HP B6960-96035 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie do odzyskiwania kopii zapasowych HP B6960-96035. HP B6960-96035 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 422
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Concepts guide

HP Data Protector A.06.10Concepts guideB6960-96035Part number: B6960-96035First edition: November 2008

Strona 2

Filesystem backup of databases and applications ... 239Online backup of databases and applications ...

Strona 3 - Contents

Catalog protectionWhat is catalog protection?Data Protector saves information about backed up data in the IDB. Since theinformation about the backed u

Strona 4

available, but you must know which media to use and what needs to be restored,for example, the exact file name.The IDB also keeps information on how l

Strona 5

Exporting media from a cellExporting media from a Data Protector cell removes all the information about backedup data on the media and the media thems

Strona 6

on UNIX or disk drives on Windows systems) and the destinations are specified (tape)devices. During the backup session, Data Protector reads the objec

Strona 7

• Description: uniquely defines the backup objects with identical client name andmount point.• Type: backup object type, for example filesystem or Ora

Strona 8

Backup sessionsWhat is a backup session?A backup session is a process that backs up data from a client system to media. Abackup session always runs on

Strona 9

You can combine full and incremental backups when you configure scheduledbackups. For example, you may run a full backup on Sundays and incrementalbac

Strona 10

This section combines all these concepts by giving some examples of backup schedulesand some tips for efficient scheduling.When to schedule backupsTyp

Strona 11

incremental backup. For more information on how Data Protector selects media forbackups, see Selecting media for backups .Example 1Figure 28 on page 1

Strona 12

Figure 29 Full backup with daily level 1 incremental backupsThis policy requires slightly more time for backups and also requires a little moremedia s

Strona 13

Local mirror - dual host ... 269Local mirror - single host ...

Strona 14

Figure 30 Full backup with mixed incremental backupsThis policy takes into account the fact that there are not many changes duringweekends. Data is ba

Strona 15

• When is the lowest system usage and user activity?Typically, this is at night and most backups are scheduled to run during the night.Data Protector

Strona 16

If you need to back up large amounts of data and the backup window presentsa problem, consider backing up to disk-based devices and using advanced bac

Strona 17 - Concepts guide 17

Smart MediaCopyMedia copyObject mirrorObject copyNo3No2YesYesAppendabilityof target mediaMedia identicalto the sourcemediaMedia identicalto the source

Strona 18

Figure 31 Object copy conceptIn the figure, there is an object version resulting from a backup of object A, version1, and two additional copies of the

Strona 19 - Concepts guide 19

Selection of devicesYou need separate devices to be used with the source media and the target media.The destination devices can have a larger block si

Strona 20

Why use object copy?Additional copies of backed up data are created for multiple purposes:• VaultingYou can make copies of backed up objects and keep

Strona 21 - Publication history

Figure 32 Freeing mediaDemultiplexing of mediaMultiplexed media contain interleaved data of multiple objects. Such media mayarise from backup sessions

Strona 22 - Publication history22

Figure 33 Demultiplexing a mediumConsolidating a restore chainYou can copy a restore chain (all backups that are necessary for a restore) of anobject

Strona 23 - About this guide

Figure 34 Disk staging conceptDisk staging also eliminates the need for frequent backups of numerous small objectsto tape. Such backups are inconvenie

Strona 24 - About this guide24

Examples of automated media copying ... 332Example 1: automated media copying of filesystem

Strona 25

The result of a successful backup session with object mirroring is one media setcontaining the backed up objects and additional media sets containing

Strona 26 - Online Help

Figure 35 Object mirroringSelection of devicesObject mirroring is load balanced by default. Data Protector makes optimum use ofthe available devices b

Strona 27 - Documentation map

Backup performance also depends on factors such as device block sizes and theconnection of devices. If the devices used for backup and object mirrorin

Strona 28 - GuideAbbreviation

Automated media copyingWhat is automated media copying?Automated media copying is an automated process that creates copies of the mediacontaining back

Strona 29 - Integrations

Smart media copying using VLSWhat is smart media copying?In smart media copying, the data is first backed up to a virtual tape library (VTL)configured

Strona 30 - GuideIntegration

Restoring dataPolicies for restoring data are an essential part of the overall backup strategy in thecompany. Keep the following in mind:• Backing up

Strona 31

Selection of the media setIf an object version that you want to restore exists on more than one media set, whichhas been created using one of the Data

Strona 32 - About this guide32

SQL Server, and Microsoft SharePoint Portal Server integrations. Such databasesare usually backed up with interdependent data streams and, consequentl

Strona 33 - HP technical support

End users are allowed to restoreAnother possible restore policy is to allow all or just selected end users to restoretheir own data. This policy provi

Strona 34 - Documentation feedback

operation can begin. This includes repartitioning and/or reformatting the boot partitionand recovery of the operating system with all the configuratio

Strona 35 - Protector

FiguresData Protector graphical user interface ... 331Backup process ...

Strona 36

Disaster recovery methodsData Protector supports the following disaster recovery methods:• Manual disaster recoveryThis is a basic and very flexible d

Strona 37

Alternative disaster recovery methodsThis section compares the Data Protector disaster recovery concept with concepts ofother vendors. This section po

Strona 38 - What is a backup?

Planning your backup strategy132

Strona 39 - What is a restore?

3 Media management anddevicesIn this chapterThis chapter describes Data Protector concepts of media and device management.It discusses media pools, de

Strona 40 - Data Protector architecture

Media management functionalityData Protector provides the following media management functionality that allowssimple and efficient management of a lar

Strona 41 - HP Data Protector product

1. Preparing media for backup.This includes initializing (formatting) media for use with Data Protector andassigning media to media pools, which are u

Strona 42 - Operations in the cell

else, does not matter; it always belongs to its pool until it is recycled and exportedfrom the cell.Several devices can use media from the same pool.M

Strona 43

• system platform (one pool for UNIX systems, one for Windows 2000 systems,and one for Windows XP systems)• per system (every system has its own pool)

Strona 44

What is a free pool?A free pool is an auxiliary source of media of the same type (for example, DLT) foruse when all free media in a regular pool run o

Strona 45 - Enterprise environments

All free (unprotected, empty) media can be grouped in a free pool and sharedbetween all media pools that support free pool usage.• Reduced operator in

Strona 46

Incremental backups ... 9523Leveled incremental backups ...

Strona 47

Media pool usage examplesThe examples below show some configurations you may want to consider whenchoosing the appropriate strategy for a particular b

Strona 48 - Media management

Figure 38 Configuration of media pools for large librariesExample 3Figure 39 on page 142 shows an example when data is backed up to media in amedia po

Strona 49 - Backup devices

Figure 39 Multiple devices, single media poolExample 4Data is backed up to media in multiple media pools on multiple devicessimultaneously. If you wan

Strona 50 - User interfaces

Figure 40 Multiple devices, multiple media poolsImplementing a media rotation policyWhat is a media rotation policy?A media rotation policy defines ho

Strona 51

Media rotation and Data ProtectorAutomatic media rotation and media handlingData Protector automates media rotation and media handling as follows:• Be

Strona 52 - Data Protector Java GUI

By now you should be able to estimate the quantity of media required for a full mediarotation. Additional media will be required in case you:• Assume

Strona 53

Data Protector also assigns each medium a media ID that uniquely identifies thismedium.An ANSI X3.27 label is also written on the tape for identificat

Strona 54

Media management during backup sessionsWhat happens during backup?During a backup session, Data Protector automatically selects media for backup andke

Strona 55

Media conditionThe condition of the media also influences which media are selected for backup, forexample, media in good condition are used for backup

Strona 56

Figure 41 Multiple objects and sessions per medium, sequential writesFigure 41 on page 149 shows an example of eight sequential writes over four sessi

Strona 57 - 2 Planning your backup

Sharing an ADIC/GRAU or StorageTek ACS library ... 17050Storage Area Network ...

