3 preparation for using application agent – HP XP Array Manager Software User Manual

Page 4

Advertising
background image

CCR configurations ............................................................................................................. 58

Configuration in which only the active server is used ........................................................ 59
Configuration in which only the standby server is used
...................................................... 59
Configuration in which different backup servers are used for the active and standby
servers
....................................................................................................................... 60
Configuration in which the same backup server is used for the active and standby servers
..... 60

SCR configurations ............................................................................................................. 61
DAG configurations ............................................................................................................ 62

Backing up and restoring active mailbox database copies ................................................. 63
Backing up and restoring passive mailbox database copies .............................................. 64
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using different backup servers
........................................................................... 65
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using the same backup server
........................................................................... 67
Comparison of DAG configurations ................................................................................ 68

Requirements and precautions for backing up Exchange databases ................................................. 68

Using VSS ......................................................................................................................... 70
Restoring backup data obtained using VSS in units of Information Stores ................................... 72
Using a cluster configuration ................................................................................................ 74
Cascade configuration ........................................................................................................ 75
CCR configuration .............................................................................................................. 76
SCR configuration .............................................................................................................. 77
DAG configuration
............................................................................................................. 77

Requirements when using RAID Manager to configure a pair volume ............................................... 79
Volume configurations usable by Application Agent ...................................................................... 86

Examples of disk group configurations usable by Application Agent .......................................... 88

Requirements and precautions for volume configurations ................................................................ 90

Volume configuration requirements ....................................................................................... 90
Precautions when changing a volume configuration ................................................................ 91
Requirements and precautions when a disk group Is configured ................................................ 92

Using dynamic disks in Veritas Storage Foundation .......................................................... 92
Backing up and restoring dynamic disks by dynamically or statically recognizing secondary
volumes
...................................................................................................................... 93
Expanding dynamic volumes
......................................................................................... 93

Precautions for partition styles for disks ................................................................................. 93

3 Preparation for using Application Agent .............................................. 95

Setting up an environment for Application Agent ........................................................................... 95
Setting up RAID Manager .......................................................................................................... 98

Backing up one primary volume to multiple generations .......................................................... 99
Backing up multiple primary volumes to a single generation
.................................................... 99
Backing up multiple primary volumes to multiple generations ................................................. 100
Backup or restore between storage systems .......................................................................... 101
Setting up a multi-target or cascade configuration ................................................................. 103

Setting up operation of Application Agent .................................................................................. 104

Specifying the retry count and interval for cluster resource status retry check ............................. 104
Specifying the retry count and interval for process status retry check ........................................ 106
Specifying the retry count and interval for command execution status retry check ...................... 107
Setting up the backup option for SQL Server database backup
............................................... 107
Setting up the dictionary map synchronization option for SQL Server database backup ............. 108
Setting up the recovery option for SQL Server database backup
............................................. 108
Setting up restoration while cluster resources are online ......................................................... 109
Setting up parallel execution of verification processes for Exchange database backup ............... 112
Setting communication timeout periods for the Protection Manager service
............................... 112

4

Advertising