HP B6960-90078 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software HP B6960-90078. HP B6960-90078 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 856
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
HP OpenView Storage Data Protector
Administrator’s Guide
Manual Edition: May 2003
Manufacturing Part Number: B6960-90078
Release A.05.10
© Copyright Hewlett-Packard Development Company, L.P.2003.
Zobrazit stránku 0
1 2 3 4 5 6 ... 855 856

Shrnutí obsahu

Strany 1 - Administrator’s Guide

HP OpenView Storage Data ProtectorAdministrator’s GuideManual Edition: May 2003Manufacturing Part Number: B6960-90078Release A.05.10© Copyright Hewlet

Strany 2 - Legal Notices

Contentsx7. Monitoring, Reporting, Notifications, and the Event LogIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 3

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 270Disabling a Backup DeviceDisabling a backup device is useful when the device i

Strany 4

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 2 71Figure 2-12 Disable Device

Strany 5

Configuring and Using Backup DevicesRemoving a Backup DeviceChapter 272Removing a Backup Device By removing a backup device from the Data Protector co

Strany 6

Configuring and Using Backup DevicesRenaming a Backup DeviceChapter 2 73Renaming a Backup DeviceWhen you rename a backup device, the device is no long

Strany 7

Configuring and Using Backup DevicesDevice LockingChapter 274Device LockingInternal Locking The internal locking of backup devices prevents two Data P

Strany 8

Configuring and Using Backup DevicesDevice LockingChapter 2 75Data Protector recognizes in order to lock the device before starting backup and restore

Strany 9

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 276Device Concurrency, Segment Size, and Block SizeStreami

Strany 10 - Contents

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 77Figure 2-13 Advanced Options Dialog Box: Concurrency

Strany 11

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 278Figure 2-14 Device Properties Dialog Box: ConcurrencyCh

Strany 12

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 79You can change the segment size in the Advanced Option

Strany 13

Contents xiGenerating the Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Configuring Notif

Strany 14

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 280Before changing the block size for a particular SCSI ca

Strany 15

Chapter 3 813 Configuring Users and User Groups

Strany 16

Configuring Users and User GroupsIn This ChapterChapter 382In This ChapterThis chapter explains how to configure both user groups and individual users

Strany 17

Configuring Users and User GroupsData Protector User RightsChapter 3 83Data Protector User RightsData Protector users have the user rights of the user

Strany 18

Configuring Users and User GroupsData Protector User RightsChapter 384Start backup specification Allows the user to perform a backup using a backup

Strany 19 - Printing History

Configuring Users and User GroupsData Protector User RightsChapter 3 85Start restore Allows users to restore their own data as well as monitor and a

Strany 20

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 386Predefined Data Protector User GroupsThe following default groups are

Strany 21 - Conventions

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 3 87The user rights you have set on the Cell Manager determine the avail

Strany 22

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 388Adding or Deleting a User GroupThe default Data Protector user groups are s

Strany 23 - Contact Information

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 3 89Deleting a User Group1. In the Data Protector Manager, switch to the Users

Strany 24

ContentsxiiReducing the IDB Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Reducing the IDB Size

Strany 25 - Data Protector Documentation

Configuring Users and User GroupsAdding or Deleting a UserChapter 390Adding or Deleting a UserAfter the product installation, the following users are

Strany 26

Configuring Users and User GroupsAdding or Deleting a UserChapter 3 91Figure 3-2 Adding New UsersFor further information, press F1.

Strany 27

Configuring Users and User GroupsModifying a UserChapter 392Modifying a UserYou can change the properties of an existing user, or move the user from o

Strany 28

Configuring Users and User GroupsChanging User Group RightsChapter 3 93Changing User Group RightsUsers have the rights of the groups to which they bel

Strany 29 - In This Book

Configuring Users and User GroupsExample User ConfigurationsChapter 394Example User ConfigurationsThis section gives some examples of typical user con

Strany 30 - Organization

Configuring Users and User GroupsExample User ConfigurationsChapter 3 952. Add the users who will be able to configure their own backups to this user

Strany 31 - 1 Introducing Data Protector

Configuring Users and User GroupsExample User ConfigurationsChapter 396

Strany 32

Chapter 4 974 Managing Media

Strany 33

Managing MediaIn This ChapterChapter 498In This ChapterThis chapter gives detailed information on how to manage your media, including:“Overview of Dat

Strany 34 - How a Restore Session Works

Managing MediaOverview of Data Protector Media ManagementChapter 4 99Overview of Data Protector Media ManagementData Protector provides a powerful med

Strany 35

Contents xiiiPreparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460Recove

Strany 36

Managing MediaOverview of Data Protector Media ManagementChapter 4100• The ability to store information about media in a central place and share this

Strany 37 - Graphical User Interface

Managing MediaOverview of Data Protector Media ManagementChapter 4 101“Creating a Media Pool” on page 102.“Adding Media to a Media Pool” on page 107.2

Strany 38

Managing MediaCreating a Media PoolChapter 4102Creating a Media PoolWhat Is a Media Pool?A media pool represents a set of media of the same type (for

Strany 39

Managing MediaCreating a Media PoolChapter 4 103Properties of a Media PoolThis section describes the properties of a media pool. You specify them when

Strany 40

Managing MediaCreating a Media PoolChapter 4104If InitOnLoosePolicy is set to 1 (by default, it is set to 0) media that are unrecognized by Data Prote

Strany 41 - The Command-Line Interface

Managing MediaCreating a Media PoolChapter 4 105medium is used first. If additional media are needed during the same backup session, they must be free

Strany 42

Managing MediaCreating a Media PoolChapter 4106Maximum number of overwrites The usage of a medium is defined as the number of overwrites from the beg

Strany 43

Managing MediaAdding Media to a Media PoolChapter 4 107Adding Media to a Media PoolOnce you have created a media pool, you have to add the media that

Strany 44

Managing MediaFormatting MediaChapter 4108Formatting MediaWh at Is Forma tting Media?Formatting media prepares them for use with Data Protector by sa

Strany 45

Managing MediaFormatting MediaChapter 4 109How to Format MediaTo format media, browse for the specific device, media pool, or library slot in the Devi

Strany 46

ContentsxivGeneral Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514Troubleshooting Ass

Strany 47 - Chapter 2 17

Managing MediaFormatting MediaChapter 4110Figure 4-2 Cartridge Memory Reformat for Specific Slot What’s Next? Once you have formatted your media, you

Strany 48

Managing MediaFormatting MediaChapter 4 111TIP To format media used by other applications, use the Force Operation option. Data Protector protected me

Strany 49

Managing MediaFormatting MediaChapter 4112NOTE Do not rely on Data Protector to recognize other media types, as recognition depends on the platforms y

Strany 50 - Configuring Backup Devices

Managing MediaImporting MediaChapter 4 113Importing Media Importing media adds media already used by Data Protector to a media pool, without losing th

Strany 51

Managing MediaImporting MediaChapter 4114Figure 4-3 Import Multiple MediaImporting the Catalog from MediaImporting the catalog from a medium writes th

Strany 52 - Chapter 222

Managing MediaImporting MediaChapter 4 115Figure 4-4 Import CatalogImporting Media in a Magazine DeviceIf you use a device with magazine support, Data

Strany 53

Managing MediaImporting MediaChapter 4116Figure 4-5 Import MagazineHow to Import a Single Medium into a MagazineTo import a single medium into a magaz

Strany 54

Managing MediaAppending Backups to MediaChapter 4 117Appending Backups to MediaData Protector allows you to add new backups to media which already con

Strany 55

Managing MediaAppending Backups to MediaChapter 4118• Link a different pool to each client in the backup specification, or create a separate backup sp

Strany 56 - Configuring File Devices

Managing MediaUsing a Pre-Allocation List of Media for BackupChapter 4 119Using a Pre-Allocation List of Media for BackupYou can specify the order in

Strany 57

Contents xvTroubleshooting Data Protector Services and Daemons . . . . . . . . . . . . . . . . . . . . . . . 569Problems Starting Data Protector Ser

Strany 58

Managing MediaSelecting Media for BackupChapter 4120Selecting Media for BackupData Protector media management automatically selects the most appropria

Strany 59 - Configuring Library Devices

Managing MediaSelecting Media for BackupChapter 4 121Media in poor condition are not used for backup. Media in fair condition are used only if no medi

Strany 60

Managing MediaSetting Data Protection for MediaChapter 4122Setting Data Protection for MediaData Protector keeps track of data on every medium used. W

Strany 61

Managing MediaRecycling MediaChapter 4 123Recycling Media Data Protector keeps track of data on every medium used. When configuring a backup, you prot

Strany 62

Managing MediaMoving Media to Another PoolChapter 4124Moving Media to Another PoolData Protector lets you move a medium from one media pool to another

Strany 63 - Chapter 2 33

Managing MediaExporting Media from Data ProtectorChapter 4 125Exporting Media from Data ProtectorWhat Is Exporting Media?Exporting (removing) a medium

Strany 64 - Configuring Magazine Devices

Managing MediaModifying Media LocationsChapter 4126Modifying Media LocationsWhat Is a Location?The media location helps you to physically locate the m

Strany 65 - Configuring Stacker Devices

Managing MediaModifying Media DescriptionsChapter 4 127Modifying Media DescriptionsWhat Is a Description?The media description helps you identify medi

Strany 66

Managing MediaVerifying Data on a MediumChapter 4128Verifying Data on a MediumWhat Is Verifying? Verifying a medium shows whether the data on the medi

Strany 67

Managing MediaScanning Media in a DeviceChapter 4 129Scanning Media in a DeviceWhat Is Scanning? You scan a device to update Data Protector informatio

Strany 68

ContentsxviTemporary Directory Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597Problems During Backup

Strany 69 - Configuration Procedure

Managing MediaScanning Media in a DeviceChapter 4130List Cartridge Memory List Cartridge Memory, available for Cartridge Memory enabled drives, is equ

Strany 70

Managing MediaChecking the Condition of a MediumChapter 4 131Checking the Condition of a MediumData Protector allows you to view information about the

Strany 71 - Support of New Devices

Managing MediaChecking the Condition of a MediumChapter 4132Cartridge Memory ListTo view some additional information about Cartridge Memory enabled me

Strany 72

Managing MediaChecking the Condition of a MediumChapter 4 133Statuses of Media and Media PoolsMedia or media pools can have three statuses, based on t

Strany 73

Managing MediaChecking the Condition of a MediumChapter 4134Changing How Media Condition Is CalculatedWhen you add a medium to a media pool, you can d

Strany 74

Managing MediaSearching for and Selecting a MediumChapter 4 135Searching for and Selecting a MediumUse this function to locate and select specific med

Strany 75 - Chapter 2 45

Managing MediaEntering a Medium into a DeviceChapter 4136Entering a Medium into a DeviceData Protector allows you to physically enter media into a lib

Strany 76

Managing MediaEjecting a Medium from a DeviceChapter 4 137Ejecting a Medium from a DeviceData Protector allows you to physically eject media from the

Strany 77 - Configuration Overview

Managing MediaEjecting a Medium from a DeviceChapter 4138TIP Ejecting of media can be scheduled. Refer to “Scheduled Eject of Media” on page 138 for d

Strany 78

Managing MediaEjecting a Medium from a DeviceChapter 4 139If media are not removed from the mail slots after a default time span, and there are still

Strany 79

Contents xvii14. ADIC/GRAU DAS and STK ACS LibrariesIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 80

Managing MediaVaulting MediaChapter 4140Vaulting MediaWhat Is Vaulting? Vaulting is a process of moving media with important information to a safe pla

Strany 81

Managing MediaVaulting MediaChapter 4 1414. Select the media that you want to store in the vault, change the location of the media, eject the media, a

Strany 82

Managing MediaVaulting MediaChapter 41422. Take the media from a vault, enter the media in the library, and scan them.3. If the catalog protection for

Strany 83

Managing MediaCopying MediaChapter 4 143Copying MediaWhat Is Media Copying?Data Protector enables copying of backed up data to a second set of media.

