SlideShare a Scribd company logo
1 of 45
More than Backups for Accounting
           Databases

                    Configuring disks can aid
                          performance.
                 Backups may be the last line of
                  defense against data loss but
                they can also provide operational
                            benefits.



                 Cliff Beacham MBA,
                 MCDBA, CPA.CITP
Contents:


      1.   From the Company point of view
      2.   What are we hoping to achieve?
      3.   Technical – hardware - methods
      4.   Technical Questions (FAQs)
      5.   Conclusion & Recommendations


2                                  © Cliff Beacham 2007
Part 1:

      1.   Whose responsibility is it?
      2.   Why do it at all?
      3.   What Risks do we face?
      4.   Is it just a Management Decision?
      5.   Emerging Trends
      6.   Operational advantages
      7.   Consequences of downtime
3                                        © Cliff Beacham 2007
ERP Architecture (SQL Server)



     ERP Client    ERP Server
                   ERP Server
     ERP Client
                   Application
                    Application        MasterDB

                  ERP Database
                   ERP Database         msdbDB
                       Server
                        Server
                  E.g. SQL Server
                  E.g. SQL Server
                                      ERPSystemDB

     ERP Client
     ERP Client
                                     AccountingDB

4                                   © Cliff Beacham 2007
1a. Whose Responsibility?:

                     Shareholders


                        Directors


                  CFO
                                    CIO


                Controller     IT Manager

5                                         © Cliff Beacham 2007
1b. Why do it (SOX etc)

    Sarbanes Oxley has requirements that are:
      1. law to public companies
      2. common sense to others




6                               © Cliff Beacham 2007
1c. Risks – 5 main areas

       Loss or failure of Hardware
       Natural Disasters/Catastrophes
       Theft or Destruction
       Malicious/deliberate
       Inadvertent error



7                                        © Cliff Beacham 2007
1d. Management Decision

    1. Compare Cost with Benefits
    2. BUT remember there are decisions where cost
       vs. benefits are not applicable
    3. Economic justification can be calculated by:
           Anything x Infinity = Infinity




8                                   © Cliff Beacham 2007
1e. Emerging trends:


    1. ISACA – Information Systems Audit and
       Control Association (50,000 members) CISA &
       CISM
    2. CPA/CITP specialist designation

    3. SOX applicability to smaller companies



9                                  © Cliff Beacham 2007
1f. Operational uses of Backups:


       1.   DSS’s
       2.   Test Companies
       3.   Development Companies
       4.   Scoreboards
       5.   Lookups
       6.   Read-only databases
10                                  © Cliff Beacham 2007
1g. Likely downtime


     “I’ll call the company that has the tape backup
       and see when they can get it back to us.”
     Most error is caused by users – if we have the
       backup we can restore immediately with
       minimum loss of productivity



11                                    © Cliff Beacham 2007
An aside (to be personal)

     Never, never, NEVER mix data and operating
      systems on the same drive


                                 Operating System




                                       Data



12                                   © Cliff Beacham 2007
Part 2: What are we trying to do?

      2a. What databases need backing up
      2b. Log file
      2c. Other applicable DBs




13                                 © Cliff Beacham 2007
2a. What databases need backing up?

      Production
      System   databases – Master, msdb, Model
      Log file
      Other applicable DBs




14                                   © Cliff Beacham 2007
2b. ERP Architecture (SQL Server)


                                          tempDB
       ERP Client    ERP Server
                     ERP Server
       ERP Client
                     Application
                      Application        MasterDB

                    ERP Database
                     ERP Database         msdbDB
                         Server
                          Server
                    E.g. SQL Server
                    E.g. SQL Server
                                        ERPSystemDB

       ERP Client
       ERP Client
                    Log file           AccountingDB

15                                    © Cliff Beacham 2007
2c. Disk arrangements - Objectives:


     1.   Speed / Performance
     2.   Reliability / Redundancy
     3.   Vulnerability / Risk




16                                   © Cliff Beacham 2007
Part 3: Disks


     1.   RAID arrays
     2.   Appropriate use
     3.   Typical arrangement




17                              © Cliff Beacham 2007
3a. RAID (Redundant Array of
           Independent/Inexpensive Disks)


     RAID #    Description
      0       Striped set
      1       Mirrored set
      5       Parity set
      10      Striped then Mirrored

18                               © Cliff Beacham 2007
3b. Appropriate use

       O/S + Programs      Cluster
       OLTP db             5 or 10
       DSS db              Stripe
       Tempdb              Stripe
       Log file            Mirror
       Backup              Isolated
19                               © Cliff Beacham 2007
3c. Optimizing the Database
     Using Filegroups with Hardware-based RAID
                                RAID 10
                                 RAID 10
                                  Disk
                                  Disk                  Filegroup 11
                                                         Filegroup
                                Controller
                                Controller


                                 RAID 5
                                 RAID 5
                                  Disk
                                  Disk
                                Controller              Filegroup 22
                                                         Filegroup
                                Controller



               Disk
               Disk              RAID 0
                                 RAID 0                 Filegroup 33
                                                         Filegroup
             Controller
             Controller           Disk
                                  Disk
                                Controller
                                Controller               TempDB
                                                          TempDB

                                 RAID 1
                                 RAID 1
         Operating System         Disk                 Transaction Log
                                                        Transaction Log
         Operating System         Disk
           & Programs
            & Programs          Controller
                                Controller
20                                               © Cliff Beacham 2007
Part 4. FAQs


       1.   RAID
       2.   Cluster
       3.   Log Shipping
       4.   Full Backups
       5.   Backup Methods


21                           © Cliff Beacham 2007
4a. Why backup when I have a RAID
     system?

      Because RAID does not deal with user error
      RAID deals with Disc Hardware error and
       performance issues




22                                  © Cliff Beacham 2007
4b. Why backup when I have a Clustered
     system?

      Because  Clusters do not deal with user error
      Clusters are designed to deal with O/S and
       certain Program errors




23                                    © Cliff Beacham 2007
Typical Clustered System
        Single subnet                               Web
                                                     Web
                                                     Host 1                         Node 1
        No routers                                  Host 1
        No Internet




                                ethernet
         access to DB                               Web
                                                    Web
                                                    Host 2
                                                    Host 2


                                                    Web
                                                    Web                       SQL Server Database
                                                                              SQL Server Database
                                                    Host 3
                                                    Host 3



         Clients
         Clients                           2-node Cluster Service
                                           2-node Cluster Service


      Network Load Balancing
      Network Load Balancing                        Web
                                                    Web                            Node 2
     Component Load Balancing                       Host 6
                                                    Host 6
     Component Load Balancing

24                                                                  © Cliff Beacham 2007
4c. Why backup when I have a Log-
         shipping system?


