Part 1: IBM Applications
This part of the guide describes ways to back up and restore Informix Server database objects, DB2 databases, and Lotus Notes/Domino Server.
This part includes the following chapters:
Data Protector Informix Server integration
Data Protector DB2 UDB integration
lData Protector Lotus Notes/Domino Server integration
Part 2:
Microsoft Applications
This part of the guide describes ways to configure and use the following:
Data Protector Microsoft SQL Server integration
Data Protector Microsoft SQL Server 2007/2010/2013 integration
Data Protector Microsoft SharePoint Server VSS based solution
Data Protector Microsoft Exchange Server 2007 integration
Data Protector Microsoft Exchange Server 2010 integration
Data Protector Microsoft Exchange Single Mailbox integration
Part 3:
Oracle and SAP
This part of the guide describes ways to configure and use the following:
Data Protector Oracle Server integration
Data Protector MySQL integration
Data Protector SAP R/3 integration
Data Protector SAP MaxDB integration
Data Protector SAP HANA Appliance integration
Part 4:
Sybase and Network Data Management Protocol Server
This part of the guide describes ways to configure and use the following:
Sybase Server integration
Network Data Management Protocol Server integration
NetApp SnapManager solution
Part 5:
Virtualization
This part of the guide describes ways to back up VMware virtual machines and Microsoft Hyper-V data online.
This part includes the following chapters:
Data Protector Virtual Environment integration for VMware
Data Protector Virtual Environment integration for Microsoft Hyper-V
Part 6:
PostgreSQL
This part of the guide describes Data Protector integration.
This part includes the following chapter:
Data Protector PostgreSQL integration
Introduction to Lightning Web Component SmritiSharan1
Introduction to lightning web component
What is lightning web component?
Difference between aura component and LWC
Why do you go for LWC instead of existing aura components?
Coexistence and interoperability of aura and LWC
Lightning web components are custom HTML elements built using HTML and modern JavaScript. Lightning Web Components uses core Web Components standards and provides only what’s necessary to perform well in browsers supported by Salesforce.
Omni is all about getting the right work to the right person at the right time.
Omni Channel routes the work based on relative priority.
Omni-Channel directly will not pick the object records. It only picks the records of the objects which are routing enabled in Service Channel.
Omni-channel treats any record as work items, irrespective of which object record it is!
Work item which comes into omni channel is routing enabled.
Omni Channel supports Cases, Leads and Custom objects that don’t have a master object.
The job interview - Mock Interview ActivityDave Truss
A Lesson where students first learn about getting an interview and then they hold mock interviews with each other. For Inquiry Hub Secondary School students - April 2014, by David Truss.
'Observer' Handout available at: http://2di.me/ihubmockinterviews
Introduction to Lightning Web Component SmritiSharan1
Introduction to lightning web component
What is lightning web component?
Difference between aura component and LWC
Why do you go for LWC instead of existing aura components?
Coexistence and interoperability of aura and LWC
Lightning web components are custom HTML elements built using HTML and modern JavaScript. Lightning Web Components uses core Web Components standards and provides only what’s necessary to perform well in browsers supported by Salesforce.
Omni is all about getting the right work to the right person at the right time.
Omni Channel routes the work based on relative priority.
Omni-Channel directly will not pick the object records. It only picks the records of the objects which are routing enabled in Service Channel.
Omni-channel treats any record as work items, irrespective of which object record it is!
Work item which comes into omni channel is routing enabled.
Omni Channel supports Cases, Leads and Custom objects that don’t have a master object.
The job interview - Mock Interview ActivityDave Truss
A Lesson where students first learn about getting an interview and then they hold mock interviews with each other. For Inquiry Hub Secondary School students - April 2014, by David Truss.
'Observer' Handout available at: http://2di.me/ihubmockinterviews
Becoming a Salesforce.com Technical ArchitectSteven Herod
Presented to the Sydney SF Developer User Group 13 February 2013
Video of this presentation is available at http://www.youtube.com/watch?v=5-oVBgRVzBM from about the 23 minute mark to the 39 minute mark.
Lightning Web Components are a JavaScript programming model for building web applications and interfaces that is built on the best of web standards.
Any front-end web developer can get started with LWC and leverage custom elements, and JavaScript APIs to create modern apps and experiences that are fully aware of Salesforce data and processes.
A beginner's guide to setting up your development environment to build a very basic "Hello World" web part using the SharePoint Framework and resources on how to keep learning more about it.
Sleepless Nights, Loss of Appetite, Anxiety etc….Don’t take me wrong as I am not discussing about some disease but these are the few symptoms of Job Interview Fear or Phobia.
Is there a job interview coming up? Then take a look at these 7 interview do's and don'ts put together by the SThree UK Talent Acquisition Team. We hope these tips will help you move your career forward.
For more information and tips visit our website: http://www.sthreecareers.com/.
HPE Data Protector Administrator's GuideAndrey Karpov
About Data Protector
HPE Data Protector is a backup solution that provides reliable data protection and high accessibility for your
fast-growing business data. Data Protector offers comprehensive backup and restore functionality
specifically tailored for enterprise-wide and distributed environments.
Major Data Protector features
l Scalable and highly flexible architecture
l Mixed environment support
l Easy central administration
l High performance backup
l Easy restore
l Data and control communication security
l High availability support
l Automated or unattended operation
l Monitoring, reporting, and notification
l Service management
l Integration with online database applications
l Integration with other products
Data Protector Architecture
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
Becoming a Salesforce.com Technical ArchitectSteven Herod
Presented to the Sydney SF Developer User Group 13 February 2013
Video of this presentation is available at http://www.youtube.com/watch?v=5-oVBgRVzBM from about the 23 minute mark to the 39 minute mark.
Lightning Web Components are a JavaScript programming model for building web applications and interfaces that is built on the best of web standards.
Any front-end web developer can get started with LWC and leverage custom elements, and JavaScript APIs to create modern apps and experiences that are fully aware of Salesforce data and processes.
A beginner's guide to setting up your development environment to build a very basic "Hello World" web part using the SharePoint Framework and resources on how to keep learning more about it.
Sleepless Nights, Loss of Appetite, Anxiety etc….Don’t take me wrong as I am not discussing about some disease but these are the few symptoms of Job Interview Fear or Phobia.
Is there a job interview coming up? Then take a look at these 7 interview do's and don'ts put together by the SThree UK Talent Acquisition Team. We hope these tips will help you move your career forward.
For more information and tips visit our website: http://www.sthreecareers.com/.
HPE Data Protector Administrator's GuideAndrey Karpov
About Data Protector
HPE Data Protector is a backup solution that provides reliable data protection and high accessibility for your
fast-growing business data. Data Protector offers comprehensive backup and restore functionality
specifically tailored for enterprise-wide and distributed environments.
Major Data Protector features
l Scalable and highly flexible architecture
l Mixed environment support
l Easy central administration
l High performance backup
l Easy restore
l Data and control communication security
l High availability support
l Automated or unattended operation
l Monitoring, reporting, and notification
l Service management
l Integration with online database applications
l Integration with other products
Data Protector Architecture
HP Data Protector is the first data backup solution in the entire industry to provide a uniform deduplication solution from the source to the target, and protect mission-critical data in virtual and physical environments. More than 45,000 customers worldwide trust their HP Data Protector solution to protect their most valuable asset—information.
This white paper provides recommendations for the implementation of a backup and recovery strategy for HP Data
Protector that allows you to optimize the way you use Data Protector in each IT environment. The guide concludes with
references to other sources of information related to Data Protector and a glossary of important terms.
Quick overview:
• VMware Full/incremental and differental cached GRE, “Power On“ & Live Migration from StoreOnce Catalyst
• 3PAR Remote copy ZDB with VMware VEPA
• StoreOnce Multiprotocol access (cross-over CoIP & CoFC) and Service Set selection
• Microsoft Hyper-V individual VHD/VHDX restore
• NetApp NDMP Cluster Aware Backup & NDMP 3-Way Backup
• Openstack Cinder volumes with VMware
• Debug Log and Telemetry Data gathering
• PostgreSQL Online Integration
• REST API for Restore
• Improved reporting and security for client certifications
• EADR support extended to RHEL 7.x and Oracle Linux 7.x
Hpe Data Protector troubleshooting guideAndrey Karpov
How to troubleshoot
To solve problems quickly and efficiently:
1.Make yourself familiar with the general troubleshooting information.
2.Check if your problem is described in the HPE Data Protector Help file or the troubleshooting sections of applicable guides:
To troubleshoot installation and upgrade, see the HPE Data Protector Installation Guide.
To troubleshoot application integration sessions, see the HPE Data Protector Integration Guide.
To troubleshoot zero downtime backup and instant recovery, see the HPE Data Protector Zero Downtime Backup Administrator's Guide and HPE Data Protector Zero Downtime Backup Integration Guide.
To troubleshoot disaster recovery, see the HPE Data Protector Disaster Recovery Guide.
Overview of the installation procedure
Chapter 2: Installing Data Protector
This chapter contains detailed instructions about:
Installing the Data Protector Cell Manager and Installation Servers
Installing the Data Protector Single Server Edition
Installing the Data Protector web reporting
Chapter 3: Installing Data Protector clients
Chapter 4: Installing the Data Protector integration clients
Chapter 5: Installing Data Protector on Clusters
Chapter 6: Maintaining the installation
Chapter 7: Upgrading the Data Protector
Chapter 8: Data Protector Licensing
Chapter 9: Troubleshooting installation and upgrade
March 2016 HPE Data Protector
Comprehensive data protection for the modern enterprise
If you pick up the latest datacenter trends reports from ESG, Gartner, and IDC, you will notice that improving backup and recovery appears among the top IT priorities for organizations. The reason for that is simple: as the velocity, variety and complexity of data continue to accelerate, so do the risks of not being able to speedily restore critical systems and applications in case of disaster or data loss.
This document describes the functions performed by an HP Vertica database administrator (DBA).
Perform these tasks using only the dedicated database administrator account that was created
when you installed HP Vertica. The examples in this documentation set assume that the
administrative account name is dbadmin.
l To perform certain cluster configuration and administration tasks, the DBA (users of the
administrative account) must be able to supply the root password for those hosts. If this
requirement conflicts with your organization's security policies, these functions must be
performed by your IT staff.
l If you perform administrative functions using a different account from the account provided
during installation, HP Vertica encounters file ownership problems.
l If you share the administrative account password, make sure that only one user runs the
Administration Tools at any time. Otherwise, automatic configuration propagation does not
work correctly.
l The Administration Tools require that the calling user's shell be /bin/bash. Other shells give
unexpected results and are not supported.
Трансформация ИТ с помощью Hewlett Packard Enterprise
ИТ для экономики идей
Идеи всегда являлись залогом успеха в развития бизнеса. Однако одних лишь хороших идей мало. Успех определяется тем, насколько быстро компания может превращать идеи в прибыль. Сегодня путь от идеи до ее реализации радикально сократился. Именно поэтому, говоря об особенностях современного этапа развития экономики, эксперты рынка все чаще используют термин «экономика идей».
Hpe Zero Downtime Administrator's GuideAndrey Karpov
Part 1: HPE P4000 SAN Solutions
This part describes how to configure the Data Protector HPE P4000 SAN Solutions integration. For information on how to perform zero downtime backup and instant recovery using the HPE P4000 SAN Solutions integration, see the HPE Data Protector Integration Guide for Microsoft Volume Shadow Copy Service.
Part 2: HPE P6000 EVA Disk Array Family
This part describes how to configure the Data Protector HPE P6000 EVA Disk Array Family integration, how to perform zero downtime backup and instant recovery using the HPE P6000 EVA Disk Array Family integration, and how to resolve the integration-specific Data Protector problems
Part 3: HPE P9000 XP Disk Array Family
This part describes how to configure the Data Protector HPE P9000 XP Disk Array Family integration, how to perform zero downtime backup and instant recovery using the HPE P9000 XP Disk Array Family integration, and how to resolve the integration-specific Data Protector problems.
Part 4: HPE 3PAR StoreServ Storage
This part describes how to configure the Data Protector HPE 3PAR StoreServ Storage integration, and how to perform zero downtime backup and instant recovery using the HPE 3PAR StoreServ Storage integration through native storage system support built-in in the Data Protector HPE P6000 / HPE 3PAR SMI-S Agent. For information on how to perform zero downtime backup and instant recovery using the HPE 3PAR StoreServ Storage integration through the Data Protector Microsoft Volume Shadow Copy Service integration, see the HPE Data Protector Integration Guide for Microsoft Volume Shadow Copy Service.
Part 5: EMC Symmetrix
This part describes how to configure the Data Protector EMC Symmetrix integration, how to perform zero downtime backup and instant recovery using the EMC Symmetrix integration, and how to resolve the integration-specific Data Protector problems.
Part 6: NetApp Storage
This part describes how to configure the Data Protector NetApp Storage integration, how to perform zero downtime backup using the NetApp Storage system, and how to resolve the integration-specific Data Protector problems.
Part 7: EMC VNX Family
This part describes how to configure the Data Protector EMC VNX Family integration, how to perform zero downtime backup using the EMC VNX storage system, and how to resolve the integration-specific Data Protector problems.
Part 8: EMC VMAX Family
This part describes how to configure the Data Protector EMC VMAX Family integration, how to perform zero downtime backup using the EMC VMAX storage system, and how to resolve the integration-specific Data Protector problems.
