Sep 28, 2012 ... EMC NetWorker Module for Microsoft Applications Release 2.4 Administration
Guide. 3. CONTENTS. Preface. Revision History. Chapter 1.
EMC® NetWorker Module for Microsoft Applications Release 2.4
Administration Guide P/N 300-012-874 REV 03
Copyright © 2007 - 2012 EMC Corporation. All rights reserved. Published in the USA. Published September 28, 2012 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to EMC Online Support (http://support.emc.com).
2
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CONTENTS
Preface Revision History Chapter 1
Overview About the NetWorker Module for Microsoft Applications software................ Support provided by NMM 2.4 .................................................................... Supported NetWorker features .............................................................. Supported Windows versions and related features................................ Support for IPv4 and IPv6 ...................................................................... Support for data deduplication ............................................................. Support for VSS backup and recovery.................................................... Support for dynamic volumes that use the Microsoft Software Shadow Copy provider .......................................................................... Support for SQL VDI Servers recovery models ........................................ Full backup and recovery............................................................................. Granular-level recovery for Exchange, Hyper-V and SharePoint applications................................................................................................. GLR Process Overview ........................................................................... GLR-compatible backup availability ...................................................... NWFS Logs and Attributes ..................................................................... Normal and directed recovery...................................................................... The VSS snapshot creation process ............................................................. Components in the VSS snapshot creation process ............................... The VSS backup process ....................................................................... About snapshots and types of snapshot backups........................................ Copy-on-write snapshot versus split-mirror snapshot technology ............................................................................................ Roll over a snapshot.............................................................................. Types of NMM client snapshot backups ................................................ Types of NMM client recoveries ............................................................. The NMM client graphical user interface...................................................... NetWorker User for NMM program overview........................................... NetWorker User for SQL Server program overview .................................. Basic tasks in NetWorker User for NMM client user interface........................ Opening the software and connecting to a NetWorker server ................. Selecting an item for recovery ............................................................... Searching for an item ............................................................................ Specifying a recovery browse time......................................................... Marking items ....................................................................................... Selecting a backup version for recovery................................................. Viewing the volumes required for a recovery.......................................... Performing a snapshot rollover.............................................................. Deleting a snapshot .............................................................................. Access privileges for backup and recovery................................................... Microsoft Windows groups and NetWorker administrative privileges............ Name resolution to identify and back-translate computer names.................
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
18 18 19 19 20 20 20 22 22 23 24 24 25 25 25 27 27 29 30 30 31 31 33 34 34 37 40 41 41 42 43 43 43 44 44 45 46 47 48
3
Contents
Cloning and recovering from original or cloned NMM backups that are no longer browsable or present in the media database.................... 49
Chapter 2
NetWorker Client Management Specifying a remote client for directed recovery........................................... Requirements........................................................................................ Specifying a remote client volume for recovery locally ........................... Recovering a remote client volume ........................................................ Connecting to a NetWorker server................................................................ Specifying a recovery browse time .............................................................. Specifying ranges for service and connection ports ..................................... Reducing the range of available ports.................................................... Specifying a password ................................................................................ Changing the PW1 password .................................................................
Chapter 3
Multihomed setup for backup and recovery Overview..................................................................................................... Basic requirements for setting up a multihomed environment ..................... Sample network topology of multihomed environment for backup ........ Requirements for multihomed NMM client's network configuration ............. Requirements for multihomed NetWorker server's network configuration ............................................................................................... Requirements for network configuration on NetWorker storage node ........... Configuring NMM client resources in a multihomed environment................. Configuring NMM client resources in a multihomed environment .......... Performing a configuration check for multihomed NetWorker backup..................................................................................................
Chapter 4
61 61 61 62 62
64 65 79 79 80 82 84
Data Deduplication with Avamar The benefits of using data deduplication..................................................... Deduplication differentiators................................................................. Comparison of deduplication and non-deduplication backups .............. Utilizing the Avamar data deduplication capabilities ................................... Supported and unsupported applications, features, and configurations ............................................................................................. Supported operating systems................................................................ Supported Microsoft applications ......................................................... Supported configurations...................................................................... Supported applications for single and multi streams when using Avamar ................................................................................................. Related documentation on Avamar and NetWorker ...................................... Avamar integration in NMM.........................................................................
4
57 57 59 59
Scheduled Backup Backup configuration roadmap ................................................................... Configuration tasks ..................................................................................... Backing up a clustered NMM client ............................................................. Moving a NMM client to another NetWorker server ...................................... Performing a directed recovery with NMM.................................................... Setting AES data encryption ........................................................................ Best practices and recommendations for backing up application data.............................................................................................................
Chapter 5
52 52 52 52 53 54 54 54 55 55
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
86 86 86 87 87 88 88 89 89 90 91
Contents
Avamar and NetWorker server configuration ................................................ Configure the Avamar and the NetWorker server ................................... Set the DNS resolution for NetWorker deduplication node and NMM .................................................................................................... Deduplication backup requirements for NetWorker server ........................... Backup levels and schedules for deduplication clients.......................... Initial full backup followed by daily incremental backups...................... Initial full backup followed by daily full backups ................................... Retention policies ................................................................................. Backup configuration notes .................................................................. Configuring a client resource for deduplication backup ............................... Querying deduplication save sets by using mminfo ..................................... Recovering deduplicated data .................................................................... Deleting deduplication save sets ................................................................
Chapter 6
92 92 93 93 94 94 94 95 98 98 99
Data Deduplication with Data Domain Software requirements.............................................................................. Utilizing the Data Domain Boost data deduplication capabilities ............... Support for client-side deduplication backup and recovery ................. Supported operating systems, applications, and streams types ................ Supported operating systems.............................................................. Supported Microsoft applications ....................................................... Supported applications for single and multi streams when using Data Domain ....................................................................................... Configuration considerations for NMM ...................................................... Configuring a client resource for client-side Data Domain Boost deduplication backups .............................................................................. Recovering deduplicated data .................................................................. Related documentation about Data Domain and NetWorker server ............
Chapter 7
91 91
102 102 102 104 104 104 105 106 106 109 109
Microsoft Windows System Backup and Recovery Supported Windows systems .................................................................... Configuring system scheduled backups..................................................... Performing a recovery ............................................................................... Recovery considerations ..................................................................... System recovery in Windows Server 2008 ........................................... System Recovery Options summary..................................................... Recovery options ...................................................................................... General recovery options..................................................................... NetWorker recovery options ................................................................ Cluster recovery options...................................................................... ADAM recovery options ....................................................................... DFS recovery options........................................................................... FRS recovery options ........................................................................... NTDS recovery options ........................................................................ Security recovery options .................................................................... Recovering file system snapshots that have not been rolled over............... Booting the NMM host in Directory Service Restore mode.......................... Authoritative recovery of NTDS or FRS data ................................................ Recovering the Windows system configuration to an earlier state .............. Restoring BOOT/BCD data in Windows 2008 R2 ........................................ Windows print queues backup and recovery.............................................. Windows DFS-R granular backup and recovery...........................................
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
112 112 115 115 116 117 118 118 119 120 123 124 126 128 129 130 131 132 134 135 135 135
5
Contents
DFS-R replicated and shared directories .............................................. Pre and post command support ................................................................ precmd.bat script................................................................................ postcmd.bat script .............................................................................. nsrsnapvsssavepnpc file..................................................................... Recovering client file index and the media database ................................. Restoring a save set entry to the client file index only .......................... Restoring a save set entry to the client file index and media database ..................................................................................
Chapter 8
138
Microsoft Windows Cluster Backup and Recovery Overview................................................................................................... Cluster support in NMM client ............................................................. Components used by NMM for Windows Cluster backup and recovery .............................................................................................. Configuring a virtual client to back up to a local storage node ............. Windows Cluster application information variable settings.................. Performing Windows Server Cluster backups ............................................. Cluster failover and backups ............................................................... Performing Windows Server Cluster recovery .............................................
Glossary Index
6
135 136 136 136 137 137 137
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
140 140 140 141 142 143 143 144
FIGURES Title 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Page
VSS backup process.................................................................................................... 30 NMM client main page ................................................................................................ 35 Monitor view ............................................................................................................... 36 Backup view................................................................................................................ 37 Restore Operation view ............................................................................................... 38 Change Server view ..................................................................................................... 38 Select SQL Instance view............................................................................................. 38 Marking a fake object.................................................................................................. 39 Selected and partially selected items .......................................................................... 42 Snapshots and snapshot save sets ............................................................................. 45 Configurations Options ............................................................................................... 53 Sample network topology of NetWorker multihomed backup....................................... 59 NIC settings................................................................................................................. 60 Local client on the taskbar next to client...................................................................... 80 Configuration Options dialog box ................................................................................ 81 Select Viewable Clients dialog box .............................................................................. 81 NMM client menu list .................................................................................................. 81 Encyrption directive for SQL VSS client resource configuration .................................... 83 General tab in NMC ..................................................................................................... 96 Apps & Modules tab with Deduplication attribute ....................................................... 97 Globals (1 of 2) tab ..................................................................................................... 98 Client direct file access deduplication environment................................................... 103 General tab in NMC ................................................................................................... 107 Apps & Modules tab with Deduplication attribute ..................................................... 108
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
7
Figures
8
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
TABLES Title 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Page
EMC publications for additional information................................................................ 12 Supported data deduplication..................................................................................... 20 VSS backup and recovery support for Microsoft applications and Windows components ................................................................................................................ 21 Support for disaster backup and recovery ................................................................... 24 NWFS Logs and Attributes ........................................................................................... 25 Pull and push support ................................................................................................. 26 Currently supported writers ......................................................................................... 28 Main conventions used in the NMM GUI ...................................................................... 36 SQL Server storage hierarchy display conventions....................................................... 39 Access privileges needed for backup and recovery ...................................................... 46 Backup tasks .............................................................................................................. 64 List of tasks required for VSS based and VDI based backups....................................... 65 Configuring a backup pool .......................................................................................... 66 Preconfigured snapshot policies ................................................................................. 69 Valid values for Backup Snapshots attribute ............................................................... 70 Conventional backup settings ..................................................................................... 71 Hardware instant snapshot policy ............................................................................... 71 Hardware instant snapshot with rollover policy ........................................................... 71 Considerations for NMM client backup schedules ....................................................... 72 Special characters and their URL-encoded values........................................................ 75 General configuration requirements for a proxy client.................................................. 78 Additional considerations for backing up a clustered NMM client................................ 79 Best practices and considerations for application backups ......................................... 84 Backup and recovery schedule comparison................................................................. 87 Single and multi streams support to and from Avamar................................................. 89 Single and multi streams support to and from Data Domain ...................................... 105 Configuration details for Data Domain and NetWorker ............................................... 106 Tasks for scheduling a backup for VSS writers........................................................... 112 Save set for Windows backup.................................................................................... 113 Components for recovery of Cluster Writer ................................................................ 140 Windows Cluster application information variable settings........................................ 142 Steps and considerations for backing up a clustered client resource ......................... 143
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
9
Tableses
10
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
PREFACE
As part of an effort to improve and enhance the performance and capabilities of its product lines, EMC periodically releases revisions of its hardware and software. Therefore, some functions described in this document might not be supported by all versions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes. If a product does not function properly or does not function as described in this document, please contact your EMC representative. Note: This document was accurate at publication time. Go to EMC Online Support (http://support.emc.com) to ensure that you are using the latest version of this document.
Purpose This guide contains information common to all the Microsoft applications that can be backed up and recovered by using EMC NetWorker Module for Microsoft Applications.
Ensure to download a copy of the NetWorker Module for Microsoft Applications Release 2.4 Application Guide from the EMC Online Support to use along with this guide. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide contains information specific to an application, and must be referred to when backing up and recovering an application.
Audience This guide is part of the EMC NetWorker Module for Microsoft Applications documentation set, and is intended for use by system administrators during the setup and maintenance of the product. Readers should be familiar with the following technologies used in backup and recovery: ◆
EMC NetWorker software
◆
EMC NetWorker snapshot management
◆
Microsoft Volume Shadow Copy Service (VSS) technology
◆
Storage subsystems, such as EMC CLARiiON or Symmetrix, if used
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
11
Preface
Related documentation Table 1 on page 12 lists the EMC publications that provide additional information. Table 1 EMC publications for additional information Guide names
Description
NetWorker Module for Microsoft Applications Release 2.4 Installation Guide
Contains preinstallation, installation, silent installation, and post installation information about NMM 2.4.
NetWorker Module for Microsoft Applications Release 2.4 Applications Guide
Contains information needed to back up and recover the supported Microsoft applications.
NetWorker Module for Microsoft Applications Release 2.4 Release Notes
Contain information about new features and changes, problems fixed from previous releases, known limitations, and late breaking information that was not updated in the remaining documentation set.
NetWorker Module for Microsoft Applications and EMC CLARiiON Implementing Proxy Node Backups 2.4 Technical Note
Contains supplemental information about using EMC NetWorker Module for Microsoft Applications release 2.4 with EMC CLARiiON.
NetWorker Module for Microsoft Applications and EMC Symmetrix Implementing Proxy Node Backups 2.4 Technical Note
Contains supplemental information about using EMC NetWorker Module for Microsoft Applications Release 2.4 with EMC Symmetrix.
NetWorker Cloning Integration Guide
Contains planning, practices, and configuration information for using the NetWorker, NMM, and NMDA cloning feature.
Simplified Windows Bare Metal Recovery Solution for Microsoft Applications by using EMC NetWorker Module for Microsoft Applications Release 2.4 Technical Notes
Contain supplemental information about performing Windows Bare Metal Recovery by using NMM.
SharePoint Granular Recovery by using EMC NetWorker Module for Microsoft Applications and Kroll Ontrack PowerControls Release 2.4 Technical Notes
Contain information about how to perform granular recovery of Microsoft SharePoint with NMM release 2.4 and third-party software Kroll Ontrack PowerControls.
Protecting Virtual Machine Manager Environments Using EMC NetWorker Module for Microsoft Applications
Provide a data protection strategy for Microsoft System Center Virtual Machine Manager (VMM) using EMC NetWorker Module for Microsoft Applications release 2.4 (NMM) and the EMC NetWorker Windows Disaster Recovery feature.
NetWorker Procedure Generator (NPG)
The NPG is an executable download that can be used to generate precise, user-driven steps for high demand tasks carried out by customers, support, and the field.
NetWorker Licensing Guide
Provides information about licensing NetWorker and its modules.
NetWorker Software Compatibility Guide
Includes a list of supported client, server, and storage node operating systems for the following software products: NetWorker and NetWorker application modules and options (including deduplication and virtualization support), AlphaStor, Data Protection Advisor, and HomeBase.
NetWorker Data Domain Deduplication Devices Integration Guide
Provides planning and configuration information on the use of Data Domain devices for data deduplication backup and storage in a NetWorker environment.
NetWorker Avamar Integration Guide
Provides planning and configuration information on the use of Avamar in a NetWorker environment.
NetWorker documentation set
Provides the documentation that is available with NetWorker.
12
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Preface
Conventions used in this document EMC uses the following conventions for special notices: Note: A note presents information that is important, but not hazard-related.
An important notice contains information essential to software or hardware operation.
Typographical conventions EMC uses the following type style conventions in this document: Normal
Used in running (nonprocedural) text for: • Names of interface elements, such as names of windows, dialog boxes, buttons, fields, and menus • Names of resources, attributes, pools, Boolean expressions, buttons, DQL statements, keywords, clauses, environment variables, functions, and utilities • URLs, pathnames, filenames, directory names, computer names, links, groups, service keys, file systems, and notifications
Bold
Used in running (nonprocedural) text for names of commands, daemons, options, programs, processes, services, applications, utilities, kernels, notifications, system calls, and man pages Used in procedures for: • Names of interface elements, such as names of windows, dialog boxes, buttons, fields, and menus • What the user specifically selects, clicks, presses, or types
Italic
Used in all text (including procedures) for: • Full titles of publications referenced in text • Emphasis, for example, a new term • Variables
Courier
Used for: • System output, such as an error message or script • URLs, complete paths, filenames, prompts, and syntax when shown outside of running text
Courier bold
Used for specific user input, such as commands
Courier italic
Used in procedures for: • Variables on the command line • User input variables
Angle brackets enclose parameter or variable values supplied by the user
[]
Square brackets enclose optional values
|
Vertical bar indicates alternate selections — the bar means “or”
{}
Braces enclose content that the user must specify, such as x or y or z
...
Ellipses indicate nonessential information omitted from the example
EMC support, product, and licensing information can be obtained as follows: Product information — For documentation, release notes, software updates, or information about EMC products, go to EMC Online Support at: http://support.emc.com
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
13
Preface
Technical support — Go to EMC Online Support and click Service Center. You will see several options for contacting EMC Technical Support. Note that to open a service request, you must have a valid support agreement. Contact your EMC sales representative for details about obtaining a valid support agreement or with questions about your account.
Your comments Your suggestions will help us continue to improve the accuracy, organization, and overall quality of the user publications. Send your opinions of this document to:
[email protected]
14
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
REVISION HISTORY
Email your clarifications or suggestions for this document to:
[email protected]
The following table lists the revision history of this document. Revision
Date
Description of added or changed sections
03
September 28, 2012
Third release of this document for General Availability (GA) release of the EMC NetWorker Module for Microsoft Applications Release 2.4. Updated to include Exchange in list of supported applications for granular level recovery.
02
August 08, 2012
Second release of this document for General Availability (GA) release of the EMC NetWorker Module for Microsoft Applications Release 2.4. The updates made in this release are: • Updated “Granular-level recovery for Exchange, Hyper-V and SharePoint applications” on page 24. • Incorporated technical feedback received from the EMC Support team. • Updated the new website location for documentation and software downloads (http://support.emc.com).
A01
June 27, 2012
First release of this document for Restricted Availability (RA) release of EMC NetWorker Module for Microsoft Applications Release 2.4.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
15
Revision History
16
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 1 Overview This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆
About the NetWorker Module for Microsoft Applications software............................ Support provided by NMM 2.4 ................................................................................ Full backup and recovery......................................................................................... Granular-level recovery for Exchange, Hyper-V and SharePoint applications............. Normal and directed recovery.................................................................................. The VSS snapshot creation process ......................................................................... About snapshots and types of snapshot backups.................................................... The NMM client graphical user interface.................................................................. Basic tasks in NetWorker User for NMM client user interface.................................... Access privileges for backup and recovery............................................................... Microsoft Windows groups and NetWorker administrative privileges........................ Name resolution to identify and back-translate computer names............................. Cloning and recovering from original or cloned NMM backups that are no longer browsable or present in the media database ...........................................................
Overview
18 18 23 24 25 27 30 34 40 46 47 48 49
17
Overview
About the NetWorker Module for Microsoft Applications software In the basic EMC NetWorker Module for Microsoft Applications (NMM) backup and recovery process: 1. The NMM client is installed on the computer that will be backed up. 2. That NMM client is configured to work with a specific NetWorker server on another computer. 3. Backups are configured on and performed by the NetWorker server. 4. Recovery is performed through the NMM client UI on the NMM client computer, and recovered to the same NMM client computer. The NMM software supports backup and recovery by using: ◆
Microsoft Volume Shadow Copy Service (VSS) technology—Where NMM works with Microsoft Volume Shadow Copy Service (VSS) technology to provide snapshot backup and recovery services for file systems, Microsoft applications, and Windows system data. The NMM client allows the creation of point-in-time snapshot data. A snapshot can be retained on storage volumes for quick access. You can also perform a rollover of a snapshot to a traditional backup medium, such as tape, file type device, advanced file type device, EMC Avamar device, and EMC Data Domain device. Data can be recovered from either of the following: snapshot or backup media. “Microsoft applications and Windows components” on page 21 provides the list of Microsoft applications and Windows components for which backup and recovery of data by using the VSS technology is available.
◆
Microsoft Virtual Device Interface (VDI) technology—Where NMM uses the Virtual Device Interface (VDI) technology to communicate with the SQL Server. In NMM, backup and recovery of data by using the VDI technology is available for SQL Server.
Note: The NMM client clock must be kept in sync with that of the NetWorker server. If the clock times are not in sync and differ more than five minutes, problems occur when recovering full and incremental backups. The clock times for the client, server, and data mover must match for backups to work without any issues.
Support provided by NMM 2.4 This section provides the following information:
18
◆
“Supported NetWorker features” on page 19
◆
“Supported Windows versions and related features” on page 19
◆
“Support for IPv4 and IPv6” on page 20
◆
“Support for data deduplication” on page 20
◆
“Support for VSS backup and recovery” on page 20
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
◆
“Support for dynamic volumes that use the Microsoft Software Shadow Copy provider” on page 22
◆
“Support for SQL VDI Servers recovery models” on page 22
Supported NetWorker features NMM 2.4 supports the following NetWorker features: ◆
Avamar and Data Domain support for data deduplication
◆
Dedicated storage node for LAN-free backups
◆
Internationalization (I18N)
◆
Mulithomed environment backup and recovery
◆
NetWorker cloning and staging to create and manage additional copies of save sets. This NMM support requires NetWorker 7.6 SP2 or later.
◆
Manual (adhoc) backups for SQL VDI
◆
Offline disaster recovery, which means that the Windows operating system is not active
Localization (L10N) is not supported in NMM 2.4.
Supported Windows versions and related features NMM client supports the following versions of Microsoft Windows and Microsoft Windows-related features: ◆
Supported Windows operating system and features • Windows Server 2008 R2 (x64), including Server Core installation options • Windows Server 2008 R2 SP1 (x64), including Server Core installation options • Windows Server 2008 SP2 (x86, x64), including Server Core installation options
◆
System state recovery, file servers, and operating system roles including the following: • Active Directory • DHCP • Terminal Services
◆
GUID Partition Table disks: • No disk size limit on Windows environments with CLARiiON storage (EMC SnapView™ clone, and SnapView snap technologies only) • Disk size limit of less than 2 TB on Windows environments with Symmetrix storage
Support provided by NMM 2.4
19
Overview
NMM does not support the following operating system and features: — Windows IA64 editions — BitLocker encryption — VSS Hardware Provider based proxy backup of Windows dynamic disks — Single Instance Storage (SIS)
Support for IPv4 and IPv6 NMM 2.4 supports the use of IPv4 and IPv6. Ensure that if the host on which NMM is installed uses IPv4 or IPv6, then the NetWorker server, NetWorker storage node, or NetWorker client node must be within the IPv4 or IPv6 network infrastructure. Note: The NMM GUI takes more than five minutes to start in an IPv6 environment. Update the hosts file at C:\Windows\System32\drivers\etc\ with the IPv6 client and FQDN names. This helps in resolving the IPv6 enabled clients quickly and starts the NMM GUI faster.
Support for data deduplication Table 2 on page 20 provides details about the supported configurations, data deduplication, backups, and restores in NMM 2.4. Table 2 Supported data deduplication Support
Details
Data deduplication support with Avamar
• NetWorker Server 7.6 SP2 and later is required • Avamar Axiom 4.0 SP2 or later is required • Chapter 5, “Data Deduplication with Avamar,” provides the list of Microsoft applications for which data deduplication is supported
Data deduplication support with Data Domain
• NetWorker Server 7.6 SP2 and later is required • For the Data Domain deduplication, the following are required: — Data Domain Appliance with Data Domain operating system version supported by NetWorker client installed on NMM 2.4 client — Data Domain operating system 4.8 or later for Data Domain-Boost functionality — NetWorker 7.6 SP2 or later for Data Domain-Boost functionality • Chapter 6, “Data Deduplication with Data Domain,” provides the list of Microsoft applications for which data deduplication is supported
Support for VSS backup and recovery This section provides the following information:
20
◆
“Microsoft applications and Windows components” on page 21
◆
“System providers” on page 21
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Microsoft applications and Windows components Table 3 on page 21 lists the Microsoft applications and Windows components for which NMM provides VSS backup and recovery support. Table 3 VSS backup and recovery support for Microsoft applications and Windows components Support
Details
Backup and recovery support for Microsoft applications
• • • • • •
Active Directory Application Mode (ADAM) Active Directory Exchange Server 2010 and Exchange Server 2007 SharePoint Server 2010 and SharePoint Server 2007 SQL Server 2012, SQL Server 2008 R2, SQL Server 2008, and SQL Server 2005 System Center Data Protection Manager 2007
Backup and recovery support for Microsoft Windows components
• • • • •
Windows cluster support Windows filesystem and system components Windows Server 2008 and Windows Server 2008 R2 with Hyper-V Windows Server 2008 Service Pack 2 and its updates Windows Server 2008, Server Core Installation with Hyper-V
Note: Application support often requires a minimum specific service-pack level. The service-pack levels frequently change. The NetWorker Software Compatibility Guide provides the most up-to-date information about service packs that are required for each application.
