HP Serveur lame HP ProLiant BL465c Gen8 User Manual

Page 22

Advertising
background image

How to determine a mount point when the command for mounting a secondary volume
is executed (when a copy group is specified for an option)
......................................... 180

52

How to determine a mount target when the command for mounting a secondary volume
is executed
........................................................................................................... 181

53

Extended command execution preparation tasks needed for each kind of server ........... 181

54

Value and maximum value length of each entry in a host environment settings file ......... 185

55

Example: contents and maximum value length of each entry in an operation definition file
(when the backup is of a file system)
........................................................................ 188

56

Cluster Resources (In cluster configuration when the backup is of a file system) .............. 189

57

Operation IDs for which an operation definition file is created (in cluster configuration
when the backup is of a file system)
......................................................................... 190

58

Contents and maximum value length of each entry in an operation definition file (when
the backup is of an SQL Server database)
................................................................ 193

59

Cluster resources (when the backup is of an SQL Server database) .............................. 194

60

Example of VDI metafile storage directory ................................................................ 195

61

Operation IDs for which to create operation definition files (when the backup is of an SQL
Server and in a cluster configuration)
....................................................................... 195

62

Contents and maximum value length of each entry in an operation definition file (when
the backup is of an Exchange database)
.................................................................. 197

63

Cluster resources (when the backup is of an Exchange database) ................................ 199

64

Operation IDs for which an operation definition file is created (when the backup is of an
Exchange database and in a cluster configuration)
.................................................... 200

65

Naming conventions for the temporary directory for extended commands .................... 201

66

Naming conventions for the temporary directory for extended commands .................... 201

67

Directories used for inter-server FTP transmission and reception ................................... 202

68

Directories used for inter-server FTP transmission and reception ................................... 202

69

Coding rules for user scripts ................................................................................... 203

70

Entries in user scripts ............................................................................................. 204

71

Script environment variables ................................................................................... 210

72

Commands that can be specified in user pre-processing and user post-processing ......... 211

73

Examples of user script usage ................................................................................. 212

74

mail.conf parameters ............................................................................................. 212

75

Parameters in the Exchange environment configuration file .......................................... 219

76

Correspondence between extended commands and basic commands (commands used
for backing up and restoring file systems)
................................................................. 222

77

Correspondence between extended commands and basic commands (Common
commands)
.......................................................................................................... 222

78

Correspondence between extended commands and basic commands (Tape
commands)
.......................................................................................................... 223

79

Correspondence between extended commands and basic commands (Utility
commands)
.......................................................................................................... 224

80

22

Advertising