HP OpenView Storage Data ProtectorAdministrator’s GuideManual Edition: May 2003Manufacturing Part Number: B6960-90078Release A.05.10© Copyright Hewlet
Contentsx7. Monitoring, Reporting, Notifications, and the Event LogIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 270Disabling a Backup DeviceDisabling a backup device is useful when the device i
Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 2 71Figure 2-12 Disable Device
Configuring and Using Backup DevicesRemoving a Backup DeviceChapter 272Removing a Backup Device By removing a backup device from the Data Protector co
Configuring and Using Backup DevicesRenaming a Backup DeviceChapter 2 73Renaming a Backup DeviceWhen you rename a backup device, the device is no long
Configuring and Using Backup DevicesDevice LockingChapter 274Device LockingInternal Locking The internal locking of backup devices prevents two Data P
Configuring and Using Backup DevicesDevice LockingChapter 2 75Data Protector recognizes in order to lock the device before starting backup and restore
Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 276Device Concurrency, Segment Size, and Block SizeStreami
Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 77Figure 2-13 Advanced Options Dialog Box: Concurrency
Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 278Figure 2-14 Device Properties Dialog Box: ConcurrencyCh
Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 79You can change the segment size in the Advanced Option
Contents xiGenerating the Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Configuring Notif
Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 280Before changing the block size for a particular SCSI ca
Chapter 3 813 Configuring Users and User Groups
Configuring Users and User GroupsIn This ChapterChapter 382In This ChapterThis chapter explains how to configure both user groups and individual users
Configuring Users and User GroupsData Protector User RightsChapter 3 83Data Protector User RightsData Protector users have the user rights of the user
Configuring Users and User GroupsData Protector User RightsChapter 384Start backup specification Allows the user to perform a backup using a backup
Configuring Users and User GroupsData Protector User RightsChapter 3 85Start restore Allows users to restore their own data as well as monitor and a
Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 386Predefined Data Protector User GroupsThe following default groups are
Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 3 87The user rights you have set on the Cell Manager determine the avail
Configuring Users and User GroupsAdding or Deleting a User GroupChapter 388Adding or Deleting a User GroupThe default Data Protector user groups are s
Configuring Users and User GroupsAdding or Deleting a User GroupChapter 3 89Deleting a User Group1. In the Data Protector Manager, switch to the Users
ContentsxiiReducing the IDB Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Reducing the IDB Size
Configuring Users and User GroupsAdding or Deleting a UserChapter 390Adding or Deleting a UserAfter the product installation, the following users are
Configuring Users and User GroupsAdding or Deleting a UserChapter 3 91Figure 3-2 Adding New UsersFor further information, press F1.
Configuring Users and User GroupsModifying a UserChapter 392Modifying a UserYou can change the properties of an existing user, or move the user from o
Configuring Users and User GroupsChanging User Group RightsChapter 3 93Changing User Group RightsUsers have the rights of the groups to which they bel
Configuring Users and User GroupsExample User ConfigurationsChapter 394Example User ConfigurationsThis section gives some examples of typical user con
Configuring Users and User GroupsExample User ConfigurationsChapter 3 952. Add the users who will be able to configure their own backups to this user
Configuring Users and User GroupsExample User ConfigurationsChapter 396
Chapter 4 974 Managing Media
Managing MediaIn This ChapterChapter 498In This ChapterThis chapter gives detailed information on how to manage your media, including:“Overview of Dat
Managing MediaOverview of Data Protector Media ManagementChapter 4 99Overview of Data Protector Media ManagementData Protector provides a powerful med
Contents xiiiPreparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460Recove
Managing MediaOverview of Data Protector Media ManagementChapter 4100• The ability to store information about media in a central place and share this
Managing MediaOverview of Data Protector Media ManagementChapter 4 101“Creating a Media Pool” on page 102.“Adding Media to a Media Pool” on page 107.2
Managing MediaCreating a Media PoolChapter 4102Creating a Media PoolWhat Is a Media Pool?A media pool represents a set of media of the same type (for
Managing MediaCreating a Media PoolChapter 4 103Properties of a Media PoolThis section describes the properties of a media pool. You specify them when
Managing MediaCreating a Media PoolChapter 4104If InitOnLoosePolicy is set to 1 (by default, it is set to 0) media that are unrecognized by Data Prote
Managing MediaCreating a Media PoolChapter 4 105medium is used first. If additional media are needed during the same backup session, they must be free
Managing MediaCreating a Media PoolChapter 4106Maximum number of overwrites The usage of a medium is defined as the number of overwrites from the beg
Managing MediaAdding Media to a Media PoolChapter 4 107Adding Media to a Media PoolOnce you have created a media pool, you have to add the media that
Managing MediaFormatting MediaChapter 4108Formatting MediaWh at Is Forma tting Media?Formatting media prepares them for use with Data Protector by sa
Managing MediaFormatting MediaChapter 4 109How to Format MediaTo format media, browse for the specific device, media pool, or library slot in the Devi
ContentsxivGeneral Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514Troubleshooting Ass
Managing MediaFormatting MediaChapter 4110Figure 4-2 Cartridge Memory Reformat for Specific Slot What’s Next? Once you have formatted your media, you
Managing MediaFormatting MediaChapter 4 111TIP To format media used by other applications, use the Force Operation option. Data Protector protected me
Managing MediaFormatting MediaChapter 4112NOTE Do not rely on Data Protector to recognize other media types, as recognition depends on the platforms y
Managing MediaImporting MediaChapter 4 113Importing Media Importing media adds media already used by Data Protector to a media pool, without losing th
Managing MediaImporting MediaChapter 4114Figure 4-3 Import Multiple MediaImporting the Catalog from MediaImporting the catalog from a medium writes th
Managing MediaImporting MediaChapter 4 115Figure 4-4 Import CatalogImporting Media in a Magazine DeviceIf you use a device with magazine support, Data
Managing MediaImporting MediaChapter 4116Figure 4-5 Import MagazineHow to Import a Single Medium into a MagazineTo import a single medium into a magaz
Managing MediaAppending Backups to MediaChapter 4 117Appending Backups to MediaData Protector allows you to add new backups to media which already con
Managing MediaAppending Backups to MediaChapter 4118• Link a different pool to each client in the backup specification, or create a separate backup sp
Managing MediaUsing a Pre-Allocation List of Media for BackupChapter 4 119Using a Pre-Allocation List of Media for BackupYou can specify the order in
Contents xvTroubleshooting Data Protector Services and Daemons . . . . . . . . . . . . . . . . . . . . . . . 569Problems Starting Data Protector Ser
Managing MediaSelecting Media for BackupChapter 4120Selecting Media for BackupData Protector media management automatically selects the most appropria
Managing MediaSelecting Media for BackupChapter 4 121Media in poor condition are not used for backup. Media in fair condition are used only if no medi
Managing MediaSetting Data Protection for MediaChapter 4122Setting Data Protection for MediaData Protector keeps track of data on every medium used. W
Managing MediaRecycling MediaChapter 4 123Recycling Media Data Protector keeps track of data on every medium used. When configuring a backup, you prot
Managing MediaMoving Media to Another PoolChapter 4124Moving Media to Another PoolData Protector lets you move a medium from one media pool to another
Managing MediaExporting Media from Data ProtectorChapter 4 125Exporting Media from Data ProtectorWhat Is Exporting Media?Exporting (removing) a medium
Managing MediaModifying Media LocationsChapter 4126Modifying Media LocationsWhat Is a Location?The media location helps you to physically locate the m
Managing MediaModifying Media DescriptionsChapter 4 127Modifying Media DescriptionsWhat Is a Description?The media description helps you identify medi
Managing MediaVerifying Data on a MediumChapter 4128Verifying Data on a MediumWhat Is Verifying? Verifying a medium shows whether the data on the medi
Managing MediaScanning Media in a DeviceChapter 4 129Scanning Media in a DeviceWhat Is Scanning? You scan a device to update Data Protector informatio
ContentsxviTemporary Directory Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597Problems During Backup
Managing MediaScanning Media in a DeviceChapter 4130List Cartridge Memory List Cartridge Memory, available for Cartridge Memory enabled drives, is equ
Managing MediaChecking the Condition of a MediumChapter 4 131Checking the Condition of a MediumData Protector allows you to view information about the
Managing MediaChecking the Condition of a MediumChapter 4132Cartridge Memory ListTo view some additional information about Cartridge Memory enabled me
Managing MediaChecking the Condition of a MediumChapter 4 133Statuses of Media and Media PoolsMedia or media pools can have three statuses, based on t
Managing MediaChecking the Condition of a MediumChapter 4134Changing How Media Condition Is CalculatedWhen you add a medium to a media pool, you can d
Managing MediaSearching for and Selecting a MediumChapter 4 135Searching for and Selecting a MediumUse this function to locate and select specific med
Managing MediaEntering a Medium into a DeviceChapter 4136Entering a Medium into a DeviceData Protector allows you to physically enter media into a lib
Managing MediaEjecting a Medium from a DeviceChapter 4 137Ejecting a Medium from a DeviceData Protector allows you to physically eject media from the
Managing MediaEjecting a Medium from a DeviceChapter 4138TIP Ejecting of media can be scheduled. Refer to “Scheduled Eject of Media” on page 138 for d
Managing MediaEjecting a Medium from a DeviceChapter 4 139If media are not removed from the mail slots after a default time span, and there are still
Contents xvii14. ADIC/GRAU DAS and STK ACS LibrariesIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing MediaVaulting MediaChapter 4140Vaulting MediaWhat Is Vaulting? Vaulting is a process of moving media with important information to a safe pla
Managing MediaVaulting MediaChapter 4 1414. Select the media that you want to store in the vault, change the location of the media, eject the media, a
Managing MediaVaulting MediaChapter 41422. Take the media from a vault, enter the media in the library, and scan them.3. If the catalog protection for
Managing MediaCopying MediaChapter 4 143Copying MediaWhat Is Media Copying?Data Protector enables copying of backed up data to a second set of media.