Hpe Data Protector Disaster Recovery GuideAndrey Karpov
This chapter provides a general overview of the disaster recovery process, explains the basic terms used in the Disaster Recovery guide and provides an overview of disaster recovery methods
Carefully follow the instructions below to prepare for disaster recovery and ensure a fast and efficient restore. The preparation procedure does not depend on the disaster recovery method, and includes developing a detailed disaster recovery plan, performing consistent and relevant backups, and updating the SRD file on Windows.
Assisted Manual Disaster Recovery (AMDR)
Manual Disaster Recovery (MDR)
This chapter contains descriptions of problems you might encounter while performing a disaster recovery. You can start with problems connected to a particular disaster recovery method and continue with general disaster recovery problems.
Example Preparation Tasks
hpe manual data protector 9.07 granular extension guidesAndrey Karpov
Granular Recovery Extension User Guide for
Microsoft SharePoint Server, Exchange and
VMware
The HP Data Protector Granular Recovery Extension User Guide for Microsoft Exchange Server provides information specific to this extension:
l
For detailed information about Data Protector specifics, see the Data Protector Documentation set.
l
For detailed information about Microsoft Exchange Server specifics, refer to the official Microsoft Exchange Server documentation.
l Software Version number, which indicates the software version.
l Document Release Date, which changes each time the document is updated.
l Software Release Date, which indicates the release date of this version of the software.
To check for recent updates or to verify that you are using the most recent edition of a document, visit the
Knowledge Base on the HPE Big Data Customer Support Site.
This document describes the steps to create a Vertica cluster on AWS. To run a Vertica
cluster on AWS requires creating Amazon Machine Instances (AMIs). The instructions in
this document apply to AMIs built with Vertica Version 7.2.x
The Vertica Community Edition is installed on the AMI. Community Edition is limited to
three nodes and up to 1 TB of data. Each AMI includes a Community Edition license.
Most of the remainder of this document describes the details of how to prepare your
AWS environment, launch AMI instances, and combine instances to create a cluster. To
set up your Vertica cluster on AWS, follow the detailed directions that follow, or use the
summarized set of tasks in Quick Start to Setting Up Vertica AWS
Introducing Backup to Disk devices and deduplication
This document describes how HPE Data Protector integrates with Backup to Disk devices and deduplication. By supporting deduplication, several new concepts are introduced to Data Protector, including a new device type, the Backup to Disk device, and four interface types: the HPE StoreOnce Software deduplication, the HPE StoreOnce Backup System, Smart Cache, and the EMC Data Domain Boost. Backup to Disk devices and deduplication are both discussed in detail in this document.
Backup to Disk devices are devices that back up data to a physical storage disk and support multi-host configurations. They support different backends such as the HP StoreOnce Software deduplication, the StoreOnce Backup system, Smart Cache, or the EMC Data Domain Boost. This document also describes the basic principles behind deduplication technology.
Data Protector supports the following deduplication backends:
HPE Data Protector Software deduplication provides the ability to deploy target-side deduplication on virtually any industry-standard hardware, offers greater flexibility than existing solutions as it can be deployed in a wider range of hardware set-ups, and provides enterprise-class scalability.
Because of the way Data Protector makes use of the extremely efficient HPE StoreOnce engine, Data Protector software deduplication uses memory very efficiently. As a result, you can deploy deduplication on application or backup servers without lowering application performance. Data Protector software deduplication can even be deployed on a virtual machine. In addition, Data Protector software deduplication delivers very high throughput. HPE StoreOnce Backup system devices are disk to disk (D2D) backup devices which support deduplication. Smart Cache devices are backup to disk devices that enable non-staged recovery from VMware backups. EMC Data Domain Boost devices are D2D backup devices which support deduplication.
Потребности:Надежное, экономически выгодное и простое в обращении решение для резервного копирования
Среда: VMware и Hyper-V, более, чем10 TБданных.
Предыдущее решение:
Очень дорогое и сложное решение для резервного копирования
Проблема: нехватка бюджета на нужды ИТ
Область применения:Социальные услуги.
Потребности:Сократить время и сложность бэкапа виртуальных машин.
Среда:45 ВМ, 1.5 TБданных, Windows Domain Controller, Lotus Notes, NAS
Область применения:ИТ услуги
Потребности:надежная система резервного копирования, нацеленная на сокращение времени простоя в случае отказа сервера.
Среда:множествоГипервизоров, WEBсайтов, ERP систем.
HP Distributed R is a high-performance scalable platform for the R language. It enables R to
leverage multiple cores and multiple servers to perform Big Data Advanced Analytics. It consists of
new R language constructs to easily parallelize algorithms across multiple R processes.
HP Distributed R simplifies large-scale analysis by extending R. Because R is a single-threaded
environment, it has limited utility for Big Data analytics. HP Distributed R allows you to specify that
parts of programs be run in multiple single-threaded R-processes. This approach results in
significantly reduced execution times for Big Data analysis.
Upgrade Without the Headache: Best Practices for Upgrading Hadoop in ProductionCloudera, Inc.
Walk through some of the best practices to keep in mind when it comes to upgrading your cluster, and learn how to leverage new Upgrade Wizard features in Cloudera Enterprise 5.3.
For most mission critical workloads, downtime is never an option. Any downtime can have a direct impact on revenue and lead to frantic calls in the middle of the night. For this reason, upgrading the software that powers these workloads can often be a daunting task. It can cause unpredictable issues without access to support. That’s why an enterprise-grade administration tool is crucial for running Hadoop in production. Hadoop consists of dozens of components, running across multiple machines, all with their own configurations. That can lead to a lot of complexity and uncertainty - especially when taking the upgrade plunge.
Cloudera Manager makes it easy and is the only production-ready administration tool for Hadoop. Not only does Cloudera Manager feature zero-downtime rolling upgrades, but it also has a built in Upgrade Wizard to make upgrades simple and predictable.
Save time completing backups and restores with a Dell PowerProtect Data Manag...Principled Technologies
The Dell Technologies solution also had the fastest time to day one activities among five data protection solutions
In our testing, we saw the Dell PowerProtect Data Manager Appliance achieve the fastest deployment time to day 1 activities among five data protection solutions, with Vendor X also achieving that fastest time. The
Dell Technologies solution with Transparent Snapshots also delivered a faster initial backup of 500 VMs than the Vendor X solution, and backed up the VMs within an overnight backup window—something the Vendor X
solution did not do. The PowerProtect Data Manager Appliance also delivered faster incremental backups and a faster VM restore than the solution from Vendor X using a traditional transport mode (NBD). In an ideal world, you’d never have to rely on your backups—but if you do, these results indicate that the Dell PowerProtect Data Manager Appliance with Transparent Snapshots could help your business recover more quickly.
Backup Navigator install and configuration guideAndrey Karpov
HP Backup Navigator is one of three products that support HP’s Adaptive Backup and Recovery solution. Adaptive Backup and Recovery is an innovative approach to data protection based on the use of operational analytics targeting the day-to-day use of the backup infrastructure. More importantly this approach adds trending capabilities and predictive algorithms enabling IT teams to make decisions about the backup and recovery process before problems surface. As a core component of the Adaptive Backup and Recovery solution, HP Backup Navigator delivers an interactive web-based reporting and analytics tool that correlates related, but often disparate, pools of information presenting the content graphically in the form of customizable dashboards, graphs, charts, summaries, trending views and detailed information concerning the backup performance, capacity utilization and daily operational details.
HPE IDOL Technical Overview - july 2016Andrey Karpov
Search and Analytics Platform for Text and Rich Media
Open Innovation is transforming everything
Connected people, apps and things generating massive data in many forms
How do you bridge the gap between data and outcomes?
Augmented Intelligence power apps for competitive advantage
Machine Learning at the Service of Business Augmented Intelligence
HPE Big Data Advanced Analytics Software Solutions
Strong information and weak information
HPE IDOL: Natural Language Processing (NLP) engine
VM Explorer® is a simple but powerful software to back up, replicate and restore your VMware ESX, ESXi and Microsoft Hyper-V Virtual Machines (VM).
The following documentation explains the main tasks required for configuration and daily use of VM Explorer®. All services hereinafter are brought to you by HPE.
The HPE services and materials presented for VM Explorer® hereinafter are protected by copyright, trademark, trade dress, unfair competition, and other intellectual property rights. The trademarks, logos and marks of HPE and VM Explorer® displayed on the services and products are the property of HPE or third parties. You are not permitted to use the Marks without the prior consent of HPE or the third party that may own the Marks.
Building and managing secure private and hybrid clouds
HP Helion extends beyond just cloud to become the very fabric of your enterprise. Delivers an extensible and open portfolio to build and manage enterprise grade end-to-end orchestrated cloud services.
Конференция по программным решениям HPE 2016Andrey Karpov
Конференция по программным решениям HPE 14 апреля 2016
Автоматизация процесса перевода транспортного сервиса между географически распределенными площадками
Система управления ТСЭР
Подсистема автоматизации процедуры перевода обработки
ЭС между центральными серверами ЦТУ ТСЭР (ПАПО)
Автоматизация процессов управления DevOps Новые реалии – новая скорость
8.0Transforming records management for Information Governance
•Access and understand virtually any source of information on-premise and in the cloud
•A strategic pillar of HP’s HAVEnBig Data platform
•Non-disruptive, manage-in-place approach complements any organization
Understanding human information
•Access and understand virtually any source of information on-premise and in the cloud
•A strategic pillar of HP’s HAVEnBig Data platform
•Non-disruptive, manage-in-place approach complements any organization
Become a data-driven organization with the Internet of Things
Executive summary
Personal health monitors tracking your fitness, trashcans monitoring their fullness, watches telling you more
than just the time, and agricultural soil monitors saying it’s time to water. It seems a day doesn’t go by that
we don’t hear about the latest “offline” thing, device, or equipment becoming “online,” moving from isolation
to being connected to the Internet of Things (IoT). It’s clear that integrating sensors, electronics, and
network connectivity into devices can enable innovation, enhancing and extending the way we work and
interact with each other and the world around us.
HP Vertica Analytic Database
Creating flex tables is similar to creating other tables, except column definitions are optional. When
you create flex tables, with or without column definitions, HP Vertica implicitly adds a special
column to your table, called __raw__. This is the column that stores loaded data. The __raw__
column type is LONG VARBINARY, and its default maximum width is 130000 bytes (with an
absolute maximum of 32000000 bytes). You can change the width default with the
FlexTablesRawSize configuration parameter.
Loading data into a flex table encodes the record into a map type, and populates the __raw__
column. The map type is a standard dictionary type, pairing keys with string values as virtual
columns.
Каталог программных решений. Управление портфелем сервисов. Управление разработкой и тестированием. Управление качеством предоставления бизнес сервисов. Автоматизация ЦОД и построение облачных платформ. Обеспечение безопасности. Большие данные. Техническая поддержка программных продуктов HPE. Сервисы для обучения работе с продуктами HPE. Авторизованные партнеры HPE.
Emerging Technologies For Business Intelligence, Analytics, and Data Warehousing
Report Purpose. This report educates organizations worldwide about the inventory of
currently available emerging technologies and methods (ETMs) as they apply directly
to business intelligence (BI), analytics, and data warehousing (DW). TDWI
assumes that the innovations and excitement of ETMs can make BI, DW, and
analytics more appealing, pervasive, insightful, and actionable.
Продукт HP Vertica является системой управления базами данных, работающей по принципам массивной параллельной обработки и разработанной специально для хранения и обработки больших объемов данных.
HP Vertica поддерживает язык SQL, стандартные интерфейсы доступа к данным ODBC, JDBC, ADO.NET, а также содержащий множество коннекторов к различным инструментам бизнес-аналитики и анализа данных.
Кластер СУБД HP Vertica состоит из узлов стандартной архитектуры x86, объединенных сетевым соединением. Все узлы кластера являются равноценными, любой из узлов кластера может принимать и обслуживать запросы пользователей, а также выполнять загрузку данных.