Strona 58 - Backup strategy planning

concurrently written in sess_7 and the second one in sess_8. Note that one objectcan be stretched over several media. The media usage policy is append

Strona 59

• media ageThe age of a medium is calculated as the number of months that have elapsedsince you formatted, or initialized, the medium. Once a medium i

Strona 60

• A report showing media used for backup within a specified time-frame.• A report showing which backup specifications have used specified media during

Strona 61

Restoring from media in a vaultRestoring media from a vault is no different than restoring from any other media.Depending on how your data and catalog

Strona 62 - Planning cells

in Data Protector using different (logical) device names, for example, one withouthardware data compression and another one with hardware data compres

Strona 63

Device lists and load balancingMultiple devices for backupWhen configuring a backup specification, you can specify several standalone devicesor multip

Strona 64

gets full, the backup automatically continues on the medium in the next device in thedevice chain.How load balancing worksFor example, assume that the

Strona 65 - Windows domains

Disk agent concurrencyThe number of Disk Agents started for each Media Agent is called Disk Agent (backup)concurrency and can be modified using the Ad

Strona 66 - Geographically remote cells

NOTE:Some tape technologies place limitations on the number of file marks per medium. Ensurethat your segment size is not too low.Figure 45 Data forma

Strona 67 - The infrastructure

Increasing the block size can improve performance. Changing the block size shouldbe done before formatting tapes. For example, a tape written with the

Strona 68

Split mirror backup concept ... 26678Local mirror - dual host (full performance, Zero Downtim

Strona 69 - Using hardware in parallel

Physical device collisionWhen specifying a device used for backup, you may specify one device name inone backup specification and another device name

Strona 70 - Hardware compression

install a Data Protector Media Agent on the system with the device connected. DataProtector can detect and automatically configure most standalone dev

Strona 71 - Object distribution to media

Large librariesWhat are library devices?Library devices are automated devices, also called autoloaders, exchangers orjukeboxes. In Data Protector, mos

Strona 72 - Disk performance

• Obtain the number of required media. See “Implementing a media rotationpolicy” on page 143.Sharing a library with other applicationsA library device

Strona 73 - Planning security

• Scanning the barcodes of the media in a device’s repository is faster, becauseData Protector does not need to actually load the media to a drive and

Strona 74 - Data Protector users accounts

Protector internally redirects the robotic commands to the system that manages therobotics.Figure 47 Connecting drives to multiple systemsControl prot

Strona 75 - Data Protector user groups

• SCSI—for robotics other libraries• NDMP—for NDMP roboticsAll four library robotic control protocols are implemented in both the General MediaAgent a

Strona 76 - Data encryption

Table 11 on page 167 show the Data Protector Media Agent (the General MediaAgent or the NDMP Media Agent) required on a client system configured for r

Strona 77

Figure 48 Sharing a SCSI library (robotics attached to a Data ProtectorClient System)Figure 48 on page 168 shows a SCSI library, with its robotics att

Strona 78 - What is backup ownership?

Figure 49 Sharing a SCSI library (robotics attached to an NDMP Server)Figure 49 on page 169 shows a SCSI library, with its robotics attached to an NDM

Strona 79 - Clustering

Overview of backup and automated media copy sessions ... 340105Concepts guide 17

Strona 80

Figure 50 Sharing an ADIC/GRAU or StorageTek ACS libraryFigure 50 on page 170 shows an ADIC/GRAU or StorageTek ACS library, with itsrobotics attached

Strona 81

Storage Area NetworksA Storage Area Network (SAN), depicted in Figure 51 on page 172, is a newapproach to network storage that separates storage manag

Strona 82 - Cluster support

Figure 51 Storage Area NetworkFibre ChannelFibre Channel is an ANSI standard for high-speed computer interconnection. Usingeither optical or copper ca

Strona 83 - Example cluster environments

Point-to-point, loop, and switched Fibre Channel topologies can be mixed to best suityour connectivity and growth requirements.For a list of supported

Strona 84

Figure 52 Loop initialization protocolSwitched topologyThe switched topology provides any-to-any connectivity between all nodes connectedto a switch.

Strona 85

Device sharing in SANData Protector supports the SAN concept by enabling multiple systems to sharebackup devices in the SAN environment. The same phys

Strona 86

Figure 53 Example multipath configurationWhy use multiple pathsWith previous versions of Data Protector, a device could be accessed from only oneclien

Strona 87

During a restore session, the device paths are selected in the following order:1. Paths that are on the client to which the objects are restored, if a

Strona 88

Indirect and Direct Library AccessUpon configuring Data Protector with a SCSI Library device, there are two ways inwhich client systems can access lib

Strona 89

Figure 54 Indirect Library AccessNote that you cannot use a shared library if the client system that controls the robotics,castor, in our example, fai

Strona 90

TablesEdition history ... 211Document conventions ...

Strona 91

Figure 55 Direct Library AccessDevice sharing in clustersClustering, which is often used in combination with the SAN concept, is based onsharing netwo

Strona 92 - Incremental backups

Floating drivesFloating drives are device that are configured on a virtual host, using virtual systemnames. Floating drives should be configured for t

Strona 93 - Types of incremental backups

Media management and devices182

Strona 94

4 Users and user groupsIn this chapterThis chapter discusses Data Protector security, users, user groups, and user rights.It is organized as follows:“

Strona 95

can see and restore the backed up data. You can make data visible to other usersusing the Data Protector Public option. For instructions, see the Data

Strona 96 - Considering restore

Using predefined user groupsThe following default groups are provided by Data Protector:Table 12 Data Protector predefined user groupsAccess rightsUse

Strona 97

Users and user groups186

Strona 98

5 The Data Protector internaldatabaseIn this chapterThis chapter describes the Data Protector internal database (IDB) architecture, as wellas its usag

Strona 99 - Data protection

• Fast and convenient restore The information stored in the IDB enables you toquickly find the media required for a restore, and therefore makes the r

Strona 100 - Browsing files for restore

The IDB on the UNIX Cell ManagerIDB locationThe IDB on the UNIX Cell Manager is located in the /var/opt/omni/server/db40directory.IDB formatThe IDB on

Strona 101

ABC’s Media Pool Usage ... 32525The Staggering Approach for ABC Cape Town ...

Strona 102 - Backing up data

For robustness considerations and recommendations for optimizing robustness byrelocating some IDB directories, see the online Help index: “robustness

Strona 103 - Selecting backup objects

MMDB size and growthThe MMDB does not grow very big in size. The largest portion of the MMDB istypically occupied by information about the Data Protec

Strona 104

when one of these files starts running out of space, so that you can add new files toextend the size of the filenames part of the IDB.Size and growth

Strona 105 - Object mirrors

DCBF locationBy default, the DCBF is located in the following directory:• On Windows Server 2008: Data_Protector_program_data\db40\dcbf• On other Wind

Strona 106 - Scheduling tips and tricks

Serverless Integrations Binary Files (SIBF)SIBF recordsThe Serverless Integrations Binary Files stores raw NDMP restore data. This data isnecessary fo

Strona 107 - Optimizing for restore

If transaction logging is enabled, an IDB backup removes old transaction logs andstarts creating new ones, which are necessary for an IDB recovery.Dur

Strona 108

Removing the detail catalogWhen the detail catalog is removed for a specific medium, its DC binary file isremoved. The same result is achieved by remo

Strona 109

IDB maintenanceOnce you configure the IDB, its maintenance is reduced to a minimum, mainly actingon notifications and reports.IDB recoveryAn IDB recov

Strona 110

• Growth of your backup environment The number of systems being backed up inthe cell influences the IDB growth. Plan for the growth of your backup env

Strona 111

Figure 57 The influence of logging level and catalog protection on IDBgrowthLogging level as an IDB key tunable parameterWhat is logging level?Logging

Strona 112 - Duplicating backed up data

Legal and notice information© Copyright 1999, 2008 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP requ

Strona 114

Logs all detailed information about backed up directories (names,versions, and attributes). This represents approximately 10% of alldetailed informati

Strona 115

Catalog protection as an IDB key tunable parameterWhat is catalog protection?Catalog protection determines how long the information about backed up da

Strona 116 - Why use object copy?

protection is set for 4 weeks, then significant growth of the IDB stops after 4 weeks.Therefore, in this case, the IDB is 13 times larger if the catal

Strona 117

Specifics for large cellsIf the number of files grows into the tens of millions, or there are tens of thousandsof files generated on a daily basis, an

Strona 118

The Data Protector internal database204

Strona 119 - Object mirroring

6 Service managementIn this chapterService Management, reporting, and monitoring help administrators manage theirbackup environments more effectively.

