SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Never a DULL Moment
 How to Avoid Costly Data Recovery


                              RMOUG QEW
                             November 2008
Who am I?
Daniel Fink
  Oracle DBA since 1996
  Diagnosis, Optimization, Data Recovery and
  Training
  Member of Oak Table, BAARF and BAAG

www.optimaldba.com
daniel.fink@optimaldba.com
Agenda
  DULs
  Recoveries
  Case Studies
      Worst Practices
      Best Practices

Some case studies provided by Kurt Van Meerbeeck (www.ora600.be)
Never a DULL Moment
DUL – Data UnLoader
  Extract data from a down database
Option of last resort
  Downtime
  Expensive
  May or May not work
Why do you need a DUL?
Seed
 Incorrect Configurations
 Poor Policies/Procedures
 Inflexible Processes
 Lack of Security
Trigger
 Human Error
 Technology Failure
Bullet Proof Backups
Simply don’t exist
  There will always be a point of failure
Keep it simple, but thorough
  Added complexity = Added risk
  Change management
Protect redo
  Once redo is lost, recovery stops
An Unrecovered Backup
Is No Backup At ALL!
Recovery is Job One
 “Contrary to common opinion, a DBA does not have a
 responsibility to back up a database. The DBA’s real
 responsibility is to be able to recover the database.”
            Essential Oracle8i Data Warehousing (Dodge/Gorman)
 “The actual responsibility is to restore or recover the
 database to the point in time and within the downtime window
 determined by the business needs.”
            Real Life Recovery (RMOUG Training Days 1999)
Audience Participation
Today
 Did you check your backup log?
This Week/Month
 Did you check the backup process?
 Did you recover a backup?
Ever
 Did you check your backup log?
 Did you recover a backup?
Best Core Practices
Find Recovery Opportunities
  Environment Refreshes
  Upgrade/Patch Testing
  Disaster Recovery Training
Every single case study presented would
have been avoided if they had tested
recovery
Best Core Practices
You have known, good processes
 This does not mean every backup is good
 Always test after any changes
You have documented the processes
 Help when thinking is not clear
Best Core Practices
Prevention
  Audits
  Implementation Checklists
Find Opportunities to Recover
  Refreshes
  DBA sandboxes
Case Studies
Situation
  Summary of the issue
Seed
  A condtion that is present
Trigger
  An event that causes the failure
Red Flag
  A “recognized” indication of a future
  problem
“Hot” Backups
Files were not being properly backed up
Seed
  DBA did not understand how files were managed
  Backup the files without putting them into backup
  mode
Trigger
  Media failure
Red Flag
  Lack of desire to learn
Best Practice
Basic Oracle, Backup and Recovery
knowledge
  Oracle Documentation
  DBA Training
Good backup process
No Backup
No backup for production
Seed
 Backups not set up
Trigger
 Media failure
Red Flag
 Production use of a database without
 backup
Best Practice
Backups are part of the implementation
check off/hand over
Test Recovery before implementation
A backup that may work
Backup set does not encapsulate full recovery
set
Seed
  Custom script does not include all commands within
  backup set
Trigger
  Fraud investigation
Red Flag
  Custom hot backup script command sequence
  incorrect
Best Practice
Custom scripts require complete
knowledge
  Full backup set
  Command sequence
Every backup set should be self-
contained
Can you backup your worst-case
recovery scenario?
Known Bad Backup
Archived redo logs were known to be corrupt
Seed
  Bug in Oracle caused corrupt archived redo logs
  Application owner “could not afford downtime to
  fix”
Trigger
  Rollback segment tablespace went offline
  Monitoring software failed
Red Flag
  Backups known to be unrecoverable
Best Practice
Be careful of complicated application
architectures
Have the political will to do the right
thing
Find an interim solution
User not in the Specs
User level export as only backup
Seed
  User added to database, but not script
Trigger
  Media failure
Red Flag
  Static scripts
  Development responsible for backups
Best Practice
If you are responsible for the database,
for recovery of the database…you are
responsible for the backup!
  Export can only restore a database, not
  perform full recovery
Audit
  schema owners v. users being backed up
You are…the weakest link
Improper tape management
Seed
 Unskilled, unmotivated operations personnel
Trigger
 Anything…
Red Flag
 Non-technical personnel in charge of tape
 management
Best Practice
If you are responsible for the database,
for recovery of the database…you are
responsible for the backup!
You have to trust those responsible for
operations
We can just Reload
Data warehouse recovery strategy was
to reload
Seed
 Database grew, but backup strategy did not
Trigger
 Current redo log corruption
Red Flag
 Backup strategy not revisited as database
 grew
Best Practice
Periodically revisit non-standard backup
strategies
Better yet…avoid non-standard backup
strategies
We don’t need no stinkin’
     SYSTEM tablespace
Default installation on local drive with
additional datafiles on external drives
Seed
  Single database has files on separate
  storage systems
Trigger
  Media Failure
Red Flag
  Never checking backup process
Best Practice
Properly plan and install databases
Verify that all needed parts of the
database are being backed up
  Without SYSTEM tablespace, you lose the
  ‘map’ to tables…and data
  Know what is and is not needed
Security
Table is dropped in production
Seed
  Improper security
  Invalid Backups
Trigger
  Wrong environment
  Wrong action
Red Flag
  Access to production
Best Practice
Appropriate Architecture and Policies
  Schema owner logins
  Non-database tier authentication
Security Audits
  Know who has what and why
  Balance safety v. security
It’s Hammer Time!
Disks failed and user level export was
incomplete
Seed
  Known bad hardware
  Exports not dynamic
Trigger
  Disk crash…finally
Red Flag
  A hammer attached to a storage device is rarely a
  good sign
Best Practice
DON’T USE A HAMMER!!!!!
Use dynamic scripting techniques
  Backups
  Exports
Validate scripting
SOX and Recoveries
7 years of data
Could you recover a 7 year old backup?
  2001 – Oracle 9i introduced
    Most systems 7.3 and 8.x
    Do you have a 7.3 install?
Do you have 7 year old
  Hardware?
  O/S and drivers?
How to avoid calling me…
Backups are part of any installation
  Test recovery before turning over to
  user/developer
  Document the process
  Understand the implications of changes
  Adapt the strategy to the system
Monitor backups on a daily basis
  Exception reporting is good, but not perfect
  Know what to do if a backup fails
The only good recovery is a successful
recovery
  Determine likely, unlikely and worst-case scenarios
  Look for opportunities to perform recoveries
  Understand the implications of changes
  Don’t uncover issues on production systems
Audit security
  Know who can access production and how
  Establish policies and procedures to minimize risk
Annual Reviews
Go Forth
  and
Recover!

