IntegrationIBM
IntegrationIBM
Integration Guide
for IBM Applications:
Informix
DB2
Lotus Notes/Domino
ii
Contents
1. Integrating Informix Server and Data Protector
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Integration Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Configuring the Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Cluster-Aware Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Configuring Informix Server Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Configuring Informix Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Checking the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
What You Must Back Up as Filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Creating Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Modifying Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Scheduling Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Previewing Backup Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Starting Backup Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Restore Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Finding Information for Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Restoring Using the Data Protector GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Restoring Using the Data Protector CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Restoring Using Informix Server Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Restoring to Another Informix Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Restoring Using Another Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Monitoring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Checks and Verifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
iii
Contents
Partitioned Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Configuring DB2 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuring DB2 Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Checking the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Physically Partitioned Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Creating Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Modifying Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Scheduling Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Previewing Backup Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Starting Backup Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Restoring Using the Data Protector GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Restoring Using the Data Protector CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Restoring to a New Database or Another DB2 Instance . . . . . . . . . . . . . . . . . . . . . . 68
Restore in a Partitioned Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Monitoring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Checks and Verifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
iv
Contents
Scheduling Backup Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Previewing Backup Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Starting Backup Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Restoring Lotus Notes/Domino Server Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Monitoring Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Checking the Lotus Notes/Domino Server Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Checks and Verifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Glossary
Index
v
Contents
vi
Printing History
Manual updates may be issued between editions to correct errors or
document product changes. To ensure that you receive updated or new
editions, subscribe to the appropriate product support service. See your
HP sales representative for details.
Table 1 Edition History
vii
viii
Conventions
The following typographical conventions are used in this manual.
Table 2
ix
Data Protector provides a cross-platform (Windows and UNIX) graphical
user interface. Refer to the online Help for information about the Data
Protector graphical user interface.
x
Contact Information
General General information about Data Protector can be found at
Information
http://www.hp.com/go/dataprotector
xi
xii
Data Protector Documentation
Data Protector documentation comes in the form of manuals and online
Help.
Manuals Data Protector manuals are available in printed format and in PDF
format. Install the PDF files during the Data Protector setup procedure
by selecting the User Interface component on Windows or the
OB2-DOCS component on UNIX. Once installed, the manuals reside in the
<Data_Protector_home>\docs directory on Windows and in the
/opt/omni/doc/C/ directory on UNIX. You can also find the manuals in
PDF format at http://www.hp.com/support/manuals
HP OpenView Storage Data Protector Concepts Guide
This manual describes Data Protector concepts and provides background
information on how Data Protector works. It is intended to be used with
the task-oriented online Help.
HP OpenView Storage Data Protector Installation and Licensing
Guide
This manual describes how to install the Data Protector software, taking
into account the operating system and architecture of your environment.
This manual also gives details on how to upgrade Data Protector, as well
as how to obtain the proper licenses for your environment.
HP OpenView Storage Data Protector Troubleshooting Guide
This manual describes how to troubleshoot problems you may encounter
when using Data Protector.
HP OpenView Storage Data Protector Disaster Recovery Guide
This manual describes how to plan, prepare for, test and perform a
disaster recovery.
xiii
HP OpenView Storage Data Protector Integration Guide
This manual describes how to configure and use Data Protector to back
up and restore various databases and applications. It is intended for
backup administrators or operators. There are four versions of this
manual:
xiv
HP OpenView Storage Data Protector Integration Guide for HP
OpenView Operations for UNIX
This manual describes how to monitor and manage the health and
performance of the Data Protector environment with HP OpenView
Operations (OVO), HP OpenView Service Navigator, and HP OpenView
Performance (OVP) on UNIX.
HP OpenView Storage Data Protector Integration Guide for HP
OpenView Operations for Windows
This manual describes how to monitor and manage the health and
performance of the Data Protector environment with HP OpenView
Operations (OVO), HP OpenView Service Navigator, and HP OpenView
Performance (OVP) on Windows.
There are two versions of the manual:
xv
SQL Server 2000 databases. The manual also describes how to configure
and use Data Protector to perform backup and restore using the
Microsoft Volume Shadow Copy Service.
HP OpenView Storage Data Protector MPE/iX System User Guide
This manual describes how to configure MPE/iX clients and how to back
up and restore MPE/iX data.
HP OpenView Storage Data Protector Media Operations User's
Guide
This manual provides tracking and management of offline storage
media. It is intended for network administrators responsible for
maintaining and backing up systems. It describes the tasks of installing
and configuring the application, performing daily media operations and
producing reports.
HP OpenView Storage Data Protector Product Announcements,
Software Notes, and References
This manual gives a description of new features of HP OpenView Storage
Data Protector A.06.00. It also provides information on supported
configurations (devices, platforms and online database integrations,
SAN, and ZDB), required patches, and limitations, as well as known
problems and workarounds. An updated version of the supported
configurations is available at http://www.hp.com/support/manuals
There are also four other Product Announcements, Software Notes and
References, which serve a similar purpose for the following:
Online Help Data Protector provides context-sensitive (F1) Help and Help Topics for
Windows and UNIX platforms.
xvi
Documentation Map
Abbreviations
Abbreviations in the documentation map that follows are explained
below. The manual titles are all preceded by the words “HP OpenView
Storage Data Protector”
Abbreviation Manual
CLI Command Line Interface Reference Guide
Concepts Concepts Guide
DR Disaster Recovery Guide
GS Getting Started Guide
Help Online Help
IG-IBM Integration Guide—IBM Applications
IG-MS Integration Guide—Microsoft Applications
IG-O/S Integration Guide—Oracle, SAP R/3, and
SAP DB/MaxDB
IG-OV Integration Guide—HP OpenView Service Information
Portal/OpenView Reporter
IG-OVOU Integration Guide—HP OpenView Operations, UNIX
IG-OVOW Integration Guide—HP OpenView Operations 7.1x,
7.2x, Windows
IG-OVOW Integration Guide—HP OpenView Operations 7.5,
Windows
IG-Var Integration Guide—Sybase, Network Node Manager,
NDMP and VMware
Install Installation and Licensing Guide
MO GS Media Operations Getting Started Guide
MO RN Media Operations Product Announcements, Software
Notes, and References
MO UG Media Operations User Guide
MPE/iX MPE/iX System User Guide
xvii
Abbreviation Manual
PA Product Announcements, Software Notes, and
References
Trouble Troubleshooting Guide
ZDB Admin ZDB Administrator's Guide
ZDB Concpt ZDB Concepts Guide
ZDB IG ZDB Integration Guide
Map
The following table shows where to find information of different kinds.
Shaded squares are a good place to look first.
Integration ZDB MO
Guides
Concepts
Trouble
MPE/iX
Concpt
Admin
OVOW
Install
OVOU
Help
User
IBM
CLI
Var
O/S
MS
DR
OV
GS
GS
PA
PA
IG
Backup X X X X X X X X X X X
CLI X
Concepts/Techniques X X X X X X X X X X X X X
Disaster Recovery X X X
Installation/Upgrade X X X X X X X X X X
Instant Recovery X X X X X
Licensing X X X X
Limitations X X X X X X X X X X
New features X X X
Planning strategy X X X X
Procedures/Tasks X X X X X X X X X X X X X X
Recommendations X X X X
Requirements X X X X X X X X X X
Restore X X X X X X X X X X
Support matrices X
Supported configurations X
Troubleshooting X X X X X X X X X X
xviii
Integrations
Look in these manuals for details of the following integrations:
Integration Guide
HP OpenView Operations (OVO) IG-OVOU, IG-OVOW
HP OpenView Reporter (OVR) IG-OV
HP OpenView Reporter Light IG-OVOW
HP OpenView Service Information Portal IG-OV
(OVSIP)
HP StorageWorks Disk Array XP all ZDB
HP StorageWorks Enterprise Virtual Array all ZDB
(EVA)
HP StorageWorks Virtual Array (VA) all ZDB
IBM DB2 UDB IG-IBM
Informix IG-IBM
Lotus Notes/Domino IG-IBM
Media Operations MO User
MPE/iX System MPE/iX
Microsoft Exchange Servers IG-MS, ZDB IG
Microsoft Exchange Single Mailbox IG-MS
Microsoft SQL Servers IG-MS, ZDB IG
Microsoft Volume Shadow Copy Service (VSS) IG-MS, ZDB IG
NDMP Server IG-Var
Network Node Manager (NNM) IG-Var
Oracle IG-O/S
Oracle ZDB ZDB IG
SAP DB IG-O/S
SAP R/3 IG-O/S, ZDB IG
Sybase IG-Var
Symmetrix (EMC) all ZDB
VMware IG-Var
xix
xx
In This Book
This guide describes how to configure and use Data Protector with IBM
applications.
