HP Data Protector A.06.10Concepts guideB6960-96035Part number: B6960-96035First edition: November 2008
Filesystem backup of databases and applications ... 239Online backup of databases and applications ...
Catalog protectionWhat is catalog protection?Data Protector saves information about backed up data in the IDB. Since theinformation about the backed u
available, but you must know which media to use and what needs to be restored,for example, the exact file name.The IDB also keeps information on how l
Exporting media from a cellExporting media from a Data Protector cell removes all the information about backedup data on the media and the media thems
on UNIX or disk drives on Windows systems) and the destinations are specified (tape)devices. During the backup session, Data Protector reads the objec
• Description: uniquely defines the backup objects with identical client name andmount point.• Type: backup object type, for example filesystem or Ora
Backup sessionsWhat is a backup session?A backup session is a process that backs up data from a client system to media. Abackup session always runs on
You can combine full and incremental backups when you configure scheduledbackups. For example, you may run a full backup on Sundays and incrementalbac
This section combines all these concepts by giving some examples of backup schedulesand some tips for efficient scheduling.When to schedule backupsTyp
incremental backup. For more information on how Data Protector selects media forbackups, see Selecting media for backups .Example 1Figure 28 on page 1
Figure 29 Full backup with daily level 1 incremental backupsThis policy requires slightly more time for backups and also requires a little moremedia s
Local mirror - dual host ... 269Local mirror - single host ...
Figure 30 Full backup with mixed incremental backupsThis policy takes into account the fact that there are not many changes duringweekends. Data is ba
• When is the lowest system usage and user activity?Typically, this is at night and most backups are scheduled to run during the night.Data Protector
If you need to back up large amounts of data and the backup window presentsa problem, consider backing up to disk-based devices and using advanced bac
Smart MediaCopyMedia copyObject mirrorObject copyNo3No2YesYesAppendabilityof target mediaMedia identicalto the sourcemediaMedia identicalto the source
Figure 31 Object copy conceptIn the figure, there is an object version resulting from a backup of object A, version1, and two additional copies of the
Selection of devicesYou need separate devices to be used with the source media and the target media.The destination devices can have a larger block si
Why use object copy?Additional copies of backed up data are created for multiple purposes:• VaultingYou can make copies of backed up objects and keep
Figure 32 Freeing mediaDemultiplexing of mediaMultiplexed media contain interleaved data of multiple objects. Such media mayarise from backup sessions
Figure 33 Demultiplexing a mediumConsolidating a restore chainYou can copy a restore chain (all backups that are necessary for a restore) of anobject
Figure 34 Disk staging conceptDisk staging also eliminates the need for frequent backups of numerous small objectsto tape. Such backups are inconvenie
Examples of automated media copying ... 332Example 1: automated media copying of filesystem
The result of a successful backup session with object mirroring is one media setcontaining the backed up objects and additional media sets containing
Figure 35 Object mirroringSelection of devicesObject mirroring is load balanced by default. Data Protector makes optimum use ofthe available devices b
Backup performance also depends on factors such as device block sizes and theconnection of devices. If the devices used for backup and object mirrorin
Automated media copyingWhat is automated media copying?Automated media copying is an automated process that creates copies of the mediacontaining back
Smart media copying using VLSWhat is smart media copying?In smart media copying, the data is first backed up to a virtual tape library (VTL)configured
Restoring dataPolicies for restoring data are an essential part of the overall backup strategy in thecompany. Keep the following in mind:• Backing up
Selection of the media setIf an object version that you want to restore exists on more than one media set, whichhas been created using one of the Data
SQL Server, and Microsoft SharePoint Portal Server integrations. Such databasesare usually backed up with interdependent data streams and, consequentl
End users are allowed to restoreAnother possible restore policy is to allow all or just selected end users to restoretheir own data. This policy provi
operation can begin. This includes repartitioning and/or reformatting the boot partitionand recovery of the operating system with all the configuratio
FiguresData Protector graphical user interface ... 331Backup process ...
Disaster recovery methodsData Protector supports the following disaster recovery methods:• Manual disaster recoveryThis is a basic and very flexible d
Alternative disaster recovery methodsThis section compares the Data Protector disaster recovery concept with concepts ofother vendors. This section po
Planning your backup strategy132
3 Media management anddevicesIn this chapterThis chapter describes Data Protector concepts of media and device management.It discusses media pools, de
Media management functionalityData Protector provides the following media management functionality that allowssimple and efficient management of a lar
1. Preparing media for backup.This includes initializing (formatting) media for use with Data Protector andassigning media to media pools, which are u
else, does not matter; it always belongs to its pool until it is recycled and exportedfrom the cell.Several devices can use media from the same pool.M
• system platform (one pool for UNIX systems, one for Windows 2000 systems,and one for Windows XP systems)• per system (every system has its own pool)
What is a free pool?A free pool is an auxiliary source of media of the same type (for example, DLT) foruse when all free media in a regular pool run o
All free (unprotected, empty) media can be grouped in a free pool and sharedbetween all media pools that support free pool usage.• Reduced operator in
Incremental backups ... 9523Leveled incremental backups ...
Media pool usage examplesThe examples below show some configurations you may want to consider whenchoosing the appropriate strategy for a particular b
Figure 38 Configuration of media pools for large librariesExample 3Figure 39 on page 142 shows an example when data is backed up to media in amedia po
Figure 39 Multiple devices, single media poolExample 4Data is backed up to media in multiple media pools on multiple devicessimultaneously. If you wan
Figure 40 Multiple devices, multiple media poolsImplementing a media rotation policyWhat is a media rotation policy?A media rotation policy defines ho
Media rotation and Data ProtectorAutomatic media rotation and media handlingData Protector automates media rotation and media handling as follows:• Be
By now you should be able to estimate the quantity of media required for a full mediarotation. Additional media will be required in case you:• Assume
Data Protector also assigns each medium a media ID that uniquely identifies thismedium.An ANSI X3.27 label is also written on the tape for identificat
Media management during backup sessionsWhat happens during backup?During a backup session, Data Protector automatically selects media for backup andke
Media conditionThe condition of the media also influences which media are selected for backup, forexample, media in good condition are used for backup
Figure 41 Multiple objects and sessions per medium, sequential writesFigure 41 on page 149 shows an example of eight sequential writes over four sessi
Sharing an ADIC/GRAU or StorageTek ACS library ... 17050Storage Area Network ...
