HP B6960-90078 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software HP B6960-90078 herunter. HP B6960-90078 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 856
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
HP OpenView Storage Data Protector
Administrator’s Guide
Manual Edition: May 2003
Manufacturing Part Number: B6960-90078
Release A.05.10
© Copyright Hewlett-Packard Development Company, L.P.2003.
Seitenansicht 0
1 2 3 4 5 6 ... 855 856

Inhaltsverzeichnis

Seite 1 - Administrator’s Guide

HP OpenView Storage Data ProtectorAdministrator’s GuideManual Edition: May 2003Manufacturing Part Number: B6960-90078Release A.05.10© Copyright Hewlet

Seite 2 - Legal Notices

Contentsx7. Monitoring, Reporting, Notifications, and the Event LogIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 3

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 270Disabling a Backup DeviceDisabling a backup device is useful when the device i

Seite 4

Configuring and Using Backup DevicesDisabling a Backup DeviceChapter 2 71Figure 2-12 Disable Device

Seite 5

Configuring and Using Backup DevicesRemoving a Backup DeviceChapter 272Removing a Backup Device By removing a backup device from the Data Protector co

Seite 6

Configuring and Using Backup DevicesRenaming a Backup DeviceChapter 2 73Renaming a Backup DeviceWhen you rename a backup device, the device is no long

Seite 7

Configuring and Using Backup DevicesDevice LockingChapter 274Device LockingInternal Locking The internal locking of backup devices prevents two Data P

Seite 8

Configuring and Using Backup DevicesDevice LockingChapter 2 75Data Protector recognizes in order to lock the device before starting backup and restore

Seite 9

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 276Device Concurrency, Segment Size, and Block SizeStreami

Seite 10 - Contents

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 77Figure 2-13 Advanced Options Dialog Box: Concurrency

Seite 11

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 278Figure 2-14 Device Properties Dialog Box: ConcurrencyCh

Seite 12

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 2 79You can change the segment size in the Advanced Option

Seite 13

Contents xiGenerating the Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Configuring Notif

Seite 14

Configuring and Using Backup DevicesDevice Concurrency, Segment Size, and Block SizeChapter 280Before changing the block size for a particular SCSI ca

Seite 15

Chapter 3 813 Configuring Users and User Groups

Seite 16

Configuring Users and User GroupsIn This ChapterChapter 382In This ChapterThis chapter explains how to configure both user groups and individual users

Seite 17

Configuring Users and User GroupsData Protector User RightsChapter 3 83Data Protector User RightsData Protector users have the user rights of the user

Seite 18

Configuring Users and User GroupsData Protector User RightsChapter 384Start backup specification Allows the user to perform a backup using a backup

Seite 19 - Printing History

Configuring Users and User GroupsData Protector User RightsChapter 3 85Start restore Allows users to restore their own data as well as monitor and a

Seite 20

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 386Predefined Data Protector User GroupsThe following default groups are

Seite 21 - Conventions

Configuring Users and User GroupsPredefined Data Protector User GroupsChapter 3 87The user rights you have set on the Cell Manager determine the avail

Seite 22

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 388Adding or Deleting a User GroupThe default Data Protector user groups are s

Seite 23 - Contact Information

Configuring Users and User GroupsAdding or Deleting a User GroupChapter 3 89Deleting a User Group1. In the Data Protector Manager, switch to the Users

Seite 24

ContentsxiiReducing the IDB Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Reducing the IDB Size

Seite 25 - Data Protector Documentation

Configuring Users and User GroupsAdding or Deleting a UserChapter 390Adding or Deleting a UserAfter the product installation, the following users are

Seite 26

Configuring Users and User GroupsAdding or Deleting a UserChapter 3 91Figure 3-2 Adding New UsersFor further information, press F1.

Seite 27

Configuring Users and User GroupsModifying a UserChapter 392Modifying a UserYou can change the properties of an existing user, or move the user from o

Seite 28

Configuring Users and User GroupsChanging User Group RightsChapter 3 93Changing User Group RightsUsers have the rights of the groups to which they bel

Seite 29 - In This Book

Configuring Users and User GroupsExample User ConfigurationsChapter 394Example User ConfigurationsThis section gives some examples of typical user con

Seite 30 - Organization

Configuring Users and User GroupsExample User ConfigurationsChapter 3 952. Add the users who will be able to configure their own backups to this user

Seite 31 - 1 Introducing Data Protector

Configuring Users and User GroupsExample User ConfigurationsChapter 396

Seite 32

Chapter 4 974 Managing Media

Seite 33

Managing MediaIn This ChapterChapter 498In This ChapterThis chapter gives detailed information on how to manage your media, including:“Overview of Dat

Seite 34 - How a Restore Session Works

Managing MediaOverview of Data Protector Media ManagementChapter 4 99Overview of Data Protector Media ManagementData Protector provides a powerful med

Seite 35

Contents xiiiPreparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460Recove

Seite 36

Managing MediaOverview of Data Protector Media ManagementChapter 4100• The ability to store information about media in a central place and share this

Seite 37 - Graphical User Interface

Managing MediaOverview of Data Protector Media ManagementChapter 4 101“Creating a Media Pool” on page 102.“Adding Media to a Media Pool” on page 107.2

Seite 38

Managing MediaCreating a Media PoolChapter 4102Creating a Media PoolWhat Is a Media Pool?A media pool represents a set of media of the same type (for

Seite 39

Managing MediaCreating a Media PoolChapter 4 103Properties of a Media PoolThis section describes the properties of a media pool. You specify them when

Seite 40

Managing MediaCreating a Media PoolChapter 4104If InitOnLoosePolicy is set to 1 (by default, it is set to 0) media that are unrecognized by Data Prote

Seite 41 - The Command-Line Interface

Managing MediaCreating a Media PoolChapter 4 105medium is used first. If additional media are needed during the same backup session, they must be free

Seite 42

Managing MediaCreating a Media PoolChapter 4106Maximum number of overwrites The usage of a medium is defined as the number of overwrites from the beg

Seite 43

Managing MediaAdding Media to a Media PoolChapter 4 107Adding Media to a Media PoolOnce you have created a media pool, you have to add the media that

Seite 44

Managing MediaFormatting MediaChapter 4108Formatting MediaWh at Is Forma tting Media?Formatting media prepares them for use with Data Protector by sa

Seite 45

Managing MediaFormatting MediaChapter 4 109How to Format MediaTo format media, browse for the specific device, media pool, or library slot in the Devi

Seite 46

ContentsxivGeneral Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514Troubleshooting Ass

Seite 47 - Chapter 2 17

Managing MediaFormatting MediaChapter 4110Figure 4-2 Cartridge Memory Reformat for Specific Slot What’s Next? Once you have formatted your media, you

Seite 48

Managing MediaFormatting MediaChapter 4 111TIP To format media used by other applications, use the Force Operation option. Data Protector protected me

Seite 49

Managing MediaFormatting MediaChapter 4112NOTE Do not rely on Data Protector to recognize other media types, as recognition depends on the platforms y

Seite 50 - Configuring Backup Devices

Managing MediaImporting MediaChapter 4 113Importing Media Importing media adds media already used by Data Protector to a media pool, without losing th

Seite 51

Managing MediaImporting MediaChapter 4114Figure 4-3 Import Multiple MediaImporting the Catalog from MediaImporting the catalog from a medium writes th

Seite 52 - Chapter 222

Managing MediaImporting MediaChapter 4 115Figure 4-4 Import CatalogImporting Media in a Magazine DeviceIf you use a device with magazine support, Data

Seite 53

Managing MediaImporting MediaChapter 4116Figure 4-5 Import MagazineHow to Import a Single Medium into a MagazineTo import a single medium into a magaz

Seite 54

Managing MediaAppending Backups to MediaChapter 4 117Appending Backups to MediaData Protector allows you to add new backups to media which already con

Seite 55

Managing MediaAppending Backups to MediaChapter 4118• Link a different pool to each client in the backup specification, or create a separate backup sp

Seite 56 - Configuring File Devices

Managing MediaUsing a Pre-Allocation List of Media for BackupChapter 4 119Using a Pre-Allocation List of Media for BackupYou can specify the order in

Seite 57

Contents xvTroubleshooting Data Protector Services and Daemons . . . . . . . . . . . . . . . . . . . . . . . 569Problems Starting Data Protector Ser

Seite 58

Managing MediaSelecting Media for BackupChapter 4120Selecting Media for BackupData Protector media management automatically selects the most appropria

Seite 59 - Configuring Library Devices

Managing MediaSelecting Media for BackupChapter 4 121Media in poor condition are not used for backup. Media in fair condition are used only if no medi

Seite 60

Managing MediaSetting Data Protection for MediaChapter 4122Setting Data Protection for MediaData Protector keeps track of data on every medium used. W

Seite 61

Managing MediaRecycling MediaChapter 4 123Recycling Media Data Protector keeps track of data on every medium used. When configuring a backup, you prot

Seite 62

Managing MediaMoving Media to Another PoolChapter 4124Moving Media to Another PoolData Protector lets you move a medium from one media pool to another

Seite 63 - Chapter 2 33

Managing MediaExporting Media from Data ProtectorChapter 4 125Exporting Media from Data ProtectorWhat Is Exporting Media?Exporting (removing) a medium

Seite 64 - Configuring Magazine Devices

Managing MediaModifying Media LocationsChapter 4126Modifying Media LocationsWhat Is a Location?The media location helps you to physically locate the m

Seite 65 - Configuring Stacker Devices

Managing MediaModifying Media DescriptionsChapter 4 127Modifying Media DescriptionsWhat Is a Description?The media description helps you identify medi

Seite 66

Managing MediaVerifying Data on a MediumChapter 4128Verifying Data on a MediumWhat Is Verifying? Verifying a medium shows whether the data on the medi

Seite 67

Managing MediaScanning Media in a DeviceChapter 4 129Scanning Media in a DeviceWhat Is Scanning? You scan a device to update Data Protector informatio

Seite 68

ContentsxviTemporary Directory Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597Problems During Backup

Seite 69 - Configuration Procedure

Managing MediaScanning Media in a DeviceChapter 4130List Cartridge Memory List Cartridge Memory, available for Cartridge Memory enabled drives, is equ

Seite 70

Managing MediaChecking the Condition of a MediumChapter 4 131Checking the Condition of a MediumData Protector allows you to view information about the

Seite 71 - Support of New Devices

Managing MediaChecking the Condition of a MediumChapter 4132Cartridge Memory ListTo view some additional information about Cartridge Memory enabled me

Seite 72

Managing MediaChecking the Condition of a MediumChapter 4 133Statuses of Media and Media PoolsMedia or media pools can have three statuses, based on t

Seite 73

Managing MediaChecking the Condition of a MediumChapter 4134Changing How Media Condition Is CalculatedWhen you add a medium to a media pool, you can d

Seite 74

Managing MediaSearching for and Selecting a MediumChapter 4 135Searching for and Selecting a MediumUse this function to locate and select specific med

Seite 75 - Chapter 2 45

Managing MediaEntering a Medium into a DeviceChapter 4136Entering a Medium into a DeviceData Protector allows you to physically enter media into a lib

Seite 76

Managing MediaEjecting a Medium from a DeviceChapter 4 137Ejecting a Medium from a DeviceData Protector allows you to physically eject media from the

Seite 77 - Configuration Overview

Managing MediaEjecting a Medium from a DeviceChapter 4138TIP Ejecting of media can be scheduled. Refer to “Scheduled Eject of Media” on page 138 for d

Seite 78

Managing MediaEjecting a Medium from a DeviceChapter 4 139If media are not removed from the mail slots after a default time span, and there are still

Seite 79

Contents xvii14. ADIC/GRAU DAS and STK ACS LibrariesIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 80

Managing MediaVaulting MediaChapter 4140Vaulting MediaWhat Is Vaulting? Vaulting is a process of moving media with important information to a safe pla

Seite 81

Managing MediaVaulting MediaChapter 4 1414. Select the media that you want to store in the vault, change the location of the media, eject the media, a

Seite 82

Managing MediaVaulting MediaChapter 41422. Take the media from a vault, enter the media in the library, and scan them.3. If the catalog protection for

Seite 83

Managing MediaCopying MediaChapter 4 143Copying MediaWhat Is Media Copying?Data Protector enables copying of backed up data to a second set of media.

