Backup Strategies for Integrity Virtual Machines

Size: px
Start display at page:

Download "Backup Strategies for Integrity Virtual Machines"

Transcription

1 Backup Strategies for Integrity Virtual Machines Introduction...2 Basic Aspects of Data Protection for Virtual Environments...2 Backup and Recovery from the VM Host System...3 Backup and Recovery of Individual Virtual Machines...3 Protecting the Virtual Environment Configuration...4 Data Protection Scenarios for Virtual Machines...5 Network Backup and Recovery...5 Statically Attached Device Backup and Recovery...6 Dynamically Attached Device Backup and Recovery...7 Volume Splitting on the VM Host...9 Consolidated Virtual System Backup from VM Host...10 Disaster Recovery, Ignite-UX, and Integrity Virtual Machines...10 General Guidelines and Suggestions...11 Storage Configuration for Reliability...11 Plan for Recovery of the Virtual Environment...11 Best Practices for Using EBS on Integrity Virtual Machines...11 Configuration Tips for Backup and Recovery Software...11 Summary...12 Conclusion...12 For more information...12 General information online...12 Documentation and white papers...12

2 Introduction Data protection arguably the most important aspect of data center management applies to any system whether it is physical, partitioned, or virtual. The architecture of HP Integrity Virtual Machines (Integrity VM) enables multiple approaches to data protection for virtual machines, providing the flexibility to apply existing backup and recovery solutions to your virtual environment. This white paper outlines various strategies for backing up critical data, including both the virtual environment definition as well as that used by applications running in virtual systems. By providing you with the advantages and caveats of each approach here, you may choose the best solutions for your environment. In illustrating the various backup and recovery (B&R) strategies, it is important to establish two basic concepts. There are two entities (manifested as agents, daemons, etc.) common to almost all Enterprise Backup Solutions (EBS). We will borrow terminology from the HP DataProtector software product to reference these entities. First, there is the disk agent an entity that writes or reads data to or from (disk) storage on a computer system and sends or receives that data to or from a media agent. The media agent is an entity that reads or writes from or to media in the backup device (e.g., tape) and sends or receives data from the disk agent. Graphics used to represent the disk agent (DA) and media agent (MA) entities Basic Aspects of Data Protection for Virtual Environments At a high level, the Integrity VM architecture consists of a VM Host system and the virtual machines often referred to as guests that run on that VM Host system. Figure 1 illustrates the relationship between these basic entities. Virtual disks on the virtual machines map to one of three basic storage types residing on the VM Host system: 1. Whole logical storage units, either entire disks or SAN LUNs, 2. Logical volumes, and 3. Files This fact provides the foundation for two basic data protection paradigms for Integrity VM environments

3 Figure 1 Generalization of Integrity Virtual Machines architecture. Backup and Recovery from the VM Host System Keeping in mind that a virtual machine s storage can be accessed from the VM Host system, one can imagine that backups run on the VM Host can also effectively backup storage on the virtual machines. This is true because the virtual machine s storage must be accessible by the VM Host system. From this perspective, the virtual machines are effectively applications running on the VM Host system and their storage is effectively the data used by those applications (virtual machines) while they run on that (VM Host) system. Most backup software will not archive any storage that is open for I/O by a process or application running on the system. This makes for a potential issue with backing up all virtual machines from one location the VM Host system without taking some additional actions discussed in below in the section Protecting the Virtual Environment Configuration. This paradigm will be referred to as backup and recovery at the VM Host level. Backup and Recovery of Individual Virtual Machines Another approach, arguably more natural when compared to data protection scenarios for physical systems, is to do backup and recovery of individual virtual machines. That is, each virtual machine s EBS configuration is effectively independent of the VM Host system. The basic difference between these two approaches is where the disk agent resides. For data protection at VM Host level, the disk agent resides on the VM Host system. Conversely, the disk agent must reside on each virtual machine in the data protection of individual virtual machines paradigm. Figure 2 summarizes these two basic paradigms.

