Backup & Recovery
1: Introduction
Chapter 1. The Philosophy of Backup
Section 1.1. Champagne Backup on a Beer Budget
Section 1.2. Why Should I Read This Book?
Section 1.3. Why Back Up?
Section 1.4. Wax On, Wax Off: Finding a Balance
Chapter 2. Backing It All Up
Section 2.1. Don't Skip This Chapter!
Section 2.2. Deciding Why You Are Backing Up
Section 2.3. Deciding What to Back Up
Section 2.4. Deciding When to Back Up
Section 2.5. Deciding How to Back Up
Section 2.6. Storing Your Backups
Section 2.7. Testing Your Backups
Section 2.8. Monitoring Your Backups
Section 2.9. Following Proper Development Procedures
Section 2.10. Unrelated Miscellanea
Section 2.11. Good Luck
2: Open-Source Backup Utilities
Chapter 3. Basic Backup and Recovery Utilities
Section 3.1. An Overview
Section 3.2. Backing Up and Restoring with ntbackup
Section 3.3. Using System Restore in Windows
Section 3.4. Backing Up with the dump Utility
Section 3.5. Restoring with the restore Utility
Section 3.6. Limitations of dump and restore
Section 3.7. Features to Check For
Section 3.8. Backing Up and Restoring with the cpio Utility
Section 3.9. Backing Up and Restoring with the tar Utility
Section 3.10. Backing Up and Restoring with the dd Utility
Section 3.11. Using rsync
Section 3.12. Backing Up and Restoring with the ditto Utility
Section 3.13. Comparing tar, cpio, and dump
Section 3.14. Using ssh or rsh as a Conduit Between Systems
Chapter 4. Amanda
Section 4.1. Summary of Important Features
Section 4.2. Configuring Amanda
Section 4.3. Backing Up Clients via NFS or Samba
Section 4.4. Amanda Recovery
Section 4.5. Community and Support Options
Section 4.6. Future Plans
Chapter 5. BackupPC
Section 5.1. BackupPC Features
Section 5.2. How BackupPC Works
Section 5.3. Installation How-To
Section 5.4. Starting BackupPC
Section 5.5. Per-Client Configuration
Section 5.6. The BackupPC Community
Section 5.7. The Future of BackupPC
Chapter 6. Bacula
Section 6.1. Bacula Architecture
Section 6.2. Bacula Features
Section 6.3. An Example Configuration
Section 6.4. Advanced Features
Section 6.5. Future Directions
Chapter 7. Open-Source Near-CDP
Section 7.1. rsync with Snapshots
Section 7.2. rsnapshot
Section 7.3. rdiff-backup
3: Commercial Backup
Chapter 8. Commercial Backup Utilities
Section 8.1. What to Look For
Section 8.2. Full Support of Your Platforms
Section 8.3. Backup of Raw Partitions
Section 8.4. Backup of Very Large Filesystems and Files
Section 8.5. Aggressive Requirements
Section 8.6. Simultaneous Backup of Many Clients to One Drive
Section 8.7. Disk-to-Disk-to-Tape Backup
Section 8.8. Simultaneous Backup of One Client to Many Drives
Section 8.9. Data Requiring Special Treatment
Section 8.10. Storage Management Features
Section 8.11. Reduction in Network Traffic
Section 8.12. Support of a Standard or Custom Backup Format
Section 8.13. Ease of Administration
Section 8.14. Security
Section 8.15. Ease of Recovery
Section 8.16. Protection of the Backup Index
Section 8.17. Robustness
Section 8.18. Automation
Section 8.19. Volume Verification
Section 8.20. Cost
Section 8.21. Vendor
Section 8.22. Final Thoughts
Chapter 9. Backup Hardware
Section 9.1. Decision Factors
Section 9.2. Using Backup Hardware
Section 9.3. Tape Drives
Section 9.4. Optical Drives
Section 9.5. Automated Backup Hardware
Section 9.6. Disk Targets
4: Bare-Metal Recovery
Chapter 10. Solaris Bare-Metal Recovery
Section 10.1. Using Flash Archive
Section 10.2. Preparing for an Interactive Restore
Section 10.3. Setup of a Noninteractive Restore
Section 10.4. Final Thoughts
Chapter 11. Linux and Windows
Section 11.1. How It Works
Section 11.2. The Steps in Theory
Section 11.3. Assumptions
Section 11.4. Alt-Boot Full Image Method
Section 11.5. Alt-Boot Partition Image Method
Section 11.6. Live Method
Section 11.7. Alt-Boot Filesystem Method
Section 11.8. Automate Bare-Metal Recovery with G4L
Section 11.9. Commercial Solutions
Chapter 12. HP-UX Bare-Metal Recovery
Section 12.1. System Recovery with Ignite-UX
Section 12.2. Planning for Ignite-UX Archive Storage and Recovery
Section 12.3. Implementation Example
Section 12.4. System Cloning
Section 12.5. Security
Section 12.6. System Recovery and Disk Mirroring
Chapter 13. AIX Bare-Metal Recovery
Section 13.1. IBM's mksysb and savevg Utilities
Section 13.2. Backing Up with mksysb
Section 13.3. Setting Up NIM
Section 13.4. savevg Operations
Section 13.5. Verifying a mksysb or savevg Backup
Section 13.6. Restoring an AIX System with mksysb
Section 13.7. System Cloning
Chapter 14. Mac OS X Bare-Metal Recovery
Section 14.1. How It Works
Section 14.2. A Sample Bare-Metal Recovery
5: Database Backup
Chapter 15. Backing Up Databases
Section 15.1. Can It Be Done?
