-
PAGE 1
HP Data Protector Operations Guide Well-nigh this certificate ..........................................................................................................................3 Data Protector architectural overview ...................................................................................................three Information Protector Prison cell .........................................................................................................................three Cell Manager services ............................
-
Folio 2
DCBF ......................................................................................................................................37 Tablespaces.............................................................................................................................39 IDB notifications and reporting ...................................................................................................41 Recovering the IDB ..............................................................................
-
PAGE 3
Well-nigh this document This document is intended for fill-in, system or storage operators and administrators, who are new to Data Protector and are performing mutual backup tasks. It covers often performed maintenance tasks, and provides some configuration recommendations and best practices on how to set up an effective and efficient backup environment. This is not intended to replace any existing documentation. For other Data Protector documentation, please refer to www.hp.com/support/manuals.
-
PAGE 4
The Information Protector client/server compages provides multiple manager layers, which offering tremendous flexibility and arrange easily to organizational needs and changes. Cell Manager and clients The Prison cell Manager is the heart of the Data Protector fill-in environment. The clients are controlled from the Cell Director system. Enterprise Panel The Information Protector integration with HP Operations Managing director provides the concept of the Enterprise Console.
-
Page v
Notes: • Encounter the HP Information Protector concepts guide (B6960-90151) for farther information on cell architecture. • See the Jail cell Manager Planning and Sizing Guide (4AA2-5036ENW) and Capacity Planning Spreadsheet for further details on jail cell sizing.
-
Folio half dozen
Verify the services status by running the following control line selection: The Session Manager The Cell Manager listens for session requests and starts the appropriate Session Managing director, which in turn starts the required clients. A dedicated Session Manager controls the clients for each operation. If a new session is started, an additional Session Manager is generated.
-
PAGE 7
These iii default accounts can be removed if required, as long every bit another business relationship has been defined with access to all Data Protector clients and user rights.
-
PAGE 8
The User has the post-obit default user rights: New user groups tin can exist created with custom user rights. Using a service account The CRS service on windows has an owner assigned with certain permissions and a password, which needs to be updated if the user countersign changes. Use a dedicated service business relationship if y'all practice not want to change the passwords. Wild-card user Caution: For security reasons, it is not recommended to add a wild-card user. It is only recommended for use in exam environments.
-
Page nine
To add the any user, click on Add User, then make full in Any nether Name, Domain and/or Client: About user management Data Protector users are based on the operating organization user. Data Protector fill-in session ownership is based on a session level. This means that if there are multiple clients in a session or backup spec, it is not possible to split the ownership. Backup specifications need to exist organized so at that place are never two clients with different owners in the aforementioned backup spec.
-
Folio 10
Annotation: It is probably easier to directly modify the C:\ProgramData\OmniBack\Config\Server\users\userlist file to add batches of users than to do it through the GUI.
-
PAGE 11
RMAN, in conjunction with the Data Protector oracle integration, can perform backups and restores. In order for RMAN initiated backups and restores to be successful, you demand to add certain other users to Information Protector: • • • For Information Protector vi.1 on UNIX systems, add the users root and the oradba business relationship. For Oracle, you need to add the RAC root and oracle dba business relationship. For Data Protector vi.eleven on UNIX systems, yous only need to add the oradba account.
-
Folio 12
Data Protector media management automatically selects the most advisable media for backup. Basic media selection criteria: • If available, media in adept status are used starting time. • Media in fair condition are used only if no media in good condition are bachelor. • Media in poor condition are not selected for backup. • Media are e'er selected from the specified pool. If the pool does not contain unprotected media, Data Protector accesses a free pool (if configured).
-
PAGE 13
Resolving mountain requests Data Protector issues a mount request if either it requires a specific medium to read data from, or it needs more media just none are available in the device. To resolve the mount request, add together boosted media or cancel the device: • To confirm the mount asking, insert the required medium into the device and click Ostend Mount Request. Alternatively, use omnimnt on the Data Protector CLI to confirm the mount asking.
