The document discusses setting up a high availability and disaster recovery (HADR) infrastructure using IBM DB2 Express-C 9.5. It provides an overview of HADR benefits and requirements. The basic HADR setup process uses a graphical wizard to configure a primary database, initialize a standby database from a backup, and setup log replication and automatic client routing. In the event of primary system failure, the standby database can be switched to become the new primary through a takeover process to maintain data availability.
Store data more efficiently and increase I/O performance with lower latency w...Principled Technologies
Compared to an array from another vendor, the PowerMax 8000 offered a better inline data reduction ratio and better performance during simulated OLTP and data extraction workloads
SAP BASIS ONLINE TRAINING MATERIAL by Keylabskeylabstraining
We provide SAP BASIS Online Training, SAP Security online Training, SAP Security with GRC online Training, SAP Netweaver Administration online Training,SAP Solution manager online Training, SAP Basis Training in Hyderabad, SAP BASIS training in Banglore, SAP Security Training in Hyderabad, SAP Security Training in Bangalore,Online training for all SAP modules.We are providing SAP Technical, SAP Functional and SAP Techno-functional Modules.
Are you unsure of the steps needed to get your Continuent Tungsten cluster up-and-running? In this live virtual course, we will teach you how to get from a single database server to a scalable cluster, or from a brittle MySQL replication system to a transparent, manageable Tungsten cluster.
We will discuss the benefits of leveraging Continuent Tungsten clustering with MySQL, and walk you through the steps to implement a Tungsten cluster in Amazon EC2. We'll cover the prerequisites, installing and configuring Tungsten, and best practices that are part of most production installations and proof-of-concepts.
Course Topics:
- Configuring MySQL and the OS for proper installation
- Installing a cross-site cluster
- Schema upgrade on the master database server with minimal application downtime (switch operation)
- Automated failover when a MySQL database server crashes
- Recovery of a failed master to a fully operational slave with a single command (recover operation)
- Switching database operations to a remote site (geo-clustering, cross-site 'switch' operation)
We will also discuss and demonstrate basic operations, such as adding and removing a cluster node, basic monitoring and troubleshooting, and discuss the basic failure scenarios.
Learn how to quickly configure and provision highly optimized Continuent Tungsten deployments in the cloud or on-premises.
Dated: 19th July 2009
By:Shahzad Sarwar To: Related Project Managers/Consultants,Client
Case Study:
To sync data of different branches of office via replication who are running Comsoft application named PCMS.
Store data more efficiently and increase I/O performance with lower latency w...Principled Technologies
Compared to an array from another vendor, the PowerMax 8000 offered a better inline data reduction ratio and better performance during simulated OLTP and data extraction workloads
SAP BASIS ONLINE TRAINING MATERIAL by Keylabskeylabstraining
We provide SAP BASIS Online Training, SAP Security online Training, SAP Security with GRC online Training, SAP Netweaver Administration online Training,SAP Solution manager online Training, SAP Basis Training in Hyderabad, SAP BASIS training in Banglore, SAP Security Training in Hyderabad, SAP Security Training in Bangalore,Online training for all SAP modules.We are providing SAP Technical, SAP Functional and SAP Techno-functional Modules.
Are you unsure of the steps needed to get your Continuent Tungsten cluster up-and-running? In this live virtual course, we will teach you how to get from a single database server to a scalable cluster, or from a brittle MySQL replication system to a transparent, manageable Tungsten cluster.
We will discuss the benefits of leveraging Continuent Tungsten clustering with MySQL, and walk you through the steps to implement a Tungsten cluster in Amazon EC2. We'll cover the prerequisites, installing and configuring Tungsten, and best practices that are part of most production installations and proof-of-concepts.
Course Topics:
- Configuring MySQL and the OS for proper installation
- Installing a cross-site cluster
- Schema upgrade on the master database server with minimal application downtime (switch operation)
- Automated failover when a MySQL database server crashes
- Recovery of a failed master to a fully operational slave with a single command (recover operation)
- Switching database operations to a remote site (geo-clustering, cross-site 'switch' operation)
We will also discuss and demonstrate basic operations, such as adding and removing a cluster node, basic monitoring and troubleshooting, and discuss the basic failure scenarios.
Learn how to quickly configure and provision highly optimized Continuent Tungsten deployments in the cloud or on-premises.
Dated: 19th July 2009
By:Shahzad Sarwar To: Related Project Managers/Consultants,Client
Case Study:
To sync data of different branches of office via replication who are running Comsoft application named PCMS.
