HP B6960-90078 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel HP B6960-90078. HP B6960-90078 User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 856
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
HP OpenView Storage Data Protector
Administrator’s Guide
Manual Edition: May 2003
Manufacturing Part Number: B6960-90078
Release A.05.10
© Copyright Hewlett-Packard Development Company, L.P.2003.
Vue de la page 0
1 2 3 4 5 6 ... 855 856

Résumé du contenu

Page 1 - Administrator’s Guide

HP OpenView Storage Data ProtectorAdministrator’s GuideManual Edition: May 2003Manufacturing Part Number: B6960-90078Release A.05.10© Copyright Hewlet

Page 2 - Legal Notices

Contentsx7. Monitoring, Reporting, Notifications, and the Event LogIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 3

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 270Disabling a Backup DeviceDisabling a backup device is useful when the device i

Page 4

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 2 71Figure 2-12 Disable Device

Page 5

Configuring and Using Backup DevicesRemoving a Backup DeviceChapter 272Removing a Backup Device By removing a backup device from the Data Protector co

Page 6

Configuring and Using Backup DevicesRenaming a Backup DeviceChapter 2 73Renaming a Backup DeviceWhen you rename a backup device, the device is no long

Page 7

Configuring and Using Backup DevicesDevice LockingChapter 274Device LockingInternal Locking The internal locking of backup devices prevents two Data P

Page 8

Configuring and Using Backup DevicesDevice LockingChapter 2 75Data Protector recognizes in order to lock the device before starting backup and restore

Page 9

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 276Device Concurrency, Segment Size, and Block SizeStreami

Page 10 - Contents

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 77Figure 2-13 Advanced Options Dialog Box: Concurrency

Page 11

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 278Figure 2-14 Device Properties Dialog Box: ConcurrencyCh

Page 12

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 79You can change the segment size in the Advanced Option

Page 13

Contents xiGenerating the Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Configuring Notif

Page 14

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 280Before changing the block size for a particular SCSI ca

Page 15

Chapter 3 813 Configuring Users and User Groups

Page 16

Configuring Users and User GroupsIn This ChapterChapter 382In This ChapterThis chapter explains how to configure both user groups and individual users

Page 17

Configuring Users and User GroupsData Protector User RightsChapter 3 83Data Protector User RightsData Protector users have the user rights of the user

Page 18

Configuring Users and User GroupsData Protector User RightsChapter 384Start backup specification Allows the user to perform a backup using a backup

Page 19 - Printing History

Configuring Users and User GroupsData Protector User RightsChapter 3 85Start restore Allows users to restore their own data as well as monitor and a

Page 20

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 386Predefined Data Protector User GroupsThe following default groups are

Page 21 - Conventions

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 3 87The user rights you have set on the Cell Manager determine the avail

Page 22

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 388Adding or Deleting a User GroupThe default Data Protector user groups are s

Page 23 - Contact Information

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 3 89Deleting a User Group1. In the Data Protector Manager, switch to the Users

Page 24

ContentsxiiReducing the IDB Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Reducing the IDB Size

Page 25 - Data Protector Documentation

Configuring Users and User GroupsAdding or Deleting a UserChapter 390Adding or Deleting a UserAfter the product installation, the following users are

Page 26

Configuring Users and User GroupsAdding or Deleting a UserChapter 3 91Figure 3-2 Adding New UsersFor further information, press F1.

Page 27

Configuring Users and User GroupsModifying a UserChapter 392Modifying a UserYou can change the properties of an existing user, or move the user from o

Page 28

Configuring Users and User GroupsChanging User Group RightsChapter 3 93Changing User Group RightsUsers have the rights of the groups to which they bel

Page 29 - In This Book

Configuring Users and User GroupsExample User ConfigurationsChapter 394Example User ConfigurationsThis section gives some examples of typical user con

Page 30 - Organization

Configuring Users and User GroupsExample User ConfigurationsChapter 3 952. Add the users who will be able to configure their own backups to this user

Page 31 - 1 Introducing Data Protector

Configuring Users and User GroupsExample User ConfigurationsChapter 396

Page 32

Chapter 4 974 Managing Media

Page 33

Managing MediaIn This ChapterChapter 498In This ChapterThis chapter gives detailed information on how to manage your media, including:“Overview of Dat

Page 34 - How a Restore Session Works

Managing MediaOverview of Data Protector Media ManagementChapter 4 99Overview of Data Protector Media ManagementData Protector provides a powerful med

Page 35

Contents xiiiPreparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460Recove

Page 36

Managing MediaOverview of Data Protector Media ManagementChapter 4100• The ability to store information about media in a central place and share this

Page 37 - Graphical User Interface

Managing MediaOverview of Data Protector Media ManagementChapter 4 101“Creating a Media Pool” on page 102.“Adding Media to a Media Pool” on page 107.2

Page 38

Managing MediaCreating a Media PoolChapter 4102Creating a Media PoolWhat Is a Media Pool?A media pool represents a set of media of the same type (for

Page 39

Managing MediaCreating a Media PoolChapter 4 103Properties of a Media PoolThis section describes the properties of a media pool. You specify them when

Page 40

Managing MediaCreating a Media PoolChapter 4104If InitOnLoosePolicy is set to 1 (by default, it is set to 0) media that are unrecognized by Data Prote

Page 41 - The Command-Line Interface

Managing MediaCreating a Media PoolChapter 4 105medium is used first. If additional media are needed during the same backup session, they must be free

Page 42

Managing MediaCreating a Media PoolChapter 4106Maximum number of overwrites The usage of a medium is defined as the number of overwrites from the beg

Page 43

Managing MediaAdding Media to a Media PoolChapter 4 107Adding Media to a Media PoolOnce you have created a media pool, you have to add the media that

Page 44

Managing MediaFormatting MediaChapter 4108Formatting MediaWh at Is Forma tting Media?Formatting media prepares them for use with Data Protector by sa

Page 45

Managing MediaFormatting MediaChapter 4 109How to Format MediaTo format media, browse for the specific device, media pool, or library slot in the Devi

Page 46

ContentsxivGeneral Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514Troubleshooting Ass

Page 47 - Chapter 2 17

Managing MediaFormatting MediaChapter 4110Figure 4-2 Cartridge Memory Reformat for Specific Slot What’s Next? Once you have formatted your media, you

Page 48

Managing MediaFormatting MediaChapter 4 111TIP To format media used by other applications, use the Force Operation option. Data Protector protected me

Page 49

Managing MediaFormatting MediaChapter 4112NOTE Do not rely on Data Protector to recognize other media types, as recognition depends on the platforms y

Page 50 - Configuring Backup Devices

Managing MediaImporting MediaChapter 4 113Importing Media Importing media adds media already used by Data Protector to a media pool, without losing th

Page 51

Managing MediaImporting MediaChapter 4114Figure 4-3 Import Multiple MediaImporting the Catalog from MediaImporting the catalog from a medium writes th

Page 52 - Chapter 222

Managing MediaImporting MediaChapter 4 115Figure 4-4 Import CatalogImporting Media in a Magazine DeviceIf you use a device with magazine support, Data

Page 53

Managing MediaImporting MediaChapter 4116Figure 4-5 Import MagazineHow to Import a Single Medium into a MagazineTo import a single medium into a magaz

Page 54

Managing MediaAppending Backups to MediaChapter 4 117Appending Backups to MediaData Protector allows you to add new backups to media which already con

Page 55

Managing MediaAppending Backups to MediaChapter 4118• Link a different pool to each client in the backup specification, or create a separate backup sp

Page 56 - Configuring File Devices

Managing MediaUsing a Pre-Allocation List of Media for BackupChapter 4 119Using a Pre-Allocation List of Media for BackupYou can specify the order in

Page 57

Contents xvTroubleshooting Data Protector Services and Daemons . . . . . . . . . . . . . . . . . . . . . . . 569Problems Starting Data Protector Ser

Page 58

Managing MediaSelecting Media for BackupChapter 4120Selecting Media for BackupData Protector media management automatically selects the most appropria

Page 59 - Configuring Library Devices

Managing MediaSelecting Media for BackupChapter 4 121Media in poor condition are not used for backup. Media in fair condition are used only if no medi

Page 60

Managing MediaSetting Data Protection for MediaChapter 4122Setting Data Protection for MediaData Protector keeps track of data on every medium used. W

Page 61

Managing MediaRecycling MediaChapter 4 123Recycling Media Data Protector keeps track of data on every medium used. When configuring a backup, you prot

Page 62

Managing MediaMoving Media to Another PoolChapter 4124Moving Media to Another PoolData Protector lets you move a medium from one media pool to another

Page 63 - Chapter 2 33

Managing MediaExporting Media from Data ProtectorChapter 4 125Exporting Media from Data ProtectorWhat Is Exporting Media?Exporting (removing) a medium

Page 64 - Configuring Magazine Devices

Managing MediaModifying Media LocationsChapter 4126Modifying Media LocationsWhat Is a Location?The media location helps you to physically locate the m

Page 65 - Configuring Stacker Devices

Managing MediaModifying Media DescriptionsChapter 4 127Modifying Media DescriptionsWhat Is a Description?The media description helps you identify medi

Page 66

Managing MediaVerifying Data on a MediumChapter 4128Verifying Data on a MediumWhat Is Verifying? Verifying a medium shows whether the data on the medi

Page 67

Managing MediaScanning Media in a DeviceChapter 4 129Scanning Media in a DeviceWhat Is Scanning? You scan a device to update Data Protector informatio

Page 68

ContentsxviTemporary Directory Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597Problems During Backup

Page 69 - Configuration Procedure

Managing MediaScanning Media in a DeviceChapter 4130List Cartridge Memory List Cartridge Memory, available for Cartridge Memory enabled drives, is equ

Page 70

Managing MediaChecking the Condition of a MediumChapter 4 131Checking the Condition of a MediumData Protector allows you to view information about the

Page 71 - Support of New Devices

Managing MediaChecking the Condition of a MediumChapter 4132Cartridge Memory ListTo view some additional information about Cartridge Memory enabled me

Page 72

Managing MediaChecking the Condition of a MediumChapter 4 133Statuses of Media and Media PoolsMedia or media pools can have three statuses, based on t

Page 73

Managing MediaChecking the Condition of a MediumChapter 4134Changing How Media Condition Is CalculatedWhen you add a medium to a media pool, you can d

Page 74

Managing MediaSearching for and Selecting a MediumChapter 4 135Searching for and Selecting a MediumUse this function to locate and select specific med

Page 75 - Chapter 2 45

Managing MediaEntering a Medium into a DeviceChapter 4136Entering a Medium into a DeviceData Protector allows you to physically enter media into a lib

Page 76

Managing MediaEjecting a Medium from a DeviceChapter 4 137Ejecting a Medium from a DeviceData Protector allows you to physically eject media from the

Page 77 - Configuration Overview

Managing MediaEjecting a Medium from a DeviceChapter 4138TIP Ejecting of media can be scheduled. Refer to “Scheduled Eject of Media” on page 138 for d

Page 78

Managing MediaEjecting a Medium from a DeviceChapter 4 139If media are not removed from the mail slots after a default time span, and there are still

Page 79

Contents xvii14. ADIC/GRAU DAS and STK ACS LibrariesIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 80

Managing MediaVaulting MediaChapter 4140Vaulting MediaWhat Is Vaulting? Vaulting is a process of moving media with important information to a safe pla

Page 81

Managing MediaVaulting MediaChapter 4 1414. Select the media that you want to store in the vault, change the location of the media, eject the media, a

Page 82

Managing MediaVaulting MediaChapter 41422. Take the media from a vault, enter the media in the library, and scan them.3. If the catalog protection for

Page 83

Managing MediaCopying MediaChapter 4 143Copying MediaWhat Is Media Copying?Data Protector enables copying of backed up data to a second set of media.

Page 84

Managing MediaCopying MediaChapter 4144NOTE When copying media, it is possible that the target medium reaches the end of the tape before the source me

Page 85

Managing MediaCopying MediaChapter 4 145Automated Media CopyingWhat Is Automated Media Copying?Automated media copying is an automated process that cr

Page 86

Managing MediaCopying MediaChapter 4146target medium is selected to which the data will be copied. The target media are selected from the same media p

Page 87

Managing MediaDetection of Write-Protected MediaChapter 4 147Detection of Write-Protected MediaData Protector can detect and handle media that has bee

Page 88

Managing MediaUsing Different Media Format TypesChapter 4148Using Different Media Format TypesData Protector recognizes and uses two different format

Page 89

Managing MediaModifying Views in the Media Management WindowChapter 4 149Modifying Views in the Media Management WindowYou can customize the informati

Page 90

ContentsxviiiCreating a libaci.o on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-26Example of th

Page 91 - Drive Cleaning

Managing MediaModifying Views in the Media Management WindowChapter 4150

Page 92

Chapter 5 1515Backup

Page 93

BackupIn This ChapterChapter 5152In This ChapterThis chapter explains how to back up your data. It also describes some advanced Data Protector feature

Page 94

BackupConfiguring a BackupChapter 5 153Configuring a BackupA backup is a process that creates a copy of system data on backup media. This copy is stor

Page 95 - Busy Drive Handling

BackupConfiguring a BackupChapter 5154A backup session is based on the backup specification, and can be started interactively. During the backup sessi

Page 96 - Activating Barcode Support

BackupConfiguring a BackupChapter 5 155Key Points • The backup type (full or incremental) is the same for the whole backup session. All data in a grou

Page 97 - Chapter 2 67

BackupConfiguring a BackupChapter 5156Figure 5-2 Create New Backup Dialog Box5. Select what you want to back up. Figure 5-3 on page 157 shows data sou

Page 98

BackupConfiguring a BackupChapter 5 157Figure 5-3 Source Page of the Backup Wizard 6. Select the device(s) that will be used to back up your data. See

Page 99 - Chapter 2 69

BackupConfiguring a BackupChapter 5158Figure 5-4 Device Page of the Backup Wizard7. Select backup options. See “Using Backup Options” on page 225 for

Page 100 - Disabling a Backup Device

BackupConfiguring a BackupChapter 5 159Figure 5-5 Backup Object Summary Page10. In the final page of the Backup wizard, you can save the backup specif

Page 101 - Figure 2-12 Disable Device

xixPrinting HistoryThe manual printing date and part number indicate its current edition. The printing date will change when a new edition is printe

Page 102 - Removing a Backup Device

BackupConfiguring a BackupChapter 5160Figure 5-6 Final Page of the Backup Wizard11.Click Start Backup to run the backup interactively. The Start Backu

Page 103 - Renaming a Backup Device

BackupBacking Up UNIX SystemsChapter 5 161Backing Up UNIX SystemsYou can install a Disk Agent on every UNIX system in order to back it up. Alternative

Page 104 - Device Locking

BackupBacking Up UNIX SystemsChapter 5162Data Protector provides a sophisticated mechanism for incremental backups. To determine which files have chan

Page 105

BackupBacking Up UNIX SystemsChapter 5 163Backing Up Clients Using Disk DiscoveryHow Are Disks Discovered?If you specify a client backup with disk dis

Page 106

BackupBacking Up UNIX SystemsChapter 5164Figure 5-7 Selecting an Entire Client to Be Backed Up NOTE Selecting all of the client’s drives is not the sa

Page 107 - Chapter 2 77

BackupBacking Up UNIX SystemsChapter 5 165To back up this filesystem using NFS, follow the same procedure as if you were backing up any other filesyst

Page 108

BackupBacking Up UNIX SystemsChapter 5166NOTE It is recommended to have root permission on mounted NFS filesystems.When to Use NFS BackupUse NFS backu

Page 109

BackupBacking Up UNIX SystemsChapter 5 167IMPORTANT Unmount a disk before a disk image backup and mount it later. You can use pre- and post- exec comm

Page 110

BackupBacking Up Windows SystemsChapter 5168Backing Up Windows SystemsPrerequisites You have to install a Disk Agent on at least one Windows computer

Page 111 - 3 Configuring Users and User

BackupBacking Up Windows SystemsChapter 5 169• NTFS alternate data streams • NTFS security dataNOTE The sharing properties of a folder are not stored

Page 112 - In This Chapter

iiLegal Notices Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of mer

Page 114

BackupBacking Up Windows SystemsChapter 5170NTFS 3.x Filesystem FeaturesThe NTFS 3.x filesystem has introduced new file attributes and concepts, which

Page 115

BackupBacking Up Windows SystemsChapter 5 171The advantages of the VSS filesystem backup are the following:• A computer can be backed up while applica

Page 116

BackupBacking Up Windows SystemsChapter 5172Sparse Files Sparse files contain many zero data sets as opposed to, for example, compressed files. At bac

Page 117

BackupBacking Up Windows SystemsChapter 5 173Figure 5-9 Specifying Objects Using Manual AddFor detailed steps, refer to the online Help index keyword

Page 118 - Adding a User Group

BackupBacking Up Windows SystemsChapter 5174Figure 5-10 Windows NT CONFIGURATION TIP The SystemRecoveryData file is only needed for Windows disaster r

Page 119 - Deleting a User Group

BackupBacking Up Windows SystemsChapter 5 175 See “Backing Up WINS, DHCP, and DNS” on page 178.• SysVolSysVol is a shared directory that stores the se

Page 120 - Adding or Deleting a User

BackupBacking Up Windows SystemsChapter 5176Backing Up CONFIGURATIONOnly one CONFIGURATION backup can run on a system at the time. You have to expand

Page 121

BackupBacking Up Windows SystemsChapter 5 177Figure 5-12 System State on Windows 2000/XP/Server 2003Backing Up the Windows Registry The database repos

Page 122 - Modifying a User

BackupBacking Up Windows SystemsChapter 5178Figure 5-13 Backing Up the Windows RegistryBacking Up WINS, DHCP, and DNSWINS, DHCP, DNS ServersIn TCP/IP

Page 123 - Changing User Group Rights

BackupBacking Up Windows SystemsChapter 5 179Backing Up the Windows 2000/XP/Server 2003 ServicesBacking up the Windows 2000/XP/Server 2003 services me

Page 124 - Example User Configurations

xxiConventionsThe following typographical conventions are used in this manual.Table 2Convention Meaning ExampleItalic Book or manual titles, and man

Page 125

BackupBacking Up Windows SystemsChapter 5180This service provides automatic distribution of events to subscribing COM+ components. To back up this dat

Page 126 - Chapter 396

BackupBacking Up Windows SystemsChapter 5 181For example, if you use Active Directory to publish Certificate Revocation Lists (CLRs), back up the Acti

Page 127 - 4 Managing Media

BackupBacking Up Windows SystemsChapter 5182net stop/start “Remote Storage Engine”net stop/start “Remote Storage File”The RSS databases are located in

Page 128

BackupBacking Up Windows SystemsChapter 5 183See also “Warnings When Backing Up System Disks” on page 263. Event Logs Event logs are files where the W

Page 129 - Management

BackupBacking Up Windows SystemsChapter 5184How to Perform a BackupTo perform a Windows client backup, you have to create a backup specification as de

Page 130 - Media Life Cycle

BackupBacking Up Windows SystemsChapter 5 185See “Using Backup Options” on page 225 for information on using and structuring your backup specification

Page 131

BackupBacking Up Windows SystemsChapter 5186IMPORTANT The Disk Agent client must have the Inet service configured using an account with access to the

Page 132 - Creating a Media Pool

BackupBacking Up Windows SystemsChapter 5 1879. Enter the required information. See online Help for details.Setting the User Account for the Data Prot

Page 133 - Properties of a Media Pool

BackupBacking Up Windows SystemsChapter 5188Figure 5-16 Inet Logon Option on Windows NT7. Click OK to return to the Services dialog box.8. Ensure that

Page 134

BackupBacking Up Windows SystemsChapter 5 189Figure 5-17 Inet General Property Page on Windows 2000/XP/Server 20034. In the Log On As area, select the

Page 135

xxiiData Protector provides a cross-platform (Windows and UNIX) graphical user interface. Figure 1 Data Protector Graphical User Interface

Page 136

BackupBacking Up Windows SystemsChapter 5190Figure 5-18 Inet Logon option on Windows 2000/XP/Server 20037. Click Apply to apply the changes and then r

Page 137 - Adding Media to a Media Pool

BackupBacking Up Windows SystemsChapter 5 191How to Specify a Disk Image SectionYou can specify a disk image section in two ways. In case of a zero do

Page 138 - Formatting Media

BackupBacking Up Windows SystemsChapter 5192Figure 5-19 The Numbers Representing Disks (Physical Drive Number) on Windows 2000 SystemNOTE The numbers

Page 139

BackupBacking Up Windows SystemsChapter 5 193Figure 5-20 The Manual Add Functionality

Page 140

BackupBacking Up Novell NetWare SystemsChapter 5194Backing Up Novell NetWare SystemsThis section describes how to back up Novell NetWare filesystems a

Page 141

BackupBacking Up Novell NetWare SystemsChapter 5 195• Trustee information• Inherited right mask• File and directory attributes• Time attributes (creat

Page 142

BackupBacking Up Novell NetWare SystemsChapter 5196• The Compress option • The omit_deleted_files option (restore option)Files of up to 4 GB are backe

Page 143 - Importing Media

BackupBacking Up Novell NetWare SystemsChapter 5 197Figure 5-21 Backing Up NetWare 4.x and NetWare 5.x Configuration

Page 144

BackupBacking Up Novell NetWare SystemsChapter 5198Client Backup with Disk DiscoveryYou can discover disks (volumes) on NetWare just as you can for UN

Page 145

BackupBacking Up Novell NetWare SystemsChapter 5 199Backing Up NetWare Directory Services (NDS) Data Protector backs up NDS using Novell NetWare Stora

Page 146

xxiiiContact InformationGeneral InformationGeneral information about Data Protector can be found athttp://www.hp.com/go/dataprotectorTechnical Suppo

Page 147 - Appending Backups to Media

BackupBacking Up Novell NetWare SystemsChapter 5200has its counterpart used by Data Protector, containing forward slashes, which are used for Windows

Page 148

BackupBacking Up OpenVMS SystemsChapter 5 201Backing Up OpenVMS SystemsThis section describes how to back up OpenVMS filesystems.Backing Up OpenVMS Fi

Page 149

BackupBacking Up OpenVMS SystemsChapter 5202Files can be backed up from mounted FILES-11 ODS-2 or ODS-5 volumes only.Limitations • Any file specificat

Page 150 - Selecting Media for Backup

BackupBacking Up OpenVMS SystemsChapter 5 203Files with multiple directory entries are only backed up once using the primary path name. The secondary

Page 151

BackupBacking Up in a Direct Backup EnvironmentChapter 5204Backing Up in a Direct Backup EnvironmentThis section provides the steps for the configurat

Page 152

BackupBacking Up in a Direct Backup EnvironmentChapter 5 205• You need to have appropriate user rights for performing a backup. Refer to Chapter 3, “C

Page 153 - Recycling Media

BackupBacking Up in a Direct Backup EnvironmentChapter 5206•rawdisks• Oracle8i databases (online)• Oracle8i databases (offline)Backing Up RawdisksPlea

Page 154 - Moving Media to Another Pool

BackupScheduling Unattended BackupsChapter 5 207Scheduling Unattended BackupsData Protector allows you to configure unattended backups by scheduling b

Page 155

BackupScheduling Unattended BackupsChapter 5208• Each backup specification can be scheduled multiple times with different option values. Within one ba

Page 156 - Modifying Media Locations

BackupScheduling Unattended BackupsChapter 5 209Starting Backups on Specific DatesData Protector allows you to define the date and time when you want

Page 158 - Verifying Data on a Medium

BackupScheduling Unattended BackupsChapter 5210Fortnightly full Data Protector runs a full backup every second Friday. Between these backups, Data Pro

Page 159 - Scanning Media in a Device

BackupScheduling Unattended BackupsChapter 5 211To disable a backup schedule, select the Disable Schedule option in the Schedule property page. The ba

Page 160

BackupScheduling Unattended BackupsChapter 5212Running Consecutive BackupsYou can start a backup after one is finished. For example, you can start a b

Page 161

BackupSelecting a Backup Type: Full or IncrementalChapter 5 213Selecting a Backup Type: Full or IncrementalTo save time and media during a backup, you

Page 162

BackupSelecting a Backup Type: Full or IncrementalChapter 5214backup. Even if the previous backup was an incremental (Incr or Incr1, Incr2, ...) backu

Page 163

BackupSelecting a Backup Type: Full or IncrementalChapter 5 215How to Read Table 5-1• The rows in Table 5-1 are independent of each other and show dif

Page 164

BackupUsing Backup TemplatesChapter 5216Using Backup Templates Overview Data Protector backup templates are a powerful tool that can help you simplify

Page 165

BackupUsing Backup TemplatesChapter 5 217Figure 5-22 Options Offered by TemplatesDestination Backup device settings specified in your template apply

Page 166

BackupUsing Backup TemplatesChapter 5218Using a Backup Template When Creating a New Backup SpecificationWhen creating a new backup specification, Data

Page 167

BackupUsing Backup TemplatesChapter 5 219To apply a template to backup specifications, right-click the backup specification and click Apply Template.

Page 168 - Scheduled Eject of Media

xxvData Protector DocumentationData Protector documentation comes in the form of manuals and online Help.Manuals Data Protector manuals are availabl

Page 169

BackupUsing Backup TemplatesChapter 5220Creating a New TemplateYou can create new templates and use them for creating or modifying backup specificatio

Page 170 - Vaulting Media

BackupUsing Backup TemplatesChapter 5 221For more information on individual options, refer to “Using Backup Options” on page 225.