-
PAGE 14
The post-obit screenshot shows the media that is added to the pre-allocation listing: Using a free puddle A free puddle is a media pool that you tin can configure to allow free media to be shared across media pools, which may reduce operator intervention due to mount requests. The use of a free pool is optional. A complimentary pool: • cannot be deleted if it is linked with a media pool or if it is not empty. • is dissimilar from a regular pool as it cannot be used for allocation because information technology cannot hold protected media.
-
Page 15
• • You may feel some temporary inconsistencies (i day) in pools when using free pools (for example when there is an unprotected medium in a regular pool waiting for deallocation to the complimentary pool). If a costless pool contains media with different data format types, Information Protector automatically reformats allocated media if necessary. For case, NDMP media may exist reformatted to normal media. To create a free pool, right-click on Media, Pools and select Gratuitous Puddle.
-
Folio xvi
| P a g east
-
PAGE 17
Annotation: Invalid media will exist removed by Data Protector: Backup management This affiliate covers hints and tips about common backup management tasks, for example creating and viewing a fill-in specification, and soon. It explains a few HP Data Protector internals, such as using drive concurrency and multiplexing. It describes how to configure and run reports, how to monitor backup sessions, and how to resolve failed sesisons.
-
Page eighteen
Click on the View carte to select what criteria to apply for viewing the backup specifications: Right-click to add a group, and specify the proper noun of the new group: Click Change-Grouping… to motility backup specifications into their dedicated groups: Calculation a new backup specification An existing backup specification can exist quickly copied and edited through the Information Protector GUI.
-
PAGE xix
To copy a backup specification, right-click and chose Copy Every bit…: Using bulldoze concurrency The number of Disk Agents started for each Media Agent is called Disk Agent (backup) concurrency and tin be modified using the Advanced options for the device or when configuring a backup. Notation: The concurrency set in the backup specification takes precedence over the concurrency ready in the device definition. Information Protector provides a default number of Disk Agents that are sufficient for nearly cases.
-
PAGE 20
Order of Disk Agents started Data Protector has 2 backup modes: SAN Fill-in mode, and LAN Backup mode. 1. If y'all exercise a SAN fill-in, Data Protector e'er tries to run local backups. Information technology volition make full all slots of a running local Media Agents with bachelor Disk Agent slots.
-
PAGE 21
Defining backup specification-based drive concurrency The fill-in object summary shows the number of Disk Agents configured for a filesystem backup specification. To add together a new Disk Agent, go through the Manual add… option, and follow the sorcerer to specify the filesystem fill-in details: Chose which type of object is used for the backup specification. Then select the client and mount point, optional filters and reporting parameters, advanced properties and other filesystem options.
-
Folio 22
Notation: Yous can likewise specify a new raw disk partition via this selection in the GUI. Click on Transmission Add, and chose a Deejay Image Object. Virtually multiplexing Multiplexed media contain interleaved data of multiple objects. Such media may arise from backup sessions with a device concurrency of more than 1. Multiplexed media may compromise the privacy of backups and require more fourth dimension for restore. Using the Data Protector object copy functionality, you lot can demultiplex media.
-
PAGE 23
During the copy operation definition, a number of parameters can be customized for backupand catalog protection, recycling source copies, and ejecting media after a successful re-create: Schedule the copy session, or launch an interactive copy. The post-backup copy session volition run after the backup session has been completed. For an interactive copy, chose the session that needs to exist copied: Select the source session version from the interactive re-create wizard.
-
Folio 24
Afterward the session has run successfully, the session messages in the IDB volition testify a (copy) fill-in type: The backup type will show every bit (copy) type for an object re-create session. Object copy The Data Protector object copy functionality enables you to copy selected object versions to a specific media set. Y'all can select object versions from one or several backup sessions or object consolidation sessions.
