HP OpenView Storage Data Protector
Administrator’s Guide
Legal Notices
Trademark Notices
Page
1. Introducing Data Protector
2. Configuring and Using Backup Devices
3. Configuring Users and User Groups
4. Managing Media
5. Backup
Page
6. Restore
7. Monitoring, Reporting, Notifications, and the Event Log
8. Manager-of-ManagersEnvironment
9. Managing the Data Protector Internal Database
10. Disaster Recovery
Page
11. Customizing the Data Protector Environment
12. Troubleshooting
Page
13. Integrations with Other Applications
14. ADIC/GRAU DAS and STK ACS Libraries
A. Further Information
Glossary
Index
Printing History
Page
Conventions
Page
Contact Information
Page
Data Protector Documentation
HP OpenView Storage Data Protector Concepts Guide
HP OpenView Storage Data Protector EMC Symmetrix Integration Guide
HP OpenView Storage Data Protector EVA/VA/MSA Integration Guide
HP OpenView Storage Data Protector Integration Guide for HP
OpenView
HP OpenView Storage Data Protector MPE/iX System User Guide
OpenView Operations
HP OpenView Storage Data Protector Software Release Notes
Page
In This Book
Organization
Chapter
Appendix A
Glossary
Introducing Data Protector
In This Chapter
The Data Protector Cell Environment
The Data Protector Cell Environment
cell
clients
backup devices
Data Protector Internal Database (IDB)
How a Backup Session Works
How a Restore Session Works
Page
Using the Data Protector User Interface
Using the Data Protector User Interface
HP OpenView Storage Data Protector Graphical User Interface
Graphical User Interface
Starting GUI on
Platforms
UNIX Platforms
xomni
xomnicellmon
xomnimm
xomnimonitor
xomnirestore
xomniinstrec
Elements of the Data Protector Graphical User Interface
Context List
Context List
Scoping Pane
Scoping Pane
Results Area
Results Area
Results Area
Navigation Tabs
The Command-LineInterface
Data Protector Online Resources
Help Topics
Help Navigator
Online Documentation
Data Protector on the Web
Using the Online Manuals
Using Microsoft Management Console (MMC)
snap-in
OB2_Snap
OB2_Snap
Page
Overview of Tasks to Set Up Data Protector
Overview of Tasks to Set Up Data Protector
Page
Configuring and Using Backup
Devices
Page
Page
Configuring Backup Devices
Configuring Backup Devices
UNIX
Systems
Robotics
Drivers
Cartridge
Memory
Page
What Are
Standalone
Devices
How to Configure
Configuring Standalone Devices
Specifying Device Type and Name
Configuring
Device Chains
device chains
Page
Configuring File Devices
Configuring File Devices
What Are File
The Recommended Segment Sizes for Specific Device File Sizes
File size (GB)
Segment size (MB)
Handling Mount
Requests
IMPORTANT
File Devices
Specifying a Pathname for a File Device
Configuring Library Devices
Configuring Library Devices
What Are Library
Slot Number
Drive Index
Drive SCSI
Drive Index to SCSI Address Mapping
a Library Device
What’s Next
Configuring Libraries with Multiple Systems
Prerequisites
How to Configure Libraries with Multiple Systems
Configuring Libraries with Multiple Systems
Page
Configuring Magazine Devices
Configuring Magazine Devices
Magazine
magazine
a Magazine Device
Configuring Stacker Devices
Configuring Stacker Devices
What Are Stacker
a Stacker Device
Stacker Device
Management
Backup and
Restore with
Stacker Devices
Configuring a Library for Mixed Media
Configuring a Library for Mixed Media
Configuring Devices for Direct Backup
Configuring Devices for Direct Backup
Backup Device
Auto-detection
XCopy Engine
Configuration Procedure
Configuring Standalone Devices
Configuring SCSI-IILibraries
Configuring XCopy Engines
Configuring the libtab File
Support of New Devices
Support of New Devices
Using Several Drive Types in a Library
Using Several Drive Types in a Library
Same Density
Setting
Different Media
Pools (on UNIX
Page
Shared Devices in the SAN Environment
Shared Devices in the SAN Environment
What Is a SAN
Key Concepts
Page
Using
FC-AL
SANs
with LIP
Locking Devices Used Exclusively by Data Protector
Direct Library Access Concept
Indirect Library Access Concept
Configuration Overview
Configuration Goals
SAN Environment Configuration
Configuration Methods
Device Autoconfiguration
Limitations
Configuration Using the SANconf Tool
Manually Configuring the Library
Configuring the
Library Robotics
in a Cluster
Manually Configuring the Devices (Drives)
Configuring Drives
Device Locking for Drives
Environment Conditions
Required Action
Defining Lock
Names
Setting Advanced Options
Summary of Device Definitions Using Lock Names
Enabling Direct
Access
Selecting Direct Access
Manually Configuring the libtab Files
file on zala
file on oda
file on donat
Shared Devices and MC/ServiceGuard
Configuration Basics
Creating the ATS Configuration Files
Configuring Drives
Floating Drives
How to Configure a Floating Drive
Static Drives
How to Configure a Static Drive
Drive Cleaning
Drive Cleaning
Conditions for Automatic Cleaning
Configuring Automatic Drive Cleaning
Enabling Dirty
Drive Detection
Configuring a Slot
for Cleaning Tape
Testing the Drive Cleaning Configuration
Testing the
Busy Drive Handling
Busy Drive Handling
Abort
Eject
Eject to mail slot
Activating Barcode Support
Activating Barcode Support
Page
Activating Cartridge Memory Support
Activating Cartridge Memory Support
Page
Disabling a Backup Device
Disabling a Backup Device
How to Disable a
How to Restart the
Deviceoption
Page
Removing a Backup Device
How to Remove a Backup Device
Removing a Backup Device
Renaming a Backup Device
How to Rename a Backup Device
Renaming a Backup Device
Device Locking
Device Locking
Internal Locking
Locking When a
Mount Request Is
Issued
How to Lock a
Device Concurrency, Segment Size, and Block Size
Device Concurrency, Segment Size, and Block
Size
Streaming
Changing
Concurrency