Mais conteúdo relacionado

Mais procurados

Chaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field GuideChaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field Guidematthewbrahms
 
Chaos Engineering: Injecting Failure for Building Resilience in Systems
Chaos Engineering: Injecting Failure for Building Resilience in SystemsChaos Engineering: Injecting Failure for Building Resilience in Systems
Chaos Engineering: Injecting Failure for Building Resilience in SystemsYury Roa
 
Introduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingIntroduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingJohn Kingsley
 
Root cause analysis arg sc
Root cause analysis arg scRoot cause analysis arg sc
Root cause analysis arg scManish Chaurasia
 
Process plant troubleshooting
Process plant troubleshootingProcess plant troubleshooting
Process plant troubleshootingAnand Mishra
 
MESA 2016 Presentation - Mark Spinks - Remote Isolation
MESA 2016 Presentation - Mark Spinks - Remote IsolationMESA 2016 Presentation - Mark Spinks - Remote Isolation
MESA 2016 Presentation - Mark Spinks - Remote IsolationMark Spinks
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
 

Mais procurados (9)

Chaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field GuideChaos Engineering 101: A Field Guide
Chaos Engineering 101: A Field Guide
 
Chaos Engineering: Injecting Failure for Building Resilience in Systems
Chaos Engineering: Injecting Failure for Building Resilience in SystemsChaos Engineering: Injecting Failure for Building Resilience in Systems
Chaos Engineering: Injecting Failure for Building Resilience in Systems
 
Introduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingIntroduction to PSM Online Interactive Training
Introduction to PSM Online Interactive Training
 
Alarm Management_NKS
Alarm Management_NKSAlarm Management_NKS
Alarm Management_NKS
 
Root cause analysis arg sc
Root cause analysis arg scRoot cause analysis arg sc
Root cause analysis arg sc
 
Process plant troubleshooting
Process plant troubleshootingProcess plant troubleshooting
Process plant troubleshooting
 
MESA 2016 Presentation - Mark Spinks - Remote Isolation
MESA 2016 Presentation - Mark Spinks - Remote IsolationMESA 2016 Presentation - Mark Spinks - Remote Isolation
MESA 2016 Presentation - Mark Spinks - Remote Isolation
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 

Semelhante a Nevera Dul Moment

Best practices for running MySQL on production - Vaibhav Upadhyay
Best practices for running MySQL on production - Vaibhav UpadhyayBest practices for running MySQL on production - Vaibhav Upadhyay
Best practices for running MySQL on production - Vaibhav UpadhyayMydbops
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backupRita Crawford
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentationoracle documents
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
8 i rman_love_it
8 i rman_love_it8 i rman_love_it
8 i rman_love_itAnil Pandey
 