Strany 84

Managing MediaCopying MediaChapter 4144NOTE When copying media, it is possible that the target medium reaches the end of the tape before the source me

Strany 85

Managing MediaCopying MediaChapter 4 145Automated Media CopyingWhat Is Automated Media Copying?Automated media copying is an automated process that cr

Strany 86

Managing MediaCopying MediaChapter 4146target medium is selected to which the data will be copied. The target media are selected from the same media p

Strany 87

Managing MediaDetection of Write-Protected MediaChapter 4 147Detection of Write-Protected MediaData Protector can detect and handle media that has bee

Strany 88

Managing MediaUsing Different Media Format TypesChapter 4148Using Different Media Format TypesData Protector recognizes and uses two different format

Strany 89

Managing MediaModifying Views in the Media Management WindowChapter 4 149Modifying Views in the Media Management WindowYou can customize the informati

Strany 90

ContentsxviiiCreating a libaci.o on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-26Example of th

Strany 91 - Drive Cleaning

Managing MediaModifying Views in the Media Management WindowChapter 4150

Strany 92

Chapter 5 1515Backup

Strany 93

BackupIn This ChapterChapter 5152In This ChapterThis chapter explains how to back up your data. It also describes some advanced Data Protector feature

Strany 94

BackupConfiguring a BackupChapter 5 153Configuring a BackupA backup is a process that creates a copy of system data on backup media. This copy is stor

Strany 95 - Busy Drive Handling

BackupConfiguring a BackupChapter 5154A backup session is based on the backup specification, and can be started interactively. During the backup sessi

Strany 96 - Activating Barcode Support

BackupConfiguring a BackupChapter 5 155Key Points • The backup type (full or incremental) is the same for the whole backup session. All data in a grou

Strany 97 - Chapter 2 67

BackupConfiguring a BackupChapter 5156Figure 5-2 Create New Backup Dialog Box5. Select what you want to back up. Figure 5-3 on page 157 shows data sou

Strany 98

BackupConfiguring a BackupChapter 5 157Figure 5-3 Source Page of the Backup Wizard 6. Select the device(s) that will be used to back up your data. See

Strany 99 - Chapter 2 69

BackupConfiguring a BackupChapter 5158Figure 5-4 Device Page of the Backup Wizard7. Select backup options. See “Using Backup Options” on page 225 for

Strany 100 - Disabling a Backup Device

BackupConfiguring a BackupChapter 5 159Figure 5-5 Backup Object Summary Page10. In the final page of the Backup wizard, you can save the backup specif

Strany 101 - Figure 2-12 Disable Device

xixPrinting HistoryThe manual printing date and part number indicate its current edition. The printing date will change when a new edition is printe

Strany 102 - Removing a Backup Device

BackupConfiguring a BackupChapter 5160Figure 5-6 Final Page of the Backup Wizard11.Click Start Backup to run the backup interactively. The Start Backu

Strany 103 - Renaming a Backup Device

BackupBacking Up UNIX SystemsChapter 5 161Backing Up UNIX SystemsYou can install a Disk Agent on every UNIX system in order to back it up. Alternative

Strany 104 - Device Locking

BackupBacking Up UNIX SystemsChapter 5162Data Protector provides a sophisticated mechanism for incremental backups. To determine which files have chan

Strany 105

BackupBacking Up UNIX SystemsChapter 5 163Backing Up Clients Using Disk DiscoveryHow Are Disks Discovered?If you specify a client backup with disk dis

Strany 106

BackupBacking Up UNIX SystemsChapter 5164Figure 5-7 Selecting an Entire Client to Be Backed Up NOTE Selecting all of the client’s drives is not the sa

Strany 107 - Chapter 2 77

BackupBacking Up UNIX SystemsChapter 5 165To back up this filesystem using NFS, follow the same procedure as if you were backing up any other filesyst

Strany 108

BackupBacking Up UNIX SystemsChapter 5166NOTE It is recommended to have root permission on mounted NFS filesystems.When to Use NFS BackupUse NFS backu

Strany 109

BackupBacking Up UNIX SystemsChapter 5 167IMPORTANT Unmount a disk before a disk image backup and mount it later. You can use pre- and post- exec comm

Strany 110

BackupBacking Up Windows SystemsChapter 5168Backing Up Windows SystemsPrerequisites You have to install a Disk Agent on at least one Windows computer

Strany 111 - 3 Configuring Users and User

BackupBacking Up Windows SystemsChapter 5 169• NTFS alternate data streams • NTFS security dataNOTE The sharing properties of a folder are not stored

Strany 112 - In This Chapter

iiLegal Notices Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of mer

Strany 114

BackupBacking Up Windows SystemsChapter 5170NTFS 3.x Filesystem FeaturesThe NTFS 3.x filesystem has introduced new file attributes and concepts, which

Strany 115

BackupBacking Up Windows SystemsChapter 5 171The advantages of the VSS filesystem backup are the following:• A computer can be backed up while applica

Strany 116

BackupBacking Up Windows SystemsChapter 5172Sparse Files Sparse files contain many zero data sets as opposed to, for example, compressed files. At bac

Strany 117

BackupBacking Up Windows SystemsChapter 5 173Figure 5-9 Specifying Objects Using Manual AddFor detailed steps, refer to the online Help index keyword

Strany 118 - Adding a User Group

BackupBacking Up Windows SystemsChapter 5174Figure 5-10 Windows NT CONFIGURATION TIP The SystemRecoveryData file is only needed for Windows disaster r

Strany 119 - Deleting a User Group

BackupBacking Up Windows SystemsChapter 5 175 See “Backing Up WINS, DHCP, and DNS” on page 178.• SysVolSysVol is a shared directory that stores the se

Strany 120 - Adding or Deleting a User

BackupBacking Up Windows SystemsChapter 5176Backing Up CONFIGURATIONOnly one CONFIGURATION backup can run on a system at the time. You have to expand

Strany 121

BackupBacking Up Windows SystemsChapter 5 177Figure 5-12 System State on Windows 2000/XP/Server 2003Backing Up the Windows Registry The database repos

Strany 122 - Modifying a User

BackupBacking Up Windows SystemsChapter 5178Figure 5-13 Backing Up the Windows RegistryBacking Up WINS, DHCP, and DNSWINS, DHCP, DNS ServersIn TCP/IP

Strany 123 - Changing User Group Rights

BackupBacking Up Windows SystemsChapter 5 179Backing Up the Windows 2000/XP/Server 2003 ServicesBacking up the Windows 2000/XP/Server 2003 services me

Strany 124 - Example User Configurations

xxiConventionsThe following typographical conventions are used in this manual.Table 2Convention Meaning ExampleItalic Book or manual titles, and man

Strany 125

BackupBacking Up Windows SystemsChapter 5180This service provides automatic distribution of events to subscribing COM+ components. To back up this dat

Strany 126 - Chapter 396

BackupBacking Up Windows SystemsChapter 5 181For example, if you use Active Directory to publish Certificate Revocation Lists (CLRs), back up the Acti

Strany 127 - 4 Managing Media

BackupBacking Up Windows SystemsChapter 5182net stop/start “Remote Storage Engine”net stop/start “Remote Storage File”The RSS databases are located in

Strany 128

BackupBacking Up Windows SystemsChapter 5 183See also “Warnings When Backing Up System Disks” on page 263. Event Logs Event logs are files where the W

Strany 129 - Management

BackupBacking Up Windows SystemsChapter 5184How to Perform a BackupTo perform a Windows client backup, you have to create a backup specification as de

Strany 130 - Media Life Cycle

BackupBacking Up Windows SystemsChapter 5 185See “Using Backup Options” on page 225 for information on using and structuring your backup specification

Strany 131

BackupBacking Up Windows SystemsChapter 5186IMPORTANT The Disk Agent client must have the Inet service configured using an account with access to the

Strany 132 - Creating a Media Pool

BackupBacking Up Windows SystemsChapter 5 1879. Enter the required information. See online Help for details.Setting the User Account for the Data Prot

Strany 133 - Properties of a Media Pool

BackupBacking Up Windows SystemsChapter 5188Figure 5-16 Inet Logon Option on Windows NT7. Click OK to return to the Services dialog box.8. Ensure that

Strany 134

BackupBacking Up Windows SystemsChapter 5 189Figure 5-17 Inet General Property Page on Windows 2000/XP/Server 20034. In the Log On As area, select the

Strany 135

xxiiData Protector provides a cross-platform (Windows and UNIX) graphical user interface. Figure 1 Data Protector Graphical User Interface

Strany 136

BackupBacking Up Windows SystemsChapter 5190Figure 5-18 Inet Logon option on Windows 2000/XP/Server 20037. Click Apply to apply the changes and then r

Strany 137 - Adding Media to a Media Pool

BackupBacking Up Windows SystemsChapter 5 191How to Specify a Disk Image SectionYou can specify a disk image section in two ways. In case of a zero do

Strany 138 - Formatting Media

BackupBacking Up Windows SystemsChapter 5192Figure 5-19 The Numbers Representing Disks (Physical Drive Number) on Windows 2000 SystemNOTE The numbers

Strany 139

BackupBacking Up Windows SystemsChapter 5 193Figure 5-20 The Manual Add Functionality

Strany 140

BackupBacking Up Novell NetWare SystemsChapter 5194Backing Up Novell NetWare SystemsThis section describes how to back up Novell NetWare filesystems a

Strany 141

BackupBacking Up Novell NetWare SystemsChapter 5 195• Trustee information• Inherited right mask• File and directory attributes• Time attributes (creat

Strany 142

BackupBacking Up Novell NetWare SystemsChapter 5196• The Compress option • The omit_deleted_files option (restore option)Files of up to 4 GB are backe

Strany 143 - Importing Media

BackupBacking Up Novell NetWare SystemsChapter 5 197Figure 5-21 Backing Up NetWare 4.x and NetWare 5.x Configuration

Strany 144

BackupBacking Up Novell NetWare SystemsChapter 5198Client Backup with Disk DiscoveryYou can discover disks (volumes) on NetWare just as you can for UN

Strany 145

BackupBacking Up Novell NetWare SystemsChapter 5 199Backing Up NetWare Directory Services (NDS) Data Protector backs up NDS using Novell NetWare Stora

Strany 146

xxiiiContact InformationGeneral InformationGeneral information about Data Protector can be found athttp://www.hp.com/go/dataprotectorTechnical Suppo

Strany 147 - Appending Backups to Media

BackupBacking Up Novell NetWare SystemsChapter 5200has its counterpart used by Data Protector, containing forward slashes, which are used for Windows

Strany 148

BackupBacking Up OpenVMS SystemsChapter 5 201Backing Up OpenVMS SystemsThis section describes how to back up OpenVMS filesystems.Backing Up OpenVMS Fi

Strany 149

BackupBacking Up OpenVMS SystemsChapter 5202Files can be backed up from mounted FILES-11 ODS-2 or ODS-5 volumes only.Limitations • Any file specificat

Strany 150 - Selecting Media for Backup

BackupBacking Up OpenVMS SystemsChapter 5 203Files with multiple directory entries are only backed up once using the primary path name. The secondary

Strany 151

BackupBacking Up in a Direct Backup EnvironmentChapter 5204Backing Up in a Direct Backup EnvironmentThis section provides the steps for the configurat

Strany 152

BackupBacking Up in a Direct Backup EnvironmentChapter 5 205• You need to have appropriate user rights for performing a backup. Refer to Chapter 3, “C

Strany 153 - Recycling Media

BackupBacking Up in a Direct Backup EnvironmentChapter 5206•rawdisks• Oracle8i databases (online)• Oracle8i databases (offline)Backing Up RawdisksPlea

Strany 154 - Moving Media to Another Pool

BackupScheduling Unattended BackupsChapter 5 207Scheduling Unattended BackupsData Protector allows you to configure unattended backups by scheduling b

Strany 155

BackupScheduling Unattended BackupsChapter 5208• Each backup specification can be scheduled multiple times with different option values. Within one ba

Strany 156 - Modifying Media Locations

BackupScheduling Unattended BackupsChapter 5 209Starting Backups on Specific DatesData Protector allows you to define the date and time when you want

Strany 158 - Verifying Data on a Medium

BackupScheduling Unattended BackupsChapter 5210Fortnightly full Data Protector runs a full backup every second Friday. Between these backups, Data Pro

Strany 159 - Scanning Media in a Device

BackupScheduling Unattended BackupsChapter 5 211To disable a backup schedule, select the Disable Schedule option in the Schedule property page. The ba

Strany 160

BackupScheduling Unattended BackupsChapter 5212Running Consecutive BackupsYou can start a backup after one is finished. For example, you can start a b

Strany 161

BackupSelecting a Backup Type: Full or IncrementalChapter 5 213Selecting a Backup Type: Full or IncrementalTo save time and media during a backup, you

Strany 162

BackupSelecting a Backup Type: Full or IncrementalChapter 5214backup. Even if the previous backup was an incremental (Incr or Incr1, Incr2, ...) backu

Strany 163

BackupSelecting a Backup Type: Full or IncrementalChapter 5 215How to Read Table 5-1• The rows in Table 5-1 are independent of each other and show dif

Strany 164

BackupUsing Backup TemplatesChapter 5216Using Backup Templates Overview Data Protector backup templates are a powerful tool that can help you simplify

Strany 165

BackupUsing Backup TemplatesChapter 5 217Figure 5-22 Options Offered by TemplatesDestination Backup device settings specified in your template apply

Strany 166

BackupUsing Backup TemplatesChapter 5218Using a Backup Template When Creating a New Backup SpecificationWhen creating a new backup specification, Data

Strany 167

BackupUsing Backup TemplatesChapter 5 219To apply a template to backup specifications, right-click the backup specification and click Apply Template.

Strany 168 - Scheduled Eject of Media

xxvData Protector DocumentationData Protector documentation comes in the form of manuals and online Help.Manuals Data Protector manuals are availabl

Strany 169

BackupUsing Backup TemplatesChapter 5220Creating a New TemplateYou can create new templates and use them for creating or modifying backup specificatio

Strany 170 - Vaulting Media

BackupUsing Backup TemplatesChapter 5 221For more information on individual options, refer to “Using Backup Options” on page 225.