Seite 84

Managing MediaCopying MediaChapter 4144NOTE When copying media, it is possible that the target medium reaches the end of the tape before the source me

Seite 85

Managing MediaCopying MediaChapter 4 145Automated Media CopyingWhat Is Automated Media Copying?Automated media copying is an automated process that cr

Seite 86

Managing MediaCopying MediaChapter 4146target medium is selected to which the data will be copied. The target media are selected from the same media p

Seite 87

Managing MediaDetection of Write-Protected MediaChapter 4 147Detection of Write-Protected MediaData Protector can detect and handle media that has bee

Seite 88

Managing MediaUsing Different Media Format TypesChapter 4148Using Different Media Format TypesData Protector recognizes and uses two different format

Seite 89

Managing MediaModifying Views in the Media Management WindowChapter 4 149Modifying Views in the Media Management WindowYou can customize the informati

Seite 90

ContentsxviiiCreating a libaci.o on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-26Example of th

Seite 91 - Drive Cleaning

Managing MediaModifying Views in the Media Management WindowChapter 4150

Seite 92

Chapter 5 1515Backup

Seite 93

BackupIn This ChapterChapter 5152In This ChapterThis chapter explains how to back up your data. It also describes some advanced Data Protector feature

Seite 94

BackupConfiguring a BackupChapter 5 153Configuring a BackupA backup is a process that creates a copy of system data on backup media. This copy is stor

Seite 95 - Busy Drive Handling

BackupConfiguring a BackupChapter 5154A backup session is based on the backup specification, and can be started interactively. During the backup sessi

Seite 96 - Activating Barcode Support

BackupConfiguring a BackupChapter 5 155Key Points • The backup type (full or incremental) is the same for the whole backup session. All data in a grou

Seite 97 - Chapter 2 67

BackupConfiguring a BackupChapter 5156Figure 5-2 Create New Backup Dialog Box5. Select what you want to back up. Figure 5-3 on page 157 shows data sou

Seite 98

BackupConfiguring a BackupChapter 5 157Figure 5-3 Source Page of the Backup Wizard 6. Select the device(s) that will be used to back up your data. See

Seite 99 - Chapter 2 69

BackupConfiguring a BackupChapter 5158Figure 5-4 Device Page of the Backup Wizard7. Select backup options. See “Using Backup Options” on page 225 for

Seite 100 - Disabling a Backup Device

BackupConfiguring a BackupChapter 5 159Figure 5-5 Backup Object Summary Page10. In the final page of the Backup wizard, you can save the backup specif

Seite 101 - Figure 2-12 Disable Device

xixPrinting HistoryThe manual printing date and part number indicate its current edition. The printing date will change when a new edition is printe

Seite 102 - Removing a Backup Device

BackupConfiguring a BackupChapter 5160Figure 5-6 Final Page of the Backup Wizard11.Click Start Backup to run the backup interactively. The Start Backu

Seite 103 - Renaming a Backup Device

BackupBacking Up UNIX SystemsChapter 5 161Backing Up UNIX SystemsYou can install a Disk Agent on every UNIX system in order to back it up. Alternative

Seite 104 - Device Locking

BackupBacking Up UNIX SystemsChapter 5162Data Protector provides a sophisticated mechanism for incremental backups. To determine which files have chan

Seite 105

BackupBacking Up UNIX SystemsChapter 5 163Backing Up Clients Using Disk DiscoveryHow Are Disks Discovered?If you specify a client backup with disk dis

Seite 106

BackupBacking Up UNIX SystemsChapter 5164Figure 5-7 Selecting an Entire Client to Be Backed Up NOTE Selecting all of the client’s drives is not the sa

Seite 107 - Chapter 2 77

BackupBacking Up UNIX SystemsChapter 5 165To back up this filesystem using NFS, follow the same procedure as if you were backing up any other filesyst

Seite 108

BackupBacking Up UNIX SystemsChapter 5166NOTE It is recommended to have root permission on mounted NFS filesystems.When to Use NFS BackupUse NFS backu

Seite 109

BackupBacking Up UNIX SystemsChapter 5 167IMPORTANT Unmount a disk before a disk image backup and mount it later. You can use pre- and post- exec comm

Seite 110

BackupBacking Up Windows SystemsChapter 5168Backing Up Windows SystemsPrerequisites You have to install a Disk Agent on at least one Windows computer

Seite 111 - 3 Configuring Users and User

BackupBacking Up Windows SystemsChapter 5 169• NTFS alternate data streams • NTFS security dataNOTE The sharing properties of a folder are not stored

Seite 112 - In This Chapter

iiLegal Notices Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of mer

Seite 114

BackupBacking Up Windows SystemsChapter 5170NTFS 3.x Filesystem FeaturesThe NTFS 3.x filesystem has introduced new file attributes and concepts, which

Seite 115

BackupBacking Up Windows SystemsChapter 5 171The advantages of the VSS filesystem backup are the following:• A computer can be backed up while applica

Seite 116

BackupBacking Up Windows SystemsChapter 5172Sparse Files Sparse files contain many zero data sets as opposed to, for example, compressed files. At bac

Seite 117

BackupBacking Up Windows SystemsChapter 5 173Figure 5-9 Specifying Objects Using Manual AddFor detailed steps, refer to the online Help index keyword

Seite 118 - Adding a User Group

BackupBacking Up Windows SystemsChapter 5174Figure 5-10 Windows NT CONFIGURATION TIP The SystemRecoveryData file is only needed for Windows disaster r

Seite 119 - Deleting a User Group

BackupBacking Up Windows SystemsChapter 5 175 See “Backing Up WINS, DHCP, and DNS” on page 178.• SysVolSysVol is a shared directory that stores the se

Seite 120 - Adding or Deleting a User

BackupBacking Up Windows SystemsChapter 5176Backing Up CONFIGURATIONOnly one CONFIGURATION backup can run on a system at the time. You have to expand

Seite 121

BackupBacking Up Windows SystemsChapter 5 177Figure 5-12 System State on Windows 2000/XP/Server 2003Backing Up the Windows Registry The database repos

Seite 122 - Modifying a User

BackupBacking Up Windows SystemsChapter 5178Figure 5-13 Backing Up the Windows RegistryBacking Up WINS, DHCP, and DNSWINS, DHCP, DNS ServersIn TCP/IP

Seite 123 - Changing User Group Rights

BackupBacking Up Windows SystemsChapter 5 179Backing Up the Windows 2000/XP/Server 2003 ServicesBacking up the Windows 2000/XP/Server 2003 services me

Seite 124 - Example User Configurations

xxiConventionsThe following typographical conventions are used in this manual.Table 2Convention Meaning ExampleItalic Book or manual titles, and man

Seite 125

BackupBacking Up Windows SystemsChapter 5180This service provides automatic distribution of events to subscribing COM+ components. To back up this dat

Seite 126 - Chapter 396

BackupBacking Up Windows SystemsChapter 5 181For example, if you use Active Directory to publish Certificate Revocation Lists (CLRs), back up the Acti

Seite 127 - 4 Managing Media

BackupBacking Up Windows SystemsChapter 5182net stop/start “Remote Storage Engine”net stop/start “Remote Storage File”The RSS databases are located in

Seite 128

BackupBacking Up Windows SystemsChapter 5 183See also “Warnings When Backing Up System Disks” on page 263. Event Logs Event logs are files where the W

Seite 129 - Management

BackupBacking Up Windows SystemsChapter 5184How to Perform a BackupTo perform a Windows client backup, you have to create a backup specification as de

Seite 130 - Media Life Cycle

BackupBacking Up Windows SystemsChapter 5 185See “Using Backup Options” on page 225 for information on using and structuring your backup specification

Seite 131

BackupBacking Up Windows SystemsChapter 5186IMPORTANT The Disk Agent client must have the Inet service configured using an account with access to the

Seite 132 - Creating a Media Pool

BackupBacking Up Windows SystemsChapter 5 1879. Enter the required information. See online Help for details.Setting the User Account for the Data Prot

Seite 133 - Properties of a Media Pool

BackupBacking Up Windows SystemsChapter 5188Figure 5-16 Inet Logon Option on Windows NT7. Click OK to return to the Services dialog box.8. Ensure that

Seite 134

BackupBacking Up Windows SystemsChapter 5 189Figure 5-17 Inet General Property Page on Windows 2000/XP/Server 20034. In the Log On As area, select the

Seite 135

xxiiData Protector provides a cross-platform (Windows and UNIX) graphical user interface. Figure 1 Data Protector Graphical User Interface

Seite 136

BackupBacking Up Windows SystemsChapter 5190Figure 5-18 Inet Logon option on Windows 2000/XP/Server 20037. Click Apply to apply the changes and then r

Seite 137 - Adding Media to a Media Pool

BackupBacking Up Windows SystemsChapter 5 191How to Specify a Disk Image SectionYou can specify a disk image section in two ways. In case of a zero do

Seite 138 - Formatting Media

BackupBacking Up Windows SystemsChapter 5192Figure 5-19 The Numbers Representing Disks (Physical Drive Number) on Windows 2000 SystemNOTE The numbers

Seite 139

BackupBacking Up Windows SystemsChapter 5 193Figure 5-20 The Manual Add Functionality

Seite 140

BackupBacking Up Novell NetWare SystemsChapter 5194Backing Up Novell NetWare SystemsThis section describes how to back up Novell NetWare filesystems a

Seite 141

BackupBacking Up Novell NetWare SystemsChapter 5 195• Trustee information• Inherited right mask• File and directory attributes• Time attributes (creat

Seite 142

BackupBacking Up Novell NetWare SystemsChapter 5196• The Compress option • The omit_deleted_files option (restore option)Files of up to 4 GB are backe

Seite 143 - Importing Media

BackupBacking Up Novell NetWare SystemsChapter 5 197Figure 5-21 Backing Up NetWare 4.x and NetWare 5.x Configuration

Seite 144

BackupBacking Up Novell NetWare SystemsChapter 5198Client Backup with Disk DiscoveryYou can discover disks (volumes) on NetWare just as you can for UN

Seite 145

BackupBacking Up Novell NetWare SystemsChapter 5 199Backing Up NetWare Directory Services (NDS) Data Protector backs up NDS using Novell NetWare Stora

Seite 146

xxiiiContact InformationGeneral InformationGeneral information about Data Protector can be found athttp://www.hp.com/go/dataprotectorTechnical Suppo

Seite 147 - Appending Backups to Media

BackupBacking Up Novell NetWare SystemsChapter 5200has its counterpart used by Data Protector, containing forward slashes, which are used for Windows

Seite 148

BackupBacking Up OpenVMS SystemsChapter 5 201Backing Up OpenVMS SystemsThis section describes how to back up OpenVMS filesystems.Backing Up OpenVMS Fi

Seite 149

BackupBacking Up OpenVMS SystemsChapter 5202Files can be backed up from mounted FILES-11 ODS-2 or ODS-5 volumes only.Limitations • Any file specificat

Seite 150 - Selecting Media for Backup

BackupBacking Up OpenVMS SystemsChapter 5 203Files with multiple directory entries are only backed up once using the primary path name. The secondary

Seite 151

BackupBacking Up in a Direct Backup EnvironmentChapter 5204Backing Up in a Direct Backup EnvironmentThis section provides the steps for the configurat

Seite 152

BackupBacking Up in a Direct Backup EnvironmentChapter 5 205• You need to have appropriate user rights for performing a backup. Refer to Chapter 3, “C

Seite 153 - Recycling Media

BackupBacking Up in a Direct Backup EnvironmentChapter 5206•rawdisks• Oracle8i databases (online)• Oracle8i databases (offline)Backing Up RawdisksPlea

Seite 154 - Moving Media to Another Pool

BackupScheduling Unattended BackupsChapter 5 207Scheduling Unattended BackupsData Protector allows you to configure unattended backups by scheduling b

Seite 155

BackupScheduling Unattended BackupsChapter 5208• Each backup specification can be scheduled multiple times with different option values. Within one ba

Seite 156 - Modifying Media Locations

BackupScheduling Unattended BackupsChapter 5 209Starting Backups on Specific DatesData Protector allows you to define the date and time when you want

Seite 158 - Verifying Data on a Medium

BackupScheduling Unattended BackupsChapter 5210Fortnightly full Data Protector runs a full backup every second Friday. Between these backups, Data Pro

Seite 159 - Scanning Media in a Device

BackupScheduling Unattended BackupsChapter 5 211To disable a backup schedule, select the Disable Schedule option in the Schedule property page. The ba

Seite 160

BackupScheduling Unattended BackupsChapter 5212Running Consecutive BackupsYou can start a backup after one is finished. For example, you can start a b

Seite 161

BackupSelecting a Backup Type: Full or IncrementalChapter 5 213Selecting a Backup Type: Full or IncrementalTo save time and media during a backup, you

Seite 162

BackupSelecting a Backup Type: Full or IncrementalChapter 5214backup. Even if the previous backup was an incremental (Incr or Incr1, Incr2, ...) backu

Seite 163

BackupSelecting a Backup Type: Full or IncrementalChapter 5 215How to Read Table 5-1• The rows in Table 5-1 are independent of each other and show dif

Seite 164

BackupUsing Backup TemplatesChapter 5216Using Backup Templates Overview Data Protector backup templates are a powerful tool that can help you simplify

Seite 165

BackupUsing Backup TemplatesChapter 5 217Figure 5-22 Options Offered by TemplatesDestination Backup device settings specified in your template apply

Seite 166

BackupUsing Backup TemplatesChapter 5218Using a Backup Template When Creating a New Backup SpecificationWhen creating a new backup specification, Data

Seite 167

BackupUsing Backup TemplatesChapter 5 219To apply a template to backup specifications, right-click the backup specification and click Apply Template.

Seite 168 - Scheduled Eject of Media

xxvData Protector DocumentationData Protector documentation comes in the form of manuals and online Help.Manuals Data Protector manuals are availabl

Seite 169

BackupUsing Backup TemplatesChapter 5220Creating a New TemplateYou can create new templates and use them for creating or modifying backup specificatio

Seite 170 - Vaulting Media

BackupUsing Backup TemplatesChapter 5 221For more information on individual options, refer to “Using Backup Options” on page 225.

Seite 171 - Moving Media to a Vault

BackupGroups of Backup SpecificationsChapter 5222Groups of Backup SpecificationsData Protector offers you the ability to organize backup specification

Seite 172

BackupGroups of Backup SpecificationsChapter 5 223Figure 5-26 Example of Backup Specification GroupsHow to View and Create GroupsThe following procedu

Seite 173 - Copying Media

BackupGroups of Backup SpecificationsChapter 5224How to Delete a GroupBefore deleting a group, you have to empty it first. One way of doing this is to

Seite 174

BackupUsing Backup OptionsChapter 5 225Using Backup OptionsData Protector offers a comprehensive set of backup options to help you fine-tune your back

Seite 175 - Automated Media Copying

BackupUsing Backup OptionsChapter 5226For split mirror and snapshot backups, the backup type is ignored (it is set to full). Data protection that is s

Seite 176

BackupUsing Backup OptionsChapter 5 227Figure 5-27 Backup OptionsMost Frequently Used Backup OptionsThis section describes the options that are most l

Seite 177

BackupUsing Backup OptionsChapter 5228Data Protection: Specifying How Long Data Is Kept on the MediaConfiguring protection policies is extremely impor

Seite 178

BackupUsing Backup OptionsChapter 5 229You can specify a different period of protection for each individual or periodic scheduled backup. The data pro

Seite 179

xxvi• HP OpenView Storage Data Protector UNIX Integration GuideThis manual describes integrations running on the UNIX operating system, such as Oracle

Seite 180 - Chapter 4150

BackupUsing Backup OptionsChapter 5230Figure 5-29 Backup Object Properties - Options: ProtectionCatalog Protection: How Long Info Is Kept in the Datab

Seite 181 - Chapter 5 151

BackupUsing Backup OptionsChapter 5 231Even when catalog protection expires, you are still able to restore, but you must specify filenames manually.Be

Seite 182

BackupUsing Backup OptionsChapter 5232The different logging level settings influence the IDB growth, backup speed, and the convenience of browsing dat

Seite 183 - Configuring a Backup

BackupUsing Backup OptionsChapter 5 233When to Use Load BalancingIt is recommended that you use the Load Balancing option when you want to back up a l

Seite 184

BackupUsing Backup OptionsChapter 5234• Objects that reside on the client connected to the backup device have a higher priority.• Objects are selected

