SlideShare a Scribd company logo
1 of 54
Download to read offline
1 | Understanding IBM i HA Options
Understanding
IBM i HA Options
Becky Hjellming, Director, Product Marketing
John Dunn, Senior Product Manager
• Technical differences between hardware replication and
journal-based replication
• Practical differences between hardware replication and
journal-based replication
• Considerations to keep in mind when considering cloud-
hosted DRaaS
• How to increase confidence in your HA solution
• Questions to ask when considering HA options
Today’s Topics
All the HA claims sound
the same. What’s the
difference?
On-prem or cloud-
hosted? How do I
choose?
What can I do to
be sure we are
switch ready?
| Understanding IBM i HA Options2
Hardware and Journal-Based
Replication Technology
Technology Considerations
1. Underlying architecture
2. Replication and recovery point
3. Bandwidth usage
4. Online or offline target
5. Application and data requirements
6. Damaged object replication
7. Access path recovery
8. Topology flexibility
Weighing HA
Options
| Understanding IBM i HA Options4
Underlying Architecture
• IBM storage provides the underlying mechanism for
SAN to SAN replication
• Sectors written to the source SAN are replicated to
the tightly coupled target SAN
• Only applications and data in IASPs are replicated
• Switching is done by attaching storage to a secondary
server and recovering to that server
Storage Replication
SAN SAN
| Understanding IBM i HA Options5
Underlying Architecture
• IBM storage provides the underlying mechanism for
SAN to SAN replication
• Sectors written to the source SAN are replicated to
the tightly coupled target SAN
• Only applications and data in IASPs are replicated
• Switching is done by attaching storage to a secondary
server and recovering to that server
• IBM Journaling provides the underlying replication
mechanism for Journal-Based Replication solutions
• Replication is done server to server
• Supports internal, external or mixed storage
• Switching is done to a live target without recovery
steps
Storage Replication Journal-Based Replication
Server Server
SAN SAN
| Understanding IBM i HA Options6
Replication and Recovery Point
• IBM i OS uses memory as a cache
• Data may be either in memory or on disk
• Data is not protected until written to disk
• Unknown time after transaction completes
• Results in non-zero, unpredictable RPO
• Journaling is required with Storage Replication
• Journaling saves data to disk before transactions complete
• Provides transaction integrity and near-zero RPO
Storage Replication
Server
Storage
No memory to memory
transfer
Disk sectors
Server
Storage
| Understanding IBM i HA Options7
Replication and Recovery Point
• IBM i OS uses memory as a cache
• Data may be either in memory or on disk
• Data is not protected until written to disk
• Unknown time after transaction completes
• Results in non-zero, unpredictable RPO
• Journaling is required with Storage Replication
• Journaling saves data to disk before transactions complete
• Provides transaction integrity and near-zero RPO
• Journaling eliminates issues associated with
delayed disk writes due to memory caching
• Journaling saves data to disk and replicates it before
the end of each transaction
• Asynchronous and synchronous options support
near-zero or zero RPO
Storage Replication Journal-Based Replication
Server
Storage
No memory to memory
transfer
Disk sectors
Server
Storage
Journal EntriesServer
Storage
Server
Storage
| Understanding IBM i HA Options8
Bandwidth Usage
• The bandwidth needed for SAN replication is
over twice that needed by logical replication
• Journaled data is replicated
• All sectors (files, objects and temporary files) are
replicated again when written to disk
• Initial synchronization and any re-sync processes are
also bandwidth intensive
Storage Replication
journals
data
Sector Replication
Server
SAN
Server
SAN
| Understanding IBM i HA Options9
Bandwidth Usage
• The bandwidth needed for SAN replication is
over twice that needed by logical replication
• Journaled data is replicated
• All sectors (files, objects and temporary files) are
replicated again when written to disk
• Initial synchronization and any re-sync processes are
also bandwidth intensive
• Journaling replicates only changed data
• Bandwidth can be further reduced through
• Filtering non-critical data from replication
• Journal optimizations
• RJ filtering (Option 42 – HA Journal Performance)
• JRNMINDTA
• Hardware compression
Storage Replication Journal-Based Replication
journals
data
Sector Replication
Server
SAN
Server
SAN
objects
Logical Replication
Server Server
| Understanding IBM i HA Options10
Online or Offline Target
• SAN to SAN replication does not support
a live backup server
• IASP must be varied on to a server to be used
• Some users add flash technology to storage
replication
• Provides only a point-in-time copy of the data
• Must be varied on to a server to be used
• Quickly becomes stale as flashes are no real time
Storage Replication
Server SAN SAN
Server
| Understanding IBM i HA Options11
Online or Offline Target
• SAN to SAN replication does not support
a live backup server
• IASP must be varied on to a server to be used
• Some users add flash technology to storage
replication
• Provides only a point-in-time copy of the data
• Must be varied on to a server to be used
• Quickly becomes stale as flashes are no real time
• The backup server is always current and live in a
journal-based replication solution
• The backup server may be used to off-load work
from the production server, including
• Reporting
• BI
• Testing
• Tape saves
• More
Storage Replication Journal-Based Replication
Server SAN SAN
Server
Server Server
| Understanding IBM i HA Options12
Application and Data Requirements
• Applications must run in an IASP to be protected by
Storage Replication
• Effort to convert and test applications can be substantial
• Application data must also reside in an IASP to be
protected by Storage Replication
• Application data in SYSBAS is not protected
• Admin Domain does not fully protect SYSBAS
Storage Replication
| Understanding IBM i HA Options13
Application and Data Requirements
• Applications must run in an IASP to be protected by
Storage Replication
• Effort to convert and test applications can be substantial
for some applications
• Application data must also reside in an IASP to be
protected by Storage Replication
• Application data in SYSBAS is not protected
• Admin Domain does not fully protect SYSBAS
• No application changes required
• Journal-Based Replication is independent of the
underlying storage configuration
• Journal-Based Replication can replicate to and
from SYSBAS, ASP, IASP or mixed environments
• Applications for every vertical are supported (e.g.
banking, retail, logistics, health, etc.)
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options14
Damaged Object Replication and Repair
• Objects damaged on the source system’s storage will
be propagated to the target
• Damaged objects detected during the IPL or vary on
are marked by the OS
• Damaged objects will require recovery from backup
media, negatively impacting both RTO and RPO
Storage Replication
| Understanding IBM i HA Options15
Damaged Object Replication and Repair
• Objects damaged on the source system’s storage will
be propagated to the target
• Damaged objects detected during the IPL or vary on
are marked by the OS
• Damaged objects will require recovery from backup
media, negatively impacting both RTO and RPO
• Journal-Based Replication cannot propagate
damaged objects from the source to the target
• Journal-Based Replication audits ensure objects
damaged on either the source or target are
detected, repaired and reported
• Live target data is always ready for switch without
added object recovery steps
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options16
Access Path Recovery
• Recovery from unplanned failure may require access
paths to be rebuilt
• Time to rebuild access paths varies based on storage,
system, file and the access path itself – can be a
lengthy process
• If access paths are invalidated during a switch
process’ vary-on, the application cannot start until
keyed access paths have been rebuilt
Storage Replication
| Understanding IBM i HA Options17
Access Path Recovery
• Recovery from unplanned failure may require access
paths to be rebuilt
• Time to rebuild access paths varies based on storage,
system, file and the access path itself – can be a
lengthy process
• If access paths are invalidated during a switch
process’ vary-on, the application cannot start until
keyed access paths have been rebuilt
• There is no exposure to rebuilding access paths
during a Journal-Based Replication switch
• Journal-Based Replication solutions can audit
access paths to verify their integrity
• Journal-Based Replication cannot replicate
invalidated access paths from the source to target
• Journal-Based Replication allows you to minimize
downtime by switching to the target during a long
access path recovery on the production server
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options18
Topology Flexibility
• Storage Replication replicates SAN to SAN
• Source and target SAN hardware must be similar
• Source and target OS and levels must be similar
• Storage Replication replicates from IASP to IASP
• Distance limitations must be understood for Storage
Replication options
Storage Replication
| Understanding IBM i HA Options19
Topology Flexibility
• Storage Replication replicates SAN to SAN
• Source and target SAN hardware must be similar