Strany 171 - Moving Media to a Vault

BackupGroups of Backup SpecificationsChapter 5222Groups of Backup SpecificationsData Protector offers you the ability to organize backup specification

Strany 172

BackupGroups of Backup SpecificationsChapter 5 223Figure 5-26 Example of Backup Specification GroupsHow to View and Create GroupsThe following procedu

Strany 173 - Copying Media

BackupGroups of Backup SpecificationsChapter 5224How to Delete a GroupBefore deleting a group, you have to empty it first. One way of doing this is to

Strany 174

BackupUsing Backup OptionsChapter 5 225Using Backup OptionsData Protector offers a comprehensive set of backup options to help you fine-tune your back

Strany 175 - Automated Media Copying

BackupUsing Backup OptionsChapter 5226For split mirror and snapshot backups, the backup type is ignored (it is set to full). Data protection that is s

Strany 176

BackupUsing Backup OptionsChapter 5 227Figure 5-27 Backup OptionsMost Frequently Used Backup OptionsThis section describes the options that are most l

Strany 177

BackupUsing Backup OptionsChapter 5228Data Protection: Specifying How Long Data Is Kept on the MediaConfiguring protection policies is extremely impor

Strany 178

BackupUsing Backup OptionsChapter 5 229You can specify a different period of protection for each individual or periodic scheduled backup. The data pro

Strany 179

xxvi• HP OpenView Storage Data Protector UNIX Integration GuideThis manual describes integrations running on the UNIX operating system, such as Oracle

Strany 180 - Chapter 4150

BackupUsing Backup OptionsChapter 5230Figure 5-29 Backup Object Properties - Options: ProtectionCatalog Protection: How Long Info Is Kept in the Datab

Strany 181 - Chapter 5 151

BackupUsing Backup OptionsChapter 5 231Even when catalog protection expires, you are still able to restore, but you must specify filenames manually.Be

Strany 182

BackupUsing Backup OptionsChapter 5232The different logging level settings influence the IDB growth, backup speed, and the convenience of browsing dat

Strany 183 - Configuring a Backup

BackupUsing Backup OptionsChapter 5 233When to Use Load BalancingIt is recommended that you use the Load Balancing option when you want to back up a l

Strany 184

BackupUsing Backup OptionsChapter 5234• Objects that reside on the client connected to the backup device have a higher priority.• Objects are selected

Strany 185

BackupUsing Backup OptionsChapter 5 235• If load balancing is only selected in the template, the device options are applied only if the backup specifi

Strany 186

BackupUsing Backup OptionsChapter 5236Changing the owner works only for saved backup specifications. If the backup configuration is changed and not sa

Strany 187

BackupUsing Backup OptionsChapter 5 237Figure 5-30 Backup Specification Options - General and OtherAvailable Backup Specification OptionsDescriptionYo

Strany 188

BackupUsing Backup OptionsChapter 5238• root on UNIX Cell Managers• the user specified at installation time on Windows Cell ManagersThe default value

Strany 189

BackupUsing Backup OptionsChapter 5 239See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying post-exec commands

Strany 190

xxviiHP OpenView Storage Data Protector Integration Guide for HP OpenViewThis manual describes how to install, configure, and use the integration of

Strany 191 - Backing Up UNIX Systems

BackupUsing Backup OptionsChapter 5240Figure 5-31 Filesystem Options Setting the Disk Image Options1. Select the backup specification.2. Select the Op

Strany 192

BackupUsing Backup OptionsChapter 5 241See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying pre-exec commands o

Strany 193

BackupUsing Backup OptionsChapter 5242Figure 5-33 Object Properties - General and Trees/Filters The Object Properties window for a UNIX filesystem con

Strany 194 - Backing Up Disks Using NFS

BackupUsing Backup OptionsChapter 5 243Figure 5-34 Object Properties - General and Disk Image Options 4. Set the options and click OK to confirm the s

Strany 195

BackupUsing Backup OptionsChapter 5244is made. In the second traverse, only one hard link is backed up with the file contents, while all the others ar

Strany 196

BackupUsing Backup OptionsChapter 5 245EncodeOpen Systems and public networking make data security in large enterprises essential. Data Protector lets

Strany 197

BackupUsing Backup OptionsChapter 5246Open Files (Windows-Specific Option)This option controls what Data Protector does when it encounters open Window

Strany 198 - Backing Up Windows Systems

BackupUsing Backup OptionsChapter 5 247Report Open Locked Files As (Windows-Specific Option)This option sets the report level for files that are opene

Strany 199

BackupUsing Backup OptionsChapter 5248Use Shadow Copy (Windows-Specific Option)When performing filesystem backup on Windows Sever 2003 systems, Data P

Strany 200

BackupUsing Backup OptionsChapter 5 249Device Backup OptionsYou can select the options listed below for each backup device in use. None of the setting

Strany 202

BackupPre- and Post-Exec CommandsChapter 5250Pre- and Post-Exec CommandsBefore a backup or restore session begins, an additional action is sometimes n

Strany 203 - Backing Up CONFIGURATION

BackupPre- and Post-Exec CommandsChapter 5 251c. The post-exec (for each object in the backup specification) starts and completes.3. The post-exec com

Strany 204

BackupPre- and Post-Exec CommandsChapter 5252the filename. For scripts that are not located in the <Data_Protector_home>\bin directory, you must

Strany 205

BackupPre- and Post-Exec CommandsChapter 5 253RESTARTED Set to 1 if this is a restarted backup session, otherwise set to 0. The post-exec can use th

Strany 206

BackupPre- and Post-Exec CommandsChapter 5254✓ The execution of pre- and post-exec commands is implemented using the Windows pipe mechanism. All proce

Strany 207

BackupPre- and Post-Exec CommandsChapter 5 255Pre- and Post-Exec Commands for a Specific Backup ObjectPre- and post-exec commands for an object are ex

Strany 208

BackupPre- and Post-Exec CommandsChapter 5256NOTE If you perform a host backup, the pre-exec script is started once, before the first filesystem backu

Strany 209

BackupPre- and Post-Exec CommandsChapter 5 257✓ Time-out is provided. If no message is received within the specified time-out in seconds, the session

Strany 210

BackupPre- and Post-Exec CommandsChapter 5258How to Specify the Filename or Pathname?For information on how to specify the commands, refer to the onli

Strany 211

BackupPre- and Post-Exec CommandsChapter 5 259Key Points Check the following before configuring pre- and post- exec commands for a backup specificatio

Strany 212

xxixIn This BookThe HP OpenView Storage Data Protector Administrator’s Guide describes how to configure and use the Data Protector network backup pr

Strany 213

BackupPre- and Post-Exec CommandsChapter 5260/opt/omni/lbin/utilns/detach pre_script [arguments...]• You can disable a session’s pre- and post-exec co

Strany 214

BackupPre- and Post-Exec CommandsChapter 5 261Environment VariablesThe following environment variables are exported, and can be used in the pre- and p

Strany 215

BackupPre- and Post-Exec CommandsChapter 5262✓ The pre- and post-exec processes operate in background mode. Therefore, do not use any interactive comm

Strany 216

BackupManaging Failed BackupsChapter 5 263Managing Failed BackupsDuring a backup, some systems may not be available because they were shut down, there

Strany 217

BackupManaging Failed BackupsChapter 5264The following example is a list of files that cannot be opened on an active Windows NT 4.0 system with the Wi

Strany 218

BackupManaging Failed BackupsChapter 5 265If a backup of an object fails to start, Data Protector tries to back up this object again at the end of the

Strany 219

BackupManaging Failed BackupsChapter 5266NOTE You can enable Wake ONLAN support for computers equipped with a Wake ONLAN-compatible LAN interface, suc

Strany 220

Chapter 6 2676Restore

Strany 221

RestoreIn This ChapterChapter 6268In This ChapterThis chapter describes restore topics, such as how to restore specific data and how to use restore op

Strany 222

RestoreRestoring Your DataChapter 6 269Restoring Your DataA restore is a process that recreates the original data from a backup copy on a disk. This p

Strany 223 - Chapter 5 193

iii©Copyright 1985-86, 1988 Massachusetts Institute of Technology©Copyright 1989-93 The Open Software Foundation, Inc.©Copyright 1986-1997 FTP Softw

Strany 224

xxxOrganizationThe manual is organized as follows:Chapter 1 “Introducing Data Protector” on page 1.Chapter 2 “Configuring and Using Backup Devic

Strany 225

RestoreRestoring Your DataChapter 6270• The location you want to restore data to• The device to restore from• How to handle file conflicts with existi

Strany 226

RestoreRestoring Your DataChapter 6 271Figure 6-1 Selecting Data for RestoreSelecting a Backup VersionWhen selecting data that you want to restore, th

Strany 227 - Chapter 5 197

RestoreRestoring Your DataChapter 6272possible options: Keep most recent, No overwrite, and Overwrite. For more information on these options, refer to

Strany 228

RestoreRestoring Your DataChapter 6 273NOTE With some database integrations, you can set the changed device as a default restore device for all Data P

Strany 229

RestoreRestoring Your DataChapter 6274Prerequisites You need to meet the following prerequisites in order to perform a disk image restore:• The disk m

Strany 230

RestoreRestoring Your DataChapter 6 275Restoring Your Data to a Shared DiskData Protector allows you to restore UNIX and Windows data to a Windows sha

Strany 231 - Backing Up OpenVMS Systems

RestoreRestoring UNIX SystemsChapter 6276Restoring UNIX SystemsWhat Is Restored? When restoring files to the original location from which the backup w

Strany 232

RestoreRestoring Windows SystemsChapter 6 277Restoring Windows SystemsWhat Is Restored? When restoring a Windows filesystem, Data Protector restores t

Strany 233

RestoreRestoring Windows SystemsChapter 6278Filesystem LimitationsYou can select a different target filesystem from the one where the backup was perfo

Strany 234

RestoreRestoring Windows SystemsChapter 6 279Table 6-1 shows that NTFS 3.x filesystem objects can only be adequately restored to the NTFS 3.x filesyst

Strany 235

Chapter 1 11 Introducing Data Protector

Strany 236

RestoreRestoring Windows SystemsChapter 6280Restoring Disk Images Refer to “Restoring Disk Images” on page 273.Restoring the Windows CONFIGURATIONTo r

Strany 237 - Scheduling Unattended Backups

RestoreRestoring Windows SystemsChapter 6 281• You have to boot the system in the Active Directory restore mode to restore the Active Directory.Refer

Strany 238

RestoreRestoring Windows SystemsChapter 62821. System State objects that belong to CONFIGURATION. Refer to “Backing Up the Windows 2000/XP/Server 2003

Strany 239 - Starting Periodic Backups

RestoreRestoring Windows SystemsChapter 6 283Once the restore session is completed, restart the system.NOTE If you select the whole Windows 2000/XP/Se

Strany 240 - Editing Your Backup Schedule

RestoreRestoring Windows SystemsChapter 6284the local system account and then restart the services. Refer to “Setting the User Account for the Data Pr

Strany 241

RestoreRestoring Windows SystemsChapter 6 285Remote Storage Service RestoreAlthough the RSS databases are part of System State data, you restore them

Strany 242 - Running Consecutive Backups

RestoreRestoring Windows SystemsChapter 62862. To keep the restored files unmerged, you can delete the files in the newly created profile before runni

Strany 243

RestoreRestoring Novell Netware FilesystemsChapter 6 287Restoring Novell Netware FilesystemsUse the standard restore procedure to restore Novell NetWa

Strany 244

RestoreRestoring Novell Netware FilesystemsChapter 6288• You cannot restore Novell NetWare files that have been backed up in their compressed format t

Strany 245

RestoreRestoring Novell Netware FilesystemsChapter 6 289Figure 6-6 Restoring the NetWare ConfigurationRestoring Novell NDSPrerequisites The prerequisi

Strany 246 - Using Backup Templates

Introducing Data ProtectorIn This ChapterChapter 12In This ChapterThis chapter contains some general principles on how Data Protector works, covered i

Strany 247

RestoreRestoring Novell Netware FilesystemsChapter 6290For Novell NDS restore you can specify how to handle conflicts between the version currently on

Strany 248 - Applying a Backup Template

RestoreRestoring OpenVMS FilesystemsChapter 6 291Restoring OpenVMS FilesystemsUse the standard restore procedure to restore OpenVMS filesystems. Refer

Strany 249

RestoreRestoring OpenVMS FilesystemsChapter 6292— File specifications for OpenVMS files are case insensitive.For example:An OpenVMS file specification

Strany 250 - Creating a New Template

RestoreRestoring OpenVMS FilesystemsChapter 6 293Files during Restore (-lock) option is enabled or disabled.• The default device and directory for pre

Strany 251 - Options” on page 225

RestoreRestore OptionsChapter 6294Restore OptionsData Protector offers a set of comprehensive restore options that allow fine-tuning of a restore. All

Strany 252

RestoreRestore OptionsChapter 6 295The time on the Cell Manager and clients must be synchronized for the Omit Deleted Files option to function properl

Strany 253

RestoreRestore OptionsChapter 6296Restore Sparse Files This option restores sparse files in their original compressed form. This is important because

Strany 254

RestoreRestore OptionsChapter 6 297Post-Exec This option allows you to enter a command to be executed after the restore of each object is completed.