CtrlS, the leading data center solution provider, today announced the launch of an innovative, first-of-its-kind solution in India: Disaster Recovery on Demand. CtrlS's DR on Demand framework is built to align to enterprises - large and medium - DR strategy by offering a robust Disaster recovery solution at a cost that suits their budget. CtrlS is using "scalable, ready to deploy private cloud architecture" for this framework. With this solution, CtrlS now supports the full LAMP and Windows Stack for on demand disaster recovery services.
Moments after you move data into your Hadoop cluster or target database, new transactions on source systems make that data incomplete, and analyses done on that data inaccurate.
However, there are several strategies for keeping data in sync between data platforms.
View this webcast on-demand to learn about the advantages and disadvantages of various change data capture strategies, as well as:
• The latest improvements in Syncsort DMX and DMX-h
• The new DMX Change Data Capture software
• How Syncsort can help you keep your data analytics current and accurate
New VMware Continuent 5.0 - A powerful and cost-efficient Oracle GoldenGate a...Continuent
VMware Continuent 5.0 is a complete data replication solution that includes all the functionality you need at one low price. In this webinar, you’ll see how VMware Continuent delivers:
- Migration. Replicate from an old version of Oracle, often running on non-Linux platform (Windows, AIX, HP-UX, Solaris), to a new version of Oracle (often running in Linux). VMware Continuent supports heterogeneous environments.
- On-boarding to Cloud and Service Providers' data centers. Replicate from an old version of Oracle, often running on non-Linux platform, into a virtual or cloud-hosted environment. VMware Continuent is “Cloud-ready”.
- Replication into Analytics (Hadoop, HP Vertica, Amazon Redshift). VMware Continuent offers real-time data loading into analytics and Big Data. This often includes Oracle running on Linux replicating into Hadoop/Vertica analytics.
- Replication to MySQL (and PostgreSQL). There is a lot of interest by customers to save money with open source databases. VMware Continuent supports two-way replication between Oracle and MySQL, and allows off-loading workloads to cost-saving MySQL databases. VMware Continuent will soon allow migration from Oracle to PostgreSQL.
Don’t miss this opportunity to learn about the alternative to Oracle’s tools!
Kertas Kerja Audit Kinerja P3DN v 1.0 ini dirancang untuk membantu Internal Auditor di Pemerintah Daerah dalam mengaudit kinerja P3DN di Pemerintah Daerah. Kami tunggu masukan Anda.
Kebijakan dan Strategi Penggunaan Produk Dalam Negeri (PDN) dalam upaya Mendukung Ketahanan Ekonomi dan Daya Saing Bangsa ini disajikan oleh unsur Lembaga Kebijakan Pengadaan Barang/Jasa ketika membahas rancangan indikator kinerja Percepatan Peningkatan Penggunaan Produk Dalam Negeri (P3DN) dan pengawasan kolaboratifnya pada 21 Juni 2023
Slide ini berisi rancangan indikator kinerja Percepatan Peningkatan Penggunan Produk Dalam Negeri (P3DN) beserta pengawasan kolaboratifnya versi 21 Juni 2023.
Silahkan diberikan tanggapan jika Anda tertarik.
Fenomena penerapan manajemen kinerja yang terperangkap sebagai kegiatan administratif, kurang memberikan nilai, harus menjadi perhatian kita bersama. Pertanyaannya adalah: Bagaimanakah agar kita, pegawai sektor publik di Indonesia, dapat menerapkan manajemen kinerja yang memberikan nilai?
Bagaimanakah menjadi auditor millenial yang handal di masa depan? Pandemi Covid-19 telah memberikan pelajaran penting bagi kita semua, termasuk para auditor. Auditor millenial dapat mengambil pelajaran penting dari Pandemi Covid-19 ini, terutama bagaimana mereka bisa berperan di masa depan agar tetap sustain keberadaannya.
Materi ini disampaikan pada acara AuditZone di Poltek Keuangan STAN tanggal 15 Januari 2021. Semoga menginspirasi Anda semua.
I shared my presentation in TOP Digital Awards 2020. You can learn on what the challenges of internal auditors during Pandemic COVID-19 and how my office transformed digitally as an internal audit agency.
Slide ini akan menguraikan pentingnya memahami budaya dan peran pengawasan intern berbasis risiko dalam mempercepat penerapan manajemen risiko di kementerian/lembaga.
