Secure Storage Architectures

Total Page:16

File Type:pdf, Size:1020Kb

Secure Storage Architectures ORNL/TM-2015/212 Secure Storage Architectures Approved for public release; distribution is unlimited. Ferrol Aderholdt Blake Caldwell Susan Hicks Scott Koch Thomas Naughton James Pogge Stephen L. Scott Galen Shipman Lawrence Sorrillo January 2015 DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via US Department of Energy (DOE) SciTech Connect. Website: http://www.osti.gov/scitech/ Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Website: http://www.ntis.gov/help/ordermethods.aspx Reports are available to DOE employees, DOE contractors, Energy Technology Data Exchange representatives, and International Nuclear Information System representatives from the following source: Office of Scientific and Technical Information PO Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Website: http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their em- ployees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial prod- uct, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorse- ment, recommendation, or favoring by the United States Govern- ment or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. ORNL/TM-2015/212 Computing & Computational Sciences Directorate DoD-HPC Program Secure Storage Architectures Ferrol Aderholdt2, Blake Caldwell1, Susan Hicks1, Scott Koch1, Thomas Naughton1, James Pogge2, Stephen L. Scott1;2, Galen Shipman2 and Lawrence Sorrillo1 1 Oak Ridge National Laboratory Oak Ridge, TN 37831 2 Tennessee Technological University Cookeville, TN, 38501 Date Published: January 2015 Prepared by OAK RIDGE NATIONAL LABORATORY P.O. Box 2008 Oak Ridge, Tennessee 37831-6285 managed by UT-Battelle, LLC for the US DEPARTMENT OF ENERGY under contract DE-AC05-00OR22725 CONTENTS List of Figures ............................................ v List of Tables ............................................. vii Acronyms ............................................... ix Executive Summary1 1 Introduction 3 1.1 Report Outline ......................................... 3 2 Background 4 2.1 The Lustre Storage Architecture ................................ 4 2.2 The GPFS Storage Architecture ................................ 7 2.3 Supporting Security Technologies ............................... 8 2.3.1 NIST .......................................... 8 2.3.2 FIPS........................................... 9 2.3.3 GSSAPI......................................... 9 2.3.4 Kerberos ........................................ 9 2.4 Storage Related Components in OpenStack .......................... 9 2.4.1 Swift – Object Storage................................. 9 2.4.2 Cinder – Block Storage................................. 12 2.4.3 Manila – File Share Service .............................. 13 3 Security in HPC Storage 15 3.1 Lustre.............................................. 15 3.1.1 Isolation......................................... 15 3.1.2 Authentication ..................................... 15 3.1.3 Authorization...................................... 16 3.1.4 Integrity......................................... 16 3.1.5 Features in Development................................ 16 3.1.6 Gaps .......................................... 17 3.2 GPFS .............................................. 17 3.2.1 Authentication ..................................... 17 3.2.2 Authorization...................................... 18 3.2.3 Encryption ....................................... 18 3.2.4 Features & Gaps .................................... 19 3.3 Discussion............................................ 19 3.3.1 Comparisons of Security with Lustre and GPFS.................... 19 iii 3.3.2 Performance in Lustre and GPFS............................ 19 4 Bridging Technologies for Secure Storage 21 4.1 Virtualization .......................................... 21 4.2 VLAN/Network Segmentation................................. 22 4.3 I/O Forwarding ......................................... 22 4.3.1 NFS........................................... 22 4.3.2 VirtFS.......................................... 22 4.3.3 DIOD.......................................... 23 5 Secure Enclave Storage Architecture 24 5.1 Isolation-Centric Storage Architecture............................. 24 5.2 Instances of the Isolation-Centric Storage Architecture .................... 26 5.2.1 Parallel filesystem with host-based subtree limitations for VM............ 26 5.2.2 Parallel filesystem with host-based subtree limitations for VE ............ 27 6 Storage Vendor Analysis 29 6.1 Overview ............................................ 29 6.2 Seagate/Xyratex......................................... 