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...2023240532
Quantitative data Analysis
Overview
Reliability Analysis (Cronbach Alpha)
Common Method Bias (Harman Single Factor Test)
Frequency Analysis (Demographic)
Descriptive Analysis
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
3. l Search for knowledge documents of interest
l Submit and track support cases and enhancement requests
l Download software patches
l Manage support contracts
l Look up HPE support contacts
l Review information about available services
l Enter into discussions with other software customers
l Research and register for software training
Most of the support areas require that you register as an HPE Passport user and sign in. Many also require a
support contract. To register for an HPE Passport ID, go to:
https://hpp12.passport.hp.com/hppcf/createuser.do
To find more information about access levels, go to:
https://softwaresupport.hp.com/web/softwaresupport/access-levels
HPE Software Solutions Now accesses the HPESW Solution and Integration Portal Web site. This site
enables you to explore HPE Product Solutions to meet your business needs, includes a full list of
Integrations between HPE Products, as well as a listing of ITIL Processes. The URL for this Web site is
http://h20230.www2.hp.com/sc/solutions/index.jsp
Integration Guide
HPE Data Protector (9.07) Page 3 of 803
4. Contents
About this guide 26
Part 1: IBM Applications 27
Chapter 1: Data Protector Informix Server integration 28
Introduction 28
Integration concepts 29
Configuring the integration 30
Prerequisites 30
Before you begin 30
Cluster-aware clients 31
Configuring Informix Server users 31
Configuring Informix instances 31
Before you begin 31
Using the Data Protector GUI 31
Using the Data Protector CLI 34
Handling errors 35
Checking the configuration 36
Using the Data Protector GUI 36
Using the Data Protector CLI 36
Backup 37
What you must back up as filesystem 37
What does not need to be backed up? 37
Creating backup specifications 38
Modifying backup specifications 43
Scheduling backup sessions 44
Scheduling example 44
Previewing backup sessions 45
Using the Data Protector GUI 45
Using the Data Protector CLI 45
What happens during the preview? 46
Starting backup sessions 47
Backup methods 47
Before you begin 47
Using the Data Protector GUI 48
Using the Data Protector CLI 48
Using Informix Server commands 48
Using Informix Server log_full.sh on UNIX 50
Manual and continuous logical log backups 50
Restore 50
Restore methods 51
Integration Guide
HPE Data Protector (9.07) Page 4 of 803
5. Before you begin 51
Finding information for restore 51
Using the Data Protector GUI 51
Using the Data Protector CLI 52
Restoring using the Data Protector GUI 54
Restoring using the Data Protector CLI 57
Restoring using Informix Server commands 58
Restoring dbspaces, blobspaces, and logical logs 58
Restoring dbspaces and blobspaces only 58
Restoring a particular dbspace or blobspace 58
Restoring to another Informix Server 58
Restoring using another device 59
Using the Data Protector GUI 59
Using the Data Protector CLI or Informix Server commands 59
Monitoring sessions 60
Troubleshooting 60
Before you begin 60
Checks and verifications 60
Checking the Informix Server side 63
Problems 64
Chapter 2: Data Protector DB2 UDB integration 66
Introduction 66
Integration concepts 67
Considerations 68
Configuring the integration 68
Prerequisites 69
Before you begin 69
Cluster-aware clients 69
Partitioned environment 69
Configuring DB2 users 69
Configuring DB2 instances 70
Before you begin 70
Using the Data Protector GUI 70
Using the Data Protector CLI 71
Checking the configuration 72
Using the Data Protector GUI 72
Using the Data Protector CLI 72
Backup 72
Physically partitioned environment 73
Creating backup specifications 74
Modifying backup specifications 77
Scheduling backup sessions 77
Previewing backup sessions 78
Using the Data Protector GUI 78
Using the Data Protector CLI 78
What happens during the preview? 79
Integration Guide
HPE Data Protector (9.07) Page 5 of 803
6. Starting backup sessions 79
Before you begin 79
Using the Data Protector GUI 79
Using the Data Protector CLI 80
Starting backups of physically partitioned DB2 objects 80
Restore 80
Restoring using the Data Protector GUI 81
Restoring using the Data Protector CLI 86
Restoring to a new database or another DB2 instance 87
Restore in a partitioned environment 90
Restoring to the original database 91
Corrupt database 91
Physically partitioned environment 91
Logically partitioned environment 91
Restoring to a new database or another instance 91
Monitoring sessions 92
DB2 Pruning 92
Troubleshooting 93
Before you begin 94
Checks and verifications 94
Problems 94
Chapter 3: Data Protector Lotus Notes/Domino Server integration 100
Introduction 100
Integration concepts 101
Lotus Domino Cluster 102
Replicas 102
Replication in a cluster 103
Failover in a cluster 103
Example 103
Configuring the integration 104
Prerequisites 105
Before you begin 105
Transaction logging of Lotus Notes/Domino Server 105
Enabling transaction logging 106
Configuring Lotus Notes/Domino Server users 107
Configuring Lotus Notes/Domino Server systems 107
Using the Data Protector GUI 107
Using the Data Protector CLI 109
Checking the configuration 110
Using the Data Protector GUI 110
Using the Data Protector CLI 110
Handling errors 111
Backup 111
What is backed up? 112
What is not backed up? 112
Considerations 112
Integration Guide
HPE Data Protector (9.07) Page 6 of 803
7. Creating backup specifications 113
Modifying backup specifications 115
Scheduling backup sessions 115
Scheduling example 115
Previewing backup sessions 116
Using the Data Protector GUI 116
Using the Data Protector CLI 116
What happens during the preview? 117
Starting backup sessions 117
Using the Data Protector GUI 117
Restore 117
Finding information for restore 118
Using the Data Protector GUI 118
Using the Data Protector CLI 119
Restoring using the Data Protector GUI 119
Restoring using the Data Protector CLI 121
Restore options 122
Restore in Lotus Domino Cluster environment 123
Restoring a replica database without recovery 123
Restoring with recovery to the latest possible state 124
Point-in-time recovery 124
Restoring to a new location 125
Performance tuning 125
Monitoring sessions 125
Troubleshooting 125
Before you begin 126
Checking the Lotus Notes/Domino Server side 126
Checks and verifications 126
Problems 128
Part 2: Microsoft Applications 132
Chapter 4: Data Protector Microsoft SQL Server integration 133
Introduction 133
Integration concepts 134
Parallelism 135
Configuring the integration 136
Prerequisites 136
Before you begin 137
Data Protector SQL Server configuration file 137
Configuring users 138
Configuring an SQL Server cluster 139
Configuring SQL Server instances 139
Using the Data Protector GUI 139
Using the Data Protector CLI 142
Changing and checking configuration 143
Integration Guide
HPE Data Protector (9.07) Page 7 of 803
8. Using the Data Protector GUI 143
Using the Data Protector CLI 144
Backup 145
Creating backup specifications 145
SQL Server-specific backup options 150
Object-specific options 153
Scheduling backups 155
Scheduling example 155
Starting backup sessions 155
Using the Data Protector GUI 156
Restore 156
Before you begin 156
Restoring using the Data Protector GUI 156
Restore options 161
Restoring to a different SQL Server instance or/and different SQL Server 162
Restoring using the Data Protector CLI 163
Disaster recovery 164
Recovering the master database 165
Recovering user databases 165
Performance tuning 166
Monitoring sessions 169
Troubleshooting 169
Before you begin 169
Checks and verifications 169
Problems 170
Chapter 5: Data Protector Microsoft SharePoint Server 2007/2010/2013 integration 175
Introduction 175
Integration concepts 176
Configuring the integration 179
Prerequisites 179
Before you begin 179
Configuring user accounts 179
Backup 180
Backup concepts 181
Backup types 182
Creating backup specifications 182
Modifying backup specifications 186
Scheduling backup sessions 186
Scheduling example 186
Previewing backup sessions 187
Using the Data Protector GUI 187
Using the Data Protector CLI 187
What happens during the preview? 188
Starting backup sessions 188
Before you begin 188
Using the Data Protector GUI 188
Integration Guide
HPE Data Protector (9.07) Page 8 of 803
9. Using the Data Protector CLI 188
Preparing for disaster recovery 189
Restore 190
Restore concepts 190
Before you begin 192
Restoring using the Data Protector GUI 192
Restore options 200
Restoring using the Data Protector CLI 205
Disaster recovery 207
Monitoring sessions 207
Troubleshooting 207
Before you begin 207
Checks and verifications 208
Problems 208
Chapter 6: Data Protector Microsoft SharePoint Server Server VSS based solution 211
Introduction 211
Backup 211
Limitations 212
Restore 212
Installation and configuration 212
Licensing 212
Installing the integration 212
Configuring the integration 214
Configuring user accounts 214
Backup 215
Prerequisites 215
Limitations 215
Recommendations 215
How the command works 216
Microsoft Office SharePoint Server 2007 216
Microsoft SharePoint Server 2010 217
Microsoft SharePoint Server 2013 218
Considerations 218
The command syntax 218
Option description 219
Starting Windows PowerShell 222
Creating backup specifications (examples) 223
Modifying backup specifications 224
Source page 224
Destination page 225
Options page 225
Starting backup sessions (examples) 225
Scheduling backup sessions 228
Restore 229
Before you begin 230
Restoring data 231
Integration Guide
HPE Data Protector (9.07) Page 9 of 803
10. Considerations 231
Prerequisites 232
Restoring using the Data Protector GUI 232
Restoring using the Data Protector CLI 234
Limitations 234
After the restore 234
Restoring index files on the Query system 235
Troubleshooting 235
Before you begin 235
Checks and verifications 236
After restore, you cannot connect to the Central Administration webpage 236
Backup fails with the error Failed to resume Service Windows SharePoint Services
Help Search 236
After restore, a quiesce operation fails 237
After restore, you cannot connect to the FAST Search Server 237
The SharePoint_VSS_backup.ps1 script stops responding and the farm stays in read
only mode 238
SharePoint Search service application not operational after restore 238
Chapter 7: Data Protector Microsoft Exchange Server 2007 integration 241
Introduction 241
Integration concepts 241
Configuring the integration 242
Prerequisites 242
Limitations 243
Before you begin 243
Backup 243
Configuring Exchange Server Backup 244
Creating backup specifications 244
Exchange Server specific backup options 247
Scheduling backups 248
Scheduling example 248
Starting backup sessions 249
Using the Data Protector GUI 249
Restore 249
Restoring using the GUI 250
Restoring to another client 254
Restoring using the CLI 255
Troubleshooting 256
Before you begin 256
Checks and verifications 256
Problems 257
Chapter 8: Data Protector Microsoft Exchange Server 2010+ integration 261
Introduction 261
Integration concepts 262
Supported environments 262
Standalone environments 262
Integration Guide
HPE Data Protector (9.07) Page 10 of 803
11. DAG environments 262
Configuring the integration 264
Prerequisites 264
Limitations 265
Before you begin 265
Configuring user accounts 265
Windows domain user account for backup and restore sessions 265
User account for executing Exchange Management cmdlet operations 266
Backup 266
Backup types 267
Microsoft Exchange Server backup types 267
Backup parallelism 267
Backup considerations 268
Object operations considerations 268
Creating backup specifications 269
Modifying backup specifications 277
Scheduling backup sessions 277
Scheduling example 277
Previewing backup sessions 278
Using the Data Protector GUI 278
Using the Data Protector CLI 278
What happens during the preview? 279
Starting backup sessions 279
Using the Data Protector GUI 279
Using the Data Protector CLI 279
Backup objects 280
Restore 280
Restore methods 281
Repair all passive copies with failed status 281
Restore to the latest state 281
Restore to a point in time 282
Restore to a new mailbox database 282
Restore files to a temporary location 282
Restore destination 282
Restoring to a standalone database 283
Restoring to an active copy 283
Restoring to a passive copy 283
Restoring data to a new database 283
Restoring data to a temporary location 284
Restore chain 284
Restore parallelism 284
Finding information for restore 285
Using the Data Protector GUI 285
Using the Data Protector CLI 285
Restore procedure 285
Restoring using the Data Protector GUI 286
Integration Guide
HPE Data Protector (9.07) Page 11 of 803
12. Restoring using the Data Protector CLI 292
Restoring using another device 295
Restore options 295
Monitoring sessions 300
Troubleshooting 300
Before you begin 300
Checks and verifications 301
Problems 301
Chapter 9: Data Protector Microsoft Exchange Single Mailbox integration 305
Introduction 305
Integration concepts 306
Configuring the integration 307
Prerequisites 307
Limitations 307
Before you begin 307
Cluster-aware clients 307
Configuring Exchange Server users 308
Configuring Exchange servers 308
Checking the configuration 309
Backup 309
Creating backup specifications 310
Modifying backup specifications 313
Scheduling backup sessions 314
Scheduling example 314
Previewing backup sessions 315
Using the Data Protector GUI 315
Using the Data Protector CLI 315
What happens during the preview? 315
Starting backup sessions 315
Using the Data Protector GUI 315
Using the Data Protector CLI 316
Restore 316
Before you begin 316
Restoring using the Data Protector GUI 316
Restoring using the Data Protector CLI 322
Restore examples 323
Monitoring sessions 324
Performance tuning 324
Troubleshooting 326
Before you begin 326
Checks and verifications 326
Problems 327
Part 3: Oracle and SAP 331
Chapter 10: Data Protector Oracle Server integration 332
Integration Guide
HPE Data Protector (9.07) Page 12 of 803
13. Introduction 332
Integration concepts 333
Configuring the integration 337
Prerequisites 337
Limitations 338
Before you begin 338
Cluster-aware systems 339
Linking Oracle Server with the Data Protector MML 339
Linking on HP OpenVMS systems 340
Configuring Oracle user accounts 340
Configuring Oracle operating system user accounts 340
Clusters 341
Configuring Oracle database user accounts 341
Configuring user accounts on HP OpenVMS systems 342
Configuring Oracle databases 343
Using the Data Protector GUI 344
Using the Data Protector CLI 346
Configuring multiple Oracle databases simultaneously 348
XLS files 350
CSV files 350
Checking the configuration 352
Using the Data Protector GUI 352
Using the Data Protector CLI 352
Handling errors 353
Setting environment variables 353
Using the Data Protector GUI 354
Using the Data Protector CLI 355
Backup 355
Creating new templates 356
Creating backup specifications 356
Examples of pre-exec and post-exec scripts on UNIX systems 363
Editing the Oracle RMAN script 364
Creating copies of backed up objects 367
Testing the integration 367
Testing using the Data Protector GUI 367
Testing using the CLI 368
Starting backup sessions 369
Scheduling backup sessions 371
Running an interactive backup 372
Starting a backup using the GUI 372
Starting a backup using the CLI 373
Starting Oracle backup using RMAN 374
Examples of the RMAN scripts 376
Restore 380
Prerequisites 382
Restoring Oracle using the Data Protector GUI 382
Integration Guide
HPE Data Protector (9.07) Page 13 of 803
14. Restoring database items in a disaster recovery 382
Changing the database state 382
Restoring the recovery catalog database 383
Restoring the control file 384
Restoring Oracle database objects 386
Restoring tablespaces and datafiles 390
Restoring and recovering an Oracle database in Oracle Data Guard environment 390
Restoring and recovering a primary database 390
Restoring and recovering a standby database 390
Duplicating an Oracle database 391
Restore, recovery, and duplicate options 393
Restore action options 393
General options 394
Duplicate options 395
Restore and recovery options 395
Restoring Oracle using RMAN 397
Preparing the Oracle database for restore 397
Connection strings used in the examples 399
SBT_LIBRARY parameter 399
Example of full database restore and recovery 399
Example of point-in-time restore 400
Example of tablespace restore and recovery 401
Example of datafile restore and recovery 403
Example of archive log restore 405
Example of database restore using a different device (with the automatic device
selection functionality disabled) 406
Restoring using another device 406
Disaster recovery 407
Monitoring sessions 408
Monitoring current sessions 408
Viewing previous sessions 409
Resuming sessions 409
Using the Data Protector GUI 411
Using the Data Protector CLI 412
