DP 5 5 Integr Microsoft 10 2004
DP 5 5 Integr Microsoft 10 2004
Integration Guide
for Microsoft Applications:
SQL Server 7/2000
Exchange Server 5.x
Exchange Server 2000/2003
Volume Shadow Copy Service
ii
Contents
1. Integrating Microsoft SQL Server 7.0/2000 and Data Protector
In This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Prerequisites and Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Integration Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Advanced Concept - Parallelism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Data Protector Microsoft SQL Server 7.0/2000 Configuration File . . . . . . . . . . . . . . . 12
Configuring the Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configuring Microsoft SQL Server 7.0/2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configuring a Microsoft SQL Server 7.0/2000 Backup. . . . . . . . . . . . . . . . . . . . . . . . 18
Backing Up Microsoft SQL Server 7.0/2000 Databases. . . . . . . . . . . . . . . . . . . . . . . . . 26
Scheduling a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Running an Interactive Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Restoring a Microsoft SQL Server 7.0/2000 Database . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Restoring Using the Data Protector GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Restoring Using the Data Protector CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Performance Tuning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Monitoring a Microsoft SQL Server 7.0/2000 Backup and Restore. . . . . . . . . . . . . . . . 47
Monitoring Current Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Viewing Previous Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Backup Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Restore Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Before You Call Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
iii
Contents
Backing Up Microsoft Exchange Server 5.x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Scheduling a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Running an Interactive Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Restoring a Microsoft Exchange 5.x Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Restoring from the Latest Online Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Performance Tuning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Monitoring a Microsoft Exchange 5.x Backup and Restore . . . . . . . . . . . . . . . . . . . . . . 91
Monitoring Current Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Viewing Previous Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
General Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Backup Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Restore Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
iv
Contents
Integration Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Configuring the Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Configuring the Single Mailbox Integration Agent . . . . . . . . . . . . . . . . . . . . . . . . . 144
Configuring a Single Mailbox Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Backup Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Testing the Integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Backing Up a Single Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Scheduling a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Running an Interactive Backup Using the Data Protector GUI . . . . . . . . . . . . . . . 156
Running an Interactive Backup Using the Data Protector CLI. . . . . . . . . . . . . . . . 157
Restoring a Single Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Restoring a Single Mailbox Using the Data Protector GUI . . . . . . . . . . . . . . . . . . . 159
Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Restoring a Single Mailbox Using the Data Protector CLI . . . . . . . . . . . . . . . . . . . 165
Performance Tuning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Monitoring a Single Mailbox Backup and Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Monitoring Current Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Viewing Previous Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
General Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Backup Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Restore Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
v
Contents
MSDE Writer Restore Specifics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Microsoft Exchange Server 2003 Writer Restore Specifics . . . . . . . . . . . . . . . . . . . 211
Restore Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Monitoring a VSS Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Monitoring Current Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Viewing Previous Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Troubleshooting Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Restore Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Glossary
Index
vi
Printing History
The manual printing date and part number indicate its current edition.
The printing date will change when a new edition is printed. Minor
changes may be made at reprint without changing the printing date. The
manual part number will change when extensive changes are made.
Manual updates may be issued between editions to correct errors or
document product changes. To ensure that you receive the updated or
new editions, you should subscribe to the appropriate product support
service. See your HP sales representative for details.
Table 1 Edition History
vii
viii
Conventions
The following typographical conventions are used in this manual.
Table 2
ix
Data Protector provides a cross-platform (Windows and UNIX) graphical
user interface. Refer to the HP OpenView Storage Data Protector
Administrator’s Guide for information about the Data Protector
graphical user interface.
x
Contact Information
General General information about Data Protector can be found at
Information
http://www.hp.com/go/dataprotector
xi
xii
Data Protector Documentation
Data Protector documentation comes in the form of manuals and online
Help.
Manuals Data Protector manuals are available in printed format and in PDF
format. Install the PDF files during the Data Protector setup procedure
by selecting the User Interface component on Windows or the
OB2-DOCS component on UNIX. Once installed, the manuals reside in the
<Data_Protector_home>\docs directory on Windows and in the
/opt/omni/doc/C/ directory on UNIX. You can also find the manuals in
PDF format at http://ovweb.external.hp.com/lpe/doc_serv/
HP OpenView Storage Data Protector Concepts Guide
This manual describes Data Protector concepts and provides background
information on how Data Protector works. It is intended to be used with
the task-oriented HP OpenView Storage Data Protector Administrator’s
Guide.
HP OpenView Storage Data Protector Administrator’s Guide
This manual describes typical configuration and administration tasks
performed by a backup administrator, such as device configuration,
media management, configuring a backup, and restoring data.
HP OpenView Storage Data Protector Installation and Licensing
Guide
This manual describes how to install the Data Protector software, taking
into account the operating system and architecture of your environment.
This manual also gives details on how to upgrade Data Protector, as well
as how to obtain the proper licenses for your environment.
HP OpenView Storage Data Protector Integration Guide
This manual describes how to configure and use Data Protector to back
up and restore various databases and applications. It is intended for
backup administrators or operators. There are four versions of this
manual:
xiii
This manual describes the integrations of Data Protector with the
following Microsoft applications: Microsoft Exchange Server
2000/2003, Microsoft Exchange Server 5.x, Microsoft SQL Server
7/2000, and Volume Shadow Copy Service.
• HP OpenView Storage Data Protector Integration Guide for Oracle
and SAP
This manual describes the integrations of Data Protector with Oracle,
SAP R3, and SAP DB.
• HP OpenView Storage Data Protector Integration Guide for IBM
Applications: Informix, DB2, and Lotus Notes/Domino
This manual describes the integrations of Data Protector with the
following IBM applications: Informix, IBM DB2, and Lotus
Notes/Domino.
• HP OpenView Storage Data Protector Integration Guide for Sybase,
Network Node Manager, and Network Data Management Protocol
This manual describes the integrations of Data Protector with
Sybase, Network Node Manager, and Network Data Management
Protocol.
HP OpenView Storage Data Protector Integration Guide for HP
OpenView
This manual describes how to install, configure, and use the integration
of Data Protector with HP OpenView Service Information Portal, HP
OpenView Service Desk, and HP OpenView Reporter. It is intended for
backup administrators. It discusses how to use the OpenView
applications for Data Protector service management.
HP OpenView Storage Data Protector Integration Guide for HP
OpenView Operations for UNIX
This manual describes how to monitor and manage the health and
performance of the Data Protector environment with HP OpenView
Operations (OVO), HP OpenView Service Navigator, and HP OpenView
Performance (OVP) on UNIX.
xiv
HP OpenView Storage Data Protector Integration Guide for HP
OpenView Operations for Windows
This manual describes how to monitor and manage the health and
performance of the Data Protector environment with HP OpenView
Operations (OVO), HP OpenView Service Navigator, and HP OpenView
Performance (OVP) on Windows.
HP OpenView Storage Data Protector Zero Downtime Backup
Concepts Guide
This manual describes Data Protector zero downtime backup and instant
recovery concepts and provides background information on how Data
Protector works in a zero downtime backup environment. It is intended
to be used with the task-oriented HP OpenView Storage Data Protector
Zero Downtime Backup Administrator’s Guide and the HP OpenView
Storage Data Protector Zero Downtime Backup Integration Guide.
HP OpenView Storage Data Protector Zero Downtime Backup
Administrator’s Guide
This manual describes how to configure and use the integration of Data
Protector with HP StorageWorks Virtual Array, HP StorageWorks
Enterprise Virtual Array, EMC Symmetrix Remote Data Facility and
TimeFinder, and HP StorageWorks Disk Array XP. It is intended for
backup administrators or operators. It covers the zero downtime backup,
instant recovery, and the restore of filesystems and disk images.
HP OpenView Storage Data Protector Zero Downtime Backup
Integration Guide
This manual describes how to configure and use Data Protector to
perform zero downtime backup, instant recovery, and standard restore of
Oracle, SAP R/3, Microsoft Exchange Server 2000/2003, and Microsoft
SQL Server 2000 databases. The manual also describes how to configure
and use Data Protector to perform backup and restore using the
Microsoft Volume Shadow Copy Service.
HP OpenView Storage Data Protector MPE/iX System User Guide
This manual describes how to configure MPE/iX clients and how to back
up and restore MPE/iX data.
xv
HP OpenView Storage Data Protector Media Operations User's
Guide
This manual provides tracking and management of offline storage
media. It is intended for network administrators responsible for
maintaining and backing up systems. It describes the tasks of installing
and configuring the application, performing daily media operations and
producing reports.
HP OpenView Storage Data Protector Software Release Notes
This manual gives a description of new features of HP OpenView Storage
Data Protector A.05.50. It also provides information on supported
configurations (devices, platforms and online database integrations,
SAN, and ZDB), required patches, and limitations, as well as known
problems and workarounds. An updated version of the supported
configurations is available at
http://www.openview.hp.com/products/datapro/spec_0001.html.
Online Help Data Protector provides context-sensitive (F1) Help and Help Topics for
Windows and UNIX platforms.
xvi
In This Book
The HP OpenView Storage Data Protector Integration Guide for Microsoft
Applications: SQL Server 7/2000, Exchange Server 5.x, Exchange Server
2000/2003, and Volume Shadow Copy Service describes how to configure
and use Data Protector with Microsoft applications.
Audience
This manual is intended for backup administrators who are responsible
for the planning, setup, and maintenance of network backups. It assumes
that you are familiar with:
xvii
Organization
The manual is organized as follows:
Chapter 1 “Integrating Microsoft SQL Server 7.0/2000 and Data
Protector” on page 1.
Chapter 2 “Integrating Microsoft Exchange Server 5.x and Data
Protector” on page 59.
Chapter 3 “Integrating Microsoft Exchange Server 2000/2003 and
Data Protector” on page 101.
Chapter 4 “Integrating Microsoft Exchange Single Mailbox and
Data Protector” on page 135.
Chapter 5 “Integrating Microsoft Volume Shadow Copy Service
with Data Protector” on page 179.
Glossary Definition of terms used in this manual.
The integrations of Data Protector with the following database
applications are described in the HP OpenView Storage Data Protector
Integration Guide for Oracle and SAP:
• Oracle
• SAP R/3
• SAP DB
The integrations of Data Protector with the following database
applications are described in the HP OpenView Storage Data Protector
Integration Guide for IBM Applications: Informix, DB2, and Lotus
Notes/Domino:
• Informix
• IBM DB2 UDB
• Lotus Notes/Domino
The integrations of Data Protector with the following database
applications are described in the HP OpenView Storage Data Protector
Integration Guide for Sybase, Network Node Manager, and Network Data
Management Protocol:
• Sybase
• Network Node Manager
xviii
• Network Data Management Protocol
The integrations of Data Protector ZDB integrations with the following
applications or operating system services are described in the HP
OpenView Storage Data Protector Zero Downtime Backup Integration
Guide:
• Oracle
• SAP R/3
• Microsoft SQL Server 7.0/2000
• Microsoft Volume Shadow Copy Service
• Microsoft Exchange Server 2000/2003
xix
xx
1 Integrating Microsoft SQL
Server 7.0/2000 and Data
Protector
Chapter 1 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
In This Chapter
In This Chapter
This chapter explains how to configure and use the Data Protector
Microsoft SQL Server 7.0/2000 integration.
The chapter is organized into the following sections:
“Overview” on page 3
“Prerequisites and Limitations” on page 5
“Integration Concept” on page 6
“Data Protector Microsoft SQL Server 7.0/2000 Configuration File” on
page 12
“Configuring the Integration” on page 14
“Backing Up Microsoft SQL Server 7.0/2000 Databases” on page 26
“Restoring a Microsoft SQL Server 7.0/2000 Database” on page 29
“Performance Tuning” on page 41
“Monitoring a Microsoft SQL Server 7.0/2000 Backup and Restore” on
page 47
“Troubleshooting” on page 50
2 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Overview
Overview
The Data Protector integration with Microsoft SQL Server 7.0/2000
allows you to perform online backups.
Refer to the HP OpenView Storage Data Protector Software Release Notes
for information about platforms and devices that are supported by the
Data Protector Microsoft SQL Server 7.0/2000 integration.
The online backup concept is widely accepted. It addresses the business
requirements for high application availability better than the offline
backup concept.
Data Protector Microsoft SQL 7.0/2000 integration supports the
following backup types:
• Point-in-time restore
• Restore database to another SQL Server
• Recovery completion state
• Force restore over existing database
Advantages Using Data Protector together with Microsoft SQL Server 7.0/2000 offers
several advantages over using Microsoft SQL Server 7.0/2000 alone:
Chapter 1 3
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Overview
• Backup Management
Backed up data can be duplicated during or after the backup to
increase fault tolerance of backups, to improve data security and
availability, or for vaulting purposes.
• Scheduling
Data Protector has a built-in scheduler, which allows the
administrator to automate backups to run periodically. With the Data
Protector Scheduler, the backups you configure run unattended at
specified times, provided the devices and media are properly set.
• Device Support
Data Protector supports a wide range of devices: files, standalone
drives, very large multiple drive libraries, etc.
• Reporting
Data Protector has reporting capabilities that allow you to receive
information about your backup environment. You can schedule
reports to be issued at a specific time or attached to a predefined set
of events, such as the end of a backup session or a mount request.
• Monitoring
Data Protector has a feature that allows the administrator to monitor
currently running sessions and view finished sessions from any
system that has the Data Protector GUI installed.
All backup sessions are logged in the IDB, which provides the
administrator with a history of activities that can be queried at a
later time.
4 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Prerequisites and Limitations
Prerequisites • You need a license to use the Data Protector Microsoft SQL Server
7.0/2000 integration. Refer to the HP OpenView Storage Data
Protector Installation and Licensing Guide for information about
licensing.
• Before you begin, make sure that you have correctly installed and
configured the Microsoft SQL Server 7.0/2000 and Data Protector
systems. Refer to the:
Limitation Preview is not possible for SQL 7.0/2000 backup and restore sessions.
It is assumed that you are familiar with the Microsoft SQL Server
7.0/2000 database administration and the basic Data Protector
functionality.
Chapter 1 5
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
Integration Concept
Virtual Device The Microsoft SQL Server 7.0/2000 introduces a new backup interface
Interface called Virtual Device Interface (VDI). VDI allows much faster backups
and restores than the backup interface used in previous versions of the
Microsoft SQL Server.
