background image

HP Data Protector A.06.10

Concepts guide

B6960-96035

Part number: B6960-96035
First edition: November 2008

Summary of Contents for B6960-96035

Page 1: ...HP Data Protector A 06 10 Concepts guide B6960 96035 Part number B6960 96035 First edition November 2008 ...

Page 2: ...y statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein Intel Itanium Pentium Intel Inside and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries Mic...

Page 3: ...P technical support 33 Subscription service 34 HP websites 34 Documentation feedback 34 1 About backup and Data Protector 35 In this chapter 35 About Data Protector 35 Introducing backups and restores 38 What is a backup 38 What is a restore 39 Backing up a network environment 39 Direct backup 40 Data Protector architecture 40 Operations in the cell 42 Backup sessions 43 Restore sessions 44 Enterp...

Page 4: ...nvironment 65 Windows domains 65 Windows workgroups 66 Creating cells in a mixed environment 66 Geographically remote cells 66 Understanding and planning performance 67 The infrastructure 67 Network versus local backups 67 Network or server versus direct backups 68 Devices 68 High performance hardware other than devices 69 Advanced high performance configuration 69 Using hardware in parallel 69 Co...

Page 5: ...ups 91 Full backups 92 Synthetic backup 92 Incremental backups 92 Conventional incremental backup 93 Enhanced incremental backup 93 Types of incremental backups 93 Considering restore 96 Keeping backed up data and information about the data 99 Data protection 99 Catalog protection 100 Logging level 100 Browsing files for restore 100 Enabling the browsing of files and quick restore 101 Enabling the...

Page 6: ... 128 Disaster recovery methods 130 Alternative disaster recovery methods 131 3 Media management and devices 133 In this chapter 133 Media management 133 Media life cycle 134 Media pools 135 Free pools 137 Media pool usage examples 140 Implementing a media rotation policy 143 Media rotation and Data Protector 144 Media needed for rotation 144 Media management before backups begin 145 Initializing o...

Page 7: ...g tape support 164 Sharing a library with multiple systems 164 Data Protector and Storage Area Networks 170 Storage Area Networks 171 Fibre Channel 172 Point to point topology 173 Loop topology 173 Switched topology 174 Device sharing in SAN 175 Configuring multiple paths to physical devices 175 Device locking 177 Indirect and Direct Library Access 178 Indirect Library Access 178 Direct Library Ac...

Page 8: ...ving the detail catalog 196 Filenames purge 196 File versions purge 196 Overview of IDB management 196 IDB growth and performance 197 Key IDB growth and performance factors 197 IDB growth and performance key tunable parameters 198 Logging level as an IDB key tunable parameter 199 Catalog protection as an IDB key tunable parameter 201 Recommended usage of logging level and catalog protection 201 ID...

Page 9: ...h disk discovery 225 Restore sessions 225 Restore session data flow and processes 226 Queuing of restore sessions 227 Mount requests in a restore session 228 Parallel restores 228 Fast multiple single file restore 229 Object copy sessions 229 Automated and interactive object copy sessions 230 Object copy session data flow and processes 230 Queuing of object copy sessions 232 Mount requests in an o...

Page 10: ...0 Three hosts CM application Resolve 250 Two Hosts Cell Manager Resolve Agent and application 251 Basic configuration single host 251 10 Disk backup 253 In this chapter 253 Overview 253 Disk backup benefits 254 Data Protector disk based devices 255 1 1 Synthetic backup 257 In this chapter 257 Overview 257 Synthetic backup benefits 258 How Data Protector synthetic backup works 258 Synthetic backup ...

Page 11: ...figuration single disk array dual host 281 Other supported configurations 282 Other configurations 286 14 Microsoft Volume Shadow Copy service 289 In this chapter 289 Overview 289 Data Protector Volume Shadow Copy integration 293 VSS filesystem backup and restore 295 A Backup scenarios 297 In this appendix 297 Considerations 297 Company XYZ 299 Environment 299 Backup strategy requirements 302 Prop...

Page 12: ...ckup 333 Full backup 335 Example 2 automated media copying of Oracle database backups 338 Full backup 339 Internationalization 340 Localization 340 File name handling 341 Background 341 File name handling during backup 342 Browsing file names 342 File name handling during restore 342 Glossary 345 Index 403 12 ...

Page 13: ... 47 1 1 How backup specifications devices and media pools are related 49 12 Using the Data Protector user interface 50 13 Original Data Protector GUI 52 14 Data Protector Java GUI 52 15 Data Protector Java GUI architecture 53 16 Backup session with AES 256 bit encryption 77 17 Backup session with drive based encryption 78 18 Typical cluster 80 19 Cell Manager installed outside a cluster 84 20 Cell...

Page 14: ...21 35 Free pools 138 36 A simple one device one media pool relation 140 37 Configuration of media pools for large libraries 141 38 Multiple devices single media pool 142 39 Multiple devices multiple media pools 143 40 Multiple objects and sessions per medium sequential writes 149 41 Multiple objects and sessions per medium concurrent writes 149 42 Multiple media per session multiple media per obje...

Page 15: ...ctor Reporter example 216 60 Operational error status report 217 61 Direct SIP integration example 218 62 Backup session information flow 1 222 63 Backup session information flow multiple sessions 223 64 Restore session information flow 227 65 Parallel restore session flow 229 66 Object copy session information flow 232 67 Relational database 238 68 Data Protector integration with databases 240 69...

Page 16: ...ks Virtual Array only 285 87 Campus Cluster with LVM Mirroring HP StorageWorks Virtual Array only 286 88 Actors of the traditional backup model 292 89 Actors of the VSS backup model 292 90 Current XYZ backup topology 300 91 Proposed XYZ backup topology 305 92 Input parameters 306 93 Results 306 94 Current ABC Cape Town backup topology 314 95 ABC enterprise environment 318 96 ABC Cape Town enterpri...

Page 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...

Page 18: ...ta Protector Media Agent for robotic control 167 1 1 Data Protector predefined user groups 185 12 ARM functionality 209 13 Benefits of using VSS 293 14 Hardware and software environment of XYZ 299 15 Proposed environment 303 16 The staggering approach 308 17 Remote full backups to the HP DLT 41 15 library 309 18 Size of backup environment 313 19 Maximum acceptable downtime for recovery 315 20 How ...

Page 19: ...ABC s Media Pool Usage 325 25 The Staggering Approach for ABC Cape Town 326 26 ABC s backup specification configuration 327 27 Concepts guide 19 ...

Page 20: ...20 ...

Page 21: ...rt service See your HP sales representative for details Table 1 Edition history Product Guide edition Part number Data Protector Release A 05 00 August 2002 B6960 90059 Data Protector Release A 05 10 May 2003 B6960 90080 Data Protector Release A 05 50 October 2004 B6960 90105 Data Protector Release A 06 00 August 2006 B6960 96001 Data Protector Release A 06 10 November 2008 B6960 96035 Concepts gu...

Page 22: ...Publication history 22 ...

Page 23: ...ble in printed format and in PDF format Install the PDF files during the Data Protector setup procedure by selecting the English Documentation Help component on Windows or the OB2 DOCS component on UNIX Once installed the guides reside in the Data_Protector_home docs directory on Windows and in the opt omni doc C directory on UNIX You can find these documents from the Manuals page of the HP Busine...

Page 24: ...bes the integrations of Data Protector with the following Microsoft applications Microsoft Exchange Server Microsoft SQL Server and Volume Shadow Copy Service HP Data Protector integration guide for Oracle and SAP This guide describes the integrations of Data Protector with Oracle SAP R3 and SAP DB MaxDB HP Data Protector integration guide for IBM applications Informix DB2 and Lotus Notes Domino T...

Page 25: ...kup concepts guide This guide describes Data Protector zero downtime backup and instant recovery concepts and provides background information on how Data Protector works in a zero downtime backup environment It is intended to be used with the task oriented HP Data Protector zero downtime backup administrator s guide and the HP Data Protector zero downtime backup integration guide HP Data Protector...

Page 26: ... product announcements software notes and references for integrations to HP Operations Manager HP Reporter HP Performance Manager HP Performance Agent and HP Service Information Portal This guide fulfills a similar function for the listed integrations HP Data Protector Media Operations product announcements software notes and references This guide fulfills a similar function for Media Operations H...

Page 27: ...de for Microsoft applications SQL Server SharePoint Portal Server Exchange Server and Volume Shadow Copy Service IG MS Integration guide for Oracle and SAP IG O S Integration guide for HP Operations Manager for UNIX IG OMU Integration guide for HP Operations Manager for Windows IG OMW Integration guide for HP Performance Manager and HP Performance Agent IG PM PA Integration guide for HP Reporter I...

Page 28: ...ia Operations user guide MO UG MPE iX system user guide MPE iX Product announcements software notes and references PA Troubleshooting guide Trouble ZDB administrator s guide ZDB Admin ZDB concepts guide ZDB Concept ZDB integration guide ZDB IG Map The following table shows where to find information of different kinds Shaded squares are a good place to look first About this guide 28 ...

Page 29: ...ook in these guides for details of the following integrations Guide Integration IG OMU IG OMW HP Operations Manager for UNIX for Windows IG PM PA HP Performance Manager IG PM PA HP Performance Agent Concepts guide 29 ...

Page 30: ...IBM IBM DB2 UDB IG IBM Informix IG IBM Lotus Notes Domino MO User Media Operations MPE iX MPE iX system IG MS ZDB IG Microsoft Exchange Server IG MS Microsoft Exchange Single Mailbox IG MS ZDB IG Microsoft SQL Server IG MS ZDB IG Microsoft Volume Shadow Copy Service VSS IG Var NDMP Server IG Var Network Node Manager NNM IG O S Oracle ZDB IG Oracle ZDB IG O S SAP DB IG O S ZDB IG SAP R 3 About this...

Page 31: ...ses Blue underlined text http www hp com Text emphasis Italic text File and directory names System output Code Commands their arguments and argument values Monospace text Code variables Command variables Monospace italic text Emphasized monospace text text CAUTION Indicates that failure to follow directions could result in damage to equipment or data IMPORTANT Provides clarifying information or sp...

Page 32: ...phical user interface Data Protector provides a cross platform Windows and UNIX graphical user interface You can use the original Data Protector GUI Windows only or the Data Protector Java GUI For information about the Data Protector graphical user interface see the online Help About this guide 32 ...

Page 33: ...chnical support For worldwide technical support information see the HP support website http www hp com support Before contacting HP collect the following information Product model names and numbers Technical support registration number if applicable Product serial numbers Error messages Operating system type and revision level Detailed questions Concepts guide 33 ...

Page 34: ... firmware updates and other product resources HP websites For additional information see the following HP websites http www hp com http www hp com go software http www hp com support manuals http www hp com support downloads Documentation feedback HP welcomes your feedback To make comments and suggestions about product documentation please send a message to DP DocFeedback hp com All submissions be...

Page 35: ...on page 38 Data Protector architecture on page 40 Enterprise environments on page 45 Media management on page 48 Backup devices on page 49 User interfaces on page 50 Overview of tasks to set up Data Protector on page 55 About Data Protector HP Data Protector is a backup solution that provides reliable data protection and high accessibility for your fast growing business data Data Protector offers ...

Page 36: ...s backup possibilities such as local backup network backup online backup disk image backup synthetic backup backup with object mirroring and built in support for parallel data streams allow you to tune your backups to best fit your requirements Data security To enhance the security of your data Data Protector lets you encrypt your backups so that they become protected from others Data Protector of...

Page 37: ...eps track of data such as which files from which system are kept on a particular medium In order to restore any part of a system simply browse the files and directories This provides fast and convenient access to the data to be restored Automated or Unattended Operation With the internal database Data Protector keeps information about each Data Protector medium and the data on it Data Protector pr...

Page 38: ...ine Database Applications Data Protector provides online backup of Microsoft Exchange Server Microsoft SQL Server Oracle Informix Server SAP R 3 Lotus Notes Domino Server IBM DB2 UDB Sybase database objects and VMware Virtual Infrastructure objects For a list of supported versions for a particular operating system see the HP Data Protector product announcements software notes and references Integr...

Page 39: ...s a process that recreates the original data from a backup copy This process consists of the preparation and actual restore of data and some post restore actions that make that data ready for use Figure 3 Restore process The source is a backup copy A restore application is software that actually writes data to a destination The destination is usually a disk to which the original data is written Ba...

Page 40: ...ta directly from disk to tape in the SAN without involving a dedicated backup server for the data movement The use of a filesystem independent ability to resolve data is fully integrated with the industry standard XCOPY functionality that is embedded in supported disk arrays and bridges removing the need for a separate data mover appliance Data Protector architecture The Data Protector cell shown ...

Page 41: ...an run on UNIX and Windows operating systems they do not have to run the same operating system For a list of supported operating systems for a particular Data Protector component see the HP Data Protector product announcements software notes and references Cell Manager The Cell Manager is the main system in the cell The Cell Manager Manages the cell from a central point Contains the IDB The IDB co...

Page 42: ...d not only to the Cell Manager A Media Agent reads or writes data from or to media in the device and sends or receives data from the Disk Agent Systems with a user interface You can manage Data Protector from any system on the network on which the Data Protector graphical user interface GUI is installed Therefore you can have the Cell Manager system in a computer room while managing Data Protector...

Page 43: ...is started either interactively by an operator using the Data Protector user interface or unattended using the Data Protector Scheduler How does it work The Backup Session Manager process starts Media Agent s and Disk Agent s controls the session and stores generated messages to the IDB Data is read by the Disk Agent and sent to a Media Agent which saves it to media Concepts guide 43 ...

Page 44: ...The restore session is interactively started by an operator using the Data Protector user interface How does it work After you have selected the files to be restored from a previous backup you invoke the actual restore The Restore Session Manager process starts the needed Media Agent s and Disk Agent s controls the session and stores messages in the IDB Data is read by a Media Agent and sent to th...

Page 45: ...ion can be used when several geographically separated sites require common backup policies to be used It can also be used when all departments at the same site want to share the same set of backup devices Figure 9 Large Data Protector enterprise environment Configuring and managing backups of such a heterogeneous environment is challenging Data Protector functionality has been designed to highly s...

Page 46: ... large environments with multiple cells The MoM allows you to group multiple cells into a larger unit called a MoM environment that can be managed from a single point as shown in Figure 10 on page 46 The MoM enables virtually unlimited growth of your backup environment New cells can be added or existing ones split A MoM environment does not require a reliable network connection from Data Protector...

Page 47: ...d must reside in the MoM cell In this case a reliable network connection is required between the MoM cell and the other Data Protector cells Note that it is optional to centralize the Media Management Database Sharing libraries With the CMMDB you can share high end devices between cells in the multi cell environment One cell can control the robotics serving several devices that are connected to sy...

Page 48: ...rmed automatically Recognition and support of barcodes on large library devices and silo devices with barcode support Recognition tracking viewing and handling of media used by Data Protector in large library devices and silo devices The possibility of having information about the media in a central place and the sharing of this information among several Data Protector cells Interactive or automat...

Page 49: ... Figure 12 How backup specifications devices and media pools are related Figure 12 on page 49 shows the relationship among the backup specification devices and media pools The devices are referred to in the backup specification Each device is linked to a media pool this media pool can be changed in the backup specification For example backup specification 2 references the pool Dept_X instead of th...

Page 50: ...ave to be used from the Cell Manager system you can install it on your desktop system As depicted in Figure 13 on page 50 the user interface also allows you to transparently manage Data Protector cells with Cell Managers on all supported platforms Figure 13 Using the Data Protector user interface TIP In a typical mixed environment install the Data Protector user interface on several systems in the...