4 Figure 2 Two basic paradigms for backing up an Integrity VM environment are: 1) backup and recovery at VM Host level (shown on the left), and 2) backup and recovery of individual virtual machines (shown on the right). Protecting the Virtual Environment Configuration Be sure to include the VM Host system s data, independent of the storage used by the virtual machines themselves as their virtual disks, in your data protection strategy. One of the distinct advantages of Integrity Virtual Machines is that you can use off-the-shelf EBS software to protect not only your virtual machines, but also the VM Host system. With Integrity Virtual Machines, the VM Host system runs a standard, albeit lean, version of the HP-UX operating system. As a result, you can use Enterprise Backup Solution that supports HP-UX, such as NetBackup and HP Data Protector Software, to protect the VM Host system s data including the virtual environment configurations. So far, the focus has been on protecting the data used by the virtual system and its applications. It is critical to include protection of the virtual environment configuration in your data protection strategy. That is, you must protect each virtual machine s definition virtual CPU counts and entitlement, virtual I/O device definitions, memory size, etc. so that you can reconstruct those virtual machines in the event of a disaster. Configuration files that reside on the VM Host system in the directory /var/opt/hpvm contain these virtual machine definitions. Because some of the configuration files may be open (e.g., the VM may be restarting, causing the configuration file to be opened for reading), it is a good practice to take a snapshot of the /var/opt/ hpvm directory periodically. You can accomplish this with the Enterprise Backup Solution s open file management capability. Alternatively, you can explicitly create the snapshot independent of the EBS software. For example, create a snapshot of the /var/opt/hpvm directory in the file /var/opt/hpvm.tar with the tar utility: # tar cf /var/opt/hpvm.tar /var/opt/hpvm Then be sure to include the resulting snapshot (in this example, /var/opt/hpvm.tar) in the backup configuration for the VM Host system.

5 Data Protection Scenarios for Virtual Machines The recent releases, 3.0 and 3.5, of Integrity Virtual Machines delivered new functionality in areas that directly benefit data protection strategies for virtual systems, including: Attached I/O device support for tape drives, media changers, and optical media burners, Online add and delete capability for virtual storage devices, Accelerated Virtual I/O devices, Boot-from-tape capability. By leveraging these capabilities, you have many choices for protecting data used by virtual systems. In the following sections, you will find several scenarios including general configuration examples and approaches. These scenarios serve as examples and are not an exhaustive list but rather a summary of practices that you can modify as necessary to fit into your overall data center protection practices. Network Backup and Recovery You can achieve virtual system data protection via network connection with a disk agent in the virtual system connecting to a separate system where the media agent resides. The virtual systems do not need a direct connection to an attached device (e.g., tape drive), nor does it require media agents in the virtual systems. Figure 3 shows the media agent residing on a physical system connected to a storage system, but this system could also be a virtual machine with an attached device connection as outlined in Figure 4. Figure 3 Network backup and recovery for virtual machines

6 Statically Attached Device Backup and Recovery Having a virtual machine serve as the backup server is, in a sense, a variation on the network B&R strategy. You may configure such a scenario so that only a single VM need an attached device connection while not requiring a physical network adapter. With such a configuration, the backup and restore traffic is isolated from the public LANs both virtual and physical in that environment. Another advantage to this arrangement is that a media agent is only required on the VM with the attached device as illustrated in Figure 4. Note that an attached device is not limited to a locally connected tape drive, but may also be an individual LUN connected to tape drives, media changers, or optical media burners on storage systems. Figure 4 Backup and recovery of virtual machines using attached device capability

7 Dynamically Attached Device Backup and Recovery By taking advantage of the online add and delete capabilities of Integrity VM attached devices, you can avoid network connections for B&R altogether. While attached devices cannot be shared amongst virtual machines simultaneously, they can be accessed exclusively by individual virtual machines without having to restart them. You can automate the online addition and deletion of the attached device by leveraging pre-exec and post-exec scripts executed by the EBS software. As shown in Figure 5, this does require both a disk agent and a media agent in each virtual machine, but it does not require a network connection. You will be required to define the backup configurations for each virtual machine so that the EBS software does not attempt to initiate the backup of more than one VM at a time on a single VM Host system. Figure 5 Backup and recovery of virtual systems using OLA and OLD of attached devices Note that you will need to define your pre-exec and post-exec scripts to execute on the VM Host system. Use the hpvmmodify command to add and remove the attached device. For example, if you are using a tape drive that corresponds to the path /dev/rscsi/c0t1d3, then add the tape drive to the VM named vmdev1 with: hpvmmodify P vmdev1 a tape:scsi::attach:/dev/rscsi/c0t1d3 Subsequently, you remove the tape drive from vmdev1 using the following: hpvmmodify P vmdev1 d tape:scsi::attach:/dev/rscsi/c0t1d3