Section 15.2. Confusion: The Mysteries of Database Architecture
Section 15.3. The Muck Stops Here: Databases in Plain English
Section 15.4. What's the Big Deal?
Section 15.5. Database Structure
Section 15.6. An Overview of a Page Change
Section 15.7. ACID Compliance
Section 15.8. What Can Happen to an RDBMS?
Section 15.9. Backing Up an RDBMS
Section 15.10. Restoring an RDBMS
Section 15.11. Documentation and Testing
Section 15.12. Unique Database Requirements
Chapter 16. Oracle Backup and Recovery
Section 16.1. Two Backup Methods
Section 16.2. Oracle Architecture
Section 16.3. Physical Backups Without rman
Section 16.4. Physical Backups with rman
Section 16.5. Flashback
Section 16.6. Managing the Archived Redo Logs
Section 16.7. Recovering Oracle
Section 16.8. Logical Backups
Section 16.9. A Broken Record
Chapter 17. Sybase Backup and Recovery
Section 17.1. Sybase Architecture
Section 17.2. The Power User's View
Section 17.3. The DBA's View
Section 17.4. Protecting Your Database
Section 17.5. Backup Automation Through Scripting
Section 17.6. Physical Backups with a Storage Manager
Section 17.7. Recovering Your Database
Section 17.8. Common Sybase Procedures
Section 17.9. Sybase Recovery Procedure
Chapter 18. IBM DB2 Backup and Recovery
Section 18.1. DB2 Architecture
Section 18.2. The backup, restore, rollforward, and recover Commands
Section 18.3. Recovering Your Database
Chapter 19. SQL Server
Section 19.1. Overview of SQL Server
Section 19.2. The Power User's View
Section 19.3. The DBA's View
Section 19.4. Backups
Section 19.5. Logical (Table-Level) Backups
Section 19.6. Restore and Recovery
Chapter 20. Exchange
Section 20.1. Exchange Architecture
Section 20.2. Storage Groups
Section 20.3. Backup
Section 20.4. Using ntbackup to Back Up
Section 20.5. Restore
Section 20.6. Exchange Restore
Chapter 21. PostgreSQL
Section 21.1. PostgreSQL Architecture
Section 21.2. Backup and Recovery
Section 21.3. Point-in-Time Recovery
Chapter 22. MySQL
Section 22.1. MySQL Architecture
Section 22.2. MySQL Backup and Recovery Methodologies
6: Potpourri
Chapter 23. VMware and Miscellanea
Section 23.1. Backing Up VMware Servers
Section 23.2. Volatile Filesystems
Section 23.3. Demystifying dump
Section 23.4. How Do I Read This Volume?
Section 23.5. Gigabit Ethernet
Section 23.6. Disk Recovery Companies
Section 23.7. Yesterday
Section 23.8. Trust Me About the Backups
Chapter 24. It's All About Data Protection
Section 24.1. Business Reasons for Data Protection
Section 24.2. Technical Reasons for Data Protection
Section 24.3. Backup and Archive
Section 24.4. What Needs to Be Backed Up?
Section 24.5. What Needs to Be Archived?
Section 24.6. Examples of Backup and Archive
Section 24.7. Can Open-Source Backup Do the Job?
Section 24.8. Disaster Recovery
Section 24.9. Everything Starts with the Business
Section 24.10. Storage Security
Section 24.11. Conclusion
Backup & Recovery starts with a complete overview of backup philosophy
and design, including the basic backup utilities of tar, dump, cpio, ntbackup,
ditto, and rsync. It then explains several open source backup products
that automate backups using those utilities, including AMANDA, Bacula,
BackupPC, rdiff-backup, and rsnapshot.
Backup & Recovery then explains how to perform bare metal recovery of
AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using
freely-available utilities. The book also provides overviews of the
current state of the commercial backup software and hardware market,
including overviews of CDP, Data De-duplication, D2D2T, and VTL technology.
Finally, it covers how to automate the backups of DB2, Exchange, MySQL,
Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a
commercial backup product to do so.