HP Data Protector A.06.10 Concepts guide
Page
Contents
Planning your backup strategy
Types of incremental backups
Media management and devices 133
Users and user groups 183
Service management 205
Data Protector internal database 187
How Data Protector operates 219
Integration with database applications 237
Synthetic backup 257
Direct backup 243
Disk backup 253
This chapter 265 Overview Supported configurations 269
Snapshot concepts 275
Microsoft Volume Shadow Copy service 289
Backup scenarios 297
Further information 331
Glossary 345 Index 403
Figures
149
Backup session information flow multiple sessions
Page
Page
Tables
Page
Page
Part number Guide edition Product
Publication history
Edition history
Publication history
Documentation set
About this guide
Intended audience
Guides
HP Data Protector disaster recovery guide
HP Data Protector installation and licensing guide
HP Data Protector troubleshooting guide
HP Data Protector integration guides
HP Data Protector zero downtime backup integration guide
HP Data Protector zero downtime backup concepts guide
HP Data Protector zero downtime backup administrators guide
HP Data Protector integration guide for HP Reporter
HP Data Protector Media Operations users guide
HP Data Protector command line interface reference
Online Help
This guide fulfills a similar function for Media Operations
Guide
Documentation map
Abbreviations
Map
Abbreviation Guide
Integrations
Integration Guide
Convention Element
Document conventions and symbols
Document conventions
Provides helpful hints and shortcuts
Data Protector graphical user interface
Provides additional information
General information HP technical support
Data Protector graphical user interface
Documentation feedback
Subscription service
HP websites
For additional information, see the following HP websites
About Data Protector
About backup and Data Protector
This chapter
High Availability Support
Page
This section explains basic backup and restore concepts
Introducing backups and restores
What is a backup?
What is a restore?
Backing up a network environment
Direct backup
Data Protector architecture
Data Protector cell physical view and logical view
Cell Manager
Operations in the cell
Systems with backup devices
Installation Server
Systems to be backed up
How does it work?
Backup sessions
What is a backup session?
Restore sessions
What is a restore session?
Enterprise environments
What is an enterprise environment?
When to use an enterprise environment
Splitting an environment into multiple cells
Why split large environments into multiple cells?
MoM
Manager-of-Managers environment
Media management functionality
What is a media pool?
Media management
Backup devices
User interfaces
Data Protector GUI
Page
Data Protector Java GUI
Original Data Protector GUI
Data Protector Java GUI architecture
Benefits of Java GUI
Differences from the Original Data Protector GUI
Overview of tasks to set up Data Protector
Install and configure your Data Protector environment
Clustering on
Planning your backup strategy
Disaster recovery on
Restoring data on
What is backup strategy planning?
Backup strategy planning
Defining the requirements of a backup strategy
Page
Factors influencing your backup strategy
Preparing a backup strategy plan
Page
Planning cells
One cell or multiple cells?
Page
Creating cells in the Unix environment
Installing and maintaining client systems
Installation Servers and the Cell Manager
Mapping a Data Protector cell into a Windows domain
Creating cells in the Windows environment
Windows domains
Windows workgroups
Creating cells in a mixed environment
Geographically remote cells
Considerations for geographically remote cells
Infrastructure
Network versus local backups
Understanding and planning performance
MoM environment
Device performance
Network or server versus direct backups
Devices
When to use parallelism
Advanced high performance configuration
Using hardware in parallel
High performance hardware other than devices
Hardware compression
Configuring backups and restores
Software compression
Object distribution to media
Full and incremental backups
Disk image versus filesystem backups
Disk fragmentation
Disk image backups
Disk performance
Compression
SAN performance
What is security?
Planning security
Online database application performance
Cells
Data Protector users accounts
Data Protector user groups
Data Protector user rights
How Data Protector AES 256-bit encryption works
Visibility of backed up data
Data encryption
Hiding data from other users
Backup session with AES 256-bit encryption
How Data Protector drive-based encryption works
Who owns a backup session?
What is backup ownership?
Restore from encrypted backups
Clustering
Backup ownership and restore
What is a cluster?