Aborting sessions 413
Oracle RMAN metadata and Data Protector Media Management Database
synchronization 413
Troubleshooting 414
Before you begin 414
Checks and verifications 414
Problems 419
Chapter 11: Data Protector MySQL integration 424
Introduction 424
Integration concepts 425
Configuring the integration 426
Prerequisites 427
Integration Guide
HPE Data Protector (9.07) Page 14 of 803
15. Configuration steps 427
Checking the configuration 429
Backup 429
Limitations 429
Considerations 430
Creating backup specifications 430
Application-specific backup options 433
Modifying backup specifications 434
Scheduling backup sessions 435
Starting backup sessions 435
Restore 435
Limitations 435
Considerations 435
Finding information needed for restore 436
Using the Data Protector GUI 436
Using the Data Protector CLI 436
Restoring using the Data Protector GUI 436
Restoring using the Data Protector CLI 439
MySQL data migration 440
MySQL restore options 440
Monitoring and reviewing sessions 443
Troubleshooting 443
Before you begin 444
Checks and verifications 444
Chapter 12: Data Protector SAP R/3 integration 445
Introduction 445
Integration concepts 446
Backup flow 449
Restore flow 450
Data Protector SAP R/3 configuration file 451
Setting, retrieving, listing, and deleting Data Protector SAP R/3 configuration file
parameters using the CLI 453
Configuring the integration 455
Prerequisites 456
Before you begin 456
Cluster-aware clients 457
Configuring user accounts 457
Checking the connection 458
Authentication password file 458
Enabling archived logging 459
Linking Oracle Server with the Data Protector MML 460
Choosing authentication mode 460
Configuring SAP R/3 databases 461
Before you begin 461
Using the Data Protector GUI 461
Using the Data Protector CLI 464
Integration Guide
HPE Data Protector (9.07) Page 15 of 803
16. Handling errors 465
Checking the configuration 466
Using the Data Protector GUI 466
Using the Data Protector CLI 466
Backup 467
Considerations 469
Creating backup specifications 469
Modifying backup specifications 474
Scheduling backup sessions 474
Scheduling example 474
Previewing backup sessions 475
Using the Data Protector GUI 475
Using the Data Protector CLI 475
What happens during the preview? 475
Starting backup sessions 476
Backup methods 476
Using the Data Protector GUI 476
Using the Data Protector CLI 476
Using the SAP BRTOOLS 476
Backing up using Oracle Recovery Manager 478
Manual balancing 478
Restore 479
Considerations 479
Restoring using the Data Protector GUI 479
Restoring using the Data Protector CLI 481
Restoring using the SAP commands 482
Restoring using another device 483
Using the Data Protector GUI 483
Using the Data Protector CLI or SAP commands 483
Localized SAP R/3 objects 483
Sparse files 484
Disaster recovery 484
Restoring the control file 484
Monitoring sessions 484
Troubleshooting 485
Before you begin 485
General troubleshooting 485
Troubleshooting on Windows systems 486
Prerequisites concerning the Oracle side of the integration 486
Prerequisites on the SAP side of the integration 487
Configuration problems 488
Backup problems 491
Restore problems 492
Troubleshooting on UNIX systems 493
Prerequisites concerning the Oracle side of the integration 493
Prerequisites on the SAP side of the integration 496
Integration Guide
HPE Data Protector (9.07) Page 16 of 803
17. Configuration problems 497
Backup problems 498
Restore problems 499
Chapter 13: Data Protector SAP MaxDB integration 503
Introduction 503
Integration concepts 504
Backup flow 505
Restore flow 505
Configuring the integration 505
Prerequisites 506
Limitations 506
Before you begin 506
Cluster-aware clients 506
Configuring SAP MaxDB users 506
Configuring SAP MaxDB instances 507
Before you begin 507
Using the Data Protector GUI 507
Using the Data Protector CLI 509
Handling errors 510
Checking the configuration 510
Using the Data Protector GUI 510
Using the Data Protector CLI 510
Backup 511
Creating backup specifications 511
Modifying backup specifications 513
Scheduling backup sessions 513
Scheduling example 514
Previewing backup sessions 514
Using the Data Protector GUI 515
Using the Data Protector CLI 515
What happens during the preview? 515
Starting backup sessions 515
Backup methods 515
Using the Data Protector GUI 516
Using the Data Protector CLI 516
Using SAP MaxDB utilities 516
Restore 519
Restore and recovery overview 519
Before you begin 521
Restoring using the Data Protector GUI 522
Restoring using the Data Protector CLI 523
Restoring using SAP MaxDB utilities 524
SAP MaxDB restore and recovery 525
SAP MaxDB migration 528
Finding information for restore 528
SAP MaxDB restore options 528
Integration Guide
HPE Data Protector (9.07) Page 17 of 803
18. Restoring using another device 531
Using the Data Protector GUI 532
Using the Data Protector CLI or SAP commands 532
Monitoring sessions 532
Troubleshooting 532
Before you begin 532
Problems 533
SAP MaxDB cluster-related troubleshooting 535
Chapter 14: Data Protector SAP HANA Appliance integration 537
Introduction 537
Integration concepts 538
Integration limitations 539
Configuring the integration 540
Prerequisites 540
Configuration steps 540
Linking Data Protector backint agent with SAP HANA Appliance 540
Adjusting SAP HANA backup settings for redo logs 541
Backup 541
Creating backup specifications 542
Creating Data Protector parameter files for SAP HANA 544
Modifying backup specifications 545
Starting backup sessions 545
SAP HANA backup catalog 545
Restore 546
Finding information for restore 546
Starting restore and recovery sessions 546
Prerequisites 546
Restoring using another device 547
Using the Data Protector GUI 547
Using the Data Protector CLI or SAP commands 547
Recovering a system to a different machine and SystemID (SID) 547
Prerequisites 547
Recovering a system to different machine and same SystemID (SID) 548
Prerequisites 548
Recovering a system to same SystemID without catalog 549
Monitoring sessions 550
Troubleshooting 550
Before you begin 550
Problems 551
Part 4: Sybase and Network Data Management Protocol Server 555
Chapter 15: Data Protector Sybase Server integration 556
Introduction 556
Integration concepts 556
Data Protector CLI commands 557
Integration Guide
HPE Data Protector (9.07) Page 18 of 803
19. Configuring the integration 558
Prerequisites 558
Before you begin 558
Cluster-aware clients 559
Configuring Sybase users 559
Configuring Sybase instances 559
Before you begin 559
Using the Data Protector GUI 559
Using the Data Protector CLI 562
Checking the configuration 562
Using the Data Protector GUI 562
Using the Data Protector CLI 563
Backup 563
Creating backup specifications 563
Modifying backup specifications 568
Scheduling backup sessions 568
Previewing backup sessions 569
Using the Data Protector GUI 569
Using the Data Protector CLI 569
What happens during the preview? 570
Starting backup sessions 570
Using the Data Protector GUI 571
Using the Data Protector CLI 571
Using Sybase commands 571
Restore 572
Localized database names 572
Finding information for restore 572
Using the Data Protector GUI 572
Using the Data Protector CLI 572
Using the Data Protector syb_tool command 573
Using the standard Data Protector CLI commands 576
Restoring using the Sybase isql command 578
Restore examples 579
Restoring using another device 581
Monitoring sessions 581
Troubleshooting 581
Before you begin 582
Checks and verifications 582
Problems 583
Chapter 16: Data Protector Sybase IQ integration 586
Introduction 586
Backup 586
Pre-Exec Sybase IQ Backup Command Sample 587
Restore 587
Post-Exec Sybase IQ Restore Command Sample 589
Chapter 17: Data Protector Network Data Management Protocol Server integration 590
Integration Guide
HPE Data Protector (9.07) Page 19 of 803
20. Introduction 590
Integration concept 591
Configuring the integration 592
Prerequisites 593
Importing NDMP Server systems 593
Creating media pools 595
Configuring NDMP devices 595
Configuring tape libraries 597
Configuring standalone devices 599
Network Appliance configuration 600
Standalone tape devices and drives in a tape library 600
Library robotics 601
EMC Celerra configuration 602
SCSI devices 602
EMC Isilon configuration 602
Hitachi BlueArc or Hitachi configuration 603
Library robotics 604
Standalone tape devices and drives in a tape library 604
Block size 605
Backup 605
Backup types 605
Before you begin 607
Creating backup specifications 608
Modifying backup specifications 610
Starting backup sessions 610
Restore 611
Restoring using the Data Protector GUI 611
Direct access restore 613
Restoring using another device 614
NDMP environment variables 614
The NDMP specific omnirc options 617
Media management 618
Troubleshooting 619
Before you begin 619
Problems 619
Chapter 18: Data Protector NetApp SnapManager solution 622
Introduction 622
Concepts 622
Configuration 622
Prerequisites 622
Configuration procedure 623
Backup 624
Limitations 624
Creating a backup specification 624
Restore 626
omnisnapmgr.pl reference page 629
Integration Guide
HPE Data Protector (9.07) Page 20 of 803
21. SYNOPSIS 629
DESCRIPTION 629
OPTIONS 629
NOTES 630
EXAMPLES 630
Part 5: Virtualization 632
Chapter 19: Data Protector Virtual Environment integration for VMware 633
Introduction 633
Recommendations 634
Integration concepts 634
Supported environments 634
vCenter environment 634
Migration of virtual machines 635
vCenter Server system in a cluster 637
Standalone ESX/ESXi Server environment 637
Data Protector components 637
Data ProtectorCell Manager 637
Data Protector Virtual Environment Integration component 638
Data Protector Disk Agent component 638
Data Protector Media Agents 638
Backup concepts 639
What is backed up? 639
Virtual machines 639
Virtual machine templates 640
vStorage Image backup method 640
vStorage Image + OpenStack backup method 641
General limitations 642
Considerations 642
Snapshot management 642
Backup types 643
Changed block tracking 644
Non-Changed Block Tracking (Non-CBT) backup 646
Quiescence 647
Prerequisites 649
Limitations 649
Considerations for Quiescence Operations 649
Disk space requirements 650
Free space required option 650
Backup disk buffer 651
Backup parallelism 651
Backup considerations 652
Restore concepts 653
Restore of VMware objects backed up with vStorage Image method 653
Restore to a datacenter 653
Integration Guide
HPE Data Protector (9.07) Page 21 of 803
22. Restore to a directory 654
Restore of Nova Instances and Shadow VMs backed up with vStorage Image +
Openstack method 654
Restore chain 655
Power On and Live Migrate 655
Restore considerations 656
Power On considerations 657
StoreOnce Recovery Manager Central Integration 658
Configuring the integration 660
Recommendations 660
Prerequisites 660
Before you begin 661
Importing and configuring VMware clients 661
Changing the configuration of VMware clients 664
Using the Data Protector GUI 664
Using the Data Protector CLI 665
Checking the configuration of VMware clients 666
Using the Data Protector GUI 666
Using the Data Protector CLI 666
Configuring virtual machines 667
Using the Data Protector GUI 667
Using the Data Protector CLI 670
Customizing the Data Protector behavior with omnirc options 671
Adding the RMC Server details in Data Protector using the Command Line Interface 672
Backup 672
Backup limitations 672
vStorage Image + OpenStack backup method limitations 673
Creating backup specifications 673
Creating backup specifications for RMC backups 678
Modifying backup specifications 681
Scheduling backup sessions 682
Scheduling example 683
Previewing backup sessions 684
Using the Data Protector GUI 684
Using the Data Protector CLI 684
What happens during the preview? 684
Starting backup sessions 684
Using the Data Protector GUI 684
Using the Data Protector CLI 685
Preparing for disaster recovery 685
Restore 686
Restore limitations 686
vStorage Image + OpenStack restore limitations 688
Power On and Live Migrate limitations 688
Finding information for restore 689
Using the Data Protector GUI 689
Integration Guide
HPE Data Protector (9.07) Page 22 of 803
23. Using the Data Protector CLI 691
Restoring using the Data Protector GUI 691
Restoring using the Data Protector CLI 703
Recovering virtual machines manually 705
Recovering virtual machines after restore to a directory 706
Recovering with the VM configuration file in the VMX format 706
Recovering with the VM configuration file in the XML format 711
Recovering virtual machines after restore to a datacenter 711
Restoring using another device 712
Cleaning up a datastore after a failed restore 712
Disaster recovery 712
Monitoring sessions 713
Troubleshooting 713
Before you begin 713
Checks and verifications 713
Problems 714
Chapter 20: Data Protector Virtual Environment integration for Microsoft Hyper-V 729
Introduction 729
Integration concepts 730
Supported environments 730
Standalone environments 730
Clustered environments 731
Migration of virtual machines 734
Cluster Shared Volumes 735
Hyper-V Replica 735
Virtual machines on Windows file shares 736
Data Protector installation components 736
Data Protector Cell Manager 736
Data Protector Virtual Environment Integration component 737
Data Protector Disk Agent component 737
Data Protector MS Volume Shadow Copy Integration component 737
Data Protector Media Agent component 737
Backup concepts 737
Hyper-V Image backup method 737
Backup types 739
Microsoft Hyper-V backup types 739
VSS backup types 739
Quiescence 740
Restore chain protection 740
Backup considerations 741
Virtual machine storage 741
Concurrent sessions 741
Cluster Shared Volumes (CSV) 741
Virtual machines on SMB file shares 741
Incremental backup 743
Virtual machine replicas 743
Integration Guide
HPE Data Protector (9.07) Page 23 of 803
24. Virtual machine migration 744
ZDB environments 744
Object copy considerations 745
Restore concepts 745
Restore of virtual machines 745
Restore to the default location 745
Restore to a different location 746
Restore to a directory 746
Restore of individual virtual machine disks 746
Prerequisites for disk restore 747
Prerequisites for Backup and Hyper-V hosts 748
Successful restore session flow 750
Restore chain validation 750
Restore considerations 750
Data Protector backup solutions 751
Restore parallelism 751
Restore to a backup host 752
Restore to a different location 752
Restore of virtual machine replicas 752
Virtual machines on Windows shares 753
Configuring the integration 754
Prerequisites 754
Limitations 755
Before you begin 755
Enabling automatic mounting of new volumes on Microsoft Hyper-V systems 755
Configuring Microsoft Hyper-V clusters 755
Importing and configuring Microsoft Hyper-V systems 755
Changing the configuration of Microsoft Hyper-V systems 757
Using the Data Protector GUI 757
Using the Data Protector CLI 758
Customizing the Data Protector behavior with omnirc options 758
Backup 758
Creating backup specifications 758
Modifying backup specifications 763
Scheduling backup sessions 765
Scheduling example 765
Starting backup sessions 766
Using the Data Protector GUI 766
Using the Data Protector CLI 767
Restore 767
Limitations 767
Finding information for restore 768
Using the Data Protector GUI 768
Using the Data Protector CLI 768
Restoring using the Data Protector GUI 769
Restoring using the Data Protector CLI 771
Integration Guide
HPE Data Protector (9.07) Page 24 of 803
25. Merging virtual machine snapshots manually 773
Restore of cluster virtual machines 774
Restoring a replicated virtual machine 774
Re-enabling the replication 774
Reverting a restored replica VM to an application-consistent recovery point 775
Restoring using another device 775
Monitoring sessions 775
Troubleshooting 775
Before you begin 775
Checks and verifications 776
Problems 776
Part 6: PostgreSQL 785
Chapter 21: Data Protector PostgreSQL integration 786
Introduction 786
Integration concepts 787
Configuring the integration 788
Prerequisites 789
Before you begin 789
Configuration steps 789
Checking the configuration 791
Backup 791
Prerequisites 791
Backup considerations 791
Creating backup specifications 791
Application-specific backup options 794
Modifying backup specifications 795
Scheduling backup sessions 795
Starting backup sessions 795
Restore 795
Limitations 796
Finding information needed for restore 796
Using the Data Protector GUI 796
Using the Data Protector CLI 796
Before you begin 796
Restoring using the Data Protector GUI 797
Restoring using the Data Protector CLI 798
PostgreSQL data migration 798
PostgreSQL restore options 798
Monitoring and reviewing sessions 800
Troubleshooting 800
Before you begin 800
Checks and verifications 800
Send Documentation Feedback 802
Integration Guide
HPE Data Protector (9.07) Page 25 of 803
26. About this guide
This guide describes how to configure and use the following:
l IBM Informix Server integration, IBM DB2 UDB integration, and IBM Lotus Notes/Domino Server
integration.
