3 preparation for using application agent – HP Serveur lame HP ProLiant BL465c Gen8 User Manual

Page 4

Advertising
background image

CCR configurations ............................................................................................................. 58

Configuration in which only the active server is used ........................................................ 59
Configuration in which only the standby server is used
...................................................... 59
Configuration in which different backup servers are used for the active and standby
servers
....................................................................................................................... 60
Configuration in which the same backup server is used for the active and standby servers
..... 60

SCR configurations ............................................................................................................. 61
DAG configurations ............................................................................................................ 62

Backing up and restoring active mailbox database copies ................................................. 63
Backing up and restoring passive mailbox database copies .............................................. 64
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using different backup servers
........................................................................... 65
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using the same backup server
........................................................................... 67
Comparison of DAG configurations ................................................................................ 68

Requirements and precautions for backing up Exchange databases ................................................. 69

Using VSS ......................................................................................................................... 70
Restoring backup data obtained using VSS in units of Information Stores ................................... 73
Using a dynamic disk configuration ...................................................................................... 75
Using a cluster configuration
................................................................................................ 75
Cascade configuration ........................................................................................................ 76
CCR configuration .............................................................................................................. 77
SCR configuration .............................................................................................................. 78
DAG configuration
............................................................................................................. 78

Requirements when using RAID Manager to configure a pair volume ............................................... 80
Volume configurations usable by Application Agent ...................................................................... 87

Examples of disk group configurations usable by Application Agent .......................................... 89

Requirements and precautions for volume configurations ................................................................ 91

Volume configuration requirements ....................................................................................... 91
Precautions when changing a volume configuration ................................................................ 92
Requirements and precautions when a disk group Is configured ................................................ 93

Using dynamic disks in Veritas Storage Foundation .......................................................... 93
Backing up and restoring dynamic disks by dynamically or statically recognizing secondary
volumes
...................................................................................................................... 94
Expanding dynamic volumes
......................................................................................... 94

Precautions for partition styles for disks ................................................................................. 94

3 Preparation for using Application Agent .............................................. 97

Setting up an environment for Application Agent ........................................................................... 97
Setting up RAID Manager ........................................................................................................ 100

Backing up one primary volume to multiple generations ........................................................ 101
Backing up multiple primary volumes to a single generation
.................................................. 101
Backing up multiple primary volumes to multiple generations ................................................. 102
Backup or restore between storage systems .......................................................................... 103
Setting up a multi-target or cascade configuration ................................................................. 105

Setting up operation of Application Agent .................................................................................. 106

Specifying the retry count and interval for cluster resource status retry check ............................. 106
Specifying the retry count and interval for process status retry check ........................................ 108
Specifying the retry count and interval for command execution status retry check ...................... 109
Setting up the backup option for SQL Server database backup
............................................... 109
Setting up the dictionary map synchronization option for SQL Server database backup ............. 110
Setting up the recovery option for SQL Server database backup
............................................. 110
Setting up restoration while cluster resources are online ......................................................... 111
Setting up parallel execution of verification processes for Exchange database backup ............... 114

4

Advertising