See also, Selecting protection group members, Guidelines for protection groups – Dell PowerVault DP600 User Manual
Page 41

41
Selecting a Data Protection Method
Allocating Space for Protection Groups
Specifying Tape and Library Details
Choosing a Replica Creation Method
See Also
What Are Your Goals for Recovery?
Selecting Protection Group Members
With Data Protection Manager (DPM) 2007, there are several approaches you can take to
organize data sources into protection groups, including the following:
• By computer, with all data sources for a computer belonging to the same protection group.
• An advantage of this approach is that with all data from a computer in the same
protection group, you have a single point of adjustment for performance loads.
• A constraint of this approach is that all data sources of a type on that computer must be
assigned the same recovery goals.
• By data type, separating files and each application data type into different protection groups.
• An advantage of this approach is that you can manage data types as a group.
• A constraint of this approach is that recovering a server can require multiple tapes from
several protection groups.
By definition, all members of a protection group share recovery goals—that is, all data sources of
a type in a protection group must have the same retention range and data loss tolerance.
If you have only a single stand-alone tape, use a single protection group to minimize the effort to
change tapes. Multiple protection groups require a separate tape for each protection group.
Guidelines for Protection Groups
As you design the structure of your protection groups, keep the following guidelines and
restrictions in mind:
• Data sources on a computer must be protected by the same DPM server. In DPM, a data
source is a volume, share, database, or storage group that is a member of a protection
group.
• You can include data sources from more than one computer in a protection group.
• When you select a parent folder or share, its subfolders are automatically selected. You can
designate subfolders for exclusion and also exclude file types by extension.