Sending notification to an operator
You can configure a Data Protector notification to send an e-mail to the operator with
information about the mount request. The operator can take the appropriate actions,
such as manually loading the needed media or aborting the session. For more
information, see “
Reporting and notification
” on page 211.
Automating a mount request
You can configure automated actions for the handling of mount requests. To do this,
write a script or a batch program that performs the desired action.
Backing up with disk discovery
What is disk discovery?
In backing up with disk discovery, Data Protector creates a detailed list of disks on
the target system when the backup session is started, and backs up all disks. Therefore,
all local disks on the system are backed up even though they were not present on
the system when the backup was configured. Backup with disk discovery is particularly
useful in dynamic environments, where configurations change rapidly. It enables you
to select or exclude specific directories in the backup.
How does it compare to a standard backup?
In a standard backup, you explicitly configure specific disks, directories or other
objects for backup by configuring them in the backup specification. Therefore, only
these objects are backed up. If you add new disks to the system or want to back up
some other objects, you must manually edit the backup specification and these new
objects. You can select, as you configure the backup, the method you want to use -
disk discovery or standard backup.
Restore sessions
This section describes how a restore session is started, what happens during a restore
session, and the processes and services involved.
What is a restore session?
In a restore session, data is copied from a backup copy, typically on a tape medium,
back to a disk.
Concepts guide
225
Содержание B6960-96035
Страница 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Страница 20: ...20 ...
Страница 22: ...Publication history 22 ...
Страница 132: ...Planning your backup strategy 132 ...
Страница 182: ...Media management and devices 182 ...
Страница 186: ...Users and user groups 186 ...
Страница 204: ...The Data Protector internal database 204 ...
Страница 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Страница 242: ...Integration with database applications 242 ...
Страница 264: ...Synthetic backup 264 ...
Страница 274: ...Split mirror concepts 274 ...
Страница 288: ...Snapshot concepts 288 ...
Страница 344: ...Further information 344 ...
Страница 402: ...Glossary 402 ...