Restoring data
Policies for restoring data are an essential part of the overall backup strategy in the
company. Keep the following in mind:
•
Backing up and restoring files is essentially the same as copying files. Therefore,
ensure that only authorized people have the rights to restore confidential data.
•
Ensure that unauthorized people cannot restore files of other people.
This section describes some possible implementations of the restore policy using Data
Protector. You can restore your filesystem data by browsing through restore objects
or restore sessions. By default, data is restored to its original location. However, you
can specify any location to be the destination of restored data.
Restore duration
After data loss, access to data is possible only after the recovery process is finished.
It is often critical to minimize restore duration so that users can do their regular work.
Therefore, plan for the time needed to restore specific data.
Factors affecting restore duration
The restore duration depends on a number of factors, such as:
•
The amount of data to be restored. This also directly influences all the following
items.
•
A combination of full and incremental backups. For more information, see “
Full
and incremental backups
” on page 91.
•
Media and devices used for backup. For more information, see
Chapter
3
on page 133.
•
Speed of networks and systems. For more information, see “
Understanding and
planning performance
” on page 67.
•
The application you are recovering, for example, Oracle database files. For more
information, see the appropriate HP Data Protector integration guide.
•
The use of parallel restore. Several objects can be restored with a single read
operation, depending on how the data was backed up. See “
Parallel
restores
” on page 228.
•
Speed and ease of selecting the data to be restored, which depends on the
logging level settings used during the backup and on catalog protection time.
See “
Logging level as an IDB key tunable parameter
” on page 199.
Concepts guide
125
Содержание B6960-96035
Страница 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Страница 20: ...20 ...
Страница 22: ...Publication history 22 ...
Страница 132: ...Planning your backup strategy 132 ...
Страница 182: ...Media management and devices 182 ...
Страница 186: ...Users and user groups 186 ...
Страница 204: ...The Data Protector internal database 204 ...
Страница 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Страница 242: ...Integration with database applications 242 ...
Страница 264: ...Synthetic backup 264 ...
Страница 274: ...Split mirror concepts 274 ...
Страница 288: ...Snapshot concepts 288 ...
Страница 344: ...Further information 344 ...
Страница 402: ...Glossary 402 ...