Page 171 - Moving Media to a Vault

BackupGroups of Backup SpecificationsChapter 5222Groups of Backup SpecificationsData Protector offers you the ability to organize backup specification

Page 172

BackupGroups of Backup SpecificationsChapter 5 223Figure 5-26 Example of Backup Specification GroupsHow to View and Create GroupsThe following procedu

Page 173 - Copying Media

BackupGroups of Backup SpecificationsChapter 5224How to Delete a GroupBefore deleting a group, you have to empty it first. One way of doing this is to

Page 174

BackupUsing Backup OptionsChapter 5 225Using Backup OptionsData Protector offers a comprehensive set of backup options to help you fine-tune your back

Page 175 - Automated Media Copying

BackupUsing Backup OptionsChapter 5226For split mirror and snapshot backups, the backup type is ignored (it is set to full). Data protection that is s

Page 176

BackupUsing Backup OptionsChapter 5 227Figure 5-27 Backup OptionsMost Frequently Used Backup OptionsThis section describes the options that are most l

Page 177

BackupUsing Backup OptionsChapter 5228Data Protection: Specifying How Long Data Is Kept on the MediaConfiguring protection policies is extremely impor

Page 178

BackupUsing Backup OptionsChapter 5 229You can specify a different period of protection for each individual or periodic scheduled backup. The data pro

Page 179

xxvi• HP OpenView Storage Data Protector UNIX Integration GuideThis manual describes integrations running on the UNIX operating system, such as Oracle

Page 180 - Chapter 4150

BackupUsing Backup OptionsChapter 5230Figure 5-29 Backup Object Properties - Options: ProtectionCatalog Protection: How Long Info Is Kept in the Datab

Page 181 - Chapter 5 151

BackupUsing Backup OptionsChapter 5 231Even when catalog protection expires, you are still able to restore, but you must specify filenames manually.Be

Page 182

BackupUsing Backup OptionsChapter 5232The different logging level settings influence the IDB growth, backup speed, and the convenience of browsing dat

Page 183 - Configuring a Backup

BackupUsing Backup OptionsChapter 5 233When to Use Load BalancingIt is recommended that you use the Load Balancing option when you want to back up a l

Page 184

BackupUsing Backup OptionsChapter 5234• Objects that reside on the client connected to the backup device have a higher priority.• Objects are selected

Page 185

BackupUsing Backup OptionsChapter 5 235• If load balancing is only selected in the template, the device options are applied only if the backup specifi

Page 186

BackupUsing Backup OptionsChapter 5236Changing the owner works only for saved backup specifications. If the backup configuration is changed and not sa

Page 187

BackupUsing Backup OptionsChapter 5 237Figure 5-30 Backup Specification Options - General and OtherAvailable Backup Specification OptionsDescriptionYo

Page 188

BackupUsing Backup OptionsChapter 5238• root on UNIX Cell Managers• the user specified at installation time on Windows Cell ManagersThe default value

Page 189

BackupUsing Backup OptionsChapter 5 239See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying post-exec commands

Page 190

xxviiHP OpenView Storage Data Protector Integration Guide for HP OpenViewThis manual describes how to install, configure, and use the integration of

Page 191 - Backing Up UNIX Systems

BackupUsing Backup OptionsChapter 5240Figure 5-31 Filesystem Options Setting the Disk Image Options1. Select the backup specification.2. Select the Op

Page 192

BackupUsing Backup OptionsChapter 5 241See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying pre-exec commands o

Page 193

BackupUsing Backup OptionsChapter 5242Figure 5-33 Object Properties - General and Trees/Filters The Object Properties window for a UNIX filesystem con

Page 194 - Backing Up Disks Using NFS

BackupUsing Backup OptionsChapter 5 243Figure 5-34 Object Properties - General and Disk Image Options 4. Set the options and click OK to confirm the s

Page 195

BackupUsing Backup OptionsChapter 5244is made. In the second traverse, only one hard link is backed up with the file contents, while all the others ar

Page 196

BackupUsing Backup OptionsChapter 5 245EncodeOpen Systems and public networking make data security in large enterprises essential. Data Protector lets

Page 197

BackupUsing Backup OptionsChapter 5246Open Files (Windows-Specific Option)This option controls what Data Protector does when it encounters open Window

Page 198 - Backing Up Windows Systems

BackupUsing Backup OptionsChapter 5 247Report Open Locked Files As (Windows-Specific Option)This option sets the report level for files that are opene

Page 199

BackupUsing Backup OptionsChapter 5248Use Shadow Copy (Windows-Specific Option)When performing filesystem backup on Windows Sever 2003 systems, Data P

Page 200

BackupUsing Backup OptionsChapter 5 249Device Backup OptionsYou can select the options listed below for each backup device in use. None of the setting

Page 201

xxviii

Page 202

BackupPre- and Post-Exec CommandsChapter 5250Pre- and Post-Exec CommandsBefore a backup or restore session begins, an additional action is sometimes n

Page 203 - Backing Up CONFIGURATION

BackupPre- and Post-Exec CommandsChapter 5 251c. The post-exec (for each object in the backup specification) starts and completes.3. The post-exec com

Page 204

BackupPre- and Post-Exec CommandsChapter 5252the filename. For scripts that are not located in the <Data_Protector_home>\bin directory, you must

Page 205

BackupPre- and Post-Exec CommandsChapter 5 253RESTARTED Set to 1 if this is a restarted backup session, otherwise set to 0. The post-exec can use th

Page 206

BackupPre- and Post-Exec CommandsChapter 5254✓ The execution of pre- and post-exec commands is implemented using the Windows pipe mechanism. All proce

Page 207

BackupPre- and Post-Exec CommandsChapter 5 255Pre- and Post-Exec Commands for a Specific Backup ObjectPre- and post-exec commands for an object are ex

Page 208

BackupPre- and Post-Exec CommandsChapter 5256NOTE If you perform a host backup, the pre-exec script is started once, before the first filesystem backu

Page 209

BackupPre- and Post-Exec CommandsChapter 5 257✓ Time-out is provided. If no message is received within the specified time-out in seconds, the session

Page 210

BackupPre- and Post-Exec CommandsChapter 5258How to Specify the Filename or Pathname?For information on how to specify the commands, refer to the onli

Page 211

BackupPre- and Post-Exec CommandsChapter 5 259Key Points Check the following before configuring pre- and post- exec commands for a backup specificatio

Page 212

xxixIn This BookThe HP OpenView Storage Data Protector Administrator’s Guide describes how to configure and use the Data Protector network backup pr

Page 213

BackupPre- and Post-Exec CommandsChapter 5260/opt/omni/lbin/utilns/detach pre_script [arguments...]• You can disable a session’s pre- and post-exec co

Page 214

BackupPre- and Post-Exec CommandsChapter 5 261Environment VariablesThe following environment variables are exported, and can be used in the pre- and p

Page 215

BackupPre- and Post-Exec CommandsChapter 5262✓ The pre- and post-exec processes operate in background mode. Therefore, do not use any interactive comm

Page 216

BackupManaging Failed BackupsChapter 5 263Managing Failed BackupsDuring a backup, some systems may not be available because they were shut down, there

Page 217

BackupManaging Failed BackupsChapter 5264The following example is a list of files that cannot be opened on an active Windows NT 4.0 system with the Wi

Page 218

BackupManaging Failed BackupsChapter 5 265If a backup of an object fails to start, Data Protector tries to back up this object again at the end of the

Page 219

BackupManaging Failed BackupsChapter 5266NOTE You can enable Wake ONLAN support for computers equipped with a Wake ONLAN-compatible LAN interface, suc

Page 220

Chapter 6 2676Restore

Page 221

RestoreIn This ChapterChapter 6268In This ChapterThis chapter describes restore topics, such as how to restore specific data and how to use restore op

Page 222

RestoreRestoring Your DataChapter 6 269Restoring Your DataA restore is a process that recreates the original data from a backup copy on a disk. This p

Page 223 - Chapter 5 193

iii©Copyright 1985-86, 1988 Massachusetts Institute of Technology©Copyright 1989-93 The Open Software Foundation, Inc.©Copyright 1986-1997 FTP Softw

Page 224

xxxOrganizationThe manual is organized as follows:Chapter 1 “Introducing Data Protector” on page 1.Chapter 2 “Configuring and Using Backup Devic

Page 225

RestoreRestoring Your DataChapter 6270• The location you want to restore data to• The device to restore from• How to handle file conflicts with existi

Page 226

RestoreRestoring Your DataChapter 6 271Figure 6-1 Selecting Data for RestoreSelecting a Backup VersionWhen selecting data that you want to restore, th

Page 227 - Chapter 5 197

RestoreRestoring Your DataChapter 6272possible options: Keep most recent, No overwrite, and Overwrite. For more information on these options, refer to

Page 228

RestoreRestoring Your DataChapter 6 273NOTE With some database integrations, you can set the changed device as a default restore device for all Data P

Page 229

RestoreRestoring Your DataChapter 6274Prerequisites You need to meet the following prerequisites in order to perform a disk image restore:• The disk m

Page 230

RestoreRestoring Your DataChapter 6 275Restoring Your Data to a Shared DiskData Protector allows you to restore UNIX and Windows data to a Windows sha

Page 231 - Backing Up OpenVMS Systems

RestoreRestoring UNIX SystemsChapter 6276Restoring UNIX SystemsWhat Is Restored? When restoring files to the original location from which the backup w

Page 232

RestoreRestoring Windows SystemsChapter 6 277Restoring Windows SystemsWhat Is Restored? When restoring a Windows filesystem, Data Protector restores t

Page 233

RestoreRestoring Windows SystemsChapter 6278Filesystem LimitationsYou can select a different target filesystem from the one where the backup was perfo

Page 234

RestoreRestoring Windows SystemsChapter 6 279Table 6-1 shows that NTFS 3.x filesystem objects can only be adequately restored to the NTFS 3.x filesyst

Page 235

Chapter 1 11 Introducing Data Protector

Page 236

RestoreRestoring Windows SystemsChapter 6280Restoring Disk Images Refer to “Restoring Disk Images” on page 273.Restoring the Windows CONFIGURATIONTo r

Page 237 - Scheduling Unattended Backups

RestoreRestoring Windows SystemsChapter 6 281• You have to boot the system in the Active Directory restore mode to restore the Active Directory.Refer

Page 238

RestoreRestoring Windows SystemsChapter 62821. System State objects that belong to CONFIGURATION. Refer to “Backing Up the Windows 2000/XP/Server 2003

Page 239 - Starting Periodic Backups

RestoreRestoring Windows SystemsChapter 6 283Once the restore session is completed, restart the system.NOTE If you select the whole Windows 2000/XP/Se

Page 240 - Editing Your Backup Schedule

RestoreRestoring Windows SystemsChapter 6284the local system account and then restart the services. Refer to “Setting the User Account for the Data Pr

Page 241

RestoreRestoring Windows SystemsChapter 6 285Remote Storage Service RestoreAlthough the RSS databases are part of System State data, you restore them

Page 242 - Running Consecutive Backups

RestoreRestoring Windows SystemsChapter 62862. To keep the restored files unmerged, you can delete the files in the newly created profile before runni

Page 243

RestoreRestoring Novell Netware FilesystemsChapter 6 287Restoring Novell Netware FilesystemsUse the standard restore procedure to restore Novell NetWa

Page 244

RestoreRestoring Novell Netware FilesystemsChapter 6288• You cannot restore Novell NetWare files that have been backed up in their compressed format t

Page 245

RestoreRestoring Novell Netware FilesystemsChapter 6 289Figure 6-6 Restoring the NetWare ConfigurationRestoring Novell NDSPrerequisites The prerequisi

Page 246 - Using Backup Templates

Introducing Data ProtectorIn This ChapterChapter 12In This ChapterThis chapter contains some general principles on how Data Protector works, covered i

Page 247

RestoreRestoring Novell Netware FilesystemsChapter 6290For Novell NDS restore you can specify how to handle conflicts between the version currently on

Page 248 - Applying a Backup Template

RestoreRestoring OpenVMS FilesystemsChapter 6 291Restoring OpenVMS FilesystemsUse the standard restore procedure to restore OpenVMS filesystems. Refer

Page 249

RestoreRestoring OpenVMS FilesystemsChapter 6292— File specifications for OpenVMS files are case insensitive.For example:An OpenVMS file specification

Page 250 - Creating a New Template

RestoreRestoring OpenVMS FilesystemsChapter 6 293Files during Restore (-lock) option is enabled or disabled.• The default device and directory for pre

Page 251 - Options” on page 225

RestoreRestore OptionsChapter 6294Restore OptionsData Protector offers a set of comprehensive restore options that allow fine-tuning of a restore. All

Page 252

RestoreRestore OptionsChapter 6 295The time on the Cell Manager and clients must be synchronized for the Omit Deleted Files option to function properl

Page 253

RestoreRestore OptionsChapter 6296Restore Sparse Files This option restores sparse files in their original compressed form. This is important because

Page 254

RestoreRestore OptionsChapter 6 297Post-Exec This option allows you to enter a command to be executed after the restore of each object is completed.

