Disaster Recovery and Backup Solutions for IBM FileNet P8 Version 4.5.1 Systems
An IBM Redbooks publication
Published 16 June 2010, updated 13 April 2015
IBM Form #: SG24-7744-00
Rate and comment
Authors: Wei-Dong Zhu, Gary Allenbach, Ross Battaglia, Julie Boudreaux, David Harnick-Shapiro, Heajin Kim, Bob Kreuch, Tim Morgan, Sandip Patel, Martin Willingham
Many organizations require continuous operation of their mission-critical, IBM® FileNet P8® systems after a failure has occurred. Loss of system resources and services as a result of any failure can translate directly into lost customers and lost revenue. The goal, therefore, is to design and implement a FileNet P8 system that ensures continuous operation even after a failure happens.
This IBM Redbooks® publication focuses on FileNet P8 Version 4.5.1 systems disaster recovery. The book covers strategies, preparation levels, site sizing, data replication, testing, and what to do during a disaster. Backup and restore planning is a critical aspect of a disaster recovery strategy.
We discuss backup types and strategies. We also discuss alternative strategies such as rolling storage policies and IBM FlashCopy® capability.
With the help of use cases and our lab testing environment, the book provides guidelines for setting up a FileNet P8 production environment and a standby FileNet P8 disaster recovery system.
This book is intended for IT architects, IT specialists, project managers, and decision makers, who must identify the best disaster recovery strategies and integrate them into the FileNet P8 system design process.
Table of contents
Part 1. Concept and overview
Chapter 1. Introducing disaster recovery
Chapter 2. Introducing backup and restore
Chapter 3. FileNet P8 system architecture overview
Chapter 4. FileNet P8 data relationships and dependencies
Chapter 5. FileNet P8 data components to backup and replicate
Chapter 6. Alternative strategies for backup
Part 2. Implementation details
Chapter 7. Case study description and system setup
Chapter 8. Backup and restore setup and configuration
Chapter 9. Disaster recovery setup and configuration
Chapter 10. System testing and validation
Chapter 11. Working with IBM Information Archive
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks