HP B6960-96035 User Manual

Browse online or download User Manual for Backup recovery software HP B6960-96035. HP B6960-96035 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 422
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Concepts guide

HP Data Protector A.06.10Concepts guideB6960-96035Part number: B6960-96035First edition: November 2008

Page 2

Filesystem backup of databases and applications ... 239Online backup of databases and applications ...

Page 3 - Contents

Catalog protectionWhat is catalog protection?Data Protector saves information about backed up data in the IDB. Since theinformation about the backed u

Page 4

available, but you must know which media to use and what needs to be restored,for example, the exact file name.The IDB also keeps information on how l

Page 5

Exporting media from a cellExporting media from a Data Protector cell removes all the information about backedup data on the media and the media thems

Page 6

on UNIX or disk drives on Windows systems) and the destinations are specified (tape)devices. During the backup session, Data Protector reads the objec

Page 7

• Description: uniquely defines the backup objects with identical client name andmount point.• Type: backup object type, for example filesystem or Ora

Page 8

Backup sessionsWhat is a backup session?A backup session is a process that backs up data from a client system to media. Abackup session always runs on

Page 9

You can combine full and incremental backups when you configure scheduledbackups. For example, you may run a full backup on Sundays and incrementalbac

Page 10

This section combines all these concepts by giving some examples of backup schedulesand some tips for efficient scheduling.When to schedule backupsTyp

Page 11

incremental backup. For more information on how Data Protector selects media forbackups, see Selecting media for backups .Example 1Figure 28 on page 1

Page 12

Figure 29 Full backup with daily level 1 incremental backupsThis policy requires slightly more time for backups and also requires a little moremedia s

Page 13

Local mirror - dual host ... 269Local mirror - single host ...

Page 14

Figure 30 Full backup with mixed incremental backupsThis policy takes into account the fact that there are not many changes duringweekends. Data is ba

Page 15

• When is the lowest system usage and user activity?Typically, this is at night and most backups are scheduled to run during the night.Data Protector

Page 16

If you need to back up large amounts of data and the backup window presentsa problem, consider backing up to disk-based devices and using advanced bac

Page 17 - Concepts guide 17

Smart MediaCopyMedia copyObject mirrorObject copyNo3No2YesYesAppendabilityof target mediaMedia identicalto the sourcemediaMedia identicalto the source

Page 18

Figure 31 Object copy conceptIn the figure, there is an object version resulting from a backup of object A, version1, and two additional copies of the

Page 19 - Concepts guide 19

Selection of devicesYou need separate devices to be used with the source media and the target media.The destination devices can have a larger block si

Page 20

Why use object copy?Additional copies of backed up data are created for multiple purposes:• VaultingYou can make copies of backed up objects and keep

Page 21 - Publication history

Figure 32 Freeing mediaDemultiplexing of mediaMultiplexed media contain interleaved data of multiple objects. Such media mayarise from backup sessions

Page 22 - Publication history22

Figure 33 Demultiplexing a mediumConsolidating a restore chainYou can copy a restore chain (all backups that are necessary for a restore) of anobject

Page 23 - About this guide

Figure 34 Disk staging conceptDisk staging also eliminates the need for frequent backups of numerous small objectsto tape. Such backups are inconvenie

Page 24 - About this guide24

Examples of automated media copying ... 332Example 1: automated media copying of filesystem

Page 25

The result of a successful backup session with object mirroring is one media setcontaining the backed up objects and additional media sets containing

Page 26 - Online Help

Figure 35 Object mirroringSelection of devicesObject mirroring is load balanced by default. Data Protector makes optimum use ofthe available devices b

Page 27 - Documentation map

Backup performance also depends on factors such as device block sizes and theconnection of devices. If the devices used for backup and object mirrorin

Page 28 - GuideAbbreviation

Automated media copyingWhat is automated media copying?Automated media copying is an automated process that creates copies of the mediacontaining back

Page 29 - Integrations

Smart media copying using VLSWhat is smart media copying?In smart media copying, the data is first backed up to a virtual tape library (VTL)configured

Page 30 - GuideIntegration

Restoring dataPolicies for restoring data are an essential part of the overall backup strategy in thecompany. Keep the following in mind:• Backing up

Page 31

Selection of the media setIf an object version that you want to restore exists on more than one media set, whichhas been created using one of the Data

Page 32 - About this guide32

SQL Server, and Microsoft SharePoint Portal Server integrations. Such databasesare usually backed up with interdependent data streams and, consequentl

Page 33 - HP technical support

End users are allowed to restoreAnother possible restore policy is to allow all or just selected end users to restoretheir own data. This policy provi

Page 34 - Documentation feedback

operation can begin. This includes repartitioning and/or reformatting the boot partitionand recovery of the operating system with all the configuratio

Page 35 - Protector

FiguresData Protector graphical user interface ... 331Backup process ...

Page 36

Disaster recovery methodsData Protector supports the following disaster recovery methods:• Manual disaster recoveryThis is a basic and very flexible d

Page 37

Alternative disaster recovery methodsThis section compares the Data Protector disaster recovery concept with concepts ofother vendors. This section po

Page 38 - What is a backup?

Planning your backup strategy132

Page 39 - What is a restore?

3 Media management anddevicesIn this chapterThis chapter describes Data Protector concepts of media and device management.It discusses media pools, de

Page 40 - Data Protector architecture

Media management functionalityData Protector provides the following media management functionality that allowssimple and efficient management of a lar

Page 41 - HP Data Protector product

1. Preparing media for backup.This includes initializing (formatting) media for use with Data Protector andassigning media to media pools, which are u

Page 42 - Operations in the cell

else, does not matter; it always belongs to its pool until it is recycled and exportedfrom the cell.Several devices can use media from the same pool.M

Page 43

• system platform (one pool for UNIX systems, one for Windows 2000 systems,and one for Windows XP systems)• per system (every system has its own pool)

Page 44

What is a free pool?A free pool is an auxiliary source of media of the same type (for example, DLT) foruse when all free media in a regular pool run o

Page 45 - Enterprise environments

All free (unprotected, empty) media can be grouped in a free pool and sharedbetween all media pools that support free pool usage.• Reduced operator in

Page 46

Incremental backups ... 9523Leveled incremental backups ...

Page 47

Media pool usage examplesThe examples below show some configurations you may want to consider whenchoosing the appropriate strategy for a particular b

Page 48 - Media management

Figure 38 Configuration of media pools for large librariesExample 3Figure 39 on page 142 shows an example when data is backed up to media in amedia po

Page 49 - Backup devices

Figure 39 Multiple devices, single media poolExample 4Data is backed up to media in multiple media pools on multiple devicessimultaneously. If you wan

Page 50 - User interfaces

Figure 40 Multiple devices, multiple media poolsImplementing a media rotation policyWhat is a media rotation policy?A media rotation policy defines ho

Page 51

Media rotation and Data ProtectorAutomatic media rotation and media handlingData Protector automates media rotation and media handling as follows:• Be

Page 52 - Data Protector Java GUI

By now you should be able to estimate the quantity of media required for a full mediarotation. Additional media will be required in case you:• Assume

Page 53

Data Protector also assigns each medium a media ID that uniquely identifies thismedium.An ANSI X3.27 label is also written on the tape for identificat

Page 54

Media management during backup sessionsWhat happens during backup?During a backup session, Data Protector automatically selects media for backup andke

Page 55

Media conditionThe condition of the media also influences which media are selected for backup, forexample, media in good condition are used for backup

Page 56

Figure 41 Multiple objects and sessions per medium, sequential writesFigure 41 on page 149 shows an example of eight sequential writes over four sessi

Page 57 - 2 Planning your backup

Sharing an ADIC/GRAU or StorageTek ACS library ... 17050Storage Area Network ...