Strona 120

Service management measures and reports are a key tool IT managers can use todemonstrate value delivered to the organization and also to maintain comp

Strona 121

Figure 58 Service management information flowNative Data Protector functionalityThe functionality described in the following sections comes with Data

Strona 122 - Copying media

send alerts via SNMP, it is possible to integrate virtually any application that canreceive SNMP traps.• Data Protector backup session auditing stores

Strona 123 - Automated media copying

central operations console, such as HP Operations Manager software, paging asystem operator, or taking automated remedial action to resolve the proble

Strona 124 - Smart media copying using VLS

Publication historyGuide updates may be issued between editions to correct errors or document productchanges. To ensure that you receive updated or ne

Strona 125 - Restoring data

Integration with HP Operations Manager softwareFunctionality of the Data Protector OM integrationData Protector integrates with HP Operations Manager

Strona 126 - Selection of devices

From the monitor’s user interface, you can abort a backup, restore, or mediamanagement session or respond to “mount” requests.If you make use of the M

Strona 127

• Select from many delivery methods used to deliver reports (such as e-mail, SNMP,broadcast (available on Windows only), write to file, and send to ex

Strona 128 - Disaster recovery

Data Protector log filesSome Service Management applications, such as HP Operations Manager software,allow you to specify when and which log files sho

Strona 129

Data Protector checking and maintenance mechanismData Protector has a rich automated daily self-check and maintenance mechanism,which improves its ope

Strona 130 - Disaster recovery methods

• Sending major and critical Data Protector events to your network managementsolution, such as HP Network Node Manager (Data Protector built-in notifi

Strona 131

• Administration Reports• Media Pool Reports• PerformanceAn IT Service Provider can use these reports to demonstrate its SLA compliance to acustomer.

Strona 132

Figure 61 Operational error status reportData Protector OM SIPThis integration also uses SIP to provide Data Protector information through aweb-based

Strona 133 - 3 Media management and

Figure 62 Direct SIP integration exampleService management218

Strona 134 - Media life cycle

7 How Data Protector operatesIn this chapterThis chapter describes the operation of Data Protector. It explains Data Protectorprocesses (on UNIX) and

Strona 135 - Media pools

Publication history22

Strona 136

CRS The CRS (Cell Request Server) process (service) runs on theData Protector Cell Manager. It starts and controls backupand restore sessions. The ser

Strona 137 - Free pools

Scheduled and interactive backup sessionsScheduled backup sessionA scheduled backup session is started by the Data Protector Scheduler at the timeyou

Strona 138

4. The BSM starts Disk Agents (DAs) for each disk to be backed up in parallel. Theactual number of Disk Agents started depends on the concurrency of D

Strona 139

To prevent Data Protector processes from exceeding system capabilities, the maximumnumber of concurrent backup sessions is limited. The limit is confi

Strona 140 - Media pool usage examples

Queuing of backup sessionsTimeoutWhen a backup session is started, Data Protector tries to allocate all needed resources,such as devices. The session

Strona 141

Sending notification to an operatorYou can configure a Data Protector notification to send an e-mail to the operator withinformation about the mount r

Strona 142

A restore session is started interactively. You tell Data Protector what to restore, letData Protector determine the needed media, select some options

Strona 143

Figure 65 Restore session information flowHow many restore sessions can run concurrently?A number of restore sessions can run in the cell at the same

Strona 144 - Media needed for rotation

Mount requests in a restore sessionWhat is a mount request?A mount request appears in a restore session when the media needed for restore arenot avail

Strona 145 - Labeling Data Protector media

Figure 66 Parallel restore session flowIn a parallel restore, Data Protector reads multiplexed data for all selected objectsand assembles the parts ne

Strona 146 - Location field

About this guideThis guide describes Data Protector concepts. Read this manual to fully understandthe fundamentals and the model of Data Protector.Int

Strona 147 - Selecting media for backups

What is an object copy session?An object copy session is a process that creates an additional copy of the backedup data on a different media set. Duri

Strona 148

4. The CSM starts the Media Agents on the systems with devices configured forcopying. The Media Agents load the source and target media allocatedaccor

Strona 149

Figure 67 Object copy session information flowQueuing of object copy sessionsTimeoutWhen an object copy session is started, Data Protector tries to al

Strona 150 - Calculating media condition

Object consolidation sessionsThis section describes how an object consolidation session is started, what happensduring the session, and the processes

Strona 151 - Vaulting

2. The CSM opens the IDB, reads the information about the needed media, andwrites the information about the object consolidation session, such as gene

Strona 152

available. If the resources are still unavailable after the timeout, the session is aborted.The timeout period can be set using the SmWaitForDevice gl

Strona 153

2. The MSM starts the Media Agents (MAs) on the system that has devices usedfor the media management session.3. Media Agents perform the requested ope

Strona 154

8 Integration with databaseapplicationsIn this chapterThis chapter gives a brief description of the integration of Data Protector with databaseapplica

Strona 155

Figure 68 Relational databaseFigure 68 on page 238 shows a typical relational database with the structuresdescribed below.Data files are physical file

Strona 156 - How load balancing works

1. A transaction is first recorded into the transaction log.2. Changes required in the transaction are then applied to cached pages.3. From time to ti

Strona 157 - Segment size

• HP Data Protector installation and licensing guideThis guide describes how to install the Data Protector software, taking into accountthe operating

Strona 158 - Block size

The essence of the backup interface is that it provides the backup application withconsistent data (even if it may not be consistent on the disk) whil

Strona 159 - Device locking and lock names

• There is no need to specify the location of data files. These can be located ondifferent disks.• The logical structure of the database can be browse

Strona 160 - Standalone devices

Integration with database applications242

Strona 161 - Small magazine devices

9 Direct backupIn this chapterThis chapter introduces the direct backup concept and the technologies that enableit. The chapter also discusses the dir

Strona 162 - Large libraries

Direct backup extends the benefits of HP’s ZDB solution by moving data directly fromdisk to tape and making the load on the backup server negligible o

Strona 163 - Barcode support

Backup typesDirect backup supports backup of application data files and control files and of diskimages -- either raw disk or raw logical volume.Direc

Strona 164 - Cleaning tape support

Figure 70 on page 246 shows a basic direct backup configuration. The Resolve Agentis on a separate backup host in this configuration. Data, however, d

Strona 165

• The HP StorageWorks Disk Array XP (XP) is configured as Business Copy (BC)with mirrors configured with enough disk space.• The SAN is properly confi

Strona 166

XCopy + ResolvePrior to Resolve, you needed a server with a matching file system to get thisinformation. This was because even with the right server,

Strona 167

Database. The Backup Media Agent (BMA) writes catalog segments and delimitersbetween data and catalog segments known as file-marks.RestoreThere are tw

