HP P9000 Replication Manager Software 7.3.1-00 CLI User Guide
Setting communication timeout periods for the Protection Manager service ............................... 112
Setting up Application Agent for linkage with RAID Manager ....................................................... 112
Specifying instance numbers .............................................................................................. 112
Specifying a retry count and interval for pair status retry checking .......................................... 115
Specifying a retry count and interval for RAID Manager command busy retry checking ............. 119
Specifying a retry count and interval appropriate to operation style ........................................ 120
Specifying track sizes used when copying data .................................................................... 122
Specifying volume pair creation ......................................................................................... 123
Settings for using secondary volume dynamic recognition ...................................................... 124
Setting up operation mode when automatically selecting copy groups ..................................... 124
Notes on starting and stopping RAID Manager .................................................................... 125
Specifying the installation path for RAID Manager ................................................................ 125
Specifying modification of pair status if a backup error occurs ................................................ 126
Creating dictionary map files ................................................................................................... 126
Creation in a non-cluster configuration or on a backup server ................................................ 127
Creation in an Active-Passive cluster configuration ................................................................. 127
Creation in an Active-Active cluster configuration .................................................................. 129
Creation in a cascade configuration for Exchange database backup ....................................... 132
Specifying cluster configuration settings and creating a definition file ............................................. 132
Settings related to shared disks and cluster groups ................................................................ 133
How to define a cluster group (when a backup target and shared disks are to be in the same
cluster group) ............................................................................................................ 133
Creating a cluster information configuration definition file when using Veritas cluster server ........ 134
Creating a database configuration definition file ......................................................................... 136
Creating a configuration definition file for SQL Server database backup .................................. 136
Specifying settings related to linkage with an SQL Server ............................................................. 138
Specifying settings for using VSS ............................................................................................... 142
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/03 or later .................. 144
Using VSS with P9000 RMXP Shadow Copy Provider version 01-02-03/02 or earlier ............... 145
Creating a cascade configuration definition file for Exchange database backup .............................. 147
Setting up linkage with a tape backup management software ....................................................... 150
Registering information for linkage with a tape backup management software .......................... 150
Creating a configuration definition file for tape backup ......................................................... 151
Configuration parameters ........................................................................................... 152
Configuration file examples ......................................................................................... 155
User-defined configuration definition file ....................................................................... 156
Creating a list file ................................................................................................................... 156
Creating a copy-group list file ............................................................................................ 156
Creating a database list file or mount point directory list file .................................................. 157
Commands that support a target definition file ............................................................... 157
File name of the list file ............................................................................................... 158
List file storage location .............................................................................................. 158
Contents of the list file ................................................................................................ 158
Creating a transaction log list file ....................................................................................... 158
File name of the transaction log list file ......................................................................... 158
Transaction log list file storage location ......................................................................... 158
Contents of the transaction log list file ........................................................................... 159
Creation of a transaction log list file ............................................................................. 159
Updating a dictionary map file ................................................................................................. 160
Specifying how to mount a secondary volume ............................................................................ 160
Making the OS dynamically recognize the secondary volume ................................................ 161
Making the OS statically recognize the secondary volume ..................................................... 169
Determining a mount point and mount target when mounting a secondary volume .................... 173
Determination of a mount point .................................................................................... 174
Determination of a mount target ................................................................................... 176
Application Agent CLI User Guide 5