Cluster concepts
Cluster network
Cluster nodes
Shared disks
What is a failover?
What is a package or group?
What is a virtual server?
High availability of the Data Protector Cell Manager
Automatic restart of backups
Cluster support
Load balancing at failover
Example cluster environments
Cell Manager installed outside a cluster
This section gives three example cluster configurations
Cell Manager installed outside a cluster
Virtual server backup
Result
Backup behavior
Condition
Virtual server backup
Condition Result
FC/SCSI MUX
Virtual server backup
Failover before a backup starts
Incremental backup
Full and incremental backups
Comparison of full and incremental backup
Synthetic backup
Full backups
Incremental backups
Full backup Incremental backup
Types of incremental backups
Conventional incremental backup
Enhanced incremental backup
Incr1-9 backup never references an existing Incr backup
Level that is still protected. For example, an Incr1 backup
Backup saves all changes since the last Incr4 backup. An
Incremental backups
Relative referencing of backup runs
Examples
Considering restore
How to read on
TIP
Media needed to restore from leveled incremental backups
Data protection
What is data protection?
Keeping backed up data and information about the data
Data Protector Internal Database
What is logging level?
Browsing files for restore
What is catalog protection?
Catalog protection
Overwriting backed up files with new data
Enabling the browsing of files and quick restore
Enabling the restore of files, but not browsing
Backing up data
Exporting media from a cell
What is a backup specification?
Creating a backup specification
Selecting backup objects
How to create a backup specification
Examples of backup options
What is a media set?
Backup types and scheduled backups
What is an object mirror?
Object mirrors
Backup session
Scheduling, backup configurations, and sessions
Backup configuration
Optimizing backup performance
Optimizing for restore
When to schedule backups
Staggering full backups
Staggered approach
Full backup with daily simple incremental backups
Example
Full backup with daily level 1 incremental backups
Considerations for unattended backups
Automated or unattended operation
Page
Object copy Object mirror Media copy Smart Media Copy
Duplicating backed up data
Data Protector data duplication methods
What is object copy?
Copying objects
Scheduled object copying
Post-backup object copying
Start of object copy session
Object copy session performance
Selection of devices
Selection of the media set to copy from
Freeing media
Why use object copy?
Vaulting
Freeing media
Demultiplexing of media
Disk staging
Consolidating a restore chain
Migration to another media type
What is object mirroring?
Object mirroring
Benefits of object mirroring
Object mirror operation
Backup performance
Object mirroring
What is the result?
What is media copying?
How to copy media
Copying media
Automated media copying
What is automated media copying?
Post-backup media copying
Scheduled media copying
What happens after the backup?
Smart media copying using VLS
What is smart media copying?
Automated smart media copying
Restoring data
Restore duration
Factors affecting restore duration
Selection of devices
Selection of restore chain
Selection of the media set
Media set selection algorithm
What needs to be done
Operators are allowed to restore
When to use this policy
Disaster recovery
End users are allowed to restore
Page
Disaster recovery methods
Recovery using third-party tools for Windows
Alternative disaster recovery methods
Recovery methods supported by operating system vendors
132 Planning your backup strategy
Media pools on
Media management and devices
Media management on Media life cycle on
Devices on
Media life cycle
Typical media life cycle consists of the following steps
Concepts guide 135
Media pools
See Calculating media condition on
Media pools and dcbf directories
How to use media pools
Media pool property examples
Default media pools
Free pools
Free pool benefits
What is a free pool?
When is a free pool used?
Free pool limitations
Free pool properties
Media quality calculation
Media pool usage examples
Simple one device/one media pool relation
Configuration of media pools for large libraries
Multiple devices, single media pool
What is a media rotation policy?
Implementing a media rotation policy
Automatic media rotation and media handling
Media rotation and Data Protector
Media needed for rotation
Estimating the quantity of needed media
Initializing or formatting media
Media management before backups begin
What is initializing formatting media?
Labeling Data Protector media
Location field
How are labels used?