Page 58 - Backup strategy planning

concurrently written in sess_7 and the second one in sess_8. Note that one objectcan be stretched over several media. The media usage policy is append

Page 59

• media ageThe age of a medium is calculated as the number of months that have elapsedsince you formatted, or initialized, the medium. Once a medium i

Page 60

• A report showing media used for backup within a specified time-frame.• A report showing which backup specifications have used specified media during

Page 61

Restoring from media in a vaultRestoring media from a vault is no different than restoring from any other media.Depending on how your data and catalog

Page 62 - Planning cells

in Data Protector using different (logical) device names, for example, one withouthardware data compression and another one with hardware data compres

Page 63

Device lists and load balancingMultiple devices for backupWhen configuring a backup specification, you can specify several standalone devicesor multip

Page 64

gets full, the backup automatically continues on the medium in the next device in thedevice chain.How load balancing worksFor example, assume that the

Page 65 - Windows domains

Disk agent concurrencyThe number of Disk Agents started for each Media Agent is called Disk Agent (backup)concurrency and can be modified using the Ad

Page 66 - Geographically remote cells

NOTE:Some tape technologies place limitations on the number of file marks per medium. Ensurethat your segment size is not too low.Figure 45 Data forma

Page 67 - The infrastructure

Increasing the block size can improve performance. Changing the block size shouldbe done before formatting tapes. For example, a tape written with the

Page 68

Split mirror backup concept ... 26678Local mirror - dual host (full performance, Zero Downtim

Page 69 - Using hardware in parallel

Physical device collisionWhen specifying a device used for backup, you may specify one device name inone backup specification and another device name

Page 70 - Hardware compression

install a Data Protector Media Agent on the system with the device connected. DataProtector can detect and automatically configure most standalone dev

Page 71 - Object distribution to media

Large librariesWhat are library devices?Library devices are automated devices, also called autoloaders, exchangers orjukeboxes. In Data Protector, mos

Page 72 - Disk performance

• Obtain the number of required media. See “Implementing a media rotationpolicy” on page 143.Sharing a library with other applicationsA library device

Page 73 - Planning security

• Scanning the barcodes of the media in a device’s repository is faster, becauseData Protector does not need to actually load the media to a drive and

Page 74 - Data Protector users accounts

Protector internally redirects the robotic commands to the system that manages therobotics.Figure 47 Connecting drives to multiple systemsControl prot

Page 75 - Data Protector user groups

• SCSI—for robotics other libraries• NDMP—for NDMP roboticsAll four library robotic control protocols are implemented in both the General MediaAgent a

Page 76 - Data encryption

Table 11 on page 167 show the Data Protector Media Agent (the General MediaAgent or the NDMP Media Agent) required on a client system configured for r

Page 77

Figure 48 Sharing a SCSI library (robotics attached to a Data ProtectorClient System)Figure 48 on page 168 shows a SCSI library, with its robotics att

Page 78 - What is backup ownership?

Figure 49 Sharing a SCSI library (robotics attached to an NDMP Server)Figure 49 on page 169 shows a SCSI library, with its robotics attached to an NDM

Page 79 - Clustering

Overview of backup and automated media copy sessions ... 340105Concepts guide 17

Page 80

Figure 50 Sharing an ADIC/GRAU or StorageTek ACS libraryFigure 50 on page 170 shows an ADIC/GRAU or StorageTek ACS library, with itsrobotics attached

Page 81

Storage Area NetworksA Storage Area Network (SAN), depicted in Figure 51 on page 172, is a newapproach to network storage that separates storage manag

Page 82 - Cluster support

Figure 51 Storage Area NetworkFibre ChannelFibre Channel is an ANSI standard for high-speed computer interconnection. Usingeither optical or copper ca

Page 83 - Example cluster environments

Point-to-point, loop, and switched Fibre Channel topologies can be mixed to best suityour connectivity and growth requirements.For a list of supported

Page 84

Figure 52 Loop initialization protocolSwitched topologyThe switched topology provides any-to-any connectivity between all nodes connectedto a switch.

Page 85

Device sharing in SANData Protector supports the SAN concept by enabling multiple systems to sharebackup devices in the SAN environment. The same phys

Page 86

Figure 53 Example multipath configurationWhy use multiple pathsWith previous versions of Data Protector, a device could be accessed from only oneclien

Page 87

During a restore session, the device paths are selected in the following order:1. Paths that are on the client to which the objects are restored, if a

Page 88

Indirect and Direct Library AccessUpon configuring Data Protector with a SCSI Library device, there are two ways inwhich client systems can access lib

Page 89

Figure 54 Indirect Library AccessNote that you cannot use a shared library if the client system that controls the robotics,castor, in our example, fai

Page 90

TablesEdition history ... 211Document conventions ...

Page 91

Figure 55 Direct Library AccessDevice sharing in clustersClustering, which is often used in combination with the SAN concept, is based onsharing netwo

Page 92 - Incremental backups

Floating drivesFloating drives are device that are configured on a virtual host, using virtual systemnames. Floating drives should be configured for t

Page 93 - Types of incremental backups

Media management and devices182

Page 94

4 Users and user groupsIn this chapterThis chapter discusses Data Protector security, users, user groups, and user rights.It is organized as follows:“

Page 95

can see and restore the backed up data. You can make data visible to other usersusing the Data Protector Public option. For instructions, see the Data

Page 96 - Considering restore

Using predefined user groupsThe following default groups are provided by Data Protector:Table 12 Data Protector predefined user groupsAccess rightsUse

Page 97

Users and user groups186

Page 98

5 The Data Protector internaldatabaseIn this chapterThis chapter describes the Data Protector internal database (IDB) architecture, as wellas its usag

Page 99 - Data protection

• Fast and convenient restore The information stored in the IDB enables you toquickly find the media required for a restore, and therefore makes the r

Page 100 - Browsing files for restore

The IDB on the UNIX Cell ManagerIDB locationThe IDB on the UNIX Cell Manager is located in the /var/opt/omni/server/db40directory.IDB formatThe IDB on

Page 101

ABC’s Media Pool Usage ... 32525The Staggering Approach for ABC Cape Town ...

Page 102 - Backing up data

For robustness considerations and recommendations for optimizing robustness byrelocating some IDB directories, see the online Help index: “robustness

Page 103 - Selecting backup objects

MMDB size and growthThe MMDB does not grow very big in size. The largest portion of the MMDB istypically occupied by information about the Data Protec

Page 104

when one of these files starts running out of space, so that you can add new files toextend the size of the filenames part of the IDB.Size and growth

Page 105 - Object mirrors

DCBF locationBy default, the DCBF is located in the following directory:• On Windows Server 2008: Data_Protector_program_data\db40\dcbf• On other Wind

Page 106 - Scheduling tips and tricks

Serverless Integrations Binary Files (SIBF)SIBF recordsThe Serverless Integrations Binary Files stores raw NDMP restore data. This data isnecessary fo

Page 107 - Optimizing for restore

If transaction logging is enabled, an IDB backup removes old transaction logs andstarts creating new ones, which are necessary for an IDB recovery.Dur

Page 108

Removing the detail catalogWhen the detail catalog is removed for a specific medium, its DC binary file isremoved. The same result is achieved by remo

Page 109

IDB maintenanceOnce you configure the IDB, its maintenance is reduced to a minimum, mainly actingon notifications and reports.IDB recoveryAn IDB recov

Page 110

• Growth of your backup environment The number of systems being backed up inthe cell influences the IDB growth. Plan for the growth of your backup env

Page 111

Figure 57 The influence of logging level and catalog protection on IDBgrowthLogging level as an IDB key tunable parameterWhat is logging level?Logging

Page 112 - Duplicating backed up data

Legal and notice information© Copyright 1999, 2008 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP requ

Page 114

Logs all detailed information about backed up directories (names,versions, and attributes). This represents approximately 10% of alldetailed informati

Page 115

Catalog protection as an IDB key tunable parameterWhat is catalog protection?Catalog protection determines how long the information about backed up da

Page 116 - Why use object copy?

protection is set for 4 weeks, then significant growth of the IDB stops after 4 weeks.Therefore, in this case, the IDB is 13 times larger if the catal

Page 117

Specifics for large cellsIf the number of files grows into the tens of millions, or there are tens of thousandsof files generated on a daily basis, an

Page 118

The Data Protector internal database204

Page 119 - Object mirroring

6 Service managementIn this chapterService Management, reporting, and monitoring help administrators manage theirbackup environments more effectively.

