data Loading.pptx
Snowflake Data Loading.pptxSnowflake Data Loading.pptx
Snowflake Data Loading.pptxParag860410
 
Monitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with ZabbixMonitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with ZabbixGerger
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
 
MariaDB MaxScale
MariaDB MaxScaleMariaDB MaxScale
MariaDB MaxScaleMariaDB plc
 
(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon RedshiftAmazon Web Services
 

What's hot (20)

DOAG Oracle Unified Audit in Multitenant Environments
DOAG Oracle Unified Audit in Multitenant EnvironmentsDOAG Oracle Unified Audit in Multitenant Environments
DOAG Oracle Unified Audit in Multitenant Environments
 
Sql server basics
Sql server basicsSql server basics
Sql server basics
 
Direct SGA access without SQL
Direct SGA access without SQLDirect SGA access without SQL
Direct SGA access without SQL
 
Oracle data guard for beginners
Oracle data guard for beginnersOracle data guard for beginners
Oracle data guard for beginners
 
Introduction to NoSQL
Introduction to NoSQLIntroduction to NoSQL
Introduction to NoSQL
 
Exadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedExadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs Virtualized
 
Optane DC Persistent Memory(DCPMM) 성능 테스트
Optane DC Persistent Memory(DCPMM) 성능 테스트Optane DC Persistent Memory(DCPMM) 성능 테스트
Optane DC Persistent Memory(DCPMM) 성능 테스트
 
Survey of Percona Toolkit
Survey of Percona ToolkitSurvey of Percona Toolkit
Survey of Percona Toolkit
 
Exadata master series_asm_2020
Exadata master series_asm_2020Exadata master series_asm_2020
Exadata master series_asm_2020
 
Proxysql use case scenarios fosdem17
Proxysql use case scenarios    fosdem17Proxysql use case scenarios    fosdem17
Proxysql use case scenarios fosdem17
 
Building Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon RedshiftBuilding Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon Redshift
 
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018
Deep Dive on PostgreSQL Databases on Amazon RDS (DAT324) - AWS re:Invent 2018
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
 
Solving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration DilemmaSolving the DB2 LUW Administration Dilemma
Solving the DB2 LUW Administration Dilemma
 
Snowflake Data Loading.pptx
Snowflake Data Loading.pptxSnowflake Data Loading.pptx
Snowflake Data Loading.pptx
 
Monitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with ZabbixMonitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with Zabbix
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
HDFS Internals
HDFS InternalsHDFS Internals
HDFS Internals
 
MariaDB MaxScale
MariaDB MaxScaleMariaDB MaxScale
MariaDB MaxScale
 
(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift
 

Similar to Zdlra copy to cloud

twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633Arush Jain
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudCloudTechnologies
 
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...StorageCraft Benelux
 
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...StorageCraft Benelux
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentRoy Kim
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceJean-Philippe PINTE
 
Kazoup software appliance - A technical deep dive
Kazoup software appliance - A technical deep diveKazoup software appliance - A technical deep dive
Kazoup software appliance - A technical deep diveKazoup
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...MongoDB
 
WP VERITAS InfoScale Storage and Dockers Intro - v8
WP VERITAS InfoScale Storage and Dockers Intro - v8WP VERITAS InfoScale Storage and Dockers Intro - v8
WP VERITAS InfoScale Storage and Dockers Intro - v8Rajagopal Vaideeswaran
 
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...Docker, Inc.
 
FOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxFOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxrohithprakash16
 
Dataguard presentation
Dataguard presentationDataguard presentation
Dataguard presentationVimlendu Kumar
 
Clouds in Your Coffee Session with Cleversafe & Avere
Clouds in Your Coffee Session with Cleversafe & AvereClouds in Your Coffee Session with Cleversafe & Avere
Clouds in Your Coffee Session with Cleversafe & AvereAvere Systems
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
CloudBackup Slick
CloudBackup SlickCloudBackup Slick
CloudBackup SlickRapidScale
 
Persistent storage in Docker
Persistent storage in DockerPersistent storage in Docker
Persistent storage in DockerCheryl Hung
 

Similar to Zdlra copy to cloud (20)

Oracle Cloud Backup
Oracle Cloud BackupOracle Cloud Backup
Oracle Cloud Backup
 
twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
con8832-cloudha-2811114.pdf
con8832-cloudha-2811114.pdfcon8832-cloudha-2811114.pdf
con8832-cloudha-2811114.pdf
 
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...
Storage craft shadowprotect_product_scenarios_windows_small_business_server_d...
 
