Tag: geographic

Miguel Cuevas Department

The company, every day have more consideration to contingency solutions that might allow the recovery of a server which fails. The automatic geographic cluster, is one solution integrates with remote hardware copy cluster environment so that the disaster failover process is fully automatic. In this case, would be a solution designed for a high service criticality would require the implementation of an extended SAN network, as well as the third copies mechanisms necessary for the restoration of data logical disaster in tending to zero times. The cluster will be distributed between a main centre and another alternative, with a node access to each storage system. A node accesses the main disks and the other has the possibility of accessing the remote copy. Disaster remote disks on the second node of the cluster are prepared automatically during the failover process and from this service is lifted.

Since the process is automatic and does not require manual intervention, the switching time is quite small, about 5 or 10 minutes depending on the applications that are running. With this solution and in a situation of total loss of communications between the two centres there is the risk of Split Brain, i.e. that both cluster nodes continue to operate independently and the information is corrupted. To avoid this possibility, consider leaving the failover in manual mode where all communications, servers and storage systems are lost. Via this solution is achieved be tolerant physical disaster, those applications that have data, with close to zero response thresholds. Disaster logical, remote copy unusable, since as this type synchronous, all changes are replicated to the remote Center, including the corruptions of databases or deletion of information. These one of the different alternatives of the numerous recovery strategies. From Audea want to remind you that the best way to prevent a penalty or damage to our information systems, is to comply with all technical and legal requirements of the security of the information.