Strona 168

• HP Data Protector integration guide for HP ReporterThis manual describes how to install, configure, and use the integration of DataProtector with HP

Strona 169

Supported configurationsThree hosts: CM, application, ResolveThis solution uses three hosts: one each for the Cell Manager, Resolve Agent, andapplicat

Strona 170

Figure 71 Basic three host configurationTwo Hosts: Cell Manager/Resolve Agent and applicationThis solution uses two hosts: one for the Cell Manager an

Strona 171 - Storage Area Networks

Media Agent may impact the application database’s performance (XCopy’s processingrequirements are negligible).Note that in this configuration, the hos

Strona 172 - Fibre Channel

10 Disk backupIn this chapterThis chapter introduces the concepts associated with backing up data to disk andthe technologies that enable it. It also

Strona 173 - Loop topology

Disk backup benefitsThere are many situations in which it is advantageous to use disk-based devices whenperforming backups. Disk-based devices are, in

Strona 174 - Switched topology

• Overall, disk-based storage space is becoming increasingly cheaper even ifcompared to tape-based storage.Data Protector disk-based devicesData Prote

Strona 175 - Device sharing in SAN

of free disk space approaches the configured minimum amount required for thedevice to work. This enables you to free more disk space in good time for

Strona 176

11 Synthetic backupIn this chapterThis chapter introduces the concept of synthetic backup and explains the syntheticbackup solution provided by Data P

Strona 177 - Device locking

new, synthetic full backup. This can be repeated indefinitely, with no need to run afull backup again.In terms of restore speed, a synthetic full back

Strona 178 - Indirect Library Access

The following figures explain the concept of synthetic backup and virtual full backup.They show how a synthetic full backup or a virtual full backup i

Strona 179 - Direct Library Access

This guide describes how to configure MPE/iX clients and how to back up andrestore MPE/iX data.• HP Data Protector Media Operations user's guideT

Strona 180 - Device sharing in clusters

Figure 73 Virtual full backupFigure 73 on page 260 shows how a virtual full backup is created. With this type ofbackup, all the backups reside in a si

Strona 181 - Floating drives

Figure 74 Full and incremental backupsIn Figure 74 on page 261, conventional backups were performed. To restore to thelatest possible state, you need

Strona 182

Figure 76 Regular synthetic backupFigure 76 on page 262 shows a situation where a synthetic backup was performedafter each incremental backup. This st

Strona 183 - 4 Users and user groups

By default, the last synthetic full backup in the backup chain is used for restore,irrespective of whether the preceding backups are still valid or th

Strona 185 - Data Protector user rights

12 Split mirror conceptsIn this chapterThis chapter introduces the split mirror backup concept and discusses theconfigurations that are supported by H

Strona 186 - Users and user groups186

Figure 78 Split mirror backup conceptThe target volumes in replica are typically connected to a separate client, which alsohas tape devices connected

Strona 187 - 5 The Data Protector internal

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedOnly when this is carried out before a replica

Strona 188

allows up to three replicas, and each can have an additional two copies if cascadingis used.During the instant recovery, the data on the specified rep

Strona 189 - IDB architecture

Supported configurationsLocal mirror - dual hostThis solution uses a local mirroring functionality such as Business Copy XP. Both disksare in the same

Strona 190

Documentation mapAbbreviationsAbbreviations in the documentation map that follows are explained below. The guidetitles are all preceded by the words “

Strona 191 - Catalog Database (CDB)

database into a consistent mode that permits the split, as well as to take it out of thismode again.This configuration enables an offline backup of a

Strona 192

Figure 80 Split mirror - remote mirror (LAN-free remote backup - dataHA)The remote mirror transfers data to a physically separate site where it can be

Strona 193

remote disaster recovery site using hardware mirror concepts is widely accepted inthe industry.Local/remote mirror combinationIf the customer has a ne

Strona 194 - IDB operation

Other configurationsThere are many other possible split mirror configurations that provide some particularadvantage or fulfill a specific user need. H

Strona 195 - Exporting media

Split mirror concepts274

Strona 196 - Overview of IDB management

13 Snapshot conceptsIn this chapterThis chapter introduces the snapshot backup concepts and discusses the configurationsthat are supported by HP.It is

Strona 197 - IDB growth and performance

allocation of logical volumes on physical disks, but you can influence it with a choiceof protection characteristics.RAIDRedundant Array of Inexpensiv

Strona 198

Figure 82 Snapshot backupThe backup client is set up as a Data Protector client with tape devices connected,to allow a local backup to be performed.Wh

Strona 199

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedFor an online database backup, snapshot data al

Strona 200

Instant recoveryDuring snapshot backup sessions, several snapshot copies of data can be producedand can be retained on a disk array, each point-in-tim

Strona 201

GuideAbbreviationInstallation and licensing guideInstallMedia Operations getting started guideMO GSMedia Operations product announcements, software no

Strona 202

not written to that reserved space until necessary. As the data changes on the sourcevolume, the snapshot data on the target volume is updated with th

Strona 203 - IDB size estimation

Supported configurationsBasic configuration: single disk array - dual hostBoth hosts are connected to the same disk array, so that the I/O infrastruct

Strona 204

1. Put the database into a consistent mode that permits a snapshot to be taken.2. Perform a snapshot of the application data.3. Return the database to

Strona 205 - 6 Service management

Figure 85 Multiple application hosts - single backup hostWith this solution, multiple application hosts may be connected to a single or multipledisk a

Strona 206 - Service management206

Figure 86 Disk array(s) - single hostIn cases where no dedicated backup server is available, both functions (applicationand backup) can be performed o

Strona 207

Figure 87 LVM mirroring - HP StorageWorks Virtual Array onlyIn the supported configurations described previously, only Business Copy functionalityis p

Strona 208 - Service management208

Figure 88 Campus Cluster with LVM Mirroring - HP StorageWorksVirtual Array onlyWith this configuration, it is possible to emulate Continuous Access pl

Strona 209

In the event that you want to back up data in a configuration not listed, this does notmean that it cannot be supported. Please contact your local HP

Strona 210 - The monitor

Snapshot concepts288

Strona 211 - Reporting and notification

14 Microsoft Volume ShadowCopy serviceIn this chapterThis chapter introduces the Microsoft Volume Shadow Copy service (VSS) conceptand its role in the

Strona 212 - Service management212

IntegrationsLook in these guides for details of the following integrations:GuideIntegrationIG-OMU, IG-OMWHP Operations Manager for UNIX/for WindowsIG-

Strona 213 - Java-based online reporting

VSSVolume Shadow Copy service (VSS) is a software service introduced by Microsoft onWindows operating systems. This service collaborates with the back

Strona 214 - Service management214

The example of the hardware provider is disk array, which has its hardwaremechanism of providing point-in-time state of a disk. A software provider op

Strona 215

Figure 89 Actors of the traditional backup modelFigure 90 Actors of the VSS backup modelIn the traditional model, the backup application had to commun

Strona 216 - Service management216

VSS benefitsThe advantages of using Volume Shadow Copy service are as follows• A unified backup interface for all writers.• A unified backup interface

Strona 217 - Data Protector OM SIP

writers, and backup and restore functionality. For detailed information on theintegration, see the HP Data Protector integration guide.VSS backupIn ca

Strona 218 - Service management218

VSS filesystem backup and restoreSome applications are not aware of the Volume Shadow Copy service. Suchapplications cannot guarantee consistency of d

Strona 219 - 7 How Data Protector operates

• Backups can be performed at any time without locking out users.• There is little or no impact on the performance of the application system duringthe

Strona 220

A Backup scenariosIn this appendixThis Appendix describes two scenarios: one for company XYZ and one for companyABC. Both companies plan to enhance th

Strona 221

Define the periods of time during which backups of specific systems can bedone.• Local versus network backupsDetermine which systems, that the backup

Strona 222

Determine the administration and operations rights for the backup systems users.Company XYZXYZ is a translation agency providing the following service

Strona 223

ContentsPublication history ... 21About this guide ...