• Source and target OS and levels must be similar
• Storage Replication replicates from IASP to IASP
• Distance limitations must be understood for Storage
Replication options
• Journal-Based Replication is storage-independent.
Replication is supported in SAN, internal storage,
or mixed storage environments.
• Journal-Based Replication is OS-independent.
Replication between source and target servers
with different OS versions, TR and PTF levels is
supported.
• Supports replication between ASP, IASP and
SYSBAS
• No distance limitations enables replication
between on-premises and cloud servers
• Broadcast to multiple targets is supported
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options20
Hardware and Journal-Based
Practical Considerations
Behavior in Common Scenarios
1. Initial synchronization
2. Unplanned switch
3. Planned switch
4. Reporting
5. Target integrity validation
6. Recovery from network issues
7. Operating system upgrade
8. Storage event management
9. Workload distribution
Weighing Your
HA Options
| Understanding IBM i HA Options22
Scenario 1 – Initial Synchronization
• SAN solutions require a full storage sync before
steady state replication can begin
• All storage sectors are sent across the network
• Limitations must imposed on the quantity of data
going across the wire or synchronization may
never complete
Sectors
SAN SAN
All storage
SYSBAS
IASP
SYSBAS
IASP
Storage Replication
| Understanding IBM i HA Options23
Scenario 1 – Initial Synchronization
• SAN solutions require a full storage sync before
steady state replication can begin
• All storage sectors are sent across the network
• Limitations must imposed on the quantity of data
going across the wire or synchronization may
never complete
• Journal-Based Replication solutions provide many
options for the initial sync
• Save and restore from tape
• Storage copy
• Physical drive swap
• Audit over time
• Object sync commands
• And more
• Reduces impact on network
Sectors
SAN SAN
All storage
SYSBAS
IASP
SYSBAS
IASP
Objects audited over time
Initial object replication
Tape
Selected objects
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options24
Scenario 2 - Unplanned Switch
• To switch, the target system must go through a vary
on process to recover transaction integrity – similar
to an abnormal IPL
• A vary on has 34 steps – most of which are recovery
steps of indeterminate length
• Some steps may result in invalidated access paths,
damaged objects, etc.
• Damaged objects detected during vary on require
manual intervention
Storage Replication
| Understanding IBM i HA Options25
Scenario 2 - Unplanned Switch
• The target system is a hot standby with journal-
based replication solutions
• No vary-on process required
• Data has been audited for integrity
• No need to rebuild access paths
• Solutions may provide automation around the
switch from source to target that
• Runs switch steps in parallel when possible
• Provides visibility into progress of each step
• No post-switch recovery steps necessary
• To switch, the target system must go through a vary
on process to recover transaction integrity – similar
to an abnormal IPL
• A vary on has 34 steps – most of which are recovery
steps of indeterminate length
• Some steps may result in invalidated access paths,
damaged objects, etc.
• Damaged objects detected during vary on require
manual intervention
Diagram on next slide
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options26
Scenario 2 - Unplanned Switch Timeline
Switch
Vary On
(“IPL” of IASP)
Application
Restart
Switch
Application
Restart
Complete Applies
System Crash1. Waiting for devices - none present
2. Cluster vary job submission
3. Waiting for devices - not all present
4. DASD checker
5. Storage management recovery
6. Synchronization of mirrored data
7. Synchronization of mirrored data-2
8. Scanning DASD pages
9. Directory recovery - perm directory
10. Authority recovery
11. Context rebuild
12. Journal recovery
13. Database recovery
14. Journal synchronization
15. Commit recovery
16. Database initialization
17. Journal cleanup
18. Commit initialization
19. User profile creation
20. Database, journal, commit-1
21. Identifying interrupted DDL ops
22. Recovering system managed jrnls
23. POSIX directory recovery
24. Database, journal, commit-2
25. Commit recovery - 2
26. Cleaning up journal receivers
27. Cleaning up cross-reference files
28. UID/GID mismatch correction
29. Database access path recovery
30. Database cross-reference file merge
31. SPOOL initialization
32. Image catalog synchronization
33. Command analyzer recovery
34. Catalog validation
Post Vary On
Recovery
System Crash
• Damaged object recovery
• Access path rebuild
Time
Think Time
Vary On
recovery
time
cannot be
predicted
recovery
Journal-Based Replication delivers a
significantly lower recovery time for
unplanned outages
Storage Replication Journal-Based Replication
27
Scenario 3 - Planned Switch
• Storage Replication solutions require a vary off
before the switch
• Requires 34-step vary on after the switch
• Vary on can be impacted by configuration issues,
such as duplicate library names and UID/GID
mismatches
Storage Replication
| Understanding IBM i HA Options28
Scenario 3 - Planned Switch
• Storage Replication solutions require a vary off
before the switch
• Requires 34-step vary on after the switch
• Vary on can be impacted by configuration issues,
such as duplicate library names and UID/GID
mismatches
• Target system is a hot standby
• No vary on process required
• Solutions may regularly audit target data for integrity
• Solutions may provide automation around the switch
from source to target that
• Runs switch steps in parallel when possible
• Provides visibility into progress of each step
Storage Replication Journal-Based Replication
Diagram on next slide
| Understanding IBM i HA Options29
Scenario 3 - Planned Switch Timeline
Switch
Application
Restart
Switch
Application
Restart
Application
Shut Down
Vary On
(“IPL” of IASP)
1. Waiting for devices - none present
2. Cluster vary job submission
3. Waiting for devices - not all present
4. DASD checker
5. Storage management recovery
6. Synchronization of mirrored data
7. Synchronization of mirrored data-2
8. Scanning DASD pages
9. Directory recovery - perm directory
10. Authority recovery
11. Context rebuild
12. Journal recovery
13. Database recovery
14. Journal synchronization
15. Commit recovery
16. Database initialization
17. Journal cleanup
18. Commit initialization
19. User profile creation
20. Database, journal, commit-1
21. Identifying interrupted DDL ops
22. Recovering system managed jrnls
23. POSIX directory recovery
24. Database, journal, commit-2
25. Commit recovery - 2
26. Cleaning up journal receivers
27. Cleaning up cross-reference files
28. UID/GID mismatch correction
29. Database access path recovery
30. Database cross-reference file merge
31. SPOOL initialization
32. Image catalog synchronization
33. Command analyzer recovery
34. Catalog validation
Vary Off
Time
Application
Shut Down
Journal-Based Replication delivers a
lower recovery time for
planned outages
Storage Replication Journal-Based Replication
30
Scenario 4 – Reporting
• Data on the target SAN is not accessible until varied
on to a server
• Other than point-in-time storage flashes, Storage
Replications solutions cannot support reporting
from the target
sectors
Server
SAN
Server
SAN
Storage Replication
| Understanding IBM i HA Options31
Scenario 4 – Reporting
• Data on the target SAN is not accessible until varied
on to a server
• Other than point-in-time storage flashes, Storage
Replications solutions cannot support reporting
from the target
• Reports can be run from any target
• Broadcast replication can feed multiple targets for
queries and reports (as well as additional HA/DR
servers)
• Vendors may provide solutions that simplify
management and switching of multi-node
environments.
sectors
Server
SAN
Server
SAN
Remote
DR Server
Reporting
Server
Primary
HA Server
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options32
Scenario 5 – Target Integrity Validation
• With Storage Replication, the target SAN cannot be
audited for integrity
• If the target SAN becomes out of sync, a partial or
full resynch of the storage image is required
• Corruption introduced by dirty networks may be
undetectable until the data is read
No audits of target SAN
SAN SAN
SYSBAS
IASP
SYSBAS
IASP
Storage Replication
| Understanding IBM i HA Options33
Scenario 5 – Target Integrity Validation
• With Storage Replication, the target SAN cannot be
audited for integrity
• If the target SAN becomes out of sync, a partial or
full resynch of the storage image is required
• Corruption introduced by dirty networks may be
undetectable until the data is read
• Journal-based replication solutions may offer
methods for validating the live target
• Self-healing audits
• Continuous monitoring of target data
• Solutions may offer virtual switch features to enable
switch testing without production server impact
• Remote Journaling offers validity check to detect
network corruption
No audits of target SAN
SAN SAN
SYSBAS
IASP
SYSBAS
IASP Object comparison
Audits
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options34
Scenario 6 – Recovery from Network Issues
• Depending on the extent of the outage, a partial or
full synchronization of stored sectors may be
required
• SAN is not protected until the full or partial resync is
complete
Sectors
SAN SAN
SYSBAS
IASP
SYSBAS
IASP
Storage Replication
| Understanding IBM i HA Options35