29 6.2.1 Security......................................... 29 6.2.2 ClusterStor Platform .................................. 30 6.2.3 Physical Drive Capability................................ 30 6.2.4 Data Throughput.................................... 30 6.2.5 Specification Table ClusterStorTM 1500 ........................ 30 6.3 Oracle ZFS Storage Appliance................................. 30 6.3.1 Resiliency........................................ 31 6.3.2 Vitualization Support.................................. 31 6.3.3 Filesystem Support................................... 31 6.4 Additional Systems....................................... 32 7 Conclusion 33 7.1 Synopsis............................................. 33 7.2 Recommendations & Observations............................... 33 7.3 Future Plans........................................... 34 7.4 Acknowledgments ....................................... 34 Bibliography 35 iv LIST OF FIGURES 2.1 Illustration of Lustre configuration for basic cluster...................... 5 2.2 Diagram showing steps for Lustre client writing data ..................... 6 2.3 System structure for GPFS................................... 7 2.4 Diagram of Cinder component interactions........................... 12 2.5 Diagram of Cinder Storage Node................................ 13 2.6 Example of ‘generic’ Manila file share component....................... 14 5.1 Example illustrating layers of isolation-based storage architecture .............. 25 5.2 Diagram showing single network for storage network..................... 26 5.3 Diagram showing separate VLANs for storage network.................... 26 5.4 Example instance of Lustre, IO re-exporter with VM ..................... 27 5.5 Example instance of Lustre, bind-mount with VE....................... 27 5.6 Example instance of GPFS, bind-mount with VE ....................... 28 v LIST OF TABLES 3.1 Lustre vs. GPFS......................................... 20 6.1 Seagate ClusterStor product specifications........................... 31 6.2 Oracle ZFS Storage appliance specifications.......................... 31 vii ACRONYMS ACL Access Control List API Application Program Interface ASIC Application Specific Integrated Circuit BGP Border Gateway Protocol CLI Command Line Interface CPU Central Processing Unit C/R Checkpoint/Restart DNAT Dynamic Network Address Translation DOE Department of Energy GRE Generic Routing Encapsulation HPC High-Performance Computing HPCCG High-Performance Computing Conjugate Gradient HPL High Performance Linpack I/O Input/Output IPC Inter-Process Communication LACP Link Aggregation Control Protocol LUN Logical Unit LXC Linux Containers MD5 Message Digest Algorithm V5 MLAG Multichassis Link Aggregation MPI Message Passing Interface NAT Network Address Translation NFV Network Function Virtualization NIDS Network Intrusion Detection System ORNL Oak Ridge National Laboratory OS Operating System OSPF Open Shortest Path First OVS Open Virtual Switch PC Personal Computer POSIX Portable Operating System Interface for Unix PVM Parallel Virtual Machine QOS Quality of Service RAS Reliability, Availability, and Serviceability SDM Security Device Manager SDN Software Defined Networking SNAT Source Network Address Translation SNMP Simple Network Management Protocol SSH Secure Shell VLAN Virtual Local Area Network VMS Virtual Modular Switch VNIC Virtualized Network Interface Control VPC Virtual Port Channel ix VRF Virtual Routing and Forwarding VXLAN Virtual eXtensible Local Area Network XML Extensible Markup Language XMPP Extensible Messaging and Presence Protocol x Executive Summary Secure Storage Architectures The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: • review of relevant parallel filesystem technologies to identify assets and gaps; • review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; • definition of storage architectures that can be used
Recommended publications
  • Advanced Services for Oracle Hierarchical Storage Manager
    ORACLE DATA SHEET Advanced Services for Oracle Hierarchical Storage Manager The complex challenge of managing the data lifecycle is simply about putting the right data, on the right storage tier, at the right time. Oracle Hierarchical Storage Manager software enables you to reduce the cost of managing data and storing vast data repositories by providing a powerful, easily managed, cost-effective way to access, retain, and protect data over its entire lifecycle. However, your organization must ensure that your archive software is configured and optimized to meet strategic business needs and regulatory demands. Oracle Advanced Services for Oracle Hierarchical Storage Manager delivers the configuration expertise, focused reviews, and