concurrently written in sess_7 and the second one in sess_8. Note that one objectcan be stretched over several media. The media usage policy is append
• media ageThe age of a medium is calculated as the number of months that have elapsedsince you formatted, or initialized, the medium. Once a medium i
• A report showing media used for backup within a specified time-frame.• A report showing which backup specifications have used specified media during
Restoring from media in a vaultRestoring media from a vault is no different than restoring from any other media.Depending on how your data and catalog
in Data Protector using different (logical) device names, for example, one withouthardware data compression and another one with hardware data compres
Device lists and load balancingMultiple devices for backupWhen configuring a backup specification, you can specify several standalone devicesor multip
gets full, the backup automatically continues on the medium in the next device in thedevice chain.How load balancing worksFor example, assume that the
Disk agent concurrencyThe number of Disk Agents started for each Media Agent is called Disk Agent (backup)concurrency and can be modified using the Ad
NOTE:Some tape technologies place limitations on the number of file marks per medium. Ensurethat your segment size is not too low.Figure 45 Data forma
Increasing the block size can improve performance. Changing the block size shouldbe done before formatting tapes. For example, a tape written with the
Split mirror backup concept ... 26678Local mirror - dual host (full performance, Zero Downtim
Physical device collisionWhen specifying a device used for backup, you may specify one device name inone backup specification and another device name
install a Data Protector Media Agent on the system with the device connected. DataProtector can detect and automatically configure most standalone dev
Large librariesWhat are library devices?Library devices are automated devices, also called autoloaders, exchangers orjukeboxes. In Data Protector, mos
• Obtain the number of required media. See “Implementing a media rotationpolicy” on page 143.Sharing a library with other applicationsA library device
• Scanning the barcodes of the media in a device’s repository is faster, becauseData Protector does not need to actually load the media to a drive and
Protector internally redirects the robotic commands to the system that manages therobotics.Figure 47 Connecting drives to multiple systemsControl prot
• SCSI—for robotics other libraries• NDMP—for NDMP roboticsAll four library robotic control protocols are implemented in both the General MediaAgent a
Table 11 on page 167 show the Data Protector Media Agent (the General MediaAgent or the NDMP Media Agent) required on a client system configured for r
Figure 48 Sharing a SCSI library (robotics attached to a Data ProtectorClient System)Figure 48 on page 168 shows a SCSI library, with its robotics att
Figure 49 Sharing a SCSI library (robotics attached to an NDMP Server)Figure 49 on page 169 shows a SCSI library, with its robotics attached to an NDM
Overview of backup and automated media copy sessions ... 340105Concepts guide 17
Figure 50 Sharing an ADIC/GRAU or StorageTek ACS libraryFigure 50 on page 170 shows an ADIC/GRAU or StorageTek ACS library, with itsrobotics attached
Storage Area NetworksA Storage Area Network (SAN), depicted in Figure 51 on page 172, is a newapproach to network storage that separates storage manag
Figure 51 Storage Area NetworkFibre ChannelFibre Channel is an ANSI standard for high-speed computer interconnection. Usingeither optical or copper ca
Point-to-point, loop, and switched Fibre Channel topologies can be mixed to best suityour connectivity and growth requirements.For a list of supported
Figure 52 Loop initialization protocolSwitched topologyThe switched topology provides any-to-any connectivity between all nodes connectedto a switch.
Device sharing in SANData Protector supports the SAN concept by enabling multiple systems to sharebackup devices in the SAN environment. The same phys
Figure 53 Example multipath configurationWhy use multiple pathsWith previous versions of Data Protector, a device could be accessed from only oneclien
During a restore session, the device paths are selected in the following order:1. Paths that are on the client to which the objects are restored, if a
Indirect and Direct Library AccessUpon configuring Data Protector with a SCSI Library device, there are two ways inwhich client systems can access lib
Figure 54 Indirect Library AccessNote that you cannot use a shared library if the client system that controls the robotics,castor, in our example, fai
TablesEdition history ... 211Document conventions ...
Figure 55 Direct Library AccessDevice sharing in clustersClustering, which is often used in combination with the SAN concept, is based onsharing netwo
Floating drivesFloating drives are device that are configured on a virtual host, using virtual systemnames. Floating drives should be configured for t
Media management and devices182
4 Users and user groupsIn this chapterThis chapter discusses Data Protector security, users, user groups, and user rights.It is organized as follows:“
can see and restore the backed up data. You can make data visible to other usersusing the Data Protector Public option. For instructions, see the Data
Using predefined user groupsThe following default groups are provided by Data Protector:Table 12 Data Protector predefined user groupsAccess rightsUse
Users and user groups186
5 The Data Protector internaldatabaseIn this chapterThis chapter describes the Data Protector internal database (IDB) architecture, as wellas its usag
• Fast and convenient restore The information stored in the IDB enables you toquickly find the media required for a restore, and therefore makes the r
The IDB on the UNIX Cell ManagerIDB locationThe IDB on the UNIX Cell Manager is located in the /var/opt/omni/server/db40directory.IDB formatThe IDB on
ABC’s Media Pool Usage ... 32525The Staggering Approach for ABC Cape Town ...
For robustness considerations and recommendations for optimizing robustness byrelocating some IDB directories, see the online Help index: “robustness
MMDB size and growthThe MMDB does not grow very big in size. The largest portion of the MMDB istypically occupied by information about the Data Protec
when one of these files starts running out of space, so that you can add new files toextend the size of the filenames part of the IDB.Size and growth
DCBF locationBy default, the DCBF is located in the following directory:• On Windows Server 2008: Data_Protector_program_data\db40\dcbf• On other Wind
Serverless Integrations Binary Files (SIBF)SIBF recordsThe Serverless Integrations Binary Files stores raw NDMP restore data. This data isnecessary fo
If transaction logging is enabled, an IDB backup removes old transaction logs andstarts creating new ones, which are necessary for an IDB recovery.Dur
Removing the detail catalogWhen the detail catalog is removed for a specific medium, its DC binary file isremoved. The same result is achieved by remo
IDB maintenanceOnce you configure the IDB, its maintenance is reduced to a minimum, mainly actingon notifications and reports.IDB recoveryAn IDB recov
• Growth of your backup environment The number of systems being backed up inthe cell influences the IDB growth. Plan for the growth of your backup env
Figure 57 The influence of logging level and catalog protection on IDBgrowthLogging level as an IDB key tunable parameterWhat is logging level?Logging
Legal and notice information© Copyright 1999, 2008 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP requ
Logs all detailed information about backed up directories (names,versions, and attributes). This represents approximately 10% of alldetailed informati
Catalog protection as an IDB key tunable parameterWhat is catalog protection?Catalog protection determines how long the information about backed up da
protection is set for 4 weeks, then significant growth of the IDB stops after 4 weeks.Therefore, in this case, the IDB is 13 times larger if the catal
Specifics for large cellsIf the number of files grows into the tens of millions, or there are tens of thousandsof files generated on a daily basis, an
The Data Protector internal database204
6 Service managementIn this chapterService Management, reporting, and monitoring help administrators manage theirbackup environments more effectively.
