HP OpenView Storage Data Protector Administrator’s Guide
Legal Notices
Iii
Page
Contents
Configuring Users and User Groups
Backup
Vii
Viii
Restore
Monitoring, Reporting, Notifications, and the Event Log
Manager-of-Managers Environment
Disaster Recovery
Xii
Xiii
Customizing the Data Protector Environment
Xiv
Contents
Integrations with Other Applications
Xvi
ADIC/GRAU DAS and STK ACS Libraries
Xvii
Xviii
Edition History Part Number Manual Edition Product
Xix
Page
Xxi
Data Protector Graphical User Interface
Xxii
General
Information Technical Support
Documentation
Feedback
Xxiv
Manuals
Xxv
HP OpenView Storage Data Protector Unix Integration Guide
Xxvi
Online Help
Xxvii
Xxviii
HP OpenView Storage Data Protector Administrator’s Guide
Audience
Licensing Guide
Xxix
Organization
Xxx
Introducing Data Protector
This Chapter
Data Protector Cell Environment
Concepts Guide
How a Backup Session Works
How a Restore Session Works
Data Protector Cell Environment
Using the Data Protector User Interface
HP OpenView Storage Data Protector Graphical User Interface
Graphical User Interface
Platforms
Starting GUI on
Unix Platforms
Storage Data Protector Installation and Licensing
Storage Data Protector HP StorageWorks Disk Array
Printing from the Data Protector Graphical User Interface
Prerequisite
Elements of the Data Protector Graphical User Interface
Context List
Scoping Pane
Results Area
Results Area
Navigation Tabs
Command-Line Interface
Data Protector Online Resources
Using Microsoft Management Console MMC
Using the Online Manuals
Add
Overview of Tasks to Set Up Data Protector
Overview of Tasks to Set Up Data Protector
Configuring and Using Backup
Configuring and Using Backup Devices
Licensing Guide for details
Configuring Backup Devices
Systems
Guide
Windows
Configuring Backup Devices
How Backup Specifications, Devices, and Media Pools Relate
Configuring Standalone Devices
What Are Standalone Devices? How to Configure
Device Chains
Configuring
Specifying Device Type and Name
Configuring Standalone Devices
Configuring File Devices
What Are File
Recommended Segment Sizes for Specific Device File Sizes
File size GB Segment size MB
File Devices
Handling Mount
Requests
Specifying a Pathname for a File Device
Configuring Library Devices
Drive Index to Scsi Address Mapping
Library Device
Configuring Library Devices
Configuring Libraries with Multiple Systems
Configure a backup. See , Backup, on
Configuring Magazine Devices
What Are
Magazine
What’s Next?
Configuring Stacker Devices
Stacker Devices
Backup
Restore with
Configuring a Library for Mixed Media
Configuring Devices for Direct Backup
Configuration Procedure
Configuring Standalone Devices
Configuring SCSI-II Libraries
Configuring XCopy Engines
Configuring the libtab File
Support of New Devices
Using Several Drive Types in a Library
Using Several Drive Types in a Library
Shared Devices in the SAN Environment
OpenView Storage Data Protector Concepts Guide
Multiple System to Multiple Device Connectivity in SAN
Locking Devices Used Exclusively by Data Protector
Locking Devices Used by Multiple Applications
Configuration Overview
Direct Library Access Concept
Indirect Library Access Concept
Configuration Goals
SAN Environment Configuration
Limitations
Configuration Methods
Device Autoconfiguration
Configuration Using the SANconf Tool
Manually Configuring the Library
A Cluster
Manually Configuring the Devices Drives
Library Robotics
Defining Lock
Names
Setting Advanced Options
Summary of Device Definitions Using Lock Names
Selecting Direct Access
Manually Configuring the libtab Files
File on zala File on oda
File on donat
Shared Devices and MC/ServiceGuard
Configuration Basics
B3935-90015MC/ServiceGuard Version A.11.05 Release Notes
Creating the ATS Configuration Files
Configuring Drives
How to Configure a Floating Drive
How to Configure a Static Drive
Static Drives
Drive Cleaning
Configuring Automatic Drive Cleaning
Conditions for Automatic Cleaning
Testing the Drive Cleaning Configuration
Testing
Configuration
Eject
Busy Drive Handling
Abort
Activating Barcode Support
10 Activating Barcode Reader Support
Activating Cartridge Memory Support
11 Cartridge Memory Support Activation for a Drive
Disabling a Backup Device
Deviceoption
Disable Device
Removing a Backup Device
How to Remove a Backup Device
Renaming a Backup Device
How to Rename a Backup Device
Device Locking
Device Locking
Device Concurrency, Segment Size, and Block
Size
Streaming
Changing
13 Advanced Options Dialog Box Concurrency
14 Device Properties Dialog Box Concurrency
Segment Size
Number of Buffers
Block Size
Before Changing
Block Size in Data
Block size
Configuring Users and User
Configuring Users and User Groups
Data Protector User Rights
Start backup specification
Save backup specification
Switch session ownership
Back up as root
Data Protector User Rights
User Rights Admin Operator
Predefined Data Protector User Groups
Predefined Data Protector User Groups
Adding New User Groups
Adding or Deleting a User Group
Adding a User Group
Deleting a User Group
Adding or Deleting a User
Adding New Users
Moving a User to Another User Group
Modifying a User
Changing User Properties
Changing User Group Rights
Example User Configurations
Allowing Users to Restore Their Own Files
When to Use This
Enabling Users to Back Up Their Systems
Example User Configurations
Example User Configurations Chapter
Managing Media
Managing Media
Overview of Data Protector Media Management
100
Media Life Cycle
How the Media Pool Relates to Other Components
Chapter 101
Creating a Media Pool
Properties of a Media Pool
Pool Name
Description
Media Type
104
Policymedia
Non
Factors
Magazine Support
Media Condition
106
How to Add
How to Add Used
Adding Media to a Media Pool
Unused Media
Formatting Media
How to Format Media
110
Formatting Media in a Magazine
Cartridge Memory Reformat for Specific Slot
Recognizing Other Data Formats
Recognized
Formats
Data Protector Media Format Categories
Cartridge Memory Enabled Recognition
112
How to Import Media
Importing Media
Importing the Catalog from Media
Import Multiple Media
Catalog from
114
Importing Media in a Magazine Device
Import Catalog
116
How to Import a Single Medium into a Magazine What’s Next?