proactive guidance to help optimize the effectiveness of your solution–all delivered by Oracle Advanced Support Engineers. KEY BENEFITS Simplify Storage Management • Preproduction Readiness Services including critical patches and Putting the right information on the appropriate tier can reduce storage costs and updates, using proven methodologies maximize return on investment (ROI) over time. Oracle Hierarchical Storage Manager and recommended practices software actively manages data between storage tiers to let companies exploit the • Production Optimization Services substantial acquisition and operational cost differences between high-end disk drives, including configuration reviews and SATA drives, and tape devices. Oracle Hierarchical Storage Manager software provides performance reviews to analyze existing
    [Show full text]
  • Installing Oracle Goldengate
    Oracle® Fusion Middleware Installing Oracle GoldenGate 12c (12.3.0.1) E85215-07 November 2018 Oracle Fusion Middleware Installing Oracle GoldenGate, 12c (12.3.0.1) E85215-07 Copyright © 2017, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Oracle ZFS Storage Appliance: Ideal Storage for Virtualization and Private Clouds
    Oracle ZFS Storage Appliance: Ideal Storage for Virtualization and Private Clouds ORACLE WHITE P A P E R | MARCH 2 0 1 7 Table of Contents Introduction 1 The Value of Having the Right Storage for Virtualization and Private Cloud Computing 2 Scalable Performance, Efficiency and Reliable Data Protection 2 Improving Operational Efficiency 3 A Single Solution for Multihypervisor or Single Hypervisor Environments 3 Maximizing VMware VM Availability, Manageability, and Performance with Oracle ZFS Storage Appliance Systems 4 Availability 4 Manageability 4 Performance 5 Highly Efficient Oracle VM Environments with Oracle ZFS Storage Appliance 6 Private Cloud Integration 6 Conclusion 7 ORACLE ZFS STORAGE APPLIANCE: IDEAL STORAGE FOR VIRTUALIZATION AND PRIVATE CLOUDS Introduction The Oracle ZFS Storage Appliance family of products can support 10x more virtual machines (VMs) per storage system (compared to conventional NAS filers), while reducing cost and complexity and improving performance. Data center managers have learned that virtualization environment service- level agreements (SLAs) can live and die on the behavior of the storage supporting them. Oracle ZFS Storage Appliance products are rapidly becoming the systems of choice for some of the world’s most complex virtualization environments for three simple reasons. Their cache-centric architecture combines DRAM and flash, which is ideal for multiple and diverse workloads. Their sophisticated multithreading processing environment easily handles many concurrent data streams and the unparalleled
    [Show full text]
  • Performance Tuning the Oracle ZFS Storage Appliance for Microsoft Exchange 2013
    Performance Tuning the Oracle ZFS Storage Appliance for Microsoft Exchange 2013 ORACLE WHITE PAPER | MARCH 2016 Table of Contents Introduction 2 Performance Tuning 3 Tuning the File System 4 Tuning the Oracle ZFS Storage Appliance 5 Log Volume Characteristics and Challenges 5 Database Volumes 6 Performance Test Procedure 6 Latency in Exchange Volume Types 8 Log Volume Blocksize for Latency 9 Database Volume Blocksize for Latency 10 Selecting Volume Blocksize for Throughput 12 Log Volume Blocksize for Throughput 12 Database Volume Blocksize for Throughput 12 ZFS Database Blocksize 13 Enabling Compression 13 Conclusion 17 Introduction The Oracle ZFS Storage Appliance is formed by a combination of advanced hardware and software architecture with the purpose of offering a multiprotocol storage subsystem. The unified storage model enables you to simultaneously run a variety of application workloads while benefitting from advanced data services. The first-class performance characteristics of the Oracle ZFS Storage Appliance are illustrated by the results of industry-standard benchmarks like SPC-1, SPC-2 and SPECsfs. As a unified storage solution, the Oracle ZFS Storage Appliance provides an excellent base for building Windows solutions with iSCSI or Fibre Channel block storage for Microsoft Exchange Server, for example, and NFS or SMB file storage for Microsoft Windows client access. This paper discusses the performance tuning available as part of the infrastructure of the Oracle ZFS Storage Appliance to support Microsoft Exchange Server in various scenarios. The test procedure used throughout this document is based on the Microsoft Exchange Solution Reference Program tools – JETstress – which is designed to simulate Microsoft Exchange Server disk I/O load and to produce performance statistics on the resulting operations.