Service management measures and reports are a key tool IT managers can use todemonstrate value delivered to the organization and also to maintain comp
Figure 58 Service management information flowNative Data Protector functionalityThe functionality described in the following sections comes with Data
send alerts via SNMP, it is possible to integrate virtually any application that canreceive SNMP traps.• Data Protector backup session auditing stores
central operations console, such as HP Operations Manager software, paging asystem operator, or taking automated remedial action to resolve the proble
Publication historyGuide updates may be issued between editions to correct errors or document productchanges. To ensure that you receive updated or ne
Integration with HP Operations Manager softwareFunctionality of the Data Protector OM integrationData Protector integrates with HP Operations Manager
From the monitor’s user interface, you can abort a backup, restore, or mediamanagement session or respond to “mount” requests.If you make use of the M
• Select from many delivery methods used to deliver reports (such as e-mail, SNMP,broadcast (available on Windows only), write to file, and send to ex
Data Protector log filesSome Service Management applications, such as HP Operations Manager software,allow you to specify when and which log files sho
Data Protector checking and maintenance mechanismData Protector has a rich automated daily self-check and maintenance mechanism,which improves its ope
• Sending major and critical Data Protector events to your network managementsolution, such as HP Network Node Manager (Data Protector built-in notifi
• Administration Reports• Media Pool Reports• PerformanceAn IT Service Provider can use these reports to demonstrate its SLA compliance to acustomer.
Figure 61 Operational error status reportData Protector OM SIPThis integration also uses SIP to provide Data Protector information through aweb-based
Figure 62 Direct SIP integration exampleService management218
7 How Data Protector operatesIn this chapterThis chapter describes the operation of Data Protector. It explains Data Protectorprocesses (on UNIX) and
Publication history22
CRS The CRS (Cell Request Server) process (service) runs on theData Protector Cell Manager. It starts and controls backupand restore sessions. The ser
Scheduled and interactive backup sessionsScheduled backup sessionA scheduled backup session is started by the Data Protector Scheduler at the timeyou
4. The BSM starts Disk Agents (DAs) for each disk to be backed up in parallel. Theactual number of Disk Agents started depends on the concurrency of D
To prevent Data Protector processes from exceeding system capabilities, the maximumnumber of concurrent backup sessions is limited. The limit is confi
Queuing of backup sessionsTimeoutWhen a backup session is started, Data Protector tries to allocate all needed resources,such as devices. The session
Sending notification to an operatorYou can configure a Data Protector notification to send an e-mail to the operator withinformation about the mount r
A restore session is started interactively. You tell Data Protector what to restore, letData Protector determine the needed media, select some options
Figure 65 Restore session information flowHow many restore sessions can run concurrently?A number of restore sessions can run in the cell at the same
Mount requests in a restore sessionWhat is a mount request?A mount request appears in a restore session when the media needed for restore arenot avail
Figure 66 Parallel restore session flowIn a parallel restore, Data Protector reads multiplexed data for all selected objectsand assembles the parts ne
About this guideThis guide describes Data Protector concepts. Read this manual to fully understandthe fundamentals and the model of Data Protector.Int
What is an object copy session?An object copy session is a process that creates an additional copy of the backedup data on a different media set. Duri
4. The CSM starts the Media Agents on the systems with devices configured forcopying. The Media Agents load the source and target media allocatedaccor
Figure 67 Object copy session information flowQueuing of object copy sessionsTimeoutWhen an object copy session is started, Data Protector tries to al
Object consolidation sessionsThis section describes how an object consolidation session is started, what happensduring the session, and the processes
2. The CSM opens the IDB, reads the information about the needed media, andwrites the information about the object consolidation session, such as gene
available. If the resources are still unavailable after the timeout, the session is aborted.The timeout period can be set using the SmWaitForDevice gl
2. The MSM starts the Media Agents (MAs) on the system that has devices usedfor the media management session.3. Media Agents perform the requested ope
8 Integration with databaseapplicationsIn this chapterThis chapter gives a brief description of the integration of Data Protector with databaseapplica
Figure 68 Relational databaseFigure 68 on page 238 shows a typical relational database with the structuresdescribed below.Data files are physical file
1. A transaction is first recorded into the transaction log.2. Changes required in the transaction are then applied to cached pages.3. From time to ti
• HP Data Protector installation and licensing guideThis guide describes how to install the Data Protector software, taking into accountthe operating
The essence of the backup interface is that it provides the backup application withconsistent data (even if it may not be consistent on the disk) whil
• There is no need to specify the location of data files. These can be located ondifferent disks.• The logical structure of the database can be browse
Integration with database applications242
9 Direct backupIn this chapterThis chapter introduces the direct backup concept and the technologies that enableit. The chapter also discusses the dir
Direct backup extends the benefits of HP’s ZDB solution by moving data directly fromdisk to tape and making the load on the backup server negligible o
Backup typesDirect backup supports backup of application data files and control files and of diskimages -- either raw disk or raw logical volume.Direc
Figure 70 on page 246 shows a basic direct backup configuration. The Resolve Agentis on a separate backup host in this configuration. Data, however, d
• The HP StorageWorks Disk Array XP (XP) is configured as Business Copy (BC)with mirrors configured with enough disk space.• The SAN is properly confi
XCopy + ResolvePrior to Resolve, you needed a server with a matching file system to get thisinformation. This was because even with the right server,
Database. The Backup Media Agent (BMA) writes catalog segments and delimitersbetween data and catalog segments known as file-marks.RestoreThere are tw
• HP Data Protector integration guide for HP ReporterThis manual describes how to install, configure, and use the integration of DataProtector with HP
Supported configurationsThree hosts: CM, application, ResolveThis solution uses three hosts: one each for the Cell Manager, Resolve Agent, andapplicat
Figure 71 Basic three host configurationTwo Hosts: Cell Manager/Resolve Agent and applicationThis solution uses two hosts: one for the Cell Manager an
