HP Data Protector Introduction
HP Data Protector is a backup solution that
provides reliable data protection and high accessibility for your fast growing
business data. Data Protector offers comprehensive backup and restore
functionality specifically tailored for enterprise-wide and distributed
environments.
The Major Data Protector features:
Scalable and Highly Flexible Architecture
Data Protector can be used in environments
ranging from a single system to thousands of systems on several sites. Due to
the network component concept of Data Protector, elements of the backup
infrastructure can be placed in the topology according to user requirements.
The numerous backup options and alternatives to setting up a backup
infrastructure allow the implementation of virtually any configuration you
want. Data Protector also enables the use of advanced backup concepts, such as
synthetic backup and disk staging.
Easy Central Administration
Through its easy-to-use graphical user interface
(GUI), Data Protector allows you to administer your complete backup environment
from a single system. To ease operation, the GUI can be installed on various systems
to allow multiple administrators to access Data Protector via their locally
installed consoles. Even multiple backup environments can be managed from a
single system. The Data Protector command-line interface allows you to manage
Data Protector using scripts.
High Performance Backup
Data Protector enables you to perform backup to
several hundred backup devices simultaneously. It supports high-end devices in
very large libraries. Various backup possibilities, such as local backup,
network backup, online backup, disk image backup, synthetic backup, backup with
object mirroring, and built-in support for parallel data streams allow you to
tune your backups to best fit your requirements.
Data security
To enhance the security of your data, Data
Protector lets you encrypt your backups so that they become protected from
others. Data Protector offers two data encryption techniques: software-based
and drive-based.
Supporting Mixed Environments
As Data Protector supports heterogeneous
environments, most features are common to the UNIX and Windows platforms. The
UNIX and Windows Cell Managers can control all supported client platforms
(UNIX, Windows, and Novell NetWare). The Data Protector User interface can
access the entire Data Protector functionality on all supported platforms.
Easy Installation for Mixed Environments
The Installation Server concept simplifies the
installation and upgrade procedures. To remotely install UNIX clients, you need
an Installation Server for UNIX. To remotely install Windows clients, you need
an Installation Server for Windows. The remote installation can be performed
from any client with an installed Data Protector GUI.
High Availability Support
Data Protector enables you to meet the needs for
continued business operations around the clock. In today's globally distributed
business environment, company-wide information resources and customer service
applications must always be available. Data Protector enables you to meet high
availability needs by:
• Integrating with clusters to ensure fail-safe
operation with the ability to back up virtual nodes. For a list of supported
clusters, see the HP Data Protector Product Announcements, Software Notes, and
References.
• Enabling the Data Protector Cell Manager itself
to run on a cluster.
• Supporting all popular online database
Application Programming Interfaces.
• Integrating with advanced high-availability
solutions like EMC Symmetrix, HP StorageWorks P6000 EVA Disk Array Family, HP
StorageWorks P9000 XP Disk Array Family, or HP StorageWorks P4000 SAN
Solutions.
• Providing various disaster recovery methods for
Windows and UNIX platforms.
• Offering methods of duplicating backed up data
during and after the backup to improve fault tolerance of backups or for
redundancy purposes.
Backup Object Operations
To provide flexibility in the choice of backup
and archive strategy, advanced techniques are available for performing
operations on individual backup objects. These include copying of objects from
one medium to another, useful for disk staging and archiving purposes, and
consolidation of multiple object versions from incremental backups into a
single full-backup version. To support such functionality, there is also the
ability to verify both original and copied or consolidated backup objects.
Easy Restore
Data Protector includes an internal database that
keeps track of data such as which files from which system are kept on a
particular medium. In order to restore any part of a system, simply browse the
files and directories. This provides fast and convenient access to the data to
be restored.
Automated or Unattended Operation
With the internal database, Data Protector keeps
information about each Data Protector medium and the data on it. Data Protector
provides sophisticated media management functionality. For example, it keeps
track of how long a particular backup needs to remain available for restoring,
and which media can be (re)used for backups. The support of very large
libraries complements this, allowing for unattended operation over several days
or weeks (automated media rotation). Additionally, when new disks are connected
to systems, Data Protector can automatically detect or discover) the disks and
back them up. This eliminates the need to adjust backup configurations
manually.
Service Management
Data Protector is the first backup and restore
management solution to support service management. The integration with
Application Response Management (ARM) and Data Source Integration (DSI) enables
powerful support of Service Level Management (SLM) and Service Level Agreements
(SLA) concepts by providing relevant data to management and planning systems.
The DSI integration provides a set of scripts and configuration files from
which users are able to see how to add their own queries using Data Protector reporting
capabilities.
