Snapshot-based Oracle database protection method
A database and snapshot technology, applied in interdisciplinary fields, can solve problems such as large host dependence, achieve the effect of avoiding waiting time, guaranteeing consistency, and ensuring security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.
[0036] In the present invention, the storage device is mounted on the host, and the methods used for mounting the storage device include iscsi, FC, FCoE or IB. In this embodiment, the iscsi storage technology is taken as an example to illustrate, and the oracle database is built in the storage device iscsi volume, which can reduce the dependence on the host, realize data security and integrity, create instances and table spaces, and configure oracle to archive mode, and then install the snapshot agent for database monitoring.
[0037] like figure 1 As shown, the storage device 2 is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com