System providers Microsoft System Provider are available for use with disks that are directly attached to the host or are part of a hardware array: ◆
This includes directly connected disks such as SATA or SCSI and storage arrays. For example, where a hardware provider does not exist or has not been installed.
◆
The Microsoft System Provider will not take advantage of any features that a storage array can provide including any built-in snapshot capabilities.
The Microsoft System Provider is part of the operating system. The sizes and locations are managed in the Disk Management applet. The EMC VSS providers available are: ◆
EMC Symmetrix V-MAX™ arrays
◆
EMC Symmetrix DMX™arrays
◆
EMC CLARiiON arrays
◆
EMC VNX™ arrays
When EMC VSS hardware providers are used with VMware ESX 3.5 or ESX 4.0 and Windows guest operating system in NMM clients, set the environment variable VICLIENT_DISABLE_CACHE=1 to disable Virtual Infrastructure Client (VI Client) cache in the NMM clients.
Support provided by NMM 2.4
21
Overview
Support for dynamic volumes that use the Microsoft Software Shadow Copy provider In Windows Server 2008 R2, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2: ◆
NMM supports snapshots of dynamic volumes that use the Microsoft Software Shadow Copy provider.
◆
NMM provides software-based support for the following: • Dynamic volume on a single disk. • Dynamic volume spanning multiple disks.
◆
NMM does not support: • Dynamic volumes in striping. • NMM does not support NSR Data Mover parameter for dynamic volume configuration. For example, hardware-based transportable snapshots are not supported when the dynamic volumes are on CLARiiON storage. NMM attempts to perform the hardware-based snapshot, but the operation fails during import of the hardware-based snapshot on the proxy backup host.
Any attempt to take a hardware-based replica of a dynamic volume fails, and causes instability in the system. Although Windows Server 2008 introduces support for local, hardware-based snapshots of dynamic volumes, NMM does not support the following snapshots of dynamic volumes on Windows Server 2008: ◆
Local
◆
Non-transportable
◆
Hardware-based
For environments where dynamic volumes are provisioned by using a storage array, do not install the storage array vendor’s VSS provider on the production host. For example, if a dynamic volume was created on a CLARiiON LUN, do not install the EMC VSS Hardware Provider on the production host.
Support for SQL VDI Servers recovery models Microsoft SQL VDI Servers support three recovery models: full, bulk_logged, and simple. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides detailed information.
Full recovery model The full recovery model imposes the fewest constraints on the backup and restore process, but it requires the most log space of all recovery models. NMM enforces the following constraints based on the version of SQL Server:
22
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
◆
All levels of file, filegroup, and database backup are supported.
◆
All backup data is restorable up to the most recent transaction log.
◆
Point-in-time and named log mark restores are supported.
Bulk_Logged recovery model The bulk_logged recovery model also imposes a few backup constraints and supports reduced log space requirements for bulk operations. NMM enforces the following constraints differently, depending on which version of SQL Servers is managing the storage hierarchy: ◆
All levels of file, filegroup, and database backups are supported.
◆
Backup data is restorable up to the most recent transaction log.
◆
A point-in-time restore is not supported for SQL Servers if the following conditions apply: • If a bulk log change has occurred for the transaction log backup that corresponds to the current browse time. • If bulk changes in the transaction log that contains the time or day marker. The NetWorker Module rolls forward all transactions to the end of the transaction log and leaves the database in an operational state.
Simple recovery model The simple recovery model provides the fastest performance by minimally logging operations, thereby reducing log space. However, the simple recovery model does not support transaction log backups. The simple recovery model implements the most constraints on the backup and restore process. It provides significant control over how storage management operations impact system resources. NMM enforces the following constraints depending on the version of SQL Server: ◆
Only level full and differential database backup types are supported.
◆
Backup data is restorable up to the last level full or differential database backup.
◆
Point-in-time and named log mark restores are not supported.
Full backup and recovery NMM provides full backup and recovery for all supported Microsoft applications, where: ◆
The entire volume or database for that application is backed up.
◆
The entire volume or database is recovered as a whole.
VSS based backups for Microsoft applications are always full.
Full backup and recovery
23
Overview
Table 4 Support for disaster backup and recovery By using VDI technology
By using VSS technology Types of Active backup and Directory recovery *
SQL Server Exchange * 2007
ShareExchange Point Server Server 2010 2007
SharePoint Server 2010
DPM *
Hyper- File V* system *
SQL Server*
Full backup
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
Full recovery
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
*All supported versions.
For disaster recovery, only full backup and recovery are used.
Granular-level recovery for Exchange, Hyper-V and SharePoint applications You can perform granular-level recovery (GLR) for backups created with NMM 2.4 with Exchange, Hyper-V and SharePoint applications. GLR lets you recover specific items—such as files and folders—from a single full backup without having to recover the full backup. This reduces the recovery time and the space requirements on local system storage. To perform GLR, use the GLR option built into the NMM GUI. The application GLR plug-in uses NetWorker Virtual File System (NWFS), which exposes files from a list of save sets within a single full backup as a virtual file system on an NMM 2.4 client. The virtual file system appears to applications as a normal file system, but the application reads the save set directories and files directly from the backup device. Using NWFS, the GLR plug-in can create, rename, move, or delete directories and files. NWFS copies blocks of data from save set files that are requested by an application. NWFS stores changes to these files locally without making any changes to files within the save set.
GLR Process Overview During NMM installation, if the GLR option is selected, NMM installs NWFS and the Eldos CBFS filer driver, which requires a system reboot. Initialization of the NWFS virtual file system is managed by the GLR plug-in or plug-in service, which creates the NWFS COM server. Only one NWFS virtual file system can be active at any given time. If you mount another backup to restore, NWFS releases the current save set, and you lose access to its contents until you remount it. Backup can be to any NetWorker device type. However, recovery is only possible with an adv_file (AFTD) or Data Domain (DD) device on a NetWorker server or storage node. If the device type is ineligible for GLR restores, the backup will have to be cloned to an AFTD or DD device before a GLR restore can be performed.
24
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Once a GLR session is complete, the plug-in shuts down the NWFS virtual file system. The client closes NWFS, removes the virtual file system from the system, and deletes the temporary locally stored data.
GLR-compatible backup availability Only full backups are GLR-compatible. No additional configuration is required for GLR compatible backups. You can disable GLR-compatible backups by using NSR_ENABLE_GLR = no. When this parameter is used in the Application Information attribute when configuring the client resource, NMM does not create the GLR offset map during the backup. All other backup configurations remain the same. To check to see that the backup performed is GLR compatible, run the mminfo command with the -r attrs attribute. For example, mminfo -v -ot -q group=nmmspglr -r ssid/ssflags/level/savetime/totalsize/name/client/attrs
Where -r attrs displays the GLR compatible backups. Note: An Exchange or Hyper-V granular-level recovery session is complete when the NMM GUI is closed or when a new restore is requested. A SharePoint GLR session completes when NMM mounts the save set and the actual GLR can be performed by using a third-party software, like Kroll OnTrack. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details on performing GLR with Exchange, Hyper-V, and SharePoint.
NWFS Logs and Attributes NWFS logs information, warning, and error messages to a new log file: nwfs.raw and stores this log file in C:\Program Files\Legato\nsr\applogs. Table 5 on page 25 lists the media database attributes that identify GLR-compatible save sets:. Table 5 NWFS Logs and Attributes Attribute Name
Type
GLR_OFFSET_MAP Boolean GLR_Hint
Value Yes
Value string A set of least common paths for the backup
Normal and directed recovery The recovery process involves three roles: Source, Control, and Destination. The NMM 2.4 software supports both normal recovery and directed recovery: ◆
Normal recovery — All of these roles are on the same computer: • The source client is the computer where the backup data came from.
Normal and directed recovery
25
Overview
• The control client is the computer running the NMM UI to initiate the recover process. • The destination client is the computer that the data is restored to. ◆
Directed recovery—The source, control, and destination roles are not all on the same computer. There are two types of directed recovery: • In pull directed recovery, the control role and destination role are performed on the same computer. The control role running on the destination computer pulls the recovery data to itself. Backup data from the source client is restored to the destination client. • In push directed recovery, the control role can be run on the source client or a different client. Backup data from the source client is restored to the destination client. The control client computer pushes it out to another computer, the destination client. The destination client is not the same computer as the source client or control client.
Table 6 on page 26 lists the pull and push directed recovery support provided by NMM. Table 6 Pull and push support Application
Pull directed recovery
Push directed recovery
DPM
✔
X
Exchange Server 2007
✔
X
Exchange Server 2010
✔ Only for DAG based recovery
X
Hyper-V
✔
✔
SharePoint Server 2007
X
X
SharePoint Server 2010
X
X
SQL Server VSS
✔
X
SQL Server VDI
✔
X
Filesystem
✔
X
For pull directed recovery for the supported applications listed in Table 6 on page 26, you can: ◆
Run the NMM software recovery (the control role) on the same computer that the data is being restored to (the destination client). Note: Additional or different steps may be required. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details for each application.
◆
26
Specify the alternate server to recover to in the normal recovery steps for the application. “Recovering the Windows system configuration to an earlier state” on page 134 provides more information.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Note: The NMM software does not support directed recovery of SYSTEM COMPONENTS.
The VSS snapshot creation process This section provides the information needed to understand the VSS snapshot creation process: ◆
“Components in the VSS snapshot creation process” on page 27
◆
“The VSS backup process” on page 29
Components in the VSS snapshot creation process Microsoft Volume Shadow Copy Service (VSS) acts as a coordinator among the following three components that create, modify, back up, and recover data: ◆
Requestors—In VSS, NMM is a requestor, that is an application that performs the backup and recovery of applications or services.
◆
Providers—A provider is used to capture snapshots. One of the following types of providers are available: • Microsoft Software Shadow Copy provider—The Microsoft Software Shadow Copy provider is a host-based provider that works with any type of storage hardware. • EMC VSS Hardware Provider—The EMC VSS Hardware Provider works with a CLARiiON or a Symmetrix disk array. Serverless backup (NMM proxy based backups) is available only with hardware providers, such as the EMC VSS Hardware Provider.
Rollback recovery is not supported in NMM. • EMC Celerra VSS Hardware Provider—The EMC Celerra VSS Hardware Provider supports Celerra arrays. More information about using NMM with an EMC VSS Hardware Provider, including hardware array installation and configuration is provided in: – The NetWorker Module for Microsoft Applications and EMC CLARiiON:
Implementing Proxy Node Backups Release 2.4 Technical Note – The NetWorker Module for Microsoft Applications and EMC Symmetrix:
Implementing Proxy Node Backups Release 2.4 Technical Note
Conventional restore and snapshot restore are supported for backups performed by Dell EqualLogic or Celerra hardware. ◆
Writers—Writers provide information about what data to back up, and specific methods for handling components and applications during backup and recovery. They also identify the type of application or service that is being backed up. If a
The VSS snapshot creation process
27
Overview
service or application is present on a system but is not active, information from its writer will not be available. Consequently, a writer can appear or disappear from backup to backup. Table 7 on page 28 lists the writers that are supported for the NMM client. Table 7 Currently supported writers Writer type
Writers that NMM supports
Volumes
A file system path such as D:\data Note: NMM only supports NTFS volumes. It does not support FAT16 and FAT32 volumes. Also, NMM does not support backup of raw volumes.
Microsoft applications
• • • • • •
Active Directory Lightweight Directory Services (AD LDS) ADAM Exchange Server 2007 and Exchange Server 2010 SharePoint Server 2007 and SharePoint Server 2010 SQL Server 2012, SQL Server 2008, SQL Server 2008 R2, and SQL Server 2005 System Center Data Protection Manager 2007
Windows versions
• Windows Server 2008 R2 • Windows Server 2008 (Full Installation) with Hyper-V • Windows Server 2008 (Server Core Installation) with Hyper-V
Windows SYSTEM COMPONENTS
For Windows Server 2008 and Windows Server 2008 R2: • Background Intelligent Transfer Service (BITS) • COM+ Registration Database (REGDB) • Certificate Authority • Cluster Writer (Windows Server 2008 and Windows Server 2008 R2) • DFS Replication Service Writer (Windows Server 2008 R2) • Dynamic Host Configuration Protocol (DHCP) Jet • Event log • File Storage Resource Manager (FSRM) • IIS Configuration Writer (Windows Server 2008 and Windows Server 2008 R2) • IIS Metabase • MSSearch Service Writer (Windows Server 2008 and Windows Server 2008 R2) • Network Policy and Access Service (NPS) VSS Writer (Windows Server 2008 and Windows Server 2008 R2) • NTDS (Active Directory Schema) • Registry • Removable Storage Manager (RSM) • Remote Storage Manager • Shadow Copy Optimization Writer (Windows Server 2008 and Windows Server 2008 R2) • SQL Embedded (SQL 2005 Express, or SQL 2008 Express, and SQL 2008 R2 Express) • Terminal Services Licensing • Windows Internet Name Service (WINS) • Windows Management Instrumentation (WMI) • VSS Performance Counters Writer (Windows Server 2008 R2) • VSS Task Scheduler Writer (Windows Server 2008 R2) • VSS Express Metadata Store Writer (Windows Server 2008 R2) Note: Terminal Services Gateway writer is not supported in NMM.
28
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Some of the VSS writers appear under Bootable System State in SYSTEM COMPONENTS:\ save set. These writers are listed when the vssadmin list writers command is used at the command prompt. Files located in an FTP directory are not included in a SYSTEM COMPONENTS snapshot. Typically, FTP files are stored by Internet Information Services (IIS) in C:\inetpub. IIS metabase files are configuration files, which are backed up as part of SYSTEM COMPONENTS. The FTP files are content files, and must be backed up separately.
The VSS backup process When a requestor performs a backup or recovery, the following occurs: 1. The requestor asks for information about the available writers and their metadata from VSS. 2. VSS reviews the request for validity. 3. VSS sends writer data from multiple application and system writers to the requestor. 4. The requestor tells VSS which writers and volumes to include in the snapshot. Each application and service that supports VSS has its own writer, which understands how the application or service works. After the writer signals that it has prepared the data, the following occurs: 1. The VSS software does the following: a. Directs the writer to freeze input/output (I/O) to the selected volumes. b. Queues transactions for later processing. c. Calls a provider to capture or take a shadow copy of the requested data. 2. The provider does the following: a. Captures the prepared data. b. Creates a snapshot that exists side-by-side with the live volume. 3. After the snapshot is created: a. The provider signals VSS and this signal tells the writer to resume activity. b. I/O is released to the selected volumes and any queued writes that arrived during the provider's work are processed.
The VSS snapshot creation process
29
Overview
Figure 1 on page 30 illustrates the VSS backup process.
Requestor 4. Requestor asks VSS to create snapshot.
Writer
1. NetWorker software (the requestor) asks VSS to enumerate writers and gather their metadata. 2. Writers provide an XML description of backup components and define the recover method.
Writer
Writer
Writer
5. VSS tells the writers to freeze activity. Writer
7. VSS tells the writers to resume activity.
3. VSS asks which providers can support a snapshot for each of the required volumes. Microsoft VSS Software Provider
Disk 1
Disk 2
6. VSS tells the providers to create the snapshot of the current state on disk. EMC VSS Provider (CLARiiON or Symmetrix)
Disk 3
Disk 3 GEN-000188
Figure 1 VSS backup process
About snapshots and types of snapshot backups This section provides the following information: ◆
“Copy-on-write snapshot versus split-mirror snapshot technology” on page 30
◆
“Roll over a snapshot” on page 31
◆
“Types of NMM client snapshot backups” on page 31
◆
“Types of NMM client recoveries” on page 33
Copy-on-write snapshot versus split-mirror snapshot technology Some hardware providers, such as the EMC VSS Hardware Provider, support split-mirror snapshot technology and copy-on-write technology. Although copy-on-write technology requires less hardware resources, split-mirror technology provides better performance. Large or fast-changing databases should not be saved with copy-on-write snapshot technology. The input/output requirements of these databases can cause the copy-on-write cache to overflow and invalidate the snapshot. Additionally, copy-on-write technology cannot match the performance of split-mirror technology. For large or fast-changing databases, use the EMC VSS Hardware Provider along with EMC hardware to provide a split-mirror storage solution such as the following:
30
◆
EMC CLARiiON SnapView Clone
◆
EMC Symmetrix TimeFinder Clone
◆
EMC Symmetrix TimeFinder Mirror
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Roll over a snapshot A rollover is the process of creating a conventional backup from a snapshot. Rollover policies are automatically controlled through snapshot policy settings on the NetWorker server. If necessary, perform a rollover manually by using the NMM GUI. Before recovering data that currently exists only as a persistent snapshot: ◆
Roll over the snapshot to tape to protect the data if the snapshot becomes corrupted during the recovery process.
◆
Create a convention backup copy of the snapshot data. This conventional copy will reside on the device even if the retention deletes the snapshot.
Types of NMM client snapshot backups The NMM client supports three types of snapshot backups: ◆
“Conventional backup” on page 31
◆
“Serverless backup” on page 31
◆
“Nonpersistent rollover backup” on page 32
◆
“Instant backup with or without rollover” on page 32
Conventional backup Conventional backup includes snapshot rollover backup to tape, file type, or advanced file type devices.
Serverless backup Serverless backup is a method of offloading backup procedures from an application server so that the time ordinarily devoted to backup functions can be used to carry out other server tasks. Serverless backup uses an NMM proxy client to move the data from the proxy client to the backup media for a snapshot created on application server host.
Serverless backup is available only with EMC VSS Hardware Providers. The EMC VSS Provider for CLARiiON and Symmetrix provides the capability to perform serverless backup operations for these storage platforms. In this kind of backup: 1. The snapshot is created on the application server and immediately mounted to the proxy client. 2. After the snapshot is created, the application server is not involved in the backup operation. 3. During the rollover, that is backup of the snapshot, the application server is free and all of its resources are available for use.
About snapshots and types of snapshot backups
31
Overview
Examples of scenarios when serverless backups are used: ◆
When Exchange Server is backed up by using serverless backup, Outlook users can continue to use the application server.
◆
Performing serverless backups are also useful when there is additional processing involved in a snapshot backup and is CPU intensive. For example, to help determine whether a snapshot of a Exchange database is consistent, the Exchange utility eseutil is run against the snapshot. • Running eseutil can be disk and processor intensive. • Using serverless backup helps free resources on the Exchange Server because the backup operation workload from the Exchange Server is offloaded to a proxy client.
To enable serverless or proxy backup: ◆
Ensure that the following is the same on both the application server host and the proxy host: • Operating system version • Service pack • Update level For example, do not use a Windows Server 2008 R2 system as the proxy mount host for Windows Server 2008 SP2 production host, otherwise backup fails. • If a production server is a virtual machine, then the proxy host should be a physical machine. • Specify the following in the Application Information field of the client resource: NSR_DATA_MOVER=
Nonpersistent rollover backup Nonpersistent rollover backup means that snapshots are not retained once the backup is rolled over to a conventional backup medium such as tape, file, or advanced file type file type device, or Data Domain device. The snapshot is automatically deleted from the NMM client. The snapshot created is also called a temporary snapshot. For nonpersistent backup, select zero in the Retention Policy field during the client resource configuration process on the NetWorker server.
Instant backup with or without rollover An instant backup creates a snapshot on a locally mounted storage volume. During the period the snapshot resides on a mounted storage disk volume, it is referred to as a persistent snapshot. Retention of persistent snapshots on a mounted storage disk volume enables the user to perform an instant recovery. The number of persistent snapshots that can be retained locally depends on the snapshot policy and the available disk storage. Depending on how the backups are configured, a snapshot that is created during an instant backup may be configured to rollover to a backup media.
32
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
For persistent backup with or without rollover, the Retain Snapshots is set to any non-zero value in the Snapshot Policy during the client resource configuration process.
Types of NMM client recoveries The NMM 2.4 software supports the following types of recoveries: ◆
“Conventional recovery” on page 33
◆
“Instant recovery” on page 33
By default, recoveries are performed from a conventional backup. If a conventional backup is not available for the selected browse time, an instant recovery is performed. The default recovery method can be specified in the NetWorker recovery options dialog box. Instant recoveries are performed with persistent snapshots. “NetWorker recovery options” on page 119 provides more information about these recovery methods.
Conventional recovery A conventional recovery consists of recovering data that has already been rolled over to a backup media. Conventional recoveries support the same level of item selection as instant recoveries.
Instant recovery Instant recoveries are performed with persistent snapshots. An instant recovery can take less time to complete than a conventional recovery because the snapshot is available on a mounted disk storage volume rather than on a conventional backup medium. Instant recoveries support the selection of individual files in a file system snapshot. Additionally, instant recoveries support the selection of individual components at whatever level of granularity is supported by the application writer. If the persistent snapshot is created by using a proxy client, the snapshot file system on the proxy client is read to restore the files. In this way, performance is improved even further because the job of processing the snapshot for recovery is off-loaded from the NMM client production host to the proxy client. The procedure to perform an instant recovery of file system data differs if only a persistent snapshot is available. provides more information about performing recoveries. Note: When performing an instant recovery, the snapshot may become invalidated. This can occur if the snapshot is based on copy-on-write technology. If a large amount of data is recovered to the original volume, the cache may overflow. This is true for the Microsoft Software Shadow Copy provider and for hardware providers that use copy-on-write technology, such as CLARiiON snapview snapshot and Symmetrix virtual devices.
About snapshots and types of snapshot backups
33
Overview
The NMM client graphical user interface Two client interfaces are now available for the NMM 2.4 software: ◆
“NetWorker User for NMM program overview” on page 34 — This GUI can be used to recover the following Microsoft applications (all supported versions) by using the VSS technology: • SQL Server • Data Protection Manager Server • Exchange Server • Hyper-V Server • SharePoint Server • Active Directory Go to Start > Program > NetWorker Modules > NetWorker User for NMM on the host where the NMM 2.4 software is installed to start this GUI.
◆
“NetWorker User for SQL Server program overview” on page 37—This GUI can be used to back up and recover the supported versions of SQL Server by using the VDI technology. Go to Start > Program > NetWorker Modules > NetWorker User for SQL on the host where the NMM 2.4 software is installed to start this GUI.
NetWorker User for NMM program overview After installing the NMM 2.4 software, go to Start > Programs > NetWorker Modules > NetWorker User for NMM program, to start the NMM client graphical use interface. This section contains the following sections: ◆
“User interface views” on page 34
◆
“Display conventions” on page 36
User interface views The NetWorker User for NMM program user interface has three views:
34
◆
“Recover view” on page 35
◆
“Snapshot Management view” on page 35
◆
“Monitor view” on page 36
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Recover view All recoveries are performed from the Recover view by selecting the Recover icon the left.
on
Figure 2 on page 35 shows the Recover view. Navigation tree
client selection (clustered client only)
Main toolbar
Available views
Summary of selected items
View specific toolbar
Figure 2 NMM client main page
The summary of selected items can also display exclusions, which shows only those items that are not selected for recovery. This view can be helpful when many items are selected for recovery.