Video lengkapnya tentang materi ini ada di link youtube ini:
https://youtu.be/J9R74R2Pi18
https://youtu.be/BTYYVsVpZ84
This presentation is a concept to support the President of Indonesia in managing his/her accountability using advanced information technology. A prototype was developed. Therefore, this presentation also shows the weakness that observed when implemented. The successors who want to implement a similar system should learn from the experiences shown by this presentation. Learning from past experiences will enable the possibility to implement a similar system successfully in the future.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Hadr db2express
1. June 08
Information Management software
High Availability and Disaster
Recovery
Creating Robust and Reliable Data Server
Clusters with IBM® DB2® Express-C 9.5
Ian Hakes
IBM Software Group
2. DB2 Express-C – High Availability and Disaster Recovery
Page 2
CONTENTS
1. Executive Summary
1. Executive summary
2
2. DB2 Express-C 9.5: 12 Month
License and Subscription
2
3. HADR benefits
3
4. HADR synchronization 3
5. HADR client routing
5
6. Requirements
6
7. Basic HADR setup
7
8. HADR recovery
11
9. Conclusion
12
10. Terminology
13
11 References and Resources
15
The goal of a High Availability and Disaster Recovery
(HADR) solution is to provide a means to shift data
processing and retrieval to a standby system in the
event of a primary system failure.
The recently announced DB2 Express-C 9.5: 12 Month
License and Subscription offering gives companies and
organizations with top flight database requirements the
ability to run a high availability infrastructure at a very
attractive price point.
IBM DB2 products are known for their reliability and their
extensive administration and application development
toolsets, and the inclusion of a high availability licensing
option makes DB2 Express-C an even more attractive
choice for your database software needs.
2. DB2 Express-C 9.5: 12 Month License and
Subscription
IBM announced that the no-charge DB2 Express-C
database will have an available support license
offering, aimed at lower and mid-market database
segments. This new DB2 Express-C 9.5 offering includes
a license for the DB2 High Availability (HA) code,
offering customers the ability to create a best of breed
database HADR infrastructure within their own
organizations for minimal database software costs.
The HADR application code included in this latest
offering of DB2 Express-C 9.5 seamlessly manages the
replication of logged databases for local or remote
systems. Database logs from the HADR primary system
are sent via TCP/IP network connection to the HADR
standby system where they are applied to the replica
database. This standby database is then able to take
over data transaction and processing if the primary
3. DB2 Express-C – High Availability and Disaster Recovery
Page 3
system is offline, because of system upgrades,
hardware failure, or in the event of a disaster striking
the primary data center.
3. HADR Benefits
Why choose to set up an HADR solution for your
organization?
The benefits of providing your customer base with
uninterrupted data access are clear: more uptime
means more bottom line results. There are no worries
about being called to account for lost revenue or
customers due to system instability or downtime.
A full DB2-supported HADR solution gives you:
• Lightning fast failover capability, with complete
transparency for customers and client
applications
• Full transaction atomicity to prevent data loss
• The ability to upgrade systems or applications
without visible service interruption
• Remote system failover, providing full recovery
from local disaster striking the data center
• The ability to run 1 to 1, n to 1, or 1 to n scenarios
for primary to standby databases on different
systems, since HADR replication occurs at the
database level, rather than the DB2 instance
level
• Easy management with DB2 graphical tools
• All of this with negligible impact on overall system
performance over a standard database
4. HADR Synchronization
Synchronization of DB2 database logs is essential to
maintaining the HADR infrastructure between the
primary and standby systems. DB2 Express-C offers an
HADR administrator several choices for balancing
performance and reliability.
4. DB2 Express-C – High Availability and Disaster Recovery
Page 4
The first option is a full Synchronous mode. In this
scenario, log writes on the primary system are held until
the standby system sends an acknowledgment that the
same log page has been written to the standby
database. The benefit here is that there is no possible
data loss between the systems, but this comes at the
cost of performance on the primary, because the
primary logging is held up until the confirmation
message is returned.
The second choice, and the default choice for DB2
HADR, is the Near Synchronous mode. In Near
Synchronous mode, the primary system again sends the
log page to the standby system, and holds the primary
log write, but in this mode, the acknowledgement
needed for the primary log write is sent back as soon as
the standby system has received the log. The standby
log writer then proceeds to add the information to the
standby database. While this does create the remote
possibility of data loss if the standby and primary both
fail simultaneously, this mode is the best compromise of
speed and reliability for the HADR infrastructure.
The final option is an Asynchronous mode, where the
primary log writes are written to the primary disk and
then sent out to the standby system for the standby log
replication. Obviously, any failure of the primary,
standby, or the connecting network would cause the
loss of the log data; then any failure to the primary
system would mean actual data loss after an HADR
failover.