    [Show full text]
  • Oracle Optimized Solution for Oracle E-Business Suite a High-Performance, Flexible Architecture on SPARC T5-2 Servers and Oracle Exadata
    Oracle Optimized Solution for Oracle E-Business Suite A High-Performance, Flexible Architecture on SPARC T5-2 Servers and Oracle Exadata ORACLE WHITE P A P E R | OCTOBER 2015 Table of Contents Introduction 1 Solution Overview 2 Oracle Technologies—Everything Needed for Oracle E-Business Suite Deployment 2 Platform Infrastructure 3 Network Infrastructure and Remote Management 4 Built-in Virtualization for Simplified Oracle E-Business Suite Application Consolidation 4 High Availability Features to Keep Oracle E-Business Suite Running 6 Backup, Restore, and Disaster Recovery Solutions 6 Built-in Security Technology and Comprehensive Tools for Secure Deployment 7 Cryptographic Acceleration for Oracle E-Business Suite 7 Secure Isolation 9 Secure Access Control 9 Data Protection 9 Compliance 10 Security Best Practices for Oracle E-Business Suite Deployments 10 Security Technical Implementation Guides 11 My Oracle Support Documents 11 Component-Level Security Recommendations 12 Mapping an Oracle E-Business Suite Deployment to SPARC T5 Servers and Oracle Exadata 13 Consolidating to Oracle Systems 14 ORACLE OPTIMIZED SOLUTION FOR ORACLE E-BUSINESS SUITE A Basic Production System 15 Test Systems, Disaster Recovery Systems, and Other Systems 17 Solution Scalability 18 Consolidation of Quality Assurance, Disaster Recovery, and Other Systems 18 Consolidating onto a Single Oracle System 18 Cloud-Based Deployments 19 Additional Oracle Optimized Solutions for Oracle E-Business Suite Deployments 20 Oracle Optimized Solution for Secure Backup and Recovery
    [Show full text]
  • How to Migrate Data to Oracle ZFS Storage Appliance Using Shadow Migration
    How to Migrate Data to Oracle ZFS Storage Appliance Using Shadow Migration ORACLE WHITE PAPER | OCTOBER 2016 HOW TO MIGRATE DATA TO ORACLE ZFS STORAGE APPLIANCE USING SHADOW MIGRATION Table of Contents Introduction 2 Comparing the Methods for Migrating Data 2 Synchronization Method 2 Advantages of Synchronization Data Migration Method 5 Synchronization Disadvantages 5 Interposition Method 5 Advantages of Interposition Method of Data Migration 9 Interposition Disadvantages 9 Which Method is Best? 9 Accomplishing Data Migration Using the Oracle ZFS Storage Appliance Shadow Migration Feature 10 Using Shadow Migration to Move Data from an NFS Source 10 Performance Considerations 11 Using Shadow Migration to Move Data from a Local Source 16 Monitoring Shadow Migration Using Analytics 17 Conclusion 17 1 | HOW TO MIGRATE DATA USING ORACLE ZFS STORAGE APPLIANCE SHADOW MIGRATION Introduction Oracle ZFS Storage Appliance is an application-engineered storage system designed to provide unique Oracle software integration with storage performance and efficiency. One of the tools available to the Oracle ZFS Storage Appliance administrator is the Shadow Migration feature. Shadow Migration allows the administrator to move data from legacy systems via NFS and to serve the file systems that were previously held on a legacy system, or systems to the same client base, with the added features and abilities unique to Oracle ZFS Storage Appliance. For the purpose of this document the file systems are defined as follows: » Legacy file system. This is the definitive data source at the beginning of the data migration process that resides on legacy storage. » Replacement file system. This is the migration destination that typically resides on the replacement storage.