Audience
It is intended for backup administrators responsible for planning, setting
up, and maintaining network backups. It assumes you are familiar with:
xxi
Organization
The manual is organized as follows:
Chapter 1 “Integrating Informix Server and Data Protector” on
page 1.
Chapter 2 “Integrating Lotus Notes/Domino Server and Data
Protector” on page 79.
Chapter 3 “Integrating IBM DB2 UDB and Data Protector” on
page 45.
Glossary Definition of terms used in this manual.
xxii
1 Integrating Informix Server and
Data Protector
Chapter 1 1
Integrating Informix Server and Data Protector
Introduction
Introduction
This chapter explains how to configure and use the Data Protector
Informix Server integration. It describes the concepts and methods you
need to understand to back up and restore Informix Server database
objects (dbobjects).
Data Protector integrates with the Informix Dynamic Server (Informix
Server) to back up dbobjects online. During backup, a database server
(Informix instance) is online and actively used.
Data Protector offers interactive and scheduled backups of the following
types:
Table 1-1 Informix Server Backup Types
You can also back up and restore dbobjects using the Informix Server
onbar command.
This chapter provides information specific to the Data Protector Informix
Server integration. For general Data Protector procedures and options,
see online Help.
2 Chapter 1
Integrating Informix Server and Data Protector
Integration Concepts
Integration Concepts
Data Protector integrates with the Informix Server through the Data
Protector Database Library based on a common library called Data
Protector BAR (Backup And Restore). The Data Protector Database
Library channels communication between the Data Protector Session
Manager, and, via the XBSA interface, the Informix Server ON-Bar
utility. Figure 1-1 shows the architecture of the Data Protector Informix
Server integration.
Chapter 1 3
Integrating Informix Server and Data Protector
Integration Concepts
4 Chapter 1
Integrating Informix Server and Data Protector
Configuring the Integration
Prerequisites
• Ensure that you have correctly installed and configured Informix
Server.
Cluster-Aware Clients
Configure Informix instances only on one cluster node, since the
configuration files reside on the Cell Manager.
Chapter 1 5
Integrating Informix Server and Data Protector
Configuring the Integration
If you intend to use the Data Protector CLI, set the Data Protector
environment variable OB2BARHOSTNAME to the virtual server name as
follows:
Windows: set OB2BARHOSTNAME=<virtual_server_name>
UNIX: export OB2BARHOSTNAME=<virtual_server_name>
6 Chapter 1
Integrating Informix Server and Data Protector
Configuring the Integration
Click Next.
5. In Informix Server home directory, specify the pathname of the
Informix Server home directory.
In Full pathname of sqlhosts file, type the following:
Windows: Name of the system with the sqlhosts entry in the
Windows Registry. Use the UNC notation, for example:
\\computer_name.
UNIX: Pathname of the sqlhosts file.
Chapter 1 7
Integrating Informix Server and Data Protector
Configuring the Integration
Click OK.
8 Chapter 1
Integrating Informix Server and Data Protector
Configuring the Integration
Parameter Description
<INFORMIXSERVER> Name of the Informix instance.
<INFORMIXDIR> Pathname of the Informix Server home directory.
<sqlhosts> Windows: Name of the system with the sqlhosts
entry in the Windows Registry. Use the UNC notation,
for example: \\computer_name.
UNIX: Pathname of the sqlhosts file.
<ONCONFIG> Name of the Informix instance ONCONFIG file.
Successful configuration displays the message *RETVAL*0.
Chapter 1 9
Integrating Informix Server and Data Protector
Configuring the Integration
10 Chapter 1
Integrating Informix Server and Data Protector
Configuring the Integration
Chapter 1 11
Integrating Informix Server and Data Protector
Configuring the Integration
12 Chapter 1
Integrating Informix Server and Data Protector
Backup
Backup
The integration provides online database backup of the following types:
Table 1-4 Informix Server Backup Types
For details on these types and on ON-Bar, see the Backup and Restore
Guide of Informix Server.
Object Location
Chapter 1 13
Integrating Informix Server and Data Protector
Backup
IMPORTANT How often you need to back up these objects depends on how frequently
they change. However, back up the emergency boot file at least daily and
always after a critical dbspace backup.
• Dbspace pages allocated to the Informix instance but not yet allocated
to a tblspace extent.
• Mirror chunks, if the corresponding primary chunks are accessible.
• Temporary dbspaces.
14 Chapter 1
Integrating Informix Server and Data Protector
Backup
Click Next.
7. Select devices to use for the backup.
To specify device options, right-click the device and click Properties.
Specify the number of parallel backup streams in the Concurrency
tab and the media pool you will use.
Chapter 1 15
Integrating Informix Server and Data Protector
Backup
IMPORTANT For a logical log backup, always use a separate device and ensure that
the LTAPEDEV parameter in the ONCONFIG file is not set to /dev/null or
''.
B blobspace
L logical log
ND noncritical dbspace
R root dbspace
TIP Select an additional set of devices (covering all resource types specified
for backup) so that they can take over if some devices in the primary
group fail. Select the Load balancing option and set the Min and Max
parameters to the number of primary devices.
Click Next.
16 Chapter 1
Integrating Informix Server and Data Protector
Backup
8. Set backup options (Figure 1-11 and Figure 1-12). For information,
see Table 1-7 on page 18.
Click Next.
9. Optionally, schedule the backup. See “Scheduling Backup
Specifications” on page 19.
Click Next.
10. Save the backup specification, specifying a name and a backup
specification group.
TIP Preview your backup specification before using it for real. See
“Previewing Backup Sessions” on page 20.
Chapter 1 17
Integrating Informix Server and Data Protector
Backup
Option Description
18 Chapter 1
Integrating Informix Server and Data Protector
Backup
Scheduling Example
To back up logical logs at 8.00 a.m., 1.00 p.m., and 6.00 p.m. during week
days:
Chapter 1 19
Integrating Informix Server and Data Protector
Backup
20 Chapter 1
Integrating Informix Server and Data Protector
Backup
Chapter 1 21
Integrating Informix Server and Data Protector
Backup
22 Chapter 1
Integrating Informix Server and Data Protector
Backup
Backup Methods
Start a backup of dbobjects in any of the following ways:
• Use the Data Protector GUI. See “Using the Data Protector GUI” on
page 23.
• Use the Data Protector CLI. See “Using the Data Protector CLI” on
page 23.
• Use the Informix Server onbar command. See “Using Informix Server
Commands” on page 24.
• UNIX only: Use the Informix Server log_full.sh script. See “Using
Informix Server log_full.sh on UNIX” on page 26.
✓ Ensure that you have sufficient logical log space to create a backup.
If the amount of free space in all logical log files is less than half a
single log file, Informix Server does not create a backup.
✓ Before a Full backup, print or keep a copy of your ONCONFIG file, the
emergency boot file, and on UNIX, also the sqlhosts file.
✓ Verify data consistency.
Chapter 1 23
Integrating Informix Server and Data Protector
Backup
run:
omnib -informix_list <backup_specification_name> [-barmode
<InformixMode>][<List_options>]
where <InformixMode> is one of the following:
full|inf_incr1|inf_incr2
NOTE Data Protector terms full, inf_incr1, and inf_incr2 backup are
equivalent to Informix Server terms level-0, level-1, and level-2 backup,
respectively.
Examples To start a full backup using the Informix Server backup specification
InformixWhole, run:
omnib -informix_list InformixWhole -barmode full
To start an incremental backup (level 1) of the Informix Server backup
specification InformixIncr, run:
omnib -informix_list InformixIncr -barmode inf_incr1
24 Chapter 1
Integrating Informix Server and Data Protector
Backup
✓ Keep a copy of your ONCONFIG file, the emergency boot file, and on
UNIX, also the sqlhosts file, after you create a full backup. You need
this information to restore dbobjects.
To back up a list of dbspaces, run:
onbar -b <dbspace_list>
For example, to back up dbspaces dbspace1 and dbspace3, run:
onbar -b dbspace1, dbspace3
To back up the current logical log file and switch to the next logical log
file, run:
Informix Server 7.3: onbar -l -c
Informix Server 9.4: onbar -b -l -c
Chapter 1 25
Integrating Informix Server and Data Protector
Backup
For more information, see the Backup and Restore Guide of Informix
Server.
To back up logical log files that are full and ready to be backed up, start
• a manual logical log backup to back up all full logical log files and
stop at the current logical log file.
• a continuous logical log backup to back up each logical log file
automatically as it becomes full. Use this backup if you do not want to
monitor the logical log files.
