暂无图片
暂无图片
1
暂无图片
暂无图片
暂无图片
Commvault备份平台方案建议书
813
21页
8次
2019-10-31
5墨值下载
备份平台方案建议书
目 录
目 录...............................................................................................................................2
1 概述...............................................................................................................................4
1.1 项目背景......................................................................................................................4
1.2 项目组成员....................................................................................................................4
1.3 组件说明......................................................................................................................4
 
 
 
 
 
 
 
1.4 术语............................................................................................................................5
2 实施计划.........................................................................................................................6
2.1 实施计划......................................................................................................................6
2.2 流程说明......................................................................................................................7
 项目阶段
 调研设计阶段
 安装实施阶段
 测试验收阶段
3 规划设计.........................................................................................................................8
3.1 实施范围......................................................................................................................8
3.2 需要统计的信息..............................................................................................................8
3.3 架构设计......................................................................................................................8
 拓扑图
 架构说明 !
3.4 安装规划....................................................................................................................10
  "
  
3.5 文件系统备份...............................................................................................................12
 配置信息 
 备份策略规划 
 恢复规划 
3.6 Oracle RAC 备份.........................................................................................................13
 安装要求 
 备份策略规划 
 数据库归档模式 
 数据库用户 
3.7 VMware 虚拟机..........................................................................................................15
 要求 
 访问用户 
 备份策略规划 !
 恢复策略 !
3.8 网络要求....................................................................................................................19
  备份软件网络端口 !
  虚拟机网络端口 !
3.9 存储设备....................................................................................................................20
! 磁盘库 "
! 磁带库 "
3.10 策略规划....................................................................................................................21
" 存储策略 
" 存储策略时效调整 
" 计划策略 
3.11 客户端计算机组............................................................................................................22
3.12 用户安全管理...............................................................................................................22
3.13 恢复环境....................................................................................................................22
4 培训和交付.....................................................................................................................23
4.1 培训..........................................................................................................................23
4.2 交付..........................................................................................................................23
5 项目管理.......................................................................................................................24
5.1 项目管理....................................................................................................................24
5.2 实施团队....................................................................................................................24
5.3 项目沟通....................................................................................................................25
5.4 项目变更....................................................................................................................25
5.5 风险管理....................................................................................................................26
2
of 21
5墨值下载
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文档的来源(墨天轮),文档链接,文档作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论

关注
最新上传
暂无内容,敬请期待...
下载排行榜
Top250 周榜 月榜