SlideShare a Scribd company logo
HPE Data Protector
Software Version: 9.07
Integration Guide
Document Release Date: June 2016
Software Release Date: June 2016
Legal Notices
Warranty
The only warranties for Hewlett Packard Enterprise Development LP products and services are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or
omissions contained herein.
The information contained herein is subject to change without notice.
Restricted Rights Legend
Confidential computer software. Valid license from HPE required for possession, use or copying. Consistent
with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and
Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard
commercial license.
Copyright Notice
© Copyright 2016 Hewlett Packard Enterprise Development LP
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
This product includes an interface of the 'zlib' general purpose compression library, which is Copyright ©
1995-2002 Jean-loup Gailly and Mark Adler.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number, which indicates the software version.
l Document Release Date, which changes each time the document is updated.
l Software Release Date, which indicates the release date of this version of the software.
To check for recent updates or to verify that you are using the most recent edition of a document, go to:
https://softwaresupport.hp.com
This site requires that you register for an HPE Passport and sign in. To register for an HPE Passport ID, go
to: https://hpp12.passport.hp.com/hppcf/createuser.do
Or click the Register link at the top of the HPE Software Support page.
You will also receive updated or new editions if you subscribe to the appropriate product support service.
Contact your HPE sales representative for details.
Support
Visit the HPE Software Support Online web site at: https://softwaresupport.hp.com
This web site provides contact information and details about the products, services, and support that HPE
Software offers.
HPE Software online support provides customer self-solve capabilities. It provides a fast and efficient way to
access interactive technical support tools needed to manage your business. As a valued support customer,
you can benefit by using the support web site to:
Integration Guide
HPE Data Protector (9.07) Page 2 of 803
l Search for knowledge documents of interest
l Submit and track support cases and enhancement requests
l Download software patches
l Manage support contracts
l Look up HPE support contacts
l Review information about available services
l Enter into discussions with other software customers
l Research and register for software training
Most of the support areas require that you register as an HPE Passport user and sign in. Many also require a
support contract. To register for an HPE Passport ID, go to:
https://hpp12.passport.hp.com/hppcf/createuser.do
To find more information about access levels, go to:
https://softwaresupport.hp.com/web/softwaresupport/access-levels
HPE Software Solutions Now accesses the HPESW Solution and Integration Portal Web site. This site
enables you to explore HPE Product Solutions to meet your business needs, includes a full list of
Integrations between HPE Products, as well as a listing of ITIL Processes. The URL for this Web site is
http://h20230.www2.hp.com/sc/solutions/index.jsp
Integration Guide
HPE Data Protector (9.07) Page 3 of 803
Contents
About this guide 26
Part 1: IBM Applications 27
Chapter 1: Data Protector Informix Server integration 28
Introduction 28
Integration concepts 29
Configuring the integration 30
Prerequisites 30
Before you begin 30
Cluster-aware clients 31
Configuring Informix Server users 31
Configuring Informix instances 31
Before you begin 31
Using the Data Protector GUI 31
Using the Data Protector CLI 34
Handling errors 35
Checking the configuration 36
Using the Data Protector GUI 36
Using the Data Protector CLI 36
Backup 37
What you must back up as filesystem 37
What does not need to be backed up? 37
Creating backup specifications 38
Modifying backup specifications 43
Scheduling backup sessions 44
Scheduling example 44
Previewing backup sessions 45
Using the Data Protector GUI 45
Using the Data Protector CLI 45
What happens during the preview? 46
Starting backup sessions 47
Backup methods 47
Before you begin 47
Using the Data Protector GUI 48
Using the Data Protector CLI 48
Using Informix Server commands 48
Using Informix Server log_full.sh on UNIX 50
Manual and continuous logical log backups 50
Restore 50
Restore methods 51
Integration Guide
HPE Data Protector (9.07) Page 4 of 803
Before you begin 51
Finding information for restore 51
Using the Data Protector GUI 51
Using the Data Protector CLI 52
Restoring using the Data Protector GUI 54
Restoring using the Data Protector CLI 57
Restoring using Informix Server commands 58
Restoring dbspaces, blobspaces, and logical logs 58
Restoring dbspaces and blobspaces only 58
Restoring a particular dbspace or blobspace 58
Restoring to another Informix Server 58
Restoring using another device 59
Using the Data Protector GUI 59
Using the Data Protector CLI or Informix Server commands 59
Monitoring sessions 60
Troubleshooting 60
Before you begin 60
Checks and verifications 60
Checking the Informix Server side 63
Problems 64
Chapter 2: Data Protector DB2 UDB integration 66
Introduction 66
Integration concepts 67
Considerations 68
Configuring the integration 68
Prerequisites 69
Before you begin 69
Cluster-aware clients 69
Partitioned environment 69
Configuring DB2 users 69
Configuring DB2 instances 70
Before you begin 70
Using the Data Protector GUI 70
Using the Data Protector CLI 71
Checking the configuration 72
Using the Data Protector GUI 72
Using the Data Protector CLI 72
Backup 72
Physically partitioned environment 73
Creating backup specifications 74
Modifying backup specifications 77
Scheduling backup sessions 77
Previewing backup sessions 78
Using the Data Protector GUI 78
Using the Data Protector CLI 78
What happens during the preview? 79
Integration Guide
HPE Data Protector (9.07) Page 5 of 803
Starting backup sessions 79
Before you begin 79
Using the Data Protector GUI 79
Using the Data Protector CLI 80
Starting backups of physically partitioned DB2 objects 80
Restore 80
Restoring using the Data Protector GUI 81
Restoring using the Data Protector CLI 86
Restoring to a new database or another DB2 instance 87
Restore in a partitioned environment 90
Restoring to the original database 91
Corrupt database 91
Physically partitioned environment 91
Logically partitioned environment 91
Restoring to a new database or another instance 91
Monitoring sessions 92
DB2 Pruning 92
Troubleshooting 93
Before you begin 94
Checks and verifications 94
Problems 94
Chapter 3: Data Protector Lotus Notes/Domino Server integration 100
Introduction 100
Integration concepts 101
Lotus Domino Cluster 102
Replicas 102
Replication in a cluster 103
Failover in a cluster 103
Example 103
Configuring the integration 104
Prerequisites 105
Before you begin 105
Transaction logging of Lotus Notes/Domino Server 105
Enabling transaction logging 106
Configuring Lotus Notes/Domino Server users 107
Configuring Lotus Notes/Domino Server systems 107
Using the Data Protector GUI 107
Using the Data Protector CLI 109
Checking the configuration 110
Using the Data Protector GUI 110
Using the Data Protector CLI 110
Handling errors 111
Backup 111
What is backed up? 112
What is not backed up? 112
Considerations 112
Integration Guide
HPE Data Protector (9.07) Page 6 of 803
Creating backup specifications 113
Modifying backup specifications 115
Scheduling backup sessions 115
Scheduling example 115
Previewing backup sessions 116
Using the Data Protector GUI 116
Using the Data Protector CLI 116
What happens during the preview? 117
Starting backup sessions 117
Using the Data Protector GUI 117
Restore 117
Finding information for restore 118
Using the Data Protector GUI 118
Using the Data Protector CLI 119
Restoring using the Data Protector GUI 119
Restoring using the Data Protector CLI 121
Restore options 122
Restore in Lotus Domino Cluster environment 123
Restoring a replica database without recovery 123
Restoring with recovery to the latest possible state 124
Point-in-time recovery 124
Restoring to a new location 125
Performance tuning 125
Monitoring sessions 125
Troubleshooting 125
Before you begin 126
Checking the Lotus Notes/Domino Server side 126
Checks and verifications 126
Problems 128
Part 2: Microsoft Applications 132
Chapter 4: Data Protector Microsoft SQL Server integration 133
Introduction 133
Integration concepts 134
Parallelism 135
Configuring the integration 136
Prerequisites 136
Before you begin 137
Data Protector SQL Server configuration file 137
Configuring users 138
Configuring an SQL Server cluster 139
Configuring SQL Server instances 139
Using the Data Protector GUI 139
Using the Data Protector CLI 142
Changing and checking configuration 143
Integration Guide
HPE Data Protector (9.07) Page 7 of 803
Using the Data Protector GUI 143
Using the Data Protector CLI 144
Backup 145
Creating backup specifications 145
SQL Server-specific backup options 150
Object-specific options 153
Scheduling backups 155
Scheduling example 155
Starting backup sessions 155
Using the Data Protector GUI 156
Restore 156
Before you begin 156
Restoring using the Data Protector GUI 156
Restore options 161
Restoring to a different SQL Server instance or/and different SQL Server 162
Restoring using the Data Protector CLI 163
Disaster recovery 164
Recovering the master database 165
Recovering user databases 165
Performance tuning 166
Monitoring sessions 169
Troubleshooting 169
Before you begin 169
Checks and verifications 169
Problems 170
Chapter 5: Data Protector Microsoft SharePoint Server 2007/2010/2013 integration 175
Introduction 175
Integration concepts 176
Configuring the integration 179
Prerequisites 179
Before you begin 179
Configuring user accounts 179
Backup 180
Backup concepts 181
Backup types 182
Creating backup specifications 182
Modifying backup specifications 186
Scheduling backup sessions 186
Scheduling example 186
Previewing backup sessions 187
Using the Data Protector GUI 187
Using the Data Protector CLI 187
What happens during the preview? 188
Starting backup sessions 188
Before you begin 188
Using the Data Protector GUI 188
Integration Guide
HPE Data Protector (9.07) Page 8 of 803
Using the Data Protector CLI 188
Preparing for disaster recovery 189
Restore 190
Restore concepts 190
Before you begin 192
Restoring using the Data Protector GUI 192
Restore options 200
Restoring using the Data Protector CLI 205
Disaster recovery 207
Monitoring sessions 207
Troubleshooting 207
Before you begin 207
Checks and verifications 208
Problems 208
Chapter 6: Data Protector Microsoft SharePoint Server Server VSS based solution 211
Introduction 211
Backup 211
Limitations 212
Restore 212
Installation and configuration 212
Licensing 212
Installing the integration 212
Configuring the integration 214
Configuring user accounts 214
Backup 215
Prerequisites 215
Limitations 215
Recommendations 215
How the command works 216
Microsoft Office SharePoint Server 2007 216
Microsoft SharePoint Server 2010 217
Microsoft SharePoint Server 2013 218
Considerations 218
The command syntax 218
Option description 219
Starting Windows PowerShell 222
Creating backup specifications (examples) 223
Modifying backup specifications 224
Source page 224
Destination page 225
Options page 225
Starting backup sessions (examples) 225
Scheduling backup sessions 228
Restore 229
Before you begin 230
Restoring data 231
Integration Guide
HPE Data Protector (9.07) Page 9 of 803
Considerations 231
Prerequisites 232
Restoring using the Data Protector GUI 232
Restoring using the Data Protector CLI 234
Limitations 234
After the restore 234
Restoring index files on the Query system 235
Troubleshooting 235
Before you begin 235
Checks and verifications 236
After restore, you cannot connect to the Central Administration webpage 236
Backup fails with the error Failed to resume Service Windows SharePoint Services
Help Search 236
After restore, a quiesce operation fails 237
After restore, you cannot connect to the FAST Search Server 237
The SharePoint_VSS_backup.ps1 script stops responding and the farm stays in read
only mode 238
SharePoint Search service application not operational after restore 238
Chapter 7: Data Protector Microsoft Exchange Server 2007 integration 241
Introduction 241
Integration concepts 241
Configuring the integration 242
Prerequisites 242
Limitations 243
Before you begin 243
Backup 243
Configuring Exchange Server Backup 244
Creating backup specifications 244
Exchange Server specific backup options 247
Scheduling backups 248
Scheduling example 248
Starting backup sessions 249
Using the Data Protector GUI 249
Restore 249
Restoring using the GUI 250
Restoring to another client 254
Restoring using the CLI 255
Troubleshooting 256
Before you begin 256
Checks and verifications 256
Problems 257
Chapter 8: Data Protector Microsoft Exchange Server 2010+ integration 261
Introduction 261
Integration concepts 262
Supported environments 262
Standalone environments 262
Integration Guide
HPE Data Protector (9.07) Page 10 of 803
DAG environments 262
Configuring the integration 264
Prerequisites 264
Limitations 265
Before you begin 265
Configuring user accounts 265
Windows domain user account for backup and restore sessions 265
User account for executing Exchange Management cmdlet operations 266
Backup 266
Backup types 267
Microsoft Exchange Server backup types 267
Backup parallelism 267
Backup considerations 268
Object operations considerations 268
Creating backup specifications 269
Modifying backup specifications 277
Scheduling backup sessions 277
Scheduling example 277
Previewing backup sessions 278
Using the Data Protector GUI 278
Using the Data Protector CLI 278
What happens during the preview? 279
Starting backup sessions 279
Using the Data Protector GUI 279
Using the Data Protector CLI 279
Backup objects 280
Restore 280
Restore methods 281
Repair all passive copies with failed status 281
Restore to the latest state 281
Restore to a point in time 282
Restore to a new mailbox database 282
Restore files to a temporary location 282
Restore destination 282
Restoring to a standalone database 283
Restoring to an active copy 283
Restoring to a passive copy 283
Restoring data to a new database 283
Restoring data to a temporary location 284
Restore chain 284
Restore parallelism 284
Finding information for restore 285
Using the Data Protector GUI 285
Using the Data Protector CLI 285
Restore procedure 285
Restoring using the Data Protector GUI 286
Integration Guide
HPE Data Protector (9.07) Page 11 of 803
Restoring using the Data Protector CLI 292
Restoring using another device 295
Restore options 295
Monitoring sessions 300
Troubleshooting 300
Before you begin 300
Checks and verifications 301
Problems 301
Chapter 9: Data Protector Microsoft Exchange Single Mailbox integration 305
Introduction 305
Integration concepts 306
Configuring the integration 307
Prerequisites 307
Limitations 307
Before you begin 307
Cluster-aware clients 307
Configuring Exchange Server users 308
Configuring Exchange servers 308
Checking the configuration 309
Backup 309
Creating backup specifications 310
Modifying backup specifications 313
Scheduling backup sessions 314
Scheduling example 314
Previewing backup sessions 315
Using the Data Protector GUI 315
Using the Data Protector CLI 315
What happens during the preview? 315
Starting backup sessions 315
Using the Data Protector GUI 315
Using the Data Protector CLI 316
Restore 316
Before you begin 316
Restoring using the Data Protector GUI 316
Restoring using the Data Protector CLI 322
Restore examples 323
Monitoring sessions 324
Performance tuning 324
Troubleshooting 326
Before you begin 326
Checks and verifications 326
Problems 327
Part 3: Oracle and SAP 331
Chapter 10: Data Protector Oracle Server integration 332
Integration Guide
HPE Data Protector (9.07) Page 12 of 803
Introduction 332
Integration concepts 333
Configuring the integration 337
Prerequisites 337
Limitations 338
Before you begin 338
Cluster-aware systems 339
Linking Oracle Server with the Data Protector MML 339
Linking on HP OpenVMS systems 340
Configuring Oracle user accounts 340
Configuring Oracle operating system user accounts 340
Clusters 341
Configuring Oracle database user accounts 341
Configuring user accounts on HP OpenVMS systems 342
Configuring Oracle databases 343
Using the Data Protector GUI 344
Using the Data Protector CLI 346
Configuring multiple Oracle databases simultaneously 348
XLS files 350
CSV files 350
Checking the configuration 352
Using the Data Protector GUI 352
Using the Data Protector CLI 352
Handling errors 353
Setting environment variables 353
Using the Data Protector GUI 354
Using the Data Protector CLI 355
Backup 355
Creating new templates 356
Creating backup specifications 356
Examples of pre-exec and post-exec scripts on UNIX systems 363
Editing the Oracle RMAN script 364
Creating copies of backed up objects 367
Testing the integration 367
Testing using the Data Protector GUI 367
Testing using the CLI 368
Starting backup sessions 369
Scheduling backup sessions 371
Running an interactive backup 372
Starting a backup using the GUI 372
Starting a backup using the CLI 373
Starting Oracle backup using RMAN 374
Examples of the RMAN scripts 376
Restore 380
Prerequisites 382
Restoring Oracle using the Data Protector GUI 382
Integration Guide
HPE Data Protector (9.07) Page 13 of 803
Restoring database items in a disaster recovery 382
Changing the database state 382
Restoring the recovery catalog database 383
Restoring the control file 384
Restoring Oracle database objects 386
Restoring tablespaces and datafiles 390
Restoring and recovering an Oracle database in Oracle Data Guard environment 390
Restoring and recovering a primary database 390
Restoring and recovering a standby database 390
Duplicating an Oracle database 391
Restore, recovery, and duplicate options 393
Restore action options 393
General options 394
Duplicate options 395
Restore and recovery options 395
Restoring Oracle using RMAN 397
Preparing the Oracle database for restore 397
Connection strings used in the examples 399
SBT_LIBRARY parameter 399
Example of full database restore and recovery 399
Example of point-in-time restore 400
Example of tablespace restore and recovery 401
Example of datafile restore and recovery 403
Example of archive log restore 405
Example of database restore using a different device (with the automatic device
selection functionality disabled) 406
Restoring using another device 406
Disaster recovery 407
Monitoring sessions 408
Monitoring current sessions 408
Viewing previous sessions 409
Resuming sessions 409
Using the Data Protector GUI 411
Using the Data Protector CLI 412
Aborting sessions 413
Oracle RMAN metadata and Data Protector Media Management Database
synchronization 413
Troubleshooting 414
Before you begin 414
Checks and verifications 414
Problems 419
Chapter 11: Data Protector MySQL integration 424
Introduction 424
Integration concepts 425
Configuring the integration 426
Prerequisites 427
Integration Guide
HPE Data Protector (9.07) Page 14 of 803
Configuration steps 427
Checking the configuration 429
Backup 429
Limitations 429
Considerations 430
Creating backup specifications 430
Application-specific backup options 433
Modifying backup specifications 434
Scheduling backup sessions 435
Starting backup sessions 435
Restore 435
Limitations 435
Considerations 435
Finding information needed for restore 436
Using the Data Protector GUI 436
Using the Data Protector CLI 436
Restoring using the Data Protector GUI 436
Restoring using the Data Protector CLI 439
MySQL data migration 440
MySQL restore options 440
Monitoring and reviewing sessions 443
Troubleshooting 443
Before you begin 444
Checks and verifications 444
Chapter 12: Data Protector SAP R/3 integration 445
Introduction 445
Integration concepts 446
Backup flow 449
Restore flow 450
Data Protector SAP R/3 configuration file 451
Setting, retrieving, listing, and deleting Data Protector SAP R/3 configuration file
parameters using the CLI 453
Configuring the integration 455
Prerequisites 456
Before you begin 456
Cluster-aware clients 457
Configuring user accounts 457
Checking the connection 458
Authentication password file 458
Enabling archived logging 459
Linking Oracle Server with the Data Protector MML 460
Choosing authentication mode 460
Configuring SAP R/3 databases 461
Before you begin 461
Using the Data Protector GUI 461
Using the Data Protector CLI 464
Integration Guide
HPE Data Protector (9.07) Page 15 of 803
Handling errors 465
Checking the configuration 466
Using the Data Protector GUI 466
Using the Data Protector CLI 466
Backup 467
Considerations 469
Creating backup specifications 469
Modifying backup specifications 474
Scheduling backup sessions 474
Scheduling example 474
Previewing backup sessions 475
Using the Data Protector GUI 475
Using the Data Protector CLI 475
What happens during the preview? 475
Starting backup sessions 476
Backup methods 476
Using the Data Protector GUI 476
Using the Data Protector CLI 476
Using the SAP BRTOOLS 476
Backing up using Oracle Recovery Manager 478
Manual balancing 478
Restore 479
Considerations 479
Restoring using the Data Protector GUI 479
Restoring using the Data Protector CLI 481
Restoring using the SAP commands 482
Restoring using another device 483
Using the Data Protector GUI 483
Using the Data Protector CLI or SAP commands 483
Localized SAP R/3 objects 483
Sparse files 484
Disaster recovery 484
Restoring the control file 484
Monitoring sessions 484
Troubleshooting 485
Before you begin 485
General troubleshooting 485
Troubleshooting on Windows systems 486
Prerequisites concerning the Oracle side of the integration 486
Prerequisites on the SAP side of the integration 487
Configuration problems 488
Backup problems 491
Restore problems 492
Troubleshooting on UNIX systems 493
Prerequisites concerning the Oracle side of the integration 493
Prerequisites on the SAP side of the integration 496
Integration Guide
HPE Data Protector (9.07) Page 16 of 803
Configuration problems 497
Backup problems 498
Restore problems 499
Chapter 13: Data Protector SAP MaxDB integration 503
Introduction 503
Integration concepts 504
Backup flow 505
Restore flow 505
Configuring the integration 505
Prerequisites 506
Limitations 506
Before you begin 506
Cluster-aware clients 506
Configuring SAP MaxDB users 506
Configuring SAP MaxDB instances 507
Before you begin 507
Using the Data Protector GUI 507
Using the Data Protector CLI 509
Handling errors 510
Checking the configuration 510
Using the Data Protector GUI 510
Using the Data Protector CLI 510
Backup 511
Creating backup specifications 511
Modifying backup specifications 513
Scheduling backup sessions 513
Scheduling example 514
Previewing backup sessions 514
Using the Data Protector GUI 515
Using the Data Protector CLI 515
What happens during the preview? 515
Starting backup sessions 515
Backup methods 515
Using the Data Protector GUI 516
Using the Data Protector CLI 516
Using SAP MaxDB utilities 516
Restore 519
Restore and recovery overview 519
Before you begin 521
Restoring using the Data Protector GUI 522
Restoring using the Data Protector CLI 523
Restoring using SAP MaxDB utilities 524
SAP MaxDB restore and recovery 525
SAP MaxDB migration 528
Finding information for restore 528
SAP MaxDB restore options 528
Integration Guide
HPE Data Protector (9.07) Page 17 of 803
Restoring using another device 531
Using the Data Protector GUI 532
Using the Data Protector CLI or SAP commands 532
Monitoring sessions 532
Troubleshooting 532
Before you begin 532
Problems 533
SAP MaxDB cluster-related troubleshooting 535
Chapter 14: Data Protector SAP HANA Appliance integration 537
Introduction 537
Integration concepts 538
Integration limitations 539
Configuring the integration 540
Prerequisites 540
Configuration steps 540
Linking Data Protector backint agent with SAP HANA Appliance 540
Adjusting SAP HANA backup settings for redo logs 541
Backup 541
Creating backup specifications 542
Creating Data Protector parameter files for SAP HANA 544
Modifying backup specifications 545
Starting backup sessions 545
SAP HANA backup catalog 545
Restore 546
Finding information for restore 546
Starting restore and recovery sessions 546
Prerequisites 546
Restoring using another device 547
Using the Data Protector GUI 547
Using the Data Protector CLI or SAP commands 547
Recovering a system to a different machine and SystemID (SID) 547
Prerequisites 547
Recovering a system to different machine and same SystemID (SID) 548
Prerequisites 548
Recovering a system to same SystemID without catalog 549
Monitoring sessions 550
Troubleshooting 550
Before you begin 550
Problems 551
Part 4: Sybase and Network Data Management Protocol Server 555
Chapter 15: Data Protector Sybase Server integration 556
Introduction 556
Integration concepts 556
Data Protector CLI commands 557
Integration Guide
HPE Data Protector (9.07) Page 18 of 803
Configuring the integration 558
Prerequisites 558
Before you begin 558
Cluster-aware clients 559
Configuring Sybase users 559
Configuring Sybase instances 559
Before you begin 559
Using the Data Protector GUI 559
Using the Data Protector CLI 562
Checking the configuration 562
Using the Data Protector GUI 562
Using the Data Protector CLI 563
Backup 563
Creating backup specifications 563
Modifying backup specifications 568
Scheduling backup sessions 568
Previewing backup sessions 569
Using the Data Protector GUI 569
Using the Data Protector CLI 569
What happens during the preview? 570
Starting backup sessions 570
Using the Data Protector GUI 571
Using the Data Protector CLI 571
Using Sybase commands 571
Restore 572
Localized database names 572
Finding information for restore 572
Using the Data Protector GUI 572
Using the Data Protector CLI 572
Using the Data Protector syb_tool command 573
Using the standard Data Protector CLI commands 576
Restoring using the Sybase isql command 578
Restore examples 579
Restoring using another device 581
Monitoring sessions 581
Troubleshooting 581
Before you begin 582
Checks and verifications 582
Problems 583
Chapter 16: Data Protector Sybase IQ integration 586
Introduction 586
Backup 586
Pre-Exec Sybase IQ Backup Command Sample 587
Restore 587
Post-Exec Sybase IQ Restore Command Sample 589
Chapter 17: Data Protector Network Data Management Protocol Server integration 590
Integration Guide
HPE Data Protector (9.07) Page 19 of 803
Introduction 590
Integration concept 591
Configuring the integration 592
Prerequisites 593
Importing NDMP Server systems 593
Creating media pools 595
Configuring NDMP devices 595
Configuring tape libraries 597
Configuring standalone devices 599
Network Appliance configuration 600
Standalone tape devices and drives in a tape library 600
Library robotics 601
EMC Celerra configuration 602
SCSI devices 602
EMC Isilon configuration 602
Hitachi BlueArc or Hitachi configuration 603
Library robotics 604
Standalone tape devices and drives in a tape library 604
Block size 605
Backup 605
Backup types 605
Before you begin 607
Creating backup specifications 608
Modifying backup specifications 610
Starting backup sessions 610
Restore 611
Restoring using the Data Protector GUI 611
Direct access restore 613
Restoring using another device 614
NDMP environment variables 614
The NDMP specific omnirc options 617
Media management 618
Troubleshooting 619
Before you begin 619
Problems 619
Chapter 18: Data Protector NetApp SnapManager solution 622
Introduction 622
Concepts 622
Configuration 622
Prerequisites 622
Configuration procedure 623
Backup 624
Limitations 624
Creating a backup specification 624
Restore 626
omnisnapmgr.pl reference page 629
Integration Guide
HPE Data Protector (9.07) Page 20 of 803
SYNOPSIS 629
DESCRIPTION 629
OPTIONS 629
NOTES 630
EXAMPLES 630
Part 5: Virtualization 632
Chapter 19: Data Protector Virtual Environment integration for VMware 633
Introduction 633
Recommendations 634
Integration concepts 634
Supported environments 634
vCenter environment 634
Migration of virtual machines 635
vCenter Server system in a cluster 637
Standalone ESX/ESXi Server environment 637
Data Protector components 637
Data ProtectorCell Manager 637
Data Protector Virtual Environment Integration component 638
Data Protector Disk Agent component 638
Data Protector Media Agents 638
Backup concepts 639
What is backed up? 639
Virtual machines 639
Virtual machine templates 640
vStorage Image backup method 640
vStorage Image + OpenStack backup method 641
General limitations 642
Considerations 642
Snapshot management 642
Backup types 643
Changed block tracking 644
Non-Changed Block Tracking (Non-CBT) backup 646
Quiescence 647
Prerequisites 649
Limitations 649
Considerations for Quiescence Operations 649
Disk space requirements 650
Free space required option 650
Backup disk buffer 651
Backup parallelism 651
Backup considerations 652
Restore concepts 653
Restore of VMware objects backed up with vStorage Image method 653
Restore to a datacenter 653
Integration Guide
HPE Data Protector (9.07) Page 21 of 803
Restore to a directory 654
Restore of Nova Instances and Shadow VMs backed up with vStorage Image +
Openstack method 654
Restore chain 655
Power On and Live Migrate 655
Restore considerations 656
Power On considerations 657
StoreOnce Recovery Manager Central Integration 658
Configuring the integration 660
Recommendations 660
Prerequisites 660
Before you begin 661
Importing and configuring VMware clients 661
Changing the configuration of VMware clients 664
Using the Data Protector GUI 664
Using the Data Protector CLI 665
Checking the configuration of VMware clients 666
Using the Data Protector GUI 666
Using the Data Protector CLI 666
Configuring virtual machines 667
Using the Data Protector GUI 667
Using the Data Protector CLI 670
Customizing the Data Protector behavior with omnirc options 671
Adding the RMC Server details in Data Protector using the Command Line Interface 672
Backup 672
Backup limitations 672
vStorage Image + OpenStack backup method limitations 673
Creating backup specifications 673
Creating backup specifications for RMC backups 678
Modifying backup specifications 681
Scheduling backup sessions 682
Scheduling example 683
Previewing backup sessions 684
Using the Data Protector GUI 684
Using the Data Protector CLI 684
What happens during the preview? 684
Starting backup sessions 684
Using the Data Protector GUI 684
Using the Data Protector CLI 685
Preparing for disaster recovery 685
Restore 686
Restore limitations 686
vStorage Image + OpenStack restore limitations 688
Power On and Live Migrate limitations 688
Finding information for restore 689
Using the Data Protector GUI 689
Integration Guide
HPE Data Protector (9.07) Page 22 of 803
Using the Data Protector CLI 691
Restoring using the Data Protector GUI 691
Restoring using the Data Protector CLI 703
Recovering virtual machines manually 705
Recovering virtual machines after restore to a directory 706
Recovering with the VM configuration file in the VMX format 706
Recovering with the VM configuration file in the XML format 711
Recovering virtual machines after restore to a datacenter 711
Restoring using another device 712
Cleaning up a datastore after a failed restore 712
Disaster recovery 712
Monitoring sessions 713
Troubleshooting 713
Before you begin 713
Checks and verifications 713
Problems 714
Chapter 20: Data Protector Virtual Environment integration for Microsoft Hyper-V 729
Introduction 729
Integration concepts 730
Supported environments 730
Standalone environments 730
Clustered environments 731
Migration of virtual machines 734
Cluster Shared Volumes 735
Hyper-V Replica 735
Virtual machines on Windows file shares 736
Data Protector installation components 736
Data Protector Cell Manager 736
Data Protector Virtual Environment Integration component 737