Page 120

Service management measures and reports are a key tool IT managers can use todemonstrate value delivered to the organization and also to maintain comp

Page 121

Figure 58 Service management information flowNative Data Protector functionalityThe functionality described in the following sections comes with Data

Page 122 - Copying media

send alerts via SNMP, it is possible to integrate virtually any application that canreceive SNMP traps.• Data Protector backup session auditing stores

Page 123 - Automated media copying

central operations console, such as HP Operations Manager software, paging asystem operator, or taking automated remedial action to resolve the proble

Page 124 - Smart media copying using VLS

Publication historyGuide updates may be issued between editions to correct errors or document productchanges. To ensure that you receive updated or ne

Page 125 - Restoring data

Integration with HP Operations Manager softwareFunctionality of the Data Protector OM integrationData Protector integrates with HP Operations Manager

Page 126 - Selection of devices

From the monitor’s user interface, you can abort a backup, restore, or mediamanagement session or respond to “mount” requests.If you make use of the M

Page 127

• Select from many delivery methods used to deliver reports (such as e-mail, SNMP,broadcast (available on Windows only), write to file, and send to ex

Page 128 - Disaster recovery

Data Protector log filesSome Service Management applications, such as HP Operations Manager software,allow you to specify when and which log files sho

Page 129

Data Protector checking and maintenance mechanismData Protector has a rich automated daily self-check and maintenance mechanism,which improves its ope

Page 130 - Disaster recovery methods

• Sending major and critical Data Protector events to your network managementsolution, such as HP Network Node Manager (Data Protector built-in notifi

Page 131

• Administration Reports• Media Pool Reports• PerformanceAn IT Service Provider can use these reports to demonstrate its SLA compliance to acustomer.

Page 132

Figure 61 Operational error status reportData Protector OM SIPThis integration also uses SIP to provide Data Protector information through aweb-based

Page 133 - 3 Media management and

Figure 62 Direct SIP integration exampleService management218

Page 134 - Media life cycle

7 How Data Protector operatesIn this chapterThis chapter describes the operation of Data Protector. It explains Data Protectorprocesses (on UNIX) and

Page 135 - Media pools

Publication history22

Page 136

CRS The CRS (Cell Request Server) process (service) runs on theData Protector Cell Manager. It starts and controls backupand restore sessions. The ser

Page 137 - Free pools

Scheduled and interactive backup sessionsScheduled backup sessionA scheduled backup session is started by the Data Protector Scheduler at the timeyou

Page 138

4. The BSM starts Disk Agents (DAs) for each disk to be backed up in parallel. Theactual number of Disk Agents started depends on the concurrency of D

Page 139

To prevent Data Protector processes from exceeding system capabilities, the maximumnumber of concurrent backup sessions is limited. The limit is confi

Page 140 - Media pool usage examples

Queuing of backup sessionsTimeoutWhen a backup session is started, Data Protector tries to allocate all needed resources,such as devices. The session

Page 141

Sending notification to an operatorYou can configure a Data Protector notification to send an e-mail to the operator withinformation about the mount r

Page 142

A restore session is started interactively. You tell Data Protector what to restore, letData Protector determine the needed media, select some options

Page 143

Figure 65 Restore session information flowHow many restore sessions can run concurrently?A number of restore sessions can run in the cell at the same

Page 144 - Media needed for rotation

Mount requests in a restore sessionWhat is a mount request?A mount request appears in a restore session when the media needed for restore arenot avail

Page 145 - Labeling Data Protector media

Figure 66 Parallel restore session flowIn a parallel restore, Data Protector reads multiplexed data for all selected objectsand assembles the parts ne

Page 146 - Location field

About this guideThis guide describes Data Protector concepts. Read this manual to fully understandthe fundamentals and the model of Data Protector.Int

Page 147 - Selecting media for backups

What is an object copy session?An object copy session is a process that creates an additional copy of the backedup data on a different media set. Duri

Page 148

4. The CSM starts the Media Agents on the systems with devices configured forcopying. The Media Agents load the source and target media allocatedaccor

Page 149

Figure 67 Object copy session information flowQueuing of object copy sessionsTimeoutWhen an object copy session is started, Data Protector tries to al

Page 150 - Calculating media condition

Object consolidation sessionsThis section describes how an object consolidation session is started, what happensduring the session, and the processes

Page 151 - Vaulting

2. The CSM opens the IDB, reads the information about the needed media, andwrites the information about the object consolidation session, such as gene

Page 152

available. If the resources are still unavailable after the timeout, the session is aborted.The timeout period can be set using the SmWaitForDevice gl

Page 153

2. The MSM starts the Media Agents (MAs) on the system that has devices usedfor the media management session.3. Media Agents perform the requested ope

Page 154

8 Integration with databaseapplicationsIn this chapterThis chapter gives a brief description of the integration of Data Protector with databaseapplica

Page 155

Figure 68 Relational databaseFigure 68 on page 238 shows a typical relational database with the structuresdescribed below.Data files are physical file

Page 156 - How load balancing works

1. A transaction is first recorded into the transaction log.2. Changes required in the transaction are then applied to cached pages.3. From time to ti

Page 157 - Segment size

• HP Data Protector installation and licensing guideThis guide describes how to install the Data Protector software, taking into accountthe operating

Page 158 - Block size

The essence of the backup interface is that it provides the backup application withconsistent data (even if it may not be consistent on the disk) whil

Page 159 - Device locking and lock names

• There is no need to specify the location of data files. These can be located ondifferent disks.• The logical structure of the database can be browse

Page 160 - Standalone devices

Integration with database applications242

Page 161 - Small magazine devices

9 Direct backupIn this chapterThis chapter introduces the direct backup concept and the technologies that enableit. The chapter also discusses the dir

Page 162 - Large libraries

Direct backup extends the benefits of HP’s ZDB solution by moving data directly fromdisk to tape and making the load on the backup server negligible o

Page 163 - Barcode support

Backup typesDirect backup supports backup of application data files and control files and of diskimages -- either raw disk or raw logical volume.Direc

Page 164 - Cleaning tape support

Figure 70 on page 246 shows a basic direct backup configuration. The Resolve Agentis on a separate backup host in this configuration. Data, however, d

Page 165

• The HP StorageWorks Disk Array XP (XP) is configured as Business Copy (BC)with mirrors configured with enough disk space.• The SAN is properly confi

Page 166

XCopy + ResolvePrior to Resolve, you needed a server with a matching file system to get thisinformation. This was because even with the right server,

Page 167

Database. The Backup Media Agent (BMA) writes catalog segments and delimitersbetween data and catalog segments known as file-marks.RestoreThere are tw