Scenario 6 – Recovery from Network Issues
• Depending on the extent of the outage, a partial or
full synchronization of stored sectors may be
required
• SAN is not protected until the full or partial resync is
complete
• After communication resumes, Journal-Based
replication solutions will catch up with journal entries
• Remote Journaling will repackage journal entries into
large block transfers to quickly catch up
• HA/DR protection is in effect as soon as the transfers
catch up
Sectors
SAN SAN
SYSBAS
IASP
SYSBAS
IASP Journal entries
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options36
Scenario 7 – Operating System Upgrade
• Once you switch to the upgraded target server, you
cannot switch back to the original production server
until the upgrade completes successfully
• There is no option to go back to a lower OS level
after switching to a higher OS level
Upgrade the target
server to the new OS
version and validate.
Production
Server
Target
Server
1. Switch to the target server. The IASP
image will be upgraded as part of
Vary On. This is non-reversible and
must complete successfully.
1. Upgrade original
production server to
the same level as the
target. Switch back.
SAN
SYSBAS
IASP
SAN
SYSBAS
IASP
Storage Replication
| Understanding IBM i HA Options37
Scenario 7 – Operating System Upgrade
• Once you switch to the upgraded target server, you
cannot switch back to the original production server
until the upgrade completes successfully
• There is no option to go back to a lower OS level
after switching to a higher OS level
• Journal-Based Replication solutions fully support
replication from higher to lower OS levels
• Journal-Based solutions enable an “upgrade, test and
switch” process that removes risk and downtime from
an OS upgrade
• A 3rd node can remove risk of outage during upgrade
Upgrade the target
server to the new OS
version and validate.
Production
Server
Target
Server
1. Switch to the target server. The IASP
image will be upgraded as part of
Vary On. This is non-reversible and
must complete successfully.
1. Upgrade original
production server to
the same level as the
target. Switch back.
SAN
SYSBAS
IASP
SAN
SYSBAS
IASP
Production
Server
Target
Server
Secondary
Target
1) Upgrade the target server to
the new OS version and
validate. Switch to the target
server.
1. Upgrade the production
server to the new OS
version. Switch back to
the production server.
1. Replication to a secondary
target is recommended to
protect against outages
during the upgrade.
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options38
Scenario 8 – Storage Event Management
• Source and target storage images are tightly coupled
(bit by bit copy)
• Single system storage events or storage image issues
can require production downtime
• For example, Reclaim Storage (RCLSTG) events create
protection downtime
SAN SAN
Storage Replication
| Understanding IBM i HA Options39
Scenario 8 – Storage Event Management
• Source and target storage images are tightly coupled
(bit by bit copy)
• Single system storage events or storage image issues
can require production downtime
• For example, Reclaim Storage (RCLSTG) events create
protection downtime
• Journal-Based Replication is isolated from the storage
layer by IBM local or remote journaling
• Storage events can be addressed with little impact on
production operations
• For example, can switch to target while doing
Reclaim Storage (RCLSTG) on production
Server Server
SAN SAN
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options40
Scenario 9 – Workload Distribution
• With Storage Replication the target SAN is locked
and cannot be read from or written to
• Workloads run entirely on the source and cannot be
balanced between the two systems
• Some Storage Replication users add flash solutions
to offload work to a snapshot; however, it is point in
time and requires more resources
Write: No
Read: No
Write: ACTIVE
Read: ACTIVE
SAN SAN
SYSBAS
IASP
SYSBAS
IASP
Storage Replication
| Understanding IBM i HA Options41
Scenario 9 – Workload Distribution
• With Storage Replication the target SAN is locked
and cannot be read from or written to
• Workloads run entirely on the source and cannot be
balanced between the two systems
• Some Storage Replication users add flash solutions
to offload work to a snapshot; however, it is point in
time and requires more resources
• Journal-Based Replication solutions support multiple
replication topologies (e.g.1-to-1, broadcast, cascade,
bidirectional)
• Standard 1-to-1 HA/DR by default would use a
readable target that cannot be written
• Active-active solutions with collision handling enables
workload distribution between two servers working
on the same customer data and a near-zero RTO
Write: No
Read: No
Write: ACTIVE
Read: ACTIVE
SAN SAN
SYSBAS
IASP
SYSBAS
IASP
Write: ACTIVE
Read: ACTIVE
Application
Data
Write: ACTIVE
Read: ACTIVE
Bi-Directional
Replication
Application
Data
Write: No
Read: ACTIVE
or
Storage Replication Journal-Based Replication
| Understanding IBM i HA Options42
• How will the initial sync be accomplished and what bandwidth is required?
• What bandwidth is required for steady-state replication?
• What RTO/RPO will I be able to achieve?
• Will I have visibility into my ability to meet RTO/RPO at any particular point?
• Can I speak to current customers about their experiences with planned and
unplanned switches?
• How can I know that no corruptions are being introduced into my target data
that will impact my switch time? Can I test without production impact?
• How much flexibility do I have for replication topologies? Can I have nodes for
HA, DR and reporting? Can I workload balance with bidirectional replication?
• When I need to upgrade to the next version of the IBM i OS, what does that
process look like?
• What is the total cost of all software and hardware components required?
• Can I offload reporting or other maintenance tasks to my target server? If so,
will the data be current?
| Understanding IBM i HA Options43
Questions to Ask
How much bandwidth is
required?
What RTO are
customers like me
achieving?
How do I validate
my switch
readiness?
Considerations for DRaaS
in the Cloud
• Reduces cost of obtaining a second system or access to a
secondary site or data center
• Reduces complexity of managing all aspects of a full solution
internally
• Delivers flexibility in ground and cloud configurations and allows
applications to be added or removed from protection as needs
evolve
• Saves time to implement a solution by leveraging a hosting
provider’s infrastructure
• Provides a comprehensive HA/DR solution if you’re ready to step
up from a solution that doesn’t meet your RPO/RTO needs
| Understanding IBM i HA Options45
Reasons to Consider DRaaS
Ask for details about your MSP’s infrastructure,
their policies and SLAs, and the DRaaS solution they
employ. Not all DRaaS solutions deliver the same results!
1. Recovery point and recovery time SLAs
2. DR center locations and infrastructure capacity to handle
DR workloads and failover
3. Onboarding process and migration to MSP’s cloud
4. Privacy and security of your data
5. Issue response times & your ability to participate in
HA/DR monitoring and management
| Understanding IBM i HA Options46
5 Questions to Ask Potential
DRaaS Providers
10 Must-Have Features in a
DRaaS Solution
| Understanding IBM i HA Options
1. Flexible topologies and platform support
2. Replication that meets RPO/RTO goals
3. Efficient bandwidth consumption
4. Ensured data integrity
5. Support for failover into the cloud
6. Built-in HA/DR testing
7. Scalability
8. Easy, automated operation
9. Partner and customer friendly monitoring
and reports
10. Flexible licensing options
47
How Syncsort
Can Help
Syncsort Can Help!
✓ Syncsort’s HA/DR portfolio has grown rapidly through
acquisition
✓ Syncsort is the market leader in IBM i HA/DR
solutions
✓ Syncsort has solutions that meet any downtime
prevention need for your IBM i – from entry-level to
the most aggressive enterprise requirements
✓ Syncsort can help keep your operations running
and your data available!
| Understanding IBM i HA Options49
iTERA
Quick-EDDMIMIX
Syncsort’s
Data Availability
Product Lines
Bring together industry leading
IBM i HA/DR brands that serve
1000s of customers worldwide.
OMS/ODS
| Understanding IBM i HA Options50
IBM PowerHA Add-Ons
Extends and enhances IBM
PowerHA to ensure that all data
and applications are replicated
and ready to switch and enable
multi-node topologies
Disaster Recovery
Ensure rapid recovery of
operations and protection from
lost data in the event of regional
disaster, site failure, hardware
failure or human error
High Availability
Assure continuous availability of
IBM i systems, applications and
data to customers, supply chain
partners and staff
Syncsort Can Help
with All Your
Downtime
Prevention Needs
| Understanding IBM i HA Options51
Managed and Professional
Services
Offload IBM i server migration,
optimization and daily HA/DR
management on a temporary or
long-term basis
• Storage and journal-based replication are fundamentally
different technologies
• Knowing those differences helps you understand how the
two technologies perform common HA tasks
• DRaaS solutions are becoming more common but you must
understanding the underlying solution and SLAs
• Ensure switch readiness by choosing technology that
prevents corruption, ensures target data integrity and
enables regular switch testing
• Be prepared to ask questions!
• Syncsort is here to help
| Understanding IBM i HA Options52
Recap
Learn more at
www.syncsort.com/en/assure
Q&A
Understanding IBM i HA Options

