HP B6960-96035 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software pro obnovení zálohy HP B6960-96035. HP B6960-96035 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 422
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Concepts guide

HP Data Protector A.06.10Concepts guideB6960-96035Part number: B6960-96035First edition: November 2008

Strany 2

Filesystem backup of databases and applications ... 239Online backup of databases and applications ...

Strany 3 - Contents

Catalog protectionWhat is catalog protection?Data Protector saves information about backed up data in the IDB. Since theinformation about the backed u

Strany 4

available, but you must know which media to use and what needs to be restored,for example, the exact file name.The IDB also keeps information on how l

Strany 5

Exporting media from a cellExporting media from a Data Protector cell removes all the information about backedup data on the media and the media thems

Strany 6

on UNIX or disk drives on Windows systems) and the destinations are specified (tape)devices. During the backup session, Data Protector reads the objec

Strany 7

• Description: uniquely defines the backup objects with identical client name andmount point.• Type: backup object type, for example filesystem or Ora

Strany 8

Backup sessionsWhat is a backup session?A backup session is a process that backs up data from a client system to media. Abackup session always runs on

Strany 9

You can combine full and incremental backups when you configure scheduledbackups. For example, you may run a full backup on Sundays and incrementalbac

Strany 10

This section combines all these concepts by giving some examples of backup schedulesand some tips for efficient scheduling.When to schedule backupsTyp

Strany 11

incremental backup. For more information on how Data Protector selects media forbackups, see Selecting media for backups .Example 1Figure 28 on page 1

Strany 12

Figure 29 Full backup with daily level 1 incremental backupsThis policy requires slightly more time for backups and also requires a little moremedia s

Strany 13

Local mirror - dual host ... 269Local mirror - single host ...

Strany 14

Figure 30 Full backup with mixed incremental backupsThis policy takes into account the fact that there are not many changes duringweekends. Data is ba

Strany 15

• When is the lowest system usage and user activity?Typically, this is at night and most backups are scheduled to run during the night.Data Protector

Strany 16

If you need to back up large amounts of data and the backup window presentsa problem, consider backing up to disk-based devices and using advanced bac

Strany 17 - Concepts guide 17

Smart MediaCopyMedia copyObject mirrorObject copyNo3No2YesYesAppendabilityof target mediaMedia identicalto the sourcemediaMedia identicalto the source

Strany 18

Figure 31 Object copy conceptIn the figure, there is an object version resulting from a backup of object A, version1, and two additional copies of the

Strany 19 - Concepts guide 19

Selection of devicesYou need separate devices to be used with the source media and the target media.The destination devices can have a larger block si

Strany 20

Why use object copy?Additional copies of backed up data are created for multiple purposes:• VaultingYou can make copies of backed up objects and keep

Strany 21 - Publication history

Figure 32 Freeing mediaDemultiplexing of mediaMultiplexed media contain interleaved data of multiple objects. Such media mayarise from backup sessions

Strany 22 - Publication history22

Figure 33 Demultiplexing a mediumConsolidating a restore chainYou can copy a restore chain (all backups that are necessary for a restore) of anobject

Strany 23 - About this guide

Figure 34 Disk staging conceptDisk staging also eliminates the need for frequent backups of numerous small objectsto tape. Such backups are inconvenie

Strany 24 - About this guide24

Examples of automated media copying ... 332Example 1: automated media copying of filesystem

Strany 25

The result of a successful backup session with object mirroring is one media setcontaining the backed up objects and additional media sets containing

Strany 26 - Online Help

Figure 35 Object mirroringSelection of devicesObject mirroring is load balanced by default. Data Protector makes optimum use ofthe available devices b

Strany 27 - Documentation map

Backup performance also depends on factors such as device block sizes and theconnection of devices. If the devices used for backup and object mirrorin

Strany 28 - GuideAbbreviation

Automated media copyingWhat is automated media copying?Automated media copying is an automated process that creates copies of the mediacontaining back

Strany 29 - Integrations

Smart media copying using VLSWhat is smart media copying?In smart media copying, the data is first backed up to a virtual tape library (VTL)configured

Strany 30 - GuideIntegration

Restoring dataPolicies for restoring data are an essential part of the overall backup strategy in thecompany. Keep the following in mind:• Backing up

Strany 31

Selection of the media setIf an object version that you want to restore exists on more than one media set, whichhas been created using one of the Data

Strany 32 - About this guide32

SQL Server, and Microsoft SharePoint Portal Server integrations. Such databasesare usually backed up with interdependent data streams and, consequentl

Strany 33 - HP technical support

End users are allowed to restoreAnother possible restore policy is to allow all or just selected end users to restoretheir own data. This policy provi

Strany 34 - Documentation feedback

operation can begin. This includes repartitioning and/or reformatting the boot partitionand recovery of the operating system with all the configuratio

Strany 35 - Protector

FiguresData Protector graphical user interface ... 331Backup process ...

Strany 36

Disaster recovery methodsData Protector supports the following disaster recovery methods:• Manual disaster recoveryThis is a basic and very flexible d

Strany 37

Alternative disaster recovery methodsThis section compares the Data Protector disaster recovery concept with concepts ofother vendors. This section po

Strany 38 - What is a backup?

Planning your backup strategy132

Strany 39 - What is a restore?

3 Media management anddevicesIn this chapterThis chapter describes Data Protector concepts of media and device management.It discusses media pools, de

Strany 40 - Data Protector architecture

Media management functionalityData Protector provides the following media management functionality that allowssimple and efficient management of a lar

Strany 41 - HP Data Protector product

1. Preparing media for backup.This includes initializing (formatting) media for use with Data Protector andassigning media to media pools, which are u

Strany 42 - Operations in the cell

else, does not matter; it always belongs to its pool until it is recycled and exportedfrom the cell.Several devices can use media from the same pool.M

Strany 43

• system platform (one pool for UNIX systems, one for Windows 2000 systems,and one for Windows XP systems)• per system (every system has its own pool)

Strany 44

What is a free pool?A free pool is an auxiliary source of media of the same type (for example, DLT) foruse when all free media in a regular pool run o

Strany 45 - Enterprise environments

All free (unprotected, empty) media can be grouped in a free pool and sharedbetween all media pools that support free pool usage.• Reduced operator in

Strany 46

Incremental backups ... 9523Leveled incremental backups ...

Strany 47

Media pool usage examplesThe examples below show some configurations you may want to consider whenchoosing the appropriate strategy for a particular b

Strany 48 - Media management

Figure 38 Configuration of media pools for large librariesExample 3Figure 39 on page 142 shows an example when data is backed up to media in amedia po

Strany 49 - Backup devices

Figure 39 Multiple devices, single media poolExample 4Data is backed up to media in multiple media pools on multiple devicessimultaneously. If you wan

Strany 50 - User interfaces

Figure 40 Multiple devices, multiple media poolsImplementing a media rotation policyWhat is a media rotation policy?A media rotation policy defines ho

Strany 51

Media rotation and Data ProtectorAutomatic media rotation and media handlingData Protector automates media rotation and media handling as follows:• Be

Strany 52 - Data Protector Java GUI

By now you should be able to estimate the quantity of media required for a full mediarotation. Additional media will be required in case you:• Assume

Strany 53

Data Protector also assigns each medium a media ID that uniquely identifies thismedium.An ANSI X3.27 label is also written on the tape for identificat

Strany 54

Media management during backup sessionsWhat happens during backup?During a backup session, Data Protector automatically selects media for backup andke

Strany 55

Media conditionThe condition of the media also influences which media are selected for backup, forexample, media in good condition are used for backup

Strany 56

Figure 41 Multiple objects and sessions per medium, sequential writesFigure 41 on page 149 shows an example of eight sequential writes over four sessi

Strany 57 - 2 Planning your backup

Sharing an ADIC/GRAU or StorageTek ACS library ... 17050Storage Area Network ...