Seite 185

BackupUsing Backup OptionsChapter 5 235• If load balancing is only selected in the template, the device options are applied only if the backup specifi

Seite 186

BackupUsing Backup OptionsChapter 5236Changing the owner works only for saved backup specifications. If the backup configuration is changed and not sa

Seite 187

BackupUsing Backup OptionsChapter 5 237Figure 5-30 Backup Specification Options - General and OtherAvailable Backup Specification OptionsDescriptionYo

Seite 188

BackupUsing Backup OptionsChapter 5238• root on UNIX Cell Managers• the user specified at installation time on Windows Cell ManagersThe default value

Seite 189

BackupUsing Backup OptionsChapter 5 239See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying post-exec commands

Seite 190

xxviiHP OpenView Storage Data Protector Integration Guide for HP OpenViewThis manual describes how to install, configure, and use the integration of

Seite 191 - Backing Up UNIX Systems

BackupUsing Backup OptionsChapter 5240Figure 5-31 Filesystem Options Setting the Disk Image Options1. Select the backup specification.2. Select the Op

Seite 192

BackupUsing Backup OptionsChapter 5 241See “Pre- and Post- Exec Commands on Windows Systems” on page 251 for details of specifying pre-exec commands o

Seite 193

BackupUsing Backup OptionsChapter 5242Figure 5-33 Object Properties - General and Trees/Filters The Object Properties window for a UNIX filesystem con

Seite 194 - Backing Up Disks Using NFS

BackupUsing Backup OptionsChapter 5 243Figure 5-34 Object Properties - General and Disk Image Options 4. Set the options and click OK to confirm the s

Seite 195

BackupUsing Backup OptionsChapter 5244is made. In the second traverse, only one hard link is backed up with the file contents, while all the others ar

Seite 196

BackupUsing Backup OptionsChapter 5 245EncodeOpen Systems and public networking make data security in large enterprises essential. Data Protector lets

Seite 197

BackupUsing Backup OptionsChapter 5246Open Files (Windows-Specific Option)This option controls what Data Protector does when it encounters open Window

Seite 198 - Backing Up Windows Systems

BackupUsing Backup OptionsChapter 5 247Report Open Locked Files As (Windows-Specific Option)This option sets the report level for files that are opene

Seite 199

BackupUsing Backup OptionsChapter 5248Use Shadow Copy (Windows-Specific Option)When performing filesystem backup on Windows Sever 2003 systems, Data P

Seite 200

BackupUsing Backup OptionsChapter 5 249Device Backup OptionsYou can select the options listed below for each backup device in use. None of the setting

Seite 202

BackupPre- and Post-Exec CommandsChapter 5250Pre- and Post-Exec CommandsBefore a backup or restore session begins, an additional action is sometimes n

Seite 203 - Backing Up CONFIGURATION

BackupPre- and Post-Exec CommandsChapter 5 251c. The post-exec (for each object in the backup specification) starts and completes.3. The post-exec com

Seite 204

BackupPre- and Post-Exec CommandsChapter 5252the filename. For scripts that are not located in the <Data_Protector_home>\bin directory, you must

Seite 205

BackupPre- and Post-Exec CommandsChapter 5 253RESTARTED Set to 1 if this is a restarted backup session, otherwise set to 0. The post-exec can use th

Seite 206

BackupPre- and Post-Exec CommandsChapter 5254✓ The execution of pre- and post-exec commands is implemented using the Windows pipe mechanism. All proce

Seite 207

BackupPre- and Post-Exec CommandsChapter 5 255Pre- and Post-Exec Commands for a Specific Backup ObjectPre- and post-exec commands for an object are ex

Seite 208

BackupPre- and Post-Exec CommandsChapter 5256NOTE If you perform a host backup, the pre-exec script is started once, before the first filesystem backu

Seite 209

BackupPre- and Post-Exec CommandsChapter 5 257✓ Time-out is provided. If no message is received within the specified time-out in seconds, the session

Seite 210

BackupPre- and Post-Exec CommandsChapter 5258How to Specify the Filename or Pathname?For information on how to specify the commands, refer to the onli

Seite 211

BackupPre- and Post-Exec CommandsChapter 5 259Key Points Check the following before configuring pre- and post- exec commands for a backup specificatio

Seite 212

xxixIn This BookThe HP OpenView Storage Data Protector Administrator’s Guide describes how to configure and use the Data Protector network backup pr

Seite 213

BackupPre- and Post-Exec CommandsChapter 5260/opt/omni/lbin/utilns/detach pre_script [arguments...]• You can disable a session’s pre- and post-exec co

Seite 214

BackupPre- and Post-Exec CommandsChapter 5 261Environment VariablesThe following environment variables are exported, and can be used in the pre- and p

Seite 215

BackupPre- and Post-Exec CommandsChapter 5262✓ The pre- and post-exec processes operate in background mode. Therefore, do not use any interactive comm

Seite 216

BackupManaging Failed BackupsChapter 5 263Managing Failed BackupsDuring a backup, some systems may not be available because they were shut down, there

Seite 217

BackupManaging Failed BackupsChapter 5264The following example is a list of files that cannot be opened on an active Windows NT 4.0 system with the Wi

Seite 218

BackupManaging Failed BackupsChapter 5 265If a backup of an object fails to start, Data Protector tries to back up this object again at the end of the

Seite 219

BackupManaging Failed BackupsChapter 5266NOTE You can enable Wake ONLAN support for computers equipped with a Wake ONLAN-compatible LAN interface, suc

Seite 220

Chapter 6 2676Restore

Seite 221

RestoreIn This ChapterChapter 6268In This ChapterThis chapter describes restore topics, such as how to restore specific data and how to use restore op

Seite 222

RestoreRestoring Your DataChapter 6 269Restoring Your DataA restore is a process that recreates the original data from a backup copy on a disk. This p

Seite 223 - Chapter 5 193

iii©Copyright 1985-86, 1988 Massachusetts Institute of Technology©Copyright 1989-93 The Open Software Foundation, Inc.©Copyright 1986-1997 FTP Softw

Seite 224

xxxOrganizationThe manual is organized as follows:Chapter 1 “Introducing Data Protector” on page 1.Chapter 2 “Configuring and Using Backup Devic

Seite 225

RestoreRestoring Your DataChapter 6270• The location you want to restore data to• The device to restore from• How to handle file conflicts with existi

Seite 226

RestoreRestoring Your DataChapter 6 271Figure 6-1 Selecting Data for RestoreSelecting a Backup VersionWhen selecting data that you want to restore, th

Seite 227 - Chapter 5 197

RestoreRestoring Your DataChapter 6272possible options: Keep most recent, No overwrite, and Overwrite. For more information on these options, refer to

Seite 228

RestoreRestoring Your DataChapter 6 273NOTE With some database integrations, you can set the changed device as a default restore device for all Data P

Seite 229

RestoreRestoring Your DataChapter 6274Prerequisites You need to meet the following prerequisites in order to perform a disk image restore:• The disk m

Seite 230

RestoreRestoring Your DataChapter 6 275Restoring Your Data to a Shared DiskData Protector allows you to restore UNIX and Windows data to a Windows sha

Seite 231 - Backing Up OpenVMS Systems

RestoreRestoring UNIX SystemsChapter 6276Restoring UNIX SystemsWhat Is Restored? When restoring files to the original location from which the backup w

Seite 232

RestoreRestoring Windows SystemsChapter 6 277Restoring Windows SystemsWhat Is Restored? When restoring a Windows filesystem, Data Protector restores t

Seite 233

RestoreRestoring Windows SystemsChapter 6278Filesystem LimitationsYou can select a different target filesystem from the one where the backup was perfo

Seite 234

RestoreRestoring Windows SystemsChapter 6 279Table 6-1 shows that NTFS 3.x filesystem objects can only be adequately restored to the NTFS 3.x filesyst

Seite 235

Chapter 1 11 Introducing Data Protector

Seite 236

RestoreRestoring Windows SystemsChapter 6280Restoring Disk Images Refer to “Restoring Disk Images” on page 273.Restoring the Windows CONFIGURATIONTo r

Seite 237 - Scheduling Unattended Backups

RestoreRestoring Windows SystemsChapter 6 281• You have to boot the system in the Active Directory restore mode to restore the Active Directory.Refer

Seite 238

RestoreRestoring Windows SystemsChapter 62821. System State objects that belong to CONFIGURATION. Refer to “Backing Up the Windows 2000/XP/Server 2003

Seite 239 - Starting Periodic Backups

RestoreRestoring Windows SystemsChapter 6 283Once the restore session is completed, restart the system.NOTE If you select the whole Windows 2000/XP/Se

Seite 240 - Editing Your Backup Schedule

RestoreRestoring Windows SystemsChapter 6284the local system account and then restart the services. Refer to “Setting the User Account for the Data Pr

Seite 241

RestoreRestoring Windows SystemsChapter 6 285Remote Storage Service RestoreAlthough the RSS databases are part of System State data, you restore them

Seite 242 - Running Consecutive Backups

RestoreRestoring Windows SystemsChapter 62862. To keep the restored files unmerged, you can delete the files in the newly created profile before runni

Seite 243

RestoreRestoring Novell Netware FilesystemsChapter 6 287Restoring Novell Netware FilesystemsUse the standard restore procedure to restore Novell NetWa

Seite 244

RestoreRestoring Novell Netware FilesystemsChapter 6288• You cannot restore Novell NetWare files that have been backed up in their compressed format t

Seite 245

RestoreRestoring Novell Netware FilesystemsChapter 6 289Figure 6-6 Restoring the NetWare ConfigurationRestoring Novell NDSPrerequisites The prerequisi

Seite 246 - Using Backup Templates

Introducing Data ProtectorIn This ChapterChapter 12In This ChapterThis chapter contains some general principles on how Data Protector works, covered i

Seite 247

RestoreRestoring Novell Netware FilesystemsChapter 6290For Novell NDS restore you can specify how to handle conflicts between the version currently on

Seite 248 - Applying a Backup Template

RestoreRestoring OpenVMS FilesystemsChapter 6 291Restoring OpenVMS FilesystemsUse the standard restore procedure to restore OpenVMS filesystems. Refer

Seite 249

RestoreRestoring OpenVMS FilesystemsChapter 6292— File specifications for OpenVMS files are case insensitive.For example:An OpenVMS file specification

Seite 250 - Creating a New Template

RestoreRestoring OpenVMS FilesystemsChapter 6 293Files during Restore (-lock) option is enabled or disabled.• The default device and directory for pre

Seite 251 - Options” on page 225

RestoreRestore OptionsChapter 6294Restore OptionsData Protector offers a set of comprehensive restore options that allow fine-tuning of a restore. All

Seite 252

RestoreRestore OptionsChapter 6 295The time on the Cell Manager and clients must be synchronized for the Omit Deleted Files option to function properl

Seite 253

RestoreRestore OptionsChapter 6296Restore Sparse Files This option restores sparse files in their original compressed form. This is important because

Seite 254

RestoreRestore OptionsChapter 6 297Post-Exec This option allows you to enter a command to be executed after the restore of each object is completed.

Seite 255 - Using Backup Options

RestoreRestore OptionsChapter 6298User Defined Restore VariablesYou can use variables (a variable name and its value) for flexible operations on some

Seite 256

RestoreRestore TechniquesChapter 6 299Restore TechniquesThe following restore techniques apply to the UNIX and Windows platforms.Restoring Files to Di

Seite 257

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 3The Data Protector Cell EnvironmentThe Data Protector cell is a network enviro

Seite 258

RestoreRestore TechniquesChapter 6300This capability is available for the initially selected tree node (directory) and for tree nodes that are not hie

Seite 259

RestoreRestore TechniquesChapter 6 301Figure 6-8 Restoring Files in ParallelThe figure shows an example of restoring files in parallel from one medium

Seite 260

RestoreRestore TechniquesChapter 6302• The catalog protection has expired. Refer to “Most Frequently Used Backup Options” on page 227 for more informa

Seite 261

RestoreRestore TechniquesChapter 6 303Figure 6-9 Restore by QueryTo search for a file or a directory, you need to know at least a part of its name. Th

Seite 262

RestoreRestore TechniquesChapter 6304How to Restore by QueryStart the Restore by Query task from the Restore context of the Data Protector Manager. Us

Seite 263

RestoreRestore TechniquesChapter 6 305Figure 6-11 Matching Files for RestoreRestoring Files and Directories ManuallyYou need to restore a file or a di

Seite 264

RestoreRestore TechniquesChapter 6306

Seite 265

Chapter 7 3077 Monitoring, Reporting, Notifications, and the Event Log

Seite 266

Monitoring, Reporting, Notifications, and the Event LogIn This ChapterChapter 7308In This ChapterThis chapter consists of the following sections: “Mon

Seite 267

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 309Monitoring SessionsData Protector allows you to manage running

Seite 268

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 14NOTE For further information on these terms, or on the principles of Data Prote

Seite 269

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7310The progress and status of current sessions appear in the Result

Seite 270

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 3112. Insert the needed medium into the device. If you have a libr

Seite 271

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7312You can sort your sessions using the buttons on the top of each

Seite 272

Monitoring, Reporting, Notifications, and the Event LogMonitoring SessionsChapter 7 313See “Restore Options” on page 294 for information on which rest

Seite 273

Monitoring, Reporting, Notifications, and the Event LogMonitoring Several Cells SimultaneouslyChapter 7314Monitoring Several Cells SimultaneouslyYou c

Seite 274

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7 315Data Protector Reporting What Is Reporting?Data Protector

Seite 275

Monitoring, Reporting, Notifications, and the Event LogData Protector ReportingChapter 7316If no optional input parameters (optional selections) are s

Seite 276

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 317Report TypesData Protector provides various types of reports, as shown

Seite 277

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7318For supported formats, refer to “Report Formats” on page 329. Table 7-2

Seite 278

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3191. Counted from the moment of starting the report backwards.Not Config

Seite 279 - Device Backup Options

Introducing Data ProtectorThe Data Protector Cell EnvironmentChapter 1 52. The Cell Manager determines the type of session that has been requested (re

Seite 280 - Pre- and Post-Exec Commands

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7320Configuration ReportsThe following table lists the Configuration report

Seite 281

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 321IDB ReportsThe following table lists the IDB reports. IDB reports prov

Seite 282

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7322Purge Previewdb_purge_previewLists the following information: overall n

Seite 283

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 323System Dynamicsdb_systemLists for each Data Protector client in the ce