      Because  Log shipping does not deal with
       user error
      Log shipping will faithfully replicate the error




25                                      © Cliff Beacham 2007
4d. Log Shipping

       Providesa Baseline
       Backs Up Original Files, Objects, and Data
       Backs Up Portions of the Transaction Log

             ProdDB                         ProdLS


                  Log    Ship Log
                          Ship Log       Log
           Data                                Data



26                                   © Cliff Beacham 2007
4e. Why backup the Log when I have
         Full database backups?

      Because  Full backups do not enable Point-in-
       time recovery
      A Full backup plan means you have to re-
       enter everything from the last Full backup




27                                   © Cliff Beacham 2007
4f. Backup Methods


       Full Database Backup
       Differential Database Backup
       Transaction Log Backup
       Piecemeal Filegroup Backup plan


28                              © Cliff Beacham 2007
Part 5: Strategies

     A.   Full Database Backup Strategy
     B.   Full Database and Transaction Log Backup
          Strategy
     C.   Differential Backup Strategy
     D.   Database File or Filegroup Backup Strategy




29                                     © Cliff Beacham 2007
5a. Full Database Backup

       Providesa Baseline
       Backs Up Original Files, Objects, and Data
       Backs Up Portions of the Transaction Log

            Northwind                         D:


                   Log    Backup
                          Backup            NwindBU
           Dat
            a


30                                   © Cliff Beacham 2007
Full Database Backup Strategy

       Created Database
                           Full Database Backup   Full Database Backup
      and Performed Full
       Database Backup




                  Log                    Log                      Log
      Data                   Data                    Data




             Sunday              Monday                 Tuesday

31                                                © Cliff Beacham 2007
5b. Full Database and Transaction
         Log Backup Strategy


       Full Database                              Full Database
          Backup                                     Backup


                Log    Log   Log            Log             Log
      Data       Log                              Data




             Sunday                Monday


32                                      © Cliff Beacham 2007
5c. Differential Backup

      Use  on Frequently Modified Databases
      Requires a Full Database Backup
      Backs Up Database Changes Since the Last
       Full Database Backup
      Saves Time in Both Backup and Restore
       Process



33                                 © Cliff Beacham 2007
Differential Backup Strategy


     Full Database                        Differential                        Differential
        Backup                             Backup                              Backup



     Data
             Log     Log     Log    Log
                                          Data∆   Log    Log   Log      Log
                                                                                   ∆         ...
                                                                                              ...




                           Monday                                Tuesday



34                                                                   © Cliff Beacham 2007
5d. Database File or Filegroup
         Backup Strategy


     Full Database
                                 Backup                   Backup               Backup File3
        Backup
                                 File1                    File2

                     Log   Log   Data       Log     Log   Data     Log   Log   Data     Log    Log
            Log
     Data                        File 1                   File 2               File 3




            Monday                        Tuesday             Wednesday             Thursday


35                                                                   © Cliff Beacham 2007
5e. Plan Database Files and Logs

        Manage     Disk Storage for:
         –   Performance
         –   Fault tolerance
        Place Transaction Logs on Separate Disks
        Place the tempdb Database separately
        Adopt a coherent Backup policy




36                                      © Cliff Beacham 2007
Backup Strategy

      Plan (and Document the procedure)
      Implement
      Test regularly
      Document effectiveness of Internal Controls




37                                     © Cliff Beacham 2007
THE END


     Thank you for listening:
         Cliff Beacham
         (949) 813-1349



    Proudly sponsored by:
       IFRSUSA.ORG
How the Transaction Log Works

          1 Data modification is
          1 Data modification is
            sent by application
            sent by application             3 Modification is recorded
                                            3 Modification is recorded
                                              in transaction log on disk
                                               in transaction log on disk


                             Buffer Cache            Disk




                                                        Disk
     2 Data pages are located in,
     2 Data pages are located in,
       or read into, RAM and
       or read into, RAM and
       modified
       modified                                        4 Checkpoint writes
                                                       4 Checkpoint writes
                                                         committed
                                                          committed
                                                         transactions
                                                          transactions
                                                         to database
                                                          to database

39                                                     © Cliff Beacham 2007
Optimizing a Database Using Hardware
     RAID
        Using Hardware-based RAID
          – Better performance than O/S-based RAID
          – Enables hot replacement failed drive
        Applying Types of RAID (Examples)
         –   Disk mirroring (RAID 1) for redundancy of the log
         –   Disk striping with parity (RAID 5) for performance and
             redundancy for data files and transaction logs
         –   Disk mirroring with striping (RAID 10) for maximum
             performance for data files

40                                                  © Cliff Beacham 2007
Example of User-defined Filegroups
                         Production Database
         sys…
          sys…               ……
        sys…
        sys…                Orders
                            Orders
      sysusers
       sysusers           Customers
                           Customers                OrdHistYear2
                                                    OrdHistYear2
     sysobjects
     sysobjects          Products
                         Products                  OrdHistYear1
                                                   OrdHistYear1




           C:                        D:                           E:

        ProdOLTP.mdf       OrdHist1.ndf OrdHist2.ndf            ProdLog.ldf


     Primary Filegroup     User-defined Filegroup             Transaction Log
41                                                        © Cliff Beacham 2007
RAID 0 – Striped drives



           Disk 1             Disk 2         Disk 3

           100GB              100 GB         100GB




       Total Volume = 300GB




42                                     © Cliff Beacham 2007
RAID 1- Mirrored drives


                             Disk 1
                             100GB




                             Disk 2
                             100GB



      Total Volume = 100GB

43                                    © Cliff Beacham 2007
RAID 5
     – Compressed copy on another disk



         Disk 1                     Disk 2            Disk 3
         100GB                      100GB             100GB

         Parity                     Parity             Parity




       Volume = 200GB (n-1 x 100)



44                                           © Cliff Beacham 2007
RAID 10 – A mirrored stripe set


           Disk 1      Disk 2        Disk 3

           100GB       100 GB        100GB




           Disk 4      Disk 5        Disk 6

           100GB       100 GB        100GB


      Volume = 300GB
45                              © Cliff Beacham 2007

More Related Content

What's hot

Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and systemxKinAnx
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architectureAmit Bhalla
 
Performing Sandboxed Testing with PlateSpin Forge
Performing Sandboxed Testing with PlateSpin ForgePerforming Sandboxed Testing with PlateSpin Forge
Performing Sandboxed Testing with PlateSpin ForgeNovell
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Symantec
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
L lpic2201-pdf
L lpic2201-pdfL lpic2201-pdf
L lpic2201-pdfG&P
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesNovell
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM India Smarter Computing
 
