HP Data Protector A.06.11 Integration Manual page 4

For vmware virtual infrastructure, sybase, network node manager, and network data management protocol server
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

Configuring VMware users ........................................................................... 38
Configuring clusters ..................................................................................... 38
ESX Server systems in a cluster ............................................................... 38
Configuring backup proxy systems ................................................................ 39
Configuring VMware management clients ...................................................... 39
Using the Data Protector GUI ................................................................. 40
Using the Data Protector CLI .................................................................. 42
Configuring virtual machines ........................................................................ 43
Using the Data Protector GUI ................................................................. 43
Using the Data Protector CLI .................................................................. 46
Checking the configuration of VMware clients ................................................ 47
Using the Data Protector GUI ................................................................. 47
Using the Data Protector CLI .................................................................. 47
Backup ............................................................................................................ 48
What is backed up? .................................................................................... 48
Virtual machines .................................................................................. 49
Filesystems ........................................................................................... 49
Backup methods ......................................................................................... 49
Snapshot method ................................................................................. 50
Suspend method .................................................................................. 60
VCBimage method ............................................................................... 61
VCBfile method .................................................................................... 63
Backup types .............................................................................................. 65
Considerations ........................................................................................... 66
Creating backup specifications ..................................................................... 68
Modifying backup specifications ................................................................... 72
Scheduling backup specifications .................................................................. 72
Scheduling example ............................................................................. 72
Previewing backup sessions .......................................................................... 73
Using the Data Protector GUI ................................................................. 73
Using the Data Protector CLI .................................................................. 74
What happens during the preview? ........................................................ 74
Starting backup sessions .............................................................................. 74
Using the Data Protector GUI ................................................................. 74
Using the Data Protector CLI .................................................................. 75
Preparing for disaster recovery ..................................................................... 76
Restore ............................................................................................................. 77
Restore of virtual machines ........................................................................... 77
Application database: Datacenter .......................................................... 77
Application database: None (restore files to client) ................................... 78
Restore of filesystems ................................................................................... 78
Considerations ........................................................................................... 79
Finding information for restore ...................................................................... 79
4

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Data Protector A.06.11 and is the answer not in the manual?

Questions and answers

Table of Contents