Strany 58 - Backup strategy planning

concurrently written in sess_7 and the second one in sess_8. Note that one objectcan be stretched over several media. The media usage policy is append

Strany 59

• media ageThe age of a medium is calculated as the number of months that have elapsedsince you formatted, or initialized, the medium. Once a medium i

Strany 60

• A report showing media used for backup within a specified time-frame.• A report showing which backup specifications have used specified media during

Strany 61

Restoring from media in a vaultRestoring media from a vault is no different than restoring from any other media.Depending on how your data and catalog

Strany 62 - Planning cells

in Data Protector using different (logical) device names, for example, one withouthardware data compression and another one with hardware data compres

Strany 63

Device lists and load balancingMultiple devices for backupWhen configuring a backup specification, you can specify several standalone devicesor multip

Strany 64

gets full, the backup automatically continues on the medium in the next device in thedevice chain.How load balancing worksFor example, assume that the

Strany 65 - Windows domains

Disk agent concurrencyThe number of Disk Agents started for each Media Agent is called Disk Agent (backup)concurrency and can be modified using the Ad

Strany 66 - Geographically remote cells

NOTE:Some tape technologies place limitations on the number of file marks per medium. Ensurethat your segment size is not too low.Figure 45 Data forma

Strany 67 - The infrastructure

Increasing the block size can improve performance. Changing the block size shouldbe done before formatting tapes. For example, a tape written with the

Strany 68

Split mirror backup concept ... 26678Local mirror - dual host (full performance, Zero Downtim

Strany 69 - Using hardware in parallel

Physical device collisionWhen specifying a device used for backup, you may specify one device name inone backup specification and another device name

Strany 70 - Hardware compression

install a Data Protector Media Agent on the system with the device connected. DataProtector can detect and automatically configure most standalone dev

Strany 71 - Object distribution to media

Large librariesWhat are library devices?Library devices are automated devices, also called autoloaders, exchangers orjukeboxes. In Data Protector, mos

Strany 72 - Disk performance

• Obtain the number of required media. See “Implementing a media rotationpolicy” on page 143.Sharing a library with other applicationsA library device

Strany 73 - Planning security

• Scanning the barcodes of the media in a device’s repository is faster, becauseData Protector does not need to actually load the media to a drive and

Strany 74 - Data Protector users accounts

Protector internally redirects the robotic commands to the system that manages therobotics.Figure 47 Connecting drives to multiple systemsControl prot

Strany 75 - Data Protector user groups

• SCSI—for robotics other libraries• NDMP—for NDMP roboticsAll four library robotic control protocols are implemented in both the General MediaAgent a

Strany 76 - Data encryption

Table 11 on page 167 show the Data Protector Media Agent (the General MediaAgent or the NDMP Media Agent) required on a client system configured for r

Strany 77

Figure 48 Sharing a SCSI library (robotics attached to a Data ProtectorClient System)Figure 48 on page 168 shows a SCSI library, with its robotics att

Strany 78 - What is backup ownership?

Figure 49 Sharing a SCSI library (robotics attached to an NDMP Server)Figure 49 on page 169 shows a SCSI library, with its robotics attached to an NDM

Strany 79 - Clustering

Overview of backup and automated media copy sessions ... 340105Concepts guide 17

Strany 80

Figure 50 Sharing an ADIC/GRAU or StorageTek ACS libraryFigure 50 on page 170 shows an ADIC/GRAU or StorageTek ACS library, with itsrobotics attached

Strany 81

Storage Area NetworksA Storage Area Network (SAN), depicted in Figure 51 on page 172, is a newapproach to network storage that separates storage manag

Strany 82 - Cluster support

Figure 51 Storage Area NetworkFibre ChannelFibre Channel is an ANSI standard for high-speed computer interconnection. Usingeither optical or copper ca

Strany 83 - Example cluster environments

Point-to-point, loop, and switched Fibre Channel topologies can be mixed to best suityour connectivity and growth requirements.For a list of supported

Strany 84

Figure 52 Loop initialization protocolSwitched topologyThe switched topology provides any-to-any connectivity between all nodes connectedto a switch.

Strany 85

Device sharing in SANData Protector supports the SAN concept by enabling multiple systems to sharebackup devices in the SAN environment. The same phys

Strany 86

Figure 53 Example multipath configurationWhy use multiple pathsWith previous versions of Data Protector, a device could be accessed from only oneclien

Strany 87

During a restore session, the device paths are selected in the following order:1. Paths that are on the client to which the objects are restored, if a

Strany 88

Indirect and Direct Library AccessUpon configuring Data Protector with a SCSI Library device, there are two ways inwhich client systems can access lib

Strany 89

Figure 54 Indirect Library AccessNote that you cannot use a shared library if the client system that controls the robotics,castor, in our example, fai

Strany 90

TablesEdition history ... 211Document conventions ...

Strany 91

Figure 55 Direct Library AccessDevice sharing in clustersClustering, which is often used in combination with the SAN concept, is based onsharing netwo

Strany 92 - Incremental backups

Floating drivesFloating drives are device that are configured on a virtual host, using virtual systemnames. Floating drives should be configured for t

Strany 93 - Types of incremental backups

Media management and devices182

Strany 94

4 Users and user groupsIn this chapterThis chapter discusses Data Protector security, users, user groups, and user rights.It is organized as follows:“

Strany 95

can see and restore the backed up data. You can make data visible to other usersusing the Data Protector Public option. For instructions, see the Data

Strany 96 - Considering restore

Using predefined user groupsThe following default groups are provided by Data Protector:Table 12 Data Protector predefined user groupsAccess rightsUse

Strany 97

Users and user groups186

Strany 98

5 The Data Protector internaldatabaseIn this chapterThis chapter describes the Data Protector internal database (IDB) architecture, as wellas its usag

Strany 99 - Data protection

• Fast and convenient restore The information stored in the IDB enables you toquickly find the media required for a restore, and therefore makes the r

Strany 100 - Browsing files for restore

The IDB on the UNIX Cell ManagerIDB locationThe IDB on the UNIX Cell Manager is located in the /var/opt/omni/server/db40directory.IDB formatThe IDB on

Strany 101

ABC’s Media Pool Usage ... 32525The Staggering Approach for ABC Cape Town ...

Strany 102 - Backing up data

For robustness considerations and recommendations for optimizing robustness byrelocating some IDB directories, see the online Help index: “robustness

Strany 103 - Selecting backup objects

MMDB size and growthThe MMDB does not grow very big in size. The largest portion of the MMDB istypically occupied by information about the Data Protec

Strany 104

when one of these files starts running out of space, so that you can add new files toextend the size of the filenames part of the IDB.Size and growth

Strany 105 - Object mirrors

DCBF locationBy default, the DCBF is located in the following directory:• On Windows Server 2008: Data_Protector_program_data\db40\dcbf• On other Wind

Strany 106 - Scheduling tips and tricks

Serverless Integrations Binary Files (SIBF)SIBF recordsThe Serverless Integrations Binary Files stores raw NDMP restore data. This data isnecessary fo

Strany 107 - Optimizing for restore

If transaction logging is enabled, an IDB backup removes old transaction logs andstarts creating new ones, which are necessary for an IDB recovery.Dur

Strany 108

Removing the detail catalogWhen the detail catalog is removed for a specific medium, its DC binary file isremoved. The same result is achieved by remo

Strany 109

IDB maintenanceOnce you configure the IDB, its maintenance is reduced to a minimum, mainly actingon notifications and reports.IDB recoveryAn IDB recov

Strany 110

• Growth of your backup environment The number of systems being backed up inthe cell influences the IDB growth. Plan for the growth of your backup env

Strany 111

Figure 57 The influence of logging level and catalog protection on IDBgrowthLogging level as an IDB key tunable parameterWhat is logging level?Logging

Strany 112 - Duplicating backed up data

Legal and notice information© Copyright 1999, 2008 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP requ

Strany 114

Logs all detailed information about backed up directories (names,versions, and attributes). This represents approximately 10% of alldetailed informati

Strany 115

Catalog protection as an IDB key tunable parameterWhat is catalog protection?Catalog protection determines how long the information about backed up da

Strany 116 - Why use object copy?

protection is set for 4 weeks, then significant growth of the IDB stops after 4 weeks.Therefore, in this case, the IDB is 13 times larger if the catal

Strany 117

Specifics for large cellsIf the number of files grows into the tens of millions, or there are tens of thousandsof files generated on a daily basis, an

Strany 118

The Data Protector internal database204

Strany 119 - Object mirroring

6 Service managementIn this chapterService Management, reporting, and monitoring help administrators manage theirbackup environments more effectively.

