A Method of Protecting Oracle Database Based on Snapshot
A database and snapshot technology, applied in interdisciplinary fields, can solve problems such as large host dependence, and achieve the effects of avoiding waiting time, ensuring safety and reliability, and ensuring consistency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.
[0036] In the present invention, the storage device is mounted on the host, and the methods used for mounting the storage device include iscsi, FC, FCoE or IB. In this embodiment, the iscsi storage technology is taken as an example to illustrate, and the oracle database is built in the storage device iscsi volume, which can reduce the dependence on the host, realize data security and integrity, create instances and table spaces, and configure oracle to archive mode, and then install the snapshot agent for database monitoring.
[0037] like figure 1 As shown, the storage device 2 is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com