The central component of the integration is the Data Protector
sql_bar.exe executable, which is installed on the Microsoft SQL Server
7.0/2000 system. From the perspective of the Microsoft SQL Server
7.0/2000, Data Protector is seen as media management software. The
sql_bar.exe executable implements multiple virtual devices used for
backup and restore, and transforms VDI commands from the Microsoft
SQL Server into Data Protector backup or restore streams.
Fast Direct Mode The VDI architecture allows the Data Protector General Media Agent to
access data directly in the Microsoft SQL Server's memory, provided that
the devices are attached directly to the Microsoft SQL Server system.
Therefore, high backup and restore speeds on large databases can be
achieved.
The high performance Data Protector mode is called Fast direct mode.
Backup Types There are three online backup types of the Microsoft SQL Server
7.0/2000 system that can be performed using the Data Protector
Microsoft SQL 7.0/2000 integration:
Full database backup
Full database backup includes all data in a database regardless of
whether the database has changed after the last backup was created.
This means that the entire database backup does not depend on any
other backup media.
Differential database backup
A differential database backup records only the data changes made to
the database since the last full database backup. A differential database
backup takes less time to complete than a full database backup. By
creating differential database backups more frequently than full
database backups, you can conserve the media used for a backup.
6 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
Backup Objects When selecting objects for a backup, you can choose to back up the whole
server system or may select particular databases, which are listed below:
Database Description
user databases Contain user data. For example, there is the pubs
database providing learning tools, which is the basis
for most of the examples in Microsoft SQL Server
7.0/2000 manuals.
master Controls the user databases and the operation of
Microsoft SQL Server 7.0/2000 as a whole. It keeps
track of such information as user accounts,
configurable environment variables, and system error
messages.
model Provides a template or prototype for new user
databases.
distribution The distribution database is one of the system
databases used by the replication components of the
Microsoft SQL Server 7.0/2000, such as Distribution
Agent, to store data, including transactions, snapshot
jobs, synchronization status, and replication history
information. This database does not necessarily reside
on a server unless the system is used for remote
distribution or as a combined Publisher/Distributor.
msdb Provides a storage area for scheduling information and
information about backups.
Chapter 1 7
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
IMPORTANT Table backup is not supported by the Data Protector Microsoft SQL
Server 7.0/2000 integration.
Backup Flow A backup session is started by the Data Protector Backup Session
Manager (BSM), which reads the Data Protector backup specification
and invokes sql_bar.exe. The BSM also starts the General Media
Agents. The sql_bar.exe executable connects to the Microsoft SQL
Server 7.0/2000 and receives data from it via VDI. It then passes the
instructions on to Data Protector General Media Agents, which write the
data to the backup devices.
Messages from the backup session are sent to the Backup Session
Manager, which then writes messages and information regarding the
respective session to the IDB.
Restore Flow Using the Data Protector User Interface, the objects and object versions
which are to be restored are defined by the user. A restore session is
started by the Restore Session Manager (RSM), which starts
sql_bar.exe and the Data Protector General Media Agents. The
sql_bar.exe connects to Microsoft SQL Server 7.0/2000 and receives
data from the General Media Agents. The Microsoft SQL Server 7.0/2000
then writes the data restored by Data Protector to the disks.
Messages from the restore session are sent to the Data Protector RSM,
which writes messages and information regarding the respective session
to the IDB.
The concept of a backup and a restore session is shown in the Figure 1-1
on page 9.
8 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
Legend:
SM A Data Protector Session Manager, which is the Data
Protector Backup Session Manager during backup, or
the Data Protector Restore Session Manager during
restore.
BackupAPI or VDI The Microsoft SQL Server 7.0/2000 Virtual Device
Interface, the Microsoft backup interface introduced
with the Microsoft SQL Server 7.0.
MA The Data Protector General Media Agent.
Chapter 1 9
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
• Database parallelism
More than one database is backed up at a time if the number of
available devices allows you to perform backups in parallel.
The allocation of streams to devices is done automatically.
Data Protector tries to use all available devices to run the backup in
parallel.
• Number of concurrent streams
The number of concurrent streams is defined as the number of
devices used to back up a particular database or Microsoft SQL
Server 7.0/2000. It can be specified by the user or calculated
automatically.
NOTE Microsoft SQL Server 7.0/2000 does not support the backup of multiple
streams to one device.
10 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Integration Concept
Chapter 1 11
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Data Protector Microsoft SQL Server 7.0/2000 Configuration File
Syntax The syntax of the Data Protector Microsoft SQL Server 7.0/2000
configuration file is as follows:
Login='<user>';
Password='<encoded_password>';
IMPORTANT To avoid problems with your backups, take extra care to ensure that the
syntax of your configuration file matches the examples.
12 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Data Protector Microsoft SQL Server 7.0/2000 Configuration File
Chapter 1 13
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Before You Begin It is recommended that you configure and run some test filesystem
backups using Data Protector.
This includes installing the Disk Agent on the Microsoft SQL Server
7.0/2000 system. Any device can be used for this test. Configure a
standard filesystem backup, which can include one directory only.
Thus, you can check whether the Microsoft SQL Server 7.0/2000 client
system and the Data Protector Cell Manager are communicating
properly.
In case of problems, this type of backup is much easier to troubleshoot
than the integration of Microsoft SQL Server 7.0/2000 with Data
Protector.
Refer to the HP OpenView Storage Data Protector Administrator’s Guide
for instructions. In case of any difficulties with the filesystem backup, do
not continue configuring the integration until you have solved the
problems.
14 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
You need to define the way in which the Data Protector sessions will run
on the Microsoft SQL Server system, using either Data Protector Inet
account (in most cases the system account) or a specified user account
(preferred option).
Chapter 1 15
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Configuration To configure the Microsoft SQL 7.0/2000 Server while creating the first
Procedure backup specification or while changing the configuration, proceed as
follows:
In the Configure MS SQL dialog box, select either Integrated
Security or Standard Security. See Figure 1-4.
16 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
What Happens? The login information is written to the Data Protector Microsoft SQL
Server 7.0/2000 configuration file on the Cell Manager:
<Data_Protector_home>\Config\server\Integ\Config\MSSQL\<ho
stname>%<instance name> (Windows Cell Manager) or
/etc/opt/omni/server/integ/config/MSSQL/<hostname>%<instance
name> (UNIX Cell Manager).
Chapter 1 17
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
1. Configure the devices you plan to use for a backup. Refer to the online
Help index keyword “configuring devices” for instructions. See also
“Performance Tuning” on page 41 for advanced options.
2. Configure media pools and media for a backup. Refer to the online
Help index keyword “creating media pools” for instructions.
3. Create a Data Protector Microsoft SQL Server 7.0/2000 backup
specification.
18 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Click OK.
4. In the Client drop-down list, select the Microsoft SQL Server
7.0/2000 system. If the application is cluster-aware, select the virtual
server of the Microsoft SQL Server 7.0/2000 resource group.
In the Application database drop-down list, leave the instance
name for Microsoft SQL Server 7.0/2000.
Chapter 1 19
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Click Next.
5. If the client has not been configured yet, the Configure Microsoft
SQL dialog box appears. See “Configuring Microsoft SQL Server
7.0/2000” on page 14 for detailed steps.
6. Select the Microsoft SQL Server 7.0/2000 databases you want to back
up.
Click Next.
7. Select the device(s) you want to use for the backup. Click Properties
to set the device concurrency, media pool, and preallocation policy. For
more information on these options, click Help.
You can also specify whether you want to create additional copies
(mirrors) of the backup during the backup session. Specify the desired
number of mirrors by clicking the Add mirror and Remove mirror
buttons. Select separate devices for the backup and for each mirror.
20 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
10. Save the backup specification. It is recommended that you save all
Microsoft SQL Server 7.0/2000 backup specifications in the MSSQL
group. See the following figure.
11. Once saved, the backup specification can be started by clicking Start
Backup.
See “Backing Up Microsoft SQL Server 7.0/2000 Databases” on
page 26 for information on starting a backup.
Chapter 1 21
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
NOTE It is recommended that the local devices with special block-size settings
be dedicated to the Microsoft SQL Server 7.0/2000 high performance
backup only.
NOTE If the check fails, the backup session is still completed (with warnings).
22 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Chapter 1 23
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
NOTE If you selected whole server backup, the same options as in the
Application Specific Options windows are displayed here.
24 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Configuring the Integration
Concurrent streams
The number of user-specified concurrent streams
(devices) used for backup. VDI supports up to 32
virtual devices per database.
Chapter 1 25
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Backing Up Microsoft SQL Server 7.0/2000 Databases
Scheduling a Backup
Scheduling a backup specification means setting time, date, and type of a
backup that starts unattended once the scheduling options are defined
and saved in the backup specification.
For more information on scheduling, refer to the online Help index
keyword “scheduled backups”.
To schedule a Microsoft SQL Server 7.0/2000 backup, proceed as follows:
26 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Backing Up Microsoft SQL Server 7.0/2000 Databases
You can select one of the following backup types: full, differential, or
transaction log backup. See “Integration Concept” on page 6 for a
detailed description of backup types.
Chapter 1 27
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Backing Up Microsoft SQL Server 7.0/2000 Databases
In the Start Backup dialog box, select the Backup type and Network
load options. For information on these options, click Help.
Click OK.
28 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Prerequisite Before you start a restore session, verify that the database is not being
used by any user.
• Point-in-time restore
• Recovery completion state
• Force restore over existing database
In this way, you can choose among several restore scenarios.
Restore Procedure To restore the Microsoft SQL Server 7.0/2000 databases using the Data
Protector GUI, proceed as follows:
Chapter 1 29
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
To select the backup object specific options, right-click the object and
select Properties.
30 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Here you can select the version (date of a backup) from which you
want to restore and choose the Microsoft SQL Server 7.0/2000 specific
restore options. See “Restore Options” on page 33 for details about
these options. Click OK.
4. In the Options property page, specify whether you want to restore
your data to another client or instance. In this case, you have to
specify new locations for the databases you want to restore. See
“Restore Options” on page 33.
NOTE When you click the Options tab, Data Protector browses the cell for the
running Microsoft SQL Server 2000 instances that can be selected as
target instances for restore. If no instances are found, the Restore to
another instance option is automatically disabled and the message
There are no instances on this client system is displayed.
Chapter 1 31
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
5. Click Devices and then Media to select the devices and media to be
used for the restore.
Note that you can use a different device for the restore than the one
used for the backup. Refer to the “Restoring Under Another Device”
section in the HP OpenView Storage Data Protector Administrator’s
Guide for more information on how to perform a restore using
another device.
32 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
IMPORTANT If the devices used for the restore are not those used for the backup,
select the same number of devices in the Devices property page as you
used when you backed up the databases.
6. Click Restore MS SQL Server and then Next to select the Report
level and Network load.
Click Finish to start the restore session.
Restore Options
See also “Before You Call Support” on page 56 for restore options
available from the command line only.
Backup Version
Specify the backup session from which the selected
objects will be restored.
Point-in-Time Restore
Point-in-time restore means that a user can specify a
point in time to which the database state must be
restored. After recovery, the database is recovered in
the state it was at the specified date and time.
Only transaction log records written before the
specified date and time are applied to the database.
Point-in-time restore is specified by selecting a backup
version and by setting the Stop at option.
Stop at
The Stop at option specifies the exact time when the
rollforward of transactions will be stopped. Therefore,
the backup you restore from must include transaction
log backups so that the Microsoft SQL Server can
recover the database to a particular point in time.
This option cannot be used with NORECOVERY or
STANDBY. If you specify a Stop at time that is after the
end of the RESTORE LOG operation, the database is left
in a non-recovered state, just as if RESTORE LOG had
been run with NORECOVERY.
Chapter 1 33
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
34 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Prerequisites • Both Microsoft SQL Servers 7.0/2000 must have the same local
settings, such as code page and sort order. This information is
displayed in the session monitor for each backup.
• The Target Microsoft SQL Server 7.0/2000 must be in the same Data
Protector cell as the original Microsoft SQL Server 7.0/2000 and it
must be configured.
Proceed as follows:
Chapter 1 35
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
3. Select whether you want to restore the data to another Microsoft SQL
Server 7.0/2000 client or (and) to another Microsoft SQL Server 2000
instance:
Example To start a restore of the database RONA that was running on the Microsoft
SQL Server 7.0/2000 called Alma, execute the following command to
restore the latest backup session to the same destination:
omnir -MSSQL -barhost Alma -base RONA
36 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Disaster Recovery
Disaster recovery is a very complex process that involves products from
several vendors. As such, a successful disaster recovery depends on all
the vendors involved. The information provided here is intended to be
used as a guideline.
Check the instructions from the database/application vendor on how to
prepare for a disaster recovery. See also the “Disaster Recovery” chapter
in the HP OpenView Storage Data Protector Administrator’s Guide for
instructions on how to approach system disaster recovery using Data
Protector.
This is a general procedure for recovering an application:
IMPORTANT If you need to reinstall SQL Server 7.0/2000, ensure that you use the
original local settings. Before you perform a restore to another client,
ensure that the local settings on the restore target system match the
original.
Chapter 1 37
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
You need to recover the master database first. See the following section
for the procedure on how to do this.
Setting User After the master database is rebuilt, proceed as follows to set user
Rights rights using the Microsoft SQL Server 7.0/2000 Enterprise Manager:
38 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Chapter 1 39
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Restoring a Microsoft SQL Server 7.0/2000 Database
Remember that you must restore all other databases if you perform
disaster recovery.
If you restored selected databases only, you need to reattach
databases (if they exist on disks) to the newly-rebuilt master
database. See the next section for details.
TIP It is also possible to restore versions one by one to have more control over
the restore process. Use the options Restore only this backup and
Recovery completion state to do this.
40 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
Performance Tuning
Performance tuning means customizing your Microsoft SQL Server
7.0/2000 and Data Protector in a way that enables them to achieve better
backup and restore results. You can improve the backup or restore
performance of your Microsoft SQL Server 7.0/2000 by following these
guidelines:
1. Ensure that your Microsoft SQL Server 7.0/2000 database files are on
separate disks.
2. Calculate the number of devices to be used in parallel. The main
consideration is to select a number of devices to match the bandwidth
of the incoming data stream and to identify the bottleneck. This can
be either the network, if devices are connected to remote systems, or
the Microsoft SQL Server 7.0/2000 itself, if the devices are connected
locally.