Strany 255 - Using Backup Options

RestoreRestore OptionsChapter 6298User Defined Restore VariablesYou can use variables (a variable name and its value) for flexible operations on some

Strany 256

RestoreRestore TechniquesChapter 6 299Restore TechniquesThe following restore techniques apply to the UNIX and Windows platforms.Restoring Files to Di

Strany 257

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 3The Data Protector Cell EnvironmentThe Data Protector cell is a network enviro

Strany 258

RestoreRestore TechniquesChapter 6300This capability is available for the initially selected tree node (directory) and for tree nodes that are not hie

Strany 259

RestoreRestore TechniquesChapter 6 301Figure 6-8 Restoring Files in ParallelThe figure shows an example of restoring files in parallel from one medium

Strany 260

RestoreRestore TechniquesChapter 6302• The catalog protection has expired. Refer to “Most Frequently Used Backup Options” on page 227 for more informa

Strany 261

RestoreRestore TechniquesChapter 6 303Figure 6-9 Restore by QueryTo search for a file or a directory, you need to know at least a part of its name. Th

Strany 262

RestoreRestore TechniquesChapter 6304How to Restore by QueryStart the Restore by Query task from the Restore context of the Data Protector Manager. Us

Strany 263

RestoreRestore TechniquesChapter 6 305Figure 6-11 Matching Files for RestoreRestoring Files and Directories ManuallyYou need to restore a file or a di

Strany 264

RestoreRestore TechniquesChapter 6306

Strany 265

Chapter 7 3077 Monitoring, Reporting, Notifications, and the Event Log

Strany 266

Monitoring, Reporting, Notifications, and the Event LogIn This ChapterChapter 7308In This ChapterThis chapter consists of the following sections: “Mon

Strany 267

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 309Monitoring SessionsData Protector allows you to manage running

Strany 268

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 14NOTE For further information on these terms, or on the principles of Data Prote

Strany 269

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7310The progress and status of current sessions appear in the Result

Strany 270

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 3112. Insert the needed medium into the device. If you have a libr

Strany 271

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7312You can sort your sessions using the buttons on the top of each

Strany 272

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 313See “Restore Options” on page 294 for information on which rest

Strany 273

Monitoring, Reporting, Notifications, and the Event LogMonitoring Several Cells SimultaneouslyChapter 7314Monitoring Several Cells SimultaneouslyYou c

Strany 274

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7 315Data Protector Reporting What Is Reporting?Data Protector

Strany 275

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7316If no optional input parameters (optional selections) are s

Strany 276

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 317Report TypesData Protector provides various types of reports, as shown

Strany 277

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7318For supported formats, refer to “Report Formats” on page 329. Table 7-2

Strany 278

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3191. Counted from the moment of starting the report backwards.Not Config

Strany 279 - Device Backup Options

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 52. The Cell Manager determines the type of session that has been requested (re

Strany 280 - Pre- and Post-Exec Commands

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7320Configuration ReportsThe following table lists the Configuration report

Strany 281

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 321IDB ReportsThe following table lists the IDB reports. IDB reports prov

Strany 282

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7322Purge Previewdb_purge_previewLists the following information: overall n

Strany 283

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 323System Dynamicsdb_systemLists for each Data Protector client in the ce

Strany 284

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7324Pools and Media ReportsThe following table lists the Pools and Media re

Strany 285

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3251. The following are possible: Don’t care / Unprotected / Protected; t

Strany 286

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7326Number of remaining days in which the data protection will expire, coun

Strany 287

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 327Device Flowdevice_flowGraphically presents the usage of each medium. A

Strany 288

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 73281. Timeframe in which the medium was used for a backup.Relative time: t

Strany 289

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 329Report FormatsData Protector reports can be produced in various format

Strany 290

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 16Using the Data Protector User InterfaceThere is one Data Protector user int

Strany 291

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7330IMPORTANT When sending an HTML report on a Windows Cell Manager using t

Strany 292

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 331Report Send MethodsReport Send MethodsReports can be sent using

Strany 293 - Managing Failed Backups

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73325. In the information services list, select Microsoft Exchange S

Strany 294 - Preventing Backup Failure

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 333NOTE On a UNIX Cell Manager, SNMP traps are sent to the systems

Strany 295

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73346. Right-click SNMP Service and select Properties.a. Select the

Strany 296 - Restarting Failed Backups

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 335Configuring Reports Using the Data

Strany 297 - 6Restore

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7336Administrators can configure a repo

Strany 298

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 337NOTE To trigger a report group by

Strany 299 - Restoring Your Data

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Data Protector GUIChapter 7338Running Reports and R

Strany 300

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 339Running Reports

Strany 301

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 7Graphical User InterfaceThe Data Protector graphical user interface (GUI)

Strany 302

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7340omnirpt -report s

Strany 303 - Restoring Disk Images

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 341omnirpt -report

Strany 304

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7342Data Protector NotificationsWhat Are Notifications?The

Strany 305

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 343✓ End of Session✓ Mail Slots Full✓ Mount Request• Noti

Strany 306 - Restoring UNIX Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7344Unexpected EventsNumber of Events (threshold value for

Strany 307 - Restoring Windows Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 345Database Purge Needed• Days Last Purge [days])• Num. E

Strany 308

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7346Explanation of Some NotificationsAlarm The Alarm notif

Strany 309

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 347For more information on the Data Protector checking an

Strany 310

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7348• Broadcast message send method•SNMP send method• Exter

Strany 311

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3497. In the Profile Name text box, enter OmniBack, and t

Strany 312

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 18xomnicellmon to start the MoM cell monitoring GUIxomnimm to start the m

Strany 313

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7350Windows NT To configure Windows NT SNMP traps, proceed

Strany 314

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3517. Start omnisnmp.External Send MethodExternal script

Strany 315 - Restoring DFS

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7352TIP To trigger a report group by a notification, config

Strany 316

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 353Configuring Reports and Notificati

Strany 317 - Restrictions

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 73543. Optionally, configure a password

Strany 318

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 355Generating the ReportsTo generate

Strany 319 - Restoring Novell NDS

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7356Data Protector Event LogThe Data Protector Event Log repres

Strany 320

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7 357When the Data Protector graphical user interface is starte

Strany 321 - Restoring OpenVMS Filesystems

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7358

Strany 322

Chapter 8 3598 Manager-of-Managers Environment

Strany 323

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 9Elements of the Data Protector Graphical User InterfaceFor the visual repr

Strany 324 - Restore Options

Manager-of-Managers EnvironmentIn This ChapterChapter 8360In This ChapterThis chapter shows you how to configure and use the Data Protector Manager-of

Strany 325

Manager-of-Managers EnvironmentManager-of-ManagersChapter 8 361Manager-of-ManagersThe Data Protector Manager-of-Managers (MoM) allows administrators t

Strany 326

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8362Configuring the Manager-of-ManagersTo configure the MoM environment, you

Strany 327

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 363Setting Up MoM ManagerTo set up an enterprise environment, configure on

Strany 328

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 83643. Enter, or browse for, the name of the Cell Manager that you want to i

Strany 329 - Restore Techniques

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 365cmhaltpkg <pkg_name>where <pkg_name> is the name of the Dat

Strany 330 - Restoring Files in Parallel

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8366Centralized Media Management Database (CMMDB)The IDB is an emb

Strany 331 - Viewing Files Not in the IDB

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8 367NOTE A backup anywhere in the enterprise environment will not

Strany 332 - Restoring by Query

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8368Configuring a Centralized Media Management DatabaseIt is

Strany 333

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 369On the MoM, add one cell at a time to the CMMDB.Prerequ

Strany 334 - Skipping Files for Restore

ivHP-UX Release 11.00 and later (in both 32- and 64-bit configurations) on all HP 9000 computers are Open Group UNIX 95 branded products.Netscape and

Strany 335

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 110Internal Database Allows you to get information on the IDB storage capac

Strany 336 - Chapter 6306

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8370TIP If you are configuring a new cell, (and you do not y

Strany 337 - 7 Monitoring, Reporting

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 371• On Windows: <Data_Protector_home>\bin\omnicc -u

Strany 338

Manager-of-Managers EnvironmentCentralized LicensingChapter 8372Centralized LicensingIt is not required to set up centralized licensing. Individual li

Strany 339 - Monitoring Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 373On Windows: <Data_Protector_home>\config\cell\lic_serverOn UNIX: /etc/opt/omni/

Strany 340 - Responding to Mount Requests

Manager-of-Managers EnvironmentCentralized LicensingChapter 8374NOTE Data Protector checks the license configuration with the MoM Manager every hour.

Strany 341

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 375Moving Licenses in the MoM EnvironmentIf you have not configured centralized licensin

Strany 342 - Aborting Running Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8376Deactivating Centralized LicensingCentralized licensing can be deactivated and changed

Strany 343 - Chapter 7 313

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 377Working with a MoM EnvironmentThe Manager-of-Managers interface enables you

Strany 344

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8378Moving Client Systems Among CellsData Protector allows you to move systems am

Strany 345 - Data Protector Reporting

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 379Configuring Data Protector UsersYou can add users or user groups to a MoM en

Strany 346

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 11The Command-Line InterfaceThe command-line interface (CLI) follows the st

Strany 347 - Report Types

Manager-of-Managers EnvironmentRestoring, Monitoring, and Reporting in an Enterprise EnvironmentChapter 8380Restoring, Monitoring, and Reporting in an

Strany 348

Chapter 9 3819 Managing the Data Protector Internal Database

Strany 349

Managing the Data Protector Internal DatabaseIn This ChapterChapter 9382In This ChapterThis chapter provides information about the Data Protector inte

Strany 350 - Configuration Reports

Managing the Data Protector Internal DatabaseAbout the Data Protector Internal DatabaseChapter 9 383About the Data Protector Internal DatabaseWhat Is

Strany 351 - IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9384The IDB ArchitectureThe IDB consists of the following parts:• MMDB (Media

Strany 352 - Table 7-4 IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 385Figure 9-1 IDB ArchitectureEach of the IDB parts stores specific Data Pr

Strany 353 - Chapter 7 323

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9386• Backup sessions and restore sessions. This is the copy of the informati

Strany 354 - Pools and Media Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 387For additional information on each of the IDB parts, refer to the HP Ope

Strany 355

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9388Configuring the IDBThe IDB configuration helps to manage the following:• t

Strany 356 - Sessions in Timeframe Reports

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 389• You need to estimate future IDB size (disk space necessary for future I

Strany 357

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 112Data Protector Online ResourcesInformation about Data Protector is availab

Strany 358 - Single Session Report

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9390• The filenames part of the IDB is proportional to the total number of fil

Strany 359 - Report Formats

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 391• The DCBF and SMBF parts of the IDB are not required for basic operation

Strany 360

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9392• If the IDB is installed in a cluster, it must be installed on disks in t

Strany 361 - Report Send Methods

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 393Figure 9-2 Recommended Location of IDB DirectoriesRelocating the IDB Dire

Strany 362 - SNMP Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9394NOTE On UNIX, you can use symbolic links to relocate the directories, but

Strany 363

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 395• On UNIX: /opt/omni/sbin/omnisv -startIf the IDB is installed on MC/Serv

Strany 364 - External Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9396Creating or Relocating DC DirectoriesCreating a DC DirectoryCreate a DC di

Strany 365

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 397By default, transaction logging is disabled. If enabled, transaction logs

Strany 366

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9398• On Windows: <Data_Protector_home>\bin\omnisv -start• On UNIX: /opt

Strany 367

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 399• Perform the IDB backup using a separate media pool on separate media, o

Strany 368 - Running Report Groups

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 13If the GUI concerned is running on Windows, the Help Navigator is dynamic

Strany 369

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9400In environments where the Cell Manager is used heavily and the time needed

Strany 370

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 401There are also other Data Protector reports to be considered. For example

Strany 371

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9402Maintaining the IDBOnce you have configured the IDB, you need to perform I

Strany 372 - Data Protector Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 403The Database Corrupted notification informs you about IDB corruption.Refe

Strany 373

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9404Table 9-3 IDB Maintenance TasksSituation Which Task Can You Perform?Refere

Strany 374

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 405Reducing the IDB GrowthYou can reduce the growth of the IDB by reducing t

Strany 375

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9406Figure 9-6 Changing Logging Level and Catalog Protection SettingsReducing

Strany 376

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 407By changing the catalog protection, you change protection in the IDB only

Strany 377 - Notification Send Methods

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9408Purging Obsolete FilenamesDuring the purge process, Data Protector automat

Strany 378

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 409Creating New fnames.dat FilesWhat Are fnames.dat Files?The fnames.dat fil

Strany 379

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1143. In the Open text box, enter mmc to open the Microsoft Management Consol

Strany 380

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9410Checking the Database SizeYou can check the current size of the IDB parts

Strany 381 - Configuring Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 411Checking the Consistency of the Database Data Protector by default checks

Strany 382

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9412If you run into problems using the IDB, refer to the troubleshooting secti

Strany 383

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 413On Windows systems: <Data_Protector_home>\db40\msg to <Data_Prot

Strany 384

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9414Restoring the IDBIf you have backed up the IDB using the standard procedure,

Strany 385 - Configuring Report Groups

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9 415NOTE You should not select the <Data_Protector_home> directory, as th

Strany 386 - Data Protector Event Log

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 94163. Move the existing IDB directories (db40 and config) from the <Data_Pro

Strany 387

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 417Recovering the IDBWhen Is Recovery Needed?IDB recovery is needed if all or

Strany 388 - Chapter 7358

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9418The Most Convenient Complete RecoveryWhen the complete IDB is missing or th

Strany 389 - Environment

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 419If the transaction logs are available, the recovery procedures in Table 9-

Strany 390

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 1 15Overview of Tasks to Set Up Data ProtectorAlthough configuring Data Pr

Strany 391 - Manager-of-Managers

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9420You can use the IDB consistency check to determine which part of the IDB is

Strany 392

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 421Performing Guided AutorecoveryGuided autorecovery is the most convenient I

Strany 393 - Setting Up MoM Manager

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9422• If the IDB is installed on Microsoft Cluster Server, take the OBVS_VELOCI

Strany 394 - Adding a MoM Administrator

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 423label and media pool.2. Run the omnidbutil -fixmpos command to establish c

Strany 395

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9424• The catalogs created by subsequent backups are good enough.• There is no

Strany 396

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 425• Verify that Data Protector is installed on the Cell Manager and the syst

Strany 397

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9426-dev scsi0:0:0:0 -mahost goedl.hermes -maid 0100007f:3a486bd7:0410:0001 -po

Strany 398 - Database

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 427drive letters must be assigned). If this cannot be ensured, follow the pro

Strany 399

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9428• Mahost (Media Agent host)• Policy (number)A policy number can be obtained

Strany 400

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 429procedure for recovering the IDB to a different disk/volume layout. You ca

Strany 401

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 116• Which devices will be used, and how?• Which user groups do you want t

Strany 402 - Centralized Licensing

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9430Replaying IDB Transaction Logs In a successful omnidbrestore -autorecover,

Strany 403

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 431the procedure below, bring the OBVS_VELOCIS and OBVS_MCRS cluster groups o

Strany 404

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 94321. In the Data Protector Manager, browse the Internal Database backup objec