Page 168

• HP Data Protector integration guide for HP ReporterThis manual describes how to install, configure, and use the integration of DataProtector with HP

Page 169

Supported configurationsThree hosts: CM, application, ResolveThis solution uses three hosts: one each for the Cell Manager, Resolve Agent, andapplicat

Page 170

Figure 71 Basic three host configurationTwo Hosts: Cell Manager/Resolve Agent and applicationThis solution uses two hosts: one for the Cell Manager an

Page 171 - Storage Area Networks

Media Agent may impact the application database’s performance (XCopy’s processingrequirements are negligible).Note that in this configuration, the hos

Page 172 - Fibre Channel

10 Disk backupIn this chapterThis chapter introduces the concepts associated with backing up data to disk andthe technologies that enable it. It also

Page 173 - Loop topology

Disk backup benefitsThere are many situations in which it is advantageous to use disk-based devices whenperforming backups. Disk-based devices are, in

Page 174 - Switched topology

• Overall, disk-based storage space is becoming increasingly cheaper even ifcompared to tape-based storage.Data Protector disk-based devicesData Prote

Page 175 - Device sharing in SAN

of free disk space approaches the configured minimum amount required for thedevice to work. This enables you to free more disk space in good time for

Page 176

11 Synthetic backupIn this chapterThis chapter introduces the concept of synthetic backup and explains the syntheticbackup solution provided by Data P

Page 177 - Device locking

new, synthetic full backup. This can be repeated indefinitely, with no need to run afull backup again.In terms of restore speed, a synthetic full back

Page 178 - Indirect Library Access

The following figures explain the concept of synthetic backup and virtual full backup.They show how a synthetic full backup or a virtual full backup i

Page 179 - Direct Library Access

This guide describes how to configure MPE/iX clients and how to back up andrestore MPE/iX data.• HP Data Protector Media Operations user's guideT

Page 180 - Device sharing in clusters

Figure 73 Virtual full backupFigure 73 on page 260 shows how a virtual full backup is created. With this type ofbackup, all the backups reside in a si

Page 181 - Floating drives

Figure 74 Full and incremental backupsIn Figure 74 on page 261, conventional backups were performed. To restore to thelatest possible state, you need

Page 182

Figure 76 Regular synthetic backupFigure 76 on page 262 shows a situation where a synthetic backup was performedafter each incremental backup. This st

Page 183 - 4 Users and user groups

By default, the last synthetic full backup in the backup chain is used for restore,irrespective of whether the preceding backups are still valid or th

Page 185 - Data Protector user rights

12 Split mirror conceptsIn this chapterThis chapter introduces the split mirror backup concept and discusses theconfigurations that are supported by H

Page 186 - Users and user groups186

Figure 78 Split mirror backup conceptThe target volumes in replica are typically connected to a separate client, which alsohas tape devices connected

Page 187 - 5 The Data Protector internal

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedOnly when this is carried out before a replica

Page 188

allows up to three replicas, and each can have an additional two copies if cascadingis used.During the instant recovery, the data on the specified rep

Page 189 - IDB architecture

Supported configurationsLocal mirror - dual hostThis solution uses a local mirroring functionality such as Business Copy XP. Both disksare in the same

Page 190

Documentation mapAbbreviationsAbbreviations in the documentation map that follows are explained below. The guidetitles are all preceded by the words “

Page 191 - Catalog Database (CDB)

database into a consistent mode that permits the split, as well as to take it out of thismode again.This configuration enables an offline backup of a

Page 192

Figure 80 Split mirror - remote mirror (LAN-free remote backup - dataHA)The remote mirror transfers data to a physically separate site where it can be

Page 193

remote disaster recovery site using hardware mirror concepts is widely accepted inthe industry.Local/remote mirror combinationIf the customer has a ne

Page 194 - IDB operation

Other configurationsThere are many other possible split mirror configurations that provide some particularadvantage or fulfill a specific user need. H

Page 195 - Exporting media

Split mirror concepts274

Page 196 - Overview of IDB management

13 Snapshot conceptsIn this chapterThis chapter introduces the snapshot backup concepts and discusses the configurationsthat are supported by HP.It is

Page 197 - IDB growth and performance

allocation of logical volumes on physical disks, but you can influence it with a choiceof protection characteristics.RAIDRedundant Array of Inexpensiv

Page 198

Figure 82 Snapshot backupThe backup client is set up as a Data Protector client with tape devices connected,to allow a local backup to be performed.Wh

Page 199

• Databases can be put into backup mode• Databases can be taken offline• A mount point can be unmountedFor an online database backup, snapshot data al

Page 200

Instant recoveryDuring snapshot backup sessions, several snapshot copies of data can be producedand can be retained on a disk array, each point-in-tim

Page 201

GuideAbbreviationInstallation and licensing guideInstallMedia Operations getting started guideMO GSMedia Operations product announcements, software no

Page 202

not written to that reserved space until necessary. As the data changes on the sourcevolume, the snapshot data on the target volume is updated with th

Page 203 - IDB size estimation

Supported configurationsBasic configuration: single disk array - dual hostBoth hosts are connected to the same disk array, so that the I/O infrastruct

Page 204

1. Put the database into a consistent mode that permits a snapshot to be taken.2. Perform a snapshot of the application data.3. Return the database to

Page 205 - 6 Service management

Figure 85 Multiple application hosts - single backup hostWith this solution, multiple application hosts may be connected to a single or multipledisk a

Page 206 - Service management206

Figure 86 Disk array(s) - single hostIn cases where no dedicated backup server is available, both functions (applicationand backup) can be performed o

Page 207

Figure 87 LVM mirroring - HP StorageWorks Virtual Array onlyIn the supported configurations described previously, only Business Copy functionalityis p

Page 208 - Service management208

Figure 88 Campus Cluster with LVM Mirroring - HP StorageWorksVirtual Array onlyWith this configuration, it is possible to emulate Continuous Access pl

Page 209

In the event that you want to back up data in a configuration not listed, this does notmean that it cannot be supported. Please contact your local HP

Page 210 - The monitor

Snapshot concepts288

Page 211 - Reporting and notification

14 Microsoft Volume ShadowCopy serviceIn this chapterThis chapter introduces the Microsoft Volume Shadow Copy service (VSS) conceptand its role in the

Page 212 - Service management212

IntegrationsLook in these guides for details of the following integrations:GuideIntegrationIG-OMU, IG-OMWHP Operations Manager for UNIX/for WindowsIG-

Page 213 - Java-based online reporting

VSSVolume Shadow Copy service (VSS) is a software service introduced by Microsoft onWindows operating systems. This service collaborates with the back

Page 214 - Service management214

The example of the hardware provider is disk array, which has its hardwaremechanism of providing point-in-time state of a disk. A software provider op

Page 215

Figure 89 Actors of the traditional backup modelFigure 90 Actors of the VSS backup modelIn the traditional model, the backup application had to commun

Page 216 - Service management216

VSS benefitsThe advantages of using Volume Shadow Copy service are as follows• A unified backup interface for all writers.• A unified backup interface

Page 217 - Data Protector OM SIP

writers, and backup and restore functionality. For detailed information on theintegration, see the HP Data Protector integration guide.VSS backupIn ca

Page 218 - Service management218

VSS filesystem backup and restoreSome applications are not aware of the Volume Shadow Copy service. Suchapplications cannot guarantee consistency of d

Page 219 - 7 How Data Protector operates

• Backups can be performed at any time without locking out users.• There is little or no impact on the performance of the application system duringthe

Page 220

A Backup scenariosIn this appendixThis Appendix describes two scenarios: one for company XYZ and one for companyABC. Both companies plan to enhance th

Page 221

Define the periods of time during which backups of specific systems can bedone.• Local versus network backupsDetermine which systems, that the backup

Page 222

Determine the administration and operations rights for the backup systems users.Company XYZXYZ is a translation agency providing the following service

Page 223

ContentsPublication history ... 21About this guide ...