Strany 120

Service management measures and reports are a key tool IT managers can use todemonstrate value delivered to the organization and also to maintain comp

Strany 121

Figure 58 Service management information flowNative Data Protector functionalityThe functionality described in the following sections comes with Data

Strany 122 - Copying media

send alerts via SNMP, it is possible to integrate virtually any application that canreceive SNMP traps.• Data Protector backup session auditing stores

Strany 123 - Automated media copying

central operations console, such as HP Operations Manager software, paging asystem operator, or taking automated remedial action to resolve the proble

Strany 124 - Smart media copying using VLS

Publication historyGuide updates may be issued between editions to correct errors or document productchanges. To ensure that you receive updated or ne

Strany 125 - Restoring data

Integration with HP Operations Manager softwareFunctionality of the Data Protector OM integrationData Protector integrates with HP Operations Manager

Strany 126 - Selection of devices

From the monitor’s user interface, you can abort a backup, restore, or mediamanagement session or respond to “mount” requests.If you make use of the M

Strany 127

• Select from many delivery methods used to deliver reports (such as e-mail, SNMP,broadcast (available on Windows only), write to file, and send to ex

Strany 128 - Disaster recovery

Data Protector log filesSome Service Management applications, such as HP Operations Manager software,allow you to specify when and which log files sho

Strany 129

Data Protector checking and maintenance mechanismData Protector has a rich automated daily self-check and maintenance mechanism,which improves its ope

Strany 130 - Disaster recovery methods

• Sending major and critical Data Protector events to your network managementsolution, such as HP Network Node Manager (Data Protector built-in notifi

Strany 131

• Administration Reports• Media Pool Reports• PerformanceAn IT Service Provider can use these reports to demonstrate its SLA compliance to acustomer.

Strany 132

Figure 61 Operational error status reportData Protector OM SIPThis integration also uses SIP to provide Data Protector information through aweb-based

Strany 133 - 3 Media management and

Figure 62 Direct SIP integration exampleService management218

Strany 134 - Media life cycle

7 How Data Protector operatesIn this chapterThis chapter describes the operation of Data Protector. It explains Data Protectorprocesses (on UNIX) and

Strany 135 - Media pools

Publication history22

Strany 136

CRS The CRS (Cell Request Server) process (service) runs on theData Protector Cell Manager. It starts and controls backupand restore sessions. The ser

Strany 137 - Free pools

Scheduled and interactive backup sessionsScheduled backup sessionA scheduled backup session is started by the Data Protector Scheduler at the timeyou

Strany 138

4. The BSM starts Disk Agents (DAs) for each disk to be backed up in parallel. Theactual number of Disk Agents started depends on the concurrency of D

Strany 139

To prevent Data Protector processes from exceeding system capabilities, the maximumnumber of concurrent backup sessions is limited. The limit is confi

Strany 140 - Media pool usage examples

Queuing of backup sessionsTimeoutWhen a backup session is started, Data Protector tries to allocate all needed resources,such as devices. The session

Strany 141

Sending notification to an operatorYou can configure a Data Protector notification to send an e-mail to the operator withinformation about the mount r

Strany 142

A restore session is started interactively. You tell Data Protector what to restore, letData Protector determine the needed media, select some options

Strany 143

Figure 65 Restore session information flowHow many restore sessions can run concurrently?A number of restore sessions can run in the cell at the same

Strany 144 - Media needed for rotation

Mount requests in a restore sessionWhat is a mount request?A mount request appears in a restore session when the media needed for restore arenot avail

Strany 145 - Labeling Data Protector media

Figure 66 Parallel restore session flowIn a parallel restore, Data Protector reads multiplexed data for all selected objectsand assembles the parts ne

Strany 146 - Location field

About this guideThis guide describes Data Protector concepts. Read this manual to fully understandthe fundamentals and the model of Data Protector.Int

Strany 147 - Selecting media for backups

What is an object copy session?An object copy session is a process that creates an additional copy of the backedup data on a different media set. Duri

Strany 148

4. The CSM starts the Media Agents on the systems with devices configured forcopying. The Media Agents load the source and target media allocatedaccor

Strany 149

Figure 67 Object copy session information flowQueuing of object copy sessionsTimeoutWhen an object copy session is started, Data Protector tries to al

Strany 150 - Calculating media condition

Object consolidation sessionsThis section describes how an object consolidation session is started, what happensduring the session, and the processes

Strany 151 - Vaulting

2. The CSM opens the IDB, reads the information about the needed media, andwrites the information about the object consolidation session, such as gene

Strany 152

available. If the resources are still unavailable after the timeout, the session is aborted.The timeout period can be set using the SmWaitForDevice gl

Strany 153

2. The MSM starts the Media Agents (MAs) on the system that has devices usedfor the media management session.3. Media Agents perform the requested ope

Strany 154

8 Integration with databaseapplicationsIn this chapterThis chapter gives a brief description of the integration of Data Protector with databaseapplica

Strany 155

Figure 68 Relational databaseFigure 68 on page 238 shows a typical relational database with the structuresdescribed below.Data files are physical file

Strany 156 - How load balancing works

1. A transaction is first recorded into the transaction log.2. Changes required in the transaction are then applied to cached pages.3. From time to ti

Strany 157 - Segment size

• HP Data Protector installation and licensing guideThis guide describes how to install the Data Protector software, taking into accountthe operating

Strany 158 - Block size

The essence of the backup interface is that it provides the backup application withconsistent data (even if it may not be consistent on the disk) whil

Strany 159 - Device locking and lock names

• There is no need to specify the location of data files. These can be located ondifferent disks.• The logical structure of the database can be browse

Strany 160 - Standalone devices

Integration with database applications242

Strany 161 - Small magazine devices

9 Direct backupIn this chapterThis chapter introduces the direct backup concept and the technologies that enableit. The chapter also discusses the dir

Strany 162 - Large libraries

Direct backup extends the benefits of HP’s ZDB solution by moving data directly fromdisk to tape and making the load on the backup server negligible o

Strany 163 - Barcode support

Backup typesDirect backup supports backup of application data files and control files and of diskimages -- either raw disk or raw logical volume.Direc

Strany 164 - Cleaning tape support

Figure 70 on page 246 shows a basic direct backup configuration. The Resolve Agentis on a separate backup host in this configuration. Data, however, d

Strany 165

• The HP StorageWorks Disk Array XP (XP) is configured as Business Copy (BC)with mirrors configured with enough disk space.• The SAN is properly confi

Strany 166

XCopy + ResolvePrior to Resolve, you needed a server with a matching file system to get thisinformation. This was because even with the right server,

Strany 167

Database. The Backup Media Agent (BMA) writes catalog segments and delimitersbetween data and catalog segments known as file-marks.RestoreThere are tw