Page
Figure 2-14Device Properties Dialog Box: Concurrency
Segment Size
Changing the
Number of Buffers
Block Size
Before Changing
Block Size in Data
Page
Configuring Users and User
Groups
Page
Data Protector User Rights
Data Protector User Rights
Clients configuration
User configuration
Device configuration
Media configuration
Start backup specification
Save backup specification
Back up as root
Switch session ownership
Monitor
Start restore
Restore to other clients
Restore from other users
Restore as root
See private objects
Predefined Data Protector User Groups
User Rights
Admin
Operator
User
Page
Adding or Deleting a User Group
Adding or Deleting a User Group
Adding a User Group
Adding New User Groups
Deleting a User Group
Adding or Deleting a User
Adding or Deleting a User
Adding New Users
Modifying a User
Modifying a User
Changing User Properties
Moving a User to Another User Group
Changing User Group Rights
Changing User Group Rights
Example User Configurations
Example User Configurations
Allowing Users to Restore Their Own Files
When to Use This
Policy
What Needs to Be
Page
Page
Managing Media
Page
Overview of Data Protector Media Management
Overview of Data Protector Media
Management
•Support for media vaulting, also known as archiving or off-sitestorage
How the Media Pool Relates to Other Components
Media Life Cycle
Page
Creating a Media Pool
Creating a Media Pool
What Is a Media
Pool
What Is a Free
Default Media
Properties of a Media Pool
Pool Name
Description
Media Type
Media Allocation
Unformatted media first
Use free pool
Media Usage
Policymedia
Appendable
Magazine Support
Media Condition
Factors
Medium valid for
Maximum number of overwrites
Adding Media to a Media Pool
Adding Media to a Media Pool
How to Add the
Unused Media
How to Add Used
Labeling Media
Formatting Media
What Is Formatting
Media
When to Format
Recognition of
How to Format Media
Cartridge Memory
Data Initialization
Reformat
Cartridge Memory Reformat for Specific Slot
Formatting Media in a Magazine
How to Format a
Full Magazine
Single Medium in a
Recognizing Other Data Formats
Recognized
Data Protector Media Format Categories
Media Format
Data Protector Behavior
Enabled
Recognition
How to Import Media
Importing Media
Import Multiple Media
Importing the Catalog from Media
How to Import the
Catalog from
Import Catalog
Importing Media in a Magazine Device
How to Import All
Import Magazine
How to Import a Single Medium into a Magazine
Appending Backups to Media
Appending Backups to Media
Limitation
Appendable:
• Appendable on incrementals only: The first medium used in a
Page
Using a Pre-AllocationList of Media for Backup
Using a Pre-AllocationList of Media for
Backup
pre-allocation
list
Preallocating
Selecting Media for Backup
media allocation
Media Selection
How Media Are Selected for Backup
Allocation
Allocate
Data Protector Selection Order
Policy
Setting Data Protection for Media
Recycling Media
Recycling Media
How to Recycle
Moving Media to Another Pool
Moving Media to Another Pool
How to Move
Media to Another
Pool
Moving Media
Exporting Media from Data Protector
What Is Exporting
When to Export
How to Export
What Is a
Modifying Media Locations
What Is a Description
Media Label
Modifying Media Descriptions
Modifying Media Descriptions
How to Modify a
Media Description
Using Cartridge
Memory
Verifying Data on a Medium
What Is Verifying
When to Verify
How to Verify Data
on a Medium
Scanning Media in a Device
What Is Scanning
When to Scan the
How to Scan
Media in a Device
List Cartridge
List Cartridge Memory for Specific Slots
Checking the Condition of a Medium
Checking the Condition of a Medium
Information on Media
Selection of
Backup Media
List
Factors Influencing the Condition of Media
media condition factors
Device Error and
Statuses of Media
and Media Pools
Good
Fair
Poor
Changing How Media Condition Is Calculated
The Media Condition Property Page
Searching for and Selecting a Medium
Searching for and Selecting a Medium
How to Search for
and Select Media
Entering a Medium into a Device
Entering a Medium into a Device
How to Enter
Media into a
Ejecting a Medium from a Device
Ejecting a Medium from a Device
Bulk Eject of
Predefined Eject of
How to Eject
Scheduled Eject of Media
Notification on
Mail Slots Full
Page
Vaulting Media
Vaulting Media
What Is Vaulting
vault
Vaulting and Data
Implementing
Configuring Vaults
Moving Media to a Vault
Restoring from Media in a Vault
Page
Copying Media
Copying Media
What Is Media
Copying
How to Copy
source
Moving Copies
Exporting Copies
Restoring from a
Copy
Automated Media Copying
What Is Automated
Media Copying
post-backupmedia copying and scheduled media copying
What Is
Selection and Use
of Devices
Destination Pool
of the Copies
Data Protection of
Detection of Write-ProtectedMedia
Using Different Media Format Types
Using Different Media Format Types
Modifying Views in the Media Management Window
Modifying Views in the Media Management Window
Page
5 Backup
Page
Configuring a Backup
Configuring a Backup
backup specification
backup object
backup session
Backup Session
Creating a Backup Specification
Key Points
Example of Creating a Backup Specification
Create New Backup Dialog Box
Source Page of the Backup Wizard
Device Page of the Backup Wizard
Backup Object Summary Page
Final Page of the Backup Wizard
Backing Up UNIX Systems
Backing Up UNIX Systems
Backing Up UNIX Filesystems
Selecting Specific
Files or Directories
How to Back Up
UNIX Files
Backing Up Clients Using Disk Discovery
How Are Disks
disk discovery
Discovered
When to Use Disk
Selecting an Entire Client to Be Backed Up
Backing Up Disks Using NFS
What Is NFS
NFS Environment
When to Use NFS
Backing Up UNIX Disks as Disk Image Objects
What Is a Disk
disk image backup
Image Backup