Seite 284

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7324Pools and Media ReportsThe following table lists the Pools and Media re

Seite 285

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 3251. The following are possible: Don’t care / Unprotected / Protected; t

Seite 286

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7326Number of remaining days in which the data protection will expire, coun

Seite 287

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 327Device Flowdevice_flowGraphically presents the usage of each medium. A

Seite 288

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 73281. Timeframe in which the medium was used for a backup.Relative time: t

Seite 289

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7 329Report FormatsData Protector reports can be produced in various format

Seite 290

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 16Using the Data Protector User InterfaceThere is one Data Protector user int

Seite 291

Monitoring, Reporting, Notifications, and the Event LogReport TypesChapter 7330IMPORTANT When sending an HTML report on a Windows Cell Manager using t

Seite 292

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 331Report Send MethodsReport Send MethodsReports can be sent using

Seite 293 - Managing Failed Backups

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73325. In the information services list, select Microsoft Exchange S

Seite 294 - Preventing Backup Failure

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 7 333NOTE On a UNIX Cell Manager, SNMP traps are sent to the systems

Seite 295

Monitoring, Reporting, Notifications, and the Event LogReport Send MethodsChapter 73346. Right-click SNMP Service and select Properties.a. Select the

Seite 296 - Restarting Failed Backups

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 335Configuring Reports Using the Data

Seite 297 - 6Restore

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7336Administrators can configure a repo

Seite 298

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports Using the Data Protector GUIChapter 7 337NOTE To trigger a report group by

Seite 299 - Restoring Your Data

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Data Protector GUIChapter 7338Running Reports and R

Seite 300

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 339Running Reports

Seite 301

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 7Graphical User InterfaceThe Data Protector graphical user interface (GUI)

Seite 302

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7340omnirpt -report s

Seite 303 - Restoring Disk Images

Monitoring, Reporting, Notifications, and the Event LogRunning Reports and Report Groups Using the Command-Line InterfaceChapter 7 341omnirpt -report

Seite 304

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7342Data Protector NotificationsWhat Are Notifications?The

Seite 305

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 343✓ End of Session✓ Mail Slots Full✓ Mount Request• Noti

Seite 306 - Restoring UNIX Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7344Unexpected EventsNumber of Events (threshold value for

Seite 307 - Restoring Windows Systems

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 345Database Purge Needed• Days Last Purge [days])• Num. E

Seite 308

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7346Explanation of Some NotificationsAlarm The Alarm notif

Seite 309

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 347For more information on the Data Protector checking an

Seite 310

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7348• Broadcast message send method•SNMP send method• Exter

Seite 311

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3497. In the Profile Name text box, enter OmniBack, and t

Seite 312

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 18xomnicellmon to start the MoM cell monitoring GUIxomnimm to start the m

Seite 313

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7350Windows NT To configure Windows NT SNMP traps, proceed

Seite 314

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7 3517. Start omnisnmp.External Send MethodExternal script

Seite 315 - Restoring DFS

Monitoring, Reporting, Notifications, and the Event LogData Protector NotificationsChapter 7352TIP To trigger a report group by a notification, config

Seite 316

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 353Configuring Reports and Notificati

Seite 317 - Restrictions

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 73543. Optionally, configure a password

Seite 318

Monitoring, Reporting, Notifications, and the Event LogConfiguring Reports and Notifications on the WebChapter 7 355Generating the ReportsTo generate

Seite 319 - Restoring Novell NDS

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7356Data Protector Event LogThe Data Protector Event Log repres

Seite 320

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7 357When the Data Protector graphical user interface is starte

Seite 321 - Restoring OpenVMS Filesystems

Monitoring, Reporting, Notifications, and the Event LogData Protector Event LogChapter 7358

Seite 322

Chapter 8 3598 Manager-of-Managers Environment

Seite 323

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 9Elements of the Data Protector Graphical User InterfaceFor the visual repr

Seite 324 - Restore Options

Manager-of-Managers EnvironmentIn This ChapterChapter 8360In This ChapterThis chapter shows you how to configure and use the Data Protector Manager-of

Seite 325

Manager-of-Managers EnvironmentManager-of-ManagersChapter 8 361Manager-of-ManagersThe Data Protector Manager-of-Managers (MoM) allows administrators t

Seite 326

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8362Configuring the Manager-of-ManagersTo configure the MoM environment, you

Seite 327

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 363Setting Up MoM ManagerTo set up an enterprise environment, configure on

Seite 328

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 83643. Enter, or browse for, the name of the Cell Manager that you want to i

Seite 329 - Restore Techniques

Manager-of-Managers EnvironmentConfiguring the Manager-of-ManagersChapter 8 365cmhaltpkg <pkg_name>where <pkg_name> is the name of the Dat

Seite 330 - Restoring Files in Parallel

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8366Centralized Media Management Database (CMMDB)The IDB is an emb

Seite 331 - Viewing Files Not in the IDB

Manager-of-Managers EnvironmentCentralized Media Management Database (CMMDB)Chapter 8 367NOTE A backup anywhere in the enterprise environment will not

Seite 332 - Restoring by Query

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8368Configuring a Centralized Media Management DatabaseIt is

Seite 333

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 369On the MoM, add one cell at a time to the CMMDB.Prerequ

Seite 334 - Skipping Files for Restore

ivHP-UX Release 11.00 and later (in both 32- and 64-bit configurations) on all HP 9000 computers are Open Group UNIX 95 branded products.Netscape and

Seite 335

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 110Internal Database Allows you to get information on the IDB storage capac

Seite 336 - Chapter 6306

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8370TIP If you are configuring a new cell, (and you do not y

Seite 337 - 7 Monitoring, Reporting

Manager-of-Managers EnvironmentConfiguring a Centralized Media Management DatabaseChapter 8 371• On Windows: <Data_Protector_home>\bin\omnicc -u

Seite 338

Manager-of-Managers EnvironmentCentralized LicensingChapter 8372Centralized LicensingIt is not required to set up centralized licensing. Individual li

Seite 339 - Monitoring Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 373On Windows: <Data_Protector_home>\config\cell\lic_serverOn UNIX: /etc/opt/omni/

Seite 340 - Responding to Mount Requests

Manager-of-Managers EnvironmentCentralized LicensingChapter 8374NOTE Data Protector checks the license configuration with the MoM Manager every hour.

Seite 341

Manager-of-Managers EnvironmentCentralized LicensingChapter 8 375Moving Licenses in the MoM EnvironmentIf you have not configured centralized licensin

Seite 342 - Aborting Running Sessions

Manager-of-Managers EnvironmentCentralized LicensingChapter 8376Deactivating Centralized LicensingCentralized licensing can be deactivated and changed

Seite 343 - Chapter 7 313

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 377Working with a MoM EnvironmentThe Manager-of-Managers interface enables you

Seite 344

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8378Moving Client Systems Among CellsData Protector allows you to move systems am

Seite 345 - Data Protector Reporting

Manager-of-Managers EnvironmentWorking with a MoM EnvironmentChapter 8 379Configuring Data Protector UsersYou can add users or user groups to a MoM en

Seite 346

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 11The Command-Line InterfaceThe command-line interface (CLI) follows the st

Seite 347 - Report Types

Manager-of-Managers EnvironmentRestoring, Monitoring, and Reporting in an Enterprise EnvironmentChapter 8380Restoring, Monitoring, and Reporting in an

Seite 348

Chapter 9 3819 Managing the Data Protector Internal Database

Seite 349

Managing the Data Protector Internal DatabaseIn This ChapterChapter 9382In This ChapterThis chapter provides information about the Data Protector inte

Seite 350 - Configuration Reports

Managing the Data Protector Internal DatabaseAbout the Data Protector Internal DatabaseChapter 9 383About the Data Protector Internal DatabaseWhat Is

Seite 351 - IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9384The IDB ArchitectureThe IDB consists of the following parts:• MMDB (Media

Seite 352 - Table 7-4 IDB Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 385Figure 9-1 IDB ArchitectureEach of the IDB parts stores specific Data Pr

Seite 353 - Chapter 7 323

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9386• Backup sessions and restore sessions. This is the copy of the informati

Seite 354 - Pools and Media Reports

Managing the Data Protector Internal DatabaseThe IDB ArchitectureChapter 9 387For additional information on each of the IDB parts, refer to the HP Ope

Seite 355

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9388Configuring the IDBThe IDB configuration helps to manage the following:• t

Seite 356 - Sessions in Timeframe Reports

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 389• You need to estimate future IDB size (disk space necessary for future I

Seite 357

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 112Data Protector Online ResourcesInformation about Data Protector is availab

Seite 358 - Single Session Report

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9390• The filenames part of the IDB is proportional to the total number of fil

Seite 359 - Report Formats

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 391• The DCBF and SMBF parts of the IDB are not required for basic operation

Seite 360

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9392• If the IDB is installed in a cluster, it must be installed on disks in t

Seite 361 - Report Send Methods

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 393Figure 9-2 Recommended Location of IDB DirectoriesRelocating the IDB Dire

Seite 362 - SNMP Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9394NOTE On UNIX, you can use symbolic links to relocate the directories, but

Seite 363

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 395• On UNIX: /opt/omni/sbin/omnisv -startIf the IDB is installed on MC/Serv

Seite 364 - External Send Method

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9396Creating or Relocating DC DirectoriesCreating a DC DirectoryCreate a DC di

Seite 365

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 397By default, transaction logging is disabled. If enabled, transaction logs

Seite 366

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9398• On Windows: <Data_Protector_home>\bin\omnisv -start• On UNIX: /opt

Seite 367

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 399• Perform the IDB backup using a separate media pool on separate media, o

Seite 368 - Running Report Groups

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1 13If the GUI concerned is running on Windows, the Help Navigator is dynamic

Seite 369

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9400In environments where the Cell Manager is used heavily and the time needed

Seite 370

Managing the Data Protector Internal DatabaseConfiguring the IDBChapter 9 401There are also other Data Protector reports to be considered. For example

Seite 371

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9402Maintaining the IDBOnce you have configured the IDB, you need to perform I

Seite 372 - Data Protector Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 403The Database Corrupted notification informs you about IDB corruption.Refe

Seite 373

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9404Table 9-3 IDB Maintenance TasksSituation Which Task Can You Perform?Refere

Seite 374

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 405Reducing the IDB GrowthYou can reduce the growth of the IDB by reducing t

Seite 375

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9406Figure 9-6 Changing Logging Level and Catalog Protection SettingsReducing

Seite 376

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 407By changing the catalog protection, you change protection in the IDB only

Seite 377 - Notification Send Methods

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9408Purging Obsolete FilenamesDuring the purge process, Data Protector automat

Seite 378

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 409Creating New fnames.dat FilesWhat Are fnames.dat Files?The fnames.dat fil

Seite 379

Introducing Data ProtectorUsing the Data Protector User InterfaceChapter 1143. In the Open text box, enter mmc to open the Microsoft Management Consol

Seite 380

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9410Checking the Database SizeYou can check the current size of the IDB parts

Seite 381 - Configuring Notifications

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 411Checking the Consistency of the Database Data Protector by default checks

Seite 382

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9412If you run into problems using the IDB, refer to the troubleshooting secti

Seite 383

Managing the Data Protector Internal DatabaseMaintaining the IDBChapter 9 413On Windows systems: <Data_Protector_home>\db40\msg to <Data_Prot

Seite 384

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9414Restoring the IDBIf you have backed up the IDB using the standard procedure,

Seite 385 - Configuring Report Groups

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 9 415NOTE You should not select the <Data_Protector_home> directory, as th

Seite 386 - Data Protector Event Log

Managing the Data Protector Internal DatabaseRestoring the IDBChapter 94163. Move the existing IDB directories (db40 and config) from the <Data_Pro

Seite 387

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 417Recovering the IDBWhen Is Recovery Needed?IDB recovery is needed if all or

Seite 388 - Chapter 7358

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9418The Most Convenient Complete RecoveryWhen the complete IDB is missing or th

Seite 389 - Environment

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 419If the transaction logs are available, the recovery procedures in Table 9-

Seite 390

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 1 15Overview of Tasks to Set Up Data ProtectorAlthough configuring Data Pr

Seite 391 - Manager-of-Managers

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9420You can use the IDB consistency check to determine which part of the IDB is

Seite 392

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 421Performing Guided AutorecoveryGuided autorecovery is the most convenient I

Seite 393 - Setting Up MoM Manager

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9422• If the IDB is installed on Microsoft Cluster Server, take the OBVS_VELOCI

Seite 394 - Adding a MoM Administrator

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 423label and media pool.2. Run the omnidbutil -fixmpos command to establish c

Seite 395

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9424• The catalogs created by subsequent backups are good enough.• There is no

Seite 396

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 425• Verify that Data Protector is installed on the Cell Manager and the syst

Seite 397

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9426-dev scsi0:0:0:0 -mahost goedl.hermes -maid 0100007f:3a486bd7:0410:0001 -po

Seite 398 - Database

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 427drive letters must be assigned). If this cannot be ensured, follow the pro

Seite 399

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9428• Mahost (Media Agent host)• Policy (number)A policy number can be obtained

Seite 400

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 429procedure for recovering the IDB to a different disk/volume layout. You ca

Seite 401

Introducing Data ProtectorOverview of Tasks to Set Up Data ProtectorChapter 116• Which devices will be used, and how?• Which user groups do you want t

Seite 402 - Centralized Licensing

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9430Replaying IDB Transaction Logs In a successful omnidbrestore -autorecover,

Seite 403

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 431the procedure below, bring the OBVS_VELOCIS and OBVS_MCRS cluster groups o

Seite 404

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 94321. In the Data Protector Manager, browse the Internal Database backup objec

Seite 405

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9 433Updating the IDB by Importing MediaTo successfully complete the IDB recove

Seite 406

Managing the Data Protector Internal DatabaseRecovering the IDBChapter 9434

Seite 407

Chapter 10 43510 Disaster Recovery

Seite 408

Disaster RecoveryIn This ChapterChapter 10436In This ChapterThis chapter provides an overview of disaster recovery on Windows UNIX clients and Cell Ma

Seite 409

Disaster RecoveryIntroductionChapter 10 437IntroductionThis section explains the basic terms used in the Disaster Recovery chapter. For overview and c

Seite 410 - Enterprise Environment

Disaster RecoveryIntroductionChapter 1043832-bit Windows XPa/Server 2003•“Assisted Manual Disaster Recovery of a Windows System” on page 450• “Automa

Seite 411 - Internal Database

Disaster RecoveryIntroductionChapter 10 439What Is a Computer Disaster?A computer disaster refers to any event that renders a computer system unbootab

Seite 412

Chapter 2 172 Configuring and Using Backup Devices

Seite 413

Disaster RecoveryIntroductionChapter 10440What Is a Hosting System?Hosting system is a working Data Protector client used for Disk Delivery Disaster R

Seite 414 - The IDB Architecture

Disaster RecoveryIntroductionChapter 10 441• user profiles volume• Certificate Server database volume on Windows Server• Active Directory Service volu

Seite 415

Disaster RecoveryIntroductionChapter 10442The Recovery ProcessThe disaster recovery process consists of 4 phases with the Phase 0 (preparation) being

Seite 416

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 443Preparing for a Disaster RecoveryCarefully follow the instructions in this section to

Seite 417 - Chapter 9 387

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10444On UNIX systems:• Creation of tools, such as the auxiliary disk with the minimum operat

Seite 418 - Configuring the IDB

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 445On Windows, while the system is up and running, many system files cannot be replaced b

Seite 419

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10446corresponding media must be added to the SRD. The SRD can be updated only on a Windows

Seite 420 - Preparing for IDB Recovery

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 447Omnisrdupdate requires a session_ID to update an existing SRD file with backup object

Seite 421

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10448To determine for which hostname the SRD file from the Cell Manager should be updated, u

Seite 422

Disaster RecoveryPreparing for a Disaster RecoveryChapter 10 449IMPORTANT You should restrict access to SRD files due to security reasons.