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Sverige
 
Rudder - Configuration management benefits for everyone (FOSDEM 2012)
Rudder - Configuration management benefits for everyone (FOSDEM 2012)Rudder - Configuration management benefits for everyone (FOSDEM 2012)
Rudder - Configuration management benefits for everyone (FOSDEM 2012)RUDDER
 

What's hot (19)

Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
RHEL6 - Rh255
RHEL6 - Rh255RHEL6 - Rh255
RHEL6 - Rh255
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
Performance in a virtualized environment
Performance in a virtualized environmentPerformance in a virtualized environment
Performance in a virtualized environment
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architecture
 
Performing Sandboxed Testing with PlateSpin Forge
Performing Sandboxed Testing with PlateSpin ForgePerforming Sandboxed Testing with PlateSpin Forge
Performing Sandboxed Testing with PlateSpin Forge
 
Less08 users
Less08 usersLess08 users
Less08 users
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Less18 support
Less18 supportLess18 support
Less18 support
 
Database backup 110810
Database backup 110810Database backup 110810
Database backup 110810
 
L lpic2201-pdf
L lpic2201-pdfL lpic2201-pdf
L lpic2201-pdf
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
myResume
myResumemyResume
myResume
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
 
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
 
Rudder - Configuration management benefits for everyone (FOSDEM 2012)
Rudder - Configuration management benefits for everyone (FOSDEM 2012)Rudder - Configuration management benefits for everyone (FOSDEM 2012)
Rudder - Configuration management benefits for everyone (FOSDEM 2012)
 

Viewers also liked

Travelcoop's MontblancXpedition photocontest 2012
Travelcoop's MontblancXpedition photocontest 2012Travelcoop's MontblancXpedition photocontest 2012
Travelcoop's MontblancXpedition photocontest 2012Travelcoop Reisadviseurs
 
Travelcoop Oezbekistan Parel van ht Oosten slide
Travelcoop Oezbekistan Parel van ht Oosten slideTravelcoop Oezbekistan Parel van ht Oosten slide
Travelcoop Oezbekistan Parel van ht Oosten slideTravelcoop Reisadviseurs
 
Power point presentation by saini
Power point presentation  by sainiPower point presentation  by saini
Power point presentation by sainiJatin Saini
 
Presentfin
PresentfinPresentfin
Presentfinbank2427
 
ict summary of the first evaluation
ict summary of the first evaluationict summary of the first evaluation
ict summary of the first evaluationjonanle
 
Summary of the 1st evaluation
Summary of the 1st evaluationSummary of the 1st evaluation
Summary of the 1st evaluationjonanle
 
Galani2011
Galani2011Galani2011
Galani2011citrange
 
Travelcoop Partnermeeting dec2011 brochure
Travelcoop Partnermeeting dec2011 brochureTravelcoop Partnermeeting dec2011 brochure
Travelcoop Partnermeeting dec2011 brochureTravelcoop Reisadviseurs
 
NANOG52 - OCN Experience to Handle the Internet Growth and the Future
NANOG52 - OCN Experience to Handle the Internet Growth and the FutureNANOG52 - OCN Experience to Handle the Internet Growth and the Future
NANOG52 - OCN Experience to Handle the Internet Growth and the FutureChika Yoshimura
 
APRICOT 2014 NOG Reports (JANOG)
APRICOT 2014 NOG Reports (JANOG)APRICOT 2014 NOG Reports (JANOG)
APRICOT 2014 NOG Reports (JANOG)Chika Yoshimura
 
Leadership stephens
 Leadership stephens Leadership stephens
Leadership stephensharry0709
 
JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011Chika Yoshimura
 

Viewers also liked (17)

De brochure in een notedop slideshare
De brochure in een notedop slideshareDe brochure in een notedop slideshare
De brochure in een notedop slideshare
 
Travelcoop's MontblancXpedition photocontest 2012
Travelcoop's MontblancXpedition photocontest 2012Travelcoop's MontblancXpedition photocontest 2012
Travelcoop's MontblancXpedition photocontest 2012
 
Travelcoop Partenmeeting 5 december
Travelcoop Partenmeeting 5 decemberTravelcoop Partenmeeting 5 december
Travelcoop Partenmeeting 5 december
 
Travelcoop Oezbekistan Parel van ht Oosten slide
Travelcoop Oezbekistan Parel van ht Oosten slideTravelcoop Oezbekistan Parel van ht Oosten slide
Travelcoop Oezbekistan Parel van ht Oosten slide
 
Andalucia alegria pp travelcoop
Andalucia alegria pp travelcoopAndalucia alegria pp travelcoop
Andalucia alegria pp travelcoop
 
Power point presentation by saini
Power point presentation  by sainiPower point presentation  by saini
Power point presentation by saini
 
Presentfin
PresentfinPresentfin
Presentfin
 
ict summary of the first evaluation
ict summary of the first evaluationict summary of the first evaluation
ict summary of the first evaluation
 
Travelcoop cruise schotland & noorwegen
Travelcoop cruise schotland & noorwegenTravelcoop cruise schotland & noorwegen
Travelcoop cruise schotland & noorwegen
 
Summary of the 1st evaluation
Summary of the 1st evaluationSummary of the 1st evaluation
Summary of the 1st evaluation
 
Galani2011
Galani2011Galani2011
Galani2011
 
Travelcoop City Trip New York
Travelcoop City Trip New YorkTravelcoop City Trip New York
Travelcoop City Trip New York
 
Travelcoop Partnermeeting dec2011 brochure
Travelcoop Partnermeeting dec2011 brochureTravelcoop Partnermeeting dec2011 brochure
Travelcoop Partnermeeting dec2011 brochure
 
NANOG52 - OCN Experience to Handle the Internet Growth and the Future
NANOG52 - OCN Experience to Handle the Internet Growth and the FutureNANOG52 - OCN Experience to Handle the Internet Growth and the Future
NANOG52 - OCN Experience to Handle the Internet Growth and the Future
 
APRICOT 2014 NOG Reports (JANOG)
APRICOT 2014 NOG Reports (JANOG)APRICOT 2014 NOG Reports (JANOG)
APRICOT 2014 NOG Reports (JANOG)
 
Leadership stephens
 Leadership stephens Leadership stephens
Leadership stephens
 
JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011
 

Similar to Presentations bu 8

Db As Behaving Badly... Worst Practices For Database Administrators Rod Colledge
Db As Behaving Badly... Worst Practices For Database Administrators Rod ColledgeDb As Behaving Badly... Worst Practices For Database Administrators Rod Colledge
Db As Behaving Badly... Worst Practices For Database Administrators Rod Colledgesqlserver.co.il
 
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...MongoDB
 
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Lindsey Aitchison
 
DBA Basics guide
DBA Basics guideDBA Basics guide
DBA Basics guideazoznasser1
 
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...Nagios
 
112667416 raid-seminar
112667416 raid-seminar112667416 raid-seminar
112667416 raid-seminarabhivicram
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationYudi Herdiana
 
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...TSOLUTIONS
 
Light-weighted HDFS disaster recovery
Light-weighted HDFS disaster recoveryLight-weighted HDFS disaster recovery
Light-weighted HDFS disaster recoveryDataWorks Summit
 
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACAUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACSandesh Rao
 
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』Insight Technology, Inc.
 