More Related Content

What's hot

Sap security online training
Sap security online trainingSap security online training
Sap security online trainingsapscmit
 
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...Christoph Adler
 
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...John Campbell
 
Best practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryBest practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
 
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...Tomas Krojzl
 
Oracle apps scm online training
Oracle apps scm online trainingOracle apps scm online training
Oracle apps scm online trainingsaptpmit
 
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS by Namik Hrle ...
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS  by  Namik Hrle ...Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS  by  Namik Hrle ...
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS by Namik Hrle ...Surekha Parekh
 
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...Daniel Reimann
 
Overview of Hitachi Dynamic Tiering, Part 1 of 2
Overview of Hitachi Dynamic Tiering, Part 1 of 2Overview of Hitachi Dynamic Tiering, Part 1 of 2
Overview of Hitachi Dynamic Tiering, Part 1 of 2Hitachi Vantara
 
Using Release(deallocate) and Painful Lessons to be learned on DB2 locking
Using Release(deallocate) and Painful Lessons to be learned on DB2 lockingUsing Release(deallocate) and Painful Lessons to be learned on DB2 locking
Using Release(deallocate) and Painful Lessons to be learned on DB2 lockingJohn Campbell
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_updateFran Navarro
 
Best Practices: Migrating a Postgres Production Database to the Cloud
Best Practices: Migrating a Postgres Production Database to the CloudBest Practices: Migrating a Postgres Production Database to the Cloud
Best Practices: Migrating a Postgres Production Database to the CloudEDB
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingMavenWire
 

What's hot (14)

Sap security online training
Sap security online trainingSap security online training
Sap security online training
 
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...
1491 - Virtual, Faster, Better! How to Virtualize the Rich Client and Browser...
 
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...
DB2 for z/OS Bufferpool Tuning win by Divide and Conquer or Lose by Multiply ...
 
Best practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryBest practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recovery
 
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...
SAP HANA Distinguished Engineer (HDE) Webinar: Overview of SAP HANA On-Premis...
 
Oracle apps scm online training
Oracle apps scm online trainingOracle apps scm online training
Oracle apps scm online training
 
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS by Namik Hrle ...
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS  by  Namik Hrle ...Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS  by  Namik Hrle ...
Efficient Monitoring & Tuning of Dynamic SQL in DB2 for z/OS by Namik Hrle ...
 
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...
IBM Connect 2016 BP1491: Virtual, Faster, Better! How to Virtualize the Rich ...
 
Overview of Hitachi Dynamic Tiering, Part 1 of 2
Overview of Hitachi Dynamic Tiering, Part 1 of 2Overview of Hitachi Dynamic Tiering, Part 1 of 2
Overview of Hitachi Dynamic Tiering, Part 1 of 2
 
Using Release(deallocate) and Painful Lessons to be learned on DB2 locking
Using Release(deallocate) and Painful Lessons to be learned on DB2 lockingUsing Release(deallocate) and Painful Lessons to be learned on DB2 locking
Using Release(deallocate) and Painful Lessons to be learned on DB2 locking
 
Backup_exadata_update
Backup_exadata_updateBackup_exadata_update
Backup_exadata_update
 
Best Practices: Migrating a Postgres Production Database to the Cloud
Best Practices: Migrating a Postgres Production Database to the CloudBest Practices: Migrating a Postgres Production Database to the Cloud
Best Practices: Migrating a Postgres Production Database to the Cloud
 
IBM Spectrum Scale Slidecast
IBM Spectrum Scale SlidecastIBM Spectrum Scale Slidecast
IBM Spectrum Scale Slidecast
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and Troubleshooting
 

Similar to Understanding IBM i HA Options

PHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StoragePHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StorageMark McHenry
 
4. (mjk) extreme performance 2
4. (mjk) extreme performance 24. (mjk) extreme performance 2
4. (mjk) extreme performance 2Doina Draganescu
 
High Availability Options for IBM i
High Availability Options for IBM iHigh Availability Options for IBM i
High Availability Options for IBM iHelpSystems
 
