Logs all detailed information about backed up directories (names,
versions, and attributes). This represents approximately 10% of all
detailed information about backed up files and directories.
Log Directories
No information about backed up files and directories is logged to
the IDB.
No Log
The different settings influence the IDB growth, the backup speed, and the convenience
of browsing for data to be restored.
Impact on performance
The logging level defines the amount of data written to the IDB during a backup. This
also influences the IDB speed, and therefore the backup process.
Logging level and browsing for restore
Changing the level of stored information affects your ability to browse files using the
Data Protector GUI during a restore. If the
No Log
option is set, browsing is not
possible; if the
Log Directories
option is set, browsing of directories is possible;
if the
Log Files
option is set, full browsing is possible but file attributes (size,
creation, and modification dates and so on) are not displayed.
Regardless of the logging level set, it is always possible to restore your data:
•
Instead of browsing for your data, you can always manually select a file to restore
(if you know the name of the file).
•
You can retrieve information about backed up data from the media.
Logging level and restore speed
The restore speed is approximately the same when the
Log All
,
Log
Directories
, or
Log Files
options are set.
If the
No Log
option is set, the restore speed can be slower when restoring single
files. This is because Data Protector has to read all data from the beginning of an
object before finding a file to be restored.
In case of a full system restore, the whole object should be read anyway, so the
logging level settings do not play an important role.
The Data Protector internal database
200
Summary of Contents for B6960-96035
Page 17: ...Overview of backup and automated media copy sessions 340 105 Concepts guide 17 ...
Page 20: ...20 ...
Page 22: ...Publication history 22 ...
Page 132: ...Planning your backup strategy 132 ...
Page 182: ...Media management and devices 182 ...
Page 186: ...Users and user groups 186 ...
Page 204: ...The Data Protector internal database 204 ...
Page 218: ...Figure 62 Direct SIP integration example Service management 218 ...
Page 242: ...Integration with database applications 242 ...
Page 264: ...Synthetic backup 264 ...
Page 274: ...Split mirror concepts 274 ...
Page 288: ...Snapshot concepts 288 ...
Page 344: ...Further information 344 ...
Page 402: ...Glossary 402 ...