Contents
1 INTRODUCTION ................................................................................................................................................................4
1.1 P
URPOSE
...........................................................................................................................................................................4
1.2 B
ACKGROUND
..................................................................................................................................................................4
1.3 S
COPE
& A
PPLICATION
....................................................................................................................................................4
1.4 R
ELATED
D
OCUMENTS
.....................................................................................................................................................5
1.5 A
SSUMPTIONS
...................................................................................................................................................................5
2 ARCHITECTURE AND CONCEPTS ...............................................................................................................................6
2.1 G
LOSSARY
.........................................................................................................................................................................6
2.2 RAC A
RCHITECTURE
.......................................................................................................................................................6
2.3 D
ATA
G
UARD
A
RCHITECTURE
.........................................................................................................................................6
2.4 N
ETWORK
.........................................................................................................................................................................7
2.5 D
ATA
G
UARD
A
RCHITECTURE
.........................................................................................................................................8
2.5.1 Log Transport Services.................................................................................................................................................8
2.5.2 Log Apply Services.......................................................................................................................................................8
2.5.3 Data Guard Broker........................................................................................................................................................9
2.6 H
OW IT
W
ORKS
................................................................................................................................................................9
2.6.1 Archived Log Shipping................................................................................................................................................9
2.6.2 Standby Redo logs ........................................................................................................................................................9
2.7 L
EVELS OF
P
ROTECTION
.................................................................................................................................................10
2.7.1 Maximum Protection..................................................................................................................................................10
2.7.2 Maximum Availability...............................................................................................................................................10
2.7.3 Maximum Performance .............................................................................................................................................10
2.7.4 Pros and Cons..............................................................................................................................................................10
3 PREREQUISITES................................................................................................................................................................ 11
3.1 H
ARDWARE
....................................................................................................................................................................11
3.2 N
ETWORK
.......................................................................................................................................................................11
3.3 S
OFTWARE
......................................................................................................................................................................11
3.4 R
EAL
A
PPLICATION
C
LUSTERS
......................................................................................................................................11
3.4.1 ASM ..............................................................................................................................................................................11
3.4.2 Raw Devices ................................................................................................................................................................11
4 CREATING A DATA GUARD ENVIRONMENT.......................................................................................................13
4.1 A
SSUMPTIONS
.................................................................................................................................................................13
4.2 P
ROCEDURE
- S
UMMARY
................................................................................................................................................13
4.3 C
REATING THE
RAC S
TANDBY
D
ATABASE
...................................................................................................................14
4.3.1 Configure Primary and Standby sites......................................................................................................................14
4.3.2 Install Oracle Software on each site..........................................................................................................................14
4.3.3 Server Names / VIPs..................................................................................................................................................14
4.3.4 Configure Oracle Networking ..................................................................................................................................15
4.3.5 Configure ASM on each Site .....................................................................................................................................17
2
评论