Page 51: ...se applications that run in Windows environments such as Microsoft SQL Server Microsoft Exchange Server SAP R 3 and Oracle or those that run in the UNIX environments such as SAP R 3 Oracle and Informix Server A comprehensive online Help system called the Help Topics and context sensitive Help called the Help Navigator Concepts guide 51 ...

Page 52: ...gure 14 Original Data Protector GUI Figure 15 Data Protector Java GUI Data Protector Java GUI The Data Protector Java GUI is a Java based graphical user interface with a About backup and Data Protector 52 ...

Page 53: ...Data Protector Java GUI architecture The Java GUI Server is installed on the Data Protector Cell Manager system The Java GUI Server receives requests from the Java GUI Client processes them and then sends the responses back to the Java GUI Client The communication is done through Hypertext Transfer Protocol HTTP on port 5556 The Java GUI Client contains only user interface related functionalities ...

Page 54: ...he text Non blocking behavior The Java GUI Server transmits only data for the current context which reduces the network traffic between the Java GUI Server and the Java GUI Client Due to its non blocking behavior you can work on different contexts while Java GUI Server processes your requests in the background Differences from the Original Data Protector GUI Due to the different underlying technol...

Page 55: ...pe of connections LAN and or SAN 4 Purchase the required Data Protector licenses for your setup This way you obtain the passwords you will need to install Alternatively you can operate Data Protector using an instant on password However this is valid only for 60 days from the date of installation For details see the HP Data Protector installation and licensing guide 5 Consider security aspects Ana...

Page 56: ...tape drives to the systems that will control them Configure backup devices Configure media pools and prepare the media Configure backup specifications including backup of the IDB Configure reports if needed 8 Become familiar with tasks such as Handling failed backups Performing restores Duplicating backed up data and vaulting media Preparing for disaster recovery Maintaining the IDB About backup a...

Page 57: ...saster recovery It is organized as follows Backup strategy planning on page 58 Planning cells on page 62 Understanding and planning performance on page 67 Planning security on page 73 Clustering on page 79 Full and incremental backups on page 91 Keeping backed up data and information about the data on page 99 Backing up data on page 102 Automated or unattended operation on page 110 Duplicating bac...

Page 58: ...e that you choose For instance if you back up to disk you can take advantage of advanced backup strategies such as synthetic backup and disk staging 3 Preparing the backup strategy that shows your backup concept and how it is implemented This section provides detailed information on the preceding steps The rest of this guide provides important information and considerations that help you plan your...

Page 59: ...ou use one For example user files may not be stored in a vault at all while order information may be kept for five years with verification of each medium after two years To how many media sets should the data be written during backup Consider writing critical data to several media sets during backup to improve the fault tolerance of such backups or to enable multi site vaulting Object mirroring in...

Page 60: ...f SAN speed reduced network traffic and the lack of the backup server bottleneck How often does data need to be backed up For each type of data list how often the data needs to be backed up For example user working files may be backed up on a daily basis system data on a weekly basis and some database transactions twice a day Factors influencing your backup strategy There are a number of factors t...

Page 61: ...ations This can be done on the basis of departments data types or backup frequency How the backups are scheduled Consider using the staggered approach whereby full backups are scheduled for different clients backup specifications on different days to avoid network load device load and time window issues Retaining data on media and information about backups Consider protecting data from being overw...

Page 62: ... and operators Determine the rights of users that can administer and operate your storage product Planning cells One of the most important decisions in planning your backup strategy is whether you want to have a single or multiple cell environment This section describes the following Factors you should consider when planning cells How cells relate to a typical network environment How cells relate ...

Page 63: ... zone Security of data Data Protector provides cell level based security All Data Protector administrative work is done in the context of a single cell media backup devices and backed up data belong to one cell Note that Data Protector lets you share devices or move media between cells so physical access to media must be limited to authorized personnel Mixed environments Data Protector allows you ...

Page 64: ...vailable throughout the cell For details see the HP Data Protector installation and licensing guide The Cell Manager and Installation Servers are installed directly from the CD After you have installed the Cell Manager and Installation Servers you can then install the components on various client systems using the Data Protector Installation GUI When you install Data Protector for the first time i...

Page 65: ...lient systems can be installed using a central Windows account in a domain organization Other operations however are not limited to a Windows domain organization since all operations and security verifications are performed by the Data Protector internal protocol and not by the Windows Security In general there are no limitations on how and where Data Protector can be installed However because of ...

Page 66: ...g cells in a mixed environment In a mixed environment take into account the factors described in Creating cells in the UNIX environment on page 64 The more the environment is broken into multiple domains and multiple workgroups the more accounts and steps need to be considered to distribute the software and to prepare the environment for administration Geographically remote cells Data Protector al...

Page 67: ...ecovery in case of a corrupt database or a disk crash Therefore understanding and planning backup performance is extremely important Optimizing the time required for the backup of a number of client systems and large databases that are all connected on different networks and different platforms is a challenging task The following sections give an overview of the most common backup performance fact...

Page 68: ...chievable compression ratio depends on the nature of the data being backed up In most cases using high speed devices with hardware compression improves performance This is true however only if the devices stream At the start and at the end of a backup session backup devices require some time for operations such as rewinding media and mount or unmount media Libraries offer additional advantages bec...

Page 69: ...ly attached device For more information on Zero Downtime Backup see the HP Data Protector zero downtime backup concepts guide Using hardware in parallel Using several datapaths in parallel is a fundamental and efficient method to improve performance This includes the network infrastructure Parallelism boosts performance in the following situations When to use parallelism Several client systems can...

Page 70: ...but it requires significant CPU resources from the client By default software compression is disabled Use software compression only for backups of many machines over a slow network where data can be compressed before sending it over the network If software compression is used hardware compression should be disabled since trying to compress data twice actually expands the data Hardware compression ...

Page 71: ...fixed relationship between an object and a medium where the object resides This can be of benefit for the restore process since only one medium needs to be accessed The disadvantage in a network backup configuration is the likely performance limitation due to the network causing the device not to stream Many objects go to a few media each medium has data from several objects one object goes to one...

Page 72: ...is differs from one operating system to another TIP Backups are most efficient for large files with little fragmentation Compression If data is compressed on a disk the Windows operating system first decompresses the data before sending it across the network This reduces the backup speed and uses CPU resources Disk image backups Data Protector also allows you to back up UNIX disks as disk images W...

Page 73: ...ector integrates with all popular online database applications to optimize backup performance For more information on how Data Protector integrates with various applications and for tips on how to improve backup performance see the HP Data Protector integration guide Also see the documentation that comes with your online database application for more information on how to improve backup performanc...

Page 74: ...tor allows you to explicitly configure from which Cell Manager a client system can be accessed that is configuring a trusted peer Restrict pre and post execution For security reasons various levels of restrictions can be configured for pre exec and post exec scripts These optional scripts allow a client system to be prepared for the backup by for example shutting down an application to obtain a co...

Page 75: ... personal data to a local system only while the operator group allows the starting and monitoring of backups but not the creating of backups For more information see Chapter 4 on page 183 Data Protector user rights What are user rights Data Protector user rights define the actions that a user can perform with Data Protector They are applied on the Data Protector user group level and not to each us...

Page 76: ...ryption With AES 256 bit encryption data is encrypted before it is transferred over a network and before it is written to media Data Protector drive based encryption uses the encryption functionality of the drive The actual implementation and encryption strength depend on the drive s firmware Data Protector only turns on the feature and manages encryption keys The key management functionality is p...

Page 77: ...M reads the backup specification in which the Drive based encryption option is selected and requests an active encryption key from the KMS The key is transferred to the Media Agent MA which configures the drive for encryption and sets the encryption key into the drive The drive encrypts both the data and the meta data that is written to the medium In an object copy or object consolidation operatio...

Page 78: ...on with the Drive based encryption option selected Figure 18 Backup session with drive based encryption Restore from encrypted backups No additional encryption related preparations are needed for restore of encrypted backups as Data Protector automatically obtains the appropriate decryption keys What is backup ownership Who owns a backup session Each backup session and all the data backed up withi...

Page 79: ... this can be applied see the online Help index ownership Clustering Cluster concepts What is a cluster A cluster is a group of two or more computers that appear on the network as a single system This group of computers is managed as a single system and is designed to Ensure that mission critical applications and resources are as highly available as possible Tolerate component failures Support eith...

Page 80: ...sion critical application data as well as specific cluster data needed to run the cluster In MSCS clusters a shared disk is exclusively active on only one cluster node at a time Cluster network A cluster network is a private network that connects all cluster nodes It transfers the internal cluster data called heartbeat of the cluster The heartbeat is a data packet with a time stamp that is distrib...

Page 81: ...d by the cluster software and mapped to the cluster node where the specific package or group is currently running Since the group or package can switch from one node to another the virtual server can reside on different machines in different time frames What is a failover Each package or group has its own preferred node where it normally runs Such a node is called a primary node A package or group...

Page 82: ...other than Data Protector perform a failover The Data Protector Cell Manager allows you to define what should happen in such situations If the backup is less important than the application Data Protector can abort running sessions If the backup is more important or is just ending Data Protector can continue the sessions For more information on how to define the criteria see the online Help index c...

Page 83: ... be restarted as a whole restarted only for the failed objects not restarted at all For more information on backup session behavior options on failover of the Data Protector Cell Manager see the online Help index cluster backup specification options Example cluster environments This section gives three example cluster configurations Cell Manager installed outside a cluster In the environment depic...

Page 84: ...tual Server Virtual server backup If you select the virtual server in the backup specification then the backup session will back up the selected active virtual host server regardless of the physical node the package or group is currently running on For more information on how to define these options see the online Help index cluster backup specification options Planning your backup strategy 84 ...

Page 85: ...sed for restore the failed running and pending objects need to be backed up again by restarting the session manually Failover of the node during backup activity Application backup The backup session fails The session needs to be restarted manually Cell Manager installed outside a cluster devices connected to the cluster nodes In the environment depicted below The Cell Manager installed outside a c...

Page 86: ...tems that can be backed up in the cluster Physical Node A Physical Node B Virtual Server Virtual server backup If you select the virtual server in the backup specification then the backup session will back up the selected active virtual host server regardless of the physical node the package or group is currently running on Planning your backup strategy 86 ...

Page 87: ...re the failed running and pending objects need to be backed up again by restarting the session manually Failover of the node during backup activity Application backup The backup session fails The session needs to be restarted manually IMPORTANT If a failover during backup activity occurs in such a configuration the MA may not be able to properly abort the session This results in the corruption of ...

Page 88: ...or sessions aborted during the failover The Data Protector Cell Manager is configured to run both during the normal operation and during the failover on nodes other than the application node the Data Protector cluster critical resources are defined in some other package MC ServiceGuard or group Microsoft Cluster Server as the application cluster critical resources Backup device s connected to the ...

Page 89: ... systems that can be backed up in the cluster Physical Node A Physical Node B Virtual Server Virtual server backup If you select the virtual server in the backup specification then the backup session will back up the selected active virtual host server regardless of the physical node the package or group is currently running on Concepts guide 89 ...

Page 90: ...pplication that just switched to the backup system Data Protector can abort the running sessions If the backup is more important or it is just pending Data Protector continues the sessions The following is the expected backup behavior under this configuration Table 5 Backup behavior Result Condition Successful backup Failover before a backup starts IMPORTANT To restart the session the appropriate ...

Page 91: ...ment producing a very highly available backup environment For more information see the HP Data Protector zero downtime backup administrator s guide Full and incremental backups Data Protector provides two basic types of filesystem backups full and incremental A full backup saves all the files selected for backup in a filesystem An incremental backup saves only those files that have changed since t...

Page 92: ...ckup snapshot backup and data mover backup are available with Data Protector application integrations For more information see the respective HP Data Protector integration guides for more information Full backups Full backups always back up all selected objects even if there are no changes since the previous backup Synthetic backup Synthetic backup is an advanced backup solution that eliminates th...

Page 93: ...d up in the next full backup Enhanced incremental backup Enhanced incremental backup reliably detects and backs up also renamed and moved files as well as files with changes in attributes Enhanced incremental backup also eliminates unnecessary full backups of an entire backup object when some of the trees selected for backup change For example if an additional directory is selected for backup sinc...

Page 94: ...r1 9 A leveled incremental backup shown in Figure 24 on page 95 depends on the last backup of the next lower level that is still protected For example an Incr1 backup saves all changes since the last full backup while an Incr5 backup saves all changes since the last Incr4 backup An Incr1 9 backup never references an existing Incr backup Planning your backup strategy 94 ...

Page 95: ...elative referencing of backup runs with various backup types See the text following the table for a full explanation Table 7 Relative referencing of backup runs Incr1 Full 1 Incr2 Full 2 Incr2 Incr1 Full 3 Incr Full 4 Incr Incr1 Full 5 Incr Incr2 Incr1 Full 6 Incr Incr Incr1 Full 7 Concepts guide 95 ...

Page 96: ... a full backup an Incr1 and another incremental is running Data Protector references the currently running backup to the previous incremental that is Incr1 In the eighth row the Incr3 is executed as Incr2 and in the eleventh row the Incr3 is executed as Incr1 Considering restore To restore the latest data you need media from your last full backup and subsequent incremental backups Therefore the mo...

Page 97: ...r common use of the incremental backup concept is indicated in Figure 26 on page 98 Here the required space on the media is slightly larger Only two media sets need to be accessed to restore to the desired point in time Note that there is no dependency on any previous Incr1 media set for this restore unless the desired restore point in time would be moved Concepts guide 97 ...

Page 98: ...from leveled incremental backups Note that you must set the appropriate data protection in order to get all needed full and incremental backups for restore If the data protection is not properly set you can get a broken restore chain For more information see Appendix B on page 331 Planning your backup strategy 98 ...

Page 99: ... long time can cause the IDB to grow to unmanageable levels Data Protector allows you to trade off IDB growth with the convenience of restore by letting you specify catalog protection independently of data protection For example you can implement a policy that enables an easy and fast restore within four weeks after the backup by setting catalog protection to four weeks From then on restores can s...

Page 100: ... with each backup For more information on how catalog protection settings influence the IDB growth and performance see Catalog protection as an IDB key tunable parameter on page 201 The protection model used by Data Protector can be mapped to the concept of backup generations which is elaborated in Appendix B on page 331 Logging level What is logging level Logging level determines the amount of de...

Page 101: ... not browsing Once catalog protection has expired and data protection is still valid you cannot browse files in the Data Protector user interface but you can still restore data if you know the file name and the media The restore is slower as Data Protector does not know where on the media the desired data is located You can also import the media back into the IDB thus re establishing the informati...

Page 102: ... Backing up your data consists of some or all of the following steps Selecting what to back up from which client system the source of data Selecting where to back up the destination Selecting to write the same data to additional media sets mirroring Selecting how to back up backup options Scheduling a backup for automated operation You can specify all these when creating a backup specification Fig...

Page 103: ...u need to know what you want to back up how many mirrors you want to create which media and which devices you want to use for the backup and optionally some desired specific behavior for the backup Data Protector provides default behavior that is suitable for most cases You can customize backup behavior using Data Protector backup options Data Protector can back up a client with all the disks conn...

Page 104: ...f details on files and directories stored in the IDB Log All Log Files Log Directories No Log Note that changing the level of stored information affects the ability to browse the files using the Data Protector user interface when restoring For more information on logging levels see Logging level as an IDB key tunable parameter on page 199 Automatic load balancing Dynamic device allocation from a s...