Page 255 - Using Backup Options

RestoreRestore OptionsChapter 6298User Defined Restore VariablesYou can use variables (a variable name and its value) for flexible operations on some

Page 256

RestoreRestore TechniquesChapter 6 299Restore TechniquesThe following restore techniques apply to the UNIX and Windows platforms.Restoring Files to Di

Page 257

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 3The Data Protector Cell EnvironmentThe Data Protector cell is a network enviro

Page 258

RestoreRestore TechniquesChapter 6300This capability is available for the initially selected tree node (directory) and for tree nodes that are not hie

Page 259

RestoreRestore TechniquesChapter 6 301Figure 6-8 Restoring Files in ParallelThe figure shows an example of restoring files in parallel from one medium

Page 260

RestoreRestore TechniquesChapter 6302• The catalog protection has expired. Refer to “Most Frequently Used Backup Options” on page 227 for more informa

Page 261

RestoreRestore TechniquesChapter 6 303Figure 6-9 Restore by QueryTo search for a file or a directory, you need to know at least a part of its name. Th

Page 262

RestoreRestore TechniquesChapter 6304How to Restore by QueryStart the Restore by Query task from the Restore context of the Data Protector Manager. Us

Page 263

RestoreRestore TechniquesChapter 6 305Figure 6-11 Matching Files for RestoreRestoring Files and Directories ManuallyYou need to restore a file or a di

Page 264

RestoreRestore TechniquesChapter 6306

Page 265

Chapter 7 3077 Monitoring, Reporting, Notifications, and the Event Log

Page 266

Monitoring, Reporting, Notifications, and the Event LogIn This ChapterChapter 7308In This ChapterThis chapter consists of the following sections: “Mon

Page 267

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 309Monitoring SessionsData Protector allows you to manage running

Page 268

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 14NOTE For further information on these terms, or on the principles of Data Prote

Page 269

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7310The progress and status of current sessions appear in the Result

Page 270

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 3112. Insert the needed medium into the device. If you have a libr

Page 271

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7312You can sort your sessions using the buttons on the top of each

Page 272

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 313See “Restore Options” on page 294 for information on which rest

Page 273

Monitoring, Reporting, Notifications, and the Event LogMonitoring Several Cells SimultaneouslyChapter 7314Monitoring Several Cells SimultaneouslyYou c

Page 274

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7 315Data Protector Reporting What Is Reporting?Data Protector

Page 275

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7316If no optional input parameters (optional selections) are s

Page 276

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 317Report TypesData Protector provides various types of reports, as shown

Page 277

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7318For supported formats, refer to “Report Formats” on page 329. Table 7-2

Page 278

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3191. Counted from the moment of starting the report backwards.Not Config

Page 279 - Device Backup Options

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 52. The Cell Manager determines the type of session that has been requested (re

Page 280 - Pre- and Post-Exec Commands

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7320Configuration ReportsThe following table lists the Configuration report

Page 281

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 321IDB ReportsThe following table lists the IDB reports. IDB reports prov

Page 282

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7322Purge Previewdb_purge_previewLists the following information: overall n

Page 283

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 323System Dynamicsdb_systemLists for each Data Protector client in the ce

Page 284

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7324Pools and Media ReportsThe following table lists the Pools and Media re

Page 285

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3251. The following are possible: Don’t care / Unprotected / Protected; t

Page 286

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7326Number of remaining days in which the data protection will expire, coun

Page 287

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 327Device Flowdevice_flowGraphically presents the usage of each medium. A

Page 288

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 73281. Timeframe in which the medium was used for a backup.Relative time: t

Page 289

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 329Report FormatsData Protector reports can be produced in various format

Page 290

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 16Using the Data Protector User InterfaceThere is one Data Protector user int

Page 291

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7330IMPORTANT When sending an HTML report on a Windows Cell Manager using t

Page 292

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 331Report Send MethodsReport Send MethodsReports can be sent using

Page 293 - Managing Failed Backups

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73325. In the information services list, select Microsoft Exchange S

Page 294 - Preventing Backup Failure

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 333NOTE On a UNIX Cell Manager, SNMP traps are sent to the systems

Page 295

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73346. Right-click SNMP Service and select Properties.a. Select the

Page 296 - Restarting Failed Backups

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 335Configuring Reports Using the Data

Page 297 - 6Restore

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7336Administrators can configure a repo

Page 298

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 337NOTE To trigger a report group by

Page 299 - Restoring Your Data

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Data Protector GUIChapter 7338Running Reports and R

Page 300

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 339Running Reports

Page 301

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 7Graphical User InterfaceThe Data Protector graphical user interface (GUI)

Page 302

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7340omnirpt -report s

Page 303 - Restoring Disk Images

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 341omnirpt -report

Page 304

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7342Data Protector NotificationsWhat Are Notifications?The

Page 305

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 343✓ End of Session✓ Mail Slots Full✓ Mount Request• Noti

Page 306 - Restoring UNIX Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7344Unexpected EventsNumber of Events (threshold value for

Page 307 - Restoring Windows Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 345Database Purge Needed• Days Last Purge [days])• Num. E

Page 308

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7346Explanation of Some NotificationsAlarm The Alarm notif

Page 309

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 347For more information on the Data Protector checking an

Page 310

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7348• Broadcast message send method•SNMP send method• Exter

Page 311

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3497. In the Profile Name text box, enter OmniBack, and t

Page 312

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 18xomnicellmon to start the MoM cell monitoring GUIxomnimm to start the m

Page 313

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7350Windows NT To configure Windows NT SNMP traps, proceed

Page 314

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3517. Start omnisnmp.External Send MethodExternal script

Page 315 - Restoring DFS

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7352TIP To trigger a report group by a notification, config

Page 316

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 353Configuring Reports and Notificati

Page 317 - Restrictions

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 73543. Optionally, configure a password

Page 318

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 355Generating the ReportsTo generate

Page 319 - Restoring Novell NDS

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7356Data Protector Event LogThe Data Protector Event Log repres

Page 320

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7 357When the Data Protector graphical user interface is starte

Page 321 - Restoring OpenVMS Filesystems

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7358

Page 322

Chapter 8 3598 Manager-of-Managers Environment

Page 323

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 9Elements of the Data Protector Graphical User InterfaceFor the visual repr

Page 324 - Restore Options

Manager-of-Managers EnvironmentIn This ChapterChapter 8360In This ChapterThis chapter shows you how to configure and use the Data Protector Manager-of

Page 325

Manager-of-Managers EnvironmentManager-of-ManagersChapter 8 361Manager-of-ManagersThe Data Protector Manager-of-Managers (MoM) allows administrators t

Page 326

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8362Configuring the Manager-of-ManagersTo configure the MoM environment, you

Page 327

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 363Setting Up MoM ManagerTo set up an enterprise environment, configure on

Page 328

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 83643. Enter, or browse for, the name of the Cell Manager that you want to i

Page 329 - Restore Techniques

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 365cmhaltpkg <pkg_name>where <pkg_name> is the name of the Dat

Page 330 - Restoring Files in Parallel

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8366Centralized Media Management Database (CMMDB)The IDB is an emb

Page 331 - Viewing Files Not in the IDB

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8 367NOTE A backup anywhere in the enterprise environment will not

Page 332 - Restoring by Query

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8368Configuring a Centralized Media Management DatabaseIt is

Page 333

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 369On the MoM, add one cell at a time to the CMMDB.Prerequ

Page 334 - Skipping Files for Restore

ivHP-UX Release 11.00 and later (in both 32- and 64-bit configurations) on all HP 9000 computers are Open Group UNIX 95 branded products.Netscape and

Page 335

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 110Internal Database Allows you to get information on the IDB storage capac

Page 336 - Chapter 6306

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8370TIP If you are configuring a new cell, (and you do not y

Page 337 - 7 Monitoring, Reporting

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 371• On Windows: <Data_Protector_home>\bin\omnicc -u

Page 338

Manager-of-Managers EnvironmentCentralized LicensingChapter 8372Centralized LicensingIt is not required to set up centralized licensing. Individual li

Page 339 - Monitoring Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 373On Windows: <Data_Protector_home>\config\cell\lic_serverOn UNIX: /etc/opt/omni/

Page 340 - Responding to Mount Requests

Manager-of-Managers EnvironmentCentralized LicensingChapter 8374NOTE Data Protector checks the license configuration with the MoM Manager every hour.

Page 341

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 375Moving Licenses in the MoM EnvironmentIf you have not configured centralized licensin

Page 342 - Aborting Running Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8376Deactivating Centralized LicensingCentralized licensing can be deactivated and changed

Page 343 - Chapter 7 313

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 377Working with a MoM EnvironmentThe Manager-of-Managers interface enables you

Page 344

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8378Moving Client Systems Among CellsData Protector allows you to move systems am

Page 345 - Data Protector Reporting

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 379Configuring Data Protector UsersYou can add users or user groups to a MoM en

Page 346

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 11The Command-Line InterfaceThe command-line interface (CLI) follows the st

Page 347 - Report Types

Manager-of-Managers EnvironmentRestoring, Monitoring, and Reporting in an Enterprise EnvironmentChapter 8380Restoring, Monitoring, and Reporting in an

Page 348

Chapter 9 3819 Managing the Data Protector Internal Database

Page 349

Managing the Data Protector Internal DatabaseIn This ChapterChapter 9382In This ChapterThis chapter provides information about the Data Protector inte

Page 350 - Configuration Reports

Managing the Data Protector Internal DatabaseAbout the Data Protector Internal DatabaseChapter 9 383About the Data Protector Internal DatabaseWhat Is

Page 351 - IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9384The IDB ArchitectureThe IDB consists of the following parts:• MMDB (Media

Page 352 - Table 7-4 IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 385Figure 9-1 IDB ArchitectureEach of the IDB parts stores specific Data Pr

Page 353 - Chapter 7 323

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9386• Backup sessions and restore sessions. This is the copy of the informati

Page 354 - Pools and Media Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 387For additional information on each of the IDB parts, refer to the HP Ope

Page 355

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9388Configuring the IDBThe IDB configuration helps to manage the following:• t

Page 356 - Sessions in Timeframe Reports

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 389• You need to estimate future IDB size (disk space necessary for future I

Page 357

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 112Data Protector Online ResourcesInformation about Data Protector is availab

Page 358 - Single Session Report

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9390• The filenames part of the IDB is proportional to the total number of fil

Page 359 - Report Formats

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 391• The DCBF and SMBF parts of the IDB are not required for basic operation

Page 360

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9392• If the IDB is installed in a cluster, it must be installed on disks in t

Page 361 - Report Send Methods

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 393Figure 9-2 Recommended Location of IDB DirectoriesRelocating the IDB Dire

Page 362 - SNMP Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9394NOTE On UNIX, you can use symbolic links to relocate the directories, but

Page 363

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 395• On UNIX: /opt/omni/sbin/omnisv -startIf the IDB is installed on MC/Serv

Page 364 - External Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9396Creating or Relocating DC DirectoriesCreating a DC DirectoryCreate a DC di

Page 365

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 397By default, transaction logging is disabled. If enabled, transaction logs

Page 366

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9398• On Windows: <Data_Protector_home>\bin\omnisv -start• On UNIX: /opt

Page 367

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 399• Perform the IDB backup using a separate media pool on separate media, o

Page 368 - Running Report Groups

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 13If the GUI concerned is running on Windows, the Help Navigator is dynamic

Page 369

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9400In environments where the Cell Manager is used heavily and the time needed

Page 370

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 401There are also other Data Protector reports to be considered. For example

Page 371

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9402Maintaining the IDBOnce you have configured the IDB, you need to perform I

Page 372 - Data Protector Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 403The Database Corrupted notification informs you about IDB corruption.Refe

Page 373

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9404Table 9-3 IDB Maintenance TasksSituation Which Task Can You Perform?Refere

Page 374

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 405Reducing the IDB GrowthYou can reduce the growth of the IDB by reducing t

Page 375

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9406Figure 9-6 Changing Logging Level and Catalog Protection SettingsReducing

Page 376

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 407By changing the catalog protection, you change protection in the IDB only

Page 377 - Notification Send Methods

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9408Purging Obsolete FilenamesDuring the purge process, Data Protector automat

Page 378

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 409Creating New fnames.dat FilesWhat Are fnames.dat Files?The fnames.dat fil

Page 379

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1143. In the Open text box, enter mmc to open the Microsoft Management Consol

Page 380

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9410Checking the Database SizeYou can check the current size of the IDB parts

Page 381 - Configuring Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 411Checking the Consistency of the Database Data Protector by default checks

Page 382

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9412If you run into problems using the IDB, refer to the troubleshooting secti

Page 383

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 413On Windows systems: <Data_Protector_home>\db40\msg to <Data_Prot

Page 384

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9414Restoring the IDBIf you have backed up the IDB using the standard procedure,

Page 385 - Configuring Report Groups

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9 415NOTE You should not select the <Data_Protector_home> directory, as th

Page 386 - Data Protector Event Log

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 94163. Move the existing IDB directories (db40 and config) from the <Data_Pro

Page 387

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 417Recovering the IDBWhen Is Recovery Needed?IDB recovery is needed if all or

Page 388 - Chapter 7358

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9418The Most Convenient Complete RecoveryWhen the complete IDB is missing or th

Page 389 - Environment

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 419If the transaction logs are available, the recovery procedures in Table 9-

Page 390

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 1 15Overview of Tasks to Set Up Data ProtectorAlthough configuring Data Pr

Page 391 - Manager-of-Managers

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9420You can use the IDB consistency check to determine which part of the IDB is

Page 392

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 421Performing Guided AutorecoveryGuided autorecovery is the most convenient I

Page 393 - Setting Up MoM Manager

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9422• If the IDB is installed on Microsoft Cluster Server, take the OBVS_VELOCI

Page 394 - Adding a MoM Administrator

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 423label and media pool.2. Run the omnidbutil -fixmpos command to establish c

Page 395

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9424• The catalogs created by subsequent backups are good enough.• There is no

Page 396

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 425• Verify that Data Protector is installed on the Cell Manager and the syst

Page 397

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9426-dev scsi0:0:0:0 -mahost goedl.hermes -maid 0100007f:3a486bd7:0410:0001 -po

Page 398 - Database

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 427drive letters must be assigned). If this cannot be ensured, follow the pro

Page 399

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9428• Mahost (Media Agent host)• Policy (number)A policy number can be obtained

Page 400

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 429procedure for recovering the IDB to a different disk/volume layout. You ca

Page 401

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 116• Which devices will be used, and how?• Which user groups do you want t

Page 402 - Centralized Licensing

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9430Replaying IDB Transaction Logs In a successful omnidbrestore -autorecover,

Page 403

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 431the procedure below, bring the OBVS_VELOCIS and OBVS_MCRS cluster groups o