Pascal benois performance_troubleshooting-spsbe18
Pascal benois performance_troubleshooting-spsbe18Pascal benois performance_troubleshooting-spsbe18
Pascal benois performance_troubleshooting-spsbe18BIWUG
 
Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014EDB
 
Top 10 Tips for an Effective Postgres Deployment
Top 10 Tips for an Effective Postgres DeploymentTop 10 Tips for an Effective Postgres Deployment
Top 10 Tips for an Effective Postgres DeploymentEDB
 
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld
 
Lecture-7 Main Memroy.pptx
Lecture-7 Main Memroy.pptxLecture-7 Main Memroy.pptx
Lecture-7 Main Memroy.pptxAmanuelmergia
 
MySQL :What's New #GIDS16
MySQL :What's New #GIDS16MySQL :What's New #GIDS16
MySQL :What's New #GIDS16Sanjay Manwani
 
Coherence Overview - OFM Canberra July 2014
Coherence Overview - OFM Canberra July 2014Coherence Overview - OFM Canberra July 2014
Coherence Overview - OFM Canberra July 2014Joelith
 
Data Virtualization Reference Architectures: Correctly Architecting your Solu...
Data Virtualization Reference Architectures: Correctly Architecting your Solu...Data Virtualization Reference Architectures: Correctly Architecting your Solu...
Data Virtualization Reference Architectures: Correctly Architecting your Solu...Denodo
 
Share point disaster avoidance architecture for large scale enterprises
Share point disaster avoidance architecture for large scale enterprisesShare point disaster avoidance architecture for large scale enterprises
Share point disaster avoidance architecture for large scale enterprisesSentri
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.Taras Matyashovsky
 
Oracle Database in-Memory Overivew
Oracle Database in-Memory OverivewOracle Database in-Memory Overivew
Oracle Database in-Memory OverivewMaria Colgan
 
Scaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesScaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesAvere Systems
 
071410 sun a_1515_feldman_stephen
071410 sun a_1515_feldman_stephen071410 sun a_1515_feldman_stephen
071410 sun a_1515_feldman_stephenSteve Feldman
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Tony Pearson
 
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...Microsoft Technet France
 

Similar to Understanding IBM i HA Options (20)

Oracle Storage a ochrana dat
Oracle Storage a ochrana datOracle Storage a ochrana dat
Oracle Storage a ochrana dat
 
PHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StoragePHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any Storage
 
4. (mjk) extreme performance 2
4. (mjk) extreme performance 24. (mjk) extreme performance 2
4. (mjk) extreme performance 2
 
High Availability Options for IBM i
High Availability Options for IBM iHigh Availability Options for IBM i
High Availability Options for IBM i
 
Pascal benois performance_troubleshooting-spsbe18
Pascal benois performance_troubleshooting-spsbe18Pascal benois performance_troubleshooting-spsbe18
Pascal benois performance_troubleshooting-spsbe18
 
Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014Top10 list planningpostgresdeployment.2014
Top10 list planningpostgresdeployment.2014
 
Top 10 Tips for an Effective Postgres Deployment
Top 10 Tips for an Effective Postgres DeploymentTop 10 Tips for an Effective Postgres Deployment
Top 10 Tips for an Effective Postgres Deployment
 
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
 
Lecture-7 Main Memroy.pptx
Lecture-7 Main Memroy.pptxLecture-7 Main Memroy.pptx
Lecture-7 Main Memroy.pptx
 
MySQL :What's New #GIDS16
MySQL :What's New #GIDS16MySQL :What's New #GIDS16
MySQL :What's New #GIDS16
 
Coherence Overview - OFM Canberra July 2014
Coherence Overview - OFM Canberra July 2014Coherence Overview - OFM Canberra July 2014
Coherence Overview - OFM Canberra July 2014
 
Data Virtualization Reference Architectures: Correctly Architecting your Solu...
Data Virtualization Reference Architectures: Correctly Architecting your Solu...Data Virtualization Reference Architectures: Correctly Architecting your Solu...
Data Virtualization Reference Architectures: Correctly Architecting your Solu...
 
Share point disaster avoidance architecture for large scale enterprises
Share point disaster avoidance architecture for large scale enterprisesShare point disaster avoidance architecture for large scale enterprises
Share point disaster avoidance architecture for large scale enterprises
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.
 
Oracle Database in-Memory Overivew
Oracle Database in-Memory OverivewOracle Database in-Memory Overivew
Oracle Database in-Memory Overivew
 
Scaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesScaling Security Workflows in Government Agencies
Scaling Security Workflows in Government Agencies
 
071410 sun a_1515_feldman_stephen
071410 sun a_1515_feldman_stephen071410 sun a_1515_feldman_stephen
071410 sun a_1515_feldman_stephen
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4
 
Memory Management.pdf
Memory Management.pdfMemory Management.pdf
Memory Management.pdf
 
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...
 

More from Precisely

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfPrecisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 

More from Precisely (20)

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Understanding IBM i HA Options