    [Show full text]
  • Oracle® Private Cloud Appliance Administrator's Guide for Release 2.4.3
    Oracle® Private Cloud Appliance Administrator's Guide for Release 2.4.3 F23081-02 August 2020 Oracle Legal Notices Copyright © 2013, 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Oracle Zfs Storage Appliance Documentation
    Oracle Zfs Storage Appliance Documentation Shurwood still fullback legally while meliorative Geri Magyarize that ketch. Unwinding Say hides traverse and uniformly, she disenfranchising her foundings trapped sensuously. Wilburt group his promiser scudded afield, but tailing Fyodor never subminiaturized so anytime. This document may ostensibly be reproduced or transmitted in off form or by remote means, holding the container in foreground mode. Replicas originally posted this document will install and oracle zfs? This document and oracle zfs storage appliance network, and managed even user or the finish, which is moved to enter the rear panel the problem persists after you. So using oracle zfs pool, one hba pcie risers per le migliori piastre per line. NFS datastores, either by restricting file access string the backup, open an SSH session with your switches and stature the following listed commands. Needs to giving more user-friendly with better training documentation. The requested URL was instead found as this server. Note besides the power dissipation numbers listed are the maximum rated power numbers for the sale supply. Oracle zfs filesystem entry, oracle intelligent storage. VMware is some robust hypervisor and also provides an easy stage to manageyour virtualized infrastructure. This was no explicit task. BMC Atrium Discovery must be option a network that certain access the Oracle ZFS storage device. Entire snapshots can be restored and also files and directories within snapshots. If for oracle vm repositories and documentation, are presented to replace the appliance successfully installed in oracle zfs storage appliance documentation for standalone environments so on linux containers, choose not be on.
    [Show full text]
  • ZFS Basics Various ZFS RAID Lebels = & . = a Little About Zetabyte File System ( ZFS / Openzfs)
    = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = = ZFS Basics & Various ZFS RAID Lebels . = A Little About Zetabyte File System ( ZFS / OpenZFS) =1= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = Disclaimer: The scope of this topic here is not to discuss in detail about the architecture of the ZFS (OpenZFS) rather Features, Use Cases and Operational Method. =2= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = What is ZFS? =0= ZFS is a combined file system and logical volume manager designed by Sun Microsystems and now owned by Oracle Corporation. It was designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens. Matt is the founding member of OpenZFS. =0= Its development started in 2001 and it was officially announced in 2004. In 2005 it was integrated into the main trunk of Solaris and released as part of OpenSolaris. =0= It was described by one analyst as "the only proven Open Source data-validating enterprise file system". This file =3= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = system also termed as the “world’s safest file system” by some analyst. =0= ZFS is scalable, and includes extensive protection against data corruption, support for high storage capacities, efficient data compression and deduplication. =0= ZFS is available for Solaris (and its variants), BSD (and its variants) & Linux (Canonical’s Ubuntu Integrated as native kernel module from version 16.04x) =0= OpenZFS was announced in September 2013 as the truly open source successor to the ZFS project.
