Restoring data

Policies for restoring data are an essential part of the overall backup strategy in the company. Keep the following in mind:

Backing up and restoring files is essentially the same as copying files. Therefore, ensure that only authorized people have the rights to restore confidential data.

Ensure that unauthorized people cannot restore files of other people.

This section describes some possible implementations of the restore policy using Data Protector. You can restore your filesystem data by browsing through restore objects or restore sessions. By default, data is restored to its original location. However, you can specify any location to be the destination of restored data.

Restore duration

After data loss, access to data is possible only after the recovery process is finished. It is often critical to minimize restore duration so that users can do their regular work. Therefore, plan for the time needed to restore specific data.

Factors affecting restore duration

The restore duration depends on a number of factors, such as:

The amount of data to be restored. This also directly influences all the following items.

A combination of full and incremental backups. For more information, see Full and incremental backups” on page 91.

Media and devices used for backup. For more information, see Chapter 3 on page 133.

Speed of networks and systems. For more information, see Understanding and planning performance” on page 67.

The application you are recovering, for example, Oracle database files. For more information, see the appropriate HP Data Protector integration guide.

The use of parallel restore. Several objects can be restored with a single read operation, depending on how the data was backed up. See Parallel restores” on page 228.

Speed and ease of selecting the data to be restored, which depends on the logging level settings used during the backup and on catalog protection time. See Logging level as an IDB key tunable parameter” on page 199.

Concepts guide

125