Import Magazine
Appendable on incrementals only The first medium used in a
Appending Backups to Media
Limitation
118
Using a Pre-Allocation List of Media for Backup
120
Selecting Media for Backup
Media Selection
How Media Are Selected for Backup
OFF
Setting Data Protection for Media
122
Recycling Media
Moving Media to Another Pool
What Is Exporting
When to Export
How to Export
Exporting Media from Data Protector
What Is a Location?
How to Modify Media Location
Modifying Media Locations
126
What Is a Description? Media Label
Modifying Media Descriptions
When to Verify
How to Verify Data
Verifying Data on a Medium
On a Medium
Scanning Media in a Device
List Cartridge Memory for Specific Slots
130
Backup Media
Checking the Condition of a Medium
Information on Media
Selection
Factors Influencing the Condition of Media
132
Statuses of Media
Media Pools
Good
Fair
134
Changing How Media Condition Is Calculated
Media Condition Property
Searching for and Selecting a Medium
How to Enter
Entering a Medium into a Device
Media into a
136
Bulk Eject
How to Eject
Ejecting a Medium from a Device
Scheduled Eject of Media
Overview
Notification on
Mail Slots Full
Chapter 139
Vaulting Media
140
Restoring from Media in a Vault
Configuring Vaults
Moving Media to a Vault
142
Copying Media
Moving Copies
Exporting Copies
Restoring from a
Copy
Automated Media Copying
Cleanme Request
Selection and Use
Devices
Destination Pool
Detection of Write-Protected Media
Using Different Media Format Types
148
Modifying Views in the Media Management Window
150
Backup
152
Configuring a Backup
Prerequisites
154
Creating a Backup Specification
Backup Session
Example of Creating a Backup Specification
Key Points
Create New Backup Dialog Box
156
Source Page of the Backup Wizard
Device Page of the Backup Wizard
158
Backup Object Summary
Final Page of the Backup Wizard
160
Backing Up Unix Systems
Backing Up Unix Filesystems
How to Back Up
Selecting Specific
Files or Directories
Unix Files
Backing Up Clients Using Disk Discovery
Discovery
Backing Up Disks Using NFS
What Is NFS?
Selecting an Entire Client to Be Backed Up
164
NFS Environment
Backing Up Unix Disks as Disk Image Objects
166
Chapter 167
Backing Up Windows Systems
Backing Up Filesystems Logical Disk Drives
Private exclusion list
What Is Not
Backed Up?
Features
Ntfs
Filesystem
VSS Filesystem
Chapter 171
Sparse Files
Manual Definition
Multiple Disk
Agents
Windows NT
Backing Up Configuration
Specifying Objects Using Manual Add
174
2000/XP/Server
2003
Chapter 175
176
Backing Up
Backing Up the Windows 2000/XP/Server 2003 System State
Chapter 177
Servers
Wins Server
Dhcp Server
DNS Server
Backing Up the Windows 2000/XP/Server 2003 Services
Backing Up Windows 2000/XP/Server 2003 Services
Refer to the HP OpenView Storage Data Protector Installation
180
Backing Up a Remote Storage Service Database
Backing Up the DFS
Backing Up Windows User Profiles, Event Logs, and User Disk
Quotas
User Profiles
182
Backing Up Windows Clients Using Disk Discovery
Event Logs
User Disk Quotas
How Are Disks
Selecting the Client
184
When to Use Shared Disks Backup
Backing Up Windows Shared Disks
186
Chapter 187
16 Inet Logon Option on Windows NT
188
Chapter 189
Backing Up Windows Disks as Disk Image Objects
190
How to Specify a
Where to Find a
Disk Image
Section
How to Perform a
192
Chapter 193
Backing Up Novell NetWare Filesystems Volumes
Prerequisites How to Back Up a Novell NetWare System
Backing Up Novell NetWare Systems
194
Chapter 195
What Is Included
Backup?
