Privileged Attack Vectors by Morey J. Haber

Privileged Attack Vectors by Morey J. Haber

Author:Morey J. Haber
Language: eng
Format: epub
ISBN: 9781484259146
Publisher: Apress


Active/Passive: Two installations are required for active/passive. The internal databases are replicated, and a missing heartbeat sent from the primary to the secondary installation indicates if it should take over operations.Advantages:Easy to set up.

All high availability is incorporated within the solution.

Disadvantages:An external load balancer is required for auto-switching users to the active appliance.

The failover process is not instantaneous and can take time to initiate.

Cold Spare versions can have databases that are out of sync or in a split-brain configuration if their age from initial backup is too large.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.