l Microsoft SQL server integration, Microsoft SQL Server 2007/2010/2013 integration, Microsoft SharePoint
Server VSS based solution, Microsoft Exchange Server 2007 integration, Microsoft Exchange Server 2010
integration, and Microsoft Exchange Single Mailbox integration.
l Oracle Server integration, MySQL integration, SAP R/3 integration, SAP MaxDB integration, and SAP
HANA Appliance integration.
l Sybase Server integration, Network Data Management Protocol Server integration, and NetApp
SnapManager solution.
l VMware - Virtual Environment integration and Microsoft Hyper-V - Virtual Environment integration.
HPE Data Protector (9.07) Page 26 of 803
27. HPE Data Protector (9.07)
Part 1: IBM Applications
This part of the guide describes ways to back up and restore Informix Server database objects, DB2
databases, and Lotus Notes/Domino Server.
This part includes the following chapters:
l Data Protector Informix Server integration
l Data Protector DB2 UDB integration
l Data Protector Lotus Notes/Domino Server integration
28. Chapter 1: Data Protector Informix Server
integration
Introduction
This chapter explains how to configure and use the Data Protector Informix Server integration. It
describes the concepts and methods you need to understand to back up and restore Informix Server
database objects (dbobjects).
Data Protector integrates with the Informix Dynamic Server (Informix Server) to back up dbobjects
online. During backup, a database server (Informix instance) is online and actively used.
Data Protector offers interactive and scheduled backups of the following types:
Informix Server backup types
Backup type Description
Full Full backup (level 0).
Incr1 Incremental backup (level 1). Backs up changes since the last
Full backup.
Incr2 Incremental backup (level 2). Backs up changes since the last
Incr1 backup.
Data Protector offers two types of restore:
Informix Server restore types
Restore type Description
Complete database restore Restore from any backup. ON-Bar restores dbobjects
concurrently and replays the logical logs once.
Whole-system restore Restore from a whole-system backup. ON-Bar restores the
whole system sequentially with or without restoring the logical
logs. Whole-system restore is appropriate for small systems,
when you do not need to restore logs, for disasterrecovery, or
when restoring to another client.
You can also back up and restore dbobjects using the Informix Server onbar command.
This chapter provides information specific to the Data Protector Informix Server integration. For general
Data Protector procedures and options, see the HPE Data Protector Help.
HPE Data Protector (9.07) Page 28 of 803
29. Integration concepts
Data Protector integrates with the Informix Server through the Data Protector Database Library based
on a common library called Data Protector BAR (Backup And Restore). The Data Protector Database
Library channels communication between the Data Protector Session Manager, and, via the XBSA
interface, the Informix Server ON-Bar utility. "Data Protector Informix Server integration architecture"
below shows the architecture of the Data Protector Informix Server integration.
Data Protector Informix Server integration architecture
Informix Server integration architecture - Legend and Description
Legend Description
SM Data Protector Session Manager: Backup Session Manager during backup
and Restore Session Manager during restore.
ON-Bar ON-Bar executes backup and restore requests from Data Protector and
from the Informix Server command line.
XBSA X/Open Backup Services Application Programmer's Interface, through
which ON-Bar and Data Protector exchange control and data.
Database Library A set of Data Protector executables that enable data transfer between an
Informix instance and Data Protector.
MA Data Protector General Media Agent.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 29 of 803
30. Legend Description
Backup Specification A list of objects to be backed up, backup devices, and options to be used.
IDB The Data Protector Internal Database.
Backup is always executed on the Informix Server system via the Informix Server ON-Bar utility. ON-
Bar communicates backup and restore requests to the Informix instance.
While an Informix instance is responsible for read/write operations to disk, Data Protector reads from
and writes to devices and manages media.
Configuring the integration
You need to configure an Informix Server user and every Informix instance you intend to back up or
restore.
Prerequisites
l Ensure that you have correctly installed and configured Informix Server.
l For supported versions, platforms, devices, and other information, see the HPE Data Protector
Product Announcements, Software Notes, and References or
http://support.openview.hp.com/selfsolve/manuals.
l For information on installing, configuring, and using Informix Server, see the Informix Server
online documentation.
l Ensure that you have correctly installed Data Protector. For information on how to install Data
Protector in various architectures, see the HPE Data Protector Product Announcements, Software
Notes, and References.
Every Informix Server system you intend to back up from or restore to must have the Data Protector
Informix Integration component installed.
Before you begin
l Configure devices and media for use with Data Protector.
l To test whether the Informix Server system and the Cell Manager communicate properly, configure
and run a Data Protector filesystem backup and restore on the Informix Server system.
l Windows systems:
l On Windows Server 2003 system, you need to restart the Data Protector Inet service under a
Windows domain user account that has the appropriate Informix Server permissions for running
backups and restores. Stop the service and restart it as user informix.
For information on changing the user account under which the Data Protector Inet service is
running, see the HPE Data Protector Help index: “Inet, changing account”.
l On other Windows operating systems, configure the Data Protector Inet service user
impersonation for the user that has the appropriate Informix Server permissions for running
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 30 of 803
31. backups and restores.
For details, see the HPE Data Protector Help index: “Inet user impersonation”.
Cluster-aware clients
Configure Informix instances only on one cluster node, since the configuration files reside on the Cell
Manager.
If you intend to use the Data Protector CLI, set the Data Protector environment variable
OB2BARHOSTNAME to the virtual server name as follows:
Windows systems: set OB2BARHOSTNAME=virtual_server_name
UNIX systems: export OB2BARHOSTNAME=virtual_server_name
Configuring Informix Server users
On UNIX, add the Informix Server administrator to the Data Protector admin or operator user group.
For information, see the HPE Data Protector Help index: “adding users”.
This user is typically informix or root in the group informix. To determine it, check the owner of the
Informix Server onbar_d file.
This chapter assumes that your Informix Server user is informix in the group informix.
Configuring Informix instances
You need to provide Data Protector with configuration parameters for the Informix instance:
l Name of the Informix instance.
l Pathname of the Informix Server home directory.
l Windows systems: Name of the system with the sqlhosts entry in the Windows Registry.
UNIX systems: Pathname of the sqlhosts file.
l Name of the Informix instance ONCONFIG file.
Data Protector then creates the Informix instance configuration file on the Cell Manager and verifies the
connection to the instance.
To configure an Informix instance, use the Data Protector GUI or CLI.
Before you begin
l Ensure that the Informix instance is online.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add
Backup.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 31 of 803
32. 3. In the Create New Backup dialog box, click OK.
4. In Client, select the Informix Server system. In a cluster environment, select the virtual server.
In Application database, enter the Informix instance name.
In the User and group/domain options, specify the account under which you want the backup
session to run. These options are available on UNIX and Windows Server 2008 clients. On
Windows Server 2003, the backup session will run under the account under which the Data
Protector Inet service is running.
Ensure that this user has been added to the Data Protector admin or operator user group, and
has the Informix Server backup rights. This user becomes the backup owner.
l UNIX systems: Type informix in both Username and Group/Domain name.
l Windows Server 2008: In Username and Group/Domain name, type the user name and
domain (for example, the user name Administrator, domain DP). This account must be set up
for the Data Protector Inet service user impersonation. For details, see the HPE Data
Protector Help index: “Inet user impersonation”.
Specifying an Informix instance
Click Next.
5. In Informix Server home directory, specify the pathname of the Informix Server home directory.
In Full pathname of sqlhosts file, enter the following:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 32 of 803
33. Windows systems: Name of the system with the sqlhosts entry in the Windows Registry. Use
the UNC notation, for example: computer_name.
UNIX systems: Pathname of the sqlhosts file.
In Name of ONCONFIG file, enter the name of the Informix instance ONCONFIG file, located in
the following directory:
Windows systems: INFORMIXDIRetc
UNIX systems: INFORMIXDIR/etc
Configuring an Informix instance (Windows)
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 33 of 803
34. Configuring an Informix instance (UNIX)
Click OK.
6. If an error occurs, click Details or see "Troubleshooting" on page 60.
7. The Informix instance is configured. Exit the GUI or proceed with creating the backup
specification at "Select the dbobjects to be backed up." on page 38.
Using the Data Protector CLI
Log in to the Informix Server system as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/lbin
Other UNIX systems: /usr/omni/bin
execute the following:
Windows systems:
perl -I..libperl util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts
ONCONFIG
UNIX systems:
util_informix.pl -CONFIG INFORMIXSERVER INFORMIXDIR sqlhosts ONCONFIG
Parameter description
INFORMIXSERVER Name of the Informix instance.
INFORMIXDIR Pathname of the Informix Server home directory.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 34 of 803
35. sqlhosts Windows systems: Name of the system with the sqlhosts entry in the
Windows Registry. Use the UNC notation, for example: computer_name.
UNIX systems: Pathname of the sqlhosts file.
ONCONFIG Name of the Informix instance ONCONFIG file.
The message *RETVAL*0 indicates successful configuration.
Configuring an Informix instance (Windows)
Configuring an Informix instance (HP-UX, Solaris)
Handling errors
If an error occurs, the error number is displayed in the form *RETVAL*error_number.
To get the error description:
Windows systems: On the Cell Manager, see the file Data_Protector_
homehelpenuTrouble.txt.
HP-UX and Solaris systems: Execute:
/opt/omni/lbin/omnigetmsg 12 error_number
Other UNIX systems: Execute:
/usr/omni/bin/omnigetmsg 12 error_number
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 35 of 803
36. Checking the configuration
You can check the configuration of an Informix instance after you have created at least one backup
specification for the Informix instance. Use the Data Protector GUI or CLI.
Using the Data Protector GUI
1. In the Context List, select Backup.
2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Click the backup
specification to display the Informix instance to be checked.