By default, the ALARMPROGRAM configuration parameter is set so that
ON-Bar performs continuous backups.
IMPORTANT If you use continuous backups, ensure that a device is always available
for the logical log backup process.
26 Chapter 1
Integrating Informix Server and Data Protector
Backup
Chapter 1 27
Integrating Informix Server and Data Protector
Restore
Restore
The Data Protector Informix Server integration provides two types of
restore:
Table 1-10 Informix Server Restore Types
Restore Methods
Restore dbobjects in any of the following ways:
• Use the Data Protector GUI. See “Restoring Using the Data Protector
GUI” on page 31.
• Use the Data Protector CLI. See “Restoring Using the Data Protector
CLI” on page 35.
• Use the Informix Server onbar command. See “Restoring Using
Informix Server Commands” on page 35.
NOTE Once the Informix instance is offline, you cannot restore only non-critical
(user) dbspaces. The root dbspace must also be selected for restore.
28 Chapter 1
Integrating Informix Server and Data Protector
Restore
Chapter 1 29
Integrating Informix Server and Data Protector
Restore
1. Go to the directory:
Windows: <Data_Protector_home>\bin
HP-UX and Solaris: /opt/omni/bin/
Other UNIX: /usr/omni/bin/
2. Get a list of Informix Server backed up objects:
omnidb -informix
30 Chapter 1
Integrating Informix Server and Data Protector
Restore
IMPORTANT For object copies, use the object’s backup ID (which equals the object’s
backup session ID). Do not use the object’s copy session ID.
For details on the omnidb command, see the omnidb man page.
Chapter 1 31
Integrating Informix Server and Data Protector
Restore
4. In the Options page, set the Informix Server specific restore options.
For information, see Table 1-11 on page 34 or press F1.
32 Chapter 1
Integrating Informix Server and Data Protector
Restore
Chapter 1 33
Integrating Informix Server and Data Protector
Restore
Option Description
Username UNIX only: User name of the Informix Server backup owner.
onbar is started under the account of the specified user.
User group UNIX only: User group of the Informix Server backup
owner.
Restore to The client to restore to. By default, you restore to the original
client backup client. This option is only valid for a whole-system
restore.
Restore the Select this option to restore the latest backup version.
latest
version
34 Chapter 1
Integrating Informix Server and Data Protector
Restore
Chapter 1 35
Integrating Informix Server and Data Protector
Restore
The following are examples of the onbar command syntax for restore. For
further options, see the Backup and Restore Guide of Informix Server.
36 Chapter 1
Integrating Informix Server and Data Protector
Restore
Chapter 1 37
Integrating Informix Server and Data Protector
Monitoring Sessions
Monitoring Sessions
You can monitor currently running sessions in the Data Protector GUI.
When you run an interactive backup or a restore session, a monitor
window shows you the progress of the session. Closing the GUI does not
affect the session.
You can also monitor sessions from any Data Protector client with the
User Interface component installed, using the Monitor context.
On how to monitor a session, see the online Help index: “viewing
currently running sessions”.
When ON-Bar encounters an error or a condition that warrants a
warning, it writes a message to the Informix Server ON-Bar message
file. The full pathname of this file is specified in the BAR_ACT_LOG
configuration parameter. For more information on this file, see the
Backup and Restore Guide of Informix Server.
To abort a backup or restore session successfully, set the ON-Bar
BAR_RETRY configuration parameter to 0. This parameter specifies how
many times ON-Bar retries a backup or restore if the first attempt fails.
38 Chapter 1
Integrating Informix Server and Data Protector
Troubleshooting
Troubleshooting
This section lists general checks and verifications, plus problems you
might encounter when using the Data Protector Informix Server
integration. Start at “Problems” on page 44 and if you cannot find a
solution there, perform general checks and verifications.
For general Data Protector troubleshooting information, see the HP
OpenView Storage Data Protector Troubleshooting Guide.
Chapter 1 39
Integrating Informix Server and Data Protector
Troubleshooting
Verify that this user is also the owner of the backup specification, or
in the case of a restore failure, verify that this user is specified for the
restore session, and that it is in the Data Protector operator or
admin group.
If this user is in the Data Protector operator group, ensure that the
See private objects user right of this group is selected. For
information, see the online help index: “user rights, changing”.
Now test if this user, for example user informix, has appropriate
rights in Data Protector. Log in to the Informix Server system as user
informix. From the directory:
HP-UX and Solaris: /opt/omni/bin/utilns/
Other UNIX: /usr/omni/bin/utilns/
run:
testbar -type:informix -perform:checkuser
-bar:<backup_specification_name>
In this example, the user has all the necessary rights for the backup
specification named InformixWhole.
40 Chapter 1
Integrating Informix Server and Data Protector
Troubleshooting
— If this fails, check if the Informix Server part of the test failed:
Run the onbar -b -F command. If the test fails, see the Informix
Server documentation for further instructions.
— If the Data Protector part of the test failed, create an Informix
Server backup specification to back up to a null or file device.
If the backup succeeds, the problem is probably related to devices.
For information on troubleshooting devices, see online Help.
— If the test succeeds, start the backup directly from the Informix
Server system using Informix Server commands. For information,
see “Using Informix Server Commands” on page 24.
If this backup succeeds, the problem may be that the client on
which the Data Protector User Interface is running does not have
enough memory, disk space, or other operating system resources.
Chapter 1 41
Integrating Informix Server and Data Protector
Troubleshooting
✓ Test the Data Protector data transfer using the testbar utility. Log
in to the Informix Server system as user informix. From the
directory:
Windows: <Data_Protector_home>\bin
HP-UX and Solaris: /opt/omni/bin/utilns/
Other UNIX: /usr/omni/bin/utilns/
✓ Ensure that the backup specification used for salvaging logical logs is
properly configured.
42 Chapter 1
Integrating Informix Server and Data Protector
Troubleshooting
✓ For a cold restore, verify if the dbspaces you want to restore are
offline:
Chapter 1 43
Integrating Informix Server and Data Protector
Troubleshooting
Problems
Action Edit the emergency boot file to reflect the changed Data Protector
session IDs. List the changed session IDs during the import procedure.
Information about backed-up objects is stored in the emergency boot file
in the following format:
ODS730 rootdbs R 1 7 0 9 1999008018 2005-08-18 18:10:25 1
Entries 7 and 9 make up make up the Data Protector session ID. Entry 9
is the date and entry 7 the unique session number.
Here, the session ID is 2005/08/18-9. Note that the delimiter in the
date field is "-" in the emergency boot file and "/" in the Data Protector
session ID.
The value of the SERVERNUM configuration parameter is given in entry 4.
Problem Restore fails because the emergency boot file is too large
Action Use the ON-Bar onsmsync utility to remove expired backups from the
Informix Server sysutils database and emergency boot file. For
information on the onsmsync utility, see the Backup and Restore Guide of
Informix Server.
44 Chapter 1
2 Integrating IBM DB2 UDB and
Data Protector
Chapter 2 45
Integrating IBM DB2 UDB and Data Protector
Introduction
Introduction
This chapter explains how to configure and use the Data Protector IBM
DB2 UDB (DB2) integration. It describes concepts and methods you
need to understand to back up and restore DB2 databases.
Data Protector integrates with IBM DB2 Universal Database Server
(DB2 Server) to back up DB2 database objects online and offline.
Data Protector offers interactive and scheduled backups of the following
types:
Table 2-1 Backup Types
The basic backup unit is a table space. Only table spaces or databases
(DB2 objects) can be selected for backup.
When restoring a database or table space, you can specify restore options
to perform:
• Rollforward recovery
• Version recovery
• Restore to a new database (database only)
• Restore to another instance (database only)
• Restore to another system (database only)
• Automatic restore from incremental or delta backups
Databases are restored offline, table spaces online.
Limitations Table or datafile backup and restore are not supported. Neither are
backup or restore using Data Protector media with the DB2 Command
Line Processor or the DB2 Control Center.
This chapter provides information specific to the Data Protector DB2
Server integration. For general Data Protector procedures and options,
see online Help.
46 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Integration Concept
Integration Concept
Data Protector integrates with the DB2 Server through a set of modules
responsible for data backup and restore. Figure 2-1 shows the
architecture of the Data Protector DB2 integration.
Chapter 2 47
Integrating IBM DB2 UDB and Data Protector
Integration Concept
48 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Configuring the Integration
Prerequisites
• Ensure you have correctly installed and configured DB2 Server.
Partitioned Environment
In a physically partitioned environment, configure the integration on
every physical node separately.