Page 105: ... use of object mirroring improves the fault tolerance of backups and enables multi site vaulting However object mirroring during a backup session increases the time needed for backup For more information see Object mirroring on page 119 Media sets What is a media set The result of a backup session is backed up data on a medium or a media set Each backup session results in one or several media sets...

Page 106: ...ormed Within one backup specification you can schedule both ZDB to disk and ZDB to disk tape and specify a different data protection period for each individual or periodic scheduled backup Backup session When a backup session is started Data Protector tries to allocate all needed resources such as devices The session is queued for as long as the required minimum resources are not yet available Dat...

Page 107: ...ing already existing backups Staggering full backups Performing a full backup of all systems during the same day may cause network load and time window problems To avoid these problems use the staggered approach for full backups Table 8 The staggered approach Wed Tue Mon Incr1 Incr1 FULL system_grp_a Incr1 FULL Incr1 system_grp_b FULL Incr1 Incr1 system_grp_c Optimizing for restore The combination...

Page 108: ...ackups This policy reduces the media space and time needed for backing up because you only back up changes from the previous day However to restore files from a Thursday backup you need to provide the media for the full and each of the incremental backups until Thursday that is five media sets This complicates and slows down the restore Example 2 Figure 29 on page 109 depicts a scheduling policy b...

Page 109: ...ull backup every day To restore files from Thursday s backup you need to provide media for the full and for Thursday s incremental backup that is two media sets only This considerably simplifies and speeds up the restore Example 3 Depending on your environment and requirements the best solution could lie somewhere in between For example you may have the following scheduling policy Concepts guide 1...

Page 110: ...up process Data Protector provides extensive functionality supporting unattended or automatic backup during lights out time This section describes how to plan your scheduling policies how these policies influence the behavior of backup and provides examples of scheduling policies This section focuses on longer periods of unattended operation spanning from several days to weeks rather than the unat...

Page 111: ...ion policy See Implementing a media rotation policy on page 143 This will show if you can keep enough media inside the planned library to operate for the desired period without having to handle media manually What about mount prompt handling Consider whether to use one or several libraries This enables automatic operation since Data Protector can have access to all or most of the media hence signi...

Page 112: ...owing methods of duplicating backed up data object copy object mirror and media copy See Table 9 on page 112 for an overview of the main characteristics of these methods Table 9 Data Protector data duplication methods Smart Media Copy Media copy Object mirror Object copy An entire medium An entire medium A set of objects from a backup session Any combination of object versions from one or several ...

Page 113: ...r media with expired protection as target media After the operation both the source and the target media become non appendable Copying objects What is object copy The Data Protector object copy functionality enables you to copy selected object versions to a specific media set You can select object versions from one or several backup sessions or object consolidation sessions During the object copy ...

Page 114: ...teractively or specify an automated start of the session Data Protector offers two types of automated object copying post backup object copying and scheduled object copying Post backup object copying Post backup object copying takes place after the completion of a session that is specified in the automated object copy specification It copies objects selected according to the automated object copy ...

Page 115: ... network attached devices Devices are locked at the beginning of the session Devices that are not available at that time cannot be used in the session as device locking after the beginning of the session is not possible If a media error occurs the device with errors will be avoided within that copy session Selection of the media set to copy from If an object version that you want to copy exists on...

Page 116: ...type Support of advanced backup concepts You can use backup concepts such as disk staging Vaulting Vaulting is a process of storing media in a safe place often called a vault where they are kept for a specific period of time For details see Vaulting on page 151 It is recommended to keep a copy of the backed up data on site for restore purposes To obtain additional copies you can use the object cop...

Page 117: ...om backup sessions with the device concurrency more than 1 Multiplexed media may compromise the privacy of backups and require more time for restore Data Protector offers a possibility of demultiplexing of media Objects from a multiplexed medium are copied to several media that you specify See Figure 33 on page 118 Concepts guide 1 17 ...

Page 118: ...cking up data in several stages to improve the performance of backups and restores reduce costs of storing the backed up data and increase the data availability and accessibility for restore The backup stages consist of backing up data to media of one type and later moving the data to media of a different type The data is backed up to media with high performance and accessibility but limited capac...

Page 119: ... and unloading of media The use of disk staging reduces backup time and prevents media deterioration Object mirroring What is object mirroring The Data Protector object mirror functionality enables writing the same data to several media sets simultaneously during a backup session You can mirror all or some backup objects to one or more additional media sets Concepts guide 1 19 ...

Page 120: ...ffect the creation of the other mirrors Object mirror operation In a backup session with object mirroring each selected object is backed up and at the same time mirrored as many times as specified in the backup specification See Figure 35 on page 121 Let us take Object 3 in the figure as an example The Disk Agent reads a block of data from the disk and sends it to the Media Agent that is responsib...

Page 121: ...ces are selected before network attached devices When you perform an object mirror operation from the command line load balancing is not available Backup performance Object mirroring has an impact on backup performance On the Cell Manager and Media Agent clients the impact of writing mirrors is the same as if additional objects were backed up On these systems the backup performance will decrease d...

Page 122: ...offers automated media copying For more information see Automated media copying on page 124 How to copy media You need two devices of the same media type one for the source medium and one for the target medium The source medium is the medium being copied while the target medium is the medium to which data is copied When you copy media within a library that has multiple drives you can use one drive...

Page 123: ...he automated media copy session begins Data Protector generates a list of media referred to as source media based on the parameters specified in the automated media copy specification For each source medium a target medium is selected to which the data will be copied The target media are selected from the same media pool as the source media from a free pool or from the blank media in a library For...

Page 124: ... of the backed up data You can also keep smart media copies for archiving or vaulting purposes Data Protector offers two types of smart media copying automated smart media copying and interactive smart media copying Automated smart media copying You can create automated smart media copying of the following types Post backup smart media copying which takes place after the completion of a backup ses...

Page 125: ...k Therefore plan for the time needed to restore specific data Factors affecting restore duration The restore duration depends on a number of factors such as The amount of data to be restored This also directly influences all the following items A combination of full and incremental backups For more information see Full and incremental backups on page 91 Media and devices used for backup For more i...

Page 126: ...chain for the same point in time of an object By default Data Protector selects the most convenient restore chain and the most appropriate media within the selected restore chain Media location priority To influence the selection of the media set specify the media location priority This is important if you use the concept of multi site storage If you keep media at different sites you can specify w...

Page 127: ... cases In a large network environment where it is best to have a dedicated person to do such jobs In an environment where end users do not have the necessary computer knowledge to restore files operators can be trusted to restore sensitive data What needs to be done You need to do the following to implement this policy Add the backup operators or network administrators that will restore data for o...

Page 128: ...sers that are allowed to restore their own data to the Data Protector end users user group For additional security you may limit the Data Protector access of these users to a specific system only Install the Data Protector user interface on the systems the end users are using Data Protector automatically checks the user rights and allows restore functionality only When you configure backups of the...

Page 129: ... have only fundamental system knowledge Disaster recovery is a complex task that involves extensive planning and preparation before execution You need to have a well defined step by step process in place to prepare for and recover from disastrous situations The disaster recovery process consists of 4 phases 1 Phase 0 planning preparation is the prerequisite for a successful disaster recovery CAUTI...

Page 130: ...an be connected to the faulty system and booted On UNIX systems the auxiliary disk with a minimal operating system networking and Data Protector agent installed is used to perform Disk Delivery Disaster Recovery Enhanced Automated Disaster Recovery EADR Enhanced Automated Disaster Recovery EADR is a fully automated Data Protector recovery method for Windows clients and Cell Manager where user inte...

Page 131: ...eir configurations as a whole set Recovery using third party tools for Windows This often consists of a special tool that backs up the system partition as a snapshot which can be restored rapidly The method conceptually requires the following steps 1 Restore the system partition using the third party tool 2 Restore any other partition perhaps selective if required using the standard backup tool It...

Page 132: ...Planning your backup strategy 132 ...

Page 133: ... on page 147 Media management after backup sessions on page 151 Devices on page 153 Standalone devices on page 160 Small magazine devices on page 161 Large libraries on page 162 Data Protector and Storage Area Networks on page 170 Media management Serious challenges can arise when administrating large quantities of media in an enterprise environment Data Protector media management functionality al...

Page 134: ...rary devices the media management functionality enables the running of backups without the need for an operator to handle media for weeks Recognition and support of barcodes on large libraries with barcode support and silo devices Automatic recognition of Data Protector media format and other popular tape formats Data Protector only writes to blank media initialized formatted by Data Protector You...

Page 135: ...oses For more information on vaulting see Media management after backup sessions on page 151 4 Recycling media for new backups once the data on the media is no longer needed 5 Retiring media Once a medium has expired it is marked poor and will no longer be used by Data Protector See Calculating media condition on page 150 Media pools Data Protector media pools manage large numbers of media hence r...

Page 136: ...s of strictness as to which media can be used for backup They range from strict where Data Protector requires a specific medium to loose where Data Protector accepts any suitable medium in the pool including new blank media Every device is linked to a default pool This pool can be changed in the backup specification For information on other media pool properties see the online Help index media poo...

Page 137: ...d for a similar kind of backup to media pools allows you to apply common media handling policies on a group level while not bothering with each medium individually All media in a pool are tracked as one set and have the same media allocation policy Default media pools Data Protector provides default media pools for various media types These default media pools allow you to quickly run backups with...

Page 138: ... the GUI whether deallocation is done automatically Media from the PC backup pool in Figure 36 on page 138 for example are not automatically deallocated Protected allocated used media belong to a specific regular pool like the SAP pool while free Data Protector media can be automatically moved to a free pool This free pool is later used for allocation of free media for all pools that are configure...

Page 139: ...tions You cannot select different condition factors for each pool Instead all pools that use a free pool use condition factors configured for this free pool You cannot move protected media to a free pool and unprotected media to a regular pool that has automatic deallocation configured You cannot use some operations such as Import Copy and Recycle on media in a free pool Pools with magazine suppor...

Page 140: ...rary devices contain a number of physical drives and media used by different departments or applications You can configure a media pool for each department as shown in Figure 38 on page 141 and decide which drive in the library will handle the actual data transfer The arrow pointing from a backup specification to a media pool indicates that you defined a target media pool in a backup specification...

Page 141: ...ws an example when data is backed up to media in a media pool with multiple devices simultaneously Higher performance is achieved due to the use of several devices in parallel regardless of which pool is used For more information see Device lists and load balancing on page 155 Concepts guide 141 ...

Page 142: ... in multiple media pools on multiple devices simultaneously If you want to use the same device with different pools you need to create several backup specifications In the example below a separate media pool is dedicated to each database application Media management and devices 142 ...

Page 143: ...Where are media stored How often media are used When can media be overwritten and re used for new backups When are media old enough to be replaced Traditional backup strategies used with older backup tools required a thoroughly planned and well defined media rotation policy controlled by the administrator rather than a backup application With Data Protector you can implement a rotation policy by s...

Page 144: ...condition of the media Data Protector provides a security mechanism so that media with protected data do not get overwritten accidentally by Data Protector Media needed for rotation Estimating the quantity of needed media The following helps to estimate the quantity of media you might need for a full rotation Determine if the media capacity can be used fully or if some media are non appendable and...

Page 145: ...ia for backup it initializes formats the media This saves the information about each medium medium ID description and location in the IDB and also writes this information on the medium itself to the medium header When you initialize format media you also specify to which media pool the media belong If media are not initialized formatted before backup Data Protector can initialize format blank medi...

Page 146: ...wed for this medium For example if you try to write a new backup to this medium the media management system checks whether the data protection for the data already contained on this medium has expired The user defined label is used to identify a specific medium Location field Backup media are usually stored in different locations For example a backup needs to be available on site for fast restore ...

Page 147: ...s Data Protector automatically selects media for backup based on media allocation policies This simplifies media management and media handling a backup operator does not need to manually administer the media for backup Media allocation policy You can influence how media are selected for backup using the media allocation policy You can specify a loose policy where any suitable medium is used for ba...

Page 148: ...m used from a previous backup session Subsequent media needed in this session are written from the beginning of the tape hence only unprotected or new tapes can be used Appending media conserves media space but can add complexity to vaulting because one medium can contain data from several media sets Non Appendable A backup session starts writing data at the beginning of the first available medium...

Page 149: ...s an example of eight objects that have been written during four sessions with the concurrency settings that allow for simultaneous writes In this case obj_1 obj_2 and obj_3 have been backed up concurrently in sess_1 obj_4 and obj_5 have been backed up concurrently in sess_2 and so on Obj_1 could come from system_A and obj_2 from system_B or they could come from different disks on the same system ...

Page 150: ...write all or some objects to several media sets simultaneously using the Data Protector object mirror functionality For more information see Object mirroring on page 119 Calculating media condition Media condition factors Data Protector calculates the state of used media using media condition factors The state of the poorest medium in a pool determines the state of the entire pool For example as s...

Page 151: ...er the backup is done For more information on data and catalog protection see Keeping backed up data and information about the data on page 99 Protecting media from physical damage Media with permanent data may be stored to a safe place Copying backed up data and keeping the copies at a safe place See Duplicating backed up data on page 112 The following sections describe how to vault media and res...

Page 152: ...object mirror functionality during backup or the object copy or media copy functionality after backup 5 Selecting the media you want to store in a vault ejecting the media and storing it in the vault 6 Selecting the media with expired data which is in a vault and inserting the media in a library Vaulting usage example Your company backup policy for example says that you must back up data daily Eac...

Page 153: ... export the media and import them back Then specify that you want to read the detailed catalog data from those media Now you will be able to select files and directories in the Data Protector user interface again For more information on how data protection and catalog protection policies influence restores see Keeping backed up data and information about the data on page 99 Devices Data Protector ...

Page 154: ... By selecting a dedicated menu item in the GUI a web browser is invoked and the console interface is automatically loaded into it For a list of device types for which this feature is available see the HP Data Protector product announcements software notes and references IMPORTANT Before using the library management console consider that some operations which you can perform through the console may...

Page 155: ... session you just specify the devices to be used When to use load balancing Use load balancing when You back up a large number of objects You use library autochanger devices with several drives You do not need to know on which media objects will be backed up You have a good network connection You want to increase the robustness of the backup Data Protector automatically redirects the backup operat...

Page 156: ...the next three pending objects are assigned to the new device This means that each failure of a device can cause a maximum of three objects to be aborted provided that other devices are available for the backup session to continue Device streaming and concurrency What is device streaming To maximize a device performance it must be kept streaming A device is streaming if it can feed enough data to ...

Page 157: ...kup sessions on page 220 Multiple data streams Data Protector allows you to concurrently back up parts of a disk to multiple devices This feature is useful for backing up very large and fast disks to relatively slow devices Multiple Disk Agents read data from the disk in parallel and send the data to multiple Media Agents This method speeds up the backup but requires that you take into account the...

Page 158: ...s a file mark that takes up media space However a larger number of file marks results in faster restores because a Media Agent can more quickly locate the segment containing the data to be restored Optimal segment size depends on the type of media used in the device and the kind of data to be backed up For example by default the segment size for DLT medium is 150 MB Block size Segments are not wri...

Page 159: ...ary There are two basic reasons to change this setting Shortage of memory The shared memory required for a Media Agent can be calculated as follows DAConcurrency NumberOfBuffers BlockSize Reducing the number of buffers from 8 to 4 for instance results in a 50 reduction in memory consumption with performance implications Streaming If the available network bandwidth varies significantly during backu...

