Data Protector user rights ........................................................................... | |
5 The Data Protector internal database ............................... | |
In this chapter ................................................................................................. | |
About the IDB ................................................................................................. | |
The IDB on the Windows Cell Manager ....................................................... | |
The IDB on the UNIX Cell Manager ............................................................. | |
The IDB in the | |
IDB architecture ............................................................................................... | |
Media Management Database (MMDB) ...................................................... | |
Catalog Database (CDB) ........................................................................... | |
Detail Catalog Binary Files (DCBF) .............................................................. | |
Session Messages Binary Files (SMBF) ......................................................... | |
Serverless Integrations Binary Files (SIBF) ...................................................... | |
IDB operation ................................................................................................. | |
During backup .......................................................................................... | |
During restore ........................................................................................... | |
During object copying or object consolidation .............................................. | |
Exporting media ....................................................................................... | |
Removing the detail catalog ...................................................................... | |
Filenames purge ....................................................................................... | |
File versions purge .................................................................................... | |
Overview of IDB management ........................................................................... | |
IDB growth and performance ............................................................................ | |
Key IDB growth and performance factors ..................................................... | |
IDB growth and performance: key tunable parameters ................................... | |
Logging level as an IDB key tunable parameter ...................................... | |
Catalog protection as an IDB key tunable parameter ............................... | |
Recommended usage of logging level and catalog protection .................. | |
IDB size estimation ................................................................................... | |
6 Service management ..................................................... | |
In this chapter ................................................................................................. | |
Overview ....................................................................................................... | |
Data Protector and service management ...................................................... | |
Native Data Protector functionality ..................................................................... | |
Application Response Measurement version 2.0 (ARM 2.0 API) ....................... | |
Integration with HP Operations Manager software ........................................ | |
SNMP traps ............................................................................................. | |
The monitor .............................................................................................. | |
Reporting and notification .......................................................................... | |
Event logging and notification .................................................................... |
8