Oracle’s Zero Data Loss Recovery Appliance is an Oracle Engineered System purpose-built for Oracle AI Database protection and cyber resiliency. Co-developed with Oracle AI Database, Recovery Appliance delivers unique capabilities to simplify operational management, improve resource efficiencies, and reduce business risk with fast, predictable zero data loss data recovery.
Recovery automation, backup immutability, and a high availability architecture help you meet organizational requirements to protect and rapidly recover crucial data.
Yes. Oracle Database Zero Data Loss Autonomous Recovery Service is a fully managed public cloud offering that leverages the same zero data loss technology along with built-in cloud automation. It runs on Recovery Appliances fully managed by Oracle cloud engineers. Recovery Service is available in Oracle’s public cloud (OCI) and multicloud environments—Oracle Database@AWS, Oracle Database@Azure, and Oracle Database@Google Cloud.
Recovery Appliance supports heterogenous environments running Oracle Database and Oracle AI Database 26ai, Standard and Enterprise Editions.
Oracle Enterprise Manager Cloud Control is the recommended user interface to manage and monitor the environment. The Cloud Control plug-in for Recovery Appliance provides a unified view of the entire backup lifecycle for each database, whether backups reside on disk, tape, or another Recovery Appliance.
Although Cloud Control is the recommended user interface for Recovery Appliance administration, Oracle supplies the DBMS_RA PL/SQL package as a command-line alternative. For command-line monitoring and reporting, simply query the Recovery Appliance catalog views.
No, Recovery Appliance is purpose-built for Oracle AI Database protection and cyber resiliency.
Recovery Appliance, an Oracle Engineered System, delivers a resilient architecture with integrated software, compute, and storage servers and in-built Oracle Maximum Availability Architecture (MAA) best practices with no single point of failure. Based on the Oracle Exadata architecture, Recovery Appliance inherits its proven reliability, scalability, redundancy, and performance characteristics.
The Recovery Appliance is designed to be fault-isolated from the production database it protects. If a cyberattack hits the production database, Recovery Appliance is not compromised.
Recovery Appliance has natively integrated Oracle Data Guard redo transport technology, reducing Recovery Point Objective (RPO) to less than a second instead of the time since last backup, which could be 15 minutes, a few hours, or even a full day. For continuous transaction protection and recovery without data loss, simply enable real-time redo transport on protected databases. As the database generates redo changes in memory, redo is automatically sent to Recovery Appliance, which validates the redo blocks. When a database log switch occurs, Recovery Appliance automatically creates a compressed archived log backup and catalogs it.
If the redo stream terminates unexpectedly, Recovery Appliance closes the incoming redo stream and creates a partial archived redo log file backup, thereby protecting transactions up to the last change received. When Recovery Appliance detects that the redo stream has restarted, it automatically retrieves all missing archived redo log files from the protected database to preserve the intended recovery window defined by the user.
Yes. Daily incremental backups make the recovery process faster and more efficient than restoring and applying days or weeks of archived log backups during recovery.
No. Recovery Appliance protects database transactions as they occur, creating archived log backups automatically when a database log switch occurs. Since archived log backups already reside on Recovery Appliance, it eliminates the need to perform and send periodic archived log backups to the appliance.
Yes, Recovery Appliance supports continuous replication for disaster recovery or high availability purposes and air-gapped replication for cyber vault configurations. Network connectivity to Recovery Appliance deployed in a cyber vault is controlled by a firewall/gateway. This creates an “air gap” that limits the amount of time that the environment is network-accessible, thereby reducing the attack vector.
Recovery Appliance’s incremental forever backup strategy helps minimize the vault’s online window since only incremental changes are replicated after an initial full backup. Use built-in access controls and Enterprise Manager to create secure configurations wherein no single user has 100% access to all environments (e.g. primary Recovery Appliance, replicas, and cyber vault). Restore to a clean room or another environment when needed.
Yes, an incremental forever strategy can be used when backing up from the primary or standby databases. If backups are performed on both the primary and standby, each Recovery Appliance has backups and redo information for the same database. As a result, either appliance can be used for RMAN restore and recovery operations.
Recovery Appliance platform uses a defense-in-depth architecture that follows security best practices including:
While deployments use a client/server architecture, connectivity is inherently minimized to only Oracle databases rather than a wide variety of applications with varying security protocols. Communication between protected databases (clients) and Recovery Appliance is orchestrated by RMAN, which controls all data movement for backup and recovery operations.
Recovery Appliance accepts incoming backups only from pre-enrolled databases with an authorized virtual private catalog (VPC) user account (i.e., database administrator) configured by an appliance administrator. During ingest, all backups are validated (readable by RMAN) before being stored on disk. No .exe files—a typical attack vector—would be accepted.
Standardizing operational management with an incremental forever backup strategy across all Oracle databases helps eliminate the overhead and risk of using diverse database scripts across the environment. Recovery Appliance delivers cloud-scale performance and scalability, enabling you to consolidate data protection for tens, hundreds, or thousands of Oracle databases, thereby reducing the surface area of attack.
