HP P9000 Replication Manager Software
Application Agent CLI User Guide
Part number: TB584-96080
Ninth edition: October 2013
Legal and notice information
© Copyright 2011, 2013 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211
and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items
are licensed to the U.S. Government under vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set
forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Acknowledgments
Microsoft, Windows, and Windows XP are U.S. registered trademarks of Microsoft Corporation.
UNIX is a registered trademark of The Open Group.
Export Requirements
You may not export or re-export this document or any copy or adaptation in violation of export laws or regulations.
Without limiting the foregoing, this document may not be exported, re-exported, transferred or downloaded to or within (or to
a national resident of) countries under U.S. economic embargo, including Cuba, Iran, North Korea, Sudan, and Syria. This
list is subject to change.
This document may not be exported, re-exported, transferred, or downloaded to persons or entities listed on the U.S. Department
of Commerce Denied Persons List, Entity List of proliferation concern or on any U.S. Treasury Department Designated Nationals
exclusion list, or to parties directly or indirectly involved in the development or production of nuclear, chemical, biological
weapons, or in missile technology programs as specified in the U.S. Export Administration Regulations (15 CFR 744).
Hitachi and Universal Replicator are registered trademarks of Hitachi, Ltd. ShadowImage and TrueCopy are registered
trademarks of Hitachi, Ltd. and Hitachi Data Systems Corporation.
Revision history
Description Edition Version Date
First edition First 7.1.0-00 April 2011
Added information for new and changed features. Second 7.1.1-00 August 2011
Added information for new and changed features. Third 7.2.0-00 November 2011
Added information for new and changed features. Fourth 7.2.1-00 March 2012
Added information for new and changed features. Fifth 7.3.1-00 August 2012
Added information for new and changed features. Sixth 7.4.0-00 November 2012
Added information for new and changed features. Seventh 7.4.1-00 February 2013
Added information for new and changed features. Eighth 7.5.0-00 May 2013
Added information for new and changed features. Ninth 7.6.0-00 October 2013
Contents
Preface .............................................................................................. 25
1 Overview of Application Agent .......................................................... 27
Application Agent features ........................................................................................................ 27
Application Agent functions ...................................................................................................... 28
Backing up data ............................................................................................................... 28
Restoring data .................................................................................................................. 29
Managing data by using dictionary map files ....................................................................... 29
Pair management using copy groups ................................................................................... 30
Cluster support .................................................................................................................. 30
Reducing workload by using commands ............................................................................... 31
Data management on another storage systems ...................................................................... 31
Managing generations ...................................................................................................... 32
2 Application Agent system configurations ............................................. 35
Basic configurations for backing up and restoring data .................................................................. 35
Configurations in which data is backed up and restored within a storage system ........................ 35
Configurations in which data can be backed up and restored between two storage systems ......... 36
Continuous Access Software or Continuous Access Journal configuration ............................. 36
Business Copy and Continuous Access Software multi-target configuration ........................... 37
Business Copy and Continuous Access Journal multi-target configuration ............................. 38
Continuous Access Software and Continuous Access Journal multi-target configuration .......... 39
Business Copy (multi-generation), Continuous Access Software, or Continuous Access Journal
configuration ............................................................................................................... 40
Precautions on backing up and restoring data between storage systems .................................... 41
Configurations using tape devices ........................................................................................ 42
Configurations for operation in cluster environments ...................................................................... 43
Operation-standby cluster configuration ................................................................................. 43
Mutual-standby cluster configuration ..................................................................................... 44
Configurations when VSS is used ................................................................................................ 45
Requirements and precautions for backing up file systems .............................................................. 46
System configurations for backing up SQL Server databases ........................................................... 47
Configurations for restoring an SQL Server database to a host that is not the original host ........... 47
Configurations for using the log-shipping functionality ............................................................. 48
Cascade configurations ...................................................................................................... 49
Multi-target configurations ................................................................................................... 50
Requirements and precautions for backing up SQL Server databases ............................................... 51
Allocating files that comprise a database .............................................................................. 54
Allocating multiple database configuration files to one volume ................................................. 55
Allocating metafiles ............................................................................................................ 55
Using a dynamic disk configuration ...................................................................................... 57
Using a cluster configuration ................................................................................................ 58
System configurations for backing up Exchange databases ............................................................. 58
Cascade configurations ...................................................................................................... 58
Application Agent CLI User Guide 3
CCR configurations ............................................................................................................. 58
Configuration in which only the active server is used ........................................................ 59
Configuration in which only the standby server is used ...................................................... 59
Configuration in which different backup servers are used for the active and standby
servers ....................................................................................................................... 60
Configuration in which the same backup server is used for the active and standby servers ..... 60
SCR configurations ............................................................................................................. 61
DAG configurations ............................................................................................................ 62
Backing up and restoring active mailbox database copies ................................................. 63
Backing up and restoring passive mailbox database copies .............................................. 64
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using different backup servers ........................................................................... 65
Backing up and restoring the active mailbox database copy and the passive mailbox database
copy by using the same backup server ........................................................................... 67
Comparison of DAG configurations ................................................................................ 68
Requirements and precautions for backing up Exchange databases ................................................. 69
Using VSS ......................................................................................................................... 70
Restoring backup data obtained using VSS in units of Information Stores ................................... 73
Using a dynamic disk configuration ...................................................................................... 75
Using a cluster configuration ................................................................................................ 75
Cascade configuration ........................................................................................................ 76
CCR configuration .............................................................................................................. 77
SCR configuration .............................................................................................................. 78
DAG configuration ............................................................................................................. 78
Requirements when using RAID Manager to configure a pair volume ............................................... 80
Volume configurations usable by Application Agent ...................................................................... 87
Examples of disk group configurations usable by Application Agent .......................................... 89
Requirements and precautions for volume configurations ................................................................ 91
Volume configuration requirements ....................................................................................... 91
Precautions when changing a volume configuration ................................................................ 92
Requirements and precautions when a disk group Is configured ................................................ 93
Using dynamic disks in Veritas Storage Foundation .......................................................... 93
Backing up and restoring dynamic disks by dynamically or statically recognizing secondary
volumes ...................................................................................................................... 94
Expanding dynamic volumes ......................................................................................... 94
Precautions for partition styles for disks ................................................................................. 94
3 Preparation for using Application Agent .............................................. 97
Setting up an environment for Application Agent ........................................................................... 97
Setting up RAID Manager ........................................................................................................ 100
Backing up one primary volume to multiple generations ........................................................ 101
Backing up multiple primary volumes to a single generation .................................................. 101
Backing up multiple primary volumes to multiple generations ................................................. 102
Backup or restore between storage systems .......................................................................... 103
Setting up a multi-target or cascade configuration ................................................................. 105
Setting up operation of Application Agent .................................................................................. 106
Specifying the retry count and interval for cluster resource status retry check ............................. 106
Specifying the retry count and interval for process status retry check ........................................ 108
Specifying the retry count and interval for command execution status retry check ...................... 109
Setting up the backup option for SQL Server database backup ............................................... 109
Setting up the dictionary map synchronization option for SQL Server database backup ............. 110
Setting up the recovery option for SQL Server database backup ............................................. 110
Setting up restoration while cluster resources are online ......................................................... 111
Setting up parallel execution of verification processes for Exchange database backup ............... 114
4
Setting communication timeout periods for the Protection Manager service ............................... 114
Setting up Application Agent for linkage with RAID Manager ....................................................... 115
Specifying instance numbers .............................................................................................. 115
Specifying a retry count and interval for pair status retry checking .......................................... 118
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 123
Specifying a retry count and interval appropriate to operation style ........................................ 123
Specifying track sizes used when copying data .................................................................... 125
Specifying volume pair creation ......................................................................................... 126
Settings for using secondary volume dynamic recognition ...................................................... 127
Setting up operation mode when automatically selecting copy groups ..................................... 128
Notes on starting and stopping RAID Manager .................................................................... 128
Specifying the installation path for RAID Manager ................................................................ 129
Specifying modification of pair status if a backup error occurs ................................................ 129
Creating dictionary map files ................................................................................................... 130
Creation in a non-cluster configuration or on a backup server ................................................ 130