Strany 168

• HP Data Protector integration guide for HP ReporterThis manual describes how to install, configure, and use the integration of DataProtector with HP

Strany 169

Supported configurationsThree hosts: CM, application, ResolveThis solution uses three hosts: one each for the Cell Manager, Resolve Agent, andapplicat

Strany 170

Figure 71 Basic three host configurationTwo Hosts: Cell Manager/Resolve Agent and applicationThis solution uses two hosts: one for the Cell Manager an

Strany 171 - Storage Area Networks

Media Agent may impact the application database’s performance (XCopy’s processingrequirements are negligible).Note that in this configuration, the hos

Strany 172 - Fibre Channel

10 Disk backupIn this chapterThis chapter introduces the concepts associated with backing up data to disk andthe technologies that enable it. It also

Strany 173 - Loop topology

Disk backup benefitsThere are many situations in which it is advantageous to use disk-based devices whenperforming backups. Disk-based devices are, in

Strany 174 - Switched topology

• Overall, disk-based storage space is becoming increasingly cheaper even ifcompared to tape-based storage.Data Protector disk-based devicesData Prote

Strany 175 - Device sharing in SAN

of free disk space approaches the configured minimum amount required for thedevice to work. This enables you to free more disk space in good time for

Strany 176

11 Synthetic backupIn this chapterThis chapter introduces the concept of synthetic backup and explains the syntheticbackup solution provided by Data P

Strany 177 - Device locking

new, synthetic full backup. This can be repeated indefinitely, with no need to run afull backup again.In terms of restore speed, a synthetic full back

Strany 178 - Indirect Library Access

The following figures explain the concept of synthetic backup and virtual full backup.They show how a synthetic full backup or a virtual full backup i

Strany 179 - Direct Library Access

This guide describes how to configure MPE/iX clients and how to back up andrestore MPE/iX data.• HP Data Protector Media Operations user's guideT

Strany 180 - Device sharing in clusters

Figure 73 Virtual full backupFigure 73 on page 260 shows how a virtual full backup is created. With this type ofbackup, all the backups reside in a si

Strany 181 - Floating drives

Figure 74 Full and incremental backupsIn Figure 74 on page 261, conventional backups were performed. To restore to thelatest possible state, you need

Strany 182

Figure 76 Regular synthetic backupFigure 76 on page 262 shows a situation where a synthetic backup was performedafter each incremental backup. This st

Strany 183 - 4 Users and user groups

By default, the last synthetic full backup in the backup chain is used for restore,irrespective of whether the preceding backups are still valid or th

Strany 185 - Data Protector user rights

12 Split mirror conceptsIn this chapterThis chapter introduces the split mirror backup concept and discusses theconfigurations that are supported by H

Strany 186 - Users and user groups186

Figure 78 Split mirror backup conceptThe target volumes in replica are typically connected to a separate client, which alsohas tape devices connected

Strany 187 - 5 The Data Protector internal

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedOnly when this is carried out before a replica

Strany 188

allows up to three replicas, and each can have an additional two copies if cascadingis used.During the instant recovery, the data on the specified rep

Strany 189 - IDB architecture

Supported configurationsLocal mirror - dual hostThis solution uses a local mirroring functionality such as Business Copy XP. Both disksare in the same

Strany 190

Documentation mapAbbreviationsAbbreviations in the documentation map that follows are explained below. The guidetitles are all preceded by the words “

Strany 191 - Catalog Database (CDB)

database into a consistent mode that permits the split, as well as to take it out of thismode again.This configuration enables an offline backup of a

Strany 192

Figure 80 Split mirror - remote mirror (LAN-free remote backup - dataHA)The remote mirror transfers data to a physically separate site where it can be

Strany 193

remote disaster recovery site using hardware mirror concepts is widely accepted inthe industry.Local/remote mirror combinationIf the customer has a ne

Strany 194 - IDB operation

Other configurationsThere are many other possible split mirror configurations that provide some particularadvantage or fulfill a specific user need. H

Strany 195 - Exporting media

Split mirror concepts274

Strany 196 - Overview of IDB management

13 Snapshot conceptsIn this chapterThis chapter introduces the snapshot backup concepts and discusses the configurationsthat are supported by HP.It is

Strany 197 - IDB growth and performance

allocation of logical volumes on physical disks, but you can influence it with a choiceof protection characteristics.RAIDRedundant Array of Inexpensiv

Strany 198

Figure 82 Snapshot backupThe backup client is set up as a Data Protector client with tape devices connected,to allow a local backup to be performed.Wh

Strany 199

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedFor an online database backup, snapshot data al

Strany 200

Instant recoveryDuring snapshot backup sessions, several snapshot copies of data can be producedand can be retained on a disk array, each point-in-tim

Strany 201

GuideAbbreviationInstallation and licensing guideInstallMedia Operations getting started guideMO GSMedia Operations product announcements, software no

Strany 202

not written to that reserved space until necessary. As the data changes on the sourcevolume, the snapshot data on the target volume is updated with th

Strany 203 - IDB size estimation

Supported configurationsBasic configuration: single disk array - dual hostBoth hosts are connected to the same disk array, so that the I/O infrastruct

Strany 204

1. Put the database into a consistent mode that permits a snapshot to be taken.2. Perform a snapshot of the application data.3. Return the database to

Strany 205 - 6 Service management

Figure 85 Multiple application hosts - single backup hostWith this solution, multiple application hosts may be connected to a single or multipledisk a

Strany 206 - Service management206

Figure 86 Disk array(s) - single hostIn cases where no dedicated backup server is available, both functions (applicationand backup) can be performed o

Strany 207

Figure 87 LVM mirroring - HP StorageWorks Virtual Array onlyIn the supported configurations described previously, only Business Copy functionalityis p

Strany 208 - Service management208

Figure 88 Campus Cluster with LVM Mirroring - HP StorageWorksVirtual Array onlyWith this configuration, it is possible to emulate Continuous Access pl

Strany 209

In the event that you want to back up data in a configuration not listed, this does notmean that it cannot be supported. Please contact your local HP

Strany 210 - The monitor

Snapshot concepts288

Strany 211 - Reporting and notification

14 Microsoft Volume ShadowCopy serviceIn this chapterThis chapter introduces the Microsoft Volume Shadow Copy service (VSS) conceptand its role in the

Strany 212 - Service management212

IntegrationsLook in these guides for details of the following integrations:GuideIntegrationIG-OMU, IG-OMWHP Operations Manager for UNIX/for WindowsIG-

Strany 213 - Java-based online reporting

VSSVolume Shadow Copy service (VSS) is a software service introduced by Microsoft onWindows operating systems. This service collaborates with the back

Strany 214 - Service management214

The example of the hardware provider is disk array, which has its hardwaremechanism of providing point-in-time state of a disk. A software provider op

Strany 215

Figure 89 Actors of the traditional backup modelFigure 90 Actors of the VSS backup modelIn the traditional model, the backup application had to commun

Strany 216 - Service management216

VSS benefitsThe advantages of using Volume Shadow Copy service are as follows• A unified backup interface for all writers.• A unified backup interface

Strany 217 - Data Protector OM SIP

writers, and backup and restore functionality. For detailed information on theintegration, see the HP Data Protector integration guide.VSS backupIn ca

Strany 218 - Service management218

VSS filesystem backup and restoreSome applications are not aware of the Volume Shadow Copy service. Suchapplications cannot guarantee consistency of d

Strany 219 - 7 How Data Protector operates

• Backups can be performed at any time without locking out users.• There is little or no impact on the performance of the application system duringthe

Strany 220

A Backup scenariosIn this appendixThis Appendix describes two scenarios: one for company XYZ and one for companyABC. Both companies plan to enhance th

Strany 221

Define the periods of time during which backups of specific systems can bedone.• Local versus network backupsDetermine which systems, that the backup

Strany 222

Determine the administration and operations rights for the backup systems users.Company XYZXYZ is a translation agency providing the following service

Strany 223

ContentsPublication history ... 21About this guide ...