Page
Backing Up Windows Systems
Backing Up Windows Systems
Backing Up Filesystems (Logical Disk Drives)
Selecting Backup
Objects
What Is Backed
What Is Not
Backed Up
private exclusion list
NTFS
Features
reparse points
volume
mount points, Single Instance Storage (SIS), and directory
Reparse Points
directory junctions
Single Instance Storage (SIS)
Sparse Files
Manual Definition
of Multiple Disk
Agents
Specifying Objects Using Manual Add
Backing Up CONFIGURATION
Windows NT
CONFIGURATION
Figure 5-10Windows NT CONFIGURATION
2000/XP/Server
System State
Figure 5-11Windows 2000/XP/Server 2003 CONFIGURATION
Backing Up
Backing Up the Windows 2000/XP/Server 2003 System State
Figure 5-12System State on Windows 2000/XP/Server
Backing Up the Windows Registry
Figure 5-13Backing Up the Windows Registry
Backing Up WINS, DHCP, and DNS
WINS, DHCP, DNS
Servers
WINS Server
Backing Up the Windows 2000/XP/Server 2003 Services
Backing Up Windows 2000/XP/Server 2003 Services
Page
Backing Up the DFS
Backing Up a Remote Storage Service Database
Backing Up Windows User Profiles, Event Logs, and User Disk
Quotas
User Profiles
Event Logs
User Disk Quotas
Backing Up Windows Clients Using Disk Discovery
How to Perform a
Selecting the Client
When to Use Shared Disks Backup
Backing Up Windows Shared Disks
Page
Setting the User Account for the Data Protector Inet Service
Figure 5-16Inet Logon Option on Windows NT
Figure 5-17Inet General Property Page on Windows 2000/XP/Server
Figure 5-18Inet Logon option on Windows 2000/XP/Server
What Is a Disk Image Backup
Backing Up Windows Disks as Disk Image Objects
How to Specify a
Disk Image
Section
Where to Find a
Disk Number
Page
Page
Backing Up Novell NetWare Systems
Backing Up Novell NetWare Systems
Backing Up Novell NetWare Filesystems (Volumes)
How to Back Up a Novell NetWare System
Page
moved files
What Is Included
in an Incremental
Backup
Backing Up CONFIGURATION
Page
How Are Disks Discovered
How to Perform a NetWare Client Backup
Client Backup with Disk Discovery
Backing Up NetWare Directory Services (NDS)
Backing Up NDS
Adding NDS Objects to a Backup Specification
The Mountpoint Configuration File TSANDS.CFG
Backing Up OpenVMS Systems
Backing Up OpenVMS Systems
Backing Up OpenVMS Filesystems
How to Back Up an
OpenVMS System
Page
Page
Backing Up in a Direct Backup Environment
Backing Up in a Direct Backup Environment
Restore
Backup Specification Configuration Procedure
Backing Up Rawdisks
Backing Up Oracle8i Online and Offline
Starting Direct Backup Using the CLI
Scheduling Unattended Backups
Scheduling Unattended Backups
Scheduling
Conflicts
Planning Your
Policies
Starting Backups on Specific Dates
Backups on
Specific Dates
Starting Periodic Backups
Predefined Backup Schedules
Fortnightly full
Monthly full
How to Use a
Predefined
Schedule
Skipping Backups During Holidays
Configuring Backup Options When Scheduling
Backups
How to Set
Schedule Backup
Running Consecutive Backups
Selecting a Backup Type: Full or Incremental
Selecting a Backup Type: Full or Incremental
Backup Types
Incr
Incr1
Incr2
Relative Referencing of Backup Runs
How to Read Table •
Examples:
How to Select the
Backup Type
Backup Type and
Using Backup Templates
Data Protector Default Backup Templates
Blank Backup
Templates
Options Offered by Templates
Figure 5-22Options Offered by Templates
Destination
Backup specification
Filesystem
Force to defaults
Using a Backup Template When Creating a New
Backup Specification
Figure 5-23Using Templates When Creating New Backup Specifications
Applying a Backup Template
Figure 5-24The Apply Template Dialog Box
Integration
Creating a New Template
Figure 5-25Creating a New Template
Modifying an Existing Template
Page
Groups of Backup Specifications
Groups of Backup Specifications
USER_FILES
SERVERS_DR
END_USER
Figure 5-26Example of Backup Specification Groups
How to View and
Create Groups
How to Save a
Specification in a
How to Delete a
Using Backup Options
Using Backup Options
Load balancing, Ownership
pre
post-exec
Page
Backup Options
Most Frequently Used Backup Options
Data Protection: Specifying How Long Data Is Kept on the Media
Backup Options: Protection
Figure 5-29Backup Object Properties - Options: Protection
Catalog Protection: How Long Info Is Kept in the Database
Logging: Changing Details About Data Stored in the Database
Log All
Log Files
Log
Directories
No Log
Load Balancing: Balancing the Usage of Backup Devices
What Is Load
When to Use Load
Balancing
When Not to Use
Load Balancing
How Are the
Page
Ownership: Who Will Be Able to Restore
Who Is a Backup
Session Owner
Who Can Restore
a Private Object
List of Data Protector Backup Options
Backup Specification Options
Setting Options for
aBackup Specification
Available Backup
Backup Specification Options - General and Other
Load Balancing
Ownership
Pre-Exec
Post-Exec
Reconnect Broken Connections
Object Options
Setting the
Figure 5-31Filesystem Options
Setting the Disk Image Options
Figure 5-32Disk Image Options
Setting the Object Specific Options
Windows filesystem
Object Properties - General and Trees/Filters
UNIX filesystem
disk image
Figure 5-34Object Properties - General and Disk Image Options
Allow Fallback
Backup Files of Size
Backup POSIX Hard Links as Files
Catalog Protection
Same as data protection
None
Until
Days
Encode
Expand Sparse Files
Lock Files During Backup
Logging
Log Directories
Open Files
Number of retries
Time out
Protection (Data Protection)
Permanent
Report Open Locked Files As (Windows-SpecificOption)
Software Compression
Uncompress NetWare Compressed Files (Novell Netware Specific)
Use Shadow Copy
User Defined Backup Variables
Figure 5-35User Defined Variables
Device Backup Options
CRC Check
Concurrency
Media Pool
Prealloc List
Pre- and Post-ExecCommands