Seite 423

Configuring and Using Backup DevicesIn This ChapterChapter 218In This ChapterThis chapter includes information on the following topics:“Configuring Ba

Seite 424

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10450Assisted Manual Disaster Recovery of a Windows SystemThe following

Seite 425

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 451Requirements• The partitions have to be the same size or larger th

Seite 426

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 104521. You need a Windows bootable installation CD-ROM to enable your s

Seite 427

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 453\i386\tools\DRSetup (located on Data Protector installation medium

Seite 428

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10454The table on the next page is an example of the preparation for the

Seite 429

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 455Table 10-3client properties computer name ANDEShostname andes.comp

Seite 430

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10456RecoveryFollow the procedure below to recover a Windows system usin

Seite 431

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10 457Other Windows SystemsIf you are recovering a Windows system other

Seite 432 - Maintaining the IDB

Disaster RecoveryAssisted Manual Disaster Recovery of a Windows SystemChapter 10458CD drives for the location of disaster recovery setup files (Dr1.ca

Seite 433

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 459Disk Delivery Disaster Recovery of a Windows Client To perform the D

Seite 434

Configuring and Using Backup DevicesIn This ChapterChapter 2 19NOTE Backup devices (like tape drives) are subject to specific Data Protector licenses.

Seite 435 - Reducing the IDB Growth

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10460Limitations• Disk Delivery Disaster Recovery is not supported for Mic

Seite 436 - Reducing the IDB Size

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10 461• partitions filesystem typeYou can refer to Table 10-3 on page 455

Seite 437

Disaster RecoveryDisk Delivery Disaster Recovery of a Windows ClientChapter 10462IMPORTANT You have to assign drive letters for Windows 2000/XP/Server

Seite 438 - Extending the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 463Enhanced Automated Disaster Recovery of a Windows SystemEnhance

Seite 439

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10464Any remaining partitions can be recovered using the standard Dat

Seite 440 - Checking the Database Size

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 465• When backing up the client, the default 64 kB block size shou

Seite 441

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10466Certificate Server Database are not restored automatically durin

Seite 442

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 4672. In the Scoping pane, expand the Backup Specifications and th

Seite 443

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10468(create it if you have not created it already). 4. In the Result

Seite 444 - Restoring the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 469IMPORTANT It is recommended to restrict access to backup media,

Seite 445

Contents v1. Introducing Data ProtectorIn This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 446

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 220Configuring Backup DevicesPreparation of a backup device consists of connecti

Seite 447 - Recovering the IDB

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10470RecoveryYou need the following to successfully perform a disaste

Seite 448

Disaster RecoveryEnhanced Automated Disaster Recovery of a Windows SystemChapter 10 471machine <HOSTNAME> press F12, to boot from the hard disk

Seite 449

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10472One Button Disaster Recovery of a Windows SystemOne Button Disaster Reco

Seite 450

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 473Requirements• Data Protector Automatic Disaster Recovery and User Inter

Seite 451

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10474• When backing up the client, the default 64 kB block size should be use

Seite 452

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 475• One Button Disaster Recovery backup session can only be performed for

Seite 453 - Filenames Part

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 104762. Click Tasks navigation tab and check One Button Disaster Recovery Wiz

Seite 454 - Changed Device

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 477an OBDR backup specification to keep it in the original One Button Disa

Seite 455 - -type 1

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10478device documentation.4. In the screen that appears, select the scope of

Seite 456 - -daid 977824764

Disaster RecoveryOne Button Disaster Recovery of a Windows SystemChapter 10 479• You have interrupted the Disaster Recovery Wizard during the 10 secon

Seite 457

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 2 213. Boot the system to have the device recognized by the system.4. Configure

Seite 458

Disaster RecoveryAutomated System RecoveryChapter 10480Automated System RecoveryAutomated System Recovery (ASR) is an automated system on Windows syst

Seite 459

Disaster RecoveryAutomated System RecoveryChapter 10 481The following sections explain the requirements, limitations, preparation, and recovery pertai

Seite 460

Disaster RecoveryAutomated System RecoveryChapter 10482Figure 10-4 Verifying the Default Block SizeLimitations• Windows XP Home Edition does not suppo

Seite 461

Disaster RecoveryAutomated System RecoveryChapter 10 483• Only those local backup devices are supported, that can be installed by Windows during OS in

Seite 462

Disaster RecoveryAutomated System RecoveryChapter 104843. In the HP OpenView Storage Data Protector Manager, switch to the Restore context.4. Click th

Seite 463

Disaster RecoveryAutomated System RecoveryChapter 10 485installation check box to copy DR installation files to the same location. The recommended des

Seite 464 - Chapter 9434

Disaster RecoveryAutomated System RecoveryChapter 10486RecoveryTo successfully perform a disaster recovery of the crashed system, you need the followi

Seite 465 - 10 Disaster Recovery

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 487Restoring the Data Protector Cell Manager Specifics This section exp

Seite 466

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10488• Disaster recovery CD for the Cell Manager should be prepared in adv

Seite 467 - Introduction

Disaster RecoveryRestoring the Data Protector Cell Manager SpecificsChapter 10 489Automated System Recovery SpecificsAn additional step is required in

Seite 468

Configuring and Using Backup DevicesConfiguring Backup DevicesChapter 222Figure 2-1 How Backup Specifications, Devices, and Media Pools Relate

Seite 469

Disaster RecoveryAdvanced Recovery TasksChapter 10490Advanced Recovery TasksThis section provides explanation of the steps you will need to take if yo

Seite 470

Disaster RecoveryAdvanced Recovery TasksChapter 10 491• all nodes• administrative virtual server (defined by the administrator)• if Data Protector is

Seite 471

Disaster RecoveryAdvanced Recovery TasksChapter 10492Merging P1S files of all nodes for EADRAnother step is required for EADR after backup has been pe

Seite 472

Disaster RecoveryAdvanced Recovery TasksChapter 10 493• the primary node must have write access to all IDB volumes, when recovering the Cell Manager•

Seite 473 - Planning

Disaster RecoveryAdvanced Recovery TasksChapter 10494TIP To enable automatic restore of all shared disk volumes in the MSCS using OBDR method, move al

Seite 474

Disaster RecoveryAdvanced Recovery TasksChapter 10 495Restoring Hard Disk Signatures On Windows The MSCS service uses a hard disk signature written i

Seite 475

Disaster RecoveryAdvanced Recovery TasksChapter 10496There is no simple procedure for recovering the disk signatures on Windows NT. MSDN article Q2431

Seite 476

Disaster RecoveryAdvanced Recovery TasksChapter 10 4974. The IIS Database is restored as a plain file (with the filename DisasterRecovery) into the de

Seite 477

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10498Manual Disaster Recovery of an HP-UX ClientThis chapter explains the procedur

Seite 478

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 499Use Ignite-UX GUI where it is supported.Using Custom Installation MediumOver

Seite 479 - Chapter 10 449

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 23Configuring Standalone DevicesWhat Are Standalone Devices?Standalone dev

Seite 480 - Windows System

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10500core.cfg to archive_<name>.cfg:cp /opt/ignite/data/examples/core.cfg /v

Seite 481 - Preparation

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 501impacts = "/stand" 1116Kbimpacts = "/tcadm" 1Kbimpacts =

Seite 482

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10502NOTE Ignite-UX enables you to create a bootable tape or CD based on the creat

Seite 483

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 503Using System Recovery ToolsOverviewThe usage of the system recovery tools, b

Seite 484

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10504This creates an Ignite-UX depot under /var/opt/ignite/depots/recovery_cmds, w

Seite 485

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 10 505enough space to store the compressed archive.4. Select the volume groups you

Seite 486 - Recovery

Disaster RecoveryManual Disaster Recovery of an HP-UX ClientChapter 105063. Select Install HP-UX from the Welcome to Ignite-UX screen.4. Choose Remote

Seite 487

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 507Disk Delivery Disaster Recovery of an UNIX ClientTo perform a Disk Del

Seite 488

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10508• If the system that will be backed up has application processes active

Seite 489

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 509single user mode:— boot -fl s to boot using already generated vmunix f

Seite 490 - Limitations

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 224Figure 2-2 Specifying Device Type and Name Configuring Device ChainsData

Seite 491

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10510— Consider logging out all users from the system.— Shut down all applic

Seite 492

Disaster RecoveryDisk Delivery Disaster Recovery of an UNIX ClientChapter 10 5114. Reconstruct the logical volume structure if applicable (for example

Seite 493

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10512Manual Disaster Recovery of an UNIX Cell Manager Manual Disaster Recover

Seite 494

Disaster RecoveryManual Disaster Recovery of an UNIX Cell ManagerChapter 10 513• A device connected to the Cell Manager.Procedure The following steps

Seite 495

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10514Troubleshooting Disaster Recovery on WindowsThis section provides explanatio

Seite 496

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 5154. To update this new state with disaster recovery, you should perform all

Seite 497

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10516Problem “No Operating System Found”Action After performing disaster recovery

Seite 498

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 517<Data_Protector_home>\tmp) if improperly configured storage devices a

Seite 499

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10518'System may not boot after disaster recovery.If the boot and system vol

Seite 500

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10 519WARNING Editing the registry incorrectly can result in failed disaster reco

Seite 501

Configuring and Using Backup DevicesConfiguring Standalone DevicesChapter 2 25Protector can immediately use media that are recognized and unprotected.

Seite 502

Disaster RecoveryTroubleshooting Disaster Recovery on WindowsChapter 10520

Seite 503

Chapter 11 52111 Customizing the Data Protector Environment

Seite 504

Customizing the Data Protector EnvironmentIn This ChapterChapter 11522In This ChapterThis chapter describes how you can customize Data Protector to be

Seite 505

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11 523Global Options FileGlobal options affect the entire Data Protector cell, an

Seite 506

Customizing the Data Protector EnvironmentGlobal Options FileChapter 11524balance number.• DailyMaintenanceTime: Determines the time after which the d

Seite 507

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 525Using Omnirc OptionsThe omnirc options are most useful for troubleshooting

Seite 508

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11526• OB2DEVSLEEP: Changes the sleep time between each retry while loading a de

Seite 509

Customizing the Data Protector EnvironmentUsing Omnirc OptionsChapter 11 527• OB2VXDIRECT: Enables direct (without cache) reading for Advanced VxFS fi

Seite 510 - Automated System Recovery

Customizing the Data Protector EnvironmentFirewall SupportChapter 11528Firewall SupportThis section describes how to configure Data Protector in an en

Seite 511

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 529NOTE The OB2PORTRANGE variable only applies to dynamically allocated ports. It

Seite 512

Configuring and Using Backup DevicesConfiguring File DevicesChapter 226Configuring File DevicesWhat Are File Devices?A file device is a file in a spec

Seite 513

Customizing the Data Protector EnvironmentFirewall SupportChapter 11530The table below lists all possible Data Protector agent identifiers that can be

Seite 514

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 531NOTE The OB2PORTRANGESPEC variable only applies to dynamically allocated ports

Seite 515

Customizing the Data Protector EnvironmentFirewall SupportChapter 11532The following table provides a list of all Data Protector components. The first

Seite 516

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 533When writing the firewall configuration rules, the process in the first column

Seite 517 - Specifics

Customizing the Data Protector EnvironmentFirewall SupportChapter 11534Table 11-3Connecting Component Listening ComponentProcess Port Process PortCell

Seite 518

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 535Examples of Configuring Data Protector in Firewall EnvironmentsThe following s

Seite 519

Customizing the Data Protector EnvironmentFirewall SupportChapter 11536Figure 11-1 Configuration DiagramThe following two items define the port range

Seite 520 - Advanced Recovery Tasks

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 537✓ Allow connections from the CM system to port 5555 on the MA systemThis table

Seite 521

Customizing the Data Protector EnvironmentFirewall SupportChapter 11538Example 2: Disk Agent Installed Outside, Other Components Installed Inside a Fi

Seite 522

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 5391. In order to determine which processes need to communicate across the firewa

Seite 523

Configuring and Using Backup DevicesConfiguring File DevicesChapter 2 27You specify the capacity of a file device when you first format the medium. Wh

Seite 524

Customizing the Data Protector EnvironmentFirewall SupportChapter 11540NOTE All Session Managers allocate ports from this range, not only the one comm

Seite 525

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 541Figure 11-3 Configuration DiagramThe following three items define the port ran

Seite 526

Customizing the Data Protector EnvironmentFirewall SupportChapter 11542This leads to the following firewall rule for the connection to the Inet listen

Seite 527

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 543Port Range Settings on the Cell ManagerFor example, if there are 25 backup and

Seite 528

Customizing the Data Protector EnvironmentFirewall SupportChapter 11544Figure 11-4 Configuration DiagramThe following three items define the port rang

Seite 529

Customizing the Data Protector EnvironmentFirewall SupportChapter 11 545Here, the application Agent connects to the Media Agent. However, this connect