Strany 224 - Queuing of backup sessions

GuideIntegrationIG-RHP ReporterIG-SIPHP Service Information Portalall ZDBHP StorageWorks Disk Array XPall ZDBHP StorageWorks Enterprise Virtual Array

Strany 225 - Restore sessions

Current devicesProjecteddata (in 5Years)Currentdata#Clients#ServersDepart.2 HPStorageWorksDAT24autoloaders67 GB22 GB11 UX1 AIXOtherLanguages1 HPStorag

Strany 226

network shares. Employees in the Other Languages Department also work onSaturdays.Problems with the current solutionThe current backup solution is not

Strany 227 - Queuing of restore sessions

Backup strategy requirementsRequirementsAfter addressing the items under “Considerations” on page 297, the followingrequirements have been identified

Strany 228 - Parallel restores

Proposed solutionBecause of the limitations of the current backup solution for both performance andenterprise-wide management, there is a need to rede

Strany 229 - Object copy sessions

DevicesProjected Data(In 5 Years)Current DataDepartment* One HP StorageWorks DAT24 autoloader is currently used to locally back up the 12 GBof data. T

Strany 230

Figure 92 Proposed XYZ backup topology• The Cell Manager maintains the Catalog Database (CDB). This provides aminimum of 20 days of file and directory

Strany 231

Figure 93 Input parametersThe results are shown in Figure 94 on page 306. In one year, the database is expectedto grow to approximately 419.75 MB.Figu

Strany 232

The backup devices consist of an HP StorageWorks DLT 4115w Library aswell as two HP StorageWorks DAT24 autoloaders.Why use the HP StorageWorks DLT 411

Strany 233 - Object consolidation sessions

The Data Protector Catalog Database is approximately 0.4 GB in size. It isbacked up locally to an HP StorageWorks DAT24 autoloader, which has asustain

Strany 234

Table 18 on page 309 shows the size and time requirements for these fullbackups as of today, as well as the five year projection.Table 18 Remote full

Strany 235 - Media management sessions

GuideIntegrationIG-VarSybaseall ZDBEMC SymmetrixIG-VarVMwareDocument conventions and symbolsTable 2 Document conventionsElementConventionCross-referen

Strany 236

Why use level 1 incremental backups?To restore the latest data, only two media sets need to be accessed, one forthe latest full backup and one for the

Strany 237 - 8 Integration with database

Data protection determines the amount of time until each medium can bereused. Set data protection to permanent so that data on the media is notoverwri

Strany 238

autoloaders. All actions excluding the actual moving of media to the vault aredone by the software solution, including queries done internally in the

Strany 239

1. Identifies the media needed for restore.2. Brings the media from a vault, enters the media in the HP StorageWorksDLT 4115w Library or other device

Strany 240

Three departments at ABC Cape Town use the Microsoft SQL database to store theirdata and the company uses Microsoft Exchange Server for mailing servic

Strany 241

Backup media are denoted by the name of the department, the name of the serverand first and last dates on which backups were performed on the media. A

Strany 242

Maximum downtimeType of data6 hoursCompany resource data1 dayProject data2 daysPersonal dataThis recovery time mainly consists of the time needed to a

Strany 243 - 9 Direct backup

Data (in GB)Location22ABC Pretoria16ABC DurbanPlans for future growth of the amount of dataABC plans to grow at 15 to 20% per year. The amount of data

Strany 244 - Direct backup

Configure cell A as the MoM cell for the ABC Cape Town environment, cell D as theMoM cell for the ABC Pretoria environment, and cell F as the MoM cell

Strany 245 - How direct backup works

The two cells at the ABC Durban MoM environment should also share a CentralizedMedia Management Database. This should be configured on the MoM of cell

Strany 246 - Environment

NOTE:Provides additional information.TIP:Provides helpful hints and shortcuts.Data Protector graphical user interfaceData Protector provides a cross-p

Strany 247 - About XCopy

#SAP#UNIXclients#UNIXservers#Windowsclients#WindowsserversCellMoMenvironment1215112B1124202C334D*ABC Pretoria32561E304102F*ABC Durban292111p#SAP is th

Strany 248 - Direct backup process flow

Figure 97 ABC Cape Town enterprise backup environmentThe two cells at the ABC Pretoria MoM environment should share a CentralizedMedia Management Data

Strany 249 - Requirements and support

catalog protection (3 weeks), number of full backups per week (1), and numberof incremental backups per week (5).Figure 98 Input parametersThe results

Strany 250 - Supported configurations

All systems in the same location should be on the same LAN for maximumperformance. Use the 100TX network to connect all the systems in each of theloca

Strany 251

Why use the HP StorageWorks DLT 4115w Library?• The HP StorageWorks DLT 4115w Library has a single DLT4000 drivewith 15 slots. It has a total compress

Strany 252 - Direct backup252

library has two drives and a sustained data transfer rate of 6 MB/s (2 x 3 MB/s),or 21 GB/h. Therefore, data is backed up to this library in up to 5 h

Strany 253 - 10 Disk backup

DescriptionLocationMedia pool nameIDBPretoriaP_DB_PoolHP StorageWorks DLT 4115wLibraryDurbanD_DLT_PoolHP StorageWorks DAT24autoloadersDurbanD_DAT_Pool

Strany 254 - Disk backup benefits

FullIncr1Incr1Incr1Incr1Incr1Cell C• SERVERS_A...GBackup specifications for the company’s servers to prepare for disasterrecovery. Each time a new ser

Strany 255

TimeBackup dayDescriptionCellName23:00SundayServersCSERVERS_C03:00SaturdayIDBDDB_D03:00SaturdayIDBEDB_E23:00FridayServersDSERVERS_D23:00SaturdayServer

Strany 256 - Disk backup256

Set data protection to 5 years for all backup specifications except forExchange_A, which is sued to back up personal mail. Set data protection forthis

Strany 257 - 11 Synthetic backup

Figure 1 Data Protector graphical user interfaceGeneral informationGeneral information about Data Protector can be found at http://www.hp.com/go/datap

Strany 258 - Synthetic backup benefits

• Display a list of media needed for restore and the physical locations wherethe media are stored.• Filter media from the media view based on specific

Strany 259

B Further informationIn this appendixThis appendix provides additional information about some of the aspects of DataProtector concepts, including back

Strany 260 - Restore and synthetic backup

Figure 100 Backup generationsYou configure Data Protector to automatically maintain the desired number of backupgenerations by selecting the appropria

Strany 261

Example 1: automated media copying of filesystem backupsYour company has a MoM environment with two cells, each containing 150 computersystems (server

Strany 262 - Synthetic backup262

have 900 GB of data to back up. The data is divided among backup specificationsin the following way:• BackupSpec1 (Drive 1) - 300 GB• BackupSpec2 (Dri

Strany 263

Figure 101 Incr1 backup and automated media copyingFull backupConfiguring backupsYou schedule your weekly full backup on Friday at 6 PM. The data prot

Strany 264 - Synthetic backup264

Again, you use post-backup media copying to copy the media used with BackupSpec1and BackupSpec2, and scheduled media copying to copy media used inBack

Strany 265 - 12 Split mirror concepts

Figure 102 Full backup and automated media copyingYou schedule your monthly full backup on Sunday at 6 AM. This backup is intendedfor archiving purpos

Strany 266 - Split mirror concepts266

Figure 103 Overview of backup and automated media copy sessionsExample 2: automated media copying of Oracle database backupsYour company has an Oracle