Creation in an Active-Passive cluster configuration ................................................................. 131
Creation in an Active-Active cluster configuration .................................................................. 133
Creation in a cascade configuration for Exchange database backup ....................................... 135
Specifying cluster configuration settings and creating a definition file ............................................. 136
Settings related to shared disks and cluster groups ................................................................ 136
How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group) ............................................................................................................ 137
How to Define Cluster Groups (When a Backup Target and Shared Disks Are to Be in Separate
Cluster Groups) ......................................................................................................... 138
Creating a cluster information configuration definition file when using Veritas cluster server ........ 139
Creating a database configuration definition file ......................................................................... 142
Creating a configuration definition file for SQL Server database backup .................................. 142
Specifying settings related to linkage with an SQL Server ............................................................. 144
Specifying settings for using VSS ............................................................................................... 147
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 149
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 150
Creating a cascade configuration definition file for Exchange database backup .............................. 151
Setting up linkage with a tape backup management software ....................................................... 155
Registering information for linkage with a tape backup management software .......................... 155
Creating a configuration definition file for tape backup ......................................................... 156
Configuration parameters ........................................................................................... 156
Configuration file examples ......................................................................................... 159
User-defined configuration definition file ....................................................................... 160
Creating a list file ................................................................................................................... 161
Creating a copy-group list file ............................................................................................ 161
Creating a database list file or mount point directory list file .................................................. 161
Commands that support a target definition file ............................................................... 162
File name of the list file ............................................................................................... 162
List file storage location .............................................................................................. 162
Contents of the list file ................................................................................................ 162
Creating a transaction log list file ....................................................................................... 163
File name of the transaction log list file ......................................................................... 163
Transaction log list file storage location ......................................................................... 163
Contents of the transaction log list file ........................................................................... 163
Creation of a transaction log list file ............................................................................. 164
Updating a dictionary map file ................................................................................................. 164
Specifying how to mount a secondary volume ............................................................................ 165
Making the OS dynamically recognize the secondary volume ................................................ 166
Making the OS statically recognize the secondary volume ..................................................... 174
Determining a mount point and mount target when mounting a secondary volume .................... 178
Application Agent CLI User Guide 5
Determination of a mount point .................................................................................... 179
Determination of a mount target ................................................................................... 181
Preparations required before executing extended commands ........................................................ 181
Checking the prerequisite conditions ................................................................................... 182
Execution permissions for extended commands .............................................................. 183
Automatic execution of extended commands ................................................................. 183
Prerequisite VBScript version ........................................................................................ 183
Deletion of unnecessary files ....................................................................................... 183
Setting up an FTP service for backing up to tape .................................................................. 184
Specifying how to start the extended commands ................................................................... 184
Creating a host environment settings file .............................................................................. 185
Creating operation IDs ...................................................................................................... 186
Creating operation definition files for file system backup ........................................................ 187
Deployment of operation definition files ........................................................................ 187
Format of operation definition files ............................................................................... 188
Example of creating operation definition files (in a cluster configuration) ........................... 189
Creating operation definition files for SQL Server database backup ........................................ 191
Deployment of operation definition files ........................................................................ 192
Format of operation definition files ............................................................................... 192
Example of creating operation definition files ................................................................ 194
Creating operation definition files for Exchange database backup .......................................... 196
Deployment of operation definition files ........................................................................ 196
Format of operation definition files ............................................................................... 197
Example of creating operation definition files ................................................................ 199
Checking the temporary directory for extended commands .................................................... 201
Checking the copy-group list file ......................................................................................... 202
Checking the FTP service (if you are going to back up to tape) ............................................... 202
Creating a user script .............................................................................................................. 203
Overview of user scripts .................................................................................................... 203
Coding rules for user scripts ............................................................................................... 203
Coding rules for user scripts ........................................................................................ 203
Entries in user scripts .................................................................................................. 204
Script environment variables ........................................................................................ 210
Command execution permission ................................................................................... 210
Commands that can be specified in user pre-processing and user post-processing .............. 210
Examples of user script usage ............................................................................................ 212
Specifying settings for sending mail .......................................................................................... 212
Backing up the Application Agent operating environment ............................................................. 214
Files that need to be backed up ......................................................................................... 214
Application Agent environment setting files and log files ................................................. 214
Definition files created after the installation of Application Agent ...................................... 215
Application Agent backup information .......................................................................... 215
Recovering the operating environment ................................................................................. 217
Recovering operating environment (common among servers) ........................................... 217
Recovering backup information (file server) .................................................................... 218
Recovering backup information (database server) ........................................................... 218
Restoring backup information (backup server) ................................................................ 218
Creating the Exchange environment configuration file .................................................................. 219
4 Application Agent operations .......................................................... 221
Application Agent commands .................................................................................................. 221
Extended commands ........................................................................................................ 221
Basic commands .............................................................................................................. 222
Correspondence between extended commands and basic commands ........................................... 222
6
Precautions on operations ........................................................................................................ 225
Precautions on operations ................................................................................................. 226
Precautions on backup and restoration ................................................................................ 226
Precautions on backup ...................................................................................................... 227
Precautions on restoration .................................................................................................. 229
Precautions when executing commands simultaneously .......................................................... 229
Precautions for executing commands in a cluster environment ................................................. 230
Precautions regarding backup servers ................................................................................. 230
Precautions when mounting ......................................................................................... 230
Precautions regarding the drive when mounting data to a backup server ........................... 231
Precautions when importing backup information ............................................................ 231
Command execution conditions ................................................................................... 231
Precautions when updating dictionary map files ................................................................... 231
Unavailable tools when executing commands ...................................................................... 232
Disk group configuration that does not allow backup (dynamic disk configuration) .................... 232
Notes on pair volume resynchronization in a cascade configuration ........................................ 233
Precautions when executing commands ..................................................................................... 233
Permissions required for users executing commands .............................................................. 233
Possibility of concurrent execution with other commands ........................................................ 237
Retry time when an error occurs ......................................................................................... 240
Stopping retry operations caused by a command that cannot execute concurrently with other
commands ...................................................................................................................... 240
Executing multiple drmmediabackup or drmmediarestore commands concurrently ..................... 241
Configurations that requires RAID Manager user authentication .............................................. 242
Starting and stopping the Protection Manager service ................................................................. 242
Starting the Protection Manager service .............................................................................. 242
Restarting the Protection Manager service ............................................................................ 243
Stopping the Protection Manager service ............................................................................. 243
5 Operation for file systems ................................................................ 245
Backing up and restoring a file system ....................................................................................... 245
Precautions when backing up a file system ........................................................................... 245
Precautions when restoring a file system .............................................................................. 245
Precautions when executing commands in a cluster environment ............................................. 246
Precautions on forced termination of commands ................................................................... 246
Backing up and restoring data between volumes ......................................................................... 246
System configuration ......................................................................................................... 246