Strona 224 - Queuing of backup sessions

GuideIntegrationIG-RHP ReporterIG-SIPHP Service Information Portalall ZDBHP StorageWorks Disk Array XPall ZDBHP StorageWorks Enterprise Virtual Array

Strona 225 - Restore sessions

Current devicesProjecteddata (in 5Years)Currentdata#Clients#ServersDepart.2 HPStorageWorksDAT24autoloaders67 GB22 GB11 UX1 AIXOtherLanguages1 HPStorag

Strona 226

network shares. Employees in the Other Languages Department also work onSaturdays.Problems with the current solutionThe current backup solution is not

Strona 227 - Queuing of restore sessions

Backup strategy requirementsRequirementsAfter addressing the items under “Considerations” on page 297, the followingrequirements have been identified

Strona 228 - Parallel restores

Proposed solutionBecause of the limitations of the current backup solution for both performance andenterprise-wide management, there is a need to rede

Strona 229 - Object copy sessions

DevicesProjected Data(In 5 Years)Current DataDepartment* One HP StorageWorks DAT24 autoloader is currently used to locally back up the 12 GBof data. T

Strona 230

Figure 92 Proposed XYZ backup topology• The Cell Manager maintains the Catalog Database (CDB). This provides aminimum of 20 days of file and directory

Strona 231

Figure 93 Input parametersThe results are shown in Figure 94 on page 306. In one year, the database is expectedto grow to approximately 419.75 MB.Figu

Strona 232

The backup devices consist of an HP StorageWorks DLT 4115w Library aswell as two HP StorageWorks DAT24 autoloaders.Why use the HP StorageWorks DLT 411

Strona 233 - Object consolidation sessions

The Data Protector Catalog Database is approximately 0.4 GB in size. It isbacked up locally to an HP StorageWorks DAT24 autoloader, which has asustain

Strona 234

Table 18 on page 309 shows the size and time requirements for these fullbackups as of today, as well as the five year projection.Table 18 Remote full

Strona 235 - Media management sessions

GuideIntegrationIG-VarSybaseall ZDBEMC SymmetrixIG-VarVMwareDocument conventions and symbolsTable 2 Document conventionsElementConventionCross-referen

Strona 236

Why use level 1 incremental backups?To restore the latest data, only two media sets need to be accessed, one forthe latest full backup and one for the

Strona 237 - 8 Integration with database

Data protection determines the amount of time until each medium can bereused. Set data protection to permanent so that data on the media is notoverwri

Strona 238

autoloaders. All actions excluding the actual moving of media to the vault aredone by the software solution, including queries done internally in the

Strona 239

1. Identifies the media needed for restore.2. Brings the media from a vault, enters the media in the HP StorageWorksDLT 4115w Library or other device

Strona 240

Three departments at ABC Cape Town use the Microsoft SQL database to store theirdata and the company uses Microsoft Exchange Server for mailing servic

Strona 241

Backup media are denoted by the name of the department, the name of the serverand first and last dates on which backups were performed on the media. A

Strona 242

Maximum downtimeType of data6 hoursCompany resource data1 dayProject data2 daysPersonal dataThis recovery time mainly consists of the time needed to a

Strona 243 - 9 Direct backup

Data (in GB)Location22ABC Pretoria16ABC DurbanPlans for future growth of the amount of dataABC plans to grow at 15 to 20% per year. The amount of data

Strona 244 - Direct backup

Configure cell A as the MoM cell for the ABC Cape Town environment, cell D as theMoM cell for the ABC Pretoria environment, and cell F as the MoM cell

Strona 245 - How direct backup works

The two cells at the ABC Durban MoM environment should also share a CentralizedMedia Management Database. This should be configured on the MoM of cell

Strona 246 - Environment

NOTE:Provides additional information.TIP:Provides helpful hints and shortcuts.Data Protector graphical user interfaceData Protector provides a cross-p

Strona 247 - About XCopy

#SAP#UNIXclients#UNIXservers#Windowsclients#WindowsserversCellMoMenvironment1215112B1124202C334D*ABC Pretoria32561E304102F*ABC Durban292111p#SAP is th

Strona 248 - Direct backup process flow

Figure 97 ABC Cape Town enterprise backup environmentThe two cells at the ABC Pretoria MoM environment should share a CentralizedMedia Management Data

Strona 249 - Requirements and support

catalog protection (3 weeks), number of full backups per week (1), and numberof incremental backups per week (5).Figure 98 Input parametersThe results

Strona 250 - Supported configurations

All systems in the same location should be on the same LAN for maximumperformance. Use the 100TX network to connect all the systems in each of theloca

Strona 251

Why use the HP StorageWorks DLT 4115w Library?• The HP StorageWorks DLT 4115w Library has a single DLT4000 drivewith 15 slots. It has a total compress

Strona 252 - Direct backup252

library has two drives and a sustained data transfer rate of 6 MB/s (2 x 3 MB/s),or 21 GB/h. Therefore, data is backed up to this library in up to 5 h

Strona 253 - 10 Disk backup

DescriptionLocationMedia pool nameIDBPretoriaP_DB_PoolHP StorageWorks DLT 4115wLibraryDurbanD_DLT_PoolHP StorageWorks DAT24autoloadersDurbanD_DAT_Pool

Strona 254 - Disk backup benefits

FullIncr1Incr1Incr1Incr1Incr1Cell C• SERVERS_A...GBackup specifications for the company’s servers to prepare for disasterrecovery. Each time a new ser

Strona 255

TimeBackup dayDescriptionCellName23:00SundayServersCSERVERS_C03:00SaturdayIDBDDB_D03:00SaturdayIDBEDB_E23:00FridayServersDSERVERS_D23:00SaturdayServer

Strona 256 - Disk backup256

Set data protection to 5 years for all backup specifications except forExchange_A, which is sued to back up personal mail. Set data protection forthis

Strona 257 - 11 Synthetic backup

Figure 1 Data Protector graphical user interfaceGeneral informationGeneral information about Data Protector can be found at http://www.hp.com/go/datap

Strona 258 - Synthetic backup benefits

• Display a list of media needed for restore and the physical locations wherethe media are stored.• Filter media from the media view based on specific

Strona 259

B Further informationIn this appendixThis appendix provides additional information about some of the aspects of DataProtector concepts, including back

Strona 260 - Restore and synthetic backup

Figure 100 Backup generationsYou configure Data Protector to automatically maintain the desired number of backupgenerations by selecting the appropria

Strona 261

Example 1: automated media copying of filesystem backupsYour company has a MoM environment with two cells, each containing 150 computersystems (server

Strona 262 - Synthetic backup262

have 900 GB of data to back up. The data is divided among backup specificationsin the following way:• BackupSpec1 (Drive 1) - 300 GB• BackupSpec2 (Dri

Strona 263

Figure 101 Incr1 backup and automated media copyingFull backupConfiguring backupsYou schedule your weekly full backup on Friday at 6 PM. The data prot

Strona 264 - Synthetic backup264

Again, you use post-backup media copying to copy the media used with BackupSpec1and BackupSpec2, and scheduled media copying to copy media used inBack

Strona 265 - 12 Split mirror concepts

Figure 102 Full backup and automated media copyingYou schedule your monthly full backup on Sunday at 6 AM. This backup is intendedfor archiving purpos

Strona 266 - Split mirror concepts266

Figure 103 Overview of backup and automated media copy sessionsExample 2: automated media copying of Oracle database backupsYour company has an Oracle