3. Right-click the Informix instance and click Check configuration.
Using the Data Protector CLI
Log in to the Informix Server system as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/lbin
Other UNIX systems: /usr/omni/bin
execute:
Windows systems:
perl -I..libperl util_informix.pl -CHKCONF INFORMIXSERVER
UNIX systems:
util_informix.pl -CHKCONF INFORMIXSERVER
where INFORMIXSERVER is the name of the Informix instance.
Checking configuration (Windows)
Checking configuration (UNIX)
A successful configuration check displays the message *RETVAL*0.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 36 of 803
37. If an error occurs, the error number is displayed in the form *RETVAL*error_number. For information on
how to get the error description, see "Handling errors" on page 35.
Backup
The integration provides online database backup of the following types:
Informix Server backup types
Backup type Description
Full Full backup (level 0).
Incr1 Incremental backup (level 1). Backs up changes since the last
Full backup.
Incr2 Incremental backup (level 2). Backs up changes since the last
Incr1 backup.
For details on these types and on ON-Bar, see the Backup and restore guide of Informix Server.
What you must back up as filesystem
ON-Bar backs up all dbobjects except the following, which you must back up using a filesystem
backup:
What needs to be backed up as filesystem
Object Location
The ONCONFIG file Windows systems:
INFORMIXDIR etc
UNIX systems:
INFORMIXDIR /etc
Note: This is not applicable
for Informix versions 11.7
and 12.1.
The oncfg_SERVERNAME.SERVERNUM file
Emergency boot file, an Informix Server configuration file called
ixbar.server_id, where server_id is the value of the
SERVERNUM configuration parameter.
UNIX systems: The sqlhosts file
Simple-large-object data in blobspaces Disks or optical platters
How often you need to back up these objects depends on how frequently they change. However, back
up the emergency boot file at least daily and always after a critical dbspace backup.
What does not need to be backed up?
ON-Bar does not back up the following items because it automatically re-creates them during a restore:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 37 of 803
38. l Dbspace pages allocated to the Informix instance but not yet allocated to a tblspace extent.
l Mirror chunks, if the corresponding primary chunks are accessible.
l Temporary dbspaces.
Creating backup specifications
Create a backup specification using the Data Protector Manager.
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click Informix Server, and click Add
Backup.
3. In the Create New Backup dialog box, click OK.
4. In Client, select the Informix Server system. In a cluster environment, select the virtual server.
In Application database, select the Informix instance to be backed up.
In the User and group/domain options, specify the account under which you want the backup
session to run. These options are available on UNIX and Windows Server 2008 clients. On
Windows Server 2003, the backup session will run under the account under which the Data
Protector Inet service is running.
Ensure that this user has been added to the Data Protector admin or operator user group, and
has the Informix Server backup rights. This user becomes the backup owner.
l UNIX systems: Type informix in both Username and Group/Domain name.
l Windows Server 2008: In Username and Group/Domain name, type the user name and
domain (for example, the user name Administrator, domain DP). This account must be set up
for the Data Protector Inet service user impersonation. For details, see the HPE Data
Protector Help index: “Inet user impersonation”.
Click Next.
5. If the Informix instance is not configured yet for use with Data Protector, the Configure Informix
dialog box is displayed. Configure it as described in "Configuring Informix instances" on page 31.
6. Select the dbobjects to be backed up.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 38 of 803
39. Selecting backup objects
For Informix versions 11.7 and 12.1, you must appropriately select the system database objects,
rootdbs, physdbs, plog, llog, and logdbs if you have created another database. If these are not
selected together for the restore session, the session fails.
Click Next.
7. Select devices to use for the backup.
To specify device options, right-click the device and click Properties. Specify the number of
parallel backup streams in the Concurrency tab and the media pool you will use.
Note: Except for whole-system backups, ON-Bar backs up and restores dbobjects
concurrently, creating a new process for each object. The number of processes is limited by
the Informix Server BAR_MAX_BACKUP configuration parameter. Set the Informix configuration
parameter BAR_MAX_BACKUP to the Data Protector concurrency.
To specify which resource types can be backed up to the device, click the Informix tab, select the
desired resource types, and click OK. See "Specifying Informix Server resource types" on the
next page.
Ensure that the selected devices cover all resource types specified for backup and are not locked
when starting the backup. Ideally, back up each resource to a separate device.
For a logical log backup, always use a separate device and ensure that the LTAPEDEV parameter in
the ONCONFIG file is not set to /dev/null or ''.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 39 of 803
40. Specifying Informix Server resource types
Informix Server resource types
Resource type Description
B Blobspace
CD Critical dbspace (a root dbspace or a dbspace containing the
physical log or a logical log file)
L Logical log
MR Master root dbspace
ND Non-critical dbspace
R Root dbspace
CF Critical file
Note: Selecting this resource is mandatory for Informix
versions 11.7 and 12.1.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 40 of 803
41. Tip: Select an additional set of devices (covering all resource types specified for backup) so
that they can take over if some devices in the primary group fail. Select the Load balancing
option and set the Min and Max parameters to the number of primary devices.
Click Next.
8. Set backup options ("Informix Server specific backup options (Windows)" below and "Informix
Server specific backup options (UNIX)" on the next page). For information, see "Informix Server
backup options " on the next page.
Informix Server specific backup options (Windows)
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 41 of 803
42. Informix Server specific backup options (UNIX)
Click Next.
9. Optionally, schedule the backup. See "Scheduling backup sessions" on page 44.
Click Next.
10. Save the backup specification, specifying a name and a backup specification group.
Tip: Preview backup session for your backup specification before using it. See "Previewing
backup sessions" on page 45.
Informix Server backup options
Option
Description
Backup
type
Storage-space
backup
(default)
In a storage-space backup, the onbar command backs up the
selected storage-spaces and logical logs in parallel. When you
restore from a storage-space backup, you also have to restore
logical logs to make the data consistent.
Storage-space backup is faster than whole-system backup on large
databases.
Whole-system
backup
In a whole-system backup, all Informix instance's dbobjects from
the onbar command are backed up. ON-Bar cannot back them up
concurrently; they are backed up sequentially. Whole-system
backup is useful for disaster recovery, or restore to another client.
When you restore from a whole-system backup, you do not need to
restore logical logs to make the data consistent.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 42 of 803
43. Option
Description
Pre-exec
Post-exec
Specify a command that will be started by ob2onbar.pl on the
Informix Server system before the backup (pre-exec) or after it
(post-exec). Do not use double quotes, spaces, or special
characters. Provide only the name of the command, which must
reside in the following directory:
Windows systems: Data_Protector_homebin
See "Informix Server specific backup options (Windows)" on page
41.
HP-UX, Solaris, Linux systems: /opt/omni/lbin
See "Informix Server specific backup options (UNIX)" on the
previous page.
Other UNIX systems: /usr/omni/bin
If you selected a logical log for backup, it is sensible to add onmode
-l as a pre-exec command to ensure that you always have a log
file to back up. Without a log file to back up, the backup fails.
If the onmode -l command returns a non-zero value, Data
Protector interprets this as an error and the backup session does
not start.
Modifying backup specifications
To modify your backup specification, click its name in the Scoping Pane of the Backup context, then
click the appropriate tab, and apply the changes. See "Modifying a backup specification" on the next
page.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 43 of 803
44. Modifying a backup specification
Scheduling backup sessions
You can run unattended backups at specific times or periodically. For details on scheduling, see the
HPE Data Protector Help index: “scheduled backups”.
Scheduling example
To back up logical logs at 8:00, 13:00, and 18:00 during weekdays:
1. In the Schedule property page, select the starting date in the calendar and click Add to open the
Schedule Backup dialog box.
2. Under Recurring, select Weekly. Under Time options, select 8:00. Under Recurring Options,
select Mon, Tue, Wed, Thu, and Fri. See "Scheduling a backup session" on the next page.
Click OK.
3. Repeat steps 1 and 2 to schedule backups at 13:00 and 18:00.
4. Click Apply to save the changes.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 44 of 803
45. Scheduling a backup session
Previewing backup sessions
Preview the backup session to test it. You can use the Data Protector GUI or CLI.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications and then Informix Server. Right-click the
backup specification you want to preview and click Preview Backup.
3. Specify the Backup type and Network load. Click OK.
The message Session completed successfully is displayed at the end of a successful
preview.
Using the Data Protector CLI
Execute the following commands:
omnib -informix_list backup_specification_name -test_bar
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 45 of 803
46. Previewing a backup with backup specification ds_street (Windows)
Previewing a backup with backup specification IDS914 (UNIX)
What happens during the preview?
1. The Informix Server onbar command is started with the -F option, which specifies a fake backup.
This tests if the Informix instance is correctly configured for backup.
2. Data Protector tests the Data Protector part of the configuration. The following are tested:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 46 of 803
47. l Communication between the Informix instance and Data Protector
l The syntax of the backup specification
l If devices are correctly specified
l If the necessary media are in the devices
Starting backup sessions
Interactive backups are run on demand. They are useful for urgent backups or restarting failed backups.
Before starting the backup session, perform the following actions:
1. Set the below environment variables:
a. ONCONFIG
i. INFORMIXSQLHOSTS
ii. INFORMIXDIR
iii. INFORMIXSERVER
b. PATH (Add $INFORMIXDIR/bin to PATH)
2. Set the tapedev and ltapedev variables appropriately in ONCONFIG file. If the tapedev and
ltapedev variables are not present, create the files with informix ownership, and a minimum of
660 permissions. Set these paths in the ONCONFIG file.
Backup methods
Start a backup of dbobjects in any of the following ways:
l Use the Data Protector GUI. See "Using the Data Protector GUI" on the next page.
l Use the Data Protector CLI. See "Using the Data Protector CLI" on the next page.
l Use the Informix Server onbar command. See "Using Informix Server commands" on the next page.
l UNIX systems: Use the Informix Server log_full.sh script. See "Using Informix Server log_
full.sh on UNIX" on page 50.
Before you begin
l Ensure that you have sufficient logical log space to create a backup.
If the amount of free space in all logical log files is less than half a single log file, Informix Server
does not create a backup.
l Before a Full backup, print or keep a copy of your ONCONFIG file, the emergency boot file, and on
UNIX, also the sqlhosts file.
l Verify data consistency.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 47 of 803
48. Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, and then Informix Server. Right-click the
backup specification you want to use and click Start Backup.
3. Select the Backup type and Network load. Click OK.
The message Session completed successfully is displayed at the end of a successful backup
session.
Using the Data Protector CLI
Execute the following command:
omnib -informix_list backup_specification_name [-barmode InformixMode] [List_
options]
where InformixMode is one of the following:
full|inf_incr1|inf_incr2
Note: Data Protector terms full, inf_incr1, and inf_incr2 backup are equivalent to Informix
Server terms level-0, level-1, and level-2 backup, respectively.
For List_options, see the omnib man page.
Examples
To start a full backup using the Informix Server backup specification InformixWhole, execute:
omnib -informix_list InformixWhole -barmode full
To start an incremental backup (level 1) of the Informix Server backup specification InformixIncr,
execute:
omnib -informix_list InformixIncr -barmode inf_incr1
Using Informix Server commands
Use the Informix Server onbar command to start a backup of dbobjects from the Informix Server
system where the relevant Informix instance is located.
Before the backup:
l Log in to the Informix Server system as user informix.
l Set the following variables:
Data Protector and Informix Server variables
Variable Description
ONCONFIG Name of the Informix instance ONCONFIG file.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 48 of 803
49. Variable Description
INFORMIXSQLHOSTS Windows systems: System on which the sqlhosts entry in the
Windows Registry exists.
UNIX systems: Pathname of the sqlhosts file, for example
/applications/informix/etc/sqlhosts.
INFORMIXDIR Pathname of the Informix Server home directory.
INFORMIXSERVER Name of the Informix instance.
OB2APPNAME Name of the Informix instance.
OB2BARLIST For backup, name of the backup specification to be used for the
backup.
For restore, name of the backup specification to be used for salvaging
logical logs.
l Ensure that the Informix instance is in online or quiescent mode. Once you start a backup, do not
change the mode until the backup finishes; changing the mode terminates the backup. Only online
dbspaces and blobspaces are backed up. To list online dbobjects, execute:
Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
Backup modes
Backup mode Description
Online Use online mode if your Informix instance must be accessible during
the backup. An online backup may impact performance.
Quiescent Use quiescent mode to eliminate partial transactions in a backup.
Quiescent backup may not be practical if you need continuous access
to Informix instances.
l Keep a copy of your ONCONFIG file, the emergency boot file, and on UNIX, also the sqlhosts file,
after you create a full backup. You need this information to restore dbobjects.
To back up a list of dbspaces, execute:
onbar -b dbspace_list
For example, to back up dbspaces dbspace1 and dbspace3, execute:
onbar -b dbspace1, dbspace3
For more information, see the Backup and restore guide of Informix Server.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 49 of 803
50. Using Informix Server log_full.sh on UNIX
On UNIX, log_full.sh is used to start a backup of logical log files when the Informix Server issues a
log-full event alarm on the Informix Server. For information on logical log file backups, see "Manual and
continuous logical log backups" below.
To enable Informix Server backups from the log_full.sh script:
1. Add the following line to the Informix instance ONCONFIG file:
ALARMPROGRAM INFORMIXDIR/etc/log_full.sh.
2. If the Data Protector User Interface is not installed on the Informix Server system, create an
Informix Server backup specification to back up only logical logs, and edit
INFORMIXDIR/etc/log_full.sh.