ISD 6.3 and IBM i june 2012
ISD 6.3 and IBM i june 2012ISD 6.3 and IBM i june 2012
ISD 6.3 and IBM i june 2012COMMON Europe
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesInsight Technology, Inc.
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Arunkumar Shanmugam
 

Similar to Presentations bu 8 (20)

Module 03.pdf
Module 03.pdfModule 03.pdf
Module 03.pdf
 
Db As Behaving Badly... Worst Practices For Database Administrators Rod Colledge
Db As Behaving Badly... Worst Practices For Database Administrators Rod ColledgeDb As Behaving Badly... Worst Practices For Database Administrators Rod Colledge
Db As Behaving Badly... Worst Practices For Database Administrators Rod Colledge
 
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...
Transforming your Business with Scale-Out Flash: How MongoDB & Flash Accelera...
 
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
 
Raid level
Raid levelRaid level
Raid level
 
DBA Basics guide
DBA Basics guideDBA Basics guide
DBA Basics guide
 
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
 
112667416 raid-seminar
112667416 raid-seminar112667416 raid-seminar
112667416 raid-seminar
 
RAID seminar
RAID seminarRAID seminar
RAID seminar
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
 
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...
GeoVision : CCTV Solutions : RAID vs Non-RAID System for Storing Surveillance...
 
Light-weighted HDFS disaster recovery
Light-weighted HDFS disaster recoveryLight-weighted HDFS disaster recovery
Light-weighted HDFS disaster recovery
 
SEMINAR
SEMINARSEMINAR
SEMINAR
 
S903 palla
S903 pallaS903 palla
S903 palla
 
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACAUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
 
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』
[db tech showcase Tokyo 2018] #dbts2018 #B17 『オラクル パフォーマンス チューニング - 神話、伝説と解決策』
 
ISD 6.3 and IBM i june 2012
ISD 6.3 and IBM i june 2012ISD 6.3 and IBM i june 2012
ISD 6.3 and IBM i june 2012
 
Oracle RAC 12c Overview
Oracle RAC 12c OverviewOracle RAC 12c Overview
Oracle RAC 12c Overview
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practices
 
Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01Backup netezza-tsm-v1403c-140330170451-phpapp01
Backup netezza-tsm-v1403c-140330170451-phpapp01
 

More from Cliff Beacham, MBA, CPA, MCDBA, Excel Consultant

More from Cliff Beacham, MBA, CPA, MCDBA, Excel Consultant (20)

FP_Examples.pptx
FP_Examples.pptxFP_Examples.pptx
FP_Examples.pptx
 
FP&A_Education4_PPT_v18.pptx
FP&A_Education4_PPT_v18.pptxFP&A_Education4_PPT_v18.pptx
FP&A_Education4_PPT_v18.pptx
 
00_FP&A_Section_02_PPT_16.pptx
00_FP&A_Section_02_PPT_16.pptx00_FP&A_Section_02_PPT_16.pptx
00_FP&A_Section_02_PPT_16.pptx
 
Taxpayers billofrights cv04
Taxpayers billofrights cv04Taxpayers billofrights cv04
Taxpayers billofrights cv04
 
Budgets, Plans and How are we doing?
Budgets, Plans and How are we doing?Budgets, Plans and How are we doing?
Budgets, Plans and How are we doing?
 
Cost Accounting - An Introduction
Cost Accounting - An IntroductionCost Accounting - An Introduction
Cost Accounting - An Introduction
 
Breakeven cv02
Breakeven cv02Breakeven cv02
Breakeven cv02
 
Cashbook presentation 02
Cashbook presentation 02Cashbook presentation 02
Cashbook presentation 02
 
006 ifrs_09_session05_derecognition_cv01
 006 ifrs_09_session05_derecognition_cv01 006 ifrs_09_session05_derecognition_cv01
006 ifrs_09_session05_derecognition_cv01
 
004 ifrs_09_session03_classification_cv01
 004 ifrs_09_session03_classification_cv01 004 ifrs_09_session03_classification_cv01
004 ifrs_09_session03_classification_cv01
 
003 ifrs_09_session02_basics_cv04
 003 ifrs_09_session02_basics_cv04 003 ifrs_09_session02_basics_cv04
003 ifrs_09_session02_basics_cv04
 
001 ifrs_09_session01_intro_cv03
 001 ifrs_09_session01_intro_cv03 001 ifrs_09_session01_intro_cv03
001 ifrs_09_session01_intro_cv03
 
Index cv01
Index cv01Index cv01
Index cv01
 
Pivot tables c01
Pivot tables c01Pivot tables c01
Pivot tables c01
 
Cliff tip indexmatch_01
Cliff tip indexmatch_01Cliff tip indexmatch_01
Cliff tip indexmatch_01
 
Xl breakeven chart - How to prepare a Breakeven Chart in Excel, Breakeven, Fi...
Xl breakeven chart - How to prepare a Breakeven Chart in Excel, Breakeven, Fi...Xl breakeven chart - How to prepare a Breakeven Chart in Excel, Breakeven, Fi...
Xl breakeven chart - How to prepare a Breakeven Chart in Excel, Breakeven, Fi...
 
Developing software 2013
Developing software 2013Developing software 2013
Developing software 2013
 
Ifrs09, IFRS9 hedging, accounting for hedges, hedge accounting, Investment, d...
Ifrs09, IFRS9 hedging, accounting for hedges, hedge accounting, Investment, d...Ifrs09, IFRS9 hedging, accounting for hedges, hedge accounting, Investment, d...
Ifrs09, IFRS9 hedging, accounting for hedges, hedge accounting, Investment, d...
 
ifrs 09 impairment, impairment, Investment impairment,
ifrs 09 impairment, impairment, Investment impairment, ifrs 09 impairment, impairment, Investment impairment,
ifrs 09 impairment, impairment, Investment impairment,
 
Great Plains Tablenames
Great Plains TablenamesGreat Plains Tablenames
Great Plains Tablenames
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Presentations bu 8