As the bandwidths of networks are most often either ~1 MB/s (10
Mbit Ethernet), or ~10 MB/s (100 Mbit Ethernet), though the actual
throughput is usually lower, you will not need more than one fast
device, such as a DLT 7000 for a remote backup.
There are two possibilities when you have devices connected locally:
TIP Create separate backup specifications for local and remote devices. It is
not recommended to use both in one backup specification.
Chapter 1 41
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
42 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
You can adjust the block size during the initial device definition
for local devices by checking the attached check box and selecting
the block size. See Figure 1-15 on page 44.
You can also modify the block size later, however you will have to
first calculate the block size by using the formula above and then
insert the value as shown in Figure 1-16 on page 45.
• Modify the registry.
To use a block size larger than 56 KB, some SCSI interface cards
require you to adjust related values in the registry of the system
where the device is connected.
Refer to the HP OpenView Storage Data Protector Administrator’s
Guide for information on how to adjust registry values for block
sizes larger than 56 KB.
Chapter 1 43
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
44 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
If the Fast direct mode option has been activated and not all
selected local devices in a backup specification are adjusted
accordingly, you will get the following warning message when
saving the backup specification:
Chapter 1 45
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Performance Tuning
4. Scheduling
The backup schedule depends on how many transactions are done on
the server. Generally, it is not wise to let the transaction log files grow
over a certain limit, which depends on the certain production
database and the size of its transaction log files. These are some
general rules on how to schedule backups for production databases:
46 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Monitoring a Microsoft SQL Server 7.0/2000 Backup and Restore
Clearing Sessions To remove all completed or aborted sessions from the Results Area of the
Monitor context, proceed as follows:
Chapter 1 47
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Monitoring a Microsoft SQL Server 7.0/2000 Backup and Restore
NOTE All completed or aborted sessions are automatically removed from the
Results Area of the Monitor context if you restart the Data Protector
GUI.
48 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Monitoring a Microsoft SQL Server 7.0/2000 Backup and Restore
Chapter 1 49
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
Troubleshooting
This section is divided into the following subsections:
50 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
Configuration Problems
1. If a configuration procedure does not work:
• The username and password of the SQL Server 7.0/2000 user who has
permissions to back up and restore the SQL Server backup objects.
• The name of the SQL Server system.
To check configuration using the command line, enter the following
string from the <Data_Protector_home>\bin directory on the
Microsoft SQL Server 7.0/2000 computer:
sql_bar chkconf [-instance:<instance_name>]
If the optional parameter -instance:<instance_name> is not specified,
the default instance is checked.
Chapter 1 51
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
What Happens? Once you start the configuration from the command line, the login
information will be written in the <hostname>%<instance name> file in
the <Data_Protector_home>\Config\Server\Integ\Config\MSSQL
directory.
Once you start checking the configuration procedure, the Data Protector
service reads login information from the <hostname>%<instance name>
file on the Data Protector Cell Manager and tries to connect to the server
using this account.
Miscellaneous Problems
52 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
Cause The SQL Server service and the Data Protector Inet service are
running under different accounts. The SQL Server 7.0/2000 integration
cannot access the SQL Server's data for backup due to security problems.
Solution Restart the Data Protector Inet service under the same account as
the SQL Server service is running.
Backup Problems
1. If a backup does not work:
Chapter 1 53
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
Problem Backup of a Microsoft SQL Server can hang if Disk Agent concurrency is
set to more than one and one of the devices fails during backup or is not
started at all, for example because of a medium error.
Action Set the device concurrency to one or replace the invalid media.
Restore Problems
• If a restore does not work:
54 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
• Increase the number of Disk Agent buffers for the device used for the
restore.
• If all objects of the backup are recorded in the IDB, perform the
following steps:
Chapter 1 55
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
Action The database can be recovered to the latest point in time by using the
Microsoft SQL Query Analyzer. To recover the database, run the
following T-SQL command:
RESTORE DATABASE <database_name> WITH RECOVERY
After the database is recovered, additional transaction logs cannot be
applied.
Problem You want to perform a restore of the Microsoft SQL Server 7.0/2000
database to another client in the Data Protector cell not configured to use
with the Microsoft SQL Server 7.0/2000, but the restore does not work.
Action Create the configuration file by configuring the Microsoft SQL 7.0/2000
integration on this client. See “Configuring the Integration” on page 14.
Problem If you set the time for the Stop at restore option beyond the end of the
RESTORE LOG operation, the database remains in the unrecovered state
as if the RESTORE LOG operation was run with the Leave the database
non-operational option.
Action The database can be recovered to the latest point in time by using the
Microsoft SQL Query Analyzer. To recover the database, run the
following T-SQL command:
RESTORE DATABASE <database_name> WITH RECOVERY
After the database is recovered, additional transaction logs cannot be
applied.
56 Chapter 1
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
• <Data_Protector_home>\log\debug.log
• <MSSQL7.0/2000>\log\errorlog
• <MSSQL7.0/2000>\log\vdi.log
Copy the session output into a file.
Chapter 1 57
Integrating Microsoft SQL Server 7.0/2000 and Data Protector
Troubleshooting
58 Chapter 1
2 Integrating Microsoft Exchange
Server 5.x and Data Protector
Chapter 2 59
Integrating Microsoft Exchange Server 5.x and Data Protector
In This Chapter
In This Chapter
This chapter explains how to configure and use the Data Protector
Microsoft Exchange 5.x integration.
The chapter is organized into the following sections:
“Overview” on page 61
“Prerequisites and Limitations” on page 63
“Integration Concept” on page 64
“Configuring the Integration” on page 68
“Backing Up Microsoft Exchange Server 5.x” on page 78
“Restoring a Microsoft Exchange 5.x Object” on page 81
“Performance Tuning” on page 90
“Monitoring a Microsoft Exchange 5.x Backup and Restore” on
page 91
“Troubleshooting” on page 94
60 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Overview
Overview
Data Protector offers online backup of your Microsoft Exchange Server
5.x. The online backup concept is widely accepted. It addresses the
business requirements for high application availability better than the
offline backup concept.
An offline filesystem backup can also be performed. This can be
implemented by configuring pre-exec commands to shut down the
database before the backup, and post-exec commands to start up the
database after the backup.
Using the Data Protector Microsoft Exchange Server integration, you
can perform online backups and restores of single mailboxes located on a
MS Exchange Server system. For more information on configuring,
backing up, and restoring single mailboxes, see Chapter 4, “Integrating
Microsoft Exchange Single Mailbox and Data Protector,” on page 135.
Advantages Using Data Protector together with the Microsoft Exchange Server 5.x
offers several advantages over using the Microsoft Exchange Server 5.x
alone:
Chapter 2 61
Integrating Microsoft Exchange Server 5.x and Data Protector
Overview
• Device Support
Data Protector supports a wide range of devices: files, standalone
drives, very large multiple drive libraries, etc.
• Reporting
Data Protector has reporting capabilities that allow you to receive
information about your backup environment. You can schedule
reports to be issued at a specific time or attached to a predefined set
of events, such as the end of a backup session or a mount request.
• Monitoring
Data Protector has a feature that allows the administrator to monitor
currently running sessions and view finished sessions from any
system that has the Data Protector Manager installed.
All backup sessions are logged in the IDB, which provides the
administrator with the history of activities that can be queried at a
later time.
Refer to the HP OpenView Storage Data Protector Software Release Notes
for more information about the platforms and devices that are supported
by the Data Protector Microsoft Exchange 5.x integration.
62 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Prerequisites and Limitations
Limitations • On a single node, only one Data Protector Microsoft Exchange 5.x
Agent may run at a certain point of time. You cannot run two or more
backup sessions, two or more restore sessions, or a backup and a
restore session simultaneously. In the Data Protector cell, however,
you can run multiple Exchange 5.x backups (backup of different
Microsoft Exchange Servers 5.x) simultaneously.
• Do not use double quotes (" ") in object-specific pre-exec and post-exec
commands.
It is assumed that you are familiar with the Microsoft Exchange 5.x
database administration and the basic Data Protector functionality.
Chapter 2 63
Integrating Microsoft Exchange Server 5.x and Data Protector
Integration Concept
Integration Concept
Data Protector integration with the Microsoft Exchange 5.x allows you to
perform online backups of the Microsoft Exchange Server 5.x.
The integration also provides you with such features as library support,
parallel backups, and media management for the backup and restore.
Data Protector backs up online the Microsoft Exchange Server 5.x
Directory Store (DS) and the Information Store (MDB), which are also
referred to as the Microsoft Exchange 5.x backup objects.
The central component of the integration is the Data Protector
exbar.exe executable, which is installed on the Microsoft Exchange
Server 5.x computer and which controls the activities between the
Microsoft Exchange Server 5.x and Data Protector backup and restore
processes.
From the perspective of the Microsoft Exchange Server 5.x, Data
Protector is seen as a media management software. On the other hand,
the Microsoft Exchange Server 5.x is a Data Protector client from Data
Protector Cell Manager’s point of view.
Backup Flow A Data Protector backup session can be started only from the Data
Protector side.
The Data Protector Backup Session Manager reads the backup
specification and starts the exbar.exe on the Microsoft Exchange Server
5.x system.
The exbar.exe reads data from the Microsoft Exchange Server 5.x and
passes it to the Data Protector General Media Agents.
Data Protector can back up a single database using multiple streams.
This is known as the concurrent streaming.
Microsoft Exchange 5.x objects are backed up sequentially one after
another. Each object can be backed up to more than one stream. So you
can back up to 4 devices, for example.
64 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Integration Concept
The concurrency value per backup session equals the number of the
streams started by the exbar.exe, that is the sum of all concurrencies
per individual device defined in the backup specification. The
configuration of streams is designed to optimize the performance of a
backup.
Two backup types supported by Data Protector Microsoft Exchange 5.x
integration are full and incremental. There is only one level of
incremental which refers to the previous full or incremental, whichever
was performed last.
The full backup includes all backup objects specified in the backup
specification regardless of whether they have changed since the last
backup. The incremental backup performs a backup of the objects that
have changed since the last backup.
Backup session messages are sent to the Backup Session Manager,
which then writes the messages and information regarding the
respective session to the IDB.
Restore Flow Using the Data Protector User Interface, you define which objects and
object versions to restore. The Data Protector Restore Session Manager
is invoked, which then starts the exbar.exe and passes the information
about the objects and the backup versions to the backup API. The
General Media Agents are started by the exbar.exe and the data flows
from the media to the target Microsoft Exchange Server 5.x (see Figure
2-1). For optimal performance, use the same number of devices as for a
backup.
Messages from the restore session are sent to the Data Protector Restore
Session Manager, which writes the messages and information regarding
the respective session to the IDB.
Chapter 2 65
Integrating Microsoft Exchange Server 5.x and Data Protector
Integration Concept
MA
Device
Media Agent Clients
Directory Store exbar.exe
Microsoft Exchange
Server MA
+ Device
Backup API
Cell Manager
Data Protector
Backup
Specification
Information Store
Microsoft Exchange Server SM IDB
• Directory database
• Directory service agent
66 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Integration Concept
Backup API The Microsoft defined interface that enables data transfer
between Data Protector and Microsoft Exchange Server 5.x.
Chapter 2 67
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Cluster-Aware If the application is cluster-aware, switch off the circular logging on all
Clients cluster nodes.
Switching Off the 1. From the Windows desktop on the Microsoft Exchange 5.x computer,
Circular Logging start the Exchange Administrator.
2. Log on to the Microsoft Exchange Server 5.x, open the site, move to
Configuration, Servers, <Server_Name>.
68 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Chapter 2 69
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Before You Begin It is recommended that you configure and run a test filesystem backup
using Data Protector.
This includes installing a Disk Agent on the Microsoft Exchange Server
5.x. Any device can be used for this test. Configure a standard filesystem
backup which may include one directory only.
By doing this, you will check whether the Microsoft Exchange Server 5.x
client system and the Data Protector Cell Manager can communicate
properly.
In case of problems, this type of backup is much easier to troubleshoot
than the Data Protector Microsoft Exchange Server 5.x integration.
Refer to the HP OpenView Storage Data Protector Administrator’s Guide
for instructions. In case of any difficulties with the filesystem backup, do
not proceed with configuring the integration until you solve them.
To configure a Microsoft Exchange Server 5.x backup, perform the
following steps:
1. Configure the devices you plan to use for a backup. Refer to the online
Help index keyword “configuring devices” for instructions.
2. Configure media pools and media for a backup. Refer to the online
Help index keyword “creating media pools” for instructions.
3. Create a Data Protector Microsoft Exchange Server 5.x backup
specification.
70 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Click OK.
4. In the Client drop-down list, select the Microsoft Exchange Server
5.x system. If the application is cluster-aware, select the virtual
server of the Microsoft Exchange Server 5.x resource group.
In the Application database drop-down list, leave the instance
name for Microsoft Exchange Server 5.x that is MSExchange.
Click Next.
5. Select the Microsoft Exchange Server 5.x objects you want to back up.
You can select the Information Store (MDB) and the Directory
Store (DS) object.
The public information store (PUB.EDB), and the private information
store(PRIV.EDB)are backed up if the Information Store (MDB) has
been selected for a backup.
Chapter 2 71
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Click Next.
6. Select the device(s) you want to use for the backup. Click Properties
to set the device concurrency, media pool, and preallocation policy.
For more information on these options, click Help.
You can also specify whether you want to create additional copies
(mirrors) of the backup during the backup session. Specify the desired
number of mirrors by clicking the Add mirror and Remove mirror
buttons. Select separate devices for the backup and for each mirror.
For detailed information on the object mirror functionality, see HP
OpenView Storage Data Protector Administrator’s Guide.
Click Next.
72 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Chapter 2 73
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
10. Once saved, the backup specification can be tested by clicking Start
Preview, or started by clicking Start Backup.
See “Testing the Microsoft Exchange 5.x Backup Configuration” on
page 76 for information on testing a backup configuration.
See “Backing Up Microsoft Exchange Server 5.x” on page 78 for
information on starting a backup.
74 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Chapter 2 75
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
NOTE Note that the Pre-exec and the Post-exec commands have to reside in
the <Data_Protector_home>\bin directory on the Microsoft Exchange
Server 5.x computer.
The application specific options are applied to all backup objects that
have been selected in the backup specification.