-
Page 25
Object copy sessions tin exist run interactively, or scheduled, based on media, sessions, or objects. Select what type of copy operations you want to perform. Note: See the HP Information Protector concepts guide (B6960-90151) for further information on object copy. Copy session start time The copy session start fourth dimension will always be the time of the original backup session.
-
Folio 26
It is not possible to calculate the exact duration of an object re-create on a per object level. Emailing backup session reports A schedule can be added at the report grouping level. If only i report needs to exist scheduled to be sent, create a unlike group with a single report for each schedule. Setting up webbased reporting Information Protector'due south web-based reporting allows you lot to view reports on backup, object copy, and object consolidation condition and Data Protector configuration, using the web-interface.
-
PAGE 27
• • UNIX: /opt/omni/java/bin Windows: C:\Program Files\Omniback\java\bin In a browser on any system with admission to the spider web server, open the post-obit file from the copied java folder on the web server to brandish the Data Protector reporting: • UNIX: /bin/webreporting.html • Windows: C:\Program Files\Omniback\bin\WebReporting.html Make this file available to the users of the spider web reporting in the total URL form. For example, put a link to this file from your Intranet site.
-
PAGE 28
To add together media to the location, right-click on the media backdrop, and select Change Location. Concord downwardly the Shift key to change the location for several media at in one case. The location volition show the number of media added. Each medium will also evidence the location details. Performance monitoring using a nul device Backup functioning numbers are displayed at the stop of each backup session as a summary. Data Protector does not offer interactive operation monitoring for ongoing sessions through the GUI.
-
Folio 29
3. Create a backup specification. In the Options wizard page, set data protection to None and catalog protection to Aforementioned as data protection. Select the option Display Statistical Info to see the performance summary at the end of the backup session. 4. Perform backups to this nul device and check if the performance discrepancy between backups to the file device and backups to the real device can be explained.
-
PAGE 30
Restarting failed sessions You lot tin restart a failed session or a completed session with failures after y'all have resolved related problems. This restarts but the failed objects. The option can be used for clustered failed objects also. Yous cannot restart failed sessions that are the result of an unsaved fill-in specification. To restart sessions: 1. In the Context Listing, click Internal Database. 2. In the Scoping Pane, expand the Internal Database detail and click Sessions. 3.
-
Page 31
The following screenshot shows how to resume a failed session. Right-click on the session name, and chose Resume Session: Editing the backup schedules You cannot edit a backup schedule created in Data Protector from the GUI. You need to delete and recreate it. You can edit it via the schedule template file by following the required format. Bulk edits are also quicker done from the templates than the GUI.
-
PAGE 32
Annotation: Apply omnitrig –stop to stop the scheduler: Restore management This chapter covers file version and file search based restore operations, and performing a restore later on a library configuration has been deleted. File version restore File version restore is bachelor via the backup session history, or via the backup objects. The backup objects will show the fill-in sessions for the file: full, incremental, enhanced incremental, or constructed or virtual full session details.
-
Page 33
Restore query To search for a file and version backed up, get to the Task list under the Restore options, and apply the sorcerer to find the file.
-
Folio 34
• For File organization backups but, you can accomplish the same past specifying the –device pick to omnir on the command line. For integrations backup, you can utilize other alternatives. Keeping a restoredev file under the directory: o UNIX: /etc/opt/omni/server/cell o Windows: \Config\Server\prison cell This is a plain text file containing the sometime and new device names separated by a space. It is referred to whenever the device is called, and the old name is replaced past the new proper noun.
-
PAGE 35
Every day at 12:30 P.M. by default, Information Protector starts checks for the following: • IDB Infinite Low • IDB Tablespace Space Depression • Not Plenty Free Media • Health Cheque Failed • User Check Failed (if configured) • Unexpected Events • License Alert • License Will Expire • IDB Purge Needed By default, any triggered notification is sent to the Data Protector Effect Log.