Strona 267

Full backupConfiguring backupsYou schedule your daily full backup each day from Monday to Friday at 6 PM. Thedata protection is set to 4 weeks. You ha

Strona 268 - Split mirror concepts268

Subscription serviceHP recommends that you register your product at the Subscriber's Choice for Businesswebsite:http://www.hp.com/go/e-updatesAft

Strona 269

Figure 105 Overview of backup and automated media copy sessionsInternationalizationInternationalization is a way to design and implement a software pr

Strona 270 - Remote mirror

File name handlingHandling file names in a heterogeneous environment (different operating systemswith different local settings, all in one cell) is a

Strona 271

UNIX incompatibility exampleThree users working on a Solaris system without Data Protector installed, each usinga different character set, create file

Strona 272 - Split mirror concepts272

• the files to be restored are selected in the GUI• Data Protector searches the tape for the specified data and restores it• the original file names (

Strona 274 - Split mirror concepts274

Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge SystemLibrary Server (ACSLS) software that manages the

Strona 275 - 13 Snapshot concepts

an archived redo log is determined by the mode the databaseis using:• ARCHIVELOG - The filled online redo log files are archivedbefore they are reused

Strona 276 - Snapshot concepts

associated with managing data and disk and provides stripingand mirroring capabilities to optimize performance.automigration (VLS specific term) The f

Strona 277

located (drive on Windows and mount point on UNIX). Forintegration objects — backup stream identification, indicatingthe backed up database/applicatio

Strona 278 - Snapshot backup types

See also application system, target volume, and replica.backup types See incremental backup, differential backup, transaction backup,full backup, and

Strona 279 - Types of snapshots

1 About backup and DataProtectorIn this chapterThis chapter provides an overview of backup and restore concepts. It introduces DataProtector architect

Strona 280 - Snapshot concepts280

See also replica, source volume, snapshot, and CA+BC EVA.BC Process (EMC Symmetrix specific term) A protected storage environmentsolution that has def

Strona 281

See also BRBACKUP, and BRRESTORE.BRBACKUP (SAP R/3 specific term) An SAP R/3 backup tool that allows anonline or offline backup of the control file, o

Strona 282 - Snapshot concepts282

CAP (StorageTek specific term) Cartridge Access Port is a port builtinto the door panel of a library. The purpose is to enter or ejectmedia.catalog pr

Strona 283

Database(CMMDB)Change Journal (Windows specific term) A Windows filesystem feature that logsa record of each change as it occurs to the files and dire

Strona 284 - Snapshot concepts284

client backup withdisk discoveryA backup of all filesystems mounted on a client. When thebackup starts, Data Protector discovers the disks on the clie

Strona 285

between the MoM cell and the other Data Protector cells is highlyrecommendedSee also MoM.COM+ RegistrationDatabase(Windows specific term) The COM+ Reg

Strona 286

the CRS runs under the account of the user specified atinstallation time. On UNIX systems, it runs under the accountroot.CSM The Data Protector Copy a

Strona 287 - Concepts guide 287

they have common characteristics and share a common CAEVA log.See also copy set.database server A computer with a large database stored on it, such as

Strona 288 - Snapshot concepts288

a single device group. All devices in a device group must beon the same EMC Symmetrix unit. You can use a device groupto identify and work with a subs

Strona 289 - Copy service

directory junction (Windows specific term) Directory junctions use the reparsepoint concept of Windows. An NTFS 5 directory junction allowsyou to redi

Strona 290

Data Protector can be used in environments ranging from a single system tothousands of systems on several sites. Due to the network component concept

Strona 291

the backed up data, and increase the data availability andaccessibility for restore. The backup stages consist of backingup data to one media type fir

Strona 292

can also read the data from the medium and send it to thecomputer system.drive-basedencryptionData Protector drive-based encryption uses the encryptio

Strona 293

and to Data Protector users who are granted the Reportingand notifications user rights. You can view or delete allevents in the Event Log.Event Logs (

Strona 294

bi-directional transmission of large data files and can bedeployed between sites kilometers apart. Fibre Channel connectsnodes using three physical to

Strona 295

See also primary volume and MU number.flash recoveryarea(Oracle specific term) Flash recovery area is an Oracle 10g/11gmanaged directory, filesystem,

Strona 296

the directoryData_Protector_program_data\Config\Server\Options(Windows Server 2008),Data_Protector_home\Config\Server\Options (otherWindows systems),

Strona 297 - A Backup scenarios

hosting system A working Data Protector client used for Disk Delivery DisasterRecovery with a Data Protector Disk Agent installed.HP OperationsManager

Strona 298 - Backup scenarios298

information or method invocation, and returns standardizedresponses.See also HP StorageWorks EVA SMI-S Agent and CommandView (CV) EVA.HP StorageWorksV

Strona 299 - Company XYZ

See also backup types.incrementalmailbox backupAn incremental mailbox backup backs up all the changes madeto the mailbox after the last backup of any

Strona 300

Information Store (Microsoft Exchange Server specific term) The MicrosoftExchange Server service that is responsible for storagemanagement. Informatio

Strona 301

Data Protector enables you to meet the needs for continued business operationsaround the clock. In today's globally distributed business environm

Strona 302 - Backup strategy requirements

ISQL (Sybase specific term) A Sybase utility used to perform systemadministration tasks on Sybase SQL Server.Java GUI Client The Java GUI Client is a

Strona 303 - Proposed solution

library Also called autochanger, jukebox, autoloader, or exchanger.A library contains media in repository slots. Each slot holds onemedium (for exampl

Strona 304 - Backup scenarios304

An LCR copy is used for disaster recovery because you canswitch to the LCR copy in a few seconds. If an LCR copy is usedfor backup and if it is locate

Strona 305

login ID (Microsoft SQL Server specific term) The name a user uses tolog on to Microsoft SQL Server. A login ID is valid if MicrosoftSQL Server has an

Strona 306 - Backup scenarios306

mailbox store (Microsoft Exchange Server specific term) A part of theInformation Store that maintains information in user mailboxes.A mailbox store co

Strona 307

During a restore session, a Media Agent locates data on thebackup medium and sends it to the Disk Agent. The Disk Agentthen writes the data to the dis

Strona 308

merging This defines one mode to resolve file conflicts during restore. Ifthe file to be restored already exists at the destination, the onewith the m

Strona 309 - 31 GB / 3 h10 GB / 1 hAdmin

MMD The Media Management Daemon process (service) runs on theData Protector Cell Manager and controls media managementand device operations. The proce

Strona 310 - Backup scenarios310

OBDR capabledeviceA device that can emulate a CD-ROM drive loaded with abootable disk and can thus be used as a backup or boot devicefor disaster reco

Strona 311

period (several minutes or hours). For instance, for backupto tape, until streaming of data to the tape is finished.• For ZDB methods, the database is

Strona 312 - Backup scenarios312

The DSI integration provides a set of scripts and configuration files from whichusers are able to see how to add their own queries using Data Protecto

Strona 313 - Company ABC

• For ZDB methods, backup mode is required for the shortperiod of the data replication process only (several seconds).Normal database operation can th

Strona 314 - Backup scenarios314

overwrite An option that defines one mode to resolve file conflicts duringrestore. All files are restored from a backup even if they areolder than exi

Strona 315

COPY - The mirrored pair is currently re-synchronizing. Datais transferred from one disk to the other. The disks do notcontain the same data.•• PAIR -

Strona 316

pre-exec A backup option that executes a command or script before thebackup of an object or before the entire session is started.Pre-exec commands are

Strona 317

instance translates the commands into a sequence of low levelSCSI commands.rawdisk backup See disk image backup.RCU See Remote Control Unit (RCU).RDBM