Strany 405

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 433Updating the IDB by Importing MediaTo successfully complete the IDB recove

Strany 406

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9434

Strany 407

Chapter 10 43510 Disaster Recovery

Strany 408

Disaster RecoveryIn This ChapterChapter 10436In This ChapterThis chapter provides an overview of disaster recovery on Windows UNIX clients and Cell Ma

Strany 409

Disaster RecoveryIntroductionChapter 10 437IntroductionThis section explains the basic terms used in the Disaster Recovery chapter. For overview and c

Strany 410 - Enterprise Environment

Disaster RecoveryIntroductionChapter 1043832-bit Windows XPa/Server 2003•“Assisted Manual Disaster Recovery of a Windows System” on page 450• “Automa

Strany 411 - Internal Database

Disaster RecoveryIntroductionChapter 10 439What Is a Computer Disaster?A computer disaster refers to any event that renders a computer system unbootab

Strany 412

Chapter 2 172 Configuring and Using Backup Devices

Strany 413

Disaster RecoveryIntroductionChapter 10440What Is a Hosting System?Hosting system is a working Data Protector client used for Disk Delivery Disaster R

Strany 414 - The IDB Architecture

Disaster RecoveryIntroductionChapter 10 441• user profiles volume• Certificate Server database volume on Windows Server• Active Directory Service volu

Strany 415

Disaster RecoveryIntroductionChapter 10442The Recovery ProcessThe disaster recovery process consists of 4 phases with the Phase 0 (preparation) being

Strany 416

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 443Preparing for a Disaster RecoveryCarefully follow the instructions in this section to

Strany 417 - Chapter 9 387

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10444On UNIX systems:• Creation of tools, such as the auxiliary disk with the minimum operat

Strany 418 - Configuring the IDB

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 445On Windows, while the system is up and running, many system files cannot be replaced b

Strany 419

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10446corresponding media must be added to the SRD. The SRD can be updated only on a Windows

Strany 420 - Preparing for IDB Recovery

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 447Omnisrdupdate requires a session_ID to update an existing SRD file with backup object

Strany 421

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10448To determine for which hostname the SRD file from the Cell Manager should be updated, u

Strany 422

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 449IMPORTANT You should restrict access to SRD files due to security reasons.

Strany 423

Configuring and Using Backup DevicesIn This ChapterChapter 218In This ChapterThis chapter includes information on the following topics:“Configuring Ba

Strany 424

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10450Assisted Manual Disaster Recovery of a Windows SystemThe following

Strany 425

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 451Requirements• The partitions have to be the same size or larger th

Strany 426

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 104521. You need a Windows bootable installation CD-ROM to enable your s

Strany 427

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 453\i386\tools\DRSetup (located on Data Protector installation medium

Strany 428

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10454The table on the next page is an example of the preparation for the

Strany 429

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 455Table 10-3client properties computer name ANDEShostname andes.comp

Strany 430

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10456RecoveryFollow the procedure below to recover a Windows system usin

Strany 431

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 457Other Windows SystemsIf you are recovering a Windows system other

Strany 432 - Maintaining the IDB

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10458CD drives for the location of disaster recovery setup files (Dr1.ca

Strany 433

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 459Disk Delivery Disaster Recovery of a Windows Client To perform the D

Strany 434

Configuring and Using Backup DevicesIn This ChapterChapter 2 19NOTE Backup devices (like tape drives) are subject to specific Data Protector licenses.

Strany 435 - Reducing the IDB Growth

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10460Limitations• Disk Delivery Disaster Recovery is not supported for Mic

Strany 436 - Reducing the IDB Size

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 461• partitions filesystem typeYou can refer to Table 10-3 on page 455

Strany 437

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10462IMPORTANT You have to assign drive letters for Windows 2000/XP/Server

Strany 438 - Extending the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 463Enhanced Automated Disaster Recovery of a Windows SystemEnhance

Strany 439

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10464Any remaining partitions can be recovered using the standard Dat

Strany 440 - Checking the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 465• When backing up the client, the default 64 kB block size shou

Strany 441

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10466Certificate Server Database are not restored automatically durin

Strany 442

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 4672. In the Scoping pane, expand the Backup Specifications and th

Strany 443

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10468(create it if you have not created it already). 4. In the Result

Strany 444 - Restoring the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 469IMPORTANT It is recommended to restrict access to backup media,

Strany 445

Contents v1. Introducing Data ProtectorIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 446

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 220Configuring Backup DevicesPreparation of a backup device consists of connecti

Strany 447 - Recovering the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10470RecoveryYou need the following to successfully perform a disaste

Strany 448

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 471machine <HOSTNAME> press F12, to boot from the hard disk

Strany 449

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10472One Button Disaster Recovery of a Windows SystemOne Button Disaster Reco

Strany 450

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 473Requirements• Data Protector Automatic Disaster Recovery and User Inter

Strany 451

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10474• When backing up the client, the default 64 kB block size should be use

Strany 452

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 475• One Button Disaster Recovery backup session can only be performed for

Strany 453 - Filenames Part

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 104762. Click Tasks navigation tab and check One Button Disaster Recovery Wiz

Strany 454 - Changed Device

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 477an OBDR backup specification to keep it in the original One Button Disa

Strany 455 - -type 1

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10478device documentation.4. In the screen that appears, select the scope of

Strany 456 - -daid 977824764

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 479• You have interrupted the Disaster Recovery Wizard during the 10 secon

Strany 457

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 2 213. Boot the system to have the device recognized by the system.4. Configure

Strany 458

Disaster RecoveryAutomated System RecoveryChapter 10480Automated System RecoveryAutomated System Recovery (ASR) is an automated system on Windows syst

Strany 459

Disaster RecoveryAutomated System RecoveryChapter 10 481The following sections explain the requirements, limitations, preparation, and recovery pertai

Strany 460

Disaster RecoveryAutomated System RecoveryChapter 10482Figure 10-4 Verifying the Default Block SizeLimitations• Windows XP Home Edition does not suppo

Strany 461

Disaster RecoveryAutomated System RecoveryChapter 10 483• Only those local backup devices are supported, that can be installed by Windows during OS in

Strany 462

Disaster RecoveryAutomated System RecoveryChapter 104843. In the HP OpenView Storage Data Protector Manager, switch to the Restore context.4. Click th

Strany 463

Disaster RecoveryAutomated System RecoveryChapter 10 485installation check box to copy DR installation files to the same location. The recommended des

Strany 464 - Chapter 9434

Disaster RecoveryAutomated System RecoveryChapter 10486RecoveryTo successfully perform a disaster recovery of the crashed system, you need the followi

Strany 465 - 10 Disaster Recovery

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 487Restoring the Data Protector Cell Manager Specifics This section exp

Strany 466

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10488• Disaster recovery CD for the Cell Manager should be prepared in adv

Strany 467 - Introduction

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 489Automated System Recovery SpecificsAn additional step is required in

Strany 468

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 222Figure 2-1 How Backup Specifications, Devices, and Media Pools Relate

Strany 469

Disaster RecoveryAdvanced Recovery TasksChapter 10490Advanced Recovery TasksThis section provides explanation of the steps you will need to take if yo

Strany 470

Disaster RecoveryAdvanced Recovery TasksChapter 10 491• all nodes• administrative virtual server (defined by the administrator)• if Data Protector is

Strany 471

Disaster RecoveryAdvanced Recovery TasksChapter 10492Merging P1S files of all nodes for EADRAnother step is required for EADR after backup has been pe

Strany 472

Disaster RecoveryAdvanced Recovery TasksChapter 10 493• the primary node must have write access to all IDB volumes, when recovering the Cell Manager•

Strany 473 - Planning

Disaster RecoveryAdvanced Recovery TasksChapter 10494TIP To enable automatic restore of all shared disk volumes in the MSCS using OBDR method, move al

Strany 474

Disaster RecoveryAdvanced Recovery TasksChapter 10 495Restoring Hard Disk Signatures On Windows The MSCS service uses a hard disk signature written i

Strany 475

Disaster RecoveryAdvanced Recovery TasksChapter 10496There is no simple procedure for recovering the disk signatures on Windows NT. MSDN article Q2431

Strany 476

Disaster RecoveryAdvanced Recovery TasksChapter 10 4974. The IIS Database is restored as a plain file (with the filename DisasterRecovery) into the de

Strany 477

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10498Manual Disaster Recovery of an HP-UX ClientThis chapter explains the procedur

Strany 478

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 499Use Ignite-UX GUI where it is supported.Using Custom Installation MediumOver

Strany 479 - Chapter 10 449

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 23Configuring Standalone DevicesWhat Are Standalone Devices?Standalone dev

Strany 480 - Windows System

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10500core.cfg to archive_<name>.cfg:cp /opt/ignite/data/examples/core.cfg /v

Strany 481 - Preparation

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 501impacts = "/stand" 1116Kbimpacts = "/tcadm" 1Kbimpacts =

Strany 482

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10502NOTE Ignite-UX enables you to create a bootable tape or CD based on the creat

Strany 483

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 503Using System Recovery ToolsOverviewThe usage of the system recovery tools, b

Strany 484

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10504This creates an Ignite-UX depot under /var/opt/ignite/depots/recovery_cmds, w

Strany 485

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 505enough space to store the compressed archive.4. Select the volume groups you

Strany 486 - Recovery

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 105063. Select Install HP-UX from the Welcome to Ignite-UX screen.4. Choose Remote

Strany 487

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 507Disk Delivery Disaster Recovery of an UNIX ClientTo perform a Disk Del

Strany 488

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10508• If the system that will be backed up has application processes active

Strany 489

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 509single user mode:— boot -fl s to boot using already generated vmunix f

Strany 490 - Limitations

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 224Figure 2-2 Specifying Device Type and Name Configuring Device ChainsData

Strany 491

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10510— Consider logging out all users from the system.— Shut down all applic

Strany 492

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 5114. Reconstruct the logical volume structure if applicable (for example

Strany 493

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10512Manual Disaster Recovery of an UNIX Cell Manager Manual Disaster Recover

Strany 494

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10 513• A device connected to the Cell Manager.Procedure The following steps

Strany 495

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10514Troubleshooting Disaster Recovery on WindowsThis section provides explanatio

Strany 496

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 5154. To update this new state with disaster recovery, you should perform all

Strany 497

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10516Problem “No Operating System Found”Action After performing disaster recovery

Strany 498

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 517<Data_Protector_home>\tmp) if improperly configured storage devices a

Strany 499

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10518'System may not boot after disaster recovery.If the boot and system vol

Strany 500

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 519WARNING Editing the registry incorrectly can result in failed disaster reco

Strany 501

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 25Protector can immediately use media that are recognized and unprotected.

Strany 502

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10520

Strany 503

Chapter 11 52111 Customizing the Data Protector Environment

Strany 504

Customizing the Data Protector EnvironmentIn This ChapterChapter 11522In This ChapterThis chapter describes how you can customize Data Protector to be

Strany 505

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11 523Global Options FileGlobal options affect the entire Data Protector cell, an

Strany 506

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11524balance number.• DailyMaintenanceTime: Determines the time after which the d

Strany 507

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 525Using Omnirc OptionsThe omnirc options are most useful for troubleshooting

Strany 508

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11526• OB2DEVSLEEP: Changes the sleep time between each retry while loading a de

Strany 509

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 527• OB2VXDIRECT: Enables direct (without cache) reading for Advanced VxFS fi

Strany 510 - Automated System Recovery

Customizing the Data Protector EnvironmentFirewall SupportChapter 11528Firewall SupportThis section describes how to configure Data Protector in an en

Strany 511

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 529NOTE The OB2PORTRANGE variable only applies to dynamically allocated ports. It

Strany 512

Configuring and Using Backup DevicesConfiguring File DevicesChapter 226Configuring File DevicesWhat Are File Devices?A file device is a file in a spec

Strany 513

Customizing the Data Protector EnvironmentFirewall SupportChapter 11530The table below lists all possible Data Protector agent identifiers that can be

Strany 514

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 531NOTE The OB2PORTRANGESPEC variable only applies to dynamically allocated ports

Strany 515

Customizing the Data Protector EnvironmentFirewall SupportChapter 11532The following table provides a list of all Data Protector components. The first

Strany 516

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 533When writing the firewall configuration rules, the process in the first column

Strany 517 - Specifics

Customizing the Data Protector EnvironmentFirewall SupportChapter 11534Table 11-3Connecting Component Listening ComponentProcess Port Process PortCell

Strany 518

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 535Examples of Configuring Data Protector in Firewall EnvironmentsThe following s

Strany 519

Customizing the Data Protector EnvironmentFirewall SupportChapter 11536Figure 11-1 Configuration DiagramThe following two items define the port range

Strany 520 - Advanced Recovery Tasks

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 537✓ Allow connections from the CM system to port 5555 on the MA systemThis table

Strany 521

Customizing the Data Protector EnvironmentFirewall SupportChapter 11538Example 2: Disk Agent Installed Outside, Other Components Installed Inside a Fi

Strany 522

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 5391. In order to determine which processes need to communicate across the firewa

Strany 523

Configuring and Using Backup DevicesConfiguring File DevicesChapter 2 27You specify the capacity of a file device when you first format the medium. Wh

Strany 524

Customizing the Data Protector EnvironmentFirewall SupportChapter 11540NOTE All Session Managers allocate ports from this range, not only the one comm

Strany 525

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 541Figure 11-3 Configuration DiagramThe following three items define the port ran

Strany 526

Customizing the Data Protector EnvironmentFirewall SupportChapter 11542This leads to the following firewall rule for the connection to the Inet listen

Strany 527

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 543Port Range Settings on the Cell ManagerFor example, if there are 25 backup and