Data Protector Disk Agent component 737
Data Protector MS Volume Shadow Copy Integration component 737
Data Protector Media Agent component 737
Backup concepts 737
Hyper-V Image backup method 737
Backup types 739
Microsoft Hyper-V backup types 739
VSS backup types 739
Quiescence 740
Restore chain protection 740
Backup considerations 741
Virtual machine storage 741
Concurrent sessions 741
Cluster Shared Volumes (CSV) 741
Virtual machines on SMB file shares 741
Incremental backup 743
Virtual machine replicas 743
Integration Guide
HPE Data Protector (9.07) Page 23 of 803
Virtual machine migration 744
ZDB environments 744
Object copy considerations 745
Restore concepts 745
Restore of virtual machines 745
Restore to the default location 745
Restore to a different location 746
Restore to a directory 746
Restore of individual virtual machine disks 746
Prerequisites for disk restore 747
Prerequisites for Backup and Hyper-V hosts 748
Successful restore session flow 750
Restore chain validation 750
Restore considerations 750
Data Protector backup solutions 751
Restore parallelism 751
Restore to a backup host 752
Restore to a different location 752
Restore of virtual machine replicas 752
Virtual machines on Windows shares 753
Configuring the integration 754
Prerequisites 754
Limitations 755
Before you begin 755
Enabling automatic mounting of new volumes on Microsoft Hyper-V systems 755
Configuring Microsoft Hyper-V clusters 755
Importing and configuring Microsoft Hyper-V systems 755
Changing the configuration of Microsoft Hyper-V systems 757
Using the Data Protector GUI 757
Using the Data Protector CLI 758
Customizing the Data Protector behavior with omnirc options 758
Backup 758
Creating backup specifications 758
Modifying backup specifications 763
Scheduling backup sessions 765
Scheduling example 765
Starting backup sessions 766
Using the Data Protector GUI 766
Using the Data Protector CLI 767
Restore 767
Limitations 767
Finding information for restore 768
Using the Data Protector GUI 768
Using the Data Protector CLI 768
Restoring using the Data Protector GUI 769
Restoring using the Data Protector CLI 771
Integration Guide
HPE Data Protector (9.07) Page 24 of 803
Merging virtual machine snapshots manually 773
Restore of cluster virtual machines 774
Restoring a replicated virtual machine 774
Re-enabling the replication 774
Reverting a restored replica VM to an application-consistent recovery point 775
Restoring using another device 775
Monitoring sessions 775
Troubleshooting 775
Before you begin 775
Checks and verifications 776
Problems 776
Part 6: PostgreSQL 785
Chapter 21: Data Protector PostgreSQL integration 786
Introduction 786
Integration concepts 787
Configuring the integration 788
Prerequisites 789
Before you begin 789
Configuration steps 789
Checking the configuration 791
Backup 791
Prerequisites 791
Backup considerations 791
Creating backup specifications 791
Application-specific backup options 794
Modifying backup specifications 795
Scheduling backup sessions 795
Starting backup sessions 795
Restore 795
Limitations 796
Finding information needed for restore 796
Using the Data Protector GUI 796
Using the Data Protector CLI 796
Before you begin 796
Restoring using the Data Protector GUI 797
Restoring using the Data Protector CLI 798
PostgreSQL data migration 798
PostgreSQL restore options 798
Monitoring and reviewing sessions 800
Troubleshooting 800
Before you begin 800
Checks and verifications 800
Send Documentation Feedback 802
Integration Guide
HPE Data Protector (9.07) Page 25 of 803
About this guide
This guide describes how to configure and use the following:
l IBM Informix Server integration, IBM DB2 UDB integration, and IBM Lotus Notes/Domino Server
integration.
l Microsoft SQL server integration, Microsoft SQL Server 2007/2010/2013 integration, Microsoft SharePoint
Server VSS based solution, Microsoft Exchange Server 2007 integration, Microsoft Exchange Server 2010
integration, and Microsoft Exchange Single Mailbox integration.
l Oracle Server integration, MySQL integration, SAP R/3 integration, SAP MaxDB integration, and SAP
HANA Appliance integration.
l Sybase Server integration, Network Data Management Protocol Server integration, and NetApp
SnapManager solution.
l VMware - Virtual Environment integration and Microsoft Hyper-V - Virtual Environment integration.
HPE Data Protector (9.07) Page 26 of 803
HPE Data Protector (9.07)
Part 1: IBM Applications
This part of the guide describes ways to back up and restore Informix Server database objects, DB2
databases, and Lotus Notes/Domino Server.
This part includes the following chapters:
l Data Protector Informix Server integration
l Data Protector DB2 UDB integration
l Data Protector Lotus Notes/Domino Server integration
Chapter 1: Data Protector Informix Server
integration
Introduction
This chapter explains how to configure and use the Data Protector Informix Server integration. It
describes the concepts and methods you need to understand to back up and restore Informix Server
database objects (dbobjects).
Data Protector integrates with the Informix Dynamic Server (Informix Server) to back up dbobjects
online. During backup, a database server (Informix instance) is online and actively used.
Data Protector offers interactive and scheduled backups of the following types:
Informix Server backup types
Backup type Description
Full Full backup (level 0).
Incr1 Incremental backup (level 1). Backs up changes since the last
Full backup.
Incr2 Incremental backup (level 2). Backs up changes since the last
Incr1 backup.
Data Protector offers two types of restore:
Informix Server restore types
Restore type Description
Complete database restore Restore from any backup. ON-Bar restores dbobjects
concurrently and replays the logical logs once.
Whole-system restore Restore from a whole-system backup. ON-Bar restores the
whole system sequentially with or without restoring the logical
logs. Whole-system restore is appropriate for small systems,
when you do not need to restore logs, for disasterrecovery, or
when restoring to another client.
You can also back up and restore dbobjects using the Informix Server onbar command.
This chapter provides information specific to the Data Protector Informix Server integration. For general
Data Protector procedures and options, see the HPE Data Protector Help.
HPE Data Protector (9.07) Page 28 of 803
Integration concepts
Data Protector integrates with the Informix Server through the Data Protector Database Library based
on a common library called Data Protector BAR (Backup And Restore). The Data Protector Database
Library channels communication between the Data Protector Session Manager, and, via the XBSA
interface, the Informix Server ON-Bar utility. "Data Protector Informix Server integration architecture"
below shows the architecture of the Data Protector Informix Server integration.
Data Protector Informix Server integration architecture
Informix Server integration architecture - Legend and Description
Legend Description
SM Data Protector Session Manager: Backup Session Manager during backup
and Restore Session Manager during restore.
ON-Bar ON-Bar executes backup and restore requests from Data Protector and
from the Informix Server command line.
XBSA X/Open Backup Services Application Programmer's Interface, through
which ON-Bar and Data Protector exchange control and data.
Database Library A set of Data Protector executables that enable data transfer between an
Informix instance and Data Protector.
MA Data Protector General Media Agent.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 29 of 803
Legend Description
Backup Specification A list of objects to be backed up, backup devices, and options to be used.
IDB The Data Protector Internal Database.
Backup is always executed on the Informix Server system via the Informix Server ON-Bar utility. ON-
Bar communicates backup and restore requests to the Informix instance.
While an Informix instance is responsible for read/write operations to disk, Data Protector reads from
and writes to devices and manages media.
Configuring the integration
You need to configure an Informix Server user and every Informix instance you intend to back up or
restore.
Prerequisites
l Ensure that you have correctly installed and configured Informix Server.
l For supported versions, platforms, devices, and other information, see the HPE Data Protector
Product Announcements, Software Notes, and References or
http://support.openview.hp.com/selfsolve/manuals.
l For information on installing, configuring, and using Informix Server, see the Informix Server
online documentation.
l Ensure that you have correctly installed Data Protector. For information on how to install Data
Protector in various architectures, see the HPE Data Protector Product Announcements, Software
Notes, and References.
Every Informix Server system you intend to back up from or restore to must have the Data Protector
Informix Integration component installed.
Before you begin
l Configure devices and media for use with Data Protector.
l To test whether the Informix Server system and the Cell Manager communicate properly, configure
and run a Data Protector filesystem backup and restore on the Informix Server system.
l Windows systems:
l On Windows Server 2003 system, you need to restart the Data Protector Inet service under a
Windows domain user account that has the appropriate Informix Server permissions for running
backups and restores. Stop the service and restart it as user informix.
For information on changing the user account under which the Data Protector Inet service is
running, see the HPE Data Protector Help index: “Inet, changing account”.
l On other Windows operating systems, configure the Data Protector Inet service user
impersonation for the user that has the appropriate Informix Server permissions for running
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 30 of 803
backups and restores.
For details, see the HPE Data Protector Help index: “Inet user impersonation”.
Cluster-aware clients
Configure Informix instances only on one cluster node, since the configuration files reside on the Cell
Manager.
If you intend to use the Data Protector CLI, set the Data Protector environment variable
OB2BARHOSTNAME to the virtual server name as follows:
Windows systems: set OB2BARHOSTNAME=virtual_server_name
UNIX systems: export OB2BARHOSTNAME=virtual_server_name
Configuring Informix Server users
On UNIX, add the Informix Server administrator to the Data Protector admin or operator user group.
For information, see the HPE Data Protector Help index: “adding users”.
This user is typically informix or root in the group informix. To determine it, check the owner of the
Informix Server onbar_d file.
This chapter assumes that your Informix Server user is informix in the group informix.
Configuring Informix instances
You need to provide Data Protector with configuration parameters for the Informix instance:
l Name of the Informix instance.
l Pathname of the Informix Server home directory.
l Windows systems: Name of the system with the sqlhosts entry in the Windows Registry.
UNIX systems: Pathname of the sqlhosts file.
l Name of the Informix instance ONCONFIG file.
Data Protector then creates the Informix instance configuration file on the Cell Manager and verifies the
connection to the instance.
To configure an Informix instance, use the Data Protector GUI or CLI.
Before you begin
l Ensure that the Informix instance is online.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add
Backup.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 31 of 803
3. In the Create New Backup dialog box, click OK.
4. In Client, select the Informix Server system. In a cluster environment, select the virtual server.
In Application database, enter the Informix instance name.
In the User and group/domain options, specify the account under which you want the backup
session to run. These options are available on UNIX and Windows Server 2008 clients. On
Windows Server 2003, the backup session will run under the account under which the Data
Protector Inet service is running.
Ensure that this user has been added to the Data Protector admin or operator user group, and
has the Informix Server backup rights. This user becomes the backup owner.
l UNIX systems: Type informix in both Username and Group/Domain name.
l Windows Server 2008: In Username and Group/Domain name, type the user name and
domain (for example, the user name Administrator, domain DP). This account must be set up
for the Data Protector Inet service user impersonation. For details, see the HPE Data
Protector Help index: “Inet user impersonation”.
Specifying an Informix instance
Click Next.
5. In Informix Server home directory, specify the pathname of the Informix Server home directory.
In Full pathname of sqlhosts file, enter the following:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 32 of 803
Windows systems: Name of the system with the sqlhosts entry in the Windows Registry. Use
the UNC notation, for example: computer_name.
UNIX systems: Pathname of the sqlhosts file.
In Name of ONCONFIG file, enter the name of the Informix instance ONCONFIG file, located in
the following directory:
Windows systems: INFORMIXDIRetc
UNIX systems: INFORMIXDIR/etc
Configuring an Informix instance (Windows)
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 33 of 803
Configuring an Informix instance (UNIX)
Click OK.
6. If an error occurs, click Details or see "Troubleshooting" on page 60.
7. The Informix instance is configured. Exit the GUI or proceed with creating the backup
specification at "Select the dbobjects to be backed up." on page 38.
Using the Data Protector CLI
Log in to the Informix Server system as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/lbin
Other UNIX systems: /usr/omni/bin
execute the following:
Windows systems:
perl -I..libperl util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts
ONCONFIG
UNIX systems:
util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts ONCONFIG
Parameter description
INFORMIXSERVER Name of the Informix instance.
INFORMIXDIR Pathname of the Informix Server home directory.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 34 of 803
sqlhosts Windows systems: Name of the system with the sqlhosts entry in the
Windows Registry. Use the UNC notation, for example: computer_name.
UNIX systems: Pathname of the sqlhosts file.
ONCONFIG Name of the Informix instance ONCONFIG file.
The message *RETVAL*0 indicates successful configuration.
Configuring an Informix instance (Windows)
Configuring an Informix instance (HP-UX, Solaris)
Handling errors
If an error occurs, the error number is displayed in the form *RETVAL*error_number.
To get the error description:
Windows systems: On the Cell Manager, see the file Data_Protector_
homehelpenuTrouble.txt.
HP-UX and Solaris systems: Execute:
/opt/omni/lbin/omnigetmsg 12 error_number
Other UNIX systems: Execute:
/usr/omni/bin/omnigetmsg 12 error_number
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 35 of 803
Checking the configuration
You can check the configuration of an Informix instance after you have created at least one backup
specification for the Informix instance. Use the Data Protector GUI or CLI.
Using the Data Protector GUI
1. In the Context List, select Backup.
2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Click the backup
specification to display the Informix instance to be checked.
3. Right-click the Informix instance and click Check configuration.
Using the Data Protector CLI
Log in to the Informix Server system as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/lbin
Other UNIX systems: /usr/omni/bin
execute:
Windows systems:
perl -I..libperl util_informix.pl -CHKCONF INFORMIXSERVER
UNIX systems:
util_informix.pl -CHKCONF INFORMIXSERVER
where INFORMIXSERVER is the name of the Informix instance.
Checking configuration (Windows)
Checking configuration (UNIX)
A successful configuration check displays the message *RETVAL*0.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 36 of 803
If an error occurs, the error number is displayed in the form *RETVAL*error_number. For information on
how to get the error description, see "Handling errors" on page 35.
Backup
The integration provides online database backup of the following types:
Informix Server backup types
Backup type Description
Full Full backup (level 0).
Incr1 Incremental backup (level 1). Backs up changes since the last
Full backup.
Incr2 Incremental backup (level 2). Backs up changes since the last
Incr1 backup.
For details on these types and on ON-Bar, see the Backup and restore guide of Informix Server.
What you must back up as filesystem
ON-Bar backs up all dbobjects except the following, which you must back up using a filesystem
backup:
What needs to be backed up as filesystem
Object Location
The ONCONFIG file Windows systems:
INFORMIXDIR etc
UNIX systems:
INFORMIXDIR /etc
Note: This is not applicable
for Informix versions 11.7
and 12.1.
The oncfg_SERVERNAME.SERVERNUM file
Emergency boot file, an Informix Server configuration file called
ixbar.server_id, where server_id is the value of the
SERVERNUM configuration parameter.
UNIX systems: The sqlhosts file
Simple-large-object data in blobspaces Disks or optical platters
How often you need to back up these objects depends on how frequently they change. However, back
up the emergency boot file at least daily and always after a critical dbspace backup.
What does not need to be backed up?
ON-Bar does not back up the following items because it automatically re-creates them during a restore:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 37 of 803
l Dbspace pages allocated to the Informix instance but not yet allocated to a tblspace extent.
l Mirror chunks, if the corresponding primary chunks are accessible.
l Temporary dbspaces.
Creating backup specifications
Create a backup specification using the Data Protector Manager.
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add
Backup.
3. In the Create New Backup dialog box, click OK.
4. In Client, select the Informix Server system. In a cluster environment, select the virtual server.
In Application database, select the Informix instance to be backed up.
In the User and group/domain options, specify the account under which you want the backup
session to run. These options are available on UNIX and Windows Server 2008 clients. On
Windows Server 2003, the backup session will run under the account under which the Data
Protector Inet service is running.
Ensure that this user has been added to the Data Protector admin or operator user group, and
has the Informix Server backup rights. This user becomes the backup owner.
l UNIX systems: Type informix in both Username and Group/Domain name.
l Windows Server 2008: In Username and Group/Domain name, type the user name and
domain (for example, the user name Administrator, domain DP). This account must be set up
for the Data Protector Inet service user impersonation. For details, see the HPE Data
Protector Help index: “Inet user impersonation”.
Click Next.
5. If the Informix instance is not configured yet for use with Data Protector, the Configure Informix
dialog box is displayed. Configure it as described in "Configuring Informix instances" on page 31.
6. Select the dbobjects to be backed up.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 38 of 803
Selecting backup objects
For Informix versions 11.7 and 12.1, you must appropriately select the system database objects,
rootdbs, physdbs, plog, llog, and logdbs if you have created another database. If these are not
selected together for the restore session, the session fails.
Click Next.
7. Select devices to use for the backup.
To specify device options, right-click the device and click Properties. Specify the number of
parallel backup streams in the Concurrency tab and the media pool you will use.
Note: Except for whole-system backups, ON-Bar backs up and restores dbobjects
concurrently, creating a new process for each object. The number of processes is limited by
the Informix Server BAR_MAX_BACKUP configuration parameter. Set the Informix configuration
parameter BAR_MAX_BACKUP to the Data Protector concurrency.
To specify which resource types can be backed up to the device, click the Informix tab, select the
desired resource types, and click OK. See "Specifying Informix Server resource types" on the
next page.
Ensure that the selected devices cover all resource types specified for backup and are not locked
when starting the backup. Ideally, back up each resource to a separate device.
For a logical log backup, always use a separate device and ensure that the LTAPEDEV parameter in
the ONCONFIG file is not set to /dev/null or ''.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 39 of 803
Specifying Informix Server resource types
Informix Server resource types
Resource type Description
B Blobspace
CD Critical dbspace (a root dbspace or a dbspace containing the
physical log or a logical log file)
L Logical log
MR Master root dbspace
ND Non-critical dbspace
R Root dbspace
CF Critical file
Note: Selecting this resource is mandatory for Informix
versions 11.7 and 12.1.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 40 of 803
Tip: Select an additional set of devices (covering all resource types specified for backup) so
that they can take over if some devices in the primary group fail. Select the Load balancing
option and set the Min and Max parameters to the number of primary devices.
Click Next.
8. Set backup options ("Informix Server specific backup options (Windows)" below and "Informix
Server specific backup options (UNIX)" on the next page). For information, see "Informix Server
backup options " on the next page.
Informix Server specific backup options (Windows)
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 41 of 803
Informix Server specific backup options (UNIX)
Click Next.
9. Optionally, schedule the backup. See "Scheduling backup sessions" on page 44.
Click Next.
10. Save the backup specification, specifying a name and a backup specification group.
Tip: Preview backup session for your backup specification before using it. See "Previewing
backup sessions" on page 45.
Informix Server backup options
Option
Description
Backup
type
Storage-space
backup
(default)
In a storage-space backup, the onbar command backs up the
selected storage-spaces and logical logs in parallel. When you
restore from a storage-space backup, you also have to restore
logical logs to make the data consistent.
Storage-space backup is faster than whole-system backup on large
databases.
Whole-system
backup
In a whole-system backup, all Informix instance's dbobjects from
the onbar command are backed up. ON-Bar cannot back them up
concurrently; they are backed up sequentially. Whole-system
backup is useful for disaster recovery, or restore to another client.
When you restore from a whole-system backup, you do not need to
restore logical logs to make the data consistent.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 42 of 803
Option
Description
Pre-exec
Post-exec
Specify a command that will be started by ob2onbar.pl on the
Informix Server system before the backup (pre-exec) or after it
(post-exec). Do not use double quotes, spaces, or special
characters. Provide only the name of the command, which must
reside in the following directory:
Windows systems: Data_Protector_homebin
See "Informix Server specific backup options (Windows)" on page
41.
HP-UX, Solaris, Linux systems: /opt/omni/lbin
See "Informix Server specific backup options (UNIX)" on the
previous page.
Other UNIX systems: /usr/omni/bin
If you selected a logical log for backup, it is sensible to add onmode
-l as a pre-exec command to ensure that you always have a log
file to back up. Without a log file to back up, the backup fails.
If the onmode -l command returns a non-zero value, Data
Protector interprets this as an error and the backup session does
not start.
Modifying backup specifications
To modify your backup specification, click its name in the Scoping Pane of the Backup context, then
click the appropriate tab, and apply the changes. See "Modifying a backup specification" on the next
page.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 43 of 803
Modifying a backup specification
Scheduling backup sessions
You can run unattended backups at specific times or periodically. For details on scheduling, see the
HPE Data Protector Help index: “scheduled backups”.
Scheduling example
To back up logical logs at 8:00, 13:00, and 18:00 during weekdays:
1. In the Schedule property page, select the starting date in the calendar and click Add to open the
Schedule Backup dialog box.
2. Under Recurring, select Weekly. Under Time options, select 8:00. Under Recurring Options,
select Mon, Tue, Wed, Thu, and Fri. See "Scheduling a backup session" on the next page.
Click OK.
3. Repeat steps 1 and 2 to schedule backups at 13:00 and 18:00.
4. Click Apply to save the changes.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 44 of 803
Scheduling a backup session
Previewing backup sessions
Preview the backup session to test it. You can use the Data Protector GUI or CLI.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Right-click the
backup specification you want to preview and click Preview Backup.
3. Specify the Backup type and Network load. Click OK.
The message Session completed successfully is displayed at the end of a successful
preview.
Using the Data Protector CLI
Execute the following commands:
omnib -informix_list backup_specification_name -test_bar
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 45 of 803
Previewing a backup with backup specification ds_street (Windows)
Previewing a backup with backup specification IDS914 (UNIX)
What happens during the preview?
1. The Informix Server onbar command is started with the -F option, which specifies a fake backup.
This tests if the Informix instance is correctly configured for backup.
2. Data Protector tests the Data Protector part of the configuration. The following are tested:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 46 of 803
l Communication between the Informix instance and Data Protector
l The syntax of the backup specification
l If devices are correctly specified
l If the necessary media are in the devices
Starting backup sessions
Interactive backups are run on demand. They are useful for urgent backups or restarting failed backups.
Before starting the backup session, perform the following actions:
1. Set the below environment variables:
a. ONCONFIG
i. INFORMIXSQLHOSTS
ii. INFORMIXDIR
iii. INFORMIXSERVER
b. PATH (Add $INFORMIXDIR/bin to PATH)
2. Set the tapedev and ltapedev variables appropriately in ONCONFIG file. If the tapedev and
ltapedev variables are not present, create the files with informix ownership, and a minimum of
660 permissions. Set these paths in the ONCONFIG file.
Backup methods
Start a backup of dbobjects in any of the following ways:
l Use the Data Protector GUI. See "Using the Data Protector GUI" on the next page.
l Use the Data Protector CLI. See "Using the Data Protector CLI" on the next page.
l Use the Informix Server onbar command. See "Using Informix Server commands" on the next page.
l UNIX systems: Use the Informix Server log_full.sh script. See "Using Informix Server log_
full.sh on UNIX" on page 50.
Before you begin
l Ensure that you have sufficient logical log space to create a backup.
If the amount of free space in all logical log files is less than half a single log file, Informix Server
does not create a backup.
l Before a Full backup, print or keep a copy of your ONCONFIG file, the emergency boot file, and on
UNIX, also the sqlhosts file.
l Verify data consistency.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 47 of 803
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, and then Informix Server. Right-click the
backup specification you want to use and click Start Backup.
3. Select the Backup type and Network load. Click OK.
The message Session completed successfully is displayed at the end of a successful backup
session.
Using the Data Protector CLI
Execute the following command:
omnib -informix_list backup_specification_name [-barmode InformixMode] [List_
options]
where InformixMode is one of the following:
full|inf_incr1|inf_incr2
Note: Data Protector terms full, inf_incr1, and inf_incr2 backup are equivalent to Informix
Server terms level-0, level-1, and level-2 backup, respectively.
For List_options, see the omnib man page.
Examples
To start a full backup using the Informix Server backup specification InformixWhole, execute:
omnib -informix_list InformixWhole -barmode full
To start an incremental backup (level 1) of the Informix Server backup specification InformixIncr,
execute:
omnib -informix_list InformixIncr -barmode inf_incr1
Using Informix Server commands
Use the Informix Server onbar command to start a backup of dbobjects from the Informix Server
system where the relevant Informix instance is located.
Before the backup:
l Log in to the Informix Server system as user informix.
l Set the following variables:
Data Protector and Informix Server variables
Variable Description
ONCONFIG Name of the Informix instance ONCONFIG file.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 48 of 803
Variable Description
INFORMIXSQLHOSTS Windows systems: System on which the sqlhosts entry in the
Windows Registry exists.
UNIX systems: Pathname of the sqlhosts file, for example
/applications/informix/etc/sqlhosts.
INFORMIXDIR Pathname of the Informix Server home directory.
INFORMIXSERVER Name of the Informix instance.
OB2APPNAME Name of the Informix instance.
OB2BARLIST For backup, name of the backup specification to be used for the
backup.
For restore, name of the backup specification to be used for salvaging
logical logs.
l Ensure that the Informix instance is in online or quiescent mode. Once you start a backup, do not
change the mode until the backup finishes; changing the mode terminates the backup. Only online
dbspaces and blobspaces are backed up. To list online dbobjects, execute:
Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
Backup modes
Backup mode Description
Online Use online mode if your Informix instance must be accessible during
the backup. An online backup may impact performance.
Quiescent Use quiescent mode to eliminate partial transactions in a backup.
Quiescent backup may not be practical if you need continuous access
to Informix instances.
l Keep a copy of your ONCONFIG file, the emergency boot file, and on UNIX, also the sqlhosts file,
after you create a full backup. You need this information to restore dbobjects.
To back up a list of dbspaces, execute:
onbar -b dbspace_list
For example, to back up dbspaces dbspace1 and dbspace3, execute:
onbar -b dbspace1, dbspace3
For more information, see the Backup and restore guide of Informix Server.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 49 of 803
Using Informix Server log_full.sh on UNIX
On UNIX, log_full.sh is used to start a backup of logical log files when the Informix Server issues a
log-full event alarm on the Informix Server. For information on logical log file backups, see "Manual and
continuous logical log backups" below.
To enable Informix Server backups from the log_full.sh script:
1. Add the following line to the Informix instance ONCONFIG file:
ALARMPROGRAM INFORMIXDIR/etc/log_full.sh.
2. If the Data Protector User Interface is not installed on the Informix Server system, create an
Informix Server backup specification to back up only logical logs, and edit
INFORMIXDIR/etc/log_full.sh.
Add the following at the beginning of the file:
export OB2BARLIST=backup_specification_name
export OB2APPNAME=INFORMIXSERVER
3. If the Data Protector User Interface is installed on the Informix Server system, create an Informix