Managing MediaCopying MediaChapter 4144NOTE When copying media, it is possible that the target medium reaches the end of the tape before the source me
Managing MediaCopying MediaChapter 4 145Automated Media CopyingWhat Is Automated Media Copying?Automated media copying is an automated process that cr
Managing MediaCopying MediaChapter 4146target medium is selected to which the data will be copied. The target media are selected from the same media p
Managing MediaDetection of Write-Protected MediaChapter 4 147Detection of Write-Protected MediaData Protector can detect and handle media that has bee
Managing MediaUsing Different Media Format TypesChapter 4148Using Different Media Format TypesData Protector recognizes and uses two different format
Managing MediaModifying Views in the Media Management WindowChapter 4 149Modifying Views in the Media Management WindowYou can customize the informati
ContentsxviiiCreating a libaci.o on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-26Example of th
Managing MediaModifying Views in the Media Management WindowChapter 4150
Chapter 5 1515Backup
BackupIn This ChapterChapter 5152In This ChapterThis chapter explains how to back up your data. It also describes some advanced Data Protector feature
BackupConfiguring a BackupChapter 5 153Configuring a BackupA backup is a process that creates a copy of system data on backup media. This copy is stor
BackupConfiguring a BackupChapter 5154A backup session is based on the backup specification, and can be started interactively. During the backup sessi
BackupConfiguring a BackupChapter 5 155Key Points • The backup type (full or incremental) is the same for the whole backup session. All data in a grou
BackupConfiguring a BackupChapter 5156Figure 5-2 Create New Backup Dialog Box5. Select what you want to back up. Figure 5-3 on page 157 shows data sou
BackupConfiguring a BackupChapter 5 157Figure 5-3 Source Page of the Backup Wizard 6. Select the device(s) that will be used to back up your data. See
BackupConfiguring a BackupChapter 5158Figure 5-4 Device Page of the Backup Wizard7. Select backup options. See “Using Backup Options” on page 225 for
BackupConfiguring a BackupChapter 5 159Figure 5-5 Backup Object Summary Page10. In the final page of the Backup wizard, you can save the backup specif
xixPrinting HistoryThe manual printing date and part number indicate its current edition. The printing date will change when a new edition is printe
BackupConfiguring a BackupChapter 5160Figure 5-6 Final Page of the Backup Wizard11.Click Start Backup to run the backup interactively. The Start Backu
BackupBacking Up UNIX SystemsChapter 5 161Backing Up UNIX SystemsYou can install a Disk Agent on every UNIX system in order to back it up. Alternative
BackupBacking Up UNIX SystemsChapter 5162Data Protector provides a sophisticated mechanism for incremental backups. To determine which files have chan
BackupBacking Up UNIX SystemsChapter 5 163Backing Up Clients Using Disk DiscoveryHow Are Disks Discovered?If you specify a client backup with disk dis
BackupBacking Up UNIX SystemsChapter 5164Figure 5-7 Selecting an Entire Client to Be Backed Up NOTE Selecting all of the client’s drives is not the sa
BackupBacking Up UNIX SystemsChapter 5 165To back up this filesystem using NFS, follow the same procedure as if you were backing up any other filesyst
BackupBacking Up UNIX SystemsChapter 5166NOTE It is recommended to have root permission on mounted NFS filesystems.When to Use NFS BackupUse NFS backu
BackupBacking Up UNIX SystemsChapter 5 167IMPORTANT Unmount a disk before a disk image backup and mount it later. You can use pre- and post- exec comm
BackupBacking Up Windows SystemsChapter 5168Backing Up Windows SystemsPrerequisites You have to install a Disk Agent on at least one Windows computer
BackupBacking Up Windows SystemsChapter 5 169• NTFS alternate data streams • NTFS security dataNOTE The sharing properties of a folder are not stored
iiLegal Notices Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of mer
BackupBacking Up Windows SystemsChapter 5170NTFS 3.x Filesystem FeaturesThe NTFS 3.x filesystem has introduced new file attributes and concepts, which
BackupBacking Up Windows SystemsChapter 5 171The advantages of the VSS filesystem backup are the following:• A computer can be backed up while applica
BackupBacking Up Windows SystemsChapter 5172Sparse Files Sparse files contain many zero data sets as opposed to, for example, compressed files. At bac
BackupBacking Up Windows SystemsChapter 5 173Figure 5-9 Specifying Objects Using Manual AddFor detailed steps, refer to the online Help index keyword
BackupBacking Up Windows SystemsChapter 5174Figure 5-10 Windows NT CONFIGURATION TIP The SystemRecoveryData file is only needed for Windows disaster r
BackupBacking Up Windows SystemsChapter 5 175 See “Backing Up WINS, DHCP, and DNS” on page 178.• SysVolSysVol is a shared directory that stores the se
BackupBacking Up Windows SystemsChapter 5176Backing Up CONFIGURATIONOnly one CONFIGURATION backup can run on a system at the time. You have to expand
BackupBacking Up Windows SystemsChapter 5 177Figure 5-12 System State on Windows 2000/XP/Server 2003Backing Up the Windows Registry The database repos
BackupBacking Up Windows SystemsChapter 5178Figure 5-13 Backing Up the Windows RegistryBacking Up WINS, DHCP, and DNSWINS, DHCP, DNS ServersIn TCP/IP
BackupBacking Up Windows SystemsChapter 5 179Backing Up the Windows 2000/XP/Server 2003 ServicesBacking up the Windows 2000/XP/Server 2003 services me
xxiConventionsThe following typographical conventions are used in this manual.Table 2Convention Meaning ExampleItalic Book or manual titles, and man
BackupBacking Up Windows SystemsChapter 5180This service provides automatic distribution of events to subscribing COM+ components. To back up this dat
BackupBacking Up Windows SystemsChapter 5 181For example, if you use Active Directory to publish Certificate Revocation Lists (CLRs), back up the Acti
BackupBacking Up Windows SystemsChapter 5182net stop/start “Remote Storage Engine”net stop/start “Remote Storage File”The RSS databases are located in
BackupBacking Up Windows SystemsChapter 5 183See also “Warnings When Backing Up System Disks” on page 263. Event Logs Event logs are files where the W
BackupBacking Up Windows SystemsChapter 5184How to Perform a BackupTo perform a Windows client backup, you have to create a backup specification as de
BackupBacking Up Windows SystemsChapter 5 185See “Using Backup Options” on page 225 for information on using and structuring your backup specification
BackupBacking Up Windows SystemsChapter 5186IMPORTANT The Disk Agent client must have the Inet service configured using an account with access to the
BackupBacking Up Windows SystemsChapter 5 1879. Enter the required information. See online Help for details.Setting the User Account for the Data Prot
BackupBacking Up Windows SystemsChapter 5188Figure 5-16 Inet Logon Option on Windows NT7. Click OK to return to the Services dialog box.8. Ensure that
BackupBacking Up Windows SystemsChapter 5 189Figure 5-17 Inet General Property Page on Windows 2000/XP/Server 20034. In the Log On As area, select the
xxiiData Protector provides a cross-platform (Windows and UNIX) graphical user interface. Figure 1 Data Protector Graphical User Interface
BackupBacking Up Windows SystemsChapter 5190Figure 5-18 Inet Logon option on Windows 2000/XP/Server 20037. Click Apply to apply the changes and then r
BackupBacking Up Windows SystemsChapter 5 191How to Specify a Disk Image SectionYou can specify a disk image section in two ways. In case of a zero do
BackupBacking Up Windows SystemsChapter 5192Figure 5-19 The Numbers Representing Disks (Physical Drive Number) on Windows 2000 SystemNOTE The numbers
BackupBacking Up Windows SystemsChapter 5 193Figure 5-20 The Manual Add Functionality
BackupBacking Up Novell NetWare SystemsChapter 5194Backing Up Novell NetWare SystemsThis section describes how to back up Novell NetWare filesystems a
BackupBacking Up Novell NetWare SystemsChapter 5 195• Trustee information• Inherited right mask• File and directory attributes• Time attributes (creat
BackupBacking Up Novell NetWare SystemsChapter 5196• The Compress option • The omit_deleted_files option (restore option)Files of up to 4 GB are backe
BackupBacking Up Novell NetWare SystemsChapter 5 197Figure 5-21 Backing Up NetWare 4.x and NetWare 5.x Configuration
BackupBacking Up Novell NetWare SystemsChapter 5198Client Backup with Disk DiscoveryYou can discover disks (volumes) on NetWare just as you can for UN
BackupBacking Up Novell NetWare SystemsChapter 5 199Backing Up NetWare Directory Services (NDS) Data Protector backs up NDS using Novell NetWare Stora
xxiiiContact InformationGeneral InformationGeneral information about Data Protector can be found athttp://www.hp.com/go/dataprotectorTechnical Suppo
BackupBacking Up Novell NetWare SystemsChapter 5200has its counterpart used by Data Protector, containing forward slashes, which are used for Windows
BackupBacking Up OpenVMS SystemsChapter 5 201Backing Up OpenVMS SystemsThis section describes how to back up OpenVMS filesystems.Backing Up OpenVMS Fi
BackupBacking Up OpenVMS SystemsChapter 5202Files can be backed up from mounted FILES-11 ODS-2 or ODS-5 volumes only.Limitations • Any file specificat
BackupBacking Up OpenVMS SystemsChapter 5 203Files with multiple directory entries are only backed up once using the primary path name. The secondary
BackupBacking Up in a Direct Backup EnvironmentChapter 5204Backing Up in a Direct Backup EnvironmentThis section provides the steps for the configurat
BackupBacking Up in a Direct Backup EnvironmentChapter 5 205• You need to have appropriate user rights for performing a backup. Refer to Chapter 3, “C
BackupBacking Up in a Direct Backup EnvironmentChapter 5206•rawdisks• Oracle8i databases (online)• Oracle8i databases (offline)Backing Up RawdisksPlea
BackupScheduling Unattended BackupsChapter 5 207Scheduling Unattended BackupsData Protector allows you to configure unattended backups by scheduling b
BackupScheduling Unattended BackupsChapter 5208• Each backup specification can be scheduled multiple times with different option values. Within one ba
BackupScheduling Unattended BackupsChapter 5 209Starting Backups on Specific DatesData Protector allows you to define the date and time when you want
BackupScheduling Unattended BackupsChapter 5210Fortnightly full Data Protector runs a full backup every second Friday. Between these backups, Data Pro
BackupScheduling Unattended BackupsChapter 5 211To disable a backup schedule, select the Disable Schedule option in the Schedule property page. The ba
BackupScheduling Unattended BackupsChapter 5212Running Consecutive BackupsYou can start a backup after one is finished. For example, you can start a b
BackupSelecting a Backup Type: Full or IncrementalChapter 5 213Selecting a Backup Type: Full or IncrementalTo save time and media during a backup, you
BackupSelecting a Backup Type: Full or IncrementalChapter 5214backup. Even if the previous backup was an incremental (Incr or Incr1, Incr2, ...) backu
BackupSelecting a Backup Type: Full or IncrementalChapter 5 215How to Read Table 5-1• The rows in Table 5-1 are independent of each other and show dif
BackupUsing Backup TemplatesChapter 5216Using Backup Templates Overview Data Protector backup templates are a powerful tool that can help you simplify
BackupUsing Backup TemplatesChapter 5 217Figure 5-22 Options Offered by TemplatesDestination Backup device settings specified in your template apply
BackupUsing Backup TemplatesChapter 5218Using a Backup Template When Creating a New Backup SpecificationWhen creating a new backup specification, Data
BackupUsing Backup TemplatesChapter 5 219To apply a template to backup specifications, right-click the backup specification and click Apply Template.
xxvData Protector DocumentationData Protector documentation comes in the form of manuals and online Help.Manuals Data Protector manuals are availabl
BackupUsing Backup TemplatesChapter 5220Creating a New TemplateYou can create new templates and use them for creating or modifying backup specificatio
BackupUsing Backup TemplatesChapter 5 221For more information on individual options, refer to “Using Backup Options” on page 225.