Configuration Components
An Incremental
Chapter 197
Client Backup with Disk Discovery
198
Backing Up NetWare Directory Services NDS
Adding NDS Objects to a Backup Specification
Mountpoint Configuration File TSANDS.CFG
200
OpenVMS System
Backing Up OpenVMS Systems
Backing Up OpenVMS Filesystems
Equivalent to a BACKUP/PHYSICAL
202
Chapter 203
Backing Up in a Direct Backup Environment
Data Protector Installation and Licensing Guide
Protector EVA/VA/MSA Integration Guide
EVA/VA/MSA Integration Guide
Backup Specification Configuration Procedure
Restore
Starting Direct Backup Using the CLI
Backing Up Rawdisks
Backing Up Oracle8i Online and Offline
206
Scheduling Unattended Backups
Scheduling
Conflicts
Planning Your
Policies
Starting Backups on Specific Dates
Starting Periodic Backups
Editing Your Backup Schedule
Backups
Skipping Backups During Holidays
Configuring Backup Options When Scheduling
Running Consecutive Backups
212
Selecting a Backup Type Full or Incremental
Backup Types
Relative Referencing of Backup Runs
214
How to Read Table
How to Select
Backup Type
Examples
Options Offered by Templates
Using Backup Templates
Data Protector Default Backup Templates
Trees
Schedule
Applying a Backup Template
218
Specification
Integration
220
Creating a New Template
Modifying an Existing Template
Chapter 221
Groups of Backup Specifications
222
26 Example of Backup Specification Groups
Group
224
Using Backup Options
226
Most Frequently Used Backup Options
Backup Options
228
Backup Options Protection
230
Log Files
Logging Changing Details About Data Stored in the Database
Log All
232
What Is Load
Balancing?
Load Balancing
How Are
Parameters Used?
How Are Objects
234
Ownership Who Will Be Able to Restore?
List of Data Protector Backup Options
Backup Specification Options
Setting Options for Backup Specification
236
Available Backup Specification Options
Backup Specification Options General and Other Description
Load Balancing
Ownership
238
Pre-Exec
Post-Exec
Reconnect Broken Connections
Object Options
Setting the Disk Image Options
240
Setting the Object Specific Options
32 Disk Image Options
Object Properties General and Trees/Filters
242
Backup Files of Size
Backup Posix Hard Links as Files
Do Not Preserve Access Time Attributes
Catalog Protection
Do Not Use Archive Attribute Windows-Specific Option
244
Logging
Lock Files During Backup
Encode
Protection Data Protection
Public/Private
Report Level
246
Uncompress NetWare Compressed Files Novell Netware Specific
Report Open Locked Files As Windows-Specific Option
Software Compression
User Defined Backup Variables
248
Device Backup Options
CRC Check
Concurrency
Media Pool
Pre- and Post-Exec Commands
Backup Specification
Specific Backup Object
250
Pre- and Post- Exec Commands on Windows Systems
Pre- and Post-Exec Commands for a Backup Specification
252
Filename or
Pathname
Restarted
Value Description
254
Pre- and Post-Exec Commands for a Specific Backup Object
Environment Variables
256
Pre- and Post- Exec Commands on Unix Systems
How to Write the Commands
Pathname?
258
Chapter 259
Pathname 260
Environment
Variables
262
Managing Failed Backups
Preventing Backup Failure
264
Enabling Wake Onlan Support
Restarting Failed Backups
266
Restore
268
Standard Restore Procedure
Restoring Your Data
Selecting Your Data for Restore
270
Handling File Conflicts
Selecting Data for Restore
Selecting a Backup Version
Specifying Restore Location
Setting Restore Options
Restoring Under Another Device
272
Previewing and Starting a Restore
Aborting a Restore
Restoring Disk Images
Finding Needed Media
274
Procedure
Disk Image Objects
Restoring Your Data to a Shared Disk
Restoring Unix Systems
Restoring Windows Systems
278
Windows Filesystem Restore Limitations
How to Read This
Directories
Restoring the Windows Configuration
Restoring Windows Configuration
Images
280
Restoring the Windows 2000/XP/Server 2003 System State
Restoring the SysVol
282
Restoring the Windows Registry
Selecting System State Items
Restoring Windows 2000/XP/Server 2003 Services
Active Directory
Active Directory Restore Modes
Services Restore
Certificate
284
Restoring DFS
Restoring Windows User Profiles and Event Logs
Deleted User
Profiles
Restoring Windows TCP/ IP Services
286
Restoring Novell Netware Filesystems
288
Restoring the Novell NetWare Configuration
Restoring File Ownerships and Trustees
Restoring the NetWare Configuration
Restoring Novell NDS
290
What is Restored?