What Happens? The given procedure actually tests the backup by performing the
following actions:
76 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Configuring the Integration
Chapter 2 77
Integrating Microsoft Exchange Server 5.x and Data Protector
Backing Up Microsoft Exchange Server 5.x
Backup Methods • Schedule the backup of an existing Microsoft Exchange 5.x backup
specification using the Data Protector Scheduler.
• Start an interactive backup of an existing Microsoft Exchange 5.x
backup specification using the Data Protector GUI or the Data
Protector command-line interface.
For information on starting an interactive backup using the Data
Protector command-line interface, refer to the omnib man page.
Scheduling a Backup
Scheduling a backup specification means setting time, date and type of a
backup that will be started unattended once the scheduling options are
defined and saved in the backup specification.
For more information on scheduling, refer to the online Help index
keyword “scheduled backups”.
To schedule a Microsoft Exchange 5.x backup, proceed as follows:
78 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Backing Up Microsoft Exchange Server 5.x
Chapter 2 79
Integrating Microsoft Exchange Server 5.x and Data Protector
Backing Up Microsoft Exchange Server 5.x
In the Start Backup dialog box, select the Backup type and Network
load. For information on these options, click Help.
Click OK.
80 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
You can restore a Microsoft Exchange 5.x object using the Data Protector
GUI. The following is a description of the Microsoft Exchange 5.x restore
flow:
Restore Flow • The Data Protector Restore Session Manager starts the exbar.exe
command on the Microsoft Exchange Server 5.x and General Media
Agents on the systems where the backup devices are configured.
• The Data Protector exbar.exe command stops all Microsoft
Exchange 5.x services except the Exchange System Attendant if the
Stop services before restore option is selected in the Data
Protector Manager.
Otherwise, you have to stop the services manually:
Use the Windows desktop to open the Services window. Select all
the Microsoft Exchange 5.x services with the exception of the
Exchange System Attendant, and then click the Stop button. See
Figure 2-9 on page 82.
• General Media Agents read data from the backup devices, and after
send it to exbar.exe which writes the data to disks.
• If the Start services after restore option was selected,
exbar.exe restarts all Microsoft Exchange 5.x services that were
stopped at the beginning of the restore session.
• During the services start-up, the Microsoft Exchange Server 5.x
performs its internal restore procedure, which can be monitored using
the Windows EventLog Viewer.
NOTE Microsoft Exchange 5.x objects are restored offline. Steps two and four
are performed by the Data Protector integration, provided that the above
mentioned options are selected.
Chapter 2 81
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
Once you have taken the Microsoft Exchange Server 5.x offline
(manually or by selecting the corresponding option), proceed as follows to
restore the Microsoft Exchange 5.x backup objects using the Data
Protector GUI:
82 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
Chapter 2 83
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
84 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
IMPORTANT If the devices used for the restore are not those used for the backup,
select the same number of devices in the Devices property page as you
used when you backed up the object.
Prerequisites • You have an online backup with databases and log files from number
M to N (for example, edb000110.log to edb000120.log)
• You have log files at the time of the crash from number N+1 to K and
the edb.log file (for example, edb000121.log to edb000135.log).
Procedure 1. Restore from an online backup without deleting existing logs so that
you get databases from the time of the backup, logs from number M to
N, and existing logs. You should have the following files in the
directory:
Restore Options
The following restore options are specific to the Data Protector Microsoft
Exchange 5.x integration (See also Figure “Restore Options” on page 88):
Restore to another client (supported for the Information Store
only)
By default, the target Data Protector Microsoft
Exchange 5.x client is the Microsoft Exchange Server
5.x from which the application data was backed up.
Chapter 2 85
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
NOTE It is recommended that this option is used with the Delete existing
log files option (see below for a description).
Follow the steps below to restore the Information Store to another client:
86 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
Chapter 2 87
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
Disaster Recovery
Disaster recovery is a very complex process where the following products
from several vendors participate:
• interface cards
• operating system
• backup/restore application
88 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Restoring a Microsoft Exchange 5.x Object
a. Install the Microsoft Exchange Server 5.x and create the same
structure for the new Microsoft Exchange Server 5.x and name it
the same as the original.
b. Install the Microsoft Exchange Service Pack.
3. Restore the Directory from the last backup of this Microsoft Exchange
Server 5.x.
4. Restore the Information Store from the last backup.
5. Run the Microsoft Exchange DS/MDB consistency adjustment tool.
Refer to the Microsoft Exchange Server 5.x Books Online for more
information.
Chapter 2 89
Integrating Microsoft Exchange Server 5.x and Data Protector
Performance Tuning
Performance Tuning
Performance tuning means customizing your Microsoft Exchange Server
5.x and Data Protector in the way that they achieve better backup and
restore results. You can improve the backup or restore performance of
your Microsoft Exchange Server 5.x by following these guidelines:
• Increase the Microsoft Exchange Server 5.x buffer size on the high
performance systems. The recommended values range from 512 KB to
2 MB. See “The Microsoft Exchange Server 5.x Specific Backup
Options” on page 74 for information on how to modify the buffer size.
• Calculate the number of devices to use in parallel.
The main consideration is to set the number of devices to match the
bandwidth of the incoming data stream and to identify the bottleneck.
This can be either the network, if the devices are connected to remote
computers, or the server computer itself, if the devices are connected
locally.
As the bandwidths of networks usually vary between ~1 MB/s (10
Mbit Ethernet), ~10 MB/s (100 Mbit Ethernet) and the actual
throughput is usually lower, you will not need more than one fast
device, such as a DLT 7000 for a remote backup.
Otherwise, determine the maximum backup capabilities of the
Microsoft Exchange Server 5.x machine by performing a backup to a
few null file devices on the local server and select the number of
devices that best fit the measured performance.
90 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Monitoring a Microsoft Exchange 5.x Backup and Restore
Clearing Sessions To remove all completed or aborted sessions from the Results Area of the
Monitor context, proceed as follows:
Chapter 2 91
Integrating Microsoft Exchange Server 5.x and Data Protector
Monitoring a Microsoft Exchange 5.x Backup and Restore
NOTE All completed or aborted sessions are automatically removed from the
Results Area of the Monitor context if you restart the Data Protector
GUI.
92 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Monitoring a Microsoft Exchange 5.x Backup and Restore
Chapter 2 93
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
Troubleshooting
This section is divided into the following subsections:
• General troubleshooting
• Backup problems
• Restore problems
General Troubleshooting
• Ensure that the latest official Data Protector patches are installed.
Refer to the “Verifying Which Data Protector Patches Are Installed”
section in the HP OpenView Storage Data Protector Installation and
Licensing Guide.
Refer to the HP OpenView Storage Data Protector Software Release
Notes or
http://www.openview.hp.com/products/datapro/spec_0001.html for an
up-to-date list of supported versions, platforms, and other
information.
• Refer to the HP OpenView Storage Data Protector Software Release
Notes for a description of general Data Protector limitations,
problems and workarounds, as well as the list of related Data
Protector patches.
Backup Problems
1. Backup does not work:
94 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
Chapter 2 95
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
Command Line A backup session can be tested using the Data Protector CLI, where the
backup options have to be specified as the exbar.exe command-line
options.
The command has to be started from the
<Data_Protector_home>\bin directory on a Data Protector Microsoft
Exchange 5.x client system:
exbar [-appsrv:<Microsoft_Exchange_Server>]-perform:backup
-base:<Microsoft_Exchange_backup_object>
[-type:<backup_type>]-bar:<backup_specification_name> -n
<concurrency> [-buffer:
<buffer_size>][-pre:<Pre_exec_command>][-post:<Post_exec_comm
and>]
The <Microsoft_Exchange_backup_object> can be MDB or DS and
the <backup type> can be full or incremental. The [-start][-stop]
options are related to the Microsoft Exchange 5.x services that have to be
stopped before or started after a restore session.
96 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
NOTE The -bar option is mandatory since exbar.exe reads the device options
from the backup specification as opposed to other options in the
respective backup specification, which are ignored. The command-line
options are used instead.
Restore Problems
1. Restore does not work:
Chapter 2 97
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
a. Check the messages in the Event Viewer to see if any log file has
failed. Delete the first failed log file and all subsequent log files.
b. Delete the tmp.edb file in Directory Database directory and/or
temp.edb file in the Information Store directory.
c. Delete *.chk files and all old *.log files in the Directory
Transaction Logs directory or the Information Store Transaction
Logs directory. Refer to the Microsoft Exchange Administrator for
the locations of the files.
d. Delete all data in the directories and perform the restore once
again.
4. Data Protector Manager displays misleading error messages.
In case of the system or the Microsoft Exchange Server 5.x errors,
exbar.exe displays messages generated by the Microsoft Exchange
Server 5.x or the Windows operating system. Some of these messages
are erroneous.
98 Chapter 2
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
Command Line A restore session can be tested using the Data Protector exbar
command. The command has to be started from the
<Data_Protector_home>\bin directory on a Data Protector
Microsoft Exchange Server 5.x system:
exbar [-appsrv:<Microsoft_Exchange_Server>]-perform:restore
-base:<Microsoft_Exchange_backup_object>
[-versionmdb:<version_string>][-versionds:<version_string>]
[-start][-stop][-restorefrom:<Original_Microsoft_Exchange_Serve
r>]
The <Microsoft_Exchange_backup_object> can be MDB or DS and
the <version string> has to be specified as it is recorded in the IDB,
otherwise the last version will be restored. The [-start] [-stop]
options are related to the Microsoft Exchange 5.x services that have
to be stopped before or started after a restore session.
Before You Call If you have performed the troubleshooting procedures without solving
Support your problem, you should gather the following information for the
Data Protector support before you make a call.
Chapter 2 99
Integrating Microsoft Exchange Server 5.x and Data Protector
Troubleshooting
100 Chapter 2
3 Integrating Microsoft Exchange
Server 2000/2003 and Data
Protector
Chapter 3 101
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
In This Chapter
In This Chapter
This chapter explains how to configure and use the Data Protector
Microsoft Exchange integration.
The chapter is organized into the following sections:
102 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Overview
Overview
The Data Protector integration with Microsoft Exchange enables you to
perform online backup of Microsoft Exchange Server.
Chapter 3 103
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Overview
104 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Overview
Chapter 3 105
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Prerequisites and Limitations
106 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Integration Concept
Integration Concept
The central component of the Data Protector Microsoft Exchange
integration is the Data Protector ese_bar.exe executable, which is
installed on the Microsoft Exchange Server system and which controls
the activities between Microsoft Exchange Server and Data Protector
backup and restore processes.
From the perspective of Microsoft Exchange Server, Data Protector is
seen as media management software. On the other hand, Microsoft
Exchange Server is a Data Protector client from the Data Protector Cell
Manager’s point of view.
Backup Flow A Data Protector backup session can be started only from the Data
Protector GUI.
The Data Protector Backup Session Manager reads the backup
specification and starts the ese_bar.exe command on the Microsoft
Exchange Server system.
The ese_bar.exe command reads the data from Microsoft Exchange
Server and passes it to the Data Protector General Media Agents.
Multiple storage groups are backed up in parallel. Multiple databases
within a storage group are backed up sequentially. The maximum
number of devices used in a backup session equals the number of storage
groups you want to back up.
The two types of backup supported by the Data Protector Microsoft
Exchange integration are Full and Incremental.
A full backup selects for a backup the whole database and all log files of a
storage group regardless of whether they have been changed since the
last backup. Incremental backup selects only log files. After a full or
incremental backup, the log files are deleted.
There is only one level of incremental backup, which refers to the
previous full or incremental backup, whichever was performed last.
Restore Flow Using the Data Protector User Interface, you define which objects and
object versions to restore. The Data Protector Restore Session Manager
is invoked, which then starts ese_bar.exe and passes the information
Chapter 3 107
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Integration Concept
about the objects and backup versions on to the backup API. General
Media Agents are started by ese_bar.exe, and the data flows from the
media to the target Microsoft Exchange Server. See Figure 3-1.
Messages from the restore session are sent to the Data Protector Restore
Session Manager, which writes the messages and the information
regarding the respective session to the IDB.
Backup API The Microsoft defined interface that enables the data
transfer between Data Protector and Microsoft
Exchange Server.
108 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Integration Concept
Chapter 3 109
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
Cluster-Aware If the application is cluster-aware, switch off the circular logging on all
Clients cluster nodes.
Extending the Path The <Exchange_home>\bin directory must be added to the Windows
Environment Path environment variable before any operation is performed.
Variable
To add this directory, proceed as follows:
110 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
1. Configure the devices which you plan to use for a backup. Refer to the
online Help index keyword “configuring devices” for instructions.
2. Configure media pools and media for a backup. Refer to the online
Help index keyword “creating media pools” for instructions.
3. Create a Data Protector Microsoft Exchange Server backup
specification.
See the following section for the procedure on creating a backup
specification.
See the following section for the procedure on how to create a backup
specification.
Chapter 3 111
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
112 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
6. Select the Microsoft Exchange Server databases you want to back up.
Chapter 3 113
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
Click Next.
7. Select the device(s) you want to use for the backup. Click Properties
to set the device concurrency, media pool, and preallocation policy. For
more information on these options, click Help.
You can also specify whether you want to create additional copies
(mirrors) of the backup during the backup session. Specify the desired
number of mirrors by clicking the Add mirror and Remove mirror
buttons. Select separate devices for the backup and for each mirror.
For detailed information on the object mirror functionality, see HP
OpenView Storage Data Protector Administrator’s Guide.
114 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
Chapter 3 115
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
116 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Configuring the Integration
NOTE Note that the pre-exec and post-exec commands/scripts must reside in
the <Data_Protector_home>\bin directory on the Microsoft Exchange
Server system.
Chapter 3 117
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Backing Up Microsoft Exchange Server
Scheduling a Backup
Scheduling a backup specification means setting time, date, and type of a
backup that starts unattended once the scheduling options are defined
and saved in the backup specification.
For more information on scheduling, refer to the online Help index
keyword “scheduled backups”.
To schedule a Microsoft Exchange backup, proceed as follows:
118 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Backing Up Microsoft Exchange Server
Chapter 3 119
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Backing Up Microsoft Exchange Server
120 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
To unmount the database (store), perform the following steps using the
Exchange Administration GUI:
Chapter 3 121
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
NOTE Log files for storage groups are saved in the subdirectory of the specified
log directory. See “Restore Options” on page 125 for details.
