Integrations with Other Applications

Access Points for System and Management Applications

Command-Line Interface, Graphical User Interface and Web Reporting Interface

The Data Protector CLI provides comparable functionality as it is provided in Data Protector GUI. Using the Data Protector CLI you can:

Start the Data Protector GUI and sub-GUIs. For a list of the Data Protector sub-GUIs, refer to “Graphical User Interface” on page 6.

Configure and start Data Protector actions such as backup, restore and IDB purge. For a list of possible Data Protector actions, refer to Appendix, “Data Protector Commands,” on page A-7.

Configure and start Data Protector reports using the Data Protector omnirpt CLI command. For more information about reporting, refer to “Data Protector Reporting” on page 315.

Start the Java user interface to configure and start Data Protector reports. For more information about web reporting, refer to “Configuring Reports and Notifications on the Web” on page 353.

You can use Data Protector commands for scripts that provide the input data to System and Application Management application.

Data Protector Log Files

Some System and Application Management applications, such as HP OpenView Vantage Point Operations, allow you to specify when and which log files should be monitored for a specific log entry. If the specified entry is detected in the file, an action can be specified. In VPO this is called Log file encapsulation.

You can configure such a System and Application Management application to monitor Data Protector log files for specific log entries (Data Protector events) and define an action that is to be executed in case a particular Data Protector event is detected.

For more information on Data Protector log files refer to “Data Protector Log Files” on page 550. Note that there is no log files formatting specification provided. For Data Protector log files exemplary entries, refer to Appendix, “Data Protector Log Files Example Entries,” on page A-44.

Windows Application Log

Some System and Application Management applications, such as ManageX, monitor the Windows Application Log.

652

Chapter 13