Media Agent may impact the application database’s performance (XCopy’s processingrequirements are negligible).Note that in this configuration, the hos
10 Disk backupIn this chapterThis chapter introduces the concepts associated with backing up data to disk andthe technologies that enable it. It also
Disk backup benefitsThere are many situations in which it is advantageous to use disk-based devices whenperforming backups. Disk-based devices are, in
• Overall, disk-based storage space is becoming increasingly cheaper even ifcompared to tape-based storage.Data Protector disk-based devicesData Prote
of free disk space approaches the configured minimum amount required for thedevice to work. This enables you to free more disk space in good time for
11 Synthetic backupIn this chapterThis chapter introduces the concept of synthetic backup and explains the syntheticbackup solution provided by Data P
new, synthetic full backup. This can be repeated indefinitely, with no need to run afull backup again.In terms of restore speed, a synthetic full back
The following figures explain the concept of synthetic backup and virtual full backup.They show how a synthetic full backup or a virtual full backup i
This guide describes how to configure MPE/iX clients and how to back up andrestore MPE/iX data.• HP Data Protector Media Operations user's guideT
Figure 73 Virtual full backupFigure 73 on page 260 shows how a virtual full backup is created. With this type ofbackup, all the backups reside in a si
Figure 74 Full and incremental backupsIn Figure 74 on page 261, conventional backups were performed. To restore to thelatest possible state, you need
Figure 76 Regular synthetic backupFigure 76 on page 262 shows a situation where a synthetic backup was performedafter each incremental backup. This st
By default, the last synthetic full backup in the backup chain is used for restore,irrespective of whether the preceding backups are still valid or th
Synthetic backup264
12 Split mirror conceptsIn this chapterThis chapter introduces the split mirror backup concept and discusses theconfigurations that are supported by H
Figure 78 Split mirror backup conceptThe target volumes in replica are typically connected to a separate client, which alsohas tape devices connected
• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedOnly when this is carried out before a replica
allows up to three replicas, and each can have an additional two copies if cascadingis used.During the instant recovery, the data on the specified rep
Supported configurationsLocal mirror - dual hostThis solution uses a local mirroring functionality such as Business Copy XP. Both disksare in the same
Documentation mapAbbreviationsAbbreviations in the documentation map that follows are explained below. The guidetitles are all preceded by the words “
database into a consistent mode that permits the split, as well as to take it out of thismode again.This configuration enables an offline backup of a
Figure 80 Split mirror - remote mirror (LAN-free remote backup - dataHA)The remote mirror transfers data to a physically separate site where it can be
remote disaster recovery site using hardware mirror concepts is widely accepted inthe industry.Local/remote mirror combinationIf the customer has a ne
Other configurationsThere are many other possible split mirror configurations that provide some particularadvantage or fulfill a specific user need. H
Split mirror concepts274
13 Snapshot conceptsIn this chapterThis chapter introduces the snapshot backup concepts and discusses the configurationsthat are supported by HP.It is
allocation of logical volumes on physical disks, but you can influence it with a choiceof protection characteristics.RAIDRedundant Array of Inexpensiv
Figure 82 Snapshot backupThe backup client is set up as a Data Protector client with tape devices connected,to allow a local backup to be performed.Wh
• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedFor an online database backup, snapshot data al
Instant recoveryDuring snapshot backup sessions, several snapshot copies of data can be producedand can be retained on a disk array, each point-in-tim
GuideAbbreviationInstallation and licensing guideInstallMedia Operations getting started guideMO GSMedia Operations product announcements, software no
not written to that reserved space until necessary. As the data changes on the sourcevolume, the snapshot data on the target volume is updated with th
Supported configurationsBasic configuration: single disk array - dual hostBoth hosts are connected to the same disk array, so that the I/O infrastruct
1. Put the database into a consistent mode that permits a snapshot to be taken.2. Perform a snapshot of the application data.3. Return the database to
Figure 85 Multiple application hosts - single backup hostWith this solution, multiple application hosts may be connected to a single or multipledisk a
Figure 86 Disk array(s) - single hostIn cases where no dedicated backup server is available, both functions (applicationand backup) can be performed o
Figure 87 LVM mirroring - HP StorageWorks Virtual Array onlyIn the supported configurations described previously, only Business Copy functionalityis p
Figure 88 Campus Cluster with LVM Mirroring - HP StorageWorksVirtual Array onlyWith this configuration, it is possible to emulate Continuous Access pl
In the event that you want to back up data in a configuration not listed, this does notmean that it cannot be supported. Please contact your local HP
Snapshot concepts288
14 Microsoft Volume ShadowCopy serviceIn this chapterThis chapter introduces the Microsoft Volume Shadow Copy service (VSS) conceptand its role in the
IntegrationsLook in these guides for details of the following integrations:GuideIntegrationIG-OMU, IG-OMWHP Operations Manager for UNIX/for WindowsIG-
VSSVolume Shadow Copy service (VSS) is a software service introduced by Microsoft onWindows operating systems. This service collaborates with the back
The example of the hardware provider is disk array, which has its hardwaremechanism of providing point-in-time state of a disk. A software provider op
Figure 89 Actors of the traditional backup modelFigure 90 Actors of the VSS backup modelIn the traditional model, the backup application had to commun
VSS benefitsThe advantages of using Volume Shadow Copy service are as follows• A unified backup interface for all writers.• A unified backup interface
writers, and backup and restore functionality. For detailed information on theintegration, see the HP Data Protector integration guide.VSS backupIn ca
VSS filesystem backup and restoreSome applications are not aware of the Volume Shadow Copy service. Suchapplications cannot guarantee consistency of d
• Backups can be performed at any time without locking out users.• There is little or no impact on the performance of the application system duringthe
A Backup scenariosIn this appendixThis Appendix describes two scenarios: one for company XYZ and one for companyABC. Both companies plan to enhance th
Define the periods of time during which backups of specific systems can bedone.• Local versus network backupsDetermine which systems, that the backup
Determine the administration and operations rights for the backup systems users.Company XYZXYZ is a translation agency providing the following service
ContentsPublication history ... 21About this guide ...