Restore Procedure Use the following procedure to restore a Microsoft Exchange Server
database:
122 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
IMPORTANT If you are restoring several databases from the same storage group,
make sure that their backup versions are the same. Otherwise, you need
to restore them in separate restore sessions.
Chapter 3 123
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
4. In the Options property page, select the restore options. See “Restore
Options” on page 125 for details about these options.
5. Click Devices and then Media to select the devices, verify device
information, and set priorities of media to be used for the restore.
Note that you can use a different device for the restore than the one
used for the backup. Refer to the “Restoring Under Another Device”
section in the HP OpenView Storage Data Protector Administrator’s
Guide for more information on how to perform a restore using
another device.
IMPORTANT If the devices used for the restore are not those used for the backup,
select the same number of devices in the Devices property page as you
used when you backed up the object.
124 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
If the Mount databases after recovery option was not specified for
the restore, mount the dismounted Information Stores using the
Exchange System Manager after the restore has finished.
Restore Options
The following restore options are specific to the Data Protector Microsoft
Exchange integration:
Restore to another client
By default, the target Data Protector Microsoft
Exchange client is the Microsoft Exchange Server from
which the application data was backed up.
Nevertheless, the databases can be restored to a
Microsoft Exchange Server other than the one the
backup was made from. The new target Microsoft
Exchange Server must be a part of the Data Protector
cell and have the MS Exchange Integration software
component installed.
Follow the steps below to restore a database to another client:
Chapter 3 125
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
126 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
IMPORTANT When you restore from a full database (store) backup, make sure you
selected the database files and the transaction log files from the same
version.
Chapter 3 127
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
and you want to restore the version marked T, restore all the versions in
<italic>: the first full and transaction log backup, the second
transaction log backup, and the last transaction log backup. The last
transaction log backup has to be restored with the Last restore set (start
recovery) option selected.
Options where:
-msese specifies a Microsoft Exchange Server database for restore
-barhost <ClientName> specifies the system where the Data Protector
Microsoft Exchange client that was backed up is installed
-destination <ClientName> specifies the target client for restore
-appname <full_application_name> Specifies a Microsoft Exchange
Information Store, Site Replication Service or Key Management Service
for the restore. The name of the Store/Service
(<full_application_name>) must be provided in double quotes as
follows:
128 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Restoring a Microsoft Exchange Server Database
Chapter 3 129
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Troubleshooting
Troubleshooting
This section is divided into the following subsections:
• General troubleshooting
• Backup problems
• Restore problems
General Troubleshooting
• Ensure that the latest official Data Protector patches are installed.
Refer to the “Verifying Which Data Protector Patches Are Installed”
section in the HP OpenView Storage Data Protector Installation and
Licensing Guide.
Refer to the HP OpenView Storage Data Protector Software Release
Notes or
http://www.openview.hp.com/products/datapro/spec_0001.html for an
up-to-date list of supported versions, platforms, and other
information.
• Refer to the HP OpenView Storage Data Protector Software Release
Notes for a description of general Data Protector limitations,
problems and workarounds, as well as for a list of related Data
Protector patches.
• Try to run a backup and restore without using Data Protector. Use
Windows Backup to back up and restore the Microsoft Exchange
Server Information Store.
• Check if the following directories exist on the Data Protector Cell
Manager:
<Data_Protector_home>\config\server\barlists\msese
<Data_Protector_home>\config\server\barschedules\msese
• If you perform an incremental backup, ensure that the Enable
circular logging option on the Microsoft Exchange Server is
disabled. You can check this option by starting the Exchange System
manager and selecting Properties from the storage group you are
backing up.
130 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Troubleshooting
Backup Problems
Backup Fails
Chapter 3 131
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Troubleshooting
Restore Problems
• Check if the following Microsoft Exchange Server services are
running:
132 Chapter 3
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Troubleshooting
Message [Critical]
Target Instance, specified for restore, is not found or log
files do not match the backup set logs.
Description This problem occurs when there is a gap in the sequence of the
restored and the current log files
Action At the command prompt, run the eseutil tool from the directory
with temporary log files of the corresponding storage group:
Chapter 3 133
Integrating Microsoft Exchange Server 2000/2003 and Data Protector
Troubleshooting
134 Chapter 3
4 Integrating Microsoft Exchange
Single Mailbox and Data
Protector
Chapter 4 135
Integrating Microsoft Exchange Single Mailbox and Data Protector
In This Chapter
In This Chapter
This chapter explains how to configure and use the Data Protector MS
Exchange Single Mailbox integration.
The chapter is organized into the following sections:
136 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Overview
Overview
The Data Protector MS Exchange Single Mailbox integration enables
performing online backups and restores of single mailboxes located on
the MS Exchange Server system. The entire mailbox content including
e-mail messages, task assignments, calendar schedules, contacts, etc., is
backed up and restored by Data Protector.
You can perform full, incremental1, and incremental backups of single
mailboxes using the Data Protector MS Exchange Single Mailbox
integration.
You can restore your data into the original mailbox, into a new mailbox
on the same MS Exchange Server system, or into the mailbox located on
an other MS Exchange Server.
Advantages The following are the advantages of integrating Data Protector with MS
Exchange Single Mailbox:
Chapter 4 137
Integrating Microsoft Exchange Single Mailbox and Data Protector
Overview
• Device Support
Data Protector supports a wide range of devices: files, standalone
drives, very large multiple drive libraries, etc.
• Reporting
Data Protector has reporting capabilities that allow you to receive
information about your backup environment. You can schedule
reports to be issued at a specific time or attached to a predefined set
of events, such as the end of a backup session or a mount request.
• Monitoring
Data Protector has a feature that allows you to monitor currently
running sessions and view finished sessions from any system that has
the Data Protector User Interface installed.
All backup sessions are logged in the Data Protector internal
database (IDB), which provides the administrator with a history of
activities that can be queried later.
138 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Prerequisites and Limitations
Limitations • A single mailbox backup is slower and requires more media space
than a regular MS Exchange Server backup. The reason is that only
one copy of a message addressed to more than one recipient is saved
on the MS Exchange Server system and linked to all recipients. The
entire message is backed up for each mailbox when performing single
mailbox backups.
Chapter 4 139
Integrating Microsoft Exchange Single Mailbox and Data Protector
Prerequisites and Limitations
140 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Integration Concept
Integration Concept
The following MS Exchange concepts are important from the single
mailbox backup and restore perspective:
Backup Flow A backup session is started by the Data Protector Backup Session
Manager (BSM). The BSM reads a backup specification and starts the
mbx_bar.exe agent installed on the MS Exchange Server system. The
mbx_bar.exe agent logs in through the MAPI profile to the Exchange
administrator’s mailbox, which has privileges to access users’ mailboxes.
Chapter 4 141
Integrating Microsoft Exchange Single Mailbox and Data Protector
Integration Concept
Backup Types The Data Protector MS Exchange Single Mailbox integration supports
three backup types: Full, Incremental1, and Incremental. A full
backup is a backup of the entire mailbox content. An incremental1
backup backs up all the changes made to the mailbox after the last full
backup. An incremental backup backs up all the changes after the last
backup of any type.
Each mailbox is represented as one Data Protector backup object and is
backed up in one stream. Multiple mailboxes can be backed up in
parallel streams to one device. See “Performance Tuning” on page 167.
Restore Flow A restore session is started by the Data Protector Restore Session
Manager (RSM). The RSM starts the mbx_bar.exe agent on the target
MS Exchange Server and invokes Data Protector General Media Agents,
which read the data from backup devices and send it to the MS Exchange
Server. The MS Exchange Server processes write the data to disks.
The mbx_bar.exe agent logs in to each mailbox that was selected for
restore, and creates there a new Data Protector <backup date>
<backup time> folder to which the selected data is restored.
Messages from the restore session are sent to the RSM, which writes
them and the information regarding the respective restore session to the
IDB.
The architecture of the Data Protector MS Exchange Single Mailbox
integration is presented in Figure 4-1 on page 143.
142 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Integration Concept
MA The Data Protector General Media Agent, which reads and writes
data from and to media devices.
IDB The Data Protector internal database where all the information
about Data Protector sessions, including session messages, objects,
data, used devices and media is written.
Chapter 4 143
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
Configuration The following list gives an overview of the global tasks for configuring
Overview the MS Exchange Single Mailbox integration:
144 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
Chapter 4 145
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
What Happens? The login information and the encrypted password are written to the
configuration file on the Cell Manager:
• <Data_Protector_home>\Config\server\Integ\Config\Mailbox\
<hostname>%SingleMailbox - Windows Cell Manager
• /etc/opt/omni/server/integ/config/Mailbox/<hostname>%
SingleMailbox - HP-UX Cell Manager
If the integration is configured properly, Data Protector is allowed to
back up and restore single mailboxes.
146 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
Chapter 4 147
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
148 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
NOTE If the integration had not been configured for the selected client, the
configuration window appears. See “Configuring the Single Mailbox
Integration Agent” on page 144 for the information on how to configure
the MS Exchange Single Mailbox integration.
Chapter 4 149
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
5. In the next step of the wizard, select the data you want to back up. All
the mailboxes residing on the selected client are displayed in
alphabetical order. For example, all mailboxes with the first letter S
are collected under the S item in the Data Protector GUI.
You can specify a full server backup by selecting a top-level backup
object, or a single mailbox backup by selecting lower-level objects.
150 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
You can also specify whether you want to create additional copies
(mirrors) of the backup during the backup session. Specify the desired
number of mirrors by clicking the Add mirror and Remove mirror
buttons. Select separate devices for the backup and for each mirror.
For detailed information on the object mirror functionality, refer to
the HP OpenView Storage Data Protector Administrator’s Guide.
Refer to the Data Protector online Help and the HP OpenView
Storage Data Protector Administrator’s Guide for a description of the
backup options common to all backup objects.
See “Backup Options” on page 151 for details about backup options,
specific to the Data Protector MS Exchange Single Mailbox
integration.
7. Name and save your MS Exchange Single Mailbox backup
specification.
After the backup specification is saved, it can be started either from
the Data Protector GUI or the Data Protector CLI, or can be
scheduled to run automatically using the Data Protector Scheduler.
See “Backing Up a Single Mailbox” on page 155 for information on
how to perform a backup using the Data Protector GUI or the Data
Protector CLI and on how to schedule a backup specification.
You can examine the newly created and saved backup specification in
the Backup context. The backup specification itself is stored in the
<Data_Protector_home>\Config\server\barlists\Mailbox\<b
ackup_specification_name> file on Windows Cell Manager
systems and in the /etc/opt/omni/server/barlists/Mailbox/
<backup_specification_name> file on HP-UX Cell Manager.
You can start an interactive backup that includes data transfer by
clicking the Start Backup button.
Backup Options
The MS Exchange Single Mailbox integration specific backup options are
specified using the Data Protector GUI by clicking the Advanced button
next to Application Specific Options.
Chapter 4 151
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
152 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
Testing Procedure The testing procedure consists of checking the MS Exchange and the
Data Protector parts of the integration to ensure the communication
within MS Exchange and Data Protector is established and the data
transfer works properly. Proceed as follows to test the integration:
Chapter 4 153
Integrating Microsoft Exchange Single Mailbox and Data Protector
Configuring the Integration
What Happens? The session messages are displayed on the screen during the command
execution.
The mbx_bar.exe program is started, which then starts the Data
Protector testbar2 command. This command checks the following:
154 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Backing Up a Single Mailbox
Scheduling a Backup
Scheduling a backup specification means setting the time, date, and type
of a backup that will be started unattended once the scheduling options
are defined and saved in the backup specification.
To schedule an MS Exchange Single Mailbox backup specification,
perform the following steps:
Chapter 4 155
Integrating Microsoft Exchange Single Mailbox and Data Protector
Backing Up a Single Mailbox
You can select one of the following backup types: full, incremental1,
or incremental. See “Integration Concept” on page 141 for a detailed
description of backup types.
6. Click OK to return to the Schedule property page.
7. Click Apply to save the changes.
Backup Procedure To start an interactive single mailbox backup using the Data Protector
GUI, perform the following steps:
156 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Backing Up a Single Mailbox
2. In the Scoping Pane, expand the Backup, and then the Backup
Specifications items.
Expand MS Exchange Single Mailboxes. A list of backup
specifications appears.
3. Right-click the backup specification you want to back up, and then
select Start Backup from the pop-up menu.
The Start Backup dialog box appears.
Select the backup type and network load, and click OK. For a
description of these options, press F1.
Chapter 4 157
Integrating Microsoft Exchange Single Mailbox and Data Protector
Backing Up a Single Mailbox
158 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
Prerequisites • If you want to perform a restore into a different mailbox, make sure
that the destination mailbox exists on the target MS Exchange
Server.
• If you want to restore mailbox content to another MS Exchange
Server, configure the MS Exchange Single Mailbox integration on the
target MS Exchange Server.
Chapter 4 159
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
NOTE By default, the latest version of the object is selected. If you want to
restore some other version, select it from the Backup version drop-down
list.
160 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
IMPORTANT The destination mailbox must exist on the target MS Exchange Server.
You can choose between Restore only this backup and Full
restore of mailbox options. The last option is selected by default.
Chapter 4 161
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
See “Restore Options” on page 165 for details about these options.
4. In the Options property page, specify whether you want to restore
the data to another MS Exchange Server system. See “Restore
Options” on page 165 for a description of this option.
162 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
5. In the Devices property page, the names of devices used for backup
are displayed. If you want to restore from a device different from the
one used for backup, select the device you want to change, and click
Change. The list of all configured devices is displayed. From this list,
select the device you want to use for restore, and then click OK.
Refer to the HP OpenView Storage Data Protector Administrator’s
Guide for more information on how to perform a restore using
another device.
6. Click Restore MS Exchange to start the restore session.
After the Restore Data Protector creates a Data Protector <backup date> <backup
time> folder on each mailbox selected for restore, and restores the data
into it. If the same backup version was restored several times, folders
with restored data look as follows: Data Protector <backup date>
<backup time> (1) (this folder contains the backup version, which was
restored first), Data Protector <backup date> <backup time> (2)
Chapter 4 163
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
(this folder contains the backup version, which was restored second), etc.,
depending on the number of restore sessions performed. See Figure 4-13
on page 164.
