기술문서 Oracle asm
2017.08.24 00:26
Using Oracle Database 10g
Automatic Storage Management with FUJITSU Storage
Contents
1. Introduction ............................................................................................................................... 1
2. Fujitsu’s ETERNUS Storage Systems ..................................................................................... 2
2-1. High Availability.................................................................................................................................................. 2
2-2. Performance Tuning........................................................................................................................................... 2
2-3. Point-in-time copy feature.................................................................................................................................. 2
3. Fujitsu Storage Management software.................................................................................... 2
3-1. Fujitsu Storage Cruiser ...................................................................................................................................... 2
3-2. Fujitsu AdvancedCopy Manager........................................................................................................................ 3
4. Oracle Technologies ................................................................................................................. 3
4-1. Automatic Storage Management........................................................................................................................ 3
4-2. ASM Architecture ............................................................................................................................................... 3
4-3. I/O Distribution ................................................................................................................................................... 3
4-4. Dynamic Reconfiguration of a disk group .......................................................................................................... 4
4-5. Rebalancing ....................................................................................................................................................... 4
4-6. ASM Mirroring .................................................................................................................................................... 4
4-7. ASM Recovery ................................................................................................................................................... 4
5. Best Practices ........................................................................................................................... 4
5-1. High Reliability and High Availability.................................................................................................................. 4
5-2. Database Acceleration ....................................................................................................................................... 4
5-3. System Relation Management and Failure Monitoring...................................................................................... 5
5-4. ASM Disk Group Configuration Guideline.......................................................................................................... 5
6. Conclusion ................................................................................................................................ 6
7. Appendix.................................................................................................................................... 7
7-1. Cluster System by the Combination of Oracle RAC and PRIMECLUSTER...................................................... 7
7-2. Database Space Management by Fujitsu Storage Manager ............................................................................. 8
7-3. Backup/Recovery Procedure Methods and Usage Example............................................................................. 9
7-4. Additional Technical References...................................................................................................................... 24
댓글 0
번호 | 제목 | 날짜 | 조회 수 |
---|---|---|---|
65 | BCP | 2017.11.01 | 588 |
64 | WLAN, VLAN | 2017.11.01 | 189 |
63 | ISMS - 정보보호관리체계 | 2017.11.01 | 169 |
62 | 위험관리 | 2017.11.01 | 218 |
61 | 법규 - 추가작성 | 2017.11.01 | 113 |
60 | 개발보안 | 2017.11.01 | 563 |
59 | 어플리케이션 보안 | 2017.11.01 | 133 |
58 | 시스템보안 | 2017.11.01 | 1314 |
57 | DDos 공격대응 가이드 - kisa 자료 | 2017.10.31 | 290 |
56 | 블록체인 | 2017.10.31 | 161 |
55 | route access-list | 2017.10.30 | 590 |
54 | 전자서명의 원리 | 2017.10.30 | 183 |
53 | 사이버 침해사고 대응 절차 | 2017.10.29 | 235 |
52 | 스니핑용 promisc 모드 | 2017.10.29 | 320 |
51 | DDoS 공격도구 | 2017.10.18 | 221 |