Restoring OpenVMS Filesystems
292
Chapter 293
Restore Options
List of Restore Options
General Restore
294
Chapter 295
Commands
Pre-
Post-Exec
296
Specific Options
File Conflict
Handling Options
User Defined Restore Variables
298
Restore Techniques
Restoring Files to Different Paths
Restoring Files in Parallel
300
Restoring Files in Parallel
When to Restore Directly from Media
Viewing Files Not in the IDB
How to Restore
Restoring Files in Use
Restoring by Query
Directly from
Restore by Query
By Query
304
Skipping Files for Restore
Selecting Only Specific Files Matching for Restore
Manually
How to Add Files
Restoring Files and Directories Manually
306
Monitoring, Reporting
308
Monitoring Sessions
Viewing Currently Running Sessions
310
Viewing Finished Sessions
Responding to Mount Requests
Chapter 311
312
Aborting Running Sessions
Changing the Amount of Messages Shown
Chapter 313
Monitoring Several Cells Simultaneously
314
Data Protector Reporting
Report Formats
Report Send
Methods
316
Backup Specification Reports
Report Types
Backup Specification Reports
318
Chapter 319
320
Configuration Reports
Configuration Reports
IDB Reports
IDB Reports
322
Chapter 323
324
Pools and Media Reports
Pools and Media Reports
Chapter 325
326
Sessions in Timeframe Reports
Sessions in Timeframe Reports
Chapter 327
328
Single Session Report
Single Session Reports
Report Formats
Html
330
Report Send Methods
Email Send Method
Creating a New
Microsoft
Broadcast Message Send Method
Log to File Send Method
Snmp Send Method
332
Chapter 333
External Send Method
334
Configuring Reports Using the Data Protector
Configuring Report Groups and Adding Reports
336
Chapter 337
338
Running Individual Reports
Running Report Groups
Chapter 339
340
Session Flow Report
Media Statistics Report
Device Flow Report
Chapter 341
What Are Notifications? Configuring Notifications
Data Protector Notifications
Notification Types
342
Data Protector Notifications
344
Chapter 345
Explanation of Some Notifications
346
Notification Send Methods
Email Send Method
348
Snmp Send Method
Broadcast Message Send Method
Log to File Send Method
350
Configuring Notifications
External Send Method
Use Report Group Send Method
Data Protector Event Log Send Method
352
Configuring Reports and Notifications on the Web
354
Restricting Access to Web Reporting
Copying Data Protector Java Programs to the Web Server
Configuring Report Groups
Generating the Reports
356
Event Log Deleting Event Log Contents
Data Protector Event Log
Event Log Message
358
Manager-of-Managers Environment
360
Manager-of-Managers
Centralized management of all tasks
Centralized Media Management Database
Centralized licensing
Configuring the Manager-of-Managers
362
Setting Up MoM Manager
Importing Data Protector Cells
364
Adding a MoM Administrator
Restarting Data Protector Services
Chapter 365
Centralized Media Management Database Cmmdb
366
Central Media Management Database
Configuring a Centralized Media Management Database
368
Configuring the Cmmdb on the MoM Manager
Cmmdb
Configuring the Cmmdb on the Client Cell
370
Chapter 371
Setting Up Centralized Licensing
Why Use Centralized Licensing? Prerequisite Configuring
Centralized Licensing
372
Assigning
Releasing
Licenses
374
Moving Licenses in the MoM Environment
Enterprise
Before
Reorganization
376
Deactivating Centralized Licensing
Deactivation
Importing a Cell Manager Exporting a Cell Manager
Working with a MoM Environment
Importing and Exporting Data Protector Cells
Distributing the MoM Configuration
How to Distribute the MoM Configuration
Moving Client Systems Among Cells
378
Configuring Data Protector Users
Managing Devices and Media for a Specific Cell
380
Managing the Data Protector
382
Data Protector Software Release Notes
About the Data Protector Internal Database
Used?
IDB Architecture
384
IDB Architecture
Mmdb
Dcbf
386
Chapter 387
388
Configuring the IDB
Allocating Disk Space for Future Use
What to Plan for in Advance
390
Preparing for IDB Recovery
Robustness Considerations
Recommendations
To Optimize
Robustness
IDB Directories
392
Location of IDB Directories on Unix
Location on Unix
Recommended Location of IDB Directories
Relocating the IDB Directories
394
Creating an Additional Copy of the IDB Recovery File
Creating or Relocating DC Directories
Directory
Creating a DC Directory
Enabling Transaction Logs
Why Enable
Transaction Logs?
Disk Space
Considerations
Configuring the Database Backup
Recommended IDB Backup Configuration
Selecting the Internal Database Object
398
During the IDB
400
Configuring the Database Reports and Notifications
IDB Reports
Chapter 401
Maintaining the IDB
402
Chapter 403
404
Reducing the IDB Growth
IDB Growth
When Does Change Take Effect?
Changing Logging Level and Catalog Protection Settings
Reducing the IDB Size
406
Changing Catalog Protection for a Session
Changing Catalog Protection for an Object
Purging Obsolete Filenames
Extending the Database Size
Filenames
Creating New DC Directories
How to Create
Creating New fnames.dat Files
Files?
Creating a New fnames.dat File
Checking the Database Size
410
Checking the Consistency of the Database
Moving the Database to a Different Cell Manager
412
Chapter 413
414
Restoring the IDB
Restoring the IDB to a Temporary Directory
Manager
Moving the IDB to the Original Location
On an Unix Cell
416
Recovering the IDB
Overview of IDB Recovery Methods
Most
Convenient
Omitting
Removing
Levels
Identifying the Level of Database Corruption
IDB Corruption
420
How to Identify
Corruption Level
Performing Guided Autorecovery
422
Recovery Procedure
Handling Minor Database Corruption in the Dcbf Part
Handling Major Database Corruption Filenames Part
Recovering the IDB Using IDB Recovery File Changed Device
424
Chapter 425
Recovering the IDB Without the IDB Recovery File
426
Chapter 427
Recovering the IDB from a Specific IDB Session
428
Chapter 429
Replaying IDB Transaction Logs
430
Recovering the IDB to a Different Disk Layout
How to Replay
432
Updating the IDB by Importing Media
434
Disaster Recovery
436
Cell Manager Client
Supported Disaster Recovery Methods and Operating Systems
Introduction
438
What Is a
Order to recover other user data
Computer
Disaster?