164 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
Restore Options
The following restore options are specific to the Data Protector MS
Exchange Single Mailbox integration:
Restore into mailbox By default, the data is restored into the original
mailbox. Nevertheless, you may restore your data into
a different mailbox. In this case, enter the name of this
mailbox in the Restore into mailbox text box. The
destination mailbox must exist on the target MS
Exchange Server. Note that you can specify the same
destination mailbox for more than one mailbox you
want to restore.
Full restore of mailbox This option is selected by default. The latest
full, the latest incremental1 (if exists), and all
incremental backups from the last incremental1 up to
the selected version are restored within one restore
session.
Restore only this backup If you specify this option, only a selected
backup session, regardless of the backup type, will be
restored.
Restore to another host By default, the target Data Protector MS
Exchange client is the MS Exchange Server from which
the data was backed up. Nevertheless, mailboxes can
be restored to an MS Exchange Server other than the
one the backup was made from. The new target MS
Exchange Server must be a part of the Data Protector
cell and have the MS Exchange 5.x Integration or
the MS Exchange 2000/2003 Integration software
component installed and configured.
Chapter 4 165
Integrating Microsoft Exchange Single Mailbox and Data Protector
Restoring a Single Mailbox
-mailbox <MailboxName>
-session <SessionID>
[<MAILBOX_OPTIONS>]...
You can select among the following <MAILBOX_OPTIONS>:
-destMailbox <destMailboxName>
-chain
The -barhost <HostName> parameter is the name of the MS Exchange
Server system from which you are restoring, while the -destination
<HostName> parameter is the name of the target MS Exchange Server.
<MailboxName> is the name of the mailbox you want to restore, and
<SessionID> is the ID of the backup session. In case of object copies, do
not use the copy session ID, but the object's backup ID, which equals the
object's backup session ID.
The <destMailboxName> parameter is the name of a destination mailbox
into which the data will be restored (in case of a restore into the mailbox
other than the original). By specifying the chain parameter, you select
full restore of a mailbox meaning that the latest full, the latest
incremental1 (if exists), and all incremental backups from the last
incremental1 up to the selected version are restored within one restore
session; otherwise, only a selected backup session, regardless of the
backup type, will be restored.
166 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Performance Tuning
Performance Tuning
Performance tuning means customizing MS Exchange Server and Data
Protector to achieve better backup and restore results.
When backing up single mailboxes, one backup object is created for each
mailbox selected for backup. The Single Mailbox integration agent
mbx_bar.exe spends a significant amount of time on creating/finishing
Data Protector backup objects and logging mailboxes on/off before it
starts the actual data transfer to tape. This influences backup
performance, especially if the mailbox store contains a lot of mailboxes.
In this case, data transfer stops when mbx_bar.exe finishes a backup of
one mailbox and starts a backup of the next one. This has an impact on
the backup device, which stops a tape when the mbx_bar.exe agent
finishes with one mailbox and starts running a tape when the agent
restarts data transfer.
Figure 4-14 on page 167 shows how a single-streamed backup of
mailboxes affects backup performance.
Chapter 4 167
Integrating Microsoft Exchange Single Mailbox and Data Protector
Performance Tuning
NOTE The backup of one mailbox using multiple streams is not supported.
168 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Monitoring a Single Mailbox Backup and Restore
Clearing Sessions To remove all completed or aborted sessions from the Results Area of the
Monitor context, proceed as follows:
Chapter 4 169
Integrating Microsoft Exchange Single Mailbox and Data Protector
Monitoring a Single Mailbox Backup and Restore
NOTE All completed or aborted sessions are automatically removed from the
Results Area of the Monitor context if you restart the Data Protector
GUI.
170 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Monitoring a Single Mailbox Backup and Restore
Chapter 4 171
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
Troubleshooting
The following section provides some testing procedures you should
perform before calling the Data Protector support. Following these
guidelines, you may either resolve the problem yourself or identify the
area where the problems occur.
Should you fail when performing a troubleshooting procedure, actions
are proposed to help you work around the problem.
The section is divided into the following subsections:
• General troubleshooting
• Configuration problems
• Backup problems
• Restore problems
General Troubleshooting
1. Ensure that the latest official Data Protector patches are installed.
Refer to the “Verifying Which Data Protector Patches Are Installed”
in the HP OpenView Storage Data Protector Installation and
Licensing Guide.
Refer to the HP OpenView Storage Data Protector Software Release
Notes or
http://www.openview.hp.com/products/datapro/spec_0001.html for an
up-to-date list of supported versions, platforms, and other
information.
2. Refer to the HP OpenView Storage Data Protector Software Release
Notes for a description of general Data Protector limitations,
problems, and workarounds.
3. Check if the following directories exist on the Data Protector Cell
Manager:
<Data_Protector_home>\config\server\barlists\Mailbox
<Data_Protector_home>\config\server\barschedules\Mailbox
172 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
Configuration Problems
or:
[MBX_ImpersonateUser] A required privilege is not held by the
client.
a. Log off the currently logged on user, and then log this user on
again.
Chapter 4 173
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
Domain-Level If the domain-level policy settings are not defined, perform the following
Policy Settings steps on the MS Exchange 2000/2003 Server system:
Are Not Defined
1. Start the Local Security Policy console application:
Start->Settings->Control Panel->Administrative
Tools->Local Security Policy->Local Policies->User Rights
Assignment.
2. Set the Act as part of the operating system and Log on as a
service user rights for the MS Exchange administrator account.
3. Log off the currently logged on user, and then log this user on again.
174 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
Backup Problems
Actions To solve this kind of problem, try one of the actions described below:
Chapter 4 175
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
HKEY_LOCAL_MACHINE\SOFTWARE\Hewlett-Packard\OpenVie
w\OmniBack II\Site
Its name and value must be CellServer and “<Cell Manager
hostname>”, respectively.
2. Check if the integration was properly configured. The
procedure how to check configuration is described on page 147.
3. Create an MS Exchange Single Mailbox backup specification to
back up to a null or file device, and run the backup. If the
backup succeeds, the problem may be related to backup
devices. Refer to the HP OpenView Storage Data Protector
Administrator’s Guide for instructions on troubleshooting
devices.
— If the preview succeeds, proceed as follows:
Restore Problems
Actions To solve this kind of problem, try one of the actions described below:
• Make sure that the Cell Manager is correctly set on the MS Exchange
Server client by checking the following registry entry:
HKEY_LOCAL_MACHINE\SOFTWARE\Hewlett-Packard\OpenView\Omni
Back II\Site
Its name and value should be CellServer and “<Cell Manager
hostname>”, respectively.
• Examine the errors reported in the
<Data_Protector_home>\log\debug.log file on the MS Exchange
Server.
• Examine the errors logged in the Windows Event log.
176 Chapter 4
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
Action Check if the MS Exchange Server is installed and the Data Protector MS
Exchange Single Mailbox integration is installed and configured on the
system to which you will perform a restore.
Action Make sure that the destination mailbox exists on the target MS
Exchange Server.
Chapter 4 177
Integrating Microsoft Exchange Single Mailbox and Data Protector
Troubleshooting
178 Chapter 4
5 Integrating Microsoft Volume
Shadow Copy Service with Data
Protector
Chapter 5 179
Integrating Microsoft Volume Shadow Copy Service with Data Protector
In This Chapter
In This Chapter
This chapter explains how to configure and use the Data Protector
Microsoft Volume Shadow Copy integration.
The chapter is organized into the following chapters:
180 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Overview
Overview
A traditional backup process is based on the direct communication
between the backup application and the application to be backed up. This
backup method requires from the backup application an individual
interface for each application it backs up.
The number of applications on the market is constantly increasing. The
necessity of handling application specific features can cause difficulties
in backup, restore, and storage activities. An effective solution to this
problem is introducing a coordinator among the actors of the backup and
restore process.
Volume Shadow Volume Shadow Copy service (VSS) is a software service introduced by
Copy Service Microsoft on Windows operating systems. This service collaborates with
the backup application, applications to be backed up, shadow copy
providers, and the operating system kernel to implement the
management of volume shadow copies and shadow copy sets.
HP OpenView Storage Data Protector supports the integration with the
Microsoft Volume Shadow Copy service (VSS).
The Data Protector Volume Shadow Copy integration provides a unified
communication interface that can coordinate backup and restore of any
application regardless of their specific features. With this approach,
backup application does not need to handle each application to be backed
up specifically. However, the production application as well as the backup
application must conform to the VSS specification.
Figure 5-1 and Figure 5-2 show the differences between the traditional
backup model and the model with the Data Protector MS Volume
Shadow Copy integration.
Chapter 5 181
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Overview
Figure 5-2 Actors of the Data Protector VSS Integration Backup Model
182 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Overview
Without using the Volume Shadow Copy service, Data Protector has to
communicate with each application to be backed up individually. The
Data Protector VSS integration introduces a unified backup and restore
interface and provides the coordination among the participants of the
backup and restore process.
Advantages The advantages of using the Data Protector MS Volume Shadow Copy
integration are the following:
Chapter 5 183
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Overview
• Monitoring
Data Protector has a feature that allows the administrator to monitor
currently running sessions and view finished sessions from any
system that has the Data Protector GUI installed.
All backup sessions are logged in the IDB, which provides the
administrator with a history of activities that can be queried later.
184 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Prerequisites and Limitations
Limitations Refer to the HP OpenView Storage Data Protector Software Release Notes
for a list of general Data Protector limitations. The integration-specific
limitations are the following:
Chapter 5 185
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Prerequisites and Limitations
186 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Integration Concepts
Integration Concepts
The Data Protector integration with the MS Volume Shadow Copy
service provides full support for certified VSS-aware writers. This
includes automatic detection of the VSS-aware writers and backup and
restore functionality.
If the writers are not aware of the VSS mechanism, the VSS filesystem
backup is provided. For information on the VSS filesystem backup, refer
to the HP OpenView Storage Data Protector Administrator’s Guide.
For a complete list of supported VSS writers and providers refer to the
HP OpenView Storage Data Protector Software Release Notes.
Benefits of Using The advantages of using the Data Protector VSS integration are the
the Integration following:
VSSBAR Agent The central part of the integration is the VSSBAR agent, which links
Data Protector with the MS Volume Shadow Copy service. Data
Protector MS Volume Shadow Copy integration uses the VSSBAR agent
for automatic browsing of VSS-aware writers, coordinating backup and
restore. VSSBAR agent is responsible for the following actions:
Chapter 5 187
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Integration Concepts
Backup Flow During the Data Protector VSS integration backup, Data Protector does
not interact directly with each writer, but through the VSS interface. It
uses the VSSBAR agent to coordinate the backup process. The
consistency of data is provided on the level of writer and not dependent
on Data Protector functionality. The backup process of the VSS-aware
writers consists of the following phases:
1. When you selected writers and components you want to back up and
started a VSS integration backup, Data Protector communicates with
the Volume Shadow Copy service (backup coordinator) to notify that
the backup is about to start.
2. The coordinator identifies all writers that support the VSS feature
and passes the list of available writers and their characteristics
(Writer Metadata Document) back to Data Protector.
3. Data Protector examines Writer Metadata and identifies the volumes
that contain the data to be backed up. Then the VSS informs
available writers about selected components.
4. Data Protector prepares a list of volumes (shadow copy set) that must
be put into consistent state, and passes the list back to the
coordinator for preparing a shadow copy.
5. The VSSBAR agent notifies the writers about the shadow copy
creation. The VSS mechanism ensures that there are no writes on the
volume while the shadow copy is being created.
NOTE When the VSSBAR agent creates a shadow copy of the volume, this
volume is marked in order to avoid attempts to simultaneously create
another shadow copy of the same volume. In order to prevent any
deadlocks arising from volume locking, only a single VSSBAR agent at a
time is allowed to define a shadow copy set.
6. When the writers are fully prepared for the consistent shadow copy
backup, the VSSBAR agent passes shadow copy creation requests to
VSS.
188 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Integration Concepts
7. After a shadow copy is created, the VSS service returns the related
information to the Data Protector.
8. Data Protector backs up the data from the shadow copy to media and
then notifies the VSS service that the shadow copy can be released.
VSS issues a command to the shadow copy provider to destroy the
shadow copy that has been already backed up. Figure 5-3 shows the
relations between the actors of a local or network VSS backup.
Restore Flow During the restore procedure, the Data Protector VSS integration
coordinates communication between Data Protector and the writers. In
general, the restore flow consists of the following phases: preparing for
restore, restoring components, and notifying the application writers that
a restore has been completed. The restore procedure of the VSS-aware
writers consists of the following phases.
Chapter 5 189
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Integration Concepts
190 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Configuring the Integration
Chapter 5 191
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Configuring the Integration
• If you select node_A as your source host, you have Event Log Writer
and Exchange Server 2003 associated with node_A. While it is true,
that Event Log Writer is a property of the physical node, it is wrong to
associate Exchange Server with it, as it is a property of the virtual
server.
Suppose that after a failover, MS Exchange Server 2003 is running on
node_B. When you try to restore the data to node_A, the restore will
fail because Exchange disks are now owned by node_B and you
cannot write to them. However, the restore of Event Log Writer will
succeed.
192 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Configuring the Integration
• If you select exchsvr as your source host, you have Event Log Writer
and Exchange Server associated with a virtual server exchsvr. While
it is true, that Exchange Server 2003 is a property of the virtual
server, it is wrong to associate Event Log Writer with it, as it is a
property of the physical node.
Suppose that after a failover, MS Exchange Server 2003 is running on
node_B. When you try to restore Event Log Writer data to exchsvr, it
will overwrite (or try to overwrite) the data in the Event Log of
node_B with the data from the Event Log of node_A. The restore of
Event Log Writer will fail, while Exchange Server will be restored
successfully.
Chapter 5 193
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Writers Specifics
Writers Specifics
This section describes specific information about VSS writers, that you
need to take into account before backing up or restoring the writers.
VSS writers either come with the Windows operating system or with
applications. Please refer to the support matrix in the HP OpenView
Storage Data Protector Software Release Notes for a list of supported
writers.
The Data Protector MS VSS integration does not provide any restore
method for writers requesting a custom restore. If a writer specifies a
custom restore method, it is only possible to restore the writer's data as
plain files using the Data Protector functionality. You can perform the
custom restore manually. Refer to the writers documentation for
additional information on the restore methods.
NOTE Writers requiring custom restore methods are by default not shown by
Data Protector. The omnirc variable OB2_SHOWALLWRITERS must be set
to 1 for all writers to be displayed.