  • 1. More than Backups for Accounting Databases Configuring disks can aid performance. Backups may be the last line of defense against data loss but they can also provide operational benefits. Cliff Beacham MBA, MCDBA, CPA.CITP
  • 2. Contents: 1. From the Company point of view 2. What are we hoping to achieve? 3. Technical – hardware - methods 4. Technical Questions (FAQs) 5. Conclusion & Recommendations 2 © Cliff Beacham 2007
  • 3. Part 1: 1. Whose responsibility is it? 2. Why do it at all? 3. What Risks do we face? 4. Is it just a Management Decision? 5. Emerging Trends 6. Operational advantages 7. Consequences of downtime 3 © Cliff Beacham 2007
  • 4. ERP Architecture (SQL Server) ERP Client ERP Server ERP Server ERP Client Application Application MasterDB ERP Database ERP Database msdbDB Server Server E.g. SQL Server E.g. SQL Server ERPSystemDB ERP Client ERP Client AccountingDB 4 © Cliff Beacham 2007
  • 5. 1a. Whose Responsibility?: Shareholders Directors CFO CIO Controller IT Manager 5 © Cliff Beacham 2007
  • 6. 1b. Why do it (SOX etc) Sarbanes Oxley has requirements that are: 1. law to public companies 2. common sense to others 6 © Cliff Beacham 2007
  • 7. 1c. Risks – 5 main areas  Loss or failure of Hardware  Natural Disasters/Catastrophes  Theft or Destruction  Malicious/deliberate  Inadvertent error 7 © Cliff Beacham 2007
  • 8. 1d. Management Decision 1. Compare Cost with Benefits 2. BUT remember there are decisions where cost vs. benefits are not applicable 3. Economic justification can be calculated by: Anything x Infinity = Infinity 8 © Cliff Beacham 2007
  • 9. 1e. Emerging trends: 1. ISACA – Information Systems Audit and Control Association (50,000 members) CISA & CISM 2. CPA/CITP specialist designation 3. SOX applicability to smaller companies 9 © Cliff Beacham 2007
  • 10. 1f. Operational uses of Backups: 1. DSS’s 2. Test Companies 3. Development Companies 4. Scoreboards 5. Lookups 6. Read-only databases 10 © Cliff Beacham 2007
  • 11. 1g. Likely downtime “I’ll call the company that has the tape backup and see when they can get it back to us.” Most error is caused by users – if we have the backup we can restore immediately with minimum loss of productivity 11 © Cliff Beacham 2007
  • 12. An aside (to be personal) Never, never, NEVER mix data and operating systems on the same drive Operating System Data 12 © Cliff Beacham 2007
  • 13. Part 2: What are we trying to do?  2a. What databases need backing up  2b. Log file  2c. Other applicable DBs 13 © Cliff Beacham 2007
  • 14. 2a. What databases need backing up?  Production  System databases – Master, msdb, Model  Log file  Other applicable DBs 14 © Cliff Beacham 2007
  • 15. 2b. ERP Architecture (SQL Server) tempDB ERP Client ERP Server ERP Server ERP Client Application Application MasterDB ERP Database ERP Database msdbDB Server Server E.g. SQL Server E.g. SQL Server ERPSystemDB ERP Client ERP Client Log file AccountingDB 15 © Cliff Beacham 2007
  • 16. 2c. Disk arrangements - Objectives: 1. Speed / Performance 2. Reliability / Redundancy 3. Vulnerability / Risk 16 © Cliff Beacham 2007
  • 17. Part 3: Disks 1. RAID arrays 2. Appropriate use 3. Typical arrangement 17 © Cliff Beacham 2007
  • 18. 3a. RAID (Redundant Array of Independent/Inexpensive Disks) RAID # Description 0 Striped set 1 Mirrored set 5 Parity set 10 Striped then Mirrored 18 © Cliff Beacham 2007
  • 19. 3b. Appropriate use O/S + Programs Cluster OLTP db 5 or 10 DSS db Stripe Tempdb Stripe Log file Mirror Backup Isolated 19 © Cliff Beacham 2007
  • 20. 3c. Optimizing the Database Using Filegroups with Hardware-based RAID RAID 10 RAID 10 Disk Disk Filegroup 11 Filegroup Controller Controller RAID 5 RAID 5 Disk Disk Controller Filegroup 22 Filegroup Controller Disk Disk RAID 0 RAID 0 Filegroup 33 Filegroup Controller Controller Disk Disk Controller Controller TempDB TempDB RAID 1 RAID 1 Operating System Disk Transaction Log Transaction Log Operating System Disk & Programs & Programs Controller Controller 20 © Cliff Beacham 2007
  • 21. Part 4. FAQs 1. RAID 2. Cluster 3. Log Shipping 4. Full Backups 5. Backup Methods 21 © Cliff Beacham 2007
  • 22. 4a. Why backup when I have a RAID system?  Because RAID does not deal with user error  RAID deals with Disc Hardware error and performance issues 22 © Cliff Beacham 2007
  • 23. 4b. Why backup when I have a Clustered system?  Because Clusters do not deal with user error  Clusters are designed to deal with O/S and certain Program errors 23 © Cliff Beacham 2007
  • 24. Typical Clustered System  Single subnet Web Web Host 1 Node 1  No routers Host 1  No Internet ethernet access to DB Web Web Host 2 Host 2 Web Web SQL Server Database SQL Server Database Host 3 Host 3 Clients Clients 2-node Cluster Service 2-node Cluster Service Network Load Balancing Network Load Balancing Web Web Node 2 Component Load Balancing Host 6 Host 6 Component Load Balancing 24 © Cliff Beacham 2007