440
What is Online
Recovery?
What is Offline
Local/Remote
442
Preparing for a Disaster Recovery
Prepare for recovery
Planning
Plan
444
Consistent and Relevant Backup
Perform recovery procedures
What Is SRD?
Updating the System Recovery Data SRD
How to Create a Consistent and Relevant Backup?
446
Using
Omnisrdupdate
Chapter 447
Script
448
Chapter 449
Assisted Manual Disaster Recovery of a Windows System
450
Requirements
Limitation
Preparation
Has occurred
452
How to Determine the Filesystem Type from the SRD File
Type number Filesystem
454
Chapter 455
Recovery
456
Other Windows Systems
458
Disk Delivery Disaster Recovery of a Windows Client
Limitations
460
Chapter 461
462
Enhanced Automated Disaster Recovery of a Windows System
464
Chapter 465
466
Disk and Partition
DR Image File
Chapter 467
468
ISO Image
470
Eadr of a
Windows Client
Chapter 471
One Button Disaster Recovery of a Windows System
472
Chapter 473
474
Obdr Backup
Modifying an
476
Chapter 477
478
Chapter 479
Automated System Recovery
480
ASR. See the HP OpenView Storage Data Protector Installation
Hardware
482
Prerequisite Creation of ASR Set
484
Chapter 485
486
Making IDB consistent all methods
Enhanced Automated Disaster Recovery Specifics
Restoring the Data Protector Cell Manager Specifics
One Button Disaster Recovery Specifics
488
Automated System Recovery Specifics
Advanced Recovery Tasks
Restoring the Microsoft Cluster Server Specifics
Possible Scenarios
490
Disaster Recovery of a Secondary Node
Disaster Recovery of the Primary Node
Mmerge p1sApath ... p1sXpath
492
Chapter 493
494
Restoring Hard Disk Signatures On Windows
Restoring Internet Information Server IIS Specifics
496
Troubleshooting
498
Manual Disaster Recovery of an HP-UX Client
Concept
Creating a Golden Image
Using Custom Installation Medium
Overview
Swsource section
500
Chapter 501
Golden Image
502
Using System Recovery Tools
Creating Recovery Archives
504
Via the Network in the Ignite-UX Administration Guide
506
Gathering
Disk Delivery Disaster Recovery of an Unix Client
Storage Data Protector Software Release Notes
HP-UX Example
Solaris Example
Tru64
508
Auxiliary Disk
Preparing Backup Specification
Creating an
510
Chapter 511
Manual Disaster Recovery of an Unix Cell Manager
512
Chapter 513
Windows
Troubleshooting Disaster Recovery on
General Troubleshooting
Troubleshooting Assisted Manual Disaster Recovery
Troubleshooting Disk Delivery Disaster Recovery
Drstart reports Can not copy filename
Cannot Find Physical Location of Drives Selected for Disk
Troubleshooting Eadr and Obdr
Disk Delivery Disaster Recovery of a Media Agent Client
No Operating System Found
Automatic DR information could not be collected
Some Non-critical Errors Were Detected
Message
518
Blank Screen During Recovery
Network is Not Available During Restore
Cannot Create a CD ISO Image for Eadr of Mscs
Auto Logon Does Not Work
Computer Freezes During Eadr
520
Customizing the Data Protector Environment
522
Most Often Used Variables
How to Use Global Options
Global Options File
524
Using Omnirc Options
How to Use
Locations
Omnirc Options?