Seite 530

Customizing the Data Protector EnvironmentFirewall SupportChapter 11546one DBSM will be started. For Oracle and SAP R/3 integrations, “concurrency + 1

Seite 531

Chapter 12 54712 Troubleshooting

Seite 532

TroubleshootingIn This ChapterChapter 12548In This ChapterIf you have problems with Data Protector, use the suggestions in this chapter to get back on

Seite 533 - Using System Recovery Tools

TroubleshootingBefore Calling Your Support RepresentativeChapter 12 549Before Calling Your Support RepresentativeIn order to speed up the process of s

Seite 534

Configuring and Using Backup DevicesConfiguring File DevicesChapter 228To create a jukebox file device, specify the Jukebox device type in the Add Dev

Seite 535

TroubleshootingData Protector Log FilesChapter 12550Data Protector Log FilesIf you encounter problems using the Data Protector application, you can us

Seite 536

TroubleshootingData Protector Log FilesChapter 12 551Log Files and Their ContentsThe table below describes the information found in Data Protector log

Seite 537

TroubleshootingData Protector Log FilesChapter 12552purge.log Contains traces of the background purge of the IDB.RDS.log Contains IDB logs. The file r

Seite 538

TroubleshootingDebuggingChapter 12 553DebuggingYou should collect debugs only when the support organization requires them to resolve a technical issue

Seite 539

TroubleshootingDebuggingChapter 12554Ways of DebuggingYou can start Data Protector in the debug mode in different ways and use it to generate debug tr

Seite 540

TroubleshootingDebuggingChapter 12 555NOTE Before you edit the file, make a copy of it, as the changes have to be reverted when debugging is no longer

Seite 541

TroubleshootingDebuggingChapter 12556Trace File NameThe debug postfix option is used for creating the trace files in the following directory:• On UNIX

Seite 542 - Manager

TroubleshootingDebuggingChapter 12 557OB2DBGDIR The default location of trace files can be changed on a per system basis with the omnirc variable OB2D

Seite 543

TroubleshootingDebuggingChapter 12558NOTE Use the -debug option carefully because execution traces can become quite large.CRS Debug in the Microsoft C

Seite 544 - General Troubleshooting

TroubleshootingDebuggingChapter 12 559onboard_type/Adaptec xxx/... for Windows Media Agent clients.• The operating system version, for example, HP-UX

Seite 545

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 29Configuring Library DevicesWhat Are Library Devices?SCSI-II library devices

Seite 546 - Troubleshooting EADR and OBDR

TroubleshootingDebuggingChapter 12560Protector services on the Cell Manager and restart them without the debug option.10.Copy the files from any clien

Seite 547

TroubleshootingBrowsing Troubleshooting MessagesChapter 12 561Browsing Troubleshooting MessagesData Protector provides an interactive online troublesh

Seite 548 - Enter to log on using the

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12562When You Cannot Access Online TroubleshootingIf the user interface cannot be

Seite 549

TroubleshootingWhen You Cannot Access Online TroubleshootingChapter 12 563* Collect all log files (*.log) in <Data_Protector_home>/log directori

Seite 550 - Chapter 10520

TroubleshootingDescription of Common ProblemsChapter 12564Description of Common ProblemsIf you have problems with Data Protector, find the problem are

Seite 551

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 565Troubleshooting Networking and CommunicationThe section addresses the followi

Seite 552

TroubleshootingTroubleshooting Networking and CommunicationChapter 12566DNS Resolution ProblemTest DNS resolution among hosts using the omnicheck comm

Seite 553 - Global Options File

TroubleshootingTroubleshooting Networking and CommunicationChapter 12 567Problem The response to the omnicheck command is:<client_1> cannot conn

Seite 554

TroubleshootingTroubleshooting Networking and CommunicationChapter 12568On Windows, apply the change to the Cell Manager first.If you run the UNIX Cel

Seite 555 - Using Omnirc Options

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 569Troubleshooting Data Protector Services and DaemonsThe Data Protector

Seite 556 - Shared Memory Segment)

ContentsviActivating Cartridge Memory Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Disabling a Backup Device

Seite 557

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 230NOTE It is not necessary to configure all drives for use with Data Protector

Seite 558 - Firewall Support

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12570Changed service account properties If the service account does not have

Seite 559

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 571directory and the problems should be resolved.2. Restart the services

Seite 560

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12572There are several possible reasons why the Data Protector daemon has fa

Seite 561 - Port Usage in Data Protector

TroubleshootingTroubleshooting Data Protector Services and DaemonsChapter 12 573• /etc/opt/omni/options/global• /etc/opt/omni/options/users/UserList•

Seite 562

TroubleshootingTroubleshooting Devices and MediaChapter 12574Troubleshooting Devices and MediaThis section describes solutions to the following proble

Seite 563

TroubleshootingTroubleshooting Devices and MediaChapter 12 575Device Open ProblemThe error message Cannot open device (not owner) appears when trying

Seite 564 - Table 11-3

TroubleshootingTroubleshooting Devices and MediaChapter 12576If you receive media related errors during write operations, or if the medium is marked a

Seite 565 - Environments

TroubleshootingTroubleshooting Devices and MediaChapter 12 577• Log sense write report for LTO devices - total data sets processed. Media ID from tape

Seite 566

TroubleshootingTroubleshooting Devices and MediaChapter 12578Action Export the medium from the IDB and restart the failed session using a different me

Seite 567

TroubleshootingTroubleshooting Devices and MediaChapter 12 579For example, move the media associated with the reconfigured 9940 devices to the Default

Seite 568

Configuring and Using Backup DevicesConfiguring Library DevicesChapter 2 31policy, and the device file or SCSI address of the device, and also configu

Seite 569

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12580Troubleshooting Backup and Restore SessionsYou may run into the following probl

Seite 570

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 581No previous full backupBefore performing an incremental backup of an object, D

Seite 571

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12582Action Modify the media pool policy to Appendable to enable the appending of ba

Seite 572

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 583The media in the library are not formatted and the media pool with the media u

Seite 573

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12584Action 1. Before you start a restore erase the disk image on the Data Protector

Seite 574

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 585Data Protector Backup sessions are not started at all (UNIX-specific)Action Ru

Seite 575

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12586reset by peer. It is possible that some parallel restore sessions are completed

Seite 576

TroubleshootingTroubleshooting Backup and Restore SessionsChapter 12 587to the <system_name.company.com>, but it cannot because it does not know

Seite 577 - 12 Troubleshooting

TroubleshootingTroubleshooting Data Protector InstallationChapter 12588Troubleshooting Data Protector InstallationIf you run into problems while insta

Seite 578

TroubleshootingTroubleshooting Data Protector InstallationChapter 12 589Name Resolution Problems when Installing the Windows Cell ManagerDuring the in

Seite 579

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 232Configuring Libraries with Multiple Systems You can configur

Seite 580 - Data Protector Log Files

TroubleshootingTroubleshooting User Interface StartupChapter 12590Troubleshooting User Interface Startup Data Protector user interface start-up proble

Seite 581 - Log Files and Their Contents

TroubleshootingTroubleshooting User Interface StartupChapter 12 591Connection to a Remote System Refused on Windows or Novell NetWareThe response of t

Seite 582

TroubleshootingTroubleshooting the IDBChapter 12592Troubleshooting the IDB This section provides troubleshooting for the following problems using the

Seite 583 - Debugging

TroubleshootingTroubleshooting the IDBChapter 12 593• Upgrade of detail part running.The detail upgrade was started and is currently running.• Upgrade

Seite 584 - Ways of Debugging

TroubleshootingTroubleshooting the IDBChapter 12594The detail upgrade runs out of memory on the system•The upgrade.log file on the Cell Manager contai

Seite 585 - Debug Syntax

TroubleshootingTroubleshooting the IDBChapter 12 595Problems While Running the User InterfaceIDB is corruptedAny of the following messages can be disp

Seite 586 - Trace File Name

TroubleshootingTroubleshooting the IDBChapter 12596The RDS service/process cannot be started If one or several shared library files are missing, the o

Seite 587 - CRS Debug on Windows

TroubleshootingTroubleshooting the IDBChapter 12 597Temporary Directory MissingThe following temporary directories should exist on the Cell Manager:•

Seite 588 - Sample Debugging

TroubleshootingTroubleshooting the IDBChapter 12598Problems During Backup and ImportThe BSM or RSM is terminated during the IDB backup or import sessi

Seite 589

TroubleshootingTroubleshooting the IDBChapter 12 599• On UNIX, the Data Protector MMD (/opt/omni/lbin/mmd) is not displayed when listing the Data Prot

Seite 590

Configuring and Using Backup DevicesConfiguring Libraries with Multiple SystemsChapter 2 33• Configure a backup. See Chapter 5, “Backup,” on page 151.

Seite 591

TroubleshootingTroubleshooting the IDBChapter 12600Action Set the time interval, which will be used when browsing object versions for restore. You can

Seite 592 - Troubleshooting

TroubleshootingTroubleshooting the IDBChapter 12 601with the CMMDB installed (MoM). Run this command for every Cell Manager in the MoM environment by

Seite 593

TroubleshootingTroubleshooting Reporting and NotificationsChapter 12602Troubleshooting Reporting and NotificationsIf you use Outlook XP or Outlook 98/

Seite 594

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12 603Troubleshooting Data Protector Online HelpData Protector online Help consists o

Seite 595 - Communication

TroubleshootingTroubleshooting Data Protector Online HelpChapter 12604not Netscape Navigator, select Custom.IMPORTANT Data Protector supports only Net

Seite 596

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 605Check Whether Data Protector Functions ProperlyThe following sections prov

Seite 597

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12606• Database Purge NeededFor more information on Data Protector notifications

Seite 598

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 607Overview of Items to Be CheckedIn order to ensure that Data Protector is f

Seite 599

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12608Check whether backups are configured properly1. Run the backup preview for

Seite 600

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12 609✓ Database Space Low✓ Not Enough Free Media✓ Health Check Failed✓ User Che

Seite 601

Configuring and Using Backup DevicesConfiguring Magazine DevicesChapter 234Configuring Magazine DevicesWhat Are Magazine Devices?Magazine devices grou

Seite 602

TroubleshootingCheck Whether Data Protector Functions ProperlyChapter 12610

Seite 603 - Data Protector Processes

Chapter 13 61113 Integrations with Other Applications

Seite 604 - 2000/XP/Server 2003

Integrations with Other ApplicationsIn This ChapterChapter 13612In This ChapterThis chapter gives detailed information on how to integrate the followi

Seite 605 - Medium Quality Statistics

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 613Cluster Integrations with Data ProtectorSee the HP OpenView

Seite 606

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13614Figure 13-1 A Typical Cluster• Cluster nodes (two or more)•Lo

Seite 607 - Medium Header Sanity Check

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13 615all cluster nodes. Each cluster node compares this packet an

Seite 608 - Protector A.05.10

Integrations with Other ApplicationsCluster Integrations with Data ProtectorChapter 13616NOTE In MSCS environment, Cluster Service components (for exa

Seite 609 - Other Common Problems

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 617Microsoft Cluster Server IntegrationAs a part of its high-availa

Seite 610

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13618Cell Manager on Microsoft Cluster ServerThe Data Protector Cell M

Seite 611

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 619Figure 13-2 Importing Cluster Virtual Server Hostnames to a Cell

Seite 612

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 2 35Configuring Stacker DevicesWhat Are Stacker Devices?A stacker is a single d

Seite 613

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13620To distinguish between local cluster node disks and shared cluste

Seite 614

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 621Failover of Data ProtectorIf a failover of the cluster-aware Dat

Seite 615

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13622Figure 13-3 Advanced Backup Specification Options-ClusteringDo no

Seite 616 - Backup Protection Expiration

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 623Failover of Application Other Than Data ProtectorAs the Data Pro

Seite 617

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13624script will be run. This is the node where Data Protector is runn

Seite 618

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13 625Example In the Data Protector GUI you have configured a backup s

Seite 619 - Windows Cell Manager

Integrations with Other ApplicationsMicrosoft Cluster Server IntegrationChapter 13626NOTE When the command is run, the elapsed time for each backup sp

Seite 620

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 627MC/ServiceGuard IntegrationAs part of its high-availability support, Data

Seite 621

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13628— Package IP or virtual ip-addressIn addition, you will also need to creat

Seite 622 - Troubleshooting the IDB

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 629Configuring the Primary and Secondary Cell ManagersThe following sections

Seite 623

Configuring and Using Backup DevicesConfiguring Stacker DevicesChapter 236Backup and Restore with Stacker DevicesOnly the first medium has to be manua

Seite 624

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136302. Create a logical volume for that group (for example, /dev/vg_ob2cm/lv_o

Seite 625

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 631mount /dev/vg_ob2cm/lv_ob2cm /omni_shared5. Modify the /etc/opt/omni/sg/s

Seite 626

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136321. On system2 set up the volume group to be imported, with the following s

Seite 627 - Temporary Directory Missing

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 633/opt/omni/sbin/install/omniforsg.ksh -secondary /omni_shared5. Unmount th

Seite 628

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 136343. Create the directory in the /etc/cmcluster directory that will hold the

Seite 629 - Performance Problems

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 635• SERVICE_NAME, SERVICE_FAIL_FAST_ENABLED , SERVICE_HALT_TIMEOUT Enter th

Seite 630

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13636IMPORTANT The service name must be the same as that used in the configurat

Seite 631

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 637f. Import the cluster package host name manually (for example, by using t

Seite 632

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13638NOTE When using the Data Protector GUI, import each cluster package as a c

Seite 633

Integrations with Other ApplicationsMC/ServiceGuard IntegrationChapter 13 639NOTE When backing up a virtual host, the object ownership will acquire th

Seite 634

Configuring and Using Backup DevicesConfiguring a Library for Mixed MediaChapter 2 37Configuring a Library for Mixed MediaA mixed media library contai

Seite 635 - Properly

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13640Veritas Cluster IntegrationClients on Veritas ClusterData Protector can on

Seite 636

Integrations with Other ApplicationsVeritas Cluster IntegrationChapter 13 6411. Install the Data Protector Disk Agent on each system with the local di

Seite 637

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13642Novell NetWare Cluster IntegrationClients on Novell NetWare Cluster

Seite 638

Integrations with Other ApplicationsNovell NetWare Cluster IntegrationChapter 13 6432. Configure a backup of the local system in the cluster and defin