Page 160: ...or example a DDS device is configured as a compressed device named DDS_C and as a non compressed device DDS_NC as shown in Figure 46 on page 160 Specify the same lockname DDS for both devices Figure 46 Device locking and device names Standalone devices What are standalone devices Standalone devices are devices with one drive that reads writes to one medium at time Standalone devices are used for s...

Page 161: ...rder When a medium gets full the next medium is loaded and used for backup Small magazine devices What are magazine devices Magazine devices group a number of media into a single unit called a magazine Data Protector treats the magazine as if it were a single medium A magazine has a larger capacity than a single medium and is easier to handle than several single media For a list of supported devic...

Page 162: ... announcements software notes and references Handling of media The Data Protector user interface provides a special library view which simplifies managing library devices Media in a large library device can all belong to one Data Protector media pool or they can be split into several pools Configuring a library When configuring a device you configure the slot range you want to assign to Data Prote...

Page 163: ...ect mail slots Library devices provide special enter eject mail slots an operator uses to enter or eject media to or from the device Depending on the device more than one enter eject slot can be provided In case of a single mail slot media are inserted one by one while in case of multiple mail slots a particular number of slots can be used in one enter eject operation Data Protector allows you to ...

Page 164: ...barcode reader Data Protector recognizes cleaning tape barcodes automatically if they have the CLN prefix For devices without a cleaning tape a dirty drive detection will cause a cleaning request to be displayed on the session monitor window The operator must clean the device manually You cannot continue your backup without cleaning the drive since the backup may fail because data may not be corre...

Page 165: ...nt or the NDMP Media Agent installed With Data Protector there are two types of protocols used for drive control SCSI for SCSI or Fibre Channel connected drives This protocol is implemented in both the General Media Agent and in the NDMP Media Agent NDMP for NDMP dedicated drives This protocol is implemented in the NDMP Media Agent only On the other hand there are four types of protocols used for ...

Page 166: ...nt systems controlling the backup of an NDMP server on client systems configured for NDMP dedicated drives In all other cases the two Data Protector Media Agents are interchangeable Table 10 on page 166 show the Data Protector Media Agent the General Media Agent or the NDMP Media Agent required on client systems configured for drive control of a library with drives shared among multiple client sys...

Page 167: ...ntrol Robotic control protocol NDMP SCSI StorageTek ACS ADIC GRAU NDMP Media Agent or General Media Agent NDMP Media Agent or General Media Agent NDMP Media Agent or General Media Agent NDMP Media Agent or General Media Agent Drive control protocol NDMP or SCSI Exemplary configurations Figures Figure 48 on page 168 to Figure 50 on page 170 show exemplary configurations of shared drives in librarie...

Page 168: ...rotector client system with the attached robotics can also have one or more drives attached The NDMP dedicated drive in the library is configured on the Data Protector client system with the NDMP Media Agent installed The NDMP drive control protocol is used by the NDMP Media Agent on the client Another drive in the library is configured on and attached to the Data Protector client system with eith...

Page 169: ...NDMP dedicated drive attached the Data Protector client system on which the robotics and the NDMP dedicated drive are configured can only have the NDMP Media Agent installed since the NDMP drive control protocol is used for the NDMP dedicated drive The NDMP dedicated drive in the library is configured on the Data Protector client system with the NDMP Media Agent installed The NDMP drive control pr...

Page 170: ...e NDMP Media Agent installed The NDMP drive control protocol is used by the NDMP Media Agent on the client Another drive in the library is configured on and attached to the Data Protector client system with either the General Media Agent or the NDMP Media Agent installed The SCSI drive control protocol is used by the General Media Agent or the NDMP Media Agent on the client Data Protector and Stor...

Page 171: ...ty of devices The SAN concept allows the exchange of information between multiple data storage devices and servers The servers can access data directly from any device and do not need to transfer data over the conventional LAN A SAN consists of servers backup devices disk arrays and other nodes all connected with a fast network connection typically Fibre Channel This additional network provides of...

Page 172: ...ssion of large data files at up to 4 25 gigabits per second and can be deployed between sites within a 30 kilometer range Fibre Channel is the most reliable highest performance solution for information storage transfer and retrieval available today Fibre Channel connects nodes using three physical topologies that can have variants Point to point Loop Switched Media management and devices 172 ...

Page 173: ...andwidth An FC AL loop is typically implemented using an FC AL hub with automatic port by pass Automatic port by pass allows the hot plug of nodes into the loop LIP A Loop Initialization Primitive Protocol LIP may be triggered by a number of causes most common being the introduction of a new device The new device could be a former participant that has been powered on or an active device that has b...

Page 174: ... bandwidth to connected nodes The switched topology provides real hot plug of nodes NOTE Hot plug refers to protocol capabilities such as reset re establish communication and so on Take into account that ongoing data transfers are interrupted during hot plug and that some devices such as tape devices cannot handle this behavior Connecting nodes to or disconnecting nodes from a loop is likely to in...

Page 175: ... using locking mechanisms SAN technology provides an excellent way to manage the robotics of a library from multiple systems This allows the option to manage the robotics from one system classic or allow each system that uses the library to access the robotics directly provided the requests to the robotics are synchronized between all the systems involved Configuring multiple paths to physical dev...

Page 176: ...o configure 10 devices with the same lock name With this version of Data Protector you can simplify the configuration by configuring a single multipath device for all paths Multipath devices increase system resilience Data Protector will try to use the first defined path If all paths on a client are inaccessible Data Protector will try to use paths on the next client Only when none of the listed p...

Page 177: ...urpose of locking is to ensure that only one system at a time communicates with a device that is shared between several systems Device locking with multiple applications If Data Protector and at least one other application want to use the same device from several systems the same generic device locking mechanism has to be used by each application This mechanism needs to work across several applica...

Page 178: ... client system that has direct access to the library robotics This is called Indirect Library Access In the example depicted in Figure 54 on page 179 two client systems are attached to an HP StorageWorks DLT multidrive library The client system castor controls the robotics and the first drive while the client system pollux controls the second drive A Data Protector Media Agent on pollux communicat...

Page 179: ... Direct Library Access There is no single controlling client system for the robotics a failure of the system controlling the robotics does not exclude any other system from using the library This is performed without reconfiguration Several client systems can be used to control the robotics Figure 55 on page 180 shows an HP StorageWorks DLT multidrive library attached via a SAN to two client syste...

Page 180: ...lication you need to configure devices with virtual hostnames instead of real node names Configure as many devices for each physical device as you need using the Lock Name device locking mechanism For details see Device locking on page 177 Static drives Static drives are devices that are configured on a real node in a cluster They can be used to back up data from systems with disks that are not sh...

Page 181: ...using virtual system names Floating drives should be configured for the backup of cluster aware applications This ensures that no matter on which node in the cluster the application is currently running Data Protector always starts a Media Agent on that same node Concepts guide 181 ...

Page 182: ...Media management and devices 182 ...

Page 183: ...scribes security issues related to using Data Protector for backing up data restoring data or monitoring the progress of backup sessions Access to backed up data Backing up and then restoring data is essentially the same as copying data Therefore it is important to restrict access to this data to authorized users only Data Protector provides the following user related security All users intent on ...

Page 184: ...tionality For example only members of the admin user group can access all Data Protector functionality Operators can by default start and monitor backups TIP In small environments only one person is required to perform all backup tasks This person must be a member of the Data Protector admin user group In this case there is no need to add other users to the Data Protector configuration Depending o...

Page 185: ... NOTE Admin capabilities are powerful A member of the Data Protector admin user group has system administrator privileges on all the clients in the Data Protector cell Data Protector user rights Data Protector users have the Data Protector user rights of the user group they belong to For example all members of the admin user group have the rights of the Data Protector admin user group When configu...

Page 186: ...Users and user groups 186 ...

Page 187: ...ation and maintenance It is organized as follows About the IDB on page 187 IDB architecture on page 189 IDB operation on page 194 Overview of IDB management on page 196 IDB growth and performance on page 197 About the IDB What is the Data Protector Internal Database IDB The IDB is an embedded database located on the Cell Manager which keeps information regarding what data is backed up on which med...

Page 188: ...m Therefore the Data Protector administrator must understand the IDB and according to needs decide which information to keep in the IDB and for how long It is the administrator s task to balance between restore time and functionality on the one hand and the size and growth of the IDB on the other Data Protector offers two key parameters to assist in balancing your needs logging level and catalog p...

Page 189: ...on page 340 The IDB in the Manager of Managers environment In the Manager of Managers MoM environment you can use the Centralized Media Management Database CMMDB which allows you to share devices and media across several cells For more information on the MoM functionality see Enterprise environments on page 45 IDB architecture The IDB consists of the following parts MMDB Media Management Database ...

Page 190: ...ated using transaction logs The transaction logs are stored in the db40 logfiles syslog directory The CDB objects and positions and the MMDB parts represent the core part of the IDB The DCBF SMBF and SIBF parts of the IDB consist of binary files Updates are direct no transactions Figure 56 IDB parts Media Management Database MMDB MMDB records The Media Management Database stores information about ...

Page 191: ... backed up objects on media For each backed up object Data Protector stores information about the media and data segments used for the backup The same is done for object copies and object mirrors Pathnames of backed up files filenames together with client system names Filenames are stored only once per client system The filenames created between backups are added to the CDB Filename size and growt...

Page 192: ...ch as file size modification time attributes protection and so on One DC Detail Catalog binary file is created for each Data Protector medium used for backup When the medium is overwritten the old binary file is removed and a new one is created DCBF size and growth In an environment where filesystem backups using the Log all option are typical the DCBF occupies the largest part typically 80 of the...

Page 193: ... session The files are grouped by year and month SMBF size and growth The SMBF size depends on the following The number of sessions performed since one binary file is created per session The number of messages in a session One session message occupies approximately 200 bytes on Windows and 130 bytes on UNIX systems You can change the amount of messages displayed when backup restore and media manag...

Page 194: ...d in the IDB Also for each object and each object mirror in the session an object version record is created All these records are stored in the CDB and have several attributes The Backup Session Manager updates media during a backup All media records are stored in the MMDB and are allocated for a backup depending on policies When a data segment is written to the tape and then to a catalog segment ...

Page 195: ...store the selected files During object copying or object consolidation During an object copy or object consolidation session the same processes run as during a backup and a restore session Basically data is read from source media as if it was restored and written to target media as if it was backed up An object copy or object consolidation session has the same effect on the IDB operation as backup...

Page 196: ...lenames are not used To remove such filenames Data Protector scans all DC binary files and then removes unused filenames File versions purge When the catalog protection of all object versions stored on a specific medium expires automatic daily maintenance of DC binary files removes the respective binary file Overview of IDB management IDB configuration One of the most important steps in setting up...

Page 197: ...l you use the greater influence it has on the IDB For details see IDB growth and performance key tunable parameters on page 198 Catalog protection settings Catalog protection determines how long the information about backed up data is available in the IDB The longer period of catalog protection you set the greater influence it has on the IDB For details see IDB growth and performance key tunable p...

Page 198: ...ilename part of IDB on UNIX on Windows all characters take up two bytes in the IDB Number of object copies and object mirrors The more object copies and object mirrors you create the more information is stored in the IDB For object copies and object mirrors the IDB stores the same information as for backed up objects except for filenames IDB growth and performance key tunable parameters The loggin...

Page 199: ...less of the logging level used during backup Data Protector provides four logging levels that control the amount of details about files and directories written to the IDB Logs all detailed information about backed up files and directories names versions and attributes Log All Logs all detailed information about backed up files and directories names and versions This represents approximately 30 of ...

Page 200: ...f the Log Directories option is set browsing of directories is possible if the Log Files option is set full browsing is possible but file attributes size creation and modification dates and so on are not displayed Regardless of the logging level set it is always possible to restore your data Instead of browsing for your data you can always manually select a file to restore if you know the name of ...

Page 201: ...alog protection expires for all objects on the medium Impact on performance Catalog protection settings do not have any impact on the backup performance Catalog protection and restore When catalog protection expires data is restored as if it were backed up using the No Log option See Logging level as an IDB key tunable parameter on page 199 Recommended usage of logging level and catalog protection...

Page 202: ...ions of files For backups with the Log Directories or No Log options set you can import catalogs from the media which in a reasonably short time allows the possibility to browse for the selected object For information on importing catalogs from media see the online Help index importing catalogs from media Different logging levels for object copies Backed up objects and object copies or mirrors of ...

Page 203: ... a final solution you can always introduce another IDB and redirect half of the systems into it You can configure Report on System Dynamics which informs you about dynamics of the growth of filenames on a particular client IDB size estimation If you mainly perform filesystem backups the IDB can grow to a significant size larger than 16 GB under certain conditions If you perform disk image or onlin...

Page 204: ...The Data Protector internal database 204 ...

Page 205: ...service expansion Because IT groups must manage the risk of data loss data backup and recovery are critical elements in IT service delivery and management Threats ranging from user error to viruses or other unauthorized data access and modification or the occasional failure of the storage device itself put data at risk constantly Business critical data loss can cost the enterprise thousands even m...

Page 206: ...ter information and insight into overall IT service delivery Data Protector provides IT service managers with key data to enable operative monitoring and planning of backup and data recovery operations This data can be used in service availability and recovery planning activities that are key if service agreements are to be adhered to In addition Data Protector information can be used to implement...

Page 207: ...egistration of this data can be performed with HP Performance Agent PA Built in monitoring of running sessions allows you to instantly react to occurrences in your backup environment The Data Protector built in notification and reporting engine allows you to receive concise reports as well as immediate alerts in many different formats such as ASCII HTML and spreadsheet compatible format and delive...

Page 208: ...nment The Data Protector built in Java based online reporting allows you to do online reporting from wherever you are in your network even from a remote location without the need to have the Data Protector user interface installed on your local system This functionality requires a Web browser Application Response Measurement version 2 0 ARM 2 0 API What Is ARM The ARM API is an emerging standard f...

Page 209: ...t is a fairly simple task to integrate Data Protector with an application like PA that supports the ARM API On Windows platforms this is completely automatic If Data Protector is installed on a system where PA is already present or vice versa the transaction data will immediately show up in PA and HP Performance Manager PM On HP UX the only required task is to create a link from a PA library to a ...

Page 210: ...perator can react to them Service monitoring OMW monitors all Data Protector services running on the Cell Manager as well as any Data Protector client system In case of failure of any of these services OMW immediately alerts the operator OMW can also be configured in such a way that it automatically attempts to restart the failed service SNMP traps SNMP traps allow a Service Management application...

Page 211: ...he licensing report which is a Data Protector license utilization report and the dev_unused report which lists devices that are currently not used for backup object copy or object consolidation and are consequently available Problem Reports such as the session_statistics report which consists of information about failed backup copy and consolidation sessions An administrator can receive an hourly ...

Page 212: ... ASCII format that contains a backup status report Event logging and notification The Data Protector Event Log is a central repository of all Data Protector related notifications The Data Protector built in notification engine sends alerts or activates the Data Protector reporting mechanism based on the log entries The event log is the information source for SLA compliance reports in Data Protecto...

Page 213: ...essages and messages about the Data Protector services if they are stopped to Windows Application Log set the EventLogMessages variable in the Data Protector global options file to 1 For more information on the Data Protector global options file see the HP Data Protector troubleshooting guide Java based online reporting Data Protector comes with a Java based online reporting capability that lets y...