OB2INCRDIFFTIME and OB2CHECKCHANGETIME
526
Chapter 527
Firewall Support
Limiting the Range of Port Numbers
Chapter 529
Agent Identifiers
530
Variables Together
Using Both
Port Usage in Data Protector
532
Chapter 533
534
User Interface
Chapter 535
Configuration Diagram
536
Settings
Port Range
538
Chapter 539
540
Example 3 GUI Installed Inside, Other Components Installed
Outside a Firewall
Chapter 541
Process Port
542
Settings on
Example 4 Application Agent and Media Agent Installed
Outside, Other Components Installed Inside a Firewall
Cell Manager
544
Chapter 545
Port Range Setting on the Cell Manager Limitations
546
Troubleshooting
548
Before Calling Your Support Representative
Data Protector Log Files
Location of Data Protector Log Files
Format of Data Protector Log Files
550
Log Files and Their Contents
552
Debugging
Limiting the Maximum Size of Debugs
Ways of Debugging
554
Debug Syntax
Modified Schedule -full
Trace File Name
556
CRS Debug on Windows
Inet Debug on Unix
Inet Debug on Windows
558
CRS Debug in the Microsoft Cluster Environment
Sample Debugging
Chapter 559
560
Browsing Troubleshooting Messages
Sample Error Message Dialog
When You Cannot Access Online Troubleshooting
562
Chapter 563
Description of Common Problems
564
Troubleshooting Networking Communication
Hostname Resolution Problems
Data Protector Components Name Resolution
Host a Host B
DNS Resolution Problem
566
Hosts file resolution problem
Client Fails with Connection Reset by Peer
Checking the TCP/IP setup
568
Troubleshooting Data Protector Services and Daemons
Problems Starting Data Protector Services on
You do not have permission to start the services
Windows
Changed service account properties
Specific service has not been found
MMD fails upon starting the CRS service
570
Problems Starting Data Protector Daemons on Unix
Raima Velocis server daemon could not be started
Raima Velocis server daemon is apparently not running
Data Protector Cell Manager daemon could not be started
572
Data Protector Processes
Which Processes Run Where, and When
Troubleshooting Devices and Media
Cannot Access Exchanger Control Device on Windows
2000/XP/Server
574
Medium Quality Statistics
Device Open Problem
Using Unsupported Scsi Adapters on Windows
Error statistics Explanation
576
Medium Header Sanity Check
Command Syntax
Cannot Use Devices After Upgrading to Data
Protector A.05.10
578
Other Common Problems
Troubleshooting Backup and Restore Sessions
Full Backups Are Performed Instead of Incrementals
Filenames Are Not Displayed Correctly in GUI
580
No previous full backup
Backup owner is different
Unexpected Mount Request for a Standalone Device
Description has changed
Unexpected Mount Request for a Library Device
582
With the media used for backup has a Strict policy
Unexpected Mounted Filesystems Detected
Media in the library are not formatted and the media pool
Media in the library are formatted but are different from
Data Protector Fails to Start a Scheduled Session
Scheduled sessions no longer run
Licenses available
584
Poor Backup Performance on Novell NetWare Server
Data Protector Fails to Start Parallel Restore Media
Data Protector Fails to Start an Interactive Session
Agent on Novell NetWare Clients
586
Backup Protection Expiration
Troubleshooting Application Database Restores
Problems with non-ASCII Characters in Filenames
Licensing Guide for information
Troubleshooting Data Protector Installation
Problems with Remote Installation of Windows
Clients
588
Name resolution fails when using DNS or Lmhosts
TCP/IP protocol is not installed and configured on your
Troubleshooting User Interface Startup
No Permissions to Access the Cell Manager
Installation and Licensing Guide
Inet Is Not Responding on the Cell Manager
Connection to Windows 98 Clients Fails
Connection to a Remote System Refused on Windows
Or Novell NetWare
592
Troubleshooting the IDB
Problems During the Upgrade of the IDB on Solaris
Cell Manager crashes during the core upgrade
Core upgrade runs out of disk space
594
Detail upgrade runs out of memory on the system
Detail upgrade runs out of disk space on the system
Problems While Running the User Interface
Libraries Executables Missing
IDB is corrupted
IDB Session Manager is not running on the Cell Manager
RDS service/process cannot be started
Data Files Directories Missing
One or several IDB data files or directories are missing
596
Temporary Directory Missing
Data Protector GUI cannot connect to the Cell Manager
598
Problems During Backup and Import
MMD is terminated during the IDB backup or import session
Number of IDB objects and IDB objects sizes are too large
Performance Problems
DC binary files are corrupted or missing
Mmdb and CDB Are Not Synchronized
600
Chapter 601
Troubleshooting Reporting and Notifications
602
Troubleshooting Online Help on Unix
Troubleshooting Data Protector Online Help
Troubleshooting Online Help on Windows
Viewing
604
Data Protector Checking and Maintenance Mechanism
Maintenance
Check Whether Data Protector Functions Properly
Tasks
User Check Failed Notification
606
Overview of Items to Be Checked
Check the Data Protector Cell Manager
Check whether backups are configured properly
Verify the Data Protector installation
Inspect the Data Protector log files
Run the Notifications Checks
Check Other System Resources
610
Integrations with Other Applications
612
Cluster Integrations with Data Protector
Cluster Concepts and Terminology
Typical Cluster
614
What is a Package
What Is a Virtual
Or Group?
Server?
Cluster-Aware Databases and Applications
616
Microsoft Cluster Server Integration
Licensing Microsoft Cluster Server
Installation
Cell Manager on Microsoft Cluster Server
Clients on Microsoft Cluster Server
618
Backing Up Data in a Cluster Mscs
Managing Cluster-Aware Backups
Backing Up Local Disks
Backing Up Shared Disks
620
Failover of Data Protector
Failover
622
Failover of Application Other Than Data Protector
624
Aborting Sessions Based on Elapsed Session Time To balance
Command Line
626
Licensing and MC/ServiceGuard
MC/ServiceGuard Integration
Cell Manager on MC/ServiceGuard
628
Prerequisites for Configuration
Protector Installation and Licensing Guide for instructions
Configuring the Primary and Secondary Cell Managers
Configuring Primary Cell Manager
630
Secondary Cell Manager
632
Configuring the Cell Manager Package
Protector Package
634
Configuration File
Modifying
Modifying the Control File
636
Configuration
Clients on MC/ServiceGuard
Installation
Backing Up Data in a Cluster MC/SG
638
About Backing Up Database Applications
640
Veritas Cluster Integration
Clients on Veritas Cluster
Chapter 641
642
Novell NetWare Cluster Integration
Clients on Novell NetWare Cluster
Backing Up Shared Cluster Pools
What Is DSI?