Metric Abuse: Frequently Misused Metrics in Oracle
Metric Abuse: Frequently Misused Metrics in OracleMetric Abuse: Frequently Misused Metrics in Oracle
Metric Abuse: Frequently Misused Metrics in OracleSteve Karam
 
5 Essential Techniques for Building Fault-tolerant Systems
5 Essential Techniques for Building Fault-tolerant Systems5 Essential Techniques for Building Fault-tolerant Systems
5 Essential Techniques for Building Fault-tolerant SystemsAtlassian
 
Data recovery report
Data recovery reportData recovery report
Data recovery reporttutannandi
 
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...TeamCain
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
7 Stages of Scaling Web Applications
7 Stages of Scaling Web Applications7 Stages of Scaling Web Applications
7 Stages of Scaling Web ApplicationsDavid Mitzenmacher
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014Kevin McDaniel
 
When the Back-Ups Fail: Recovery and Reinvention of Digital Collections
When the Back-Ups Fail: Recovery and Reinvention of Digital CollectionsWhen the Back-Ups Fail: Recovery and Reinvention of Digital Collections
When the Back-Ups Fail: Recovery and Reinvention of Digital CollectionsVisual Resources Association
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with SymantecArrow ECS UK
 

Semelhante a Nevera Dul Moment (20)

Best practices for running MySQL on production - Vaibhav Upadhyay
Best practices for running MySQL on production - Vaibhav UpadhyayBest practices for running MySQL on production - Vaibhav Upadhyay
Best practices for running MySQL on production - Vaibhav Upadhyay
 
Real liferecoverypaper
Real liferecoverypaperReal liferecoverypaper
Real liferecoverypaper
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Guide on Raid Data Recovery
Guide on Raid Data RecoveryGuide on Raid Data Recovery
Guide on Raid Data Recovery
 
Real liferecoverypresentation
Real liferecoverypresentationReal liferecoverypresentation
Real liferecoverypresentation
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
8 i rman_love_it
8 i rman_love_it8 i rman_love_it
8 i rman_love_it
 
Metric Abuse: Frequently Misused Metrics in Oracle
Metric Abuse: Frequently Misused Metrics in OracleMetric Abuse: Frequently Misused Metrics in Oracle
Metric Abuse: Frequently Misused Metrics in Oracle
 
5 Essential Techniques for Building Fault-tolerant Systems
5 Essential Techniques for Building Fault-tolerant Systems5 Essential Techniques for Building Fault-tolerant Systems
5 Essential Techniques for Building Fault-tolerant Systems
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
 
DBA Best Practices.ppt
DBA Best Practices.pptDBA Best Practices.ppt
DBA Best Practices.ppt
 
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...
WCRUG 2013 - Procurity Keep Their JDE "On the Go" with Clean Data and Improve...
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
7 Stages of Scaling Web Applications
7 Stages of Scaling Web Applications7 Stages of Scaling Web Applications
7 Stages of Scaling Web Applications
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
 
When the Back-Ups Fail: Recovery and Reinvention of Digital Collections
When the Back-Ups Fail: Recovery and Reinvention of Digital CollectionsWhen the Back-Ups Fail: Recovery and Reinvention of Digital Collections
When the Back-Ups Fail: Recovery and Reinvention of Digital Collections
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Nevera Dul Moment