Page 214: ...Managers is as convenient as managing just one IT service providers can administer larger clients environments without adding employees For more information on MoM see the online Help index MoM environment Using the data provided by Data Protector What can I do with the data Here are some examples of what you can do with the data that Data Protector provides Real time alerting of backup or restore...

Page 215: ...Data Protector Facilitates a specific consistent measurable level of service Availability of Data Protector information through a web interface Graphical representation of data Figure 59 Example of an IT service provider environment with service management access through the client portal Data Protector OM R integration The integration of Data Protector with HP Operations Manager software OM is ex...

Page 216: ... of service performance metrics one of the IT SLA parameters Figure 60 Data Protector Reporter example In addition to SLA compliance reports An IT Service Provider can generate monthly operational reports for the Data Protector environment For example the Data Protector Operational Error Status report aggregates the problem data and can be used by an IT service provider for operational planning Se...

Page 217: ... Data Protector OM SIP This integration also uses SIP to provide Data Protector information through a web based interface It does not require OVO to be installed The integration provides information through tables and gauges Concepts guide 217 ...

Page 218: ...Figure 62 Direct SIP integration example Service management 218 ...

Page 219: ...s several background processes on UNIX and services on Windows that enables it to run backup and restore sessions It provides the necessary communication paths activates backup and restore sessions starts Disk Agents and Media Agents stores information about what was backed up manages media and performs similar functions Inet The Data Protector Inet service runs on each Windows system in the Data ...

Page 220: ...ver UIProxy service runs on the Data Protector Cell Manager It is responsible for communication between the Java GUI Client and the Cell Manager moreover it performs business logic operations and sends only important information to the client The service is started as soon as Data Protector is installed on the Cell Manager For instructions on how to manually start or stop the Data Protector proces...

Page 221: ...here are for a standard network backup For data flow and processes specific to other types of backup such as direct backup see the related chapter When a backup session is started the following happens 1 The Backup Session Manager BSM process is started on the Cell Manager system and controls the backup session This process reads the backup specification for information on what to back up and whic...

Page 222: ...writing mirrored objects are daisy chained Each Media Agent writes the received data to media and forwards it to the next Media Agent in the chain 6 The BSM monitors the progress of the session and starts new Disk Agents and new Media Agents as necessary 7 When the backup session is completed the BSM closes the session Figure 63 Backup session information flow 1 How many sessions can run concurren...

Page 223: ...xec commands enable you to execute some actions after a backup or a restore session A typical pre exec action would be to shut down a database to put data in a consistent state The pre exec and post exec commands can be set for a backup specification and as such executed on the Cell Manager system or they can be specified as a backup object option and thus executed on the client system where the r...

Page 224: ...ount request A mount request in a backup session appears when Data Protector needs a new medium for backup and the medium is not available Data Protector issues a mount request for one of the following reasons Issuing a mount request There is not enough space on the backup media and there are no new media available Data Protector media allocation policy for backup requires a medium that is not ava...

Page 225: ... present on the system when the backup was configured Backup with disk discovery is particularly useful in dynamic environments where configurations change rapidly It enables you to select or exclude specific directories in the backup How does it compare to a standard backup In a standard backup you explicitly configure specific disks directories or other objects for backup by configuring them in ...

Page 226: ... media needed for restore and writes the information about the restore session to the IDB such as generated messages 3 The RSM starts Media Agents MAs on the systems with devices used for restore For each drive used in parallel a new Media Agent is started 4 The RSM starts Disk Agents DAs for each disk restored in parallel The actual number of Disk Agents started depends on the objects you selecte...

Page 227: ...vices Queuing of restore sessions Timeout When a restore session is started Data Protector tries to allocate all needed resources such as backup devices The session is queued for as long as the required minimum resources are not yet available Data Protector tries to allocate the resources for a specific period of time the timeout Timeout is user configurable If the resources are still unavailable ...

Page 228: ...iple objects is read concurrently from media in a single path and restored A parallel restore significantly improves restore performance when restoring multiple objects from the same media For more information see Figure 66 on page 229 How does it compare to a standard restore Data from multiple Disk Agents is most of the time multiplexed and stored on the media See Figure 41 on page 149 In a stan...

Page 229: ...re Data Protector uses discontinuous object restore to improve restore performance After restoring a specific file or tree Data Protector repositions itself directly on the next file or tree on the medium if there s at least a single segment between the files or trees and continues the restore Within an individual restore object you can start multiple Disk Agents This way the restoring of multiple...

Page 230: ...ultiple users can monitor the same object copy session You may want to stop monitoring by disconnecting the user interface from the session The session will then continue in the background Object copy session data flow and processes What happens in an object copy session The information flow of an object copy session is shown in Figure 67 on page 232 When an object copy session is started the foll...

Page 231: ...s are selected before those with a different block size locally attached devices are selected before network attached devices 6 Media Agents loaded with the target media accept connections from the Media Agents loaded with the source media and start writing object copies to the target media If the block size of the source device is smaller than the block size of the destination device blocks are r...

Page 232: ...e timeout period can be set using the SmWaitForDevice global option Mount requests in an object copy session What is a mount request A mount request in an object copy session is issued when a source or a target medium needed for the object copy operation is not available Responding to a mount request Responding to a mount request includes providing the required medium and confirming the mount requ...

Page 233: ... have specified using the Data Protector Scheduler A post backup object consolidation session is started after the specified backup session finishes You can view the progress of an automated object consolidation session in the Data Protector monitor Interactive object consolidation session An interactive object consolidation session is started from the Data Protector user interface directly The Da...

Page 234: ...ne locally attached devices are selected before network attached devices 5 One Media Agent reads the full object version It sends the data to another Media Agent that reads incremental object versions The latter Media Agent does the actual consolidation and sends the data to the Media Agent that writes the data to the target media If the full backup and the incremental backups reside in the same f...

Page 235: ...ium Media management sessions What is a media management session A media management session is used to perform a certain action on the media such as initializing media scanning the content verifying data on the media and copying media Logging to the IDB Information about a media management session such as generated messages is stored in the IDB Data Protector monitor and media management session A...

Page 236: ...d messages to the Data Protector user interface where you can track the progress The session is also stored in the IDB 4 When the session is complete the MSM closes the session How many sessions can run A number of media management sessions can run in the cell at the same time if they do not use the same resources such as devices or media How Data Protector operates 236 ...

Page 237: ...es Relational tables are defined by their columns and are given a name Data is stored in rows in the table Tables can be related to each other and the database can be used to enforce these relationships Data can thus be stored in relational format or as object oriented structures such as abstract data types and methods Objects can be related to other objects and objects can contain other objects A...

Page 238: ...g files Any kind of recovery is done in two parts roll forward which applies transaction changes into the main database and roll back which removes uncommitted transactions Control files hold information about the physical structure of the database such as database names names and locations of a database s data files and log files and the time stamp of the database s creation This control data is ...

Page 239: ... up the database respectively configure the filesystem backup specification with all the data files included and specify the shut down program as a pre exec command and the start up program as a post exec command This method is relatively simple to understand and configure but has one key disadvantage the database is not accessible during the backup which is unacceptable for most business environm...

Page 240: ...nd restore operations A typical procedure to configure the backup of a database through the Data Protector integration is as follows 1 A database application specific agent is installed on the database system 2 The Data Protector integration is configured for each database Data needed for Data Protector to work with this database are stored on the database system into configuration files or regist...

Page 241: ...plications are aware of backup operation and keep track of which parts are backed up Several modes of backup are possible Besides full backups users can select block level incremental backups or only the backup of transaction logs Several modes of restore are possible and after the restore of data files the database can automatically restore transaction logs and apply them as configured Concepts g...

Page 242: ...Integration with database applications 242 ...

Page 243: ...ars over the last 20 years and continues to grow even faster Applications and services need to be online nearly all the time with maximum performance Backup windows are narrow and performance degradation due to backup or anything else is no longer acceptable In addition the requirement for solutions that do not demand substantial investment in solution specific equipment is also growing This multi...

Page 244: ...d data is not moved across the LAN The data moves directly from the client system to be backed up to a tape device without moving data through a backup server Direct backup supports backup of application data files and control files and of disk images either raw disk or raw logical volume Direct backup uses existing split mirror and Storage Area Network SAN technology to access application data wi...

Page 245: ...kup solution both by addition and omission For example direct backup Takes advantage of the most advanced XCopy features to speed backups Enables maximum uptime by leveraging existing hardware mirroring and snapshot capabilities Lets you take advantage of Data Protector s industry leading instant recovery capability to speed recovery Requires very little CPU and memory resource from the XCopy host...

Page 246: ...ere they are installed For information about platform tape drive and library support see Supported configurations on page 250 Direct backup requires the General Media Agent to be off the application server Also the Resolve Media Agent must be on the application server or other host and must have access to the XCopy engine For discussion of Resolve Agent placement see Supported configurations on pa...

Page 247: ...iate method of interpreting the disk s file system Note that Resolve does not read the data itself it reads only information related to disk location It then returns information suitable for direct input to the XCopy engine About XCopy XCopy is a National Committee for Information Technology NCITS standard that allows two devices to communicate with one another without the help of another computer...

Page 248: ... Release application Resolve blocks Move data The XCopy engine Reconnect and resynchronize mirror Backup stages for data files Original data files that are to be backed up go through several stages before they end up as copies that are used later to perform restores The direct backup process generally follows these steps 1 Obtain data file consistency quiesce the application 2 Read meta data file ...

Page 249: ... issue on the backup end as the data does not pass through the server during this process On restore however the data does impact the server Requirements and support This section lists the requirements for using direct backup successfully and the file systems and applications that direct backup supports Data Protector Cell Manager running on any supported operating system Resolve Agent running on ...

Page 250: ...tion requires three machines the Resolve host can be a less expensive host and the resource load is split helping you avoid performance impact on the application Note that in this configuration the Cell Manager host can be running any of the operating systems supported by Data Protector The application and Resolve Agent hosts must be running HP UX 1 1 1 1 Direct backup 250 ...

Page 251: ...er and the Resolve Agent can be of minimal processing capacity Note that in this configuration both hosts must be running HP UX 1 1 1 1 Basic configuration single host This solution uses a single host on which the Cell Manager application and Resolve Agent are all installed As all three components are running on the same physical machine they are sharing resources I O channels CPUs memory etc for ...

Page 252: ...Media Agent may impact the application database s performance XCopy s processing requirements are negligible Note that in this configuration the host must be running HP UX 1 1 1 1 Direct backup 252 ...

Page 253: ...new files containing business critical data throughout the working day These files need to be backed up immediately to guarantee the data in them will not be lost This requirement means that a fast medium that can store large amounts of data that works without interruption is necessary for storing data Disk based storage media have become increasingly cheaper in recent years At the same time the s...

Page 254: ...free up the disk space This process is known as disk staging In environments that have fast high capacity disk drives and slow tape drives you can shrink the backup window by performing backup to disk based devices first and moving the data to tape later Using disk based devices for backup enables you to take advantage of advanced backup strategies such as synthetic backup Disk based devices are u...

Page 255: ...le jukebox device consists of multiple slots to which you can back up data Configuration is a two phase process firstly a file jukebox device is created and then one or several drive s is configured for it Once the device has been configured it is possible to change its properties Each slot in the file jukebox device has a maximum capacity of 2 TB The device s maximum capacity is equal to Number o...

Page 256: ... more sophisticated disk space handling than any other disk based backup devices Furthermore it enables the use of advanced backup strategies such as synthetic backup For description of the file library device functionality see the online Help index file library devices Data format The data format of the disk based devices is based on the tape data format Data Protector converts the data to be bac...

Page 257: ...ckup to disk is gaining popularity due to the high performance and capacity as well as increasingly lower price of disks new opportunities have arisen The industry s requirements are to minimize the backup window minimize the load on production servers and the network and enable a quick restore These requirements are met by synthetic backup Synthetic backup is an advanced backup solution that prod...

Page 258: ...inates the reading of each incremental backup in the restore chain and if tape devices are used also loading and unloading of several media and seeking for object versions How Data Protector synthetic backup works Data Protector synthetic backup enables you to merge a full backup and any number of incremental backups into a new synthetic full backup To enable synthetic backup the use of enhanced i...

Page 259: ...the backup medium which can be a tape or a disk The data is sent to another RMA which reads the incremental backups from the file library and consolidates the data The consolidated data is then sent to the Backup Media Agent BMA which writes the synthetic full backup to the backup medium which can again be a tape or a disk Later on the synthetic full backup is typically merged with subsequent incr...

Page 260: ...backup media However if virtual full backup is performed the backup media space consumption is minimized With virtual full backup the space consumption largely depends on the size of the backed up files If the files are significantly larger than the block size used virtual full backup achieves maximum savings of the space compared to normal synthetic backup On the other hand if the files are small...

Page 261: ...tal backup must be read If tape devices are used time is spent for loading and unloading of several media and seeking for object versions to restore Figure 75 Synthetic backup In Figure 75 on page 261 a synthetic full backup exists which is used for restore by default The restore chain consists of only two elements namely the synthetic full backup and the subsequent incremental backup The restore ...

Page 262: ...77 on page 262 a synthetic backup was performed and then copied This provides additional safety The restore to the latest possible state can use any of the three different restore chains shown By default Data Protector selects the optimum restore chain which normally includes the synthetic full backup or its copy In case of missing media a media error or similar an alternative restore chain is use...

Page 263: ...re irrespective of whether the preceding backups are still valid or their protection has already expired and the objects are removed from the IDB For additional safety set data protection to permanent so that data on the media is not overwritten unintentionally Concepts guide 263 ...

Page 264: ...Synthetic backup 264 ...

Page 265: ...Supported configurations on page 269 Overview Modern high availability HA storage configurations introduce new demands on backup concepts The configuration consists of one of numerous variations of single or multiple mirror structures The usual approach is to use one replica mirror copy for the backup task while the source volumes still serve the application See Figure 78 on page 266 Concepts guid...

Page 266: ...he data on the disk consistent and perform the actual split of the mirrors The data must be consistent so that the application can make use of the data after a restore Normally the replica is not created at the time of backup but is already available and synchronized to provide high availability to the application The backup and the resyncing of the replica does not affect the application performa...

Page 267: ...lient should be capable of performing backups in a reasonable amount of time Though theoretically almost 24 hours may be required to perform a backup the restore time must be considered as well It is thus recommended to have a backup client that can perform the backup in 2 to 4 hours It is recommended to perform the restore through the application client In this approach the bulk of the data trans...

Page 268: ... a ZDB to disk session the original data is not moved to a backup medium tape from the replica The replicas up to three can be used for various purposes such as offline data processing or instant recovery the latter is possible only if HP StorageWorks BusinessCopy XP configuration was used It is only possible to restore objects from a ZDB to disk session by using the instant recovery functionality...

Page 269: ...ithout interfering with each other In this way the backup performance does not impact the database performance Figure 79 Local mirror dual host full performance Zero Downtime Backup The Data Protector split mirror backup integration allows automatic handling of mirror status as well as tight integration with applications such as SAP R 3 and Oracle to ensure data consistency and application databas...

Page 270: ...eated during the split are applied Local mirror single host In cases where no dedicated backup server is available both functions application and backup are performed on the same client or host Offline backups of mail applications for instance could reduce the downtime of the application to minutes instead of hours in this way In this type of configuration only disk image raw disk and filesystem b...

Page 271: ...p service by mirroring the application data from several production sites A and C in this case to a central location or central disk array In this way your investment in a backup service server and tape library can be consolidated and combined with the high availability of a remote mirror configuration The remote site cannot be used as an automatic disaster recovery site during the time of the bac...