BackupGroups of Backup SpecificationsChapter 5222Groups of Backup SpecificationsData Protector offers you the ability to organize backup specification
BackupGroups of Backup SpecificationsChapter 5 223Figure 5-26 Example of Backup Specification GroupsHow to View and Create GroupsThe following procedu
BackupGroups of Backup SpecificationsChapter 5224How to Delete a GroupBefore deleting a group, you have to empty it first. One way of doing this is to
BackupUsing Backup OptionsChapter 5 225Using Backup OptionsData Protector offers a comprehensive set of backup options to help you fine-tune your back
BackupUsing Backup OptionsChapter 5226For split mirror and snapshot backups, the backup type is ignored (it is set to full). Data protection that is s
BackupUsing Backup OptionsChapter 5 227Figure 5-27 Backup OptionsMost Frequently Used Backup OptionsThis section describes the options that are most l
BackupUsing Backup OptionsChapter 5228Data Protection: Specifying How Long Data Is Kept on the MediaConfiguring protection policies is extremely impor
BackupUsing Backup OptionsChapter 5 229You can specify a different period of protection for each individual or periodic scheduled backup. The data pro
xxvi• HP OpenView Storage Data Protector UNIX Integration GuideThis manual describes integrations running on the UNIX operating system, such as Oracle
BackupUsing Backup OptionsChapter 5230Figure 5-29 Backup Object Properties - Options: ProtectionCatalog Protection: How Long Info Is Kept in the Datab
BackupUsing Backup OptionsChapter 5 231Even when catalog protection expires, you are still able to restore, but you must specify filenames manually.Be
BackupUsing Backup OptionsChapter 5232The different logging level settings influence the IDB growth, backup speed, and the convenience of browsing dat
BackupUsing Backup OptionsChapter 5 233When to Use Load BalancingIt is recommended that you use the Load Balancing option when you want to back up a l
BackupUsing Backup OptionsChapter 5234• Objects that reside on the client connected to the backup device have a higher priority.• Objects are selected
BackupUsing Backup OptionsChapter 5 235• If load balancing is only selected in the template, the device options are applied only if the backup specifi
BackupUsing Backup OptionsChapter 5236Changing the owner works only for saved backup specifications. If the backup configuration is changed and not sa
BackupUsing Backup OptionsChapter 5 237Figure 5-30 Backup Specification Options - General and OtherAvailable Backup Specification OptionsDescriptionYo
BackupUsing Backup OptionsChapter 5238• root on UNIX Cell Managers• the user specified at installation time on Windows Cell ManagersThe default value
BackupUsing Backup OptionsChapter 5 239See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying post-exec commands
xxviiHP OpenView Storage Data Protector Integration Guide for HP OpenViewThis manual describes how to install, configure, and use the integration of
BackupUsing Backup OptionsChapter 5240Figure 5-31 Filesystem Options Setting the Disk Image Options1. Select the backup specification.2. Select the Op
BackupUsing Backup OptionsChapter 5 241See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying pre-exec commands o
BackupUsing Backup OptionsChapter 5242Figure 5-33 Object Properties - General and Trees/Filters The Object Properties window for a UNIX filesystem con
BackupUsing Backup OptionsChapter 5 243Figure 5-34 Object Properties - General and Disk Image Options 4. Set the options and click OK to confirm the s
BackupUsing Backup OptionsChapter 5244is made. In the second traverse, only one hard link is backed up with the file contents, while all the others ar
BackupUsing Backup OptionsChapter 5 245EncodeOpen Systems and public networking make data security in large enterprises essential. Data Protector lets
BackupUsing Backup OptionsChapter 5246Open Files (Windows-Specific Option)This option controls what Data Protector does when it encounters open Window
BackupUsing Backup OptionsChapter 5 247Report Open Locked Files As (Windows-Specific Option)This option sets the report level for files that are opene
BackupUsing Backup OptionsChapter 5248Use Shadow Copy (Windows-Specific Option)When performing filesystem backup on Windows Sever 2003 systems, Data P
BackupUsing Backup OptionsChapter 5 249Device Backup OptionsYou can select the options listed below for each backup device in use. None of the setting
xxviii
BackupPre- and Post-Exec CommandsChapter 5250Pre- and Post-Exec CommandsBefore a backup or restore session begins, an additional action is sometimes n
BackupPre- and Post-Exec CommandsChapter 5 251c. The post-exec (for each object in the backup specification) starts and completes.3. The post-exec com
BackupPre- and Post-Exec CommandsChapter 5252the filename. For scripts that are not located in the <Data_Protector_home>\bin directory, you must
BackupPre- and Post-Exec CommandsChapter 5 253RESTARTED Set to 1 if this is a restarted backup session, otherwise set to 0. The post-exec can use th
BackupPre- and Post-Exec CommandsChapter 5254✓ The execution of pre- and post-exec commands is implemented using the Windows pipe mechanism. All proce
BackupPre- and Post-Exec CommandsChapter 5 255Pre- and Post-Exec Commands for a Specific Backup ObjectPre- and post-exec commands for an object are ex
BackupPre- and Post-Exec CommandsChapter 5256NOTE If you perform a host backup, the pre-exec script is started once, before the first filesystem backu
BackupPre- and Post-Exec CommandsChapter 5 257✓ Time-out is provided. If no message is received within the specified time-out in seconds, the session
BackupPre- and Post-Exec CommandsChapter 5258How to Specify the Filename or Pathname?For information on how to specify the commands, refer to the onli
BackupPre- and Post-Exec CommandsChapter 5 259Key Points Check the following before configuring pre- and post- exec commands for a backup specificatio
xxixIn This BookThe HP OpenView Storage Data Protector Administrator’s Guide describes how to configure and use the Data Protector network backup pr
BackupPre- and Post-Exec CommandsChapter 5260/opt/omni/lbin/utilns/detach pre_script [arguments...]• You can disable a session’s pre- and post-exec co
BackupPre- and Post-Exec CommandsChapter 5 261Environment VariablesThe following environment variables are exported, and can be used in the pre- and p
BackupPre- and Post-Exec CommandsChapter 5262✓ The pre- and post-exec processes operate in background mode. Therefore, do not use any interactive comm
BackupManaging Failed BackupsChapter 5 263Managing Failed BackupsDuring a backup, some systems may not be available because they were shut down, there
BackupManaging Failed BackupsChapter 5264The following example is a list of files that cannot be opened on an active Windows NT 4.0 system with the Wi
BackupManaging Failed BackupsChapter 5 265If a backup of an object fails to start, Data Protector tries to back up this object again at the end of the
BackupManaging Failed BackupsChapter 5266NOTE You can enable Wake ONLAN support for computers equipped with a Wake ONLAN-compatible LAN interface, suc
Chapter 6 2676Restore
RestoreIn This ChapterChapter 6268In This ChapterThis chapter describes restore topics, such as how to restore specific data and how to use restore op
RestoreRestoring Your DataChapter 6 269Restoring Your DataA restore is a process that recreates the original data from a backup copy on a disk. This p
iii©Copyright 1985-86, 1988 Massachusetts Institute of Technology©Copyright 1989-93 The Open Software Foundation, Inc.©Copyright 1986-1997 FTP Softw
xxxOrganizationThe manual is organized as follows:Chapter 1 “Introducing Data Protector” on page 1.Chapter 2 “Configuring and Using Backup Devic
RestoreRestoring Your DataChapter 6270• The location you want to restore data to• The device to restore from• How to handle file conflicts with existi
RestoreRestoring Your DataChapter 6 271Figure 6-1 Selecting Data for RestoreSelecting a Backup VersionWhen selecting data that you want to restore, th
RestoreRestoring Your DataChapter 6272possible options: Keep most recent, No overwrite, and Overwrite. For more information on these options, refer to
RestoreRestoring Your DataChapter 6 273NOTE With some database integrations, you can set the changed device as a default restore device for all Data P
RestoreRestoring Your DataChapter 6274Prerequisites You need to meet the following prerequisites in order to perform a disk image restore:• The disk m
RestoreRestoring Your DataChapter 6 275Restoring Your Data to a Shared DiskData Protector allows you to restore UNIX and Windows data to a Windows sha
RestoreRestoring UNIX SystemsChapter 6276Restoring UNIX SystemsWhat Is Restored? When restoring files to the original location from which the backup w
RestoreRestoring Windows SystemsChapter 6 277Restoring Windows SystemsWhat Is Restored? When restoring a Windows filesystem, Data Protector restores t
RestoreRestoring Windows SystemsChapter 6278Filesystem LimitationsYou can select a different target filesystem from the one where the backup was perfo
RestoreRestoring Windows SystemsChapter 6 279Table 6-1 shows that NTFS 3.x filesystem objects can only be adequately restored to the NTFS 3.x filesyst
Chapter 1 11 Introducing Data Protector
RestoreRestoring Windows SystemsChapter 6280Restoring Disk Images Refer to “Restoring Disk Images” on page 273.Restoring the Windows CONFIGURATIONTo r
RestoreRestoring Windows SystemsChapter 6 281• You have to boot the system in the Active Directory restore mode to restore the Active Directory.Refer
RestoreRestoring Windows SystemsChapter 62821. System State objects that belong to CONFIGURATION. Refer to “Backing Up the Windows 2000/XP/Server 2003
RestoreRestoring Windows SystemsChapter 6 283Once the restore session is completed, restart the system.NOTE If you select the whole Windows 2000/XP/Se
RestoreRestoring Windows SystemsChapter 6284the local system account and then restart the services. Refer to “Setting the User Account for the Data Pr
RestoreRestoring Windows SystemsChapter 6 285Remote Storage Service RestoreAlthough the RSS databases are part of System State data, you restore them
RestoreRestoring Windows SystemsChapter 62862. To keep the restored files unmerged, you can delete the files in the newly created profile before runni
RestoreRestoring Novell Netware FilesystemsChapter 6 287Restoring Novell Netware FilesystemsUse the standard restore procedure to restore Novell NetWa
RestoreRestoring Novell Netware FilesystemsChapter 6288• You cannot restore Novell NetWare files that have been backed up in their compressed format t
RestoreRestoring Novell Netware FilesystemsChapter 6 289Figure 6-6 Restoring the NetWare ConfigurationRestoring Novell NDSPrerequisites The prerequisi
Introducing Data ProtectorIn This ChapterChapter 12In This ChapterThis chapter contains some general principles on how Data Protector works, covered i
RestoreRestoring Novell Netware FilesystemsChapter 6290For Novell NDS restore you can specify how to handle conflicts between the version currently on
RestoreRestoring OpenVMS FilesystemsChapter 6 291Restoring OpenVMS FilesystemsUse the standard restore procedure to restore OpenVMS filesystems. Refer
RestoreRestoring OpenVMS FilesystemsChapter 6292— File specifications for OpenVMS files are case insensitive.For example:An OpenVMS file specification
RestoreRestoring OpenVMS FilesystemsChapter 6 293Files during Restore (-lock) option is enabled or disabled.• The default device and directory for pre
RestoreRestore OptionsChapter 6294Restore OptionsData Protector offers a set of comprehensive restore options that allow fine-tuning of a restore. All
RestoreRestore OptionsChapter 6 295The time on the Cell Manager and clients must be synchronized for the Omit Deleted Files option to function properl
RestoreRestore OptionsChapter 6296Restore Sparse Files This option restores sparse files in their original compressed form. This is important because
RestoreRestore OptionsChapter 6 297Post-Exec This option allows you to enter a command to be executed after the restore of each object is completed.
