| | Copyright |
| | Preface |
| | Part 1: Introduction |
| | | Chapter 1. The Philosophy of Backup |
| | | Section 1.1. Champagne Backup on a Beer Budget |
| | | Section 1.2. Why Should I Read This Book? |
| | | Section 1.3. Why Back Up? |
| | | Section 1.4. Wax On, Wax Off: Finding a Balance |
| | | Chapter 2. Backing It All Up |
| | | Section 2.1. Don't Skip This Chapter! |
| | | Section 2.2. Deciding Why You Are Backing Up |
| | | Section 2.3. Deciding What to Back Up |
| | | Section 2.4. Deciding When to Back Up |
| | | Section 2.5. Deciding How to Back Up |
| | | Section 2.6. Storing Your Backups |
| | | Section 2.7. Testing Your Backups |
| | | Section 2.8. Monitoring Your Backups |
| | | Section 2.9. Following Proper Development Procedures |
| | | Section 2.10. Unrelated Miscellanea |
| | | Section 2.11. Good Luck |
| | Part 2: Open-Source Backup Utilities |
| | | Chapter 3. Basic Backup and Recovery Utilities |
| | | Section 3.1. An Overview |
| | | Section 3.2. Backing Up and Restoring with ntbackup |
| | | Section 3.3. Using System Restore in Windows |
| | | Section 3.4. Backing Up with the dump Utility |
| | | Section 3.5. Restoring with the restore Utility |
| | | Section 3.6. Limitations of dump and restore |
| | | Section 3.7. Features to Check For |
| | | Section 3.8. Backing Up and Restoring with the cpio Utility |
| | | Section 3.9. Backing Up and Restoring with the tar Utility |
| | | Section 3.10. Backing Up and Restoring with the dd Utility |
| | | Section 3.11. Using rsync |
| | | Section 3.12. Backing Up and Restoring with the ditto Utility |
| | | Section 3.13. Comparing tar, cpio, and dump |
| | | Section 3.14. Using ssh or rsh as a Conduit Between Systems |
| | | Chapter 4. Amanda |
| | | Section 4.1. Summary of Important Features |
| | | Section 4.2. Configuring Amanda |
| | | Section 4.3. Backing Up Clients via NFS or Samba |
| | | Section 4.4. Amanda Recovery |
| | | Section 4.5. Community and Support Options |
| | | Section 4.6. Future Plans |
| | | Chapter 5. BackupPC |
| | | Section 5.1. BackupPC Features |
| | | Section 5.2. How BackupPC Works |
| | | Section 5.3. Installation How-To |
| | | Section 5.4. Starting BackupPC |
| | | Section 5.5. Per-Client Configuration |
| | | Section 5.6. The BackupPC Community |
| | | Section 5.7. The Future of BackupPC |
| | | Chapter 6. Bacula |
| | | Section 6.1. Bacula Architecture |
| | | Section 6.2. Bacula Features |
| | | Section 6.3. An Example Configuration |
| | | Section 6.4. Advanced Features |
| | | Section 6.5. Future Directions |
| | | Chapter 7. Open-Source Near-CDP |
| | | Section 7.1. rsync with Snapshots |
| | | Section 7.2. rsnapshot |
| | | Section 7.3. rdiff-backup |
| | Part 3: Commercial Backup |
| | | Chapter 8. Commercial Backup Utilities |
| | | Section 8.1. What to Look For |
| | | Section 8.2. Full Support of Your Platforms |
| | | Section 8.3. Backup of Raw Partitions |
| | | Section 8.4. Backup of Very Large Filesystems and Files |
| | | Section 8.5. Aggressive Requirements |
| | | Section 8.6. Simultaneous Backup of Many Clients to One Drive |
| | | Section 8.7. Disk-to-Disk-to-Tape Backup |
| | | Section 8.8. Simultaneous Backup of One Client to Many Drives |
| | | Section 8.9. Data Requiring Special Treatment |
| | | Section 8.10. Storage Management Features |
| | | Section 8.11. Reduction in Network Traffic |
| | | Section 8.12. Support of a Standard or Custom Backup Format |
| | | Section 8.13. Ease of Administration |
| | | Section 8.14. Security |
| | | Section 8.15. Ease of Recovery |
| | | Section 8.16. Protection of the Backup Index |
| | | Section 8.17. Robustness |
| | | Section 8.18. Automation |
| | | Section 8.19. Volume Verification |
| | | Section 8.20. Cost |
| | | Section 8.21. Vendor |
| | | Section 8.22. Final Thoughts |
| | | Chapter 9. Backup Hardware |
| | | Section 9.1. Decision Factors |
| | | Section 9.2. Using Backup Hardware |
| | | Section 9.3. Tape Drives |
| | | Section 9.4. Optical Drives |
| | | Section 9.5. Automated Backup Hardware |
| | | Section 9.6. Disk Targets |
| | Part 4: Bare-Metal Recovery |
| | | Chapter 10. Solaris Bare-Metal Recovery |
| | | Section 10.1. Using Flash Archive |
| | | Section 10.2. Preparing for an Interactive Restore |
| | | Section 10.3. Setup of a Noninteractive Restore |
| | | Section 10.4. Final Thoughts |
| | | Chapter 11. Linux and Windows |
| | | Section 11.1. How It Works |
| | | Section 11.2. The Steps in Theory |
| | | Section 11.3. Assumptions |
| | | Section 11.4. Alt-Boot Full Image Method |
| | | Section 11.5. Alt-Boot Partition Image Method |
| | | Section 11.6. Live Method |