Strany 267

Full backupConfiguring backupsYou schedule your daily full backup each day from Monday to Friday at 6 PM. Thedata protection is set to 4 weeks. You ha

Strany 268 - Split mirror concepts268

Subscription serviceHP recommends that you register your product at the Subscriber's Choice for Businesswebsite:http://www.hp.com/go/e-updatesAft

Strany 269

Figure 105 Overview of backup and automated media copy sessionsInternationalizationInternationalization is a way to design and implement a software pr

Strany 270 - Remote mirror

File name handlingHandling file names in a heterogeneous environment (different operating systemswith different local settings, all in one cell) is a

Strany 271

UNIX incompatibility exampleThree users working on a Solaris system without Data Protector installed, each usinga different character set, create file

Strany 272 - Split mirror concepts272

• the files to be restored are selected in the GUI• Data Protector searches the tape for the specified data and restores it• the original file names (

Strany 274 - Split mirror concepts274

Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge SystemLibrary Server (ACSLS) software that manages the

Strany 275 - 13 Snapshot concepts

an archived redo log is determined by the mode the databaseis using:• ARCHIVELOG - The filled online redo log files are archivedbefore they are reused

Strany 276 - Snapshot concepts

associated with managing data and disk and provides stripingand mirroring capabilities to optimize performance.automigration (VLS specific term) The f

Strany 277

located (drive on Windows and mount point on UNIX). Forintegration objects — backup stream identification, indicatingthe backed up database/applicatio

Strany 278 - Snapshot backup types

See also application system, target volume, and replica.backup types See incremental backup, differential backup, transaction backup,full backup, and

Strany 279 - Types of snapshots

1 About backup and DataProtectorIn this chapterThis chapter provides an overview of backup and restore concepts. It introduces DataProtector architect

Strany 280 - Snapshot concepts280

See also replica, source volume, snapshot, and CA+BC EVA.BC Process (EMC Symmetrix specific term) A protected storage environmentsolution that has def

Strany 281

See also BRBACKUP, and BRRESTORE.BRBACKUP (SAP R/3 specific term) An SAP R/3 backup tool that allows anonline or offline backup of the control file, o

Strany 282 - Snapshot concepts282

CAP (StorageTek specific term) Cartridge Access Port is a port builtinto the door panel of a library. The purpose is to enter or ejectmedia.catalog pr

Strany 283

Database(CMMDB)Change Journal (Windows specific term) A Windows filesystem feature that logsa record of each change as it occurs to the files and dire

Strany 284 - Snapshot concepts284

client backup withdisk discoveryA backup of all filesystems mounted on a client. When thebackup starts, Data Protector discovers the disks on the clie

Strany 285

between the MoM cell and the other Data Protector cells is highlyrecommendedSee also MoM.COM+ RegistrationDatabase(Windows specific term) The COM+ Reg

Strany 286

the CRS runs under the account of the user specified atinstallation time. On UNIX systems, it runs under the accountroot.CSM The Data Protector Copy a

Strany 287 - Concepts guide 287

they have common characteristics and share a common CAEVA log.See also copy set.database server A computer with a large database stored on it, such as

Strany 288 - Snapshot concepts288

a single device group. All devices in a device group must beon the same EMC Symmetrix unit. You can use a device groupto identify and work with a subs

Strany 289 - Copy service

directory junction (Windows specific term) Directory junctions use the reparsepoint concept of Windows. An NTFS 5 directory junction allowsyou to redi

Strany 290

Data Protector can be used in environments ranging from a single system tothousands of systems on several sites. Due to the network component concept

Strany 291

the backed up data, and increase the data availability andaccessibility for restore. The backup stages consist of backingup data to one media type fir

Strany 292

can also read the data from the medium and send it to thecomputer system.drive-basedencryptionData Protector drive-based encryption uses the encryptio

Strany 293

and to Data Protector users who are granted the Reportingand notifications user rights. You can view or delete allevents in the Event Log.Event Logs (

Strany 294

bi-directional transmission of large data files and can bedeployed between sites kilometers apart. Fibre Channel connectsnodes using three physical to

Strany 295

See also primary volume and MU number.flash recoveryarea(Oracle specific term) Flash recovery area is an Oracle 10g/11gmanaged directory, filesystem,

Strany 296

the directoryData_Protector_program_data\Config\Server\Options(Windows Server 2008),Data_Protector_home\Config\Server\Options (otherWindows systems),

Strany 297 - A Backup scenarios

hosting system A working Data Protector client used for Disk Delivery DisasterRecovery with a Data Protector Disk Agent installed.HP OperationsManager

Strany 298 - Backup scenarios298

information or method invocation, and returns standardizedresponses.See also HP StorageWorks EVA SMI-S Agent and CommandView (CV) EVA.HP StorageWorksV

Strany 299 - Company XYZ

See also backup types.incrementalmailbox backupAn incremental mailbox backup backs up all the changes madeto the mailbox after the last backup of any

Strany 300

Information Store (Microsoft Exchange Server specific term) The MicrosoftExchange Server service that is responsible for storagemanagement. Informatio

Strany 301

Data Protector enables you to meet the needs for continued business operationsaround the clock. In today's globally distributed business environm

Strany 302 - Backup strategy requirements

ISQL (Sybase specific term) A Sybase utility used to perform systemadministration tasks on Sybase SQL Server.Java GUI Client The Java GUI Client is a

Strany 303 - Proposed solution

library Also called autochanger, jukebox, autoloader, or exchanger.A library contains media in repository slots. Each slot holds onemedium (for exampl

Strany 304 - Backup scenarios304

An LCR copy is used for disaster recovery because you canswitch to the LCR copy in a few seconds. If an LCR copy is usedfor backup and if it is locate

Strany 305

login ID (Microsoft SQL Server specific term) The name a user uses tolog on to Microsoft SQL Server. A login ID is valid if MicrosoftSQL Server has an

Strany 306 - Backup scenarios306

mailbox store (Microsoft Exchange Server specific term) A part of theInformation Store that maintains information in user mailboxes.A mailbox store co

Strany 307

During a restore session, a Media Agent locates data on thebackup medium and sends it to the Disk Agent. The Disk Agentthen writes the data to the dis

Strany 308

merging This defines one mode to resolve file conflicts during restore. Ifthe file to be restored already exists at the destination, the onewith the m

Strany 309 - 31 GB / 3 h10 GB / 1 hAdmin

MMD The Media Management Daemon process (service) runs on theData Protector Cell Manager and controls media managementand device operations. The proce

Strany 310 - Backup scenarios310

OBDR capabledeviceA device that can emulate a CD-ROM drive loaded with abootable disk and can thus be used as a backup or boot devicefor disaster reco

Strany 311

period (several minutes or hours). For instance, for backupto tape, until streaming of data to the tape is finished.• For ZDB methods, the database is

Strany 312 - Backup scenarios312

The DSI integration provides a set of scripts and configuration files from whichusers are able to see how to add their own queries using Data Protecto

Strany 313 - Company ABC

• For ZDB methods, backup mode is required for the shortperiod of the data replication process only (several seconds).Normal database operation can th

Strany 314 - Backup scenarios314

overwrite An option that defines one mode to resolve file conflicts duringrestore. All files are restored from a backup even if they areolder than exi

Strany 315

COPY - The mirrored pair is currently re-synchronizing. Datais transferred from one disk to the other. The disks do notcontain the same data.•• PAIR -

Strany 316

pre-exec A backup option that executes a command or script before thebackup of an object or before the entire session is started.Pre-exec commands are

Strany 317

instance translates the commands into a sequence of low levelSCSI commands.rawdisk backup See disk image backup.RCU See Remote Control Unit (RCU).RDBM