Media management during backup sessions
Selecting media for backups
Media usage policy
Adding data to media during backup sessions
Media condition
Distributing objects over media
Multiple objects and sessions per medium, sequential writes
Media condition factors
Writing data to several media sets during backup
Calculating media condition
Vaulting
Media management after backup sessions
What is vaulting?
Implementing vaulting
Vaulting usage example
Restoring from media in a vault
Using devices with Data Protector
Devices
Concepts guide 153
Library management console support
TapeAlert
Device lists and load balancing
Device streaming and concurrency
What is device streaming?
How to configure device streaming
How load balancing works
Increased performance
Segment size
Disk agent concurrency
Multiple data streams
Block size
Data format
Device names
Number of disk agent buffers
Device locking and lock names
Preventing collision
Standalone devices
Physical device collision
What are standalone devices?
Small magazine devices
Handling of media
Configuring a library
Large libraries
Size of a library
Barcode support
Sharing a library with other applications
Enter / eject mail slots
Advantages of barcodes
Sharing a library with multiple systems
Cleaning tape support
What is library sharing?
Connecting drives to multiple systems
Control protocols and Data Protector Media Agents
Drive control protocol
Drive control
Required Data Protector Media Agent for drive control
Ndmp Scsi
ADIC/GRAU
Exemplary configurations
Required Data Protector Media Agent for robotic control
Scsi Ndmp ACS
168 Media management and devices
Sharing a Scsi library robotics attached to an Ndmp Server
Data Protector and Storage Area Networks
Sharing an ADIC/GRAU or StorageTek ACS library
Storage Area Networks
Fibre Channel
Storage Area Network
Point-to-point topology
Loop topology
Switched topology
Loop initialization protocol
Concepts guide 175
Configuring multiple paths to physical devices
Device sharing in SAN
Why use multiple paths
Path selection
Device locking with multiple applications
Device locking
Backward compatibility
Device locking within Data Protector
Indirect and Direct Library Access
Indirect Library Access
Direct Library Access
Indirect Library Access
Device sharing in clusters
Static drives
Floating drives
Concepts guide 181
182 Media management and devices
Increased security for Data Protector users
Access to backed up data
Users and user groups
Visibility of backed up data
Predefined user groups
Default administrators
Users and user groups
User group Access rights
Using predefined user groups
Following default groups are provided by Data Protector
Data Protector predefined user groups
186 Users and user groups
Data Protector internal database
About the IDB
IDB location
IDB on the Windows Cell Manager
IDB size and growth consideration
IDB format
IDB in the Manager-of-Managers environment
IDB architecture
IDB on the Unix Cell Manager
Mmdb records
Media Management Database Mmdb
Underlying technology
Mmdb location
Catalog Database CDB
Mmdb size and growth
CDB records
CDB location
Detail Catalog Binary Files Dcbf
Size and growth for CDB objects and positions
Dcbf information
Smbf records
Session Messages Binary Files Smbf
Dcbf location
Smbf size and growth
Serverless Integrations Binary Files Sibf
During backup
IDB operation
Exporting media
During restore
During object copying or object consolidation
Removing the detail catalog
IDB configuration
Overview of IDB management
Filenames purge
IDB growth and performance
IDB maintenance
IDB recovery
Key IDB growth and performance factors
IDB growth and performance key tunable parameters
Logging level as an IDB key tunable parameter
Concepts guide 199
Impact on performance
Logging level and browsing for restore
Logging level and restore speed
Recommended usage of logging level and catalog protection
Catalog protection and restore
Catalog protection as an IDB key tunable parameter
Expired catalog protection
Specifics for small cells
Use different logging levels in the same cell
Different logging levels for object copies
On the Windows Cell Manager
IDB size estimation
Specifics for large cells
204
It is organized as follows Overview on
Service management
Overview
Data Protector and service management
Concepts guide 207
Native Data Protector functionality
Key functions
What Is ARM?
Application Response Measurement version 2.0 ARM 2.0 API
ARM functionality
Monitor
Integration with HP Operations Manager software
Snmp traps
Functionality of the Data Protector OM integration
Reporting and notification
Event logging and notification
Reporting and notification examples
Data Protector log files
Windows application log
Java-based online reporting
Central management, distributed environment
Data Protector checking and maintenance mechanism
Using the data provided by Data Protector
What can I do with the data?
