HP XP Command View Advanced Edition Software User Manual
Page 5

Setting communication timeout periods for the Protection Manager service ............................... 114
Setting up Application Agent for linkage with RAID Manager ....................................................... 115
Specifying instance numbers .............................................................................................. 115
Specifying a retry count and interval for pair status retry checking .......................................... 117
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 122
Specifying a retry count and interval appropriate to operation style ........................................ 122
Specifying track sizes used when copying data .................................................................... 124
Specifying volume pair creation ......................................................................................... 125
Settings for using secondary volume dynamic recognition ...................................................... 126
Setting up operation mode when automatically selecting copy groups ..................................... 127
Notes on starting and stopping RAID Manager .................................................................... 127
Specifying the installation path for RAID Manager ................................................................ 128
Specifying modification of pair status if a backup error occurs ................................................ 128
Creating dictionary map files ................................................................................................... 129
Creation in a non-cluster configuration or on a backup server ................................................ 129
Creation in an Active-Passive cluster configuration ................................................................. 130
Creation in an Active-Active cluster configuration .................................................................. 132
Creation in a cascade configuration for Exchange database backup ....................................... 134
Specifying cluster configuration settings and creating a definition file ............................................. 134
Settings related to shared disks and cluster groups ................................................................ 135
How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group) ............................................................................................................ 135
How to Define Cluster Groups (When a Backup Target and Shared Disks Are to Be in Separate
Cluster Groups) ......................................................................................................... 136
Creating a cluster information configuration definition file when using Veritas cluster server ........ 137
Creating a database configuration definition file ......................................................................... 139
Creating a configuration definition file for SQL Server database backup .................................. 139
Specifying settings related to linkage with an SQL Server ............................................................. 141
Specifying settings for using VSS ............................................................................................... 145
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 147
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 148
Creating a cascade configuration definition file for Exchange database backup .............................. 150
Setting up linkage with a tape backup management software ....................................................... 153
Registering information for linkage with a tape backup management software .......................... 153
Creating a configuration definition file for tape backup ......................................................... 154
Configuration parameters ........................................................................................... 155
Configuration file examples ......................................................................................... 158
User-defined configuration definition file ....................................................................... 159
Creating a list file ................................................................................................................... 159
Creating a copy-group list file ............................................................................................ 159
Creating a database list file or mount point directory list file .................................................. 160
Commands that support a target definition file ............................................................... 160
File name of the list file ............................................................................................... 161
List file storage location .............................................................................................. 161
Contents of the list file ................................................................................................ 161
Creating a transaction log list file ....................................................................................... 161
File name of the transaction log list file ......................................................................... 161
Transaction log list file storage location ......................................................................... 161
Contents of the transaction log list file ........................................................................... 162
Creation of a transaction log list file ............................................................................. 162
Updating a dictionary map file ................................................................................................. 163
Specifying how to mount a secondary volume ............................................................................ 163
Making the OS dynamically recognize the secondary volume ................................................ 164
Making the OS statically recognize the secondary volume ..................................................... 172
Determining a mount point and mount target when mounting a secondary volume .................... 176
Application Agent CLI User Guide
5