Implementing Data Guard

  • Martin Bach


You were introduced to Data Guard terms and technology in depth in the previous chapter. Now it is time to put theory into practice. A Data Guard implementation always starts with the duplication of the primary database. This is easiest done using Recovery Manger, RMAN. The high-level steps are as follows:


File System Configuration Status Parameter File Active Database Media Recovery 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Martin Bach 2013

Authors and Affiliations

  • Martin Bach
    • 1
  1. 1.East SussexUK

Personalised recommendations