Data Protector OM-R integration
Service management integrations
Backup Session Reports Concepts guide 215
Data Protector Reporter example
Operational error status report
Data Protector OM SIP
Direct SIP integration example
Systems, the system inet daemon Inetd starts the Data
Data Protector processes or services
How Data Protector operates
Protector Inet process
MMD
Backup sessions
CRS
RDS
Scheduled backup session
Scheduled and interactive backup sessions
Backup session data flow and processes
Interactive backup session
Backup session information flow
How many sessions can run concurrently?
Pre-exec and post-exec commands
On page 223 shows multiple sessions running concurrently
Queuing of backup sessions
Mount requests in backup sessions
Restore sessions
Backing up with disk discovery
Restore session data flow and processes
What happens in a restore session?
Queuing of restore sessions
How many restore sessions can run concurrently?
What is a parallel restore?
Mount requests in a restore session
Parallel restores
How does it compare to a standard restore?
Fast multiple single file restore
Object copy sessions
Automated and interactive object copy sessions
Object copy session data flow and processes
How many sessions can run concurrently?
Queuing of object copy sessions
Mount requests in an object copy session
Object consolidation session data flow and processes
Object consolidation sessions
Automated and interactive object consolidation sessions
Queuing of object consolidation sessions
Media management session data flow
Media management sessions
Mount requests in an object consolidation session
How many sessions can run?
Integration with database applications
Overview of database operation
Relational database
Filesystem backup of databases and applications
Online backup of databases and applications
Data Protector integration with databases
Concepts guide 241
242
Direct backup
Requirements and support on Supported configurations on
Configurations on
Backup types
How direct backup works
Direct backup benefits
Direct backup architecture
Environment
About resolve
About XCopy
XCopy + Resolve
Direct backup process flow
Backup stages for data files
Requirements and support
Restore
There are two restore options when using direct backup
Supported configurations
Three hosts CM, application, Resolve
Concepts guide 251
Basic configuration single host
Two Hosts Cell Manager/Resolve Agent and application
252
Disk backup
Disk backup benefits on Data Protector disk-based devices on
Disk backup benefits
File jukebox device
Data Protector disk-based devices
Standalone file device
File library device
Data format
Recommended disk-backup device
Configuration
Backing up to a disk device
Synthetic backup
Concepts guide 257
Synthetic backup brings the following benefits
Synthetic backup benefits
How Data Protector synthetic backup works
Synthetic backup
Restore and synthetic backup
Synthetic backup and media space consumption
Full and incremental backups
Regular synthetic backup
Page
264
Split mirror concepts
Split mirror backup concept
Instant recovery
ZDB to disk
Backup clients and clusters
ZDB to tape and ZDB to disk+tape
Replica set rotation
Local mirror dual host
Concepts guide 269
Local mirror single host
Remote mirror
Split mirror remote mirror LAN-free remote backup data HA
Concepts guide 271
Local/remote mirror combination
Other configurations
274 Split mirror concepts
Snapshot concepts
Storage virtualization
Snapshot concepts
RAID
Snapshot backup
Snapshot backup types
Types of snapshots
Instant recovery
Replica set and replica set rotation
Snapshots with the preallocation of disk space
Snapshots without the preallocation of disk space
Snapclones
Basic configuration single disk array dual host
Other supported configurations
Multiple disk arrays dual host
Multiple application hosts single backup host
Disk arrays single host
LVM mirroring HP StorageWorks Virtual Array only
286
Page
288
Microsoft Volume Shadow Copy service
What is a shadow copy provider?
What is a shadow copy?
What is a writer?