Backup Specification
Specific Backup Object
Figure 5-36Pre- and Post-ExecControl Flow
Pre- and Post- Exec Commands on Windows Systems
How to Write the
Commands
Pre- and Post-ExecCommands for a Backup Specification
How to Specify the
Filename or
Pathname
Environment
Variables
RESTARTED
SMEXIT
SESSIONID
SESSIONKEY
SMEXIT VALUES
Page
Pre- and Post-ExecCommands for a Specific Backup Object
Environment Variables
BDACC
Page
Pre- and Post- Exec Commands on UNIX Systems
How to Write the Commands
Pathname
Page
Page
Page
Page
Managing Failed Backups
Managing Failed Backups
Setup Notification
Checking Failed
Backups
Warnings When Backing Up System Disks
Preventing Backup Failure
Enabling Wake ONLAN Support
Wake ONLAN
Restarting Failed Backups
6 Restore
Page
Restoring Your Data
What You Need to Do to Perform a Restore
Other Settings
Restoring Your Data
Standard Restore Procedure
Selecting Your Data for Restore
Selecting Data for Restore
Selecting a Backup Version
Handling File Conflicts
Specifying Restore Location
Setting Restore Options
Restoring Under Another Device
Finding Needed Media
Previewing and Starting a Restore
Aborting a Restore
Restoring Disk Images
Disk Image Objects
Restoring Your Data to a Shared Disk
How to Restore to
a Shared Disk
Restoring UNIX Systems
Restoring UNIX Systems
What Is Restored
Restoring Regular
Restoring VxFS
Restoring
Restoring Windows Systems
Windows Filesystem Restore Limitations
How to Read This
Table
Windows Files and
Directories
Restoring Shared
Disks
Restoring the Windows CONFIGURATION
Restoring Windows CONFIGURATION
Restoring the SysVol
Restoring the Windows 2000/XP/Server 2003 System
State
Selecting System State Items
Restoring the Windows Registry
Restoring Windows 2000/XP/Server 2003 Services
Active Directory
Active Directory Restore Modes
Certificate
Services Restore
Remote Storage
Service Restore
Restoring DFS
Restoring Windows User Profiles and Event Logs
Deleted User
Restoring Windows TCP/ IP Services
configured as a WINS Server, a DHCP Server, or a DNS Server, you
Restoring Novell Netware Filesystems
Restoring Novell Netware Filesystems
Restoring Namespace Information and Volume Space Restrictions
Restoring File Ownerships and Trustees
Restoring the Novell NetWare CONFIGURATION
Restoring the NetWare Configuration
Restoring Novell NDS
Restoring NDS
Schema and NDS
Troubleshooting
Restoring OpenVMS Filesystems
Restoring OpenVMS Filesystems
What is Restored
Page
Page
Restore Options
Restore Options
List of Restore Options
General Restore
Target Client
Omit Deleted Files
Page
Restore Sparse Files
Lock Files During Restore
Restore Time Attributes
Restore Protection Attributes
Pre- and
File Conflict
Keep Most Recent
Handling Options
No Overwrite
Overwrite
User Defined Restore Variables
Restore Techniques
Restore Techniques
Restoring Files to Different Paths
Different Location
for an Object
for Individual Files
Restoring Files in Parallel
What Is Parallel
Restore
Restoring Files in Parallel
How to Run a
Parallel Restore
When to Restore Directly from Media
Viewing Files Not in the IDB
How to Restore
Directly from
Restoring Files in Use
Restoring by Query
Restore by Query
When to Restore
by Query
How to Restore by
Query
Skipping Files for Restore
How to Skip Files
for Restore
Figure 6-11Matching Files for Restore
Restoring Files and Directories Manually
How to Add Files
and Directories
Manually
Page
Monitoring, Reporting
Notifications, and the Event Log
Page
Monitoring Sessions
Monitoring Sessions
Viewing Currently Running Sessions
Viewing Finished Sessions
Responding to Mount Requests
Page
Aborting Running Sessions
Changing the Amount of Messages Shown
Page
Monitoring Several Cells Simultaneously
Monitoring Several Cells Simultaneously
Data Protector Reporting
Data Protector Reporting
Reporting
Report Groups
Starting Reports
Reports on
Report Formats
Report Send
Methods
Report Types
Report Types
Backup Specification Reports
Backup Specification Reports
Page
Configuration Reports
Configuration Reports
IDB Reports
IDB Reports
Page
Page
Pools and Media Reports
Pools and Media Reports
Page
Sessions in Timeframe Reports
Sessions in Timeframe Reports
Page
Single Session Report
Single Session Reports
Report Formats
Page
Report Send Methods
Report Send Methods
Email Send Method
Creating a New
Microsoft
Exchange Profile
Broadcast Message Send Method
Log to File Send Method
SNMP Send Method
Page
External Send Method
Configuring Reports Using the Data Protector GUI
Configuring Reports Using the Data Protector
GUI
Configuring Report Groups and Adding Reports
Examples
Page
Page
Running Reports and Report Groups Using the Data Protector GUI
Running Reports and Report Groups Using the Data Protector GUI
Running Individual Reports
Running Report Groups
Running Reports and Report Groups Using the Command-LineInterface
Running Reports and Report Groups Using the Command-LineInterface
A Session Flow Report
A Media Statistics Report
A Device Flow Report
What Are Notifications
Configuring Notifications
Data Protector Notifications
Notification Types
Data Protector Notifications
Page
Page
Explanation of Some Notifications
Alarm
Database Purge Needed
Database Space Low
Health Check Failed
User Check Failed
End of Session
Notification Send Methods
Email Send Method
Broadcast Message Send Method
Log to File Send Method
SNMP Send Method
Page
External Send Method
Use Report Group Send Method
Data Protector Event Log Send Method
Configuring Notifications
Page
Configuring Reports and Notifications on the Web
Configuring Reports and Notifications on the Web
Copying Data Protector Java Programs to the Web Server
Restricting Access to Web Reporting
Generating the Reports
Configuring Report Groups
Data Protector Event Log
Event Log