Server backup specification to back up logical logs only.
Manual and continuous logical log backups
To back up logical log files that are full and ready to be backed up, start:
l a manual logical log backup to back up all full logical log files and stop at the current logical log file.
l a continuous logical log backup to back up each logical log file automatically as it becomes full. Use
this backup if you do not want to monitor the logical log files.
By default, the ALARMPROGRAM configuration parameter is set so that ON-Bar performs continuous
backups.
If you use continuous backups, ensure that a device is always available for the logical log backup
process.
To perform a manual logical log backup, set the OB2APPNAME and OB2BARLIST environment variables as
described in "Data Protector and Informix Server variables " on page 48 and execute:
onbar -l
For more information, see the Backup and restore guide of Informix Server.
Restore
The Data Protector Informix Server integration provides two types of restore:
Informix Server restore types
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 50 of 803
Restore type Description
Complete database
restore
Restore from any backup. ON-Bar restores dbobjects concurrently and
replays the logical logs once.
Whole-system restore Restore from a whole-system backup. ON-Bar restores the whole system
sequentially with or without restoring the logical logs. Whole-system
restore is appropriate for small systems, when you do not need to restore
logs, for disaster recovery, or when restoring to another client.
Restore methods
Restore dbobjects in any of the following ways:
l Use the Data Protector GUI. See "Restoring using the Data Protector GUI" on page 54.
l Use the Data Protector CLI. See "Restoring using the Data Protector CLI" on page 57.
l Use the Informix Server onbar command. See "Restoring using Informix Server commands" on
page 58.
Before you begin
l Before restoring the root dbspace or performing a whole-system restore, shut down the Informix
instance (cold restore). Log in to the Informix Server system as user informix and execute:
Windows systems: INFORMIXDIRbinonmode -ky
UNIX systems: INFORMIXDIR/bin/onmode -ky
Note: Once the Informix instance is offline, you cannot restore only non-critical (user)
dbspaces. The root dbspace must also be selected for restore.
l To restore only non-critical dbspaces, ensure that the Informix instance is online or in a quiescent
mode (warm restore ), and that the non-critical dbspaces to be restored are offline.
To check whether dbspaces are offline, execute:
Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
Finding information for restore
To restore dbobjects, first find the needed media and the session ID of the last full backup session.
Use the Data Protector GUI or CLI.
Using the Data Protector GUI
In the Internal Database context, expand Objects or Sessions. To view details on a session, right-
click the session and click Properties.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 51 of 803
Example of session properties
Using the Data Protector CLI
Localized database names: If the names of backed up objects contain characters from different
Unicode language groups (for example, if you are using Japanese and Latin characters), you must
redirect the output of Data Protector utilities to use UTF-8 encoding:
l Set the environment variable OB2_CLI_UTF8 to 1.
l Set the encoding used on the terminal to UTF-8.
If you are using localized databases, and the system locale uses the same Unicode language group, no
changes are required.
1. Get a list of Informix Server backed up objects:
omnidb -informix
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 52 of 803
Example of a list of Informix Server backed up objects
2. Get a list of backup sessions for a specific object, including the session ID:
omnidb -informix object_name
Example of a list of backup sessions for a specific object
For object copies, use the object backup ID (which equals the object backup session ID). Do not
use the object copy session ID.
To get information on the object backup ID, execute:
omnidb -session session_id -detail
3. Get a list of media needed for restore:
omnidb -session session_id -media
Example of finding media needed for restore
For details on the omnidb command, see the omnidb man page.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 53 of 803
Restoring using the Data Protector GUI
1. In the Context List, click Restore.
2. In the Scoping Pane, expand Informix Server, expand the client from which the data to be
restored was backed up, and then click the Informix instance you want to restore.
3. In the Source page, select objects for restore. To restore the complete database or for a whole-
system restore, select Restore complete database.
Selecting objects for restore
Note: For Informix versions 11.7 and 12.1, you must appropriately select the system
database objects, rootdbs, physdbs, plog, llog, and logdbs if you have created another
database.
4. In the Options page, set the Informix Server specific restore options. For information, see
"Informix Server restore options " on page 56 or press F1.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 54 of 803
Informix Server restore options
5. In the Devices page, select the devices to be used for the restore.
For more information on how to select devices for a restore, see the HPE Data Protector Help
index: “restore, selecting devices for”.
6. If you perform a whole-system restore and the Informix instance is in online mode, take the
Informix instance offline by executing:
onmode -ky
Click Restore.
7. In the Start Restore Session dialog box, click Next.
8. Specify the Report level and Network load.
Note: Select Display statistical information to view the restore profile messages in the
session output.
9. Click Finish to start the restore.
The statistics of the restore session, along with the message Session completed
successfully is displayed at the end of the session output.
10. If you performed a whole-system restore, bring the Informix instance online by executing:
onmode -m
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 55 of 803
Informix Server restore options
Option Description
Backup Specification The backup specification to be used
for salvaging logical log files still on
the disk before restoring. Preferably,
specify the backup specification used
for the backup of logical logs.
Username UNIX systems: User name of the
Informix Server backup owner. onbar
is started under the account of the
specified user.
User group UNIX systems: User group of the
Informix Server backup owner.
Restore to client The client to restore to. By default,
you restore to the original backup
client. This option is only valid for a
whole-system restore.
Restore by log number This option is only available if you
selected Restore complete
database in the Source page. Use this
option to restore data up to a specific
log number. If further logs exist, ON-
Bar does not restore them. This option
invokes onbar -r -n last_log_
number. For details, see the Backup
and restore guide of Informix Server.
Restore by date This option is only available if you
selected Restore complete
database in the Source page. Use this
option to restore data to a specific
point in time. This option invokes
onbar -r -t time. For details, see
the Backup and restore guide of
Informix Server.
Restore the latest version Select this option to restore the latest
backup version.
Whole database restore This option is only available if you
selected Restore complete
database in the Source page. Select
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 56 of 803
Option Description
this option to perform a whole-system
restore. Only use this option when
restoring from a whole-system
backup. Data Protector does not
automatically detect if a whole-
system backup exists.
Data Protector searches for the last
whole-system backup and restores
from that. This option invokes onbar
-r -w. For details, see the Backup
and restore guide of Informix Server.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Restoring using the Data Protector CLI
Before you begin the restore procedure, set the OB2BARLIST environment variable as described in “Data
Protector and Informix Server variables” (page 32)"Backup" on page 37. For example:
set OB2BARLIST=dbspace5
Run the following command:
omnir -informix -barhost ClientName -barcmnd ob2onbar.pl -user User:Group -appname
INFORMIXSERVER -bararg OnBarRestoreArguments [INFORMIX_OPTIONS]
ClientName Name of the Informix Server system. In a cluster environment, name of
the virtual server.
INFORMIXSERVER Name of the Informix instance.
User, Group UNIX systems: The user name and its group name.
OnBarRestoreArguments ON-Bar restore arguments. Put each argument in double quotes.
INFORMIX_OPTIONS A subset of general restore options. For information, see the omnir man
page.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Example
To restore the Informix instance informix_instance1 on the UNIX system computer with the bar
argument -r rootdbs, execute:
omnir -informix -barhost computer -barcmnd ob2onbar.pl -user informix:informix -
appname informix_instance1 -bararg "-r rootdbs"
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 57 of 803
Restoring using Informix Server commands
Before restoring:
l Log in to the Informix Server system as user informix.
l Set Data Protector and Informix Server variables as described in "Data Protector and Informix
Server variables " on page 48.
l If a disk failure occurs, salvage logical log files that are still on the disk by executing:
onbar -l -s
The following are examples of the onbar command syntax for restore. For further options, see the
Backup and restore guide of Informix Server.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Restoring dbspaces, blobspaces, and logical logs
1. If the Informix instance to be restored is in online mode, take it offline:
onmode -ky
2. Restore dbspaces, blobspaces, and appropriate logical logs:
Complete database restore: onbar -r
Whole-system restore: onbar -r -w
3. After the restore, bring the Informix instance online:
onmode -m
Restoring dbspaces and blobspaces only
To restore dbspaces and blobspaces without the logical log, execute:
onbar -r -p
Restoring a particular dbspace or blobspace
To restore a specific dbspace, for example dbspace_1, execute:
onbar -r dbspace_1
Restoring to another Informix Server
To restore data to an Informix Server system other than that from which the backup was made:
1. Install the Data Protector Informix Integration software component on the client to which you want
to restore (target client).
2. Create the user informix on the target client.
3. Create an Informix instance with the same database name and the same server number as the
original Informix instance by using the Informix Server ON-Monitor utility on the target client.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 58 of 803
To obtain the database name and the server number, log in as the user informix on the original
server and execute the following:
a. To obtain the database name, look up the value of DBSERVERNAME in the onstat –c output.
On UNIX, you can do this by executing: onstat -c | grep DBSERVERNAME
b. To obtain the server number database name, look up the value of SERVERNUM in the onstat –c
output.
On UNIX, you can do this by executing: onstat -c | grep SERVERNUM
4. Ensure that the Informix instance is online.
5. Configure the Informix instance as described in "Configuring Informix instances" on page 31.
6. Take the Informix instance offline.
7. Copy the following original Informix Server configuration files to the target client:
l ONCONFIG
l the emergency boot file
l oncfg_DBSERVERNAME.SERVERNUM
8. On UNIX, copy also the sqlhosts file to the target client. Change the source client host name in
the copied sqlhosts file to the target client host name.
9. On UNIX, add the service_name entry from the sqlhosts file to the etc/services file, together
with a unique port number (for example, 1535/tcp) on the target client to allow the instance to start
running properly.
10. Re-create the database files from the original database on the target client and then alter the files
permission and ownership of the file to match the originals.
11. Start a whole-system restore of dbobjects as described in "Restoring using the Data Protector
GUI" on page 54.
Restoring using another device
You can perform a restore using a device other than that used for the backup.
Using the Data Protector GUI
For information on how to select another device for a restore using the Data Protector GUI, see the
HPE Data Protector Help index: “restore, selecting devices for”.
Using the Data Protector CLI or Informix Server commands
If you are restoring using the Data Protector CLI or Informix Server commands, specify the new device
in the file:
Windows systems: Data_Protector_program_dataConfigServercellrestoredev
UNIX systems: /etc/opt/omni/server/cell/restoredev
Use the format:
"DEV 1" "DEV 2"
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 59 of 803
where DEV 1 is the original device and DEV 2 is the new device.
Delete this file after use.
On Windows, use the Unicode format for the file.
Monitoring sessions
You can monitor currently running sessions in the Data Protector GUI. When you run an interactive
backup or a restore session, a monitor window shows you the progress of the session. Closing the GUI
does not affect the session.
You can also monitor sessions from any Data Protector client with the User Interface component
installed, using the Monitor context.
For information on how to monitor a session, see the HPE Data Protector Help index: “viewing
currently running sessions”.
When ON-Bar encounters an error or a condition that warrants a warning, it writes a message to the
Informix Server ON-Bar message file. The full pathname of this file is specified in the BAR_ACT_LOG
configuration parameter. For more information on this file, see the Backup and Restore Guide of
Informix Server.
To abort a backup or restore session successfully, set the ON-Bar BAR_RETRY configuration parameter
to 0. This parameter specifies how many times ON-Bar retries a backup or restore if the first attempt
fails.
Troubleshooting
This section lists general checks and verifications, plus problems you might encounter when using the
Data Protector Informix Server integration. Start at "Problems" on page 64 and if you cannot find a
solution there, perform general checks and verifications.
For general Data Protector troubleshooting information, see the HPE Data Protector Troubleshooting
Guide.
Before you begin
l Ensure that the latest official Data Protector patches are installed. For information on how to verify
this, see the HPE Data Protector Help index: “patches”.
l For general Data Protector limitations, as well as recognized issues and workarounds, see the HPE
Data Protector Product Announcements, Software Notes, and References.
l For an up-to-date list of supported versions, platforms, and other information, see
http://support.openview.hp.com/selfsolve/manuals.
Checks and verifications
If your configuration, backup, or restore failed:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 60 of 803
l On the Informix Server system, examine system errors reported in the debug.log and
informix.log files, located in the directory:
Windows systems: Data_Protector_homelog
HP-UX and Solaris systems: /var/opt/omni/log
Other UNIX systems: /usr/omni/log
l Make a test backup and restore of any filesystem on the problematic client. For information, see the
HPE Data Protector Help.
l Windows systems: Ensure that the Data Protector Inet service is running under the account
informix.
l UNIX systems: Verify that the onbar_d command has the switch ownership(s) bit set and that it is
owned by the Informix Server user, for example, informix:informix or root:informix.
Verify that this user is also the owner of the backup specification, or in the case of a restore failure,
verify that this user is specified for the restore session, and that it is in the Data Protector operator
or admin group.
If this user is in the Data Protector operator group, ensure that the See private objects user right
of this group is selected. For information, see the HPE Data Protector Help index: “user rights,
changing”.
Now test if this user, for example user informix, has appropriate rights in Data Protector. Log in to
the Informix Server system as user informix. From the directory:
HP-UX and Solaris systems: /opt/omni/bin/utilns
Other UNIX systems: /usr/omni/bin/utilns
execute:
testbar -type:informix -perform:checkuser -bar: backup_specification_name
Example of checking the Informix Server user
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 61 of 803
In this example, the user has all the necessary rights for the backup specification named
InformixWhole.
If the user informix on the Informix Server system computer.hp.com does not have the necessary
rights, an error similar to the following will be displayed:
[Critical] From: OB2BAR@computer.hp.com "" Time: 08/06/2011
17:51:41[131:53]
User "informix.users@computer.hp.com" is not allowed
to perform a restore.
l In a cluster environment, ensure that the environment variable OB2BARHOSTNAME is set to the virtual
server name before performing procedures from the Data Protector CLI. When the Data Protector
GUI is used, this is not required.
Additionally, if your configuration or backup failed:
l Ensure that the Informix instance is online.
Additionally, if your backup failed:
l Check the configuration of the Informix instance as described in "Checking the configuration" on
page 36.
l Test the backup specification as described in "Previewing backup sessions" on page 45.
l If this fails, check if the Informix Server part of the test failed:
Execute the onbar -b -F command. If the test fails, see the Informix Server documentation for
further instructions.
l If the Data Protector part of the test failed, create an Informix Server backup specification to back
up to a null or file device.
If the backup succeeds, the problem is probably related to devices. For information on
troubleshooting devices, see the HPE Data Protector Help.
l If the test succeeds, start the backup directly from the Informix Server system using Informix
Server commands. For information, see "Using Informix Server commands" on page 48.
If this backup succeeds, the problem may be that the client on which the Data Protector User
Interface is running does not have enough memory, disk space, or other operating system
resources.
Additionally, if your backup or restore failed:
l Test the Data Protector data transfer using the testbar utility. Log in to the Informix Server system
as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/bin/utilns
Other UNIX systems: /usr/omni/bin/utilns
l if your backup failed, execute:
testbar -type:Informix -appname:INFORMIXSERVER -bar: backup_specification_name
-perform:backup
where INFORMIXSERVER is the name of the Informix instance.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 62 of 803
l if your restore failed, execute:
testbar -type:Informix -appname:INFORMIXSERVER -bar:backup_specification_name
-perform:restore -object:OBJECT_NAME -version:OBJECT_VERSION
where INFORMIXSERVER is the name of the Informix instance, OBJECT_NAME is the name of the
object to be restored, OBJECT_VERSION is the object version.
If the test fails:
a. Troubleshoot errors reported by the testbar utility using the Data Protector troubleshooting file,
located on the Cell Manager in:
Windows systems: Data_Protector_homehelpenuTrouble.txt
UNIX systems: /opt/omni/gui/help/C/Trouble.txt
b. On the Informix Server system, examine system errors reported in the file:
Windows systems: Data_Protector_homelogdebug.log
HP-UX and Solaris systems: /var/opt/omni/log/debug.log
Other UNIX systems: /usr/omni/log/debug.log
Additionally, if your restore failed:
l Ensure that the backup specification used for salvaging logical logs is properly configured.
Checking the Informix Server side
The following checks may help you solve some Informix Server related problems.
If your backup or restore failed:
l Check the following Informix Server files for error descriptions:
bar_act.log
bar_dbg.log
online.log
Locations of these files are specified in the Informix Server ONCONFIG file.
Additionally, if your backup failed:
l Start a backup, not using Data Protector:
a. Set the BAR_BSALIB_PATH shell variable to:
Windows systems: ISMDIRbinlibbsa.dll
where ISMDIR is the path to the ISM.
UNIX systems: INFORMIXDIR/lib/ibsad001.sl
where INFORMIXDIR is the home directory of Informix Server.
b. Use the onbar command to start the backup.
Additionally, if your restore failed:
l For a cold restore, verify if the dbspaces you want to restore are offline:
a. Log in to the Informix Server system as user informix.
b. Execute the following:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 63 of 803
Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
where INFORMIXDIR is the home directory of Informix Server.
l Ensure that the Informix Server configuration files (ONCONFIG, the emergency boot file, oncfg_
INFORMIXSERVER.SERVERNUM, and on UNIX, also the sqlhosts file) are not corrupt. If they are
corrupt, restore them manually.
Problems
Problem
Restore to another client fails
If you backed up data to one client, exported the media, and then imported them to another client in a
different cell, the Data Protector session IDs of backup sessions may be changed in the IDB.
However, the session IDs are not automatically changed in the Informix Server emergency boot file
(ixbar.server_id, where server_id is the value of the SERVERNUM configuration parameter).
Therefore, the restore of such objects may fail.
Action
Edit the emergency boot file to reflect the changed Data Protector session IDs. List the changed
session IDs during the import procedure.
Information about backed-up objects is stored in the emergency boot file in the following format:
ODS730 rootdbs R 1 7 0 9 2011008018 2011-08-18 18:10:25 1
Entries 7 and 9 make up make up the Data Protector session ID. Entry 9 is the date and entry 7 the
unique session number.
Here, the session ID is 2011/08/18-9. Note that the delimiter in the date field is "-" in the emergency
boot file and "/" in the Data Protector session ID.
The value of the SERVERNUM configuration parameter is given in entry 4.
Problem
Restore fails because the emergency boot file is too large
Action
Use the ON-Bar onsmsync utility to remove expired backups from the Informix Server sysutils
database and emergency boot file. For information on the onsmsync utility, see the Backup and restore
guide of Informix Server.
Problem
Backup or Restore fails with 131 ISAM error
The backup or restore session fails with the following 131 ISAM error: No free disk space.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 64 of 803
Action
Add chunk space to the rootdbs, or add temp dbs. By default, if disk space is not available for a
dbobject, then space is taken from rootdbs if the temp dbs is not configured.
Example: To add chunk space of 500MB with 2048 page size to rootdbs, use the following
command: onspaces -a rootdbs -p /opt/IBM/informix/ol_informix1170/dbspaces/Chunk2_rootdbs -
o 2048 -s 500000.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 65 of 803
Chapter 2: Data Protector DB2 UDB integration
Introduction
This chapter explains how to configure and use the Data Protector DB2 UDB (DB2) integration. It
describes concepts and methods you need to understand to back up and restore DB2 databases.
Data Protector integrates with IBM DB2 Universal Database Server (DB2 Server) to back up DB2
database objects online and offline.
Data Protector offers interactive and scheduled backups of the following types:
Backup types
Backup type Description
Full Backs up complete DB2 objects.
Incremental Backs up changes since the last Full backup.
Delta Backs up changes since the last backup of any type.
The basic backup unit is a table space. Only table spaces or databases (DB2 objects) can be selected
for backup.
When restoring a database or table space, you can specify restore options to perform:
l Rollforward recovery
l Version recovery
l Restore to a new database (database only)
l Restore to another instance (database only)
l Restore to another system (database only)
l Automatic restore from incremental or delta backups
Databases are restored offline, table spaces online.
Limitations
Table or datafile backup and restore are not supported. Neither are backup or restore using Data
Protector media with the DB2 Command Line Processor or the DB2 Control Center.
This chapter provides information specific to the Data Protector DB2 Server integration. For general
Data Protector procedures and options, see the HPE Data Protector Help.
HPE Data Protector (9.07) Page 66 of 803
Integration concepts
Data Protector integrates with the DB2 Server through a set of modules responsible for data backup
and restore. "DB2 integration architecture" below shows the architecture of the Data Protector DB2
integration.
DB2 integration architecture
Legend
Legend Description
SM Data Protector Session Manager: Backup Session Manager during
backup and Restore Session Manager during restore.
db2bar Data Protector module, used for controlling activities between the DB2
Server and Data Protector backup and restore.
db2arch Program that backs up and restores DB2 log files when DB2 log archive
method (logarchmeth1) is set to user exit
libob2db2 Data transferring (database backup and restore, log archive/retrieval
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 67 of 803
Legend Description
when logarchmeth1 is set to vendor) module called by DB2 Server.
MA Data Protector General Media Agent.
Backup Specification A list of objects to be backed up, backup devices, and options to be used.
IDB The Data Protector Internal Database.
While the DB2 Server is responsible for read/write operations to disk, Data Protector reads from and
writes to devices and manages media.
Considerations
1. HPE recommends that you set the log archive method (logarchmeth1) to Vendor, because IBM
DB2 has deprecated the UserExit option from the DB2 version 9.5. For more information, see
http://www-01.ibm.com/support/knowledgecenter/SSEPGG_
9.7.0/com.ibm.db2.luw.admin.config.doc/doc/r0000249.html?cp=SSEPGG_9.7.0%2F2-2-6-7-
124.
2. If your existing database has the log archive method set to UserExit and you want to change it to
Vendor, then the database recovery for the log that is backed up using the User Exit option can
be done using the below steps:
a. Restore the database (without enabling the Roll forward recovery in the Data Protector GUI).
b. Restore the logs that were backed up using the User Exit program in the active log directory.
3. Set the environment variables in the omnirc file before restoring to a DB2 database using the
automatic Roll forward:
l On the DB2 client, set the following environment variables in the omnirc file:
o OB2APPNAME = “source_Instance_name”
o OB2BARHOSTNAME=”Source_client_name”
o OB2APPDATABASE = “source_database_name”
Note: This is valid for all DB2 log backups using the Vendor library and not required for the
User-Exit mode.
In the omnirc file, delete the above mentioned three variables after the Roll forward of the
DB2 database. This ensures that the other DB2 instances running on the same system are
not influenced by these environment variables during backup.
l Execute the DB2 Roll Forward command.
4. The DB2 deduplication optimization is supported by using the omnirc variable OB2_DB2DEDUP in
the DB2 Version 9.7 (Fix Pack 4) and later releases.
Configuring the integration
You need to configure DB2 users and every DB2 instance you intend to back up or restore to.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 68 of 803
Prerequisites
l Ensure you have correctly installed and configured DB2 Server.
l For supported versions, platforms, devices, and other information, see the HPE Data Protector
Product Announcements, Software Notes, and References or
http://support.openview.hp.com/selfsolve/manuals.
l For information on DB2 Server, see the DB2 administration guide and DB2 server books online.
l Ensure you have correctly installed Data Protector. For information on how to install the Data
Protector IBM DB2 UDB integration in various architectures, see the HPE Data Protector
Installation Guide.
Every DB2 Server system you intend to back up from or restore to must have the Data Protector DB2
Integration and Disk Agent components installed.
In a partitioned environment, ensure that the DB2 Integration and Disk Agent components are
installed on all the physical nodes on which the DB2 database resides.
Before you begin
l Configure devices and media for use with Data Protector.
l To test whether the DB2 Server system and the Cell Manager communicate properly, configure and
run a Data Protector filesystem backup and restore on the DB2 Server system.
Cluster-aware clients
If you are using the Microsoft Windows Failover cluster, set the omnirc variable OB2BARHOSTNAME to the
virtual server name in the cluster nodes and cell manager.
OB2BARHOSTNAME=<virtual_server_name>
Partitioned environment
In a physically partitioned environment, configure the integration on every physical node separately.
Ensure that the MaxBSession global option is set to at least twice the number of nodes of the partitioned
database.
Configuring DB2 users
Ensure the DB2 user has appropriate authorities to perform DB2 backups and restores (either SYSADM,
SYSCTRL, or SYSMAINT).
Add user root (UNIX only) and the DB2 user to both the Data Protector and DB2 admin user groups.
For more information, see the HPE Data Protector Help index: “user groups” and “adding users”.
Provide this user in configuration and restore procedures. This user is needed by Data Protector to start
the Data Protector Inet service (Windows) or process (UNIX).
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 69 of 803
Configuring DB2 instances
Provide Data Protector with the DB2 instance configuration parameters:
l DB2 user
l DB2 user password
l DB2 instance home directory (only in a partitioned environment)
Data Protector then creates a DB2 instance configuration file on the Cell Manager and verifies the
connection to the instance.
These parameters are used for connecting to the DB2 Server system to perform backups, restores, and
other operations, such as listing objects for backup.
To configure a DB2 instance, use the Data Protector GUI or CLI.
Before you begin
l Ensure the DB2 instance is online.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click DB2 Integration, and click Add
Backup.
3. In the Create New Backup dialog box, click OK.
4. In Client, select the DB2 Server system.
In a cluster environment, select the virtual server.
In Application database, type the DB2 instance name.
For information on the User and group/domain options, press F1.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 70 of 803
Specifying a DB2 instance
Click OK.
5. Click Next. The Configure DB2 dialog box is displayed.
6. Type the name of the DB2 user and its password. This user must be configured as described in
"Configuring DB2 users" on page 69.
In a partitioned environment, select DB2 EEE and specify the pathname of the DB2 instance
home directory.
7. The DB2 instance is configured. Exit the GUI or proceed with creating a backup specification at
Step 6.
Using the Data Protector CLI
Execute the following command:
util_db2 -CONFIG DB2_instance username password [DB2 _instance_home]
Parameter description
DB2_instance Name of the DB2 instance.
username DB2 user.
password DB2 user password.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 71 of 803
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide
Hpe Data Protector integration guide