Page 404

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 94321. In the Data Protector Manager, browse the Internal Database backup objec

Page 405

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 433Updating the IDB by Importing MediaTo successfully complete the IDB recove

Page 406

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9434

Page 407

Chapter 10 43510 Disaster Recovery

Page 408

Disaster RecoveryIn This ChapterChapter 10436In This ChapterThis chapter provides an overview of disaster recovery on Windows UNIX clients and Cell Ma

Page 409

Disaster RecoveryIntroductionChapter 10 437IntroductionThis section explains the basic terms used in the Disaster Recovery chapter. For overview and c

Page 410 - Enterprise Environment

Disaster RecoveryIntroductionChapter 1043832-bit Windows XPa/Server 2003•“Assisted Manual Disaster Recovery of a Windows System” on page 450• “Automa

Page 411 - Internal Database

Disaster RecoveryIntroductionChapter 10 439What Is a Computer Disaster?A computer disaster refers to any event that renders a computer system unbootab

Page 412

Chapter 2 172 Configuring and Using Backup Devices

Page 413

Disaster RecoveryIntroductionChapter 10440What Is a Hosting System?Hosting system is a working Data Protector client used for Disk Delivery Disaster R

Page 414 - The IDB Architecture

Disaster RecoveryIntroductionChapter 10 441• user profiles volume• Certificate Server database volume on Windows Server• Active Directory Service volu

Page 415

Disaster RecoveryIntroductionChapter 10442The Recovery ProcessThe disaster recovery process consists of 4 phases with the Phase 0 (preparation) being

Page 416

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 443Preparing for a Disaster RecoveryCarefully follow the instructions in this section to

Page 417 - Chapter 9 387

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10444On UNIX systems:• Creation of tools, such as the auxiliary disk with the minimum operat

Page 418 - Configuring the IDB

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 445On Windows, while the system is up and running, many system files cannot be replaced b

Page 419

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10446corresponding media must be added to the SRD. The SRD can be updated only on a Windows

Page 420 - Preparing for IDB Recovery

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 447Omnisrdupdate requires a session_ID to update an existing SRD file with backup object

Page 421

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10448To determine for which hostname the SRD file from the Cell Manager should be updated, u

Page 422

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 449IMPORTANT You should restrict access to SRD files due to security reasons.

Page 423

Configuring and Using Backup DevicesIn This ChapterChapter 218In This ChapterThis chapter includes information on the following topics:“Configuring Ba

Page 424

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10450Assisted Manual Disaster Recovery of a Windows SystemThe following

Page 425

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 451Requirements• The partitions have to be the same size or larger th

Page 426

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 104521. You need a Windows bootable installation CD-ROM to enable your s

Page 427

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 453\i386\tools\DRSetup (located on Data Protector installation medium

Page 428

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10454The table on the next page is an example of the preparation for the

Page 429

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 455Table 10-3client properties computer name ANDEShostname andes.comp

Page 430

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10456RecoveryFollow the procedure below to recover a Windows system usin

Page 431

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 457Other Windows SystemsIf you are recovering a Windows system other

Page 432 - Maintaining the IDB

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10458CD drives for the location of disaster recovery setup files (Dr1.ca

Page 433

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 459Disk Delivery Disaster Recovery of a Windows Client To perform the D

Page 434

Configuring and Using Backup DevicesIn This ChapterChapter 2 19NOTE Backup devices (like tape drives) are subject to specific Data Protector licenses.

Page 435 - Reducing the IDB Growth

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10460Limitations• Disk Delivery Disaster Recovery is not supported for Mic

Page 436 - Reducing the IDB Size

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 461• partitions filesystem typeYou can refer to Table 10-3 on page 455

Page 437

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10462IMPORTANT You have to assign drive letters for Windows 2000/XP/Server

Page 438 - Extending the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 463Enhanced Automated Disaster Recovery of a Windows SystemEnhance

Page 439

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10464Any remaining partitions can be recovered using the standard Dat

Page 440 - Checking the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 465• When backing up the client, the default 64 kB block size shou

Page 441

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10466Certificate Server Database are not restored automatically durin

Page 442

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 4672. In the Scoping pane, expand the Backup Specifications and th

Page 443

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10468(create it if you have not created it already). 4. In the Result

Page 444 - Restoring the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 469IMPORTANT It is recommended to restrict access to backup media,

Page 445

Contents v1. Introducing Data ProtectorIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 446

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 220Configuring Backup DevicesPreparation of a backup device consists of connecti

Page 447 - Recovering the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10470RecoveryYou need the following to successfully perform a disaste

Page 448

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 471machine <HOSTNAME> press F12, to boot from the hard disk

Page 449

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10472One Button Disaster Recovery of a Windows SystemOne Button Disaster Reco

Page 450

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 473Requirements• Data Protector Automatic Disaster Recovery and User Inter

Page 451

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10474• When backing up the client, the default 64 kB block size should be use

Page 452

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 475• One Button Disaster Recovery backup session can only be performed for

Page 453 - Filenames Part

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 104762. Click Tasks navigation tab and check One Button Disaster Recovery Wiz

Page 454 - Changed Device

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 477an OBDR backup specification to keep it in the original One Button Disa

Page 455 - -type 1

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10478device documentation.4. In the screen that appears, select the scope of

Page 456 - -daid 977824764

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 479• You have interrupted the Disaster Recovery Wizard during the 10 secon

Page 457

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 2 213. Boot the system to have the device recognized by the system.4. Configure

Page 458

Disaster RecoveryAutomated System RecoveryChapter 10480Automated System RecoveryAutomated System Recovery (ASR) is an automated system on Windows syst

Page 459

Disaster RecoveryAutomated System RecoveryChapter 10 481The following sections explain the requirements, limitations, preparation, and recovery pertai

Page 460

Disaster RecoveryAutomated System RecoveryChapter 10482Figure 10-4 Verifying the Default Block SizeLimitations• Windows XP Home Edition does not suppo

Page 461

Disaster RecoveryAutomated System RecoveryChapter 10 483• Only those local backup devices are supported, that can be installed by Windows during OS in

Page 462

Disaster RecoveryAutomated System RecoveryChapter 104843. In the HP OpenView Storage Data Protector Manager, switch to the Restore context.4. Click th

Page 463

Disaster RecoveryAutomated System RecoveryChapter 10 485installation check box to copy DR installation files to the same location. The recommended des

Page 464 - Chapter 9434

Disaster RecoveryAutomated System RecoveryChapter 10486RecoveryTo successfully perform a disaster recovery of the crashed system, you need the followi

Page 465 - 10 Disaster Recovery

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 487Restoring the Data Protector Cell Manager Specifics This section exp

Page 466

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10488• Disaster recovery CD for the Cell Manager should be prepared in adv

Page 467 - Introduction

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 489Automated System Recovery SpecificsAn additional step is required in

Page 468

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 222Figure 2-1 How Backup Specifications, Devices, and Media Pools Relate

Page 469

Disaster RecoveryAdvanced Recovery TasksChapter 10490Advanced Recovery TasksThis section provides explanation of the steps you will need to take if yo

Page 470

Disaster RecoveryAdvanced Recovery TasksChapter 10 491• all nodes• administrative virtual server (defined by the administrator)• if Data Protector is

Page 471

Disaster RecoveryAdvanced Recovery TasksChapter 10492Merging P1S files of all nodes for EADRAnother step is required for EADR after backup has been pe

Page 472

Disaster RecoveryAdvanced Recovery TasksChapter 10 493• the primary node must have write access to all IDB volumes, when recovering the Cell Manager•

Page 473 - Planning

Disaster RecoveryAdvanced Recovery TasksChapter 10494TIP To enable automatic restore of all shared disk volumes in the MSCS using OBDR method, move al

Page 474

Disaster RecoveryAdvanced Recovery TasksChapter 10 495Restoring Hard Disk Signatures On Windows The MSCS service uses a hard disk signature written i

Page 475

Disaster RecoveryAdvanced Recovery TasksChapter 10496There is no simple procedure for recovering the disk signatures on Windows NT. MSDN article Q2431

Page 476

Disaster RecoveryAdvanced Recovery TasksChapter 10 4974. The IIS Database is restored as a plain file (with the filename DisasterRecovery) into the de

Page 477

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10498Manual Disaster Recovery of an HP-UX ClientThis chapter explains the procedur

Page 478

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 499Use Ignite-UX GUI where it is supported.Using Custom Installation MediumOver

Page 479 - Chapter 10 449

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 23Configuring Standalone DevicesWhat Are Standalone Devices?Standalone dev

Page 480 - Windows System

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10500core.cfg to archive_<name>.cfg:cp /opt/ignite/data/examples/core.cfg /v

Page 481 - Preparation

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 501impacts = "/stand" 1116Kbimpacts = "/tcadm" 1Kbimpacts =

Page 482

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10502NOTE Ignite-UX enables you to create a bootable tape or CD based on the creat

Page 483

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 503Using System Recovery ToolsOverviewThe usage of the system recovery tools, b

Page 484

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10504This creates an Ignite-UX depot under /var/opt/ignite/depots/recovery_cmds, w

Page 485

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 505enough space to store the compressed archive.4. Select the volume groups you

Page 486 - Recovery

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 105063. Select Install HP-UX from the Welcome to Ignite-UX screen.4. Choose Remote

Page 487

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 507Disk Delivery Disaster Recovery of an UNIX ClientTo perform a Disk Del

Page 488

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10508• If the system that will be backed up has application processes active

Page 489

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 509single user mode:— boot -fl s to boot using already generated vmunix f

Page 490 - Limitations

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 224Figure 2-2 Specifying Device Type and Name Configuring Device ChainsData

Page 491

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10510— Consider logging out all users from the system.— Shut down all applic

Page 492

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 5114. Reconstruct the logical volume structure if applicable (for example

Page 493

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10512Manual Disaster Recovery of an UNIX Cell Manager Manual Disaster Recover

Page 494

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10 513• A device connected to the Cell Manager.Procedure The following steps

Page 495

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10514Troubleshooting Disaster Recovery on WindowsThis section provides explanatio

Page 496

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 5154. To update this new state with disaster recovery, you should perform all

Page 497

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10516Problem “No Operating System Found”Action After performing disaster recovery

Page 498

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 517<Data_Protector_home>\tmp) if improperly configured storage devices a

Page 499

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10518'System may not boot after disaster recovery.If the boot and system vol

Page 500

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 519WARNING Editing the registry incorrectly can result in failed disaster reco

Page 501

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 25Protector can immediately use media that are recognized and unprotected.

Page 502

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10520

Page 503

Chapter 11 52111 Customizing the Data Protector Environment

Page 504

Customizing the Data Protector EnvironmentIn This ChapterChapter 11522In This ChapterThis chapter describes how you can customize Data Protector to be

Page 505

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11 523Global Options FileGlobal options affect the entire Data Protector cell, an

Page 506

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11524balance number.• DailyMaintenanceTime: Determines the time after which the d

Page 507

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 525Using Omnirc OptionsThe omnirc options are most useful for troubleshooting

Page 508

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11526• OB2DEVSLEEP: Changes the sleep time between each retry while loading a de

Page 509

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 527• OB2VXDIRECT: Enables direct (without cache) reading for Advanced VxFS fi

Page 510 - Automated System Recovery

Customizing the Data Protector EnvironmentFirewall SupportChapter 11528Firewall SupportThis section describes how to configure Data Protector in an en

Page 511

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 529NOTE The OB2PORTRANGE variable only applies to dynamically allocated ports. It

Page 512

Configuring and Using Backup DevicesConfiguring File DevicesChapter 226Configuring File DevicesWhat Are File Devices?A file device is a file in a spec

Page 513

Customizing the Data Protector EnvironmentFirewall SupportChapter 11530The table below lists all possible Data Protector agent identifiers that can be

Page 514

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 531NOTE The OB2PORTRANGESPEC variable only applies to dynamically allocated ports

Page 515

Customizing the Data Protector EnvironmentFirewall SupportChapter 11532The following table provides a list of all Data Protector components. The first

Page 516

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 533When writing the firewall configuration rules, the process in the first column

Page 517 - Specifics

Customizing the Data Protector EnvironmentFirewall SupportChapter 11534Table 11-3Connecting Component Listening ComponentProcess Port Process PortCell

Page 518

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 535Examples of Configuring Data Protector in Firewall EnvironmentsThe following s

Page 519

Customizing the Data Protector EnvironmentFirewall SupportChapter 11536Figure 11-1 Configuration DiagramThe following two items define the port range

Page 520 - Advanced Recovery Tasks

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 537✓ Allow connections from the CM system to port 5555 on the MA systemThis table

Page 521

Customizing the Data Protector EnvironmentFirewall SupportChapter 11538Example 2: Disk Agent Installed Outside, Other Components Installed Inside a Fi

Page 522

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 5391. In order to determine which processes need to communicate across the firewa

Page 523

Configuring and Using Backup DevicesConfiguring File DevicesChapter 2 27You specify the capacity of a file device when you first format the medium. Wh

Page 524

Customizing the Data Protector EnvironmentFirewall SupportChapter 11540NOTE All Session Managers allocate ports from this range, not only the one comm

Page 525

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 541Figure 11-3 Configuration DiagramThe following three items define the port ran

Page 526

Customizing the Data Protector EnvironmentFirewall SupportChapter 11542This leads to the following firewall rule for the connection to the Inet listen

Page 527

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 543Port Range Settings on the Cell ManagerFor example, if there are 25 backup and

