【正文】
rver or on an attached tape system, again giving you excellent granularity for recovery bined with short restore periods and fast restore speeds.Application AwarenessMany existing backup solutions offer generic backup services that can sometimes be adapted to various applications. Instead of adopting this model, DPM 2007 takes advantage of three fully supported Microsoft technologies to provide continuous data protection specifically for SQL Server:? The DPM blockbased replication engine is used to make the initial copy of a protected database, ensuring a plete and consistent copy is made. DPM’s network transport ensures that the copied data is delivered intact to the DPM server.? After the initial copy is made, DPM captures “express full” backups using the SQL Server VSS writer, which identifies which blocks have changed in the protected database. Only those blocks (or fragments) are sent to the DPM server for protection. By storing only the differences between individual express full backups, DPM is able to maintain up to 512 shadow copies of the full data set. ? In between express full copy captures, the standard SQL Server transaction logging mechanism is used to offer uptotheminute protection. The log files themselves are replicated by DPM。 group policy, System Center Configuration Manager, or the production server mand line.Figure 3: Selecting servers to protect3. Type the user name and password for the domain account to use during the agent installation. This account must be a member of the local administrators group on all selected servers. Click Next.4. Select how you want the selected server to restart when the protection agent is installed and click Next.5. If any of the selected servers are members of a Microsoft Cluster Server (MSCS), you will see an additional screen on which you must select how to restart the clustered servers. In addition, if you choose to install the agent on one node of a cluster, DPM will remind you to install on the other nodes of the cluster to ensure that the protection system does not fail during a clustered server’s failover. DPM will not automatically restart virtual servers in an MSCS cluster. Click Next.6. Review the summary and click Install Agents to proceed with the installation.7. The results of the process appear on the Task tab. You can monitor the installation progress in the Management task area on the Agents tab. If the installation is unsuccessful, you can view the alerts in the Monitoring task area on the Alerts tab.8. After the installation is plete click Close.See Chapter 5, Configuring DPM, of the Microsoft System Center Data Protection Manager 2007 Deployment Guide for more information on installing protection agents.Creating and Configuring Protection GroupsNot all data is created equal, even when it is of the same type, like “SQL databases”. To efficiently make use of your storage and bandwidth, you must design a set of recovery goals that takes into account the nature of each protected data source. To define these goals, you must first determine your desired synchronization frequency, recovery point schedule, and retention range:? The synchronization frequency determines how often the DPM agent will capture snapshots of your data and transmit the changes to the DPM server. This value reflects how much data you are willing to lose from this data source if there is an outage or disaster. Think of your synchronization frequency as how often you wish incremental backups of your data to happen.? The recovery point schedule determines how often DPM creates discrete recovery points for the protected data. This schedule is analogous to when you perform full backups of your data.? The retention range determines how long you need DPM to keep the protected data available for recovery. You may define both shortterm and longterm protection policies to control both recovery from disk and from tape. Shortterm policies may use either disk or tape, while longterm policies are intended to provide control over your extended tape retention.o Defining a “short term to tape” scenario implies using DPM as a traditional tape backup solution, intending to replace one’s existing backup solution.o Defining “short term to disk” (only) is often used to provide a robust backup and recovery solution for SQL Server and other workloads via DPM, and then allow a third party heterogeneous “enterprise” tape solution to back up the DPM server for long term pliance.o Most DPM users, however, will choose “short term to disk” plus “l(fā)ong term to tape”, enabling a plete solution offering rapid and reliable diskbased protection and recovery, with a seamlessly integrated tape ponent for longterm retention of data.DPM uses a protection group to define its protection policies. A protection group is essentially a userdefined policy of “what is to be protected” and “how should the protection be done”, meaning the collection of data sources that share the same desired protection characteristics and configuration options such as disk allo。2007 to protect SQL Server data. For information on using DPM for example, Microsoft SQL Server 2005 provides interfaces that can be used to perform online backups, but these APIs are oriented toward capturing transactions, not bytelevel changes. SQL Server 2005 also supports Microsoft’s Volume Shadow Copy Service (VSS) for pointintime copies on the , but VSS itself only provides a way to make a pointintime copy。Protecting sql server data with SYStem center data protection manager 2007Protecting SQL Server with System Center Data Protection Manager 2007 Microsoft CorporationPublished: February 2007EXECUTIVE SUMMARYSQL Server? 2005 already offers a range of data availability technologies, including support for clustering and transaction log replication. Microsoft174。 these applications are relatively easy to protect by making static copies of their unch