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
Storage craft shadowprotect_product_scenarios_windows_server_sbs_disaster_rec...
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
 
Kazoup software appliance - A technical deep dive
Kazoup software appliance - A technical deep diveKazoup software appliance - A technical deep dive
Kazoup software appliance - A technical deep dive
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
 
WP VERITAS InfoScale Storage and Dockers Intro - v8
WP VERITAS InfoScale Storage and Dockers Intro - v8WP VERITAS InfoScale Storage and Dockers Intro - v8
WP VERITAS InfoScale Storage and Dockers Intro - v8
 
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...
DCEU 18: Use Cases and Practical Solutions for Docker Container Storage on Sw...
 
FOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptxFOG drive Keerthana3rd ppt.pptx
FOG drive Keerthana3rd ppt.pptx
 
Dataguard presentation
Dataguard presentationDataguard presentation
Dataguard presentation
 
Clouds in Your Coffee Session with Cleversafe & Avere
Clouds in Your Coffee Session with Cleversafe & AvereClouds in Your Coffee Session with Cleversafe & Avere
Clouds in Your Coffee Session with Cleversafe & Avere
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
CloudBackup Slick
CloudBackup SlickCloudBackup Slick
CloudBackup Slick
 
Persistent storage in Docker
Persistent storage in DockerPersistent storage in Docker
Persistent storage in Docker
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Zdlra copy to cloud

