HP Serveur lame HP ProLiant BL465c Gen8 User Manual

Page 5

Advertising
background image

Setting communication timeout periods for the Protection Manager service ............................... 114

Setting up Application Agent for linkage with RAID Manager ....................................................... 115

Specifying instance numbers .............................................................................................. 115
Specifying a retry count and interval for pair status retry checking .......................................... 118
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 123
Specifying a retry count and interval appropriate to operation style
........................................ 123
Specifying track sizes used when copying data .................................................................... 125
Specifying volume pair creation ......................................................................................... 126
Settings for using secondary volume dynamic recognition ...................................................... 127
Setting up operation mode when automatically selecting copy groups ..................................... 128
Notes on starting and stopping RAID Manager
.................................................................... 128
Specifying the installation path for RAID Manager ................................................................ 129
Specifying modification of pair status if a backup error occurs
................................................ 129

Creating dictionary map files ................................................................................................... 130

Creation in a non-cluster configuration or on a backup server ................................................ 130
Creation in an Active-Passive cluster configuration ................................................................. 131
Creation in an Active-Active cluster configuration .................................................................. 133
Creation in a cascade configuration for Exchange database backup ....................................... 135

Specifying cluster configuration settings and creating a definition file ............................................. 136

Settings related to shared disks and cluster groups ................................................................ 136

How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group)
............................................................................................................ 137
How to Define Cluster Groups (When a Backup Target and Shared Disks Are to Be in Separate
Cluster Groups)
......................................................................................................... 138

Creating a cluster information configuration definition file when using Veritas cluster server ........ 139

Creating a database configuration definition file ......................................................................... 142

Creating a configuration definition file for SQL Server database backup .................................. 142

Specifying settings related to linkage with an SQL Server ............................................................. 144
Specifying settings for using VSS ............................................................................................... 147

Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 149
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 150

Creating a cascade configuration definition file for Exchange database backup .............................. 151
Setting up linkage with a tape backup management software ....................................................... 155

Registering information for linkage with a tape backup management software .......................... 155
Creating a configuration definition file for tape backup ......................................................... 156

Configuration parameters ........................................................................................... 156
Configuration file examples ......................................................................................... 159
User-defined configuration definition file ....................................................................... 160

Creating a list file ................................................................................................................... 161

Creating a copy-group list file ............................................................................................ 161
Creating a database list file or mount point directory list file
.................................................. 161

Commands that support a target definition file ............................................................... 162
File name of the list file
............................................................................................... 162
List file storage location
.............................................................................................. 162
Contents of the list file
................................................................................................ 162

Creating a transaction log list file ....................................................................................... 163

File name of the transaction log list file ......................................................................... 163
Transaction log list file storage location
......................................................................... 163
Contents of the transaction log list file
........................................................................... 163
Creation of a transaction log list file ............................................................................. 164

Updating a dictionary map file ................................................................................................. 164
Specifying how to mount a secondary volume ............................................................................ 165

Making the OS dynamically recognize the secondary volume ................................................ 166
Making the OS statically recognize the secondary volume ..................................................... 174
Determining a mount point and mount target when mounting a secondary volume .................... 178

Application Agent CLI User Guide

5

Advertising