2025-03-15 - San Raimundo de Fitero y otros... |      623029155    info@evainformatica.es  Contacta

Backup & Recovery

https://evainformatica.es/biblioteca_virtual/manuales/img/backup_and_recovery.png

Formato: chm

Tamaño: 3.0 MB

idioma: en

Descargar

Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery.

Backup & Recovery

1: Introduction

Chapter 1. The Philosophy of Backup
 Section 1.1. Champagne Backup on a Beer Budget
 Section 1.2. Why Should I Read This Book?
 Section 1.3. Why Back Up?
 Section 1.4. Wax On, Wax Off: Finding a Balance
Chapter 2. Backing It All Up
 Section 2.1. Don't Skip This Chapter!
 Section 2.2. Deciding Why You Are Backing Up
 Section 2.3. Deciding What to Back Up
 Section 2.4. Deciding When to Back Up
 Section 2.5. Deciding How to Back Up
 Section 2.6. Storing Your Backups
 Section 2.7. Testing Your Backups
 Section 2.8. Monitoring Your Backups
 Section 2.9. Following Proper Development Procedures
 Section 2.10. Unrelated Miscellanea
 Section 2.11. Good Luck

 

2: Open-Source Backup Utilities

Chapter 3. Basic Backup and Recovery Utilities
 Section 3.1. An Overview
 Section 3.2. Backing Up and Restoring with ntbackup
 Section 3.3. Using System Restore in Windows
 Section 3.4. Backing Up with the dump Utility
 Section 3.5. Restoring with the restore Utility
 Section 3.6. Limitations of dump and restore
 Section 3.7. Features to Check For
 Section 3.8. Backing Up and Restoring with the cpio Utility
 Section 3.9. Backing Up and Restoring with the tar Utility
 Section 3.10. Backing Up and Restoring with the dd Utility
 Section 3.11. Using rsync
 Section 3.12. Backing Up and Restoring with the ditto Utility
 Section 3.13. Comparing tar, cpio, and dump
 Section 3.14. Using ssh or rsh as a Conduit Between Systems Chapter 4. Amanda
 Section 4.1. Summary of Important Features
 Section 4.2. Configuring Amanda
 Section 4.3. Backing Up Clients via NFS or Samba
 Section 4.4. Amanda Recovery
 Section 4.5. Community and Support Options
 Section 4.6. Future Plans
Chapter 5. BackupPC
 Section 5.1. BackupPC Features
 Section 5.2. How BackupPC Works
 Section 5.3. Installation How-To
 Section 5.4. Starting BackupPC
 Section 5.5. Per-Client Configuration
 Section 5.6. The BackupPC Community
 Section 5.7. The Future of BackupPC
Chapter 6. Bacula
 Section 6.1. Bacula Architecture
 Section 6.2. Bacula Features
 Section 6.3. An Example Configuration
 Section 6.4. Advanced Features
 Section 6.5. Future Directions
Chapter 7. Open-Source Near-CDP
 Section 7.1. rsync with Snapshots
 Section 7.2. rsnapshot
 Section 7.3. rdiff-backup

 

3: Commercial Backup

Chapter 8. Commercial Backup Utilities
 Section 8.1. What to Look For
 Section 8.2. Full Support of Your Platforms
 Section 8.3. Backup of Raw Partitions
 Section 8.4. Backup of Very Large Filesystems and Files
 Section 8.5. Aggressive Requirements
 Section 8.6. Simultaneous Backup of Many Clients to One Drive
 Section 8.7. Disk-to-Disk-to-Tape Backup
 Section 8.8. Simultaneous Backup of One Client to Many Drives
 Section 8.9. Data Requiring Special Treatment
 Section 8.10. Storage Management Features
 Section 8.11. Reduction in Network Traffic
 Section 8.12. Support of a Standard or Custom Backup Format
 Section 8.13. Ease of Administration
 Section 8.14. Security
 Section 8.15. Ease of Recovery
 Section 8.16. Protection of the Backup Index
 Section 8.17. Robustness
 Section 8.18. Automation
 Section 8.19. Volume Verification
 Section 8.20. Cost
 Section 8.21. Vendor
 Section 8.22. Final Thoughts
Chapter 9. Backup Hardware
 Section 9.1. Decision Factors
 Section 9.2. Using Backup Hardware
 Section 9.3. Tape Drives
 Section 9.4. Optical Drives
 Section 9.5. Automated Backup Hardware
 Section 9.6. Disk Targets

 