Snapshot Management view In most cases, snapshot rollover and delete operations are performed automatically based on snapshot policies, which are set up on the NetWorker server. Select the by the Snapshot Management icon on the left, to see the Snapshot Management view in the NMM GUI, to manually delete or rollover a snapshot. By using the Snapshot Management view, the following operations can be performed on snapshots: ◆
Delete snapshot
◆
Mount a snapshot
◆
Rollover snapshot
“Scheduled Backup” on page 63 provides more information about snapshot policies.
The NMM client graphical user interface
35
Overview
Monitor view Recovery and snapshot management operations can be monitored in the Monitor view by selecting the Monitor icon on the left, shown in Figure 3 on page 36.
Figure 3 Monitor view
Most messages displayed in the Monitor view are also written to log files.
Display conventions The NetWorker User for NMM Server program uses specific icons to identify various tasks and operations. Table 9 on page 39 outlines the main conventions used in the NMM GUI. Table 8 Main conventions used in the NMM GUI
36
Data item
Description
Pane
NetWorker server
Select the NetWorker server that is installed.
Top
Recover
Denotes the Recover function.
Left
Snapshot Management Use the Snapshot Management view in the NMM GUI, to manually delete or rollover a snapshot.
Left
Exchange Recover Session
Available when the Recover icon is selected. Use to continue with recovery.
Left
Monitor
View recovery and snapshot management Left operations.
Log files
Log files generated with backup and recovery details.
Right
Database
Available databases for selection.
Right
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Icon
Overview
NetWorker User for SQL Server program overview After installing the NMM 2.4 software, go to Start > Programs > NetWorker Modules > NetWorker User for SQL program, to start the NMM client graphical use interface for SQL VDI backup and recovery. This section contains the following sections: ◆
“User interface views” on page 37
◆
“Fake objects” on page 38
◆
“Display conventions to differentiate SQL data types” on page 39
◆
“Marking semantics and restrictions” on page 40
User interface views The NetWorker User for SQL program user interface has four views: ◆
Backup view — All backups are performed from the Backup window. Select the icon to view the Backup window. Figure 4 on page 37 shows the Backup view.
Figure 4 Backup view
Select the database that needs to be backed up, and either right-click or select Options > Backup Options to view the Backup Options dialog box.
The NMM client graphical user interface
37
Overview
◆
Restore Operation view — Normal, Copy, or Piecemeal restores are performed from the Restore Operation view. Select the icon to view the Restore Operation window as shown in Figure 5 on page 38.
Figure 5 Restore Operation view ◆
Change Server view — Select the shown in Figure 6 on page 38.
icon to view the Change Server window, as
Figure 6 Change Server view ◆
Select SQL Instance view — Select the icon to view the Select SQL Instance window, as shown in Figure 6 on page 38.
Figure 7 Select SQL Instance view
Fake objects The NMM software enables the browsing of filegroups and files contained in a database. However, the software can display data items that are not available for backup or restore operations. These are referred to as fake objects.
38
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
When a file or filegroup exists in the SQL Server storage hierarchy, but cannot be backed up because of SQL Server settings on the database, the item is displayed in the Backup window by using the fake filegroup or fake file convention. In addition, if you try to mark a fake object, an error dialog box is displayed as in Figure 8 on page 39
Figure 8 Marking a fake object
The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides more information about the constraints SQL Servers enforce that determine whether an item is available for backup or restore.
Display conventions to differentiate SQL data types The NetWorker User for SQL Server program uses specific data item names, text characteristics, and icons to distinguish the variable qualities of SQL Server data. Table 9 on page 39 outlines these conventions. Table 9 SQL Server storage hierarchy display conventions (page 1 of 2) Data item
Description
Pane
SQL Server
• Root of the storage hierarchy • Signifies all SQL Server databases on the host
Left only
Database
• Descendant of root • Signifies a database • May contain filegroups
Left and right
Filegroup
• Descendant of a database • Signifies a database filegroup or filestream data • May contain files
Left or right
Icon
The NMM client graphical user interface
39
Overview
Table 9 SQL Server storage hierarchy display conventions (page 2 of 2) Data item
Description
Pane
Fake filegroup
• Signifies that the filegroup cannot be selected for backup
Left or right
File
• Descendant of a filegroup • Signifies a database file
Right only
Fake file
• Signifies that the file cannot be selected for backup
Right only
Icon
Marking semantics and restrictions To support the browsing capabilities, the NMM program imposes certain semantics and restrictions regarding how items can be marked. Whether an item can be marked is based on the mark status of that item’s predecessors and descendants. Depending upon what is marked, message dialog boxes may appear to provide additional information on the current marks and the type of operation. The NetWorker User for SQL Server program enables the following: ◆
Mark a single file, filegroup, or database.
◆
Mark multiple, heterogeneous items.
◆
Mark an item when any of that item’s surrounding items are already marked.
◆
Mark or unmark all SQL Server data by right-clicking the root item and selecting Mark All Databases or Unmark All Databases from the shortcut menu.
◆
Unmark all databases from the SQL Server root.
The NetWorker User for SQL Server program imposes the following restrictions: ◆
You cannot mark an item if any of the predecessors of descendants are already marked except in the SQL Server root.
◆
When a database is marked, all of the item’s descendants are not automatically marked.
◆
When a filegroup is marked, all of the files are not automatically marked.
Basic tasks in NetWorker User for NMM client user interface This section describes how to perform the basic tasks in the NMM client interface:
40
◆
“Opening the software and connecting to a NetWorker server” on page 41
◆
“Selecting an item for recovery” on page 41
◆
“Searching for an item” on page 42
◆
“Specifying a recovery browse time” on page 43
◆
“Marking items” on page 43
◆
“Selecting a backup version for recovery” on page 43
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
◆
“Viewing the volumes required for a recovery” on page 44
◆
“Performing a snapshot rollover” on page 44
◆
“Deleting a snapshot” on page 45
Opening the software and connecting to a NetWorker server You must first connect to the NetWorker server on which the backup was configured to recover data. To connect to a NetWorker server: 1. From the Start menu, open the NMM client GUI: • If you have opened the NMM client before, proceed to step 2 . • If this is the first time you have opened the NMM client, the Change NetWorker Server dialog box displays, and you can proceed to step 3 . 2. From the Main toolbar, click NetWorker Server. The Change NetWorker Server dialog box displays. 3. Click Update Server List to browse for NetWorker servers. The discovery process may take a few minutes. 4. When the list is updated: • Select a server. The selection displays in the Server field. or • Type a name in the Server field. 5. Click OK. Note: You can also select Configure Options from the Options menu to connect to a NetWorker server.
Selecting an item for recovery To select items for recovery, select the checkbox beside a node in the navigation tree. A checkmark indicates that the node is selected. By default, all items contained in the node, such as folders and files, will also be selected for recovery. To clear an item contained in a selected node: 1. Expand the node. 2. Clear the checkbox beside the item. The checkmark disappears.
Basic tasks in NetWorker User for NMM client user interface
41
Overview
Figure 9 on page 42 depicts one selected item and several partially selected nodes in the navigation tree.
Selecting an item for recovery
Solid box indicates that some items, not all, below this node are selected
Figure 9 Selected and partially selected items
Searching for an item To search for a recovery item: 1. Click Search above the navigation tree. 2. In the Path field, type a directory path. 3. Optionally, in the Name field, type the name of the search item. You can refine your search as follows: • Literal match (case-insensitive)—Type abc to return abc, ABC, or AbC but not abcd or ABCD. • Literal match (case-sensitive)—Type "abc" to return abc but not ABc or abcd. • Name contains (case-insensitive)—Type %abc% to return abc, abcd, ABCD, or
xyzABCde. • Name starts with (case-insensitive)—Type abc% to return abcd or ABCde but not
xyzABCde. • Name ends with (case-insensitive)—Type %abc to return xyzAbc but not ABCde. • Single-character match search by using the ? wildcard: – Type ? to return single character entries and drive volumes, such as C or D. – Type WMI?Writer to return WMI Writer. • Multiple-character match search by using the * wildcard: – Type *.txt to return all entries with a .txt extension. – Type * to return all items within the selected container. – Type *writer* to return all writers. • Search by using both the * and ? wildcard—Type *???*writer* to return WMI Writer. 4. Click Search. The Details pane displays the results of the search.
42
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Specifying a recovery browse time To browse for items that were backed up on or before a particular time: 1. From the application toolbar, click Browse. 2. Select the arrows to select the date and time, and then click OK. The navigation tree displays backup items from the specified date and earlier.
Marking items The NMM software provides marking indicators that help determine the state of each item in the browse tree: ◆
Unmarked—An unmarked item is one that is not selected for backup or restore. An empty checkbox appears to the left of each unselected item to indicate it is unmarked.
◆
Marked—A marked item is one that is selected for backup or restore. A checkmark appears in the checkbox to the left of each marked item.
◆
Partially marked—A partially marked item is one that has marked descendants, but the item itself is not explicitly marked. A partially marked item is not backed up or restored. A checkmark appears in a gray checkbox to the left of each partially marked item.
Selecting a backup version for recovery To view the versions of an item that were backed up before the current browse time: 1. In the navigation tree, select a recover item. Note: “Selecting an item for recovery” on page 41 provides more information about selecting an item. 2. Right-click the selected item and select Versions from the pop-up menu. 3. Select the backup version to recover. 4. Select the following attribute to change the browse time to the same date as the selected backup version: Use selected item backup time as new browse time
5. Click OK. The recover items displayed in the navigation tree are from the selected browse time.
Basic tasks in NetWorker User for NMM client user interface
43
Overview
Viewing the volumes required for a recovery There are no NetWorker volumes associated with a snapshot backup until the snapshot has been rolled over to backup media. If you select to view the required volumes for a system component or application data snapshot that has not been rolled over, no volumes will be displayed. To view the volumes that are required for a recovery operation: 1. In the navigation tree, select a recover item. Note: “Selecting an item for recovery” on page 41 provides more information about selecting an item. 2. Right-click the selected item. 3. Select Required Volumes from the pop-up menu. The Required NetWorker Volumes dialog box displays with a list of the volumes that must be mounted: • If a volume is already mounted, the device name and device path display after the volume name. • If a required volume is not mounted, only the device name displays. 4. Click OK.
Limit the number of snapshots for a volume with the EMC VSS Provider You can create a maximum of eight shadow copies for a single LUN on an EMC CLARiiON or EMC Symmetrix machine. The VSS framework also limits the number of shadow copies per volume, for example 64. This limit also applies to all VSS providers, including the VSS software provider.
Performing a snapshot rollover To rollover a snapshot: 1. Open the NMM client GUI. 2. Select the NetWorker server on which the NetWorker client was configured for backup. 3. In the left pane, select Snapshot Management. 4. In the navigation tree, select the snapshot. 5. Expand the snapshot to review the save sets. 6. From the Snapshot Management toolbar, click Snapshot to begin the rollover operation. 7. In the left pane, select Monitor to view the progress of the rollover operation.
44
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Figure 10 on page 45 displays the snapshots and snapshot save sets available for rollover.
Figure 10 Snapshots and snapshot save sets
Note: When performing a rollover of a snapshot of a drive that contains the NMM binaries, at least one drive letter must be available for use as the temporary location for the mounted snapshot.
Deleting a snapshot Snapshot deletion policies are typically controlled automatically through snapshot policy settings on the NetWorker server. However, you can delete a snapshot manually. For instance, if space must be made available immediately on the storage system, you can manually rollover and then delete snapshots. Note: To prevent the loss of data from a snapshot that is to be deleted, perform a rollover of the snapshot before the deletion operation. “Roll over a snapshot” on page 31 provides more information about rolling over a snapshot.
If a snapshot is deleted without the use of the NMM client user interface, the snapshot may still appear to be recoverable in the NMM client user interface. If such a snapshot is selected for recovery, the recover operation will fail. A snapshot could also be deleted by VSS or the storage subsystem if resources are exhausted due to high input/output rates on the volumes.
Basic tasks in NetWorker User for NMM client user interface
45
Overview
To delete a snapshot: 1. Open the NMM client GUI. 2. Select the NetWorker server on which the NetWorker client was configured for backup. “Opening the software and connecting to a NetWorker server” on page 41 provides more information about opening NMM and connecting to a NetWorker server. 3. In the left pane, select Snapshot Management. 4. In the navigation tree, select the snapshot to be deleted. 5. Right-click the selected snapshot. 6. Select Delete Snapshot. In the left pane, select Monitor to view the progress of the delete operation.
Access privileges for backup and recovery When running or configuring NMM backups and recoveries, ensure that you have the appropriate level of privileges for all resources that must be accessed. Table 10 on page 46 describes the required privilege levels. Table 10 Access privileges needed for backup and recovery (page 1 of 2) Resource
Required privileges
NetWorker server
• NetWorker Administrator or • NetWorker Backup Operator
NMM client machine
• Windows Administrator or • Windows Backup Operator
All applications protected by NMM for VSS based backups, such as: • Microsoft Data Protection Manager • Microsoft Exchange Server • Microsoft Hyper-V Server • Microsoft SharePoint Server • Microsoft SQL Server
Windows Administrator
Note: The Hyper-V Writer is not included in save set All.
46
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Table 10 Access privileges needed for backup and recovery (page 2 of 2) Resource
Required privileges
Microsoft SQL VDI Server
• Grant the Windows logon account that the NMM backup process uses to connect to SQL Server, the SQL Server system administrator (sysadmin) role to issue the T-SQL BACKUP query. • Grant the Windows logon account under which the NMM backup process is running must be granted the SQL Server sysadmin role to open a shared memory handle when initializing the Microsoft Virtual Device Interface (VDI). • The NMM administrator must be a member of the local backup operators group. • The NMM administrator must be a member of the local administrators group. Note: Windows Server 2008 introduced User Access Control, which causes processes to run as a standard user even if part of the administrator’s group. The NMM software processes account for this change.
Network domain
Windows Domain Administrator
Storage node servers
Windows Administrator
Exchange Server
The user used with the Replication Manager Interface for Exchange service must be a member of the Organization Management Exchange security group.
Microsoft Windows groups and NetWorker administrative privileges The NetWorker server recognizes domain names and Microsoft Windows groups, both local and global. For example: ◆
Administrators group
◆
Domain Admins group
If you are logged into a domain, only the global group is recognized. You can find out the name of your group by running the Windows utility findgrp.exe, which is available with the Windows Resource Kit. If you are logged into an individual Windows computer, only the local group is recognized, because there is no global group. In cases where a user belongs to a domain that cannot be contacted by the server and therefore the username cannot be verified, you can use a more specific user description to guarantee that the appropriate user will have administrative rights to the server. The syntax for this user description is as follows:
Microsoft Windows groups and NetWorker administrative privileges
47
Overview
◆
Single user: user=user_name, domain=domain_name
For example: user=joe,domain=NT-ENG ◆
Group: group=group_name, domainsid=domain_id
For example: group=Administrators,domainsid=S-1-5-32-323121-123
Name resolution to identify and back-translate computer names NetWorker server and the NMM client machines need proper name resolution to identify and back-translate computer names, such as from: ◆
name-to-IP address
or ◆
IP address-to-name
Also, the NMM client uses the host machine NETBIOS or “short” name when connecting to the NetWorker server to browse backups. If the NETBIOS name is not found, NMM will not be able to display backups. To ensure clear communication of computer names: 1. Add the NetWorker server name to either of the following: • The local hosts file, which is located in the following location: %SystemRoot%\system32\drivers\etc
• The Domain Name System that contains the names of all servers on your network. 2. When configuring a client resource for solutions like Exchange, SharePoint, and so on, specify the NETBIOS name for the client in the Aliases attribute.
48
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Overview
Cloning and recovering from original or cloned NMM backups that are no longer browsable or present in the media database The NMM software uses NetWorker snapshot management technology to perform the backup, which creates multiple save sets regardless of the filesystems or clients involved. This is different from traditional NetWorker filesystem backups, which creates one save set for each filesystem. Because the NMM software creates multiple save sets during a run of a NetWorker backup group, ensure that all save sets that were created during an NMM backup are included in the cloning process. Failure to clone all of these save sets can result in an inability to perform a restore operation from the clone copy. Review the following information sources, to clone NMM save sets, and to recover from original or cloned NMM backups that are no longer browsable or present in the media database: ◆
The NetWorker Procedure Generator (NPG) provides application-specific procedures for NMM cloning configuration and NMM recoveries.
◆
The Cloning and Recovery of Expired Save Sets for NetWorker Module for Microsoft Applications Technical Note provides additional details on the cloning and recovery procedures.
Cloning and recovering from original or cloned NMM backups that are no longer browsable or present in the media database
49
Overview
50
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 2 NetWorker Client Management This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆
Specifying a remote client for directed recovery....................................................... Connecting to a NetWorker server............................................................................ Specifying a recovery browse time .......................................................................... Specifying ranges for service and connection ports ................................................. Specifying a password ............................................................................................
NetWorker Client Management
52 53 54 54 55
51
NetWorker Client Management
Specifying a remote client for directed recovery The filesystem of a remote client can be recovered locally. The default client for recovery is the local client. The NetWorker Module for Microsoft Applications (NMM) software can also recover backups created on remote client attached to the same NetWorker server as the local client.
Requirements To recover a remote client requires the following: ◆
NetWorker server 7.6 SP2 or later.
◆
The NetWorker server must have at least two NMM clients configured.
◆
NMM 2.4 installed on the local client.
◆
A volume backup created on the remote client. The backup must be a conventional backup, not a snapshot.
Specifying a remote client volume for recovery locally To specify a remote client volume for recovery locally: 1. In the NMM client GUI, connect to the NetWorker server that hosts the remote client. 2. From the Options menu, select Configure Options. 3. Click Refresh Clients. The Select Viewable Clients dialog box displays. 4. In the Available clients on list: a. Click a client whose data needs to be recovered on this host. b. Click Add. The remote client displays in the Clients to list on the menu bar. 5. For each remote client that you want available for directed recovery from this local computer, repeat step 1 to step 4 . 6. Click OK to close the Select Viewable Clients dialog box. 7. Close the Configure Options dialog box. In the main toolbar, the client name now provides a list box.
Recovering a remote client volume To recover a remote client volume: 1. From the Client list in the menu bar, select the remote client. Note: If the active panel is Snapshot Management or Monitor, a message displays to confirm that you want to cancel the current operation and browse to the System Recover Session panel. 2. Click Yes to change clients. 52
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
NetWorker Client Management
3. Browse to the System Recover Session panel. The System Recover Session Options dialog box displays. 4. In the Relocate Recovered Data box, specify the destination for the data recovered from the remote client.
Connecting to a NetWorker server If the NMM client was configured for backup on a different NetWorker server, you can connect to that server to recover backup items for this client. To connect to a NetWorker server: 1. From the Options menu, select Configure Options. The Configure Options dialog box displays, as shown in Figure 11 on page 53.
Figure 11 Configurations Options
2. To refresh the list of available NetWorker servers, click ( server name menu.
) next to the Backup
The Change NetWorker Server dialog box displays. 3. Click the Update Server List to get the list of all available NetWorker servers, and then select the desired NetWorker server. 4. Click OK. The server name displays in the Backup Server Name field.
You can also connect to a NetWorker server by clicking the NetWorker Server icon on the Application toolbar.
Connecting to a NetWorker server
53
NetWorker Client Management
Specifying a recovery browse time To search for only those items that were backed up on or before a particular time, specify a recovery browse time. To specify a browse recovery time: 1. From the Options menu, select Configure Options. The Configure Options dialog box displays. 2. In the Browse Time field, do one of the following: • Click the arrow to select a calendar date. • Type a date and time.
Specifying ranges for service and connection ports A service port is a listener port that provides services to NMM client hosts. The default range for service ports is 7937 to 9936. A connection port is used to contact a service, whether it is on a NetWorker server, storage node, or client. The default range for connection ports is 0–0. To implement an enhanced security environment, it may be necessary to reduce the range of available ports. The NetWorker Administration Guide provides more information about determining the size of the port range.
Reducing the range of available ports To reduce the range of available ports: 1. From the Options menu, select Configure Options. The Configure Options dialog box displays. 2. In the Service Ports attribute, type the range of available ports. 3. In the Connection Ports attribute, type the range of available ports. 4. Click OK. Note: If a firewall exists between the NetWorker client and any NetWorker servers, ensure that the firewall is configured to accept the port ranges typed in the Configure Options dialog box.
Configuring TCP Networks and Network Firewalls for EMC NetWorker Technical Note available on EMC Online Support provides more information on how to identify and configure the required ports for NetWorker hosts that need to communicate across a packet filtering or stateful inspection firewall.
54
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
NetWorker Client Management
Specifying a password The password is used to protect items that will be backed up with either PW1 password-protection, or PW2 encryption and password-protection. PW1 and PW2 protection is enabled on the NetWorker server with a local or global directive. The NetWorker Administration Guide provides more information about PW1 and PW2 protection.
Changing the password does not change the password for files that have already been backed up. To recover PW1 or PW2 password-protected files, you must provide the password that was in effect at the time of the backup.
Changing the PW1 password To change the PW1 password: 1. From the Options menu, select Configure Options. The Configure Options dialog box displays. 2. In the Old password attribute, type the password that is currently in effect. 3. In the New password attribute, type the new password. 4. In the Confirm password attribute, retype the password. 5. Click OK. The new password will be applied to future scheduled backups for the NMM client where password-protection has been enabled with a global or local directive.
Specifying a password
55
NetWorker Client Management
56
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 3 Multihomed setup for backup and recovery This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆
Overview................................................................................................................. Basic requirements for setting up a multihomed environment ................................. Requirements for multihomed NMM client's network configuration ......................... Requirements for multihomed NetWorker server's network configuration ................ Requirements for network configuration on NetWorker storage node ....................... Configuring NMM client resources in a multihomed environment.............................
57 57 59 61 61 61
Overview In a multihomed environment, NetWorker Module for Microsoft Applications (NMM) backs up data by using Microsoft VSS technology and writes to a backup device like Avamar or Data Domain by using a dedicated backup LAN instead of using a production LAN. Backing up NMM production data in a multihomed environment helps avoid contention between the data application traffic and data backup traffic. Note: For cluster virtual clients, the connection from NetWorker server is initiated on the backup media production network. But the backup payload flows through the backup network. In a multihomed environment, NMM 2.4 supports backup and recovery for the following Microsoft applications: ◆
DPM Server
◆
Exchange Server
◆
Hyper-V Server
◆
SharePoint Server
◆
SQL Server
Basic requirements for setting up a multihomed environment Ensure that the following requirements are taken care of when setting up a multihomed environment: ◆
A computer has multiple NICs
◆
Each NIC is configured with only one IP address
◆
The IP belonging to any specific NIC resides in a separate subnet or VLAN (The IP subnet or VLAN through which the backup traffic is meant to pass is called the backup subnet. )
◆
The IP should resolve to one unique hostname per NIC
Multihomed setup for backup and recovery
57
Multihomed setup for backup and recovery
◆
All the hosts, such as the following that are participating in the backup must have at least one NIC (called the backup NIC) configured with an IP address (called backup IP) on the backup subnet: • NetWorker server • NetWorker storage node • NetWorker client
◆
The backup IP on any host must always resolve to its FQDN on a backup LAN. This IP address to hostname mapping can be implemented in various ways: • By creating an entry for the backup IP on a backup domain. The backup domain is a domain that offers a mechanism to identify backup IPs by names. Examples of where and how to configure a backup domain are as follows: – Backup domain can be a separate domain hosted on an exclusive DNS server on the backup subnet. – A zone configured on existing DNS server accessible from NMM client. This might require customized configurations in the DNS server depending on the status of the DNS server, if the DNS server is separate or if the preexisting DNS server being used for multi-NIC configuration. • By updating etc\hosts file with the IP to FQDN mapping.