8 Volume Splitting Inside the Virtual System Another popular approach to data protection is the notion of volume splitting which draws on data redundancy capabilities to take snapshots of data storage volumes at a given point in time. After the split occurs, the volume management software typically tracks the changes made to the volumes so that, subsequently, the volumes are merged back together. By periodically splitting and merging volumes that correspond to storage on separate storage entities you effectively create backups of the data residing on those volumes. There are many different implementations of such technology, many of which have a logical implementation, so that they are independent of the specific storage devices involved. HP s Logical Volume Manager is one example of such technology, which provides the capability to split a volume (lvsplit command) and then merge (lvmerge command). Figure 6 provides an example configuration for such an approach. You typically cannot use volume-splitting technologies that rely on specific storage devices or the behavior of a device driver when the storage is virtualized. Figure 6 Volume splitting inside a virtual system. Note that the split volume or device may be backed up to a physical tape (or other media) before the merge and resynchronization.

9 Volume Splitting on the VM Host Let us now explore virtual system data protection through the VM Host. You can protect the virtual system s data can be protected in a similar fashion by taking the volume-splitting concept down to the VM Host level. The major difference between this approach and splitting volumes inside the virtual system relates to the application using that data. As illustrated in Figure 7, only one virtual disk may correspond to a volume on the VM Host system. In order to get a consistent snapshot of the virtual storage, one must disconnect it from the virtual machine. To do so, you may dynamically remove the virtual disk from the virtual system which requires transitioning the state of all applications using that virtual disk so that I/O transactions cease. This removal flushes all I/O transactions from the application and the virtual system out to the volume. Next, you merge the volumes, synchronizing the physical storage devices with changes made to the volume. After the merge, split the volume again and dynamically reconnect the corresponding virtual disk to the virtual system. Subsequently, the application using that storage resumes execution. Unfortunately, you cannot disconnect a virtual machine s root disk; hence, one may not back up a virtual machine s operating system storage using this approach. In this case, you must shut down the virtual machine before backing up that storage using the volume-splitting approach outlined above. Figure 7 Volume splitting at the VM Host level. Similar to splitting in the guest, one may want to back up the split volume to tape or other media after the split.

10 Consolidated Virtual System Backup from VM Host You can simplify your backup approach by consolidating all of your virtual system backups by using the VM Host system as a single client for data protection purposes. To do so, you must make sure that the virtual systems have completed all of their I/O transactions by either disconnecting their virtual disks or by shutting down the virtual machine and its operating system. Backup and recovery software with the pre-exec and post-exec capability discussed earlier facilitates such an approach. After disconnecting the virtual disks by either online removal of the virtual disks or halting the virtual machines the backup executes on the VM Host system. Once the backup completes, reconnect the virtual disks and resume processing inside the virtual machines. Figure 8 Consolidated virtual system backup from the VM Host Disaster Recovery, Ignite-UX, and Integrity Virtual Machines You can use many of the backup and recovery scenarios discussed above to create a disaster recovery solution, especially with regard to application data. When considering operating system recovery perspective, you may find it appropriate to investigate additional, complementary software. For virtual systems running HP-UX, Ignite-UX addresses the need for system administrators to perform operating system recovery. Ignite-UX provides tools to archive, i.e., backup operating system configurations that you can use for system recovery or replication. Periodically, you may use Ignite-UX tools such as make_tape_recovery and make_net_recovery to create operating system archives. Version 3.5 of Integrity VM supports the capability to boot virtual machines from a tape device, enabling both a tape and network approach to system recovery for your virtual machines.