Monitoring, Reporting and Notification
Superior web reporting and notification
capabilities allow you to easily view the backup status, monitor active backup
operations, and customize reports. Reports can be generated using the Data
Protector GUI, or using the omnirpt command on systems running UNIX or Windows,
as well as using Java-based online generated web reports. You can schedule
reports to be issued at a specific time or to be attached to a predefined set
of events, such as the end of a backup session or a mount request. In addition,
the Data Protector auditing functionality enables you to collect a subset of
backup session information and provides an overview of backup operations.
Backup session information is recorded to the audit log files.
Integration with Online Applications
Data Protector provides online backup of
Microsoft Exchange Server, Microsoft SQL Server, Microsoft SharePoint Server,
Oracle, Informix Server, SAP R/3, SAP MaxDB, Lotus Notes/Domino Server, IBM DB2
UDB, Sybase database objects, and VMware Virtual Infrastructure and Hyper-V
objects. For a list of supported versions for a particular operating system,
see the HP Data Protector Product Announcements, Software Notes, and
References.
Integration with Other Products Additionally,
Data Protector integrates with EMC Symmetrix, Microsoft Cluster Server,
MC/ServiceGuard and other products.
Data Protector History
The first version of Data Protector was released
in 1994, back then it was called OmniBack II. It is not important to know all
the different versions and what are their release dates, but as the first
releases were called OmniBack II the directory structure has still OmniBack in
its name and all command line tools begin with omniback in its name.
Commands and directories still named OmniBack,
some examples:
- directory on Unix systems: /etc/opt/omni
- directory on Windows systems: C:\Program
Files\OmniBack
- CLI command: omnisv status
What is also good to know is that in previous
releases the Cell Manager was called Cell Server, therefore the patch is still
called CS patch.
And the patches for the user interface are still
called CC patch, which is because in former versions user interface (GUI) was
called Cell Console.
Direct Attached Backup
The concept of direct attached backup means that
only one host is included in the backup process. The data is read by the Data
Protector Disk Agent and written to the backup device by Data Protector Media
Agent. In this scenario both Agents (Disk and Media) are running on the same
system, no other host is included in the backup process.
A direct attached backup device is a device which
is controlled by the Media Agent installed on the host, e.g.:
• direct attached tape drive (SCSI)
• via SAN attached tape library
• via NAS attached device (NDMP)
Network Backup
In opposite to the direct attached backup, where
both Agents (Disk and Media Agent) are running on the same system, when talking
about network backup the network (LAN) is included in backup process.
The Disk Agent installed on one system is reading
the backup data and sending the data via LAN to the Media Agent installed on
the system where the backup device is connected.
Array Based Replica Backup (ZDB)
In today's storage environment, the requirements
for data availability are constantly growing. For the information resources to
be highly available, Data Protector zero downtime backup (ZDB) solution helps
you meet your business needs, eliminating the application downtime and making
mission-critical data available 24x7.
Zero downtime backup is a backup approach in
which replication techniques are used to minimize the impact of backup
operations on an application system. A replica of the data to be backed up is
created first, and all subsequent backup operations are performed on the
replicated data rather than the original data.
As a backup occurs in the background while the
application remains online and available for use, the impact on your
environment during a backup is minimal. The recovery window is reduced as well
by using the instant recovery (IR) functionality, which enables recovery of
vast amount of data in minutes rather than hours. This makes ZDB and IR
capabilities suitable for high-availability systems and mission-critical
applications.
Cell Concept
The Data Protector cell is a network environment
that has a Cell Manager, client systems, and backup devices. The Cell Manager
is the central control point where Data Protector software is installed. After
installing Data Protector software, you can add systems to be backed up. These
systems become Data Protector client systems that are part of the cell. When
Data Protector backs up files, it saves them to media in backup devices.
The Data Protector internal database (IDB) keeps
track of the files you back up so that you can browse and easily recover the
entire system or single files. Data Protector facilitates backup and restore
jobs. You can do an immediate (or interactive) backup using the Data Protector
user interface. You can also schedule your backups to run unattended.
The Data Protector architecture breaks down the
size and complexity of the enterprise network by allowing systems to be
configured into Data Protector cells. This cell is a loosely coupled collection
of systems, organized to allow for central management of backup processes.
A Data Protector cell consists of a Cell Manager
system and of the systems that are to have their backup and restored tasks
managed by it.
The Data Protector cell configuration can reflect
the organization within a company, with each department having its own
administrators. However, there is no reason that two machines, thousands of
miles apart, cannot be in the same cell.
Note: A system may belong to only one cell.