More Related Content

What's hot

Web develop in flask
Web develop in flaskWeb develop in flask
Web develop in flask
Jim Yeh
 
ASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 ValidationASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 Validation
Eyal Vardi
 
Database design and Development
Database design and DevelopmentDatabase design and Development
Database design and Development
Md. Mahbub Alam
 
Becoming a Salesforce.com Technical Architect
Becoming a Salesforce.com Technical ArchitectBecoming a Salesforce.com Technical Architect
Becoming a Salesforce.com Technical Architect
Steven Herod
 
PHP.ppt
PHP.pptPHP.ppt
PHP Summer Training Presentation
PHP Summer Training PresentationPHP Summer Training Presentation
PHP Summer Training Presentation
Nitesh Sharma
 
PHP Frameworks and CodeIgniter
PHP Frameworks and CodeIgniterPHP Frameworks and CodeIgniter
PHP Frameworks and CodeIgniter
KHALID C
 
JSON in Solr: from top to bottom
JSON in Solr: from top to bottomJSON in Solr: from top to bottom
JSON in Solr: from top to bottom
Alexandre Rafalovitch
 
Dynamic input tables lwc vs aura vs. visualforce
Dynamic input tables  lwc vs aura vs. visualforceDynamic input tables  lwc vs aura vs. visualforce
Dynamic input tables lwc vs aura vs. visualforce
Mike Tetlow
 
Lightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An IntroductionLightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An Introduction
Salesforce Developers
 
SharePoint Framework 101 (SPFx)
SharePoint Framework 101 (SPFx)SharePoint Framework 101 (SPFx)
SharePoint Framework 101 (SPFx)
Matthew J. Bailey , MCT
 
Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce administrator training presentation slides
Salesforce administrator training presentation slides
Salesforce Associates
 
Tips to Crack Job Interview
Tips to Crack Job InterviewTips to Crack Job Interview
Tips to Crack Job Interview
Firm Next
 
Soap and Rest
Soap and RestSoap and Rest
Introduction to SOAP
Introduction to SOAPIntroduction to SOAP
Introduction to SOAP
Hayati Guvence
 
Dynamics 365 CRM Introduction
Dynamics 365 CRM IntroductionDynamics 365 CRM Introduction
Dynamics 365 CRM Introduction
Sanjaya Prakash Pradhan
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
guestf6dc99b
 
Salesforce talk
Salesforce talkSalesforce talk
Salesforce talk
Suvendu Roy
 
7 Job Interview Do's and Don'ts
7 Job Interview Do's and Don'ts7 Job Interview Do's and Don'ts
7 Job Interview Do's and Don'ts
SThree
 
Front end development session1
Front end development session1Front end development session1
Front end development session1
marwa Ayad Mohamed
 

What's hot (20)

Web develop in flask
Web develop in flaskWeb develop in flask
Web develop in flask
 
ASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 ValidationASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 Validation
 
Database design and Development
Database design and DevelopmentDatabase design and Development
Database design and Development
 
Becoming a Salesforce.com Technical Architect
Becoming a Salesforce.com Technical ArchitectBecoming a Salesforce.com Technical Architect
Becoming a Salesforce.com Technical Architect
 
PHP.ppt
PHP.pptPHP.ppt
PHP.ppt
 
PHP Summer Training Presentation
PHP Summer Training PresentationPHP Summer Training Presentation
PHP Summer Training Presentation
 
PHP Frameworks and CodeIgniter
PHP Frameworks and CodeIgniterPHP Frameworks and CodeIgniter
PHP Frameworks and CodeIgniter
 
JSON in Solr: from top to bottom
JSON in Solr: from top to bottomJSON in Solr: from top to bottom
JSON in Solr: from top to bottom
 
Dynamic input tables lwc vs aura vs. visualforce
Dynamic input tables  lwc vs aura vs. visualforceDynamic input tables  lwc vs aura vs. visualforce
Dynamic input tables lwc vs aura vs. visualforce
 
Lightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An IntroductionLightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An Introduction
 
SharePoint Framework 101 (SPFx)
SharePoint Framework 101 (SPFx)SharePoint Framework 101 (SPFx)
SharePoint Framework 101 (SPFx)
 
Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce administrator training presentation slides
Salesforce administrator training presentation slides
 
Tips to Crack Job Interview
Tips to Crack Job InterviewTips to Crack Job Interview
Tips to Crack Job Interview
 
Soap and Rest
Soap and RestSoap and Rest
Soap and Rest
 
Introduction to SOAP
Introduction to SOAPIntroduction to SOAP
Introduction to SOAP
 
Dynamics 365 CRM Introduction
Dynamics 365 CRM IntroductionDynamics 365 CRM Introduction
Dynamics 365 CRM Introduction
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Salesforce talk
Salesforce talkSalesforce talk
Salesforce talk
 
7 Job Interview Do's and Don'ts
7 Job Interview Do's and Don'ts7 Job Interview Do's and Don'ts
7 Job Interview Do's and Don'ts
 
Front end development session1
Front end development session1Front end development session1
Front end development session1
 

Viewers also liked

HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
Andrey Karpov
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
Andrey Karpov
 
Data Protector 9.07 what is new
Data Protector 9.07 what is new Data Protector 9.07 what is new
Data Protector 9.07 what is new
Andrey Karpov
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
Andrey Karpov
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
Andrey Karpov
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
Andrey Karpov
 
HPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators GuideHPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators Guide
Andrey Karpov
 
Краткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нреКраткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нре
Andrey Karpov
 
Hpe Zero Downtime Administrator's Guide
Hpe Zero Downtime Administrator's GuideHpe Zero Downtime Administrator's Guide
Hpe Zero Downtime Administrator's Guide
Andrey Karpov
 
Hpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery GuideHpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery Guide
Andrey Karpov
 
hpe manual data protector 9.07 granular extension guides
hpe manual data protector 9.07 granular extension guideshpe manual data protector 9.07 granular extension guides
hpe manual data protector 9.07 granular extension guides
Andrey Karpov
 
Idol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_enIdol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_en
Andrey Karpov
 
Vertica on Amazon Web Services
Vertica on Amazon Web ServicesVertica on Amazon Web Services
Vertica on Amazon Web Services
Andrey Karpov
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
Andrey Karpov
 
2016 06 VMEx - intro (russian)
2016 06 VMEx - intro (russian)2016 06 VMEx - intro (russian)
2016 06 VMEx - intro (russian)
Andrey Karpov
 
Hp distributed R User Guide
Hp distributed R User GuideHp distributed R User Guide
Hp distributed R User Guide
Andrey Karpov
 

Viewers also liked (16)

HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
 
Data Protector 9.07 what is new
Data Protector 9.07 what is new Data Protector 9.07 what is new
Data Protector 9.07 what is new
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 
HPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators GuideHPE Vertica_7.0.x Administrators Guide
HPE Vertica_7.0.x Administrators Guide
 
Краткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нреКраткий обзор аппаратных платформ 2016 нре
Краткий обзор аппаратных платформ 2016 нре
 
Hpe Zero Downtime Administrator's Guide
Hpe Zero Downtime Administrator's GuideHpe Zero Downtime Administrator's Guide
Hpe Zero Downtime Administrator's Guide
 
Hpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery GuideHpe Data Protector Disaster Recovery Guide
Hpe Data Protector Disaster Recovery Guide
 
hpe manual data protector 9.07 granular extension guides
hpe manual data protector 9.07 granular extension guideshpe manual data protector 9.07 granular extension guides
hpe manual data protector 9.07 granular extension guides
 
Idol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_enIdol server 11.0.0_release_notes_en
Idol server 11.0.0_release_notes_en
 
Vertica on Amazon Web Services
Vertica on Amazon Web ServicesVertica on Amazon Web Services
Vertica on Amazon Web Services
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
 
2016 06 VMEx - intro (russian)
2016 06 VMEx - intro (russian)2016 06 VMEx - intro (russian)
2016 06 VMEx - intro (russian)
 
Hp distributed R User Guide
Hp distributed R User GuideHp distributed R User Guide
Hp distributed R User Guide
 

Similar to Hpe Data Protector integration guide

Hpe man dp10.00_getting_started_pdf
Hpe man dp10.00_getting_started_pdfHpe man dp10.00_getting_started_pdf
Hpe man dp10.00_getting_started_pdf
KimHuu
 
Adaptive backup & Recovery partner enablement
Adaptive backup & Recovery partner enablementAdaptive backup & Recovery partner enablement
Adaptive backup & Recovery partner enablement
Juan Niekerk
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
protect724rkeer
 
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in ProductionUpgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
Cloudera, Inc.
 