Seite 639

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13644Data Source Integration (DSI)What Is DSI? The Data Source Integration (D

Seite 640 - Chapter 12610

Integrations with Other ApplicationsData Source Integration (DSI)Chapter 13 645First select which data you want to log. Data Protector provides a repo

Seite 641 - Applications

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13646Application Response Measurement (ARM) IntegrationW

Seite 642

Integrations with Other ApplicationsApplication Response Measurement (ARM) IntegrationChapter 13 647The following table shows the supported ARM transa

Seite 643

Integrations with Other ApplicationsManageX IntegrationChapter 13648ManageX IntegrationWhat Is the ManageX Integration?ManageX integration is supporte

Seite 644

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 649Access Points for System and Management Applicat

Seite 645

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 238Configuring Devices for Direct BackupThis section provides the con

Seite 646

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13650checking and maintenance mechanism. For more info

Seite 647

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 651Each event is marked with an Enterprise Event ID

Seite 648

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13652Command-Line Interface, Graphical User Interface

Seite 649

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13 653To enable automatic forwarding of all Data Prote

Seite 650

Integrations with Other ApplicationsAccess Points for System and Management ApplicationsChapter 13654Refer to the omnihealthcheck man page for more in

Seite 651

Chapter 14 65514 ADIC/GRAU DAS and STK ACS Libraries

Seite 652

ADIC/GRAU DAS and STK ACS LibrariesIn This ChapterChapter 14656In This ChapterThis chapter assumes that you have already physically configured the ADI

Seite 653

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 657ADIC/GRAU DAS and STK ACS IntegrationsWho Uses the ADIC/GRAU DA

Seite 654

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14658Figure 14-1 Data Protector and ADIC/GRAU DAS Library Systems Int

Seite 655

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 659Configuration BasicsWhen considering your environment and the c

Seite 656

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 2 39Backup Device Auto-detectionThe XCopy engine must reside on the F

Seite 657 - MC/ServiceGuard Integration

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14660(added to an Data Protector media pool), it remains under Data P

Seite 658

ADIC/GRAU DAS and STK ACS LibrariesADIC/GRAU DAS and STK ACS IntegrationsChapter 14 661Although you can change the label and exclude the barcode numbe

Seite 659

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14662The ADIC/GRAU DAS Library DeviceData Protector provides full support f

Seite 660

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 663• Before you configure a Data Protector ADIC/GRAU backup device, you

Seite 661

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14664NOTE This applies to HP-UX and Windows.For further questions on the co

Seite 662

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 665✓ A list of available drives with corresponding DAS name of the drive

Seite 663

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14666At this stage, you should have your hardware connected and your DAS so

Seite 664

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 667dasadmin listd [client], where [client] is the DAS Client for which t

Seite 665

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14668You should see the library drives with corresponding device files disp

Seite 666 - SERVICE_RESTART [0] = “-r 2”

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6692. Open the EIF-Configuration window by double-clicking the I/O unit

Seite 667 - Clients on MC/ServiceGuard

Contents viiSelecting Media for Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Media Selection

Seite 668

Configuring and Using Backup DevicesConfiguring Devices for Direct BackupChapter 240Configuring Standalone DevicesRefer to the online Help index keywo

Seite 669

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14670• Enter the Device Name and, below, Description.•In the Client text bo

Seite 670 - Veritas Cluster Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 671Configuring the indirect access platform requires the same preparator

Seite 671

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146723. In the Edit menu, click Find. The Find dialog box appears.Use the a

Seite 672

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 673Adding Media to a Media PoolAdding media to a media pool registers th

Seite 673

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14674The Medium Size button decides whether Data Protector will Determine t

Seite 674 - Data Source Integration (DSI)

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 675Follow online Help for information on specific items in the wizard.11

Seite 675

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146766. Right-click your selected slots and their media, and then click Ver

Seite 676 - Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6776. Change the information that appears in the Results Area. See onlin

Seite 677

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 146782. In the Scoping Pane, click Devices. The list of configured devices

Seite 678 - ManageX Integration

ADIC/GRAU DAS and STK ACS LibrariesThe ADIC/GRAU DAS Library DeviceChapter 14 6791. In the HP OpenView Storage Data Protector Manager, switch to the D

Seite 679

Configuring and Using Backup DevicesSupport of New DevicesChapter 2 41Support of New DevicesTo use a device that is not listed as supported in the HP

Seite 680

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14680The STK ACS Library DeviceThe concepts, configuration, and installation of t

Seite 681

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 681Connecting Library DrivesPhysically connect the library drives and robotics

Seite 682

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14682• Data Protector has to be installed and configured. See HP OpenView Storage

Seite 683 - Examples

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 683If a CAP is not in manual operating mode, change the mode using the followi

Seite 684

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14684You should see the library drives with corresponding device files/SCSI addre

Seite 685 - Libraries

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 685ACSSA> query cap allThe format specification of an ACS CAP has to be the

Seite 686

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14686/<Data_Protector_home>/acs/ssi/ssi.sh start <ACS_LS_hostname>4.

Seite 687

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 687• Follow the same steps for creating drives as in the indirect library acce

Seite 688

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14688Entering MediaUse this functionality to physically enter media into an STK r

Seite 689 - Media Management Basics

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 689Adding Media to a Media PoolAdding media to a media pool registers the new

Seite 690

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 242Using Several Drive Types in a LibraryUsing several drive types o

Seite 691

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14690The Medium Capacity button defines whether Data Protector will Determine the

Seite 692 - Preparing for Installation

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 69111.Optionally, use the Medium Capacity button to define whether Data Protec

Seite 693

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 146921. In the HP OpenView Storage Data Protector Manager, switch to the Devices

Seite 694

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 693Moving MediaUse this function to move media from one media pool to another.

Seite 695

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14694See online Help for further information. This action queries the ASCLM host

Seite 696

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14 695NOTE If the number of media to be removed at once exceeds fourteen, the med

Seite 697

ADIC/GRAU DAS and STK ACS LibrariesThe STK ACS Library DeviceChapter 14696Observe messages generated during the process in the Library Management wind

Seite 698

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 697Troubleshooting Library Installation and Config

Seite 699 - Using the Data Protector GUI

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14698(or: dasadmin dismount -d <DRIVENAME>)wher

Seite 700

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14 699pol 9 for STKThe default media type is DLT.

Seite 701

Configuring and Using Backup DevicesUsing Several Drive Types in a LibraryChapter 2 43On Windows and UNIX systems, you can configure separate media po

Seite 702

ADIC/GRAU DAS and STK ACS LibrariesTroubleshooting Library Installation and ConfigurationChapter 14700

Seite 703

Appendix A A-1A Further Information

Seite 704

Further InformationIn This AppendixAppendix AA-2In This AppendixThis chapter gives information on the following topics:“Backing Up and Restoring UNIX

Seite 705

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-3Backing Up and Restoring UNIX SpecificsThis section explains how to backup spe

Seite 706

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-4If the amount of data modified on the snapped filesystem is higher than the spa

Seite 707

Further InformationBacking Up and Restoring UNIX SpecificsAppendix A A-5# snapping the same FS will cause the Pre-exec script to fail and# a DA to abo

Seite 708

Further InformationBacking Up and Restoring UNIX SpecificsAppendix AA-6# - a block special file of the snapshot FS## NOTE# In case of multiple Disk Ag

Seite 709

Further InformationData Protector CommandsAppendix A A-7Data Protector CommandsFor a complete list of supported Data Protector commands, refer to the

Seite 710 - The STK ACS Library Device

Further InformationPerformance ConsiderationsAppendix AA-8Performance ConsiderationsThis section gives an overview of the most common backup performan

Seite 711

Further InformationPerformance ConsiderationsAppendix A A-9The speed also varies if a device-compression gets used. The achievable compression ratio d

Seite 712

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 244Shared Devices in the SAN EnvironmentThis section describes some o

Seite 713

Further InformationPerformance ConsiderationsAppendix AA-10• Load Balancing: This is where Data Protector dynamically determines which filesystem shou

Seite 714

Further InformationPerformance ConsiderationsAppendix A A-11NOTE By default, software compression should be disabled. Software compression should only

Seite 715

Further InformationPerformance ConsiderationsAppendix AA-12Image Backup Versus FilesystemIt used to be more efficient to back up images (raw volumes)

Seite 716

Further InformationPerformance ConsiderationsAppendix A A-13If you suspect that the sustained data flow to the tape device is too low or that the devi

Seite 717

Further InformationExample of Scheduled Eject of MediaAppendix AA-14Example of Scheduled Eject of MediaYou might want to eject all media that were use

Seite 718

Further InformationExample of Scheduled Eject of MediaAppendix A A-15given in the next section. The script (HP-UX and Solaris systems) or the starting

Seite 719

Further InformationExample of Scheduled Eject of MediaAppendix AA-16 $report =`"${OMNIBIN}omnimm" -eject \"$lib\" $slots`; #

Seite 720

Further InformationExample of Scheduled Eject of MediaAppendix A A-17 while (($lib, $slot) = each(%List)) { $result |=&Library_Eject($li

Seite 721

Further InformationExample of Scheduled Eject of MediaAppendix AA-18 if (!keys(%List)) { print "[Warning] No tape(s) to eject.\n";

Seite 722

Further InformationExample of Scheduled Eject of MediaAppendix A A-19 print "[Normal] Starting eject of media that have been used in the last

Seite 723

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 45Figure 2-5 Multiple System to Multiple Device Connectivity in SAN

Seite 724

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-20Examples of Pre-Exec and Post-Exec Commands for UNIX The followin

Seite 725

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-21elseecho "Failed to unmount the disk --> ABORTED!"e

Seite 726 - Management window

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-22fiDisk Image Post-Exec: Mount a Disk After the Raw Volume Backup#

Seite 727

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix A A-23Session Post-Exec: Notify User#!/bin/sh/opt/omni/bin/omnirpt -re

Seite 728

Further InformationExamples of Pre-Exec and Post-Exec Commands for UNIXAppendix AA-24then echo "Restarted backup --> backup will not be restar

Seite 729 - Chapter 14 699

Further InformationDisaster Recovery: Move Kill Links on HP-UX 11.xAppendix A A-25Disaster Recovery: Move Kill Links on HP-UX 11.xProceed as shown bel

Seite 730 - Chapter 14700

Further InformationCreating a libaci.o on AIXAppendix AA-26Creating a libaci.o on AIXOmniBack II A.03.10 and EarlierOn AIX, Data Protector DAS Agent u

Seite 731 - A Further Information

Further InformationCreating a libaci.o on AIXAppendix A A-27#! /usr/omni/lib/libaci.aaci_initializeaci_qversionaci_initd_errnoaci_viewaci_drivestatusa

Seite 732 - In This Appendix

Further InformationExample of the Package Configuration FileAppendix AA-28Example of the Package Configuration FileThis section gives an example of a

Seite 733 - VxFS Snapshot

Further InformationExample of the Package Configuration FileAppendix A A-29# Enter the failover policy for this package. This policy will be used# to

Seite 734

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 246Using FC-AL SANs with LIPUsing tape devices in Fibre Channel Arbit

Seite 735

Further InformationExample of the Package Configuration FileAppendix AA-30# move the package back to its primary node whenever the primary node# is ca

Seite 736

Further InformationExample of the Package Configuration FileAppendix A A-31# execution of each script.# Note: The HALT_SCRIPT_TIMEOUT should be greate

Seite 737 - Data Protector Commands

Further InformationExample of the Package Configuration FileAppendix AA-32# specified SERVICE_HALT_TIMEOUT, the cluster software will send# out the SI

Seite 738 - Performance Considerations

Further InformationExample of the Package Configuration FileAppendix A A-33# the subnets defined goes down, the package will be switched to another# n

Seite 739

Further InformationExample of the Package Configuration FileAppendix AA-34# If DEFERRED is selected, ServiceGuard will not attempt to start # res

Seite 740

Further InformationExample of the Package Configuration FileAppendix A A-35# for the first operator, and only < or <= may be used for the second

Seite 741

Further InformationExample of the Package Configuration FileAppendix AA-36# Uncomment the following lines to specify Package Resource Dependencies.##R

Seite 742

Further InformationExample of the Package Configuration FileAppendix A A-37NODE_FAIL_FAST_ENABLEDNO

Seite 743

Further InformationExample of the Package Control FileAppendix AA-38Example of the Package Control FileThis section gives an example of a package cont

Seite 744 - Schedule the Report Group

Further InformationExample of the Package Control FileAppendix A A-39## Uncomment the first line (VGCHANGE="vgchange -a e -q n"), and commen

Seite 745

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 47Direct Library Access ConceptWith direct library access, every sy

Seite 746

Further InformationExample of the Package Control FileAppendix AA-40# VG[0]=vg01# VG[1]=vg02## The volume group activation method is d

Seite 747

Further InformationExample of the Package Control FileAppendix A A-41# filesystem will be fsck'd prior to being mounted. The filesystems will be

Seite 748

Further InformationExample of the Package Control FileAppendix AA-42# 192.10.25.0 enter:# IP[0]=192.10.25.12 # SUBNET[0]=192.10.25.0

Seite 749

Further InformationExample of the Package Control FileAppendix A A-43## SERVICE_NAME[1]=pkg1b# SERVICE_CMD[1]="/usr/bin/X11/xlo

Seite 750 - Commands for UNIX

Further InformationData Protector Log Files Example EntriesAppendix AA-44Data Protector Log Files Example EntriesThis section provides some typical Da

Seite 751

Further InformationData Protector Log Files Example EntriesAppendix A A-4503/02/00 09:36:51 INET.26130.0 ["/src/lib/ipc/ipc.c /main/r31_split/10

Seite 752

Further InformationData Protector Log Files Example EntriesAppendix AA-465/14/01 12:41:41 PM OMNIDBUTIL.98.124 ["db/vel_cls_spec.c /main/39"

Seite 753

Further InformationData Protector Log Files Example EntriesAppendix A A-4702/04/00 13:38:56 0a110210:389ac85b:3c6e:0001 "[CBF502] DLT_ARC_8"

Seite 754

Further InformationData Protector Log Files Example EntriesAppendix AA-4803/15/01 12:40:43Database check error! Can not proceed with upgrade.03/15/01

Seite 755 - Move Kill Links on HP-UX 11.x

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix A A-49Windows Manual Disaster Recovery Preparation TemplateThe templa

Seite 756 - Creating a libaci.o on AIX

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 248This section describes how you can manually configure the library