Page 224 - Queuing of backup sessions

GuideIntegrationIG-RHP ReporterIG-SIPHP Service Information Portalall ZDBHP StorageWorks Disk Array XPall ZDBHP StorageWorks Enterprise Virtual Array

Page 225 - Restore sessions

Current devicesProjecteddata (in 5Years)Currentdata#Clients#ServersDepart.2 HPStorageWorksDAT24autoloaders67 GB22 GB11 UX1 AIXOtherLanguages1 HPStorag

Page 226

network shares. Employees in the Other Languages Department also work onSaturdays.Problems with the current solutionThe current backup solution is not

Page 227 - Queuing of restore sessions

Backup strategy requirementsRequirementsAfter addressing the items under “Considerations” on page 297, the followingrequirements have been identified

Page 228 - Parallel restores

Proposed solutionBecause of the limitations of the current backup solution for both performance andenterprise-wide management, there is a need to rede

Page 229 - Object copy sessions

DevicesProjected Data(In 5 Years)Current DataDepartment* One HP StorageWorks DAT24 autoloader is currently used to locally back up the 12 GBof data. T

Page 230

Figure 92 Proposed XYZ backup topology• The Cell Manager maintains the Catalog Database (CDB). This provides aminimum of 20 days of file and directory

Page 231

Figure 93 Input parametersThe results are shown in Figure 94 on page 306. In one year, the database is expectedto grow to approximately 419.75 MB.Figu

Page 232

The backup devices consist of an HP StorageWorks DLT 4115w Library aswell as two HP StorageWorks DAT24 autoloaders.Why use the HP StorageWorks DLT 411

Page 233 - Object consolidation sessions

The Data Protector Catalog Database is approximately 0.4 GB in size. It isbacked up locally to an HP StorageWorks DAT24 autoloader, which has asustain

Page 234

Table 18 on page 309 shows the size and time requirements for these fullbackups as of today, as well as the five year projection.Table 18 Remote full

Page 235 - Media management sessions

GuideIntegrationIG-VarSybaseall ZDBEMC SymmetrixIG-VarVMwareDocument conventions and symbolsTable 2 Document conventionsElementConventionCross-referen

Page 236

Why use level 1 incremental backups?To restore the latest data, only two media sets need to be accessed, one forthe latest full backup and one for the

Page 237 - 8 Integration with database

Data protection determines the amount of time until each medium can bereused. Set data protection to permanent so that data on the media is notoverwri

Page 238

autoloaders. All actions excluding the actual moving of media to the vault aredone by the software solution, including queries done internally in the

Page 239

1. Identifies the media needed for restore.2. Brings the media from a vault, enters the media in the HP StorageWorksDLT 4115w Library or other device

Page 240

Three departments at ABC Cape Town use the Microsoft SQL database to store theirdata and the company uses Microsoft Exchange Server for mailing servic

Page 241

Backup media are denoted by the name of the department, the name of the serverand first and last dates on which backups were performed on the media. A

Page 242

Maximum downtimeType of data6 hoursCompany resource data1 dayProject data2 daysPersonal dataThis recovery time mainly consists of the time needed to a

Page 243 - 9 Direct backup

Data (in GB)Location22ABC Pretoria16ABC DurbanPlans for future growth of the amount of dataABC plans to grow at 15 to 20% per year. The amount of data

Page 244 - Direct backup

Configure cell A as the MoM cell for the ABC Cape Town environment, cell D as theMoM cell for the ABC Pretoria environment, and cell F as the MoM cell

Page 245 - How direct backup works

The two cells at the ABC Durban MoM environment should also share a CentralizedMedia Management Database. This should be configured on the MoM of cell

Page 246 - Environment

NOTE:Provides additional information.TIP:Provides helpful hints and shortcuts.Data Protector graphical user interfaceData Protector provides a cross-p

Page 247 - About XCopy

#SAP#UNIXclients#UNIXservers#Windowsclients#WindowsserversCellMoMenvironment1215112B1124202C334D*ABC Pretoria32561E304102F*ABC Durban292111p#SAP is th

Page 248 - Direct backup process flow

Figure 97 ABC Cape Town enterprise backup environmentThe two cells at the ABC Pretoria MoM environment should share a CentralizedMedia Management Data

Page 249 - Requirements and support

catalog protection (3 weeks), number of full backups per week (1), and numberof incremental backups per week (5).Figure 98 Input parametersThe results

Page 250 - Supported configurations

All systems in the same location should be on the same LAN for maximumperformance. Use the 100TX network to connect all the systems in each of theloca

Page 251

Why use the HP StorageWorks DLT 4115w Library?• The HP StorageWorks DLT 4115w Library has a single DLT4000 drivewith 15 slots. It has a total compress

Page 252 - Direct backup252

library has two drives and a sustained data transfer rate of 6 MB/s (2 x 3 MB/s),or 21 GB/h. Therefore, data is backed up to this library in up to 5 h

Page 253 - 10 Disk backup

DescriptionLocationMedia pool nameIDBPretoriaP_DB_PoolHP StorageWorks DLT 4115wLibraryDurbanD_DLT_PoolHP StorageWorks DAT24autoloadersDurbanD_DAT_Pool

Page 254 - Disk backup benefits

FullIncr1Incr1Incr1Incr1Incr1Cell C• SERVERS_A...GBackup specifications for the company’s servers to prepare for disasterrecovery. Each time a new ser

Page 255

TimeBackup dayDescriptionCellName23:00SundayServersCSERVERS_C03:00SaturdayIDBDDB_D03:00SaturdayIDBEDB_E23:00FridayServersDSERVERS_D23:00SaturdayServer

Page 256 - Disk backup256

Set data protection to 5 years for all backup specifications except forExchange_A, which is sued to back up personal mail. Set data protection forthis

Page 257 - 11 Synthetic backup

Figure 1 Data Protector graphical user interfaceGeneral informationGeneral information about Data Protector can be found at http://www.hp.com/go/datap

Page 258 - Synthetic backup benefits

• Display a list of media needed for restore and the physical locations wherethe media are stored.• Filter media from the media view based on specific

Page 259

B Further informationIn this appendixThis appendix provides additional information about some of the aspects of DataProtector concepts, including back

Page 260 - Restore and synthetic backup

Figure 100 Backup generationsYou configure Data Protector to automatically maintain the desired number of backupgenerations by selecting the appropria

Page 261

Example 1: automated media copying of filesystem backupsYour company has a MoM environment with two cells, each containing 150 computersystems (server

Page 262 - Synthetic backup262

have 900 GB of data to back up. The data is divided among backup specificationsin the following way:• BackupSpec1 (Drive 1) - 300 GB• BackupSpec2 (Dri

Page 263

Figure 101 Incr1 backup and automated media copyingFull backupConfiguring backupsYou schedule your weekly full backup on Friday at 6 PM. The data prot

Page 264 - Synthetic backup264

Again, you use post-backup media copying to copy the media used with BackupSpec1and BackupSpec2, and scheduled media copying to copy media used inBack

Page 265 - 12 Split mirror concepts

Figure 102 Full backup and automated media copyingYou schedule your monthly full backup on Sunday at 6 AM. This backup is intendedfor archiving purpos

Page 266 - Split mirror concepts266

Figure 103 Overview of backup and automated media copy sessionsExample 2: automated media copying of Oracle database backupsYour company has an Oracle