Page 272: ... full recovery solution at the remote site In this example the remote mirror is constantly maintained with only the local link split for backup purposes This gives the cluster the continuous ability to fail over to the remote site site B Figure 81 Local remote mirror combination disaster recovery integrated backup Service HA HP UX only In order to have the failover functionality independent of the...

Page 273: ...nd recovery It is important to control and specify which configurations are supported All the configurations shown above are supported by HP For an updated list of supported configurations see the following URL http www hp com support manuals In the event that you want to back up data in a configuration not listed this does not mean that it cannot be supported Please contact your local HP represen...

Page 274: ...Split mirror concepts 274 ...

Page 275: ... of application or database data stored on a disk array These snapshots can subsequently be kept on a disk array as point in time copies of the original data for instant recovery purposes or can be used to produce ZDB to tape sessions on a backup system The processes concerned have minimal impact on the application server providing an effective ZDB solution Storage virtualization The term storage ...

Page 276: ...onnected to separate application and backup systems The disk array can be used as a storage device by both the application system and the backup system and logical volumes can be mounted on either Using this arrangement the application system uses logical volumes within the disk array to store its data during its normal operation The logical volumes storing the application system data are for the ...

Page 277: ... During the time that the application client is in backup mode or the application may be stopped for a brief period depending on the application the impact on application availability is minimal If a ZDB to tape is specified the snapshot data is then streamed to tape media on the backup client During the tape media streaming operation the application client can run undisturbed Since the applicatio...

Page 278: ...f snapshot backups are available ZDB to tape ZDB to disk ZDB to disk tape ZDB to tape and ZDB to disk tape During ZDB to tape and ZDB to disk tape sessions a point in time snapshot data of the application data is streamed to a tape device which is connected to a separate backup system using Data Protector Disk Agent and General Media Agent with minimal impact on the application system After the ba...

Page 279: ...t can be kept concurrently on a disk array is dependant on the disk array used The replicas kept on the disk array for the same backup specification form the replica set for that backup specification The replica set is defined by the maximum number of replicas that are to be kept on a disk array for a particular backup specification When during a snapshot backup session this number is reached the ...

Page 280: ...he main benefit of copy on write snapshots without the preallocation of disk space over copy on write snapshots with the preallocation of disk space is in significant reduction of costs Considerably less additional storage capacity for replication space is needed if the snapshots are deleted regularly than with a standard snapshot technology Since this snapshot technique caches only the difference...

Page 281: ...her In this way the impact of the backup on the database performance is minimal Figure 83 Single disk array dual host full performance Zero Downtime Backup The Data Protector snapshot integrations allows automatic handling of disk array status as well as tight integration with applications such as SAP R 3 Oracle or Microsoft SQL or Exchange Server to ensure data consistency and application databas...

Page 282: ...pace needed for the archive logs in total as well as speeding up the recovery process of the database After a restore of an online database a recovery is needed to return the database to a consistent state All archive logs that have been created during the backup must be applied In a snapshot backup only the archive log files created during the snapshot are applied Other supported configurations F...

Page 283: ...tion multiple application hosts may be connected to a single or multiple disk arrays which are in turn connected to a single dedicated backup host The I O infrastructure of the RAID systems is shared between the application clients and the backup client Concepts guide 283 ...

Page 284: ...backup server is available both functions application and backup can be performed on the same client or host Offline backups of mail applications for instance could reduce the downtime of the application to minutes instead of hours in this way Snapshot concepts 284 ...

Page 285: ...le with the HP StorageWorks Virtual Array integration However by using LVM mirroring it is possible to create snapshot copies of data between different virtual arrays writing to both at the same time This allows the emulation of the Continuous Access plus Business Copy functionality that is available with HP StorageWorks Disk Array XP Concepts guide 285 ...

Page 286: ...ave application and backup services on separate clusters Other configurations There are many other possible disk array configurations that provide some particular advantage or fulfill a specific user needs However each configuration has its specific behavioral pattern that imposes specific requirements on the control functions in order to guarantee backup and recovery It is important to control an...

Page 287: ...back up data in a configuration not listed this does not mean that it cannot be supported Please contact your local HP representative or HP Consulting to investigate the supportability of additional configurations Concepts guide 287 ...

Page 288: ...Snapshot concepts 288 ...

Page 289: ...d information on the filesystem backup and restore see the Data Protector online Help Overview A traditional backup process is based on the direct communication between the backup application application which initiates and performs backup and an application to be backed up This backup method requires from the backup application an individual interface for each application it backs up The number o...

Page 290: ...The original volume continues to change as the backup process continues but the shadow copy of the volume remains constant Shadow copy is basically a snapshot backup which allows applications and users to continue writing to data volumes even if they are in the middle of a backup process while the backup is getting data from a shadow copy of the original volume A shadow copy set is a collection of...

Page 291: ...m guarantees that all hardware providers will be offered for creating shadow copy before all software providers If none of them is able to create a shadow copy VSS will use the MS Software Shadow Copy Provider for the shadow copy creation which is always available Data Protector and VSS The Volume Shadow Copy service enables coordination among the backup application writers and shadow copy provide...

Page 292: ...p model In the traditional model the backup application had to communicate with each application it backed up individually In the VSS model the backup application communicates with the VSS only and the VSS coordinates the whole backup process Microsoft Volume Shadow Copy service 292 ...

Page 293: ...riter Whenever applications are not VSS aware a shadow copy is created The consistency of the shadow copy data is not guaranteed at application level however it is improved in comparison to a non VSS filesystem backup The table below outlines the differences between using Data Protector VSS integration backup VSS filesystem backup and non VSS filesystem backup Table 14 Benefits of using VSS Non VS...

Page 294: ... and how to restore the data Data Protector therefore follows the requirements provided by the writer when selecting the volumes to be backed up and the restore method Volume Shadow Copy service synchronizes the writers and providers After a backup shadow copy is created VSS communicates this information to Data Protector Data Protector performs a backup from the shadow copy volume to the media an...

Page 295: ...with applications that are not aware of the VSS mechanism IMPORTANT When applications that are not aware of the VSS mechanism are being backed up data consistency from the applications point of view cannot be guaranteed Data consistency is the same as in the event of a power failure Data Protector cannot guarantee any data consistency when applications are not actively participating in the creatio...

Page 296: ... of system I O activity during the backup When Data Protector requests a backup of the volumes specified in the backup specification the VSS mechanism commits all pending I O operations holds incoming writing requests and prepares a shadow copy volume When the shadow copy is created Data Protector starts its normal backup procedure except that the source volume is replaced by the newly created sha...

Page 297: ...at a remote location in case of disaster The level of business continuance This includes the recovery and restore plan for all critical systems The security of backed up data The need to guard premises to prevent unauthorized people from entering This also includes safeguarding all relevant data against unauthorized access with physical access prevention and electronic password protection The type...

Page 298: ...clients backup specifications on different days to avoid network load device load and time window issues Retaining data on media and information about backups Consider protecting data from being overwritten by newer backups for a specified amount of time Define the period of time that the Data Protector Catalog Database should store information about backups Device configuration Determine the devi...

Page 299: ...abor intensive because of the manual process in handling backup tapes Environment This section describes the present day hardware and software environment of XYZ and how the data storage policy is implemented XYZ is divided into three departments which are connected to a Corporate Network backbone English Department Other Languages Department Admin Department The hardware and software environment ...

Page 300: ...t XYZ backup topology XYZ currently has three servers with an estimated total data volume of 67 GB In the English Department data is copied manually by each of the employees to their respective servers at the end of each day One of the Windows 2000 clients in this department accounts for approximately a third of the data 12 GB The backup of clients in the Other Languages Department is done through...

Page 301: ...resulting in higher training costs The solutions used in the Other Languages and the Admin Departments are less primitive but do have their problems Network usage has a high impact on backup performance Moreover not all data gets backed up Only Network File System shared files and network shared files are backed up in the Other Languages and Admin Departments respectively Because there are three i...

Page 302: ...3 weeks after backup Restores of backups of data in the vault must be possible within two days Network Connectivity The backup servers and the departments will be connected to a 100TX Ethernet LAN Planned Growth Growth in the current data capacities is projected at 20 to 25 per year in the next five years Software The backup servers need to be running on one of the supported operating systems For ...

Page 303: ...ell as two of the HP StorageWorks DAT24 autoloaders that had been used to date This suffices for the next five years at the present data growth rate of 20 to 25 per year The use of devices that have been used to date provides an added advantage in case of disaster recovery The Windows 2000 client which accounts for approximately a third of the data in the English Department 12 GB should be backed ...

Page 304: ...ll Configuration All clients and servers should be configured in a single Data Protector cell The Data Protector Cell Manager can run on the Windows 2000 Server of the English Department All systems in the cell should be on the same LAN for maximum performance The Cell Manager should also be the Installation Server for Windows Use the HP UX backup server of the Admin Department as the Installation...

Page 305: ... Planning Tool was used to estimate the size of the IDB in a year The tool is located in the same directory as the rest of the Data Protector online manuals Input parameters shown in Figure 93 on page 306 include the number of files in the environment 2 million the growth factor 1 2 data protection 52 weeks catalog protection 3 weeks the number of full backups per week 1 and the number of incremen...

Page 306: ...ear the database is expected to grow to approximately 419 75 MB Figure 94 Results Hardware Network All systems should be on the same 100TX network for maximum performance This network has a sustained data transfer rate of 10 MB s or 36 GB h of data Backup Devices Backup scenarios 306 ...

Page 307: ...s 6 24 GB data cartridges It has a total compressed storage capacity of 144 GB and a maximum sustained data transfer rate of 2 MB s or 7 GB h with data compression This is the transfer rate assumed for the remainder of this section Currently the total amount of data to be backed up to the HP StorageWorks DAT24 autoloader connected to the aforementioned Windows 2000 client in the English Department...

Page 308: ...n the system which is currently about 55 GB is backed up remotely to the HP StorageWorks DLT 41 15w Library which has a sustained data transfer rate of 3 MB s or 10 5 GB h Most of this data is via the 100TX network which has a sustained data transfer rate of 10 MB s or 36 GB h of data This does not present a bottleneck The backup of all these data would therefore take about 5 to 7 hours to complet...

Page 309: ...8 hours This is well within the allowed 12 hours Media Pools Media are grouped into media pools to provide better media tracking and control Group each of the two media types DLT and DDS in its own pool Default DDS This pool should be used for all DDS media Default DLT This pool should be used for all DLT media DB_Pool This pool should be used for the IDB and configuration files The database shoul...

Page 310: ... backed up remotely to the HP StorageWorks DLT 41 15w Library Schedule the backup specification such that Data Protector will run a full backup every Sunday at 20 00 and level 1 incremental backups every day except Saturday at 20 00 DB_BS Backup specification for the IDB and configuration files Schedule the backup specification such that Data Protector will run a full backup every day at 4 00 At t...

Page 311: ...session which includes the number of restored files and directories as well as the amount of restored data Reporting and Notifications Email notifications will be set up for backup administrators for mount requests low database space device errors and end of session events for all backup specifications Optionally email or broadcast notifications will be set up for those end users interested in bei...

Page 312: ...ons where the media are stored Filter media from the media view based on specific criteria such as media with expired protection Restore Restore by Query Requests for restores by query will be sent to the administrator If the files were last backed up less than 20 days before the request was placed then the administrator can use the Restore by Query restore task to select the files and directories...

Page 313: ...tructure to seamlessly execute a wide array of software engineering projects ABC has been growing at a rate of 30 40 per year The growth rate is expected to slow down to 15 to 20 in the next five years Environment This section describes the present day hardware and software environment of ABC and how the data storage policy is implemented ABC has offices at three locations The main hardware data a...

Page 314: ...ent of ABC Cape Town is depicted in Figure 95 on page 314 Figure 95 Current ABC Cape Town backup topology Currently backups of the SAP database servers at ABC Cape Town are performed using the SAP BRBACKUP and BRARCHIVE utilities to 3 HP StorageWorks DAT24 autoloaders Data is copied manually by employees to their respective servers on a daily basis The Microsoft Exchange Server and Microsoft SQL d...

Page 315: ...g to the backup Backup strategy requirements Before addressing ABC s backup strategy requirements consider the items under Considerations on page 297 Requirements The following section gives a description of ABC backup strategy requirements Organizational policies regarding backups and restores The company policy on archiving and storing data defines that weekly backups be completed within 12 hour...

Page 316: ...storage time Type of data 5 years Company business data 5 years Company resource data 5 years Project data 3 months Personal data How media with backed up data should be stored and maintained Media should be kept in the tape library in the computer room All data included in the company backup system should be archived in full every week and incrementally every day The data should be stored at a se...

Page 317: ...carried out once a week on Fridays Saturdays or Sundays Level one incremental backups are carried out daily on week days However if a full backup is carried out on Friday then the corresponding level one incremental backups are carried out on weekdays and then on Saturday skipping Friday Proposed solution Because of the issues presented by the current backup solution described in Problems with cur...

Page 318: ...tween cells within each MoM environment Each of the three locations should have its own library Use the HP StorageWorks DLT 4228w Library for the ABC Cape Town environment Use HP StorageWorks DLT 41 15w Libraries for ABC Pretoria and ABC Durban The three cells at the ABC Cape Town MoM environment should each have one SAP database server The SAP database servers share the HP StorageWorks DLT 4228w ...

Page 319: ...nds among other things on the number of files and directories in individual client systems Then configure each of the three locations as a Manager of Managers environment The MoM allows you to efficiently transparently and centrally manage your cells from a single point This then enables you to configure the Centralized Media Management Database CMMDB in each MoM environment Why use the CMMDB The ...

Page 320: ...t of the cells into the MoM environment Configure a Centralized Media Management Database in MoM cell A to allow you to share the same library with cells B and C Share the HP StorageWorks DLT 4228w Library for the ABC Cape Town environment With a capacity of 1 1 TB in compressed format this library should suffice for the company s projected needs in the next five years The three cells at ABC Cape ...

Page 321: ...lso have its own Catalog Database Use an HP StorageWorks DLT 41 15w Library for the ABC Pretoria environment and for the ABC Durban environment With a capacity of 600 GB in compressed format this library should suffice for the company s projected needs in the next five years in each of these environments Estimating the size of the IDB The Internal Database Capacity Planning Tool was used to estima...

Page 322: ...meters The results are shown in Figure 99 on page 322 In one year the database is expected to grow to approximately 667 47 MB Figure 99 Results You can also use the Internal Database Capacity Planning Tool to estimate the size of the IDB in environments with online databases Oracle SAP R 3 Hardware Network Backup scenarios 322 ...

Page 323: ...ined data transfer rate of 6 MB s 2 x 3 MB s or 21 GB h with data compression This is the transfer rate assumed for the remainder of this section Currently the total amount of data to be backed up to the HP StorageWorks DLT 4228w Library as a full backup whether this is a single full backup or the staggering approach is used is about 74 GB Assuming that the size of an incremental backup is approxi...

Page 324: ... Microsoft Exchange Server and Microsoft SQL Server at ABC Cape Town as well as each of the 7 Cell Managers in the 3 MoM environments Why use the HP StorageWorks DAT24 Autoloader The HP StorageWorks DAT24 autoloader has 6 24 GB data cartridges It has a total compressed storage capacity of 144 GB and a maximum sustained data transfer rate of 2 MB s or 7 GB h with data compression This is the transf...

