Feeds

NetApp reveals Exadata backup plan

Exadata users want more than Oracle backup

Combat fraud and increase customer satisfaction

NetApp has quietly announced, through its blogs and user community, a backup solution for Oracle's Exadata appliances.

Oracle has previously suggested its own storage kit is the best place to protect the contents of Exadata boxes, but the NetApp 'Technical Report', titled Deploying a Backup Solution and Dev/Test Platform for Oracle Exadata with NetApp, says “... many enterprises are looking to provide Exadata systems as the database platform, while leveraging NetApp storage for backup and recovery as well as development and test environments.” The Technical Paper goes on to say that “further protection” of Exadata is another motivator, along with a desire to “improve the flexibility and efficiency in cloning Exadata databases for development and test (dev/test) requirements.”

NetApp's response is a method of sending Oracle Recovery Manager (RMAN) backups of Exadata databases to its own kit while maintaining the Hybrid Columnar Compression (HCC) format. Those who follows the recipe are said to find themselves better able to clone Exadata databases or create test and development environments.

The lengthy recipe for Exadata backups has been tested by Oracle labs and has the Big O's seal of approval.

The Technical Paper says the solution “consists of the Exadata production environment running Oracle 11g Databases. The local NetApp storage system is directly attached to the Exadata database machine using a 10 Gigabit Ethernet (10GbE) network to host RMAN backup sets and to replicate them to a remote NetApp storage system for protection. The backup and dev/test environment consists of standard Linux servers and NetApp storage with both Fibre Channel and 10GbE connectivity. Oracle Data Guard provides database replication between the Exadata production environment and the non-Exadata backup and dev/test environment. Gigabit (or WAN/LAN) networks between the production site, Exadata, and the dev/test site, non-Exadata, are configured to support Oracle Data Guard redo log transport and SnapMirror storage replication.”

There's plenty more in the 34-page PDF if you're up for it. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.