  • 1. 1 | Understanding IBM i HA Options Understanding IBM i HA Options Becky Hjellming, Director, Product Marketing John Dunn, Senior Product Manager
  • 2. • Technical differences between hardware replication and journal-based replication • Practical differences between hardware replication and journal-based replication • Considerations to keep in mind when considering cloud- hosted DRaaS • How to increase confidence in your HA solution • Questions to ask when considering HA options Today’s Topics All the HA claims sound the same. What’s the difference? On-prem or cloud- hosted? How do I choose? What can I do to be sure we are switch ready? | Understanding IBM i HA Options2
  • 4. Technology Considerations 1. Underlying architecture 2. Replication and recovery point 3. Bandwidth usage 4. Online or offline target 5. Application and data requirements 6. Damaged object replication 7. Access path recovery 8. Topology flexibility Weighing HA Options | Understanding IBM i HA Options4
  • 5. Underlying Architecture • IBM storage provides the underlying mechanism for SAN to SAN replication • Sectors written to the source SAN are replicated to the tightly coupled target SAN • Only applications and data in IASPs are replicated • Switching is done by attaching storage to a secondary server and recovering to that server Storage Replication SAN SAN | Understanding IBM i HA Options5
  • 6. Underlying Architecture • IBM storage provides the underlying mechanism for SAN to SAN replication • Sectors written to the source SAN are replicated to the tightly coupled target SAN • Only applications and data in IASPs are replicated • Switching is done by attaching storage to a secondary server and recovering to that server • IBM Journaling provides the underlying replication mechanism for Journal-Based Replication solutions • Replication is done server to server • Supports internal, external or mixed storage • Switching is done to a live target without recovery steps Storage Replication Journal-Based Replication Server Server SAN SAN | Understanding IBM i HA Options6
  • 7. Replication and Recovery Point • IBM i OS uses memory as a cache • Data may be either in memory or on disk • Data is not protected until written to disk • Unknown time after transaction completes • Results in non-zero, unpredictable RPO • Journaling is required with Storage Replication • Journaling saves data to disk before transactions complete • Provides transaction integrity and near-zero RPO Storage Replication Server Storage No memory to memory transfer Disk sectors Server Storage | Understanding IBM i HA Options7
  • 8. Replication and Recovery Point • IBM i OS uses memory as a cache • Data may be either in memory or on disk • Data is not protected until written to disk • Unknown time after transaction completes • Results in non-zero, unpredictable RPO • Journaling is required with Storage Replication • Journaling saves data to disk before transactions complete • Provides transaction integrity and near-zero RPO • Journaling eliminates issues associated with delayed disk writes due to memory caching • Journaling saves data to disk and replicates it before the end of each transaction • Asynchronous and synchronous options support near-zero or zero RPO Storage Replication Journal-Based Replication Server Storage No memory to memory transfer Disk sectors Server Storage Journal EntriesServer Storage Server Storage | Understanding IBM i HA Options8
  • 9. Bandwidth Usage • The bandwidth needed for SAN replication is over twice that needed by logical replication • Journaled data is replicated • All sectors (files, objects and temporary files) are replicated again when written to disk • Initial synchronization and any re-sync processes are also bandwidth intensive Storage Replication journals data Sector Replication Server SAN Server SAN | Understanding IBM i HA Options9
  • 10. Bandwidth Usage • The bandwidth needed for SAN replication is over twice that needed by logical replication • Journaled data is replicated • All sectors (files, objects and temporary files) are replicated again when written to disk • Initial synchronization and any re-sync processes are also bandwidth intensive • Journaling replicates only changed data • Bandwidth can be further reduced through • Filtering non-critical data from replication • Journal optimizations • RJ filtering (Option 42 – HA Journal Performance) • JRNMINDTA • Hardware compression Storage Replication Journal-Based Replication journals data Sector Replication Server SAN Server SAN objects Logical Replication Server Server | Understanding IBM i HA Options10
  • 11. Online or Offline Target • SAN to SAN replication does not support a live backup server • IASP must be varied on to a server to be used • Some users add flash technology to storage replication • Provides only a point-in-time copy of the data • Must be varied on to a server to be used • Quickly becomes stale as flashes are no real time Storage Replication Server SAN SAN Server | Understanding IBM i HA Options11
  • 12. Online or Offline Target • SAN to SAN replication does not support a live backup server • IASP must be varied on to a server to be used • Some users add flash technology to storage replication • Provides only a point-in-time copy of the data • Must be varied on to a server to be used • Quickly becomes stale as flashes are no real time • The backup server is always current and live in a journal-based replication solution • The backup server may be used to off-load work from the production server, including • Reporting • BI • Testing • Tape saves • More Storage Replication Journal-Based Replication Server SAN SAN Server Server Server | Understanding IBM i HA Options12
  • 13. Application and Data Requirements • Applications must run in an IASP to be protected by Storage Replication • Effort to convert and test applications can be substantial • Application data must also reside in an IASP to be protected by Storage Replication • Application data in SYSBAS is not protected • Admin Domain does not fully protect SYSBAS Storage Replication | Understanding IBM i HA Options13
  • 14. Application and Data Requirements • Applications must run in an IASP to be protected by Storage Replication • Effort to convert and test applications can be substantial for some applications • Application data must also reside in an IASP to be protected by Storage Replication • Application data in SYSBAS is not protected • Admin Domain does not fully protect SYSBAS • No application changes required • Journal-Based Replication is independent of the underlying storage configuration • Journal-Based Replication can replicate to and from SYSBAS, ASP, IASP or mixed environments • Applications for every vertical are supported (e.g. banking, retail, logistics, health, etc.) Storage Replication Journal-Based Replication | Understanding IBM i HA Options14
  • 15. Damaged Object Replication and Repair • Objects damaged on the source system’s storage will be propagated to the target • Damaged objects detected during the IPL or vary on are marked by the OS • Damaged objects will require recovery from backup media, negatively impacting both RTO and RPO Storage Replication | Understanding IBM i HA Options15
  • 16. Damaged Object Replication and Repair • Objects damaged on the source system’s storage will be propagated to the target • Damaged objects detected during the IPL or vary on are marked by the OS • Damaged objects will require recovery from backup media, negatively impacting both RTO and RPO • Journal-Based Replication cannot propagate damaged objects from the source to the target • Journal-Based Replication audits ensure objects damaged on either the source or target are detected, repaired and reported • Live target data is always ready for switch without added object recovery steps Storage Replication Journal-Based Replication | Understanding IBM i HA Options16
  • 17. Access Path Recovery • Recovery from unplanned failure may require access paths to be rebuilt • Time to rebuild access paths varies based on storage, system, file and the access path itself – can be a lengthy process • If access paths are invalidated during a switch process’ vary-on, the application cannot start until keyed access paths have been rebuilt Storage Replication | Understanding IBM i HA Options17
  • 18. Access Path Recovery • Recovery from unplanned failure may require access paths to be rebuilt • Time to rebuild access paths varies based on storage, system, file and the access path itself – can be a lengthy process • If access paths are invalidated during a switch process’ vary-on, the application cannot start until keyed access paths have been rebuilt • There is no exposure to rebuilding access paths during a Journal-Based Replication switch • Journal-Based Replication solutions can audit access paths to verify their integrity • Journal-Based Replication cannot replicate invalidated access paths from the source to target • Journal-Based Replication allows you to minimize downtime by switching to the target during a long access path recovery on the production server Storage Replication Journal-Based Replication | Understanding IBM i HA Options18
  • 19. Topology Flexibility • Storage Replication replicates SAN to SAN • Source and target SAN hardware must be similar • Source and target OS and levels must be similar • Storage Replication replicates from IASP to IASP • Distance limitations must be understood for Storage Replication options Storage Replication | Understanding IBM i HA Options19