Yes. Recovery Appliance environments consist of three primary user groups—Cloud Control administrators, database administrators (DBAs), and Recovery Appliance administrators. The user model has a separation of duties; the roles for databases, Recovery Appliance, and for any related appliances are segregated from each other. Each user group can be granted access for tasks associated with their role—no users can access other systems that they don’t have privileges for. This allows organizations to implement security protocols such as no single user having modification rights on production and backup data.
Larger environments may include multiple Recovery Appliances with one replicating to another for disaster recovery and/or a cyber vault. Each Recovery Appliance maintains its own set of authorized users and protection policies, which may align with or differ from the upstream appliance.
Refer to the documentation for more details.
No. Backups of protected databases are managed throughout their lifecycle based on their associated protection policy defined on Recovery Appliance. A DBA issuing RMAN DELETE OBSOLETE or DELETE DATABASE ALONG WITH BACKUPS could impact locally managed backups (if any) but would have no effect on backups under Recovery Appliance management—whether they reside on Recovery Appliance or have been copied to alternative media.
Organizations with strict security and compliance requirements can fortify operations and reduce exposure to a single user account by requiring a user quorum for system or root access. Once configured, root access may be granted to an administrator for a defined period only if two other administrators approve the request.
Refer to the documentation to learn more about securing operations with user quorum requirements.
Recovery Appliance’s integration with TDE data formats provides the unique benefit of space-efficient data protection—databases are compressed during backup for faster performance with less storage consumption. Backup compression coupled with an incremental forever strategy helps maximize efficiency, keep backup storage consumption to a minimum, and lower overall costs.
No. Encryption keys for protected databases secured with TDE are managed by the database and stored in an Oracle Wallet or Oracle Key Vault.
Yes, this is an optional protection policy setting. Within the protection policy, turn on secure mode to require all backups and redo accepted by Recovery Appliance are encrypted. This setting would be applicable for all protected databases associated with that policy.
Yes. Recovery Appliance protection policies enable you to set a compliance retention period in which deletion or shortening of the retention period is prohibited. Backup immutability can be further applied to archival copies sent from the appliance to OCI or ZFS regulatory compliance buckets for longer-term immutable retention periods.
For more information on backup immutability or setting policies to address legal hold requirements, refer to the documentation.
Recovery Appliance uses Transport Layer Security (TLS) for end-to-end communication encryption. TLS between a Recovery Appliance and client databases uses certificates that authenticate and encrypt communication. Refer to the documentation for more details.
Yes. Recovery Appliance supports VLAN-tagging for network segregation. Use VLAN-tagged networks to isolate backup and restore traffic for protected databases with non-routable network zones.
Protected databases use the Zero Data Loss Recovery Appliance Backup Module (libra) included with a standard database installation, making it easy to establish the appliance as your backup destination. This module is an Oracle-supplied SBT library that RMAN uses to transfer backup data over the network to the Recovery Appliance.
No. Recovery Appliance has a fully managed, built-in catalog that provides all the advantages of a RMAN catalog while also handling metadata for Recovery Appliance policies, settings, and operations. However, you can import existing RMAN catalogs into the appliance’s catalog or use the RMAN REGISTER DATABASE command.
Recovery Appliance releases quarterly patch bundles that include any necessary software and firmware updates. As an Oracle Engineered System, Oracle Platinum Services delivers a proactive patch deployment process to keep your appliance optimally maintained. For more information on this complimentary service and the remote patching assistance it provides, refer to My Oracle Support Doc ID 2063633.1.
No. Recovery Appliance keeps track of backups, replicas and, archival copies along with the retention associated with each. It will automatically initiate restore from the optimal source. For example, if the backup no longer resides on your local Recovery Appliance (the initial backup location) but is on a replica and on tape, restore will be directly from the replica as its generally faster than tape—no user intervention needed.
The Recovery Appliance home page in Cloud Control provides a current overview of the environment and activity, prominently displaying any warnings, alerts, and errors. The Cloud Control incident and event notification framework is natively integrated within the appliance, enabling you to effectively manage any issues that arise and track them until resolution.
Yes. Beyond the home page dashboard, alerts can be sent to stakeholders based on user-defined parameters within the Enterprise Manager metric and collection settings page for Recovery Appliance. This page includes categories such as system health, protected databases, and storage. Administrators can modify how often metrics are collected (defaults are generally 5 or 15 minutes) and establish warning and critical thresholds to trigger alerts.
Refer to Monitoring the Recovery Appliance for more information.
Yes. Recovery Appliance provides a selection of detailed and summary reports to help effectively manage, proactively plan, and keep key stakeholders informed about performance, capacity, current protection status, and risk exposure. Reports are built into Oracle Analytics Publisher and can be accessed on demand or scheduled and automatically sent to your management team.
Oracle Analytics Publisher is available as a component of the complete Oracle Analytics Server suite, or as an independently installed Oracle Analytics Publisher component. Refer to Accessing Recovery Appliance Reports for more information.
