HP Data Protector A.06.11 Integration Manual page 476

Zero downtime backup for oracle, sap r/3, microsoft sql server, microsoft exchange server, and microsoft volume shadow copy service
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

Scheduler
secondary volume
(S-VOL)
session
session ID
session key
shadow copy
shadow copy
provider
476
Glossary
useful to perform a scan and check the actual media in the
device if someone has manually manipulated media without
using Data Protector to eject or enter, for example.
A function that controls when and how often automatic backups
occur. By setting up a schedule, you automate the start of
backups.
(HP StorageWorks Disk Array XP specific term) secondary
volumes, or S-VOLs, are XP LDEVs that act as a secondary CA
or BC mirror of another LDEV (a P-VOL). In the case of CA,
S-VOLs can be used as failover devices in a MetroCluster
configuration. The S-VOLs are assigned separate SCSI
addresses, different from the addresses used by the P-VOLs.
See also
primary volume (P-VOL)
See
backup session,media management
session.
An identifier of a backup, restore, object copy, object
consolidation, object verification, or media management session,
consisting of the date when the session ran and a unique
number.
This environment variable for the pre-exec and post-exec script
is a Data Protector unique identification of any session, including
preview sessions. The session key is not recorded in the
database, and it is used for specifying options for the omnimnt,
omnistat, and omniabort commands.
(Microsoft VSS specific term) A volume that represents a
duplicate of the original volume at a certain point in time. The
data is then backed up from the shadow copy and not from the
original volume. The original volume continues to change as
the backup process continues, but the shadow copy of the
volume remains constant.
See also
Microsoft Volume Shadow Copy Service
(Microsoft VSS specific term) An entity that performs the work
on creating and representing the volume shadow copies.
Providers own the shadow copy data and expose the shadow
copies. Providers can be software (for example, system
providers) or hardware (local disks, disk arrays).
See also
shadow
copy.
and
Main Control Unit (MCU)
session, and
and replica.
restore

Advertisement

Table of Contents
loading

Table of Contents