58
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Multihomed setup for backup and recovery
Sample network topology of multihomed environment for backup There can be several ways of setting up your multihomed environment. Figure 12 on page 59 is an example of how a NetWorker multihomed environment can be set up for backup. In this example, the NetWorker server authenticates the client through the production network, but uses the backup LAN for the data transfer.
Storage Node
Backup Lan NetWorker Server
Production Management Lan
NetWorker Client
GEN-001729
Figure 12 Sample network topology of NetWorker multihomed backup
Requirements for multihomed NMM client's network configuration Review the following requirements before configuring the NetWorker client’s network in a multihomed environment: ◆
The bind order of network interfaces must be as follows: • Production NIC • Private NIC, if any, in case of Windows cluster • Backup NIC
Requirements for multihomed NMM client's network configuration
59
Multihomed setup for backup and recovery
Modify the bind order, if required. To modify the bind order: a. Click Start > Settings > Control Panel > Network Connections. b. In the NetWork Connections dialog box, select Advanced > Advanced Settings. c. Reset the order of the connections. ◆
For each NIC, set the following: • DNS server address as the only corresponding DNS server IP address. There should always be one entry per NIC and that is the DNS server IP of the domain where this backup IP has an entry. For example, if the DNS server of backup-domain.com is hosted on 192.168.8.5, the backup NIC on NMM client should have only one entry, that is 192.168.8.5. • DNS suffix for this connection as the corresponding suffix. Figure 13 on page 60 displays the NIC settings.
Do not use the Append these DNS suffixes (in order) attribute.
Figure 13 NIC settings
To configure these settings: 1. Click Start > Settings > Control Panel > Network Connections. 2. Open the Network Connections.
60
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Multihomed setup for backup and recovery
Requirements for multihomed NetWorker server's network configuration Review the following requirements before configuring NetWorker server’s network in a multihomed environment: ◆
The minimum requirement is that the NetWorker server must have a backup IP, which is essentially an IP address for a NIC on backup subnet. This backup IP should also resolve to a unique FQDN on backup domain. The backup NIC configuration on NetWorker server should follow the guidelines in “Requirements for multihomed NMM client's network configuration” on page 59.
◆
If a NMM client is a cluster virtual server and is identified by an FQDN in production domain: • The NetWorker server must have access to the production subnet through another NIC. • The NetWorker server should be able to resolve the production FQDN of cluster virtual server. In such cases, the NetWorker server needs at least two NICs, one on backup subnet and the other on production subnet.
Requirements for network configuration on NetWorker storage node The only requirement for a NetWorker storage node is a backup IP, which is essentially an IP address for a NIC on backup subnet. This backup IP should also resolve to a unique FQDN on backup domain. The backup NIC configuration on NetWorker storage Node should follow the guidelines in “Requirements for multihomed NMM client's network configuration” on page 59.
Configuring NMM client resources in a multihomed environment This section describes how to configure NMM client resources in a multihomed environment and perform a configuration check for multihomed NetWorker backup: ◆
“Configuring NMM client resources in a multihomed environment” on page 62
◆
“Performing a configuration check for multihomed NetWorker backup” on page 62
Requirements for multihomed NetWorker server's network configuration
61
Multihomed setup for backup and recovery
Configuring NMM client resources in a multihomed environment Perform the following steps when configuring NMM client resources in a multihomed environment: 1. Create non-clustered clients with backup domain FQDN. For example: nmmclient.backupdomain.com 2. Update each client resource for the following with corresponding hostname entry in the Alias attribute of the Globals (1 of 2) tab: • NetWorker server • NetWorker storage node • NMM client Note: The production domain FQDN should be present in the aliases list 3. Ensure that all clients have the following attribute set as the backup domain FQDN of NetWorker server in the Globals (1 of 2) tab: Server network interface
4. Create an NMM client for the cluster virtual server with either of the following: • NetBIOS name or • Production domain FQDN 5. If you are using the NetBIOS name, ensure that the following attribute is enabled for the production NIC on the NetWorker server: NetBIOS over TCP/IP
6. Ensure that all clients have the following attribute set to backup domain FQDN of the storage nodes in the Globals (2 of 2) tab: Storage nodes
Performing a configuration check for multihomed NetWorker backup To perform a configuration check for multihomed NetWorker backup: 1. To resolve and reach the correct IP address from one host to another, ping for the hostnames of the following: • NetWorker server • NetWorker storage node • NetWorker client • The FQDNs corresponding to NICs participating in backup 2. Check the DNS server’s records. For each multi-NIC FQDN, there is mapping for FQDN to IP address in the DNS server's record.
62
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 4 Scheduled Backup This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆ ◆
Backup configuration roadmap ............................................................................... Configuration tasks ................................................................................................. Backing up a clustered NMM client ......................................................................... Moving a NMM client to another NetWorker server .................................................. Performing a directed recovery with NMM................................................................ Setting AES data encryption .................................................................................... Best practices and recommendations for backing up application data.....................
Scheduled Backup
64 65 79 79 80 82 84
63
Scheduled Backup
Backup configuration roadmap To configure most types of NetWorker Module for Microsoft Applications (NMM) backups, you must perform the tasks described in “Configuration tasks” on page 65. However, Table 11 on page 64 lists the specific tasks that are required to configure a backup in your setup. Table 11 Backup tasks Type of backup
Required action
Windows volumes: • Volume data such as a drive letter, for example: D:\ • A file system path, for example D:\data
Complete all seven tasks, as described in “Configuration tasks” on page 65.
Windows system components: • The Registry database • Windows Cluster • Other Window system components
Complete all seven tasks, as described in “Configuration tasks” on page 65.
Note: Certain Windows system components, for example Registry and COM+ REGDB, do not have individual save sets. The Windows system components are all backed up under the following save set: SYSTEM COMPONENTS:\ For Windows Server 2008 and Windows Server 2008 R2, during SYSTEM COMPONENTS:\ backups: —All registry keys that are created under HKCU are not backed up. —All user settings and logs related to PerfMon are not backed up. Microsoft application data: • Exchange Server • Hyper-V • SharePoint Server • SQL Server • System Center Data Protection Manager (DPM) • Windows Server Cluster
• Complete tasks 1 through 4, as described in “Configuration tasks” on page 65. • Configure a client resource by following the specific instructions for the application provided in the respective chapter in the NetWorker for
For all other applications and systems supported by NMM
Complete all seven tasks, as described in “Configuration tasks” on page 65.
An NMM client that is part of a cluster
• Complete all seven tasks, as described in “Configuration tasks” on page 65. • Review the considerations listed in “Backing up a clustered NMM client” on page 79 before performing a scheduled backup.
An Active Directory Server and ADAM
Complete the tasks described in Chapter Microsoft Active Directory Backup and Recovery in the
Microsoft Applications Release 2.4 Application Guide.
NetWorker Module for Microsoft Applications Release 2.4 Application Guide.
64
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
Configuration tasks Table 12 on page 65 lists the tasks that you must follow when configuring backups for the Microsoft application that you are using. The respective chapter for each application in the
NetWorker Microsoft Module for Microsoft Applications Release 2.4 Application Guide provides the list of tasks that are required for a particular application. Table 12 List of tasks required for VSS based and VDI based backups VSS based backup
VDI based backup SQL Server
Tasks
SQL Server, Data Protection Manager Server, Exchange Server, Hyper-V Server, SharePoint Server, and Active Directory
“Task 1: Configure a backup pool” on page 66
✔
✔
“Task 2: Configure snapshot policies” on page 68
✔
X
“Task 3: Configure a backup schedule” on page 72 ✔
✔
“Task 4: Configure a backup group” on page 72
✔
✔
“Task 5: Configure a client resource” on page 74
✔
✔
“Task 6: Configure NetWorker administrator privileges” on page 77
✔
X
“Task 7: Configure a proxy client” on page 78
✔
X
All the procedures described in this section must be performed on a NetWorker server. Use the NetWorker Management Console program (NMC) to access the NetWorker Administration page to perform all the procedures. Click the question mark icon at the bottom left of each page of the NMC for details about each field in the page. Review the NetWorker Administration Guide for details about the NetWorker Management Console program.
Configuration tasks
65
Scheduled Backup
Task 1: Configure a backup pool Configuring a backup pool is a four-part process. Table 13 on page 66 provides details. Table 13 Configuring a backup pool Task
Description
“Configuring a device” on page 66
Configure a media device for snapshot metadata. Configure a tape, file, or advanced file type device. For best performance, configure a file or advanced file type device so that a snapshot can be recovered without the potential delay associated with retrieving a tape.
“Configuring a label template” on page 67
Labels identify the kind of data that is stored on the volumes in a backup pool. Label templates define a naming convention for labels. Create a label template for volumes that are used to contain snapshot metadata.
“Configuring a backup pool” on page 67
Backup data is sorted onto backup media volumes by using media pools and volume labels. A media pool is a specific collection of volumes to which the NetWorker server writes data. The server uses media pools to sort and store data. A volume is identified with a unique label based on configurable label templates. Media pools act as filters that tell the server which backup volumes should receive specific data. The NetWorker server uses media pools in conjunction with label templates (if the Match Bar Code Labels attribute is not used for the library resource) to keep track of what data is on which specific volume. Using label templates provides more information on label templates.
“Labeling the device” on page 68
Before a device can be used for snapshot backups, it must be labeled by using the snapshot pool that you created in the previous step.
Configuring a device Note: You can use the New Device Wizard in the NetWorker Management Console to configure a device. To configure a device: 1. In the NetWorker Administration page of the NetWorker Management Console, select Devices on the taskbar. 2. In the expanded left pane, select Devices. 3. From the File menu, select New, and complete the following attributes: a. In the Name attribute, replace the default name with the path and name of the device: – If the device is configured on the NetWorker server’s storage node, the name is the simple device path. For example, C:\tmp\d0 for a file type device. A tape device would have a format similar to \\.\Tape0. Note: Do not use the 'temp' directory for NetWorker DiskBackup devices because the data will be overwritten.
66
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
– If the device is configured on a remote storage node, the name must indicate that the storage node is remote, by including rd= and the name of the remote storage node in the device path. For example, if the remote storage node is neptune, then the device path might be rd=neptune:c:\tmp\d0. b. In the Comment field, specify a comment for the device. c. From the Media Type attribute, select the appropriate media type. d. Select the Auto Media Management attribute. 4. Click Configuration, and in the Target Sessions attribute: a. Type or select a value. b. Set this attribute to a value that will speed up the backup, for example, 32. 5. Click OK.
Configuring a label template To configure a label template: 1. In the Administration page of the NetWorker Management Console, click Media. 2. In the expanded left pane, select Label Templates. 3. From the File menu, select New, and complete the following attributes: a. In the Name attribute, type a name that identifies the series of labels as belonging to volumes for snapshot metadata. b. In the Comment attribute, specify a comment for the label. c. In the Fields attribute: a. Specify a text name such as Snapshot_Metadata. b. On a separate line, specify a numeric range such as 001–999 or a text range such as aa–zz. Note: These attributes are used to incrementally identify each label. 4. Click OK.
Configuring a backup pool To configure a backup pool to store snapshot metadata: 1. In the Administration page of the NetWorker Management Console, click Media. 2. In the expanded left pane, select Media Pools. 3. From the File menu, select New, and complete the following attributes: a. For the Name attribute, type a name that matches the label template. b. In the Comment attribute, specify a comment for the pool. c. Select the Enabled attribute. d. For the Pool type attribute, select the backup pool type. Configuration tasks
67
Scheduled Backup
e. For the Label template attribute, select the matching label template. f. Perform either of the following steps, but not both: – Click the Selection Criteria tab, specify a NMM client for the Clients attribute. or – For the Groups attribute, select the applicable backup groups. g. In the Devices attribute: a. Select the device that you created in the previous step. b. Ensure that this device can accept snapshot rollovers for this pool. “Labeling the device” on page 68 provides details. 4. Click OK.
Labeling the device To label a device: 1. In the Administration page of the NetWorker Management Console, click Devices. 2. In the right pane: a. Right-click on the name of the device. b. Select Label: a. In the Pool attribute, select the snapshot pool that was created in the previous step. b. Select the Mount after Labeling attribute. 3. Click OK.
Task 2: Configure snapshot policies A snapshot policy determines the following: ◆
When and how often snapshots are created
◆
Number of snapshots, and if any are retained as persistent snapshots
◆
Which snapshots, if any, are rolled over to conventional storage
◆
When snapshots expire and become eligible for deletion
Note: Snapshots can also be manually rolled over or deleted. “Roll over a snapshot” on page 31 describes these procedures in more detail. You can specify: ◆
A preconfigured policy, as described in “Using preconfigured snapshot policies” on page 69 Or
◆
68
Create a custom snapshot policy, as described in “Creating a snapshot policy” on page 69.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
Using preconfigured snapshot policies Table 14 on page 69 lists the types of preconfigured snapshot policy in NMM 2.4. Table 14 Preconfigured snapshot policies Types
Description
Serverless
A single snapshot is taken per day. The data is then rolled over to conventional storage and the snapshot is deleted. This is a simple snapshot policy that can be considered as a “default” snapshot policy in NMM. The serverless snapshot policy in NMC can be used in true serverless backup operations, as described in “Serverless backup” on page 31, and can also be used in normal non-serverless operations.
Daily
The daily snapshot policy in NMC has Retain Snapshots set to eight. This indicates that NMM should keep eight snapshots per day. When the ninth backup starts at the beginning of the next day, the oldest snapshot is deleted, and so on. Each snapshot has 24-hour expiration policy. If you select the daily snapshot policy, persistent snapshots are created.
Creating a snapshot policy To create a custom snapshot policy: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, select Snapshot Policies. 3. From the File menu, select New, and complete the following attributes: a. In the Name attribute, type a name for the snapshot policy. b. In the Comment attribute, type a comment for the snapshot policy. c. In the Number of Snapshots attribute, type the number of snapshots to be created per day: – The Number of Snapshots attribute works in conjunction with the Group Resource Interval and Start Time attributes. – The value for the Start Time and Interval attributes must allow the specified number of snapshots to be created in a 24-hour period. For example, to take four snapshots per day and the first snapshot must occur at 4:00 AM (Start Time attribute), the Interval attribute must be set to 5 hours or less: Number of Snapshots Data Source > Groups. Use a backup group to assign the following attributes to a set of client resources:
72
◆
Backup start times
◆
Backup pools
◆
Schedules
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
◆
Snapshot policy
Review the following information when creating a group resource: ◆
A client resource or backup group cannot specify volumes that use both CLARiiON and Symmetrix storage systems. Each backup group and its client resources can specify volumes from only one type of storage system. For hosts that have both CLARiiON and Symmetrix volumes, create separate backup groups and client resources.
◆
Do not create multiple instances of the same client in one backup group when configuring a backup. Two backups on one client in parallel cannot be performed.
◆
When creating a backup group, it is important to keep in mind the NMM and group resources impact on browse and retention policies. For example, if client resource A has save set X, and client A belongs to two groups: group_1 for full backup and group_2 for incremental backup, the full backup of save set X expires before the incremental backup of save set X. This is because the client resource client A and save set belong two different groups. You are recommended to create only one group resource for one client resource even when both full and incremental level backups are performed.
To configure a backup group: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, select Groups. 3. From the File menu, select New, and complete the following attributes: a. In the Name attribute, type a name for the backup group. b. In the Comment attribute, type a description. c. For the Start Time attribute, type the time when the first snapshot is to be created. The value for the Start Time attributes must allow the specified number of snapshots to be created in a 24-hour period. For example, if you want to take four snapshots per day (Number of Snapshots attribute) and the first snapshot must occur at 4:00 AM (Start Time attribute), then the Interval attribute must be set to 5 hours or less: Number of Snapshots < (24:00 - Start Time) / Interval
Note: For SQL VDI based backups, in the Start Time attribute type the time when you want the first VDI backup to begin. d. For the Autostart attribute, select Enabled. e. For VSS based (snapshot) backups, select the Snapshot attribute. Note: For SQL Server VDI based backups, leave the Snapshot attribute clear. f. For the Snapshot Policy attribute, select a snapshot policy: – The Number of Snapshots attribute works in conjunction with the Group Resource Interval and Start Time attributes.
Configuration tasks
73
Scheduled Backup
– The value for the Start Time and Interval attributes must allow the specified number of snapshots to be created in a 24-hour period. Note: Skip this step for SQL Server VDI based backups. g. For the Snapshot Pool attribute, select a pool that was created for the snapshot. Note: Skip this step for SQL Server VDI based backups. 4. Click the Advanced tab: a. For the Interval attribute, specify how often a snapshot will be created. The Interval attribute works in conjunction with the following: – The backup group Start Time attribute – The snapshot policy Number of Snapshots attribute. b. Ensure that Restart Window attribute value is set to 00:01. c. Set the Client Retries attribute to 0 (zero). This value specifies the number of times the NetWorker software attempts to back up a failed client. 5. Click OK to create the backup group.
After you have started a snapshot of a save group, do not interrupt or halt the snapshot process. For example, in an Exchange Server backup, the nsrsnap_vss_save.exe process on the production server and the eseutil process on the proxy may continue to run after the snapshot is halted. Any attempt to stop a group in NetWorker Management Console will take a long time to complete.
Task 5: Configure a client resource A NetWorker Client is a resource configured on the NetWorker server. This resource defines the following information: ◆
Client data to back up
◆
Backup schedule for the client
◆
Browse policy for the backup data
◆
Retention policy for the backup data
For each client resource, the NetWorker server does the following:
74
◆
Maintains the client resource information, including entries in the online client file index and media database.
◆
Contacts the clients listed in a backup group configured on the server.
◆
Performs the scheduled backups when a client request is received.
◆
Restores the data upon request from the client.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
You can create multiple client resources for the same NMM client host. In this way, you can apply different backup attributes to different types of information on the same host. For example, if the NMM client host is an Exchange Server: ◆
Create one client resource to back up the Exchange databases.
◆
Create another client resource to back up Windows system component data.
This way, you can back up Exchange databases many times a day, and back up Windows system component data once a day.
Viewing valid application data save sets When configuring a client resource, you must type the save sets in the Save Set attribute of the client resource. To display a list of the application data save sets that are available for backup: 1. Open a command prompt on the application server. 2. Type the nsrsnap_vss_save -v -? command. The respective chapters for each application in the NetWorker Module for Microsoft Applications Release 2.4 Application Guide lists the available save sets. Note: The nsrsnap_vss_save -v -? command is used for VSS based backups of SQL Server, Exchange, SharePoint, DPM, and Hyper-V. 3. Press Enter. Each line of output corresponds to a save set entry that you can add to the Save Set attribute of a client resource. Each entry that you add to the Save Set attribute must be typed on a separate line.
URL encoding for save sets When specifying save set names in the Save Set attribute of the client resource, there are cases where special characters, such as the backward slash (\), must be specified by their URL-encoded values. These characters are often used in Asian languages. Table 20 on page 75 lists the most commonly used special characters and their URL values. Table 20 Special characters and their URL-encoded values (page 1 of 2) Special character
URL-encoded value
Special character
URL-encoded value
\
%5C
?
%3F
/
%2F
]
%5D
"
%22
[
%5B
%
%25
}
%7D
#
%23
{
%7B
Configuration tasks
75
Scheduled Backup
Table 20 Special characters and their URL-encoded values (page 2 of 2) Special character
URL-encoded value
Special character
URL-encoded value
&
%26
^
%5E
%3E
|
%7C
Using the NetWorker Management Console to create a client resource Although the general process for configuring a client resource is the same for all applications or systems and is done by using the NetWorker Management Console, there may be some differences in the settings and requirements specific to some applications. These settings and requirements are described in the backup sections for each application in the NetWorker Module for Microsoft Applications Release 2.4 Application Guide. The client resource is configured from the NetWorker Management Console by: ◆
Entering the details manually in the Client Properties page—For file system, SharePoint Server, Exchange Server, DPM Server, Hyper-V Server, SQL Server (both VSS and VDI), and Active Directory, you can manually enter the details in the Client Properties page. To manually create a client resource: a. In the Administration page of the NetWorker Management Console, click Configuration. b. In the expanded left pane, select Clients. c. From the File menu, select New. The Client Properties page displays. Enter the details in the Client Properties page. The settings and requirements are described in the scheduled backup sections for each application in the NetWorker Module for Microsoft Applications Release 2.4 Application Guide.
◆
Using the Client Configuration Wizard— You can use the Client Configuration Wizard to create client resources for VDI based backups of SQL Server, and VSS based backups of SharePoint Server and Exchange Server. The Client Configuration Wizard is not available for creating client resources for VSS based backups of file system, SQL Server, Hyper-V, DPM, and Active Directory. The Client Configuration Wizard configures the client resources by fetching the details from the configuration setup and displays the details in a summary page. To use the Client Configuration Wizard option from the NetWorker Management Console, you must installed: • NetWorker server 8.0 • NetWorker Management Console server 8.0 • NetWorker client 7.6 SP2 or later
76
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
To create a client resource by using the Client Configuration Wizard: a. In the Administration page of the NetWorker Management Console, click Configuration. b. In the expanded left pane, select Clients. c. From the File menu, select New, and then the Client Backup Configuration option. The details are described in the scheduled backup sections for SQL VDI Server, SharePoint Server, and the Exchange Server chapters in the NetWorker Module for Microsoft Applications Release 2.4 Application Guide.
Task 6: Configure NetWorker administrator privileges The NMM client must be granted NetWorker administrator privileges to perform media database operations during snapshot deletion. If you set up a proxy client for the NMM client, grant the proxy client NetWorker Administrator privileges. If you are setting up a NMM client in a cluster, grant NetWorker administrator privileges to each cluster node and virtual server. To configure privileges: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, click User Groups. 3. Right-click the Administrators group, and then select Properties. The Client Properties dialog box displays. 4. In the Users attribute, add the following values for the NMM client host: user=administrator,host=NMM_client_host user=system,host=NMM_client_host
where NMM_client_host is the DNS hostname of the NMM client. Place each value on a separate line. 5. If a proxy client is set up for the NMM client: • Where a single user is granted administrator rights to perform all NetWorker functionality for a host, add the following values: user=administrator,host=NMM_clientproxy_host user=system,host=NMM_clientproxy_host
• Where multiple users are configured and added to an administrator group and that group is added on NetWorker privilege list. All the users under this group have administrator rights. To perform all the NetWorker functionality for a host, add the following values: group=administrator,host=NMM_clientproxy_host group=system,host=NMM_clientproxy_host
Configuration tasks
77
Scheduled Backup
6. If the NMM client is installed in a cluster, grant NetWorker administrator privileges to each: • Cluster node (both active and passive nodes) • Virtual server 7. Click OK. All NMM users must have administrator level privileges.
Task 7: Configure a proxy client A proxy client is a separate host that acts as a data mover for a NMM client. By default, the NMM client acts as its own data mover. However, a proxy client is required for serverless backups. Serverless backups free the NMM client from much of the processing involved in a snapshot backup. In a serverless backup, a snapshot is created on the NMM client and then immediately moved to the proxy client for further processing. A proxy client can also be set up on a NetWorker storage node. In this way, the network traffic that is generated when a snapshot is rolled over to a conventional backup medium is avoided. Table 21 on page 78 lists the requirements for setting up a proxy client. Table 21 General configuration requirements for a proxy client Requirement
Description
Software and hardware versions
The proxy client must have the same version of the NMM client software, and operating system version and patch level, as the host for which it is acting as the proxy client.