Deleting Event Log Contents
Data Protector Event Log
The Event Log Message
Page
8 Manager-of-Managers
Environment
Page
Manager-of-Managers
Manager-of-Managers
Centralized management of all tasks
Centralized Media Management Database
Centralized licensing
Configuring the Manager-of-Managers
Configuring the Manager-of-Managers
Setting Up MoM Manager
Importing Data Protector Cells
virtual server name
Adding a MoM Administrator
Restarting Data Protector Services
MC/ServiceGuard
Page
Centralized Media Management Database (CMMDB)
Centralized Media Management Database (CMMDB)
The Central Media Management Database
Configuring a Centralized Media Management Database
Configuring a Centralized Media Management Database
the CMMDB
Configuring the CMMDB on the MoM Manager
Configuring the CMMDB on the Client Cell
Page
Why Use
Centralized
Licensing
Licensing
Centralized Licensing
Setting Up Centralized Licensing
USED
AVAILABLE
TOTAL
ALLOCATED
Releasing
Page
Moving Licenses in the MoM Environment
Enterprise
Before the
Reorganization
Reorganization of
Deactivating Centralized Licensing
Deactivation
Working with a MoM Environment
Importing a Cell Manager
Exporting a Cell Manager
Working with a MoM Environment
Importing and Exporting Data Protector Cells
Moving Client Systems Among Cells
Moving Clients
How to Distribute the MoM Configuration
Distributing the MoM Configuration
Configuring Data Protector Users
Managing Devices and Media for a Specific Cell
Restoring, Monitoring, and Reporting in an Enterprise Environment
Restoring, Monitoring, and Reporting in an Enterprise Environment
Managing the Data Protector
Internal Database
Page
About the Data Protector Internal Database
About the Data Protector Internal Database
What Is the Data
Protector Internal
Database (IDB)
Why Is the IDB
The IDB Architecture
IDB Architecture
Page
Page
Configuring the IDB
Configuring the IDB
General Procedure
Allocating Disk Space for Future Use
How Much Disk
Space Is Needed
What to Plan for in Advance
Preparing for IDB Recovery
Robustness Considerations
Recommendations •
to Optimize
Robustness
The IDB Directories
Location of IDB Directories on Windows
IDB
Location on Windows
Location of IDB Directories on UNIX
Location on UNIX
Recommended Location of IDB Directories
Relocating the IDB Directories
Page
Creating an Additional Copy of the IDB Recovery File
Creating or Relocating DC Directories
Creating a DC
Directory
Relocating a DC
Creating a DC Directory
Why Enable
guided
Transaction Logs
autorecovery
Disk Space
Configuring the Database Backup
the IDB Backup
Recommended
IDB Backup
Selecting the Internal Database Object
What Happens
During the IDB
Disabling the
Automatic Check
Before Backup
The Check Internal database Option (enabled by default)
Configuring the Database Reports and Notifications
IDB Reports
IDB Purge
Preview
IDB Size
IDB Notifications
Low Database
Space
Purge Needed
Maintaining the IDB
Page
IDB Maintenance Tasks
Situation
Which Task Can
Reference
You Perform
Reducing the IDB Growth
How to Reduce the
IDB Growth
When Does the
Change Take
Effect
Changing Logging Level and Catalog Protection Settings
Reducing the IDB Size
IDB Size
Changing Catalog Protection for a Session
Changing Catalog Protection for an Object
Purging Obsolete Filenames
How to Purge
Obsolete IDB
Extending the Database Size
Creating New DC Directories
Creating New fnames.dat Files
Files
How to Create
fnames.dat Files
Files
Checking the Database Size
How to Check IDB
Size
Figure 9-10Checking the Size of the fnames.dat File (CDB Part)
Checking the Consistency of the Database
Check of the
core part of
the IDB
Filenames
Extended
Moving the Database to a Different Cell Manager
Page
Restoring the IDB
Restoring the IDB to a Temporary Directory
Moving the IDB to the Original Location
On an UNIX Cell
On a Windows Cell
Page
Recovering the IDB
Recovering the IDB
When Is Recovery
Needed
Complete
Overview of IDB Recovery Methods
The Most
Convenient
Omitting
(Removing)
Corrupted IDB
Identifying the Level of Database Corruption
IDB Corruption
Levels
Figure 9-11IDB Corruption Levels
How to Identify the
Corruption Level
Performing Guided Autorecovery
Recovery Procedure
Handling Minor Database Corruption in the DCBF
Part
Recovering if DC
Binary Files Are
Corrupted
Handling Major Database Corruption in the
Filenames Part
Recovering the IDB Using IDB Recovery File and
Changed Device
Page
Recovering the IDB Without the IDB Recovery File
Page
Recovering the IDB from a Specific IDB Session
Page
Replaying IDB Transaction Logs
How to Replay
Recovering the IDB to a Different Disk Layout
Page
Updating the IDB by Importing Media
Page
10 Disaster Recovery
Page
Introduction
Introduction
Supported Disaster Recovery Methods and Operating Systems
Page
computer disaster
Computer
Disaster
What Is an Original
Original system
Page
What is Online
Recovery
What is Offline
What is
Local/Remote
The Recovery
Preparing for a Disaster Recovery
Preparing for a Disaster Recovery
Planning
1.Plan
2.Prepare for recovery
System Recovery Data (SRD)
3.Perform recovery procedures
Consistent and Relevant Backup
How to Create a Consistent and Relevant Backup
Updating the System Recovery Data (SRD)
What Is SRD
How to Update
SRD
Using SRD Update
Wizard
omnisrdupdate
omnidb -session -latest
hostname computer2, type omnisrdupdate -session 2002/05/02-5
-hostcomputer.company.com -locationa: -location
\\computer2\SRDfiles
Using a
Script
Page
Assisted Manual Disaster Recovery of a Windows System
Assisted Manual Disaster Recovery of a Windows System
Requirements
Preparation
It is too late to prepare for a disaster recovery once a disaster
has occurred
Page
drsetup diskettes
How to Determine the Filesystem Type from the SRD File
Type number
Page
Page
Page
Page
Page