Save time completing backups and restores with a Dell PowerProtect Data Manag...
Save time completing backups and restores with a Dell PowerProtect Data Manag...Save time completing backups and restores with a Dell PowerProtect Data Manag...
Save time completing backups and restores with a Dell PowerProtect Data Manag...
Principled Technologies
 
Gp Installation Presentation
Gp Installation PresentationGp Installation Presentation
Gp Installation Presentationddauphin
 
Gp Installation Presentation
Gp Installation PresentationGp Installation Presentation
Gp Installation Presentation
guest2fc298
 
Backup Navigator install and configuration guide
Backup Navigator install and configuration guideBackup Navigator install and configuration guide
Backup Navigator install and configuration guide
Andrey Karpov
 
John
JohnJohn
Replay Solutions CFD
Replay Solutions CFDReplay Solutions CFD
Replay Solutions CFD
kilroy440
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
Acend Corporate Learning
 
2014 cf summit_clustering
2014 cf summit_clustering2014 cf summit_clustering
2014 cf summit_clustering
ColdFusionConference
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital world
Veritas Technologies LLC
 
Sage 100 ERP 2014 Adminstrator's Guide
Sage 100 ERP 2014 Adminstrator's GuideSage 100 ERP 2014 Adminstrator's Guide
Sage 100 ERP 2014 Adminstrator's Guide
90 Minds Consulting Group
 
ESM_CommandCenterGuide_6.9.0.pdf
ESM_CommandCenterGuide_6.9.0.pdfESM_CommandCenterGuide_6.9.0.pdf
ESM_CommandCenterGuide_6.9.0.pdf
Protect724v2
 
EnterpriseView 2.0 Release Notes.pdf
EnterpriseView 2.0 Release Notes.pdfEnterpriseView 2.0 Release Notes.pdf
EnterpriseView 2.0 Release Notes.pdf
Protect724gopi
 
EnterpriseView 2.0 User Guide
EnterpriseView 2.0 User GuideEnterpriseView 2.0 User Guide
EnterpriseView 2.0 User Guide
Protect724gopi
 
ArcSight Enterprise View User Guide
ArcSight Enterprise View User GuideArcSight Enterprise View User Guide
ArcSight Enterprise View User Guide
Protect724gopi
 
HP EnterpriseView v1.5 User Guide
HP EnterpriseView v1.5 User GuideHP EnterpriseView v1.5 User Guide
HP EnterpriseView v1.5 User Guide
Protect724gopi
 
HP ArcSight EnterpriseView Release Notes
HP ArcSight EnterpriseView Release NotesHP ArcSight EnterpriseView Release Notes
HP ArcSight EnterpriseView Release Notes
Protect724gopi
 

Similar to Hpe Data Protector integration guide (20)

Hpe man dp10.00_getting_started_pdf
Hpe man dp10.00_getting_started_pdfHpe man dp10.00_getting_started_pdf
Hpe man dp10.00_getting_started_pdf
 
Adaptive backup & Recovery partner enablement
Adaptive backup & Recovery partner enablementAdaptive backup & Recovery partner enablement
Adaptive backup & Recovery partner enablement
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
 
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in ProductionUpgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in Production
 
Save time completing backups and restores with a Dell PowerProtect Data Manag...
Save time completing backups and restores with a Dell PowerProtect Data Manag...Save time completing backups and restores with a Dell PowerProtect Data Manag...
Save time completing backups and restores with a Dell PowerProtect Data Manag...
 
Gp Installation Presentation
Gp Installation PresentationGp Installation Presentation
Gp Installation Presentation
 
Gp Installation Presentation
Gp Installation PresentationGp Installation Presentation
Gp Installation Presentation
 
Backup Navigator install and configuration guide
Backup Navigator install and configuration guideBackup Navigator install and configuration guide
Backup Navigator install and configuration guide
 
John
JohnJohn
John
 
Replay Solutions CFD
Replay Solutions CFDReplay Solutions CFD
Replay Solutions CFD
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 
2014 cf summit_clustering
2014 cf summit_clustering2014 cf summit_clustering
2014 cf summit_clustering
 
Get your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital worldGet your enterprise backup strategy ready for the digital world
Get your enterprise backup strategy ready for the digital world
 
Sage 100 ERP 2014 Adminstrator's Guide
Sage 100 ERP 2014 Adminstrator's GuideSage 100 ERP 2014 Adminstrator's Guide
Sage 100 ERP 2014 Adminstrator's Guide
 
ESM_CommandCenterGuide_6.9.0.pdf
ESM_CommandCenterGuide_6.9.0.pdfESM_CommandCenterGuide_6.9.0.pdf
ESM_CommandCenterGuide_6.9.0.pdf
 
EnterpriseView 2.0 Release Notes.pdf
EnterpriseView 2.0 Release Notes.pdfEnterpriseView 2.0 Release Notes.pdf
EnterpriseView 2.0 Release Notes.pdf
 
EnterpriseView 2.0 User Guide
EnterpriseView 2.0 User GuideEnterpriseView 2.0 User Guide
EnterpriseView 2.0 User Guide
 
ArcSight Enterprise View User Guide
ArcSight Enterprise View User GuideArcSight Enterprise View User Guide
ArcSight Enterprise View User Guide
 
HP EnterpriseView v1.5 User Guide
HP EnterpriseView v1.5 User GuideHP EnterpriseView v1.5 User Guide
HP EnterpriseView v1.5 User Guide
 
HP ArcSight EnterpriseView Release Notes
HP ArcSight EnterpriseView Release NotesHP ArcSight EnterpriseView Release Notes
HP ArcSight EnterpriseView Release Notes
 

More from Andrey Karpov

HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016
Andrey Karpov
 
HPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manualHPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manual
Andrey Karpov
 
Резервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данныхРезервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данных
Andrey Karpov
 
Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Transform IT Service Delivery Helion
Transform IT Service Delivery Helion
Andrey Karpov
 
Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016
Andrey Karpov
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentation
Andrey Karpov
 
IDOL presentation
IDOL presentationIDOL presentation
IDOL presentation
Andrey Karpov
 
Short Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe VerticaShort Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe Vertica
Andrey Karpov
 
Connectivity to business outcomes
Connectivity to business outcomesConnectivity to business outcomes
Connectivity to business outcomes
Andrey Karpov
 
Flex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.xFlex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.x
Andrey Karpov
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information Governance
Andrey Karpov
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Management
Andrey Karpov
 
HPE Software Catalogue 2015 Ru
HPE Software Catalogue 2015 RuHPE Software Catalogue 2015 Ru
HPE Software Catalogue 2015 Ru
Andrey Karpov
 
TDWI BP Report Emerging Technologies
TDWI BP Report Emerging TechnologiesTDWI BP Report Emerging Technologies
TDWI BP Report Emerging Technologies
Andrey Karpov
 
Описание архитектуры СУБД HP Vertica
Описание архитектуры СУБД HP VerticaОписание архитектуры СУБД HP Vertica
Описание архитектуры СУБД HP Vertica
Andrey Karpov
 

More from Andrey Karpov (15)

HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016
 
HPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manualHPE VM Explorer 6 1 user manual
HPE VM Explorer 6 1 user manual
 
Резервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данныхРезервное копирование и оптимизация хранения данных
Резервное копирование и оптимизация хранения данных
 
Transform IT Service Delivery Helion
Transform IT Service Delivery Helion Transform IT Service Delivery Helion
Transform IT Service Delivery Helion
 
Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016Конференция по программным решениям HPE 2016
Конференция по программным решениям HPE 2016
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentation
 
IDOL presentation
IDOL presentationIDOL presentation
IDOL presentation
 
Short Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe VerticaShort Infrastructure Overview ru hpe Vertica
Short Infrastructure Overview ru hpe Vertica
 
Connectivity to business outcomes
Connectivity to business outcomesConnectivity to business outcomes
Connectivity to business outcomes
 
Flex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.xFlex Tables Guide Software V. 7.0.x
Flex Tables Guide Software V. 7.0.x
 
HPE Information Governance
HPE Information GovernanceHPE Information Governance
HPE Information Governance
 
Enterprise Content Management
Enterprise Content ManagementEnterprise Content Management
Enterprise Content Management
 
HPE Software Catalogue 2015 Ru
HPE Software Catalogue 2015 RuHPE Software Catalogue 2015 Ru
HPE Software Catalogue 2015 Ru
 
TDWI BP Report Emerging Technologies
TDWI BP Report Emerging TechnologiesTDWI BP Report Emerging Technologies
TDWI BP Report Emerging Technologies
 
Описание архитектуры СУБД HP Vertica
Описание архитектуры СУБД HP VerticaОписание архитектуры СУБД HP Vertica
Описание архитектуры СУБД HP Vertica
 

Recently uploaded

The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
2023240532
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 

Recently uploaded (20)