Configuration
Create a NMM client resource for the proxy client host. For the NMM client resource that will use the services of the proxy client, type the proxy client hostname for the following attributes: • Application Information • Remote Access
78
Connectivity
The proxy client must have connectivity between the following: • NMM client • NetWorker server • Storage subsystem on which snapshots reside.
Serverless backups
• A proxy client is required for serverless backups. • Additionally, serverless backups are supported only with VSS hardware providers and depend on the capabilities of the storage subsystem. • For the EMC VSS Provider, serverless backups are supported for both CLARiiON and Symmetrix storage systems.
For proxy clients that are using CLARiiON storage and the EMC VSS Provider
At least one CLARiiON LUN must be permanently assigned to the proxy host.
Third-party hardware providers
Hardware providers may have additional configuration requirements for proxy clients. The vendor’s product documentation provides details on these requirements.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
Backing up a clustered NMM client To configure a virtual NMM client for backup, complete all the tasks required to back up a normal NMM client, as described in “Configuration tasks” on page 65. However, there are some additional considerations that you must be aware of when configuring a client resource for a clustered NMM client. Table 22 on page 79 outlines these considerations. Table 22 Additional considerations for backing up a clustered NMM client Backup task
Details
Configure a client resource
• For each virtual server that is being backed up. • For each physical node in the cluster on which the virtual server can run. For each client resource, type the names of the physical nodes of the cluster in the Remote Access attribute.
Set up NetWorker administrator privileges
• For each physical node in the cluster. • For each proxy client in the cluster.
Configure a proxy client
If a hardware provider such as the EMC VSS Provider is being used, a proxy client must be configured for a clustered NMM client.
Do not use the pathownerignore functionality because this restriction is not enforced by NMM. Ensure that ansr\bin\pathownerignore file is not used or set. In some circumstances, during backup, the path owner may be ignored by NMM and the data from a clustered disk is backed up under the indexes of the physical node. However, the recovery of the data fails. Clustered disks must be backed up under a virtual cluster client.
Cluster failover and backups If a node within a cluster fails during backup, the backup fails. The next scheduled backup operation will be the next valid backup. If you are using a hardware provider such as the EMC VSS Provider, use the disk management utilities provided with the associated hardware to delete any resources that may be left in an indeterminate state as a result of the failed backup. For example, a CLARiiON storage solution may have an InActive snapshot as the result of a failed backup. In this case, use the EMC Navisphere® user interface or the NaviCLI command line interface to search and delete the inactive snapshot.
Moving a NMM client to another NetWorker server An NMM client should be protected by only one NetWorker server. Do not set up scheduled backups for a NMM client on multiple NetWorker servers. In case the NMM client is installed on a NetWorker server other that the one that is set up for scheduled backups, you can move the move the NMM client.
Backing up a clustered NMM client
79
Scheduled Backup
To move a NMM client to a different NetWorker server: 1. On the NMM client: a. Open the NMM client software. b. Manually delete any snapshots for the client. “Deleting a snapshot” on page 45 provides more information about deleting snapshots manually. Before you delete the snapshots, you can manually roll them over to a conventional backup. In this way, the data in the snapshot can be recovered. 2. On the NetWorker server that you are moving from, disable or delete the client resources that are set up for the NMM client. You can disable a client resource for scheduled backup by clearing the Scheduled backup attribute in the client resource. 3. On the NetWorker server that you are moving to, set up scheduled backups for the NMM client.
Performing a directed recovery with NMM “Normal and directed recovery” on page 25 provides details about directed recovery and the types of directed recovery. To perform a directed recovery with NMM: 1. Using the NMM software to create a volume backup. The backup can be one of the following: • Snapshot • Conventional This volume backup is the source for a directed recovery. 2. Run the NMM software on the node that will receive the backed up data. 3. Connect to the NetWorker server that hosts the source NMM client. 4. Add the NMM client that created the volume backup as a locally browsable client. Figure 14 on page 80 shows the default of only one NMM client available, the local client.
Figure 14 Local client on the taskbar next to client
5. On the Options menu, click Configure Options. Figure 15 on page 81 shows the Configuration Options dialog box.
80
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
Figure 15 Configuration Options dialog box
6. Click Refresh (
).
Figure 16 on page 81 shows the Select Viewable Clients dialog box. The clients available on the NetWorker server that you are attached to are listed under Available clients on.
Figure 16 Select Viewable Clients dialog box
7. Click the client to add in the Available clients on list box: a. Click Add to add clients as needed. b. Click Remove to remove clients as needed. c. Click OK. Figure 17 on page 81 shows the NMM window with the client box.
Figure 17 NMM client menu list Performing a directed recovery with NMM
81
Scheduled Backup
8. Click the Client list, and select the client that created the volume backup as the browsable client. 9. If the Snapshot Management or Monitor is the active navigation bar item, and you are prompted with the Navigate Away dialog box, click Yes. 10. On the System Recover Sessions bar, select Recover Options. The NetWorker System Recover Session Options dialog box displays. 11. On the NetWorker tab: a. Specify the destination for the recovery in the Relocate Recovered Data box. b. Click OK. 12. Recover remote client's backup to local destination. Note: Although SharePoint Server 2007 save sets are browsable in Snapshot Management view on a host with SharePoint Server 2010, do not perform any operation for snapshots from remote machine.
Setting AES data encryption To start using data encryption, you must first set the Datazone pass phrase for the NetWorker server. This is done from the NetWorker Management Console (NMC). After the pass phrase is assigned, you can then configure directives within NetWorker to use Advanced Encryption Standard (AES) encryption. The NetWorker Administration Guide provides details about AES encryption. To implement AES encryption in NMM: ◆
82
For filesystem and VSS backups — Select the Encyrption directive from the Directive menu in the general tab when configuring the client resource. This must be done for all applications for which AES encryption must be implemented.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Scheduled Backup
For example, in Figure 18 on page 83, the Encryption directive is selected in the Directive field when configuring the client resource for SQL VSS backup.
Figure 18 Encyrption directive for SQL VSS client resource configuration ◆
For VDI backups — The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details on AES encryption for SQL VDI client resource.
Setting AES data encryption
83
Scheduled Backup
Best practices and recommendations for backing up application data Table 23 on page 84 lists the recommendations to follow when backing up application data. Table 23 Best practices and considerations for application backups Consideration
Best practice
Define different schedules for protecting the following: • The operating system and the file system • The application that is to be backed up
For application servers, such as SQL Servers or Exchange Server, back up the server application data under a schedule different than the host operating system data and volumes. Typically, application data is backed up several times a day while operating system data and volumes are backed up less frequently. To accomplish this task: 1. Create a separate backup group, snapshot policy, and client resource for the following: •Server application data •Volumes and operating system data 2. Assign the appropriate snapshot policy and client resource to each backup group.
Installation path for application server program
Do not install application server program files on the same volume as the application’s database files and the log files.
Copy-on-write snapshot technology versus split-mirror snapshot technology, when using CLARiiON or Symmetrix.
This applies to the following hardware-based snapshots: • Large databases and databases that are updated frequently, should not be saved with copy-on-write snapshot technology. Instead, use a split-mirror snapshot technology such as, a CLARiiON clone or a Symmetrix BCV. • Although copy-on-write technology requires less hardware resources, split-mirror technology can better handle the requirements of large or fast-changing database. Split-mirror technology is supported only with a VSS hardware provider, such as the EMC VSS Provider. It is not provided by the built-in Microsoft System Provider.
Enable the recovery of SQL Server data
If SQL Server Writer service is disabled, you can enable the recovery of all SQL data by performing the following: 1. Re-enabling the SQL Server writer service. 2. Backing up the SQL Server, this will enable you to recover all SQL data.
Perform a full backup for Exchange Server 2007 and Exchange Server 2010
When the following occurs: • If a Exchange recover operation has been performed. • If a Exchange Service Pack has been installed.
When database names contain French and Spanish characters, successful backups of database are possible when the database name in the save set is entered manually.
French and Spanish characters are not printed in the command prompt on Windows. This is a Windows operating system issue.
84
Backup fails when the output generated using the nsrsnap_vss_save.exe -? command, is used for French or Spanish character database name. This is because the output is not a valid component.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 5 Data Deduplication with Avamar This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆
The benefits of using data deduplication................................................................. Utilizing the Avamar data deduplication capabilities ............................................... Supported and unsupported applications, features, and configurations .................. Related documentation on Avamar and NetWorker .................................................. Avamar integration in NMM ..................................................................................... Avamar and NetWorker server configuration ............................................................ Deduplication backup requirements for NetWorker server ....................................... Configuring a client resource for deduplication backup ........................................... Querying deduplication save sets by using mminfo ................................................. Recovering deduplicated data ................................................................................. Deleting deduplication save sets.............................................................................
Data Deduplication with Avamar
86 87 87 90 91 91 92 95 98 98 99
85
Data Deduplication with Avamar
The benefits of using data deduplication This section describes the benefits of using data deduplication.
Deduplication differentiators The key deduplication differentiators are as follows: ◆
Deduplicates backup data at the source, before data transfer across the network
◆
Enables fast, daily full backups across existing networks and infrastructure
◆
Reduces required daily network bandwidth dramatically by identifying redundant data at source
◆
Up to 10 times faster backups
◆
Data encrypted in flight and at rest
◆
Patented RAIN technology provides fault tolerance across nodes and eliminates single points of failure
◆
Scalable grid architecture
◆
Global data deduplication reduces total backup storage by up to 50 times
◆
Recoverability verified daily—no surprises
◆
Centralized web-based management
◆
Simple one-step recovery
◆
Flexible deployment options, including EMC Avamar Data Store package
Data deduplication replaces multiple copies of the same data scattered across networks with a reference to a single instance or source for the data. Edited files also have tremendous redundancy with previous versions.
Comparison of deduplication and non-deduplication backups Table 24 on page 87 provides a a rough comparison of deduplication and non-deduplication backups:
86
◆
All estimates are relative and approximate.
◆
Recovery time estimates are for save set recovery operations.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
Table 24 Backup and recovery schedule comparison
Backup type
Full initial backup
Subsequent daily, full backups
Subsequent daily, incremental backups (with a weekly full)
Non-deduplication
x hours
x hours
1/10 x hours
1.6 to 2.0x, if the full backup and all incremental backups were restored.
Deduplication (daily full)
x hours
1/5 x hours
-
Less than or equal to x (only one backup need be restored).
1/20 x hours
-
1.5 to 2.0x, if the full backup and all incremental backups were restored.
Deduplication x hours (daily incremental)
Data recovery time after 1 week
Utilizing the Avamar data deduplication capabilities NetWorker leverages the data deduplication capabilities of Avamar Data Stores, to solve the challenges associated with traditional backup, enabling fast, reliable backup and recovery for remote offices, and data center LANs. Data deduplication is a key feature of the Avamar system. Data deduplication ensures that each unique sub-file, variable length object is stored only once across sites and servers. This feature greatly reduces network traffic and provides for enhanced storage efficiency on the server. During backups, the Avamar client software: 1. Examines the client file system and applies the data deduplication algorithm that identifies redundant data sequences and breaks the client filesysytem into sub-file, variable length data segments. 2. Assigns each data segment a unique ID. 3. The client software then determines whether or not this unique ID has already been stored on the Avamar server. 4. If this object resides on the Avamar server, a link to the stored object is referenced in this backup. 5. After an object has been stored on the server, it is never resent over the network, no matter how many times it is encountered on any number of clients.
Supported and unsupported applications, features, and configurations This section provides information on the following: ◆
“Supported operating systems” on page 88
◆
“Supported Microsoft applications” on page 88
Utilizing the Avamar data deduplication capabilities
87
Data Deduplication with Avamar
◆
“Supported configurations” on page 89
◆
“Supported applications for single and multi streams when using Avamar” on page 89
The NetWorker Software Compatibility Guide contains additional and the most up-to-date information about NMM compatibility.
Because the data deduplication process in NetWorker Module for Microsoft Applications (NMM) requires Avamar and NetWorker installation and configuration, we recommend that you review the listed documentation in “Related documentation on Avamar and NetWorker” on page 90 for details about Avamar and NetWorker installation and configuration for more information.
Supported operating systems NMM supports deduplication with Avamar on the following operating systems: ◆
Windows Server 2008 R2 (x86, x64)
◆
Windows Server 2008 (x86, x64)
Supported Microsoft applications NMM supports deduplication on the following Microsoft applications: ◆
For VSS backups: • Active Directory • Exchange Server 2010 (x64) • Exchange Server 2007 (x64) • SharePoint Server 2010 • SharePoint Server 2007 (x86, x64) • System Components and File System • Windows Server 2008 with Hyper-V • Windows Server 2008 Microsoft Server Core Installation with Hyper-V
◆
For both VSS and VDI backups: • SQL Server 2012 (x64) • SQL Server 2008 R2 (x64, x86) • SQL Server 2008 SP1 (x64, x86) • SQL Server 2008 (x86, x64) • SQL Server 2005 (x86, x64)
88
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
Data deduplication with Avamar is not supported for Active Directory granular and System Center Data Protection Manager 2007.
Supported configurations NMM supports deduplication on the following configurations: ◆
System Provider
◆
Hardware Provider: Proxy Backup Configurations
◆
Cluster configurations are supported for the following in the preceding lists: • Operating systems • Applications • Configurations
NMM does not support deduplication for the following features and configurations: — NetWorker features: AES Encryption, Cloning/Staging, and Compression — Windows configurations: EFS File Systems
Supported applications for single and multi streams when using Avamar “Related documentation on Avamar and NetWorker” on page 90 lists the documentation that provides details about single and multi streams when using Avamar. Table 25 on page 89 lists the Microsoft applications for which single and multi stream support is available when using Avamar . Table 25 Single and multi streams support to and from Avamar (page 1 of 2) To Avamar
From Avamar
Microsoft Applications
SIngle stream
Multi stream
SIngle stream
Multi stream
Exchange Server 2010 (x64)
✔
✔
✔
X
SharePoint Server 2010
✔
✔
✔
X
SharePoint Server 2007 SP2
✔
✔
✔
X
SQL Server 2012 (x64) (VDI)
✔
✔
✔
X
SQL Server 2008 R2 (x64, x86) (VDI)
✔
✔
✔
X
SQL Server 2008 SP1 (x64, x86) (VDI)
✔
✔
✔
X
SQL Server 2008 (x64, x86) (VSS)
✔
✔
✔
X
Exchange Server 2007 (x86, x64)
SQL Server 2005 (x86, x64) (VSS)
Supported and unsupported applications, features, and configurations
89
Data Deduplication with Avamar
Table 25 Single and multi streams support to and from Avamar (page 2 of 2) To Avamar
From Avamar
Microsoft Applications
SIngle stream
Multi stream
SIngle stream
Multi stream
SQL Server 2012 (x64) (VSS)
✔
✔
✔
X
SQL Server 2008 R2 (x64, x86) (VSS) ✔
✔
✔
X
SQL Server 2008 SP1 (x64, x86) (VSS)
✔
✔
✔
X
SQL Server 2008 (x64, x86) (VSS)
✔
✔
✔
X
✔
✔
✔
X
SQL Server 2005 (x86, x64) (VSS)
Hyper-V Active Directory
Note: If you are using both, Avamar data deduplication support and stripes support for SQL Server VDI backup and recovery, ensure that the save streams value is less than or equal to four.
Related documentation on Avamar and NetWorker Extensive documentation for the Avamar server and NetWorker server setup and configuration is available for download at http://support.emc.com: ◆
The white paper: Efficient Backup and Recovery with EMC Avamar Deduplication Software and Systems — This white paper provides a technical overview of EMC Avamar backup and recovery software and systems with integrated global, source data deduplication technology. It includes an in-depth look at the Avamar architecture, data deduplication technology, key applications, and deployment options.
◆
The Avamar System Administration Manual — This document describes how to administer an operational Avamar 6.0 system following successful installation, setup, and configuration.
◆
The NetWorker Administration Guide — This document describes how to create the following: • Deduplication storage node • Replication nodes Additional deduplication operation information is available with the documentation on the following NetWorker features: – Backup statistics basic reports – Events
90
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
Avamar integration in NMM The integration of Avamar in NMM provides deduplication for Microsoft applications through the familiar NetWorker features and GUI. This integration provides the ability to perform the following: ◆
Configure deduplication for a NMM client resource in NetWorker Management Console (NMC) — The deduplication backup settings are part of the client resource configuration GUI. Select a checkbox to enable deduplication, and then select the deduplication server.
◆
Perform deduplication backup at snapshot rollover time — When deduplication is selected in the client resource, NMM automatically performs deduplication during the backup. No separate or additional user input is required to perform deduplication.
◆
Perform deduplication recover — The process for recovering data from a deduplication node is the same as that for recovering from a storage node.
File and data sizes vary between applications, so Avamar optimizes compression by analyzing the data in the save set and by using the best chunking size for that data.
Avamar and NetWorker server configuration Before a NMM backup client can be configured to use Avamar deduplication, the Avamar server and NetWorker server must be installed to receive deduplication data and process backups. The following topics provide the required information: ◆
“Configure the Avamar and the NetWorker server” on page 91
◆
“Set the DNS resolution for NetWorker deduplication node and NMM” on page 92
Configure the Avamar and the NetWorker server To configure Avamar and the NetWorker server to receive deduplication data and process backups: 1. Set up and configure the Avamar server. The Avamar hardware and software documentation provides information on Avamar setup and configuration. 2. Create deduplication nodes on the Avamar server: • Perform this task through the Avamar user interface. • The Avamar documentation provides detailed information. Ensure that: – The NetWorker client and NetWorker server are configured with the same Avamar node before the backup is started. – The Avamar node is available to receive the backed up data. – The license for the Avamar node has not expired.
Avamar integration in NMM
91
Data Deduplication with Avamar
3. Configure deduplication node settings on the NetWorker server: • Configure the deduplication node through the NetWorker server’s Administration interface. • The NetWorker Administration Guide provides more information about configuring the deduplication node. 4. Create a replication node for a deduplication node, if required by the NetWorker deduplication node for automatic failover of data backup nodes. The NetWorker Administration Guide provides details.
Set the DNS resolution for NetWorker deduplication node and NMM The NetWorker deduplication node and the NMM hosts require a DNS resolution between nodes. The NMM hosts include one or more of the following: ◆
NMM client
◆
NMM proxy client
◆
NMM proxy storage node
DNS resolution must work prior to starting deduplication backups: ◆
On the NMM hosts, ensure the hosts have DNS name resolution for the NetWorker deduplication node: • If the NMM hosts do not have DNS resolution for the NetWorker deduplication node, then that needs to be repaired. • Check your operating system documentation for information on how to fix DNS resolution problems.
◆
On the NetWorker deduplication node, ensure it has DNS name resolution to the NMM hosts: • If the NetWorker deduplication node does not have DNS resolution for the NMM hosts, then that needs to be repaired. • Check your operating system documentation for information on how to fix DNS resolution problems.
Deduplication backup requirements for NetWorker server All typical client operations, such as adding, deleting, and drag-and-drop, work the same for deduplication clients as they do for other types of clients. A deduplication save set is treated as a regular NetWorker save set, although it actually has two parts:
92
◆
Metadata (hash info)
◆
The backed-up client data
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
Only the metadata is stored on a NetWorker storage node. The backed-up client data is stored on a deduplication node (Avamar server). The metadata can be cloned in the usual manner, while a copy of the backed-up data can be replicated on another deduplication node. When configuring a NMM client resource for deduplication, there are several special requirements or considerations: ◆
“Backup levels and schedules for deduplication clients” on page 93
◆
“Initial full backup followed by daily incremental backups” on page 93
◆
“Initial full backup followed by daily full backups” on page 94
◆
“Retention policies” on page 94
◆
“Backup configuration notes” on page 94
Backup levels and schedules for deduplication clients When a NMM deduplication client is backed up for the first time after deduplication has been enabled, a full backup of the client data must be performed. Subsequent backups of the client then take advantage of deduplication to back up only those data segments that have changed since the previous backup. The exception to this is that full deduplication backups always include a complete backup of the index.
If the deduplication node for an existing deduplication client is changed or if another type of client is upgraded to a deduplication client, a new full backup of the client data must be performed, regardless whether the most recent backup performed was a full backup. The initial full backup of a deduplication client takes longer than a regular backup of the same client data due to the initial overhead involved in deduplicating the data. All subsequent deduplication backups benefit from the fact that now only the data segments (not files) that have changed since the previous backup will be backed up. However, the choice of subsequent backup levels, depends on what is more important to the user: backup performance or recovery performance. Deduplication clients should use backup schedules that support that priority. Deduplication backups must be scheduled to avoid the deduplication node's read-only periods. The Avamar server documentation provides more information regarding the read-only periods and backup level strategies.
Initial full backup followed by daily incremental backups For faster backups and longer recoveries: ◆
This schedule benefits an environment in which the speed of the backup is most important.
◆
The daily incremental (Level 1) deduplication backups will take significantly less time than daily regular incremental backups and even less time than daily full deduplication backups.
Deduplication backup requirements for NetWorker server
93
Data Deduplication with Avamar
◆
After 1 week of backups, this schedule results in slightly longer recovery times, due to the latency involved in restoring seven backup images (the initial full backup, followed by applying each incremental backup to the full backup).
Initial full backup followed by daily full backups For longer backups and faster recoveries: ◆
This schedule benefits an environment in which the speed of data recovery is most important.
◆
After the initial full backup, daily full deduplication backups take only slightly longer than regular daily incremental backups.
◆
After 1 week of backups, this schedule results in much shorter recovery times, since only a single backup image must be recovered.
Retention policies If a volume contains one or more deduplication save sets, the resource for the deduplication node that was used to create the backup must exist when the save sets pass their retention policy. If the resource for the deduplication node has been deleted, the volume cannot be made recyclable or relabeled. When deduplication save sets pass their retention time, the NetWorker server will begin the process of deleting the deduplicated data from the deduplication node. Therefore, deduplication data may not be recoverable by using the scanner program after the deduplication save set has passed its retention time. The NetWorker Administration Guide provides more information about retention policies, and the save set recover and scanner programs.
Backup configuration notes The following notes are described in more detail in the NetWorker Administration Guide: ◆
Do not place both regular and deduplication clients in the same groups.
◆
Ensure that all deduplication clients in the same group have the same deduplication node setting.
◆
Directives cannot be applied if deduplication is used for a client.
◆
Media pools do not apply when deduplication is used.
◆
The cloning of deduplication backups is handled differently from that of regular backups. Only the metadata is stored on a NetWorker storage node, while the backed up data is stored on a deduplication node.
An alternate method is available to handle tape backups of the deduplication client data: 1. Create a second instance of the client to be backed up.
Do not configure the second instance as a deduplication client.
94
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
2. If you are using multiple backup schedules, ensure that the backup level is set to full for all groups. This is required because the backup level and the last backup time are calculated by using both the group name and save set name, and the groups would interfere with each other.
Configuring a client resource for deduplication backup Contact EMC Customer Support to configure the deduplication nodes on the Avamar server side. Once that has been done, you can create access to them from the NetWorker side. The NetWorker Avamar Integration Guide provides information on how to create a NetWorker deduplication node. After the Avamar server and NetWorker server have been configured for deduplication, configure a client resource to use deduplication during backup, by using the NetWorker Management Console program. When NMM is installed, it automatically includes support for deduplication. You do not need to install anything extra on the NMM client or the NetWorker server. Configure a client resource with the application-specific settings for the Microsoft application that you want to back up. Enable the deduplication attribute during the configuration process. You can create a new client resource or edit an existing client resource to configure deduplication for any scenario listed in “Supported and unsupported applications, features, and configurations” on page 87. There are special considerations for the following scenarios: ◆
An Exchange client running on a passive node in a CCR environment.
◆
An Exchange 2010 client running DAG.
