Solved

Pervasive DB backup plan

Posted on 2010-09-11
1
614 Views
Last Modified: 2012-05-10
Does anyone have best practices for ensuring a pervasive database can be restored at any moment of time, ie a fire, tornado, etc.  How to and which medium to bsckup the log, DB etc?  I am trying to crate a disaster recovery plan.  
0
Comment
Question by:jckingcpa
1 Comment
 
LVL 28

Accepted Solution

by:
Bill Bach earned 500 total points
ID: 33656835
Backup up a Pervasive database is easy, and there are multiple solutions:

1) Get all users out and back up the files.  The easiest and quickest solution, this is usually limited to larger databases with available downtime windows.  Any old backup package or file copy solution will work just fine.  Consider backing up to another disk drive FIRST, and then to tape for archival purposes. Downside: down time is required, and it can take a while for large databases.

2) Use Continuous Operations Mode.  The same file copy solution, you first prepare the database by coalescing the files using BUTIL or Backup Agent, and you can copy the files while they are in use.  You can even do this several times per day -- some people have done this as frequently as every 2 hours, especially for smaller databases.  Get more information on how to do this from www.goldstarsoftware.com/press.asp in the white paper on Pervasive Database Backups.  Downside: Performance impact while in ContOps mode; limited number of copies per day; best for smaller databases.

3) Use DataExchange.  Pervasive has a replication solution which works well or poorly, depending on your database engine version, server configuration, frequency of data file changes, expertise, and time you have to devote to it.  While a cheap solution that is fairly easy to install, it can be difficult to keep running in a dynamic environment.  If your app is stable, though, with only infrequent data structure changes, then DX can provide a one-way replication from a primary server to a backup server that works VERY well, and at the database level, so it provides some good protection from viruses, bad "DEL *.*" commands, and the like.  Works very well with large databases.  Downside: Learning curve to setup; hard to maintain if the data file structures change frequently; only available and functional with SOME PSQL versions.

4) Use volume-based replication.  Several solutions abound, including DoubleTake (my own personal favorite) and CA XOSoft.  The trick is that the replication has to be done in "disk write order" to ensure that the disk writes take place on the secondary server in the same order as the primary server.  This is a good solution for also backing up flat files (EXE's, config files, txt files, etc.) along with the database and can work to an off-site server as well.  A bit more expensive, and it can be tricky to set up to ensure "pure" data stability, but this is VERY easy to maintain on a long-term basis (unlike DX) and can be used for very large data sets, as well.  Downside: DEL *.* commands or file corruption are replicated almost instantly, so this is not a stand-alone solution; can be more expensive.

5) Use SAN Snapshot solutions.  The NetAPP series of SANs has been also vetted to allow for proper snapshotting of the database.  You can easily put the database into ContOps mode, take a snapshot, and allow the SAN to replicate the snapshot copy to a secondary SAN.  I have some companies doing this every 15 minutes, and wanting to go even more frequently, which allows for great recovery potential, even from an off-site server.  Downside: Cost -- figure $300K as a starting budget, not including training and configuration.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

In today’s complex data management environments, it is not unusual for UNIX servers to be dedicated to a particular department, purpose, or database.  As a result, a SAS® data analyst often works with multiple servers, each with its own data storage…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now