没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
Oracle® Data Guard
Concepts and Administration
11g Release 1 (11.1)
B28294-03
August 2008
Oracle Data Guard Concepts and Administration, 11g Release 1 (11.1)
B28294-03
Copyright © 1999, 2008, Oracle. All rights reserved.
Primary Author: Kathy Rich
Contributors: Andy Adams, Beldalker Anand, Rick Anderson, Andrew Babb, Pam Bantis, Tammy Bednar,
Barbara Benton, Chipper Brown, Larry Carpenter, George Claborn, Laurence Clarke, Jay Davison, Jeff
Detjen, Ray Dutcher, B.G. Garin, Mahesh Girkar, Yosuke Goto, Ray Guzman, Susan Hillson, Mark Johnson,
Rajeev Jain, Joydip Kundu, J. William Lee, Steve Lee, Steve Lim, Nitin Karkhanis, Steve McGee, Bob
McGuirk, Joe Meeks, Steve Moriarty, Muthu Olagappan, Deborah Owens, Ashish Ray, Antonio Romero,
Mike Schloss, Vivian Schupmann, Mike Smith, Vinay Srihali, Morris Tao, Lawrence To, Doug Utzig, Ric Van
Dyke, Doug Voss, Ron Weiss, Jingming Zhang
The Programs (which include both the software and documentation) contain proprietary information; they
are provided under a license agreement containing restrictions on use and disclosure and are also protected
by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly,
or decompilation of the Programs, except to the extent required to obtain interoperability with other
independently created software or as specified by law, is prohibited.
The information contained in this document is subject to change without notice. If you find any problems in
the documentation, please report them to us in writing. This document is not warranted to be error-free.
Except as may be expressly permitted in your license agreement for these Programs, no part of these
Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any
purpose.
If the Programs are delivered to the United States Government or anyone licensing or using the Programs on
behalf of the United States Government, the following notice is applicable:
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data
delivered to U.S. Government customers are "commercial computer software" or "commercial technical data"
pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As
such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation
and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license
agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial
Computer Software—Restricted Rights (June 1987). Oracle USA, Inc., 500 Oracle Parkway, Redwood City,
CA 94065.
The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently
dangerous applications. It shall be the licensee's responsibility to take all appropriate fail-safe, backup,
redundancy and other measures to ensure the safe use of such applications if the Programs are used for such
purposes, and we disclaim liability for any damages caused by such use of the Programs.
Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective owners.
The Programs may provide links to Web sites and access to content, products, and services from third
parties. Oracle is not responsible for the availability of, or any content provided on, third-party Web sites.
You bear all risks associated with the use of such content. If you choose to purchase any products or services
from a third party, the relationship is directly between you and the third party. Oracle is not responsible for:
(a) the quality of third-party products or services; or (b) fulfilling any of the terms of the agreement with the
third party, including delivery of products or services and warranty obligations related to purchased
products or services. Oracle is not responsible for any loss or damage of any sort that you may incur from
dealing with any third party.