The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details. When configuring a client resource, review these considerations: ◆
Ensure that the deduplication client has been assigned to a group that contains only deduplication clients.
◆
Do not mix regular and deduplication clients within a group. “Configure a backup group” on page 72 provides information about creating backup groups.
◆
A recommended backup schedule for deduplication clients depends on whether your priority is faster backups or faster, less complicated recoveries: • “Configure a backup schedule” on page 72 provides general information about setting backup schedules. • “Backup levels and schedules for deduplication clients” on page 93 provides backup level and schedule information that is specific to deduplication clients.
To configure a deduplication scheduled backup for any client resource by using Avamar: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, select Clients to view all the clients that have been already created. Configuring a client resource for deduplication backup
95
Data Deduplication with Avamar
The Clients table with a list of clients appears. 3. You can create a new client resource or edit an exiting one: • To add a new client resource: a. Right-click Clients in the navigation tree or right-click any client in the Clients table. b. Select New. • To edit an existing client resource: a. Right-click the client in the Clients table. b. Select Properties. The Client Properties window appears, as shown in Figure 19 on page 96.
Figure 19 General tab in NMC
4. In the General tab, complete the attributes: a. In the Name attribute, type the Fully Qualified Domain Name (FQDN) of the client: – The client must be a fully qualified host to be a NetWorker deduplication client – The host must run an operating system that supports deduplication. b. In the Comment attribute, type a description. c. For the Browse Policy attribute, select a browse policy from the list. The browse policy determines the time period during which the rolled-over data is available for quick access.
96
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
d. For the Retention Policy attribute, select a retention policy from the list. The retention policy determines the time period during which the rolled-over data is available, although not necessarily quickly. e. Select the Scheduled Backups attribute. f. In the Save Set attribute, specify the save set name for the specific application that is being backed up. 5. Click the Apps & Modules tab, as shown in Figure 20 on page 97:
Figure 20 Apps & Modules tab with Deduplication attribute
a. In the Access area, leave the following fields empty: – Remote user – Password b. In the Backup command attribute, type the backup command: nsrsnap_vss_save.exe c. In the Application Information field, specify the application variable settings for the specific application that is being backed up. d. In the Deduplication area: – Select the Avamar deduplication backup attribute to enable this client for deduplication backups. – From the Avamar Deduplication node menu, select the name of the deduplication node to which this client’s backup data will be sent. This is the deduplication node created in “Configure the Avamar and the NetWorker server” on page 91. All clients in a group must have the same deduplication node value. Do not select the name of a replication node here. This step links this client with its own deduplication node. Also, if the deduplication node for this client’s backup data changes, the next backup done must be a level 0 (full) backup.
Configuring a client resource for deduplication backup
97
Data Deduplication with Avamar
6. Click the Globals (1 of 2) tab, as shown in Figure 21 on page 98:
Figure 21 Globals (1 of 2) tab
a. By default, NMM uses client parallelism set to 4 for all deduplication clients. Because deduplication backups require more CPU and memory resources on the host where the backup is performed, it might be necessary to reduce the client parallelism for configurations with either a large number of save sets, or a large number of volumes. b. Complete the remaining configuration information, for the specific application that is being backed up. 7. Click OK.
Querying deduplication save sets by using mminfo You can use the mminfo command to query information about save sets created when using deduplication. To limit the output of mminfo command to only those save sets created when using deduplication, use the -q dedupe option. For example, to query deduplication save sets for the local host, use the following command: mminfo -S -q dedupe The mminfo -S -q dedupe command does not list the following information: ◆
Empty save sets
◆
Save sets in which nothing was backed up as the result of a skip schedule
These save sets are treated as regular save sets, not as deduplicated save sets.
Recovering deduplicated data The process of recovering data from a deduplication node is the same as that for recovering from a storage node. However, there is an underlying difference in where the information is kept. Only the metadata, which is hash information, is stored (or cloned or staged) on a NetWorker storage node. The backed up data from a deduplication client is stored on a deduplication node that is an Avamar server. Both the deduplication node and the volume on the recovered side must be online during the recovery of deduplicated data.
98
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Avamar
Under some conditions, if recovery from the primary deduplication node fails, autorecovery uses a replication node. The NetWorker Administration Guide provides detailed information about recovery from a replication node.
Deleting deduplication save sets The process for deleting deduplication save sets is performed on the NetWorker and Avamar servers, and is described in the NetWorker Administration Guide.
Deleting deduplication save sets
99
Data Deduplication with Avamar
100
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 6 Data Deduplication with Data Domain This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆ ◆
Software requirements.......................................................................................... 102 Utilizing the Data Domain Boost data deduplication capabilities ........................... 102 Supported operating systems, applications, and streams types ............................ 104 Configuration considerations for NMM .................................................................. 106 Configuring a client resource for client-side Data Domain Boost deduplication backups 106 Recovering deduplicated data ............................................................................... 109 Related documentation about Data Domain and NetWorker server ........................ 109
Data Deduplication with Data Domain
101
Data Deduplication with Data Domain
Software requirements For NMM to leverage the NetWorker Data Domain integration support, the following software are required: ◆
NetWorker Server 7.6 SP2 or later
◆
NetWorker storage node 7.6 SP2 or later
◆
NetWorker client 7.6 SP2 or later
◆
Data Domain Appliance with Data Domain OS version supported by NetWorker client installed on NMM 2.4 host
◆
Data Domain OS 4.8 or later for DD Boost functionality
Utilizing the Data Domain Boost data deduplication capabilities “The benefits of using data deduplication” on page 86 provides details about the benefits of using data deduplication. As the data deduplication process in NetWorker Module for Microsoft Applications (NMM) requires Data Domain and NetWorker integration and configuration, you must review the documentation listed in “Related documentation about Data Domain and NetWorker server” on page 109 for details about Data Domain and NetWorker integration and configuration. The NetWorker integration with Data Domain Boost logical storage devices on Data Domain systems enables backup data to be deduplicated on a NetWorker storage node before it is sent for storage on a Data Domain system. This feature dramatically reduces the amount of data that is sent and stored on the Data Domain system and reduces the bandwidth used by the storage process. The DD Boost software enables multiple concurrent storage and recovery operations, unlike conventional virtual tape library (VTL), and CIFS or NFS AFTD interfaces on Data Domain systems. DD Boost software consists of the following two components: ◆
The DD Boost library API enables the NetWorker software to communicate with the Data Domain system.
◆
The distributed segment processing (DSP) feature enables data deduplication to be performed on a NetWorker storage node or other supported host before the data is sent to the Data Domain system for storage.
Deduplicated data backups are stored on special NetWorker Data Domain (DD Boost) storage devices on the Data Domain system that are accessed by the NetWorker storage nodes and server.
Support for client-side deduplication backup and recovery For some types of data, NetWorker Data Domain devices support direct file access (DFA), which enables client-side deduplication backup and recovery.
102
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Data Domain
This DFA deduplication method has the following advantages: ◆
The client will directly write to a Data Domain device, ruling out the need for a dedicated storage node configuration.
◆
Deduplication on the client host reduces the bandwidth for the data transfer.
DFA deduplication enables a NetWorker Data Domain device to be shared among multiple hosts. Multiple sessions on a device improves performance without the need to create multiple devices, which can impair performance. NMM does not support multi-stream DFA-based backups for SQL Server VDI backup and recovery. SQL Server VDI backup and recovery should be performed using the non-DFA method, which uses the traditional storage node and supports both single and multi-stream based backup. Figure 22 on page 103 shows an example environment where DFA with DSP is used to send deduplicated backup data directly to a NetWorker Data Domain device. The same device can also be used by non-DFA clients that use the storage node for deduplication backup.
Figure 22 Client direct file access deduplication environment
Backup support The DFA feature enables supported NetWorker clients to deduplicate their backup data locally and store it directly on a NetWorker Data Domain device, thereby bypassing the NetWorker storage node and reducing network bandwidth usage. Because multiple clients with DFA backup support can share a device by using multiple sessions, DFA can reduce the number of devices used, thereby reducing the impact on the Data Domain system performance and maintenance.
Recovery support If a supported DFA client has access to its NetWorker Data Domain storage device, it will recover data directly from the device, regardless of whether DFA was used for the backup. Because DFA bypasses the storage node, performance is improved. If the DFA client
Utilizing the Data Domain Boost data deduplication capabilities
103
Data Deduplication with Data Domain
cannot access the data, then the recovery process reverts to the traditional method that uses the storage node. The Data Domain system converts the stored data to its original non-deduplicated state for the recovery.
Supported operating systems, applications, and streams types This section contains the following information: ◆
“Supported operating systems” on page 104
◆
“Supported Microsoft applications” on page 104
◆
“Supported applications for single and multi streams when using Data Domain” on page 105
The NetWorker Software Compatibility Guide contains additional and the most up-to-date information about NMM compatibility.
Supported operating systems The supported operating systems are as follows: ◆
Windows 2008 SP2 (x86, x64)
◆
Windows 2008 R2 (x64)
Supported Microsoft applications Client-side Domain Boost deduplication support is available for the following applications: For VSS backup and recovery: • Exchange Server 2010 (x64) • Exchange Server 2007 (x64) SP3 Rollup 1 • Exchange 2007 SP3 Rollup 5 • SharePoint Server 2010 SP1 (x64) • SharePoint Server 2007 RTM, SP1, SP2, SP3 (x64, x86) • Hyper-V • SQL Server 2012 (x64) • SQL Server 2008 R2 (x64, x86) • SQL Server 2008 SP1 (x64, x86) • SQL Server 2008 (x64, x86) • SQL Server 2005 (x64, x86) ◆
For VDI backup and recovery: • SQL Server 2012 (x64)
104
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Data Domain
• SQL Server 2008 R2 (x64, x86) • SQL Server 2008 SP1 (x64, x86) • SQL Server 2008 (x64, x86) • SQL Server 2005 (x64, x86)
Client-side Domain Boost deduplication support is not available for Active Directory and DPM Server.
Supported applications for single and multi streams when using Data Domain “Related documentation about Data Domain and NetWorker server” on page 109 lists the documentation that provides details about single and multi streams when using Data Domain. Table 27 on page 106 lists the Microsoft applications for which single and multi stream support is available when using Data Domain. Table 26 Single and multi streams support to and from Data Domain To Data Domain
From Data Domain
Microsoft Applications
SIngle stream
Multi stream
SIngle stream
Multi stream
Exchange Server 2010 (x64)
✔
✔
✔
X
SharePoint Server 2010
✔
✔
✔
X
SharePoint Server 2007 SP2
✔
✔
✔
X
SQL Server 2012 (x64) (VDI)
✔
✔*
✔
X
SQL Server 2008 R2 (x64, x86) (VDI)
✔
✔*
✔
X
SQL Server 2008 SP1 (x64, x86) (VDI)
✔
✔*
✔
X
SQL Server 2008 (x64, x86) (VDI)
✔
✔*
✔
X
SQL Server 2005 (x64, x86) (VDI)
✔
✔*
✔
X
SQL Server 2012 (x64) (VSS)
✔
✔
✔
X
SQL Server 2008 R2 (x64, x86) (VSS) ✔
✔
✔
X
SQL Server 2008 SP1 (x64, x86) (VSS)
✔
✔
✔
X
SQL Server 2008 (x64, x86) (VSS)
✔
✔
✔
X
SQL Server 2005 (x64, x86) (VSS)
✔
✔
✔
X
Hyper-V
✔
✔
✔
X
* SQL Server VDI support for multi stream is only available when using Dedicated Storage Nodes (DSN).
Supported operating systems, applications, and streams types
105
Data Deduplication with Data Domain
Configuration considerations for NMM Configuration, monitoring, and reporting of backup and restore operations on NetWorker Data Domain devices is provided by the NetWorker Management Console (NMC) portal. The NMC server is accessible from any supported remote Internet browser. The Client Configuration Wizard simplifies the configuration of storage devices, backup clients, storage (target) pools, volume labeling, and save set cloning. Table 27 on page 106 provides the configuration details for Data Domain and NetWorker. Table 27 Configuration details for Data Domain and NetWorker Feature
Consideration
Optimized cloning
No special procedures or considerations are required for Data Domain optimized cloning by NMM 2.4. The NetWorker Administration Guide and the NetWorker Data Domain Deduplication Devices Integration Guide provide details.
Data Domain storage node
No special procedures or considerations are required for Data Domain storage node by NMM version 2.4. The NetWorker Administration Guide and the NetWorker Data Domain Deduplication Devices Integration Guide provide details.
Client-side IO optimization (Data Domain Boost)
“Configuring a client resource for client-side Data Domain Boost deduplication backups” on page 106 provides more information.
Configuring a client resource for client-side Data Domain Boost deduplication backups When NMM is installed, it automatically includes support for deduplication. You do not need to install anything extra on the NMM client. For Data Domain Boost backup, ensure that the device used is a Data Domain Boost device and that the appropriate enabler has been applied. After configuring a Data Domain-based storage node and device as described in the NetWorker Data Domain Deduplication Devices Integration Guide, configure a NetWorker deduplication client. After the Data Domain server and NetWorker server have been configured for deduplication, configure a client resource to use deduplication. A storage node, configured with at least one Data Domain Boost device, must exist for client-side IO optimization to be possible. To configure a deduplication scheduled backup for any client resource by using Data Domain: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, select Clients to view all the clients that have been already created. The Clients table with a list of clients displays.
106
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Data Domain
3. You can create a new client resource or edit an exiting one: • To add a new client resource: a. Right-click Clients in the navigation tree or right-click any client in the Clients table. b. Select New. • To edit an existing client resource: a. Right-click the client in the Clients table. b. Select Properties. The Client Properties window appears, as shown in Figure 23 on page 107.
Figure 23 General tab in NMC
4. In the General tab, complete the attributes: a. In the Name attribute, type the Fully Qualified Domain Name (FQDN) of the client: – The client must be a fully qualified host to be a NetWorker deduplication client – The host must run an operating system that supports deduplication. b. In the Comment attribute, type a description. c. For the Browse Policy attribute, select a browse policy from the list. The browse policy determines the time period during which the rolled-over data is available for quick access.
Configuring a client resource for client-side Data Domain Boost deduplication backups
107
Data Deduplication with Data Domain
d. For the Retention Policy attribute, select a retention policy from the list. The retention policy determines the time period during which the rolled-over data is available, although not necessarily quickly. e. Select the Scheduled Backups attribute. A recommended backup schedule for deduplication clients depends on whether your priority is faster backups or faster, less complicated recoveries. “Configure a backup schedule” on page 72 provides general information about setting backup schedules. “Backup levels and schedules for deduplication clients” on page 93 provides backup level and schedule information that is specific to deduplication clients. f. Select the Client direct option. Note: The client direct functionality is only available when using a Data Domain device, and is not available for other devices. g. In the Save Set attribute, specify the save set name for the specific application that is being backed up. • In the Group attribute, select the group for the client resource: – Ensure that the deduplication client has been assigned to a group that contains only deduplication clients. – Do not mix regular and deduplication clients within a group. “Configure a backup group” on page 72 provides information about creating backup groups. 5. Click the Apps & Modules tab, as shown in Figure 24 on page 108:
Figure 24 Apps & Modules tab with Deduplication attribute
a. In the Access area, leave the Remote user and Password fields empty. b. In the Backup command attribute, type the backup command: nsrsnap_vss_save.exe
108
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Data Deduplication with Data Domain
c. In the Application Information field, add parameters required for the particular application. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details for each application. d. In the Deduplication area, select the Data Domain Backup option. 6. Click Globals (2 of 2) tab of the client configuration. 7. Provide the remote storage node name where the Data Domain device is configured. This should be the first or only entry. During backup, the NMM 2.4 client: • Contacts this storage node to obtain the DD device credentials. • Establishes connection by using these credentials. • Sends data directly to the DD system. 8. Complete the remaining configuration information as for any normal client. 9. To verify if a backup is successful, use the following command: mminfo -avot -s server_name -c client_name
where: • server_name is the name of the NetWorker server • client_name is the name of NMM client
Recovering deduplicated data The process for recovering data from a Data Domain deduplication system is basically the same as that for recovering from a traditional storage node. The backed up data from a client is stored in a deduplicated state on the Data Domain device. Both the storage node and the Data Domain system must be online during the recovery of deduplicated data. The above is also valid for data that has been backed up using the client side IO feature.
Related documentation about Data Domain and NetWorker server The latest documentation for the Data Domain server and NetWorker server setup and configuration is available for download at http://support.emc.com. ◆
NetWorker Data Domain Deduplication Devices Integration Guide
◆
NetWorker Administration Guide
Documentation related to the use of Data Domain systems can be found at the Data Domain Support Portal (support account required), https://my.datadomain.com/, including: ◆
Data Domain Software Release Notes
◆
Data Domain Administration Guide
◆
Data Domain Command Reference
◆
Data Domain CLI Guide
Recovering deduplicated data
109
Data Deduplication with Data Domain
110
◆
Data Domain System Hardware Guide
◆
Installation and Setup Guide for each Data Domain system
◆
Data Domain Initial Configuration Guide
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 7 Microsoft Windows System Backup and Recovery This chapter includes the following topics: ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆
Supported Windows systems ................................................................................ Configuring system scheduled backups................................................................. Performing a recovery ........................................................................................... Recovery options .................................................................................................. Recovering file system snapshots that have not been rolled over........................... Booting the NMM host in Directory Service Restore mode...................................... Authoritative recovery of NTDS or FRS data ............................................................ Recovering the Windows system configuration to an earlier state .......................... Restoring BOOT/BCD data in Windows 2008 R2 .................................................... Windows print queues backup and recovery.......................................................... Windows DFS-R granular backup and recovery....................................................... Pre and post command support ............................................................................ Recovering client file index and the media database .............................................
Microsoft Windows System Backup and Recovery
112 112 115 118 130 131 132 134 135 135 135 136 137
111
Microsoft Windows System Backup and Recovery
Supported Windows systems NMM supports backup and recovery of the following: ◆
Active Directory
◆
Windows Clusters
◆
Windows Server 2008
◆
Windows Server 2008 R2 • Enterprise Edition (x64) • Datacenter Edition (x64) • Standard Edition (x64) • Web Edition (x64) Note: NMM 2.4 does not provide support for Windows Server 2008 R2 Foundation Edition.
Configuring system scheduled backups To perform a system scheduled backup, complete the tasks outlined in Table 28 on page 112. Table 28 Tasks for scheduling a backup for VSS writers Backup task
Consideration
“Task 1: Configure a backup pool” on page 66
No additional configuration is required.
“Task 2: Configure snapshot policies” on page 68 • To back up SYSTEM COMPONENTS:\ the snapshot policy must specify All. • NMM enforces this policy to ensure that a permanent backup of the snapshot exists. • Attempting to restore system components from a persistent snapshot might invalidate the snapshot and leave the system in an unrecoverable state. “Task 3: Configure a backup schedule” on page 72
No additional configuration is required.
“Task 4: Configure a backup group” on page 72
No additional configuration is required.
“ Task 5: Configure a system client resource” on page 112
This task is specific to configuring a client resource for Windows system backup.
Task 5: Configure a system client resource To configure a system client resource: 1. In the Administration page of the NetWorker Management Console, click Configuration. 2. In the expanded left pane, select Clients. 3. From the File menu, select New.
112
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
4. In the General tab, complete the following attributes: a. In the Name attribute, type the host name of the NetWorker client computer. b. In the Comment attribute: a. Type a description. b. If you are creating multiple client resources for the same NetWorker client host computer, use this attribute to differentiate the purpose of each resource. c. From the Browse Policy attribute, select a browse policy from the list. The browse policy determines how long rolled-over data is available for browsing. d. From the Retention Policy attribute, select a retention policy from the list. The retention policy determines how long rolled-over data is available though not necessarily quickly. e. Select the Scheduled Backups attribute. f. In the Save Set attribute, specify the save sets listed in Table 29 on page 113. Place multiple entries on separate lines. Table 29 Save set for Windows backup Save set
Details
Examples
All
To specify all volume data and all available Windows system components.
Application data such as Exchange, SQL, or DPM data is not included in the save set All. Backup of save set 'All' is not supported on hosts that have hardware LUNs on them because the backup includes both software and hardware snapshots that are taken during the same backup.
Volume
A volume save set can be a drive letter, path, or mount point.
• To specify the volume E and all of its subfolders and files. E:\ Entries are not case-sensitive. • If you have a mount point named CAD_Drawings on volume E:\ and you want to back up all of the data on E:\ including the data under the mount point, type the following on separate lines: E:\ E:\CAD_Drawings The save set All will include mount point data only if no other path to the remote data is found during backup.
Note: When a volume that contains writer files for an application or the SYSTEM STATE is backed up, the files that belong to the writers are skipped during the backup.
SYSTEM COMPONENTS:\
The SYSTEM COMPONENTS:\ save set contains many individual system writers. The individual system writers cannot be specified in a backup save set and they are all backed up in the SYSTEM COMPONENTS:\save set. Table 7 on page 28 provides the list of writers under Windows SYSTEM COMPONENTS.
Ensure that the backward slash (\) character is entered with the save set name SYSTEM COMPONENTS:\. Otherwise, the backup fails and no concise error message is provided.
Configuring system scheduled backups
113
Microsoft Windows System Backup and Recovery
To protect against a disaster, ensure that all volumes and Windows system components are backed up. Backup of SYSTEM COMPONENTS or save set All are required to have a snapshot policy of All. This ensures that SYSTEM COMPONENTS data is rolled over. The snapshot policy for volumes, while not required to be rolled over, should also specify a value of 'First', 'Last', or 'All' in the Backup Snapshots field. Online disaster Recovery can only be performed from a conventional backup. Do not specify None in the Backup Snapshots field. g. For the Group attribute, select the backup group to which this client resource will be added.
If client resources for the same NMM client host are added to different backup groups, ensure that the Start Time attribute for each backup group is set far enough apart so that the backups for the host’s client resources do not overlap. h. For the Schedule attribute, select a backup schedule. 5. Click the Apps & Modules tab: a. In the Access area, leave the Remote user and Password fields empty. b. In the Backup command attribute, type the following backup command for all types of backup data except for Active Directory conventional backups: nsrsnap_vss_save.exe
c. In the Application information attribute, type the following variable and value: NSR_SNAP_TYPE=vss
If hardware LUNs are configured in the NMM client machine, while performing system components backup, set the following: NSR_VSS_FORCE_SYSTEM_PROVIDER=yes
Note: An NMM backup fails in standalone data mover setups, when both the NSR_VSS_FORCE_SYSTEM_PROVIDER=yes and NSR_DATA_MOVER=clientname.domain.com parameters are used in the Application Information field of the client resource. 6. Click the Globals (2 of 2) tab: a. If a storage node is configured for the backup of SYSTEM COMPONENTS, specify the name of the following in the Storage nodes field: – Dedicated Storage Node (DSN) or – Remote Storage Node (RSN) 7. Click OK.
114
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
Performing a recovery This section provides information on the following: ◆
“Recovery considerations” on page 115
◆
“System recovery in Windows Server 2008” on page 116
◆
“System Recovery Options summary” on page 117
Recovery considerations Review the following options and considerations before performing the procedures in these sections: ◆
“Recovering file system snapshots that have not been rolled over” on page 130 provides more information about recovering data from a persistent snapshot that has not been rolled over to a conventional backup medium.
Attempting to restore system components from a persistent snapshot may invalidate the snapshot and leave the system in an unrecoverable state. NMM does not prevent an attempt to restore SYSTEM COMPONENTS from a point-in-time backup. “Roll over a snapshot” on page 31 describes how to rollover a snapshot. ◆
To recover backup data that was password-protected and encrypted with another VSS client program, and not NetWorker VSS Client for Microsoft Windows 1.0 or NMM, use the recover.exe command from the command line interface (CLI). The NetWorker Command Reference Guide provides more information about the recover.exe command.