Strany 528

Customizing the Data Protector EnvironmentFirewall SupportChapter 11544Figure 11-4 Configuration DiagramThe following three items define the port rang

Strany 529

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 545Here, the application Agent connects to the Media Agent. However, this connect

Strany 530

Customizing the Data Protector EnvironmentFirewall SupportChapter 11546one DBSM will be started. For Oracle and SAP R/3 integrations, “concurrency + 1

Strany 531

Chapter 12 54712 Troubleshooting

Strany 532

TroubleshootingIn This ChapterChapter 12548In This ChapterIf you have problems with Data Protector, use the suggestions in this chapter to get back on

Strany 533 - Using System Recovery Tools

TroubleshootingBefore Calling Your Support RepresentativeChapter 12 549Before Calling Your Support RepresentativeIn order to speed up the process of s

Strany 534

Configuring and Using Backup DevicesConfiguring File DevicesChapter 228To create a jukebox file device, specify the Jukebox device type in the Add Dev

Strany 535

TroubleshootingData Protector Log FilesChapter 12550Data Protector Log FilesIf you encounter problems using the Data Protector application, you can us

Strany 536

TroubleshootingData Protector Log FilesChapter 12 551Log Files and Their ContentsThe table below describes the information found in Data Protector log

Strany 537

TroubleshootingData Protector Log FilesChapter 12552purge.log Contains traces of the background purge of the IDB.RDS.log Contains IDB logs. The file r

Strany 538

TroubleshootingDebuggingChapter 12 553DebuggingYou should collect debugs only when the support organization requires them to resolve a technical issue

Strany 539

TroubleshootingDebuggingChapter 12554Ways of DebuggingYou can start Data Protector in the debug mode in different ways and use it to generate debug tr

Strany 540

TroubleshootingDebuggingChapter 12 555NOTE Before you edit the file, make a copy of it, as the changes have to be reverted when debugging is no longer

Strany 541

TroubleshootingDebuggingChapter 12556Trace File NameThe debug postfix option is used for creating the trace files in the following directory:• On UNIX

Strany 542 - Manager

TroubleshootingDebuggingChapter 12 557OB2DBGDIR The default location of trace files can be changed on a per system basis with the omnirc variable OB2D

Strany 543

TroubleshootingDebuggingChapter 12558NOTE Use the -debug option carefully because execution traces can become quite large.CRS Debug in the Microsoft C

Strany 544 - General Troubleshooting

TroubleshootingDebuggingChapter 12 559onboard_type/Adaptec xxx/... for Windows Media Agent clients.• The operating system version, for example, HP-UX

Strany 545

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 29Configuring Library DevicesWhat Are Library Devices?SCSI-II library devices

Strany 546 - Troubleshooting EADR and OBDR

TroubleshootingDebuggingChapter 12560Protector services on the Cell Manager and restart them without the debug option.10.Copy the files from any clien

Strany 547

TroubleshootingBrowsing Troubleshooting MessagesChapter 12 561Browsing Troubleshooting MessagesData Protector provides an interactive online troublesh

Strany 548 - Enter to log on using the

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12562When You Cannot Access Online TroubleshootingIf the user interface cannot be

Strany 549

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12 563* Collect all log files (*.log) in <Data_Protector_home>/log directori

Strany 550 - Chapter 10520

TroubleshootingDescription of Common ProblemsChapter 12564Description of Common ProblemsIf you have problems with Data Protector, find the problem are

Strany 551

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 565Troubleshooting Networking and CommunicationThe section addresses the followi

Strany 552

TroubleshootingTroubleshooting Networking and CommunicationChapter 12566DNS Resolution ProblemTest DNS resolution among hosts using the omnicheck comm

Strany 553 - Global Options File

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 567Problem The response to the omnicheck command is:<client_1> cannot conn

Strany 554

TroubleshootingTroubleshooting Networking and CommunicationChapter 12568On Windows, apply the change to the Cell Manager first.If you run the UNIX Cel

Strany 555 - Using Omnirc Options

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 569Troubleshooting Data Protector Services and DaemonsThe Data Protector

Strany 556 - Shared Memory Segment)

ContentsviActivating Cartridge Memory Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Disabling a Backup Device

Strany 557

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 230NOTE It is not necessary to configure all drives for use with Data Protector

Strany 558 - Firewall Support

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12570Changed service account properties If the service account does not have

Strany 559

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 571directory and the problems should be resolved.2. Restart the services

Strany 560

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12572There are several possible reasons why the Data Protector daemon has fa

Strany 561 - Port Usage in Data Protector

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 573• /etc/opt/omni/options/global• /etc/opt/omni/options/users/UserList•

Strany 562

TroubleshootingTroubleshooting Devices and MediaChapter 12574Troubleshooting Devices and MediaThis section describes solutions to the following proble

Strany 563

TroubleshootingTroubleshooting Devices and MediaChapter 12 575Device Open ProblemThe error message Cannot open device (not owner) appears when trying

Strany 564 - Table 11-3

TroubleshootingTroubleshooting Devices and MediaChapter 12576If you receive media related errors during write operations, or if the medium is marked a

Strany 565 - Environments

TroubleshootingTroubleshooting Devices and MediaChapter 12 577• Log sense write report for LTO devices - total data sets processed. Media ID from tape

Strany 566

TroubleshootingTroubleshooting Devices and MediaChapter 12578Action Export the medium from the IDB and restart the failed session using a different me

Strany 567

TroubleshootingTroubleshooting Devices and MediaChapter 12 579For example, move the media associated with the reconfigured 9940 devices to the Default

Strany 568

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 31policy, and the device file or SCSI address of the device, and also configu

Strany 569

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12580Troubleshooting Backup and Restore SessionsYou may run into the following probl

Strany 570

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 581No previous full backupBefore performing an incremental backup of an object, D

Strany 571

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12582Action Modify the media pool policy to Appendable to enable the appending of ba

Strany 572

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 583The media in the library are not formatted and the media pool with the media u

Strany 573

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12584Action 1. Before you start a restore erase the disk image on the Data Protector

Strany 574

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 585Data Protector Backup sessions are not started at all (UNIX-specific)Action Ru

Strany 575

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12586reset by peer. It is possible that some parallel restore sessions are completed

Strany 576

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 587to the <system_name.company.com>, but it cannot because it does not know

Strany 577 - 12 Troubleshooting

TroubleshootingTroubleshooting Data Protector InstallationChapter 12588Troubleshooting Data Protector InstallationIf you run into problems while insta

Strany 578

TroubleshootingTroubleshooting Data Protector InstallationChapter 12 589Name Resolution Problems when Installing the Windows Cell ManagerDuring the in

Strany 579

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 232Configuring Libraries with Multiple Systems You can configur

Strany 580 - Data Protector Log Files

TroubleshootingTroubleshooting User Interface StartupChapter 12590Troubleshooting User Interface Startup Data Protector user interface start-up proble

Strany 581 - Log Files and Their Contents

TroubleshootingTroubleshooting User Interface StartupChapter 12 591Connection to a Remote System Refused on Windows or Novell NetWareThe response of t

Strany 582

TroubleshootingTroubleshooting the IDBChapter 12592Troubleshooting the IDB This section provides troubleshooting for the following problems using the

Strany 583 - Debugging

TroubleshootingTroubleshooting the IDBChapter 12 593• Upgrade of detail part running.The detail upgrade was started and is currently running.• Upgrade

Strany 584 - Ways of Debugging

TroubleshootingTroubleshooting the IDBChapter 12594The detail upgrade runs out of memory on the system•The upgrade.log file on the Cell Manager contai

Strany 585 - Debug Syntax

TroubleshootingTroubleshooting the IDBChapter 12 595Problems While Running the User InterfaceIDB is corruptedAny of the following messages can be disp

Strany 586 - Trace File Name

TroubleshootingTroubleshooting the IDBChapter 12596The RDS service/process cannot be started If one or several shared library files are missing, the o

Strany 587 - CRS Debug on Windows

TroubleshootingTroubleshooting the IDBChapter 12 597Temporary Directory MissingThe following temporary directories should exist on the Cell Manager:•

Strany 588 - Sample Debugging

TroubleshootingTroubleshooting the IDBChapter 12598Problems During Backup and ImportThe BSM or RSM is terminated during the IDB backup or import sessi

Strany 589

TroubleshootingTroubleshooting the IDBChapter 12 599• On UNIX, the Data Protector MMD (/opt/omni/lbin/mmd) is not displayed when listing the Data Prot

Strany 590

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 2 33• Configure a backup. See Chapter 5, “Backup,” on page 151.

Strany 591

TroubleshootingTroubleshooting the IDBChapter 12600Action Set the time interval, which will be used when browsing object versions for restore. You can

Strany 592 - Troubleshooting

TroubleshootingTroubleshooting the IDBChapter 12 601with the CMMDB installed (MoM). Run this command for every Cell Manager in the MoM environment by

Strany 593

TroubleshootingTroubleshooting Reporting and NotificationsChapter 12602Troubleshooting Reporting and NotificationsIf you use Outlook XP or Outlook 98/

Strany 594

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12 603Troubleshooting Data Protector Online HelpData Protector online Help consists o

Strany 595 - Communication

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12604not Netscape Navigator, select Custom.IMPORTANT Data Protector supports only Net

Strany 596

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 605Check Whether Data Protector Functions ProperlyThe following sections prov

Strany 597

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12606• Database Purge NeededFor more information on Data Protector notifications

Strany 598

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 607Overview of Items to Be CheckedIn order to ensure that Data Protector is f

Strany 599

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12608Check whether backups are configured properly1. Run the backup preview for

Strany 600

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 609✓ Database Space Low✓ Not Enough Free Media✓ Health Check Failed✓ User Che

Strany 601

Configuring and Using Backup DevicesConfiguring Magazine DevicesChapter 234Configuring Magazine DevicesWhat Are Magazine Devices?Magazine devices grou

Strany 602

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12610

Strany 603 - Data Protector Processes

Chapter 13 61113 Integrations with Other Applications

Strany 604 - 2000/XP/Server 2003

Integrations with Other ApplicationsIn This ChapterChapter 13612In This ChapterThis chapter gives detailed information on how to integrate the followi

Strany 605 - Medium Quality Statistics

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 613Cluster Integrations with Data ProtectorSee the HP OpenView

Strany 606

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13614Figure 13-1 A Typical Cluster• Cluster nodes (two or more)•Lo

Strany 607 - Medium Header Sanity Check

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 615all cluster nodes. Each cluster node compares this packet an

Strany 608 - Protector A.05.10

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13616NOTE In MSCS environment, Cluster Service components (for exa

Strany 609 - Other Common Problems

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 617Microsoft Cluster Server IntegrationAs a part of its high-availa

Strany 610

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13618Cell Manager on Microsoft Cluster ServerThe Data Protector Cell M

Strany 611

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 619Figure 13-2 Importing Cluster Virtual Server Hostnames to a Cell

Strany 612

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 2 35Configuring Stacker DevicesWhat Are Stacker Devices?A stacker is a single d

Strany 613

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13620To distinguish between local cluster node disks and shared cluste

Strany 614

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 621Failover of Data ProtectorIf a failover of the cluster-aware Dat

Strany 615

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13622Figure 13-3 Advanced Backup Specification Options-ClusteringDo no

Strany 616 - Backup Protection Expiration

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 623Failover of Application Other Than Data ProtectorAs the Data Pro

Strany 617

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13624script will be run. This is the node where Data Protector is runn

Strany 618

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 625Example In the Data Protector GUI you have configured a backup s

Strany 619 - Windows Cell Manager

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13626NOTE When the command is run, the elapsed time for each backup sp

Strany 620

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 627MC/ServiceGuard IntegrationAs part of its high-availability support, Data

Strany 621

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13628— Package IP or virtual ip-addressIn addition, you will also need to creat

Strany 622 - Troubleshooting the IDB

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 629Configuring the Primary and Secondary Cell ManagersThe following sections

Strany 623

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 236Backup and Restore with Stacker DevicesOnly the first medium has to be manua

Strany 624

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136302. Create a logical volume for that group (for example, /dev/vg_ob2cm/lv_o

Strany 625

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 631mount /dev/vg_ob2cm/lv_ob2cm /omni_shared5. Modify the /etc/opt/omni/sg/s

Strany 626

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136321. On system2 set up the volume group to be imported, with the following s

Strany 627 - Temporary Directory Missing

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 633/opt/omni/sbin/install/omniforsg.ksh -secondary /omni_shared5. Unmount th

Strany 628

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136343. Create the directory in the /etc/cmcluster directory that will hold the

Strany 629 - Performance Problems

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 635• SERVICE_NAME, SERVICE_FAIL_FAST_ENABLED , SERVICE_HALT_TIMEOUT Enter th

Strany 630

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13636IMPORTANT The service name must be the same as that used in the configurat

Strany 631

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 637f. Import the cluster package host name manually (for example, by using t

Strany 632

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13638NOTE When using the Data Protector GUI, import each cluster package as a c

Strany 633

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 639NOTE When backing up a virtual host, the object ownership will acquire th

Strany 634

Configuring and Using Backup DevicesConfiguring a Library for Mixed MediaChapter 2 37Configuring a Library for Mixed MediaA mixed media library contai

Strany 635 - Properly

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13640Veritas Cluster IntegrationClients on Veritas ClusterData Protector can on

Strany 636

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13 6411. Install the Data Protector Disk Agent on each system with the local di

Strany 637

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13642Novell NetWare Cluster IntegrationClients on Novell NetWare Cluster

Strany 638

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13 6432. Configure a backup of the local system in the cluster and defin

Strany 639

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13644Data Source Integration (DSI)What Is DSI? The Data Source Integration (D