Data Protector and VSS
Actors of the traditional backup model
VSS benefits
Data Protector Volume Shadow Copy integration
Benefits of using VSS
VSS backup
VSS restore
VSS filesystem backup and restore
Backup and restore
Considerations
Backup scenarios
This appendix
298
Hardware and software environment of XYZ
Company XYZ
Environment
Current XYZ backup topology
Problems with the current solution
Backup strategy requirements
Requirements
Proposed environment
Proposed solution
Solution overview
Department Current Data Projected Data Devices 5 Years
Proposed solution in detail
Proposed XYZ backup topology
Estimating the size of the IDB
Input parameters
Page
Staggering approach
Time
Remote full backups to the HP DLT 4115 library
Department Current Data/Backup Time
ENG1BS
Admbs
ENG2BS
Othbs
Dbbs
Restore options
312 Backup scenarios
#UX
Size of backup environment
Company ABC
Current ABC Cape Town backup topology
Type of data Maximum downtime
Problems with current solution
Maximum acceptable downtime for recovery
Concepts guide 315
Amount of data to be backed up
How long data should be kept
Type of data Max data storage time
Location
Amount of data to be backed up in five years
ABC enterprise environment
ABC cell configuration
Why configure into seven cells?
Why use the CMMDB?
#UNIX
Why choose the Windows system?
ABC Cape Town enterprise backup environment
322
Why use the HP StorageWorks DLT 4228w Library?
How long does a full backup last?
Why use the HP StorageWorks DLT 4115w Library?
Why use the HP StorageWorks DAT24 Autoloader?
Concepts guide 325
ABC’s Media Pool Usage
Media pool name Location Description
Why use differential incr1 backups?
Staggering Approach for ABC Cape Town
SERVERSA...G
ABC’s backup specification configuration
Name Cell Description Backup day Time
USERSD...G
Backup options
Page
330
Further information
Backup generations
What is a backup generation?
Backup generations
Examples of automated media copying
Configuring backups
Example 1 automated media copying of filesystem backups
Incr1 backup
Configuring automated media copying
Full backup
Concepts guide 335
336
Full backup and automated media copying
Example 2 automated media copying of Oracle database backups
Full database backup and automated media copying
Internationalization
Localization
File name handling
Background
Browsing file names
File name handling during backup
File name handling during restore
Unix incompatibility example
Page
344
AML
Glossary
Acsls
See library
See also online redo log
Lotus Domino Server specific term Lotus Domino Server
Backint
See restore chain
See also Virtual Library System VLS and virtual tape
See also backup specification, incremental backup, and full
Backup
Backups/templates. Default view
Backup types
Backup view
By Group according to the group to which backup
Manual and disaster and recovery
Or development. When used for backup purposes, the original
Or BCV devices, are dedicated SLDs that are pre-configured
SAP R/3 specific term An SAP R/3 backup tool that allows
Non-database files saved with Brbackup
Restore files of the following type
Saved with Brbackup
You can specify files, tablespaces, complete backups, log
See also Mmdb
CAP
CDB
See also MoM
See also backup to IAP
Microsoft Exchange Server and Lotus Domino Server specific
Replication
See also Exchange Replication Service and local continuous
Microsoft Exchange Server specific term Cluster continuous
Informix Server specific term a Windows CMD script that is
VLS
HP StorageWorks EVA specific term The user interface that
CV EVA
Oracle and SAP R/3 specific term An Oracle data file that
HP StorageWorks EVA specific term a logical grouping
CSM
Oracle and SAP R/3 specific term a physical file created by
Informix Server specific term An Informix Server physical
See also backup types
See also copy set
Dcbf
See also XCopy engine
See also incremental backup
Microsoft SQL Server specific term a database backup that
Veritas Volume Manager specific term The basic unit of data
DR OS
See also virtual full backup
DMZ
EMC Symmetrix Specific term
See client backup with disk discovery
See Symmetrix Agent Syma
See also importing media
Microsoft Exchange Server specific term The Microsoft
See also library