Data Source Integration DSI
What Can You
Measure?
Chapter 645
646
Application Response Measurement ARM Integration
Measured?
Chapter 647
ManageX Integration
ManageX
Integration?
Supported?
Access Points for System and Management Applications
Data Protector Access Points
Introduction
Snmp Traps
Enterprise Event ID
650
Generic Event ID
Specific Event ID
Variables
Data Protector Snmp Traps Format
652
Data Protector Log Files
Windows Application Log
Data Protector Health Check Failed Notification
Examples
Verifying Data Protector Processes
Getting the Results of the Last Night’s Backup
654
ADIC/GRAU DAS and STK ACS Libraries
656
ADIC/GRAU DAS and STK ACS Integrations
Data Protector and ADIC/GRAU DAS Library Systems Integration
Data Protector and StorageTek ACS Library Integration
Configuration Basics
Media Management Basics
660
Additional Media Management Tips
Direct Access to the Library Installation and Configuration
Connecting Library Drives
Preparing for Installation
ADIC/GRAU DAS Library Device
Chapter 663
664
Installing the DAS Media Agent
Installing the DAS Media Agent on a Windows System
Remote
Installing the DAS Media Agent on a 32-bit HP-UX System
666
Chapter 667
Installing the DAS Media Agent on an AIX System
668
Using the Data Protector GUI
Using Data Protector to Configure Drives
670
Using Data Protector to Access the ADIC/GRAU Library
Searching for a Medium
672
Entering Media
Ejecting Media
Adding Media to a Media Pool
Initializing Media
Initializing
Individual Media
674
Initializing Multiple
Media in a Library
Querying the ADIC/GRAU DAS Server
Verifying Media
676
Scanning Media
Modifying Media Attributes
Moving Media
Getting Information about Media
Read-only window
Recycling Media
678
Removing Volsers
Exporting Media
Importing Media
680
Direct Access to the Library Installation Configuration
STK ACS Library Device
Library
Installing the ACS Media Agent to Use the StorageTek
Installing the ACS Media Agent on a Windows System
682
Chapter 683
Installing the ACS Media Agent on a 32-bit HP-UX System
684
Chapter 685
Using Data Protector to Configure the STK ACS Library
686
Using Data Protector to Access the STK ACS Library
Searching for Media
688
Chapter 689
Initializing Multiple Media in a Library Device
690
Chapter 691
692
Querying the STK Acslm Host
Removing Media
694
Chapter 695
696
Troubleshooting Library Installation Configuration
698
Chapter 699
700
Further Information
This Appendix
Backing Up and Restoring Unix Specifics
VxFS Snapshot
Pre- and Post- exec Script Templates
Example A-1 Pre- exec Script Template
Example A-2 Post- exec Script Template
MOUNTPOINT=$1
Data Protector Commands
Performance Considerations
Infrastructure
Network
Datastream Local Datastream
Using Hardware in Parallel
High Performance Hardware Other Than Devices
Block Size
Configuring Backups and Restores
Device Streaming
Full and Incremental Backups
Hardware Compression
Miscellaneous Performance Hints
Image Backup Versus Filesystem
Object Distribution to Media
On Novell NetWare
Schedule the Report Group
Add the Report to the Report Group and Configure It
Example of Scheduled Eject of Media
Copy the Script to the Specified Directory
Arguments
Example of Scheduled Eject of Media
Function
Main
Example of Scheduled Eject of Media
Examples of Pre-Exec and Post-Exec Commands for Unix
Session Pre-Exec Shut Down Application
Filesystem #!/bin/sh Pre-Exec Report Usage
Session Post-Exec Application Startup
Disk Image Post-Exec Mount Disk After Raw Volume Backup
Filesystem Post-Exec Log Backup for the Record
Post-Exec Notify User
Examples of Pre-Exec and Post-Exec Commands for Unix
Disaster Recovery Move Kill Links on HP-UX
03.5x and A.04.x
Creating a libaci.o on AIX
OmniBack
Full path to the library archive file is Daspath /libaci.a
Example of the Package Configuration File
Configurednode
Failbackpolicy Manual
Haltscript /etc/cmcluster/ob2cl/ob2cl.cntl
Dbservice
Deferred
# RESOURCEUPVALUE= Upup
# Resourceupvalue
#RESOURCESTARTAUTOMATIC/DEFERRED
Nodefailfastenabledno
# Volume Group Activation
Example of the Package Control File
# Volume Groups
# Filesystems
FSMOUNTOPT0= # Filesystem Unmount Count
# Service Names and Commands
Example of the Package Control File
Data Protector Log Files Example Entries
Debug.log
IpcGetPeer Could not expand ConnectionIP
Media.log
Sm.log
Inet.log
Upgrade.log
Data Protector Log Files Example Entries
Windows Manual Disaster Recovery Preparation Template
Table A-1
Changing Block Size on Windows Media Agent
Changing Block Size on Windows Media Agent Appendix a
Glossary
Backup API
Backup chain
Backup device
Backup generation
Backup specification
BC HP StorageWorks Disk Array XP specific term
BC HP StorageWorks Virtual Array specific term
See also HP StorageWorks Virtual Array LUN
BC Process EMC Symmetrix specific term
Boot volume/disk/partition
See also SAPDBA, Brbackup