Strany 640 - Chapter 12610

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13 645First select which data you want to log. Data Protector provides a repo

Strany 641 - Applications

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13646Application Response Measurement (ARM) IntegrationW

Strany 642

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13 647The following table shows the supported ARM transa

Strany 643

Integrations with Other ApplicationsManageX IntegrationChapter 13648ManageX IntegrationWhat Is the ManageX Integration?ManageX integration is supporte

Strany 644

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 649Access Points for System and Management Applicat

Strany 645

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 238Configuring Devices for Direct BackupThis section provides the con

Strany 646

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13650checking and maintenance mechanism. For more info

Strany 647

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 651Each event is marked with an Enterprise Event ID

Strany 648

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13652Command-Line Interface, Graphical User Interface

Strany 649

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 653To enable automatic forwarding of all Data Prote

Strany 650

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13654Refer to the omnihealthcheck man page for more in

Strany 651

Chapter 14 65514 ADIC/GRAU DAS and STK ACS Libraries

Strany 652

ADIC/GRAU DAS and STK ACS LibrariesIn This ChapterChapter 14656In This ChapterThis chapter assumes that you have already physically configured the ADI

Strany 653

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 657ADIC/GRAU DAS and STK ACS IntegrationsWho Uses the ADIC/GRAU DA

Strany 654

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14658Figure 14-1 Data Protector and ADIC/GRAU DAS Library Systems Int

Strany 655

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 659Configuration BasicsWhen considering your environment and the c

Strany 656

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 2 39Backup Device Auto-detectionThe XCopy engine must reside on the F

Strany 657 - MC/ServiceGuard Integration

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14660(added to an Data Protector media pool), it remains under Data P

Strany 658

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 661Although you can change the label and exclude the barcode numbe

Strany 659

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14662The ADIC/GRAU DAS Library DeviceData Protector provides full support f

Strany 660

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 663• Before you configure a Data Protector ADIC/GRAU backup device, you

Strany 661

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14664NOTE This applies to HP-UX and Windows.For further questions on the co

Strany 662

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 665✓ A list of available drives with corresponding DAS name of the drive

Strany 663

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14666At this stage, you should have your hardware connected and your DAS so

Strany 664

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 667dasadmin listd [client], where [client] is the DAS Client for which t

Strany 665

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14668You should see the library drives with corresponding device files disp

Strany 666 - SERVICE_RESTART [0] = “-r 2”

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6692. Open the EIF-Configuration window by double-clicking the I/O unit

Strany 667 - Clients on MC/ServiceGuard

Contents viiSelecting Media for Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Media Selection

Strany 668

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 240Configuring Standalone DevicesRefer to the online Help index keywo

Strany 669

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14670• Enter the Device Name and, below, Description.•In the Client text bo

Strany 670 - Veritas Cluster Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 671Configuring the indirect access platform requires the same preparator

Strany 671

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146723. In the Edit menu, click Find. The Find dialog box appears.Use the a

Strany 672

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 673Adding Media to a Media PoolAdding media to a media pool registers th

Strany 673

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14674The Medium Size button decides whether Data Protector will Determine t

Strany 674 - Data Source Integration (DSI)

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 675Follow online Help for information on specific items in the wizard.11

Strany 675

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146766. Right-click your selected slots and their media, and then click Ver

Strany 676 - Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6776. Change the information that appears in the Results Area. See onlin

Strany 677

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146782. In the Scoping Pane, click Devices. The list of configured devices

Strany 678 - ManageX Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6791. In the HP OpenView Storage Data Protector Manager, switch to the D

Strany 679

Configuring and Using Backup DevicesSupport of New DevicesChapter 2 41Support of New DevicesTo use a device that is not listed as supported in the HP

Strany 680

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14680The STK ACS Library DeviceThe concepts, configuration, and installation of t

Strany 681

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 681Connecting Library DrivesPhysically connect the library drives and robotics

Strany 682

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14682• Data Protector has to be installed and configured. See HP OpenView Storage

Strany 683 - Examples

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 683If a CAP is not in manual operating mode, change the mode using the followi

Strany 684

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14684You should see the library drives with corresponding device files/SCSI addre

Strany 685 - Libraries

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 685ACSSA> query cap allThe format specification of an ACS CAP has to be the

Strany 686

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14686/<Data_Protector_home>/acs/ssi/ssi.sh start <ACS_LS_hostname>4.

Strany 687

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 687• Follow the same steps for creating drives as in the indirect library acce

Strany 688

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14688Entering MediaUse this functionality to physically enter media into an STK r

Strany 689 - Media Management Basics

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 689Adding Media to a Media PoolAdding media to a media pool registers the new

Strany 690

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 242Using Several Drive Types in a LibraryUsing several drive types o

Strany 691

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14690The Medium Capacity button defines whether Data Protector will Determine the

Strany 692 - Preparing for Installation

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 69111.Optionally, use the Medium Capacity button to define whether Data Protec

Strany 693

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 146921. In the HP OpenView Storage Data Protector Manager, switch to the Devices

Strany 694

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 693Moving MediaUse this function to move media from one media pool to another.

Strany 695

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14694See online Help for further information. This action queries the ASCLM host

Strany 696

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 695NOTE If the number of media to be removed at once exceeds fourteen, the med

Strany 697

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14696Observe messages generated during the process in the Library Management wind

Strany 698

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 697Troubleshooting Library Installation and Config

Strany 699 - Using the Data Protector GUI

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14698(or: dasadmin dismount -d <DRIVENAME>)wher

Strany 700

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 699pol 9 for STKThe default media type is DLT.

Strany 701

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 2 43On Windows and UNIX systems, you can configure separate media po

Strany 702

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14700

Strany 703

Appendix A A-1A Further Information

Strany 704

Further InformationIn This AppendixAppendix AA-2In This AppendixThis chapter gives information on the following topics:“Backing Up and Restoring UNIX

Strany 705

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-3Backing Up and Restoring UNIX SpecificsThis section explains how to backup spe

Strany 706

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-4If the amount of data modified on the snapped filesystem is higher than the spa

Strany 707

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-5# snapping the same FS will cause the Pre-exec script to fail and# a DA to abo

Strany 708

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-6# - a block special file of the snapshot FS## NOTE# In case of multiple Disk Ag

Strany 709

Further InformationData Protector CommandsAppendix A A-7Data Protector CommandsFor a complete list of supported Data Protector commands, refer to the

Strany 710 - The STK ACS Library Device

Further InformationPerformance ConsiderationsAppendix AA-8Performance ConsiderationsThis section gives an overview of the most common backup performan

Strany 711

Further InformationPerformance ConsiderationsAppendix A A-9The speed also varies if a device-compression gets used. The achievable compression ratio d

Strany 712

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 244Shared Devices in the SAN EnvironmentThis section describes some o

Strany 713

Further InformationPerformance ConsiderationsAppendix AA-10• Load Balancing: This is where Data Protector dynamically determines which filesystem shou

Strany 714

Further InformationPerformance ConsiderationsAppendix A A-11NOTE By default, software compression should be disabled. Software compression should only

Strany 715

Further InformationPerformance ConsiderationsAppendix AA-12Image Backup Versus FilesystemIt used to be more efficient to back up images (raw volumes)

Strany 716

Further InformationPerformance ConsiderationsAppendix A A-13If you suspect that the sustained data flow to the tape device is too low or that the devi

Strany 717

Further InformationExample of Scheduled Eject of MediaAppendix AA-14Example of Scheduled Eject of MediaYou might want to eject all media that were use

Strany 718

Further InformationExample of Scheduled Eject of MediaAppendix A A-15given in the next section. The script (HP-UX and Solaris systems) or the starting

Strany 719

Further InformationExample of Scheduled Eject of MediaAppendix AA-16 $report =`"${OMNIBIN}omnimm" -eject \"$lib\" $slots`; #

Strany 720

Further InformationExample of Scheduled Eject of MediaAppendix A A-17 while (($lib, $slot) = each(%List)) { $result |=&Library_Eject($li

Strany 721

Further InformationExample of Scheduled Eject of MediaAppendix AA-18 if (!keys(%List)) { print "[Warning] No tape(s) to eject.\n";

Strany 722

Further InformationExample of Scheduled Eject of MediaAppendix A A-19 print "[Normal] Starting eject of media that have been used in the last

Strany 723

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 45Figure 2-5 Multiple System to Multiple Device Connectivity in SAN

Strany 724

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-20Examples of Pre-Exec and Post-Exec Commands for UNIX The followin

Strany 725

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-21elseecho "Failed to unmount the disk --> ABORTED!"e

Strany 726 - Management window

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-22fiDisk Image Post-Exec: Mount a Disk After the Raw Volume Backup#

Strany 727

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-23Session Post-Exec: Notify User#!/bin/sh/opt/omni/bin/omnirpt -re

Strany 728

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-24then echo "Restarted backup --> backup will not be restar

Strany 729 - Chapter 14 699

Further InformationDisaster Recovery: Move Kill Links on HP-UX 11.xAppendix A A-25Disaster Recovery: Move Kill Links on HP-UX 11.xProceed as shown bel

Strany 730 - Chapter 14700

Further InformationCreating a libaci.o on AIXAppendix AA-26Creating a libaci.o on AIXOmniBack II A.03.10 and EarlierOn AIX, Data Protector DAS Agent u

Strany 731 - A Further Information

Further InformationCreating a libaci.o on AIXAppendix A A-27#! /usr/omni/lib/libaci.aaci_initializeaci_qversionaci_initd_errnoaci_viewaci_drivestatusa

Strany 732 - In This Appendix

Further InformationExample of the Package Configuration FileAppendix AA-28Example of the Package Configuration FileThis section gives an example of a

Strany 733 - VxFS Snapshot

Further InformationExample of the Package Configuration FileAppendix A A-29# Enter the failover policy for this package. This policy will be used# to

Strany 734

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 246Using FC-AL SANs with LIPUsing tape devices in Fibre Channel Arbit

Strany 735

Further InformationExample of the Package Configuration FileAppendix AA-30# move the package back to its primary node whenever the primary node# is ca

Strany 736

Further InformationExample of the Package Configuration FileAppendix A A-31# execution of each script.# Note: The HALT_SCRIPT_TIMEOUT should be greate

Strany 737 - Data Protector Commands

Further InformationExample of the Package Configuration FileAppendix AA-32# specified SERVICE_HALT_TIMEOUT, the cluster software will send# out the SI

Strany 738 - Performance Considerations

Further InformationExample of the Package Configuration FileAppendix A A-33# the subnets defined goes down, the package will be switched to another# n

Strany 739

Further InformationExample of the Package Configuration FileAppendix AA-34# If DEFERRED is selected, ServiceGuard will not attempt to start # res

Strany 740

Further InformationExample of the Package Configuration FileAppendix A A-35# for the first operator, and only < or <= may be used for the second

Strany 741

Further InformationExample of the Package Configuration FileAppendix AA-36# Uncomment the following lines to specify Package Resource Dependencies.##R

Strany 742

Further InformationExample of the Package Configuration FileAppendix A A-37NODE_FAIL_FAST_ENABLEDNO

Strany 743

Further InformationExample of the Package Control FileAppendix AA-38Example of the Package Control FileThis section gives an example of a package cont

Strany 744 - Schedule the Report Group

Further InformationExample of the Package Control FileAppendix A A-39## Uncomment the first line (VGCHANGE="vgchange -a e -q n"), and commen

Strany 745

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 47Direct Library Access ConceptWith direct library access, every sy

Strany 746

Further InformationExample of the Package Control FileAppendix AA-40# VG[0]=vg01# VG[1]=vg02## The volume group activation method is d

Strany 747

Further InformationExample of the Package Control FileAppendix A A-41# filesystem will be fsck'd prior to being mounted. The filesystems will be

Strany 748

Further InformationExample of the Package Control FileAppendix AA-42# 192.10.25.0 enter:# IP[0]=192.10.25.12 # SUBNET[0]=192.10.25.0

Strany 749

Further InformationExample of the Package Control FileAppendix A A-43## SERVICE_NAME[1]=pkg1b# SERVICE_CMD[1]="/usr/bin/X11/xlo

Strany 750 - Commands for UNIX

Further InformationData Protector Log Files Example EntriesAppendix AA-44Data Protector Log Files Example EntriesThis section provides some typical Da

Strany 751

Further InformationData Protector Log Files Example EntriesAppendix A A-4503/02/00 09:36:51 INET.26130.0 ["/src/lib/ipc/ipc.c /main/r31_split/10

Strany 752

Further InformationData Protector Log Files Example EntriesAppendix AA-465/14/01 12:41:41 PM OMNIDBUTIL.98.124 ["db/vel_cls_spec.c /main/39"

Strany 753

Further InformationData Protector Log Files Example EntriesAppendix A A-4702/04/00 13:38:56 0a110210:389ac85b:3c6e:0001 "[CBF502] DLT_ARC_8"

Strany 754

Further InformationData Protector Log Files Example EntriesAppendix AA-4803/15/01 12:40:43Database check error! Can not proceed with upgrade.03/15/01

Strany 755 - Move Kill Links on HP-UX 11.x

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix A A-49Windows Manual Disaster Recovery Preparation TemplateThe templa

Strany 756 - Creating a libaci.o on AIX

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 248This section describes how you can manually configure the library

Strany 757

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix AA-50Table A-1client properties computer namehostnamedriversWindows S

Strany 758

Further InformationChanging Block Size on Windows Media AgentAppendix A A-51Changing Block Size on Windows Media AgentIn order to increase the maximum

Strany 759 - Appendix A A-29

Further InformationChanging Block Size on Windows Media AgentAppendix AA-52

Strany 760 - Appendix AA-30

G-1Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge System Library Server (ACSLS) software that manage