RestoreRestore OptionsChapter 6298User Defined Restore VariablesYou can use variables (a variable name and its value) for flexible operations on some
RestoreRestore TechniquesChapter 6 299Restore TechniquesThe following restore techniques apply to the UNIX and Windows platforms.Restoring Files to Di
Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 3The Data Protector Cell EnvironmentThe Data Protector cell is a network enviro
RestoreRestore TechniquesChapter 6300This capability is available for the initially selected tree node (directory) and for tree nodes that are not hie
RestoreRestore TechniquesChapter 6 301Figure 6-8 Restoring Files in ParallelThe figure shows an example of restoring files in parallel from one medium
RestoreRestore TechniquesChapter 6302• The catalog protection has expired. Refer to “Most Frequently Used Backup Options” on page 227 for more informa
RestoreRestore TechniquesChapter 6 303Figure 6-9 Restore by QueryTo search for a file or a directory, you need to know at least a part of its name. Th
RestoreRestore TechniquesChapter 6304How to Restore by QueryStart the Restore by Query task from the Restore context of the Data Protector Manager. Us
RestoreRestore TechniquesChapter 6 305Figure 6-11 Matching Files for RestoreRestoring Files and Directories ManuallyYou need to restore a file or a di
RestoreRestore TechniquesChapter 6306
Chapter 7 3077 Monitoring, Reporting, Notifications, and the Event Log
Monitoring, Reporting, Notifications, and the Event LogIn This ChapterChapter 7308In This ChapterThis chapter consists of the following sections: “Mon
Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 309Monitoring SessionsData Protector allows you to manage running
Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 14NOTE For further information on these terms, or on the principles of Data Prote
Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7310The progress and status of current sessions appear in the Result
Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 3112. Insert the needed medium into the device. If you have a libr
Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7312You can sort your sessions using the buttons on the top of each
Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 313See “Restore Options” on page 294 for information on which rest
Monitoring, Reporting, Notifications, and the Event LogMonitoring Several Cells SimultaneouslyChapter 7314Monitoring Several Cells SimultaneouslyYou c
Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7 315Data Protector Reporting What Is Reporting?Data Protector
Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7316If no optional input parameters (optional selections) are s
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 317Report TypesData Protector provides various types of reports, as shown
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7318For supported formats, refer to “Report Formats” on page 329. Table 7-2
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3191. Counted from the moment of starting the report backwards.Not Config
Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 52. The Cell Manager determines the type of session that has been requested (re
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7320Configuration ReportsThe following table lists the Configuration report
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 321IDB ReportsThe following table lists the IDB reports. IDB reports prov
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7322Purge Previewdb_purge_previewLists the following information: overall n
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 323System Dynamicsdb_systemLists for each Data Protector client in the ce
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7324Pools and Media ReportsThe following table lists the Pools and Media re
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3251. The following are possible: Don’t care / Unprotected / Protected; t
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7326Number of remaining days in which the data protection will expire, coun
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 327Device Flowdevice_flowGraphically presents the usage of each medium. A
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 73281. Timeframe in which the medium was used for a backup.Relative time: t
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 329Report FormatsData Protector reports can be produced in various format
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 16Using the Data Protector User InterfaceThere is one Data Protector user int
Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7330IMPORTANT When sending an HTML report on a Windows Cell Manager using t
Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 331Report Send MethodsReport Send MethodsReports can be sent using
Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73325. In the information services list, select Microsoft Exchange S
Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 333NOTE On a UNIX Cell Manager, SNMP traps are sent to the systems
Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73346. Right-click SNMP Service and select Properties.a. Select the
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 335Configuring Reports Using the Data
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7336Administrators can configure a repo
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 337NOTE To trigger a report group by
Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Data Protector GUIChapter 7338Running Reports and R
Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 339Running Reports
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 7Graphical User InterfaceThe Data Protector graphical user interface (GUI)
Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7340omnirpt -report s
Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 341omnirpt -report
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7342Data Protector NotificationsWhat Are Notifications?The
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 343✓ End of Session✓ Mail Slots Full✓ Mount Request• Noti
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7344Unexpected EventsNumber of Events (threshold value for
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 345Database Purge Needed• Days Last Purge [days])• Num. E
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7346Explanation of Some NotificationsAlarm The Alarm notif
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 347For more information on the Data Protector checking an
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7348• Broadcast message send method•SNMP send method• Exter
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3497. In the Profile Name text box, enter OmniBack, and t
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 18xomnicellmon to start the MoM cell monitoring GUIxomnimm to start the m
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7350Windows NT To configure Windows NT SNMP traps, proceed
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3517. Start omnisnmp.External Send MethodExternal script
Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7352TIP To trigger a report group by a notification, config
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 353Configuring Reports and Notificati
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 73543. Optionally, configure a password
Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 355Generating the ReportsTo generate
Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7356Data Protector Event LogThe Data Protector Event Log repres
Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7 357When the Data Protector graphical user interface is starte
Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7358
Chapter 8 3598 Manager-of-Managers Environment
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 9Elements of the Data Protector Graphical User InterfaceFor the visual repr
Manager-of-Managers EnvironmentIn This ChapterChapter 8360In This ChapterThis chapter shows you how to configure and use the Data Protector Manager-of
Manager-of-Managers EnvironmentManager-of-ManagersChapter 8 361Manager-of-ManagersThe Data Protector Manager-of-Managers (MoM) allows administrators t
Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8362Configuring the Manager-of-ManagersTo configure the MoM environment, you
Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 363Setting Up MoM ManagerTo set up an enterprise environment, configure on
Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 83643. Enter, or browse for, the name of the Cell Manager that you want to i
Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 365cmhaltpkg <pkg_name>where <pkg_name> is the name of the Dat
Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8366Centralized Media Management Database (CMMDB)The IDB is an emb
Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8 367NOTE A backup anywhere in the enterprise environment will not
Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8368Configuring a Centralized Media Management DatabaseIt is
Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 369On the MoM, add one cell at a time to the CMMDB.Prerequ
ivHP-UX Release 11.00 and later (in both 32- and 64-bit configurations) on all HP 9000 computers are Open Group UNIX 95 branded products.Netscape and
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 110Internal Database Allows you to get information on the IDB storage capac
Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8370TIP If you are configuring a new cell, (and you do not y
Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 371• On Windows: <Data_Protector_home>\bin\omnicc -u
Manager-of-Managers EnvironmentCentralized LicensingChapter 8372Centralized LicensingIt is not required to set up centralized licensing. Individual li
Manager-of-Managers EnvironmentCentralized LicensingChapter 8 373On Windows: <Data_Protector_home>\config\cell\lic_serverOn UNIX: /etc/opt/omni/
Manager-of-Managers EnvironmentCentralized LicensingChapter 8374NOTE Data Protector checks the license configuration with the MoM Manager every hour.
Manager-of-Managers EnvironmentCentralized LicensingChapter 8 375Moving Licenses in the MoM EnvironmentIf you have not configured centralized licensin
Manager-of-Managers EnvironmentCentralized LicensingChapter 8376Deactivating Centralized LicensingCentralized licensing can be deactivated and changed
Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 377Working with a MoM EnvironmentThe Manager-of-Managers interface enables you
Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8378Moving Client Systems Among CellsData Protector allows you to move systems am
Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 379Configuring Data Protector UsersYou can add users or user groups to a MoM en
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 11The Command-Line InterfaceThe command-line interface (CLI) follows the st
Manager-of-Managers EnvironmentRestoring, Monitoring, and Reporting in an Enterprise EnvironmentChapter 8380Restoring, Monitoring, and Reporting in an
Chapter 9 3819 Managing the Data Protector Internal Database
Managing the Data Protector Internal DatabaseIn This ChapterChapter 9382In This ChapterThis chapter provides information about the Data Protector inte
Managing the Data Protector Internal DatabaseAbout the Data Protector Internal DatabaseChapter 9 383About the Data Protector Internal DatabaseWhat Is
Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9384The IDB ArchitectureThe IDB consists of the following parts:• MMDB (Media
Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 385Figure 9-1 IDB ArchitectureEach of the IDB parts stores specific Data Pr
Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9386• Backup sessions and restore sessions. This is the copy of the informati
Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 387For additional information on each of the IDB parts, refer to the HP Ope
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9388Configuring the IDBThe IDB configuration helps to manage the following:• t
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 389• You need to estimate future IDB size (disk space necessary for future I
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 112Data Protector Online ResourcesInformation about Data Protector is availab
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9390• The filenames part of the IDB is proportional to the total number of fil
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 391• The DCBF and SMBF parts of the IDB are not required for basic operation
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9392• If the IDB is installed in a cluster, it must be installed on disks in t
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 393Figure 9-2 Recommended Location of IDB DirectoriesRelocating the IDB Dire
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9394NOTE On UNIX, you can use symbolic links to relocate the directories, but
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 395• On UNIX: /opt/omni/sbin/omnisv -startIf the IDB is installed on MC/Serv
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9396Creating or Relocating DC DirectoriesCreating a DC DirectoryCreate a DC di
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 397By default, transaction logging is disabled. If enabled, transaction logs
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9398• On Windows: <Data_Protector_home>\bin\omnisv -start• On UNIX: /opt
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 399• Perform the IDB backup using a separate media pool on separate media, o
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 13If the GUI concerned is running on Windows, the Help Navigator is dynamic
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9400In environments where the Cell Manager is used heavily and the time needed
Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 401There are also other Data Protector reports to be considered. For example
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9402Maintaining the IDBOnce you have configured the IDB, you need to perform I
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 403The Database Corrupted notification informs you about IDB corruption.Refe
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9404Table 9-3 IDB Maintenance TasksSituation Which Task Can You Perform?Refere
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 405Reducing the IDB GrowthYou can reduce the growth of the IDB by reducing t
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9406Figure 9-6 Changing Logging Level and Catalog Protection SettingsReducing
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 407By changing the catalog protection, you change protection in the IDB only
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9408Purging Obsolete FilenamesDuring the purge process, Data Protector automat
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 409Creating New fnames.dat FilesWhat Are fnames.dat Files?The fnames.dat fil
Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1143. In the Open text box, enter mmc to open the Microsoft Management Consol
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9410Checking the Database SizeYou can check the current size of the IDB parts
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 411Checking the Consistency of the Database Data Protector by default checks
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9412If you run into problems using the IDB, refer to the troubleshooting secti
Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 413On Windows systems: <Data_Protector_home>\db40\msg to <Data_Prot
Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9414Restoring the IDBIf you have backed up the IDB using the standard procedure,
Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9 415NOTE You should not select the <Data_Protector_home> directory, as th
Managing the Data Protector Internal DatabaseRestoring the IDBChapter 94163. Move the existing IDB directories (db40 and config) from the <Data_Pro
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 417Recovering the IDBWhen Is Recovery Needed?IDB recovery is needed if all or
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9418The Most Convenient Complete RecoveryWhen the complete IDB is missing or th
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 419If the transaction logs are available, the recovery procedures in Table 9-
Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 1 15Overview of Tasks to Set Up Data ProtectorAlthough configuring Data Pr
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9420You can use the IDB consistency check to determine which part of the IDB is
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 421Performing Guided AutorecoveryGuided autorecovery is the most convenient I
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9422• If the IDB is installed on Microsoft Cluster Server, take the OBVS_VELOCI
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 423label and media pool.2. Run the omnidbutil -fixmpos command to establish c
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9424• The catalogs created by subsequent backups are good enough.• There is no
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 425• Verify that Data Protector is installed on the Cell Manager and the syst
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9426-dev scsi0:0:0:0 -mahost goedl.hermes -maid 0100007f:3a486bd7:0410:0001 -po
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 427drive letters must be assigned). If this cannot be ensured, follow the pro
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9428• Mahost (Media Agent host)• Policy (number)A policy number can be obtained
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 429procedure for recovering the IDB to a different disk/volume layout. You ca
Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 116• Which devices will be used, and how?• Which user groups do you want t
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9430Replaying IDB Transaction Logs In a successful omnidbrestore -autorecover,
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 431the procedure below, bring the OBVS_VELOCIS and OBVS_MCRS cluster groups o
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 94321. In the Data Protector Manager, browse the Internal Database backup objec
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 433Updating the IDB by Importing MediaTo successfully complete the IDB recove
Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9434
Chapter 10 43510 Disaster Recovery
Disaster RecoveryIn This ChapterChapter 10436In This ChapterThis chapter provides an overview of disaster recovery on Windows UNIX clients and Cell Ma
Disaster RecoveryIntroductionChapter 10 437IntroductionThis section explains the basic terms used in the Disaster Recovery chapter. For overview and c
Disaster RecoveryIntroductionChapter 1043832-bit Windows XPa/Server 2003•“Assisted Manual Disaster Recovery of a Windows System” on page 450• “Automa
Disaster RecoveryIntroductionChapter 10 439What Is a Computer Disaster?A computer disaster refers to any event that renders a computer system unbootab
Chapter 2 172 Configuring and Using Backup Devices
Disaster RecoveryIntroductionChapter 10440What Is a Hosting System?Hosting system is a working Data Protector client used for Disk Delivery Disaster R
Disaster RecoveryIntroductionChapter 10 441• user profiles volume• Certificate Server database volume on Windows Server• Active Directory Service volu
Disaster RecoveryIntroductionChapter 10442The Recovery ProcessThe disaster recovery process consists of 4 phases with the Phase 0 (preparation) being
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 443Preparing for a Disaster RecoveryCarefully follow the instructions in this section to
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10444On UNIX systems:• Creation of tools, such as the auxiliary disk with the minimum operat
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 445On Windows, while the system is up and running, many system files cannot be replaced b
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10446corresponding media must be added to the SRD. The SRD can be updated only on a Windows
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 447Omnisrdupdate requires a session_ID to update an existing SRD file with backup object
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10448To determine for which hostname the SRD file from the Cell Manager should be updated, u
Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 449IMPORTANT You should restrict access to SRD files due to security reasons.
