Veritas NetBackup™ Vault Administrator's Guide
- About Vault
- Installing Vault
- Best Practices
- About preferred vaulting strategies
- About how to ensure that data is vaulted
- About not Vaulting more than necessary
- About preparing for efficient recovery
- About avoiding resource contention during duplication
- About how to avoid sending duplicates over the network
- About increasing duplication throughput
- About organizing reports
- Configuring NetBackup Vault
- Configuring Vault
- About Vault configuration
- About configuring Vault Management Properties
- About creating a vault
- About creating profiles
- Configuring a profile
- Vaulting and managing media
- About Vault sessions
- About monitoring a Vault session
- About the list of images to be vaulted
- About ejecting media
- About injecting media
- About using containers
- About vaulting additional volumes
- About using notify scripts
- Creating originals or copies concurrently
- Reporting
- Administering Vault
- About administering access to Vault
- About NetBackup Vault session files
- Using the menu user interface
- Troubleshooting
- Debug logs
- Appendix A. Recovering from disasters
- Appendix B. Vault file and directory structure
About preparing for recovery
Recovering data can be a difficult and time consuming process. The success of recovery often depends on how well you prepare for disaster. Your preparations for disaster and what you have to accomplish during a recovery depends on your recovery systems. For example, suppose your recovery site and systems are already operational and have NetBackup and Vault installed. You do not have to protect the NetBackup installation media and the license keys and install NetBackup during the recovery process. You only have to recover the NetBackup catalogs and data. Conversely, if your recovery systems do not have NetBackup and Vault installed and configured, you have to prepare for that and accomplish it during recovery.
You should do the following to prepare for recovery using NetBackup and Vault. (You may not have to do some of the items listed, and you may have to do more than what is listed.)
Develop a disaster recovery plan.
Test the disaster recovery plan.
Back up and vault data regularly. In addition to backing up files on a regular basis, it is important to select the correct files to back up. You should back up all data that your organization's impact analysis determines is critical and store copies at a secure, off-site storage location.
If you can recover to the same or identical hardware, back up and vault the applications that your organization's impact analysis determines are critical. You also should back up system files so you can quickly restore a system to normal operation.
Include all operating system files in your backups. For Microsoft Windows systems, the Windows system directories include the registry, without which it is impossible to restore a system to its original configuration. If you are using a NetBackup exclude list for a client, do not specify any Windows system files in that list.
Restoring operating system files is not helpful if you are recovering data to a different system at your original site or disaster recovery site. You can back up those files, but then not restore them if you are recovering to a different system or site.
Back up executable and other files for applications you need to conduct critical operations. You may want to save money by using fewer tape volumes, but backing up critical applications ensures that you can restore them to their exact configurations. For example, if you have applied software updates or patches, restoring from a backup eliminates the need to reapply them, reducing recovery time.
Every time you vault media, store the Recovery Report securely. The same disaster that destroys your site can destroy your Recovery Report. You need the Recovery Report to identify the media you need to recall from off-site storage. Your vault vendor may let you vault your Recovery Report. If you have a recovery site equipped with computers, email the Recovery Report to that site.
Record and protect the names of the policies that are used to backup the data you want to recover. The Recovery Report is organized by policy. You need to know which policies are used so you can identify the media you need to recover.
Record and protect the names of the off-site volume groups for the data you want to recover. Those names are used during the recovery process. Alternatively, you can obtain the off-site volume group names after you restore the NetBackup catalog (because the catalog includes the Vault configuration).
Document the commands and options that you need to recover data. For example, the bpchangeprimary command is used to promote the vaulted images to primary images so that you can restore from them. So you should have a record of the commands and options that you need during the recovery process.
Protect the NetBackup and Vault installation media. You need the media so you can install NetBackup and Vault on the recovery system if it is not already installed.
Record and protect the license keys for NetBackup and Vault. You need them for NetBackup and Vault on the recovery system if you have to install NetBackup. You can use temporary license keys if necessary.
Protect the installation media and record the license keys for any other Veritas products that must be installed on the recovery systems. For example, if you use the Veritas File System and Veritas Volume Manager on the recovery systems, you need their license keys when you install those products.
Protect the installation media for the operating system and other applications that are required to run the systems you are using for recovery.
Protect your DR plan. The same disaster that destroys your site can destroy your DR plan and recovery report. You should have copies stored so that they will be available when needed. Your vault vendor may let you vault a copy of the DR plan.
Note:
Effective disaster recovery procedures are specific to an environment and provide detailed information about everything that should be accomplished to prepare for disaster and to recover after disaster occurs. Veritas provides general disaster recovery information that is intended as a model only. You must evaluate the information and then develop your own disaster recovery plans and procedures.