-
PAGE 36
Uncomment the choice in the global file, and select 0 or 1 to enable the selection: Instead of the automatic scheduled purge preview, it is recommended to script or manually run a purge preview session in one case a month, using the following command: C:\Plan Files\OmniBack\bin>omnirpt –report db_purge_preview Analyze the output of the db_purge_preview study by looking at the column Est. Obs.
-
Folio 37
Instance: Note: C:\Plan Files\OmniBack\bin>omnidbutil –purge_stop This is useful control to stop a purge in instance y'all demand to run urgent Information Protector operations.
-
Page 38
Run the following command to determine the layout of the dcbf directories and files: • UNIX: /opt/omni/sbin/omnidbutil –list_dcdirs • Windows: C:\Program Files\OmniBack\bin>omnidbutil -list_dcdirs Analyze the output and change all existing dcbf directories if they do not meet the above recommendations, using the following command: • UNIX: /opt/omni/sbin/omnidbutil (–modify_dcdir • /var/opt/omni/server/db40/dcbf (–maxsize 32768 (–maxfiles 10000 (– spacelow 100 Windows: C:\Programme Files\OmniBack\bin>omnid
-
PAGE 39
Tablespaces It is recommended to check the size of the following tablespaces: fnames.dat, fn1.ext, fn2.ext, fn3.ext, fn4.ext and dirs.
-
Page twoscore
Each tablespace listed must have enough space otherwise you will run into the no Log bulletin and volition not exist able to select individual files for restore. Analyze the output to see if any of the tablespaces need to be extended by comparison the Maximum size and Current size for each tablespace. If they are within 500 MB of each other, extend the tablespace using the post-obit case command: • UNIX: /opt/omni/sbin/omnidbutil –extendtblspace fn2.
-
Page 41
IDB notifications and reporting Setup report notification for IDB maintenance related tasks. Recovering the IDB Several recovery methods are available for recovering the Internal Database. Depending on the identified level of corruption, your requirements, and the availability of the IDB recovery file and the original device and transaction logs, the recovery procedure can differ.
-
Page 42
Restore: Current situation Remark Recovery procedure (restoring IDB) The IDB recovery file is available simply the original device used for the IDB backup has changed. The method is essentially the same equally the guided autorecovery method, merely less guided, more complex, and time consuming. Restore the IDB Using IDB Recovery File and Changed Device The IDB recovery file is not bachelor. The method is essentially the aforementioned as the guided autorecovery method, just less guided, more complex, and time consuming.
-
Folio 43
mv /var/opt/omni/server/db40 /var/opt/omni/server/db40.salvage mv /db40 /var/opt/omni/server/db40 7. The restore process also restored the configuration files into the same location every bit the database files. You may desire to move them into place as well if they need to be recovered. Annotation: this footstep may exist optional, if the files are intact. For Windows Prison cell Managers, use the windows explorer. For Unix use the following commands: mv /etc/opt/omni/server /etc/opt/omni/server/omni.
-
Folio 44
Other frequently used maintenance related global options are the post-obit: • dcbf related options nine DCDirAllocation=0, one, 2 9 MaxDCDirs=NumberOfDirectories 9 SessionMessagesDir=FullPathToTheMessageDir • cdb related options 9 9 DBFreeDiskSpace=MinSpaceInMBytes DBFreeExtFileSpace=MinSpaceInMBytes • full general options 9 RecoveryIndexDir=FullPathToTheBackupDir ix DbXXXXXXXXXLimit=GBytes nine DBPurgeSuspension=0 or ane 9 DBPurgeSuspensionDuringDBCheck=0 or ane 9 DailyMaintenanceTime=HH:MM 9 DailyCheckTime=HH:MM omnirc
-
PAGE 45
scsitab file Information technology is recommended that you let Information Protector configure fill-in devices automatically. Data Protector tin automatically configure most mutual backup devices, including libraries. You still need to prepare the media for a backup session, only Data Protector determines the name, policy, media type, media policy, and the device file or SCSI address of the device, and also configures the drive and slots. You can as well configure a backup device manually.