Configuring and Using Backup DevicesIn This ChapterChapter 218In This ChapterThis chapter includes information on the following topics:“Configuring Ba
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10450Assisted Manual Disaster Recovery of a Windows SystemThe following
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 451Requirements• The partitions have to be the same size or larger th
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 104521. You need a Windows bootable installation CD-ROM to enable your s
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 453\i386\tools\DRSetup (located on Data Protector installation medium
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10454The table on the next page is an example of the preparation for the
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 455Table 10-3client properties computer name ANDEShostname andes.comp
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10456RecoveryFollow the procedure below to recover a Windows system usin
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 457Other Windows SystemsIf you are recovering a Windows system other
Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10458CD drives for the location of disaster recovery setup files (Dr1.ca
Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 459Disk Delivery Disaster Recovery of a Windows Client To perform the D
Configuring and Using Backup DevicesIn This ChapterChapter 2 19NOTE Backup devices (like tape drives) are subject to specific Data Protector licenses.
Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10460Limitations• Disk Delivery Disaster Recovery is not supported for Mic
Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 461• partitions filesystem typeYou can refer to Table 10-3 on page 455
Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10462IMPORTANT You have to assign drive letters for Windows 2000/XP/Server
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 463Enhanced Automated Disaster Recovery of a Windows SystemEnhance
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10464Any remaining partitions can be recovered using the standard Dat
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 465• When backing up the client, the default 64 kB block size shou
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10466Certificate Server Database are not restored automatically durin
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 4672. In the Scoping pane, expand the Backup Specifications and th
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10468(create it if you have not created it already). 4. In the Result
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 469IMPORTANT It is recommended to restrict access to backup media,
Contents v1. Introducing Data ProtectorIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 220Configuring Backup DevicesPreparation of a backup device consists of connecti
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10470RecoveryYou need the following to successfully perform a disaste
Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 471machine <HOSTNAME> press F12, to boot from the hard disk
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10472One Button Disaster Recovery of a Windows SystemOne Button Disaster Reco
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 473Requirements• Data Protector Automatic Disaster Recovery and User Inter
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10474• When backing up the client, the default 64 kB block size should be use
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 475• One Button Disaster Recovery backup session can only be performed for
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 104762. Click Tasks navigation tab and check One Button Disaster Recovery Wiz
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 477an OBDR backup specification to keep it in the original One Button Disa
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10478device documentation.4. In the screen that appears, select the scope of
Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 479• You have interrupted the Disaster Recovery Wizard during the 10 secon
Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 2 213. Boot the system to have the device recognized by the system.4. Configure
Disaster RecoveryAutomated System RecoveryChapter 10480Automated System RecoveryAutomated System Recovery (ASR) is an automated system on Windows syst
Disaster RecoveryAutomated System RecoveryChapter 10 481The following sections explain the requirements, limitations, preparation, and recovery pertai
Disaster RecoveryAutomated System RecoveryChapter 10482Figure 10-4 Verifying the Default Block SizeLimitations• Windows XP Home Edition does not suppo
Disaster RecoveryAutomated System RecoveryChapter 10 483• Only those local backup devices are supported, that can be installed by Windows during OS in
Disaster RecoveryAutomated System RecoveryChapter 104843. In the HP OpenView Storage Data Protector Manager, switch to the Restore context.4. Click th
Disaster RecoveryAutomated System RecoveryChapter 10 485installation check box to copy DR installation files to the same location. The recommended des
Disaster RecoveryAutomated System RecoveryChapter 10486RecoveryTo successfully perform a disaster recovery of the crashed system, you need the followi
Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 487Restoring the Data Protector Cell Manager Specifics This section exp
Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10488• Disaster recovery CD for the Cell Manager should be prepared in adv
Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 489Automated System Recovery SpecificsAn additional step is required in
Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 222Figure 2-1 How Backup Specifications, Devices, and Media Pools Relate
Disaster RecoveryAdvanced Recovery TasksChapter 10490Advanced Recovery TasksThis section provides explanation of the steps you will need to take if yo
Disaster RecoveryAdvanced Recovery TasksChapter 10 491• all nodes• administrative virtual server (defined by the administrator)• if Data Protector is
Disaster RecoveryAdvanced Recovery TasksChapter 10492Merging P1S files of all nodes for EADRAnother step is required for EADR after backup has been pe
Disaster RecoveryAdvanced Recovery TasksChapter 10 493• the primary node must have write access to all IDB volumes, when recovering the Cell Manager•
Disaster RecoveryAdvanced Recovery TasksChapter 10494TIP To enable automatic restore of all shared disk volumes in the MSCS using OBDR method, move al
Disaster RecoveryAdvanced Recovery TasksChapter 10 495Restoring Hard Disk Signatures On Windows The MSCS service uses a hard disk signature written i
Disaster RecoveryAdvanced Recovery TasksChapter 10496There is no simple procedure for recovering the disk signatures on Windows NT. MSDN article Q2431
Disaster RecoveryAdvanced Recovery TasksChapter 10 4974. The IIS Database is restored as a plain file (with the filename DisasterRecovery) into the de
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10498Manual Disaster Recovery of an HP-UX ClientThis chapter explains the procedur
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 499Use Ignite-UX GUI where it is supported.Using Custom Installation MediumOver
Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 23Configuring Standalone DevicesWhat Are Standalone Devices?Standalone dev
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10500core.cfg to archive_<name>.cfg:cp /opt/ignite/data/examples/core.cfg /v
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 501impacts = "/stand" 1116Kbimpacts = "/tcadm" 1Kbimpacts =
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10502NOTE Ignite-UX enables you to create a bootable tape or CD based on the creat
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 503Using System Recovery ToolsOverviewThe usage of the system recovery tools, b
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10504This creates an Ignite-UX depot under /var/opt/ignite/depots/recovery_cmds, w
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 505enough space to store the compressed archive.4. Select the volume groups you
Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 105063. Select Install HP-UX from the Welcome to Ignite-UX screen.4. Choose Remote
Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 507Disk Delivery Disaster Recovery of an UNIX ClientTo perform a Disk Del
Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10508• If the system that will be backed up has application processes active
Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 509single user mode:— boot -fl s to boot using already generated vmunix f
Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 224Figure 2-2 Specifying Device Type and Name Configuring Device ChainsData
Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10510— Consider logging out all users from the system.— Shut down all applic
Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 5114. Reconstruct the logical volume structure if applicable (for example
Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10512Manual Disaster Recovery of an UNIX Cell Manager Manual Disaster Recover
Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10 513• A device connected to the Cell Manager.Procedure The following steps
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10514Troubleshooting Disaster Recovery on WindowsThis section provides explanatio
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 5154. To update this new state with disaster recovery, you should perform all
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10516Problem “No Operating System Found”Action After performing disaster recovery
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 517<Data_Protector_home>\tmp) if improperly configured storage devices a
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10518'System may not boot after disaster recovery.If the boot and system vol
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 519WARNING Editing the registry incorrectly can result in failed disaster reco
Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 25Protector can immediately use media that are recognized and unprotected.
Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10520
Chapter 11 52111 Customizing the Data Protector Environment
Customizing the Data Protector EnvironmentIn This ChapterChapter 11522In This ChapterThis chapter describes how you can customize Data Protector to be
Customizing the Data Protector EnvironmentGlobal Options FileChapter 11 523Global Options FileGlobal options affect the entire Data Protector cell, an
Customizing the Data Protector EnvironmentGlobal Options FileChapter 11524balance number.• DailyMaintenanceTime: Determines the time after which the d
Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 525Using Omnirc OptionsThe omnirc options are most useful for troubleshooting
Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11526• OB2DEVSLEEP: Changes the sleep time between each retry while loading a de
Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 527• OB2VXDIRECT: Enables direct (without cache) reading for Advanced VxFS fi
Customizing the Data Protector EnvironmentFirewall SupportChapter 11528Firewall SupportThis section describes how to configure Data Protector in an en
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 529NOTE The OB2PORTRANGE variable only applies to dynamically allocated ports. It
Configuring and Using Backup DevicesConfiguring File DevicesChapter 226Configuring File DevicesWhat Are File Devices?A file device is a file in a spec
Customizing the Data Protector EnvironmentFirewall SupportChapter 11530The table below lists all possible Data Protector agent identifiers that can be
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 531NOTE The OB2PORTRANGESPEC variable only applies to dynamically allocated ports
Customizing the Data Protector EnvironmentFirewall SupportChapter 11532The following table provides a list of all Data Protector components. The first
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 533When writing the firewall configuration rules, the process in the first column
Customizing the Data Protector EnvironmentFirewall SupportChapter 11534Table 11-3Connecting Component Listening ComponentProcess Port Process PortCell
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 535Examples of Configuring Data Protector in Firewall EnvironmentsThe following s
Customizing the Data Protector EnvironmentFirewall SupportChapter 11536Figure 11-1 Configuration DiagramThe following two items define the port range
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 537✓ Allow connections from the CM system to port 5555 on the MA systemThis table
Customizing the Data Protector EnvironmentFirewall SupportChapter 11538Example 2: Disk Agent Installed Outside, Other Components Installed Inside a Fi
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 5391. In order to determine which processes need to communicate across the firewa
Configuring and Using Backup DevicesConfiguring File DevicesChapter 2 27You specify the capacity of a file device when you first format the medium. Wh
Customizing the Data Protector EnvironmentFirewall SupportChapter 11540NOTE All Session Managers allocate ports from this range, not only the one comm
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 541Figure 11-3 Configuration DiagramThe following three items define the port ran
Customizing the Data Protector EnvironmentFirewall SupportChapter 11542This leads to the following firewall rule for the connection to the Inet listen
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 543Port Range Settings on the Cell ManagerFor example, if there are 25 backup and
Customizing the Data Protector EnvironmentFirewall SupportChapter 11544Figure 11-4 Configuration DiagramThe following three items define the port rang
Customizing the Data Protector EnvironmentFirewall SupportChapter 11 545Here, the application Agent connects to the Media Agent. However, this connect
Customizing the Data Protector EnvironmentFirewall SupportChapter 11546one DBSM will be started. For Oracle and SAP R/3 integrations, “concurrency + 1
Chapter 12 54712 Troubleshooting
TroubleshootingIn This ChapterChapter 12548In This ChapterIf you have problems with Data Protector, use the suggestions in this chapter to get back on
TroubleshootingBefore Calling Your Support RepresentativeChapter 12 549Before Calling Your Support RepresentativeIn order to speed up the process of s
Configuring and Using Backup DevicesConfiguring File DevicesChapter 228To create a jukebox file device, specify the Jukebox device type in the Add Dev
TroubleshootingData Protector Log FilesChapter 12550Data Protector Log FilesIf you encounter problems using the Data Protector application, you can us
TroubleshootingData Protector Log FilesChapter 12 551Log Files and Their ContentsThe table below describes the information found in Data Protector log
TroubleshootingData Protector Log FilesChapter 12552purge.log Contains traces of the background purge of the IDB.RDS.log Contains IDB logs. The file r
TroubleshootingDebuggingChapter 12 553DebuggingYou should collect debugs only when the support organization requires them to resolve a technical issue
TroubleshootingDebuggingChapter 12554Ways of DebuggingYou can start Data Protector in the debug mode in different ways and use it to generate debug tr
TroubleshootingDebuggingChapter 12 555NOTE Before you edit the file, make a copy of it, as the changes have to be reverted when debugging is no longer
TroubleshootingDebuggingChapter 12556Trace File NameThe debug postfix option is used for creating the trace files in the following directory:• On UNIX
TroubleshootingDebuggingChapter 12 557OB2DBGDIR The default location of trace files can be changed on a per system basis with the omnirc variable OB2D
TroubleshootingDebuggingChapter 12558NOTE Use the -debug option carefully because execution traces can become quite large.CRS Debug in the Microsoft C
TroubleshootingDebuggingChapter 12 559onboard_type/Adaptec xxx/... for Windows Media Agent clients.• The operating system version, for example, HP-UX
Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 29Configuring Library DevicesWhat Are Library Devices?SCSI-II library devices
TroubleshootingDebuggingChapter 12560Protector services on the Cell Manager and restart them without the debug option.10.Copy the files from any clien
TroubleshootingBrowsing Troubleshooting MessagesChapter 12 561Browsing Troubleshooting MessagesData Protector provides an interactive online troublesh
TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12562When You Cannot Access Online TroubleshootingIf the user interface cannot be
TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12 563* Collect all log files (*.log) in <Data_Protector_home>/log directori
TroubleshootingDescription of Common ProblemsChapter 12564Description of Common ProblemsIf you have problems with Data Protector, find the problem are
TroubleshootingTroubleshooting Networking and CommunicationChapter 12 565Troubleshooting Networking and CommunicationThe section addresses the followi
TroubleshootingTroubleshooting Networking and CommunicationChapter 12566DNS Resolution ProblemTest DNS resolution among hosts using the omnicheck comm
TroubleshootingTroubleshooting Networking and CommunicationChapter 12 567Problem The response to the omnicheck command is:<client_1> cannot conn
TroubleshootingTroubleshooting Networking and CommunicationChapter 12568On Windows, apply the change to the Cell Manager first.If you run the UNIX Cel
TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 569Troubleshooting Data Protector Services and DaemonsThe Data Protector
ContentsviActivating Cartridge Memory Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Disabling a Backup Device
Configuring and Using Backup DevicesConfiguring Library DevicesChapter 230NOTE It is not necessary to configure all drives for use with Data Protector
TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12570Changed service account properties If the service account does not have
TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 571directory and the problems should be resolved.2. Restart the services
TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12572There are several possible reasons why the Data Protector daemon has fa
TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 573• /etc/opt/omni/options/global• /etc/opt/omni/options/users/UserList•
TroubleshootingTroubleshooting Devices and MediaChapter 12574Troubleshooting Devices and MediaThis section describes solutions to the following proble
TroubleshootingTroubleshooting Devices and MediaChapter 12 575Device Open ProblemThe error message Cannot open device (not owner) appears when trying
TroubleshootingTroubleshooting Devices and MediaChapter 12576If you receive media related errors during write operations, or if the medium is marked a
TroubleshootingTroubleshooting Devices and MediaChapter 12 577• Log sense write report for LTO devices - total data sets processed. Media ID from tape
TroubleshootingTroubleshooting Devices and MediaChapter 12578Action Export the medium from the IDB and restart the failed session using a different me
TroubleshootingTroubleshooting Devices and MediaChapter 12 579For example, move the media associated with the reconfigured 9940 devices to the Default
Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 31policy, and the device file or SCSI address of the device, and also configu
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12580Troubleshooting Backup and Restore SessionsYou may run into the following probl
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 581No previous full backupBefore performing an incremental backup of an object, D
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12582Action Modify the media pool policy to Appendable to enable the appending of ba
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 583The media in the library are not formatted and the media pool with the media u
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12584Action 1. Before you start a restore erase the disk image on the Data Protector
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 585Data Protector Backup sessions are not started at all (UNIX-specific)Action Ru
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12586reset by peer. It is possible that some parallel restore sessions are completed
TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 587to the <system_name.company.com>, but it cannot because it does not know
TroubleshootingTroubleshooting Data Protector InstallationChapter 12588Troubleshooting Data Protector InstallationIf you run into problems while insta
TroubleshootingTroubleshooting Data Protector InstallationChapter 12 589Name Resolution Problems when Installing the Windows Cell ManagerDuring the in
Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 232Configuring Libraries with Multiple Systems You can configur
TroubleshootingTroubleshooting User Interface StartupChapter 12590Troubleshooting User Interface Startup Data Protector user interface start-up proble
TroubleshootingTroubleshooting User Interface StartupChapter 12 591Connection to a Remote System Refused on Windows or Novell NetWareThe response of t
TroubleshootingTroubleshooting the IDBChapter 12592Troubleshooting the IDB This section provides troubleshooting for the following problems using the
TroubleshootingTroubleshooting the IDBChapter 12 593• Upgrade of detail part running.The detail upgrade was started and is currently running.• Upgrade
TroubleshootingTroubleshooting the IDBChapter 12594The detail upgrade runs out of memory on the system•The upgrade.log file on the Cell Manager contai
TroubleshootingTroubleshooting the IDBChapter 12 595Problems While Running the User InterfaceIDB is corruptedAny of the following messages can be disp
TroubleshootingTroubleshooting the IDBChapter 12596The RDS service/process cannot be started If one or several shared library files are missing, the o
TroubleshootingTroubleshooting the IDBChapter 12 597Temporary Directory MissingThe following temporary directories should exist on the Cell Manager:•
TroubleshootingTroubleshooting the IDBChapter 12598Problems During Backup and ImportThe BSM or RSM is terminated during the IDB backup or import sessi
TroubleshootingTroubleshooting the IDBChapter 12 599• On UNIX, the Data Protector MMD (/opt/omni/lbin/mmd) is not displayed when listing the Data Prot
Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 2 33• Configure a backup. See Chapter 5, “Backup,” on page 151.
TroubleshootingTroubleshooting the IDBChapter 12600Action Set the time interval, which will be used when browsing object versions for restore. You can
TroubleshootingTroubleshooting the IDBChapter 12 601with the CMMDB installed (MoM). Run this command for every Cell Manager in the MoM environment by
TroubleshootingTroubleshooting Reporting and NotificationsChapter 12602Troubleshooting Reporting and NotificationsIf you use Outlook XP or Outlook 98/
TroubleshootingTroubleshooting Data Protector Online HelpChapter 12 603Troubleshooting Data Protector Online HelpData Protector online Help consists o
TroubleshootingTroubleshooting Data Protector Online HelpChapter 12604not Netscape Navigator, select Custom.IMPORTANT Data Protector supports only Net
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 605Check Whether Data Protector Functions ProperlyThe following sections prov
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12606• Database Purge NeededFor more information on Data Protector notifications
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 607Overview of Items to Be CheckedIn order to ensure that Data Protector is f
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12608Check whether backups are configured properly1. Run the backup preview for
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 609✓ Database Space Low✓ Not Enough Free Media✓ Health Check Failed✓ User Che
Configuring and Using Backup DevicesConfiguring Magazine DevicesChapter 234Configuring Magazine DevicesWhat Are Magazine Devices?Magazine devices grou
TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12610
Chapter 13 61113 Integrations with Other Applications
Integrations with Other ApplicationsIn This ChapterChapter 13612In This ChapterThis chapter gives detailed information on how to integrate the followi
Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 613Cluster Integrations with Data ProtectorSee the HP OpenView
Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13614Figure 13-1 A Typical Cluster• Cluster nodes (two or more)•Lo
Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 615all cluster nodes. Each cluster node compares this packet an
Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13616NOTE In MSCS environment, Cluster Service components (for exa
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 617Microsoft Cluster Server IntegrationAs a part of its high-availa
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13618Cell Manager on Microsoft Cluster ServerThe Data Protector Cell M
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 619Figure 13-2 Importing Cluster Virtual Server Hostnames to a Cell
Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 2 35Configuring Stacker DevicesWhat Are Stacker Devices?A stacker is a single d
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13620To distinguish between local cluster node disks and shared cluste
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 621Failover of Data ProtectorIf a failover of the cluster-aware Dat
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13622Figure 13-3 Advanced Backup Specification Options-ClusteringDo no
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 623Failover of Application Other Than Data ProtectorAs the Data Pro
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13624script will be run. This is the node where Data Protector is runn
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 625Example In the Data Protector GUI you have configured a backup s
Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13626NOTE When the command is run, the elapsed time for each backup sp
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 627MC/ServiceGuard IntegrationAs part of its high-availability support, Data
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13628— Package IP or virtual ip-addressIn addition, you will also need to creat
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 629Configuring the Primary and Secondary Cell ManagersThe following sections
Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 236Backup and Restore with Stacker DevicesOnly the first medium has to be manua
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136302. Create a logical volume for that group (for example, /dev/vg_ob2cm/lv_o
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 631mount /dev/vg_ob2cm/lv_ob2cm /omni_shared5. Modify the /etc/opt/omni/sg/s
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136321. On system2 set up the volume group to be imported, with the following s
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 633/opt/omni/sbin/install/omniforsg.ksh -secondary /omni_shared5. Unmount th
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136343. Create the directory in the /etc/cmcluster directory that will hold the
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 635• SERVICE_NAME, SERVICE_FAIL_FAST_ENABLED , SERVICE_HALT_TIMEOUT Enter th
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13636IMPORTANT The service name must be the same as that used in the configurat
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 637f. Import the cluster package host name manually (for example, by using t
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13638NOTE When using the Data Protector GUI, import each cluster package as a c
Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 639NOTE When backing up a virtual host, the object ownership will acquire th
Configuring and Using Backup DevicesConfiguring a Library for Mixed MediaChapter 2 37Configuring a Library for Mixed MediaA mixed media library contai
Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13640Veritas Cluster IntegrationClients on Veritas ClusterData Protector can on
Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13 6411. Install the Data Protector Disk Agent on each system with the local di
Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13642Novell NetWare Cluster IntegrationClients on Novell NetWare Cluster
Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13 6432. Configure a backup of the local system in the cluster and defin
Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13644Data Source Integration (DSI)What Is DSI? The Data Source Integration (D
Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13 645First select which data you want to log. Data Protector provides a repo
Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13646Application Response Measurement (ARM) IntegrationW
Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13 647The following table shows the supported ARM transa
Integrations with Other ApplicationsManageX IntegrationChapter 13648ManageX IntegrationWhat Is the ManageX Integration?ManageX integration is supporte
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 649Access Points for System and Management Applicat
Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 238Configuring Devices for Direct BackupThis section provides the con
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13650checking and maintenance mechanism. For more info
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 651Each event is marked with an Enterprise Event ID
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13652Command-Line Interface, Graphical User Interface
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 653To enable automatic forwarding of all Data Prote
Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13654Refer to the omnihealthcheck man page for more in
Chapter 14 65514 ADIC/GRAU DAS and STK ACS Libraries
ADIC/GRAU DAS and STK ACS LibrariesIn This ChapterChapter 14656In This ChapterThis chapter assumes that you have already physically configured the ADI
ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 657ADIC/GRAU DAS and STK ACS IntegrationsWho Uses the ADIC/GRAU DA
ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14658Figure 14-1 Data Protector and ADIC/GRAU DAS Library Systems Int
ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 659Configuration BasicsWhen considering your environment and the c
Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 2 39Backup Device Auto-detectionThe XCopy engine must reside on the F
ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14660(added to an Data Protector media pool), it remains under Data P
ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 661Although you can change the label and exclude the barcode numbe
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14662The ADIC/GRAU DAS Library DeviceData Protector provides full support f
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 663• Before you configure a Data Protector ADIC/GRAU backup device, you
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14664NOTE This applies to HP-UX and Windows.For further questions on the co
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 665✓ A list of available drives with corresponding DAS name of the drive
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14666At this stage, you should have your hardware connected and your DAS so
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 667dasadmin listd [client], where [client] is the DAS Client for which t
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14668You should see the library drives with corresponding device files disp
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6692. Open the EIF-Configuration window by double-clicking the I/O unit
Contents viiSelecting Media for Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Media Selection
Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 240Configuring Standalone DevicesRefer to the online Help index keywo
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14670• Enter the Device Name and, below, Description.•In the Client text bo
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 671Configuring the indirect access platform requires the same preparator
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146723. In the Edit menu, click Find. The Find dialog box appears.Use the a
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 673Adding Media to a Media PoolAdding media to a media pool registers th
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14674The Medium Size button decides whether Data Protector will Determine t
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 675Follow online Help for information on specific items in the wizard.11
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146766. Right-click your selected slots and their media, and then click Ver
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6776. Change the information that appears in the Results Area. See onlin
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146782. In the Scoping Pane, click Devices. The list of configured devices
ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6791. In the HP OpenView Storage Data Protector Manager, switch to the D
Configuring and Using Backup DevicesSupport of New DevicesChapter 2 41Support of New DevicesTo use a device that is not listed as supported in the HP
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14680The STK ACS Library DeviceThe concepts, configuration, and installation of t
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 681Connecting Library DrivesPhysically connect the library drives and robotics
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14682• Data Protector has to be installed and configured. See HP OpenView Storage
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 683If a CAP is not in manual operating mode, change the mode using the followi
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14684You should see the library drives with corresponding device files/SCSI addre
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 685ACSSA> query cap allThe format specification of an ACS CAP has to be the
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14686/<Data_Protector_home>/acs/ssi/ssi.sh start <ACS_LS_hostname>4.