  • 20. Topology Flexibility • Storage Replication replicates SAN to SAN • Source and target SAN hardware must be similar • Source and target OS and levels must be similar • Storage Replication replicates from IASP to IASP • Distance limitations must be understood for Storage Replication options • Journal-Based Replication is storage-independent. Replication is supported in SAN, internal storage, or mixed storage environments. • Journal-Based Replication is OS-independent. Replication between source and target servers with different OS versions, TR and PTF levels is supported. • Supports replication between ASP, IASP and SYSBAS • No distance limitations enables replication between on-premises and cloud servers • Broadcast to multiple targets is supported Storage Replication Journal-Based Replication | Understanding IBM i HA Options20
  • 22. Behavior in Common Scenarios 1. Initial synchronization 2. Unplanned switch 3. Planned switch 4. Reporting 5. Target integrity validation 6. Recovery from network issues 7. Operating system upgrade 8. Storage event management 9. Workload distribution Weighing Your HA Options | Understanding IBM i HA Options22
  • 23. Scenario 1 – Initial Synchronization • SAN solutions require a full storage sync before steady state replication can begin • All storage sectors are sent across the network • Limitations must imposed on the quantity of data going across the wire or synchronization may never complete Sectors SAN SAN All storage SYSBAS IASP SYSBAS IASP Storage Replication | Understanding IBM i HA Options23
  • 24. Scenario 1 – Initial Synchronization • SAN solutions require a full storage sync before steady state replication can begin • All storage sectors are sent across the network • Limitations must imposed on the quantity of data going across the wire or synchronization may never complete • Journal-Based Replication solutions provide many options for the initial sync • Save and restore from tape • Storage copy • Physical drive swap • Audit over time • Object sync commands • And more • Reduces impact on network Sectors SAN SAN All storage SYSBAS IASP SYSBAS IASP Objects audited over time Initial object replication Tape Selected objects Storage Replication Journal-Based Replication | Understanding IBM i HA Options24
  • 25. Scenario 2 - Unplanned Switch • To switch, the target system must go through a vary on process to recover transaction integrity – similar to an abnormal IPL • A vary on has 34 steps – most of which are recovery steps of indeterminate length • Some steps may result in invalidated access paths, damaged objects, etc. • Damaged objects detected during vary on require manual intervention Storage Replication | Understanding IBM i HA Options25
  • 26. Scenario 2 - Unplanned Switch • The target system is a hot standby with journal- based replication solutions • No vary-on process required • Data has been audited for integrity • No need to rebuild access paths • Solutions may provide automation around the switch from source to target that • Runs switch steps in parallel when possible • Provides visibility into progress of each step • No post-switch recovery steps necessary • To switch, the target system must go through a vary on process to recover transaction integrity – similar to an abnormal IPL • A vary on has 34 steps – most of which are recovery steps of indeterminate length • Some steps may result in invalidated access paths, damaged objects, etc. • Damaged objects detected during vary on require manual intervention Diagram on next slide Storage Replication Journal-Based Replication | Understanding IBM i HA Options26
  • 27. Scenario 2 - Unplanned Switch Timeline Switch Vary On (“IPL” of IASP) Application Restart Switch Application Restart Complete Applies System Crash1. Waiting for devices - none present 2. Cluster vary job submission 3. Waiting for devices - not all present 4. DASD checker 5. Storage management recovery 6. Synchronization of mirrored data 7. Synchronization of mirrored data-2 8. Scanning DASD pages 9. Directory recovery - perm directory 10. Authority recovery 11. Context rebuild 12. Journal recovery 13. Database recovery 14. Journal synchronization 15. Commit recovery 16. Database initialization 17. Journal cleanup 18. Commit initialization 19. User profile creation 20. Database, journal, commit-1 21. Identifying interrupted DDL ops 22. Recovering system managed jrnls 23. POSIX directory recovery 24. Database, journal, commit-2 25. Commit recovery - 2 26. Cleaning up journal receivers 27. Cleaning up cross-reference files 28. UID/GID mismatch correction 29. Database access path recovery 30. Database cross-reference file merge 31. SPOOL initialization 32. Image catalog synchronization 33. Command analyzer recovery 34. Catalog validation Post Vary On Recovery System Crash • Damaged object recovery • Access path rebuild Time Think Time Vary On recovery time cannot be predicted recovery Journal-Based Replication delivers a significantly lower recovery time for unplanned outages Storage Replication Journal-Based Replication 27
  • 28. Scenario 3 - Planned Switch • Storage Replication solutions require a vary off before the switch • Requires 34-step vary on after the switch • Vary on can be impacted by configuration issues, such as duplicate library names and UID/GID mismatches Storage Replication | Understanding IBM i HA Options28
  • 29. Scenario 3 - Planned Switch • Storage Replication solutions require a vary off before the switch • Requires 34-step vary on after the switch • Vary on can be impacted by configuration issues, such as duplicate library names and UID/GID mismatches • Target system is a hot standby • No vary on process required • Solutions may regularly audit target data for integrity • Solutions may provide automation around the switch from source to target that • Runs switch steps in parallel when possible • Provides visibility into progress of each step Storage Replication Journal-Based Replication Diagram on next slide | Understanding IBM i HA Options29
  • 30. Scenario 3 - Planned Switch Timeline Switch Application Restart Switch Application Restart Application Shut Down Vary On (“IPL” of IASP) 1. Waiting for devices - none present 2. Cluster vary job submission 3. Waiting for devices - not all present 4. DASD checker 5. Storage management recovery 6. Synchronization of mirrored data 7. Synchronization of mirrored data-2 8. Scanning DASD pages 9. Directory recovery - perm directory 10. Authority recovery 11. Context rebuild 12. Journal recovery 13. Database recovery 14. Journal synchronization 15. Commit recovery 16. Database initialization 17. Journal cleanup 18. Commit initialization 19. User profile creation 20. Database, journal, commit-1 21. Identifying interrupted DDL ops 22. Recovering system managed jrnls 23. POSIX directory recovery 24. Database, journal, commit-2 25. Commit recovery - 2 26. Cleaning up journal receivers 27. Cleaning up cross-reference files 28. UID/GID mismatch correction 29. Database access path recovery 30. Database cross-reference file merge 31. SPOOL initialization 32. Image catalog synchronization 33. Command analyzer recovery 34. Catalog validation Vary Off Time Application Shut Down Journal-Based Replication delivers a lower recovery time for planned outages Storage Replication Journal-Based Replication 30
  • 31. Scenario 4 – Reporting • Data on the target SAN is not accessible until varied on to a server • Other than point-in-time storage flashes, Storage Replications solutions cannot support reporting from the target sectors Server SAN Server SAN Storage Replication | Understanding IBM i HA Options31
  • 32. Scenario 4 – Reporting • Data on the target SAN is not accessible until varied on to a server • Other than point-in-time storage flashes, Storage Replications solutions cannot support reporting from the target • Reports can be run from any target • Broadcast replication can feed multiple targets for queries and reports (as well as additional HA/DR servers) • Vendors may provide solutions that simplify management and switching of multi-node environments. sectors Server SAN Server SAN Remote DR Server Reporting Server Primary HA Server Storage Replication Journal-Based Replication | Understanding IBM i HA Options32
  • 33. Scenario 5 – Target Integrity Validation • With Storage Replication, the target SAN cannot be audited for integrity • If the target SAN becomes out of sync, a partial or full resynch of the storage image is required • Corruption introduced by dirty networks may be undetectable until the data is read No audits of target SAN SAN SAN SYSBAS IASP SYSBAS IASP Storage Replication | Understanding IBM i HA Options33
  • 34. Scenario 5 – Target Integrity Validation • With Storage Replication, the target SAN cannot be audited for integrity • If the target SAN becomes out of sync, a partial or full resynch of the storage image is required • Corruption introduced by dirty networks may be undetectable until the data is read • Journal-based replication solutions may offer methods for validating the live target • Self-healing audits • Continuous monitoring of target data • Solutions may offer virtual switch features to enable switch testing without production server impact • Remote Journaling offers validity check to detect network corruption No audits of target SAN SAN SAN SYSBAS IASP SYSBAS IASP Object comparison Audits Storage Replication Journal-Based Replication | Understanding IBM i HA Options34
  • 35. Scenario 6 – Recovery from Network Issues • Depending on the extent of the outage, a partial or full synchronization of stored sectors may be required • SAN is not protected until the full or partial resync is complete Sectors SAN SAN SYSBAS IASP SYSBAS IASP Storage Replication | Understanding IBM i HA Options35
