K2 blackpearl Product Documentation: Installation and Configuration Guide
Disaster Recovery - Recommended Procedure

Recommended Disaster Recovery Procedure

This topic covers the K2 recommended procedures to enable Disaster Recovery (DR) within the infrastructure that leverage physically different data centers for production and disaster scenarios. 

The following parameters are assumed:

Should the window of accepted data loss need to be adjusted, the scheduled jobs laid out below should be recalculated accordingly.

The procedure below leverage an initial set of database backups and then transaction log shipping with a point-in-time recovery to allow for consistent K2 data in the event of a disaster event.

Prerequisite

The following should be done,

Initial Setup

The following setup is required,

Ongoing

Disaster Recovery Cutover Procedure

  1. If possible, backup the ‘tail end’ of the log(s) from the primary site and transmit them to the secondary site.
  2. Determine the time of the disaster at the production site and subtract 2 hours. Choose an exact time of recovery that makes sense, for instance 13:35:00:000.
  3. Recover queued transaction logs for all databases to that same specific point in time (the chosen time may or may not include the ‘tail end’ backups obtained in 1). In this example, all databases should be recovered until 13:35:00:000.
  4. Reapply the appropriate K2 server licenses within the DR environment (preferably leveraging the script file recommended in the Prerequisite section, point number 2)
As a result of the time difference, there will always be 1 (or 2 or 3 as need be) log difference. This allows a restore to a point in time operation on the final log in the event of a DR event. After this restore to a point in time operation all databases will be consistent.

Testing

A manual failover process should be executed during development/QA to ensure that the procedure works as expected. All K2 operations should be tested in order to confirm that the primary data files and external artifacts (such as logins) are valid.

 

 


K2 blackpearl Product Documentation: Installation and Configuration Guide 4.6.10