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 687• Follow the same steps for creating drives as in the indirect library acce
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14688Entering MediaUse this functionality to physically enter media into an STK r
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 689Adding Media to a Media PoolAdding media to a media pool registers the new
Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 242Using Several Drive Types in a LibraryUsing several drive types o
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14690The Medium Capacity button defines whether Data Protector will Determine the
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 69111.Optionally, use the Medium Capacity button to define whether Data Protec
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 146921. In the HP OpenView Storage Data Protector Manager, switch to the Devices
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 693Moving MediaUse this function to move media from one media pool to another.
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14694See online Help for further information. This action queries the ASCLM host
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 695NOTE If the number of media to be removed at once exceeds fourteen, the med
ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14696Observe messages generated during the process in the Library Management wind
ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 697Troubleshooting Library Installation and Config
ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14698(or: dasadmin dismount -d <DRIVENAME>)wher
ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 699pol 9 for STKThe default media type is DLT.
Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 2 43On Windows and UNIX systems, you can configure separate media po
ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14700
Appendix A A-1A Further Information
Further InformationIn This AppendixAppendix AA-2In This AppendixThis chapter gives information on the following topics:“Backing Up and Restoring UNIX
Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-3Backing Up and Restoring UNIX SpecificsThis section explains how to backup spe
Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-4If the amount of data modified on the snapped filesystem is higher than the spa
Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-5# snapping the same FS will cause the Pre-exec script to fail and# a DA to abo
Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-6# - a block special file of the snapshot FS## NOTE# In case of multiple Disk Ag
Further InformationData Protector CommandsAppendix A A-7Data Protector CommandsFor a complete list of supported Data Protector commands, refer to the
Further InformationPerformance ConsiderationsAppendix AA-8Performance ConsiderationsThis section gives an overview of the most common backup performan
Further InformationPerformance ConsiderationsAppendix A A-9The speed also varies if a device-compression gets used. The achievable compression ratio d
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 244Shared Devices in the SAN EnvironmentThis section describes some o
Further InformationPerformance ConsiderationsAppendix AA-10• Load Balancing: This is where Data Protector dynamically determines which filesystem shou
Further InformationPerformance ConsiderationsAppendix A A-11NOTE By default, software compression should be disabled. Software compression should only
Further InformationPerformance ConsiderationsAppendix AA-12Image Backup Versus FilesystemIt used to be more efficient to back up images (raw volumes)
Further InformationPerformance ConsiderationsAppendix A A-13If you suspect that the sustained data flow to the tape device is too low or that the devi
Further InformationExample of Scheduled Eject of MediaAppendix AA-14Example of Scheduled Eject of MediaYou might want to eject all media that were use
Further InformationExample of Scheduled Eject of MediaAppendix A A-15given in the next section. The script (HP-UX and Solaris systems) or the starting
Further InformationExample of Scheduled Eject of MediaAppendix AA-16 $report =`"${OMNIBIN}omnimm" -eject \"$lib\" $slots`; #
Further InformationExample of Scheduled Eject of MediaAppendix A A-17 while (($lib, $slot) = each(%List)) { $result |=&Library_Eject($li
Further InformationExample of Scheduled Eject of MediaAppendix AA-18 if (!keys(%List)) { print "[Warning] No tape(s) to eject.\n";
Further InformationExample of Scheduled Eject of MediaAppendix A A-19 print "[Normal] Starting eject of media that have been used in the last
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 45Figure 2-5 Multiple System to Multiple Device Connectivity in SAN
Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-20Examples of Pre-Exec and Post-Exec Commands for UNIX The followin
Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-21elseecho "Failed to unmount the disk --> ABORTED!"e
Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-22fiDisk Image Post-Exec: Mount a Disk After the Raw Volume Backup#
Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-23Session Post-Exec: Notify User#!/bin/sh/opt/omni/bin/omnirpt -re
Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-24then echo "Restarted backup --> backup will not be restar
Further InformationDisaster Recovery: Move Kill Links on HP-UX 11.xAppendix A A-25Disaster Recovery: Move Kill Links on HP-UX 11.xProceed as shown bel
Further InformationCreating a libaci.o on AIXAppendix AA-26Creating a libaci.o on AIXOmniBack II A.03.10 and EarlierOn AIX, Data Protector DAS Agent u
Further InformationCreating a libaci.o on AIXAppendix A A-27#! /usr/omni/lib/libaci.aaci_initializeaci_qversionaci_initd_errnoaci_viewaci_drivestatusa
Further InformationExample of the Package Configuration FileAppendix AA-28Example of the Package Configuration FileThis section gives an example of a
Further InformationExample of the Package Configuration FileAppendix A A-29# Enter the failover policy for this package. This policy will be used# to
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 246Using FC-AL SANs with LIPUsing tape devices in Fibre Channel Arbit
Further InformationExample of the Package Configuration FileAppendix AA-30# move the package back to its primary node whenever the primary node# is ca
Further InformationExample of the Package Configuration FileAppendix A A-31# execution of each script.# Note: The HALT_SCRIPT_TIMEOUT should be greate
Further InformationExample of the Package Configuration FileAppendix AA-32# specified SERVICE_HALT_TIMEOUT, the cluster software will send# out the SI
Further InformationExample of the Package Configuration FileAppendix A A-33# the subnets defined goes down, the package will be switched to another# n
Further InformationExample of the Package Configuration FileAppendix AA-34# If DEFERRED is selected, ServiceGuard will not attempt to start # res
Further InformationExample of the Package Configuration FileAppendix A A-35# for the first operator, and only < or <= may be used for the second
Further InformationExample of the Package Configuration FileAppendix AA-36# Uncomment the following lines to specify Package Resource Dependencies.##R
Further InformationExample of the Package Configuration FileAppendix A A-37NODE_FAIL_FAST_ENABLEDNO
Further InformationExample of the Package Control FileAppendix AA-38Example of the Package Control FileThis section gives an example of a package cont
Further InformationExample of the Package Control FileAppendix A A-39## Uncomment the first line (VGCHANGE="vgchange -a e -q n"), and commen
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 47Direct Library Access ConceptWith direct library access, every sy
Further InformationExample of the Package Control FileAppendix AA-40# VG[0]=vg01# VG[1]=vg02## The volume group activation method is d
Further InformationExample of the Package Control FileAppendix A A-41# filesystem will be fsck'd prior to being mounted. The filesystems will be
Further InformationExample of the Package Control FileAppendix AA-42# 192.10.25.0 enter:# IP[0]=192.10.25.12 # SUBNET[0]=192.10.25.0
Further InformationExample of the Package Control FileAppendix A A-43## SERVICE_NAME[1]=pkg1b# SERVICE_CMD[1]="/usr/bin/X11/xlo
Further InformationData Protector Log Files Example EntriesAppendix AA-44Data Protector Log Files Example EntriesThis section provides some typical Da
Further InformationData Protector Log Files Example EntriesAppendix A A-4503/02/00 09:36:51 INET.26130.0 ["/src/lib/ipc/ipc.c /main/r31_split/10
Further InformationData Protector Log Files Example EntriesAppendix AA-465/14/01 12:41:41 PM OMNIDBUTIL.98.124 ["db/vel_cls_spec.c /main/39"
Further InformationData Protector Log Files Example EntriesAppendix A A-4702/04/00 13:38:56 0a110210:389ac85b:3c6e:0001 "[CBF502] DLT_ARC_8"
Further InformationData Protector Log Files Example EntriesAppendix AA-4803/15/01 12:40:43Database check error! Can not proceed with upgrade.03/15/01
Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix A A-49Windows Manual Disaster Recovery Preparation TemplateThe templa
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 248This section describes how you can manually configure the library
Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix AA-50Table A-1client properties computer namehostnamedriversWindows S
Further InformationChanging Block Size on Windows Media AgentAppendix A A-51Changing Block Size on Windows Media AgentIn order to increase the maximum
Further InformationChanging Block Size on Windows Media AgentAppendix AA-52
G-1Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge System Library Server (ACSLS) software that manage
G-2 Glossary(disk partitioning and logical volume configuration) and automatic recovery of the original system configuration and user data that was
G-3Glossaryspecified in a backup specification or an interactive session. All clients configured in one backup specification are backed up together
G-4 GlossaryBC (HP StorageWorks Disk Array XP specific term)The Business Copy XP allows to maintain internal copies of HP StorageWorks Disk Array XP
G-5GlossaryEMC Symmetrix SLDs that need to be protected. See also BC and BC Process.boolean operators The boolean operators for the full text search
G-6 Glossaryfor purposes such as data duplication, backup, and disaster recovery. CA operations involve the main (primary) disk arrays and the remot
G-7Glossaryallocate licenses to specific cells to suit your needs. See also MoM.Centralized Media Management Database (CMMDB) See CMMDB.channel (Ora
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 49Figure 2-6 SAN Environment ConfigurationBecause the library is at
G-8 Glossaryenvironment. One cell can control the robotics, serving the devices that are connected to systems in other cells.The CMMDB must reside o
G-9Glossaryusers who are granted the Reporting and notifications user rights. You can view or delete all events in the Event Log.Data Protector user
G-10 Glossarydelta backup A delta backup is a backup containing all the changes made to the database from the last backup of any type.See also backu
G-11Glossarydirect backup A SAN-based backup solution in which data movement directly from disk to tape (or to other secondary storage) is facilitat
G-12 Glossarydisk group (Veritas Volume Manager specific term)The basic unit of data storage in VxVM system. A disk group can consist of one or more
G-13Glossarysystem restore along with the target operating system configuration data. It is deleted after the target system is restored to the origi
G-14 GlossaryProtector cells which are managed and administered from a central cell using the Manager-of-Managers concept.See also MoM.EVA Agent (HP
G-15Glossaryinterface while on the other side there are parallel SCSI ports. The bridge or multiplexer enables SCSI packets to be moved between the
G-16 Glossaryfull database backup A backup of all data in a database regardless of whether it has changed after the last database backup was created
G-17Glossaryhosting system A working Data Protector client used for Disk Delivery Disaster Recovery with a Data Protector Disk Agent installed.HP IT
ContentsviiiBacking Up CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Backing Up Windows Clients U
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 250✓ Use a lock name if the (physical) device will be used by another
G-18 Glossaryan internal cache memory, and control and diagnostic software commonly referred to as the microcode.IDB The Data Protector Internal Dat
G-19Glossarydevice during the time of the original pair split, and the data that was written to the standard device during the split is overwritten
G-20 Glossarysoftware packages for a specific architecture. The Installation Server is used for remote installation of Data Protector clients. In mi
G-21GlossaryLBO (EMC Symmetrix specific term)A Logical Backup Object (LBO) is an object of data storage/retrieval in the EMC Symmetrix environment.