The following figure outlines the three possible modes in
relation to their position in a successful database
transaction.
5. DB2 Express-C – High Availability and Disaster Recovery
Page 5
Figure 1: HADR Synchronization Modes
5. HADR Client Routing
Client application connections are the heart of any
database processing system. In an HADR infrastructure,
DB2 utilizes automated client routing (ACR) settings to
properly manage client requests to the database. The
ACR is aware of which system holds the primary
database in the HADR infrastructure and will direct all
incoming client requests there.
The connection information (hostname and service
port) for the standby database is set by the HADR
administrator on the primary system. This information is
transferred to the client when a connection is made to
the primary database.
In the event of a primary database failure, the client
application will receive a connection failure message
and will then attempt to connect to the standby system
using the stored ACR information. Once the standby
6. DB2 Express-C – High Availability and Disaster Recovery
Page 6
database has taken over as the new primary through
the HADR failover process, it will then accept the client
connection and the application can continue
uninterrupted.
Figure 2: HADR Automatic Client Routing
6. Requirements
To fully enable a DB2 HADR solution, both the primary
and standby systems must have:
• A reliable TCP/IP network connection
• A licensed copy of the DB2 Express-C 9.5: 12
Month License and Subscription offering to
provide the HA licensing
• The operating system and its level must be the
same (either all Windows® or all Linux®, with the
same patch level, and, on Linux, the same kernel
level)
• The DB2 application version (e.g. DB2 9.5) and
bit-level (e.g. 32 or 64 bit) must be the same
• The DB2 databases must have the same
database name on each system
• The DB2 database table spaces much be
identical in terms of table space type and size,
and the container path, size and file type must
be the same
• The DB2 buffer pool sizes should be the same
7. DB2 Express-C – High Availability and Disaster Recovery
Page 7
•
The space allotted for database log files should
be the same
Bear these requirements in mind when planning to
implement an HADR solution.
7. Basic HADR Setup
In DB2, a graphical setup wizard provides the HADR
administrator an efficient and straightforward means of
creating and managing an entire HADR infrastructure
from scratch.
A complete step-by-step guide to installing the entire
HADR infrastructure is beyond the scope of this
document, but the simplified setup is as follows.
On the primary system, select the existing database to
be replicated and open the High Availability and
Disaster Recovery set up wizard:
Figure 3: Launch HADR Set Up Wizard
8. DB2 Express-C – High Availability and Disaster Recovery
Page 8
After this, confirm the primary database settings, setting
up archival logging (if required), and take a database
backup. This backup will be used to create the new
standby database.
The next step is to identify the standby system and the
specific instance where the standby database will
reside:
Figure 4: HADR Standby configuration wizard
DB2 must be installed and running on the standby
system, and an instance must already exist (this is
typically part of a normal DB2 installation). The DB2
database discovery feature can be used here to
retrieve the settings for the standby DB2 server.
After the standby system and instance have been set,
the HADR wizard will create the standby database. The
recommended method is to use a recent backup of
the primary database:
Figure 5: HADR Standby initialization options
There is also an option to copy over any DB2 database
objects that are not normally part of a database
backup, so that the standby database has all the DB2
9. DB2 Express-C – High Availability and Disaster Recovery
Page 9
objects as the primary database and any potential
HADR takeover will go smoothly.
The HADR wizard then configures the network
communication parameters, including the HADR ports,
and initializes the automatic client routing (ACR):
Figure 6: ACR configuration options
After the ACR configuration, the HADR Wizard asks for
the database synchronization mode, using one of 3
choices:
Figure 7: HADR Synchronization options
The final step commits all the changes and starts the
HADR on the databases.
10. DB2 Express-C – High Availability and Disaster Recovery
Page 10
While executing all the HADR setup tasks, DB2
announces the status of each task with this dialog:
Figure 8: A successful HADR setup completion dialog
The HADR infrastructure is also managed from inside the
DB2 Control Center, providing a graphical view of the
HADR system status:
Figure 9: HADR management status
11. DB2 Express-C – High Availability and Disaster Recovery
Page 11
This interface also provides the means to execute HADR
takeover tasks:
This is a simplified version of the entire HADR Wizard
setup process, but it is instructive to see how thorough
the wizard is in creating a customized HADR
infrastructure.