194 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Writers Specifics
Chapter 5 195
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Writers Specifics
196 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Writers Specifics
Chapter 5 197
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Writers Specifics
198 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
Configuration 1. Configure devices, media and media pools needed for the backup. See
Steps the HP OpenView Storage Data Protector Administrator’s Guide for
instructions.
2. Create a Data Protector VSS backup specification specifying the data
that you want to back up, the media and devices to which you want
your data to be backed up, as well as the Data Protector backup
options that define the behavior of your backup or restore session.
Chapter 5 199
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
200 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
You can specify a full client backup by selecting the top-level item (the
name of the client), a single writer or a writer’s component backup by
selecting a lower-level item.
NOTE In case a writer requires all of its components to be backed up, it is not
allowed to select lower-level items. To prevent from accidental selecting,
these items are not displayed in the GUI. If you select such a writer for
backup, all its components will be backed up.
Chapter 5 201
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
7. Following the wizard, select the devices, backup options, and schedule
your backup.
Select the device(s) you want to use for the backup. Click Properties
to set the device concurrency, media pool, and preallocation policy. For
more information on these options, click Help.
You can also specify whether you want to create additional copies
(mirrors) of the backup during the backup session. Specify the desired
number of mirrors by clicking the Add mirror and Remove mirror
buttons. Select separate devices for the backup and for each mirror.
For detailed information on the object mirror functionality, see HP
OpenView Storage Data Protector Administrator’s Guide.
TIP If you are not sure about selecting the backup options, keep the default
values.
202 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
Microsoft The following are Microsoft Exchange Server 2003 writer limitations:
Exchange 2003
Writer Limitations • A combination of VSS snapshot backups and incremental stream
backups is not possible.
• You can back up only the whole server or full storage groups. Single
stores cannot be backed up.
• Circular logging must be disabled; otherwise, only full backup
recovery is possible.
• Only one VSS backup session of the Microsoft Exchange Server 2003
Writer can be running at once on the application client.
Consistency The database can be successfully backed up only if the consistency check
Check of the replicated datafiles succeeded.
To disable consistency checking, set the
OB2VSS_EXCHANGE_DISABLE_CONSISTENCY_CHECK omnirc variable to 1.
Chapter 5 203
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
204 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
4. In the Schedule property page, select a date in the calendar and click
Add to open the Schedule Backup dialog box.
5. Specify Recurring, Time options, Recurring options, and
Session options.
See Figure 5-7 on page 205.
6. Click OK to return to the Schedule property page.
7. Click Apply to save the changes.
Chapter 5 205
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Backing Up Writers Data
3. Right-click the backup specification you want to run, and then select
Start Backup from the pop-up menu.
The Start Backup dialog box appears.
Select the Full backup type and the network load
{High|Medium|Low}.
Refer to online Help for a description of network load.
4. Click OK. Upon successful completion of the backup session, a
Session Completed Successfully message appears.
206 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
NOTE Data Protector first restores the Writer Metadata collected during the
backup time. This metadata contains the information about the backup
components and the restore method. Data Protector performs restore
according to the restore method specified by the writers.
Limitations for • Data Protector MS VSS integration does not automatically provide
Custom Restore any restore method for writers requesting custom restore. If a writer
specifies custom restore method, it is only possible to restore the
writer's data as plain files using the Data Protector restore
functionality. To do so, use the Restore Into option to specify the
restore path of these plain files. You can then perform the custom
restore from these plain files manually. For information on writer’s
custom restore, refer to the writers documentation.
NOTE Writers requiring custom restore methods are by default not shown by
Data Protector. The omnirc variable OB2_SHOWALLWRITERS must be set
to 1 for all writers to be displayed.
Restore Procedure
The procedure below shows how to restore MS VSS objects using the
Data Protector GUI. Some writers require custom restore procedures
and/or have specific limitations. Refer to the appropriate sections:
Chapter 5 207
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
You can select the top-level item (full writer restore) or only specific
components. If you select a full writer restore, but some components
of this writer were not backed up in the same session, you cannot
select them (unavailable components are shaded).
208 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
To select the version (the date of a backup) from which you want to
restore, right-click the object name and click Properties. The last
backup version is selected by default, however, you can select a
different version from the drop-down list.
4. In the Options property page, select the MS Volume Shadow Copy
specific restore options. Refer to “Restore Options” on page 214.
5. In the Devices and Media property pages, the devices and media for
restore are automatically selected.
Note that you can change the device used for the restore. Therefore,
you have the possibility of using a different device for a restore than
the one that was used for the backup. Refer to the “Restoring Under
Another Device” section of the HP OpenView Storage Data Protector
Administrator’s Guide for more information on how to perform a
restore using another device.
6. Click the Restore MS Volume... button. Review your selection, and
then click Finish to start a restore session.
The restore session messages are displayed in the Results Area.
7. If you are restoring a VSS writer that requires a custom restore, the
restored files will be saved in a temporary location specified by the
Restore Into option. You can then restore them manually using
the writers specific methods, if it is provided by a writer. Refer to the
writers’ documentation.
IMPORTANT Before restoring the SQL system databases (master, model, msdb and
pub), you have to stop the SQL service.
Chapter 5 209
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
When you expand the MSDE Writer item in the Results Area, all
Microsoft SQL Server instances are displayed. Each instance contains all
databases it includes. System databases (master, model, msdb and pub)
are always listed there.
IMPORTANT If system databases are restored, the whole internal database structure
will be changed.
210 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
• One or more databases are corrupted, but the log files are not
damaged. In this case the database is restored and transaction logs
are applied.
• The log files are corrupted or missing. In this case all databases and
log files need to be restored. A rollforward recovery of the database is
not possible.
1. Dismount all stores from the storage group in which the target store
resides using Microsoft Exchange System Manager.
Chapter 5 211
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
2. Select the stores you want to recover. Make sure that the Logs
component is not selected. If this component is selected, a
point-in-time restore will be performed instead of a rollforward
recovery of the store(s).
3. Start the restore session.
4. Mount all stores from the storage group in which they reside using
Exchange System Manager. The selected stores are recovered.
Figure 5-10 Selecting Microsoft Exchange Server 2003 Stores for Rollforward
Recovery
212 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
Chapter 5 213
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Restoring Writers Data
Restore Options
The following restore options are specific to the Data Protector MS
Volume Shadow Copy integration.
Restore to another client
By default, the target Data Protector MS Volume
Shadow Copy client is the client from which the
application data was backed up. However, you may
restore the data to another VSS client if you specify the
Restore to another client option. The new target
MS VSS client must be a part of the Data Protector
cell, it must run on the same platform and have the MS
Volume Shadow Copy Integration software component
installed.
Restore into the following directory
By default, you restore the data to the same directory
from which it was backed up (it can be on the original
client or on some other client which you selected).
However, if you specify the Restore into the
following directory option, your data will be
restored to another directory. When defining the
restore location, you can specify the path to the
directory where you want to restore your data.
214 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Monitoring a VSS Backup and Restore
Clearing Sessions To remove all completed or aborted sessions from the Results Area of the
Monitor context, proceed as follows:
Chapter 5 215
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Monitoring a VSS Backup and Restore
NOTE All completed or aborted sessions are automatically removed from the
Results Area of the Monitor context if you restart the Data Protector
GUI.
216 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Monitoring a VSS Backup and Restore
Chapter 5 217
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Troubleshooting Integration
Troubleshooting Integration
This section describes the procedures you should follow to troubleshoot
the integration.
Before You Begin 1. Ensure that the latest official Data Protector patches are installed.
Refer to “Verifying Which Data Protector Patches Are Installed” in
the HP OpenView Storage Data Protector Installation and Licensing
Guide.
Refer to the HP OpenView Storage Data Protector Software Release
Notes or
http://www.openview.hp.com/products/datapro/spec_0001.html for an
up-to-date list of supported versions, platforms, and other
information.
2. Refer to the HP OpenView Storage Data Protector Software Release
Notes for general Data Protector limitations as well as known
problems and workarounds.
Restore Problems
Problem After the restore of system writers was aborted, the Windows
operating system is corrupted when you restart it.
If the restore of some system writers (for example, System Writer) is
aborted for any reason (hardware or software failure, manually aborted,
etc.), the Windows operating system may be corrupted after the restart
(for example, the GUI or some system services cannot be started, etc.).
Problem Some components are not restored during the restore session.
If a component cannot be restored to the location specified in Writer
Metadata Document (for example, if this location is locked or it is not
possible to perform regular restore), this component will be skipped
during the restore procedure.
218 Chapter 5
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Troubleshooting Integration
Example If you want the files that are skipped during the restore to be copied to
the F:\Restore directory, set OB2VSS_DUMPTO=F:\Restore in the
omnirc file. In case the SQL component Company was skipped during the
restore, it will be copied to the specified directory as follows:
F:\Restore\2002-12-09-23\G\SQL\Log\Company.ldf
F:\Restore\2002-12-09-23\G\SQL\Log\Company.mdf
The pathname includes the backup session ID and the pathname to the
original location.
Chapter 5 219
Integrating Microsoft Volume Shadow Copy Service with Data Protector
Troubleshooting Integration
220 Chapter 5
Glossary
G-1
Glossary
G-2
Glossary
• Mount point: the access point in a backup set (Oracle specific term)
directory structure (drive on A logical grouping of backed up files
Windows and mount point on that are created using the RMAN
UNIX) on the client where the backup command. A backup set is a
backup object is located. complete set of files associated with a
backup. The files can be multiplexed to
• Description: uniquely defines increase performance. A backup set
backup objects with identical client contains either datafiles or archived
name and mount point. logs, but not both together.
G-3
Glossary
Registry for example. File selection lists instant copies of EMC Symmetrix
such as include-lists and exclude-lists standard devices.
can be specified. See also BCV.
G-4
Glossary
G-5
Glossary
• Redo log files archived with Array XP specific term), Main Control
BRARCHIVE Unit and HP StorageWorks Disk
Array XP LDEV.
• Non-database files saved with
BRBACKUP CAP (StorageTek specific term)
Cartridge Access Port is a port built into
You can specify files, tablespaces, the door panel of a library. The purpose
complete backups, log sequence is to enter or eject media.
numbers of redo log files, or the session
ID of the backup. catalog protection
See also SAPDBA, BRBACKUP and Defines how long information about
BRARCHIVE. backed up data (such as file names and
file versions) is kept in the IDB.
BSM See also data protection.
The Data Protector Backup Session
Manager controls the backup session. CDB
This process always runs on the Cell The Catalog Database is a part of the
Manager system. IDB that contains information about
backups, object copies, restores, media
CA (HP StorageWorks Disk Array XP management sessions, and backed up
specific term) data. Depending on the selected logging
Continuous Access XP allows you to level, it also contains file names and file
create and maintain remote copies of HP versions. This part of the database is
StorageWorks Disk Array XP LDEVs always local to the cell.
for purposes such as data duplication, See also MMDB.
backup, and disaster recovery. CA
operations involve the main (primary) CDF file (UNIX specific term)
disk arrays and the remote (secondary) A Context Dependent File is a file
disk arrays. The main disk arrays consisting of several files grouped under
contain the CA primary volumes (P- the same pathname. The system
VOLs), which contain the original data ordinarily selects one of the files using
and are connected to the application the context of the process. This
system. The remote disk arrays contain mechanism allows machine dependent
the CA secondary volumes (S-VOLs) executables, system data, and device
connected to the backup system. files to work correctly from all hosts in a
See also BC (HP StorageWorks Disk cluster while using the same pathname.
G-6
Glossary
G-7
Glossary
G-8
Glossary
Storage Management Appliance, and is data file (Oracle and SAP R/3 specific
accessed by a Web browser. term)
See also HP StorageWorks EVA Agent A physical file created by Oracle that
(legacy) and HP StorageWorks EVA contains data structures such as tables
SMI-S Agent. and indexes. A data file can only belong
to one Oracle database.
concurrency
See Disk Agent concurrency. data protection
Defines how long the backed up data on
control file (Oracle and SAP R/3 media remains protected, that is, Data
specific term) Protector will not overwrite it. When the
An Oracle data file that contains entries protection expires, Data Protector will
specifying the physical structure of the be able to reuse the media in one of the
database. It provides database next backup sessions.
consistency information used for See also catalog protection.
recovery.
Data Protector Event Log
CRS A central repository of all Data
The Cell Request Server process Protector related notifications. By
(service) runs on the Data Protector Cell default, all notifications are sent to the
Manager. It starts and controls the Event Log. The Event Log is accessible
backup and restore sessions. The service only to Data Protector users in the
is started as soon as Data Protector is Admin group and to Data Protector
installed on the Cell Manager. users who are granted the Reporting and
CRS runs under the account root on notifications user rights. You can view
UNIX systems, and under any Windows or delete all events in the Event Log.
account. By default, it runs under the
account of the user, specified at Data Protector user account
installation time. You can use Data Protector only if you
have a Data Protector user account,
CSM which restricts unauthorized access to
The Data Protector Copy Session Data Protector and to backed up data.
Manager process controls the object Data Protector administrators create this
copy session and runs on the Cell account specifying a user logon name,
Manager system. the systems from which the user can log
on, and a Data Protector user group
G-9
Glossary
G-10
Glossary
G-11
Glossary
G-12
Glossary
can perform a disk image backup of (Internet). It prevents outside users from
either specific disk sections or a getting direct access to company servers
complete disk. in the intranet.
G-13
Glossary
G-14
Glossary
G-15
Glossary
retains one entry in the IDB for the not formatted until the protection
filename itself and one for each version expires or the media are unprotected/
(date/time) of the file. recycled.
G-16
Glossary
G-17
Glossary
G-18
Glossary
G-19
Glossary
G-20
Glossary
G-21
Glossary
G-22
Glossary
place outside of normal business hours target system is searched for locally
without an operator. This implies that no attached devices. If only one device is
operator personnel is present to work found, it is automatically used.
with the backup application or service Otherwise, Data Protector prompts you
mount requests, for example. to select the device, which will be used
for restore.
LISTENER.ORA (Oracle specific
term) lock name
An Oracle configuration file that You can configure the same physical
describes one or more Transparent device several times with different
Network Substrate (TNS) listeners on a characteristics, by using different device
server. names.
