사용자 설명서차례Concepts guide1Table of Contents3Publication history21About this guide23Intended audience23Documentation set23Guides23Online Help26Documentation map27Abbreviations27Map28Integrations29Document conventions and symbols31Data Protector graphical user interface32General information33HP technical support33Subscription service34HP websites34Documentation feedback341 About backup and Data Protector35In this chapter35About Data Protector35Introducing backups and restores38What is a backup?38What is a restore?39Backing up a network environment39Direct backup40Data Protector architecture40Operations in the cell42Backup sessions43Restore sessions44Enterprise environments45Splitting an environment into multiple cells45Media management48Backup devices49User interfaces50Data Protector GUI50Data Protector Java GUI52Benefits of Java GUI54Differences from the Original Data Protector GUI54Overview of tasks to set up Data Protector552 Planning your backup strategy57In this chapter57Backup strategy planning58Defining the requirements of a backup strategy58Factors influencing your backup strategy60Preparing a backup strategy plan60Planning cells62One cell or multiple cells?62Installing and maintaining client systems64Creating cells in the UNIX environment64Creating cells in the Windows environment65Windows domains65Windows workgroups66Creating cells in a mixed environment66Geographically remote cells66Understanding and planning performance67The infrastructure67Network versus local backups67Network or server versus direct backups68Devices68High performance hardware other than devices69Advanced high performance configuration69Using hardware in parallel69Configuring backups and restores70Software compression70Hardware compression70Full and incremental backups71Disk image versus filesystem backups71Object distribution to media71Disk performance72SAN performance73Online database application performance73Planning security73Cells74Data Protector users accounts74Data Protector user groups75Data Protector user rights75Visibility of backed up data76Data encryption76How Data Protector AES 256-bit encryption works76How Data Protector drive-based encryption works77Restore from encrypted backups78What is backup ownership?78Clustering79Cluster concepts79Cluster support82Example cluster environments83Cell Manager installed outside a cluster83Cell Manager installed outside a cluster, devices connected to the cluster nodes85Cell Manager installed in a cluster, devices connected to the cluster nodes87Full and incremental backups91Full backups92Synthetic backup92Incremental backups92Conventional incremental backup93Enhanced incremental backup93Types of incremental backups93Considering restore96Keeping backed up data and information about the data99Data protection99Catalog protection100Logging level100Browsing files for restore100Enabling the browsing of files and quick restore101Enabling the restore of files, but not browsing101Overwriting backed up files with new data101Exporting media from a cell102Backing up data102Creating a backup specification103Selecting backup objects103Backup sessions105Object mirrors105Media sets105Backup types and scheduled backups105Scheduling, backup configurations, and sessions106Scheduling tips and tricks106When to schedule backups107Staggering full backups107Optimizing for restore107Automated or unattended operation110Considerations for unattended backups110Duplicating backed up data112Copying objects113Why use object copy?116Object mirroring119Copying media122Automated media copying124Smart media copying using VLS124Restoring data125Restore duration125Selection of the media set126Selection of devices126Operators are allowed to restore127End users are allowed to restore128Disaster recovery128Disaster recovery methods130Alternative disaster recovery methods131Recovery methods supported by operating system vendors131Recovery using third-party tools (for Windows)1313 Media management and devices133In this chapter133Media management133Media life cycle134Media pools135Free pools137Media pool usage examples140Implementing a media rotation policy143Media rotation and Data Protector144Media needed for rotation144Media management before backups begin145Initializing or formatting media145Labeling Data Protector media145Location field146Media management during backup sessions147Selecting media for backups147Adding data to media during backup sessions148Writing data to several media sets during backup150Calculating media condition150Media management after backup sessions151Vaulting151Restoring from media in a vault153Devices153Device lists and load balancing155How load balancing works156Device streaming and concurrency156Segment size157Block size158Number of disk agent buffers159Device locking and lock names159Standalone devices160Small magazine devices161Large libraries162Handling of media162Size of a library162Sharing a library with other applications163Enter / eject mail slots163Barcode support163Cleaning tape support164Sharing a library with multiple systems164Data Protector and Storage Area Networks170Storage Area Networks171Fibre Channel172Point-to-point topology173Loop topology173Switched topology174Device sharing in SAN175Configuring multiple paths to physical devices175Device locking177Indirect and Direct Library