11 General Guidelines and Suggestions Based on the scenarios presented here and some practical experience, there are some data protection guidelines and pitfalls in a virtual environment you should be aware of. Storage Configuration for Reliability In several figures above a subtle but important storage configuration detail is illustrated whenever mirroring inside the guest, take care that the virtual disks in that mirror map to storage entities on separate physical storage devices. Otherwise, the backup and recovery strategies for volume splitting will fail to provide the data protection you are trying to achieve. For example, suppose that the two virtual disks shown in Figure 6 map to logical volumes instead of LUNs. If those logical volumes reside on separate disks or LUNs, then splitting the volume inside the guest will succeed in protecting your data. However, if those two logical volumes reside on the same disk or LUN then your data is at risk. This is because a failure on that physical disk or LUN may corrupt or destroy data on both those logical volumes. Plan for Recovery of the Virtual Environment A good approach to protecting your virtual environment is to combine incremental backup practices with disaster recovery planning. That is, in addition to regularly scheduled backups for the virtual machines and the VM Host system, you should also consider periodically creating a recovery image of the VM Host system. In doing so, you may fully recover the VM Host system in the event of a disastrous failure on the physical system while also enjoying the granularity and flexibility provided by the EBS software. You can create recovery images with the Ignite tools mentioned above. An alternative is to use the dynamic root disk capabilities on the VM Host system. Using the drd (q.v.) command, one can create a recovery image of the root disk on the VM Host system that may be subsequently used to recover the VM Host system in the even the primary root disk fails for whatever reason. Best Practices for Using EBS on Integrity Virtual Machines The accelerated virtual I/O (AVIO) capability of Integrity VM provides significant performance benefit when backing up individual virtual machines. For best performance, define the virtual NIC used by the EBS software with an accelerated virtual I/O (AVIO) network adapter for best performance. By using AVIO storage adapters, you will incrementally improve overall performance and reduce load on the physical system. Configuration Tips for Backup and Recovery Software The AVIO technology operates to its maximum potential when transferring data from multiple I/O connections. Therefore, to get the maximum benefit from AVIO, configure your backups to use multiple streams at most one for each virtual disk. This will reduce the overall time needed to backup the virtual machine while utilizing the physical system s resources most efficiently. When using Data Protector you increase the number of streams by changing the concurrency setting, either per device or per backup specification. The concurrency per device defines the number of parallel jobs sent to a device. The concurrency per backup specification defines the number of parallel streams a backup specification can send. You can find details for configuring concurrency in the Data Protector Administrator's Guide. To increase the number of streams with NetBackup, you should increase the Maximum jobs per client global attribute in your NetBackup configuration.

12 Summary Data protection activities such as backups and restores will execute quickly and efficiently by practicing the following: Configuring the virtual NIC used for backups to use the AVIO network adapter, Using the AVIO storage adapter wherever possible when configuring virtual disk storage, and Enabling multiple, concurrent streams in the virtual system s backup configuration. Always check the support matrix provided by the EBS vendor for support of your environment. Many EBS vendors now provide a virtual systems compatibility statement in their support matrix documentation. Conclusion You have multiple data protection options for virtual systems with Integrity Virtual Machines. Unlike some virtualization technologies, you are not limited to a vendor-specific backup and recovery solution for your overall virtual environment. Quite the opposite actually as you may use the same hardware-independent data protection solutions such as those offered by Symantec and HP Software to protect your data and system configurations both virtual and physical across your entire data center. Before deploying an Enterprise Backup Solution in your virtual environment, be sure to consult the support matrices of that solution s vendor for details For more information General information online (HP Integrity Virtual Machines) ww.hp.com/go/dataprotector (HP Data Protector Software) ww.hp.com/go/ebs (HP Enterprise Backup Solutions) Documentation and white papers HP Integrity Virtual Machine EBS Solutions Guide (available from Successful System Recovery using Ignite-UX ( Using Ignite-UX with Integrity Virtual Machines ( HP OpenView Storage Data Protector Concepts Guide (available from Veritas NetBackup Backup Planning and Performance Tuning Guide (available from Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Symantec, NetBackup, and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Version 1.0, March 2008

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

HP Data Protector software Zero Downtime Backup and Instant Recovery. Data sheet

HP Data Protector software Zero Downtime Backup and Instant Recovery. Data sheet HP Data Protector software Zero Downtime Backup and Instant Recovery Data sheet Business uninterrupted with HP Data Protector Zero Downtime Backup and Instant Recovery software With today s increasing

More information

QuickSpecs. HP Integrity Virtual Machines (Integrity VM) Overview. Currently shipping versions:

QuickSpecs. HP Integrity Virtual Machines (Integrity VM) Overview. Currently shipping versions: Currently shipping versions: HP Integrity VM (HP-UX 11i v2 VM Host) v3.5 HP Integrity VM (HP-UX 11i v3 VM Host) v4.1 Integrity Virtual Machines (Integrity VM) is a soft partitioning and virtualization

More information

HP Data Protector software Zero Downtime Backup and Instant Recovery

HP Data Protector software Zero Downtime Backup and Instant Recovery HP Data Protector software Zero Downtime Backup and Instant Recovery Business Uninterrupted with HP Data Protector Zero Downtime Backup and Instant Recovery software With today s increasing emphasis on

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

HP Data Protector software. Assuring Business Continuity in Virtualised Environments

HP Data Protector software. Assuring Business Continuity in Virtualised Environments HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could

More information

HP StorageWorks EBS Solutions guide for VMware Consolidated Backup

HP StorageWorks EBS Solutions guide for VMware Consolidated Backup HP StorageWorks EBS Solutions guide for VMware Consolidated Backup Executive Summary... 2 Audience... 2 Information not provided... 2 Introduction... 3 HP Enterprise backup environment... 3 Virtual infrastructure...