G-23
Glossary
G-24
Glossary
G-25
Glossary
G-26
Glossary
G-27
Glossary
G-28
Glossary
single system. This license, which is session, the selected backed up objects
bound to the IP address of the Cell are copied from the source to the target
Manager, is no longer available. media.
G-29
Glossary
by the backup system, but not the On-Bar (Informix specific term)
application, for the whole backup A backup and restore system for OnLine
period (~minutes/hours). For Server. ON-Bar enables you to create a
instance, for backup to tape, until copy of your OnLine Server data and
streaming of data to the tape is later restore the data. The ON-Bar
finished. backup and restore system involves the
following components:
• For ZDB methods, the database is
also put into the quiescent state, but • onbar utility
for the period of the data replication
process only (~seconds). Normal • Data Protector, as the backup
database operation can then be solution
resumed for the rest of the backup
process. • XBSA interface
See also zero downtime backup (ZDB) • ON-Bar catalog tables, which are
and online backup. used to back up dbobjects and track
instances of dbobjects through
offline recovery multiple backups.
Offline recovery is performed if the Cell
Manager is not accessible, for example, onbar utility (Informix specific term)
due to network problems. Only The Informix utility that communicates
standalone and SCSI library devices can backup and restore requests to OnLine
be used for offline recovery. Recovery Server. The utility uses XBSA to
of the Cell Manager is always offline. exchange control data and back up and
restore data with Data Protector.
offline redo log
See archived redo log ONCONFIG (Informix specific term)
An environment variable that specifies
OmniStorage the name of the active ONCONFIG
Software providing transparent configuration file. If the ONCONFIG
migration of less frequently used data to environment variable is not present,
the optical library while keeping more OnLine uses the configuration values
frequently used data on the hard disk. from the file <INFORMIXDIR>/etc/
HP OmniStorage runs on HP-UX onconfig (on HP-UX) or
systems. <INFORMIXDIR>\etc\onconfig (on
Windows).
G-30
Glossary
G-31
Glossary
files are restored from a backup even if installation of the Cell Manager. It is
they are older than existing files. possible to modify the ownership, so
See also merging. that the specific user becomes the
session owner.
OVO
HP OpenView Operations for Unix P1S file
provides powerful capabilities for P1S file contains information on how to
operations management of a large format and partition all disks installed in
number of systems and applications on the system during Enhanced Automated
in a network. Data Protector provides an Disaster Recovery (EADR). It is created
integration into this management during full backup and is saved on
product. This integration is implemented backup medium and on Cell Manager
as a SMART Plug-In for OVO into
management servers on HP-UX and <Data_Protector_home>\Config\Se
Solaris. Earlier versions of OVO were ver\dr\p1s directory on a Windows Cell
called IT/Operation, Operations Center Manager or in /etc/opt/omni/server/dr/
and Vantage Point Operations. p1s directory on a UNIX Cell Manager
See also merging. with the filename recovery.p1s.
G-32
Glossary
G-33
Glossary
G-34
Glossary
RDS RecoveryInfo
The Raima Database Server process When backing up Windows
(service) runs on the Data Protector Cell configuration files, Data Protector
Manager and manages the IDB. The collects the information about the
process is started when Data Protector is current system configuration
installed on the Cell Manager. (information on disk layout, volume,
G-35
Glossary
G-36
Glossary
replica set rotation (ZDB specific term) SAPDBA (SAP R/3 specific term)
The use of a replica set for regular An SAP R/3 user interface that
backup production: Each time the same integrates the BRBACKUP,
backup specification requiring the use of BRARCHIVE, and BRRESTORE tools.
a replica set is run, a new replica is
created and added to the set, until the scan
maximum number for the set is reached. A function that identifies the media in a
After that, the oldest replica in the set is device. This synchronizes the MMDB
replaced, maintaining the maximum with the media that are actually present
number of replicas in the set. at the selected locations (for example,
See also replica and replica set. slots in a library).
G-37
Glossary
G-38
Glossary
G-39
Glossary
G-40
Glossary
sessions can be restored using this executes all tasks required for a split
method. mirror backup integration. It
See also ZDB to tape, ZDB to communicates with the HP
disk+tape, and replica. StorageWorks Disk Array XP storing
system using the RAID Manager XP
sqlhosts file (Informix specific term) utility (HP-UX and Windows systems)
An Informix connectivity-information or RAID Manager Library (Solaris
file that contains the names of each of systems).
the database servers and any aliases to
which the clients on a host computer can sst.conf file
connect. The file /usr/kernel/drv/sst.conf is
required on each Data Protector Sun
SRD file Solaris client to which a multi-drive
The Data Protector System Recovery library device is connected. It must
Data (SRD) file contains system contain an entry for the SCSI address of
information required for installing and the robotic mechanism of each library
configuring the operating system in case device connected to the client.
of a disaster. The SRD file is an ASCII
file, generated when a st.conf file
CONFIGURATION backup is The file /kernel/drv/st.conf is required
performed on a Windows client and on each Data Protector Solaris client
stored on the Cell Manager. with a backup device connected. It must
contain device information and a SCSI
SRDF (EMC Symmetrix specific term) address for each backup drive connected
The EMC Symmetrix Remote Data to that client. A single SCSI entry is
Facility is a business continuation required for a single-drive device and
process that enables effective, real-time multiple SCSI entries are required for a
data replication of SLDs between multi-drive library device.
dislocated processing environments.
These environments could be situated stackers
within the same root computer Devices with multiple slots for media
environment or separated by long storage usually with only one drive. A
distances. stacker selects media from the stack
sequentially. In contrast, a library can
SSE Agent (HP StorageWorks Disk randomly select media from its
Array XP specific term) repository.
A Data Protector software module that
G-41
Glossary
G-42
Glossary
G-43
Glossary
tapeless backup (ZDB specific term) target volume (ZDB specific term)
See ZDB to disk. A storage volume to which data is
replicated.
target database (Oracle specific term)
In RMAN, the target database is the Terminal Services (Windows specific
database that you are backing up or term)
restoring. Windows Terminal Services provide a
multi-session environment that allows
target (R2) device (EMC Symmetrix clients to access a virtual Windows
specific term) desktop session and Windows-based
An EMC Symmetrix device that programs running on the server.
participates in SRDF operations with a
source (R1) device. It resides in the thread (MS SQL Server 7.0/2000
remote EMC Symmetrix unit. It is specific term)
paired with a source (R1) device in the An executable entity that belongs to
local EMC Symmetrix unit and receives only one process. It comprises a
all write data from its mirrored pair. program counter, a user-mode stack, a
This device is not accessed by user kernel-mode stack, and a set of register
applications during normal I/O values. Several threads can run at a time
operations. An R2 device must be within one process.
assigned to an RDF2 group type.
See also source (R1) device TimeFinder (EMC Symmetrix specific
term)
target system (Disaster Recovery A business continuation process that
specific term) creates an instant copy of single or
A system after a computer disaster has multiple Symmetrix Logical Devices
occurred. The target system is typically (SLDs). The instant copy is created on
in a non-bootable state and the goal of specially preconfigured SLDs called
disaster recovery is to restore this BCVs and is accessible via a separate
system to the original system device address to the system(s).
configuration. The difference between a
crashed system and a target system is TLU
that a target system has all faulty Tape Library Unit.
hardware replaced.
TNSNAMES.ORA (Oracle and SAP R/
3 specific term)
A network configuration file that
G-44
Glossary
G-45
Glossary
G-46
Glossary
G-47
Glossary
G-48
Glossary
writer ZDB
(MS VSS specific term) See zero downtime backup (ZDB).
A process that initiates change of data
on the original volume. Writers are ZDB database (ZDB specific term)
typically applications or system services A part of the IDB, storing ZDB related
that write persistent information on a information such as source volumes,
volume. Writers also participate in the replicas and security information. The
shadow copy synchronization process ZDB database is used for ZDB, instant
by assuring data consistency. recovery, and split mirror restore.
See also zero downtime backup
XBSA interface (Informix specific (ZDB).
term)
The onbar utility and Data Protector ZDB to disk (ZDB specific term)
communicate with each other through A form of zero downtime backup where
the X/Open Backup Specification the replica produced is kept on the disk
Services Programmer's Interface array as a backup of the source volumes
(XBSA). at a specific point in time. Multiple
replicas, produced using the same
XCopy engine (direct backup specific backup specification at different times,
term) can be kept in a replica set. A replica
A SCSI-3 copy command that allows from ZDB to disk can be restored using
you to copy data from a storage device the instant recovery process.
having a SCSI source address to a See also zero downtime backup
backup device having a SCSI (ZDB), ZDB to tape, ZDB to
destination address, thus enabling direct disk+tape, instant recovery, and
backup. The data flows from a source replica set rotation.
device (either block or streaming, that
is, disk or tape) to the destination device ZDB to disk+tape (ZDB specific term)
(either block or streaming) through A form of zero downtime backup where
XCopy. This releases the controlling the replica produced is kept on the disk
server of reading the data from the array as a backup of the source volumes
storage device into memory and then at a specific point in time, in the same
writing the information to the way as with ZDB to disk. However, data
destination device. in the replica is also streamed to a
See also direct backup. backup medium, as with ZDB to tape. If
this backup method is used, data backed
up in the same session can be restored
G-49
Glossary
using the instant recovery process, the See also ZDB to disk, ZDB to tape,
standard Data Protector restore from ZDB to disk+tape, and instant
tape, or on split mirror arrays, split recovery.
mirror restore.
See also zero downtime backup
(ZDB), ZDB to disk, ZDB to tape,
instant recovery, replica, and replica
set rotation.
G-50
Index Index
I-1
Index
C disaster recovery
checking MS Exchange 5.x, 88
MS SQL configuration, 17 MS SQL integration, 37
concepts DS See Directory Store
MS Exchange 2000/2003 integration,
107–108 F
MS Exchange 5.x, 64 full backup
MS SQL integration, 6–11 MS Exchange 5.x integration, 65
VSS integration, 187–190 MS Exchange Single Mailbox, 142
concurrent streams
MS Exchange 5.x, 64 I
configuration file
improving performance
MS SQL integration, 12–13 MS SQL integration, 41
configuration problems
incremental backup
MS Exchange Single Mailbox, 173
MS Exchange 5.x integration, 65
MS SQL integration, 51
MS Exchange Single Mailbox, 142
configuring
MS Exchange Single Mailbox integration, Information Store (MDB), 71
integration concepts
144 MS Exchange Single Mailbox, 141
MS Exchange Single Mailbox integration interactive backup
agent, 144 MS Exchange 2000/2003 integration,
Single Mailbox backup, 148 starting, 119
configuring MS Exchange 2000/2003, MS Exchange 5.x integration, 79
110–117 MS SQL integration, starting, 27
backup specification, 112
configuring MS Exchange 5.x, 68–77
backup, 70 L
backup specification, 70 limitations
backup templates, 70 MS Exchange 5.x, 63
improving performance, 90 MS Exchange Single Mailbox, 139
performance tuning, 90 MS SQL integration, 5
configuring MS SQL, 14–25 VSS integration, 185
backup specification, 19
checking configuration, 17 M
configuration problems, 51 MAPI , 141
configuring VSS, 191–193 MAPI profile, 141
backup specification, 199 MAPI session, 141
conventions, ix MDB See Information Store
creating monitoring
MS Exchange 2000/2003 backup MS Exchange 5.x sessions, 91
specification, 112 MS Exchange Single Mailbox sessions, 169
MS Exchange 5.x backup specification, 70 MS SQL sessions, 47
MS Exchange Single Mailbox backup VSS sessions, 215
specification, 148 MS Exchange 2000/2003 backup, 118–120
MS SQL backup specification, 19 backup concepts, scheme, 108
VSS backup specification, 199 backup flow, 107
backup options, GUI, 116
D backup problems, 131
Directory Store (DS), 71 scheduling backup, 118
I-2
Index
I-3
Index
backup problems, 53 P
backup types, 3, 6 performance tuning
concepts, parallelism, 9 MS Exchange Single Mailbox, 167
scheduling backup, 26 MS SQL integration, 41
starting interactive backup, using Data prerequisites
Protector GUI, 27 MS Exchange 2000/2003 integration, 106
MS SQL configuration, 14–25 MS Exchange 5.x, 63
backup specification, 19 MS Exchange Single Mailbox, 139
checking, 17 MS SQL integration, 5
configuration problems, 51 VSS integration, 185
MS SQL configuration file, 12–13
MS SQL integration R
advantages, 3
backing up, 26–28 restore flow
backup types, 3, 6 MS Exchange 2000/2003 integration, 107
concepts, 6–11 MS Exchange 5.x, 65, 81
configuration file, 12–13 MS Exchange Single Mailbox, 142
configuring, 14–25 MS SQL integration, 8
disaster recovery, 37 VSS integration, 189
improving performance, 41 restore options
MS Exchange 2000/2003 integration, CLI,
limitations, 5
128
monitoring sessions, 47
MS Exchange 2000/2003 integration, GUI,
overview, 3
125
performance tuning, 41
MS Exchange 5.x integration, 85
prerequisites, 5
MS Exchange Single Mailbox, 165
restoring, 29–40
MS SQL integration, 3
troubleshooting, 50–57
MS SQL integration, GUI, 33
viewing sessions, 48
VSS integration, 214
MS SQL restore, 29–40
disaster recovery, 37 restore problems
MS Exchange 2000/2003 integration, 132
restore flow, 8
MS Exchange 5.x integration, 97
restore options, 3
MS Exchange Single Mailbox, 176
restore options, GUI , 33
MS SQL integration, 54
restore problems, 54
using CLI, 36 VSS integration, 218
restore procedure
using GUI, 29
MS Exchange Single Mailbox, 159
MS SQL troubleshooting, 50–57
restoring
backup problems, 53
MS Exchange single mailboxes, 159
configuration problems, 51 restoring MS Exchange 2000/2003, 121–129
restore problems, 54 restore flow, 107
restore options, CLI, 128
O restore options, GUI, 125
overview restore problems, 132
MS Exchange 2000/2003 integration, 103 restoring MS Exchange 5.x, 81–89
MS Exchange 5.x, 61 disaster recovery, 88
MS Exchange Single Mailbox integration, from the latest online backup, 85
137 restore flow, 65, 81
MS SQL integration, 3 restore options, 85
VSS integration, 181 restore problems, 97
I-4
Index
I-5
Index
I-6