  • 25. 4c. Why backup when I have a Log- shipping system?  Because Log shipping does not deal with user error  Log shipping will faithfully replicate the error 25 © Cliff Beacham 2007
  • 26. 4d. Log Shipping  Providesa Baseline  Backs Up Original Files, Objects, and Data  Backs Up Portions of the Transaction Log ProdDB ProdLS Log Ship Log Ship Log Log Data Data 26 © Cliff Beacham 2007
  • 27. 4e. Why backup the Log when I have Full database backups?  Because Full backups do not enable Point-in- time recovery  A Full backup plan means you have to re- enter everything from the last Full backup 27 © Cliff Beacham 2007
  • 28. 4f. Backup Methods Full Database Backup Differential Database Backup Transaction Log Backup Piecemeal Filegroup Backup plan 28 © Cliff Beacham 2007
  • 29. Part 5: Strategies A. Full Database Backup Strategy B. Full Database and Transaction Log Backup Strategy C. Differential Backup Strategy D. Database File or Filegroup Backup Strategy 29 © Cliff Beacham 2007
  • 30. 5a. Full Database Backup  Providesa Baseline  Backs Up Original Files, Objects, and Data  Backs Up Portions of the Transaction Log Northwind D: Log Backup Backup NwindBU Dat a 30 © Cliff Beacham 2007
  • 31. Full Database Backup Strategy Created Database Full Database Backup Full Database Backup and Performed Full Database Backup Log Log Log Data Data Data Sunday Monday Tuesday 31 © Cliff Beacham 2007
  • 32. 5b. Full Database and Transaction Log Backup Strategy Full Database Full Database Backup Backup Log Log Log Log Log Data Log Data Sunday Monday 32 © Cliff Beacham 2007
  • 33. 5c. Differential Backup  Use on Frequently Modified Databases  Requires a Full Database Backup  Backs Up Database Changes Since the Last Full Database Backup  Saves Time in Both Backup and Restore Process 33 © Cliff Beacham 2007
  • 34. Differential Backup Strategy Full Database Differential Differential Backup Backup Backup Data Log Log Log Log Data∆ Log Log Log Log ∆ ... ... Monday Tuesday 34 © Cliff Beacham 2007
  • 35. 5d. Database File or Filegroup Backup Strategy Full Database Backup Backup Backup File3 Backup File1 File2 Log Log Data Log Log Data Log Log Data Log Log Log Data File 1 File 2 File 3 Monday Tuesday Wednesday Thursday 35 © Cliff Beacham 2007
  • 36. 5e. Plan Database Files and Logs  Manage Disk Storage for: – Performance – Fault tolerance  Place Transaction Logs on Separate Disks  Place the tempdb Database separately  Adopt a coherent Backup policy 36 © Cliff Beacham 2007
  • 37. Backup Strategy  Plan (and Document the procedure)  Implement  Test regularly  Document effectiveness of Internal Controls 37 © Cliff Beacham 2007
  • 38. THE END Thank you for listening: Cliff Beacham (949) 813-1349 Proudly sponsored by: IFRSUSA.ORG
  • 39. How the Transaction Log Works 1 Data modification is 1 Data modification is sent by application sent by application 3 Modification is recorded 3 Modification is recorded in transaction log on disk in transaction log on disk Buffer Cache Disk Disk 2 Data pages are located in, 2 Data pages are located in, or read into, RAM and or read into, RAM and modified modified 4 Checkpoint writes 4 Checkpoint writes committed committed transactions transactions to database to database 39 © Cliff Beacham 2007
  • 40. Optimizing a Database Using Hardware RAID  Using Hardware-based RAID – Better performance than O/S-based RAID – Enables hot replacement failed drive  Applying Types of RAID (Examples) – Disk mirroring (RAID 1) for redundancy of the log – Disk striping with parity (RAID 5) for performance and redundancy for data files and transaction logs – Disk mirroring with striping (RAID 10) for maximum performance for data files 40 © Cliff Beacham 2007
  • 41. Example of User-defined Filegroups Production Database sys… sys… …… sys… sys… Orders Orders sysusers sysusers Customers Customers OrdHistYear2 OrdHistYear2 sysobjects sysobjects Products Products OrdHistYear1 OrdHistYear1 C: D: E: ProdOLTP.mdf OrdHist1.ndf OrdHist2.ndf ProdLog.ldf Primary Filegroup User-defined Filegroup Transaction Log 41 © Cliff Beacham 2007
  • 42. RAID 0 – Striped drives Disk 1 Disk 2 Disk 3 100GB 100 GB 100GB Total Volume = 300GB 42 © Cliff Beacham 2007
  • 43. RAID 1- Mirrored drives Disk 1 100GB Disk 2 100GB Total Volume = 100GB 43 © Cliff Beacham 2007
  • 44. RAID 5 – Compressed copy on another disk Disk 1 Disk 2 Disk 3 100GB 100GB 100GB Parity Parity Parity Volume = 200GB (n-1 x 100) 44 © Cliff Beacham 2007
  • 45. RAID 10 – A mirrored stripe set Disk 1 Disk 2 Disk 3 100GB 100 GB 100GB Disk 4 Disk 5 Disk 6 100GB 100 GB 100GB Volume = 300GB 45 © Cliff Beacham 2007