Page 325: ...rs The largest 1 3 GB Data Protector Catalog Database at ABC Pretoria should be backed up in a few minutes when no database integrity checking is performed beforehand Data Protector by default checks the integrity of the database before the database is backed up The check operation takes less than an hour for a 1 3 GB database Therefore the IDB and configuration files at ABC Pretoria should then b...

Page 326: ...or the latest full backup and one for the latest level 1 incremental backup prior to the restore point in time This considerably simplifies and speeds up the restore Where simple incremental backups are used the number of media sets may increase considerably making the restore process more complex and slower Two copies of the IDB and configuration files should be made for security reasons SAP_A C ...

Page 327: ...n in Table 27 on page 327 every Friday and level 1 incremental backups every work day However if a full backup is carried out on Friday then the corresponding level one incremental backups are carried out on weekdays and then on Saturday skipping Friday Table 27 on page 327 shows the backup specification configuration in greater detail Table 27 ABC s backup specification configuration Time Backup ...

Page 328: ...Protector backup options Set the following options as follows Log Directories This filesystem backup option ensures that details only on directories are stored in the Catalog Database This disables the search feature during restore and allows you to browse only directories Use this option for backing up the two servers with more than 500 000 files each in cell D Not using this option would result ...

Page 329: ...The report should be logged to the file in HTML format 2 Schedule the report group 3 Link the logged files to the company home page Vaulting Vaulting is a process of storing media to a safe location for a specified period of time Media will be moved to the vault once a week and replaced by new media in the HP StorageWorks DLT 4228w Library the HP StorageWorks DLT 41 15w Library and HP StorageWorks...

Page 330: ...t to the administrator If the files were last backed up less than 3 weeks before the request is placed then the administrator can select the objects for restore and use the Restore Into option With the Restore Into option selected the object is restored with the exact directory structure to a selected directory Use a Windows or UNIX utility to compare the restored object with the backed up object ...

Page 331: ...ar backups are done What is a backup generation A backup generation shown in Figure 100 on page 332 represents a full backup and all incremental backups based on this full backup When the next full backup is done a new backup generation is created Backup generations help you to know how many full versions of backed up data you have For a successful point in time restore you need at least one backu...

Page 332: ...pt For more information see Implementing a media rotation policy on page 143 Examples of automated media copying After a backup finishes you can use the automated media copy functionality to copy the media and then move either the originals or the copies to an off site vault You can use either post backup or scheduled media copying depending on the availability of devices The considerations that m...

Page 333: ...ium is 153 GB After the media copy operation the source and the target media become non appendable Considering this you may want to minimize the number of media required for the backup It is recommended to start with empty media and use their maximum capacity You can achieve this by creating backup specifications with only one device assigned This ensures that a new medium will be used only after ...

Page 334: ...ta protection as original and specify the location of the media for example Shelf 1 You also configure post backup media copying for BackupSpec2 and select Drive 2 as the source device and Drive 5 as the target device You set the same data protection as original and specify the location of the media You use scheduled media copying to copy media used in BackupSpec3 and BackupSpec4 because you will ...

Page 335: ... way BackupSpec1 Drive 1 1000 GB BackupSpec2 Drive 2 1000 GB BackupSpec3 Drive 3 500 GB BackupSpec4 Drive 4 500 GB BackupSpec1 and BackupSpec2 require 7 media each BackupSpec3 and BackupSpec4 require 4 media each The backup is completed in approximately 14 hours Configuring automated media copying Automated media copying of each backup starts after the backup is completed You have 22 media to copy...

Page 336: ... BackupSpec3 and BackupSpec4 The devices and the data protection settings are the same as those used for the copying of the Incr1 backup The scheduled media copying starts an hour after the backup is estimated to finish For a graphic representation of the full backup and automated media copying see Figure 102 on page 337 Further information 336 ...

Page 337: ...at 6 AM This backup is intended for archiving purposes so it is normally not copied Figure 103 on page 338 presents an overview of the time when the devices are busy Note that this is a rough overview so the graph ignores the partial overlap of some of the backup and copy sessions Concepts guide 337 ...

Page 338: ... copying You use an HP StorageWorks 10 700 Tape Library with 10 LTO drives and LTO Ultrium 1 media Based on previous experience you assume that the data transfer rate is about 80 GB per hour and the average capacity of a medium is 153 GB The media used for backup and media copying become non appendable after the media copy operation so you may want to use as much tape space as possible On the othe...

Page 339: ...fy Drive 1 Drive 2 Drive 3 and Drive 4 as the source devices and Drive 5 Drive 6 Drive 7 and Drive 8 as the target devices You set the same data protection as original and specify the location of the media For a graphic representation of the full database backup and automated media copying see Figure 104 on page 339 Figure 104 Full database backup and automated media copying You schedule your mont...

Page 340: ...t provides several native languages for the user interface Localization Localization is the process of adapting a product or service to a particular language and culture It relates to the ability to provide localized screens online Help error messages manuals etc Instead of sending actual message strings Data Protector sends string IDs from agents to the Cell Manager The Cell Manager then forwards...

Page 341: ... not display properly in the GUI Passing data between different platforms is not problematic if all platforms use the same character set or if they use an implementation of Unicode UTF 16 on Windows and UTF xx on other platforms which accommodates all characters Unfortunately the UTF xx implementation of Unicode is not yet a standard on UNIX systems The components of the application can be distrib...

Page 342: ...ve client to be backed up and saves an original copy to a medium The file names are also converted to an internal code set and logged to the IDB if the log filename option is selected for the backup Browsing file names The Data Protector GUI can be used to select the files for restore This is done by viewing the file names in the IDB on the system where the GUI is running Data Protector offers mul...

Page 343: ...e files to be restored are selected in the GUI Data Protector searches the tape for the specified data and restores it the original file names original copies from the tape are restored Concepts guide 343 ...

Page 344: ...Further information 344 ...

Page 345: ... that uses random keys of 256 bit length The same key is used for both encryption and decryption With AES 256 bit encryption data is encrypted before it is transferred over a network and before it is written to media AML EMASS GRAU specific term Automated Mixed Media library application agent A component needed on a client to back up or restore online database integrations See also Disk Agent appl...

Page 346: ...ng the full client backup These files are stored as an ASR archive file on the Cell Manager in Data_Protector_home Config Server dr asr on a Windows Cell Manager or in etc opt omni server dr asr on a UNIX Cell Manager as well as on the backup medium The ASR archive file is extracted to three diskettes for 32 bit Windows systems or four diskettes for 64 bit Windows systems after a disaster occurs Y...

Page 347: ... media the creation searching and removing the backup files backup chain See restore chain backup device A device configured for use with Data Protector which can write data to and read data from storage media This can be for example a standalone DDS DAT drive or a library backup generation One backup generation includes one full backup and all incremental backups until the next full backup backup...

Page 348: ...n to also called the backup or media set See also backup specification incremental backup and full backup backup set A complete set of integration objects associated with a backup backup set Oracle specific term A logical grouping of backed up files that are created using the RMAN backup command A backup set is a complete set of files associated with a backup The files can be multiplexed to increa...

Page 349: ...nager to which backup specifications templates belong BC EMC Symmetrix specific term Business Continuance are processes that allow customers to access and manage instant copies of EMC Symmetrix standard devices See also BCV BC HP StorageWorks Disk Array XP specific term The Business Copy XP allows to maintain internal copies of HP StorageWorks Disk Array XP LDEVs for purposes such as data backup o...

Page 350: ...s that are pre configured in the ICDA on which the business continuation operation runs BCV devices are assigned separate SCSI addresses differing from the addresses used by the SLDs they mirror The BCV devices are used as splittable mirrors of the primary EMC Symmetrix SLDs that need to be protected See also BC and BC Process Boolean operators The Boolean operators for the full text search functi...

Page 351: ...r system CA HP StorageWorks Disk Array XP specific term Continuous Access XP allows you to create and maintain remote copies of HP StorageWorks Disk Array XP LDEVs for purposes such as data duplication backup and disaster recovery CA operations involve the main primary disk arrays and the remote secondary disk arrays The main disk arrays contain the CA primary volumes P VOLs which contain the orig...

Page 352: ...dependent executables system data and device files to work correctly from all hosts in a cluster while using the same pathname cell A set of systems that are under the control of a Cell Manager The cell typically represents the systems on a site or an organizational entity which are connected to the same LAN Central control is available to administer the backup and restore policies and tasks Cell ...

Page 353: ...ss of dividing data into blocks chunks where each chunk gets a unique content address This address is then used to determine whether a particular chunk is already backed up to the IAP appliance If the duplicate data is identified two addresses are identical that is the address is the same as for another data chunk already stored into IAP it is not backed up This way the data redundancy is eliminat...

Page 354: ...single point of failure in your Exchange back end servers You can perform backups using VSS on your passive Exchange Server node where a CCR copy is located and thus reducing the load on the active node A CCR copy is used for disaster recovery since you can switch to the CCR copy in a few seconds A replicated storage group is represented as a new instance of Exchange writer called Exchange Replica...

Page 355: ...nes and snapshots of virtual disks The Command View EVA software runs on the HP Storage Management Appliance and is accessed by a Web browser See also HP StorageWorks EVA SMI S Agent and HP StorageWorks SMI S EVA provider Command View VLS VLS specific term A web browser based GUI that is used to configure manage and monitor the VLS through a LAN See also Virtual Library System VLS concurrency See ...

Page 356: ...he directory containing Data Protector program files On other Windows operating systems the directory containing Data Protector program files and data files Its default path is ProgramFiles OmniBack but the path can be changed in the Data Protector Setup Wizard at installation time See also Data_Protector_program_data Data_Protector_ program_data On Windows Vista and Windows Server 2008 the direct...

Page 357: ... DC directories and use a custom location Up to 50 DC directories are supported per cell The default maximum size of a DC directory is 16 GB DCBF The Detail Catalog Binary Files DCBF part of the IDB stores information about file versions and attributes It occupies approximately 80 of the IDB One DC binary file is created for each Data Protector medium used for backup Its maximum size is limited by...

Page 358: ...differential backup An incremental backup that backs up changes made since the last full backup To perform this type of backup specify the Incr1 backup type See also incremental backup differential backup Microsoft SQL Server specific term A database backup that records only the data changes made to the database after the last full database backup See also backup types differential database backup...

Page 359: ...been present on the system when the backup was configured and backs them up This is particularly useful in dynamic environments where configurations change rapidly After the disks are expanded each inherits all options from its master client object Even if pre and post exec commands are specified once they are started many times once per each object disk group Veritas Volume Manager specific term ...

Page 360: ... servers in the intranet DNS server In the DNS client server model this is the server containing information about a portion of the DNS database that makes computer names available to client resolvers querying for name resolution across the Internet domain controller A server in a network that is responsible for user security and verifying passwords within a group of other servers DR image Data re...

Page 361: ...server_id is the value of the SERVERNUM configuration parameter Each line of the emergency boot file corresponds to one backup object enhanced incremental backup Conventional incremental backup backs up files that have changed since a previous backup but has certain limitations in detection of changes Unlike conventional incremental backup enhanced incremental backup reliably detects and backs up ...

Page 362: ...oves all data about backup sessions such as systems objects and file names which reside on the media from the IDB Information about the media and their relation to a pool is also removed from the IDB The data on the media remains unchanged See also importing media Extensible Storage Engine ESE Microsoft Exchange Server specific term A database technology used as a storage system for information ex...

Page 363: ...eferred to as file depots File Replication Service FRS A Windows service that replicates the domain controller store logon scripts and group policies FRS also enables replication of Distributed File System DFS shares between systems and allows any server to perform replication activity file tree walk Windows specific term The process of traversing a filesystem to determine which objects have been ...

Page 364: ...recycled free pool An auxiliary source of media for use by media pools when they run out of media The media pools must be configured to use free pools full backup A backup in which all selected objects are backed up whether or not they have been recently modified See also backup types full database backup A backup of all data in a database not only the data that has been changed after the last ful...

Page 365: ...covery that is performed after a restore by the database engine using transaction log files heartbeat A cluster data set with a time stamp carrying information about the operational status of a particular cluster node This data set or packet is distributed among all cluster nodes Hierarchical Storage A method for optimizing the use of expensive hard disk storage by migrating less frequently used d...

Page 366: ...ger HP StorageWorks Disk Array XP LDEV A logical partition of a physical disk within an HP StorageWorks Disk Array XP LDEVs are entities that can be replicated in the Continuous Access XP CA and Business Copy XP BC configurations or can be used as standalone entities See also BC CA HP StorageWorks Disk Array XP specific term and replica HP StorageWorks EVA SMI S Agent A Data Protector software mod...

Page 367: ...run and which devices and libraries are configured IDB recovery file An IDB file obrindex dat with information about IDB backups media and devices used for the backup This information can significantly simplify IDB recovery It is recommended to relocate the file together with IDB transaction logs to a separate physical disk from other IDB directories and additionally to make an additional copy of ...

Page 368: ...ir However the standard devices are updated with only the data that was written to the BCV device during the time of the original pair split and the data that was written to the standard device during the split is overwritten with data from the BCV mirror In SRDF control operations an incremental restore reassigns a target R2 device as the next available mirror of the source R1 device in the pair ...

Page 369: ...ZDB specific term A process in which a replica produced by a ZDB to disk or a ZDB to disk tape session is used to restore the contents of the source volumes to their states at the time at which the replica was created avoiding the need to perform a restore from tape Depending on the application or database concerned this may be all that is required or other steps such as the application of transac...

Page 370: ...in A tool that eliminates the supply of a passphrase manually when decrypting the private key It needs to be installed and configured on the Installation Server if you perform remote installation using secure shell Key Management Service Microsoft Exchange Server specific term The Microsoft Exchange Server service that provides encryption functionality for enhanced security See also Information St...

Page 371: ... devices to be used If you do not want to use load balancing you can select which device will be used for each object in the backup specification Data Protector will access the devices in the specified order local and remote recovery Remote recovery is performed if all Media Agent hosts specified in the SRD file are accessible If any of them fails the disaster recovery process fails over to the lo...

Page 372: ...se to start backing up logical log files when Informix Server issues a logfull event alarm The Informix Server ALARMPROGRAM configuration parameter defaults to the INFORMIXDIR etc log_full sh where INFORMIXDIR is the Informix Server home directory If you do not want logical logs to be backed up continuously set the ALARMPROGRAM configuration parameter to INFORMIXDIR etc no_log sh logging level The...

Page 373: ...information to the Recovery Oracle Catalog Database is user_name password service where the description of the user name password and service name is the same as in the Oracle SQL Net V2 login information to the Oracle target database In this case service is the name of the service to the Recovery Catalog Database not the Oracle target database Note that the Oracle user specified here must be the ...

Page 374: ... boots directly from the Ignite UX server Booting directly from the Ignite UX server can be automated with the Ignite UX bootsys command or interactively specified on the boot console make_tape_ recovery make_tape_recovery is a command on Ignite UX which creates a bootable recovery installation tape customized for your system and enables you unattended disaster recovery by connecting the backup de...

Page 375: ...s The user assigned age threshold and overwrite threshold used to determine the state of a medium medium ID A unique identifier assigned to a medium by Data Protector media label A user defined identifier used to describe a medium media location A user defined physical location of a medium such as building 4 or off site storage media management session A session performing some action on a medium ...

Page 376: ...nts It provides a simple consistent and integrated administration user interface allowing management of many applications through the same GUI provided that the applications adhere to the MMC model Microsoft SQL Server A database management system designed to meet the requirements of distributed client server computing Microsoft Volume Shadow Copy Service VSS A software service that provides a uni...