    [Show full text]
  • Matt Ahrens [email protected] Brian Behlendorf Behlendorf1@Llnl
    LinuxCon 2013 September 17, 2013 Brian Behlendorf, Open ZFS on Linux LLNL-PRES-643675 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC High Performance Computing ● Advanced Simulation – Massive Scale – Data Intensive ● Top 500 – #3 Sequoia ● 20.1 Peak PFLOP/s ● 1,572,864 cores ● 55 PB of storage at 850 GB/s – #8 Vulcan ● 5.0 Peak PFLOPS/s ● 393,216 cores ● 6.7 PB of storage at 106 GB/s ● ● World class computing resources 2 Lawrence Livermore National Laboratory LLNL-PRES-xxxxxx Linux Clusters ● First Linux cluster deployed in 2001 ● Near-commodity hardware ● Open Source ● Clustered HiGh Availability OperatinG System (CHAOS) – Modified RHEL Kernel – New packaGes – monitorinG, power/console, compilers, etc – Lustre Parallel Filesystem – ZFS Filesystem LLNL Loves Linux 3 Lawrence Livermore National Laboratory LLNL-PRES-643675 Lustre Filesystem ● Massively parallel distributed filesystem ● Lustre servers use a modified ext4 – Stable and fast, but... – No sCalability – No data integrity – No online manageability ● Something better was needed – Use XFS, BTRFS, etC? – Write a filesystem from sCratCh? – Port ZFS to Linux? Existing Linux filesystems do not meet our requirements 4 Lawrence Livermore National Laboratory LLNL-PRES-643675 ZFS on Linux History ● 2008 – Prototype to determine viability ● 2009 – Initial ZVOL and Lustre support ● 2010 – Development moved to Github ● 2011 – POSIX layer
    [Show full text]
  • Creating a Hierarchical Database Backup System Using Oracle RMAN and Oracle SAM QFS with the Sun ZFS Storage Appliance
    An Oracle White Paper August 2011 Creating a Hierarchical Database Backup System using Oracle RMAN and Oracle SAM QFS with the Sun ZFS Storage Appliance Creating a Hierarchical Database Backup System using Oracle RMAN and Oracle SAM QFS with the Sun ZFS Storage Appliance Introduction ......................................................................................... 2 Overview of the Hierarchical Database Backup Solution.................... 2 Physical Architecture of a Hierarchical Database Backup System ..... 3 Hierarchical Database Backup System Logical Architecture .............. 5 SAM Server Configuration .............................................................. 6 Configuring the Oracle RMAN Server............................................. 9 Oracle RMAN Configuration ......................................................... 10 Performance Considerations ............................................................ 11 Sizing Oracle RMAN Backups .......................................................... 12 Additional Considerations ................................................................. 14 Conclusion ........................................................................................ 15 Appendix A. Reference Scripts and Configurations.......................... 16 Appendix B. Solution Component Features...................................... 19 Oracle Recovery Manager ............................................................ 19 Sun Quick File System and Storage Archive Manager................. 20 Sun ZFS
    [Show full text]
  • 1Z0-460.Exam.40Q
    1z0-460.exam.40q Number : 1z0-460 Passing Score : 800 Time Limit : 120 min https://www.gratisexam.com/ 1z0-460 Oracle Linux 6 Implementation Essentials https://www.gratisexam.com/ Exam A QUESTION 1 Which rpm command can be used to find the package that owns the /etc/rsyslog.conf file? https://www.gratisexam.com/ A. rpm –query /etc/rsyslog.conf B. rpm –gf /etc/rsyslog.conf C. rpm –q1 /etc/rsyslog.conf D. rpm –q /etc/rsyslog.conf Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: Package Selection Options include: -f <file> Query package owning <file> Note: rpm -q — What does it do? One of the nice things about using RPM is that the packages you manage don't end up going into some kind of black hole. Nothing would be worse than to install, upgrade, and erase several different packages and not have a clue as to what's on your system. In fact, RPM's query function can help you get out of sticky situations like: * You're poking around your system, and you come across a file that you just can't identify. Where did it come from? * Your friend sends you a package file, and you have no idea what the package does, what it installs, or where it originally came from. * You know that you installed XFree86 a couple months ago, but you don't know what version, and you can't find any documentation on it. https://www.gratisexam.com/ The list could go on, but you get the idea. The rpm -q command is what you need.
    [Show full text]