Editor's Notes

  1. An obvious question is – “Why do we need to address Accounting Databases specifically?” In my experience this is a much neglected area – I have even been answered, to my concern regarding backups – “It’s OK, we have paper printouts.” An accounting system is basically an ‘Off-the-shelf’ product which the users do not know much about and do not have access to the back-end programs or data. Typically accountants leave it to the IT department (often the IT department has no DBA) not even considering whether the IT department has the internal expertise to restore the database. This is especially true regarding a ‘Point-in-time’ restore. Most network administrators have never performed a PIT restoration. Ostrich management? The bottom line is - Accountants should be involved with their backups and not bury there heads in the sand! There needs to be documented procedures in place and there needs to regular routines that perform restores to test those procedures. Backups may be worthless unless they have been tested and you will not know their worth until you need them. To think outside the usual box, there can be some operational benefits to be gained from the use of backups. For example, we can create copies of our database for taking the load off our OLTP system or use them as the foundation for analysis reporting. We can also use them as Decision Support Systems (DSS) from which we can run those huge reports, we can use restored backups as test or development databases and gain other benefits as well. Some of the techniques discussed here are for use with large systems but smaller companies need to consider the advantages to be gained and learn how they can use some very simple routines to gain the benefits usually only available only to larger companies.
  2. DSS (Decision Support System) = a restored backup of the Production OLTP (Online Transaction Processing) database. An Example: If you backup and restore every night then you have a database that you can index extensively without affecting the OLTP database. An advantage is that all reports run against that database will be consistent as of End of Business yesterday. Test Companies can be used for training new staff, testing bulk uploads of data, ‘what-if’ scenarios, testing if the backup restores OK, etc. Development companies may be created from backups and used by developers who need a true example of the database for developing programs and add-ons. Scoreboards are used to hold aggregate totals and denormalized data for easy reference and performance. Lookups and Read-only databases can be comprised of many adaptations so that the production database does not have to carry the load. Examples: Photos of employees could be carried in a separate database. Price lists can be kept separate (Note: the permutations are endless – they may, or may not, be based on backed up databases).
  3. DSS (Decision Support System) = a restored backup of the Production OLTP (Online Transaction Processing) database. An Example: If you backup and restore every night then you have a database that you can index extensively without affecting the OLTP database. An advantage is that all reports run against that database will be consistent as of End of Business yesterday. Test Companies can be used for training new staff, testing bulk uploads of data, ‘what-if’ scenarios, testing if the backup restores OK, etc. Development companies may be created from backups and used by developers who need a true example of the database for developing programs and add-ons. Scoreboards are used to hold aggregate totals and denormalized data for easy reference and performance. Lookups and Read-only databases can be comprised of many adaptations so that the production database does not have to carry the load. Examples: Photos of employees could be carried in a separate database. Price lists can be kept separate (Note: the permutations are endless – they may, or may not, be based on backed up databases).
  4. This is a development from the previous slide – it shows tempdb (which is important for tuning performance) and the log file which needs to be on a separate drive.
  5. As part of the overall Disaster Recovery Plan , overall responsibility lies with the Board of Directors (as with everything else). The Board is responsible to the Shareholders for the continued operations of the company. Typically: The Officers follow the directions of the Board. The Managers implement the instructions of the Officers. Policies are approved at the Officer and then the Board level. Procedures are prepared by the managers for approval by the Officers.
  6. 1. Disaster recovery Plans are common sense 2. SOX compliance requires BU & Restore procedures to be in place A question I have for you is – “Is there anyone here who either thinks that backups are unnecessary or that if they are done that they do not have to be done properly?” COBIT standards can be downloaded free from www.isaca.org. COBIT (Control Objectives for Information and Related Technology) was developed by the IT Governance Institute (ITGI) SOX adaptation 2003 – IT Control Objectives for Sarbanes Oxley - detailed 27 IT processes and 136 control objectives that are critical to SOX compliance. Research in 2003 by The Meta Group found that 39% of firms said SOX will eventually make them more competitive. COBIT requires adequate backup and restore procedures and they should be regular, tested and written/recorded. While there is quite a lot of feeling that SOX has gone too far there has not been anyone that says that it was/is completely unnecessary or that it is without any merit.
  7. Since 9/11/2001 no one has said “It will never happen to us!” Prudence dictates that we do not leave the fate of the Company to chance - that we establish internal procedures that safeguard the continuity of the company should any of the risk areas become manifest. A complete Backup and restore plan should include the situation where a plane flies into the building (or something equally horrifying) and the company has to get up and running within a certain time, for example, 48 hours. Seriously and practically, and without the theatrics, - most errors are user errors and it should be a routine exercise to restore the database from a disk backup within the hour. This should be a procedure which is tested regularly.
  8. Management decisions are often based on a Cost vs. Benefit analysis. If the costs outweigh the benefits we may feel that we should not perform the function. However, there are some results for which we cannot ‘take the chance.’ An often used formula is EMV = %Probability x $Loss – or stated another way - Expected Monetary Value can be defined as Probability times Economic Result. Example: 1% probability of a $1million loss = $10,000. This is sometimes recommended as the amount of money you should spend to avoid the risk and plays a part in the calculation of the basis an Insurance Company uses when setting premiums.
  9. ISACA may be thought of as the International flavor of SOX with 50,000 members (worldwide). In Orange County there are approx 500 members. SOX needs no introduction - but I would like to say that a system of Internal Control is just common sense. CISA – Certified Information Systems Auditor. CISM - Certified Information Systems Manager. At present, both CISM and CISA are in high demand. The CITP is a fairly recent extension to AICPA membership for CPA’s specializing in IT and allows the use of CITP in conjunction with the CPA designation as CPA.CITP.
  10. DSS (Decision Support System) = a restored backup of the Production OLTP (Online Transaction Processing) database. An Example: If you backup and restore every night then you have a database that you can index extensively without affecting the OLTP database. An advantage is that all reports run against that database will be consistent as of End of Business yesterday. Test Companies can be used for training new staff, testing bulk uploads of data, ‘what-if’ scenarios, testing if the backup restores OK, etc. Development companies may be created from backups and used by developers who need a true example of the database for developing programs and add-ons. Scoreboards are used to hold aggregate totals and denormalized data for easy reference and performance. Lookups and Read-only databases can be comprised of many adaptations so that the production database does not have to carry the load. Examples: Photos of employees could be carried in a separate database. Price lists can be kept separate (Note: the permutations are endless – they may, or may not, be based on backed up databases).
  11. Nothing makes sense like backing up to a Hard Drive. It is faster, more reliable and more readily available in case of the need to restore. There has been a period when the predominant opinion was to backup to tape – maybe before hard drives became larger and cheaper. When you need to restore it makes perfect sense to restore from a hard drive copy of the backup.
  12. Why don’t companies lose data? One reason is that they do not put the data on the same drive as the operating system. The C: drive is the most vulnerable to corruption, virus attack and is heavily used. I recommend = get 2 drives: Use 1 for the operating system and programs Use the other for data Put your paging file on the second disk (it usually gets used less and will increase performance) Note: Partitions MAY have an effect on the vulnerability of your C: drive but will not fulfill performance issues.
  13. Many people seem to be under the impression that there is only one database. There are many systems that include multiple databases into their architecture. An Example is Microsoft Dynamics Great Plains which uses the Dynamics database to store GP system tables. This is in addition to their company databases. In additions to this, SQL Server itself uses the ‘master’ database for its server-wide metadata, the msdb database for job metadata and also backup details and the model database is used as a template for creating new databases. The log file is not a part of the database – it is a separate file. Another word to describe this file using an accounting term is ‘journal.’ This is a chronological record of every transaction that is written to the database. SQL Server does not write directly to the database files, it writes the transactions to the log then an internal process (called Checkpoint) writes the log file to the database tables. You can use this file when restoring a database to a ‘Point-in-time’ by a ‘play it again’ technique to bring the database to the required position. There are so many different scenarios – please allow me to catch-all by merely saying ‘other’ databases.