Processing flow ................................................................................................................ 247
Backing up a file system to a secondary volume ................................................................... 248
Restoring a file system to a primary volume .......................................................................... 249
Backing up and restoring by using a tape device ........................................................................ 249
System configuration ......................................................................................................... 249
Flow of processing ........................................................................................................... 251
Backing up a file system to tape ......................................................................................... 253
Resynchronizing copy groups ...................................................................................... 253
Backing up a file system ............................................................................................. 253
Backup using VSS ...................................................................................................... 255
Restoring a file system from tape ......................................................................................... 256
Backing up a file system by using a user script ............................................................................ 258
System configuration ......................................................................................................... 258
Processing flow ................................................................................................................ 259
User script example .......................................................................................................... 260
Backup execution example ................................................................................................ 263
Backing up and restoring between local sites and remote sites ...................................................... 265
Application Agent CLI User Guide 7
Backing up a file system to a remote site ............................................................................. 266
Operations at the local site ......................................................................................... 266
Operations at the remote site ...................................................................................... 267
Operations at the local site ......................................................................................... 268
Restoring a file system to the local site ................................................................................. 269
Operations at the remote site ...................................................................................... 269
Operations at the local site ......................................................................................... 270
Restoring a file system to a remote site ................................................................................ 271
Operations at the remote site ...................................................................................... 271
Recovering a file system from a remote site to the local site .................................................... 272
Operations at the local site ......................................................................................... 272
Operations at the remote site ...................................................................................... 272
Operations at the local site ......................................................................................... 272
Backing up and restoring a file system by using a tape backup management software that cannot link
with Application Agent ............................................................................................................ 272
Backing up and restoring a file system by using a file share .......................................................... 273
Preparing to back up or restore a file system by using a file share ........................................... 273
Example of backing up a file system by using a file share ...................................................... 274
Example of restoring a file system by using a file share .......................................................... 274
Deleting backup data .............................................................................................................. 275
6 Operation for SQL Server databases ................................................ 277
Backing up and restoring an SQL Server database ...................................................................... 277
Precautions when backing up and restoring a database ........................................................ 277
Precautions when restoring a database ............................................................................... 278
Precautions when recovering a database ............................................................................. 279
Precautions when backing up and restoring multiple databases .............................................. 279
When multiple databases are stored in the same volume ................................................ 279
When multiple databases are stored in multiple volumes ................................................. 280
Database status when restoring and recovering .................................................................... 281
Requirements for transaction log backup .............................................................................. 282
Precautions regarding backup of transaction logs ................................................................. 282
Precautions regarding sequences of transaction logs ............................................................. 283
Transaction log backups after roll-forward ..................................................................... 283
Precautions regarding application of transaction logs ............................................................ 285
Recovering the SQL Server database from the last backup data ....................................... 285
Recovering the SQL Server database from backup data existing prior to the last backup
data ......................................................................................................................... 286
SQL Server database requirements for executing commands .................................................. 286
Service status ............................................................................................................ 286
Database status ......................................................................................................... 287
Database type ........................................................................................................... 290
Backing up and restoring data between volumes ......................................................................... 291
System configuration ......................................................................................................... 291
Processing flow ................................................................................................................ 292
Backing up an SQL Server database to a secondary volume .................................................. 293
Restoring an SQL Server database to a primary volume ........................................................ 294
Restoring an SQL Server database ............................................................................... 294
Using the drmsqlrecover command to recover an SQL Server database ............................. 295
Using the drmsqlrecovertool dialog box to recover an SQL Server database ...................... 295
Backing up and restoring by using a tape device ........................................................................ 296
System configuration ......................................................................................................... 297
Processing flow ................................................................................................................ 298
Backing up an SQL Server database to tape ........................................................................ 300
8
Resynchronizing copy groups ...................................................................................... 300
Backing up an SQL Server database ............................................................................ 301
Restoring an SQL Server database from tape ....................................................................... 303
Restoring an SQL Server database ............................................................................... 303
Recovering an SQL Server database with the drmsqlrecover command ............................. 305
Recovering an SQL Server database using the drmsqlrecovertool dialog box ..................... 305
Backing up an SQL Server database by using a user script .......................................................... 306
System configuration ......................................................................................................... 307
Processing flow ................................................................................................................ 307
User script example .......................................................................................................... 308
Backup execution example ................................................................................................ 310
Operation using SQL Server transaction logs .............................................................................. 311
System configuration ......................................................................................................... 311
Example of operation using a transaction log backup ........................................................... 312
Backing up an SQL Server database ................................................................................... 313
Resynchronizing copy groups ...................................................................................... 313
Backing up an SQL Server database ............................................................................ 314
Backing up transaction logs ............................................................................................... 314
Restoring SQL Server databases ......................................................................................... 315
Applying the drmsqlrecovertool dialog box to restore an SQL Server database ......................... 315
Using the drmsqlrecovertool dialog box to recover an SQL Server database ...................... 315
Using the drmsqlrecover command to recover an SQL Server database (using a transaction
log list file) ................................................................................................................ 316
Example of operation using transaction log backup .............................................................. 317
Backing up and restoring transaction log backup files .................................................................. 318
System configuration ......................................................................................................... 319
Backing up the transaction log backup file ........................................................................... 320
Restoring the transaction log backup file .............................................................................. 322
Backing up and restoring multiple generations by locking a copy group ......................................... 323
Example of operation using lock functionality and generation management ............................. 324
Locking a copy group ....................................................................................................... 324
Unlocking a copy group .................................................................................................... 326
Backing up and restoring between local sites and remote sites ...................................................... 327
Backing up an SQL Server database to a remote site ............................................................ 329
Operation at the local site .......................................................................................... 329
Operation at the remote site ........................................................................................ 330
Operation at the local site .......................................................................................... 331
Restoring an SQL Server database to the local site ................................................................ 331
Operation at the remote site ........................................................................................ 331
Operation at the local site .......................................................................................... 332
Restoring an SQL Server database to a remote site ............................................................... 333
Operation at the remote site ........................................................................................ 333
Recovering data from the remote site to the local site ............................................................ 334
Operation at the local site .......................................................................................... 335
Operation at the remote site ........................................................................................ 335
Operation at the local site .......................................................................................... 335
Backing up and restoring in a multi-target configuration ............................................................... 335
Example of backing up an SQL Server database .................................................................. 338
Example of restoring an SQL Server database ...................................................................... 339
Performing restoration and recovery on a host other than the backup host ...................................... 341
Using the SQL Server log-shipping function ................................................................................ 346
Before using the log-shipping function ................................................................................. 346
Setting a distribution target server as an operating server ...................................................... 350
Backing up and restoring in a cascade configuration or multi-target configuration ........................... 352
Application Agent CLI User Guide 9
Preparations for performing backup or restoration in a cascade configuration or multi-target
configuration ................................................................................................................... 353
Creating a user script to perform a backup in a cascade configuration .................................... 357
Outline of user script files ............................................................................................ 357
Coding rules for user script files ................................................................................... 358
Sample user script files ............................................................................................... 358
Backing up an SQL Server database in a cascade configuration ............................................ 367
Backing up transaction logs in a cascade configuration without a backup catalog .................... 371
Restoring an SQL Server database in a cascade configuration ............................................... 371
Backing up and restoring using a tape backup management software that cannot link with Application
Agent .................................................................................................................................... 376
Backing up and restoring an SQL Server database by using a file share ........................................ 377
Preparing to back up or restore by using a file share ............................................................. 378
Backing up an SQL Server database by using a file share ..................................................... 379
Example of restoring a database by using a file share ........................................................... 379
Restoring data to an SQL Server instance that is different from the backup source ............................ 380
System configuration ......................................................................................................... 380
Operation flow ................................................................................................................ 381
Preparations for restoration (recovery) ........................................................................... 381
Operations for restoration (recovery) ............................................................................ 382
Operation example .......................................................................................................... 382
Example of restoring an SQL Server database from tape and recovering on the secondary
volume ..................................................................................................................... 382
Example of restoring (recovering) an SQL Server database on the log distribution
destination ................................................................................................................ 383
Example of restoring (recovering) an SQL Server database on the primary volume ............. 383
Deleting backup data .............................................................................................................. 383
Making an SQL Server database backed up to a secondary volume available for use ..................... 384
System configuration ......................................................................................................... 384
User script example .......................................................................................................... 386
script1.txt (used for data mining) .................................................................................. 386
script2.txt (used for backup) ........................................................................................ 387
Example ......................................................................................................................... 388
Backing up and restoring when using an SQL Server replication configuration ................................ 388
System configuration ......................................................................................................... 388
Requirements for the publication database and the distribution database .......................... 389
Requirements for the subscription database ................................................................... 390
Example ......................................................................................................................... 390
Back up the databases ............................................................................................... 390
Back up the transaction logs of the publication database ................................................ 391
Prepare for database restoration .................................................................................. 391
Restore the databases ................................................................................................. 392
Perform database recovery .......................................................................................... 393
Prepare to restart operations ....................................................................................... 393
Setting and checking the 'sync with backup' option .............................................................. 393
How to set the 'sync with backup' option ...................................................................... 394
How to check the 'sync with backup' option .................................................................. 394
Backing up and restoring in an SQL Server AlwaysOn availability group configuration .................... 394
System configuration ......................................................................................................... 394
Backing up and restoring a user database to the active server ................................................ 395
Restoring a user database to the standby server from the active server ..................................... 396
Restoring a user database to the secondary-use server from the active server ............................ 398
7 Operation for Exchange databases .................................................. 401
10
Backing up and restoring a storage group ................................................................................. 401
Precautions when backing up an Exchange database ........................................................... 401
Precautions when restoring an Exchange database ............................................................... 402
Precautions when restoring from a tape ......................................................................... 402
Note on performing a recovery using roll forward .......................................................... 402
Procedure for handing the message (KAVX1510-E) ........................................................ 402
Notes on restoring data obtained with a VSS backup ..................................................... 403
Procedure for when the Information Store cannot be mounted .......................................... 403
Precautions on recovery storage groups and recovery databases ............................................ 404
Precautions when configuring volumes ................................................................................ 404
Precautions on database verification ................................................................................... 404
Backing up and restoring data between volumes without using VSS ............................................... 404
System configuration ......................................................................................................... 404
Processing flow ................................................................................................................ 405
Backing up storage groups to a secondary volume ............................................................... 406
Restoring storage groups to a primary volume ...................................................................... 407
Backing up and restoring data between volumes by using VSS ..................................................... 407
System configuration ......................................................................................................... 407
Processing flow ................................................................................................................ 408
Backing up storage groups to a secondary volume ............................................................... 409
Restoring storage groups to a primary volume ...................................................................... 410
Backing up and restoring by using a tape device ........................................................................ 410
System configuration ......................................................................................................... 410
Processing flow ................................................................................................................ 412
Backing up storage groups to tape ..................................................................................... 414
Resynchronizing copy groups ...................................................................................... 414
Cold backup ............................................................................................................. 415
Online backup .......................................................................................................... 416
Backup using VSS ...................................................................................................... 417
Restoring storage groups from tape ..................................................................................... 419
Backing up a storage group by using a user script ...................................................................... 421
System configuration ......................................................................................................... 421
Processing flow ................................................................................................................ 421
User script example .......................................................................................................... 422
Backup execution example ................................................................................................ 423
Restoring by using transaction logs (Roll-forward) ........................................................................ 424
System configuration ......................................................................................................... 425
Rolling forward the transaction logs at the time of restoration ................................................. 426
Backing up and restoring between local sites and remote sites ...................................................... 427
Backing up storage groups to a remote site .......................................................................... 428
Operations at the local site ......................................................................................... 429
Operations at the remote site ...................................................................................... 430
Operations at the local site ......................................................................................... 431
Restoring a storage group to a local site .............................................................................. 431
Operations at the remote site ...................................................................................... 432
Operations at the local site ......................................................................................... 433
Backing up and restoring in a cascade configuration .................................................................. 434
Backing up concurrently at both local and remote sites .......................................................... 436
Operation at the local site .......................................................................................... 436
Operation at both the local and remote sites ................................................................. 438
Restoring data using the backup data at the local site ........................................................... 442
Restoring data using the backup data at the remote site ........................................................ 446
Backing up and restoring in a CCR configuration ........................................................................ 450
Using different backup servers for the active and standby servers ............................................ 452
Performing a backup on the active server ...................................................................... 453
Application Agent CLI User Guide 11
Performing a backup on the standby server ................................................................... 457
Restoring data when using the automatic seed function ......................................................... 461
Restoring backup data acquired on the active server (when the automatic seed function is
used) ........................................................................................................................ 461
Restoring backup data acquired on the standby server (when the automatic seed function is
used) ........................................................................................................................ 465
Restoring data when not using the automatic seed function .................................................... 469
Restoring backup data acquired on the active server (when the automatic seed function is not
used) ........................................................................................................................ 469
Restoring backup data acquired on the standby server (when the automatic seed function is
not used) .................................................................................................................. 473
Backing up and restoring in SCR configurations .......................................................................... 477
System configuration ......................................................................................................... 477
Backing up in an SCR configuration .................................................................................... 478
Roll-forward recovery on backed up data acquired in an SCR configuration ............................. 482
Point-in-time restoration when not using the SCR seed function ................................................ 486
Point-in-time restoration when using the SCR seed function ..................................................... 489
Backing up and restoring in DAG configurations ......................................................................... 492
System Configuration ........................................................................................................ 492
Backing up active mailbox database copies ........................................................................ 494
Backing up passive mailbox database copies ...................................................................... 497
Restoring backup data of an active mailbox database copy ................................................... 500
Restoring backup data of a passive mailbox database copy .................................................. 503
Backing up and restoring storage groups using a tape backup management software that is unable to
link with Application Agent ...................................................................................................... 506
Backing up and restoring storage groups by using a file share ...................................................... 507
Preparing to use a file share for storage group backup and restore ......................................... 508
Example of using a file share for storage group backup ......................................................... 508
Example of using a file share for storage group restoration .................................................... 509
Deleting backup data .............................................................................................................. 509
8 Troubleshooting ............................................................................. 511
Troubleshooting procedure ....................................................................................................... 511
Troubleshooting extended commands ........................................................................................ 511
Data required for troubleshooting .............................................................................................. 512
Data required for troubleshooting ....................................................................................... 512
OS log information .................................................................................................... 512
Application Agent information ..................................................................................... 513
RAID Manager information ......................................................................................... 515
Database information (when the backup is of an SQL Server database or Exchange
database) ................................................................................................................. 516
Other information ...................................................................................................... 516
Operation details ....................................................................................................... 516
Log files output by extended commands .............................................................................. 516
Adjusting trace log settings ...................................................................................................... 519
Adjusting the output level for detailed trace log information ................................................... 519
Adjusting the number of log files for detailed trace log information ......................................... 519
Investigating collected data ...................................................................................................... 519
Investigating standard output logs ....................................................................................... 520
Investigating the trace logs for Application Agent-cooperative software .................................... 520
Investigating the detailed trace log ..................................................................................... 520
Troubleshooting dictionary map file errors .................................................................................. 522
Verifying dictionary map files ............................................................................................. 523
Restoring key definition files (.KDF) ..................................................................................... 524
12
Restoring key files (.K01 or .Knn) ........................................................................................ 524
Restoring missing data files (.DRF or .DAT) ........................................................................... 525
When data file (.DRF or .DAT) backups exist ................................................................. 525
When data file (.DRF or .DAT) backups do not exist ....................................................... 525
Restoring incorrect data files (.DRF or .DAT) ......................................................................... 525
Displaying dictionary map file information or backup information ........................................... 526
Recreating dictionary map files .......................................................................................... 527
9 Support and other resources ............................................................ 529
Contacting HP ........................................................................................................................ 529
HP technical support ......................................................................................................... 529
Subscription service .......................................................................................................... 529
Documentation feedback ................................................................................................... 529
Related information ................................................................................................................. 529
Conventions ........................................................................................................................... 530
A Example of an Application Agent environment configuration ............... 533
System configuration ............................................................................................................... 533
Server configuration ......................................................................................................... 534
Storage system configuration ............................................................................................. 535
Example settings for the RAID Manager configuration definition file ............................................... 536
Example settings for the Application Agent configuration definition file (init.conf) ............................ 539
Example settings for the RAID Manager-linkage definition file (DEFAULT.dat) ................................... 540
Example of creating dictionary map files .................................................................................... 541
Example of registering SQL Server information ............................................................................ 541
Example settings for linkage to tape backup management software ............................................... 542
Example registering information for linkage to the tape backup management software .............. 543
Example of the configuration definition file for tape backup ................................................... 543
Example settings for the host environment settings file .................................................................. 544
Example settings for an operation definition file .......................................................................... 544
Example settings for a copy-group list file ................................................................................... 545
B List of files used in Application Agent ................................................ 547
List of files used in Application Agent ........................................................................................ 547
C Replacing primary and secondary volume disks while Application Agent
is running ........................................................................................ 553
Replacing primary and secondary volume disks while Application Agent is running ........................ 553
Procedure for replacing a primary volume disk ........................................................................... 553
Procedure for replacing a secondary volume disk ....................................................................... 556
D Restoring from a tape directly to a primary volume in a Fast Snap or
Snapshot configuration ...................................................................... 559
Example of Fast Snap or Snapshot configuration ......................................................................... 559
Procedure for backing up to tape on the backup server ................................................................ 559
Procedure for restoring from tape directly to the primary volume .................................................... 560
E Correspondence to Replication Manager GUI terms ............................ 561
Correspondence to Replication Manager GUI terms .................................................................... 561
Application Agent CLI User Guide 13
Glossary .......................................................................................... 563
Index ............................................................................................... 567
14
Figures
11
12
Overview of Application Agent ................................................................................. 28 1
Logical volume consisting of multiple copy groups ...................................................... 30 2
Data management at a remote site ........................................................................... 32 3
Backing up multiple generations .............................................................................. 33 4
Backing up multiple generations when a copy group is locked ..................................... 34 5
Example of a system configured to back up and restore data within a storage system ....... 36 6
Continuous Access Software or Continuous Access Journal system configuration .............. 37 7
Business Copy and Continuous Access Software multi-target configuration ...................... 38 8
Business Copy and Continuous Access Journal multi-target configuration ........................ 39 9
Continuous Access Software and Continuous Access Journal multi-target configuration ..... 40 10
Business Copy (multi-generation), Continuous Access Software, or Continuous Access
Journal configuration ............................................................................................... 41
Example of configuration for concurrent backup from multiple primary volumes to multiple
secondary volumes (remote copy) ............................................................................. 42
Example of a system configured with a tape device ..................................................... 43 13
Example of a cluster configuration of the operation standby type (Active-Passive) ............. 44 14
Example of a cluster configuration of the mutual standby type (Active-Active) .................. 45 15
Example of a system configured to use VSS to back up data ........................................ 46 16
Example of a system configured to restore data on a host that differs from the host used
17
for backup ............................................................................................................. 48
Example of a system configuration for the log-shipping functionality ............................... 49 18
Example of a cascade configuration (when the backup is of an SQL Server database) ..... 50 19
Example of a multi-target configuration (when the backup is of an SQL Server
20
database) .............................................................................................................. 51
Allocation of database configuration files ................................................................... 55 21
When multiple database configuration files are allocated to a volume ........................... 55 22
Metafile allocation .................................................................................................. 56 23
Metafile allocation (in the cluster configuration) ........................................................... 57 24
Example of a cascade configuration (when backing up Exchange databases) ................. 58 25
Example of a CCR configuration (only the active server is used) .................................... 59 26
Example of a CCR configuration (only the standby server is used) ................................. 60 27
Example of a CCR configuration (active and standby servers use different backup
28
servers) .................................................................................................................. 60
Application Agent CLI User Guide 15
Example of a CCR configuration (active and standby servers use the same backup
29
server) ................................................................................................................... 61
Example of an SCR configuration .............................................................................. 62 30
Configuration in which an active mailbox database copy Is backed up and restored ....... 64 31
Configuration in which a passive mailbox database copy Is backed up and restored ....... 65 32
Configuration in which an active mailbox database copy and a passive mailbox database
33
copy are backed up and restored by different backup servers ....................................... 66
Configuration in which an active mailbox database copy and a passive mailbox database
34
copy are backed up and restored by the same backup server ....................................... 67
Restoration in units of Information Stores (when the backup target is an Exchange
35
database) .............................................................................................................. 74
Configuration for managing the primary volume and secondary volume from the same
36
server (without using Application Agent) .................................................................... 80
System configuration (when the primary volume for Business Copy and the primary volume
37
for Continuous Access Software are the same LDEV) .................................................... 82
System configuration (when the secondary volume for Business Copy and the primary
38
volume for Continuous Access Software are the Same LDEV) ......................................... 83
System configuration (In a Business Copy cascade configuration, when the volume subject
39
to backup operates both as the primary volume and the secondary volume) ................... 84
In XP Continuous Access Asynchronous/Continuous Access Journal configuration: restoring
40
UserDB1 and UserDB2 together or separately ............................................................ 86
In XP Continuous Access Asynchronous/Continuous Access Journal configuration: restoring
41
UserDB1 and UserDB2 together ................................................................................ 86
Examples of a disk set configuration and of a relationship between a disk group and a
42
disk set .................................................................................................................. 88
Examples of disk group configurations usable by Application Agent .............................. 89 43
Data backup and restoration in a system configuration where multiple disk groups exist
44
in a file system ........................................................................................................ 90
Configuration example of a mounted directory that becomes a backup target ................. 92 45
Configuration example of a mounted directory that does not become a backup target ..... 92 46
Volume configuration and configuration definition to back up one primary volume to
47
multiple generations .............................................................................................. 101
Volume configuration and configuration definition to back up multiple primary volumes
48
to a single generation ........................................................................................... 102
Volume configuration and configuration definition to back up multiple primary volumes
49
to multiple generations .......................................................................................... 103
Example of a configuration definition for backup or restore between storage systems ..... 104 50
Configuration definition for a multi-target configuration and a cascade configuration ..... 106 51
16
Example of specifying a RAID Manager instance number in the RAID Manager-linkage
52
definition file (DEFAULT.dat) .................................................................................... 118
Example of creating dictionary map files in an Active-Passive cluster configuration ......... 131 53
Example of creating dictionary map files in an Active-Active cluster configuration .......... 133 54
Cluster group definition (when a backup target and shared disks are in the same cluster
55
group) ................................................................................................................. 138
Cluster Group Definition (When a Backup Target and Shared Disks are in Different Cluster
56
Groups) ............................................................................................................... 139
Example of deploying operation definition files (cluster configuration when the backup is
57
of a file system) ..................................................................................................... 187
Example of locations of operation definition files (when the backup is of an SQL Server
58
database) ............................................................................................................ 192
Example of locations of operation definition files (when the backup is of an Exchange
59
database) ............................................................................................................ 197
Protecting backup information for disk backups ......................................................... 215 60
Protecting backup information for tape backups ........................................................ 217 61
Correspondence of backup catalog and copy group ................................................. 227 62
Disk group configuration that does not allow backup ................................................. 233 63
System configuration for backing up and restoring data between volumes (when the backup
64
is of a file system) ................................................................................................. 247
Procedure for backing up a file system to the secondary volume .................................. 248 65
Procedure for restoring a file system to the primary volume ......................................... 248 66
System configuration for backing up a file system to tape and restoring it from tape ....... 250 67
Procedure for backing up a file system to tape .......................................................... 252 68
Procedure for restoring a file system from tape .......................................................... 252 69
System configuration for backup of a file system to tape ............................................. 259 70
Processing flow ..................................................................................................... 260 71
System configuration for backing up and restoring a file system between a local site and
72
a remote site ........................................................................................................ 265
Backing up and restoring multiple databases (same volume configuration) .................... 280 73
Backing up and restoring multiple databases (multiple volume configuration) ................ 280 74
Tape restoring multiple databases (multiple volume configuration) ................................ 281 75
Database statuses during restoration and recovery .................................................... 282 76
Transaction log backups after roll-forward (1) ........................................................... 284 77
Transaction log backups after roll-forward (2) ........................................................... 284 78
Transaction log backup error after roll-forward .......................................................... 285 79
Order of applying transaction log backups (1) .......................................................... 285 80
Order of applying transaction log backups (2) .......................................................... 286 81
System configuration for backing up and restoring data between volumes (when the backup
82
is of an SQL server database) ................................................................................. 292
Procedure for backing up an SQL Server database to the secondary volume ................ 293 83
Procedure for restoring an SQL Server database to the primary volume ........................ 293 84
System configuration for backing up an SQL Server database to tape and restoring it from
85
tape .................................................................................................................... 297
Application Agent CLI User Guide 17
Procedure for restoring an SQL Server database to the primary volume ........................ 299 86
Procedure for restoring an SQL Server database from its backup tape .......................... 300 87
System configuration for backup of an SQL Server database to tape ............................ 307 88
Processing flow ..................................................................................................... 308 89
System configuration for operations using the SQL Server transaction log ..................... 311 90
Operation using transaction log backups ................................................................. 312 91
Operations using SQL Server transaction log backup (restoring a database to the state it
92
was immediately before failure) .............................................................................. 317
Backing up SQL Server transaction log backup files ................................................... 319 93
Example of operation in which a particular copy group is locked ................................ 324 94
System configuration for backing up and restoring an SQL Server database between a
95
local site and a remote site .................................................................................... 328
System configuration for backing up an SQL Server database to tape and restoring it from
96
tape in a multi-target configuration .......................................................................... 336
System configuration for restoring and recovering from a host not used for backup (when
97
backing up) ......................................................................................................... 342
System configuration for restoring and recovering from a host not used for backup (when
98
restoring) ............................................................................................................. 343
System configuration for log-shipping operations ....................................................... 347 99
System configuration for setting a distribution target server to be an operating server ..... 351 100
Sample configuration for backing up to a secondary volume at a remote site (cascade
101
configuration) ....................................................................................................... 352
Points in time at which a user script is executed ......................................................... 357 102
Sample cascade configuration ................................................................................ 358 103
Flow of script-specified operations performed when local backup is not involved ........... 360 104
Flow of script-specified operations performed when local backup is involved ................. 364 105
System configuration using file sharing to back up and restore an SQL Server
106
database ............................................................................................................. 378
System configuration for restoring data to an SQL Server instance different from the backup
107
source ................................................................................................................. 381
System configuration for restoring to an SQL Server instance that is different from the
108
backup source (using a user script) .......................................................................... 385
Configuration for using the SQL Server replication function ......................................... 389 109
Configuration of backup server for the publisher/distributor server .............................. 390 110
Operation when using Application Agent on an SQL Server in an AlwaysOn availability
111
group configuration ............................................................................................... 395
18
System configuration for backing up and restoring data between volumes without using
112
VSS (when an Exchange database is backed up) ...................................................... 405
Processing flow for backing up storage groups to a secondary volume ......................... 406 113
Processing flow for restoring storage groups on the primary volume ............................. 406 114
System configuration for backing up and restoring data between volumes by using VSS
115
(when an Exchange database is backed up) ............................................................. 408
Processing flow for backing up storage groups to a secondary volume ......................... 409 116
Processing flow for restoring storage groups on the primary volume ............................. 409 117
System configuration for backing up and restoring storage groups to and from tape ...... 411 118
Processing flow for backing up storage groups to tape ............................................... 413 119
Processing flow for restoring storage groups from tape ............................................... 414 120
System configuration for backup of a storage group to tape ........................................ 421 121
Processing flow ..................................................................................................... 422 122
Flow of operation using transaction logs .................................................................. 424 123
System configuration for restoring data in units of Information Stores by applying transaction
124
logs .................................................................................................................... 425
System configuration for backing up and restoring a storage group between a local site
125
and a remote site .................................................................................................. 427
Example of a system for backing up and restoring data in a cascade configuration ....... 435 126
Example of a system for backing up and restoring data in a CCR configuration ............ 451 127
System configuration for an SCR system ................................................................... 477 128
System configuration for backing up and restoring data in a DAG configuration ............ 493 129
System configuration (for the example Application Agent environment configuration) ...... 534 130
Example of replacing a primary volume disk ............................................................ 554 131
Example of replacing a secondary volume disk ......................................................... 556 132
Application Agent CLI User Guide 19
Tables
10
Types of data subject to backup in the SQL Server database ......................................... 51 1
Comparison of DAG configurations ........................................................................... 68 2
Types of data subject to backup in the Exchange database ........................................... 69 3
Approximate amount required to verify Exchange Server 2003 database for backup by
4
using VSS .............................................................................................................. 72
Approximate amount required to verify Exchange Server 2007 database for backup by
5
using VSS .............................................................................................................. 72
Approximate amount required to verify Exchange Server 2010 database for backup by
6
using VSS .............................................................................................................. 73
Conditions for allocating files when restoring backup data in units of Information
7
Stores .................................................................................................................... 74
Volume configurations that Application Agent can back up and restore .......................... 87 8
Application Agent environment setup tasks needed for each kind of server ..................... 97 9
Parameters in init.conf (to set the retry count and retry interval for checking the status of
cluster resources) ................................................................................................... 107
CLU_RETRY_WAIT value for each type of cluster software ........................................... 107 11
Parameters in init.conf (to specify the retry count and retry interval for checking the status
12
of a process) ........................................................................................................ 108
Parameters in init.conf (to specifying a retry count and a retry interval for command
13
execution status retries checking) ............................................................................. 109
Parameter in init.conf (backup option) ...................................................................... 109 14
Parameter in init.conf (dictionary map synchronization option) .................................... 110 15
Parameter in init.conf (recovery option) .................................................................... 110 16
Parameter in init.conf (setting up restoration when the cluster resources are in the online
17
state) ................................................................................................................... 111