| | | Section 11.7. Alt-Boot Filesystem Method |
| | | Section 11.8. Automate Bare-Metal Recovery with G4L |
| | | Section 11.9. Commercial Solutions |
| | | Chapter 12. HP-UX Bare-Metal Recovery |
| | | Section 12.1. System Recovery with Ignite-UX |
| | | Section 12.2. Planning for Ignite-UX Archive Storage and Recovery |
| | | Section 12.3. Implementation Example |
| | | Section 12.4. System Cloning |
| | | Section 12.5. Security |
| | | Section 12.6. System Recovery and Disk Mirroring |
| | | Chapter 13. AIX Bare-Metal Recovery |
| | | Section 13.1. IBM's mksysb and savevg Utilities |
| | | Section 13.2. Backing Up with mksysb |
| | | Section 13.3. Setting Up NIM |
| | | Section 13.4. savevg Operations |
| | | Section 13.5. Verifying a mksysb or savevg Backup |
| | | Section 13.6. Restoring an AIX System with mksysb |
| | | Section 13.7. System Cloning |
| | | Chapter 14. Mac OS X Bare-Metal Recovery |
| | | Section 14.1. How It Works |
| | | Section 14.2. A Sample Bare-Metal Recovery |
| | Part 5: Database Backup |
| | | Chapter 15. Backing Up Databases |
| | | Section 15.1. Can It Be Done? |
| | | Section 15.2. Confusion: The Mysteries of Database Architecture |
| | | Section 15.3. The Muck Stops Here: Databases in Plain English |
| | | Section 15.4. What's the Big Deal? |
| | | Section 15.5. Database Structure |
| | | Section 15.6. An Overview of a Page Change |
| | | Section 15.7. ACID Compliance |
| | | Section 15.8. What Can Happen to an RDBMS? |
| | | Section 15.9. Backing Up an RDBMS |
| | | Section 15.10. Restoring an RDBMS |
| | | Section 15.11. Documentation and Testing |
| | | Section 15.12. Unique Database Requirements |
| | | Chapter 16. Oracle Backup and Recovery |
| | | Section 16.1. Two Backup Methods |
| | | Section 16.2. Oracle Architecture |
| | | Section 16.3. Physical Backups Without rman |
| | | Section 16.4. Physical Backups with rman |
| | | Section 16.5. Flashback |
| | | Section 16.6. Managing the Archived Redo Logs |
| | | Section 16.7. Recovering Oracle |
| | | Section 16.8. Logical Backups |
| | | Section 16.9. A Broken Record |
| | | Chapter 17. Sybase Backup and Recovery |
| | | Section 17.1. Sybase Architecture |
| | | Section 17.2. The Power User's View |
| | | Section 17.3. The DBA's View |
| | | Section 17.4. Protecting Your Database |
| | | Section 17.5. Backup Automation Through Scripting |
| | | Section 17.6. Physical Backups with a Storage Manager |
| | | Section 17.7. Recovering Your Database |
| | | Section 17.8. Common Sybase Procedures |
| | | Section 17.9. Sybase Recovery Procedure |
| | | Chapter 18. IBM DB2 Backup and Recovery |
| | | Section 18.1. DB2 Architecture |
| | | Section 18.2. The backup, restore, rollforward, and recover Commands |
| | | Section 18.3. Recovering Your Database |
| | | Chapter 19. SQL Server |
| | | Section 19.1. Overview of SQL Server |
| | | Section 19.2. The Power User's View |
| | | Section 19.3. The DBA's View |
| | | Section 19.4. Backups |
| | | Section 19.5. Logical (Table-Level) Backups |
| | | Section 19.6. Restore and Recovery |
| | | Chapter 20. Exchange |
| | | Section 20.1. Exchange Architecture |
| | | Section 20.2. Storage Groups |
| | | Section 20.3. Backup |
| | | Section 20.4. Using ntbackup to Back Up |
| | | Section 20.5. Restore |
| | | Section 20.6. Exchange Restore |
| | | Chapter 21. PostgreSQL |
| | | Section 21.1. PostgreSQL Architecture |
| | | Section 21.2. Backup and Recovery |
| | | Section 21.3. Point-in-Time Recovery |
| | | Chapter 22. MySQL |
| | | Section 22.1. MySQL Architecture |
| | | Section 22.2. MySQL Backup and Recovery Methodologies |
| | Part 6: Potpourri |
| | | Chapter 23. VMware and Miscellanea |
| | | Section 23.1. Backing Up VMware Servers |
| | | Section 23.2. Volatile Filesystems |
| | | Section 23.3. Demystifying dump |
| | | Section 23.4. How Do I Read This Volume? |
| | | Section 23.5. Gigabit Ethernet |
| | | Section 23.6. Disk Recovery Companies |
| | | Section 23.7. Yesterday |
| | | Section 23.8. Trust Me About the Backups |
| | | Chapter 24. It's All About Data Protection |
| | | Section 24.1. Business Reasons for Data Protection |
| | | Section 24.2. Technical Reasons for Data Protection |
| | | Section 24.3. Backup and Archive |
| | | Section 24.4. What Needs to Be Backed Up? |
| | | Section 24.5. What Needs to Be Archived? |
| | | Section 24.6. Examples of Backup and Archive |
| | | Section 24.7. Can Open-Source Backup Do the Job? |
| | | Section 24.8. Disaster Recovery |
| | | Section 24.9. Everything Starts with the Business |
| | | Section 24.10. Storage Security |
| | | Section 24.11. Conclusion |
| | Colophon |
| | Index |