Access178Indirect Library Access178Direct Library Access179Device sharing in clusters180Static drives180Floating drives1814 Users and user groups183In this chapter183Increased security for Data Protector users183Access to backed up data183Users and user groups184Using predefined user groups185Data Protector user rights1855 The Data Protector internal database187In this chapter187About the IDB187The IDB on the Windows Cell Manager188The IDB on the UNIX Cell Manager189The IDB in the Manager-of-Managers environment189IDB architecture189Media Management Database (MMDB)190Catalog Database (CDB)191Detail Catalog Binary Files (DCBF)192Session Messages Binary Files (SMBF)193Serverless Integrations Binary Files (SIBF)194IDB operation194During backup194During restore195During object copying or object consolidation195Exporting media195Removing the detail catalog196Filenames purge196File versions purge196Overview of IDB management196IDB growth and performance197Key IDB growth and performance factors197IDB growth and performance: key tunable parameters198Logging level as an IDB key tunable parameter199Catalog protection as an IDB key tunable parameter201Recommended usage of logging level and catalog protection201IDB size estimation2036 Service management205In this chapter205Overview205Data Protector and service management206Native Data Protector functionality207Application Response Measurement version 2.0 (ARM 2.0 API)208Integration with HP Operations Manager software210SNMP traps210The monitor210Reporting and notification211Event logging and notification212Data Protector log files213Windows application log213Java-based online reporting213Data Protector checking and maintenance mechanism214Central management, distributed environment214Using the data provided by Data Protector214Service management integrations215Data Protector OM-R integration215Data Protector OM SIP2177 How Data Protector operates219In this chapter219Data Protector processes or services219Backup sessions220Scheduled and interactive backup sessions221Backup session data flow and processes221Pre-exec and post-exec commands223Queuing of backup sessions224Mount requests in backup sessions224Backing up with disk discovery225Restore sessions225Restore session data flow and processes226Queuing of restore sessions227Mount requests in a restore session228Parallel restores228Fast multiple single file restore229Object copy sessions229Automated and interactive object copy sessions230Object copy session data flow and processes230Queuing of object copy sessions232Mount requests in an object copy session232Object consolidation sessions233Automated and interactive object consolidation sessions233Object consolidation session data flow and processes233Queuing of object consolidation sessions234Mount requests in an object consolidation session235Media management sessions235Media management session data flow2358 Integration with database applications237In this chapter237Overview of database operation237Filesystem backup of databases and applications239Online backup of databases and applications2399 Direct backup243In this chapter243Overview243Direct backup244Direct backup benefits245How direct backup works245Environment246About resolve247About XCopy247XCopy + Resolve248Direct backup process flow248Backup stages for data files248Restore249Requirements and support249Supported configurations250Three hosts: CM, application, Resolve250Two Hosts: Cell Manager/Resolve Agent and application251Basic configuration: single host25110 Disk backup253In this chapter253Overview253Disk backup benefits254Data Protector disk-based devices25511 Synthetic backup257In this chapter257Overview257Synthetic backup benefits258How Data Protector synthetic backup works258Synthetic backup and media space consumption260Restore and synthetic backup260How data protection periods affect restore from synthetic backup26212 Split mirror concepts265In this chapter265Overview265Supported configurations269Local mirror - dual host269Local mirror - single host270Remote mirror270Local/remote mirror combination272Other configurations27313 Snapshot concepts275In this chapter275Overview275Storage virtualization275Snapshot concepts276Snapshot backup types278Instant recovery279Replica set and replica set rotation279Types of snapshots279Supported configurations281Basic configuration: single disk array - dual host281Other supported configurations282Other configurations28614 Microsoft Volume Shadow Copy service289In this chapter289Overview289Data Protector Volume Shadow Copy integration293VSS filesystem backup and restore295A Backup scenarios297In this appendix297Considerations297Company XYZ299Environment299Backup strategy requirements302Proposed solution303Company ABC313Environment313Backup strategy requirements315Proposed solution317B Further information331In this appendix331Backup generations331Examples of automated media copying332Example 1: automated media copying of filesystem backups333Incr1 backup333Full backup335Example 2: automated media copying of Oracle database backups338Full backup339Internationalization340Localization340File name handling341Background341File name handling during backup342Browsing file names342File name handling during restore342Glossary345Index403크기: 6.8메가바이트페이지: 422Language: English매뉴얼 열기