Page 377: ...nd manage multiple cells from a central point mount request A screen prompt that tells you to insert a specific medium into a device Once you respond to the mount request by providing the required medium and confirm the mount request the session continues mount point The access point in a directory structure for a disk or logical volume for example opt or d On UNIX the mount points are displayed u...

Page 378: ...f the backed up data on a different media set During an object copy session the selected backed up objects are copied from the source to the target media object copying The process of copying selected object versions to a specific media set You can select object versions from one or several backup sessions to be copied object ID Windows specific term The object IDs OIDs enable access to NTFS 5 fil...

Page 379: ...omponents the onbar command Data Protector as the backup solution the XBSA interface ON Bar catalog tables which are used to back up dbobjects and track instances of dbobjects through multiple backups ONCONFIG Informix Server specific term An environment variable that specifies the name of the active ONCONFIG configuration file If the ONCONFIG environment variable is not present Informix Server us...

Page 380: ...ery solution Oracle Data Guard is able to maintain up to nine standby databases each of which is a real time copy of the production primary database to protect against corruptions data failures human errors and disasters If a failure occurs on the production primary database then a failover to one of the standby databases which becomes the new primary database is possible In addition planned downt...

Page 381: ...em name are specified If a backup is scheduled on a UNIX Cell Manager the session owner is root sys unless the above conditions are true If a backup is scheduled on a Windows Cell Manager the session owner is the user specified during the installation unless the above conditions are true P1S file P1S file contains information on how to format and partition all disks installed in the system during ...

Page 382: ...oncurrency of 2 or more During a parallel restore the data for multiple objects selected for restore is read from media at the same time thereby improving performance parallelism The concept of reading multiple data streams from an online database physical device A physical unit that contains either a drive or a more complex unit such as a library post exec A backup option that executes a command ...

Page 383: ...ve internet content stm file public private backed up data When configuring a backup you can select whether the backed up data will be public that is visible and accessible for restore to all Data Protector users private that is visible and accessible for restore only to the owner of the backup and administrators RAID Redundant Array of Inexpensive Disks RAID Manager Library HP StorageWorks Disk A...

Page 384: ...ager to manage the backup restore and recovery of Oracle databases The recovery catalog contains information about The physical schema of the Oracle target database Data file and archived log backup sets Data file copies Archived Redo Logs Stored scripts Recovery Catalog Database Oracle specific term An Oracle database that contains a recovery catalog schema You should not store the recovery catal...

Page 385: ... act as an MCU Removable Storage Windows specific term A Windows service used for managing removable media such as tapes and disks and storage devices Management Database libraries Removable Storage allows applications to access and share the same media resources reparse point Windows specific term A system controlled attribute that can be associated with any directory or file The value of a repar...

Page 386: ...restore chain All backups that are necessary for a restore of a backup object to a certain point in time A restore chain consists of a full backup of the object and any number of related incremental backups restore session A process that copies data from backup media to a client resync mode HP StorageWorks Disk Array XP VSS provider specific term One of two XP VSS hardware provider operation modes...

Page 387: ...ols when and how often automatic backups occur By setting up a schedule you automate the start of backups secondary volume S VOL HP StorageWorks Disk Array XP specific term secondary volumes or S VOLs are XP LDEVs that act as a secondary CA or BC mirror of another LDEV a P VOL In the case of CA S VOLs can be used as failover devices in a MetroCluster configuration The S VOLs are assigned separate ...

Page 388: ...ows disk on another system that has been made available to other users on the network Systems with shared disks can be backed up without a Data Protector Disk Agent installed SIBF The Serverless Integrations Binary Files SIBF is a part of the IDB that stores raw NDMP meta data This data is necessary to perform restore of NDMP objects single instancing IAP specific term The process of recognizing r...

Page 389: ...created per session The files are grouped by year and month snapshot HP StorageWorks VA and HP StorageWorks EVA specific term A form of replica produced using snapshot creation techniques A range of snapshot types is available with different characteristics depending on the arrays techniques used Such replicas are dynamic and may be either virtual copies still reliant upon the contents of the sour...

Page 390: ...re this file split mirror EMC Symmetrix and HP StorageWorks Disk Array XP specific term A replica created using split mirror techniques Such a replica provides an independent exact duplicate or clone of the contents of the source volumes See also replica and split mirror creation split mirror backup EMC Symmetrix specific term See ZDB to tape split mirror backup HP StorageWorks See ZDB to tape ZDB...

Page 391: ...pecific term The EMC Symmetrix Remote Data Facility is a business continuation process that enables effective real time data replication of SLDs between dislocated processing environments These environments could be situated within the same root computer environment or separated by long distances SSE Agent HP StorageWorks Disk Array XP specific term A Data Protector software module that executes a...

Page 392: ...ume represents an object that may be presented to an operating system or some other entity for example a virtualization mechanism upon which volume management systems file systems or other objects may exist The volume management systems file systems are built on this storage Typically these can be created or exist within a storage system such as a disk array switchover See failover Sybase Backup S...

Page 393: ...ase master temporary database tempdb system procedure database sybsystemprocs model database model System State Windows specific term The System State data comprises the Registry COM Class Registration database system startup files and the Certificate Services database if the server is a certificate server If the server is a domain controller Active Directory services and the SYSVOL directory are ...

Page 394: ... is typically in a non bootable state and the goal of disaster recovery is to restore this system to the original system configuration The difference between a faulty system and a target system is that a target system has all faulty hardware replaced target volume ZDB specific term A storage volume to which data is replicated Terminal Services Windows specific term Windows Terminal Services provid...

Page 395: ...re frequently than database backups By applying transaction log backups you can recover the database to a specific point in time transaction log files Files that record transactions of the database modifications and provide fault tolerance in case of a database disaster transaction logs Data Protector specific term Keep track of IDB changes The archiving of transaction logs should be enabled to pr...

Page 396: ...s application software to standard user privileges until an administrator authorizes an increase in privilege level user disk quotas NTFS quota management support enables an enhanced tracking mechanism and control over disk space usage on shared storage volumes Data Protector backs up user disk quotas on the whole system and for all configured users at a time user group Each Data Protector user is...

Page 397: ...mming interface that allows fast backup and restore of large databases virtual disk HP StorageWorks EVA specific term A unit of storage allocated from an HP StorageWorks Enterprise Virtual Array storage pool Virtual disks are the entities that are replicated using the HP StorageWorks Enterprise Virtual Array snapshot functionality See also source volume and target volume virtual full backup An eff...

Page 398: ... specific to ADIC GRAU and StorageTek devices volume group A unit of data storage in an LVM system A volume group can consist of one or more physical volumes There can be more than one volume group on the system volume mount point Windows specific term An empty directory on a volume that can be used to mount another volume The volume mount point acts as a gateway to the target volume Provided that...

Page 399: ...uestion mark typically represents a single character Wildcard characters are often used in operating systems as a means of specifying more than one file by name Windows CONFIGURATION backup Data Protector allows you to back up Windows CONFIGURATION including Windows Registry user profiles Event Logs and WINS and DHCP server data if configured on a system in one step Windows Registry A centralized ...

Page 400: ...it mirror restore See also zero downtime backup ZDB ZDB to disk ZDB specific term A form of zero downtime backup where the replica produced is kept on the disk array as a backup of the source volumes at a specific point in time Multiple replicas produced using the same backup specification at different times can be kept in a replica set A replica from ZDB to disk can be restored using the instant ...

Page 401: ...can also be used See also zero downtime backup ZDB ZDB to disk instant recovery ZDB to disk tape and replica zero downtime backup ZDB A backup approach in which data replication techniques provided by a disk array are used to minimize the impact of backup operations on an application system A replica of the data to be backed up is created first All subsequent backup operations are performed on the...

Page 402: ...Glossary 402 ...

Page 403: ...up snapshot backup 278 split mirror backup 267 ARM 2 0 208 audience 23 auditing 208 autoloaders 162 See also libraries automated smart media copying 124 automated media copying 123 examples 332 automated object consolidation sessions 233 automated object copy sessions 230 automated operation 37 110 B backed up data hiding from other users 76 visibility 76 backing up data 102 110 procedure 102 back...

Page 404: ...0 ownership 78 backup sessions 43 102 106 220 225 backup configuration 106 interactive 221 mount requests 224 scheduled 221 timeout 224 backup specifications 49 103 103 backup strategy 57 backup strategy planning system availability 60 backup strategy factors 60 backup strategy planning 57 131 backup policies 61 catalog protection 61 data encryption 76 data types 61 defining requirements 58 defini...

Page 405: ... and growth 188 impact on backup performance 201 restoring data when catalog protection expires 201 catalog protection as an IDB key tunable parameter 201 CDB location Catalog Database 192 CDB records Catalog Database 191 CDB See Catalog Database Cell Request Server 220 Cell Managers 64 high availability 82 optimizing the load 224 cells backup operation 42 Cell Managers 41 logical view 41 mixed en...

Page 406: ...ystem restore 312 complete filesystem restore 330 compression hardware 68 70 software 70 concepts snapshot backup 276 split mirror backup 265 concurrency 156 concurrent sessions backup 222 media management 236 object consolidation 234 object copy 231 restore 227 configuring cells 304 319 configuring devices 153 configuring backup specifications 103 configuring devices large libraries 162 magazines...

Page 407: ...otector operation 219 236 Data Protector processes 219 236 Cell Request Server 220 Data Protector Inet 219 Media Management Daemon 220 Raima Database Server 220 Data Protector services Cell Request Server 220 Media Management Daemon 220 Raima Database Server 220 Data Protector setup 55 Data Protector user accounts 74 Data Protector user groups 75 Data Protector user interfaces 42 50 Data Protector...

Page 408: ...ration 237 database size estimation 203 databases 237 backup interfaces 240 cache memory 238 Centralized Media Management Database 47 checkpoints 239 control files 238 data files 238 dbspaces 237 files 237 online backups 239 segments 237 tables 237 tablespaces 237 transaction logs 238 dbspaces 237 DC binary file Detail Catalog Binary Files 192 IDB operation 194 DC directory Detail Catalog Binary F...

Page 409: ...P StorageWorks DAT Autoloaders 324 HP StorageWorks DAT24 Autoloaders 307 HP StorageWorks DLT 41 15w Libraries 307 HP StorageWorks DLT 4228w Libraries 323 jukeboxes 162 library management console support 154 load balancing 155 lock names 159 multiple devices 155 number of buffers 159 overview 153 physical device collision 160 planning performance 68 SCSI libraries 162 segment size 157 selecting for...

Page 410: ...isk based devices comparison 255 do not log any details Catalog Database 100 document conventions 31 related documentation 23 documentation HP website 23 providing feedback 34 Drive Servers 42 drives 177 connecting to multiple systems 165 floating 181 static 180 duplicating backed up data 112 E e mail 207 EMC Symmetrix 266 encoding 76 encryption 76 drive based 76 77 encryption key 76 Key Managemen...

Page 411: ...actors 197 filesystem backup 71 Volume Shadow Copy service 293 filesystem vs disk image backups 71 floating drives 181 fnames dat file filename size and growth 191 formatting media 135 fragmentation 72 freeing media 116 full and incremental backups 91 98 full backups 71 staggering 107 functionality of Data Protector 35 further information 331 G General Media Agent 165 geographically remote cells 6...

Page 412: ...rations Binary Files 194 Session Messages Binary Files 193 IDB configuration creating a backup specification for the IDB backup 196 IDB management 196 IDB format UNIX Cell Managers 189 Windows Cell Manager 188 IDB growth and performance backups as key factors 197 IDB growth and performance 197 database size estimation 203 key tunable parameters 198 IDB in the MoM environment Centralized Media Mana...

Page 413: ...ting 213 jukeboxes 162 See also libraries K Key Management Server 76 KMS See Key Management Server L labeling media 145 labels 146 LAN free backups 175 large libraries 162 170 level 1 incremental backups 310 326 leveled incremental backups 94 libraries 47 barcode support 163 cleaning tape support 164 connecting to multiple systems 165 drives 165 entering and ejecting mail slots 163 HP StorageWorks...

Page 414: ...s 47 MC Service Guard 79 media age 151 barcode support 163 barcodes 163 catalog segments 157 cleaning tape support 164 copying 122 copying automated 123 data segments 157 device errors 151 ejecting mail slots 163 encrypting 77 entering mail slots 163 estimating quantity of needed media 144 exporting 102 file marks 157 formatting 135 header segments 157 initializing 135 145 labeling 145 163 locatio...

Page 415: ...th 191 media management during backing up 147 media management functionality 48 133 media pool properties append incrementals only 136 appendable 136 media allocation policy 136 media pool usage examples 140 large library configuration 141 multiple devices multiple pools 143 multiple devices single pool 142 one device one pool 140 media pools 48 49 definition 135 usage examples 136 media recogniti...

Page 416: ...ct copy sessions mount requests 232 object copy sessions 229 queuing 232 object copy tasks 116 object copying 113 object mirroring 119 omniclus command 90 online backup of databases 239 online database backup archive log backup split mirror 267 archive log backup snapshot 278 snapshot backup 278 split mirror backup 267 online integrations 240 online reporting 213 operator user group 185 optimizing...

Page 417: ...st exec scripts 223 pre exec commands 223 pre exec scripts 104 predefined user groups 184 185 preparing a backup strategy plan 60 preparing media 134 preventing collision 160 primary node 81 processes 219 backup 38 Backup Session Manager 221 restore 39 Restore Session Managers 226 properties of media pools 136 protection types catalog 100 data 99 purging file versions 196 filenames 196 Q queuing o...

Page 418: ...restore by query 312 330 selecting devices 126 selecting media 126 vaulting 153 Volume Shadow Copy service 294 restoring data 125 128 restoring from media in a vault 153 retiring media 134 robotics 177 RSM 226 S SAN See Storage Area Networks scheduled object copying 114 scheduled backup sessions 221 scheduled backups 105 scheduled media copying 123 scheduling backup configuration 106 scheduling po...

Page 419: ...ew 55 shadow copy 290 shadow copy set 290 shadow copy provider 290 shared disks 80 sharing devices in SAN 175 drives 177 robotics 177 sharing libraries 47 162 163 164 SIBF data Serverless Integrations Binary Files 194 SIBF location Serverless Integrations Binary Files 194 SIBF size and growth Serverless Integrations Binary Files 194 silo libraries 162 single file restore 229 size libraries 162 siz...

Page 420: ... 279 snapshots with the preallocation of disk space 279 snapshots without the preallocation of disk space 280 SNMP 207 software compression 70 solutions for backup scenarios 303 317 source volume snapshot backup 276 split mirror backup 265 split mirror backup archive log backup 267 overview 265 RAID 269 source volume 265 ZDB to disk 268 ZDB to tape 268 split mirror configurations other configurati...

Page 421: ...nthetic full backup 257 systems to be backed up 42 systems with backup devices 42 T tablespaces 237 TapeAlert support 154 target volume snapshot backup 276 Target System 129 target volume split mirror backup 266 technical support HP 33 technical support service locator website 34 timeout 224 timeout restore sessions 227 transaction logs 238 transactions 208 types of incremental backups 93 leveled ...

Page 422: ...tem backup 293 filesystem backup and restore 295 integration with Data Protector 293 restore 294 shadow copy 290 shadow copy provider 290 VSS See Volume Shadow Copy service VSS backup 293 VSS backup model 291 W websites HP Subscriber s Choice for Business 34 HP 34 product manuals 23 Windows domains 65 Windows workgroups 66 writer 290 Writer Metadata Document WMD 294 Z ZDB to disk tape snapshot bac...

Reviews: