beautypg.com

HP XP Command View Advanced Edition Software User Manual

Page 5

background image

Setting communication timeout periods for the Protection Manager service ............................... 114

Setting up Application Agent for linkage with RAID Manager ....................................................... 115

Specifying instance numbers .............................................................................................. 115
Specifying a retry count and interval for pair status retry checking .......................................... 117
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 122
Specifying a retry count and interval appropriate to operation style
........................................ 122
Specifying track sizes used when copying data .................................................................... 124
Specifying volume pair creation ......................................................................................... 125
Settings for using secondary volume dynamic recognition ...................................................... 126
Setting up operation mode when automatically selecting copy groups ..................................... 127
Notes on starting and stopping RAID Manager
.................................................................... 127
Specifying the installation path for RAID Manager ................................................................ 128
Specifying modification of pair status if a backup error occurs
................................................ 128

Creating dictionary map files ................................................................................................... 129

Creation in a non-cluster configuration or on a backup server ................................................ 129
Creation in an Active-Passive cluster configuration ................................................................. 130
Creation in an Active-Active cluster configuration .................................................................. 132
Creation in a cascade configuration for Exchange database backup ....................................... 134

Specifying cluster configuration settings and creating a definition file ............................................. 134

Settings related to shared disks and cluster groups ................................................................ 135

How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group)
............................................................................................................ 135
How to Define Cluster Groups (When a Backup Target and Shared Disks Are to Be in Separate
Cluster Groups)
......................................................................................................... 136

Creating a cluster information configuration definition file when using Veritas cluster server ........ 137

Creating a database configuration definition file ......................................................................... 139

Creating a configuration definition file for SQL Server database backup .................................. 139

Specifying settings related to linkage with an SQL Server ............................................................. 141
Specifying settings for using VSS ............................................................................................... 145

Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 147
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 148

Creating a cascade configuration definition file for Exchange database backup .............................. 150
Setting up linkage with a tape backup management software ....................................................... 153

Registering information for linkage with a tape backup management software .......................... 153
Creating a configuration definition file for tape backup ......................................................... 154

Configuration parameters ........................................................................................... 155
Configuration file examples ......................................................................................... 158
User-defined configuration definition file ....................................................................... 159

Creating a list file ................................................................................................................... 159

Creating a copy-group list file ............................................................................................ 159
Creating a database list file or mount point directory list file .................................................. 160

Commands that support a target definition file ............................................................... 160
File name of the list file ............................................................................................... 161
List file storage location
.............................................................................................. 161
Contents of the list file
................................................................................................ 161

Creating a transaction log list file ....................................................................................... 161

File name of the transaction log list file ......................................................................... 161
Transaction log list file storage location
......................................................................... 161
Contents of the transaction log list file ........................................................................... 162
Creation of a transaction log list file
............................................................................. 162

Updating a dictionary map file ................................................................................................. 163
Specifying how to mount a secondary volume
............................................................................ 163

Making the OS dynamically recognize the secondary volume ................................................ 164
Making the OS statically recognize the secondary volume ..................................................... 172
Determining a mount point and mount target when mounting a secondary volume .................... 176

Application Agent CLI User Guide

5