Page 528

Customizing the Data Protector EnvironmentFirewall SupportChapter 11544Figure 11-4 Configuration DiagramThe following three items define the port rang

Page 529

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 545Here, the application Agent connects to the Media Agent. However, this connect

Page 530

Customizing the Data Protector EnvironmentFirewall SupportChapter 11546one DBSM will be started. For Oracle and SAP R/3 integrations, “concurrency + 1

Page 531

Chapter 12 54712 Troubleshooting

Page 532

TroubleshootingIn This ChapterChapter 12548In This ChapterIf you have problems with Data Protector, use the suggestions in this chapter to get back on

Page 533 - Using System Recovery Tools

TroubleshootingBefore Calling Your Support RepresentativeChapter 12 549Before Calling Your Support RepresentativeIn order to speed up the process of s

Page 534

Configuring and Using Backup DevicesConfiguring File DevicesChapter 228To create a jukebox file device, specify the Jukebox device type in the Add Dev

Page 535

TroubleshootingData Protector Log FilesChapter 12550Data Protector Log FilesIf you encounter problems using the Data Protector application, you can us

Page 536

TroubleshootingData Protector Log FilesChapter 12 551Log Files and Their ContentsThe table below describes the information found in Data Protector log

Page 537

TroubleshootingData Protector Log FilesChapter 12552purge.log Contains traces of the background purge of the IDB.RDS.log Contains IDB logs. The file r

Page 538

TroubleshootingDebuggingChapter 12 553DebuggingYou should collect debugs only when the support organization requires them to resolve a technical issue

Page 539

TroubleshootingDebuggingChapter 12554Ways of DebuggingYou can start Data Protector in the debug mode in different ways and use it to generate debug tr

Page 540

TroubleshootingDebuggingChapter 12 555NOTE Before you edit the file, make a copy of it, as the changes have to be reverted when debugging is no longer

Page 541

TroubleshootingDebuggingChapter 12556Trace File NameThe debug postfix option is used for creating the trace files in the following directory:• On UNIX

Page 542 - Manager

TroubleshootingDebuggingChapter 12 557OB2DBGDIR The default location of trace files can be changed on a per system basis with the omnirc variable OB2D

Page 543

TroubleshootingDebuggingChapter 12558NOTE Use the -debug option carefully because execution traces can become quite large.CRS Debug in the Microsoft C

Page 544 - General Troubleshooting

TroubleshootingDebuggingChapter 12 559onboard_type/Adaptec xxx/... for Windows Media Agent clients.• The operating system version, for example, HP-UX

Page 545

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 29Configuring Library DevicesWhat Are Library Devices?SCSI-II library devices

Page 546 - Troubleshooting EADR and OBDR

TroubleshootingDebuggingChapter 12560Protector services on the Cell Manager and restart them without the debug option.10.Copy the files from any clien

Page 547

TroubleshootingBrowsing Troubleshooting MessagesChapter 12 561Browsing Troubleshooting MessagesData Protector provides an interactive online troublesh

Page 548 - Enter to log on using the

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12562When You Cannot Access Online TroubleshootingIf the user interface cannot be

Page 549

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12 563* Collect all log files (*.log) in <Data_Protector_home>/log directori

Page 550 - Chapter 10520

TroubleshootingDescription of Common ProblemsChapter 12564Description of Common ProblemsIf you have problems with Data Protector, find the problem are

Page 551

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 565Troubleshooting Networking and CommunicationThe section addresses the followi

Page 552

TroubleshootingTroubleshooting Networking and CommunicationChapter 12566DNS Resolution ProblemTest DNS resolution among hosts using the omnicheck comm

Page 553 - Global Options File

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 567Problem The response to the omnicheck command is:<client_1> cannot conn

Page 554

TroubleshootingTroubleshooting Networking and CommunicationChapter 12568On Windows, apply the change to the Cell Manager first.If you run the UNIX Cel

Page 555 - Using Omnirc Options

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 569Troubleshooting Data Protector Services and DaemonsThe Data Protector

Page 556 - Shared Memory Segment)

ContentsviActivating Cartridge Memory Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Disabling a Backup Device

Page 557

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 230NOTE It is not necessary to configure all drives for use with Data Protector

Page 558 - Firewall Support

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12570Changed service account properties If the service account does not have

Page 559

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 571directory and the problems should be resolved.2. Restart the services

Page 560

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12572There are several possible reasons why the Data Protector daemon has fa

Page 561 - Port Usage in Data Protector

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 573• /etc/opt/omni/options/global• /etc/opt/omni/options/users/UserList•

Page 562

TroubleshootingTroubleshooting Devices and MediaChapter 12574Troubleshooting Devices and MediaThis section describes solutions to the following proble

Page 563

TroubleshootingTroubleshooting Devices and MediaChapter 12 575Device Open ProblemThe error message Cannot open device (not owner) appears when trying

Page 564 - Table 11-3

TroubleshootingTroubleshooting Devices and MediaChapter 12576If you receive media related errors during write operations, or if the medium is marked a

Page 565 - Environments

TroubleshootingTroubleshooting Devices and MediaChapter 12 577• Log sense write report for LTO devices - total data sets processed. Media ID from tape

Page 566

TroubleshootingTroubleshooting Devices and MediaChapter 12578Action Export the medium from the IDB and restart the failed session using a different me

Page 567

TroubleshootingTroubleshooting Devices and MediaChapter 12 579For example, move the media associated with the reconfigured 9940 devices to the Default

Page 568

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 31policy, and the device file or SCSI address of the device, and also configu

Page 569

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12580Troubleshooting Backup and Restore SessionsYou may run into the following probl

Page 570

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 581No previous full backupBefore performing an incremental backup of an object, D

Page 571

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12582Action Modify the media pool policy to Appendable to enable the appending of ba

Page 572

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 583The media in the library are not formatted and the media pool with the media u

Page 573

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12584Action 1. Before you start a restore erase the disk image on the Data Protector

Page 574

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 585Data Protector Backup sessions are not started at all (UNIX-specific)Action Ru

Page 575

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12586reset by peer. It is possible that some parallel restore sessions are completed

Page 576

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 587to the <system_name.company.com>, but it cannot because it does not know

Page 577 - 12 Troubleshooting

TroubleshootingTroubleshooting Data Protector InstallationChapter 12588Troubleshooting Data Protector InstallationIf you run into problems while insta

Page 578

TroubleshootingTroubleshooting Data Protector InstallationChapter 12 589Name Resolution Problems when Installing the Windows Cell ManagerDuring the in

Page 579

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 232Configuring Libraries with Multiple Systems You can configur

Page 580 - Data Protector Log Files

TroubleshootingTroubleshooting User Interface StartupChapter 12590Troubleshooting User Interface Startup Data Protector user interface start-up proble

Page 581 - Log Files and Their Contents

TroubleshootingTroubleshooting User Interface StartupChapter 12 591Connection to a Remote System Refused on Windows or Novell NetWareThe response of t

Page 582

TroubleshootingTroubleshooting the IDBChapter 12592Troubleshooting the IDB This section provides troubleshooting for the following problems using the

Page 583 - Debugging

TroubleshootingTroubleshooting the IDBChapter 12 593• Upgrade of detail part running.The detail upgrade was started and is currently running.• Upgrade

Page 584 - Ways of Debugging

TroubleshootingTroubleshooting the IDBChapter 12594The detail upgrade runs out of memory on the system•The upgrade.log file on the Cell Manager contai

Page 585 - Debug Syntax

TroubleshootingTroubleshooting the IDBChapter 12 595Problems While Running the User InterfaceIDB is corruptedAny of the following messages can be disp

Page 586 - Trace File Name

TroubleshootingTroubleshooting the IDBChapter 12596The RDS service/process cannot be started If one or several shared library files are missing, the o

Page 587 - CRS Debug on Windows

TroubleshootingTroubleshooting the IDBChapter 12 597Temporary Directory MissingThe following temporary directories should exist on the Cell Manager:•

Page 588 - Sample Debugging

TroubleshootingTroubleshooting the IDBChapter 12598Problems During Backup and ImportThe BSM or RSM is terminated during the IDB backup or import sessi

Page 589

TroubleshootingTroubleshooting the IDBChapter 12 599• On UNIX, the Data Protector MMD (/opt/omni/lbin/mmd) is not displayed when listing the Data Prot

Page 590

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 2 33• Configure a backup. See Chapter 5, “Backup,” on page 151.

Page 591

TroubleshootingTroubleshooting the IDBChapter 12600Action Set the time interval, which will be used when browsing object versions for restore. You can

Page 592 - Troubleshooting

TroubleshootingTroubleshooting the IDBChapter 12 601with the CMMDB installed (MoM). Run this command for every Cell Manager in the MoM environment by

Page 593

TroubleshootingTroubleshooting Reporting and NotificationsChapter 12602Troubleshooting Reporting and NotificationsIf you use Outlook XP or Outlook 98/

Page 594

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12 603Troubleshooting Data Protector Online HelpData Protector online Help consists o

Page 595 - Communication

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12604not Netscape Navigator, select Custom.IMPORTANT Data Protector supports only Net

Page 596

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 605Check Whether Data Protector Functions ProperlyThe following sections prov

Page 597

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12606• Database Purge NeededFor more information on Data Protector notifications

Page 598

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 607Overview of Items to Be CheckedIn order to ensure that Data Protector is f

Page 599

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12608Check whether backups are configured properly1. Run the backup preview for

Page 600

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 609✓ Database Space Low✓ Not Enough Free Media✓ Health Check Failed✓ User Che

Page 601

Configuring and Using Backup DevicesConfiguring Magazine DevicesChapter 234Configuring Magazine DevicesWhat Are Magazine Devices?Magazine devices grou

Page 602

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12610

Page 603 - Data Protector Processes

Chapter 13 61113 Integrations with Other Applications

Page 604 - 2000/XP/Server 2003

Integrations with Other ApplicationsIn This ChapterChapter 13612In This ChapterThis chapter gives detailed information on how to integrate the followi

Page 605 - Medium Quality Statistics

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 613Cluster Integrations with Data ProtectorSee the HP OpenView

Page 606

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13614Figure 13-1 A Typical Cluster• Cluster nodes (two or more)•Lo

Page 607 - Medium Header Sanity Check

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 615all cluster nodes. Each cluster node compares this packet an

Page 608 - Protector A.05.10

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13616NOTE In MSCS environment, Cluster Service components (for exa

Page 609 - Other Common Problems

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 617Microsoft Cluster Server IntegrationAs a part of its high-availa

Page 610

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13618Cell Manager on Microsoft Cluster ServerThe Data Protector Cell M

Page 611

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 619Figure 13-2 Importing Cluster Virtual Server Hostnames to a Cell

Page 612

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 2 35Configuring Stacker DevicesWhat Are Stacker Devices?A stacker is a single d

Page 613

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13620To distinguish between local cluster node disks and shared cluste

Page 614

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 621Failover of Data ProtectorIf a failover of the cluster-aware Dat

Page 615

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13622Figure 13-3 Advanced Backup Specification Options-ClusteringDo no

Page 616 - Backup Protection Expiration

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 623Failover of Application Other Than Data ProtectorAs the Data Pro

Page 617

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13624script will be run. This is the node where Data Protector is runn

Page 618

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 625Example In the Data Protector GUI you have configured a backup s

Page 619 - Windows Cell Manager

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13626NOTE When the command is run, the elapsed time for each backup sp

Page 620

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 627MC/ServiceGuard IntegrationAs part of its high-availability support, Data

Page 621

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13628— Package IP or virtual ip-addressIn addition, you will also need to creat

Page 622 - Troubleshooting the IDB

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 629Configuring the Primary and Secondary Cell ManagersThe following sections

Page 623

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 236Backup and Restore with Stacker DevicesOnly the first medium has to be manua

Page 624

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136302. Create a logical volume for that group (for example, /dev/vg_ob2cm/lv_o

Page 625

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 631mount /dev/vg_ob2cm/lv_ob2cm /omni_shared5. Modify the /etc/opt/omni/sg/s

Page 626

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136321. On system2 set up the volume group to be imported, with the following s

Page 627 - Temporary Directory Missing

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 633/opt/omni/sbin/install/omniforsg.ksh -secondary /omni_shared5. Unmount th

Page 628

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136343. Create the directory in the /etc/cmcluster directory that will hold the

Page 629 - Performance Problems

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 635• SERVICE_NAME, SERVICE_FAIL_FAST_ENABLED , SERVICE_HALT_TIMEOUT Enter th

Page 630

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13636IMPORTANT The service name must be the same as that used in the configurat

Page 631

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 637f. Import the cluster package host name manually (for example, by using t

Page 632

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13638NOTE When using the Data Protector GUI, import each cluster package as a c

Page 633

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 639NOTE When backing up a virtual host, the object ownership will acquire th

Page 634

Configuring and Using Backup DevicesConfiguring a Library for Mixed MediaChapter 2 37Configuring a Library for Mixed MediaA mixed media library contai

Page 635 - Properly

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13640Veritas Cluster IntegrationClients on Veritas ClusterData Protector can on

Page 636

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13 6411. Install the Data Protector Disk Agent on each system with the local di

Page 637

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13642Novell NetWare Cluster IntegrationClients on Novell NetWare Cluster

Page 638

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13 6432. Configure a backup of the local system in the cluster and defin

Page 639

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13644Data Source Integration (DSI)What Is DSI? The Data Source Integration (D