  • 1. ZDLRA Copy to Cloud: Backup Workflow This procedure for archive-to-cloud builds on the techniques used for copy-to-tape. The difference is that it sends backups to cloud repositories for longer term storage. This procedure includes configuring a credential wallet to store TDE master keys, because backups are encrypted before they are archived to a cloud repository. The initial configuration tasks are performed in the Oracle Key Vault to prepare the wallet. At the end, a job template is created and run for archive-to-cloud. Pre-requisites for Archive-to-Cloud The following prerequisites must be met before starting to use cloud storage with the Recovery Appliance.  Protected database(s) should already be enrolled and backups taken to the Recovery Appliance.  The Recovery Appliance has been registered and enrolled at an Oracle Key Vault. All backup objects archived to cloud storage are encrypted using a random Data Encryption Key (DEK). A Transparent Data Encryption (TDE) master key for each protected database is used to encrypt the DEK; the encrypted DEK is stored in the backup piece. The Oracle Key Vault (OKV) contains the TDE master keys; it does not contain the individual DEKs used to encrypt backups written to tape or cloud. A protected database may acquire many TDE master keys with time, so restoration of an individual archived object requires the protected database's master key in use at time of backup.
  • 2. 1. Incremental backupsentunencryptedtoZDLRA – Virtual Full iscreated 2. ZDLRA requestsencryptionkeyfromOKV server 3. OKV serversendsencryptionkeytoZDLRA 4. ZDLRA encryptsvirtual full backuppiecesandsendsthemtocloudstorage 5. ObjectLifecycle Rulesmove the backuppiecestoArchive Storage. How Oracle Key vault works with Recovery appliance? The Oracle Key Vault (OKV) stores the TDE master keys and also keeps track of all enrolled endpoints. Endpoints are the database servers, application servers, and computer systems where actual cryptographic operations such as encryption or decryption are performed. Endpoints request OKV to store and retrieve security objects. Restore from Cloud Storage
  • 3. 1. Restore requestfromProtectedDatabase isinitiatedonZDLRA 2. ZDLRA requestsencryptionkeyfromOKV server 3. OKV serversendsencryptionkeytoZDLRA 4. ZDLRA requestsbackuppiecesfromcloudstorage 5. If backuppiecesare inArchive Storage,theyare firstrecalledtoObjectStorage 6. ZDLRA retrievesbackuppiecesfromObjectStorage,decryptsthemandsends themtoProtectedDB Restore Directly to On-PremDatabase from CloudStorage 1. Restore requestfromCloudStorage isinitiatedbyProtectedDB 2. ProtectedDB (mustbe enrolledasOKV endpoint) requestsdecryptionkeytoOKV server 3. OKV serversendsdecryptionkeytoProtectedDB 4. ProtectedDB catalogsreadsbackup piecesfromCloudObjectStorage
  • 4. EM Archive to CloudReporting Cloud backup Cost and estimates: Object storage and archive storage on the cloud will be based on Pay as you Go model. Infrequently accessed data is a prime candidate to be archived to the cloud. You can store data in the cloud for less than half a penny per GB of data. And, cloud storage infrastructure scales infinitely, so you will never run out of storage. Moving infrequently accessed data to the cloud will let you stretch your dollar to fit your storage budget! Oracle Cloud InfrastructureArchive Storageis purpose-built to storeall your long living, infrequentlyaccessed data. Whether you havea need to offload data from your primary storagearray, or you wish to archive data for a long duration to stay compliant with governmentregulations, wehaveyou covered. With prices as low as $0.003/GB per month, OracleArchiveStorageoffers a compelling reason for you to archiveinfrequently accessed data to thecloud. Why are we using OCI Object Storageand Archival storage? UseObject Storageto store'hot' data that you need unrestricted and immediateaccess to at all times. ArchiveStorageis ideal for storing 'cold' data that you do not need to access instantaneously. To read data from ArchiveStorage, you need to first 'Restore' thedata (using therestorework flow) to a staging area in Object Storage, where it can be read. Data stays in Object Storagefor a fixed period of timeafter which thedata is returned back to theArchiveStoragepool and becomes inaccessibleonceagain. Please notethat even
  • 5. though you cannot instantaneouslyaccess data in theArchiveStorage, you can retrievethe archived object's metadata at all times.You can use Object Storageto preservebackup and archivedata that must bestored for an extended duration to adhereto various compliance mandates. How Oracle Key Vault Is Licensed? Oracle Key Vault is comprised of the following components: ■ Oracle Key Vault server ■ Oracle Key vault okvutil command-line utility ■ Oracle Key Vault PKCS#11 library ■ Oracle Key Vault management console The licensing is based on a per Oracle Key Vault server installation without per processor cost. There are no license restrictions on the number of endpoints connecting to the Oracle Key Vault server. This license includes restricted use licensing for the entire Oracle Key Vault stack. You should deploy a pair of Oracle Key Vault servers as primary and standby servers for high availability or network topology purposes. Why Kaiser should incorporate copy-to-cloud feature? Oracle’s Recovery Appliance copy-to-cloud feature represents the next leap forward in Oracle database backup and recovery technology. It reduces system, storage and networking overhead, while providing the full range of Oracle database backup & recovery functionality. Copy-to-cloud feature addresses all major sources of data loss by providing superior protection of database transaction logs, comprehensive database-aware block validation, policy based, recovery-aware data retention. Data encryption protect the data at-rest and in-transit in a way that allows to meet the security and compliance requirements with respect to cryptographic algorithms and key management. With various Advantages of object storage, it also includes Excellent for dealing with ransomware. With the ever-growing numbers of malware infections, and specifically ransomware, there is a tremendous need for giving serious thought to data security. Public cloud storage offers a few inherent ways to protect against and recover from ransomware, including cloud IAM and version control. Ransomware continued to dominate the world of cybersecurity. 6 out of 10 malware payloads in Q1 were ransomware. Furthermore, we can safely assume that ransomware has become the biggest security threat any organization or individual may face in the cyber realm.
  • 6. Since an object is immutable (unchangeable), if ransomware encrypts an object, it becomes a new version. A new object is stored while the previous object remains intact, if you have a backup of it. When it comes to object storage and ransomware, object storage will not stop ransomware from attacking, even if it is seldom the target of a ransomware attack. However, what object storage can do is to help speed recovery from a ransomware attack. Additional Data Protection Advantages with Object Storage: Traditional architectures are coming under continual pressure as HDD sizes continue to increase. RAID recovery times are growing, creating vulnerability windows for subsequent failures that can lead to permanent data loss. Object storage uses erasure coding to protect data. This is a data protection scheme that breaks data into shards (fragments or symbols) that are encoded with parity (redundant data), and then stored across multiple storage media. Only a subset of the shards is needed to rehydrate the data and make it available so that in case of a failure, there is no rebuild involved, and no down time.