The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 

Hpe Data Protector integration guide

  • 1. HPE Data Protector Software Version: 9.07 Integration Guide Document Release Date: June 2016 Software Release Date: June 2016
  • 2. Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development LP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Valid license from HPE required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2016 Hewlett Packard Enterprise Development LP Trademark Notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. This product includes an interface of the 'zlib' general purpose compression library, which is Copyright © 1995-2002 Jean-loup Gailly and Mark Adler. Documentation Updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for recent updates or to verify that you are using the most recent edition of a document, go to: https://softwaresupport.hp.com This site requires that you register for an HPE Passport and sign in. To register for an HPE Passport ID, go to: https://hpp12.passport.hp.com/hppcf/createuser.do Or click the Register link at the top of the HPE Software Support page. You will also receive updated or new editions if you subscribe to the appropriate product support service. Contact your HPE sales representative for details. Support Visit the HPE Software Support Online web site at: https://softwaresupport.hp.com This web site provides contact information and details about the products, services, and support that HPE Software offers. HPE Software online support provides customer self-solve capabilities. It provides a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the support web site to: Integration Guide HPE Data Protector (9.07) Page 2 of 803
  • 3. l Search for knowledge documents of interest l Submit and track support cases and enhancement requests l Download software patches l Manage support contracts l Look up HPE support contacts l Review information about available services l Enter into discussions with other software customers l Research and register for software training Most of the support areas require that you register as an HPE Passport user and sign in. Many also require a support contract. To register for an HPE Passport ID, go to: https://hpp12.passport.hp.com/hppcf/createuser.do To find more information about access levels, go to: https://softwaresupport.hp.com/web/softwaresupport/access-levels HPE Software Solutions Now accesses the HPESW Solution and Integration Portal Web site. This site enables you to explore HPE Product Solutions to meet your business needs, includes a full list of Integrations between HPE Products, as well as a listing of ITIL Processes. The URL for this Web site is http://h20230.www2.hp.com/sc/solutions/index.jsp Integration Guide HPE Data Protector (9.07) Page 3 of 803
  • 4. Contents About this guide 26 Part 1: IBM Applications 27 Chapter 1: Data Protector Informix Server integration 28 Introduction 28 Integration concepts 29 Configuring the integration 30 Prerequisites 30 Before you begin 30 Cluster-aware clients 31 Configuring Informix Server users 31 Configuring Informix instances 31 Before you begin 31 Using the Data Protector GUI 31 Using the Data Protector CLI 34 Handling errors 35 Checking the configuration 36 Using the Data Protector GUI 36 Using the Data Protector CLI 36 Backup 37 What you must back up as filesystem 37 What does not need to be backed up? 37 Creating backup specifications 38 Modifying backup specifications 43 Scheduling backup sessions 44 Scheduling example 44 Previewing backup sessions 45 Using the Data Protector GUI 45 Using the Data Protector CLI 45 What happens during the preview? 46 Starting backup sessions 47 Backup methods 47 Before you begin 47 Using the Data Protector GUI 48 Using the Data Protector CLI 48 Using Informix Server commands 48 Using Informix Server log_full.sh on UNIX 50 Manual and continuous logical log backups 50 Restore 50 Restore methods 51 Integration Guide HPE Data Protector (9.07) Page 4 of 803
  • 5. Before you begin 51 Finding information for restore 51 Using the Data Protector GUI 51 Using the Data Protector CLI 52 Restoring using the Data Protector GUI 54 Restoring using the Data Protector CLI 57 Restoring using Informix Server commands 58 Restoring dbspaces, blobspaces, and logical logs 58 Restoring dbspaces and blobspaces only 58 Restoring a particular dbspace or blobspace 58 Restoring to another Informix Server 58 Restoring using another device 59 Using the Data Protector GUI 59 Using the Data Protector CLI or Informix Server commands 59 Monitoring sessions 60 Troubleshooting 60 Before you begin 60 Checks and verifications 60 Checking the Informix Server side 63 Problems 64 Chapter 2: Data Protector DB2 UDB integration 66 Introduction 66 Integration concepts 67 Considerations 68 Configuring the integration 68 Prerequisites 69 Before you begin 69 Cluster-aware clients 69 Partitioned environment 69 Configuring DB2 users 69 Configuring DB2 instances 70 Before you begin 70 Using the Data Protector GUI 70 Using the Data Protector CLI 71 Checking the configuration 72 Using the Data Protector GUI 72 Using the Data Protector CLI 72 Backup 72 Physically partitioned environment 73 Creating backup specifications 74 Modifying backup specifications 77 Scheduling backup sessions 77 Previewing backup sessions 78 Using the Data Protector GUI 78 Using the Data Protector CLI 78 What happens during the preview? 79 Integration Guide HPE Data Protector (9.07) Page 5 of 803
  • 6. Starting backup sessions 79 Before you begin 79 Using the Data Protector GUI 79 Using the Data Protector CLI 80 Starting backups of physically partitioned DB2 objects 80 Restore 80 Restoring using the Data Protector GUI 81 Restoring using the Data Protector CLI 86 Restoring to a new database or another DB2 instance 87 Restore in a partitioned environment 90 Restoring to the original database 91 Corrupt database 91 Physically partitioned environment 91 Logically partitioned environment 91 Restoring to a new database or another instance 91 Monitoring sessions 92 DB2 Pruning 92 Troubleshooting 93 Before you begin 94 Checks and verifications 94 Problems 94 Chapter 3: Data Protector Lotus Notes/Domino Server integration 100 Introduction 100 Integration concepts 101 Lotus Domino Cluster 102 Replicas 102 Replication in a cluster 103 Failover in a cluster 103 Example 103 Configuring the integration 104 Prerequisites 105 Before you begin 105 Transaction logging of Lotus Notes/Domino Server 105 Enabling transaction logging 106 Configuring Lotus Notes/Domino Server users 107 Configuring Lotus Notes/Domino Server systems 107 Using the Data Protector GUI 107 Using the Data Protector CLI 109 Checking the configuration 110 Using the Data Protector GUI 110 Using the Data Protector CLI 110 Handling errors 111 Backup 111 What is backed up? 112 What is not backed up? 112 Considerations 112 Integration Guide HPE Data Protector (9.07) Page 6 of 803
  • 7. Creating backup specifications 113 Modifying backup specifications 115 Scheduling backup sessions 115 Scheduling example 115 Previewing backup sessions 116 Using the Data Protector GUI 116 Using the Data Protector CLI 116 What happens during the preview? 117 Starting backup sessions 117 Using the Data Protector GUI 117 Restore 117 Finding information for restore 118 Using the Data Protector GUI 118 Using the Data Protector CLI 119 Restoring using the Data Protector GUI 119 Restoring using the Data Protector CLI 121 Restore options 122 Restore in Lotus Domino Cluster environment 123 Restoring a replica database without recovery 123 Restoring with recovery to the latest possible state 124 Point-in-time recovery 124 Restoring to a new location 125 Performance tuning 125 Monitoring sessions 125 Troubleshooting 125 Before you begin 126 Checking the Lotus Notes/Domino Server side 126 Checks and verifications 126 Problems 128 Part 2: Microsoft Applications 132 Chapter 4: Data Protector Microsoft SQL Server integration 133 Introduction 133 Integration concepts 134 Parallelism 135 Configuring the integration 136 Prerequisites 136 Before you begin 137 Data Protector SQL Server configuration file 137 Configuring users 138 Configuring an SQL Server cluster 139 Configuring SQL Server instances 139 Using the Data Protector GUI 139 Using the Data Protector CLI 142 Changing and checking configuration 143 Integration Guide HPE Data Protector (9.07) Page 7 of 803
  • 8. Using the Data Protector GUI 143 Using the Data Protector CLI 144 Backup 145 Creating backup specifications 145 SQL Server-specific backup options 150 Object-specific options 153 Scheduling backups 155 Scheduling example 155 Starting backup sessions 155 Using the Data Protector GUI 156 Restore 156 Before you begin 156 Restoring using the Data Protector GUI 156 Restore options 161 Restoring to a different SQL Server instance or/and different SQL Server 162 Restoring using the Data Protector CLI 163 Disaster recovery 164 Recovering the master database 165 Recovering user databases 165 Performance tuning 166 Monitoring sessions 169 Troubleshooting 169 Before you begin 169 Checks and verifications 169 Problems 170 Chapter 5: Data Protector Microsoft SharePoint Server 2007/2010/2013 integration 175 Introduction 175 Integration concepts 176 Configuring the integration 179 Prerequisites 179 Before you begin 179 Configuring user accounts 179 Backup 180 Backup concepts 181 Backup types 182 Creating backup specifications 182 Modifying backup specifications 186 Scheduling backup sessions 186 Scheduling example 186 Previewing backup sessions 187 Using the Data Protector GUI 187 Using the Data Protector CLI 187 What happens during the preview? 188 Starting backup sessions 188 Before you begin 188 Using the Data Protector GUI 188 Integration Guide HPE Data Protector (9.07) Page 8 of 803
  • 9. Using the Data Protector CLI 188 Preparing for disaster recovery 189 Restore 190 Restore concepts 190 Before you begin 192 Restoring using the Data Protector GUI 192 Restore options 200 Restoring using the Data Protector CLI 205 Disaster recovery 207 Monitoring sessions 207 Troubleshooting 207 Before you begin 207 Checks and verifications 208 Problems 208 Chapter 6: Data Protector Microsoft SharePoint Server Server VSS based solution 211 Introduction 211 Backup 211 Limitations 212 Restore 212 Installation and configuration 212 Licensing 212 Installing the integration 212 Configuring the integration 214 Configuring user accounts 214 Backup 215 Prerequisites 215 Limitations 215 Recommendations 215 How the command works 216 Microsoft Office SharePoint Server 2007 216 Microsoft SharePoint Server 2010 217 Microsoft SharePoint Server 2013 218 Considerations 218 The command syntax 218 Option description 219 Starting Windows PowerShell 222 Creating backup specifications (examples) 223 Modifying backup specifications 224 Source page 224 Destination page 225 Options page 225 Starting backup sessions (examples) 225 Scheduling backup sessions 228 Restore 229 Before you begin 230 Restoring data 231 Integration Guide HPE Data Protector (9.07) Page 9 of 803
  • 10. Considerations 231 Prerequisites 232 Restoring using the Data Protector GUI 232 Restoring using the Data Protector CLI 234 Limitations 234 After the restore 234 Restoring index files on the Query system 235 Troubleshooting 235 Before you begin 235 Checks and verifications 236 After restore, you cannot connect to the Central Administration webpage 236 Backup fails with the error Failed to resume Service Windows SharePoint Services Help Search 236 After restore, a quiesce operation fails 237 After restore, you cannot connect to the FAST Search Server 237 The SharePoint_VSS_backup.ps1 script stops responding and the farm stays in read only mode 238 SharePoint Search service application not operational after restore 238 Chapter 7: Data Protector Microsoft Exchange Server 2007 integration 241 Introduction 241 Integration concepts 241 Configuring the integration 242 Prerequisites 242 Limitations 243 Before you begin 243 Backup 243 Configuring Exchange Server Backup 244 Creating backup specifications 244 Exchange Server specific backup options 247 Scheduling backups 248 Scheduling example 248 Starting backup sessions 249 Using the Data Protector GUI 249 Restore 249 Restoring using the GUI 250 Restoring to another client 254 Restoring using the CLI 255 Troubleshooting 256 Before you begin 256 Checks and verifications 256 Problems 257 Chapter 8: Data Protector Microsoft Exchange Server 2010+ integration 261 Introduction 261 Integration concepts 262 Supported environments 262 Standalone environments 262 Integration Guide HPE Data Protector (9.07) Page 10 of 803
  • 11. DAG environments 262 Configuring the integration 264 Prerequisites 264 Limitations 265 Before you begin 265 Configuring user accounts 265 Windows domain user account for backup and restore sessions 265 User account for executing Exchange Management cmdlet operations 266 Backup 266 Backup types 267 Microsoft Exchange Server backup types 267 Backup parallelism 267 Backup considerations 268 Object operations considerations 268 Creating backup specifications 269 Modifying backup specifications 277 Scheduling backup sessions 277 Scheduling example 277 Previewing backup sessions 278 Using the Data Protector GUI 278 Using the Data Protector CLI 278 What happens during the preview? 279 Starting backup sessions 279 Using the Data Protector GUI 279 Using the Data Protector CLI 279 Backup objects 280 Restore 280 Restore methods 281 Repair all passive copies with failed status 281 Restore to the latest state 281 Restore to a point in time 282 Restore to a new mailbox database 282 Restore files to a temporary location 282 Restore destination 282 Restoring to a standalone database 283 Restoring to an active copy 283 Restoring to a passive copy 283 Restoring data to a new database 283 Restoring data to a temporary location 284 Restore chain 284 Restore parallelism 284 Finding information for restore 285 Using the Data Protector GUI 285 Using the Data Protector CLI 285 Restore procedure 285 Restoring using the Data Protector GUI 286 Integration Guide HPE Data Protector (9.07) Page 11 of 803
  • 12. Restoring using the Data Protector CLI 292 Restoring using another device 295 Restore options 295 Monitoring sessions 300 Troubleshooting 300 Before you begin 300 Checks and verifications 301 Problems 301 Chapter 9: Data Protector Microsoft Exchange Single Mailbox integration 305 Introduction 305 Integration concepts 306 Configuring the integration 307 Prerequisites 307 Limitations 307 Before you begin 307 Cluster-aware clients 307 Configuring Exchange Server users 308 Configuring Exchange servers 308 Checking the configuration 309 Backup 309 Creating backup specifications 310 Modifying backup specifications 313 Scheduling backup sessions 314 Scheduling example 314 Previewing backup sessions 315 Using the Data Protector GUI 315 Using the Data Protector CLI 315 What happens during the preview? 315 Starting backup sessions 315 Using the Data Protector GUI 315 Using the Data Protector CLI 316 Restore 316 Before you begin 316 Restoring using the Data Protector GUI 316 Restoring using the Data Protector CLI 322 Restore examples 323 Monitoring sessions 324 Performance tuning 324 Troubleshooting 326 Before you begin 326 Checks and verifications 326 Problems 327 Part 3: Oracle and SAP 331 Chapter 10: Data Protector Oracle Server integration 332 Integration Guide HPE Data Protector (9.07) Page 12 of 803
  • 13. Introduction 332 Integration concepts 333 Configuring the integration 337 Prerequisites 337 Limitations 338 Before you begin 338 Cluster-aware systems 339 Linking Oracle Server with the Data Protector MML 339 Linking on HP OpenVMS systems 340 Configuring Oracle user accounts 340 Configuring Oracle operating system user accounts 340 Clusters 341 Configuring Oracle database user accounts 341 Configuring user accounts on HP OpenVMS systems 342 Configuring Oracle databases 343 Using the Data Protector GUI 344 Using the Data Protector CLI 346 Configuring multiple Oracle databases simultaneously 348 XLS files 350 CSV files 350 Checking the configuration 352 Using the Data Protector GUI 352 Using the Data Protector CLI 352 Handling errors 353 Setting environment variables 353 Using the Data Protector GUI 354 Using the Data Protector CLI 355 Backup 355 Creating new templates 356 Creating backup specifications 356 Examples of pre-exec and post-exec scripts on UNIX systems 363 Editing the Oracle RMAN script 364 Creating copies of backed up objects 367 Testing the integration 367 Testing using the Data Protector GUI 367 Testing using the CLI 368 Starting backup sessions 369 Scheduling backup sessions 371 Running an interactive backup 372 Starting a backup using the GUI 372 Starting a backup using the CLI 373 Starting Oracle backup using RMAN 374 Examples of the RMAN scripts 376 Restore 380 Prerequisites 382 Restoring Oracle using the Data Protector GUI 382 Integration Guide HPE Data Protector (9.07) Page 13 of 803
  • 14. Restoring database items in a disaster recovery 382 Changing the database state 382 Restoring the recovery catalog database 383 Restoring the control file 384 Restoring Oracle database objects 386 Restoring tablespaces and datafiles 390 Restoring and recovering an Oracle database in Oracle Data Guard environment 390 Restoring and recovering a primary database 390 Restoring and recovering a standby database 390 Duplicating an Oracle database 391 Restore, recovery, and duplicate options 393 Restore action options 393 General options 394 Duplicate options 395 Restore and recovery options 395 Restoring Oracle using RMAN 397 Preparing the Oracle database for restore 397 Connection strings used in the examples 399 SBT_LIBRARY parameter 399 Example of full database restore and recovery 399 Example of point-in-time restore 400 Example of tablespace restore and recovery 401 Example of datafile restore and recovery 403 Example of archive log restore 405 Example of database restore using a different device (with the automatic device selection functionality disabled) 406 Restoring using another device 406 Disaster recovery 407 Monitoring sessions 408 Monitoring current sessions 408 Viewing previous sessions 409 Resuming sessions 409 Using the Data Protector GUI 411 Using the Data Protector CLI 412 Aborting sessions 413 Oracle RMAN metadata and Data Protector Media Management Database synchronization 413 Troubleshooting 414 Before you begin 414 Checks and verifications 414 Problems 419 Chapter 11: Data Protector MySQL integration 424 Introduction 424 Integration concepts 425 Configuring the integration 426 Prerequisites 427 Integration Guide HPE Data Protector (9.07) Page 14 of 803
  • 15. Configuration steps 427 Checking the configuration 429 Backup 429 Limitations 429 Considerations 430 Creating backup specifications 430 Application-specific backup options 433 Modifying backup specifications 434 Scheduling backup sessions 435 Starting backup sessions 435 Restore 435 Limitations 435 Considerations 435 Finding information needed for restore 436 Using the Data Protector GUI 436 Using the Data Protector CLI 436 Restoring using the Data Protector GUI 436 Restoring using the Data Protector CLI 439 MySQL data migration 440 MySQL restore options 440 Monitoring and reviewing sessions 443 Troubleshooting 443 Before you begin 444 Checks and verifications 444 Chapter 12: Data Protector SAP R/3 integration 445 Introduction 445 Integration concepts 446 Backup flow 449 Restore flow 450 Data Protector SAP R/3 configuration file 451 Setting, retrieving, listing, and deleting Data Protector SAP R/3 configuration file parameters using the CLI 453 Configuring the integration 455 Prerequisites 456 Before you begin 456 Cluster-aware clients 457 Configuring user accounts 457 Checking the connection 458 Authentication password file 458 Enabling archived logging 459 Linking Oracle Server with the Data Protector MML 460 Choosing authentication mode 460 Configuring SAP R/3 databases 461 Before you begin 461 Using the Data Protector GUI 461 Using the Data Protector CLI 464 Integration Guide HPE Data Protector (9.07) Page 15 of 803
  • 16. Handling errors 465 Checking the configuration 466 Using the Data Protector GUI 466 Using the Data Protector CLI 466 Backup 467 Considerations 469 Creating backup specifications 469 Modifying backup specifications 474 Scheduling backup sessions 474 Scheduling example 474 Previewing backup sessions 475 Using the Data Protector GUI 475 Using the Data Protector CLI 475 What happens during the preview? 475 Starting backup sessions 476 Backup methods 476 Using the Data Protector GUI 476 Using the Data Protector CLI 476 Using the SAP BRTOOLS 476 Backing up using Oracle Recovery Manager 478 Manual balancing 478 Restore 479 Considerations 479 Restoring using the Data Protector GUI 479 Restoring using the Data Protector CLI 481 Restoring using the SAP commands 482 Restoring using another device 483 Using the Data Protector GUI 483 Using the Data Protector CLI or SAP commands 483 Localized SAP R/3 objects 483 Sparse files 484 Disaster recovery 484 Restoring the control file 484 Monitoring sessions 484 Troubleshooting 485 Before you begin 485 General troubleshooting 485 Troubleshooting on Windows systems 486 Prerequisites concerning the Oracle side of the integration 486 Prerequisites on the SAP side of the integration 487 Configuration problems 488 Backup problems 491 Restore problems 492 Troubleshooting on UNIX systems 493 Prerequisites concerning the Oracle side of the integration 493 Prerequisites on the SAP side of the integration 496 Integration Guide HPE Data Protector (9.07) Page 16 of 803
  • 17. Configuration problems 497 Backup problems 498 Restore problems 499 Chapter 13: Data Protector SAP MaxDB integration 503 Introduction 503 Integration concepts 504 Backup flow 505 Restore flow 505 Configuring the integration 505 Prerequisites 506 Limitations 506 Before you begin 506 Cluster-aware clients 506 Configuring SAP MaxDB users 506 Configuring SAP MaxDB instances 507 Before you begin 507 Using the Data Protector GUI 507 Using the Data Protector CLI 509 Handling errors 510 Checking the configuration 510 Using the Data Protector GUI 510 Using the Data Protector CLI 510 Backup 511 Creating backup specifications 511 Modifying backup specifications 513 Scheduling backup sessions 513 Scheduling example 514 Previewing backup sessions 514 Using the Data Protector GUI 515 Using the Data Protector CLI 515 What happens during the preview? 515 Starting backup sessions 515 Backup methods 515 Using the Data Protector GUI 516 Using the Data Protector CLI 516 Using SAP MaxDB utilities 516 Restore 519 Restore and recovery overview 519 Before you begin 521 Restoring using the Data Protector GUI 522 Restoring using the Data Protector CLI 523 Restoring using SAP MaxDB utilities 524 SAP MaxDB restore and recovery 525 SAP MaxDB migration 528 Finding information for restore 528 SAP MaxDB restore options 528 Integration Guide HPE Data Protector (9.07) Page 17 of 803
  • 18. Restoring using another device 531 Using the Data Protector GUI 532 Using the Data Protector CLI or SAP commands 532 Monitoring sessions 532 Troubleshooting 532 Before you begin 532 Problems 533 SAP MaxDB cluster-related troubleshooting 535 Chapter 14: Data Protector SAP HANA Appliance integration 537 Introduction 537 Integration concepts 538 Integration limitations 539 Configuring the integration 540 Prerequisites 540 Configuration steps 540 Linking Data Protector backint agent with SAP HANA Appliance 540 Adjusting SAP HANA backup settings for redo logs 541 Backup 541 Creating backup specifications 542 Creating Data Protector parameter files for SAP HANA 544 Modifying backup specifications 545 Starting backup sessions 545 SAP HANA backup catalog 545 Restore 546 Finding information for restore 546 Starting restore and recovery sessions 546 Prerequisites 546 Restoring using another device 547 Using the Data Protector GUI 547 Using the Data Protector CLI or SAP commands 547 Recovering a system to a different machine and SystemID (SID) 547 Prerequisites 547 Recovering a system to different machine and same SystemID (SID) 548 Prerequisites 548 Recovering a system to same SystemID without catalog 549 Monitoring sessions 550 Troubleshooting 550 Before you begin 550 Problems 551 Part 4: Sybase and Network Data Management Protocol Server 555 Chapter 15: Data Protector Sybase Server integration 556 Introduction 556 Integration concepts 556 Data Protector CLI commands 557 Integration Guide HPE Data Protector (9.07) Page 18 of 803
  • 19. Configuring the integration 558 Prerequisites 558 Before you begin 558 Cluster-aware clients 559 Configuring Sybase users 559 Configuring Sybase instances 559 Before you begin 559 Using the Data Protector GUI 559 Using the Data Protector CLI 562 Checking the configuration 562 Using the Data Protector GUI 562 Using the Data Protector CLI 563 Backup 563 Creating backup specifications 563 Modifying backup specifications 568 Scheduling backup sessions 568 Previewing backup sessions 569 Using the Data Protector GUI 569 Using the Data Protector CLI 569 What happens during the preview? 570 Starting backup sessions 570 Using the Data Protector GUI 571 Using the Data Protector CLI 571 Using Sybase commands 571 Restore 572 Localized database names 572 Finding information for restore 572 Using the Data Protector GUI 572 Using the Data Protector CLI 572 Using the Data Protector syb_tool command 573 Using the standard Data Protector CLI commands 576 Restoring using the Sybase isql command 578 Restore examples 579 Restoring using another device 581 Monitoring sessions 581 Troubleshooting 581 Before you begin 582 Checks and verifications 582 Problems 583 Chapter 16: Data Protector Sybase IQ integration 586 Introduction 586 Backup 586 Pre-Exec Sybase IQ Backup Command Sample 587 Restore 587 Post-Exec Sybase IQ Restore Command Sample 589 Chapter 17: Data Protector Network Data Management Protocol Server integration 590 Integration Guide HPE Data Protector (9.07) Page 19 of 803
  • 20. Introduction 590 Integration concept 591 Configuring the integration 592 Prerequisites 593 Importing NDMP Server systems 593 Creating media pools 595 Configuring NDMP devices 595 Configuring tape libraries 597 Configuring standalone devices 599 Network Appliance configuration 600 Standalone tape devices and drives in a tape library 600 Library robotics 601 EMC Celerra configuration 602 SCSI devices 602 EMC Isilon configuration 602 Hitachi BlueArc or Hitachi configuration 603 Library robotics 604 Standalone tape devices and drives in a tape library 604 Block size 605 Backup 605 Backup types 605 Before you begin 607 Creating backup specifications 608 Modifying backup specifications 610 Starting backup sessions 610 Restore 611 Restoring using the Data Protector GUI 611 Direct access restore 613 Restoring using another device 614 NDMP environment variables 614 The NDMP specific omnirc options 617 Media management 618 Troubleshooting 619 Before you begin 619 Problems 619 Chapter 18: Data Protector NetApp SnapManager solution 622 Introduction 622 Concepts 622 Configuration 622 Prerequisites 622 Configuration procedure 623 Backup 624 Limitations 624 Creating a backup specification 624 Restore 626 omnisnapmgr.pl reference page 629 Integration Guide HPE Data Protector (9.07) Page 20 of 803
  • 21. SYNOPSIS 629 DESCRIPTION 629 OPTIONS 629 NOTES 630 EXAMPLES 630 Part 5: Virtualization 632 Chapter 19: Data Protector Virtual Environment integration for VMware 633 Introduction 633 Recommendations 634 Integration concepts 634 Supported environments 634 vCenter environment 634 Migration of virtual machines 635 vCenter Server system in a cluster 637 Standalone ESX/ESXi Server environment 637 Data Protector components 637 Data ProtectorCell Manager 637 Data Protector Virtual Environment Integration component 638 Data Protector Disk Agent component 638 Data Protector Media Agents 638 Backup concepts 639 What is backed up? 639 Virtual machines 639 Virtual machine templates 640 vStorage Image backup method 640 vStorage Image + OpenStack backup method 641 General limitations 642 Considerations 642 Snapshot management 642 Backup types 643 Changed block tracking 644 Non-Changed Block Tracking (Non-CBT) backup 646 Quiescence 647 Prerequisites 649 Limitations 649 Considerations for Quiescence Operations 649 Disk space requirements 650 Free space required option 650 Backup disk buffer 651 Backup parallelism 651 Backup considerations 652 Restore concepts 653 Restore of VMware objects backed up with vStorage Image method 653 Restore to a datacenter 653 Integration Guide HPE Data Protector (9.07) Page 21 of 803
  • 22. Restore to a directory 654 Restore of Nova Instances and Shadow VMs backed up with vStorage Image + Openstack method 654 Restore chain 655 Power On and Live Migrate 655 Restore considerations 656 Power On considerations 657 StoreOnce Recovery Manager Central Integration 658 Configuring the integration 660 Recommendations 660 Prerequisites 660 Before you begin 661 Importing and configuring VMware clients 661 Changing the configuration of VMware clients 664 Using the Data Protector GUI 664 Using the Data Protector CLI 665 Checking the configuration of VMware clients 666 Using the Data Protector GUI 666 Using the Data Protector CLI 666 Configuring virtual machines 667 Using the Data Protector GUI 667 Using the Data Protector CLI 670 Customizing the Data Protector behavior with omnirc options 671 Adding the RMC Server details in Data Protector using the Command Line Interface 672 Backup 672 Backup limitations 672 vStorage Image + OpenStack backup method limitations 673 Creating backup specifications 673 Creating backup specifications for RMC backups 678 Modifying backup specifications 681 Scheduling backup sessions 682 Scheduling example 683 Previewing backup sessions 684 Using the Data Protector GUI 684 Using the Data Protector CLI 684 What happens during the preview? 684 Starting backup sessions 684 Using the Data Protector GUI 684 Using the Data Protector CLI 685 Preparing for disaster recovery 685 Restore 686 Restore limitations 686 vStorage Image + OpenStack restore limitations 688 Power On and Live Migrate limitations 688 Finding information for restore 689 Using the Data Protector GUI 689 Integration Guide HPE Data Protector (9.07) Page 22 of 803
  • 23. Using the Data Protector CLI 691 Restoring using the Data Protector GUI 691 Restoring using the Data Protector CLI 703 Recovering virtual machines manually 705 Recovering virtual machines after restore to a directory 706 Recovering with the VM configuration file in the VMX format 706 Recovering with the VM configuration file in the XML format 711 Recovering virtual machines after restore to a datacenter 711 Restoring using another device 712 Cleaning up a datastore after a failed restore 712 Disaster recovery 712 Monitoring sessions 713 Troubleshooting 713 Before you begin 713 Checks and verifications 713 Problems 714 Chapter 20: Data Protector Virtual Environment integration for Microsoft Hyper-V 729 Introduction 729 Integration concepts 730 Supported environments 730 Standalone environments 730 Clustered environments 731 Migration of virtual machines 734 Cluster Shared Volumes 735 Hyper-V Replica 735 Virtual machines on Windows file shares 736 Data Protector installation components 736 Data Protector Cell Manager 736 Data Protector Virtual Environment Integration component 737 Data Protector Disk Agent component 737 Data Protector MS Volume Shadow Copy Integration component 737 Data Protector Media Agent component 737 Backup concepts 737 Hyper-V Image backup method 737 Backup types 739 Microsoft Hyper-V backup types 739 VSS backup types 739 Quiescence 740 Restore chain protection 740 Backup considerations 741 Virtual machine storage 741 Concurrent sessions 741 Cluster Shared Volumes (CSV) 741 Virtual machines on SMB file shares 741 Incremental backup 743 Virtual machine replicas 743 Integration Guide HPE Data Protector (9.07) Page 23 of 803