Chapter 2 49
Integrating IBM DB2 UDB and Data Protector
Configuring the Integration
• DB2 user
• DB2 user’s password
• DB2 instance’s home directory (only in a partitioned environment)
Data Protector then creates a DB2 instance configuration file on the Cell
Manager and verifies the connection to the instance.
These parameters are used for connecting to the DB2 Server system to
perform backups, restores, and other operations, such as listing objects
for backup.
To configure a DB2 instance, use the Data Protector GUI or CLI.
50 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Configuring the Integration
Chapter 2 51
Integrating IBM DB2 UDB and Data Protector
Configuring the Integration
Parameter Description
<DB2_instance> Name of the DB2 instance.
<username> DB2 user.
<password> DB2 user’s password.
<DB2_instance’s_home> Home directory (pathname) of the DB2
instance (only in a partitioned environment).
52 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Configuring the Integration
Chapter 2 53
Integrating IBM DB2 UDB and Data Protector
Backup
Backup
The Data Protector DB2 integration provides three backup types and two
backup modes.
Table 2-3 Backup Types
IMPORTANT Archived logs are automatically backed up whenever a new offline redo
log appears, for example, after the online backup of DB2 objects
completes. Therefore, do not start an online backup of DB2 objects before
creating an archived logs backup specification.
Delete any old archived logs backup specification before creating a new
one.
54 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Backup
DB2 Database Backup Used for backing up only DB2 database objects.
Click OK.
4. In Client, select the DB2 Server system. In a cluster environment,
select the virtual server.
In Application database, select the DB2 instance to be backed up.
UNIX only: Type a username and its group name. This user will be
the backup owner.
Click Next.
Chapter 2 55
Integrating IBM DB2 UDB and Data Protector
Backup
5. If the DB2 Instance is not configured for use with Data Protector, the
Configure DB2 dialog box is displayed. Configure it as described in
“Configuring DB2 Instances” on page 50.
6. Select the DB2 objects you want to back up. The basic backup unit is
a table space. Only table spaces and databases can be selected for
backup. See Figure 2-3.
If you select only DB2 temporary table spaces, the backup fails. To
back up DB2 temporary table spaces, select the whole database.
Click Next.
56 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Backup
Chapter 2 57
Integrating IBM DB2 UDB and Data Protector
Backup
TIP Preview your backup specification before using it for real. See
“Previewing Backup Sessions” on page 59.
Example To back up table spaces at 8.00 a.m., 1.00 p.m., and 6.00 p.m. during
week days:
58 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Backup
Chapter 2 59
Integrating IBM DB2 UDB and Data Protector
Backup
60 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Backup
✓ To enable online backups of DB2 objects, set the DB2 logretain and
userexit parameters to ON (in a partitioned environment, on every
node on which the object resides). Then restart the database for the
new parameters to take effect and perform a full offline database
backup.
✓ To enable incremental or delta backups of DB2 objects, set the DB2
trackmod parameter to ON:
1. Run:
db2 update db cfg for <db_name> USING TRACKMOD ON
In a partitioned environment, run the command on every node on
which the DB2 object resides.
2. Restart the database.
3. Perform a full offline database backup to non-Data Protector
media by running:
backup db <db_name>
✓ To enable offline backups of one or several DB2 table spaces (not the
whole database), set the DB2 logretain parameter to ON.
Chapter 2 61
Integrating IBM DB2 UDB and Data Protector
Backup
Parameter Description
<db2_mode> Backup type: {-full | -incr | -delta}
<options> For information, see the omnib man page.
Example To perform a full DB2 backup, using the backup specification MyObjects,
and to set data protection to 10 weeks, run:
omnib -db2_list MyObjects -barmode -full -protect weeks 10
1. Run the backup specification for the part of DB2 objects residing on
the system with the catalog node. Use the Data Protector GUI or CLI.
2. Run the backup specifications for the other parts of the DB2 objects in
any order.
The order in which you run the backup specifications is only important if
the object resides on the catalog node.
TIP To the first backup specification, add a post-exec script that will
automatically run the other backup specifications. For more information,
see the online Help index: “pre- and post-exec commands for backup
specifications”.
62 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
Restore
Restore DB2 objects using the Data Protector GUI or CLI.
Chapter 2 63
Integrating IBM DB2 UDB and Data Protector
Restore
64 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
4. In the Options page, set the DB2 restore options. For information,
see Table 2-7 on page 65 or press F1.
NOTE For rollforward, the latest backup version of log files is used. To perform
a rollforward using an older version of log files, first restore the desired
log files and then restore the databases/tablespaces with the
Rollforward option cleared. In a partitioned environment, connect to
the catalog node. Finally, perform a rollforward, using DB2 tools.
5. In the Devices page, select devices you want to use for the restore.
6. Click Restore.
7. In the Start Restore Session dialog box, click Next
8. Specify the Report level and Network load.
9. Click Finish to start the restore.
Table 2-7 DB2 Restore Options
Restore to client The client to restore to. By default, DB2 objects are
restored to the source client. This option is only valid
when restoring the whole database.
Chapter 2 65
Integrating IBM DB2 UDB and Data Protector
Restore
Username DB2 user of the target DB2 instance, its group, and
User group password.
Password
66 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
Parameter Description
<source_client> The DB2 Server system from which DB2 objects
were backed up. In a cluster environment, the name of
the virtual server.
<target_client> The target DB2 Server system (only if you are not
restoring to the source client).
<source_instance> The DB2 instance whose DB2 objects were
backed up.
<target_instance> The target DB2 instance.
<source_db> The database you want to restore.
<new_db> The target database (specify only if not the source
database).
<table_space> The table space you want to restore.
<log_file> The log file you want to restore.
<session_ID> Backup version ID. For object copies, use the object’s
backup ID (which equals the object’s backup session
ID). Do not use the object’s copy session ID.
For more information, see the omnir man page.
Chapter 2 67
Integrating IBM DB2 UDB and Data Protector
Restore
Example To restore the DB2 database TEMP from the instance DB2Inst on the DB2
Server system degas, and to roll it forward until the 10th of January
2006, 9:15 a.m., run:
omnir -db2 -barhost degas -instance DB2Inst -dbname TEMP
-rollforward time: 2006-01-10.09.15.00
NOTE When restoring a crashed database, you cannot use these commands
because the data is lost.
2. Define new table space containers for the non-system table spaces by
adding options for redirection to the DB2 configuration file. From the
directory:
Windows: <Data_Protector_home>\bin
HP-UX: /opt/omni/lbin/
Other UNIX: /usr/omni/bin/
run:
util_cmd -putopt DB2 <target_instance> "<old_container>"
"<new_container>" -sublist Redirection/<source_db>
for every pair of table space containers.
68 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
Parameter Description
<target_instance> The target instance.
<source_db> The backed up database.
The DB2 user of the target instance must have read and write
permissions for the new containers.
3. In a physically partitioned environment, repeat steps 1 and 2 on
every system.
4. Restore the source database to the new database without specifying
rollforward. Use the Data Protector GUI or CLI.
In a physically partitioned environment, first restore the part of the
database that resided on the system with the catalog node and then
restore the other parts in any order.
After the restore, the new database enters the rollforward pending
state.
5. If you have restored from an offline backup, perform a rollforward
using DB2 tools:
Chapter 2 69
Integrating IBM DB2 UDB and Data Protector
Restore
c. Copy the archived and redo logs of the source database to the
corresponding log path directories of the new database (in a
partitioned environment, to every node of the target instance).
If the SQLLPATH.TAG file exists in the target log file directory,
delete it to avoid possible database inconsistencies.
d. If you are restoring to another instance, grant the ownership of
the copied logs to the DB2 user of the target instance and log in to
the target instance.
e. Perform a rollforward using DB2 tools:
70 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
4. Copy the archived and redo logs of the source database to the
corresponding log path directories of the new database.
5. Perform a rollforward to the end of logs, using the DB2 CLI:
db2 rollforward db db2db_new to end of logs
Example 2 To restore the db2db database, from the instance inst1, to the db2db
database in the inst2 instance:
1. Define a new container /tmp/db2cont2 for the table space, using the
Data Protector CLI:
util_cmd -putopt DB2 inst2 "/tmp/db2cont1"
"/tmp/db2cont2" -sublist Redirection/db2db
2. Restore the db2db database to the inst2 instance, using the Data
Protector CLI:
omnir -db2 -barhost <source_client> [-destination
<target_client>] -instance inst2 -dbname
db2db -frominstance inst1
NOTE When restoring to another instance on another system, use the db2 list
tables for all command to list tables.
