HP XP Command View Advanced Edition Software User Manual

Page 5

Advertising
background image

Setting communication timeout periods for the Protection Manager service ............................... 114

Setting up Application Agent for linkage with RAID Manager ....................................................... 115

Specifying instance numbers .............................................................................................. 115
Specifying a retry count and interval for pair status retry checking .......................................... 118
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 123
Specifying a retry count and interval appropriate to operation style
........................................ 123
Specifying track sizes used when copying data .................................................................... 125
Specifying volume pair creation ......................................................................................... 126
Settings for using secondary volume dynamic recognition ...................................................... 127
Setting up operation mode when automatically selecting copy groups ..................................... 128
Notes on starting and stopping RAID Manager
.................................................................... 128
Specifying the installation path for RAID Manager ................................................................ 129
Specifying modification of pair status if a backup error occurs
................................................ 129

Creating dictionary map files ................................................................................................... 130

Creation in a non-cluster configuration or on a backup server ................................................ 130
Creation in an Active-Passive cluster configuration ................................................................. 131
Creation in an Active-Active cluster configuration .................................................................. 133
Creation in a cascade configuration for Exchange database backup ....................................... 135

Specifying cluster configuration settings and creating a definition file ............................................. 136

Settings related to shared disks and cluster groups ................................................................ 136

How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group)
............................................................................................................ 137
How to Define Cluster Groups (When a Backup Target and Shared Disks Are to Be in Separate
Cluster Groups)
......................................................................................................... 138

Creating a cluster information configuration definition file when using Veritas cluster server ........ 139

Creating a database configuration definition file ......................................................................... 142

Creating a configuration definition file for SQL Server database backup .................................. 142

Specifying settings related to linkage with an SQL Server ............................................................. 144
Specifying settings for using VSS ............................................................................................... 148

Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 150
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 151

Creating a cascade configuration definition file for Exchange database backup .............................. 152
Setting up linkage with a tape backup management software ....................................................... 156

Registering information for linkage with a tape backup management software .......................... 156
Creating a configuration definition file for tape backup ......................................................... 157

Configuration parameters ........................................................................................... 157
Configuration file examples ......................................................................................... 160
User-defined configuration definition file ....................................................................... 161

Creating a list file ................................................................................................................... 162

Creating a copy-group list file ............................................................................................ 162
Creating a database list file or mount point directory list file
.................................................. 162

Commands that support a target definition file ............................................................... 163
File name of the list file
............................................................................................... 163
List file storage location
.............................................................................................. 163
Contents of the list file
................................................................................................ 163

Creating a transaction log list file ....................................................................................... 164

File name of the transaction log list file ......................................................................... 164
Transaction log list file storage location
......................................................................... 164
Contents of the transaction log list file
........................................................................... 164
Creation of a transaction log list file ............................................................................. 165

Updating a dictionary map file ................................................................................................. 165
Specifying how to mount a secondary volume ............................................................................ 166

Making the OS dynamically recognize the secondary volume ................................................ 167
Making the OS statically recognize the secondary volume ..................................................... 175
Determining a mount point and mount target when mounting a secondary volume .................... 179

Application Agent CLI User Guide

5

Advertising