◆
Data that was backed up from a mount point is available for browsing at the root of the navigation tree. For example, if the drive H:\ has a mount point named H:\CAD_Drawings, then a separate entry for the mount point H:\CAD_Drawings will be available at the root of the navigation tree instead of as a subfolder under H:\.
◆
To recover data to a mount point that has been deleted, manually re-create the mount point before recovering the data. Otherwise, the data will be recovered to a local directory whose name corresponds to the deleted mount point.
◆
If the disk that is referenced by the mount point has been replaced, manually re-create the mount point.
◆
If a file was not backed up due to a skip directive, you may still be able to select the file for a recovery operation. In this case, although you can select the file, it is not recoverable.
If you are recovering FRS or Windows NT Directory Services (NTDS) data, boot the NetWorker client in Directory Service Restore mode (DSRM) before completing the recovery options in this section. “Booting the NMM host in Directory Service Restore mode” on page 131 provides more information about these recovery options.
Performing a recovery
115
Microsoft Windows System Backup and Recovery
System recovery in Windows Server 2008 When recovering an older backup of the system in Windows Server 2008, any application or NMM upgrades, service packs, or hot fixes that were installed since the backup may need to be reinstalled after the recovery. “Recovering system data” on page 116 describes using the System Recover Session commands and features for recovery. Some applications have their own name for the System Recover Session. When you select Recover from the NMM client GUI, it may display one or more of the following in addition to System Recover Session, depending on which of the applications are installed on the client: ◆
Active Directory Recover Session
◆
DPM Recover Session
◆
Exchange Recover Session
◆
Hyper-V Recover Session
◆
SharePoint Recover Session
◆
SQL Recover Session
Application-specific recovery steps are provided in separate chapters for the applications. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides details.
Recovering system data The System Recover Session window in the NMM Client GUI displays the backups that are available for recovery, and provides browsing and searching to locate and select items for recovery. To recover system data: 1. Open the NMM client software and select the NetWorker server on which the NMM client software was configured for backup. 2. If the NMM client is part of a cluster: a. Select the virtual client to which you are recovering data. b. Select the Client list attribute in the application toolbar. 3. From the left pane, select Recover > System Recover Session. 4. In the navigation tree, select the items to be recovered. By default, items displayed in the navigation tree are from the most recent backup. • For the System Recover Session view, both snapshot and rollovers can be displayed in the same view: – If the most recent backup for an item is a snapshot, the snapshot appears. – If the most recent backup for an item is a rollover, the rollover appears. • To recover file system items from a previous backup: a. From the application toolbar, click the Browse calendar icon.
116
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
b. Select an earlier browse time. • To view versions of a backup item prior to the browse time: a. Right-click an item in the navigation tree. b. Select Versions from the pop-up menu. 5. To determine whether any volumes need to be mounted for a selected item: a. Right-click the item. b. Select Required Volumes from the pop-up menu. 6. To determine the version of the System Components: a. Highlight the individual writer. b. Right-click the writer contents in the navigation pane. 7. From the Options menu, select System Recover Session Options: • “NetWorker recovery options” on page 119 • “Cluster recovery options” on page 120 • “ADAM recovery options” on page 123 • “DFS recovery options” on page 124 • “FRS recovery options” on page 126 • “NTDS recovery options” on page 128 • “Security recovery options” on page 129 8. Type the application-specific recover options or settings. The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides detailed information. 9. From the System Recover Session toolbar: a. Click the Recover tab. b. Select the relevant data for restore from NMM GUI. c. Click Start Recover. 10. From the left pane, select Monitor to view messages related to the progress of the recovery operation. If you recovered items from a snapshot (instant recovery), the snapshot volume will be temporarily mounted during the recovery operation. The mounted volume is displayed in the Windows Explorer program. After the recovery is complete, you may have to refresh the Windows Explorer to update its view. From the Start menu, select Programs > Accessories > Windows Explorer.
System Recovery Options summary The System Recover Sessions Options window lists the System Recover and NetWorker Recover Options. This allows you to review the settings before starting the recovery. “Performing a recovery” on page 115 provides more information. Performing a recovery
117
Microsoft Windows System Backup and Recovery
You can perform the following tasks: ◆
To change the NetWorker and System Recover Options: a. Open the NMM Client GUI. b. Click Recover Options.
◆
To access the settings from the System Recover Session view: a. Select System Recover Session from the toolbar. b. Click Recover Options.
◆
To view the System Recover Sessions Options settings, see the following tabs: • General • NetWorker • Security
◆
To validate the options: a. Click Start Recover. b. If all option settings are valid, the dialog box closes and recovery starts.
Recovery options This section describes the following recovery options: ◆
“General recovery options” on page 118
◆
“NetWorker recovery options” on page 119
◆
“Cluster recovery options” on page 120
◆
“ADAM recovery options” on page 123
◆
“DFS recovery options” on page 124
◆
“FRS recovery options” on page 126
◆
“NTDS recovery options” on page 128
◆
“Security recovery options” on page 129
Note: The NetWorker Module for Microsoft Applications Release 2.4 Application Guide includes information on the Microsoft Exchange recovery options.
General recovery options The General tab specifies how much diagnostic information is output for a recovery operation. For most recoveries, the diagnostic information is displayed in the Monitor view. To set the level of diagnostic information for a recovery: 1. In the System Recover Session Options dialog box, click the General tab.
118
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
2. From the Diagnostic Output Level attribute, select a level from normal to 9: • A value of 1 produces the least amount of diagnostic information. • A value of 9 produces the most diagnostic information. • The value Normal produces no diagnostic information. 3. Click OK. Note: After each recovery, the Diagnostic Level attribute is automatically set to Normal.
NetWorker recovery options The NetWorker tab is displayed in System Recover Session Options and Hyper-V Recover Session Options. Note: Some of the following features are not applicable to Hyper-V Recover Session Options. To specify recovery options for file system data: 1. From the Options menu, select System Recover Session Options. 2. Click the NetWorker tab. 3. In the Relocate recovered data field, type a location other than the location from which the data was originally backed up: • This feature is only applicable to System Recover Session Options. • The location must be a local path. • UNC syntax such as the following is not supported: \\servername\share 4. Use the Restore Type field to determine the default recovery method: • Select Conventional Restore to recover from a conventional backup medium. If a conventional backup is not available for the selected browse time, an snapshot restore is performed. • Select Snapshot Restore to recover from a snapshot. If a snapshot is not available for the selected browse time, a conventional restore is performed: – For snapshot restore, snapshot validation will occur prior to the restore. – If the snapshot is invalid, the restore will fail. The invalid snapshot will be deleted automatically the next time the snapshot group runs. – You can also delete a snapshot manually. “Deleting a snapshot” on page 45 provides more information about manually deleting snapshots.
Recovery options
119
Microsoft Windows System Backup and Recovery
5. Select Use Microsoft best practices for selecting the system state to enforce Microsoft recommendations that determine which system state items must be selected as a group for recovery: • This feature is only applicable to System State Restore. • Clear this attribute to select system state items individually.
Do not clear the “Use Microsoft best practices for selecting the system state” box except where specifically instructed to do otherwise in this document. For instance, there are some procedures, such as recovering DFS data, where you can clear this attribute. Microsoft does not support recovery of portions of the operating system. Attempted recovery of portions of the operating system, with this box cleared, may render the system unbootable. After each recovery operation, this option is automatically selected. 6. For Directory Services Restore Mode (DSRM), to recover the Bootable System State in a domain controller setup, ensure that the following checkbox is unchecked: Microsoft Best Practices
7. Select Terminate recover of item if errors are encountered if it is not already selected: • This option is selected by default. • If this option is selected, then when an error occurs only the recovery of the specific item causing the error is halted. For example, during the recovery of the items C:\test and APPLICATIONS:\SqlServerWriter, an error occurs during recovery of a single file in the C:\test folder: • If the option is selected, the rest of the recovery of C:\test is terminated, but NMM still attempts to recover APPLICATIONS:\SqlServerWriter\. • If option is cleared and there is a recovery error with a file in C:\test, NMM still attempts to recover the rest of C:\test and APPLICATIONS:\SqlServerWriter. 8. Clear this option if file system recovery fails, and you encounter the error message: Files failed to be restored for File system marked objects.
When this error occurs, open the EMC PowerSnap™ client log file and note which files caused the error. 9. Click OK.
Cluster recovery options Use the Cluster Recovery tab to specify whether to perform an authoritative or nonauthoritative restore of the Cluster Writer. Chapter 8, “Microsoft Windows Cluster Backup and Recovery,” provides details.
Cluster Writer nonauthoritative restore (default) Use this mode if the cluster is completely lost, in which case the cluster service does not run on either node, and the cluster database is missing or corrupted.
120
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
Nonauthoritative restores will restore the cluster but will not restore a particular version of the database, for example a file server, SQL, Exchange. After the nonauthoritative restore is complete: 1. Perform an authoritative restore to recover a specific version of the database. 2. Select the following save set to restore the registry: SYSTEM COMPONENTS:\BootableSystemState
This restores the Registry that contains entries for the following: • Cluster node • Cluster database • Quorum that exists only on active cluster node Note: The NMM software performs an nonauthoritative restore by default.
Specify a nonauthoritative restore To specify a nonauthoritative restore for the Windows Server 2008, and Windows Server 2008 R2 Cluster Writer: 1. From the Options menu, select System Recover Session Options. 2. Click the NetWorker tab. 3. Clear the Use Microsoft best practices for selecting system state option. 4. Click OK to close the System Recover Session Options dialog box. 5. In the navigation tree: a. Expand the SYSTEM COMPONENTS folder. b. Select Cluster Database. 6. Select the following save set to restore the registry that contains the entries for the relevant cluster nodes and quorum: SYSTEM COMPONENTS:\BootableSystemState
Note: The registry entry for the quorum exists only in active cluster node. 7. From the System Recover Session toolbar: a. Click Recover. b. Click Restore. 8. Restart the system when prompted. 9. On the other nodes if required, repeat step 1 to step 8 .
Cluster Writer authoritative restore Use this mode when the cluster configuration is lost, but the cluster is running okay otherwise. For example, when a cluster resource was accidentally deleted or you want to revert to a previous cluster configuration. The cluster must be healthy in all nodes. For example, the cluster services should be running in all the cluster nodes. Recovery options
121
Microsoft Windows System Backup and Recovery
Note: Authoritative restores of the Cluster Writer are only supported for Windows Server 2008 and Windows Server 2008 R2.
Specify an authoritative restore To specify an authoritative restore for the Windows Server 2008 and Windows Server 2008 R2 Cluster Writer: 1. Ensure that the cluster service is running on the local system. 2. Ensure that the cluster service is running on all remote nodes. Microsoft Windows Server 2008 product documentation provides more information on running the cluster service. 3. From the Options menu, select System Recover Session Options. 4. Click the NetWorker tab. 5. Clear the Use Microsoft best practices for selecting system state option. 6. Click the Cluster tab. 7. Select the Authoritative Restore options. 8. Click OK to close the System Recover Session Options dialog box. 9. In the navigation tree: a. Expand the SYSTEM COMPONENTS folder. b. Select Cluster Database. 10. From the System Recover Session toolbar, click Start Restore.
Perform an authoritative restore Perform an authoritative restore of the Windows 2008 and Windows Server 2008 R2 Cluster Writer: 1. In the recover session, select only the following: • Windows 2008 Cluster Writer • Windows Server 2008 R2 Cluster Writer 2. Do not perform an authoritative restore of the following simultaneously as the restore of any other NMM application: • Windows 2008 Cluster Writer • Windows Server 2008 R2 Cluster Writer Note: Authoritative restores of the Windows 2008 and Windows Server 2008 R2 Cluster Writer will restart the cluster service on all nodes in the cluster.
122
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
ADAM recovery options Use the ADAM tab in the System Recover Session Options dialog box to specify whether to perform an authoritative or nonauthoritative restore of ADAM data on this host.
ADAM nonauthoritative restore (default) This type of restore is typically performed when the host is being recovered due to catastrophic loss of data such as a disk failure. The most recent ADAM data is restored from backups and then the recovered host is updated with the most recent ADAM data from another ADAM Server in the domain. This restore relies on at least one other ADAM Server in the domain to have accurate and up-to-date ADAM data.
ADAM authoritative restore Perform an authoritative restore only when corrupted or deleted ADAM data has been propagated to other ADAM Server. This type of recovery: 1. Restores the most recent ADAM data from backups. 2. Updates other ADAM Servers in the domain with the recovered data.
Specifying recovery options for ADAM data To specify recovery options for ADAM data: 1. From the Options menu: a. Select System Recover Session Options. b. Click the ADAM tab. 2. Select one of the following options: • Non Authoritative Restore • Authoritative Restore 3. Click OK to close the System Recover Session Options dialog box. 4. In the navigation tree: a. Expand the Applications folder. b. Select ADAM instance_name Writer. 5. From the System Recover Session toolbar: a. Click Recover. b. Click Restore. 6. If an authoritative restore has been performed, restore for all selections has completed, and NMM reports success, complete the following steps: a. Exit the NMM client, and open a command window. b. Run the dsdbutil.exe utility, and select Authoritative Restore option. c. This marks the objects that are to be restored in authoritative mode. Recovery options
123
Microsoft Windows System Backup and Recovery
d. When processing is complete: – Exit the dsdbutil.exe utility. – Start the ADAM instance service manually. Note: If a nonauthoritative restore was performed, the ADAM instance has already been started.
Recovering ADAM data To recover ADAM data, ensure the that the following save set has been backed up: APPLICATIONS:\ADAM instance_name Writer\
Chapter 4, “Scheduled Backup,” provides more information about specifying save sets when configuring a backup.
DFS recovery options You can specify whether to perform an authoritative or nonauthoritative recovery of DFS data on the host in Windows Server 2008 and Windows Server 2008 R2 systems: ◆
Authoritative restore is available.
◆
The writer is recovered from: SYSTEM COMPONENTS:\Bootable System State
◆
DFS can have DFS shares, and also be part of Active Directory recovery.
◆
DFS is part of Active Directory recovery if it was promoted to a Domain Controller with the either of the following settings selected: • 2008 Functional Level • 2008 R2 Functional Level
◆
To restore DFS as part of Active Directory, the system must be restarted into DSRM. “Booting the NMM host in Directory Service Restore mode” on page 131 provides more information.
The steps for performing a DFS recovery from the following Microsoft servers are described in separate procedures: ◆
Windows Server 2008
◆
Windows Server 2008 R2
Nonauthoritative restore (default) This type of recovery restores the most recent DFS data from backups and then updates the recovered host with the most recent DFS data from another DFS Server in the domain:
124
◆
A nonauthoritative recovery relies on at least one other DFS Server in the domain to have accurate up-to-date DFS data.
◆
Nonauthoritative recoveries are typically performed when the host is recovered due to catastrophic loss of data such as a disk failure. This occurs when two or more domain controllers are restored:
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
• Select nonauthoritative restore on the second, third, and fourth domain controllers. The domain controllers erase their local copy of SYSVOL and then replicate SYSVOL from the authoritative domain controllers. • Authoritative restore should be performed on at least one domain controllers.
Authoritative restore An authoritative recovery restores the most recent DFS data from backups, and then updates other DFS Servers in the domain with the recovered data. Perform an authoritative recovery only when corrupted or deleted DFS data has been propagated to other DFS Servers. To recover DFS data: 1. The APPLICATIONS:\DFS Replication service writer save set must have been backed up. 2. The SYSTEM COMPONENTS:\ save set on the namespace server (usually the domain controller) that is associated with the DFS configuration must have been backed up. Chapter 4, “Scheduled Backup,” provides more information about specifying save sets when configuring a backup.
Windows Server 2008 and Windows Server 2008 R2 To specify which type of DFS recovery to perform in Windows Server 2008 and Windows Server 2008 R2: 1. From the Options menu: a. Select System Recover Session Options. b. Click the DFS tab. 2. Select one of the following options: • Non Authoritative Restore to perform a nonauthoritative recovery. or • Authoritative Restore to perform an authoritative recovery. 3. Click OK to close the System Recover Session Options dialog box. 4. From the left pane, select Recover > System Recover Session. 5. From the navigation tree: a. Expand the SYSTEM COMPONENTS folder. b. Select BootableSystemState. 6. From the System Recover Session toolbar: a. Click Recover. b. Click Restore. After the recovery has completed, the Use Microsoft best practices for selecting the system state attribute is automatically selected.
Recovery options
125
Microsoft Windows System Backup and Recovery
Do not clear the “Use Microsoft best practices for selecting the system state” box except where specifically instructed to do otherwise in this document. For instance, there are some procedures, such as recovering DFS data, where you can clear this attribute. Microsoft does not support recovery of portions of the operating system. Attempted recovery of portions of the operating system, with this box cleared, may render the system unbootable. After each recovery operation, this option is automatically selected.
FRS recovery options You can specify whether to perform an authoritative or nonauthoritative recovery of FRS data on this host. The following topics describe these types of FRS restores: ◆
“FRS nonauthoritative restore (default)” on page 126
◆
“FRS authoritative recovery” on page 126
Boot the NetWorker client in Directory Service Recovery mode before completing the recovery options in this section. “Booting the NMM host in Directory Service Restore mode” on page 131 provides more information.
FRS nonauthoritative restore (default) A nonauthoritative recovery restores the most recent FRS data from backups and then updates the recovered host with the most recent FRS data from another FRS Server in the domain. A nonauthoritative recovery relies on at least one other FRS Server to have accurate, up-to-date FRS data. In an environment that consists of two or more domain controllers: ◆
One domain controller should have a healthy SYSVOL folder.
◆
The other domain controllers must be reinitialized in direct replication partner order. The Microsoft documentation provides details about reinitialization.
Nonauthoritative recoveries are typically performed when the host is recovered due to catastrophic loss of data such as a disk failure.
FRS authoritative recovery An authoritative recovery restores the most recent FRS data from backups, and then updates the other FRS Servers in the domain with the recovered data. Perform an authoritative recovery only when corrupted or deleted FRS data has been propagated to other FRS Servers. Authoritative restore is performed on the domain controller whose SYSVOL folder is to be replicated to other domain controllers in the domain. All other domain controllers in the domain must be reinitialized with a nonauthoritative restore.
126
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
To recover FRS data, the SYSTEM COMPONENTS:\ save set must have been backed up. Chapter 4, “Scheduled Backup,” provides more information about specifying save sets when configuring a backup. To specify whether to perform an authoritative or nonauthoritative recovery: 1. From the Options menu: a. Select System Recover Session Options. b. Click the FRS tab. 2. Select one of the following options: • Non Authoritative Restore to perform a nonauthoritative recovery. or • Authoritative Restore to perform an authoritative recovery. 3. Click the NetWorker tab. 4. Clear the following attribute: Use Microsoft best practices for selecting the system state
5. Click Yes when asked to confirm your selection.
Do not clear the “Use Microsoft best practices for selecting the system state” box except where specifically instructed to do otherwise in this document. For instance, there are some procedures, such as recovering DFS data, where you can clear this attribute. Microsoft does not support recovery of portions of the operating system. Attempted recovery of portions of the operating system, with this box cleared, may render the system unbootable. After each recovery operation, this option is automatically selected. 6. Click OK to close the System Recover Session Options dialog box. 7. From the navigation tree: a. Expand the SYSTEM COMPONENTS folder. b. Click FRS. 8. From the System Recover Session toolbar: a. Click Recover. b. Click Restore. If you are performing an authoritative recovery, complete the remaining steps in “Authoritative recovery of NTDS or FRS data” on page 132.
Recovery options
127
Microsoft Windows System Backup and Recovery
NTDS recovery options You can specify whether to perform an authoritative or nonauthoritative recovery of Windows NTDS data on this host. The following topics describe these types of NTDS restores: ◆
“NTDS nonauthoritative restore (default)” on page 128
◆
“NTDS authoritative restore” on page 128
Boot the NetWorker client in Directory Service Recovery mode before completing the recovery options in this section. “Booting the NMM host in Directory Service Restore mode” on page 131 provides more information about these recovery options.
NTDS nonauthoritative restore (default) A nonauthoritative recovery restores the most recent NTDS data from backups and then updates the recovered host with the most recent NTDS data from another NTDS Server in the domain. A nonauthoritative recovery relies on at least one other NTDS Server to have accurate, up-to-date NTDS data. I In this mode: 1. The affected domain controller's data is restored from the backup. 2. This domain controller receives through replication all the directory changes made to the other domain controllers in the network since the backup. Nonauthoritative recoveries are typically performed when the host is being recovered due to catastrophic loss of data such as a disk failure.
NTDS authoritative restore An authoritative recovery restores the most recent NTDS data from backups, and then updates other NTDS Servers in the domain with the recovered data. Perform an authoritative recovery only when corrupted or deleted NTDS data has been propagated to other NTDS Servers. In a domain containing multiple domain controllers, authoritative restore of NTDS writer replicates directory objects such as the following to all domain controllers in that domain: ◆
Computers
◆
Groups
◆
Organizational units
◆
Users
Note: To recover NTDS data, the SYSTEM COMPONENTS:\ save set must have been backed up. Chapter 4, “Scheduled Backup,” provides more information about specifying save sets when configuring a backup.
128
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
To specify whether to perform an authoritative or nonauthoritative recovery: 1. From the Options menu: a. Select System Recover Session Options. b. Click the NTDS tab. 2. Select one of the following options: • Non Authoritative restore to perform a nonauthoritative recovery. or • Authoritative Restore to perform an authoritative recovery. 3. Click the NetWorker tab. 4. Clear the following attribute: Use Microsoft best practices for selecting the system state
5. Click Yes when asked to confirm your selection.
Do not clear the "Use Microsoft best practices for selecting the system state" box except where specifically instructed to do otherwise in this document. For instance, there are some procedures, such as recovering DFS data, where you can clear this attribute. Microsoft does not support recovery of portions of the operating system. Attempted recovery of portions of the operating system, with this box cleared, may render the system unbootable. After each recovery operation, this option is automatically selected. 6. For DSRM, to recover "Bootable System State" in a domain controller setup, ensure that the Microsoft Best Practices checkbox is cleared. 7. Click OK to close the System Recover Session Options dialog box. 8. From the navigation tree: a. Expand the SYSTEM COMPONENTS folder. b. Click NTDS. 9. From the System Recover Session toolbar, click Start Restore. If you are performing an authoritative recovery, complete the remaining steps in “Authoritative recovery of NTDS or FRS data” on page 132.
Security recovery options Backup and archive data on Windows hosts can be encrypted with an Advanced Encryption Standard (AES) Application Specific Module (ASM) pass phrase. If no pass phrase was specified when the backup data was encrypted, then the data is encrypted with a default pass phrase. During data recovery, you must specify the pass phrase used at the time of backup if it is not the default or current pass phrase.
Recovery options
129
Microsoft Windows System Backup and Recovery
Do not use AES encryption when backing up files that are encrypted by using Windows Encrypting File System (EFS). When AES encryption is applied to a file that is also encrypted by using the Microsoft EFS, the backup will be reported as successful. However, recovery of the file will fail. To specify pass phrases: 1. From the Options menu: a. Select System Recover Session Options. b. Click the Security tab. 2. Type the pass phrases. 3. Click OK. The NetWorker Administration Guide provides more information about AES encryption, and setting the pass phrase.