GuideIntegrationIG-RHP ReporterIG-SIPHP Service Information Portalall ZDBHP StorageWorks Disk Array XPall ZDBHP StorageWorks Enterprise Virtual Array
Current devicesProjecteddata (in 5Years)Currentdata#Clients#ServersDepart.2 HPStorageWorksDAT24autoloaders67 GB22 GB11 UX1 AIXOtherLanguages1 HPStorag
network shares. Employees in the Other Languages Department also work onSaturdays.Problems with the current solutionThe current backup solution is not
Backup strategy requirementsRequirementsAfter addressing the items under “Considerations” on page 297, the followingrequirements have been identified
Proposed solutionBecause of the limitations of the current backup solution for both performance andenterprise-wide management, there is a need to rede
DevicesProjected Data(In 5 Years)Current DataDepartment* One HP StorageWorks DAT24 autoloader is currently used to locally back up the 12 GBof data. T
Figure 92 Proposed XYZ backup topology• The Cell Manager maintains the Catalog Database (CDB). This provides aminimum of 20 days of file and directory
Figure 93 Input parametersThe results are shown in Figure 94 on page 306. In one year, the database is expectedto grow to approximately 419.75 MB.Figu
The backup devices consist of an HP StorageWorks DLT 4115w Library aswell as two HP StorageWorks DAT24 autoloaders.Why use the HP StorageWorks DLT 411
The Data Protector Catalog Database is approximately 0.4 GB in size. It isbacked up locally to an HP StorageWorks DAT24 autoloader, which has asustain
Table 18 on page 309 shows the size and time requirements for these fullbackups as of today, as well as the five year projection.Table 18 Remote full
GuideIntegrationIG-VarSybaseall ZDBEMC SymmetrixIG-VarVMwareDocument conventions and symbolsTable 2 Document conventionsElementConventionCross-referen
Why use level 1 incremental backups?To restore the latest data, only two media sets need to be accessed, one forthe latest full backup and one for the
Data protection determines the amount of time until each medium can bereused. Set data protection to permanent so that data on the media is notoverwri
autoloaders. All actions excluding the actual moving of media to the vault aredone by the software solution, including queries done internally in the
1. Identifies the media needed for restore.2. Brings the media from a vault, enters the media in the HP StorageWorksDLT 4115w Library or other device
Three departments at ABC Cape Town use the Microsoft SQL database to store theirdata and the company uses Microsoft Exchange Server for mailing servic
Backup media are denoted by the name of the department, the name of the serverand first and last dates on which backups were performed on the media. A
Maximum downtimeType of data6 hoursCompany resource data1 dayProject data2 daysPersonal dataThis recovery time mainly consists of the time needed to a
Data (in GB)Location22ABC Pretoria16ABC DurbanPlans for future growth of the amount of dataABC plans to grow at 15 to 20% per year. The amount of data
Configure cell A as the MoM cell for the ABC Cape Town environment, cell D as theMoM cell for the ABC Pretoria environment, and cell F as the MoM cell
The two cells at the ABC Durban MoM environment should also share a CentralizedMedia Management Database. This should be configured on the MoM of cell
NOTE:Provides additional information.TIP:Provides helpful hints and shortcuts.Data Protector graphical user interfaceData Protector provides a cross-p
#SAP#UNIXclients#UNIXservers#Windowsclients#WindowsserversCellMoMenvironment1215112B1124202C334D*ABC Pretoria32561E304102F*ABC Durban292111p#SAP is th
Figure 97 ABC Cape Town enterprise backup environmentThe two cells at the ABC Pretoria MoM environment should share a CentralizedMedia Management Data
catalog protection (3 weeks), number of full backups per week (1), and numberof incremental backups per week (5).Figure 98 Input parametersThe results
All systems in the same location should be on the same LAN for maximumperformance. Use the 100TX network to connect all the systems in each of theloca
Why use the HP StorageWorks DLT 4115w Library?• The HP StorageWorks DLT 4115w Library has a single DLT4000 drivewith 15 slots. It has a total compress
library has two drives and a sustained data transfer rate of 6 MB/s (2 x 3 MB/s),or 21 GB/h. Therefore, data is backed up to this library in up to 5 h
DescriptionLocationMedia pool nameIDBPretoriaP_DB_PoolHP StorageWorks DLT 4115wLibraryDurbanD_DLT_PoolHP StorageWorks DAT24autoloadersDurbanD_DAT_Pool
FullIncr1Incr1Incr1Incr1Incr1Cell C• SERVERS_A...GBackup specifications for the company’s servers to prepare for disasterrecovery. Each time a new ser
TimeBackup dayDescriptionCellName23:00SundayServersCSERVERS_C03:00SaturdayIDBDDB_D03:00SaturdayIDBEDB_E23:00FridayServersDSERVERS_D23:00SaturdayServer
Set data protection to 5 years for all backup specifications except forExchange_A, which is sued to back up personal mail. Set data protection forthis
Figure 1 Data Protector graphical user interfaceGeneral informationGeneral information about Data Protector can be found at http://www.hp.com/go/datap
• Display a list of media needed for restore and the physical locations wherethe media are stored.• Filter media from the media view based on specific
B Further informationIn this appendixThis appendix provides additional information about some of the aspects of DataProtector concepts, including back
Figure 100 Backup generationsYou configure Data Protector to automatically maintain the desired number of backupgenerations by selecting the appropria
Example 1: automated media copying of filesystem backupsYour company has a MoM environment with two cells, each containing 150 computersystems (server
have 900 GB of data to back up. The data is divided among backup specificationsin the following way:• BackupSpec1 (Drive 1) - 300 GB• BackupSpec2 (Dri
Figure 101 Incr1 backup and automated media copyingFull backupConfiguring backupsYou schedule your weekly full backup on Friday at 6 PM. The data prot
Again, you use post-backup media copying to copy the media used with BackupSpec1and BackupSpec2, and scheduled media copying to copy media used inBack
Figure 102 Full backup and automated media copyingYou schedule your monthly full backup on Sunday at 6 AM. This backup is intendedfor archiving purpos
Figure 103 Overview of backup and automated media copy sessionsExample 2: automated media copying of Oracle database backupsYour company has an Oracle
Full backupConfiguring backupsYou schedule your daily full backup each day from Monday to Friday at 6 PM. Thedata protection is set to 4 weeks. You ha
Subscription serviceHP recommends that you register your product at the Subscriber's Choice for Businesswebsite:http://www.hp.com/go/e-updatesAft
Figure 105 Overview of backup and automated media copy sessionsInternationalizationInternationalization is a way to design and implement a software pr
File name handlingHandling file names in a heterogeneous environment (different operating systemswith different local settings, all in one cell) is a
UNIX incompatibility exampleThree users working on a Solaris system without Data Protector installed, each usinga different character set, create file
• the files to be restored are selected in the GUI• Data Protector searches the tape for the specified data and restores it• the original file names (
Further information344
Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge SystemLibrary Server (ACSLS) software that manages the
an archived redo log is determined by the mode the databaseis using:• ARCHIVELOG - The filled online redo log files are archivedbefore they are reused
associated with managing data and disk and provides stripingand mirroring capabilities to optimize performance.automigration (VLS specific term) The f
located (drive on Windows and mount point on UNIX). Forintegration objects — backup stream identification, indicatingthe backed up database/applicatio
See also application system, target volume, and replica.backup types See incremental backup, differential backup, transaction backup,full backup, and
1 About backup and DataProtectorIn this chapterThis chapter provides an overview of backup and restore concepts. It introduces DataProtector architect