Disk Delivery Disaster Recovery of a Windows Client
Disk Delivery Disaster Recovery of a Windows Client
Page
Disk Delivery
Disaster Recovery
Page
Enhanced Automated Disaster Recovery of a Windows System
Enhanced Automated Disaster Recovery of a Windows System
DR OS image file
P1S
disaster recovery CD ISO image
Page
Figure 10-1Verifying the Default Block Size
Disk and Partition
DR Image File
image
Figure 10-2WinFS Options Tab
Phase 1 Startup
Phase 1 Startup file
File (P1S)
disaster recovery CD
Page
EADR of a
Windows Client
Page
One Button Disaster Recovery of a Windows System
One Button Disaster Recovery of a Windows System
Page
Figure 10-3Verifying the Default Block Size
OBDR Backup
Modifying an
OBDR Procedure
Page
Page
Automated System Recovery
Automated System Recovery
Hardware
Hard Disk Drives
Figure 10-4Verifying the Default Block Size
Creation of ASR Set
Page
Local Devices
ASR Procedure
Restoring the Data Protector Cell Manager Specifics
Restoring the Data Protector Cell Manager Specifics
Making IDB consistent (all methods)
Enhanced Automated Disaster Recovery Specifics
One Button Disaster Recovery Specifics
Automated System Recovery Specifics
Advanced Recovery Tasks
Advanced Recovery Tasks
Restoring the Microsoft Cluster Server Specifics
Possible Scenarios
Disaster Recovery of a Secondary Node
Disaster Recovery of the Primary Node
Merging P1S files
of all nodes for
EADR
mmerge p1sA_path ... p1sX_path
_path
Page
Page
Restoring Hard Disk Signatures On Windows
Restoring Internet Information Server (IIS) Specifics
Troubleshooting
Manual Disaster Recovery of an HP-UXClient
Manual Disaster Recovery of an HP-UXClient
Concept
Golden Image
make_tape_recovery
make_net_recovery
Using Custom Installation Medium
Overview
Creating a “Golden Image”
Steps to Create a
Golden Image
Page
Page
Recovery Using a
Using System Recovery Tools
Creating Recovery Archives
Page
Recovery From the
Backup Tape
Network
Page
Disk Delivery Disaster Recovery of an UNIX Client
Disk Delivery Disaster Recovery of an UNIX
Client
Gathering
HP-UXExample
Solaris Example
Tru64
AIX
Creating an
Auxiliary Disk
Preparing the
Page
Page
Manual Disaster Recovery of an UNIX Cell Manager
Manual Disaster Recovery of an UNIX Cell
Manager
Page
Troubleshooting Disaster Recovery on Windows
Troubleshooting Disaster Recovery on
Windows
General Troubleshooting
Problem
Problems Logging on to the System After Disaster
Troubleshooting Assisted Manual Disaster Recovery
Drstart reports: “Can not copy <filename>”
Troubleshooting Disk Delivery Disaster Recovery
“Cannot Find Physical Location of Drives Selected for Disk
Delivery”
“No Operating System Found”
Disk Delivery Disaster Recovery of a Media Agent Client
Troubleshooting EADR and OBDR
Automatic DR information could not be collected
Some Non-criticalErrors Were Detected
Blank Screen During Recovery
Network is Not Available During Restore
Editing the registry incorrectly can result in failed disaster
recovery
Auto Logon Does Not Work
Computer Freezes During EADR
Cannot Create a CD ISO Image for EADR of MSCS
Page
11Customizing the Data Protector Environment
Page
Global Options File
How to Use Global Options
Global Options File
Most Often Used Variables
Page
Using Omnirc Options
Using Omnirc Options
Locations
How to Use
Omnirc Options
Most Often Used
OB2DEVSLEEP:
OB2ENCODE:
•OB2INCRDIFFTIME and OB2CHECKCHANGETIME:
OB2INCRDIFFTIME
OB2CHECKCHANGETIME
OB2VXDIRECT:
OB2PORTRANGE:
OB2PORTRANGESPEC:
Firewall Support
Firewall Support
Communication in
Data Protector
Mechanism
Limiting the Range of Port Numbers
For a Specific Data
Protector Agent
Agent Identifiers
Using Both
Variables Together
Port Usage in Data Protector
Page
Page
Page
Examples of Configuring Data Protector in Firewall
Environments
Figure 11-1Configuration Diagram
Port Range
Settings
Example 2: Disk Agent Installed Outside, Other Components
Installed Inside a Firewall
Figure 11-2Configuration Diagram
Page
Example 3: GUI Installed Inside, Other Components Installed
Outside a Firewall
Figure 11-3Configuration Diagram
Page
Settings on the
Cell Manager
Example 4: Application Agent and Media Agent Installed
Outside, Other Components Installed Inside a Firewall
Figure 11-4Configuration Diagram
ProcessPort
Page
Port Range Setting on the Cell Manager
12 Troubleshooting
Page
Before Calling Your Support Representative
Before Calling Your Support Representative
Data Protector Log Files
Location of Data Protector Log Files
Format of Data Protector Log Files
Log Files and Their Contents
Data Protector Log Files
Log File
debug.log
Ob2EventLog.txt
purge.log
RDS.log
sm.log
Upgrade.log (UNIX only)
sap.log, oracle8.log
Debugging
Limiting the Maximum Size of Debugs
Circular
When to Use
Estimating the
Ways of Debugging
Debugging Using the Data Protector GUI
Debugging Using the Trace Configuration File
Debugging Using the OB2OPTS Variable
Debugging Scheduled Sessions
Example of a
Modified Schedule -full
Debug Syntax
Trace File Name
trace.log
OB2DBGDIR
INET Debug on UNIX
INET Debug on Windows
CRS Debug on Windows
CRS Debug in the Microsoft Cluster Environment
Sample Debugging
Page
Page
Browsing Troubleshooting Messages
Browsing Troubleshooting Messages
Figure 12-1Sample Error Message Dialog
When You Cannot Access Online Troubleshooting
When You Cannot Access Online
Troubleshooting
Page
Description of Common Problems
Description of Common Problems
Troubleshooting Networking and Communication
Troubleshooting Networking and
Communication
Hostname Resolution Problems
Data Protector Components Name Resolution
Host A
DNS Resolution Problem
Checking the TCP/IP setup
HOSTS file resolution problem
Client Fails with “Connection Reset by Peer”
Page
Troubleshooting Data Protector Services and Daemons
Troubleshooting Data Protector Services and Daemons
