Note: For more information on the available facilities, refer to the IBM i (AS/400) CL Programmers Guide.
All approaches to securing data represent a compromise. The perfectly secure system would spend all of its time backing up, and no time doing anything. The final decision as to how much data a system can afford to lose is a question of judgment and cost effectiveness.
In discussing backup and recovery, it is useful to distinguish between two different types of computer failure:
Different recovery strategies are appropriate to each type of failure:
|
Type |
Cause |
Frequency |
Protection Measure |
|
OBJECT LOSS |
Human error or program error |
Often |
On-line backup journaling |
|
SYSTEM LOSS |
Hardware failure, power cut |
Seldom |
Off-line backup |
|
SITE LOSS |
Act of God,: flood, fire, earthquake, etc. |
Rare |
Off-site backup |
In planning for the above, you should take into account both the relative probabilities and the cost of failure ("Risk = Probability x Cost of failure"), and choose a cost-effective plan. This means understanding what is the largest acceptable unit of loss: is it one day, one hour, or one transaction?
The speed of recovery required will also be relevant—for a really speedy recovery you should journal access paths as well as data.
|
Copyright © 2014 CA.
All rights reserved.
|
|