Roles In The Data Protector Cell
Before installation you need to determine the
role of each system in your Data Protector cell. The following cell components
must be selected in order to set up the environment properly.
Cell components
|
Roles in the cell
|
Description
|
Cell Manager
|
The computer that is the central point for managing the backup
environment.
|
Only one Cell Manager system can be present in each cell. You
cannot run Data Protector without having the Cell Manager system installed.
|
Installation Server
|
The computer that holds the Data Protector software depots for
remote installation.
|
This computer must have the Installation Server for the
particular platform (UNIX or Windows) installed. By default, the Cell Manager
and Installation Server are on the same system.
|
Client system
|
Computers that are backed up.
|
These computers must have the Disk Agent installed.
The Disk Agent is also installed on the Cell Manager, allowing
you to back up the Data Protector configuration, the IDB, and data on the
Cell Manager.
|
Client system (Backup system)
|
Computers with backup devices.
|
These computers must have a Media Agent installed.
A backup device can be connected to any system in the cell, not
only to the Cell Manager.
|
DP User Interface
|
Computers that can access Data Protector functionality.
|
You can install the graphical user interface on many systems,
and are therefore able to access the Cell Manager from different locations.
|
Client Server Architecture
The basic Data Protector implementation utilizes
only two architecture layers, the Cell Manager, and the Cell Client layers. The
User Interface is installed on the Cell Manager but it may be distributed on
multiple client systems as well.
Data Protector is composed of separate
client/server modules, each of which performs a specialized task. The major
component is the Cell Manager; it is responsible for the control of the entire
Data Protector Cell and the invocation of the specialized agent processes.
The agent processes are used for accessing disk
and tape devices for backup, restore and media management tasks. The two
fundamental agents are:
• Disk Agent – responsible for read/write actions
from disk drives for backup and restore
• Media Agent – responsible for read/write
actions to backup media (may be tape or disk)
The basis
of the client/server model is that the Data Protector software consists of
client modules and a server module. These modules can all be installed on a
single system (a single client cell) or be distributed across many systems.
Communication between modules is accomplished via TCP/IP sockets, initiated on
port 5555.
Cell Manager
The Cell Manager is the main control center for
the cell and contains the Internal Database (IDB). It runs the core Data
Protector software and the Session Manager, which starts and stops backup and
restore sessions and writes session information to the IDB.
Any system within a chosen cell environment can
be set up as a Data Protector Client. Essentially, a client is a system that
can be backed up, a system connected to a backup device with which the backup
data can be saved, or both. The role of the client depends on whether it has a
Disk Agent or a Media Agent installed.
A client that will be backed up using Data
Protector must have a Disk Agent installed. Data Protector controls the
access to the disk. The Disk Agent lets you back up information from, or
restore information to, the client system.
A client system with connected backup devices
must have a Media Agent installed. This software controls the access to
the backup device. A Media Agent controls reading from and writing to a backup
device’s media.
Disk Agent
The Disk Agent is a component needed on a client
to back it up and restore it. Disk Agent controls reading from and writing to a
disk. During a backup session, the Disk Agent reads data from a disk and sends
it to the Media Agent, which then moves it to the device. During a restore
session the Disk Agent receives data from the Media Agent and writes it to the
disk. During an object verification session the Disk Agent receives data from
the Media Agent and performs the verification process, but no data is written
to disk.
The Disk Agent component consists of specialized
processes that are started on demand by the respective Backup or Restore
Manager process (Session Manager). These programs are installed in the /opt/omni/lbin
directory on HP-UX and C:\Program Files\Omniback\bin on Windows.
Disk Agent
program names: (*.exe files on Windows)
vbda Volume Backup Disk Agent
vrda Volume Restore Disk Agent
rbda Raw Backup Disk Agent
rrda Raw Restore Disk Agent
fsbrda File system Browser Disk Agent
dbbda Database Backup Disk Agent (for internal
database)
Media Agent
Media Agent is a process that controls reading
from and writing to a backup device, which reads from or writes to a medium
(typically a tape). During a backup session, a Media Agent receives data from
the Disk Agent and sends it to the backup device for writing it to the medium.
During a restore session, a Media Agent locates data on the backup medium and
sends it to the Disk Agent for processing. For a restore session, the Disk
Agent then writes the data to the disk. A Media Agent also manages the robotics
control of a library.
A Media Agent component must be installed on the
client system to which the backup device is physically attached (direct
attached or SAN attached). The Media Agent component consists of specialized
processes that are started on demand by the respective Backup, Restore or Media
Manager process (Session Manager). These programs are installed in the /opt/omni/lbin
directory on HP-UX and C:\Program Files\Omniback\bin on Windows.