More information

HP StorageWorks Data Protector Express versus Symantec Backup Exec white paper

HP StorageWorks Data Protector Express versus Symantec Backup Exec white paper HP StorageWorks Data Protector Express versus Symantec Backup Exec white paper A high-level comparison of features and functionality Introduction... 2 Overview... 3 Installation... 4 What is installed?...

More information

Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices

Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices WHITE PAPER: Best Practices Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices White Paper: Best Practices Veritas NetBackup 6.5 for VMware 3.x Best Practices November

More information

Using HP StoreOnce Backup systems for Oracle database backups

Using HP StoreOnce Backup systems for Oracle database backups Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

QuickSpecs. Models HP ProLiant Storage Server iscsi Feature Pack. Overview

QuickSpecs. Models HP ProLiant Storage Server iscsi Feature Pack. Overview Overview software adds iscsi target functionality to Server devices designed for small and medium businesses, enterprise departments and branch offices, and other environments wishing to implement low-cost

More information

HP Serviceguard Cluster Configuration for HP-UX 11i or Linux Partitioned Systems April 2009

HP Serviceguard Cluster Configuration for HP-UX 11i or Linux Partitioned Systems April 2009 HP Serviceguard Cluster Configuration for HP-UX 11i or Linux Partitioned Systems April 2009 Abstract... 2 Partition Configurations... 2 Serviceguard design assumptions... 4 Hardware redundancy... 4 Cluster

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

W H I T E P A P E R : D A T A P R O T E C T I O N. Backing Up VMware with Veritas NetBackup. George Winter January 2009

W H I T E P A P E R : D A T A P R O T E C T I O N. Backing Up VMware with Veritas NetBackup. George Winter January 2009 W H I T E P A P E R : D A T A P R O T E C T I O N Backing Up VMware with Veritas NetBackup George Winter January 2009 Contents 1.0 EXECUTIVE OVERVIEW... 3 1.1 INTENDED AUDIENCE... 3 1.2 GLOSSARY... 3 1.3

More information

Integrated Data Protection for VMware infrastructure

Integrated Data Protection for VMware infrastructure Brochureochure, Solution brief, or Business white paper Integrated Data Protection for VMware infrastructure Fast, efficient, and reliable protection for mission-critical information in vsphere and vcloud

More information

HP Converged Infrastructure Solutions

HP Converged Infrastructure Solutions HP Converged Infrastructure Solutions HP Virtual Connect and HP StorageWorks Simple SAN Connection Manager Enterprise Software Solution brief Executive summary Whether it is with VMware vsphere, Microsoft

More information

Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management

Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management Managing Microsoft Hyper-V Server 2008 R2 with HP Insight Management Integration note, 4th Edition Introduction... 2 Overview... 2 Comparing Insight Management software Hyper-V R2 and VMware ESX management...

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

HP Serviceguard Cluster Configuration for Partitioned Systems

HP Serviceguard Cluster Configuration for Partitioned Systems HP Serviceguard Cluster Configuration for Partitioned Systems July 2005 Abstract...2 Partition configurations...3 Serviceguard design assumptions...4 Hardware redundancy...4 Cluster membership protocol...4

More information

HP Data Replication Solution Service for 3PAR Virtual Copy

HP Data Replication Solution Service for 3PAR Virtual Copy HP Data Replication Solution Service for 3PAR Virtual Copy HP Care Pack Services Technical data HP Data Replication Solution Service for 3PAR Virtual Copy provides implementation of the HP 3PAR Storage

More information

HP VMware ESXi 5.0 and Updates Getting Started Guide

HP VMware ESXi 5.0 and Updates Getting Started Guide HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 9.00 Microsoft Hyper-V Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only warranties

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes Backup Exec 11D VSS Snapshots and Transportable Offhost Backup Legal Notices Warranty The only warranties for HP products and services are set

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Backup and Recovery User Guide

Backup and Recovery User Guide Backup and Recovery User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. The information contained herein is subject