Add the following at the beginning of the file:
export OB2BARLIST=backup_specification_name
export OB2APPNAME=INFORMIXSERVER
3. If the Data Protector User Interface is installed on the Informix Server system, create an Informix
Server backup specification to back up logical logs only.
Manual and continuous logical log backups
To back up logical log files that are full and ready to be backed up, start:
l a manual logical log backup to back up all full logical log files and stop at the current logical log file.
l a continuous logical log backup to back up each logical log file automatically as it becomes full. Use
this backup if you do not want to monitor the logical log files.
By default, the ALARMPROGRAM configuration parameter is set so that ON-Bar performs continuous
backups.
If you use continuous backups, ensure that a device is always available for the logical log backup
process.
To perform a manual logical log backup, set the OB2APPNAME and OB2BARLIST environment variables as
described in "Data Protector and Informix Server variables " on page 48 and execute:
onbar -l
For more information, see the Backup and restore guide of Informix Server.
Restore
The Data Protector Informix Server integration provides two types of restore:
Informix Server restore types
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 50 of 803
51. Restore type Description
Complete database
restore
Restore from any backup. ON-Bar restores dbobjects concurrently and
replays the logical logs once.
Whole-system restore Restore from a whole-system backup. ON-Bar restores the whole system
sequentially with or without restoring the logical logs. Whole-system
restore is appropriate for small systems, when you do not need to restore
logs, for disaster recovery, or when restoring to another client.
Restore methods
Restore dbobjects in any of the following ways:
l Use the Data Protector GUI. See "Restoring using the Data Protector GUI" on page 54.
l Use the Data Protector CLI. See "Restoring using the Data Protector CLI" on page 57.
l Use the Informix Server onbar command. See "Restoring using Informix Server commands" on
page 58.
Before you begin
l Before restoring the root dbspace or performing a whole-system restore, shut down the Informix
instance (cold restore). Log in to the Informix Server system as user informix and execute:
Windows systems: INFORMIXDIRbinonmode -ky
UNIX systems: INFORMIXDIR/bin/onmode -ky
Note: Once the Informix instance is offline, you cannot restore only non-critical (user)
dbspaces. The root dbspace must also be selected for restore.
l To restore only non-critical dbspaces, ensure that the Informix instance is online or in a quiescent
mode (warm restore ), and that the non-critical dbspaces to be restored are offline.
To check whether dbspaces are offline, execute:
Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
Finding information for restore
To restore dbobjects, first find the needed media and the session ID of the last full backup session.
Use the Data Protector GUI or CLI.
Using the Data Protector GUI
In the Internal Database context, expand Objects or Sessions. To view details on a session, right-
click the session and click Properties.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 51 of 803
52. Example of session properties
Using the Data Protector CLI
Localized database names: If the names of backed up objects contain characters from different
Unicode language groups (for example, if you are using Japanese and Latin characters), you must
redirect the output of Data Protector utilities to use UTF-8 encoding:
l Set the environment variable OB2_CLI_UTF8 to 1.
l Set the encoding used on the terminal to UTF-8.
If you are using localized databases, and the system locale uses the same Unicode language group, no
changes are required.
1. Get a list of Informix Server backed up objects:
omnidb -informix
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 52 of 803
53. Example of a list of Informix Server backed up objects
2. Get a list of backup sessions for a specific object, including the session ID:
omnidb -informix object_name
Example of a list of backup sessions for a specific object
For object copies, use the object backup ID (which equals the object backup session ID). Do not
use the object copy session ID.
To get information on the object backup ID, execute:
omnidb -session session_id -detail
3. Get a list of media needed for restore:
omnidb -session session_id -media
Example of finding media needed for restore
For details on the omnidb command, see the omnidb man page.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 53 of 803
54. Restoring using the Data Protector GUI
1. In the Context List, click Restore.
2. In the Scoping Pane, expand Informix Server, expand the client from which the data to be
restored was backed up, and then click the Informix instance you want to restore.
3. In the Source page, select objects for restore. To restore the complete database or for a whole-
system restore, select Restore complete database.
Selecting objects for restore
Note: For Informix versions 11.7 and 12.1, you must appropriately select the system
database objects, rootdbs, physdbs, plog, llog, and logdbs if you have created another
database.
4. In the Options page, set the Informix Server specific restore options. For information, see
"Informix Server restore options " on page 56 or press F1.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 54 of 803
55. Informix Server restore options
5. In the Devices page, select the devices to be used for the restore.
For more information on how to select devices for a restore, see the HPE Data Protector Help
index: “restore, selecting devices for”.
6. If you perform a whole-system restore and the Informix instance is in online mode, take the
Informix instance offline by executing:
onmode -ky
Click Restore.
7. In the Start Restore Session dialog box, click Next.
8. Specify the Report level and Network load.
Note: Select Display statistical information to view the restore profile messages in the
session output.
9. Click Finish to start the restore.
The statistics of the restore session, along with the message Session completed
successfully is displayed at the end of the session output.
10. If you performed a whole-system restore, bring the Informix instance online by executing:
onmode -m
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 55 of 803
56. Informix Server restore options
Option Description
Backup Specification The backup specification to be used
for salvaging logical log files still on
the disk before restoring. Preferably,
specify the backup specification used
for the backup of logical logs.
Username UNIX systems: User name of the
Informix Server backup owner. onbar
is started under the account of the
specified user.
User group UNIX systems: User group of the
Informix Server backup owner.
Restore to client The client to restore to. By default,
you restore to the original backup
client. This option is only valid for a
whole-system restore.
Restore by log number This option is only available if you
selected Restore complete
database in the Source page. Use this
option to restore data up to a specific
log number. If further logs exist, ON-
Bar does not restore them. This option
invokes onbar -r -n last_log_
number. For details, see the Backup
and restore guide of Informix Server.
Restore by date This option is only available if you
selected Restore complete
database in the Source page. Use this
option to restore data to a specific
point in time. This option invokes
onbar -r -t time. For details, see
the Backup and restore guide of
Informix Server.
Restore the latest version Select this option to restore the latest
backup version.
Whole database restore This option is only available if you
selected Restore complete
database in the Source page. Select
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 56 of 803
57. Option Description
this option to perform a whole-system
restore. Only use this option when
restoring from a whole-system
backup. Data Protector does not
automatically detect if a whole-
system backup exists.
Data Protector searches for the last
whole-system backup and restores
from that. This option invokes onbar
-r -w. For details, see the Backup
and restore guide of Informix Server.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Restoring using the Data Protector CLI
Before you begin the restore procedure, set the OB2BARLIST environment variable as described in “Data
Protector and Informix Server variables” (page 32)"Backup" on page 37. For example:
set OB2BARLIST=dbspace5
Run the following command:
omnir -informix -barhost ClientName -barcmnd ob2onbar.pl -user User:Group -appname
INFORMIXSERVER -bararg OnBarRestoreArguments [INFORMIX_OPTIONS]
ClientName Name of the Informix Server system. In a cluster environment, name of
the virtual server.
INFORMIXSERVER Name of the Informix instance.
User, Group UNIX systems: The user name and its group name.
OnBarRestoreArguments ON-Bar restore arguments. Put each argument in double quotes.
INFORMIX_OPTIONS A subset of general restore options. For information, see the omnir man
page.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Example
To restore the Informix instance informix_instance1 on the UNIX system computer with the bar
argument -r rootdbs, execute:
omnir -informix -barhost computer -barcmnd ob2onbar.pl -user informix:informix -
appname informix_instance1 -bararg "-r rootdbs"
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 57 of 803
58. Restoring using Informix Server commands
Before restoring:
l Log in to the Informix Server system as user informix.
l Set Data Protector and Informix Server variables as described in "Data Protector and Informix
Server variables " on page 48.
l If a disk failure occurs, salvage logical log files that are still on the disk by executing:
onbar -l -s
The following are examples of the onbar command syntax for restore. For further options, see the
Backup and restore guide of Informix Server.
After the restore, make sure that before you perform the next restore, a full backup has been performed.
Restoring dbspaces, blobspaces, and logical logs
1. If the Informix instance to be restored is in online mode, take it offline:
onmode -ky
2. Restore dbspaces, blobspaces, and appropriate logical logs:
Complete database restore: onbar -r
Whole-system restore: onbar -r -w
3. After the restore, bring the Informix instance online:
onmode -m
Restoring dbspaces and blobspaces only
To restore dbspaces and blobspaces without the logical log, execute:
onbar -r -p
Restoring a particular dbspace or blobspace
To restore a specific dbspace, for example dbspace_1, execute:
onbar -r dbspace_1
Restoring to another Informix Server
To restore data to an Informix Server system other than that from which the backup was made:
1. Install the Data Protector Informix Integration software component on the client to which you want
to restore (target client).
2. Create the user informix on the target client.
3. Create an Informix instance with the same database name and the same server number as the
original Informix instance by using the Informix Server ON-Monitor utility on the target client.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 58 of 803
59. To obtain the database name and the server number, log in as the user informix on the original
server and execute the following:
a. To obtain the database name, look up the value of DBSERVERNAME in the onstat –c output.
On UNIX, you can do this by executing: onstat -c | grep DBSERVERNAME
b. To obtain the server number database name, look up the value of SERVERNUM in the onstat –c
output.
On UNIX, you can do this by executing: onstat -c | grep SERVERNUM
4. Ensure that the Informix instance is online.
5. Configure the Informix instance as described in "Configuring Informix instances" on page 31.
6. Take the Informix instance offline.
7. Copy the following original Informix Server configuration files to the target client:
l ONCONFIG
l the emergency boot file
l oncfg_DBSERVERNAME.SERVERNUM
8. On UNIX, copy also the sqlhosts file to the target client. Change the source client host name in
the copied sqlhosts file to the target client host name.
9. On UNIX, add the service_name entry from the sqlhosts file to the etc/services file, together
with a unique port number (for example, 1535/tcp) on the target client to allow the instance to start
running properly.
10. Re-create the database files from the original database on the target client and then alter the files
permission and ownership of the file to match the originals.
11. Start a whole-system restore of dbobjects as described in "Restoring using the Data Protector
GUI" on page 54.
Restoring using another device
You can perform a restore using a device other than that used for the backup.
Using the Data Protector GUI
For information on how to select another device for a restore using the Data Protector GUI, see the
HPE Data Protector Help index: “restore, selecting devices for”.
Using the Data Protector CLI or Informix Server commands
If you are restoring using the Data Protector CLI or Informix Server commands, specify the new device
in the file:
Windows systems: Data_Protector_program_dataConfigServercellrestoredev
UNIX systems: /etc/opt/omni/server/cell/restoredev
Use the format:
"DEV 1" "DEV 2"
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 59 of 803
60. where DEV 1 is the original device and DEV 2 is the new device.
Delete this file after use.
On Windows, use the Unicode format for the file.
Monitoring sessions
You can monitor currently running sessions in the Data Protector GUI. When you run an interactive
backup or a restore session, a monitor window shows you the progress of the session. Closing the GUI
does not affect the session.
You can also monitor sessions from any Data Protector client with the User Interface component
installed, using the Monitor context.
For information on how to monitor a session, see the HPE Data Protector Help index: “viewing
currently running sessions”.
When ON-Bar encounters an error or a condition that warrants a warning, it writes a message to the
Informix Server ON-Bar message file. The full pathname of this file is specified in the BAR_ACT_LOG
configuration parameter. For more information on this file, see the Backup and Restore Guide of
Informix Server.
To abort a backup or restore session successfully, set the ON-Bar BAR_RETRY configuration parameter
to 0. This parameter specifies how many times ON-Bar retries a backup or restore if the first attempt
fails.
Troubleshooting
This section lists general checks and verifications, plus problems you might encounter when using the
Data Protector Informix Server integration. Start at "Problems" on page 64 and if you cannot find a
solution there, perform general checks and verifications.
For general Data Protector troubleshooting information, see the HPE Data Protector Troubleshooting
Guide.
Before you begin
l Ensure that the latest official Data Protector patches are installed. For information on how to verify
this, see the HPE Data Protector Help index: “patches”.
l For general Data Protector limitations, as well as recognized issues and workarounds, see the HPE
Data Protector Product Announcements, Software Notes, and References.
l For an up-to-date list of supported versions, platforms, and other information, see
http://support.openview.hp.com/selfsolve/manuals.
Checks and verifications
If your configuration, backup, or restore failed:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 60 of 803
61. l On the Informix Server system, examine system errors reported in the debug.log and
informix.log files, located in the directory:
Windows systems: Data_Protector_homelog
HP-UX and Solaris systems: /var/opt/omni/log
Other UNIX systems: /usr/omni/log
l Make a test backup and restore of any filesystem on the problematic client. For information, see the
HPE Data Protector Help.
l Windows systems: Ensure that the Data Protector Inet service is running under the account
informix.
l UNIX systems: Verify that the onbar_d command has the switch ownership(s) bit set and that it is
owned by the Informix Server user, for example, informix:informix or root:informix.
Verify that this user is also the owner of the backup specification, or in the case of a restore failure,
verify that this user is specified for the restore session, and that it is in the Data Protector operator
or admin group.
If this user is in the Data Protector operator group, ensure that the See private objects user right
of this group is selected. For information, see the HPE Data Protector Help index: “user rights,
changing”.
Now test if this user, for example user informix, has appropriate rights in Data Protector. Log in to
the Informix Server system as user informix. From the directory:
HP-UX and Solaris systems: /opt/omni/bin/utilns
Other UNIX systems: /usr/omni/bin/utilns
execute:
testbar -type:informix -perform:checkuser -bar: backup_specification_name
Example of checking the Informix Server user
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 61 of 803
62. In this example, the user has all the necessary rights for the backup specification named
InformixWhole.
