beautypg.com

See also, Selecting protection group members, Guidelines for protection groups – Dell PowerVault DP600 User Manual

Page 41

background image

41

Selecting a Data Protection Method

Defining Recovery Goals

Allocating Space for Protection Groups

Specifying Tape and Library Details

Choosing a Replica Creation Method

See Also

What Are Your Goals for Recovery?

What Do You Want to Protect?

Selecting Protection Group Members

With Data Protection Manager (DPM) 2007, there are several approaches you can take to

organize data sources into protection groups, including the following:

By computer, with all data sources for a computer belonging to the same protection group.

• An advantage of this approach is that with all data from a computer in the same

protection group, you have a single point of adjustment for performance loads.

• A constraint of this approach is that all data sources of a type on that computer must be

assigned the same recovery goals.

By data type, separating files and each application data type into different protection groups.

• An advantage of this approach is that you can manage data types as a group.
• A constraint of this approach is that recovering a server can require multiple tapes from

several protection groups.

By definition, all members of a protection group share recovery goals—that is, all data sources of

a type in a protection group must have the same retention range and data loss tolerance.

If you have only a single stand-alone tape, use a single protection group to minimize the effort to

change tapes. Multiple protection groups require a separate tape for each protection group.

Guidelines for Protection Groups

As you design the structure of your protection groups, keep the following guidelines and

restrictions in mind:

• Data sources on a computer must be protected by the same DPM server. In DPM, a data

source is a volume, share, database, or storage group that is a member of a protection

group.

• You can include data sources from more than one computer in a protection group.
• When you select a parent folder or share, its subfolders are automatically selected. You can

designate subfolders for exclusion and also exclude file types by extension.