See also replica, source volume, snapshot, and CA+BC EVA.BC Process (EMC Symmetrix specific term) A protected storage environmentsolution that has def
See also BRBACKUP, and BRRESTORE.BRBACKUP (SAP R/3 specific term) An SAP R/3 backup tool that allows anonline or offline backup of the control file, o
CAP (StorageTek specific term) Cartridge Access Port is a port builtinto the door panel of a library. The purpose is to enter or ejectmedia.catalog pr
Database(CMMDB)Change Journal (Windows specific term) A Windows filesystem feature that logsa record of each change as it occurs to the files and dire
client backup withdisk discoveryA backup of all filesystems mounted on a client. When thebackup starts, Data Protector discovers the disks on the clie
between the MoM cell and the other Data Protector cells is highlyrecommendedSee also MoM.COM+ RegistrationDatabase(Windows specific term) The COM+ Reg
the CRS runs under the account of the user specified atinstallation time. On UNIX systems, it runs under the accountroot.CSM The Data Protector Copy a
they have common characteristics and share a common CAEVA log.See also copy set.database server A computer with a large database stored on it, such as
a single device group. All devices in a device group must beon the same EMC Symmetrix unit. You can use a device groupto identify and work with a subs
directory junction (Windows specific term) Directory junctions use the reparsepoint concept of Windows. An NTFS 5 directory junction allowsyou to redi
Data Protector can be used in environments ranging from a single system tothousands of systems on several sites. Due to the network component concept
the backed up data, and increase the data availability andaccessibility for restore. The backup stages consist of backingup data to one media type fir
can also read the data from the medium and send it to thecomputer system.drive-basedencryptionData Protector drive-based encryption uses the encryptio
and to Data Protector users who are granted the Reportingand notifications user rights. You can view or delete allevents in the Event Log.Event Logs (
bi-directional transmission of large data files and can bedeployed between sites kilometers apart. Fibre Channel connectsnodes using three physical to
See also primary volume and MU number.flash recoveryarea(Oracle specific term) Flash recovery area is an Oracle 10g/11gmanaged directory, filesystem,
the directoryData_Protector_program_data\Config\Server\Options(Windows Server 2008),Data_Protector_home\Config\Server\Options (otherWindows systems),
hosting system A working Data Protector client used for Disk Delivery DisasterRecovery with a Data Protector Disk Agent installed.HP OperationsManager
information or method invocation, and returns standardizedresponses.See also HP StorageWorks EVA SMI-S Agent and CommandView (CV) EVA.HP StorageWorksV
See also backup types.incrementalmailbox backupAn incremental mailbox backup backs up all the changes madeto the mailbox after the last backup of any
Information Store (Microsoft Exchange Server specific term) The MicrosoftExchange Server service that is responsible for storagemanagement. Informatio
Data Protector enables you to meet the needs for continued business operationsaround the clock. In today's globally distributed business environm
ISQL (Sybase specific term) A Sybase utility used to perform systemadministration tasks on Sybase SQL Server.Java GUI Client The Java GUI Client is a
library Also called autochanger, jukebox, autoloader, or exchanger.A library contains media in repository slots. Each slot holds onemedium (for exampl
An LCR copy is used for disaster recovery because you canswitch to the LCR copy in a few seconds. If an LCR copy is usedfor backup and if it is locate
login ID (Microsoft SQL Server specific term) The name a user uses tolog on to Microsoft SQL Server. A login ID is valid if MicrosoftSQL Server has an
mailbox store (Microsoft Exchange Server specific term) A part of theInformation Store that maintains information in user mailboxes.A mailbox store co
During a restore session, a Media Agent locates data on thebackup medium and sends it to the Disk Agent. The Disk Agentthen writes the data to the dis
merging This defines one mode to resolve file conflicts during restore. Ifthe file to be restored already exists at the destination, the onewith the m
MMD The Media Management Daemon process (service) runs on theData Protector Cell Manager and controls media managementand device operations. The proce
OBDR capabledeviceA device that can emulate a CD-ROM drive loaded with abootable disk and can thus be used as a backup or boot devicefor disaster reco
period (several minutes or hours). For instance, for backupto tape, until streaming of data to the tape is finished.• For ZDB methods, the database is
The DSI integration provides a set of scripts and configuration files from whichusers are able to see how to add their own queries using Data Protecto
• For ZDB methods, backup mode is required for the shortperiod of the data replication process only (several seconds).Normal database operation can th
overwrite An option that defines one mode to resolve file conflicts duringrestore. All files are restored from a backup even if they areolder than exi
COPY - The mirrored pair is currently re-synchronizing. Datais transferred from one disk to the other. The disks do notcontain the same data.•• PAIR -
pre-exec A backup option that executes a command or script before thebackup of an object or before the entire session is started.Pre-exec commands are
instance translates the commands into a sequence of low levelSCSI commands.rawdisk backup See disk image backup.RCU See Remote Control Unit (RCU).RDBM
Recovery Manager(RMAN)(Oracle specific term) An Oracle command-line interface thatdirects an Oracle Server process to back up, restore, or recoverthe
is replicated. However, if a volume manager is used on UNIX,the whole volume or disk group containing a backup object(logical volume) is replicated. I
RSM (Windows specific term) Removable Storage Manager (RSM)includes a media management service that facilitatescommunication among applications, robot
shadow copy (Microsoft VSS specific term) A volume that represents aduplicate of the original volume at a certain point in time. Thedata is then backe
number. To read a medium, a robotic mechanism moves themedium from a slot into the drive.SMB See split mirror backup.smart copy (VLS specific term) A
Figure 2 Backup processIn most cases, the source is data on a disk, such as files, directories, databases, andapplications. If the backup is expected
use. However background copying processes normally continueafter creation.See also snapshot.source (R1) device (EMC Symmetrix specific term) An EMC Sy
split mirror restore (EMC Symmetrix and HP StorageWorks Disk Array XP specificterm) A process in which data backed up in a ZDB-to-tape or aZDB-to-disk
for a single-drive device and multiple SCSI entries are requiredfor a multi-drive library device.stackers Devices with multiple slots for media storag
synthetic backup A backup solution that produces a synthetic full backup, anequivalent to a conventional full backup in terms of data, withoutputting
tablespace A part of a database structure. Each database is logicallydivided into one or more tablespaces. Each tablespace has datafiles or raw volume
TNSNAMES.ORA (Oracle and SAP R/3 specific term) A network configurationfile that contains connect descriptors mapped to service names.The file may be
UIProxy The Java GUI Server (UIProxy service) runs on the DataProtector Cell Manager. It is responsible for communicationbetween the Java GUI Client a
user rights. Users have the access rights of the user group towhich they belong.vaulting media The process of storing media to a safe and remote place
virtual tape (VLS specific term) An archival storage technology that backsup data to disk drives in the same way as if it were being storedon tape. Be
See also resync mode, source volume, primary volume (P-VOL),replica, secondary volume (S-VOL), and replica set rotation.VxFS Veritas Journal Filesyste
Media management ... 48Backup devices ...