-
PAGE 46
The cell_info file can be constitute in the following directory: C:\Plan Files\OmniBack\Config\Server\cell Important: cell_info is a file created and edited during installation. Practise not manually edit the file. Variables currently undocumented Treewalk A treewalk is performed when backing up a file system to summate how many files have changed since the final full backup. NOTREEWALK=1 is the right variable for Data Protector half-dozen.0. Information technology works exactly the same in the Data Protector 6.
-
PAGE 47
7. 8. Right-click SNMP Service and select Properties. a. Select the Traps tab. Enter public in the Community name text box and the hostname of the Direction Server in the Trap Destinations text box. b. Select the Security tab. Under Accepted community names, select the community public, click Edit and set Community rights to READ CREATE. c. Confirm your settings. Run omnisnmp. Note: The community name is case sensitive. To cease the setup, there are a few additional configuration steps.
-
PAGE 48
Case before editing the OVdests file: Instance after editing the OVdests file: Calculation a customs proper noun registry primal other than public Executing the omnisnmp command will create the Data Protector registry keys required. Action: An optional additional registry key entry tin can be created to add together a community name other than public. If it is NULL, public is assumed as a value for the registry primal. If traps demand to be sent to the public community name, no entry is necessary.
-
Page 49
In the instance beneath, the local Cell Manager hostname or Cell Manager IP accost is added, as well as the hostname or IP address of the remote trap receiver destination host. The Jail cell Manger proper name/address in the security tab is necessary. If you lot set information technology to 'Accept SNMP traps from any host', so no entries are necessary. For farther information, refer to SNMP Configuration on Windows in chapter 2 of the HP Data Protector A06.x integration guide for HP Operations Manager for Windows.
-
PAGE 50
4. Configure Data Protector to send SNMP traps to the Operations Managing director Server system: a. Using the Data Protector GUI Reporting context, ready all notification events to use: • SNMP equally delivery method • Operations Director Server organisation as the destination. b. Add the Operations Managing director Server hostname equally trap destination to the OVdests file in Data Protector Root/Config/server/SNMP. c. Disable filtering of SNMP traps by emptying the OVfilter file in Data Protector Root/Config/server/SNMP.
-
PAGE 51
To verify what files have been backed up earlier a session aborted or failed, specify the session name with the session ID and the –report selection: To view the session catalog information, specify the session ID and the –itemize option: To find which backed-upwardly objects are available: C:\Programme Files\OmniBack\bin>omnidb –object To detect the backup sessions in the database: C:\Program Files\OmniBack\bin>omnidb –session 51 | P a g e
-
PAGE 52
To perform a query of a specific session: C:\Programme Files\OmniBack\bin>omnidb –session 2009/09/10-18 To look at a detailed session report: C:\Programme Files\OmniBack\bin>omnidb –session 2009/09/10-eighteen –particular To see a list of files backed up during a specific session: C:\Plan Files\OmniBack\bin>omnidb –winfs "haptic.xst.rose.hp.
-
Folio 53
If the object is using a backup description, this needs to be specified on the command line as well.
-
PAGE 54
devbra To verify what devices are visible to the host, use the following command line option: Note: As an alternative is the devbra command, you lot can use the HP StorageWorks Library and Tape Tools (HP L&TT): http://h18006.www1.hp.com/products/storageworks/ltt/index.html Log files and troubleshooting Information required for support calls The session log The Data Protector session log lists error letters. Click on an error to go more details.
-
Folio 55
To look at the failed session messages later on the session window has been closed, go to the Internal Database view, and find the session message window.