More information

HP Thin Client Imaging Tool

HP Thin Client Imaging Tool HP Thin Client Imaging Tool Table of Contents: Abstract... 1 Introduction... 1 System Requirements... 1 Software... 1 Hardware... 1 Getting Started... 2 Formatting a USB Flash Device... 3 Unpacking the

More information

Case Studies Using EMC Legato NetWorker for OpenVMS Backups

Case Studies Using EMC Legato NetWorker for OpenVMS Backups OpenVMS Technical Journal V6 Case Studies Using EMC Legato NetWorker for OpenVMS Backups Case Studies Using EMC Legato NetWorker for OpenVMS Backups... 2 Overview... 2 Introduction... 2 Case Study 1: Backup

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Industry Trends and Technology Perspective White Paper Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Issues and solutions to enable complete data protection

More information

QuickSpecs. Introduction. What's New. HP Application Recovery Manager Software Overview

QuickSpecs. Introduction. What's New. HP Application Recovery Manager Software Overview Overview Introduction (AppRM) automates array-based backup and recovery of business application databases. In the event of failure or corruption, AppRM provides the ability to restore data to the moment

More information

VERITAS NetBackup Professional 3.5

VERITAS NetBackup Professional 3.5 VERITAS NetBackup Professional 3.5 Centralized Backup and Simplified Recovery for Distributed Client Data V E R I T A S W H I T E P A P E R Table of Contents Executive Summary.............................................................................................

More information

HP OpenView Storage Mirroring application notes. Guidelines for testing a disaster recovery/high availability scenario

HP OpenView Storage Mirroring application notes. Guidelines for testing a disaster recovery/high availability scenario HP OpenView Storage Mirroring application notes Guidelines for testing a disaster recovery/high availability scenario Part number: T2558 88082 Third edition: June 2006 Legal and notice information Copyright

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Software Update, Backup, and Recovery

Software Update, Backup, and Recovery Software Update, Backup, and Recovery User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. The information contained herein

More information

[VADP OVERVIEW FOR NETBACKUP]

[VADP OVERVIEW FOR NETBACKUP] 2013 Ram Nagalla [VADP OVERVIEW FOR NETBACKUP] Understanding the concept of VADP backup in Netbackup and brief description about the different configuration scenarios. Index 1) Overview. 2 2) Compatibility

More information

Table of contents. Matching server virtualization with advanced storage virtualization

Table of contents. Matching server virtualization with advanced storage virtualization Matching server virtualization with advanced storage virtualization Using HP LeftHand SAN and VMware Infrastructure 3 for improved ease of use, reduced cost and complexity, increased availability, and

More information

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

Using HP StoreOnce D2D systems for Microsoft SQL Server backups Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and

More information

VMware Virtual Machine Protection

VMware Virtual Machine Protection VMware Virtual Machine Protection PowerVault DL Backup to Disk Appliance Dell Symantec Symantec DL Appliance Team VMware Virtual Machine Protection The PowerVault DL Backup-to-Disk Appliance Powered by

More information

Introducing logical servers: Making data center infrastructures more adaptive

Introducing logical servers: Making data center infrastructures more adaptive Introducing logical servers: Making data center infrastructures more adaptive technology brief, 2 nd edition Abstract... 2 Introduction... 2 Overview of logical servers... 3 Why use logical servers?...

More information

Server Virtualization with Windows Server Hyper-V and System Center (20409) H8B93S

Server Virtualization with Windows Server Hyper-V and System Center (20409) H8B93S HP Education Services course data sheet Server Virtualization with Windows Server Hyper-V and System Center (20409) H8B93S Course Overview Obtain the skills you need to deploy and manage a Microsoft Server

More information

VMware Site Recovery Manager with EMC RecoverPoint

VMware Site Recovery Manager with EMC RecoverPoint VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Microsoft Exchange Server 2007 deployment scenarios for midsize businesses

Microsoft Exchange Server 2007 deployment scenarios for midsize businesses Microsoft Exchange Server 2007 deployment scenarios for midsize businesses Executive summary... 2 Sample deployment scenarios... 2 Introduction... 3 Target audience... 3 Prerequisites... 3 Customer profile...

