Best practices for disaster recovery, See also – Dell PowerVault DP600 User Manual

Page 120

Advertising
background image

120

organization's data should your facility be damaged or destroyed. Tape is a popular medium

for offsite storage.

3. Add a secondary DPM server. A secondary DPM server can protect and restore a primary

DPM server, which is a DPM server directly protecting file and application data sources. The

secondary server can protect the databases of the primary DPM server, as well as the data

source replicas that are stored on the primary DPM server. If the primary DPM server fails,

you can restore the databases and replicas to the rebuilt primary DPM server from the

secondary DPM server. You can restore data to protected computers directly from the

secondary DPM server when the primary DPM server is unavailable. The secondary DPM

server can also protect servers until the primary DPM server is available.

4. Back up DPM databases to tape. You can use a DPM server to back up its own databases

to its tape library, or you can use non-Microsoft software to back up the databases to tape or

removable media. Backup of the DPM databases enables you to recover the configuration of

protection groups after you reinstall DPM.

Important

Of these options, adding a secondary DPM server provides the greatest amount of

protection. At a minimum, we strongly recommend that you back up the DPM databases

regularly, either using DPM or non-Microsoft software.

In This Section

Best Practices for Disaster Recovery

Backup of Protected Computer System State

Backup of DPM Servers

Backup for Bare Metal Recovery

See Also

Recovery

Best Practices for Disaster Recovery

Backups of data, whether by DPM or third-party software, rely on the integrity of the data being

protected. To minimize the risk of data corruption, we recommend the following guidelines:

• Run tools that check application integrity regularly, such as DBCC in SQL Server.
• Monitor event logs on the protected computers and DPM server for hardware and file system

errors.

• Perform regular test recoveries of protected data.
• Perform frequent consistency checks on critical data.
• Use a secondary DPM server to provide additional protection and redundancy.

Advertising