Figure 4 Network backupTo accomplish backup of a network environment you need an application that allowsyou to:• Attach backup devices to any system i
XBSA interface (Informix Server specific term) ON-Bar and Data Protectorcommunicate with each other through the X/Open BackupServices Application Prog
ZDB to tape (ZDB specific term) A form of zero downtime backup wheredata in the replica produced is streamed to a backup medium,typically tape. Instan
Glossary402
IndexAadding data to media during backups,148ADIC (EMASS/GRAU) AML, 162admin user group, 185alarms, 208alternative disaster recovery methods,131operat
backup with disk discovery, 225Backup Agents, 42backup clientsplit mirror backup, 267backup client as failover serversnapshot backup, 286split mirror
benefitsdisk backup, 254synthetic backup, 258Volume Shadow Copy service, 293benefits of online integrations, 240block sizebackup devices, 158default,
client systems, 42clients, 42installing, 64maintaining, 64cluster heartbeat, 80cluster (definition), 79cluster integrationsoverview, 82cluster node, 8
creating cellsmixed environment, 66UNIX environment, 64Windows domains, 65Windows workgroups, 66Windows environment, 65CRS, 220Ddaily maintenanceIDB o
database on the UNIX Cell ManagersIDB format, 189IDB location, 189database on the Windows CellManagerIDB format, 188IDB location, 188database architec
device lists, 155device locking, 159device sharing in clusters, 180device sharing in SAN, 175drives, 177robotics, 177device streaming (definition), 15
The Data Protector internal database (IDB) keeps track of the files you back up sothat you can browse and easily recover the entire system or single f
Direct Library Access, 179dirty drive detection, 164disaster, 128Disaster RecoveryPhase 3, 129disaster recovery, 129Disaster Recoveryconcepts, 128over
exchangers, 162See also librariesexpired catalog protection, 201exporting media, 102IDB operation, 195removed objects, 195Ffactors affecting restore d
IIDB, 187advantages, 187architecture, 189Catalog Database, 191Detail Catalog Binary Files, 192in the Manager-of-Managersenvironment, 189management, 19
incremental backups, 71types, 93IndirectStorage Are Networks, 178Indirect Library AccessLibrary Access, 178Indirect Library Access, 179influence of lo
lock names, 159, 177log all detailed informationCatalog Database, 100log directory names onlyCatalog Database, 100log level of information, 104logging
media pools, 135, 309, 325default, 136properties, 136usage examples, 140Media Agents, 42General Media Agent, 165media allocation policies, 144media al
monitoring, 38, 210, 211mount prompt handling, 111mount requests, 224, 232, 235automating, 224notification, 224responding, 224, 228mount requests (res
planning cells, 62 - 67Cell Managers, 64Installation Servers, 64number of cells, 62planning performance, 67 - 73backup types, 71compression, 68devices
reporting, 38, 211reporting and notification, 311, 329broadcasts, 207e-mail, 207examples, 212HTML, 207SNMP, 207requirementsDirect backup, 249response
Service Management, 37, 205 - 215Application Response Measurement,207monitor, 210notification, 211operative analyses of trends, 206overview, 205report
Systems to be backed upClient systems you want to back up must have the Data Protector Disk Agent (DA),also called Backup Agent, installed. To back up
snapshot backup, 275application client, 277archive log backup, 278backup client, 277backup client as failover server, 286concepts, 276configuration, C
standalone devices, 161standalone devices, 160standalone file device, 255standard restore vs parallel restore, 228standard backup vs disk discovery, 2
Vvaulting, 134, 151 - 153, 311, 329definition, 151restoring, 153restoring from a vault, 312, 330vaulting usage example, 152Veritas Cluster, 79virtual
Figure 6 Backup or restore operationBackup sessionsWhat is a backup session?A backup session, shown in Figure 7 on page 44, is a process that creates
Figure 7 Backup sessionA typical backup session is more complex than the one shown in Figure 7 on page 44.A number of Disk Agents read data from multi
Enterprise environmentsWhat is an enterprise environment?A typical enterprise network environment, shown in Figure 9 on page 45, consistsof a number o
Why split large environments into multiple cells?• Geographical grouping of systems.• Logical grouping of systems, for example, departments.• Slow net
Figure 11 Manager-of-Managers environmentManager-of-Managers provides the following features:• Centralized licensing repositoryThis enables simplified
Media managementData Protector provides you with powerful media management, which lets you easilyand efficiently manage large numbers of media in your
Backup devicesData Protector defines and models each device as a physical device with its ownusage properties, such as the default pool. This device c
Data Protector user groups ... 75Data Protector user rights ...