More information

Performance characterization report for Microsoft Hyper-V R2 on HP StorageWorks P4500 SAN storage

Performance characterization report for Microsoft Hyper-V R2 on HP StorageWorks P4500 SAN storage Performance characterization report for Microsoft Hyper-V R2 on HP StorageWorks P4500 SAN storage Technical white paper Table of contents Executive summary... 2 Introduction... 2 Test methodology... 3

More information

HP STORAGEWORKS STORAGE MIRRORING V4.5 SOFTWARE

HP STORAGEWORKS STORAGE MIRRORING V4.5 SOFTWARE You can read the recommendations in the, the technical guide or the installation guide for HP STORAGEWORKS STORAGE MIRRORING V4.5 SOFTWARE. You'll find the answers to all your questions on the HP STORAGEWORKS

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

HP STORAGEWORKS ENTERPRISE BACKUP SOLUTIONS (EBS)

HP STORAGEWORKS ENTERPRISE BACKUP SOLUTIONS (EBS) You can read the recommendations in the user guide, the technical guide or the installation guide for HP STORAGEWORKS ENTERPRISE BACKUP SOLUTIONS (EBS). You'll find the answers to all your questions on

More information

HP One-Button Disaster Recovery (OBDR) Solution for ProLiant Servers

HP One-Button Disaster Recovery (OBDR) Solution for ProLiant Servers Reference guide HP One-Button Disaster Recovery (OBDR) Solution for ProLiant Servers Reference guide Contents One button disaster recovery (OBDR) 2 Requirements 2 HP tape drive and server support 2 Creating

More information

A closer look at HP LoadRunner software

A closer look at HP LoadRunner software Technical white paper A closer look at HP LoadRunner software Table of contents Sizing up the system 2 The limits of manual testing 2 A new take on testing: the HP LoadRunner solution 3 The HP LoadRunner

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

HBA Virtualization Technologies for Windows OS Environments

HBA Virtualization Technologies for Windows OS Environments HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software

More information

HP-UX 11i software deployment and configuration tools

HP-UX 11i software deployment and configuration tools HP-UX 11i software deployment and configuration tools Simplifying management of servers in a virtualized environment Introduction... 2 Simplifying management in dynamic, virtualized environments... 2 HP-UX

More information

QuickSpecs. HP Data Protector Reporter Software Overview. Powerful enterprise reporting with point and click simplicity

QuickSpecs. HP Data Protector Reporter Software Overview. Powerful enterprise reporting with point and click simplicity Overview Introduction HP Data Protector software, used by more than 41,000 customers around the world, simplifies application protection in virtual and physical environments through unified recovery and

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Choosing the best architecture for data protection in your Storage Area Network

Choosing the best architecture for data protection in your Storage Area Network Choosing the best architecture for data protection in your Storage Area Network Introduction... 2 SAN solution reliability... 2 A controller-based architecture for tape libraries... 3 Advanced features...

More information

Tunable Base Page Size

Tunable Base Page Size Tunable Base Page Size Table of Contents Executive summary... 1 What is Tunable Base Page Size?... 1 How Base Page Size Affects the System... 1 Integrity Virtual Machines Platform Manager... 2 Working

More information

Backup Solutions for the Celerra File Server

Backup Solutions for the Celerra File Server White Paper Backup Solutions for the Celerra File Server EMC Corporation 171 South Street, Hopkinton, MA 01748-9103 Corporate Headquarters: 508) 435-1000, (800) 424-EMC2 Fax: (508) 435-5374, Service: (800)

More information

VERITAS NetBackup 6.0 for Microsoft Exchange Server

VERITAS NetBackup 6.0 for Microsoft Exchange Server VERITAS NetBackup 6.0 for Microsoft Exchange Server System Administrator s Guide for Windows N152688 September 2005 Disclaimer The information contained in this publication is subject to change without

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the

More information

VERITAS NetBackup 6.0 Database and Application Protection

VERITAS NetBackup 6.0 Database and Application Protection VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity

More information

Brochure. Data Protector 9: Nine reasons to upgrade

Brochure. Data Protector 9: Nine reasons to upgrade Brochure Data Protector 9: Nine reasons to upgrade Data Protector 9: Nine reasons to upgrade Shifting data center requirements are forcing IT organizations to reassess backup and recovery processes, strategies,

More information

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide

More information

The Benefits of Virtualization for Your DR Plan

The Benefits of Virtualization for Your DR Plan E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes Oracle Backup Recovery Setup on LeftHand Networks IP SAN Legal Notices Warranty The only warranties for HP products and services are set forth

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Windows Release 6.5 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Copyright 2002-2007 Symantec Corporation.