Parameter in CLU_MSCS_RESTORE and cluster resource status (file system) ................... 111 18
Parameter in CLU_MSCS_RESTORE and cluster resource status (SQL Server database
19
1) ....................................................................................................................... 112
Parameter in CLU_MSCS_RESTORE and cluster resource Status (SQL Server database
20
2) ....................................................................................................................... 113
Parameter in CLU_MSCS_RESTORE and cluster resource status (Exchange database) ...... 113 21
Parameter in init.conf (setup of parallel execution of verification processes) ................... 114 22
Parameter in init.conf (setting the communication timeout period for the Protection Manager
23
service) ................................................................................................................ 114
Parameters in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify an
24
instance number) .................................................................................................. 116
20
Parameters in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify the retry
25
count and retry interval for checking the status of a pair) ............................................ 119
Values in the RETRY_WAIT parameter set for each storage system ................................ 119 26
Parameters in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify the retry
27
count and interval for checking the pair status according to the purpose) ..................... 120
Parameters in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify a retry
28
count and a retry interval for RAID Manager command busy status retries checking) ...... 123
Parameter in copy parameter definition files ............................................................. 124 29
Parameter in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify the track
30
size used when copying data) ................................................................................ 126
Parameter in the RAID Manager-linkage definition file (DEFAULT.dat) (to specify whether
31
to create a pair automatically) ................................................................................ 127
Parameters in the RAID Manager-linkage definition file (DEFAULT.dat) (settings for using
32
the secondary volume dynamic recognition functionality) ........................................... 127
Parameter in the RAID Manager-linkage definition file (DEFAULT.dat) (settings for operation
33
mode when automatically selecting copy groups) ...................................................... 128
Parameter in the RAID Manager-linkage definition file (DEFAULT.dat) (specifying the
34
installation path for RAID Manager) ........................................................................ 129
Parameter in the RAID Manager-linkage definition file (DEFAULT.dat) (specifying
35
modification of the pair status if an error occurs) ....................................................... 129
Directories that need to be created on a shared disk and locations of explanations on
36
how to create the directories ................................................................................... 137
Parameters for the cluster software ........................................................................... 140 37
Relationship between SQL_AUTORECOVERY_TIME parameter and restored objects ....... 144 38
Parameter defined in the sqlinit_instance-name.conf file (specification of SQL Server login
39
timeout option) ..................................................................................................... 146
Parameter defined in the sqlinit_instance-name.conf file (specification of SQL Server
40
automatic recovery time) ........................................................................................ 146
Default settings for Windows services related to P9000 RMXP Shadow Copy Provider .... 147 41
vsscom.conf parameters ......................................................................................... 148 42
System environment variables required to use VSS (file server or database server) .......... 149 43
System environment variables required to use VSS (backupserver) ................................ 149 44
System environment variables required to use VSS (file server or database server) .......... 150 45
System environment variables required to use VSS (backup server) ............................... 151 46
Parameters defined in the definition file for the cascade configuration .......................... 152 47
How the -cascade option and the sections are evaluated ............................................ 154 48
Parameters to be defined in the configuration definition file for tape backup (for
49
NetBackup) .......................................................................................................... 156
Parameters defined in the configuration file for tape backup (for Backup Exec) .............. 158 50
How to determine a mount point when the command for mounting a secondary volume
51
is executed (with a backup id specified in the option) ................................................. 179
Application Agent CLI User Guide 21
How to determine a mount point when the command for mounting a secondary volume
52
is executed (when a copy group is specified for an option) ......................................... 180
How to determine a mount target when the command for mounting a secondary volume
53
is executed ........................................................................................................... 181
Extended command execution preparation tasks needed for each kind of server ........... 181 54
Value and maximum value length of each entry in a host environment settings file ......... 185 55
Example: contents and maximum value length of each entry in an operation definition file
56
(when the backup is of a file system) ........................................................................ 188
Cluster Resources (In cluster configuration when the backup is of a file system) .............. 189 57
Operation IDs for which an operation definition file is created (in cluster configuration
58
when the backup is of a file system) ......................................................................... 190
Contents and maximum value length of each entry in an operation definition file (when
59
the backup is of an SQL Server database) ................................................................ 193
Cluster resources (when the backup is of an SQL Server database) .............................. 194 60
Example of VDI metafile storage directory ................................................................ 195 61
Operation IDs for which to create operation definition files (when the backup is of an SQL
62
Server and in a cluster configuration) ....................................................................... 195
Contents and maximum value length of each entry in an operation definition file (when
63
the backup is of an Exchange database) .................................................................. 197
Cluster resources (when the backup is of an Exchange database) ................................ 199 64
Operation IDs for which an operation definition file is created (when the backup is of an
65
Exchange database and in a cluster configuration) .................................................... 200
Naming conventions for the temporary directory for extended commands .................... 201 66
Naming conventions for the temporary directory for extended commands .................... 201 67
Directories used for inter-server FTP transmission and reception ................................... 202 68
Directories used for inter-server FTP transmission and reception ................................... 202 69
Coding rules for user scripts ................................................................................... 203 70
Entries in user scripts ............................................................................................. 204 71
Script environment variables ................................................................................... 210 72
Commands that can be specified in user pre-processing and user post-processing ......... 211 73
Examples of user script usage ................................................................................. 212 74
mail.conf parameters ............................................................................................. 212 75
Parameters in the Exchange environment configuration file .......................................... 219 76
Correspondence between extended commands and basic commands (commands used
77
for backing up and restoring file systems) ................................................................. 222
Correspondence between extended commands and basic commands (Common
78
commands) .......................................................................................................... 222
22
Correspondence between extended commands and basic commands (Tape
79
commands) .......................................................................................................... 223
Correspondence between extended commands and basic commands (Utility
80
commands) .......................................................................................................... 224
Correspondence between extended commands and basic commands (SQL server
81
database) ............................................................................................................ 224
Correspondence between extended commands and basic commands (Exchange
82
database) ............................................................................................................ 225
Required permissions for each command (commands used when backing up and restoring
83
a file system) ........................................................................................................ 234
Required permissions for each command (common system commands) ......................... 234 84
Required permissions for each command (tape system commands) .............................. 235 85
Required permissions for each command (utility commands) ....................................... 236 86
Required permissions for each command (when the backup target is an SQL server
87
database) ............................................................................................................ 236
Required permissions for each command (when the backup target is an exchange
88
database) ............................................................................................................ 236
Possibility of concurrent execution with other commands (commands used when backing
89
up and restoring a file system) ................................................................................ 237
Possibility of concurrent execution with other commands (common commands) .............. 238 90
Possibility of concurrent execution with other commands (tape-related commands) ......... 238 91
Possibility of concurrent execution with other commands (utility commands) ................... 239 92
Possibility of concurrent execution with other commands (when the backup is of an SQL
93
Server database) .................................................................................................. 239
Possibility of concurrent execution with other commands (when the backup is of an
94
Exchange database) ............................................................................................. 240
Functions that require that the Protection Manager service be running .......................... 242 95
User script creation example ................................................................................... 260 96
Relationship between the status of the SQL Server service and the executable
97
command ............................................................................................................ 286
SQL Server database status where a command can be executed (1) ............................ 287 98
SQL Server database status where a command can be executed (2) ............................ 289 99
Relationship between the type of the sql server database and executable commands ..... 290 100
User script creation example ................................................................................... 308 101
Sample script for when a local backup is not performed ............................................. 360 102
Sample script for when a local backup is performed .................................................. 364 103
User script creation example ................................................................................... 422 104
OS log information .............................................................................................. 512 105
Application Agent information ................................................................................ 513 106
RAID Manager information .................................................................................... 515 107
Database information (when the backup is of an SQL Server database or Exchange
108
database) ............................................................................................................ 516
Other information ................................................................................................. 516 109
Items that are output to the log file for extended commands ........................................ 517 110
Application Agent CLI User Guide 23
Items output to the detailed trace log ....................................................................... 521 111
Sources of messages (controlled objects) and corresponding message IDs .................... 521 112
Commands for displaying dictionary map file information .......................................... 526 113
Commands for displaying backup information .......................................................... 526 114
Product reference conventions ................................................................................. 530 115
Server configuration (for the example Application Agent environment configuration) ...... 534 116
Storage system volume configuration (for the example Application Agent environment
117
configuration) ....................................................................................................... 535
Examples of shared directory usage (for the example Application Agent environment
118
configuration) ....................................................................................................... 536
List of files used in Application Agent ....................................................................... 547 119
Correspondence of Replication Manager GUI and Application Agent command line
120
interface terms ...................................................................................................... 561
24
Preface
This guide describes how to manage HP P9000 Replication Manager Software.