If the user informix on the Informix Server system computer.hp.com does not have the necessary
rights, an error similar to the following will be displayed:
[Critical] From: OB2BAR@computer.hp.com "" Time: 08/06/2011
17:51:41[131:53]
User "informix.users@computer.hp.com" is not allowed
to perform a restore.
l In a cluster environment, ensure that the environment variable OB2BARHOSTNAME is set to the virtual
server name before performing procedures from the Data Protector CLI. When the Data Protector
GUI is used, this is not required.
Additionally, if your configuration or backup failed:
l Ensure that the Informix instance is online.
Additionally, if your backup failed:
l Check the configuration of the Informix instance as described in "Checking the configuration" on
page 36.
l Test the backup specification as described in "Previewing backup sessions" on page 45.
l If this fails, check if the Informix Server part of the test failed:
Execute the onbar -b -F command. If the test fails, see the Informix Server documentation for
further instructions.
l If the Data Protector part of the test failed, create an Informix Server backup specification to back
up to a null or file device.
If the backup succeeds, the problem is probably related to devices. For information on
troubleshooting devices, see the HPE Data Protector Help.
l If the test succeeds, start the backup directly from the Informix Server system using Informix
Server commands. For information, see "Using Informix Server commands" on page 48.
If this backup succeeds, the problem may be that the client on which the Data Protector User
Interface is running does not have enough memory, disk space, or other operating system
resources.
Additionally, if your backup or restore failed:
l Test the Data Protector data transfer using the testbar utility. Log in to the Informix Server system
as user informix. From the directory:
Windows systems: Data_Protector_homebin
HP-UX and Solaris systems: /opt/omni/bin/utilns
Other UNIX systems: /usr/omni/bin/utilns
l if your backup failed, execute:
testbar -type:Informix -appname:INFORMIXSERVER -bar: backup_specification_name
-perform:backup
where INFORMIXSERVER is the name of the Informix instance.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 62 of 803
63. l if your restore failed, execute:
testbar -type:Informix -appname:INFORMIXSERVER -bar:backup_specification_name
-perform:restore -object:OBJECT_NAME -version:OBJECT_VERSION
where INFORMIXSERVER is the name of the Informix instance, OBJECT_NAME is the name of the
object to be restored, OBJECT_VERSION is the object version.
If the test fails:
a. Troubleshoot errors reported by the testbar utility using the Data Protector troubleshooting file,
located on the Cell Manager in:
Windows systems: Data_Protector_homehelpenuTrouble.txt
UNIX systems: /opt/omni/gui/help/C/Trouble.txt
b. On the Informix Server system, examine system errors reported in the file:
Windows systems: Data_Protector_homelogdebug.log
HP-UX and Solaris systems: /var/opt/omni/log/debug.log
Other UNIX systems: /usr/omni/log/debug.log
Additionally, if your restore failed:
l Ensure that the backup specification used for salvaging logical logs is properly configured.
Checking the Informix Server side
The following checks may help you solve some Informix Server related problems.
If your backup or restore failed:
l Check the following Informix Server files for error descriptions:
bar_act.log
bar_dbg.log
online.log
Locations of these files are specified in the Informix Server ONCONFIG file.
Additionally, if your backup failed:
l Start a backup, not using Data Protector:
a. Set the BAR_BSALIB_PATH shell variable to:
Windows systems: ISMDIRbinlibbsa.dll
where ISMDIR is the path to the ISM.
UNIX systems: INFORMIXDIR/lib/ibsad001.sl
where INFORMIXDIR is the home directory of Informix Server.
b. Use the onbar command to start the backup.
Additionally, if your restore failed:
l For a cold restore, verify if the dbspaces you want to restore are offline:
a. Log in to the Informix Server system as user informix.
b. Execute the following:
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 63 of 803
64. Windows systems: INFORMIXDIRbinonstat -d
UNIX systems: INFORMIXDIR/bin/onstat -d
where INFORMIXDIR is the home directory of Informix Server.
l Ensure that the Informix Server configuration files (ONCONFIG, the emergency boot file, oncfg_
INFORMIXSERVER.SERVERNUM, and on UNIX, also the sqlhosts file) are not corrupt. If they are
corrupt, restore them manually.
Problems
Problem
Restore to another client fails
If you backed up data to one client, exported the media, and then imported them to another client in a
different cell, the Data Protector session IDs of backup sessions may be changed in the IDB.
However, the session IDs are not automatically changed in the Informix Server emergency boot file
(ixbar.server_id, where server_id is the value of the SERVERNUM configuration parameter).
Therefore, the restore of such objects may fail.
Action
Edit the emergency boot file to reflect the changed Data Protector session IDs. List the changed
session IDs during the import procedure.
Information about backed-up objects is stored in the emergency boot file in the following format:
ODS730 rootdbs R 1 7 0 9 2011008018 2011-08-18 18:10:25 1
Entries 7 and 9 make up make up the Data Protector session ID. Entry 9 is the date and entry 7 the
unique session number.
Here, the session ID is 2011/08/18-9. Note that the delimiter in the date field is "-" in the emergency
boot file and "/" in the Data Protector session ID.
The value of the SERVERNUM configuration parameter is given in entry 4.
Problem
Restore fails because the emergency boot file is too large
Action
Use the ON-Bar onsmsync utility to remove expired backups from the Informix Server sysutils
database and emergency boot file. For information on the onsmsync utility, see the Backup and restore
guide of Informix Server.
Problem
Backup or Restore fails with 131 ISAM error
The backup or restore session fails with the following 131 ISAM error: No free disk space.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 64 of 803
65. Action
Add chunk space to the rootdbs, or add temp dbs. By default, if disk space is not available for a
dbobject, then space is taken from rootdbs if the temp dbs is not configured.
Example: To add chunk space of 500MB with 2048 page size to rootdbs, use the following
command: onspaces -a rootdbs -p /opt/IBM/informix/ol_informix1170/dbspaces/Chunk2_rootdbs -
o 2048 -s 500000.
Integration Guide
Chapter 1: Data Protector Informix Server integration
HPE Data Protector (9.07) Page 65 of 803
66. Chapter 2: Data Protector DB2 UDB integration
Introduction
This chapter explains how to configure and use the Data Protector DB2 UDB (DB2) integration. It
describes concepts and methods you need to understand to back up and restore DB2 databases.
Data Protector integrates with IBM DB2 Universal Database Server (DB2 Server) to back up DB2
database objects online and offline.
Data Protector offers interactive and scheduled backups of the following types:
Backup types
Backup type Description
Full Backs up complete DB2 objects.
Incremental Backs up changes since the last Full backup.
Delta Backs up changes since the last backup of any type.
The basic backup unit is a table space. Only table spaces or databases (DB2 objects) can be selected
for backup.
When restoring a database or table space, you can specify restore options to perform:
l Rollforward recovery
l Version recovery
l Restore to a new database (database only)
l Restore to another instance (database only)
l Restore to another system (database only)
l Automatic restore from incremental or delta backups
Databases are restored offline, table spaces online.
Limitations
Table or datafile backup and restore are not supported. Neither are backup or restore using Data
Protector media with the DB2 Command Line Processor or the DB2 Control Center.
This chapter provides information specific to the Data Protector DB2 Server integration. For general
Data Protector procedures and options, see the HPE Data Protector Help.
HPE Data Protector (9.07) Page 66 of 803
67. Integration concepts
Data Protector integrates with the DB2 Server through a set of modules responsible for data backup
and restore. "DB2 integration architecture" below shows the architecture of the Data Protector DB2
integration.
DB2 integration architecture
Legend
Legend Description
SM Data Protector Session Manager: Backup Session Manager during
backup and Restore Session Manager during restore.
db2bar Data Protector module, used for controlling activities between the DB2
Server and Data Protector backup and restore.
db2arch Program that backs up and restores DB2 log files when DB2 log archive
method (logarchmeth1) is set to user exit
libob2db2 Data transferring (database backup and restore, log archive/retrieval
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 67 of 803
68. Legend Description
when logarchmeth1 is set to vendor) module called by DB2 Server.
MA Data Protector General Media Agent.
Backup Specification A list of objects to be backed up, backup devices, and options to be used.
IDB The Data Protector Internal Database.
While the DB2 Server is responsible for read/write operations to disk, Data Protector reads from and
writes to devices and manages media.
Considerations
1. HPE recommends that you set the log archive method (logarchmeth1) to Vendor, because IBM
DB2 has deprecated the UserExit option from the DB2 version 9.5. For more information, see
http://www-01.ibm.com/support/knowledgecenter/SSEPGG_
9.7.0/com.ibm.db2.luw.admin.config.doc/doc/r0000249.html?cp=SSEPGG_9.7.0%2F2-2-6-7-
124.
2. If your existing database has the log archive method set to UserExit and you want to change it to
Vendor, then the database recovery for the log that is backed up using the User Exit option can
be done using the below steps:
a. Restore the database (without enabling the Roll forward recovery in the Data Protector GUI).
b. Restore the logs that were backed up using the User Exit program in the active log directory.
3. Set the environment variables in the omnirc file before restoring to a DB2 database using the
automatic Roll forward:
l On the DB2 client, set the following environment variables in the omnirc file:
o OB2APPNAME = “source_Instance_name”
o OB2BARHOSTNAME=”Source_client_name”
o OB2APPDATABASE = “source_database_name”
Note: This is valid for all DB2 log backups using the Vendor library and not required for the
User-Exit mode.
In the omnirc file, delete the above mentioned three variables after the Roll forward of the
DB2 database. This ensures that the other DB2 instances running on the same system are
not influenced by these environment variables during backup.
l Execute the DB2 Roll Forward command.
4. The DB2 deduplication optimization is supported by using the omnirc variable OB2_DB2DEDUP in
the DB2 Version 9.7 (Fix Pack 4) and later releases.
Configuring the integration
You need to configure DB2 users and every DB2 instance you intend to back up or restore to.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 68 of 803
69. Prerequisites
l Ensure you have correctly installed and configured DB2 Server.
l For supported versions, platforms, devices, and other information, see the HPE Data Protector
Product Announcements, Software Notes, and References or
http://support.openview.hp.com/selfsolve/manuals.
l For information on DB2 Server, see the DB2 administration guide and DB2 server books online.
l Ensure you have correctly installed Data Protector. For information on how to install the Data
Protector IBM DB2 UDB integration in various architectures, see the HPE Data Protector
Installation Guide.
Every DB2 Server system you intend to back up from or restore to must have the Data Protector DB2
Integration and Disk Agent components installed.
In a partitioned environment, ensure that the DB2 Integration and Disk Agent components are
installed on all the physical nodes on which the DB2 database resides.
Before you begin
l Configure devices and media for use with Data Protector.
l To test whether the DB2 Server system and the Cell Manager communicate properly, configure and
run a Data Protector filesystem backup and restore on the DB2 Server system.
Cluster-aware clients
If you are using the Microsoft Windows Failover cluster, set the omnirc variable OB2BARHOSTNAME to the
virtual server name in the cluster nodes and cell manager.
OB2BARHOSTNAME=<virtual_server_name>
Partitioned environment
In a physically partitioned environment, configure the integration on every physical node separately.
Ensure that the MaxBSession global option is set to at least twice the number of nodes of the partitioned
database.
Configuring DB2 users
Ensure the DB2 user has appropriate authorities to perform DB2 backups and restores (either SYSADM,
SYSCTRL, or SYSMAINT).
Add user root (UNIX only) and the DB2 user to both the Data Protector and DB2 admin user groups.
For more information, see the HPE Data Protector Help index: “user groups” and “adding users”.
Provide this user in configuration and restore procedures. This user is needed by Data Protector to start
the Data Protector Inet service (Windows) or process (UNIX).
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 69 of 803
70. Configuring DB2 instances
Provide Data Protector with the DB2 instance configuration parameters:
l DB2 user
l DB2 user password
l DB2 instance home directory (only in a partitioned environment)
Data Protector then creates a DB2 instance configuration file on the Cell Manager and verifies the
connection to the instance.
These parameters are used for connecting to the DB2 Server system to perform backups, restores, and
other operations, such as listing objects for backup.
To configure a DB2 instance, use the Data Protector GUI or CLI.
Before you begin
l Ensure the DB2 instance is online.
Using the Data Protector GUI
1. In the Context List, click Backup.
2. In the Scoping Pane, expand Backup Specifications, right-click DB2 Integration, and click Add
Backup.
3. In the Create New Backup dialog box, click OK.
4. In Client, select the DB2 Server system.
In a cluster environment, select the virtual server.
In Application database, type the DB2 instance name.
For information on the User and group/domain options, press F1.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 70 of 803
71. Specifying a DB2 instance
Click OK.
5. Click Next. The Configure DB2 dialog box is displayed.
6. Type the name of the DB2 user and its password. This user must be configured as described in
"Configuring DB2 users" on page 69.
In a partitioned environment, select DB2 EEE and specify the pathname of the DB2 instance
home directory.
7. The DB2 instance is configured. Exit the GUI or proceed with creating a backup specification at
Step 6.
Using the Data Protector CLI
Execute the following command:
util_db2 -CONFIG DB2_instance username password [DB2 _instance_home]
Parameter description
DB2_instance Name of the DB2 instance.
username DB2 user.
password DB2 user password.
Integration Guide
Chapter 2: Data Protector DB2 UDB integration
HPE Data Protector (9.07) Page 71 of 803