Strona 318 - Backup scenarios318

Recovery Manager(RMAN)(Oracle specific term) An Oracle command-line interface thatdirects an Oracle Server process to back up, restore, or recoverthe

Strona 319 - 172243A*ABC Cape

is replicated. However, if a volume manager is used on UNIX,the whole volume or disk group containing a backup object(logical volume) is replicated. I

Strona 320

RSM (Windows specific term) Removable Storage Manager (RSM)includes a media management service that facilitatescommunication among applications, robot

Strona 321

shadow copy (Microsoft VSS specific term) A volume that represents aduplicate of the original volume at a certain point in time. Thedata is then backe

Strona 322 - Backup scenarios322

number. To read a medium, a robotic mechanism moves themedium from a slot into the drive.SMB See split mirror backup.smart copy (VLS specific term) A

Strona 323

Figure 2 Backup processIn most cases, the source is data on a disk, such as files, directories, databases, andapplications. If the backup is expected

Strona 324 - Backup scenarios324

use. However background copying processes normally continueafter creation.See also snapshot.source (R1) device (EMC Symmetrix specific term) An EMC Sy

Strona 325

split mirror restore (EMC Symmetrix and HP StorageWorks Disk Array XP specificterm) A process in which data backed up in a ZDB-to-tape or aZDB-to-disk

Strona 326

for a single-drive device and multiple SCSI entries are requiredfor a multi-drive library device.stackers Devices with multiple slots for media storag

Strona 327

synthetic backup A backup solution that produces a synthetic full backup, anequivalent to a conventional full backup in terms of data, withoutputting

Strona 328 - Backup options

tablespace A part of a database structure. Each database is logicallydivided into one or more tablespaces. Each tablespace has datafiles or raw volume

Strona 329

TNSNAMES.ORA (Oracle and SAP R/3 specific term) A network configurationfile that contains connect descriptors mapped to service names.The file may be

Strona 330 - Backup scenarios330

UIProxy The Java GUI Server (UIProxy service) runs on the DataProtector Cell Manager. It is responsible for communicationbetween the Java GUI Client a

Strona 331 - B Further information

user rights. Users have the access rights of the user group towhich they belong.vaulting media The process of storing media to a safe and remote place

Strona 332 - Further information332

virtual tape (VLS specific term) An archival storage technology that backsup data to disk drives in the same way as if it were being storedon tape. Be

Strona 333 - Incr1 backup

See also resync mode, source volume, primary volume (P-VOL),replica, secondary volume (S-VOL), and replica set rotation.VxFS Veritas Journal Filesyste

Strona 334 - Further information334

Media management ... 48Backup devices ...

Strona 335 - Full backup

Figure 4 Network backupTo accomplish backup of a network environment you need an application that allowsyou to:• Attach backup devices to any system i

Strona 336 - Further information336

XBSA interface (Informix Server specific term) ON-Bar and Data Protectorcommunicate with each other through the X/Open BackupServices Application Prog

Strona 337

ZDB to tape (ZDB specific term) A form of zero downtime backup wheredata in the replica produced is streamed to a backup medium,typically tape. Instan

Strona 339

IndexAadding data to media during backups,148ADIC (EMASS/GRAU) AML, 162admin user group, 185alarms, 208alternative disaster recovery methods,131operat

Strona 340 - Internationalization

backup with disk discovery, 225Backup Agents, 42backup clientsplit mirror backup, 267backup client as failover serversnapshot backup, 286split mirror

Strona 341 - File name handling

benefitsdisk backup, 254synthetic backup, 258Volume Shadow Copy service, 293benefits of online integrations, 240block sizebackup devices, 158default,

Strona 342 - Browsing file names

client systems, 42clients, 42installing, 64maintaining, 64cluster heartbeat, 80cluster (definition), 79cluster integrationsoverview, 82cluster node, 8

Strona 343 - Concepts guide 343

creating cellsmixed environment, 66UNIX environment, 64Windows domains, 65Windows workgroups, 66Windows environment, 65CRS, 220Ddaily maintenanceIDB o

Strona 344 - Further information344

database on the UNIX Cell ManagersIDB format, 189IDB location, 189database on the Windows CellManagerIDB format, 188IDB location, 188database architec

Strona 345 - Glossary

device lists, 155device locking, 159device sharing in clusters, 180device sharing in SAN, 175drives, 177robotics, 177device streaming (definition), 15

Strona 346 - Glossary346

The Data Protector internal database (IDB) keeps track of the files you back up sothat you can browse and easily recover the entire system or single f

Strona 347

Direct Library Access, 179dirty drive detection, 164disaster, 128Disaster RecoveryPhase 3, 129disaster recovery, 129Disaster Recoveryconcepts, 128over

Strona 348 - Glossary348

exchangers, 162See also librariesexpired catalog protection, 201exporting media, 102IDB operation, 195removed objects, 195Ffactors affecting restore d

Strona 349

IIDB, 187advantages, 187architecture, 189Catalog Database, 191Detail Catalog Binary Files, 192in the Manager-of-Managersenvironment, 189management, 19

Strona 350 - Glossary350

incremental backups, 71types, 93IndirectStorage Are Networks, 178Indirect Library AccessLibrary Access, 178Indirect Library Access, 179influence of lo

Strona 351

lock names, 159, 177log all detailed informationCatalog Database, 100log directory names onlyCatalog Database, 100log level of information, 104logging

Strona 352 - Glossary352

media pools, 135, 309, 325default, 136properties, 136usage examples, 140Media Agents, 42General Media Agent, 165media allocation policies, 144media al

Strona 353

monitoring, 38, 210, 211mount prompt handling, 111mount requests, 224, 232, 235automating, 224notification, 224responding, 224, 228mount requests (res

Strona 354 - Glossary354

planning cells, 62 - 67Cell Managers, 64Installation Servers, 64number of cells, 62planning performance, 67 - 73backup types, 71compression, 68devices

Strona 355

reporting, 38, 211reporting and notification, 311, 329broadcasts, 207e-mail, 207examples, 212HTML, 207SNMP, 207requirementsDirect backup, 249response

Strona 356 - Glossary356

Service Management, 37, 205 - 215Application Response Measurement,207monitor, 210notification, 211operative analyses of trends, 206overview, 205report

Strona 357

Systems to be backed upClient systems you want to back up must have the Data Protector Disk Agent (DA),also called Backup Agent, installed. To back up

Strona 358 - Glossary358

snapshot backup, 275application client, 277archive log backup, 278backup client, 277backup client as failover server, 286concepts, 276configuration, C

Strona 359

standalone devices, 161standalone devices, 160standalone file device, 255standard restore vs parallel restore, 228standard backup vs disk discovery, 2

Strona 360 - Glossary360

Vvaulting, 134, 151 - 153, 311, 329definition, 151restoring, 153restoring from a vault, 312, 330vaulting usage example, 152Veritas Cluster, 79virtual

Strona 361 - (EMC Symmetrix

Figure 6 Backup or restore operationBackup sessionsWhat is a backup session?A backup session, shown in Figure 7 on page 44, is a process that creates

Strona 362 - Glossary362

Figure 7 Backup sessionA typical backup session is more complex than the one shown in Figure 7 on page 44.A number of Disk Agents read data from multi

Strona 363

Enterprise environmentsWhat is an enterprise environment?A typical enterprise network environment, shown in Figure 9 on page 45, consistsof a number o

Strona 364 - Glossary364

Why split large environments into multiple cells?• Geographical grouping of systems.• Logical grouping of systems, for example, departments.• Slow net

Strona 365

Figure 11 Manager-of-Managers environmentManager-of-Managers provides the following features:• Centralized licensing repositoryThis enables simplified

Strona 366 - Glossary366

Media managementData Protector provides you with powerful media management, which lets you easilyand efficiently manage large numbers of media in your

Strona 367

Backup devicesData Protector defines and models each device as a physical device with its ownusage properties, such as the default pool. This device c

Strona 368 - Glossary368

Data Protector user groups ... 75Data Protector user rights ...