Strany 761 - Appendix A A-31

G-2 Glossary(disk partitioning and logical volume configuration) and automatic recovery of the original system configuration and user data that was

Strany 762 - Appendix AA-32

G-3Glossaryspecified in a backup specification or an interactive session. All clients configured in one backup specification are backed up together

Strany 763 - Appendix A A-33

G-4 GlossaryBC (HP StorageWorks Disk Array XP specific term)The Business Copy XP allows to maintain internal copies of HP StorageWorks Disk Array XP

Strany 764 - Appendix AA-34

G-5GlossaryEMC Symmetrix SLDs that need to be protected. See also BC and BC Process.boolean operators The boolean operators for the full text search

Strany 765 - Appendix A A-35

G-6 Glossaryfor purposes such as data duplication, backup, and disaster recovery. CA operations involve the main (primary) disk arrays and the remot

Strany 766 - Appendix AA-36

G-7Glossaryallocate licenses to specific cells to suit your needs. See also MoM.Centralized Media Management Database (CMMDB) See CMMDB.channel (Ora

Strany 767 - Appendix A A-37

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 49Figure 2-6 SAN Environment ConfigurationBecause the library is at

Strany 768

G-8 Glossaryenvironment. One cell can control the robotics, serving the devices that are connected to systems in other cells.The CMMDB must reside o

Strany 769 - Appendix A A-39

G-9Glossaryusers who are granted the Reporting and notifications user rights. You can view or delete all events in the Event Log.Data Protector user

Strany 770 - Appendix AA-40

G-10 Glossarydelta backup A delta backup is a backup containing all the changes made to the database from the last backup of any type.See also backu

Strany 771 - Appendix A A-41

G-11Glossarydirect backup A SAN-based backup solution in which data movement directly from disk to tape (or to other secondary storage) is facilitat

Strany 772 - Appendix AA-42

G-12 Glossarydisk group (Veritas Volume Manager specific term)The basic unit of data storage in VxVM system. A disk group can consist of one or more

Strany 773 - Appendix A A-43

G-13Glossarysystem restore along with the target operating system configuration data. It is deleted after the target system is restored to the origi

Strany 774

G-14 GlossaryProtector cells which are managed and administered from a central cell using the Manager-of-Managers concept.See also MoM.EVA Agent (HP

Strany 775

G-15Glossaryinterface while on the other side there are parallel SCSI ports. The bridge or multiplexer enables SCSI packets to be moved between the

Strany 776

G-16 Glossaryfull database backup A backup of all data in a database regardless of whether it has changed after the last database backup was created

Strany 777

G-17Glossaryhosting system A working Data Protector client used for Disk Delivery Disaster Recovery with a Data Protector Disk Agent installed.HP IT

Strany 778

ContentsviiiBacking Up CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Backing Up Windows Clients U

Strany 779 - Preparation Template

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 250✓ Use a lock name if the (physical) device will be used by another

Strany 780

G-18 Glossaryan internal cache memory, and control and diagnostic software commonly referred to as the microcode.IDB The Data Protector Internal Dat

Strany 781 -

G-19Glossarydevice during the time of the original pair split, and the data that was written to the standard device during the split is overwritten

Strany 782 - Appendix AA-52

G-20 Glossarysoftware packages for a specific architecture. The Installation Server is used for remote installation of Data Protector clients. In mi

Strany 783 - Glossary

G-21GlossaryLBO (EMC Symmetrix specific term)A Logical Backup Object (LBO) is an object of data storage/retrieval in the EMC Symmetrix environment.

Strany 784

G-22 GlossaryThe lock name is a user specified string that is used for locking all such device configurations to prevent collision if several such d

Strany 785

G-23Glossaryconnect to an operating system or software application. The password has to be the same as the password specified in the Oracle password

Strany 786

G-24 GlossaryStorageWorks Disk Array XP specific term) and HP StorageWorks Disk Array XP LDEV.Manager-of-Managers (MoM) See Enterprise Cell Manager.

Strany 787

G-25Glossarymedia pool A set of media of the same type (such as DDS) used and tracked as a group. Media are formatted and assigned to a media pool.m

Strany 788

G-26 GlossaryMicrosoft Volume Shadow Copy service (VSS) A software service that provides a unified communication interface to coordinate backup and

Strany 789

G-27GlossaryMU number (HP StorageWorks Disk Array XP specific term)A Mirror Unit number is an integer number (0, 1 or 2), used to indicate a first l

Strany 790

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 51Protector then configures the device by setting up a logical name

Strany 791

G-28 GlossaryOn-Bar (Informix specific term)A backup and restore system for OnLine Server. ON-Bar enables you to create a copy of your OnLine Server

Strany 792

G-29GlossaryOracle instance (Oracle specific term)Each installation of an Oracle database on one or more systems. One computer system can have sever

Strany 793

G-30 Glossarycalled IT/Operation, Operations Center and Vantage Point Operations.See also merging. ownership The ownership of a backup determines wh

Strany 794

G-31Glossarydata for multiple objects selected for restore is read from media at the same time, thereby improving performance.parallelism The concep

Strany 795

G-32 Glossarypublic folder store (MS Exchange 2000 Server specific term)The part of the Information Store that maintains information in public folde

Strany 796

G-33GlossaryManager and manages the IDB. The process is started when Data Protector is installed on the Cell Manager.Recovery Catalog (Oracle specif

Strany 797

G-34 Glossaryconfiguration. In bidirectional configurations, the RCU can act as an MCU.Removable Storage Management Database (Windows specific term)

Strany 798

G-35Glossaryof replica storage versions that are to be kept on a disk array before the oldest replica storage version for the backup specification i

Strany 799

G-36 Glossarydevice if someone has manually manipulated media without using Data Protector to eject or enter, for example.Scheduler A function that

Strany 800

G-37Glossaryshared disks A Windows disk on another system that has been made available to other users on the network. Systems with shared disks can

Strany 801

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 252Prerequisite Before configuring Data Protector devices in a SAN en

Strany 802

G-38 Glossarysplit mirror backup (HP StorageWorks Disk Array XP specific term) See ZDB tape backup, ZDB disk/tape backup and ZDB disk backup.split m

Strany 803

G-39Glossaryaddress for each backup drive connected to that client. A single SCSI entry is required for a single-drive device and multiple SCSI entr

Strany 804

G-40 GlossarySymmetrix Application Programming Interface (SYMAPI) (EMC Symmetrix specific term)A linkable library of functions that can interface w

Strany 805

G-41Glossaryserver is a domain controller, Active Directory directory services and the Sysvol directory are also contained in the System State data.

Strany 806

G-42 GlossaryTerminal Services (Windows specific term)Windows Terminal Services provide a multi-session environment that allows clients to access a

Strany 807

G-43Glossaryarchiving of transaction logs should be enabled to prevent you from losing the transaction log files that are created after the last IDB

Strany 808

G-44 Glossaryvaulting media The process of storing media to a safe and remote place. The media are brought back to the data center when they are nee

Strany 809

G-45Glossaryvolume mountpoint (Windows specific term)An empty directory on a volume that can be used to mount another volume. The volume mount point

Strany 810

G-46 Glossarythat write persistent information on a volume. Writers also participate in the shadow copy synchronization process by assuring data con

Strany 811

G-47GlossaryZDB part of the IDB (ZDB specific term)A part of the IDB, storing ZDB related information such as original and replica storage versions,

Strany 812

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 53The drive naming convention shows its benefits during backup spec

Strany 813

G-48 Glossary

Strany 814

I-1Aabortingall sessions, 623backup session during the size determination, 312running sessions, 312sessions, elapsed time, 625sessions, using ID, 62

Strany 815

IndexI-2cluster (MC/SG), 638cluster (MSCS), 619CONFIGURATION, 176DHCP Server, 178direct backup environment, 204disk image, UNIX, 166disk image, Window

Strany 816

Index I-3segment size, 78shared in the SAN, 44specifying type and name, figure, 24streaming, 76used by multiple applications, locking, 46using, 17bac

Strany 817

IndexI-4concepts, 3Disk Agent, 3exporting, 377importing, 377importing, MoM, 363Media Agent, 3monitoring simultaneously, 314moving clients, 378reports

Strany 818

Index I-5Novell NetWare Cluster Services, 642omniclus command, 623package (MC/SG, Veritas Cluster), 615primary node, 615secondary node, 615switchover

Strany 819

IndexI-6new Microsoft Exchange Profile, 348notifications, 342, 351notifications on the Web, 353notifications, using Web reporting interface, 355report

Strany 820

Index I-7copying to the Web server, 354Data Source Integration, 644database See IDBbackup problems, 598import problems, 598database configuration See

Strany 821

IndexI-8Disk Delivery method, 459, 507Enhanced Automated method, 463logging on after, 514One Button method, 472overview, 437Phase 0, 442Phase 1, 442Ph

Strany 822

Index I-9scheduled eject, 138elapsed session time, 625e-mail send methodnotifications, 348notifications, creating a new Microsoft Exchange Profile, 3

Strany 823

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 254Figure 2-7 Setting Advanced Options When you are setting the locki

Strany 824

IndexI-10backing up OpenVMS, 201backing up UNIX, 161backing up Windows, 168restore limitations, 278restoring Novell NetWare, 287restoring OpenVMS, 291

Strany 825

Index I-11HP-UX and Solaris clientdisaster recovery methods, 437HTML report format, 329IIDBarchitecture, 384backing up, 398backing up Windows Registr

Strany 826

IndexI-12the catalog from media, 114importing media, 113in a magazine device, 115multiple, figure, 114procedure, 113Inc backups, definition, 213Inc1-9

Strany 827

Index I-13limiting port range, firewall environment, 528listrestored files, 295List of Pools report, 324load balancing, 232backup option, 237local di

Strany 828

IndexI-14adding to pool, 107adding unused to a media pool, 107adding used to a media pool, 107allocation policy, 103, 120appendable, 104appendable of

Strany 829

Index I-15scanning media in a device, 129searching for and selecting a medium, 135selecting media for backup, 120setting data protection, 122using a

Strany 830

IndexI-16MSCS See Microsoft Cluster Servermulti host support, 32multiple backup specifications, 155multiple reports, adding to the report group, 337NN

Strany 831

Index I-17omit deleted files, 294omniclus, 623omnirc optionsoverview, 525usage, 525variables, 525omnirc options file, 525omnirptgenerating reports wi

Strany 832

IndexI-18Disk Delivery Disaster Recovery, Windows client, 460Enhanced Disaster Recovery, Windows NT/2000 client, 466, 475for disaster recovery, 443Man

Strany 833

Index I-19Enhanced Disaster Recovery, Windows NT/2000 client, 470One Button Disaster Recovery, Windows NT/2000, 477recurring backupconfiguring, 210re

Strany 834

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 55Figure 2-8 Summary of Device Definitions Using Lock Names Enablin

Strany 835

IndexI-20protection attributes, 296sparse files, 296target hostname, 294time attributes, 296restoringbindery, Novell NetWare, 288data to different cli

Strany 836

Index I-21Scoping Pane, 10SCSI address, 29SCSI IDlibrary device, 29SCSI-II Library devicesSCSI address, 29searching for media, 135secondary node, 615

Strany 837

IndexI-22pre- and post-exec commands, 250, 255Specific Event ID, 651specific object, 225specifyingpathname for a file device, figure, 28type and name

Strany 838

Index I-23troubleshooting file, 562user interface, 590when the user interface not accessible, 562troubleshooting backup sessionsmount request for a l

Strany 839

IndexI-24used mediaadding, 107user accountsetting for the Inet, 187User Check Failed notification, 347, 606user classdescription of access rights, 83u

Strany 840

Index I-25viewingcurrently running sessions, 309details of a running session, 310files from media, 301finished sessions, 310viewsmodifying in the med

Strany 841

IndexI-26XXCopy engine, 39, 204

Strany 842

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 256Figure 2-9 Selecting Direct AccessManually Configuring the libtab

Strany 843

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 57• <DeviceFile | SCSIPath> is the control path to the librar

Strany 844

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 258Example libtab file on donatExample of the libtab file on host don

Strany 845

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 59In order to share a device among multiple systems, configure one

Strany 846

Contents ixPreventing Backup Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Restarting Failed B

Strany 847

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 260Static Drives The drives can still be used in the standard way usi

Strany 848

Configuring and Using Backup DevicesDrive CleaningChapter 2 61Drive CleaningThere are several methods for cleaning dirty drives:• Library built-in cle

Strany 849

Configuring and Using Backup DevicesDrive CleaningChapter 262to store cleaning tape(s).• Detection and use of cleaning tapes depends on the system pla

Strany 850

Configuring and Using Backup DevicesDrive CleaningChapter 2 631. Enable dirty drive detection. This needs to be done for all device types (standalone

Strany 851

Configuring and Using Backup DevicesDrive CleaningChapter 264Where <file_name> is the name of the file you will use to simulate a dirty drive, a

Strany 852

Configuring and Using Backup DevicesBusy Drive HandlingChapter 2 65Busy Drive HandlingData Protector expects drives to be empty, i.e., there should no

Strany 853

Configuring and Using Backup DevicesActivating Barcode SupportChapter 266Activating Barcode SupportIf a SCSI library device uses media with barcodes,

Strany 854

Configuring and Using Backup DevicesActivating Barcode SupportChapter 2 67Figure 2-10 Activating Barcode Reader Support

Strany 855

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 268Activating Cartridge Memory SupportCartridge memory support can be a

Strany 856 - , 39, 204

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 2 69Figure 2-11 Cartridge Memory Support Activation for a Drive

Komentáře k této Příručce

Žádné komentáře