Problems Starting Data Protector Services on
Windows
You do not have permission to start the services
Changed service account properties
A specific service has not been found
MMD fails upon starting the CRS service
RDS does not work on the Windows TSE Cell Manager
Problems Starting Data Protector Daemons on UNIX
Stopping
Daemons
omnisv -stop
Raima Velocis server daemon could not be started
Raima Velocis server daemon is apparently not running
Data Protector Cell Manager daemon could not be started
Data Protector Processes
Which Processes Run Where, and When
Troubleshooting Devices and Media
Troubleshooting Devices and Media
Cannot Access Exchanger Control Device on Windows
2000/XP/Server
Device Open Problem
Using Unsupported SCSI Adapters on Windows
Medium Quality Statistics
Page
Medium Header Sanity Check
Cannot Use Devices After Upgrading to Data
Protector A.05.10
Command Syntax
Other Common Problems
Troubleshooting Backup and Restore Sessions
Troubleshooting Backup and Restore Sessions
Filenames Are Not Displayed Correctly in GUI
Full Backups Are Performed Instead of Incrementals
No previous full backup
The description has changed
The backup owner is different
Unexpected Mount Request for a Standalone Device
The media in the device are in a media pool that has the Non
The media in the device are not formatted and the media pool to
be used has a Strict policy
be used has a Loose policy
The media in the device are formatted but are different from
those in the preallocation list
The media in the library are not formatted and the media pool
with the media used for backup has a Strict policy
The media in the library are formatted but are different from
Unexpected Mounted Filesystems Detected
Data Protector Fails to Start a Scheduled Session
The scheduled sessions no longer run
The session fails and Data Protector issues the session status No
licenses available
Data Protector Backup sessions are not started at all
(UNIX-specific)
Data Protector Fails to Start an Interactive Session
Poor Backup Performance on Novell NetWare Server
Data Protector Fails to Start Parallel Restore Media
Backup Protection Expiration
Troubleshooting Application Database Restores
Problems with non-ASCIICharacters in Filenames
Troubleshooting Data Protector Installation
Troubleshooting Data Protector Installation
Problems with Remote Installation of Windows
Clients
Name Resolution Problems when Installing the
Windows Cell Manager
Name resolution fails when using DNS or LMHOSTS
The TCP/IP protocol is not installed and configured on your
system
Troubleshooting User Interface Startup
Inet Is Not Responding on the Cell Manager
No Permissions to Access the Cell Manager
Connection to a Remote System Refused on Windows
or Novell NetWare
Connection to Windows 98 Clients Fails
Troubleshooting the IDB
Troubleshooting the IDB
Problems During the Upgrade of the IDB on Solaris
The Cell Manager crashes during the core upgrade
The core upgrade runs out of disk space
The detail upgrade runs out of memory on the system
The detail upgrade runs out of disk space on the system
Problems While Running the User Interface
IDB is corrupted
The IDB Session Manager is not running on the Cell Manager
Libraries (Executables) Missing
The RDS service/process cannot be started
Data Files (Directories) Missing
One or several IDB data files or directories are missing
Temporary Directory Missing
The Data Protector GUI cannot connect to the Cell Manager
Problems During Backup and Import
The BSM or RSM is terminated during the IDB backup or import session
The MMD is terminated during the IDB backup or import session
The DC binary files are corrupted or missing
Performance Problems
The number of IDB objects and IDB objects' sizes are too large
MMDB and CDB Are Not Synchronized
Page
Troubleshooting Reporting and Notifications
Troubleshooting Reporting and Notifications
Troubleshooting Data Protector Online Help
Troubleshooting Data Protector Online Help
Troubleshooting Online Help on Windows
Troubleshooting Online Help on UNIX
Page
Check Whether Data Protector Functions Properly
Check Whether Data Protector Functions
Properly
Data Protector Checking and Maintenance
Mechanism
Maintenance
The User Check Failed Notification
Overview of Items to Be Checked
Check the Data Protector Cell Manager
Check whether backups are configured properly
Verify the Data Protector installation
Inspect the Data Protector log files
Run the Notifications Checks
Check Other System Resources
Page
13Integrations with Other Applications
Page
Cluster Integrations with Data Protector
Cluster Integrations with Data Protector
Cluster Concepts and Terminology
What Is a Cluster
cluster
Page
package
group
What is a Package
or Group
cluster-aware
Cluster-AwareDatabases and Applications
Microsoft Cluster Server Integration
Licensing and
Microsoft Cluster
Server
Microsoft Cluster Server Integration
Cell Manager on Microsoft Cluster Server
Installation
Clients on Microsoft Cluster Server
Backing Up Data in a Cluster (MSCS)
Backing Up Local Disks
Backing Up Shared Disks
Managing Cluster-AwareBackups
Page
Figure 13-3Advanced Backup Specification Options-Clustering
Do not Restart
Backups At
Failover
Restart Backup of
Failover of Application Other Than Data Protector
Aborting All Running Sessions
Aborting Running Sessions Based on a Logical ID If a specific
Data Protector GUI
Command Line
Aborting Sessions Based on Elapsed Session Time To balance the
Temporarily Disabling Backup Sessions To balance the load after
MC/ServiceGuard Integration
Licensing and MC/ServiceGuard
MC/ServiceGuard Integration
Cell Manager on MC/ServiceGuard
Prerequisites for Configuration
Configuring the Primary and Secondary Cell Managers
Primary Cell
Page
Secondary Cell
Page