Application Agent CLI User Guide 25
Preface 26
1 Overview of Application Agent
Application Agent is designed to reduce the workload on system administrators and to provide efficient
and reliable data protection. This chapter describes the features and functions of Application Agent.
The descriptions in this chapter apply to the Application Agent CLI.
Application Agent features
Application Agent is a software package that simplifies data maintenance operations, especially
those dealing with backup and restoration. Application Agent ensures the protection of important
data while minimizing the effect on other jobs that are being processed. In addition, Application
Agent reduces the workload on system administrators and the cost of data management.
Modern day information systems for enterprises must be able to protect important data without adversely
affecting any other jobs that are concurrently processing. These systems must also be able to quickly
restart any jobs that are being executed, if and when an error occurs. To meet these demands, all
storage systems are RAID-compliant (managed via the RAID Manager software) and include volume
replication functions. These replication functions are able to quickly create a replica of a logical
volume within a storage system without the use of a host. A system administrator who manages
backups can use these functions to then back up the replica (the secondary volume) of a logical volume
(the primary volume) to a tape device without having to disconnect the primary volume from the system.
This allows the primary volume to continue being used for any other jobs that are still being processed.
Until now, system administrators had to deal with the following issues when using volume replication
functions to back up a database during online operations (also referred to as an online backup):
Extensive expertise is required:
To use the volume replication functions included in storage systems, you needed to have extensive
expertise in databases, file systems, the logical volume manager, and RAID devices.
Backup operations are complex:
To back up a database object, many complex operations, some of which are susceptible to human
error, must be performed. In addition, since backup operations differ depending on the type of
database application or file system, learning how to perform all the necessary operations is difficult
and time-consuming.
Application Agent resolves these two issues while enabling high-speed, reliable backup operations
that allow the user to get the most out of the available storage system functions.
Application Agent internally manages the relationships between the objects to be backed up and
their associated logical units among the RAID devices, the relationships between the primary and
secondary volumes, and the backup history. This information is contained in dictionary map files .
Application Agent references the dictionary map files in order to automatically control the database
and RAID devices, thus reducing the workload on system administrators and the storage system's
TCO.
The following figure provides an overview of how Application Agent interacts with various storage
media.
Application Agent CLI User Guide 27
Figure 1 Overview of Application Agent
The following describes how Application Agent controls other software components. The numbers
below correspond to those in the figure above:
1. Application Agent quiesces (pauses) file systems or databases in storage systems in order to
ensure reliable backup operations.
2. By using RAID Manager, Application Agent backs up or restores volumes that have already been
operated on using the functions built into the storage systems.
3. Application Agent operates in conjunction with other tape backup management software to
perform tape backup or restore operations.
NOTE:
Application Agent utilizes a CLI to communicate with RAID Manager and other tape backup
management software. RAID Manager and one other tape backup management software must be
installed before using Application Agent.
Application Agent functions
This section describes the key functions provided by Application Agent and their benefits.
Backing up data
Application Agent provides two backup commands. One backup command uses the volume replication
function of the storage system to perform a high-speed disk copy operation. The other backup command
(in conjunction with another tape backup management software) backs up the data on the secondary
volume to a tape device. You can use whichever backup command most suits your specific needs.
Having two options for backups is useful because it decreases the amount of expertise required to
back up file systems or databases managed by DBMSs.
Overview of Application Agent 28
User script files are used to perform a series of backup operations to copy data from a primary volume
to a secondary volume, and then from the secondary volume to a tape device. Using these scripts
allows system administrators to accomplish a series of commands in just one command.
Restoring data
Application Agent provides various commands that use volume replication functions to restore a
database or file system from a backup. You can use whichever restore command most suits your
specific needs. Having two options for restoring data is useful because it decreases the amount of
expertise required to restore file systems or databases managed by DBMSs.
Managing data by using dictionary map files
Application Agent can detect a variety of configuration definitions required for backup or restore
operations, such as information about file systems and databases, and disk management information
about RAID devices. Application Agent uses this information and creates a series of files called the
dictionary map files .
Application Agent refers to the dictionary map files for using RAID Manager, which helps reduce the
workload on system administrators.
The dictionary map files consist of the following files:
Application map file
This file stores information about the relationships between objects in the target database (such
as journal logs) and their associated files.
Core map file
This file stores information about the relationships between mount point directories for file systems
and disk numbers across RAID devices.
Copy group map file
This file stores information about the connections (mapping) between primary and secondary
volumes.
Backup catalog
The backup catalog stores the Application Agent backup history and the information pertaining
to generational backups. When a backup is performed, a new record that contains information
about the backup is created in the backup catalog. When Application Agent restores data from
a backup, Application Agent references the information in the backup catalog.
Information stored in the backup catalog includes the following:
• Backup ID
• Backup start date and time
• Backup source information
• Backup destination information
The backup ID is an ID used to uniquely differentiate sets of backup data. Application Agent
automatically assigns a 10-digit backup ID whenever data is backed up, and registers the ID in
the backup catalog.
When there are multiple sets of backup data, either because you are managing generations
(multiple secondary volumes that are associated with a single primary volume), or because you
have backed up data from secondary volumes to a tape device (after making a backup from the
primary volume to the secondary volume), you can restore the desired data by specifying the
backup ID. You can also specify a backup comment, if you want to be able to specify backup
data via a fixed character string instead of the normal 10-digit backup ID.
Application Agent CLI User Guide 29
If you execute Application Agent commands in a cluster configuration, you must specify the location
of the dictionary map files to be used for each virtual server. For details on cluster configurations, see
“ Cluster support ” on page 30. For details on how to create the dictionary map files in a cluster
configuration, see “ Creating dictionary map files” on page 130.
Pair management using copy groups
In Application Agent, a primary and secondary volume pair whose synchronization is started and
stopped by using volume replication or RAID Manager functions is referred to as a copy group (or
pair volume ). The following figure shows a logical volume that consists of multiple copy groups.
Figure 2 Logical volume consisting of multiple copy groups
If the logical volume that contains the data you want to back up consists of more than one physical
volume, create a copy group (pair volume) for each of the primary and secondary physical volumes.
Application Agent can automatically manage multiple copy groups together in order to start and stop
the synchronization of the logical volume that you want to back up.
Copy group names consist of a RAID Manager group name (dev_group) and a RAID Manager pair
logical volume name (dev_name ). For example, if a dev_group is VG01 and a dev_name is dev01 ,
the copy group name will become VG01,dev01 .
Cluster support
Application Agent supports failover clustering, which is based on cluster software for a variety of
OSs. Applying the cluster configuration to file servers and database servers allows you to perform
backups without stopping the system, even if a failure occurs.
Application Agent comes with a function that can automatically control clusters, so that you can take
full advantage of the high-availability offered with cluster-based systems. In order to perform a cold
backup or restoration of a database, it must be taken offline. If a database is taken offline while the
cluster resources that are monitoring the DBMS are still online, a failover will occur. This usually results
in the need to control cluster resources manually. However, by utilizing the Application Agent function,
cluster resources that monitor the DBMS are automatically taken offline, and then put back online
whenever Application Agent is used to perform a cold backup or restore operation for data.
Overview of Application Agent 30