Page 640 - Chapter 12610

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13 645First select which data you want to log. Data Protector provides a repo

Page 641 - Applications

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13646Application Response Measurement (ARM) IntegrationW

Page 642

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13 647The following table shows the supported ARM transa

Page 643

Integrations with Other ApplicationsManageX IntegrationChapter 13648ManageX IntegrationWhat Is the ManageX Integration?ManageX integration is supporte

Page 644

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 649Access Points for System and Management Applicat

Page 645

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 238Configuring Devices for Direct BackupThis section provides the con

Page 646

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13650checking and maintenance mechanism. For more info

Page 647

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 651Each event is marked with an Enterprise Event ID

Page 648

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13652Command-Line Interface, Graphical User Interface

Page 649

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 653To enable automatic forwarding of all Data Prote

Page 650

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13654Refer to the omnihealthcheck man page for more in

Page 651

Chapter 14 65514 ADIC/GRAU DAS and STK ACS Libraries

Page 652

ADIC/GRAU DAS and STK ACS LibrariesIn This ChapterChapter 14656In This ChapterThis chapter assumes that you have already physically configured the ADI

Page 653

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 657ADIC/GRAU DAS and STK ACS IntegrationsWho Uses the ADIC/GRAU DA

Page 654

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14658Figure 14-1 Data Protector and ADIC/GRAU DAS Library Systems Int

Page 655

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 659Configuration BasicsWhen considering your environment and the c

Page 656

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 2 39Backup Device Auto-detectionThe XCopy engine must reside on the F

Page 657 - MC/ServiceGuard Integration

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14660(added to an Data Protector media pool), it remains under Data P

Page 658

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 661Although you can change the label and exclude the barcode numbe

Page 659

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14662The ADIC/GRAU DAS Library DeviceData Protector provides full support f

Page 660

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 663• Before you configure a Data Protector ADIC/GRAU backup device, you

Page 661

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14664NOTE This applies to HP-UX and Windows.For further questions on the co

Page 662

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 665✓ A list of available drives with corresponding DAS name of the drive

Page 663

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14666At this stage, you should have your hardware connected and your DAS so

Page 664

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 667dasadmin listd [client], where [client] is the DAS Client for which t

Page 665

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14668You should see the library drives with corresponding device files disp

Page 666 - SERVICE_RESTART [0] = “-r 2”

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6692. Open the EIF-Configuration window by double-clicking the I/O unit

Page 667 - Clients on MC/ServiceGuard

Contents viiSelecting Media for Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Media Selection

Page 668

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 240Configuring Standalone DevicesRefer to the online Help index keywo

Page 669

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14670• Enter the Device Name and, below, Description.•In the Client text bo

Page 670 - Veritas Cluster Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 671Configuring the indirect access platform requires the same preparator

Page 671

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146723. In the Edit menu, click Find. The Find dialog box appears.Use the a

Page 672

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 673Adding Media to a Media PoolAdding media to a media pool registers th

Page 673

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14674The Medium Size button decides whether Data Protector will Determine t

Page 674 - Data Source Integration (DSI)

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 675Follow online Help for information on specific items in the wizard.11

Page 675

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146766. Right-click your selected slots and their media, and then click Ver

Page 676 - Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6776. Change the information that appears in the Results Area. See onlin

Page 677

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146782. In the Scoping Pane, click Devices. The list of configured devices

Page 678 - ManageX Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6791. In the HP OpenView Storage Data Protector Manager, switch to the D

Page 679

Configuring and Using Backup DevicesSupport of New DevicesChapter 2 41Support of New DevicesTo use a device that is not listed as supported in the HP

Page 680

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14680The STK ACS Library DeviceThe concepts, configuration, and installation of t

Page 681

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 681Connecting Library DrivesPhysically connect the library drives and robotics

Page 682

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14682• Data Protector has to be installed and configured. See HP OpenView Storage

Page 683 - Examples

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 683If a CAP is not in manual operating mode, change the mode using the followi

Page 684

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14684You should see the library drives with corresponding device files/SCSI addre

Page 685 - Libraries

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 685ACSSA> query cap allThe format specification of an ACS CAP has to be the

Page 686

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14686/<Data_Protector_home>/acs/ssi/ssi.sh start <ACS_LS_hostname>4.

Page 687

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 687• Follow the same steps for creating drives as in the indirect library acce

Page 688

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14688Entering MediaUse this functionality to physically enter media into an STK r

Page 689 - Media Management Basics

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 689Adding Media to a Media PoolAdding media to a media pool registers the new

Page 690

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 242Using Several Drive Types in a LibraryUsing several drive types o

Page 691

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14690The Medium Capacity button defines whether Data Protector will Determine the

Page 692 - Preparing for Installation

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 69111.Optionally, use the Medium Capacity button to define whether Data Protec

Page 693

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 146921. In the HP OpenView Storage Data Protector Manager, switch to the Devices

Page 694

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 693Moving MediaUse this function to move media from one media pool to another.

Page 695

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14694See online Help for further information. This action queries the ASCLM host

Page 696

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 695NOTE If the number of media to be removed at once exceeds fourteen, the med

Page 697

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14696Observe messages generated during the process in the Library Management wind

Page 698

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 697Troubleshooting Library Installation and Config

Page 699 - Using the Data Protector GUI

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14698(or: dasadmin dismount -d <DRIVENAME>)wher

Page 700

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 699pol 9 for STKThe default media type is DLT.

Page 701

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 2 43On Windows and UNIX systems, you can configure separate media po

Page 702

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14700

Page 703

Appendix A A-1A Further Information

Page 704

Further InformationIn This AppendixAppendix AA-2In This AppendixThis chapter gives information on the following topics:“Backing Up and Restoring UNIX

Page 705

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-3Backing Up and Restoring UNIX SpecificsThis section explains how to backup spe

Page 706

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-4If the amount of data modified on the snapped filesystem is higher than the spa

Page 707

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-5# snapping the same FS will cause the Pre-exec script to fail and# a DA to abo

Page 708

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-6# - a block special file of the snapshot FS## NOTE# In case of multiple Disk Ag

Page 709

Further InformationData Protector CommandsAppendix A A-7Data Protector CommandsFor a complete list of supported Data Protector commands, refer to the

Page 710 - The STK ACS Library Device

Further InformationPerformance ConsiderationsAppendix AA-8Performance ConsiderationsThis section gives an overview of the most common backup performan

Page 711

Further InformationPerformance ConsiderationsAppendix A A-9The speed also varies if a device-compression gets used. The achievable compression ratio d

Page 712

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 244Shared Devices in the SAN EnvironmentThis section describes some o

Page 713

Further InformationPerformance ConsiderationsAppendix AA-10• Load Balancing: This is where Data Protector dynamically determines which filesystem shou

Page 714

Further InformationPerformance ConsiderationsAppendix A A-11NOTE By default, software compression should be disabled. Software compression should only

Page 715

Further InformationPerformance ConsiderationsAppendix AA-12Image Backup Versus FilesystemIt used to be more efficient to back up images (raw volumes)

Page 716

Further InformationPerformance ConsiderationsAppendix A A-13If you suspect that the sustained data flow to the tape device is too low or that the devi

Page 717

Further InformationExample of Scheduled Eject of MediaAppendix AA-14Example of Scheduled Eject of MediaYou might want to eject all media that were use

Page 718

Further InformationExample of Scheduled Eject of MediaAppendix A A-15given in the next section. The script (HP-UX and Solaris systems) or the starting

Page 719

Further InformationExample of Scheduled Eject of MediaAppendix AA-16 $report =`"${OMNIBIN}omnimm" -eject \"$lib\" $slots`; #

Page 720

Further InformationExample of Scheduled Eject of MediaAppendix A A-17 while (($lib, $slot) = each(%List)) { $result |=&Library_Eject($li

Page 721

Further InformationExample of Scheduled Eject of MediaAppendix AA-18 if (!keys(%List)) { print "[Warning] No tape(s) to eject.\n";

Page 722

Further InformationExample of Scheduled Eject of MediaAppendix A A-19 print "[Normal] Starting eject of media that have been used in the last

Page 723

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 45Figure 2-5 Multiple System to Multiple Device Connectivity in SAN

Page 724

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-20Examples of Pre-Exec and Post-Exec Commands for UNIX The followin

Page 725

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-21elseecho "Failed to unmount the disk --> ABORTED!"e

Page 726 - Management window

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-22fiDisk Image Post-Exec: Mount a Disk After the Raw Volume Backup#

Page 727

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-23Session Post-Exec: Notify User#!/bin/sh/opt/omni/bin/omnirpt -re

Page 728

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-24then echo "Restarted backup --> backup will not be restar

Page 729 - Chapter 14 699

Further InformationDisaster Recovery: Move Kill Links on HP-UX 11.xAppendix A A-25Disaster Recovery: Move Kill Links on HP-UX 11.xProceed as shown bel

Page 730 - Chapter 14700

Further InformationCreating a libaci.o on AIXAppendix AA-26Creating a libaci.o on AIXOmniBack II A.03.10 and EarlierOn AIX, Data Protector DAS Agent u

Page 731 - A Further Information

Further InformationCreating a libaci.o on AIXAppendix A A-27#! /usr/omni/lib/libaci.aaci_initializeaci_qversionaci_initd_errnoaci_viewaci_drivestatusa

Page 732 - In This Appendix

Further InformationExample of the Package Configuration FileAppendix AA-28Example of the Package Configuration FileThis section gives an example of a

Page 733 - VxFS Snapshot

Further InformationExample of the Package Configuration FileAppendix A A-29# Enter the failover policy for this package. This policy will be used# to

Page 734

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 246Using FC-AL SANs with LIPUsing tape devices in Fibre Channel Arbit

Page 735

Further InformationExample of the Package Configuration FileAppendix AA-30# move the package back to its primary node whenever the primary node# is ca

Page 736

Further InformationExample of the Package Configuration FileAppendix A A-31# execution of each script.# Note: The HALT_SCRIPT_TIMEOUT should be greate

Page 737 - Data Protector Commands

Further InformationExample of the Package Configuration FileAppendix AA-32# specified SERVICE_HALT_TIMEOUT, the cluster software will send# out the SI

Page 738 - Performance Considerations

Further InformationExample of the Package Configuration FileAppendix A A-33# the subnets defined goes down, the package will be switched to another# n

Page 739

Further InformationExample of the Package Configuration FileAppendix AA-34# If DEFERRED is selected, ServiceGuard will not attempt to start # res

Page 740

Further InformationExample of the Package Configuration FileAppendix A A-35# for the first operator, and only < or <= may be used for the second

Page 741

Further InformationExample of the Package Configuration FileAppendix AA-36# Uncomment the following lines to specify Package Resource Dependencies.##R

Page 742

Further InformationExample of the Package Configuration FileAppendix A A-37NODE_FAIL_FAST_ENABLEDNO

Page 743

Further InformationExample of the Package Control FileAppendix AA-38Example of the Package Control FileThis section gives an example of a package cont

Page 744 - Schedule the Report Group

Further InformationExample of the Package Control FileAppendix A A-39## Uncomment the first line (VGCHANGE="vgchange -a e -q n"), and commen

Page 745

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 47Direct Library Access ConceptWith direct library access, every sy

Page 746

Further InformationExample of the Package Control FileAppendix AA-40# VG[0]=vg01# VG[1]=vg02## The volume group activation method is d

Page 747

Further InformationExample of the Package Control FileAppendix A A-41# filesystem will be fsck'd prior to being mounted. The filesystems will be

Page 748

Further InformationExample of the Package Control FileAppendix AA-42# 192.10.25.0 enter:# IP[0]=192.10.25.12 # SUBNET[0]=192.10.25.0

Page 749

Further InformationExample of the Package Control FileAppendix A A-43## SERVICE_NAME[1]=pkg1b# SERVICE_CMD[1]="/usr/bin/X11/xlo

Page 750 - Commands for UNIX

Further InformationData Protector Log Files Example EntriesAppendix AA-44Data Protector Log Files Example EntriesThis section provides some typical Da

Page 751

Further InformationData Protector Log Files Example EntriesAppendix A A-4503/02/00 09:36:51 INET.26130.0 ["/src/lib/ipc/ipc.c /main/r31_split/10

Page 752

Further InformationData Protector Log Files Example EntriesAppendix AA-465/14/01 12:41:41 PM OMNIDBUTIL.98.124 ["db/vel_cls_spec.c /main/39"

Page 753

Further InformationData Protector Log Files Example EntriesAppendix A A-4702/04/00 13:38:56 0a110210:389ac85b:3c6e:0001 "[CBF502] DLT_ARC_8"

Page 754

Further InformationData Protector Log Files Example EntriesAppendix AA-4803/15/01 12:40:43Database check error! Can not proceed with upgrade.03/15/01

Page 755 - Move Kill Links on HP-UX 11.x

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix A A-49Windows Manual Disaster Recovery Preparation TemplateThe templa

Page 756 - Creating a libaci.o on AIX

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 248This section describes how you can manually configure the library

Page 757

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix AA-50Table A-1client properties computer namehostnamedriversWindows S

Page 758

Further InformationChanging Block Size on Windows Media AgentAppendix A A-51Changing Block Size on Windows Media AgentIn order to increase the maximum

Page 759 - Appendix A A-29

Further InformationChanging Block Size on Windows Media AgentAppendix AA-52

Page 760 - Appendix AA-30

G-1Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge System Library Server (ACSLS) software that manage

Page 761 - Appendix A A-31

G-2 Glossary(disk partitioning and logical volume configuration) and automatic recovery of the original system configuration and user data that was

Page 762 - Appendix AA-32

G-3Glossaryspecified in a backup specification or an interactive session. All clients configured in one backup specification are backed up together

Page 763 - Appendix A A-33

G-4 GlossaryBC (HP StorageWorks Disk Array XP specific term)The Business Copy XP allows to maintain internal copies of HP StorageWorks Disk Array XP

Page 764 - Appendix AA-34

G-5GlossaryEMC Symmetrix SLDs that need to be protected. See also BC and BC Process.boolean operators The boolean operators for the full text search

Page 765 - Appendix A A-35

G-6 Glossaryfor purposes such as data duplication, backup, and disaster recovery. CA operations involve the main (primary) disk arrays and the remot

Page 766 - Appendix AA-36

G-7Glossaryallocate licenses to specific cells to suit your needs. See also MoM.Centralized Media Management Database (CMMDB) See CMMDB.channel (Ora

Page 767 - Appendix A A-37

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 49Figure 2-6 SAN Environment ConfigurationBecause the library is at

Page 768

G-8 Glossaryenvironment. One cell can control the robotics, serving the devices that are connected to systems in other cells.The CMMDB must reside o

Page 769 - Appendix A A-39

G-9Glossaryusers who are granted the Reporting and notifications user rights. You can view or delete all events in the Event Log.Data Protector user

Page 770 - Appendix AA-40

G-10 Glossarydelta backup A delta backup is a backup containing all the changes made to the database from the last backup of any type.See also backu

Page 771 - Appendix A A-41

G-11Glossarydirect backup A SAN-based backup solution in which data movement directly from disk to tape (or to other secondary storage) is facilitat

Page 772 - Appendix AA-42

G-12 Glossarydisk group (Veritas Volume Manager specific term)The basic unit of data storage in VxVM system. A disk group can consist of one or more

Page 773 - Appendix A A-43

G-13Glossarysystem restore along with the target operating system configuration data. It is deleted after the target system is restored to the origi

Page 774

G-14 GlossaryProtector cells which are managed and administered from a central cell using the Manager-of-Managers concept.See also MoM.EVA Agent (HP

Page 775

G-15Glossaryinterface while on the other side there are parallel SCSI ports. The bridge or multiplexer enables SCSI packets to be moved between the

Page 776

G-16 Glossaryfull database backup A backup of all data in a database regardless of whether it has changed after the last database backup was created

Page 777

G-17Glossaryhosting system A working Data Protector client used for Disk Delivery Disaster Recovery with a Data Protector Disk Agent installed.HP IT

Page 778

ContentsviiiBacking Up CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Backing Up Windows Clients U

Page 779 - Preparation Template

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 250✓ Use a lock name if the (physical) device will be used by another

Page 780

G-18 Glossaryan internal cache memory, and control and diagnostic software commonly referred to as the microcode.IDB The Data Protector Internal Dat

Page 781 -

G-19Glossarydevice during the time of the original pair split, and the data that was written to the standard device during the split is overwritten

Page 782 - Appendix AA-52

G-20 Glossarysoftware packages for a specific architecture. The Installation Server is used for remote installation of Data Protector clients. In mi

Page 783 - Glossary

G-21GlossaryLBO (EMC Symmetrix specific term)A Logical Backup Object (LBO) is an object of data storage/retrieval in the EMC Symmetrix environment.

Page 784

G-22 GlossaryThe lock name is a user specified string that is used for locking all such device configurations to prevent collision if several such d

Page 785

G-23Glossaryconnect to an operating system or software application. The password has to be the same as the password specified in the Oracle password

Page 786

G-24 GlossaryStorageWorks Disk Array XP specific term) and HP StorageWorks Disk Array XP LDEV.Manager-of-Managers (MoM) See Enterprise Cell Manager.

Page 787

G-25Glossarymedia pool A set of media of the same type (such as DDS) used and tracked as a group. Media are formatted and assigned to a media pool.m

Page 788

G-26 GlossaryMicrosoft Volume Shadow Copy service (VSS) A software service that provides a unified communication interface to coordinate backup and

Page 789

G-27GlossaryMU number (HP StorageWorks Disk Array XP specific term)A Mirror Unit number is an integer number (0, 1 or 2), used to indicate a first l

Page 790

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 51Protector then configures the device by setting up a logical name

Page 791

G-28 GlossaryOn-Bar (Informix specific term)A backup and restore system for OnLine Server. ON-Bar enables you to create a copy of your OnLine Server

Page 792

G-29GlossaryOracle instance (Oracle specific term)Each installation of an Oracle database on one or more systems. One computer system can have sever

Page 793

G-30 Glossarycalled IT/Operation, Operations Center and Vantage Point Operations.See also merging. ownership The ownership of a backup determines wh

Page 794

G-31Glossarydata for multiple objects selected for restore is read from media at the same time, thereby improving performance.parallelism The concep

Page 795

G-32 Glossarypublic folder store (MS Exchange 2000 Server specific term)The part of the Information Store that maintains information in public folde

Page 796

G-33GlossaryManager and manages the IDB. The process is started when Data Protector is installed on the Cell Manager.Recovery Catalog (Oracle specif

Page 797

G-34 Glossaryconfiguration. In bidirectional configurations, the RCU can act as an MCU.Removable Storage Management Database (Windows specific term)

Page 798

G-35Glossaryof replica storage versions that are to be kept on a disk array before the oldest replica storage version for the backup specification i

Page 799

G-36 Glossarydevice if someone has manually manipulated media without using Data Protector to eject or enter, for example.Scheduler A function that

Page 800

G-37Glossaryshared disks A Windows disk on another system that has been made available to other users on the network. Systems with shared disks can

Page 801

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 252Prerequisite Before configuring Data Protector devices in a SAN en

Page 802

G-38 Glossarysplit mirror backup (HP StorageWorks Disk Array XP specific term) See ZDB tape backup, ZDB disk/tape backup and ZDB disk backup.split m

Page 803

G-39Glossaryaddress for each backup drive connected to that client. A single SCSI entry is required for a single-drive device and multiple SCSI entr

Page 804

G-40 GlossarySymmetrix Application Programming Interface (SYMAPI) (EMC Symmetrix specific term)A linkable library of functions that can interface w

Page 805

G-41Glossaryserver is a domain controller, Active Directory directory services and the Sysvol directory are also contained in the System State data.

Page 806

G-42 GlossaryTerminal Services (Windows specific term)Windows Terminal Services provide a multi-session environment that allows clients to access a

Page 807

G-43Glossaryarchiving of transaction logs should be enabled to prevent you from losing the transaction log files that are created after the last IDB

Page 808

G-44 Glossaryvaulting media The process of storing media to a safe and remote place. The media are brought back to the data center when they are nee

Page 809

G-45Glossaryvolume mountpoint (Windows specific term)An empty directory on a volume that can be used to mount another volume. The volume mount point

Page 810

G-46 Glossarythat write persistent information on a volume. Writers also participate in the shadow copy synchronization process by assuring data con

Page 811

G-47GlossaryZDB part of the IDB (ZDB specific term)A part of the IDB, storing ZDB related information such as original and replica storage versions,

Page 812

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 53The drive naming convention shows its benefits during backup spec

Page 813

G-48 Glossary

Page 814

I-1Aabortingall sessions, 623backup session during the size determination, 312running sessions, 312sessions, elapsed time, 625sessions, using ID, 62

Page 815

IndexI-2cluster (MC/SG), 638cluster (MSCS), 619CONFIGURATION, 176DHCP Server, 178direct backup environment, 204disk image, UNIX, 166disk image, Window

Page 816

Index I-3segment size, 78shared in the SAN, 44specifying type and name, figure, 24streaming, 76used by multiple applications, locking, 46using, 17bac

Page 817

IndexI-4concepts, 3Disk Agent, 3exporting, 377importing, 377importing, MoM, 363Media Agent, 3monitoring simultaneously, 314moving clients, 378reports

Page 818

Index I-5Novell NetWare Cluster Services, 642omniclus command, 623package (MC/SG, Veritas Cluster), 615primary node, 615secondary node, 615switchover

Page 819

IndexI-6new Microsoft Exchange Profile, 348notifications, 342, 351notifications on the Web, 353notifications, using Web reporting interface, 355report

Page 820

Index I-7copying to the Web server, 354Data Source Integration, 644database See IDBbackup problems, 598import problems, 598database configuration See

Page 821

IndexI-8Disk Delivery method, 459, 507Enhanced Automated method, 463logging on after, 514One Button method, 472overview, 437Phase 0, 442Phase 1, 442Ph

Page 822

Index I-9scheduled eject, 138elapsed session time, 625e-mail send methodnotifications, 348notifications, creating a new Microsoft Exchange Profile, 3

Page 823

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 254Figure 2-7 Setting Advanced Options When you are setting the locki

Page 824

IndexI-10backing up OpenVMS, 201backing up UNIX, 161backing up Windows, 168restore limitations, 278restoring Novell NetWare, 287restoring OpenVMS, 291

Page 825

Index I-11HP-UX and Solaris clientdisaster recovery methods, 437HTML report format, 329IIDBarchitecture, 384backing up, 398backing up Windows Registr

Page 826

IndexI-12the catalog from media, 114importing media, 113in a magazine device, 115multiple, figure, 114procedure, 113Inc backups, definition, 213Inc1-9

Page 827

Index I-13limiting port range, firewall environment, 528listrestored files, 295List of Pools report, 324load balancing, 232backup option, 237local di

Page 828

IndexI-14adding to pool, 107adding unused to a media pool, 107adding used to a media pool, 107allocation policy, 103, 120appendable, 104appendable of

Page 829

Index I-15scanning media in a device, 129searching for and selecting a medium, 135selecting media for backup, 120setting data protection, 122using a

Page 830

IndexI-16MSCS See Microsoft Cluster Servermulti host support, 32multiple backup specifications, 155multiple reports, adding to the report group, 337NN

Page 831

Index I-17omit deleted files, 294omniclus, 623omnirc optionsoverview, 525usage, 525variables, 525omnirc options file, 525omnirptgenerating reports wi

Page 832

IndexI-18Disk Delivery Disaster Recovery, Windows client, 460Enhanced Disaster Recovery, Windows NT/2000 client, 466, 475for disaster recovery, 443Man

Page 833

Index I-19Enhanced Disaster Recovery, Windows NT/2000 client, 470One Button Disaster Recovery, Windows NT/2000, 477recurring backupconfiguring, 210re

Page 834

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 55Figure 2-8 Summary of Device Definitions Using Lock Names Enablin

Page 835

IndexI-20protection attributes, 296sparse files, 296target hostname, 294time attributes, 296restoringbindery, Novell NetWare, 288data to different cli

Page 836

Index I-21Scoping Pane, 10SCSI address, 29SCSI IDlibrary device, 29SCSI-II Library devicesSCSI address, 29searching for media, 135secondary node, 615

Page 837

IndexI-22pre- and post-exec commands, 250, 255Specific Event ID, 651specific object, 225specifyingpathname for a file device, figure, 28type and name

Page 838

Index I-23troubleshooting file, 562user interface, 590when the user interface not accessible, 562troubleshooting backup sessionsmount request for a l

Page 839

IndexI-24used mediaadding, 107user accountsetting for the Inet, 187User Check Failed notification, 347, 606user classdescription of access rights, 83u

Page 840

Index I-25viewingcurrently running sessions, 309details of a running session, 310files from media, 301finished sessions, 310viewsmodifying in the med

Page 841

IndexI-26XXCopy engine, 39, 204

Page 842

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 256Figure 2-9 Selecting Direct AccessManually Configuring the libtab

Page 843

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 57• <DeviceFile | SCSIPath> is the control path to the librar

Page 844

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 258Example libtab file on donatExample of the libtab file on host don

Page 845

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 59In order to share a device among multiple systems, configure one

Page 846

Contents ixPreventing Backup Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Restarting Failed B

Page 847

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 260Static Drives The drives can still be used in the standard way usi

Page 848

Configuring and Using Backup DevicesDrive CleaningChapter 2 61Drive CleaningThere are several methods for cleaning dirty drives:• Library built-in cle

Page 849

Configuring and Using Backup DevicesDrive CleaningChapter 262to store cleaning tape(s).• Detection and use of cleaning tapes depends on the system pla

Page 850

Configuring and Using Backup DevicesDrive CleaningChapter 2 631. Enable dirty drive detection. This needs to be done for all device types (standalone

Page 851

Configuring and Using Backup DevicesDrive CleaningChapter 264Where <file_name> is the name of the file you will use to simulate a dirty drive, a

Page 852

Configuring and Using Backup DevicesBusy Drive HandlingChapter 2 65Busy Drive HandlingData Protector expects drives to be empty, i.e., there should no

Page 853

Configuring and Using Backup DevicesActivating Barcode SupportChapter 266Activating Barcode SupportIf a SCSI library device uses media with barcodes,

Page 854

Configuring and Using Backup DevicesActivating Barcode SupportChapter 2 67Figure 2-10 Activating Barcode Reader Support

Page 855

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 268Activating Cartridge Memory SupportCartridge memory support can be a

Page 856 - , 39, 204

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 2 69Figure 2-11 Cartridge Memory Support Activation for a Drive

Commentaires sur ces manuels

Pas de commentaire