Page 267

Full backupConfiguring backupsYou schedule your daily full backup each day from Monday to Friday at 6 PM. Thedata protection is set to 4 weeks. You ha

Page 268 - Split mirror concepts268

Subscription serviceHP recommends that you register your product at the Subscriber's Choice for Businesswebsite:http://www.hp.com/go/e-updatesAft

Page 269

Figure 105 Overview of backup and automated media copy sessionsInternationalizationInternationalization is a way to design and implement a software pr

Page 270 - Remote mirror

File name handlingHandling file names in a heterogeneous environment (different operating systemswith different local settings, all in one cell) is a

Page 271

UNIX incompatibility exampleThree users working on a Solaris system without Data Protector installed, each usinga different character set, create file

Page 272 - Split mirror concepts272

• the files to be restored are selected in the GUI• Data Protector searches the tape for the specified data and restores it• the original file names (

Page 273 - Other configurations

Further information344

Page 274 - Split mirror concepts274

Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge SystemLibrary Server (ACSLS) software that manages the

Page 275 - 13 Snapshot concepts

an archived redo log is determined by the mode the databaseis using:• ARCHIVELOG - The filled online redo log files are archivedbefore they are reused

Page 276 - Snapshot concepts

associated with managing data and disk and provides stripingand mirroring capabilities to optimize performance.automigration (VLS specific term) The f

Page 277

located (drive on Windows and mount point on UNIX). Forintegration objects — backup stream identification, indicatingthe backed up database/applicatio

Page 278 - Snapshot backup types

See also application system, target volume, and replica.backup types See incremental backup, differential backup, transaction backup,full backup, and

Page 279 - Types of snapshots

1 About backup and DataProtectorIn this chapterThis chapter provides an overview of backup and restore concepts. It introduces DataProtector architect

Page 280 - Snapshot concepts280

See also replica, source volume, snapshot, and CA+BC EVA.BC Process (EMC Symmetrix specific term) A protected storage environmentsolution that has def

Page 281

See also BRBACKUP, and BRRESTORE.BRBACKUP (SAP R/3 specific term) An SAP R/3 backup tool that allows anonline or offline backup of the control file, o

Page 282 - Snapshot concepts282

CAP (StorageTek specific term) Cartridge Access Port is a port builtinto the door panel of a library. The purpose is to enter or ejectmedia.catalog pr

Page 283

Database(CMMDB)Change Journal (Windows specific term) A Windows filesystem feature that logsa record of each change as it occurs to the files and dire

Page 284 - Snapshot concepts284

client backup withdisk discoveryA backup of all filesystems mounted on a client. When thebackup starts, Data Protector discovers the disks on the clie

Page 285

between the MoM cell and the other Data Protector cells is highlyrecommendedSee also MoM.COM+ RegistrationDatabase(Windows specific term) The COM+ Reg

Page 286

the CRS runs under the account of the user specified atinstallation time. On UNIX systems, it runs under the accountroot.CSM The Data Protector Copy a

Page 287 - Concepts guide 287

they have common characteristics and share a common CAEVA log.See also copy set.database server A computer with a large database stored on it, such as

Page 288 - Snapshot concepts288

a single device group. All devices in a device group must beon the same EMC Symmetrix unit. You can use a device groupto identify and work with a subs

Page 289 - Copy service

directory junction (Windows specific term) Directory junctions use the reparsepoint concept of Windows. An NTFS 5 directory junction allowsyou to redi

Page 290

Data Protector can be used in environments ranging from a single system tothousands of systems on several sites. Due to the network component concept

Page 291

the backed up data, and increase the data availability andaccessibility for restore. The backup stages consist of backingup data to one media type fir

Page 292

can also read the data from the medium and send it to thecomputer system.drive-basedencryptionData Protector drive-based encryption uses the encryptio

Page 293

and to Data Protector users who are granted the Reportingand notifications user rights. You can view or delete allevents in the Event Log.Event Logs (

Page 294

bi-directional transmission of large data files and can bedeployed between sites kilometers apart. Fibre Channel connectsnodes using three physical to

Page 295

See also primary volume and MU number.flash recoveryarea(Oracle specific term) Flash recovery area is an Oracle 10g/11gmanaged directory, filesystem,

Page 296

the directoryData_Protector_program_data\Config\Server\Options(Windows Server 2008),Data_Protector_home\Config\Server\Options (otherWindows systems),

Page 297 - A Backup scenarios

hosting system A working Data Protector client used for Disk Delivery DisasterRecovery with a Data Protector Disk Agent installed.HP OperationsManager

Page 298 - Backup scenarios298

information or method invocation, and returns standardizedresponses.See also HP StorageWorks EVA SMI-S Agent and CommandView (CV) EVA.HP StorageWorksV

Page 299 - Company XYZ

See also backup types.incrementalmailbox backupAn incremental mailbox backup backs up all the changes madeto the mailbox after the last backup of any

Page 300

Information Store (Microsoft Exchange Server specific term) The MicrosoftExchange Server service that is responsible for storagemanagement. Informatio

Page 301

Data Protector enables you to meet the needs for continued business operationsaround the clock. In today's globally distributed business environm

Page 302 - Backup strategy requirements

ISQL (Sybase specific term) A Sybase utility used to perform systemadministration tasks on Sybase SQL Server.Java GUI Client The Java GUI Client is a

Page 303 - Proposed solution

library Also called autochanger, jukebox, autoloader, or exchanger.A library contains media in repository slots. Each slot holds onemedium (for exampl

Page 304 - Backup scenarios304

An LCR copy is used for disaster recovery because you canswitch to the LCR copy in a few seconds. If an LCR copy is usedfor backup and if it is locate

Page 305

login ID (Microsoft SQL Server specific term) The name a user uses tolog on to Microsoft SQL Server. A login ID is valid if MicrosoftSQL Server has an

Page 306 - Backup scenarios306

mailbox store (Microsoft Exchange Server specific term) A part of theInformation Store that maintains information in user mailboxes.A mailbox store co

Page 307

During a restore session, a Media Agent locates data on thebackup medium and sends it to the Disk Agent. The Disk Agentthen writes the data to the dis

Page 308

merging This defines one mode to resolve file conflicts during restore. Ifthe file to be restored already exists at the destination, the onewith the m

Page 309 - 31 GB / 3 h10 GB / 1 hAdmin

MMD The Media Management Daemon process (service) runs on theData Protector Cell Manager and controls media managementand device operations. The proce

Page 310 - Backup scenarios310

OBDR capabledeviceA device that can emulate a CD-ROM drive loaded with abootable disk and can thus be used as a backup or boot devicefor disaster reco

Page 311

period (several minutes or hours). For instance, for backupto tape, until streaming of data to the tape is finished.• For ZDB methods, the database is

Page 312 - Backup scenarios312

The DSI integration provides a set of scripts and configuration files from whichusers are able to see how to add their own queries using Data Protecto

Page 313 - Company ABC

• For ZDB methods, backup mode is required for the shortperiod of the data replication process only (several seconds).Normal database operation can th

Page 314 - Backup scenarios314

overwrite An option that defines one mode to resolve file conflicts duringrestore. All files are restored from a backup even if they areolder than exi

Page 315

COPY - The mirrored pair is currently re-synchronizing. Datais transferred from one disk to the other. The disks do notcontain the same data.•• PAIR -

Page 316

pre-exec A backup option that executes a command or script before thebackup of an object or before the entire session is started.Pre-exec commands are

Page 317

instance translates the commands into a sequence of low levelSCSI commands.rawdisk backup See disk image backup.RCU See Remote Control Unit (RCU).RDBM