Strany 318 - Backup scenarios318

Recovery Manager(RMAN)(Oracle specific term) An Oracle command-line interface thatdirects an Oracle Server process to back up, restore, or recoverthe

Strany 319 - 172243A*ABC Cape

is replicated. However, if a volume manager is used on UNIX,the whole volume or disk group containing a backup object(logical volume) is replicated. I

Strany 320

RSM (Windows specific term) Removable Storage Manager (RSM)includes a media management service that facilitatescommunication among applications, robot

Strany 321

shadow copy (Microsoft VSS specific term) A volume that represents aduplicate of the original volume at a certain point in time. Thedata is then backe

Strany 322 - Backup scenarios322

number. To read a medium, a robotic mechanism moves themedium from a slot into the drive.SMB See split mirror backup.smart copy (VLS specific term) A

Strany 323

Figure 2 Backup processIn most cases, the source is data on a disk, such as files, directories, databases, andapplications. If the backup is expected

Strany 324 - Backup scenarios324

use. However background copying processes normally continueafter creation.See also snapshot.source (R1) device (EMC Symmetrix specific term) An EMC Sy

Strany 325

split mirror restore (EMC Symmetrix and HP StorageWorks Disk Array XP specificterm) A process in which data backed up in a ZDB-to-tape or aZDB-to-disk

Strany 326

for a single-drive device and multiple SCSI entries are requiredfor a multi-drive library device.stackers Devices with multiple slots for media storag

Strany 327

synthetic backup A backup solution that produces a synthetic full backup, anequivalent to a conventional full backup in terms of data, withoutputting

Strany 328 - Backup options

tablespace A part of a database structure. Each database is logicallydivided into one or more tablespaces. Each tablespace has datafiles or raw volume

Strany 329

TNSNAMES.ORA (Oracle and SAP R/3 specific term) A network configurationfile that contains connect descriptors mapped to service names.The file may be

Strany 330 - Backup scenarios330

UIProxy The Java GUI Server (UIProxy service) runs on the DataProtector Cell Manager. It is responsible for communicationbetween the Java GUI Client a

Strany 331 - B Further information

user rights. Users have the access rights of the user group towhich they belong.vaulting media The process of storing media to a safe and remote place

Strany 332 - Further information332

virtual tape (VLS specific term) An archival storage technology that backsup data to disk drives in the same way as if it were being storedon tape. Be

Strany 333 - Incr1 backup

See also resync mode, source volume, primary volume (P-VOL),replica, secondary volume (S-VOL), and replica set rotation.VxFS Veritas Journal Filesyste

Strany 334 - Further information334

Media management ... 48Backup devices ...

Strany 335 - Full backup

Figure 4 Network backupTo accomplish backup of a network environment you need an application that allowsyou to:• Attach backup devices to any system i

Strany 336 - Further information336

XBSA interface (Informix Server specific term) ON-Bar and Data Protectorcommunicate with each other through the X/Open BackupServices Application Prog

Strany 337

ZDB to tape (ZDB specific term) A form of zero downtime backup wheredata in the replica produced is streamed to a backup medium,typically tape. Instan

Strany 339

IndexAadding data to media during backups,148ADIC (EMASS/GRAU) AML, 162admin user group, 185alarms, 208alternative disaster recovery methods,131operat

Strany 340 - Internationalization

backup with disk discovery, 225Backup Agents, 42backup clientsplit mirror backup, 267backup client as failover serversnapshot backup, 286split mirror

Strany 341 - File name handling

benefitsdisk backup, 254synthetic backup, 258Volume Shadow Copy service, 293benefits of online integrations, 240block sizebackup devices, 158default,

Strany 342 - Browsing file names

client systems, 42clients, 42installing, 64maintaining, 64cluster heartbeat, 80cluster (definition), 79cluster integrationsoverview, 82cluster node, 8

Strany 343 - Concepts guide 343

creating cellsmixed environment, 66UNIX environment, 64Windows domains, 65Windows workgroups, 66Windows environment, 65CRS, 220Ddaily maintenanceIDB o

Strany 344 - Further information344

database on the UNIX Cell ManagersIDB format, 189IDB location, 189database on the Windows CellManagerIDB format, 188IDB location, 188database architec

Strany 345 - Glossary

device lists, 155device locking, 159device sharing in clusters, 180device sharing in SAN, 175drives, 177robotics, 177device streaming (definition), 15

Strany 346 - Glossary346

The Data Protector internal database (IDB) keeps track of the files you back up sothat you can browse and easily recover the entire system or single f

Strany 347

Direct Library Access, 179dirty drive detection, 164disaster, 128Disaster RecoveryPhase 3, 129disaster recovery, 129Disaster Recoveryconcepts, 128over

Strany 348 - Glossary348

exchangers, 162See also librariesexpired catalog protection, 201exporting media, 102IDB operation, 195removed objects, 195Ffactors affecting restore d

Strany 349

IIDB, 187advantages, 187architecture, 189Catalog Database, 191Detail Catalog Binary Files, 192in the Manager-of-Managersenvironment, 189management, 19

Strany 350 - Glossary350

incremental backups, 71types, 93IndirectStorage Are Networks, 178Indirect Library AccessLibrary Access, 178Indirect Library Access, 179influence of lo

Strany 351

lock names, 159, 177log all detailed informationCatalog Database, 100log directory names onlyCatalog Database, 100log level of information, 104logging

Strany 352 - Glossary352

media pools, 135, 309, 325default, 136properties, 136usage examples, 140Media Agents, 42General Media Agent, 165media allocation policies, 144media al

Strany 353

monitoring, 38, 210, 211mount prompt handling, 111mount requests, 224, 232, 235automating, 224notification, 224responding, 224, 228mount requests (res

Strany 354 - Glossary354

planning cells, 62 - 67Cell Managers, 64Installation Servers, 64number of cells, 62planning performance, 67 - 73backup types, 71compression, 68devices

Strany 355

reporting, 38, 211reporting and notification, 311, 329broadcasts, 207e-mail, 207examples, 212HTML, 207SNMP, 207requirementsDirect backup, 249response

Strany 356 - Glossary356

Service Management, 37, 205 - 215Application Response Measurement,207monitor, 210notification, 211operative analyses of trends, 206overview, 205report

Strany 357

Systems to be backed upClient systems you want to back up must have the Data Protector Disk Agent (DA),also called Backup Agent, installed. To back up

Strany 358 - Glossary358

snapshot backup, 275application client, 277archive log backup, 278backup client, 277backup client as failover server, 286concepts, 276configuration, C

Strany 359

standalone devices, 161standalone devices, 160standalone file device, 255standard restore vs parallel restore, 228standard backup vs disk discovery, 2

Strany 360 - Glossary360

Vvaulting, 134, 151 - 153, 311, 329definition, 151restoring, 153restoring from a vault, 312, 330vaulting usage example, 152Veritas Cluster, 79virtual

Strany 361 - (EMC Symmetrix

Figure 6 Backup or restore operationBackup sessionsWhat is a backup session?A backup session, shown in Figure 7 on page 44, is a process that creates

Strany 362 - Glossary362

Figure 7 Backup sessionA typical backup session is more complex than the one shown in Figure 7 on page 44.A number of Disk Agents read data from multi

Strany 363

Enterprise environmentsWhat is an enterprise environment?A typical enterprise network environment, shown in Figure 9 on page 45, consistsof a number o

Strany 364 - Glossary364

Why split large environments into multiple cells?• Geographical grouping of systems.• Logical grouping of systems, for example, departments.• Slow net

Strany 365

Figure 11 Manager-of-Managers environmentManager-of-Managers provides the following features:• Centralized licensing repositoryThis enables simplified

Strany 366 - Glossary366

Media managementData Protector provides you with powerful media management, which lets you easilyand efficiently manage large numbers of media in your

Strany 367

Backup devicesData Protector defines and models each device as a physical device with its ownusage properties, such as the default pool. This device c

Strany 368 - Glossary368

Data Protector user groups ... 75Data Protector user rights ...