More information

Attunity RepliWeb Event Driven Jobs

Attunity RepliWeb Event Driven Jobs Attunity RepliWeb Event Driven Jobs Software Version 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment

HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment Executive Summary... 2 HP StorageWorks MPX200 Architecture... 2 Server Virtualization and SAN based Storage... 3 VMware Architecture...

More information

SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software

SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software Table of contents Executive summary... 2 Solution overview... 2 Objectives...

More information

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

QuickSpecs. HP Data Protector Express Single Server Edition 4.0 Service Pack 1 Overview

QuickSpecs. HP Data Protector Express Single Server Edition 4.0 Service Pack 1 Overview Overview HP Data Protector Express Single Server Edition is easy to install, easy to use and easy to manage backup and recovery software. It is only available with HP StorageWorks tape drives and HP StorageWorks

More information

VERITAS VERTEX Initiative

VERITAS VERTEX Initiative VERITAS VERTEX Initiative Frequently Asked Questions Q1. What is the VERITAS VERTEX Initiative? A1. The VERITAS VERTEX Initiative is a set of NetBackup solutions from VERITAS that will deliver alternate

More information

HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number 373652-001

HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number 373652-001 HP External Hard Disk Drive Backup Solution by Seagate User Guide November 2004 (First Edition) Part Number 373652-001 Copyright 2004 Hewlett-Packard Development Company, L.P. The information contained

More information

SAP HANA Backup and Recovery (Overview, SPS08)

SAP HANA Backup and Recovery (Overview, SPS08) SAP HANA Backup and Recovery (Overview, SPS08) Andrea Kristen, SAP HANA Product Management October 2014 Disclaimer This presentation outlines our general product direction and should not be relied on in

More information

Using HP System Software Manager for the mass deployment of software updates to client PCs

Using HP System Software Manager for the mass deployment of software updates to client PCs Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...

More information

Legal Notices... 2. Introduction... 3

Legal Notices... 2. Introduction... 3 HP Asset Manager Asset Manager 5.10 Sizing Guide Using the Oracle Database Server, or IBM DB2 Database Server, or Microsoft SQL Server Legal Notices... 2 Introduction... 3 Asset Manager Architecture...

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

RAID 1(+0): breaking mirrors and rebuilding drives

RAID 1(+0): breaking mirrors and rebuilding drives RAID 1(+0): breaking mirrors and rebuilding drives How to, 5 th edition Introduction... 2 Splitting a mirrored array using the Array Configuration Utility... 2 Recombining a split mirrored array using

More information

HP Cloud Map for TIBCO ActiveMatrix BusinessWorks: Importing the template

HP Cloud Map for TIBCO ActiveMatrix BusinessWorks: Importing the template HP Cloud Map for TIBCO ActiveMatrix BusinessWorks: Importing the template An HP Reference Architecture for TIBCO Technical white paper Table of contents Executive summary... 2 Solution environment... 2

More information

Decrypting Enterprise Storage Security

Decrypting Enterprise Storage Security Industry Trends and Technology Perspective White Paper Trends and options for securing enterprise data and storage By Greg Schulz Founder and Senior Analyst, the StorageIO Group December 11 th, 2006 With

More information

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2 HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery

More information

Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S

Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S HP Education Services course data sheet Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S Course Description In this class, you will learn how to design, configure, and manage a SharePoint

More information

Getting Started with Endurance FTvirtual Server

Getting Started with Endurance FTvirtual Server Getting Started with Endurance FTvirtual Server Marathon Technologies Corporation Fault and Disaster Tolerant Solutions for Windows Environments Release 6.1.1 June 2005 NOTICE Marathon Technologies Corporation

More information

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction

More information

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008 WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.

More information

Backup and Recovery User Guide

Backup and Recovery User Guide Backup and Recovery User Guide Copyright 2007-2009 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Product notice This user guide describes features

More information

VMware Data Backup and Recovery Data Domain Deduplication Storage Best Practices Guide

VMware Data Backup and Recovery Data Domain Deduplication Storage Best Practices Guide White Paper VMware Data Backup and Recovery Data Domain Deduplication Storage Best Practices Guide Abstract VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources

More information

EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker

EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker Reference Architecture EMC Global Solutions Operations

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

Symantec NetBackup Blueprints

Symantec NetBackup Blueprints Symantec NetBackup Blueprints Blueprint for Microsoft Hyper-V Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This

More information