Page 318 - Backup scenarios318

Recovery Manager(RMAN)(Oracle specific term) An Oracle command-line interface thatdirects an Oracle Server process to back up, restore, or recoverthe

Page 319 - 172243A*ABC Cape

is replicated. However, if a volume manager is used on UNIX,the whole volume or disk group containing a backup object(logical volume) is replicated. I

Page 320

RSM (Windows specific term) Removable Storage Manager (RSM)includes a media management service that facilitatescommunication among applications, robot

Page 321

shadow copy (Microsoft VSS specific term) A volume that represents aduplicate of the original volume at a certain point in time. Thedata is then backe

Page 322 - Backup scenarios322

number. To read a medium, a robotic mechanism moves themedium from a slot into the drive.SMB See split mirror backup.smart copy (VLS specific term) A

Page 323

Figure 2 Backup processIn most cases, the source is data on a disk, such as files, directories, databases, andapplications. If the backup is expected

Page 324 - Backup scenarios324

use. However background copying processes normally continueafter creation.See also snapshot.source (R1) device (EMC Symmetrix specific term) An EMC Sy

Page 325

split mirror restore (EMC Symmetrix and HP StorageWorks Disk Array XP specificterm) A process in which data backed up in a ZDB-to-tape or aZDB-to-disk

Page 326

for a single-drive device and multiple SCSI entries are requiredfor a multi-drive library device.stackers Devices with multiple slots for media storag

Page 327

synthetic backup A backup solution that produces a synthetic full backup, anequivalent to a conventional full backup in terms of data, withoutputting

Page 328 - Backup options

tablespace A part of a database structure. Each database is logicallydivided into one or more tablespaces. Each tablespace has datafiles or raw volume

Page 329

TNSNAMES.ORA (Oracle and SAP R/3 specific term) A network configurationfile that contains connect descriptors mapped to service names.The file may be

Page 330 - Backup scenarios330

UIProxy The Java GUI Server (UIProxy service) runs on the DataProtector Cell Manager. It is responsible for communicationbetween the Java GUI Client a

Page 331 - B Further information

user rights. Users have the access rights of the user group towhich they belong.vaulting media The process of storing media to a safe and remote place

Page 332 - Further information332

virtual tape (VLS specific term) An archival storage technology that backsup data to disk drives in the same way as if it were being storedon tape. Be

Page 333 - Incr1 backup

See also resync mode, source volume, primary volume (P-VOL),replica, secondary volume (S-VOL), and replica set rotation.VxFS Veritas Journal Filesyste

Page 334 - Further information334

Media management ... 48Backup devices ...

Page 335 - Full backup

Figure 4 Network backupTo accomplish backup of a network environment you need an application that allowsyou to:• Attach backup devices to any system i

Page 336 - Further information336

XBSA interface (Informix Server specific term) ON-Bar and Data Protectorcommunicate with each other through the X/Open BackupServices Application Prog

Page 337

ZDB to tape (ZDB specific term) A form of zero downtime backup wheredata in the replica produced is streamed to a backup medium,typically tape. Instan

Page 339

IndexAadding data to media during backups,148ADIC (EMASS/GRAU) AML, 162admin user group, 185alarms, 208alternative disaster recovery methods,131operat

Page 340 - Internationalization

backup with disk discovery, 225Backup Agents, 42backup clientsplit mirror backup, 267backup client as failover serversnapshot backup, 286split mirror

Page 341 - File name handling

benefitsdisk backup, 254synthetic backup, 258Volume Shadow Copy service, 293benefits of online integrations, 240block sizebackup devices, 158default,

Page 342 - Browsing file names

client systems, 42clients, 42installing, 64maintaining, 64cluster heartbeat, 80cluster (definition), 79cluster integrationsoverview, 82cluster node, 8

Page 343 - Concepts guide 343

creating cellsmixed environment, 66UNIX environment, 64Windows domains, 65Windows workgroups, 66Windows environment, 65CRS, 220Ddaily maintenanceIDB o

Page 344 - Further information344

database on the UNIX Cell ManagersIDB format, 189IDB location, 189database on the Windows CellManagerIDB format, 188IDB location, 188database architec

Page 345 - Glossary

device lists, 155device locking, 159device sharing in clusters, 180device sharing in SAN, 175drives, 177robotics, 177device streaming (definition), 15

Page 346 - Glossary346

The Data Protector internal database (IDB) keeps track of the files you back up sothat you can browse and easily recover the entire system or single f

Page 347

Direct Library Access, 179dirty drive detection, 164disaster, 128Disaster RecoveryPhase 3, 129disaster recovery, 129Disaster Recoveryconcepts, 128over

Page 348 - Glossary348

exchangers, 162See also librariesexpired catalog protection, 201exporting media, 102IDB operation, 195removed objects, 195Ffactors affecting restore d

Page 349

IIDB, 187advantages, 187architecture, 189Catalog Database, 191Detail Catalog Binary Files, 192in the Manager-of-Managersenvironment, 189management, 19

Page 350 - Glossary350

incremental backups, 71types, 93IndirectStorage Are Networks, 178Indirect Library AccessLibrary Access, 178Indirect Library Access, 179influence of lo

Page 351

lock names, 159, 177log all detailed informationCatalog Database, 100log directory names onlyCatalog Database, 100log level of information, 104logging

Page 352 - Glossary352

media pools, 135, 309, 325default, 136properties, 136usage examples, 140Media Agents, 42General Media Agent, 165media allocation policies, 144media al

Page 353

monitoring, 38, 210, 211mount prompt handling, 111mount requests, 224, 232, 235automating, 224notification, 224responding, 224, 228mount requests (res

Page 354 - Glossary354

planning cells, 62 - 67Cell Managers, 64Installation Servers, 64number of cells, 62planning performance, 67 - 73backup types, 71compression, 68devices

Page 355

reporting, 38, 211reporting and notification, 311, 329broadcasts, 207e-mail, 207examples, 212HTML, 207SNMP, 207requirementsDirect backup, 249response

Page 356 - Glossary356

Service Management, 37, 205 - 215Application Response Measurement,207monitor, 210notification, 211operative analyses of trends, 206overview, 205report

Page 357

Systems to be backed upClient systems you want to back up must have the Data Protector Disk Agent (DA),also called Backup Agent, installed. To back up

Page 358 - Glossary358

snapshot backup, 275application client, 277archive log backup, 278backup client, 277backup client as failover server, 286concepts, 276configuration, C

Page 359

standalone devices, 161standalone devices, 160standalone file device, 255standard restore vs parallel restore, 228standard backup vs disk discovery, 2

Page 360 - Glossary360

Vvaulting, 134, 151 - 153, 311, 329definition, 151restoring, 153restoring from a vault, 312, 330vaulting usage example, 152Veritas Cluster, 79virtual

Page 361 - (EMC Symmetrix

Figure 6 Backup or restore operationBackup sessionsWhat is a backup session?A backup session, shown in Figure 7 on page 44, is a process that creates

Page 362 - Glossary362

Figure 7 Backup sessionA typical backup session is more complex than the one shown in Figure 7 on page 44.A number of Disk Agents read data from multi

Page 363

Enterprise environmentsWhat is an enterprise environment?A typical enterprise network environment, shown in Figure 9 on page 45, consistsof a number o

Page 364 - Glossary364

Why split large environments into multiple cells?• Geographical grouping of systems.• Logical grouping of systems, for example, departments.• Slow net

Page 365

Figure 11 Manager-of-Managers environmentManager-of-Managers provides the following features:• Centralized licensing repositoryThis enables simplified

Page 366 - Glossary366

Media managementData Protector provides you with powerful media management, which lets you easilyand efficiently manage large numbers of media in your

Page 367

Backup devicesData Protector defines and models each device as a physical device with its ownusage properties, such as the default pool. This device c

Page 368 - Glossary368

Data Protector user groups ... 75Data Protector user rights ...