See also CA+BC EVA
Bi-directional transmission of large data files and can be
Backup media
Volume and each of these copies can have additional two
Allows any server to perform replication activity
Full backup
Flash recovery
Run out of media. The media pools must be configured to use
Backup Full ZDB
GUI
HSM
EVA provider
Ldev
Replica
SMI-S EVA
EMC Symmetrix specific term EMCs Symmetrix Integrated
Microsoft Exchange Server specific term a backup
Icda
IDB
Pair. However, the standard devices are updated with
Incremental restore
BCV control operations, an incremental restore reassigns a
Devices are updated with only the data that was written to
ZDB to disk+tape
See also replica, zero downtime backup ZDB, ZDB to disk
See formatting
KMS
See also Information Store and Site Replication Service
Isql
LBO
LISTENER.ORA
Microsoft Exchange Server specific term Local continuous
Service
LVM
Oracle and SAP R/3 specific term The format of the login
Microsoft SQL Server specific term The name a user uses to
See Wake Onlan
CA HP StorageWorks Disk Array XP specific term, and HP
Microsoft Exchange Server specific term a part
MCU
See MoM
Media allocation
During a restore session, a Media Agent locates data on
Robotics control of a library
Or off-site storage
StorageWorks Disk Array XP specific Term
See also overwrite
Symmetrix and HP StorageWorks Disk Array XP specific Term
MSM
Mmdb
See also CMMDB, CDB
HP StorageWorks Disk Array XP specific term Mirror Unit
See backup object
See archived redo log
See also zero downtime backup ZDB and online backup
Onconfig
Informix Server specific term An environment variable that
Oraclesid
See also zero downtime backup ZDB, and offline backup
See also archived redo log
See also merging
See also pre-exec
Microsoft Exchange Server specific term The part
See also post-exec
HP StorageWorks Disk Array XP specific term Standard HP
HP StorageWorks Disk Array XP specific term The RAID
RDF1/RDF2
RCU
Rdbms
EMC Symmetrix specific term a type of Srdf device group
Rman
HP StorageWorks Disk Array XP specific term The Remote
RSM
HP StorageWorks Disk Array XP VSS provider specific term
Rman Oracle
Session
See backup session,media management session, and restore
HP StorageWorks Disk Array XP specific term secondary
Sibf
Microsoft VSS specific term a volume that represents a
Microsoft VSS specific term a collection of shadow copies
HP StorageWorks VA and HP StorageWorks EVA Specific term
SMB
Smbf
See also snapshot
HP StorageWorks Disk Array XP Specific term
EMC Symmetrix specific term The EMC Symmetrix Remote
See also ZDB to tape, ZDB to disk+tape, and replica
Srdf
Syma
See failover
EMC Symmetrix specific term The Data Protector software
Putting stress on the production servers or the network. a
Any number of incremental backups
Checkpoints and the quorum resource recovery log, which
Synthetic full
ZDB specific term
Disaster recovery specific term a system after a computer
See ZDB to disk
See also source R1 device
TNSNAMES.ORA
Oracle and SAP R/3 specific term a network configuration
See also Microsoft Volume Shadow Copy Service VSS
Data Protector specific term Keep track of IDB changes.
See lights-out operation
Microsoft SQL Server specific term This is a SQL Server
See also Command View CV EVA
See also source volume and target volume
VSS
Adic and STK specific term a VOLume SERial number is a
See Microsoft Volume Shadow Copy Service
Replica, secondary volume S-VOL, and replica set rotation
Configuration
Informix Server specific term ON-Bar and Data Protector
ZDB
Recovery, ZDB to disk+tape, and replica
Arrays, split mirror restore can also be used
See also zero downtime backup ZDB, ZDB to disk, instant
Recovery
402Glossary
Index
404
Page
Concepts Snapshot backup, 276 split mirror backup
Hardware, 68, 70 software
CRS
408
Supported configurations
Selecting for restore
Direct Backup
324
410
Failover, 81, 82 FC-AL
412
Size
See IDB Internationalization, 340 IT management
See also libraries
414
Media condition, 150 calculating, 150 fair
Media pools, 135, 309, 325 default, 136 properties
Loose, 147 strict
Good
416
RDS
Data, 194 location
Restores, 125
SAN
Backup, 43
Sharing libraries, 47, 162, 163, 164 Sibf data
Snmp
RAID
HP, 33 technical support
422