4: Bare-Metal Recovery

Chapter 10. Solaris Bare-Metal Recovery
 Section 10.1. Using Flash Archive
 Section 10.2. Preparing for an Interactive Restore
 Section 10.3. Setup of a Noninteractive Restore
 Section 10.4. Final Thoughts
Chapter 11. Linux and Windows
 Section 11.1. How It Works
 Section 11.2. The Steps in Theory
 Section 11.3. Assumptions
 Section 11.4. Alt-Boot Full Image Method
 Section 11.5. Alt-Boot Partition Image Method
 Section 11.6. Live Method
 Section 11.7. Alt-Boot Filesystem Method
 Section 11.8. Automate Bare-Metal Recovery with G4L
 Section 11.9. Commercial Solutions
Chapter 12. HP-UX Bare-Metal Recovery
 Section 12.1. System Recovery with Ignite-UX
 Section 12.2. Planning for Ignite-UX Archive Storage and Recovery
 Section 12.3. Implementation Example
 Section 12.4. System Cloning
 Section 12.5. Security
 Section 12.6. System Recovery and Disk Mirroring
Chapter 13. AIX Bare-Metal Recovery
 Section 13.1. IBM's mksysb and savevg Utilities
 Section 13.2. Backing Up with mksysb
 Section 13.3. Setting Up NIM
 Section 13.4. savevg Operations
 Section 13.5. Verifying a mksysb or savevg Backup
 Section 13.6. Restoring an AIX System with mksysb
 Section 13.7. System Cloning
Chapter 14. Mac OS X Bare-Metal Recovery
 Section 14.1. How It Works
 Section 14.2. A Sample Bare-Metal Recovery

 

5: Database Backup

Chapter 15. Backing Up Databases
 Section 15.1. Can It Be Done?
 Section 15.2. Confusion: The Mysteries of Database Architecture
 Section 15.3. The Muck Stops Here: Databases in Plain English
 Section 15.4. What's the Big Deal?
 Section 15.5. Database Structure
 Section 15.6. An Overview of a Page Change
 Section 15.7. ACID Compliance
 Section 15.8. What Can Happen to an RDBMS?
 Section 15.9. Backing Up an RDBMS
 Section 15.10. Restoring an RDBMS
 Section 15.11. Documentation and Testing
 Section 15.12. Unique Database Requirements
Chapter 16. Oracle Backup and Recovery
 Section 16.1. Two Backup Methods
 Section 16.2. Oracle Architecture
 Section 16.3. Physical Backups Without rman
 Section 16.4. Physical Backups with rman
 Section 16.5. Flashback
 Section 16.6. Managing the Archived Redo Logs
 Section 16.7. Recovering Oracle
 Section 16.8. Logical Backups
 Section 16.9. A Broken Record
Chapter 17. Sybase Backup and Recovery
 Section 17.1. Sybase Architecture
 Section 17.2. The Power User's View
 Section 17.3. The DBA's View
 Section 17.4. Protecting Your Database
 Section 17.5. Backup Automation Through Scripting
 Section 17.6. Physical Backups with a Storage Manager
 Section 17.7. Recovering Your Database
 Section 17.8. Common Sybase Procedures
 Section 17.9. Sybase Recovery Procedure
Chapter 18. IBM DB2 Backup and Recovery
 Section 18.1. DB2 Architecture
 Section 18.2. The backup, restore, rollforward, and recover Commands
 Section 18.3. Recovering Your Database
Chapter 19. SQL Server
 Section 19.1. Overview of SQL Server
 Section 19.2. The Power User's View
 Section 19.3. The DBA's View
 Section 19.4. Backups
 Section 19.5. Logical (Table-Level) Backups
 Section 19.6. Restore and Recovery
Chapter 20. Exchange
 Section 20.1. Exchange Architecture
 Section 20.2. Storage Groups
 Section 20.3. Backup
 Section 20.4. Using ntbackup to Back Up
 Section 20.5. Restore
 Section 20.6. Exchange Restore
Chapter 21. PostgreSQL
 Section 21.1. PostgreSQL Architecture
 Section 21.2. Backup and Recovery
 Section 21.3. Point-in-Time Recovery
Chapter 22. MySQL
 Section 22.1. MySQL Architecture
 Section 22.2. MySQL Backup and Recovery Methodologies

 

6: Potpourri

Chapter 23. VMware and Miscellanea
 Section 23.1. Backing Up VMware Servers
 Section 23.2. Volatile Filesystems
 Section 23.3. Demystifying dump
 Section 23.4. How Do I Read This Volume?
 Section 23.5. Gigabit Ethernet
 Section 23.6. Disk Recovery Companies
 Section 23.7. Yesterday
 Section 23.8. Trust Me About the Backups
Chapter 24. It's All About Data Protection
 Section 24.1. Business Reasons for Data Protection
 Section 24.2. Technical Reasons for Data Protection
 Section 24.3. Backup and Archive
 Section 24.4. What Needs to Be Backed Up?
 Section 24.5. What Needs to Be Archived?
 Section 24.6. Examples of Backup and Archive
 Section 24.7. Can Open-Source Backup Do the Job?
 Section 24.8. Disaster Recovery
 Section 24.9. Everything Starts with the Business
 Section 24.10. Storage Security
 Section 24.11. Conclusion


Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot.

Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology.

Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so.