Page 369

User interfacesData Protector provides easy access to all configuration and administration tasksusing the Data Protector GUI on Windows and UNIX platf

Page 370 - Glossary370

• A Results Tab with all the configuration wizards, properties and lists.• Easy configuration and management of the backup of online database applicat

Page 371

Figure 14 Original Data Protector GUIFigure 15 Data Protector Java GUIData Protector Java GUIThe Data Protector Java GUI is a Java-based graphical use

Page 372 - Glossary372

client-server architecture. It enables backup management with the same look and feelas the original Data Protector GUI.The Java GUI consists of two co

Page 373

Benefits of Java GUIThe Data Protector Java GUI has the following advantages over the original DataProtector GUI:• PortabilityThe Data Protector Java

Page 374 - Glossary374

Overview of tasks to set up Data ProtectorThis section provides an overview of global tasks to set up your Data Protector backupenvironment. Depending

Page 375

7. Install and configure your Data Protector environment.• Install the Data Protector Cell Manager system and use the Data Protectoruser interface to

Page 376 - Glossary376

2 Planning your backupstrategyIn this chapterThis chapter describes backup strategy planning. It focuses on planning Data Protectorcells, performance,

Page 377

Backup strategy planningData Protector is simple to configure and administer. However, if you work in a largeenvironment with diverse client systems a

Page 378 - Glossary378

The allowed downtime has a significant impact on the investments into networkinfrastructure and equipment needed for backups. For each type of data, l

Page 379

When to schedule backups ... 107Staggering full backups ...

Page 380 - Glossary380

The time needed for backup depends on the type of backup, full or incremental.For more information, see “Full and incremental backups” on page 91. Dat

Page 381

The need to guard premises to prevent unauthorized people from entering.This also includes safeguarding all relevant data against unauthorized access,

Page 382 - Glossary382

• Consider backing up to a disk-based device. Besides other benefits, backupto disk reduces the time needed for backup and enables the use of advanced

Page 383

is that it can require more administrative work or might even require a separateadministrator for each cell.• Size of each cellThe size of a Data Prot

Page 384 - Glossary384

Installing and maintaining client systemsIf you have several UNIX and Windows client systems, an efficient mechanism forthe installation of Data Prote

Page 385

that each client system is accessible from every other client system using the samefully qualified node name.Creating cells in the Windows environment

Page 386 - Glossary386

Windows workgroupsSome of the configuration tasks require more steps in some cases, because there areno global users as in a domain. Software distribu

Page 387

You can configure a single cell over geographically remote locations. In this case,you need to ensure that data transfer from each client system to th

Page 388 - Glossary388

To maximize performance, use local backup configurations for high volumedatastreams.Network or server versus direct backupsSending data over a network

Page 389 - StorageWorks EVA

High performance hardware other than devicesPerformance of computer systemsThe speed of computer systems themselves directly impacts performance. The

Page 390 - Disk Array XP

Vaulting ... 151Restoring from media in a vault ...

Page 391

3 fast tape devices, consider using 3 dedicated network links between system_Aand system_B.• Load BalancingUsing this Data Protector feature, Data Pro

Page 392 - Glossary392

Full and incremental backupsA basic approach to improve performance is to reduce the amount of data to backup. Carefully plan your full and incrementa

Page 393

Disk performanceAll data that Data Protector backs up resides on disks in your systems. Therefore, theperformance of disks directly influences backup

Page 394 - (ZDB specific term)

improve performance in your specific environment and determine the optimumasynchronous reading settings.SAN performanceIf large volumes of data need t

Page 395

Data Protector security featuresThe following features allow and restrict access to Data Protector and the backed updata. The items in this list are d

Page 396 - Glossary396

When is the account checked?When a user starts the Data Protector user interface, Data Protector checks user rights.User rights are also checked when

Page 397

Visibility of backed up dataBacking up data means creating a new copy. Therefore, when you deal withconfidential information, it is important to restr

Page 398 - Glossary398

encrypts the data. Thus the backed up data is encrypted before it is transferred overthe network and written to media.Figure 17 on page 77 shows a bas

Page 399

If a source medium involved in an automatic media copy session stores encryptedas well as non-encrypted data, all data written to the corresponding ta

Page 400 - Glossary400

the CRS process is running, or the user specified as the owner in the backupspecification options. For instructions on how to specify a backup owner,

Page 401

Data Protector user rights ... 1855 The Data Protector internal database ...

Page 402 - Glossary402

Figure 19 Typical clusterComponents:• Cluster nodes (two or more)• Local disks• Shared disks (shared between nodes)Cluster nodesCluster nodes are comp

Page 403

you can make an appropriate determination of the ownership of the package(MC/SG, Veritas Cluster) or group (MSCS).What is a package or group?A package

Page 404

A cluster-aware Data Protector Cell Manager that is responsible for running the IDBand managing backup and restore operations has many major benefits

Page 405

• The Data Protector client is installed in a cluster. The Cell Manager (if not installedin the cluster) in such a case is not fault tolerant; the ope

Page 406

Figure 20 Cell Manager installed outside a clusterWhen creating a backup specification, you can see three or more systems that canbe backed up in the

Page 407

The following is the expected backup behavior under this configuration.Table 3 Backup behaviorResultConditionSuccessful backupFailover of the node bef

Page 408

Figure 21 Cell Manager installed outside a cluster, devices connectedto the cluster nodesWhen creating a backup specification, you can see three or mo

Page 409

NOTE:The difference with the previous example is that each of the cluster nodes has a DataProtector Media Agent installed. Additionally, you need to u

Page 410

Data Protector cluster critical resources are defined in the same package(MC/ServiceGuard) or group (Microsoft Cluster Server) as the applicationclust

Page 411

Figure 22 Cell Manager installed in the cluster, devices connected tocluster nodesWhen creating a backup specification, you can see three or more syst

Page 412

Data Protector log files ... 213Windows application log ...

Page 413

NOTE:Clusters do not support a SCSI bus with shared tapes. To bring high availability also toMedia Agents, the Fibre Channel technology can be used as

Page 414

ResultConditionFilesystem/disk image backup The backup session fails at failoverof the node where the filesystem is installed. The completedobjects fr

Page 415

Incremental backupFull backupA restore takes more time becauseof the number of media needed.Enables simple and quick restore.RestoreOccupies less spac

Page 416

Incremental backups depend on the last full backup. If you specify an incrementalbackup and there is no protected full backup, a full backup is perfor

Page 417

Incr A simple incremental backup, shown in Figure23 on page 95, is based on the last backup that is stillprotected, which can be a full backup or an i

Page 418

Figure 23 Incremental backupsFigure 24 Leveled incremental backupsTable 7 on page 95 shows the relative referencing of backup runs with variousbackup

Page 419

Incr3<----Incr1<----Full8Incr3<----Incr2<----Incr1<----Full9Incr3<----Incr2<----<----<----Full10Incr3<----<----<--

Page 420

TIP:Use the Data Protector Appendable on Incrementals Only option to keep data from fulland incremental backups (of the same backup specification) on

Page 421

Figure 25 Media needed to restore from simple and leveled incrementalbackupsFigure 26 Media needed to restore from leveled incremental backupsNote tha

Page 422

Keeping backed up data and information about thedataData Protector lets you specify how long to keep your backed up data on the mediaitself (data prot

Comments to this Manuals

No comments