Configuring the Cell Manager Package
Configuring Data
Protector Package
Modifying the
Configuration File
Modifying the Control File
Page
Clients on MC/ServiceGuard
Installation
Configuration
Backing Up Data in a Cluster (MC/SG)
About Backing Up Database Applications
Veritas Cluster Integration
Veritas Cluster Integration
Clients on Veritas Cluster
Page
Novell NetWare Cluster Integration
Novell NetWare Cluster Integration
Clients on Novell NetWare Cluster
Backing Up Shared Cluster Pools
Data Source Integration (DSI)
Data Source Integration (DSI)
What Is DSI
What Can You
Measure
Overview of
sdlcomp obdsi.spec OmniBack.log OmniBack
/opt/perf/bin/mwa stop
DATASOURCE=OMNIBACKII
LOGFILE=/etc/opt/omni/dsi/OmniBack.log
obdsi.ksh | /opt/perf/bin/dsilog OmniBack.log OMNIBACKII
Application Response Measurement (ARM)
Integration
What Is the ARM
Integration
How to Install the
ARM Transactions
Transaction Name
Additional
Transaction
Information
ManageX Integration
ManageX
Supported
Access Points for System and Management Applications
Access Points for System and Management Applications
Introduction
Data Protector Access Points
SNMP Traps
•Enterprise Event ID
•Generic Event ID
•Specific Event ID
•Variables
Data Protector SNMP Traps Format
MIB ID
Windows Application Log
Examples
Verifying Data Protector Processes
omnisv
-status
Data Protector Health Check Failed Notification
Getting the Results of the Last Night’s Backup
omnirpt -reportlist_sessions -timeframe24 24 -html -logreport.html
14ADIC/GRAU DAS and STK ACS Libraries
Page
ADIC/GRAU DAS and STK ACS Integrations
ADIC/GRAU DAS and STK ACS Integrations
Who Uses the
ADIC/GRAU DAS
or STK ACS
Page
Configuration Basics
Choosing the Direct or Indirect Library Access Configuration
Media Management Basics
resident
non-resident
Tracking Media
tar
foreign
Initializing Other
Support
Additional Media Management Tips
The ADIC/GRAU DAS Library Device
The ADIC/GRAU DAS Library Device
Connecting Library Drives
Preparing for Installation
Page
Installing the DAS Media Agent
Installing the DAS Media Agent on a Windows System
Remote
Installing the DAS Media Agent on a 32-bit HP-UXSystem
Page
Installing the DAS Media Agent on an AIX System
Using the Data Protector GUI
Using Data Protector to Configure Drives
Using Data Protector to Configure the ADIC/GRAU Library and Drives
Using Data Protector to Access the ADIC/GRAU Library
Searching for a Medium
Entering Media
Ejecting Media
Adding Media to a Media Pool
Initializing Media
Initializing
Individual Media
Initializing Multiple
Media in a Library
Querying the ADIC/GRAU DAS Server
Verifying Media
Scanning Media
Modifying Media Attributes
Moving Media
Getting Information about Media
Recycling Media
Removing Volsers
Exporting Media
Importing Media
The STK ACS Library Device
The STK ACS Library Device
Direct Access to the Library: Installation and
Configuration
STK
ACS-Specific
Installing the ACS Media Agent to Use the StorageTek
Library
Installing the ACS Media Agent on a Windows System
Page
Page
Installing the ACS Media Agent on a 32-bit HP-UXSystem
Page
Using Data Protector to Configure the STK ACS Library
Using Data Protector to Configure the STK ACS Library and Drives
Using Data Protector to Access the STK ACS Library
Searching for Media
Page
Page
Page
Page
Page
Querying the STK ACSLM Host
Removing Media
Page
Page
Troubleshooting Library Installation and Configuration
Troubleshooting Library Installation and
Configuration
Installation Steps
GRAU CAPs
How to Use uma
Utility
Page
Page
Further Information
In This Appendix
In This Appendix
A-2
Backing Up and Restoring UNIX Specifics
Backing Up and Restoring UNIX Specifics
VxFS Snapshot
What Is VxFS
snapshot
VxFS Backup
Pre- and Post- exec Script Templates
Example A-1Pre- exec Script Template
A-4
Example A-2Post- exec Script Template
A-5
A-6
Data Protector Commands
Data Protector Commands
A-7
Performance Considerations
Performance Considerations
The Infrastructure
Network Versus Local Backups and Restores
Datastream
Local Datastream
High Performance Hardware Other Than Devices
Using Hardware in Parallel
A-9
Configuring Backups and Restores
Device Streaming
Block Size
A-10
Hardware Compression
Full and Incremental Backups
A-11
Image Backup Versus Filesystem
Object Distribution to Media
Miscellaneous Performance Hints
A-12
A-13
Example of Scheduled Eject of Media
Example of Scheduled Eject of Media
Schedule the Report Group
Add the Report to the Report Group and Configure It
A-14
Copy the Script to the Specified Directory
A-15
A-16
A-17
A-18
A-19
Examples of Pre-Execand Post-ExecCommands for UNIX
Session Pre-Exec:
Shut Down
Examples of Pre-Execand Post-ExecCommands for UNIX
Pre-Exec:
Unmount a Disk
Before a Raw
Volume Backup
Filesystem #!/bin/sh
Pre-Exec:Report
Usage of the
Post-Exec:
Startup
Page
Post-Exec:Notify
User
Post-Exec:Start
Another Backup
Post-Exec:Restart
A-24
Disaster Recovery: Move Kill Links on HP-UX11.x
Disaster Recovery:
Move Kill Links on HP-UX11.x
A-25
Creating a libaci.o on AIX
Creating a libaci.o on AIX
OmniBack
A.03.10 and Earlier
A.03.5x and A.04.x
A-26
A-27
Example of the Package Configuration File
Example of the Package Configuration File
A-28
A-29
A-30
A-31
A-32
A-33
A-34
A-35
A-36
Page
Example of the Package Control File
Example of the Package Control File
A-38
A-39
A-40
A-41
A-42
A-43
Data Protector Log Files Example Entries
Data Protector Log Files Example Entries
debug.log
A-44
A-45
sm.log
inet.log
media.log
A-46
upgrade.log
A-47
A-48
Windows Manual Disaster Recovery Preparation Template
Windows Manual Disaster Recovery Preparation Template
A-49
Table A-1
A-50
Changing Block Size on Windows Media Agent
Changing Block Size on Windows Media Agent
A-51
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Index