Chapter 2 71
Integrating IBM DB2 UDB and Data Protector
Restore
1. Connect to the node that was the catalog node of the crashed
database.
2. Create a new database with the same name.
3. Continue with the restore as described in “Restoring to a New
Database or Another DB2 Instance” on page 68.
1. Restore the part of the DB2 object that resided on the system with the
catalog node, without specifying rollforward. Use the Data Protector
GUI or CLI.
2. Restore all other parts of the DB2 object to the corresponding systems
in any order, without specifying rollforward.
3. Connect to the catalog node and perform a rollforward, using DB2
tools:
db2 terminate
export DB2NODE=<catalog_node_number>
db2 rollforward db <db_name> [[stop]|[to <time>|to end of
logs] [and complete]]
NOTE The order in which you restore the parts of a DB2 object is only
important if the object resides on the catalog node.
72 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Restore
Chapter 2 73
Integrating IBM DB2 UDB and Data Protector
Monitoring Sessions
Monitoring Sessions
You can monitor currently running sessions in the Data Protector GUI.
When you run an interactive backup or restore session, a monitor
window shows you the progress of the session. Closing the GUI does not
affect the session.
You can also monitor sessions from any Data Protector client with the
User Interface component installed, using the Monitor context.
On how to monitor a session, see the online Help index: “viewing
currently running sessions”.
74 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Troubleshooting
Troubleshooting
This section lists general checks and verifications plus problems you
might encounter when using the Data Protector DB2 integration. Start
at “Problems” on page 76 and if you cannot find a solution there, perform
general checks and verifications.
For general Data Protector troubleshooting information, see the HP
OpenView Storage Data Protector Troubleshooting Guide.
— If the DB2 part of the preview fails, see the DB2 documentation.
Chapter 2 75
Integrating IBM DB2 UDB and Data Protector
Troubleshooting
✓ Try performing:
✓ Ensure the target DB2 instance is online and configured for use with
Data Protector.
Problems
Action After configuring the DB2 database for rollforward recovery (userexit
and logretain ON), first back up the database offline. If online backup is
started first, the above error is reported.
76 Chapter 2
Integrating IBM DB2 UDB and Data Protector
Troubleshooting
Action If a lock object operation failed, ensure that the lock timeout limit in the
database configuration is adequate and resubmit the utility command.
Consider using the QUIESCE command to bring the database to a
quiesced state to ensure access.
Chapter 2 77
Integrating IBM DB2 UDB and Data Protector
Troubleshooting
• Increase the number of Disk Agent buffers for the device used for the
restore.
• If all objects of the backup are recorded in the IDB:
Action Ensure that the archived logs are available. If they are not, restore them
from the last backup.
78 Chapter 2
3 Integrating Lotus Notes/Domino
Server and Data Protector
Chapter 3 79
Integrating Lotus Notes/Domino Server and Data Protector
Introduction
Introduction
This chapter explains how to configure and use the Data Protector Lotus
Notes/Domino Server integration. It describes the concepts and methods
you need to understand to back up and restore Lotus Notes/Domino
Server.
Data Protector integrates with Lotus Notes/Domino Server to back up
databases and transaction logs online. During backup, the database can
be actively used.
Data Protector backs up all types of databases (NSF, NTF, and BOX). You
can back up and restore specific databases or the whole server (all
databases under Lotus Notes/Domino Server).
You can also back up:
80 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Introduction
Chapter 3 81
Integrating Lotus Notes/Domino Server and Data Protector
Integration Concepts
Integration Concepts
The Data Protector Lotus Notes/Domino Server integration provides
online backup, restore, and recovery of Lotus Notes/Domino Server, using
the Lotus C API. Figure 3-1 shows the architecture of the integration.
82 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Integration Concepts
Chapter 3 83
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
Prerequisites
• Ensure that you have correctly installed and configured Lotus
Notes/Domino Server.
84 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
You can perform daily full backups of transaction logs instead of full
database backups.
Transaction logging works with databases in Domino Release 5 format or
later. After enabling transaction logging, all databases are automatically
logged.
With transaction logging enabled, multiple S0000000.TXN files may
appear in the log directory.
Table 3-3 Transaction Logging Styles
Archived logging Lotus Notes/Domino Server does not reuse log extents
until they are backed up. The system uses transaction logs
to apply or undo database transactions not flushed to disk
for databases that were open when system failure
occurred.
Chapter 3 85
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
86 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
5. Save the settings and restart Lotus Notes/Domino Server for the
changes to take effect.
Chapter 3 87
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
Examples HP-UX:
ln -s /opt/lotus/notes/latest/hppa/libnotes.sl libnotes.sl
Solaris:
ln -s /opt/lotus/notes/latest/sunspa/libnotes.so libnotes.so
AIX:
ln -s /opt/lotus/notes/latest/ibmpow/libnotes_r.a
libnotes_r.a
88 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
Click Next.
5. In the Configure Lotus dialog box, specify the pathname of the
notes.ini file on the Lotus Notes/Domino Server system.
Review and – if necessary – update other automatically determined
options.
See Figure 3-5.
Chapter 3 89
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
Click OK.
If an error occurs, click Details or see “Troubleshooting” on
page 108.
6. The integration is configured. Exit the GUI or proceed with creating
the backup specification at step 6 on page 95.
90 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
AIX:
/usr/omni/bin/util_notes.exe -CONFIG -SERVER:<SRV_NAME>
-INI:<notes.ini_file> -HOMEDIR:<Lotus_home_directory>
-DATADIR:<Domino_data_directory>
-EXECDIR:<Domino_executables_directory>
Parameter Description
<SRV_NAME> Lotus Notes/Domino Server name.
<notes.ini_file> Pathname of the Lotus Notes/Domino Server
notes.ini file.
<Lotus_home_directory> Pathname of the Lotus Notes/Domino
Server home directory.
<Domino_data_directory> Pathname of the Lotus Notes/Domino
Server data directory.
<Domino_executables_directory> Pathname of the Lotus
Notes/Domino Server executables directory.
Examples Windows:
<Data_Protector_home>\bin\util_notes.exe -CONFIG
–SERVER:BLUE –INI:d:\Lotus\Domino\BLUE\notes.ini
HP-UX and Solaris:
/opt/omni/lbin/util_notes.exe -CONFIG -SERVER:BLUE
-INI:/opt/lotus/notesdata/notes.ini -HOMEDIR:/opt/lotus
-DATADIR:/opt/lotus/notesdata
-EXECDIR:/opt/lotus/notes/latest/hppa
Chapter 3 91
Integrating Lotus Notes/Domino Server and Data Protector
Configuring the Integration
92 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Backup
Backup
The integration provides backup of the following types:
Table 3-4 Lotus Notes/Domino Server Backup Types
Chapter 3 93
Integrating Lotus Notes/Domino Server and Data Protector
Backup
IMPORTANT Archived transaction log files must be backed up frequently, so that log
files do not exceed the defined amount of disk space.
• notes.ini
• desktop.dsk
• all *.id files
94 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Backup
5. If Lotus Notes/Domino Server is not configured yet for use with Data
Protector, the Configure Lotus dialog box is displayed. Configure
the integration as described in “Configuring the Data Protector Lotus
Notes/Domino Server Integration” on page 88.
6. Select the Lotus Notes/Domino Server objects to be backed up. See
Figure 3-6.
Click Next.
7. Select devices to use for the backup.
To specify device options, right-click the device and click Properties.
Click Next.
8. Set backup options. For information on the application specific
options (Figure 3-7), see Table 3-5 on page 96 or press F1.
Chapter 3 95
Integrating Lotus Notes/Domino Server and Data Protector
Backup
Click Next.
9. Optionally, schedule the backup. See “Scheduling Backup
Specifications” on page 97.
Click Next.
10. Save the backup specification, specifying a name and a backup
specification group.
TIP Preview your backup specification before using it for real. See
“Previewing Backup Sessions” on page 98.
96 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Backup
Backup buffer The size of the buffer used for reading and writing data
size during the backup.
Scheduling Example
To back up Lotus Notes/Domino Server at 9.00 a.m., 1.00 p.m., and 6.00
p.m. during week days:
Chapter 3 97
Integrating Lotus Notes/Domino Server and Data Protector
Backup
98 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Backup
Chapter 3 99
Integrating Lotus Notes/Domino Server and Data Protector
Backup
100 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Restore
Restore
You can restore databases directly to the Lotus Notes/Domino Server
system. When you restore a database, the database is brought offline,
restored, and brought online. Transaction logs are also restored if
needed. If recovery is selected, the restore of archived logs is performed
automatically during the recovery process.