Seite 757

Further InformationWindows Manual Disaster Recovery Preparation TemplateAppendix AA-50Table A-1client properties computer namehostnamedriversWindows S

Seite 758

Further InformationChanging Block Size on Windows Media AgentAppendix A A-51Changing Block Size on Windows Media AgentIn order to increase the maximum

Seite 759 - Appendix A A-29

Further InformationChanging Block Size on Windows Media AgentAppendix AA-52

Seite 760 - Appendix AA-30

G-1Glossaryaccess rights See user rights.ACSLS (StorageTek specific term) The Automated Cartridge System Library Server (ACSLS) software that manage

Seite 761 - Appendix A A-31

G-2 Glossary(disk partitioning and logical volume configuration) and automatic recovery of the original system configuration and user data that was

Seite 762 - Appendix AA-32

G-3Glossaryspecified in a backup specification or an interactive session. All clients configured in one backup specification are backed up together

Seite 763 - Appendix A A-33

G-4 GlossaryBC (HP StorageWorks Disk Array XP specific term)The Business Copy XP allows to maintain internal copies of HP StorageWorks Disk Array XP

Seite 764 - Appendix AA-34

G-5GlossaryEMC Symmetrix SLDs that need to be protected. See also BC and BC Process.boolean operators The boolean operators for the full text search

Seite 765 - Appendix A A-35

G-6 Glossaryfor purposes such as data duplication, backup, and disaster recovery. CA operations involve the main (primary) disk arrays and the remot

Seite 766 - Appendix AA-36

G-7Glossaryallocate licenses to specific cells to suit your needs. See also MoM.Centralized Media Management Database (CMMDB) See CMMDB.channel (Ora

Seite 767 - Appendix A A-37

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 49Figure 2-6 SAN Environment ConfigurationBecause the library is at

Seite 768

G-8 Glossaryenvironment. One cell can control the robotics, serving the devices that are connected to systems in other cells.The CMMDB must reside o

Seite 769 - Appendix A A-39

G-9Glossaryusers who are granted the Reporting and notifications user rights. You can view or delete all events in the Event Log.Data Protector user

Seite 770 - Appendix AA-40

G-10 Glossarydelta backup A delta backup is a backup containing all the changes made to the database from the last backup of any type.See also backu

Seite 771 - Appendix A A-41

G-11Glossarydirect backup A SAN-based backup solution in which data movement directly from disk to tape (or to other secondary storage) is facilitat

Seite 772 - Appendix AA-42

G-12 Glossarydisk group (Veritas Volume Manager specific term)The basic unit of data storage in VxVM system. A disk group can consist of one or more

Seite 773 - Appendix A A-43

G-13Glossarysystem restore along with the target operating system configuration data. It is deleted after the target system is restored to the origi

Seite 774

G-14 GlossaryProtector cells which are managed and administered from a central cell using the Manager-of-Managers concept.See also MoM.EVA Agent (HP

Seite 775

G-15Glossaryinterface while on the other side there are parallel SCSI ports. The bridge or multiplexer enables SCSI packets to be moved between the

Seite 776

G-16 Glossaryfull database backup A backup of all data in a database regardless of whether it has changed after the last database backup was created

Seite 777

G-17Glossaryhosting system A working Data Protector client used for Disk Delivery Disaster Recovery with a Data Protector Disk Agent installed.HP IT

Seite 778

ContentsviiiBacking Up CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Backing Up Windows Clients U

Seite 779 - Preparation Template

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 250✓ Use a lock name if the (physical) device will be used by another

Seite 780

G-18 Glossaryan internal cache memory, and control and diagnostic software commonly referred to as the microcode.IDB The Data Protector Internal Dat

Seite 781 -

G-19Glossarydevice during the time of the original pair split, and the data that was written to the standard device during the split is overwritten

Seite 782 - Appendix AA-52

G-20 Glossarysoftware packages for a specific architecture. The Installation Server is used for remote installation of Data Protector clients. In mi

Seite 783 - Glossary

G-21GlossaryLBO (EMC Symmetrix specific term)A Logical Backup Object (LBO) is an object of data storage/retrieval in the EMC Symmetrix environment.

Seite 784

G-22 GlossaryThe lock name is a user specified string that is used for locking all such device configurations to prevent collision if several such d

Seite 785

G-23Glossaryconnect to an operating system or software application. The password has to be the same as the password specified in the Oracle password

Seite 786

G-24 GlossaryStorageWorks Disk Array XP specific term) and HP StorageWorks Disk Array XP LDEV.Manager-of-Managers (MoM) See Enterprise Cell Manager.

Seite 787

G-25Glossarymedia pool A set of media of the same type (such as DDS) used and tracked as a group. Media are formatted and assigned to a media pool.m

Seite 788

G-26 GlossaryMicrosoft Volume Shadow Copy service (VSS) A software service that provides a unified communication interface to coordinate backup and

Seite 789

G-27GlossaryMU number (HP StorageWorks Disk Array XP specific term)A Mirror Unit number is an integer number (0, 1 or 2), used to indicate a first l

Seite 790

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 51Protector then configures the device by setting up a logical name

Seite 791

G-28 GlossaryOn-Bar (Informix specific term)A backup and restore system for OnLine Server. ON-Bar enables you to create a copy of your OnLine Server

Seite 792

G-29GlossaryOracle instance (Oracle specific term)Each installation of an Oracle database on one or more systems. One computer system can have sever

Seite 793

G-30 Glossarycalled IT/Operation, Operations Center and Vantage Point Operations.See also merging. ownership The ownership of a backup determines wh

Seite 794

G-31Glossarydata for multiple objects selected for restore is read from media at the same time, thereby improving performance.parallelism The concep

Seite 795

G-32 Glossarypublic folder store (MS Exchange 2000 Server specific term)The part of the Information Store that maintains information in public folde

Seite 796

G-33GlossaryManager and manages the IDB. The process is started when Data Protector is installed on the Cell Manager.Recovery Catalog (Oracle specif

Seite 797

G-34 Glossaryconfiguration. In bidirectional configurations, the RCU can act as an MCU.Removable Storage Management Database (Windows specific term)

Seite 798

G-35Glossaryof replica storage versions that are to be kept on a disk array before the oldest replica storage version for the backup specification i

Seite 799

G-36 Glossarydevice if someone has manually manipulated media without using Data Protector to eject or enter, for example.Scheduler A function that

Seite 800

G-37Glossaryshared disks A Windows disk on another system that has been made available to other users on the network. Systems with shared disks can

Seite 801

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 252Prerequisite Before configuring Data Protector devices in a SAN en

Seite 802

G-38 Glossarysplit mirror backup (HP StorageWorks Disk Array XP specific term) See ZDB tape backup, ZDB disk/tape backup and ZDB disk backup.split m

Seite 803

G-39Glossaryaddress for each backup drive connected to that client. A single SCSI entry is required for a single-drive device and multiple SCSI entr

Seite 804

G-40 GlossarySymmetrix Application Programming Interface (SYMAPI) (EMC Symmetrix specific term)A linkable library of functions that can interface w

Seite 805

G-41Glossaryserver is a domain controller, Active Directory directory services and the Sysvol directory are also contained in the System State data.

Seite 806

G-42 GlossaryTerminal Services (Windows specific term)Windows Terminal Services provide a multi-session environment that allows clients to access a

Seite 807

G-43Glossaryarchiving of transaction logs should be enabled to prevent you from losing the transaction log files that are created after the last IDB

Seite 808

G-44 Glossaryvaulting media The process of storing media to a safe and remote place. The media are brought back to the data center when they are nee

Seite 809

G-45Glossaryvolume mountpoint (Windows specific term)An empty directory on a volume that can be used to mount another volume. The volume mount point

Seite 810

G-46 Glossarythat write persistent information on a volume. Writers also participate in the shadow copy synchronization process by assuring data con

Seite 811

G-47GlossaryZDB part of the IDB (ZDB specific term)A part of the IDB, storing ZDB related information such as original and replica storage versions,

Seite 812

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 53The drive naming convention shows its benefits during backup spec

Seite 813

G-48 Glossary

Seite 814

I-1Aabortingall sessions, 623backup session during the size determination, 312running sessions, 312sessions, elapsed time, 625sessions, using ID, 62

Seite 815

IndexI-2cluster (MC/SG), 638cluster (MSCS), 619CONFIGURATION, 176DHCP Server, 178direct backup environment, 204disk image, UNIX, 166disk image, Window

Seite 816

Index I-3segment size, 78shared in the SAN, 44specifying type and name, figure, 24streaming, 76used by multiple applications, locking, 46using, 17bac

Seite 817

IndexI-4concepts, 3Disk Agent, 3exporting, 377importing, 377importing, MoM, 363Media Agent, 3monitoring simultaneously, 314moving clients, 378reports

Seite 818

Index I-5Novell NetWare Cluster Services, 642omniclus command, 623package (MC/SG, Veritas Cluster), 615primary node, 615secondary node, 615switchover

Seite 819

IndexI-6new Microsoft Exchange Profile, 348notifications, 342, 351notifications on the Web, 353notifications, using Web reporting interface, 355report

Seite 820

Index I-7copying to the Web server, 354Data Source Integration, 644database See IDBbackup problems, 598import problems, 598database configuration See

Seite 821

IndexI-8Disk Delivery method, 459, 507Enhanced Automated method, 463logging on after, 514One Button method, 472overview, 437Phase 0, 442Phase 1, 442Ph

Seite 822

Index I-9scheduled eject, 138elapsed session time, 625e-mail send methodnotifications, 348notifications, creating a new Microsoft Exchange Profile, 3

Seite 823

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 254Figure 2-7 Setting Advanced Options When you are setting the locki

Seite 824

IndexI-10backing up OpenVMS, 201backing up UNIX, 161backing up Windows, 168restore limitations, 278restoring Novell NetWare, 287restoring OpenVMS, 291

Seite 825

Index I-11HP-UX and Solaris clientdisaster recovery methods, 437HTML report format, 329IIDBarchitecture, 384backing up, 398backing up Windows Registr

Seite 826

IndexI-12the catalog from media, 114importing media, 113in a magazine device, 115multiple, figure, 114procedure, 113Inc backups, definition, 213Inc1-9

Seite 827

Index I-13limiting port range, firewall environment, 528listrestored files, 295List of Pools report, 324load balancing, 232backup option, 237local di

Seite 828

IndexI-14adding to pool, 107adding unused to a media pool, 107adding used to a media pool, 107allocation policy, 103, 120appendable, 104appendable of

Seite 829

Index I-15scanning media in a device, 129searching for and selecting a medium, 135selecting media for backup, 120setting data protection, 122using a

Seite 830

IndexI-16MSCS See Microsoft Cluster Servermulti host support, 32multiple backup specifications, 155multiple reports, adding to the report group, 337NN

Seite 831

Index I-17omit deleted files, 294omniclus, 623omnirc optionsoverview, 525usage, 525variables, 525omnirc options file, 525omnirptgenerating reports wi

Seite 832

IndexI-18Disk Delivery Disaster Recovery, Windows client, 460Enhanced Disaster Recovery, Windows NT/2000 client, 466, 475for disaster recovery, 443Man

Seite 833

Index I-19Enhanced Disaster Recovery, Windows NT/2000 client, 470One Button Disaster Recovery, Windows NT/2000, 477recurring backupconfiguring, 210re

Seite 834

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 55Figure 2-8 Summary of Device Definitions Using Lock Names Enablin

Seite 835

IndexI-20protection attributes, 296sparse files, 296target hostname, 294time attributes, 296restoringbindery, Novell NetWare, 288data to different cli

Seite 836

Index I-21Scoping Pane, 10SCSI address, 29SCSI IDlibrary device, 29SCSI-II Library devicesSCSI address, 29searching for media, 135secondary node, 615

Seite 837

IndexI-22pre- and post-exec commands, 250, 255Specific Event ID, 651specific object, 225specifyingpathname for a file device, figure, 28type and name

Seite 838

Index I-23troubleshooting file, 562user interface, 590when the user interface not accessible, 562troubleshooting backup sessionsmount request for a l

Seite 839

IndexI-24used mediaadding, 107user accountsetting for the Inet, 187User Check Failed notification, 347, 606user classdescription of access rights, 83u

Seite 840

Index I-25viewingcurrently running sessions, 309details of a running session, 310files from media, 301finished sessions, 310viewsmodifying in the med

Seite 841

IndexI-26XXCopy engine, 39, 204

Seite 842

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 256Figure 2-9 Selecting Direct AccessManually Configuring the libtab

Seite 843

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 57• <DeviceFile | SCSIPath> is the control path to the librar

Seite 844

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 258Example libtab file on donatExample of the libtab file on host don

Seite 845

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 2 59In order to share a device among multiple systems, configure one

Seite 846

Contents ixPreventing Backup Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Restarting Failed B

Seite 847

Configuring and Using Backup DevicesShared Devices in the SAN EnvironmentChapter 260Static Drives The drives can still be used in the standard way usi

Seite 848

Configuring and Using Backup DevicesDrive CleaningChapter 2 61Drive CleaningThere are several methods for cleaning dirty drives:• Library built-in cle

Seite 849

Configuring and Using Backup DevicesDrive CleaningChapter 262to store cleaning tape(s).• Detection and use of cleaning tapes depends on the system pla

Seite 850

Configuring and Using Backup DevicesDrive CleaningChapter 2 631. Enable dirty drive detection. This needs to be done for all device types (standalone

Seite 851

Configuring and Using Backup DevicesDrive CleaningChapter 264Where <file_name> is the name of the file you will use to simulate a dirty drive, a

Seite 852

Configuring and Using Backup DevicesBusy Drive HandlingChapter 2 65Busy Drive HandlingData Protector expects drives to be empty, i.e., there should no

Seite 853

Configuring and Using Backup DevicesActivating Barcode SupportChapter 266Activating Barcode SupportIf a SCSI library device uses media with barcodes,

Seite 854

Configuring and Using Backup DevicesActivating Barcode SupportChapter 2 67Figure 2-10 Activating Barcode Reader Support

Seite 855

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 268Activating Cartridge Memory SupportCartridge memory support can be a

Seite 856 - , 39, 204

Configuring and Using Backup DevicesActivating Cartridge Memory SupportChapter 2 69Figure 2-11 Cartridge Memory Support Activation for a Drive

Kommentare zu diesen Handbüchern

Keine Kommentare