HP StorageWorks Application Recovery Manager Administrator's Guide (T4395-96004, February 2008)

G-15
Glossary
(P-VOL) and its replica (S-VOL) are in
the suspended mirror relationship. The
maximum number of replicas (S-VOLs
per a P-VOL) rotated is three provided
that MU range is 0-2 or 0, 1, 2. Restore
from a backup in such a configuration is
possible only by re-synchronization of
an S-VOL with its P-VOL. See also VSS
compliant mode, source volume, P-
VOL, replica, S-VOL, MU number,
and replica set rotation.
RSM
The Application Recovery Manager
Restore Session Manager controls the
restore session. This process always
runs on the Cell Manager system.
Scheduler
A function that controls when and how
often automatic backups occur. By
setting up a schedule, you automate the
start of backups.
Secondary Volume (S-VOL) (HP
StorageWorks Disk Array XP specific
term)
Secondary Volumes, or S-VOLs, are XP
LDEVs that act as a secondary BC
mirror of another LDEV (a P-VOL).
The S-VOLs are assigned separate SCSI
addresses, different from the addresses
used by the P-VOLs.
See also Primary Volume (P-VOL).
session
See backup session and restore
session.
session ID
An identifier of a backup, restore
session, consisting of the date when the
session ran and a unique number.
session key
This environment variable for the Pre-
and Post-exec script is an Application
Recovery Manager unique identification
of any session. The session key is not
recorded in the database, and it is used
for specifying options for the omnistat
and omniabort CLI commands.
shadow copy (MS VSS specific term)
A volume that represents a duplicate of
the original volume at a certain point in
time. The data is then backed up from
the shadow copy and not from the
original volume. The original volume
continues to change as the backup
process continues, but the shadow copy
of the volume remains constant.
See also Microsoft Volume Shadow
Copy Service and replica.
shadow copy provider (MS VSS
specific term)
An entity that performs the work on
creating and representing the volume
shadow copies. Providers own the
shadow copy data and expose the
shadow copies. Providers can be