See also BC and BC Process Boolean operators
See also SAPDBA, Brarchive
See also data protection
See also Mmdb CDF file Unix specific term
Cell
Cell Manager
Client backup
Client backup with disk discovery
Centralized Media Management Database Cmmdb See Cmmdb
Client or client system
Command-line interface
COM+ Registration Database
Concurrency See Disk Agent concurrency
Data protection
Data Protector user account
Data stream
Database library
Database parallelism
Delta backup
See also backup types Device
Differential backup
See incremental backup Differential backup MS SQL specific
See also Information Store MDB Disaster recovery
Directory junction Windows specific term
Directory Store DS MS Exchange specific term
Disk Agent
Disk image rawdisk backup
Disk quota
Distributed File System DFS
Domain controller
EMC Symmetrix Command-Line Interface Symcli EMC Symmetrix
Enterprise Backup Environment
Drive
Drive index
Event Logs
Exchanger
Extensible Storage Engine ESE MS
Failover
File Replication Service FRS
See also Primary Volume, and MU numbers Fnames.dat
Full backup
See also backup types
Full database backup
Full mailbox backup
Host backup See client backup with disk discovery
Global options file
Hosting system
HP OpC
HP OpenView Smart Plug-In SPI
HP StorageWorks Virtual Array
See also exporting media Incremental backup
See also backup types Incremental backup MS Exchange
See also backup types Incremental mailbox backup
Incremental1 mailbox backup
Initializing See formatting Installation Server
Inet
Information Store MDB MS Exchange specific term
See also Directory Store DS Initialization Parameter File
Internet Information Server IIS
Windows specific term
IP address
Isql Sybase specific term
Local and remote recovery
Library
Lights-out operation or unattended operation
LISTENER.ORA Oracle specific term
Login information to the Oracle Target
Logfull shell script Informix Unix
Logging level
Logical-log files
Lotus C API Lotus Domino Server specific term
Magic Packet See Wake Onlan
Media allocation policy
Media condition
Media condition factors
Media ID
Media set
Media type
Media usage policy
Merging
Microsoft Volume Shadow Copy service VSS
See also shadow copy, shadow copy provider, writer
MoM
Mount point
Offline recovery
See also first level mirror Multi-drive server
Obdrindex.dat
Obdr capable device
Online backup
On-BarInformix specific term
See also archived redo log
OpC
See also merging
Original system
Original unit ZDB specific term
Pair status HP StorageWorks Disk Array XP specific term
Package MC/ServiceGuard and Veritas Cluster specific term
Parallel restore
Pre- and post-exec commands
Parallelism
Physical device
See also pre-exec
Rawdisk backup See disk image backup
Public folder store MS Exchange 2000 Server specific term
Public/private backed up data
RAID Manager XP HP StorageWorks Disk Array XP specific term
Recovery Catalog Oracle specific term
Recovery Catalog Database Oracle specific term
RecoveryInfo
Recovery Manager Rman Oracle specific term
Removable Storage Management
Database Windows specific term
Reparse point Windows specific term
Replica unit ZDB specific term
See also replica storage pool Restore session
Rman Oracle specific term See Recovery Manager
Scan
Scanning
Scheduler
Session key
Shadow copy set MS VSS specific term
See also shadow copy
See split mirror backup
Split mirror backup EMC Symmetrix
See ZDB tape backup
Shared disks
Split mirror backup HP StorageWorks
Disk Array XP specific term
SRD file
Sst.conf file
Stackers
Standard security MS SQL specific term
See also integrated security Storage Group
StorageTek ACS library
Symmetrix Command-Line Interface
System Backup to Tape Oracle specific term
Symmetrix CLI Database File
System databases Sybase specific
System volume/disk/partition
See ZDB disk backup
Tablespace
Target R2 device EMC Symmetrix
Terminal Services Windows specific term
Transaction backup
Transaction backup Sybase and SQL specific term
Transaction log backup
Transaction log table Sybase specific term
TSANDS.CFG file Novell NetWare specific term
Unattended operation See lights-out operation User account
User disk quotas
Volume group
Vaulting media
Verify
See also original unit and replica unit Virtual server
Volume mountpoint Windows specific term
See Microsoft Volume Shadow Copy service VxFS
VxVM Veritas Volume Manager
Windows Configuration backup
Xbsa interface Informix specific term
XCopy engine direct backup specific term
See zero downtime backup ZDB
See also zero downtime backup ZDB
ZDB part of the IDB ZDB specific term
Glossary
Index
Index
626
Bdacc
633
See Centralized Media Management Database
340
See IDB
440
Preparation, Windows NT/2000 client
111
116
618
Limiting port range, firewall environment
Index
149
NDS
622
Index
174
Index
Scsi ID
NT Configuration
Use Shadow Copy, object specific option
Index
VSS
XCopy engine, 39