User interfacesData Protector provides easy access to all configuration and administration tasksusing the Data Protector GUI on Windows and UNIX platf
• A Results Tab with all the configuration wizards, properties and lists.• Easy configuration and management of the backup of online database applicat
Figure 14 Original Data Protector GUIFigure 15 Data Protector Java GUIData Protector Java GUIThe Data Protector Java GUI is a Java-based graphical use
client-server architecture. It enables backup management with the same look and feelas the original Data Protector GUI.The Java GUI consists of two co
Benefits of Java GUIThe Data Protector Java GUI has the following advantages over the original DataProtector GUI:• PortabilityThe Data Protector Java
Overview of tasks to set up Data ProtectorThis section provides an overview of global tasks to set up your Data Protector backupenvironment. Depending
7. Install and configure your Data Protector environment.• Install the Data Protector Cell Manager system and use the Data Protectoruser interface to
2 Planning your backupstrategyIn this chapterThis chapter describes backup strategy planning. It focuses on planning Data Protectorcells, performance,
Backup strategy planningData Protector is simple to configure and administer. However, if you work in a largeenvironment with diverse client systems a
The allowed downtime has a significant impact on the investments into networkinfrastructure and equipment needed for backups. For each type of data, l
When to schedule backups ... 107Staggering full backups ...
The time needed for backup depends on the type of backup, full or incremental.For more information, see “Full and incremental backups” on page 91. Dat
The need to guard premises to prevent unauthorized people from entering.This also includes safeguarding all relevant data against unauthorized access,
• Consider backing up to a disk-based device. Besides other benefits, backupto disk reduces the time needed for backup and enables the use of advanced
is that it can require more administrative work or might even require a separateadministrator for each cell.• Size of each cellThe size of a Data Prot
Installing and maintaining client systemsIf you have several UNIX and Windows client systems, an efficient mechanism forthe installation of Data Prote
that each client system is accessible from every other client system using the samefully qualified node name.Creating cells in the Windows environment
Windows workgroupsSome of the configuration tasks require more steps in some cases, because there areno global users as in a domain. Software distribu
You can configure a single cell over geographically remote locations. In this case,you need to ensure that data transfer from each client system to th
To maximize performance, use local backup configurations for high volumedatastreams.Network or server versus direct backupsSending data over a network
High performance hardware other than devicesPerformance of computer systemsThe speed of computer systems themselves directly impacts performance. The
Vaulting ... 151Restoring from media in a vault ...
3 fast tape devices, consider using 3 dedicated network links between system_Aand system_B.• Load BalancingUsing this Data Protector feature, Data Pro
Full and incremental backupsA basic approach to improve performance is to reduce the amount of data to backup. Carefully plan your full and incrementa
Disk performanceAll data that Data Protector backs up resides on disks in your systems. Therefore, theperformance of disks directly influences backup
improve performance in your specific environment and determine the optimumasynchronous reading settings.SAN performanceIf large volumes of data need t
Data Protector security featuresThe following features allow and restrict access to Data Protector and the backed updata. The items in this list are d
When is the account checked?When a user starts the Data Protector user interface, Data Protector checks user rights.User rights are also checked when
Visibility of backed up dataBacking up data means creating a new copy. Therefore, when you deal withconfidential information, it is important to restr
encrypts the data. Thus the backed up data is encrypted before it is transferred overthe network and written to media.Figure 17 on page 77 shows a bas
If a source medium involved in an automatic media copy session stores encryptedas well as non-encrypted data, all data written to the corresponding ta
the CRS process is running, or the user specified as the owner in the backupspecification options. For instructions on how to specify a backup owner,
Data Protector user rights ... 1855 The Data Protector internal database ...
Figure 19 Typical clusterComponents:• Cluster nodes (two or more)• Local disks• Shared disks (shared between nodes)Cluster nodesCluster nodes are comp
you can make an appropriate determination of the ownership of the package(MC/SG, Veritas Cluster) or group (MSCS).What is a package or group?A package
A cluster-aware Data Protector Cell Manager that is responsible for running the IDBand managing backup and restore operations has many major benefits
• The Data Protector client is installed in a cluster. The Cell Manager (if not installedin the cluster) in such a case is not fault tolerant; the ope
Figure 20 Cell Manager installed outside a clusterWhen creating a backup specification, you can see three or more systems that canbe backed up in the
The following is the expected backup behavior under this configuration.Table 3 Backup behaviorResultConditionSuccessful backupFailover of the node bef
Figure 21 Cell Manager installed outside a cluster, devices connectedto the cluster nodesWhen creating a backup specification, you can see three or mo
NOTE:The difference with the previous example is that each of the cluster nodes has a DataProtector Media Agent installed. Additionally, you need to u
Data Protector cluster critical resources are defined in the same package(MC/ServiceGuard) or group (Microsoft Cluster Server) as the applicationclust
Figure 22 Cell Manager installed in the cluster, devices connected tocluster nodesWhen creating a backup specification, you can see three or more syst
Data Protector log files ... 213Windows application log ...
NOTE:Clusters do not support a SCSI bus with shared tapes. To bring high availability also toMedia Agents, the Fibre Channel technology can be used as
ResultConditionFilesystem/disk image backup The backup session fails at failoverof the node where the filesystem is installed. The completedobjects fr
Incremental backupFull backupA restore takes more time becauseof the number of media needed.Enables simple and quick restore.RestoreOccupies less spac
Incremental backups depend on the last full backup. If you specify an incrementalbackup and there is no protected full backup, a full backup is perfor
Incr A simple incremental backup, shown in Figure23 on page 95, is based on the last backup that is stillprotected, which can be a full backup or an i
Figure 23 Incremental backupsFigure 24 Leveled incremental backupsTable 7 on page 95 shows the relative referencing of backup runs with variousbackup
Incr3<----Incr1<----Full8Incr3<----Incr2<----Incr1<----Full9Incr3<----Incr2<----<----<----Full10Incr3<----<----<--
TIP:Use the Data Protector Appendable on Incrementals Only option to keep data from fulland incremental backups (of the same backup specification) on
Figure 25 Media needed to restore from simple and leveled incrementalbackupsFigure 26 Media needed to restore from leveled incremental backupsNote tha
Keeping backed up data and information about thedataData Protector lets you specify how long to keep your backed up data on the mediaitself (data prot
Comments to this Manuals