iii
Contents
Preface .............................................................................................................................................................. xvii
Audience.................................................................................................................................................... xvii
Documentation Accessibility.................................................................................................................. xvii
Related Documents ................................................................................................................................. xviii
Conventions ............................................................................................................................................. xviii
What’s New in Oracle Data Guard?.................................................................................................. xix
Part I Concepts and Administration
1 Introduction to Oracle Data Guard
1.1 Data Guard Configurations....................................................................................................... 1-1
1.1.1 Primary Database................................................................................................................. 1-2
1.1.2 Standby Databases............................................................................................................... 1-2
1.1.3 Configuration Example....................................................................................................... 1-3
1.2 Data Guard Services ................................................................................................................... 1-3
1.2.1 Redo Transport Services..................................................................................................... 1-3
1.2.2 Apply Services...................................................................................................................... 1-4
1.2.3 Role Transitions ................................................................................................................... 1-5
1.3 Data Guard Broker...................................................................................................................... 1-5
1.3.1 Using Oracle Enterprise Manager Grid Control............................................................. 1-6
1.3.2 Using the Data Guard Command-Line Interface............................................................ 1-6
1.4 Data Guard Protection Modes .................................................................................................. 1-6
1.5 Client Failover ............................................................................................................................. 1-7
1.6 Data Guard and Complementary Technologies..................................................................... 1-7
1.7 Summary of Data Guard Benefits............................................................................................. 1-9
2 Getting Started with Data Guard
2.1 Standby Database Types............................................................................................................ 2-1
2.1.1 Physical Standby Databases............................................................................................... 2-1
2.1.2 Logical Standby Databases................................................................................................. 2-2
2.1.3 Snapshot Standby Databases ............................................................................................. 2-3
2.2 User Interfaces for Administering Data Guard Configurations .......................................... 2-4
2.3 Data Guard Operational Prerequisites .................................................................................... 2-4
2.3.1 Hardware and Operating System Requirements............................................................ 2-4
iv
2.3.2 Oracle Software Requirements .......................................................................................... 2-5
2.4 Standby Database Directory Structure Considerations......................................................... 2-6
3 Creating a Physical Standby Database
3.1 Preparing the Primary Database for Standby Database Creation ....................................... 3-1
3.1.1 Enable Forced Logging ....................................................................................................... 3-2
3.1.2 Configure Redo Transport Authentication...................................................................... 3-2
3.1.3 Configure the Primary Database to Receive Redo Data ................................................ 3-2
3.1.4 Set Primary Database Initialization Parameters.............................................................. 3-3
3.1.5 Enable Archiving ................................................................................................................. 3-5
3.2 Step-by-Step Instructions for Creating a Physical Standby Database................................. 3-5
3.2.1 Create a Backup Copy of the Primary Database Datafiles ............................................ 3-6
3.2.2 Create a Control File for the Standby Database .............................................................. 3-6
3.2.3 Prepare an Initialization Parameter File for the Standby Database ............................. 3-6
3.2.4 Copy Files from the Primary System to the Standby System........................................ 3-8
3.2.5 Set Up the Environment to Support the Standby Database .......................................... 3-8
3.2.6 Start the Physical Standby Database.............................................................................. 3-10
3.2.7 Verify the Physical Standby Database Is Performing Properly ................................. 3-10
3.3 Post-Creation Steps.................................................................................................................. 3-12
4 Creating a Logical Standby Database
4.1 Prerequisite Conditions for Creating a Logical Standby Database ..................................... 4-1
4.1.1 Determine Support for Data Types and Storage Attributes for Tables ....................... 4-1
4.1.2 Ensure Table Rows in the Primary Database Can Be Uniquely Identified................. 4-2
4.2 Step-by-Step Instructions for Creating a Logical Standby Database................................... 4-3
4.2.1 Create a Physical Standby Database................................................................................. 4-3
4.2.2 Stop Redo Apply on the Physical Standby Database ..................................................... 4-3
4.2.3 Prepare the Primary Database to Support a Logical Standby Database...................... 4-4