Media Agent program names: (*.exe files on
Windows)
bma Backup Media Agent
rma Restore Media Agent
mma Media Management Agent
cma Copy Media Agent
uma Utility Media Agent (used for tape library
control; may be started interactively)
devbra Device Browser Agent (used for
auto-discovery/configuration. May be run from the command line)
Integration Agent
Data Protector provides a set of integration
components that enable data to be exchanged between the most popular
applications (databases) and Data Protector. Data Protector accesses the
application vendors API in order to perform online backups and restores. The
ability to perform online backups is a highly desirable feature in
mission-critical, high-availability environments. Data Protector also provides
integrations with many other applications that assist in areas such as high
availability, system control, and monitoring.
Application Integrations
• Oracle
• SAP, SAPDB/MaxDB
• IBM Informix
• IBM DB2
• Sybase
• Microsoft SQL, Exchange, SharePoint, VSS, DPM
• VMware
• Lotus Notes/Domino
• Citrix XenServer
• … and many more
Installation Server
Data Protector Installation Server is a computer
system that holds a repository of the Data Protector software packages for a
specific architecture. The Installation Server is used for remote installation
of Data Protector clients. In mixed environments at least two Installation
Servers are needed: one for UNIX systems and one for Windows systems. The
Installation Server must be registered as such with a Cell Manager.
NOTE: The Installation Server is not restricted
to a single cell, it may provide installation services for more than one cell.
But is limited to distribution services for its native platform (Windows or
UNIX)
When the Cell Manager system pushes agent
software to a client system, the particular Installation Server from which the
software is to be obtained is specified.
Data Protector patches are applied to the
Installation Servers(s) and then distributed to clients during an update/push
request from the Cell Manager.
User Interface
Data Protector provides easy access to all
configuration and administration tasks using the Data Protector GUI on Windows
and UNIX platforms. You can use the original Data Protector GUI (on Windows) or
the Data Protector Java GUI (on Windows and UNIX). Both user interfaces can run
simultaneously on the same computer. Additionally, a command-line interface is
available on Windows and UNIX platforms.
The Data Protector architecture allows you to
flexibly install and use the Data Protector user interface. The user interface
does not have to be used from the Cell Manager system; you can install it on
any desktop system and it allows you to transparently manage Data Protector
cells with Cell Managers on all supported platforms.
Data Protector provides a rich and powerful
command line interface. The CLI can be used in situations where a GUI is not
available, for example, when dialing in to a system for remote support, or when
writing shell scripts or batch files. Most of the Data Protector commands will
reside in the bin directory below the product home.
Internal Database
The Data Protector internal database (IDB) is an
embedded database, located on the Cell Manager, which keeps information
regarding what data is backed up; on which media it resides; the result of
backup, restore, copy, and media management sessions; and what devices and
libraries are configured.
There are three key reasons for using the IDB:
• Fast and convenient restore: The information
stored in the IDB enables you to browse the files and directories to be
restored. You can quickly find the media required for a restore and therefore
make the restore much faster.
• Backup management: The information stored in
the IDB enables you to verify the result of backup sessions.
• Media management: The information stored in the
IDB enables you to allocate media during a backup and copy sessions, track
media management operations and media attributes, group media in different
media pools, and track media locations in tape libraries.
The IDB consists of the following parts:
• MMDB (Media Management Database)
• CDB (Catalog Database)
• DCBF (Detail Catalog Binary Files)
• SMBF (Session Messages Binary Files)
• SIBF (Serverless Integrations Binary Files).
Typical Data Protector Session
Data Protector uses the standard inet (inetd) facility
to start up remote processes. This mechanism requires that a fixed port number
be allocated for Data Protector. Within a Data Protector Cell, all systems must
have the same port number configured, but it may vary from cell to cell. The default
port number used is 5555.The Data Protector session manager invokes specific
agent processes, depending on the request it has received, and uses the
following mechanism to achieve this:
1. The session manager connects to the system on
which it wants to start a Media or Disk Agent process via the predefined port
number, 5555.
2. On the Windows client platforms, the Data
Protector Inet service is already running on port 5555 to handle
incoming requests.
3. The Session Manager sends a control block that
informs the remote system exactly which agents to start and the ports that are
to be used for communication, etc.
4. The Data Protector inet process then
starts the desired agents.
·
Before you start to install the Data Protector
software, make a plan how your cell should look like. If you have a huge
environment, consider to create several cells and to use them either
independently of each other or to manage them through one central Cell Manager
using the MoM (Manager of Managers) concept.
Mukesh Handa
muk_handa@yahoo.com
+673-8813507
Mukesh Handa
muk_handa@yahoo.com
+673-8813507