You can restore a database restore while the server is online, if the
database is not being accessed. A newly-restored Lotus Notes/Domino
Server database is not active. If you access it, it will automatically be
brought online, but a recovery using the backed up logs will not be
performed. To get the last possible consistent state of the databases or to
perform a recovery to a specific point in time, use the Recover option.
You can restore a database to:
Chapter 3 101
Integrating Lotus Notes/Domino Server and Data Protector
Restore
NOTE In the Source page all backed up databases are listed. When restoring
multiple databases from a specific backup session, ensure that the
databases were backed up in the selected backup session. If not, the
102 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Restore
You can select the backup version in the Options page (Figure 3-10).
Click Browse to select a different version of backup.
4. In the Destination page, set the destination options. For
information, see Table 3-6 on page 105 or press F1.
IMPORTANT If you restore to a location where a database with the same file name
resides as the one being restored, then this database is taken offline and
deleted.
5. In the Options page, set the restore options (Figure 3-10). For
information on the application specific options, see Table 3-7 on
page 106 or press F1.
Chapter 3 103
Integrating Lotus Notes/Domino Server and Data Protector
Restore
6. In the Devices page, the devices and media for restore are
automatically selected.
You can also restore using a device other than that used for backup.
On how to specify another device for restore, see the online Help
index: “restore, selecting devices for”.
7. Click Restore.
8. In the Start Restore Session dialog box, click Next.
9. Specify the Report level and Network load.
Click Finish to start the restore.
The message Session completed successfully is displayed at the
end of a successful session.
104 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Restore
Restore Options
Specify destination and restore options specific to the Data Protector
Lotus Notes/Domino Server integration. If the target system is a UNIX
system, specify UNIX specific options as well.
Table 3-6 Destination Options
Restore to new This option enables you to restore your data to another
location directory. Specify the relative path to the Lotus
Notes/Domino Server data directory where you want to
restore your data.
Chapter 3 105
Integrating Lotus Notes/Domino Server and Data Protector
Restore
Recover (last Select this to recover the database to the last possible
possible consistent state. This also includes the restore of
consistent archived transaction logs if needed during recovery.
state)
Recovery type options
Point in time The point in time to which the database state should
recovery be recovered. Click Browse to specify the desired date
and time. Only transactions written before the
specified date and time are applied to the database.
106 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Monitoring Sessions
Monitoring Sessions
You can monitor currently running sessions in the Data Protector GUI.
When you run an interactive backup or a restore session, a monitor
window shows you the progress of the session. Closing the GUI does not
affect the session.
You can also monitor sessions from any Data Protector client with the
User Interface component installed, using the Monitor context.
On how to monitor a session, see the online Help index: “viewing
currently running sessions”.
Chapter 3 107
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Troubleshooting
This section lists Lotus Notes/Domino Server checks, general checks and
verifications, plus problems you might encounter when using the Data
Protector Lotus Notes/Domino Server integration. Start at “Problems” on
page 113 and if you cannot find a solution there, go through the checks
and verifications.
For general Data Protector troubleshooting information, see the HP
OpenView Storage Data Protector Troubleshooting Guide.
108 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Chapter 3 109
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
The name of the link must be the same as the name of the libnotes
library in the Lotus Notes/Domino Server executables directory.
Example HP-UX:
libnotes.sl -> /opt/lotus/notes/latest/hppa/libnotes.sl
Solaris:
libnotes.so -> /opt/lotus/notes/latest/sunspa/libnotes.so
AIX:
libnotes_r.a ->
/opt/lotus/notes/latest/ibmpow/libnotes_r.a
Check if the soft link works by running:
HP-UX and Solaris: /opt/omni/lbin/util_notes.exe -app
AIX: /usr/omni/bin/util_notes.exe -app
If the soft link is set correctly, the *RETVAL*0 message is displayed.
110 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Make sure the Data Protector Inet service is running under a user
that is a member of the Data Protector admin user group. For
information, see the online Help index: “Inet, changing account”.
✓ Check the omnirc environment settings.
On how to use the omnirc file, see the HP OpenView Storage Data
Protector Troubleshooting Guide.
✓ Check errors during the backup or restore session.
Error related to Lotus Notes/Domino Server take the following form:
Lotus ERROR [error #]: <Error description>
Examine the error description and take appropriate actions.
Additionally, if your backup failed:
Chapter 3 111
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
112 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Example 2006/01/25.18:15:00
Problems
Action On how to solve this problem, see “Checking the Lotus Notes/Domino
Server Side” on page 108.
Chapter 3 113
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
NOTE On UNIX, you need to clean up shared memory and semaphores before
restarting Lotus Notes/Domino Server.
114 Chapter 3
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Action Ensure that Lotus Notes/Domino Server is installed on the target system
and that it has the same non-database files as the Lotus Notes/Domino
Server system whose backup is to be restored. These files must be
restored first from a filesystem backup.
Action 1. Restart the Lotus Notes/Domino Server system and perform the
restore again.
2. Restore the failed database to a location other than the one it was
backed up from.
Chapter 3 115
Integrating Lotus Notes/Domino Server and Data Protector
Troubleshooting
Action Try to restore only one database, which you are sure it is recoverable,
and observe messages. It might be that one database in the restore list is
corrupt (was corrupted at backup time) and therefore the Lotus C API
recovery call fails.
116 Chapter 3
Glossary
G-1
Glossary
(disk partitioning and logical volume program via an open interface, which
configuration) and automatic recovery enables them to communicate with Data
of the original system configuration and Protector software. For backup and
user data that was backed up during the restore, SAP R/3 programs issue orders
full client backup. for the Data Protector backint interface.
These files are stored as an ASR archive
file on the Cell Manager (in backup API
<Data_Protector_home>\Config\Serve The Oracle interface between the Oracle
r\dr\asr on a Windows Cell Manager or backup/restore utility and the backup/
in /etc/opt/omni/server/dr/asr/ on a restore media management layer. The
UNIX Cell Manager) as well as on the interface defines a set of routines to
backup medium. The ASR archive file is allow the reading and writing of data to
extracted to three diskettes for 32-bit the backup media, the creation,
Windows systems or four diskettes for searching and removing the backup
64-bit Windows systems after a disaster files.
occurs. You need these diskettes to
perform ASR. backup chain
See restore chain.
autochanger
See library backup device
A device configured for use with Data
autoloader Protector, which can write data to and
See library read data from storage media. This can
be, for example, a standalone DDS/DAT
Automatic Storage Management drive or a library.
(Oracle specific term)
Automatic Storage Management is an backup generation
Oracle 10g integrated filesystem and One backup generation includes one full
volume manager that manages Oracle backup and all incremental backups
database files. It eliminates complexity until the next full backup.
associated with managing data and disk
and provides striping and mirroring backup ID
capabilities to optimize performance. An identifier of an integration object
that equals the session ID of the backup
BACKINT (SAP R/3 specific term) of this object. The backup ID is
SAP R/3 backup programs can call the preserved when an object is copied,
Data Protector backint interface exported, or imported.
G-2
Glossary
• Mount point: the access point in a backup set (Oracle specific term)
directory structure (drive on A logical grouping of backed up files
Windows and mount point on that are created using the RMAN
UNIX) on the client where the backup command. A backup set is a
backup object is located. complete set of files associated with a
backup. The files can be multiplexed to
• Description: uniquely defines increase performance. A backup set
backup objects with identical client contains either datafiles or archived
name and mount point. logs, but not both together.
G-3
Glossary
Registry for example. File selection lists instant copies of EMC Symmetrix
such as include-lists and exclude-lists standard devices.
can be specified. See also BCV.
G-4
Glossary
BC Process (EMC Symmetrix specific The BCV devices are used as splittable
term) mirrors of the primary EMC Symmetrix
A protected storage environment SLDs that need to be protected.
solution that has defined specially See also BC and BC Process.
configured EMC Symmetrix devices as
mirrors or Business Continuance Boolean operators
Volumes to protect data on EMC The Boolean operators for the full text
Symmetrix standard devices. search functionality of the online Help
See also BCV. system are AND, OR, NOT, and NEAR.