  • 1. Never a DULL Moment How to Avoid Costly Data Recovery RMOUG QEW November 2008
  • 2. Who am I? Daniel Fink Oracle DBA since 1996 Diagnosis, Optimization, Data Recovery and Training Member of Oak Table, BAARF and BAAG www.optimaldba.com daniel.fink@optimaldba.com
  • 3. Agenda DULs Recoveries Case Studies Worst Practices Best Practices Some case studies provided by Kurt Van Meerbeeck (www.ora600.be)
  • 4. Never a DULL Moment DUL – Data UnLoader Extract data from a down database Option of last resort Downtime Expensive May or May not work
  • 5. Why do you need a DUL? Seed Incorrect Configurations Poor Policies/Procedures Inflexible Processes Lack of Security Trigger Human Error Technology Failure
  • 6. Bullet Proof Backups Simply don’t exist There will always be a point of failure Keep it simple, but thorough Added complexity = Added risk Change management Protect redo Once redo is lost, recovery stops
  • 7. An Unrecovered Backup Is No Backup At ALL! Recovery is Job One “Contrary to common opinion, a DBA does not have a responsibility to back up a database. The DBA’s real responsibility is to be able to recover the database.” Essential Oracle8i Data Warehousing (Dodge/Gorman) “The actual responsibility is to restore or recover the database to the point in time and within the downtime window determined by the business needs.” Real Life Recovery (RMOUG Training Days 1999)
  • 8. Audience Participation Today Did you check your backup log? This Week/Month Did you check the backup process? Did you recover a backup? Ever Did you check your backup log? Did you recover a backup?
  • 9. Best Core Practices Find Recovery Opportunities Environment Refreshes Upgrade/Patch Testing Disaster Recovery Training Every single case study presented would have been avoided if they had tested recovery
  • 10. Best Core Practices You have known, good processes This does not mean every backup is good Always test after any changes You have documented the processes Help when thinking is not clear
  • 11. Best Core Practices Prevention Audits Implementation Checklists Find Opportunities to Recover Refreshes DBA sandboxes
  • 12. Case Studies Situation Summary of the issue Seed A condtion that is present Trigger An event that causes the failure Red Flag A “recognized” indication of a future problem
  • 13. “Hot” Backups Files were not being properly backed up Seed DBA did not understand how files were managed Backup the files without putting them into backup mode Trigger Media failure Red Flag Lack of desire to learn
  • 14. Best Practice Basic Oracle, Backup and Recovery knowledge Oracle Documentation DBA Training Good backup process
  • 15. No Backup No backup for production Seed Backups not set up Trigger Media failure Red Flag Production use of a database without backup
  • 16. Best Practice Backups are part of the implementation check off/hand over Test Recovery before implementation
  • 17. A backup that may work Backup set does not encapsulate full recovery set Seed Custom script does not include all commands within backup set Trigger Fraud investigation Red Flag Custom hot backup script command sequence incorrect
  • 18. Best Practice Custom scripts require complete knowledge Full backup set Command sequence Every backup set should be self- contained Can you backup your worst-case recovery scenario?
  • 19. Known Bad Backup Archived redo logs were known to be corrupt Seed Bug in Oracle caused corrupt archived redo logs Application owner “could not afford downtime to fix” Trigger Rollback segment tablespace went offline Monitoring software failed Red Flag Backups known to be unrecoverable
  • 20. Best Practice Be careful of complicated application architectures Have the political will to do the right thing Find an interim solution
  • 21. User not in the Specs User level export as only backup Seed User added to database, but not script Trigger Media failure Red Flag Static scripts Development responsible for backups
  • 22. Best Practice If you are responsible for the database, for recovery of the database…you are responsible for the backup! Export can only restore a database, not perform full recovery Audit schema owners v. users being backed up
  • 23. You are…the weakest link Improper tape management Seed Unskilled, unmotivated operations personnel Trigger Anything… Red Flag Non-technical personnel in charge of tape management
  • 24. Best Practice If you are responsible for the database, for recovery of the database…you are responsible for the backup! You have to trust those responsible for operations
  • 25. We can just Reload Data warehouse recovery strategy was to reload Seed Database grew, but backup strategy did not Trigger Current redo log corruption Red Flag Backup strategy not revisited as database grew
  • 26. Best Practice Periodically revisit non-standard backup strategies Better yet…avoid non-standard backup strategies
  • 27. We don’t need no stinkin’ SYSTEM tablespace Default installation on local drive with additional datafiles on external drives Seed Single database has files on separate storage systems Trigger Media Failure Red Flag Never checking backup process
  • 28. Best Practice Properly plan and install databases Verify that all needed parts of the database are being backed up Without SYSTEM tablespace, you lose the ‘map’ to tables…and data Know what is and is not needed
  • 29. Security Table is dropped in production Seed Improper security Invalid Backups Trigger Wrong environment Wrong action Red Flag Access to production
  • 30. Best Practice Appropriate Architecture and Policies Schema owner logins Non-database tier authentication Security Audits Know who has what and why Balance safety v. security
  • 31. It’s Hammer Time! Disks failed and user level export was incomplete Seed Known bad hardware Exports not dynamic Trigger Disk crash…finally Red Flag A hammer attached to a storage device is rarely a good sign
  • 32. Best Practice DON’T USE A HAMMER!!!!! Use dynamic scripting techniques Backups Exports Validate scripting
  • 33. SOX and Recoveries 7 years of data Could you recover a 7 year old backup? 2001 – Oracle 9i introduced Most systems 7.3 and 8.x Do you have a 7.3 install? Do you have 7 year old Hardware? O/S and drivers?
  • 34. How to avoid calling me… Backups are part of any installation Test recovery before turning over to user/developer Document the process Understand the implications of changes Adapt the strategy to the system Monitor backups on a daily basis Exception reporting is good, but not perfect Know what to do if a backup fails
  • 35. The only good recovery is a successful recovery Determine likely, unlikely and worst-case scenarios Look for opportunities to perform recoveries Understand the implications of changes Don’t uncover issues on production systems
  • 36. Audit security Know who can access production and how Establish policies and procedures to minimize risk Annual Reviews
  • 37. Go Forth and Recover!