HP Data Protector Software Cell Manager Planning and Sizing

Table Of Contents
HP Data Protector Software Cell Manager
Planning and Sizing
Planning and Configuring a HP Data Protector Software Cell
Manager and Managing the Internal Database Growth
Table of contents
Executive summary ............................................................................................................................... 3
Solution description .............................................................................................................................. 3
Cell Manager software topology ........................................................................................................... 4
Primary Data Protector processes ....................................................................................................... 4
Session managers ............................................................................................................................ 5
IDB architecture ................................................................................................................................... 6
What is the IDB used for? ................................................................................................................. 6
Media Management Database (MMDB) ............................................................................................. 7
Catalog Database (CDB) .................................................................................................................. 8
Example: Extending other tablespaces .......................................................................................... 10
Detail Catalog Binary Files (DCBF) ................................................................................................... 11
Example: Creating new DC directories.......................................................................................... 12
Session Messages Binary Files (SMBF) .............................................................................................. 13
Serverless Integrations Binary Files (SIBF) .......................................................................................... 13
Why should you configure the IDB? ..................................................................................................... 13
Regular IDB backups .......................................................................................................................... 14
What Happens During the IDB Backup?............................................................................................ 14
IDB notifications ................................................................................................................................. 15
Example: Configuring an IDB Notification ......................................................................................... 15
Existing IDB related notifications ...................................................................................................... 16
Limitations ......................................................................................................................................... 18
Internal Database Size .................................................................................................................... 18
Number of Backups Scheduled at One Time ..................................................................................... 19
Concurrent Activities ....................................................................................................................... 19
Number of Cells in a MoM (Manager of Manager) Environment ......................................................... 19
IDB Growth and Performance .............................................................................................................. 19
IDB key growth factors .................................................................................................................... 20
IDB key performance factors ............................................................................................................ 20
IDB key growth and performance parameters .................................................................................... 20
Influence of logging level on IDB ...................................................................................................... 21
Example: Changing of logging level for filesystem backup .................................................................. 22
Influence of catalog protection on IDB .............................................................................................. 23
Example: Changing of catalog protection of a backup ....................................................................... 23
Recommended usage of logging level and catalog protection ............................................................. 25
Use different logging levels in the same cell ...................................................................................... 25
Different logging levels for ObjectCopies .......................................................................................... 25

Summary of content (37 pages)