Used when searching, they enable you
BC VA (HP StorageWorks Virtual Array to define your query precisely by
specific term) creating a relationship between search
Business Copy VA allows you to terms. If no operator is specified in a
maintain internal copies of HP multi-word search, AND is used by
StorageWorks Virtual Array LUNs for default. For example, the query
data backup or data duplication within consistency checkmanual disaster
the same virtual array. The copies (child recovery is equivalent to
or Business Copy LUNs) can be used consistencymanual AND checkdisaster
for various purposes, such as backup, AND recovery.
data analysis or development. When
used for backup purposes, the original boot volume/disk/partition
(parent) LUNs are connected to the A volume/disk/partition with files
application system and the Business required for the initial step of the boot
Copy (child) LUNs are connected to the process. Microsoft terminology defines
backup system. the boot volume/disk/partition as a
See also HP StorageWorks Virtual volume/disk/partition containing the
Array LUN, application system, and operating system files.
backup system.
BRARCHIVE (SAP R/3 specific term)
BCV (EMC Symmetrix specific term) An SAP R/3 backup tool that allows you
Business Continuance Volumes, or BCV to archive redo log files. BRARCHIVE
devices, are dedicated SLDs that are also saves all the logs and profiles of the
pre-configured in the ICDA on which archiving process.
the business continuation operation See also SAPDBA, BRBACKUP and
runs. BCV devices are assigned separate BRRESTORE.
SCSI addresses, differing from the
addresses used by the SLDs they mirror.
G-5
Glossary
G-6
Glossary
G-7
Glossary
G-8
Glossary
G-9
Glossary
controls the object copy and object which restricts unauthorized access to
consolidation sessions and runs on the Data Protector and to backed up data.
Cell Manager system. Data Protector administrators create this
account specifying a user logon name,
data file (Oracle and SAP R/3 specific the systems from which the user can log
term) on, and a Data Protector user group
A physical file created by Oracle that membership. This is checked whenever
contains data structures such as tables the user starts the Data Protector user
and indexes. A data file can only belong interface or performs specific tasks.
to one Oracle database.
data stream
data protection Sequence of data transferred over the
Defines how long the backed up data on communication channel.
media remains protected, that is, Data
Protector will not overwrite it. When the database library
protection expires, Data Protector will A Data Protector set of routines that
be able to reuse the media in one of the enables data transfer between Data
next backup sessions. Protector and a server of an online
See also catalog protection. database integration, for example,
Oracle Server.
Data Protector Event Log
A central repository of all Data database parallelism
Protector related notifications. By More than one database is backed up at
default, all notifications are sent to the a time if the number of available devices
Event Log. The events are logged in the allows you to perform backups in
<Data_Protector_home>\log\server\Ob parallel.
2EventLog.txt file on the Cell
ManagerThe Event Log is accessible Data Replication (DR) group (HP
only to Data Protector users in the StorageWorks EVA specific term)
Admin group and to Data Protector A logical grouping of EVA virtual disks.
users who are granted the Reporting and It can contain up to eight copy sets
notifications user rights. You can view provided they have common
or delete all events in the Event Log. characteristics and share a common CA
EVA log.
Data Protector user account See also copy set.
You can use Data Protector only if you
have a Data Protector user account,
G-10
Glossary
G-11
Glossary
G-12
Glossary
it to the Media Agent, which then moves images. A disk image (rawdisk) backup
it to the device. During a restore session does not track the files and directory
the Disk Agent receives data from the structure stored on the disk, but stores a
Media Agent and writes it to the disk. disk image structure on byte level. You
can perform a disk image backup of
Disk Agent concurrency either specific disk sections or a
The number of Disk Agents that are complete disk.
allowed to send data to one Media
Agent concurrently. disk quota
A concept to manage disk space
disk discovery consumption for all or a subset of users
The detection of disks during client on a computer system. This concept is
backup with disk discovery. During this used by several operating system
backup, Data Protector discovers platforms.
(detects) the disks that are present on the
client — even though they might not disk staging
have been present on the system when The process of backing up data in
the backup was configured — and backs several phases to improve the
them up. This is particularly useful in performance of backups and restores,
dynamic environments, where reduce costs of storing the backed up
configurations change rapidly. After the data, and increase the data availability
disks are expanded, each inherits all and accessibility for restore. The backup
options from its master client object. stages consist of backing up data to one
Even if pre- and post-exec commands media type first (for example disk) and
are specified once, they are started many later copying it to a different media type
times, once per each object. (for example tape).
G-13
Glossary
G-14
Glossary
emergency boot file (Informix Server services and the logging on and off of
specific term) users. Data Protector can back up
The Informix Server configuration file Windows Event Logs as part of the
ixbar.<server_id> that resides in the Windows configuration backup.
directory <INFORMIXDIR>/etc (on
Windows) or <INFORMIXDIR>\etc (on exchanger
UNIX). <INFORMIXDIR> is the Also referred to as SCSI Exchanger.
Informix Server home directory and See also library.
<server_id> is the value of the
SERVERNUM configuration parameter. exporting media
Each line of the emergency boot file A process that removes all data about
corresponds to one backup object. backup sessions, such as systems,
objects, and file names, which reside on
enhanced incremental backup the media from the IDB. Information
Conventional incremental backup backs about the media and their relation to a
up files that have changed since a pool is also removed from the IDB. The
previous backup, but has certain data on the media remains unchanged.
limitations in detection of changes. See also importing media.
Unlike conventional incremental
backup, enhanced incremental backup Extensible Storage Engine (ESE)
reliably detects and backs up also
(Microsoft Exchange Server specific
renamed and moved files, as well as files
term)
with changes in attributes.
A database technology used as a storage
system for information exchange in
Enterprise Backup Environment
Microsoft Exchange Server.
Several cells can be grouped together
and managed from a central cell. The
failover
enterprise backup environment includes
Transferring of the most important
all clients located in several Data
cluster data, called group (on Windows)
Protector cells which are managed and
or package (on Unix) from one cluster
administered from a central cell using
node to another. A failover can occur
the Manager-of-Managers concept.
mostly because of software or hardware
See also MoM.
failures or maintenance on the primary
node.
Event Logs
Files in which Windows logs all events,
such as the starting or stopping of
G-15
Glossary
G-16
Glossary
G-17
Glossary
G-18
Glossary
G-19
Glossary
G-20
Glossary
G-21
Glossary
two kinds of stores: mailbox stores and steps, such as the application of
public folder stores. A mailbox store transaction log files, may be required for
consists of mailboxes that belong to full recovery.
individual users. A public folder store See also replica, zero downtime
contains public folders and messages backup (ZDB), ZDB to disk, and ZDB
that are shared among several users. to disk+tape.
See also Key Management Service and
Site Replication Service. integrated security (MS SQL specific
term)
Informix Server (Informix Server Integrated security allows the Microsoft
specific term) SQL Server to use Windows
Refers to Informix Dynamic Server. authentication mechanisms to validate
Microsoft SQL Server logins for all
initializing connections. Using integrated security
See formatting. means that users have one password for
both Windows and Microsoft SQL
Installation Server Server. Integrated security should be
A computer system that holds a used in environments where all clients
repository of the Data Protector support trusted connections.
software packages for a specific Connections validated by Windows
architecture. The Installation Server is Server and accepted by Microsoft SQL
used for remote installation of Data Server are referred to as trusted
Protector clients. In mixed environments connections. Only trusted connections
at least two Installation Servers are are allowed.
needed: one for UNIX systems and one
for Windows systems. integration object
A backup object of a Data Protector
instant recovery (ZDB specific term) integration, such as Oracle or SAP DB.
A process in which a replica, produced
by a ZDB-to-disk or a ZDB-to- Internet Information Server (IIS)
disk+tape sessions, is used to restore the
(Windows specific term)
contents of the source volumes to their
Microsoft Internet Information Server is
states at the time at which the replica
a network file and application server that
was created, avoiding the need to
supports multiple protocols. Primarily,
perform a restore from tape. Depending
IIS transmits information in Hypertext
on the application/database concerned,
this may be all that is required, or other
G-22
Glossary
G-23
Glossary
G-24
Glossary
G-25
Glossary
and recovery information between Lotus contains the primary volumes for the
Domino Server and a backup solution, Continuous Access configuration and
like Data Protector. acts as a master device.
See also BC (HP StorageWorks Disk
LVM Array XP specific term), CA (HP
A Logical Volume Manager is a StorageWorks Disk Array XP specific
subsystem for structuring and mapping term), and HP StorageWorks Disk
physical disk space to logical volumes Array XP LDEV.
on UNIX systems. An LVM system
consists of several volume groups, Manager-of-Managers (MoM)
where each volume group has several See Enterprise Cell Manager.
volumes.