A Recovery Appliance RA23 or RA23-Z base rack consists of 2 compute and 3 storage servers. Additional storage servers may be added incrementally up to a total of 17 storage servers in a full rack. A single Recovery Appliance configuration can scale up to 18 full racks with 36 compute servers and as many as 306 storage servers.
For additional details, refer to the Recovery Appliance datasheet (PDF).
Recovery Appliance RA23 and RA23-Z configurations are identical except for the capacity and number of High Capacity (HC) disks per storage server. A RA23 storage server delivers 92 TB1 of capacity with 12 HC drives. In comparison, RA23-Z storage servers are cost-optimized with 6 HC disks and 45 TB¹ of capacity each for customers that need less capacity and throughput.
No. A single Recovery Appliance configuration must use the same storage servers: RA23 or RA23-Z. However, both can be leveraged in replicated environments—backups can be replicated from Recovery Appliance RA23 to RA23-Z or vice versa.
Yes. Each additional Recovery Appliance rack includes 2 compute servers, increasing available throughput and performance. For example, multi-racking 3 into one Recovery Appliance configuration gives you the compute power and throughput of 6 compute servers and the capacity of 9 to 51 storage servers. While storage servers can be scaled up within a single rack from a minimum of 3 up to 17, each rack always has 2 compute servers—which is all that is needed to effectively power operations for maximum rack capacity.
Yes. Adding Recovery Appliance storage servers does not require downtime and can be done while the appliance is online.
Recovery Appliance can be configured with 100 Gb top-of-rack (ToR) switches to create a dedicated backup/recovery network for Exadata-hosted protected databases. This direct connectivity helps optimize overall throughput—which is especially beneficial for large database backup volumes—and eliminate potential congestion delays from going over shared data center backup networks.
Customers with strict security requirements often use this strategy to both boost performance and isolate network traffic for their critical database applications.
Recovery Appliance, integrated with the TDE data format, preserves database encryption at-rest, while providing innovative compression and incremental forever backup capabilities to reduce storage consumption. Space-efficient, encrypted backups can achieve up to three times the backup storage savings and twice the backup speed compared to general purpose storage solutions—less data sent over the network and ingested on the appliance.
Recovery Appliance supports most replication topologies to address disaster recovery, high availability, and cyber-resiliency requirements.
Refer to Recovery Appliance Replication or Replicating Backups with Recovery Appliance in the documentation and Strengthen Oracle AI Database Cyber Defense and Recovery with Zero Data Loss Air-Gapped Backups for insights on implementing a cyber vault strategy.
Yes. Protection policies are defined and managed independently on each Recovery Appliance. Every protected database must be associated with a protection policy defined on every Recovery Appliance where its backups reside—policies can use the same settings or different ones. This provides flexibility and fine-grained control in managing a database backup throughout its lifecycle, which may include multiple locations for varying durations. Backup copies to alternative media may be created on demand or scheduled from any appliance with user-defined retention settings for the copies.
Recovery Appliance catalogs are periodically synchronized automatically, making restores seamless without the need to designate the location where backups currently reside.
Replication is configured at the protection policy level and all backups for protected databases associated with that policy are replicated to the defined downstream appliance. Whether replicating to another appliance for disaster recovery/high availability purposes or to a cyber vault, Recovery Appliance automates the process without the need for user-defined schedules at the policy or database level.
Incoming RMAN backups are automatically and immediately replicated upon receipt without having to be fully ingested on the upstream appliance. Each Recovery Appliance independently validates and catalogs all backups—catalogs are automatically synchronized during periodic background processes. If real-time redo transport is enabled, when a database log switch occurs, the upstream appliance creates an archived log backup which is then replicated.
In cyber vault configurations that have air-gapped network connectivity, Recovery Appliance automatically sends backups when the vault is online and queues backups during closed access periods.
Oracle Enterprise Manager provides a unified dashboard for your entire Oracle deployment including management, monitoring, and alerting for Recovery Appliance. In cyber vault configurations, best practice guidance is to leverage a separate Enterprise Manager installation for management isolation from production environments.
Opening and closing vault connectivity can be coordinated with Recovery Appliance replication to minimize the amount of time it’s online. A time-based circuit breaker can also be added to the replication gateway to minimize human error that could leave the gateway open for longer than required.
For additional best practices, please refer to Zero Data Loss Recovery Appliance Cyber Security Architecture.
Yes. Any Recovery Appliance, whether running on RA23, RA23-Z, or a previous generation, can replicate to another Recovery Appliance in any supported replication topology.
Refer to the documentation for more information on replication.
Recovery Appliance makes it easy to create a robust, multitiered backup strategy with your choice of integrated alternative media including tape, local disk storage, and/or cloud storage:
Recovery Appliance automatically manages backup retention for archival backup copies created on demand or via schedules on the appliance based on user-defined parameters set within the protection policy.
Yes. Many companies have compliance requirements to keep month- or year-end backups for specific periods of time that are beyond standard retention policies. With Recovery Appliance, you can create on demand or schedule an archival backup copy with a specific recovery point and keep until period (e.g., 7 years) to be sent to tape or cloud for long-term storage.
Refer to documentation regarding archival copies for more information.