8. HADR Recovery
If disaster strikes the primary data server site, or if the
primary system or database suffers failure, then the
priority of the DB2 HADR system is to execute a failover
to the standby system, and thereby maintain data
availability for client applications. The HADR failover
and recovery process is relatively straightforward:
1. The primary database experiences a failure (due
to primary system or database crash, or disaster
at the primary site).
12. DB2 Express-C – High Availability and Disaster Recovery
Page 12
2. The standby system detects the communications
failure and notifies the HADR administrator that
the primary can no longer be reached.
3. After the HADR administrator confirms the
primary failure, he or she then executes a
“Takeover by Force”, thereby turning the standby
into the new primary database. (For a fully
automated failover solution, third party HA
clustering software is required to automatically
handle the process).
4. Client applications that have been set up to use
Automated Client Routing (ACR) will now access
the new primary database for data retrieval.
5. Once the former primary system has been
restored to working state, the former primary
database is restarted as the new standby
database for the HADR infrastructure. This
prevents a “split-brain” scenario where the HADR
infrastructure has two primary databases.
6. The HADR infrastructure will then use the logs from
the new primary to bring the two databases
back to a peer state.
7. If desired, once the HADR peer state has been
achieved, the HADR roles can be switched back,
restoring the HADR databases back to the
original locations.
9. Conclusion
Continuous data availability is a business necessity in
today’s aggressively competitive marketplaces.
Application outages are unacceptable: if your
customer records, inventory levels, or e-commerce
websites are unavailable due to data server downtime,
then your organization loses customers and money.
The solution is an HADR infrastructure based on the DB2
Express-C 9.5: 12 Month License and Subscription
offering, creating a fault tolerant system to ensure that
13. DB2 Express-C – High Availability and Disaster Recovery
Page 13
your data is always available, always accurate, and
always delivering customer satisfaction.
10. Terminology
Active system: Another term for a primary system in an
HA infrastructure.
Cluster: A combination of at least two computer
systems that act together to appear as a single
“virtual” system to end-user applications. In DB2
Express-C 9.5 HADR scenarios, the cluster has a primary
system, and a standby system to take over in case of a
failure.
DR: disaster recovery. The methodology of having offsite systems available to take over computing
operations, and to provide a restoration base for
primary systems, in case of catastrophic failure of the
local primary systems.
Failover: The transfer of computing operations from the
primary system to the standby system.
HA: high availability. The computer systems involved
are expected to maintain the availability of data
access and processing power at all times. Typical high
availability systems have at least 99.99% uptime.
HADR: Acronym for a computing system cluster that
offers both High Availiability and Disaster Recovery.
HADR Infrastructure: A term that refers to the primary
and standby systems, along with the network
connectivity and administration to set up and manage
the HADR computer systems
Hardware redundancy: Within a physical computer, the
hardware components have backups to handle
demand if one component fails. Typical items targeted
14. DB2 Express-C – High Availability and Disaster Recovery
Page 14
for hardware redundancy are hard drives (through a
RAID) and power supplies.
Heartbeat: A short communication message, delivered
over a TCP/IP connection, between two computer
systems providing an indication that the system is online
and available.
Node: A single computer that has been incorporated
into a cluster.
Primary system: The computer system (hardware,
software and network) hosting the primary database in
a cluster. In an HADR infrastructure, this system is
responsible for primary data processing, as well as
managing the HADR synchronization.
Peer state: A term to describe the situation when two
systems in an HADR infrastructure have identical
information available for processing; in the event of a
failure, no data loss occurs during failover.
Secondary system: Another term for a standby system
in an HADR infrastructure.
Standby system: The counterpart to a primary system in
an HADR infrastructure. The standby system (hardware,
software and network) is kept up to date with the
information from the primary system. In the event of a
primary system failure, the standby system can take
over the primary system role.
15. DB2 Express-C – High Availability and Disaster Recovery
Page 15
11. References and Resources
For further information on the DB2 Express-C 9.5: 12
License and Subscription offering or on IBM DB2 High
Availability and Disaster Recovery concepts and
background, visit any of these online resources:
IBM DB2 Express-C website:
• http://www.ibm.com/db2/express/
High Availability and Scalability Guide for DB2 on Linux,
UNIX and Windows Redbook:
• http://www.redbooks.ibm.com/
IBM DB2 Data Recovery and High Availability Guide
and Reference:
• ftp://ftp.software.ibm.com/ps/products/db2/info
/vr9/pdf/letter/en_US/db2hae90.pdf
IBM DB2 Information Center:
• http://publib.boulder.ibm.com/infocenter/db2lu
w/v9/