Media Agent
Magic Packet A process that controls reading from and
See Wake ONLAN. writing to a device, which reads from or
writes to a medium (typically a tape).
mailbox (Microsoft Exchange Server During a backup session, a Media Agent
specific term) receives data from the Disk Agent and
The location to which e-mail is sends it to the device for writing it to the
delivered, which is set up by the medium. During a restore session, a
administrator for each user. If a set of Media Agent locates data on the backup
personal folders is designated as the e- medium and sends it to the Disk Agent.
mail delivery location, e-mail is routed The Disk Agent then writes the data to
from the mailbox to this location. the disk. A Media Agent also manages
the robotics control of a library.
Mailbox Store (Microsoft Exchange
Server specific term) MAPI (Microsoft Exchange specific
A part of the Information Store that term)
maintains information about user The MAPI (Messaging Application
mailboxes. A mailbox store consists of a Programming Interface) is the
binary rich-text .edb file and a streaming programming interface that lets
native internet content .stm file. applications and messaging clients
interact with messaging and information
Main Control Unit (MCU) (HP systems.
StorageWorks Disk Array XP specific
term)
An HP StorageWorks XP disk array that
G-26
Glossary
G-27
Glossary
G-28
Glossary
environment, this part of the database number (0, 1 or 2), used to indicate a
can be common to all cells. first level mirror.
See also CMMDB, CDB. See also first level mirror.
G-29
Glossary
G-30
Glossary
G-31
Glossary
online redo log (Oracle specific term) processing can be moved from the
Redo logs that have not been archived, current primary database to a standby
but are either available to the instance database and back quickly.
for recording database activity or are
filled and waiting to be archived or Oracle instance (Oracle specific term)
reused. Each installation of an Oracle database
See also archived redo log. on one or more systems. One computer
system can have several instances of a
OpC database running.
See OVO.
ORACLE_SID (Oracle specific term)
OpenSSH A unique name for an Oracle Server
A set of network connectivity tools used instance. To switch among Oracle
to access remote machines securely, by Servers, specify the desired
using a variety of authentication and <ORACLE_SID>. The
encryption methods. It needs to be <ORACLE_SID> is included in the
installed and configured on the CONNECT DATA parts of the connect
Installation Server and the client if you descriptor in a TNSNAMES.ORA file
perform remote installation using secure and in the definition of the TNS listener
shell. in the LISTENER.ORA file.
G-32
Glossary
G-33
Glossary
G-34
Glossary
G-35
Glossary
G-36
Glossary
G-37
Glossary
G-38
Glossary
G-39
Glossary
G-40
Glossary
source (R1) device (EMC Symmetrix split mirror backup (HP StorageWorks
specific term) Disk Array XP specific term)
An EMC Symmetrix device that See ZDB to tape, ZDB to disk, and
participates in SRDF operations with a ZDB to disk+tape.
target (R2) device. All writes to this
device are mirrored to a target (R2) split mirror creation (EMC Symmetrix
device in a remote EMC Symmetrix and HP StorageWorks Disk Array XP
unit. An R1 device must be assigned to specific term)
an RDF1 group type. A replica creation technique, in which a
See also target (R2) device. pre-configured set of target volumes (a
mirror) is kept synchronized with a set
source volume (ZDB specific term) of source volumes until the time at
A storage volume containing data to be which a replica of the contents of the
replicated. source volumes is required. Then, the
synchronization is stopped (the mirror is
sparse file A file that contains data with split) and a split mirror replica of the
portions of empty blocks. Examples are: source volumes at the time of the split
-A matrix in which some or much of the remains in the target volumes.
data contains zeros -files from image See also split mirror.
applications -high-speed databases If
sparse file processing is not enabled split mirror restore (EMC Symmetrix
during restore, it might be impossible to and HP StorageWorks Disk Array XP
restore this file. specific term)
A process in which data backed up in a
split mirror (EMC Symmetrix and HP ZDB-to-tape or a ZDB-to-disk+tape
StorageWorks Disk Array XP specific session is restored from tape media to a
term) split mirror replica, which is then
A replica created using split mirror synchronized to the source volumes.
techniques. Such a replica provides an Individual backup objects or complete
independent, exact duplicate, or clone, sessions can be restored using this
of the contents of the source volumes. method.
See also replica and split mirror See also ZDB to tape, ZDB to
creation. disk+tape, and replica.
G-41
Glossary
G-42
Glossary
standard security (MS SQL specific systems, file systems are built on this
term) storage. Typically, these can be created
Standard security uses the login or exist within a storage system such as
validation process of the Microsoft SQL a disk array.
Server for all connections. Standard
security is useful in network switchover
environments with a variety of clients, See failover
some of which may not support trusted
connections. It also provides backward Sybase Backup Server API (Sybase
compatibility for older versions of the specific term)
Microsoft SQL Server. An industry-standard interface
See also integrated security. developed for the exchange of backup
and recovery information between a
Storage Group Sybase SQL Server and a backup
(Microsoft Exchange Server specific solution like Data Protector.
term)
A collection of databases (stores) that Sybase SQL Server (Sybase specific
share a common set of transaction log term)
files. Exchange manages each storage The server in the Sybase “client-server”
group with a separate server process. architecture. Sybase SQL Server
manages multiple databases and
StorageTek ACS library multiple users, keeps track of the actual
(StorageTek specific term) location of data on disks, maintains
Automated Cartridge System is a library mapping of logical data description to
system (also known as Silo) consisting physical data storage, and maintains
of one Library Management Unit data and procedure caches in memory.
(LMU) and one to 24 Library Storage
Modules (LSM) connected to the unit. Symmetrix Agent (SYMA) (EMC
Symmetrix specific term)
storage volume (ZDB specific term) The Data Protector software module that
A storage volume represents an object prepares the EMC Symmetrix
that may be presented to an operating environment for backup and restore
system or some other entity (for operations.
example, a virtualization mechanism)
upon which volume management synthetic backup
systems, file systems, or other objects A backup solution that produces a
may exist. The volume management synthetic full backup, an equivalent to a
G-43
Glossary
G-44
Glossary
G-45
Glossary
G-46
Glossary
application system and can be presented Protector backs up user disk quotas on
to the backup system which performs the whole system and for all configured
the backup. users at a time.
See also Microsoft Volume Shadow
Copy service (VSS). user group
Each Data Protector user is member of a
TSANDS.CFG file (Novell NetWare User Group. Each User Group has a set
specific term) of user rights that are given to every user
A file that allows you to specify the in that User Group. The number of User
names of containers where you want Groups with their associated user rights
backups to begin. It is text file located in can be defined as desired. Data Protector
the SYS:SYSTEM\TSA directory on the provides three default user groups:
server where TSANDS.NLM is loaded. admin, operator, and user.
G-47
Glossary
G-48
Glossary
G-49
Glossary
G-50
Glossary
G-51
Glossary
G-52
Index Index
I-1
Index
I-2
Index
L N
linking the C API library Notes Storage Facility files
Lotus integration, 87 Lotus integration, 93
Lotus backup, 93–100 Notes Template Facility files
backup options, 96 Lotus integration, 93
backup specification, modifying, 97 NSF See Notes Storage Facility files
backup specifications, creating, 94 NTF See Notes Template Facility files
backup types, 80
BOX files, 93 O
full backups, 80 , 93
onbar utility
incremental backups, 80, 93 Informix integration, 3, 25
Notes Storage Facility files, 93 online backups
Notes Template Facility files, 93 DB2 integration, 46, 54
previewing backups, 98 Informix integration, 2, 25
scheduling backups, 97 Lotus integration, 80
scheduling backups, example, 97
I-3
Index
P DB2 integration, 60
previewing backups Informix integration, 22
DB2 integration, 59 Lotus integration, 99
Informix integration, 20
Lotus integration, 98 T
transaction log files
Q Lotus integration, 93
quiescent backups transaction logging, enabling
Informix integration, 25 Lotus integration, 84
troubleshooting DB2, 75–78
troubleshooting Informix, 39–44
R
troubleshooting Lotus, 108–116
restore methods typographical conventions, ix
Informix integration, 28
restore options W
DB2 integration, 65
Informix integration, 34 whole-system restore
Informix integration, 28
Lotus integration, 105
restoring DB2, 63–73
examples, 68, 70
partitioned environment, 71
restore options, 65
to a new database, 68
to another DB2 instance, 68
using CLI, 67
using GUI, 63
restoring Informix, 28–37
complete database restore, 28
finding information for restore, 29
restore options, 34
to another Informix Server, 36
using another device, 37
using CLI, 35
using GUI, 31
using Informix commands, 35
using Informix commands, examples, 36
whole-system restore, 28
restoring Lotus, 101–105
examples, 105
restore options, 105
using GUI, 102
running backups See starting backups
S
scheduling backups
DB2 integration, 58
Informix integration, 19
Lotus integration, 97
starting backups
I-4