  • 24. Virtual machine migration 744 ZDB environments 744 Object copy considerations 745 Restore concepts 745 Restore of virtual machines 745 Restore to the default location 745 Restore to a different location 746 Restore to a directory 746 Restore of individual virtual machine disks 746 Prerequisites for disk restore 747 Prerequisites for Backup and Hyper-V hosts 748 Successful restore session flow 750 Restore chain validation 750 Restore considerations 750 Data Protector backup solutions 751 Restore parallelism 751 Restore to a backup host 752 Restore to a different location 752 Restore of virtual machine replicas 752 Virtual machines on Windows shares 753 Configuring the integration 754 Prerequisites 754 Limitations 755 Before you begin 755 Enabling automatic mounting of new volumes on Microsoft Hyper-V systems 755 Configuring Microsoft Hyper-V clusters 755 Importing and configuring Microsoft Hyper-V systems 755 Changing the configuration of Microsoft Hyper-V systems 757 Using the Data Protector GUI 757 Using the Data Protector CLI 758 Customizing the Data Protector behavior with omnirc options 758 Backup 758 Creating backup specifications 758 Modifying backup specifications 763 Scheduling backup sessions 765 Scheduling example 765 Starting backup sessions 766 Using the Data Protector GUI 766 Using the Data Protector CLI 767 Restore 767 Limitations 767 Finding information for restore 768 Using the Data Protector GUI 768 Using the Data Protector CLI 768 Restoring using the Data Protector GUI 769 Restoring using the Data Protector CLI 771 Integration Guide HPE Data Protector (9.07) Page 24 of 803
  • 25. Merging virtual machine snapshots manually 773 Restore of cluster virtual machines 774 Restoring a replicated virtual machine 774 Re-enabling the replication 774 Reverting a restored replica VM to an application-consistent recovery point 775 Restoring using another device 775 Monitoring sessions 775 Troubleshooting 775 Before you begin 775 Checks and verifications 776 Problems 776 Part 6: PostgreSQL 785 Chapter 21: Data Protector PostgreSQL integration 786 Introduction 786 Integration concepts 787 Configuring the integration 788 Prerequisites 789 Before you begin 789 Configuration steps 789 Checking the configuration 791 Backup 791 Prerequisites 791 Backup considerations 791 Creating backup specifications 791 Application-specific backup options 794 Modifying backup specifications 795 Scheduling backup sessions 795 Starting backup sessions 795 Restore 795 Limitations 796 Finding information needed for restore 796 Using the Data Protector GUI 796 Using the Data Protector CLI 796 Before you begin 796 Restoring using the Data Protector GUI 797 Restoring using the Data Protector CLI 798 PostgreSQL data migration 798 PostgreSQL restore options 798 Monitoring and reviewing sessions 800 Troubleshooting 800 Before you begin 800 Checks and verifications 800 Send Documentation Feedback 802 Integration Guide HPE Data Protector (9.07) Page 25 of 803
  • 26. About this guide This guide describes how to configure and use the following: l IBM Informix Server integration, IBM DB2 UDB integration, and IBM Lotus Notes/Domino Server integration. l Microsoft SQL server integration, Microsoft SQL Server 2007/2010/2013 integration, Microsoft SharePoint Server VSS based solution, Microsoft Exchange Server 2007 integration, Microsoft Exchange Server 2010 integration, and Microsoft Exchange Single Mailbox integration. l Oracle Server integration, MySQL integration, SAP R/3 integration, SAP MaxDB integration, and SAP HANA Appliance integration. l Sybase Server integration, Network Data Management Protocol Server integration, and NetApp SnapManager solution. l VMware - Virtual Environment integration and Microsoft Hyper-V - Virtual Environment integration. HPE Data Protector (9.07) Page 26 of 803
  • 27. HPE Data Protector (9.07) Part 1: IBM Applications This part of the guide describes ways to back up and restore Informix Server database objects, DB2 databases, and Lotus Notes/Domino Server. This part includes the following chapters: l Data Protector Informix Server integration l Data Protector DB2 UDB integration l Data Protector Lotus Notes/Domino Server integration
  • 28. Chapter 1: Data Protector Informix Server integration Introduction This chapter explains how to configure and use the Data Protector Informix Server integration. It describes the concepts and methods you need to understand to back up and restore Informix Server database objects (dbobjects). Data Protector integrates with the Informix Dynamic Server (Informix Server) to back up dbobjects online. During backup, a database server (Informix instance) is online and actively used. Data Protector offers interactive and scheduled backups of the following types: Informix Server backup types Backup type Description Full Full backup (level 0). Incr1 Incremental backup (level 1). Backs up changes since the last Full backup. Incr2 Incremental backup (level 2). Backs up changes since the last Incr1 backup. Data Protector offers two types of restore: Informix Server restore types Restore type Description Complete database restore Restore from any backup. ON-Bar restores dbobjects concurrently and replays the logical logs once. Whole-system restore Restore from a whole-system backup. ON-Bar restores the whole system sequentially with or without restoring the logical logs. Whole-system restore is appropriate for small systems, when you do not need to restore logs, for disasterrecovery, or when restoring to another client. You can also back up and restore dbobjects using the Informix Server onbar command. This chapter provides information specific to the Data Protector Informix Server integration. For general Data Protector procedures and options, see the HPE Data Protector Help. HPE Data Protector (9.07) Page 28 of 803
  • 29. Integration concepts Data Protector integrates with the Informix Server through the Data Protector Database Library based on a common library called Data Protector BAR (Backup And Restore). The Data Protector Database Library channels communication between the Data Protector Session Manager, and, via the XBSA interface, the Informix Server ON-Bar utility. "Data Protector Informix Server integration architecture" below shows the architecture of the Data Protector Informix Server integration. Data Protector Informix Server integration architecture Informix Server integration architecture - Legend and Description Legend Description SM Data Protector Session Manager: Backup Session Manager during backup and Restore Session Manager during restore. ON-Bar ON-Bar executes backup and restore requests from Data Protector and from the Informix Server command line. XBSA X/Open Backup Services Application Programmer's Interface, through which ON-Bar and Data Protector exchange control and data. Database Library A set of Data Protector executables that enable data transfer between an Informix instance and Data Protector. MA Data Protector General Media Agent. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 29 of 803
  • 30. Legend Description Backup Specification A list of objects to be backed up, backup devices, and options to be used. IDB The Data Protector Internal Database. Backup is always executed on the Informix Server system via the Informix Server ON-Bar utility. ON- Bar communicates backup and restore requests to the Informix instance. While an Informix instance is responsible for read/write operations to disk, Data Protector reads from and writes to devices and manages media. Configuring the integration You need to configure an Informix Server user and every Informix instance you intend to back up or restore. Prerequisites l Ensure that you have correctly installed and configured Informix Server. l For supported versions, platforms, devices, and other information, see the HPE Data Protector Product Announcements, Software Notes, and References or http://support.openview.hp.com/selfsolve/manuals. l For information on installing, configuring, and using Informix Server, see the Informix Server online documentation. l Ensure that you have correctly installed Data Protector. For information on how to install Data Protector in various architectures, see the HPE Data Protector Product Announcements, Software Notes, and References. Every Informix Server system you intend to back up from or restore to must have the Data Protector Informix Integration component installed. Before you begin l Configure devices and media for use with Data Protector. l To test whether the Informix Server system and the Cell Manager communicate properly, configure and run a Data Protector filesystem backup and restore on the Informix Server system. l Windows systems: l On Windows Server 2003 system, you need to restart the Data Protector Inet service under a Windows domain user account that has the appropriate Informix Server permissions for running backups and restores. Stop the service and restart it as user informix. For information on changing the user account under which the Data Protector Inet service is running, see the HPE Data Protector Help index: “Inet, changing account”. l On other Windows operating systems, configure the Data Protector Inet service user impersonation for the user that has the appropriate Informix Server permissions for running Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 30 of 803
  • 31. backups and restores. For details, see the HPE Data Protector Help index: “Inet user impersonation”. Cluster-aware clients Configure Informix instances only on one cluster node, since the configuration files reside on the Cell Manager. If you intend to use the Data Protector CLI, set the Data Protector environment variable OB2BARHOSTNAME to the virtual server name as follows: Windows systems: set OB2BARHOSTNAME=virtual_server_name UNIX systems: export OB2BARHOSTNAME=virtual_server_name Configuring Informix Server users On UNIX, add the Informix Server administrator to the Data Protector admin or operator user group. For information, see the HPE Data Protector Help index: “adding users”. This user is typically informix or root in the group informix. To determine it, check the owner of the Informix Server onbar_d file. This chapter assumes that your Informix Server user is informix in the group informix. Configuring Informix instances You need to provide Data Protector with configuration parameters for the Informix instance: l Name of the Informix instance. l Pathname of the Informix Server home directory. l Windows systems: Name of the system with the sqlhosts entry in the Windows Registry. UNIX systems: Pathname of the sqlhosts file. l Name of the Informix instance ONCONFIG file. Data Protector then creates the Informix instance configuration file on the Cell Manager and verifies the connection to the instance. To configure an Informix instance, use the Data Protector GUI or CLI. Before you begin l Ensure that the Informix instance is online. Using the Data Protector GUI 1. In the Context List, click Backup. 2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add Backup. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 31 of 803
  • 32. 3. In the Create New Backup dialog box, click OK. 4. In Client, select the Informix Server system. In a cluster environment, select the virtual server. In Application database, enter the Informix instance name. In the User and group/domain options, specify the account under which you want the backup session to run. These options are available on UNIX and Windows Server 2008 clients. On Windows Server 2003, the backup session will run under the account under which the Data Protector Inet service is running. Ensure that this user has been added to the Data Protector admin or operator user group, and has the Informix Server backup rights. This user becomes the backup owner. l UNIX systems: Type informix in both Username and Group/Domain name. l Windows Server 2008: In Username and Group/Domain name, type the user name and domain (for example, the user name Administrator, domain DP). This account must be set up for the Data Protector Inet service user impersonation. For details, see the HPE Data Protector Help index: “Inet user impersonation”. Specifying an Informix instance Click Next. 5. In Informix Server home directory, specify the pathname of the Informix Server home directory. In Full pathname of sqlhosts file, enter the following: Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 32 of 803
  • 33. Windows systems: Name of the system with the sqlhosts entry in the Windows Registry. Use the UNC notation, for example: computer_name. UNIX systems: Pathname of the sqlhosts file. In Name of ONCONFIG file, enter the name of the Informix instance ONCONFIG file, located in the following directory: Windows systems: INFORMIXDIRetc UNIX systems: INFORMIXDIR/etc Configuring an Informix instance (Windows) Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 33 of 803
  • 34. Configuring an Informix instance (UNIX) Click OK. 6. If an error occurs, click Details or see "Troubleshooting" on page 60. 7. The Informix instance is configured. Exit the GUI or proceed with creating the backup specification at "Select the dbobjects to be backed up." on page 38. Using the Data Protector CLI Log in to the Informix Server system as user informix. From the directory: Windows systems: Data_Protector_homebin HP-UX and Solaris systems: /opt/omni/lbin Other UNIX systems: /usr/omni/bin execute the following: Windows systems: perl -I..libperl util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts ONCONFIG UNIX systems: util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts ONCONFIG Parameter description INFORMIXSERVER Name of the Informix instance. INFORMIXDIR Pathname of the Informix Server home directory. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 34 of 803
  • 35. sqlhosts Windows systems: Name of the system with the sqlhosts entry in the Windows Registry. Use the UNC notation, for example: computer_name. UNIX systems: Pathname of the sqlhosts file. ONCONFIG Name of the Informix instance ONCONFIG file. The message *RETVAL*0 indicates successful configuration. Configuring an Informix instance (Windows) Configuring an Informix instance (HP-UX, Solaris) Handling errors If an error occurs, the error number is displayed in the form *RETVAL*error_number. To get the error description: Windows systems: On the Cell Manager, see the file Data_Protector_ homehelpenuTrouble.txt. HP-UX and Solaris systems: Execute: /opt/omni/lbin/omnigetmsg 12 error_number Other UNIX systems: Execute: /usr/omni/bin/omnigetmsg 12 error_number Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 35 of 803
  • 36. Checking the configuration You can check the configuration of an Informix instance after you have created at least one backup specification for the Informix instance. Use the Data Protector GUI or CLI. Using the Data Protector GUI 1. In the Context List, select Backup. 2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Click the backup specification to display the Informix instance to be checked. 3. Right-click the Informix instance and click Check configuration. Using the Data Protector CLI Log in to the Informix Server system as user informix. From the directory: Windows systems: Data_Protector_homebin HP-UX and Solaris systems: /opt/omni/lbin Other UNIX systems: /usr/omni/bin execute: Windows systems: perl -I..libperl util_informix.pl -CHKCONF INFORMIXSERVER UNIX systems: util_informix.pl -CHKCONF INFORMIXSERVER where INFORMIXSERVER is the name of the Informix instance. Checking configuration (Windows) Checking configuration (UNIX) A successful configuration check displays the message *RETVAL*0. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 36 of 803
  • 37. If an error occurs, the error number is displayed in the form *RETVAL*error_number. For information on how to get the error description, see "Handling errors" on page 35. Backup The integration provides online database backup of the following types: Informix Server backup types Backup type Description Full Full backup (level 0). Incr1 Incremental backup (level 1). Backs up changes since the last Full backup. Incr2 Incremental backup (level 2). Backs up changes since the last Incr1 backup. For details on these types and on ON-Bar, see the Backup and restore guide of Informix Server. What you must back up as filesystem ON-Bar backs up all dbobjects except the following, which you must back up using a filesystem backup: What needs to be backed up as filesystem Object Location The ONCONFIG file Windows systems: INFORMIXDIR etc UNIX systems: INFORMIXDIR /etc Note: This is not applicable for Informix versions 11.7 and 12.1. The oncfg_SERVERNAME.SERVERNUM file Emergency boot file, an Informix Server configuration file called ixbar.server_id, where server_id is the value of the SERVERNUM configuration parameter. UNIX systems: The sqlhosts file Simple-large-object data in blobspaces Disks or optical platters How often you need to back up these objects depends on how frequently they change. However, back up the emergency boot file at least daily and always after a critical dbspace backup. What does not need to be backed up? ON-Bar does not back up the following items because it automatically re-creates them during a restore: Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 37 of 803
  • 38. l Dbspace pages allocated to the Informix instance but not yet allocated to a tblspace extent. l Mirror chunks, if the corresponding primary chunks are accessible. l Temporary dbspaces. Creating backup specifications Create a backup specification using the Data Protector Manager. 1. In the Context List, click Backup. 2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add Backup. 3. In the Create New Backup dialog box, click OK. 4. In Client, select the Informix Server system. In a cluster environment, select the virtual server. In Application database, select the Informix instance to be backed up. In the User and group/domain options, specify the account under which you want the backup session to run. These options are available on UNIX and Windows Server 2008 clients. On Windows Server 2003, the backup session will run under the account under which the Data Protector Inet service is running. Ensure that this user has been added to the Data Protector admin or operator user group, and has the Informix Server backup rights. This user becomes the backup owner. l UNIX systems: Type informix in both Username and Group/Domain name. l Windows Server 2008: In Username and Group/Domain name, type the user name and domain (for example, the user name Administrator, domain DP). This account must be set up for the Data Protector Inet service user impersonation. For details, see the HPE Data Protector Help index: “Inet user impersonation”. Click Next. 5. If the Informix instance is not configured yet for use with Data Protector, the Configure Informix dialog box is displayed. Configure it as described in "Configuring Informix instances" on page 31. 6. Select the dbobjects to be backed up. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 38 of 803
  • 39. Selecting backup objects For Informix versions 11.7 and 12.1, you must appropriately select the system database objects, rootdbs, physdbs, plog, llog, and logdbs if you have created another database. If these are not selected together for the restore session, the session fails. Click Next. 7. Select devices to use for the backup. To specify device options, right-click the device and click Properties. Specify the number of parallel backup streams in the Concurrency tab and the media pool you will use. Note: Except for whole-system backups, ON-Bar backs up and restores dbobjects concurrently, creating a new process for each object. The number of processes is limited by the Informix Server BAR_MAX_BACKUP configuration parameter. Set the Informix configuration parameter BAR_MAX_BACKUP to the Data Protector concurrency. To specify which resource types can be backed up to the device, click the Informix tab, select the desired resource types, and click OK. See "Specifying Informix Server resource types" on the next page. Ensure that the selected devices cover all resource types specified for backup and are not locked when starting the backup. Ideally, back up each resource to a separate device. For a logical log backup, always use a separate device and ensure that the LTAPEDEV parameter in the ONCONFIG file is not set to /dev/null or ''. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 39 of 803
  • 40. Specifying Informix Server resource types Informix Server resource types Resource type Description B Blobspace CD Critical dbspace (a root dbspace or a dbspace containing the physical log or a logical log file) L Logical log MR Master root dbspace ND Non-critical dbspace R Root dbspace CF Critical file Note: Selecting this resource is mandatory for Informix versions 11.7 and 12.1. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 40 of 803
  • 41. Tip: Select an additional set of devices (covering all resource types specified for backup) so that they can take over if some devices in the primary group fail. Select the Load balancing option and set the Min and Max parameters to the number of primary devices. Click Next. 8. Set backup options ("Informix Server specific backup options (Windows)" below and "Informix Server specific backup options (UNIX)" on the next page). For information, see "Informix Server backup options " on the next page. Informix Server specific backup options (Windows) Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 41 of 803
  • 42. Informix Server specific backup options (UNIX) Click Next. 9. Optionally, schedule the backup. See "Scheduling backup sessions" on page 44. Click Next. 10. Save the backup specification, specifying a name and a backup specification group. Tip: Preview backup session for your backup specification before using it. See "Previewing backup sessions" on page 45. Informix Server backup options Option Description Backup type Storage-space backup (default) In a storage-space backup, the onbar command backs up the selected storage-spaces and logical logs in parallel. When you restore from a storage-space backup, you also have to restore logical logs to make the data consistent. Storage-space backup is faster than whole-system backup on large databases. Whole-system backup In a whole-system backup, all Informix instance's dbobjects from the onbar command are backed up. ON-Bar cannot back them up concurrently; they are backed up sequentially. Whole-system backup is useful for disaster recovery, or restore to another client. When you restore from a whole-system backup, you do not need to restore logical logs to make the data consistent. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 42 of 803
  • 43. Option Description Pre-exec Post-exec Specify a command that will be started by ob2onbar.pl on the Informix Server system before the backup (pre-exec) or after it (post-exec). Do not use double quotes, spaces, or special characters. Provide only the name of the command, which must reside in the following directory: Windows systems: Data_Protector_homebin See "Informix Server specific backup options (Windows)" on page 41. HP-UX, Solaris, Linux systems: /opt/omni/lbin See "Informix Server specific backup options (UNIX)" on the previous page. Other UNIX systems: /usr/omni/bin If you selected a logical log for backup, it is sensible to add onmode -l as a pre-exec command to ensure that you always have a log file to back up. Without a log file to back up, the backup fails. If the onmode -l command returns a non-zero value, Data Protector interprets this as an error and the backup session does not start. Modifying backup specifications To modify your backup specification, click its name in the Scoping Pane of the Backup context, then click the appropriate tab, and apply the changes. See "Modifying a backup specification" on the next page. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 43 of 803
  • 44. Modifying a backup specification Scheduling backup sessions You can run unattended backups at specific times or periodically. For details on scheduling, see the HPE Data Protector Help index: “scheduled backups”. Scheduling example To back up logical logs at 8:00, 13:00, and 18:00 during weekdays: 1. In the Schedule property page, select the starting date in the calendar and click Add to open the Schedule Backup dialog box. 2. Under Recurring, select Weekly. Under Time options, select 8:00. Under Recurring Options, select Mon, Tue, Wed, Thu, and Fri. See "Scheduling a backup session" on the next page. Click OK. 3. Repeat steps 1 and 2 to schedule backups at 13:00 and 18:00. 4. Click Apply to save the changes. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 44 of 803
  • 45. Scheduling a backup session Previewing backup sessions Preview the backup session to test it. You can use the Data Protector GUI or CLI. Using the Data Protector GUI 1. In the Context List, click Backup. 2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Right-click the backup specification you want to preview and click Preview Backup. 3. Specify the Backup type and Network load. Click OK. The message Session completed successfully is displayed at the end of a successful preview. Using the Data Protector CLI Execute the following commands: omnib -informix_list backup_specification_name -test_bar Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 45 of 803
  • 46. Previewing a backup with backup specification ds_street (Windows) Previewing a backup with backup specification IDS914 (UNIX) What happens during the preview? 1. The Informix Server onbar command is started with the -F option, which specifies a fake backup. This tests if the Informix instance is correctly configured for backup. 2. Data Protector tests the Data Protector part of the configuration. The following are tested: Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 46 of 803
  • 47. l Communication between the Informix instance and Data Protector l The syntax of the backup specification l If devices are correctly specified l If the necessary media are in the devices Starting backup sessions Interactive backups are run on demand. They are useful for urgent backups or restarting failed backups. Before starting the backup session, perform the following actions: 1. Set the below environment variables: a. ONCONFIG i. INFORMIXSQLHOSTS ii. INFORMIXDIR iii. INFORMIXSERVER b. PATH (Add $INFORMIXDIR/bin to PATH) 2. Set the tapedev and ltapedev variables appropriately in ONCONFIG file. If the tapedev and ltapedev variables are not present, create the files with informix ownership, and a minimum of 660 permissions. Set these paths in the ONCONFIG file. Backup methods Start a backup of dbobjects in any of the following ways: l Use the Data Protector GUI. See "Using the Data Protector GUI" on the next page. l Use the Data Protector CLI. See "Using the Data Protector CLI" on the next page. l Use the Informix Server onbar command. See "Using Informix Server commands" on the next page. l UNIX systems: Use the Informix Server log_full.sh script. See "Using Informix Server log_ full.sh on UNIX" on page 50. Before you begin l Ensure that you have sufficient logical log space to create a backup. If the amount of free space in all logical log files is less than half a single log file, Informix Server does not create a backup. l Before a Full backup, print or keep a copy of your ONCONFIG file, the emergency boot file, and on UNIX, also the sqlhosts file. l Verify data consistency. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 47 of 803
  • 48. Using the Data Protector GUI 1. In the Context List, click Backup. 2. In the Scoping Pane, expand Backup Specifications, and then Informix Server. Right-click the backup specification you want to use and click Start Backup. 3. Select the Backup type and Network load. Click OK. The message Session completed successfully is displayed at the end of a successful backup session. Using the Data Protector CLI Execute the following command: omnib -informix_list backup_specification_name [-barmode InformixMode] [List_ options] where InformixMode is one of the following: full|inf_incr1|inf_incr2 Note: Data Protector terms full, inf_incr1, and inf_incr2 backup are equivalent to Informix Server terms level-0, level-1, and level-2 backup, respectively. For List_options, see the omnib man page. Examples To start a full backup using the Informix Server backup specification InformixWhole, execute: omnib -informix_list InformixWhole -barmode full To start an incremental backup (level 1) of the Informix Server backup specification InformixIncr, execute: omnib -informix_list InformixIncr -barmode inf_incr1 Using Informix Server commands Use the Informix Server onbar command to start a backup of dbobjects from the Informix Server system where the relevant Informix instance is located. Before the backup: l Log in to the Informix Server system as user informix. l Set the following variables: Data Protector and Informix Server variables Variable Description ONCONFIG Name of the Informix instance ONCONFIG file. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 48 of 803
  • 49. Variable Description INFORMIXSQLHOSTS Windows systems: System on which the sqlhosts entry in the Windows Registry exists. UNIX systems: Pathname of the sqlhosts file, for example /applications/informix/etc/sqlhosts. INFORMIXDIR Pathname of the Informix Server home directory. INFORMIXSERVER Name of the Informix instance. OB2APPNAME Name of the Informix instance. OB2BARLIST For backup, name of the backup specification to be used for the backup. For restore, name of the backup specification to be used for salvaging logical logs. l Ensure that the Informix instance is in online or quiescent mode. Once you start a backup, do not change the mode until the backup finishes; changing the mode terminates the backup. Only online dbspaces and blobspaces are backed up. To list online dbobjects, execute: Windows systems: INFORMIXDIRbinonstat -d UNIX systems: INFORMIXDIR/bin/onstat -d Backup modes Backup mode Description Online Use online mode if your Informix instance must be accessible during the backup. An online backup may impact performance. Quiescent Use quiescent mode to eliminate partial transactions in a backup. Quiescent backup may not be practical if you need continuous access to Informix instances. l Keep a copy of your ONCONFIG file, the emergency boot file, and on UNIX, also the sqlhosts file, after you create a full backup. You need this information to restore dbobjects. To back up a list of dbspaces, execute: onbar -b dbspace_list For example, to back up dbspaces dbspace1 and dbspace3, execute: onbar -b dbspace1, dbspace3 For more information, see the Backup and restore guide of Informix Server. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 49 of 803
  • 50. Using Informix Server log_full.sh on UNIX On UNIX, log_full.sh is used to start a backup of logical log files when the Informix Server issues a log-full event alarm on the Informix Server. For information on logical log file backups, see "Manual and continuous logical log backups" below. To enable Informix Server backups from the log_full.sh script: 1. Add the following line to the Informix instance ONCONFIG file: ALARMPROGRAM INFORMIXDIR/etc/log_full.sh. 2. If the Data Protector User Interface is not installed on the Informix Server system, create an Informix Server backup specification to back up only logical logs, and edit INFORMIXDIR/etc/log_full.sh. Add the following at the beginning of the file: export OB2BARLIST=backup_specification_name export OB2APPNAME=INFORMIXSERVER 3. If the Data Protector User Interface is installed on the Informix Server system, create an Informix Server backup specification to back up logical logs only. Manual and continuous logical log backups To back up logical log files that are full and ready to be backed up, start: l a manual logical log backup to back up all full logical log files and stop at the current logical log file. l a continuous logical log backup to back up each logical log file automatically as it becomes full. Use this backup if you do not want to monitor the logical log files. By default, the ALARMPROGRAM configuration parameter is set so that ON-Bar performs continuous backups. If you use continuous backups, ensure that a device is always available for the logical log backup process. To perform a manual logical log backup, set the OB2APPNAME and OB2BARLIST environment variables as described in "Data Protector and Informix Server variables " on page 48 and execute: onbar -l For more information, see the Backup and restore guide of Informix Server. Restore The Data Protector Informix Server integration provides two types of restore: Informix Server restore types Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 50 of 803