  • 36. Scenario 6 – Recovery from Network Issues • Depending on the extent of the outage, a partial or full synchronization of stored sectors may be required • SAN is not protected until the full or partial resync is complete • After communication resumes, Journal-Based replication solutions will catch up with journal entries • Remote Journaling will repackage journal entries into large block transfers to quickly catch up • HA/DR protection is in effect as soon as the transfers catch up Sectors SAN SAN SYSBAS IASP SYSBAS IASP Journal entries Storage Replication Journal-Based Replication | Understanding IBM i HA Options36
  • 37. Scenario 7 – Operating System Upgrade • Once you switch to the upgraded target server, you cannot switch back to the original production server until the upgrade completes successfully • There is no option to go back to a lower OS level after switching to a higher OS level Upgrade the target server to the new OS version and validate. Production Server Target Server 1. Switch to the target server. The IASP image will be upgraded as part of Vary On. This is non-reversible and must complete successfully. 1. Upgrade original production server to the same level as the target. Switch back. SAN SYSBAS IASP SAN SYSBAS IASP Storage Replication | Understanding IBM i HA Options37
  • 38. Scenario 7 – Operating System Upgrade • Once you switch to the upgraded target server, you cannot switch back to the original production server until the upgrade completes successfully • There is no option to go back to a lower OS level after switching to a higher OS level • Journal-Based Replication solutions fully support replication from higher to lower OS levels • Journal-Based solutions enable an “upgrade, test and switch” process that removes risk and downtime from an OS upgrade • A 3rd node can remove risk of outage during upgrade Upgrade the target server to the new OS version and validate. Production Server Target Server 1. Switch to the target server. The IASP image will be upgraded as part of Vary On. This is non-reversible and must complete successfully. 1. Upgrade original production server to the same level as the target. Switch back. SAN SYSBAS IASP SAN SYSBAS IASP Production Server Target Server Secondary Target 1) Upgrade the target server to the new OS version and validate. Switch to the target server. 1. Upgrade the production server to the new OS version. Switch back to the production server. 1. Replication to a secondary target is recommended to protect against outages during the upgrade. Storage Replication Journal-Based Replication | Understanding IBM i HA Options38
  • 39. Scenario 8 – Storage Event Management • Source and target storage images are tightly coupled (bit by bit copy) • Single system storage events or storage image issues can require production downtime • For example, Reclaim Storage (RCLSTG) events create protection downtime SAN SAN Storage Replication | Understanding IBM i HA Options39
  • 40. Scenario 8 – Storage Event Management • Source and target storage images are tightly coupled (bit by bit copy) • Single system storage events or storage image issues can require production downtime • For example, Reclaim Storage (RCLSTG) events create protection downtime • Journal-Based Replication is isolated from the storage layer by IBM local or remote journaling • Storage events can be addressed with little impact on production operations • For example, can switch to target while doing Reclaim Storage (RCLSTG) on production Server Server SAN SAN Storage Replication Journal-Based Replication | Understanding IBM i HA Options40
  • 41. Scenario 9 – Workload Distribution • With Storage Replication the target SAN is locked and cannot be read from or written to • Workloads run entirely on the source and cannot be balanced between the two systems • Some Storage Replication users add flash solutions to offload work to a snapshot; however, it is point in time and requires more resources Write: No Read: No Write: ACTIVE Read: ACTIVE SAN SAN SYSBAS IASP SYSBAS IASP Storage Replication | Understanding IBM i HA Options41
  • 42. Scenario 9 – Workload Distribution • With Storage Replication the target SAN is locked and cannot be read from or written to • Workloads run entirely on the source and cannot be balanced between the two systems • Some Storage Replication users add flash solutions to offload work to a snapshot; however, it is point in time and requires more resources • Journal-Based Replication solutions support multiple replication topologies (e.g.1-to-1, broadcast, cascade, bidirectional) • Standard 1-to-1 HA/DR by default would use a readable target that cannot be written • Active-active solutions with collision handling enables workload distribution between two servers working on the same customer data and a near-zero RTO Write: No Read: No Write: ACTIVE Read: ACTIVE SAN SAN SYSBAS IASP SYSBAS IASP Write: ACTIVE Read: ACTIVE Application Data Write: ACTIVE Read: ACTIVE Bi-Directional Replication Application Data Write: No Read: ACTIVE or Storage Replication Journal-Based Replication | Understanding IBM i HA Options42
  • 43. • How will the initial sync be accomplished and what bandwidth is required? • What bandwidth is required for steady-state replication? • What RTO/RPO will I be able to achieve? • Will I have visibility into my ability to meet RTO/RPO at any particular point? • Can I speak to current customers about their experiences with planned and unplanned switches? • How can I know that no corruptions are being introduced into my target data that will impact my switch time? Can I test without production impact? • How much flexibility do I have for replication topologies? Can I have nodes for HA, DR and reporting? Can I workload balance with bidirectional replication? • When I need to upgrade to the next version of the IBM i OS, what does that process look like? • What is the total cost of all software and hardware components required? • Can I offload reporting or other maintenance tasks to my target server? If so, will the data be current? | Understanding IBM i HA Options43 Questions to Ask How much bandwidth is required? What RTO are customers like me achieving? How do I validate my switch readiness?
  • 45. • Reduces cost of obtaining a second system or access to a secondary site or data center • Reduces complexity of managing all aspects of a full solution internally • Delivers flexibility in ground and cloud configurations and allows applications to be added or removed from protection as needs evolve • Saves time to implement a solution by leveraging a hosting provider’s infrastructure • Provides a comprehensive HA/DR solution if you’re ready to step up from a solution that doesn’t meet your RPO/RTO needs | Understanding IBM i HA Options45 Reasons to Consider DRaaS
  • 46. Ask for details about your MSP’s infrastructure, their policies and SLAs, and the DRaaS solution they employ. Not all DRaaS solutions deliver the same results! 1. Recovery point and recovery time SLAs 2. DR center locations and infrastructure capacity to handle DR workloads and failover 3. Onboarding process and migration to MSP’s cloud 4. Privacy and security of your data 5. Issue response times & your ability to participate in HA/DR monitoring and management | Understanding IBM i HA Options46 5 Questions to Ask Potential DRaaS Providers
  • 47. 10 Must-Have Features in a DRaaS Solution | Understanding IBM i HA Options 1. Flexible topologies and platform support 2. Replication that meets RPO/RTO goals 3. Efficient bandwidth consumption 4. Ensured data integrity 5. Support for failover into the cloud 6. Built-in HA/DR testing 7. Scalability 8. Easy, automated operation 9. Partner and customer friendly monitoring and reports 10. Flexible licensing options 47
  • 49. Syncsort Can Help! ✓ Syncsort’s HA/DR portfolio has grown rapidly through acquisition ✓ Syncsort is the market leader in IBM i HA/DR solutions ✓ Syncsort has solutions that meet any downtime prevention need for your IBM i – from entry-level to the most aggressive enterprise requirements ✓ Syncsort can help keep your operations running and your data available! | Understanding IBM i HA Options49
  • 50. iTERA Quick-EDDMIMIX Syncsort’s Data Availability Product Lines Bring together industry leading IBM i HA/DR brands that serve 1000s of customers worldwide. OMS/ODS | Understanding IBM i HA Options50
  • 51. IBM PowerHA Add-Ons Extends and enhances IBM PowerHA to ensure that all data and applications are replicated and ready to switch and enable multi-node topologies Disaster Recovery Ensure rapid recovery of operations and protection from lost data in the event of regional disaster, site failure, hardware failure or human error High Availability Assure continuous availability of IBM i systems, applications and data to customers, supply chain partners and staff Syncsort Can Help with All Your Downtime Prevention Needs | Understanding IBM i HA Options51 Managed and Professional Services Offload IBM i server migration, optimization and daily HA/DR management on a temporary or long-term basis
  • 52. • Storage and journal-based replication are fundamentally different technologies • Knowing those differences helps you understand how the two technologies perform common HA tasks • DRaaS solutions are becoming more common but you must understanding the underlying solution and SLAs • Ensure switch readiness by choosing technology that prevents corruption, ensures target data integrity and enables regular switch testing • Be prepared to ask questions! • Syncsort is here to help | Understanding IBM i HA Options52 Recap Learn more at www.syncsort.com/en/assure
  • 53. Q&A