You cannot see this page without javascript.

진주성 블로그 방문하기

기술문서 Oracle asm

2017.08.24 00:26

gupy1004 조회 수:494

asm_best_practices-1.pdf


Using Oracle Database 10g
Automatic Storage Management with FUJITSU Storage

 

Contents
1. Introduction ............................................................................................................................... 1
2. Fujitsu’s ETERNUS Storage Systems ..................................................................................... 2
2-1. High Availability.................................................................................................................................................. 2
2-2. Performance Tuning........................................................................................................................................... 2
2-3. Point-in-time copy feature.................................................................................................................................. 2
3. Fujitsu Storage Management software.................................................................................... 2
3-1. Fujitsu Storage Cruiser ...................................................................................................................................... 2
3-2. Fujitsu AdvancedCopy Manager........................................................................................................................ 3
4. Oracle Technologies ................................................................................................................. 3
4-1. Automatic Storage Management........................................................................................................................ 3
4-2. ASM Architecture ............................................................................................................................................... 3
4-3. I/O Distribution ................................................................................................................................................... 3
4-4. Dynamic Reconfiguration of a disk group .......................................................................................................... 4
4-5. Rebalancing ....................................................................................................................................................... 4
4-6. ASM Mirroring .................................................................................................................................................... 4
4-7. ASM Recovery ................................................................................................................................................... 4
5. Best Practices ........................................................................................................................... 4
5-1. High Reliability and High Availability.................................................................................................................. 4
5-2. Database Acceleration ....................................................................................................................................... 4
5-3. System Relation Management and Failure Monitoring...................................................................................... 5
5-4. ASM Disk Group Configuration Guideline.......................................................................................................... 5
6. Conclusion ................................................................................................................................ 6
7. Appendix.................................................................................................................................... 7
7-1. Cluster System by the Combination of Oracle RAC and PRIMECLUSTER...................................................... 7
7-2. Database Space Management by Fujitsu Storage Manager ............................................................................. 8
7-3. Backup/Recovery Procedure Methods and Usage Example............................................................................. 9
7-4. Additional Technical References...................................................................................................................... 24

번호 제목 날짜 조회 수
65 BCP 2017.11.01 588
64 WLAN, VLAN 2017.11.01 189
63 ISMS - 정보보호관리체계 2017.11.01 169
62 위험관리 2017.11.01 218
61 법규 - 추가작성 2017.11.01 113
60 개발보안 file 2017.11.01 563
59 어플리케이션 보안 file 2017.11.01 133
58 시스템보안 file 2017.11.01 1314
57 DDos 공격대응 가이드 - kisa 자료 file 2017.10.31 290
56 블록체인 file 2017.10.31 161
55 route access-list file 2017.10.30 590
54 전자서명의 원리 file 2017.10.30 183
53 사이버 침해사고 대응 절차 file 2017.10.29 235
52 스니핑용 promisc 모드 file 2017.10.29 320
51 DDoS 공격도구 file 2017.10.18 221
진주성 블로그 방문하기
CLOSE