Strona 369

User interfacesData Protector provides easy access to all configuration and administration tasksusing the Data Protector GUI on Windows and UNIX platf

Strona 370 - Glossary370

• A Results Tab with all the configuration wizards, properties and lists.• Easy configuration and management of the backup of online database applicat

Strona 371

Figure 14 Original Data Protector GUIFigure 15 Data Protector Java GUIData Protector Java GUIThe Data Protector Java GUI is a Java-based graphical use

Strona 372 - Glossary372

client-server architecture. It enables backup management with the same look and feelas the original Data Protector GUI.The Java GUI consists of two co

Strona 373

Benefits of Java GUIThe Data Protector Java GUI has the following advantages over the original DataProtector GUI:• PortabilityThe Data Protector Java

Strona 374 - Glossary374

Overview of tasks to set up Data ProtectorThis section provides an overview of global tasks to set up your Data Protector backupenvironment. Depending

Strona 375

7. Install and configure your Data Protector environment.• Install the Data Protector Cell Manager system and use the Data Protectoruser interface to

Strona 376 - Glossary376

2 Planning your backupstrategyIn this chapterThis chapter describes backup strategy planning. It focuses on planning Data Protectorcells, performance,

Strona 377

Backup strategy planningData Protector is simple to configure and administer. However, if you work in a largeenvironment with diverse client systems a

Strona 378 - Glossary378

The allowed downtime has a significant impact on the investments into networkinfrastructure and equipment needed for backups. For each type of data, l

Strona 379

When to schedule backups ... 107Staggering full backups ...

Strona 380 - Glossary380

The time needed for backup depends on the type of backup, full or incremental.For more information, see “Full and incremental backups” on page 91. Dat

Strona 381

The need to guard premises to prevent unauthorized people from entering.This also includes safeguarding all relevant data against unauthorized access,

Strona 382 - Glossary382

• Consider backing up to a disk-based device. Besides other benefits, backupto disk reduces the time needed for backup and enables the use of advanced

Strona 383

is that it can require more administrative work or might even require a separateadministrator for each cell.• Size of each cellThe size of a Data Prot

Strona 384 - Glossary384

Installing and maintaining client systemsIf you have several UNIX and Windows client systems, an efficient mechanism forthe installation of Data Prote

Strona 385

that each client system is accessible from every other client system using the samefully qualified node name.Creating cells in the Windows environment

Strona 386 - Glossary386

Windows workgroupsSome of the configuration tasks require more steps in some cases, because there areno global users as in a domain. Software distribu

Strona 387

You can configure a single cell over geographically remote locations. In this case,you need to ensure that data transfer from each client system to th

Strona 388 - Glossary388

To maximize performance, use local backup configurations for high volumedatastreams.Network or server versus direct backupsSending data over a network

Strona 389 - StorageWorks EVA

High performance hardware other than devicesPerformance of computer systemsThe speed of computer systems themselves directly impacts performance. The

Strona 390 - Disk Array XP

Vaulting ... 151Restoring from media in a vault ...

Strona 391

3 fast tape devices, consider using 3 dedicated network links between system_Aand system_B.• Load BalancingUsing this Data Protector feature, Data Pro

Strona 392 - Glossary392

Full and incremental backupsA basic approach to improve performance is to reduce the amount of data to backup. Carefully plan your full and incrementa

Strona 393

Disk performanceAll data that Data Protector backs up resides on disks in your systems. Therefore, theperformance of disks directly influences backup

Strona 394 - (ZDB specific term)

improve performance in your specific environment and determine the optimumasynchronous reading settings.SAN performanceIf large volumes of data need t

Strona 395

Data Protector security featuresThe following features allow and restrict access to Data Protector and the backed updata. The items in this list are d

Strona 396 - Glossary396

When is the account checked?When a user starts the Data Protector user interface, Data Protector checks user rights.User rights are also checked when

Strona 397

Visibility of backed up dataBacking up data means creating a new copy. Therefore, when you deal withconfidential information, it is important to restr

Strona 398 - Glossary398

encrypts the data. Thus the backed up data is encrypted before it is transferred overthe network and written to media.Figure 17 on page 77 shows a bas

Strona 399

If a source medium involved in an automatic media copy session stores encryptedas well as non-encrypted data, all data written to the corresponding ta

Strona 400 - Glossary400

the CRS process is running, or the user specified as the owner in the backupspecification options. For instructions on how to specify a backup owner,

Strona 401

Data Protector user rights ... 1855 The Data Protector internal database ...

Strona 402 - Glossary402

Figure 19 Typical clusterComponents:• Cluster nodes (two or more)• Local disks• Shared disks (shared between nodes)Cluster nodesCluster nodes are comp

Strona 403

you can make an appropriate determination of the ownership of the package(MC/SG, Veritas Cluster) or group (MSCS).What is a package or group?A package

Strona 404

A cluster-aware Data Protector Cell Manager that is responsible for running the IDBand managing backup and restore operations has many major benefits

Strona 405

• The Data Protector client is installed in a cluster. The Cell Manager (if not installedin the cluster) in such a case is not fault tolerant; the ope

Strona 406

Figure 20 Cell Manager installed outside a clusterWhen creating a backup specification, you can see three or more systems that canbe backed up in the

Strona 407

The following is the expected backup behavior under this configuration.Table 3 Backup behaviorResultConditionSuccessful backupFailover of the node bef

Strona 408

Figure 21 Cell Manager installed outside a cluster, devices connectedto the cluster nodesWhen creating a backup specification, you can see three or mo

Strona 409

NOTE:The difference with the previous example is that each of the cluster nodes has a DataProtector Media Agent installed. Additionally, you need to u

Strona 410

Data Protector cluster critical resources are defined in the same package(MC/ServiceGuard) or group (Microsoft Cluster Server) as the applicationclust

Strona 411

Figure 22 Cell Manager installed in the cluster, devices connected tocluster nodesWhen creating a backup specification, you can see three or more syst

Strona 412

Data Protector log files ... 213Windows application log ...

Strona 413

NOTE:Clusters do not support a SCSI bus with shared tapes. To bring high availability also toMedia Agents, the Fibre Channel technology can be used as

Strona 414

ResultConditionFilesystem/disk image backup The backup session fails at failoverof the node where the filesystem is installed. The completedobjects fr

Strona 415

Incremental backupFull backupA restore takes more time becauseof the number of media needed.Enables simple and quick restore.RestoreOccupies less spac

Strona 416

Incremental backups depend on the last full backup. If you specify an incrementalbackup and there is no protected full backup, a full backup is perfor

Strona 417

Incr A simple incremental backup, shown in Figure23 on page 95, is based on the last backup that is stillprotected, which can be a full backup or an i

Strona 418

Figure 23 Incremental backupsFigure 24 Leveled incremental backupsTable 7 on page 95 shows the relative referencing of backup runs with variousbackup

Strona 419

Incr3<----Incr1<----Full8Incr3<----Incr2<----Incr1<----Full9Incr3<----Incr2<----<----<----Full10Incr3<----<----<--

Strona 420

TIP:Use the Data Protector Appendable on Incrementals Only option to keep data from fulland incremental backups (of the same backup specification) on

Strona 421

Figure 25 Media needed to restore from simple and leveled incrementalbackupsFigure 26 Media needed to restore from leveled incremental backupsNote tha

Strona 422

Keeping backed up data and information about thedataData Protector lets you specify how long to keep your backed up data on the mediaitself (data prot

Komentarze do niniejszej Instrukcji

Brak uwag