  14. Many people seem to be under the impression that there is only one database. There are many systems that include multiple databases into their architecture. An Example is Microsoft Dynamics Great Plains which uses the Dynamics database to store GP system tables. This is in addition to their company databases. In additions to this, SQL Server itself uses the ‘master’ database for its server-wide metadata, the msdb database for job metadata and also backup details and the model database is used as a template for creating new databases. The log file is not a part of the database – it is a separate file. Another word to describe this file using an accounting term is ‘journal.’ This is a chronological record of every transaction that is written to the database. SQL Server does not write directly to the database files, it writes the transactions to the log then an internal process (called Checkpoint) writes the log file to the database tables. You can use this file when restoring a database to a ‘Point-in-time’ by a ‘play it again’ technique to bring the database to the required position. There are so many different scenarios – please allow me to catch-all by merely saying ‘other’ databases.
  15. This is a development from the previous slide – it shows tempdb (which is important for tuning performance) and the log file which needs to be on a separate drive.
  16. When designing storage there considerations other than space. The greatest bottleneck to performance is the physical (the speed of electrical signals is about .6 times the speed of light). Therefore, the if we increase the number of I/O heads we increase the speed of I/O. Online duplication is called Redundancy – write to 2 disks at once and we have twice the reliability – less risk of data loss from a problem with the hard drives.
  17. When designing storage there considerations other than space. The greatest bottleneck to performance is the physical (the speed of electrical signals is about .6 times the speed of light). Therefore, the if we increase the number of I/O heads we increase the speed of I/O. Online duplication is called Redundancy – write to 2 disks at once and we have twice the reliability – less risk of data loss from a problem with the hard drives.
  18. A stripe set is comprised of multiple disks joined in series into one volume. A mirrored set is comprised of multiple disks joined in parallel into one duplicated volume. Thus you will use twice the minimum storage space. A parity set is comprised of a set of hard drives arranged so that every volume has a duplicate of the data, compressed and stored on another disk. You ‘lose’ one disk from the set because of this compressed ‘parity’ copy of the data. The resultant storage space is n-1 disks. Raid 5 arrays enable hot-swop of disks. Raid 10 is a set of stripped disks that are them mirrored. They use twice the minimum storage space. Raid 10 arrays also enable hot-swopping disks.
  19. The most susceptible disk is the one that holds the operating system. This is where problems are most likely to occur. Programs can also be installed on the ubiquitous ‘C:’ drive. This drive is capable of being clustered so that the user company can switch over to the another drive which holds the duplicate operating system and programs. OLTP databases are most suitable for storage on redundant systems. If the databases are small enough they could also just use a mirror which, at 2 disks, would be cheaper than even a Raid 5 system and just as advantageous as Raid 10). DSS databases do not need backups or redundancy as they can be recreated from a backup. Tempdb just needs speed since it is recreated each time SQL Server starts. Log files need redundancy and they are written heavily (by definition) but they are usually small enough not to require Raid 10 so a mirror is usually the answer. Backup files do not need backups and are never written to (unless written over) but they should be isolated from the other files unless there is a space problem.
  20. This system is shown merely to provide the basis for a discussion of the different types of RAID systems and disk arrangements. Usually you would not design both a RAID 5 and a RAID 10 system – either have one or the other. However, a company usually end up with a compromise system which is driven by the philosophy – “we do not need to have the ultimate in performance as long as the system is fast enough to meet our needs.” Question: When entering data, how fast is fast enough? Answer: You should have sub-second response when entering data, which is the maximum time that passes before a data entry clerk loses momentum. Note: There is a Oracle standard that defines 8 secs as the maximum time that could pass before a person starts to think of something else.
  21. DSS (Decision Support System) = a restored backup of the Production OLTP (Online Transaction Processing) database. An Example: If you backup and restore every night then you have a database that you can index extensively without affecting the OLTP database. An advantage is that all reports run against that database will be consistent as of End of Business yesterday. Test Companies can be used for training new staff, testing bulk uploads of data, ‘what-if’ scenarios, testing if the backup restores OK, etc. Development companies may be created from backups and used by developers who need a true example of the database for developing programs and add-ons. Scoreboards are used to hold aggregate totals and denormalized data for easy reference and performance. Lookups and Read-only databases can be comprised of many adaptations so that the production database does not have to carry the load. Examples: Photos of employees could be carried in a separate database. Price lists can be kept separate (Note: the permutations are endless – they may, or may not, be based on backed up databases).
  22. OK, let’s answer some FAQs. Firstly -
  23. Secondly -
  24. Notice that this slide shows that the Cluster has 2 nodes (which hold the Operation system and the programs) but only 1 database!
  25. Log-shipping is akin to – let’s copy our journal and post it to 2 copies of the General Ledger, (do it twice). We then have 2 copies, including our mistakes.
  26. This is how log-shipping works, in the background.
  27. The most common arrangement is to perform a Full backup every night. If this is what you wish this is what you get. Of course, if the database becomes in need of restoration the users will have to re-enter all data from the Full backup all over again. “ Hey, I enjoy doing things twice don’t you?” (sic) The cost of this in a 10 user company when the DB goes down at 4.30PM is 10 average man-days or 2 average man-weeks.
  28. We will look at each of these in turn and discuss the restore patterns necessary.
  29. Here are the options – that will enable: Restoration to the previous Full backup only Restoration to a Point-in-time. EG. If the database goes down at 4.30 you can restore to the 4.30 point it went down. This aides the restoration time by bypassing the log replays between the Full and the Last Differential BU This is for large DBs (called VLDBs) that need a permanent DBA and a complex routine.
  30. ALL restorations must start with a restoration from a Full BU. Only the portion of the log that is needed to complete incomplete transactions that might be pending are backed up. There is no ‘real’ Log replay of transactions that were already ‘Checkpointed.’
  31. A FULL backup strategy works like this, for example. You could backup once per week but every night is more common. You can go back to a previous backup but then you would have to re-enter data from that time.
  32. By just backing up the log, which is an independent file, you can restore the database to a point-in-time. This means you will not have re-enter all the data since the last Full backup. If you restore from the previous backup you can replay/restore the logs to the same Point-in-time because they are completely sequential. The lsn (log sequence number) is stored in the msdb database. Logs MUST be restored sequentially.
  33. Differential backups MAY be faster than FULL backups because they only backup the differences between the last FULL backup and the database at the time of the backup. Differential backups may speed the restoration by short-circuiting the restoration process by allowing the differential to be restored instead of the accumulated Logs.
  34. Here is an illustration of a differential BU strategy. A restore still has to start with the FULL BU but you can skip all differential BUs to the LAST differential.
  35. A complex arrangement involving filegroups may need an experienced DBA to implement since the planning requires a full understanding of the database and the implications of restoring parts of the database and not others.
  36. Finally
  37. And Finally stress this -
  38. 1. The Application sends modification statements to the Database Engine 2. Modifications are written to the log, they can only be Insert, Update or Delete statements. 3. Data pages are read into RAM 4. the Checkpoint process reads the old data, performs the arithmetic, writes the new data – all in RAM.
  39. A Volume made from a striped set consists of a number of disks in series, each disk merely adding to the size of the set.
  40. Mirrored drives set consists of 2 drives in parallel. The second drive is a duplicate of the first drive and everything done on the first drive is duolicated on the second drive.
  41. A Parity set consists of at least 3 drives. Each drive has an uncompressed area storing data and a compressed area that holds a compressed copy of the data stored on another drive. Drives in the set are hot-swoppable but if this happens, performance is terrible during the outage while the swop is taking place. A RAID 5 array is fast on Reads but a little slower on writing because the Parity data (compressed copy) has to be calculated when writing to the Parity copy.
  42. For the last few years most sales have been RAID 10, a mirrored stripe set. That is - a Stripe-set that is then mirrored (Note: Not mirrored then striped). Although called RAID 10 it is actually RAID 0 + 1. There is a 50 % reduction in capacity because of the dupication but the copy is not compressed and there is no slow-down in write-speed. Hot swop is enabled and even when doing this there is no slow down in performance.