HP Data Protector Operations Guide

DCBF ......................................................................................................................................37
Tablespaces.............................................................................................................................39
IDB notifications and reporting...................................................................................................41
Recovering the IDB ...................................................................................................................41
Data Protector cell and client tuning ...................................................................................................43
global variables...........................................................................................................................43
omnirc variables ..........................................................................................................................44
scsitab file...................................................................................................................................45
cell_info ......................................................................................................................................45
Variables currently undocumented..................................................................................................46
Treewalk .................................................................................................................................46
Event management...........................................................................................................................46
Setting up SNMP trap forwarding ..................................................................................................46
Running omnisnmp ...................................................................................................................47
Setting OVdests trap destination.................................................................................................47
Adding a community name registry key other than public..............................................................48
Configuring the SNMP service destination host ............................................................................48
Frequently used commands ...............................................................................................................50
omnidbutil...................................................................................................................................50
omnidb.......................................................................................................................................50
omnimm......................................................................................................................................53
devbra........................................................................................................................................54
Log files and troubleshooting.............................................................................................................54
Data required for support calls ......................................................................................................54
The session log.........................................................................................................................54
Support files ............................................................................................................................56
Database copy.........................................................................................................................56
Debugging Data Protector.............................................................................................................57
Inet connection ............................................................................................................................59
Patch upgrade and versioning .......................................................................................................60
Security ..........................................................................................................................................60
Secure cell/client .........................................................................................................................60
Firewall configuration.......................................................................................................................61
Operation audit checklist..................................................................................................................62
Backing-up data...........................................................................................................................62
Restoring data .............................................................................................................................63
Short-term maintenance checklist....................................................................................................64
Long term maintenance checklist ....................................................................................................64
Off-site vaulting............................................................................................................................64
References ......................................................................................................................................65