  • 51. Restore type Description Complete database restore Restore from any backup. ON-Bar restores dbobjects concurrently and replays the logical logs once. Whole-system restore Restore from a whole-system backup. ON-Bar restores the whole system sequentially with or without restoring the logical logs. Whole-system restore is appropriate for small systems, when you do not need to restore logs, for disaster recovery, or when restoring to another client. Restore methods Restore dbobjects in any of the following ways: l Use the Data Protector GUI. See "Restoring using the Data Protector GUI" on page 54. l Use the Data Protector CLI. See "Restoring using the Data Protector CLI" on page 57. l Use the Informix Server onbar command. See "Restoring using Informix Server commands" on page 58. Before you begin l Before restoring the root dbspace or performing a whole-system restore, shut down the Informix instance (cold restore). Log in to the Informix Server system as user informix and execute: Windows systems: INFORMIXDIRbinonmode -ky UNIX systems: INFORMIXDIR/bin/onmode -ky Note: Once the Informix instance is offline, you cannot restore only non-critical (user) dbspaces. The root dbspace must also be selected for restore. l To restore only non-critical dbspaces, ensure that the Informix instance is online or in a quiescent mode (warm restore ), and that the non-critical dbspaces to be restored are offline. To check whether dbspaces are offline, execute: Windows systems: INFORMIXDIRbinonstat -d UNIX systems: INFORMIXDIR/bin/onstat -d Finding information for restore To restore dbobjects, first find the needed media and the session ID of the last full backup session. Use the Data Protector GUI or CLI. Using the Data Protector GUI In the Internal Database context, expand Objects or Sessions. To view details on a session, right- click the session and click Properties. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 51 of 803
  • 52. Example of session properties Using the Data Protector CLI Localized database names: If the names of backed up objects contain characters from different Unicode language groups (for example, if you are using Japanese and Latin characters), you must redirect the output of Data Protector utilities to use UTF-8 encoding: l Set the environment variable OB2_CLI_UTF8 to 1. l Set the encoding used on the terminal to UTF-8. If you are using localized databases, and the system locale uses the same Unicode language group, no changes are required. 1. Get a list of Informix Server backed up objects: omnidb -informix Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 52 of 803
  • 53. Example of a list of Informix Server backed up objects 2. Get a list of backup sessions for a specific object, including the session ID: omnidb -informix object_name Example of a list of backup sessions for a specific object For object copies, use the object backup ID (which equals the object backup session ID). Do not use the object copy session ID. To get information on the object backup ID, execute: omnidb -session session_id -detail 3. Get a list of media needed for restore: omnidb -session session_id -media Example of finding media needed for restore For details on the omnidb command, see the omnidb man page. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 53 of 803
  • 54. Restoring using the Data Protector GUI 1. In the Context List, click Restore. 2. In the Scoping Pane, expand Informix Server, expand the client from which the data to be restored was backed up, and then click the Informix instance you want to restore. 3. In the Source page, select objects for restore. To restore the complete database or for a whole- system restore, select Restore complete database. Selecting objects for restore Note: For Informix versions 11.7 and 12.1, you must appropriately select the system database objects, rootdbs, physdbs, plog, llog, and logdbs if you have created another database. 4. In the Options page, set the Informix Server specific restore options. For information, see "Informix Server restore options " on page 56 or press F1. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 54 of 803
  • 55. Informix Server restore options 5. In the Devices page, select the devices to be used for the restore. For more information on how to select devices for a restore, see the HPE Data Protector Help index: “restore, selecting devices for”. 6. If you perform a whole-system restore and the Informix instance is in online mode, take the Informix instance offline by executing: onmode -ky Click Restore. 7. In the Start Restore Session dialog box, click Next. 8. Specify the Report level and Network load. Note: Select Display statistical information to view the restore profile messages in the session output. 9. Click Finish to start the restore. The statistics of the restore session, along with the message Session completed successfully is displayed at the end of the session output. 10. If you performed a whole-system restore, bring the Informix instance online by executing: onmode -m Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 55 of 803
  • 56. Informix Server restore options Option Description Backup Specification The backup specification to be used for salvaging logical log files still on the disk before restoring. Preferably, specify the backup specification used for the backup of logical logs. Username UNIX systems: User name of the Informix Server backup owner. onbar is started under the account of the specified user. User group UNIX systems: User group of the Informix Server backup owner. Restore to client The client to restore to. By default, you restore to the original backup client. This option is only valid for a whole-system restore. Restore by log number This option is only available if you selected Restore complete database in the Source page. Use this option to restore data up to a specific log number. If further logs exist, ON- Bar does not restore them. This option invokes onbar -r -n last_log_ number. For details, see the Backup and restore guide of Informix Server. Restore by date This option is only available if you selected Restore complete database in the Source page. Use this option to restore data to a specific point in time. This option invokes onbar -r -t time. For details, see the Backup and restore guide of Informix Server. Restore the latest version Select this option to restore the latest backup version. Whole database restore This option is only available if you selected Restore complete database in the Source page. Select Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 56 of 803
  • 57. Option Description this option to perform a whole-system restore. Only use this option when restoring from a whole-system backup. Data Protector does not automatically detect if a whole- system backup exists. Data Protector searches for the last whole-system backup and restores from that. This option invokes onbar -r -w. For details, see the Backup and restore guide of Informix Server. After the restore, make sure that before you perform the next restore, a full backup has been performed. Restoring using the Data Protector CLI Before you begin the restore procedure, set the OB2BARLIST environment variable as described in “Data Protector and Informix Server variables” (page 32)"Backup" on page 37. For example: set OB2BARLIST=dbspace5 Run the following command: omnir -informix -barhost ClientName -barcmnd ob2onbar.pl -user User:Group -appname INFORMIXSERVER -bararg OnBarRestoreArguments [INFORMIX_OPTIONS] ClientName Name of the Informix Server system. In a cluster environment, name of the virtual server. INFORMIXSERVER Name of the Informix instance. User, Group UNIX systems: The user name and its group name. OnBarRestoreArguments ON-Bar restore arguments. Put each argument in double quotes. INFORMIX_OPTIONS A subset of general restore options. For information, see the omnir man page. After the restore, make sure that before you perform the next restore, a full backup has been performed. Example To restore the Informix instance informix_instance1 on the UNIX system computer with the bar argument -r rootdbs, execute: omnir -informix -barhost computer -barcmnd ob2onbar.pl -user informix:informix - appname informix_instance1 -bararg "-r rootdbs" Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 57 of 803
  • 58. Restoring using Informix Server commands Before restoring: l Log in to the Informix Server system as user informix. l Set Data Protector and Informix Server variables as described in "Data Protector and Informix Server variables " on page 48. l If a disk failure occurs, salvage logical log files that are still on the disk by executing: onbar -l -s The following are examples of the onbar command syntax for restore. For further options, see the Backup and restore guide of Informix Server. After the restore, make sure that before you perform the next restore, a full backup has been performed. Restoring dbspaces, blobspaces, and logical logs 1. If the Informix instance to be restored is in online mode, take it offline: onmode -ky 2. Restore dbspaces, blobspaces, and appropriate logical logs: Complete database restore: onbar -r Whole-system restore: onbar -r -w 3. After the restore, bring the Informix instance online: onmode -m Restoring dbspaces and blobspaces only To restore dbspaces and blobspaces without the logical log, execute: onbar -r -p Restoring a particular dbspace or blobspace To restore a specific dbspace, for example dbspace_1, execute: onbar -r dbspace_1 Restoring to another Informix Server To restore data to an Informix Server system other than that from which the backup was made: 1. Install the Data Protector Informix Integration software component on the client to which you want to restore (target client). 2. Create the user informix on the target client. 3. Create an Informix instance with the same database name and the same server number as the original Informix instance by using the Informix Server ON-Monitor utility on the target client. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 58 of 803
  • 59. To obtain the database name and the server number, log in as the user informix on the original server and execute the following: a. To obtain the database name, look up the value of DBSERVERNAME in the onstat –c output. On UNIX, you can do this by executing: onstat -c | grep DBSERVERNAME b. To obtain the server number database name, look up the value of SERVERNUM in the onstat –c output. On UNIX, you can do this by executing: onstat -c | grep SERVERNUM 4. Ensure that the Informix instance is online. 5. Configure the Informix instance as described in "Configuring Informix instances" on page 31. 6. Take the Informix instance offline. 7. Copy the following original Informix Server configuration files to the target client: l ONCONFIG l the emergency boot file l oncfg_DBSERVERNAME.SERVERNUM 8. On UNIX, copy also the sqlhosts file to the target client. Change the source client host name in the copied sqlhosts file to the target client host name. 9. On UNIX, add the service_name entry from the sqlhosts file to the etc/services file, together with a unique port number (for example, 1535/tcp) on the target client to allow the instance to start running properly. 10. Re-create the database files from the original database on the target client and then alter the files permission and ownership of the file to match the originals. 11. Start a whole-system restore of dbobjects as described in "Restoring using the Data Protector GUI" on page 54. Restoring using another device You can perform a restore using a device other than that used for the backup. Using the Data Protector GUI For information on how to select another device for a restore using the Data Protector GUI, see the HPE Data Protector Help index: “restore, selecting devices for”. Using the Data Protector CLI or Informix Server commands If you are restoring using the Data Protector CLI or Informix Server commands, specify the new device in the file: Windows systems: Data_Protector_program_dataConfigServercellrestoredev UNIX systems: /etc/opt/omni/server/cell/restoredev Use the format: "DEV 1" "DEV 2" Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 59 of 803
  • 60. where DEV 1 is the original device and DEV 2 is the new device. Delete this file after use. On Windows, use the Unicode format for the file. Monitoring sessions You can monitor currently running sessions in the Data Protector GUI. When you run an interactive backup or a restore session, a monitor window shows you the progress of the session. Closing the GUI does not affect the session. You can also monitor sessions from any Data Protector client with the User Interface component installed, using the Monitor context. For information on how to monitor a session, see the HPE Data Protector Help index: “viewing currently running sessions”. When ON-Bar encounters an error or a condition that warrants a warning, it writes a message to the Informix Server ON-Bar message file. The full pathname of this file is specified in the BAR_ACT_LOG configuration parameter. For more information on this file, see the Backup and Restore Guide of Informix Server. To abort a backup or restore session successfully, set the ON-Bar BAR_RETRY configuration parameter to 0. This parameter specifies how many times ON-Bar retries a backup or restore if the first attempt fails. Troubleshooting This section lists general checks and verifications, plus problems you might encounter when using the Data Protector Informix Server integration. Start at "Problems" on page 64 and if you cannot find a solution there, perform general checks and verifications. For general Data Protector troubleshooting information, see the HPE Data Protector Troubleshooting Guide. Before you begin l Ensure that the latest official Data Protector patches are installed. For information on how to verify this, see the HPE Data Protector Help index: “patches”. l For general Data Protector limitations, as well as recognized issues and workarounds, see the HPE Data Protector Product Announcements, Software Notes, and References. l For an up-to-date list of supported versions, platforms, and other information, see http://support.openview.hp.com/selfsolve/manuals. Checks and verifications If your configuration, backup, or restore failed: Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 60 of 803
  • 61. l On the Informix Server system, examine system errors reported in the debug.log and informix.log files, located in the directory: Windows systems: Data_Protector_homelog HP-UX and Solaris systems: /var/opt/omni/log Other UNIX systems: /usr/omni/log l Make a test backup and restore of any filesystem on the problematic client. For information, see the HPE Data Protector Help. l Windows systems: Ensure that the Data Protector Inet service is running under the account informix. l UNIX systems: Verify that the onbar_d command has the switch ownership(s) bit set and that it is owned by the Informix Server user, for example, informix:informix or root:informix. Verify that this user is also the owner of the backup specification, or in the case of a restore failure, verify that this user is specified for the restore session, and that it is in the Data Protector operator or admin group. If this user is in the Data Protector operator group, ensure that the See private objects user right of this group is selected. For information, see the HPE Data Protector Help index: “user rights, changing”. Now test if this user, for example user informix, has appropriate rights in Data Protector. Log in to the Informix Server system as user informix. From the directory: HP-UX and Solaris systems: /opt/omni/bin/utilns Other UNIX systems: /usr/omni/bin/utilns execute: testbar -type:informix -perform:checkuser -bar: backup_specification_name Example of checking the Informix Server user Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 61 of 803
  • 62. In this example, the user has all the necessary rights for the backup specification named InformixWhole. If the user informix on the Informix Server system computer.hp.com does not have the necessary rights, an error similar to the following will be displayed: [Critical] From: OB2BAR@computer.hp.com "" Time: 08/06/2011 17:51:41[131:53] User "informix.users@computer.hp.com" is not allowed to perform a restore. l In a cluster environment, ensure that the environment variable OB2BARHOSTNAME is set to the virtual server name before performing procedures from the Data Protector CLI. When the Data Protector GUI is used, this is not required. Additionally, if your configuration or backup failed: l Ensure that the Informix instance is online. Additionally, if your backup failed: l Check the configuration of the Informix instance as described in "Checking the configuration" on page 36. l Test the backup specification as described in "Previewing backup sessions" on page 45. l If this fails, check if the Informix Server part of the test failed: Execute the onbar -b -F command. If the test fails, see the Informix Server documentation for further instructions. l If the Data Protector part of the test failed, create an Informix Server backup specification to back up to a null or file device. If the backup succeeds, the problem is probably related to devices. For information on troubleshooting devices, see the HPE Data Protector Help. l If the test succeeds, start the backup directly from the Informix Server system using Informix Server commands. For information, see "Using Informix Server commands" on page 48. If this backup succeeds, the problem may be that the client on which the Data Protector User Interface is running does not have enough memory, disk space, or other operating system resources. Additionally, if your backup or restore failed: l Test the Data Protector data transfer using the testbar utility. Log in to the Informix Server system as user informix. From the directory: Windows systems: Data_Protector_homebin HP-UX and Solaris systems: /opt/omni/bin/utilns Other UNIX systems: /usr/omni/bin/utilns l if your backup failed, execute: testbar -type:Informix -appname:INFORMIXSERVER -bar: backup_specification_name -perform:backup where INFORMIXSERVER is the name of the Informix instance. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 62 of 803
  • 63. l if your restore failed, execute: testbar -type:Informix -appname:INFORMIXSERVER -bar:backup_specification_name -perform:restore -object:OBJECT_NAME -version:OBJECT_VERSION where INFORMIXSERVER is the name of the Informix instance, OBJECT_NAME is the name of the object to be restored, OBJECT_VERSION is the object version. If the test fails: a. Troubleshoot errors reported by the testbar utility using the Data Protector troubleshooting file, located on the Cell Manager in: Windows systems: Data_Protector_homehelpenuTrouble.txt UNIX systems: /opt/omni/gui/help/C/Trouble.txt b. On the Informix Server system, examine system errors reported in the file: Windows systems: Data_Protector_homelogdebug.log HP-UX and Solaris systems: /var/opt/omni/log/debug.log Other UNIX systems: /usr/omni/log/debug.log Additionally, if your restore failed: l Ensure that the backup specification used for salvaging logical logs is properly configured. Checking the Informix Server side The following checks may help you solve some Informix Server related problems. If your backup or restore failed: l Check the following Informix Server files for error descriptions: bar_act.log bar_dbg.log online.log Locations of these files are specified in the Informix Server ONCONFIG file. Additionally, if your backup failed: l Start a backup, not using Data Protector: a. Set the BAR_BSALIB_PATH shell variable to: Windows systems: ISMDIRbinlibbsa.dll where ISMDIR is the path to the ISM. UNIX systems: INFORMIXDIR/lib/ibsad001.sl where INFORMIXDIR is the home directory of Informix Server. b. Use the onbar command to start the backup. Additionally, if your restore failed: l For a cold restore, verify if the dbspaces you want to restore are offline: a. Log in to the Informix Server system as user informix. b. Execute the following: Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 63 of 803
  • 64. Windows systems: INFORMIXDIRbinonstat -d UNIX systems: INFORMIXDIR/bin/onstat -d where INFORMIXDIR is the home directory of Informix Server. l Ensure that the Informix Server configuration files (ONCONFIG, the emergency boot file, oncfg_ INFORMIXSERVER.SERVERNUM, and on UNIX, also the sqlhosts file) are not corrupt. If they are corrupt, restore them manually. Problems Problem Restore to another client fails If you backed up data to one client, exported the media, and then imported them to another client in a different cell, the Data Protector session IDs of backup sessions may be changed in the IDB. However, the session IDs are not automatically changed in the Informix Server emergency boot file (ixbar.server_id, where server_id is the value of the SERVERNUM configuration parameter). Therefore, the restore of such objects may fail. Action Edit the emergency boot file to reflect the changed Data Protector session IDs. List the changed session IDs during the import procedure. Information about backed-up objects is stored in the emergency boot file in the following format: ODS730 rootdbs R 1 7 0 9 2011008018 2011-08-18 18:10:25 1 Entries 7 and 9 make up make up the Data Protector session ID. Entry 9 is the date and entry 7 the unique session number. Here, the session ID is 2011/08/18-9. Note that the delimiter in the date field is "-" in the emergency boot file and "/" in the Data Protector session ID. The value of the SERVERNUM configuration parameter is given in entry 4. Problem Restore fails because the emergency boot file is too large Action Use the ON-Bar onsmsync utility to remove expired backups from the Informix Server sysutils database and emergency boot file. For information on the onsmsync utility, see the Backup and restore guide of Informix Server. Problem Backup or Restore fails with 131 ISAM error The backup or restore session fails with the following 131 ISAM error: No free disk space. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 64 of 803
  • 65. Action Add chunk space to the rootdbs, or add temp dbs. By default, if disk space is not available for a dbobject, then space is taken from rootdbs if the temp dbs is not configured. Example: To add chunk space of 500MB with 2048 page size to rootdbs, use the following command: onspaces -a rootdbs -p /opt/IBM/informix/ol_informix1170/dbspaces/Chunk2_rootdbs - o 2048 -s 500000. Integration Guide Chapter 1: Data Protector Informix Server integration HPE Data Protector (9.07) Page 65 of 803
  • 66. Chapter 2: Data Protector DB2 UDB integration Introduction This chapter explains how to configure and use the Data Protector DB2 UDB (DB2) integration. It describes concepts and methods you need to understand to back up and restore DB2 databases. Data Protector integrates with IBM DB2 Universal Database Server (DB2 Server) to back up DB2 database objects online and offline. Data Protector offers interactive and scheduled backups of the following types: Backup types Backup type Description Full Backs up complete DB2 objects. Incremental Backs up changes since the last Full backup. Delta Backs up changes since the last backup of any type. The basic backup unit is a table space. Only table spaces or databases (DB2 objects) can be selected for backup. When restoring a database or table space, you can specify restore options to perform: l Rollforward recovery l Version recovery l Restore to a new database (database only) l Restore to another instance (database only) l Restore to another system (database only) l Automatic restore from incremental or delta backups Databases are restored offline, table spaces online. Limitations Table or datafile backup and restore are not supported. Neither are backup or restore using Data Protector media with the DB2 Command Line Processor or the DB2 Control Center. This chapter provides information specific to the Data Protector DB2 Server integration. For general Data Protector procedures and options, see the HPE Data Protector Help. HPE Data Protector (9.07) Page 66 of 803
  • 67. Integration concepts Data Protector integrates with the DB2 Server through a set of modules responsible for data backup and restore. "DB2 integration architecture" below shows the architecture of the Data Protector DB2 integration. DB2 integration architecture Legend Legend Description SM Data Protector Session Manager: Backup Session Manager during backup and Restore Session Manager during restore. db2bar Data Protector module, used for controlling activities between the DB2 Server and Data Protector backup and restore. db2arch Program that backs up and restores DB2 log files when DB2 log archive method (logarchmeth1) is set to user exit libob2db2 Data transferring (database backup and restore, log archive/retrieval Integration Guide Chapter 2: Data Protector DB2 UDB integration HPE Data Protector (9.07) Page 67 of 803
  • 68. Legend Description when logarchmeth1 is set to vendor) module called by DB2 Server. MA Data Protector General Media Agent. Backup Specification A list of objects to be backed up, backup devices, and options to be used. IDB The Data Protector Internal Database. While the DB2 Server is responsible for read/write operations to disk, Data Protector reads from and writes to devices and manages media. Considerations 1. HPE recommends that you set the log archive method (logarchmeth1) to Vendor, because IBM DB2 has deprecated the UserExit option from the DB2 version 9.5. For more information, see http://www-01.ibm.com/support/knowledgecenter/SSEPGG_ 9.7.0/com.ibm.db2.luw.admin.config.doc/doc/r0000249.html?cp=SSEPGG_9.7.0%2F2-2-6-7- 124. 2. If your existing database has the log archive method set to UserExit and you want to change it to Vendor, then the database recovery for the log that is backed up using the User Exit option can be done using the below steps: a. Restore the database (without enabling the Roll forward recovery in the Data Protector GUI). b. Restore the logs that were backed up using the User Exit program in the active log directory. 3. Set the environment variables in the omnirc file before restoring to a DB2 database using the automatic Roll forward: l On the DB2 client, set the following environment variables in the omnirc file: o OB2APPNAME = “source_Instance_name” o OB2BARHOSTNAME=”Source_client_name” o OB2APPDATABASE = “source_database_name” Note: This is valid for all DB2 log backups using the Vendor library and not required for the User-Exit mode. In the omnirc file, delete the above mentioned three variables after the Roll forward of the DB2 database. This ensures that the other DB2 instances running on the same system are not influenced by these environment variables during backup. l Execute the DB2 Roll Forward command. 4. The DB2 deduplication optimization is supported by using the omnirc variable OB2_DB2DEDUP in the DB2 Version 9.7 (Fix Pack 4) and later releases. Configuring the integration You need to configure DB2 users and every DB2 instance you intend to back up or restore to. Integration Guide Chapter 2: Data Protector DB2 UDB integration HPE Data Protector (9.07) Page 68 of 803
  • 69. Prerequisites l Ensure you have correctly installed and configured DB2 Server. l For supported versions, platforms, devices, and other information, see the HPE Data Protector Product Announcements, Software Notes, and References or http://support.openview.hp.com/selfsolve/manuals. l For information on DB2 Server, see the DB2 administration guide and DB2 server books online. l Ensure you have correctly installed Data Protector. For information on how to install the Data Protector IBM DB2 UDB integration in various architectures, see the HPE Data Protector Installation Guide. Every DB2 Server system you intend to back up from or restore to must have the Data Protector DB2 Integration and Disk Agent components installed. In a partitioned environment, ensure that the DB2 Integration and Disk Agent components are installed on all the physical nodes on which the DB2 database resides. Before you begin l Configure devices and media for use with Data Protector. l To test whether the DB2 Server system and the Cell Manager communicate properly, configure and run a Data Protector filesystem backup and restore on the DB2 Server system. Cluster-aware clients If you are using the Microsoft Windows Failover cluster, set the omnirc variable OB2BARHOSTNAME to the virtual server name in the cluster nodes and cell manager. OB2BARHOSTNAME=<virtual_server_name> Partitioned environment In a physically partitioned environment, configure the integration on every physical node separately. Ensure that the MaxBSession global option is set to at least twice the number of nodes of the partitioned database. Configuring DB2 users Ensure the DB2 user has appropriate authorities to perform DB2 backups and restores (either SYSADM, SYSCTRL, or SYSMAINT). Add user root (UNIX only) and the DB2 user to both the Data Protector and DB2 admin user groups. For more information, see the HPE Data Protector Help index: “user groups” and “adding users”. Provide this user in configuration and restore procedures. This user is needed by Data Protector to start the Data Protector Inet service (Windows) or process (UNIX). Integration Guide Chapter 2: Data Protector DB2 UDB integration HPE Data Protector (9.07) Page 69 of 803
  • 70. Configuring DB2 instances Provide Data Protector with the DB2 instance configuration parameters: l DB2 user l DB2 user password l DB2 instance home directory (only in a partitioned environment) Data Protector then creates a DB2 instance configuration file on the Cell Manager and verifies the connection to the instance. These parameters are used for connecting to the DB2 Server system to perform backups, restores, and other operations, such as listing objects for backup. To configure a DB2 instance, use the Data Protector GUI or CLI. Before you begin l Ensure the DB2 instance is online. Using the Data Protector GUI 1. In the Context List, click Backup. 2. In the Scoping Pane, expand Backup Specifications, right-click DB2 Integration, and click Add Backup. 3. In the Create New Backup dialog box, click OK. 4. In Client, select the DB2 Server system. In a cluster environment, select the virtual server. In Application database, type the DB2 instance name. For information on the User and group/domain options, press F1. Integration Guide Chapter 2: Data Protector DB2 UDB integration HPE Data Protector (9.07) Page 70 of 803
  • 71. Specifying a DB2 instance Click OK. 5. Click Next. The Configure DB2 dialog box is displayed. 6. Type the name of the DB2 user and its password. This user must be configured as described in "Configuring DB2 users" on page 69. In a partitioned environment, select DB2 EEE and specify the pathname of the DB2 instance home directory. 7. The DB2 instance is configured. Exit the GUI or proceed with creating a backup specification at Step 6. Using the Data Protector CLI Execute the following command: util_db2 -CONFIG DB2_instance username password [DB2 _instance_home] Parameter description DB2_instance Name of the DB2 instance. username DB2 user. password DB2 user password. Integration Guide Chapter 2: Data Protector DB2 UDB integration HPE Data Protector (9.07) Page 71 of 803