-
PAGE 56
Support files The table below describes the Data Protector log files: Log File debug.log inet.log enhincr.log Ob2EventLog.txt media.log omnisv.log security.log purge.log RDS.log Clarification Contains unexpected conditions. While some tin help you, the data is mainly used by the support organization. Contains local security-related events for the customer, such as denied requests. On UNIX, it also contains all requests fabricated to the Information Protector Inet service.
-
PAGE 57
Debugging Data Protector Almost all Data Protector commands can exist started with an additional -debug parameter that has the following syntax: –debug ane–99[,C:][,T:][,U] [] Where: • 1–200 is the debug range. Specify the range 1–200 unless instructed otherwise. Specify optional parameters as a function of the range parameter, separated past commas: o C: limits the size of debug files to due north kilobytes. The minimum value is 4 (4 kB) and the default value is 1024 (1 MB).
-
Page 58
Click on Utilise these settings for the next restart merely, and click Restart now… The Information Protector debug log files will be located under: • • Unix: /tmp Windows: C:\Program Files\Omniback\tmp You can alter the location with omnirc option OB2DBGDIR: # # # # # # # # OB2DBGDIR= Default: none This variable is used to modify the location of debug files on a per system basis. You have to specify a fully qualified path of an existing directory.
-
PAGE 59
Use the control line debug log collector to nix up the debug files from Jail cell Manager and clients. To unpack debug files that have been zipped on a UNIX Cell Managing director, on a Windows system, copy the omnidlc.exe file over to a Windows system, and unpack the *.pck files, running omnidlc –unpack. Note: This is an undocumented and unsupported operation.
-
Folio 60
Example: C:\Program Files\OmniBack\bin>telnet caspase 5555 HP Data Protector A.06.eleven: INET, internal build 243, built on Tuesday, Baronial 25, 2009, 7:08 AM Patch upgrade and versioning Patches tin be pushed from the Prison cell Manager or Installation Server GUI, or installed locally from the CDs or DVD. Right-click on the host name to chose Add Components or Upgrade, and select the components that need to be installed.
-
PAGE 61
Clients will verify the source for each asking and allow just those requests received from clients selected in the Enable Security on selected client(s) window. These clients are listed in the allow_hosts file. If the asking is denied, the event is logged to the inet.
-
Folio 62
Operation audit checklist Backing-up data Control Objective Backup concepts Fill-in operations Process Outcome Before you backup, review central concepts and requirements. Make up one's mind where you will store the fill-in. Make up one's mind which files, folders, or volumes you want to back upward and whether the backups will need to be used for operating arrangement (critical volumes only), full server (all volumes), organization state, or bare metal recovery. Decide how many times a day and at what times you want to run backups.
-
Page 63
rotational procedure by identifying the type and level of backup, which generation is moved offsite, how many generations are retained off-site, and which day the rotation occurs. For each environment, obtain screen captures from the backup software that show: • The choice of files that are backed up. • The schedule that the backup task is prepare to follow. • A recent log file showing a successful backup of the organization. • A recent restore log file (if available) showing a successful restore of the system.
-
Folio 64
Brusque-term maintenance checklist Control Objective Backup maintenance Media maintenance Process Event Check the Information Protector Event log for daily notifications. Restart failed backup sessions. Resume failed sessions. Verify media and pool usage. Resolve poor media issues. Long term maintenance checklist Control Objective Database maintenance Log files Procedure Outcome Run the IDB purge performance. Analyze DCBF directories' capacity usage. Check the size of the tablespaces.
-
Folio 65
misappropriation of the information stored, and is reasonably accessible during non-business organization hours. References world wide web.hp.
-
Page 66
© Copyright 2008 Hewlett-Packard Evolution Visitor, L.P. The information contained herein is subject to modify without observe. The only warranties for HP products and services are set forth in the limited warranty statements accompanying such products and services. Aught herein should be construed every bit constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Linux is a U.S. registered trademark of Linus Torvalds.
0 Response to "How To Install Hp Data Protector Client On Windows"
Post a Comment