Strany 369

User interfacesData Protector provides easy access to all configuration and administration tasksusing the Data Protector GUI on Windows and UNIX platf

Strany 370 - Glossary370

• A Results Tab with all the configuration wizards, properties and lists.• Easy configuration and management of the backup of online database applicat

Strany 371

Figure 14 Original Data Protector GUIFigure 15 Data Protector Java GUIData Protector Java GUIThe Data Protector Java GUI is a Java-based graphical use

Strany 372 - Glossary372

client-server architecture. It enables backup management with the same look and feelas the original Data Protector GUI.The Java GUI consists of two co

Strany 373

Benefits of Java GUIThe Data Protector Java GUI has the following advantages over the original DataProtector GUI:• PortabilityThe Data Protector Java

Strany 374 - Glossary374

Overview of tasks to set up Data ProtectorThis section provides an overview of global tasks to set up your Data Protector backupenvironment. Depending

Strany 375

7. Install and configure your Data Protector environment.• Install the Data Protector Cell Manager system and use the Data Protectoruser interface to

Strany 376 - Glossary376

2 Planning your backupstrategyIn this chapterThis chapter describes backup strategy planning. It focuses on planning Data Protectorcells, performance,

Strany 377

Backup strategy planningData Protector is simple to configure and administer. However, if you work in a largeenvironment with diverse client systems a

Strany 378 - Glossary378

The allowed downtime has a significant impact on the investments into networkinfrastructure and equipment needed for backups. For each type of data, l

Strany 379

When to schedule backups ... 107Staggering full backups ...

Strany 380 - Glossary380

The time needed for backup depends on the type of backup, full or incremental.For more information, see “Full and incremental backups” on page 91. Dat

Strany 381

The need to guard premises to prevent unauthorized people from entering.This also includes safeguarding all relevant data against unauthorized access,

Strany 382 - Glossary382

• Consider backing up to a disk-based device. Besides other benefits, backupto disk reduces the time needed for backup and enables the use of advanced

Strany 383

is that it can require more administrative work or might even require a separateadministrator for each cell.• Size of each cellThe size of a Data Prot

Strany 384 - Glossary384

Installing and maintaining client systemsIf you have several UNIX and Windows client systems, an efficient mechanism forthe installation of Data Prote

Strany 385

that each client system is accessible from every other client system using the samefully qualified node name.Creating cells in the Windows environment

Strany 386 - Glossary386

Windows workgroupsSome of the configuration tasks require more steps in some cases, because there areno global users as in a domain. Software distribu

Strany 387

You can configure a single cell over geographically remote locations. In this case,you need to ensure that data transfer from each client system to th

Strany 388 - Glossary388

To maximize performance, use local backup configurations for high volumedatastreams.Network or server versus direct backupsSending data over a network

Strany 389 - StorageWorks EVA

High performance hardware other than devicesPerformance of computer systemsThe speed of computer systems themselves directly impacts performance. The

Strany 390 - Disk Array XP

Vaulting ... 151Restoring from media in a vault ...

Strany 391

3 fast tape devices, consider using 3 dedicated network links between system_Aand system_B.• Load BalancingUsing this Data Protector feature, Data Pro

Strany 392 - Glossary392

Full and incremental backupsA basic approach to improve performance is to reduce the amount of data to backup. Carefully plan your full and incrementa

Strany 393

Disk performanceAll data that Data Protector backs up resides on disks in your systems. Therefore, theperformance of disks directly influences backup

Strany 394 - (ZDB specific term)

improve performance in your specific environment and determine the optimumasynchronous reading settings.SAN performanceIf large volumes of data need t

Strany 395

Data Protector security featuresThe following features allow and restrict access to Data Protector and the backed updata. The items in this list are d

Strany 396 - Glossary396

When is the account checked?When a user starts the Data Protector user interface, Data Protector checks user rights.User rights are also checked when

Strany 397

Visibility of backed up dataBacking up data means creating a new copy. Therefore, when you deal withconfidential information, it is important to restr

Strany 398 - Glossary398

encrypts the data. Thus the backed up data is encrypted before it is transferred overthe network and written to media.Figure 17 on page 77 shows a bas

Strany 399

If a source medium involved in an automatic media copy session stores encryptedas well as non-encrypted data, all data written to the corresponding ta

Strany 400 - Glossary400

the CRS process is running, or the user specified as the owner in the backupspecification options. For instructions on how to specify a backup owner,

Strany 401

Data Protector user rights ... 1855 The Data Protector internal database ...

Strany 402 - Glossary402

Figure 19 Typical clusterComponents:• Cluster nodes (two or more)• Local disks• Shared disks (shared between nodes)Cluster nodesCluster nodes are comp

Strany 403

you can make an appropriate determination of the ownership of the package(MC/SG, Veritas Cluster) or group (MSCS).What is a package or group?A package

Strany 404

A cluster-aware Data Protector Cell Manager that is responsible for running the IDBand managing backup and restore operations has many major benefits

Strany 405

• The Data Protector client is installed in a cluster. The Cell Manager (if not installedin the cluster) in such a case is not fault tolerant; the ope

Strany 406

Figure 20 Cell Manager installed outside a clusterWhen creating a backup specification, you can see three or more systems that canbe backed up in the

Strany 407

The following is the expected backup behavior under this configuration.Table 3 Backup behaviorResultConditionSuccessful backupFailover of the node bef

Strany 408

Figure 21 Cell Manager installed outside a cluster, devices connectedto the cluster nodesWhen creating a backup specification, you can see three or mo

Strany 409

NOTE:The difference with the previous example is that each of the cluster nodes has a DataProtector Media Agent installed. Additionally, you need to u

Strany 410

Data Protector cluster critical resources are defined in the same package(MC/ServiceGuard) or group (Microsoft Cluster Server) as the applicationclust

Strany 411

Figure 22 Cell Manager installed in the cluster, devices connected tocluster nodesWhen creating a backup specification, you can see three or more syst

Strany 412

Data Protector log files ... 213Windows application log ...

Strany 413

NOTE:Clusters do not support a SCSI bus with shared tapes. To bring high availability also toMedia Agents, the Fibre Channel technology can be used as

Strany 414

ResultConditionFilesystem/disk image backup The backup session fails at failoverof the node where the filesystem is installed. The completedobjects fr

Strany 415

Incremental backupFull backupA restore takes more time becauseof the number of media needed.Enables simple and quick restore.RestoreOccupies less spac

Strany 416

Incremental backups depend on the last full backup. If you specify an incrementalbackup and there is no protected full backup, a full backup is perfor

Strany 417

Incr A simple incremental backup, shown in Figure23 on page 95, is based on the last backup that is stillprotected, which can be a full backup or an i

Strany 418

Figure 23 Incremental backupsFigure 24 Leveled incremental backupsTable 7 on page 95 shows the relative referencing of backup runs with variousbackup

Strany 419

Incr3<----Incr1<----Full8Incr3<----Incr2<----Incr1<----Full9Incr3<----Incr2<----<----<----Full10Incr3<----<----<--

Strany 420

TIP:Use the Data Protector Appendable on Incrementals Only option to keep data from fulland incremental backups (of the same backup specification) on

Strany 421

Figure 25 Media needed to restore from simple and leveled incrementalbackupsFigure 26 Media needed to restore from leveled incremental backupsNote tha

Strany 422

Keeping backed up data and information about thedataData Protector lets you specify how long to keep your backed up data on the mediaitself (data prot

Komentáře k této Příručce

Žádné komentáře