G-22 GlossaryThe lock name is a user specified string that is used for locking all such device configurations to prevent collision if several such d
G-23Glossaryconnect to an operating system or software application. The password has to be the same as the password specified in the Oracle password
G-24 GlossaryStorageWorks Disk Array XP specific term) and HP StorageWorks Disk Array XP LDEV.Manager-of-Managers (MoM) See Enterprise Cell Manager.
G-25Glossarymedia pool A set of media of the same type (such as DDS) used and tracked as a group. Media are formatted and assigned to a media pool.m
G-26 GlossaryMicrosoft Volume Shadow Copy service (VSS) A software service that provides a unified communication interface to coordinate backup and
G-27GlossaryMU number (HP StorageWorks Disk Array XP specific term)A Mirror Unit number is an integer number (0, 1 or 2), used to indicate a first l
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 51Protector then configures the device by setting up a logical name
G-28 GlossaryOn-Bar (Informix specific term)A backup and restore system for OnLine Server. ON-Bar enables you to create a copy of your OnLine Server
G-29GlossaryOracle instance (Oracle specific term)Each installation of an Oracle database on one or more systems. One computer system can have sever
G-30 Glossarycalled IT/Operation, Operations Center and Vantage Point Operations.See also merging. ownership The ownership of a backup determines wh
G-31Glossarydata for multiple objects selected for restore is read from media at the same time, thereby improving performance.parallelism The concep
G-32 Glossarypublic folder store (MS Exchange 2000 Server specific term)The part of the Information Store that maintains information in public folde
G-33GlossaryManager and manages the IDB. The process is started when Data Protector is installed on the Cell Manager.Recovery Catalog (Oracle specif
G-34 Glossaryconfiguration. In bidirectional configurations, the RCU can act as an MCU.Removable Storage Management Database (Windows specific term)
G-35Glossaryof replica storage versions that are to be kept on a disk array before the oldest replica storage version for the backup specification i
G-36 Glossarydevice if someone has manually manipulated media without using Data Protector to eject or enter, for example.Scheduler A function that
G-37Glossaryshared disks A Windows disk on another system that has been made available to other users on the network. Systems with shared disks can
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 252Prerequisite Before configuring Data Protector devices in a SAN en
G-38 Glossarysplit mirror backup (HP StorageWorks Disk Array XP specific term) See ZDB tape backup, ZDB disk/tape backup and ZDB disk backup.split m
G-39Glossaryaddress for each backup drive connected to that client. A single SCSI entry is required for a single-drive device and multiple SCSI entr
G-40 GlossarySymmetrix Application Programming Interface (SYMAPI) (EMC Symmetrix specific term)A linkable library of functions that can interface w
G-41Glossaryserver is a domain controller, Active Directory directory services and the Sysvol directory are also contained in the System State data.
G-42 GlossaryTerminal Services (Windows specific term)Windows Terminal Services provide a multi-session environment that allows clients to access a
G-43Glossaryarchiving of transaction logs should be enabled to prevent you from losing the transaction log files that are created after the last IDB
G-44 Glossaryvaulting media The process of storing media to a safe and remote place. The media are brought back to the data center when they are nee
G-45Glossaryvolume mountpoint (Windows specific term)An empty directory on a volume that can be used to mount another volume. The volume mount point
G-46 Glossarythat write persistent information on a volume. Writers also participate in the shadow copy synchronization process by assuring data con
G-47GlossaryZDB part of the IDB (ZDB specific term)A part of the IDB, storing ZDB related information such as original and replica storage versions,
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 53The drive naming convention shows its benefits during backup spec
G-48 Glossary
I-1Aabortingall sessions, 623backup session during the size determination, 312running sessions, 312sessions, elapsed time, 625sessions, using ID, 62
IndexI-2cluster (MC/SG), 638cluster (MSCS), 619CONFIGURATION, 176DHCP Server, 178direct backup environment, 204disk image, UNIX, 166disk image, Window
Index I-3segment size, 78shared in the SAN, 44specifying type and name, figure, 24streaming, 76used by multiple applications, locking, 46using, 17bac
IndexI-4concepts, 3Disk Agent, 3exporting, 377importing, 377importing, MoM, 363Media Agent, 3monitoring simultaneously, 314moving clients, 378reports
Index I-5Novell NetWare Cluster Services, 642omniclus command, 623package (MC/SG, Veritas Cluster), 615primary node, 615secondary node, 615switchover
IndexI-6new Microsoft Exchange Profile, 348notifications, 342, 351notifications on the Web, 353notifications, using Web reporting interface, 355report
Index I-7copying to the Web server, 354Data Source Integration, 644database See IDBbackup problems, 598import problems, 598database configuration See
IndexI-8Disk Delivery method, 459, 507Enhanced Automated method, 463logging on after, 514One Button method, 472overview, 437Phase 0, 442Phase 1, 442Ph
Index I-9scheduled eject, 138elapsed session time, 625e-mail send methodnotifications, 348notifications, creating a new Microsoft Exchange Profile, 3
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 254Figure 2-7 Setting Advanced Options When you are setting the locki
IndexI-10backing up OpenVMS, 201backing up UNIX, 161backing up Windows, 168restore limitations, 278restoring Novell NetWare, 287restoring OpenVMS, 291
Index I-11HP-UX and Solaris clientdisaster recovery methods, 437HTML report format, 329IIDBarchitecture, 384backing up, 398backing up Windows Registr
IndexI-12the catalog from media, 114importing media, 113in a magazine device, 115multiple, figure, 114procedure, 113Inc backups, definition, 213Inc1-9
Index I-13limiting port range, firewall environment, 528listrestored files, 295List of Pools report, 324load balancing, 232backup option, 237local di
IndexI-14adding to pool, 107adding unused to a media pool, 107adding used to a media pool, 107allocation policy, 103, 120appendable, 104appendable of
Index I-15scanning media in a device, 129searching for and selecting a medium, 135selecting media for backup, 120setting data protection, 122using a
IndexI-16MSCS See Microsoft Cluster Servermulti host support, 32multiple backup specifications, 155multiple reports, adding to the report group, 337NN
Index I-17omit deleted files, 294omniclus, 623omnirc optionsoverview, 525usage, 525variables, 525omnirc options file, 525omnirptgenerating reports wi
IndexI-18Disk Delivery Disaster Recovery, Windows client, 460Enhanced Disaster Recovery, Windows NT/2000 client, 466, 475for disaster recovery, 443Man
Index I-19Enhanced Disaster Recovery, Windows NT/2000 client, 470One Button Disaster Recovery, Windows NT/2000, 477recurring backupconfiguring, 210re
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 55Figure 2-8 Summary of Device Definitions Using Lock Names Enablin
IndexI-20protection attributes, 296sparse files, 296target hostname, 294time attributes, 296restoringbindery, Novell NetWare, 288data to different cli
Index I-21Scoping Pane, 10SCSI address, 29SCSI IDlibrary device, 29SCSI-II Library devicesSCSI address, 29searching for media, 135secondary node, 615
IndexI-22pre- and post-exec commands, 250, 255Specific Event ID, 651specific object, 225specifyingpathname for a file device, figure, 28type and name
Index I-23troubleshooting file, 562user interface, 590when the user interface not accessible, 562troubleshooting backup sessionsmount request for a l
IndexI-24used mediaadding, 107user accountsetting for the Inet, 187User Check Failed notification, 347, 606user classdescription of access rights, 83u
Index I-25viewingcurrently running sessions, 309details of a running session, 310files from media, 301finished sessions, 310viewsmodifying in the med
IndexI-26XXCopy engine, 39, 204
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 256Figure 2-9 Selecting Direct AccessManually Configuring the libtab
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 57• <DeviceFile | SCSIPath> is the control path to the librar
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 258Example libtab file on donatExample of the libtab file on host don
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 59In order to share a device among multiple systems, configure one
Contents ixPreventing Backup Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Restarting Failed B
Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 260Static Drives The drives can still be used in the standard way usi
Configuring and Using Backup DevicesDrive CleaningChapter 2 61Drive CleaningThere are several methods for cleaning dirty drives:• Library built-in cle
Configuring and Using Backup DevicesDrive CleaningChapter 262to store cleaning tape(s).• Detection and use of cleaning tapes depends on the system pla
Configuring and Using Backup DevicesDrive CleaningChapter 2 631. Enable dirty drive detection. This needs to be done for all device types (standalone
Configuring and Using Backup DevicesDrive CleaningChapter 264Where <file_name> is the name of the file you will use to simulate a dirty drive, a
Configuring and Using Backup DevicesBusy Drive HandlingChapter 2 65Busy Drive HandlingData Protector expects drives to be empty, i.e., there should no
Configuring and Using Backup DevicesActivating Barcode SupportChapter 266Activating Barcode SupportIf a SCSI library device uses media with barcodes,
Configuring and Using Backup DevicesActivating Barcode SupportChapter 2 67Figure 2-10 Activating Barcode Reader Support
Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 268Activating Cartridge Memory SupportCartridge memory support can be a
Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 2 69Figure 2-11 Cartridge Memory Support Activation for a Drive
Komentáře k této Příručce