4.2.3.1 Prepare the Primary Database for Role Transitions................................................ 4-4
4.2.3.2 Build a Dictionary in the Redo Data.......................................................................... 4-5
4.2.4 Transition to a Logical Standby Database........................................................................ 4-5
4.2.4.1 Convert to a Logical Standby Database .................................................................... 4-5
4.2.4.2 Adjust Initialization Parameters for the Logical Standby Database ..................... 4-6
4.2.5 Open the Logical Standby Database ................................................................................. 4-8
4.2.6 Verify the Logical Standby Database Is Performing Properly ...................................... 4-9
4.3 Post-Creation Steps..................................................................................................................... 4-9
5 Data Guard Protection Modes
5.1 Data Guard Protection Modes .................................................................................................. 5-1
5.2 Setting the Data Protection Mode of a Primary Database .................................................... 5-2
6 Redo Transport Services
6.1 Introduction to Redo Transport Services ................................................................................ 6-1
6.2 Configuring Redo Transport Services...................................................................................... 6-2
6.2.1 Redo Transport Security..................................................................................................... 6-2
6.2.1.1 Redo Transport Authentication Using SSL............................................................... 6-2
v
6.2.1.2 Redo Transport Authentication Using a Password File ......................................... 6-3
6.2.2 Configuring an Oracle Database to Send Redo Data ..................................................... 6-3
6.2.2.1 Viewing Attributes With V$ARCHIVE_DEST......................................................... 6-5
6.2.3 Configuring an Oracle Database to Receive Redo Data................................................. 6-5
6.2.3.1 Creating and Managing a Standby Redo Log .......................................................... 6-5
6.2.3.2 Configuring Standby Redo Log Archival ................................................................. 6-6
6.3 Monitoring Redo Transport Services....................................................................................... 6-7
6.3.1 Monitoring Redo Transport Status ................................................................................... 6-7
6.3.2 Monitoring Synchronous Redo Transport Response Time ........................................... 6-8
6.3.3 Redo Gap Detection and Resolution................................................................................. 6-9
6.3.3.1 Manual Gap Resolution............................................................................................ 6-10
6.3.4 Redo Transport Services Wait Events............................................................................ 6-11
6.4 Tuning Redo Transport........................................................................................................... 6-12
7 Apply Services
7.1 Introduction to Apply Services................................................................................................. 7-1
7.2 Apply Services Configuration Options ................................................................................... 7-2
7.2.1 Using Real-Time Apply to Apply Redo Data Immediately .......................................... 7-2
7.2.2 Specifying a Time Delay for the Application of Archived Redo Log Files ................. 7-3
7.2.2.1 Using Flashback Database as an Alternative to Setting a Time Delay ................. 7-4
7.3 Applying Redo Data to Physical Standby Databases............................................................ 7-4
7.3.1 Starting Redo Apply ........................................................................................................... 7-4
7.3.2 Stopping Redo Apply.......................................................................................................... 7-5
7.3.3 Monitoring Redo Apply on Physical Standby Databases.............................................. 7-5
7.4 Applying Redo Data to Logical Standby Databases.............................................................. 7-5
7.4.1 Starting SQL Apply ............................................................................................................. 7-5
7.4.2 Stopping SQL Apply on a Logical Standby Database.................................................... 7-5
7.4.3 Monitoring SQL Apply on Logical Standby Databases................................................. 7-6
8 Role Transitions
8.1 Introduction to Role Transitions............................................................................................... 8-1
8.1.1 Preparing for a Role Transition ......................................................................................... 8-2
8.1.2 Choosing a Target Standby Database for a Role Transition.......................................... 8-2
8.1.3 Switchovers........................................................................................................................... 8-4
8.1.4 Failovers................................................................................................................................ 8-6
8.1.5 Role Transition Triggers ..................................................................................................... 8-7
8.2 Role Transitions Involving Physical Standby Databases...................................................... 8-7
8.2.1 Performing a Switchover to a Physical Standby Database............................................ 8-7
8.2.2 Performing a Failover to a Physical Standby Database ................................................. 8-9
8.3 Role Transitions Involving Logical Standby Databases..................................................... 8-11
8.3.1 Performing a Switchover to a Logical Standby Database........................................... 8-11
8.3.2 Performing a Failover to a Logical Standby Database ................................................ 8-14
8.4 Using Flashback Database After a Role Transition............................................................. 8-15
8.4.1 Using Flashback Database After a Switchover............................................................. 8-15
8.4.2 Using Flashback Database After a Failover .................................................................. 8-16
剩余315页未读,继续阅读
资源评论
- li_mj772012-12-06详细介绍了数据卫士的备份原理,不错。
wz408
- 粉丝: 0
- 资源: 39
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功