HP Data Protector Software Cell Manager Planning and Sizing
Table Of Contents
- Executive summary
- Solution description
- Cell Manager software topology
- IDB architecture
- Why should you configure the IDB?
- Regular IDB backups
- IDB notifications
- Limitations
- IDB Growth and Performance
- IDB key growth factors
- IDB key performance factors
- IDB key growth and performance parameters
- Influence of logging level on IDB
- Example: Changing of logging level for filesystem backup
- Influence of catalog protection on IDB
- Example: Changing of catalog protection of a backup
- Recommended usage of logging level and catalog protection
- Use different logging levels in the same cell
- Different logging levels for ObjectCopies
- Specifics for small cells
- Specifics for large cells
- Maintenance of DCBF directories
- Cell Manager hardware aspects to consider
- Cluster support for Data Protector software Cell Manager
- Security
- IDB space consumption example
- Cell Manager requirements
- For more information
Specifics for small cells ................................................................................................................... 25
Specifics for large cells ................................................................................................................... 26
Maintenance of DCBF directories ..................................................................................................... 26
Variables influencing DCBF behavior are located in the global options file ........................................ 27
Cell Manager hardware aspects to consider ......................................................................................... 28
MS Windows, Red Hat Linux, Suse ES, and Sun Solaris10 ................................................................. 28
Performance pack ...................................................................................................................... 28
Processor ................................................................................................................................... 28
Memory .................................................................................................................................... 29
Disk technology .......................................................................................................................... 29
I/O subsystem ........................................................................................................................... 29
Network adapter teaming ........................................................................................................... 30
HP-UX, Itanium ............................................................................................................................... 30
Cluster support for Data Protector software Cell Manager ....................................................................... 31
Security ............................................................................................................................................ 31
Cell Manager security .................................................................................................................... 31
Client security ................................................................................................................................ 31
User security .................................................................................................................................. 32
Firewall support ............................................................................................................................. 32
IDB space consumption example ......................................................................................................... 33
Cell Manager requirements ................................................................................................................. 35
On systems running HP-UX .............................................................................................................. 35
On systems running Solaris ............................................................................................................. 36
On systems running Windows 2000 or Windows XP ......................................................................... 36
On systems running Windows Server 2003 or Windows Server2008 .................................................. 36
On systems running Linux ................................................................................................................ 37
For more information .......................................................................................................................... 37