Recovering file system snapshots that have not been rolled over Note: If a snapshot volume has been mounted by using a client utility such as the EMC NaviCLI interface or the Windows Disk Management utility, remove the mount point before performing the next backup or recovery operation. If the mount point is not removed, it will be removed at the end of the next NetWorker backup or recovery operation. To recover items in a file system backup that has not been rolled over: 1. Connect to the NetWorker server on which the NetWorker client was configured for backup. “Connecting to a NetWorker server” on page 53 provides more information about connecting to the NetWorker server. 2. From the left pane, select Recover > System Recover Session. 3. In the navigation tree: a. Right-click the snapshot. b. Select Mount Snapshot. The following occurs: • If another snapshot is currently mounted, a message indicates that the currently mounted volume will be unmounted: a. Click OK to unmount the volume. b. When the taskbar animation stops and a green mark appears, click the mounted snapshot. The mounted snapshot item will expand in the navigation tree.
130
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
4. Under the expanded snapshot, select the items to be recovered. “Selecting an item for recovery” on page 41 provides more information about selecting items for recovery. 5. Select any additional file system options if applicable. “NetWorker recovery options” on page 119 provides more information about these options. 6. From the System Recover Session toolbar: a. Click Recover. b. Click Restore. After the recovery starts, the snapshot is automatically unmounted. 7. From the left pane, select Monitor to view the progress of the recovery.
Booting the NMM host in Directory Service Restore mode Before you can complete the following recovery operations, boot the NMM client in Directory Service Restore mode: ◆
DFS recovery
◆
FRS recovery
◆
NTDS recovery
◆
Active Directory (AD) disaster recovery
To boot the NMM client in Directory Service Restore mode: 1. On the NetWorker client domain controller: a. Close all programs. b. Restart Windows. When the computer restarts: • A list of startup choices appears. • The startup choices and the duration of the startup display are based on the settings in the following sections of the boot.ini file: – Operating systems – Boot loader 2. Select the Windows boot option for the domain controller. 3. Press F8 to display a list of special boot options. 4. From the list of special boot options, select Directory Service Restore Mode (Windows Domain Controllers only). When you boot in this mode, AD is taken offline.
Booting the NMM host in Directory Service Restore mode
131
Microsoft Windows System Backup and Recovery
5. Log in as administrator: • Use the password that was specified when the domain controller was created. • Windows starts in safe mode. 6. Open the NMM client application. 7. From the left pane, select Recover > System Recover Session. 8. Continue with the recovery options. The following sections provide more specific information: • “DFS recovery options” on page 124 • “FRS recovery options” on page 126 • “NTDS recovery options” on page 128 • “Security recovery options” on page 129 • “Recovering the Windows system configuration to an earlier state” on page 134 includes information about SYSTEM STATE or VSS SYSTEM BOOT save sets, and save set recovery. • Granular Active Directory or ADAM backup option—The NetWorker Module for Microsoft Application Release 2.4 Application Guide includes information about save sets on a domain controller. Note: Active Directory schema objects cannot be recovered and therefore, should never be deleted.
Authoritative recovery of NTDS or FRS data Perform an authoritative recovery only when corrupted or deleted data has been propagated to other Windows NTDS or FRS Servers. After the authoritative recovery, the domain administrator can delete any unnecessary newer objects. NTDS and FRS objects may have associated group policies, for example, organizational units, domains, and site objects. Group policies are stored in the SYSVOL directory. A recovery of the SYSVOL directory cannot be separated from an authoritative recovery of NTDS or FRS. To perform an authoritative recovery: 1. If you have not already done so, boot the NMM client in Directory Service Restore mode. “Performing a recovery” on page 115 provides more information about performing this procedure. 2. If you have not already done so, complete the NTDS or FRS recovery options. The following sections provide more specific information on the recovery options: • “FRS recovery options” on page 126 • “NTDS recovery options” on page 128
132
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
3. From the command line, use the xcopy command to copy sysvol\domain to another location. 4. This preserves the following information: • Group policy • File permissions • Directory permissions 5. Run the Windows ntdsutil utility. 6. At the ntdsutil prompt, type: NTDSUTIL: authoritative restore
7. To perform an authoritative recovery of the following: • Entire database, type: NTDSUTIL: restore database
• Subtree or individual object, type: NTDSUTIL: restore subtree distinguished_name
For example: NTDSUTIL: restore subtree
OU=engineering,DC=Seattle,DC=jupiter,DC=com NTDSUTIL: restore subtree
CN=mars,CN=users,DC=Seattle,DC=jupiter,DC=com The Microsoft Windows Server Resource Kit provides more information and Active Directory documentation. 8. Exit the ntdsutil utility by typing quit at each successive ntdsutil prompt until the command prompt displays. 9. Copy the entire recovered SYSVOL\domain directory and all of its subdirectories to a new location. 10. Restart the domain controller in normal mode. 11. Log in to the domain controller. 12. Wait for the SYSVOL share to be published. Note: This can take several minutes while the recovered domain controller synchronizes with its replication partners. 13. After the SYSVOL share has been published, perform one of the following: • For an authoritative recovery of the entire database: a. Copy the entire SYSVOL\domain directory tree from the new location to the existing SYSVOL\domain directory as described in step 9 . b. When the copy operation prompts for confirmation, select Yes to All.
Authoritative recovery of NTDS or FRS data
133
Microsoft Windows System Backup and Recovery
• For an authoritative recovery of only a part of AD that includes Policy objects, copy the policy folders from the new location as described in step 9 to the existing policy folders: – Policy objects can be identified by their global universal ID (GUID). – Policy folders are located in SYSVOL\domain\Policies.
Recovering the Windows system configuration to an earlier state Hosts that were upgraded from a regular NetWorker client to a NMM client can have their Windows operating system configuration recovered to a state prior to upgrading to the NMM client.
If the Windows operating system was upgraded on the host, you cannot recover the Windows system configuration to the state it was in before the operating system software was upgraded. To recover the Windows system state to a point-in-time that precedes the installation of the NMM client: 1. If the NMM client is a Windows domain controller, boot the NMM client in Directory Services Restore mode. “Booting the NMM host in Directory Service Restore mode” on page 131 provides more information about booting in this mode. If the NMM client is not a Windows domain controller, start with step 2 . 2. Recover the contents of the volume on which the Windows operating system was installed. 3. Recover the Windows configuration save sets: • If VSS was licensed and enabled, recover: – VSS SYSTEM BOOT – VSS SYSTEM FILESET – VSS SYSTEM SERVICES • If VSS was not licensed or enabled, recover: – SYSTEM DB – SYSTEM FILES – SYSTEM STATE 4. Update the recovered registry with NMM client entries. Because the registry was recovered to a client state prior to the NMM client installation, you must update the registry with entries for the NMM client. To update the registry: a. Uninstall the NMM client software. b. Reinstall the NMM client software.
134
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
Reinstall, as necessary, any other applications that were installed after the point-in-time to which the Windows operating system configuration was recovered. The NetWorker Module for Microsoft Applications Release 2.4 Installation Guide provides more information about the uninstall and install steps.
Restoring BOOT/BCD data in Windows 2008 R2 This procedure is optional. In Microsoft Windows 2008 R2, the BOOT Configuration Data (BCD) store contains the boot configuration parameters and controls the computer’s boot environment. BCDEdit is a command-line tool provided by Microsoft to add, delete, edit, and modify data in a BCD store. Note: Restoring the recovered file is optional. The BCDEdit reference document in the Microsoft documentation provides more information about BCDEdit. During recovery, the BCD file is recovered to the folder C:\boot_restored-{timestamp} To restore the recovered file, import the file by using the following command: bcdedit /import c:\boot_restored-{timestamp}\Boot
Windows print queues backup and recovery The NMM 2.4 software supports backup and recovery operations for Windows print queues as part of the file system. There is no writer support for Windows print queues. Depending on the status of the print queue during a restore operation, you might be prompted to restart the system.
Windows DFS-R granular backup and recovery NMM 2.4 supports granular backup and recovery of Windows Distributed File System Replication (DFS-R) folders only on Microsoft Windows Server 2008 SP2 (x64 and x86) and Microsoft Windows Server 2008 SP1 R2 (x64).
DFS-R replicated and shared directories DFS-R replicated and shared directories can be backed up like standard file directories by allowing granular DFS-R folder and file backup and recoveries on Windows Server 2008 SP2 and Windows Server 2008 R2 operating systems. You are not required to recover the entire SYSTEM COMPONENTS:\ save set to restore DFS-R replicated or shared directories.
DFS-R granular support DFS-R replicated folders and data is backed up as file system data and is not backed up as a part of DFS-R writer in SYSTEM COMPONENTS:\ save set backup. DFS-R replicated folders and data recovery is supported to both original or alternate locations. Directed recovery of DFS-R replicated folders and data is also supported.
Restoring BOOT/BCD data in Windows 2008 R2
135
Microsoft Windows System Backup and Recovery
Because DFS-R replicated folders and data is backed up as file system data, all the features supported by file system data backup and recovery are supported by DFS-R granular support.
DFS-R writer support DFS-R writer backs up only SYSVOL in a domain controller as a part of Bootable System State. Recovery of DFS-R writer is supported only to original location as this is a part of SYSTEM COMPONENTS:\ save set. On non-domain controller, the DFS-R writer is not part of the SYSTEM COMPONENTS:\ save set.
Pre and post command support With NMM 2.4, the following pre and post commands are now supported. These commands enable you to include customized backup actions before and after a client backup operation: ◆
“precmd.bat script” on page 136
◆
“postcmd.bat script” on page 136
◆
“nsrsnapvsssavepnpc file” on page 137
precmd.bat script You can create a precmd.bat script file to enable actions to be performed before a backup operation. When the NetWorker server starts the backup, the contents of the nsrsnap_vss_savepnpc.exe file is run on the client to perform the required actions. To create a precmd.bat script file: 1. Create a new file on the Windows client by using Notepad. 2. Specify a command to run before the backup. For example, add the following lines to the file: echo time date > Pre-postBackup.log /t >> Pre-postBackup.log /t >> Pre-postBackup.log commands to run here> "Complete Pre backup action" >> Pre-postBackup.log /t >> Pre-postBackup.log /t >> Pre-postBackup.log
3. Save this file as precmd.bat in a new directory that does not contain spaces. For example: C:\Scripts.
postcmd.bat script You can create a postcmd.bat script file to enable actions to be performed after a backup operation. To create a postcmd.bat script: 1. Create a new file on the Windows client by using Notepad. 2. Specify a command to run after the NetWorker software has backed up the data.
136
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows System Backup and Recovery
3. Save this file as postcmd.bat in a new directory that does not contain spaces. For example: C:\Scripts.
nsrsnapvsssavepnpc file To run the pre and post command scripts that were created in the previous steps, you must create the nsrsnapvsssavepnpc file. This file lets the NetWorker software know that a pre and post action is required. To create a nsrsnapvsssavepnpc file to run the pre and post actions: 1. Create a new file on the Windows client by using Notepad. 2. Add the following lines to the file: type: nsrsnapvsssavepnpc; precmd: "C:\\Scripts\\precmd.bat"; pstcmd: "C:\\Scripts\\postcmd.bat";
3. Save and name the file as groupname.res in the following location: C:\Program Files\Legato\nsr\res
where groupname is the name of the NetWorker backup group to which this client belongs.
Recovering client file index and the media database This section includes procedures for recovering the client file index and the media database.
Restoring a save set entry to the client file index only If a file is not browsable (which means that the save set's browse policy has expired), but its save set is still tracked by the NetWorker server in the media database, you can make the file browsable by recovering the save set's entry back into the client file index. To recover the save set's entry back into the client file index: 1. Log in as root or Windows Administrator. 2. Type the mminfo command at the command prompt: mminfo -a -v
where volume_name is the volume that contains the client file index. 3. From the mminfo output, find the ssid that contains the required file. Ensure it is not the bootstrap ssid. 4. Type the nsrmm command with a new browse time: nsrmm -S ssid -w
where browse_time is a time in the future. 5. Type the scanner command: scanner -i -S ssid
Recovering client file index and the media database
137
Microsoft Windows System Backup and Recovery
The save set entry is restored to the client file index.
Restoring a save set entry to the client file index and media database If a volume has a save set that does not appear in the media database and the save set's files are not browsable, you can restore these entries in the media database and the client file index so that the save set's files can be browsed. To rebuild the save set's entry in the media database and the client file index: 1. Log in as root or Windows Administrator. 2. At the command prompt, run the scanner program on the volumes that contain the appropriate file or files: scanner
3. Use the output from the scanner program to determine: • Whether the save set to be rebuilt is on this volume. • Whether to reintroduce the contents of this volume into the online indexes. Locate all the volumes that contain this save set ID. 4. If the save set is found on multiple volumes and the order in which the volumes were written is unknown, complete this step. Otherwise, skip to Step 5. a. On each volume that will be reintroduced into the online indexes, run this command: scanner -m
The media database is updated with information from each volume.
If the volume contains data from an earlier version of NetWorker, there may be no pool information on the volume. In this case, the volume is considered to belong to the Default pool. To assign the volume to another pool, use the -b pool_name option in this step. If the volume already belongs to a pool, the -b option will have no effect. b. Query the media database to determine the sequence in which the volumes were written: mminfo -a -v
In Step 5, the volumes must be reintroduced into the online indexes in the same order in which they were written. 5. Starting with the first volume that was written, run the scanner program: scanner -i
The scanner program prompts for a new volume until you terminate it. Scan in the remaining volumes in the order in which they were written. 6. Browse for the file to be recovered. Recovering by file selection provides information about browsing for a file.
138
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
CHAPTER 8 Microsoft Windows Cluster Backup and Recovery This chapter includes the following topics: ◆ ◆ ◆
Overview............................................................................................................... 140 Performing Windows Server Cluster backups ......................................................... 143 Performing Windows Server Cluster recovery ......................................................... 144
Microsoft Windows Cluster Backup and Recovery
139
Microsoft Windows Cluster Backup and Recovery
Overview This chapter supplements the overall NetWorker Module for Microsoft Applications (NMM) backup procedures in the following sections: ◆
“Scheduled Backup” on page 63
◆
“Microsoft Windows System Backup and Recovery” on page 111
Backup and recover information is also included for the following clusters: ◆
Windows Server 2008 — Windows Server Failover Clustering (WSFC)
◆
Windows Server 2008 R2 — Windows Server Failover Clustering (WSFC)
This section contains information on: ◆
“Cluster support in NMM client” on page 140
◆
“Components used by NMM for Windows Cluster backup and recovery” on page 140
◆
“Configuring a virtual client to back up to a local storage node” on page 141
◆
“Windows Cluster application information variable settings” on page 142
Cluster support in NMM client NMM client supports Windows Server Failover Clustering (WSFC) running on the following versions of Microsoft Windows Server: ◆
Windows Server 2008 SP2 (x86, x64) Enterprise Edition and Datacenter Edition
◆
Windows Server 2008 R2 (x64) Enterprise Edition and Datacenter Edition
Components used by NMM for Windows Cluster backup and recovery For backup—NMM backs up Windows Cluster data as part of the SYSTEM COMPONENTS save set. A Cluster Writer is used within SYSTEM COMPONENTS, but it cannot be specified in a save set. For recovery—Table 30 on page 140lists the component that needs to be selected for recovery of the Cluster Writer: Table 30 Components for recovery of Cluster Writer Save set
Description
SYSTEM COMPONENTS:\
As part of recovery of this entire save set
SYSTEM COMPONENTS:\Cluster Writer
As an authoritative restore in Windows Server 2008 SP2 and Windows Server 2008 SP1 R2
As part of a nonauthoritative restore in Windows Server • SYSTEM COMPONENTS:\Cluster 2008 SP2 and Windows Server 2008 SP1 R2 Writer • SYSTEM COMPONENTS:\BootableSystemState
140
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows Cluster Backup and Recovery
Configuring a virtual client to back up to a local storage node Typically, the NetWorker server backs up the data on a virtual client within a cluster to the first storage node listed in the virtual client’s Storage Nodes attribute. You can configure a virtual client within a cluster to direct its backups to the storage node on the physical host on which it resides. You can do this configuration for Exchange Server 2007 and SQL Server (for both VSS and VDI), by typing the following in the Storage Nodes attribute of the virtual client: curphyhost
For example, consider a two-node cluster where: ◆
Nodes A and B are the two physical nodes in the cluster.
◆
The virtual client is saturn, which can reside on Node A or fail over to Node B.
In a normal NetWorker backup of saturn without “curphyhost” listed in the virtual client’s Storage Nodes attribute — the save data is directed to the remote device (rd=) on Node A. When saturn fails over to Node B and a backup for saturn is initiated, the save data is still directed to the remote device (rd=) on Node A. Listing "curphyhost" first in saturn’s Storage Nodes attribute modifies the NetWorker operation so that if saturn fails over to Node B and a backup of saturn is initiated, the save data is directed to the remote device (rd=) on Node B. This action takes place because, after the failover saturn resides on Node B, the current physical host. Note: The curphyhost attribute is not supported for Exchange Server 2010.
Directing a virtual client backup to a local storage node To direct a virtual client to back up to a local storage node: 1. Start the NetWorker Administration Console software. 2. From the Administration window, click Configuration. 3. In the left pane, select Clients. 4. From the File menu, select Properties and then select the Globals (2 of 2) tab. 5. For the Storage Nodes attribute, add the curphyhost keyword. Position the keyword in the list based on the required priority. The top of the list is the highest priority.
Overview
141
Microsoft Windows Cluster Backup and Recovery
Windows Cluster application information variable settings Table 31 on page 142 lists the variables that can be specified in NetWorker Management Console, in the Application Information attribute of the client resource. Table 31 Windows Cluster application information variable settings
142
Attribute Name
Description
Values
NSR_SNAP_TYPE=value
Specifies the snapshot service provider name.
vss This value is required.
NSR_DATA_MOVER=value
Specifies the hostname of the NMM client that moves snapshots from the local NMM client to primary and secondary (conventional) storage. The host can be either a local host or a proxy client host.
• The local host • The proxy client hostname Consider the following: • If no value is entered, the local host is used as the data mover. • If setting up a proxy client for a virtual cluster server, ensure to type the proxy client hostname in the Remote Access attribute of the client resource. • For serverless backups, specify a proxy client. • If setting up an Windows Cluster client resource, it is recommended that you use a proxy client. If a proxy client is specified, Windows Cluster consistency checks are performed on the proxy client. Related messages are written to the Replication Manager log files (erm_clientxx.log) on the proxy client. • If no proxy client is specified for an Windows Cluster client resource, consistency checks are performed on the client resource host. Related messages are logged on the client resource host in both the Replication Manager log files and the nmm.raw file.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Microsoft Windows Cluster Backup and Recovery
Performing Windows Server Cluster backups To perform clustered client resource backups, complete the tasks outlined in Table 32 on page 143. Table 32 Steps and considerations for backing up a clustered client resource Backup task
Description
1. “Task 1: Configure a backup pool” on page 66
Tasks 1, 2, and 3 are performed for scheduling a backup, and are the same for all VSS writers supported by NMM.
2. “Task 2: Configure snapshot policies” on page 68 3. “Task 3: Configure a backup schedule” on page 72 4. “Task 4: Configure a backup group” on page 72 5. “Task 6: Configure NetWorker administrator privileges” on page 77
Tasks 4, 5, and 6 are additional considerations that are required for setting up a virtual NMM client.
Note: Set up NetWorker administrator privileges for each physical node and proxy client in the cluster. 6. “Task 7: Configure a proxy client” on page 78 Note: If a hardware provider such as the EMC VSS Provider is being used, a proxy client must be configured for a clustered NMM client.
There is an additional consideration for backing up a clustered client resource. The proxy client is not allowed to be a member of the cluster. This is by Microsoft design and Microsoft describes this restriction in a MSDN article at http://msdn.microsoft.com/en-us/library/aa384600(VS.85).aspx, in the subsection “Auto-Import Hardware Shadow Copies Are Not Supported on Windows Cluster Service.”
Cluster failover and backups Considerations include the following: ◆
If a node within a cluster undergoes failover during a backup operation, the operation fails. The next scheduled backup operation will be the next valid backup.
◆
If using a hardware provider, such as the EMC VSS Provider, use the disk management utilities provided with the associated hardware to delete any resources that may be left in an indeterminate state as a result of the failed backup.
For example, a CLARiiON storage solution may have an inactive snapshot as the result of a failed backup. In this case, use the Navisphere/Unisphere user interface or the NaviCLI command line interface to search for and delete the inactive snapshot.
Performing Windows Server Cluster backups
143
Microsoft Windows Cluster Backup and Recovery
Performing Windows Server Cluster recovery “Cluster recovery options” on page 120 describes the Cluster tab in NMM Recovery options. This tab provides options for authoritative or nonauthoritative restore. Authoritative restores of the Cluster Writer are only supported for Windows Server 2008 and Windows Server 2008 R2.
144
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
GLOSSARY
This glossary contains terms related to disk storage subsystems. Many of these terms are used in this manual.
A ad hoc backup administrator
administrators group
Application Specific Module (ASM)
See manual backup. The person normally responsible for installing, configuring, and maintaining NetWorker software. Microsoft Windows user group whose members have the rights and privileges of users in other groups, plus the ability to create and manage the users and groups in the domain. Program that is used in a directive to specify how a set of files or directories is to be backed up or recovered. For example, compressasm is a NetWorker directive used to compress files.
ASR writer
The VSS Writer, which is responsible for identifying critical data that is needed to perform an offline restores.
archive
Backing up directories or files to an archive volume to free disk space. Archived data is not recyclable.
archive volume
Volume used to store archive data. Archived data cannot be stored on a backup volume or a clone volume.
auto media management
autochanger autochanger sharing
Feature that enables the storage device to automatically label, mount, and overwrite an unlabeled or recyclable volume.
See library. See library sharing.
B backup
Operation that saves data to a volume.
See also conventional backup and snapshot. backup components
See metadata document.
backup group
See group.
backup level
See level.
backup volume
Volume used to store backup data. Backup data cannot be stored on an archive volume or a clone volume. See also volume.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
145
Glossary
bootstrap
Boot Configuration Data (BCD) browse policy
Save set that is essential for NetWorker disaster recovery procedures. The bootstrap consists of three components that reside on the NetWorker server. The media database, the resource database, and the server index. The ASR Writer component that identifies the location of the boot configuration database. This is required to perform an offline restore. NetWorker policy that specifies how long backed-up data will be readily available for recovery. Backed-up data that has not exceeded its browse policy time can be recovered more quickly than data that has exceeded its browse policy time but not its retention policy time. See also retention policy.
C carousel client client file index
client-initiated backup
See library. Computer, workstation, or fileserver whose data can be backed up and recovered. Database that tracks every database object, file, or file system that is backed up. The NetWorker server maintains a single client index file for each client.
See manual backup.
client resource
NetWorker server resource that identifies the save sets to be backed up on a client. The client resource also specifies information about the backup, such as the schedule, browse policy, and retention policy for the save sets. See also client and resource.
clone
Reliable copy of backed up data. Unlike volumes created with a simple copy command, clone volumes can be used in exactly the same way as the original backup volume. Single save sets or entire volumes can be cloned.
clone volume
Exact duplicate of a backup volume. One of four types of volumes that NetWorker software can track (backup, archive, backup clone, and archive clone). Save sets of these different types may not be intermixed on one volume.
cluster
1. Two or more independent network servers that operate and appear to clients as if they are a single unit. The cluster configuration enables work to be shifted from one server to another, providing "high availability" that allows application services to continue despite most hardware or software failures. Also known as an agent (Sun), logical server (HP TruCluster), package (HP-UX), and virtual server (Microsoft). 2. Group of disk sectors. The operating system assigns a unique number to each cluster and keeps track of files according to which clusters they use.
command line
component
Line on a display screen, also known as a command prompt or shell prompt, where you type software commands. 1. Group of related data that must be treated as a single unit for backup and recovery. 2. In Microsoft VSS terminology, a component is a subordinate unit of a writer.
components metadata document
146
See metadata document.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Glossary
consistent console server
conventional backup critical volume
State of a dataset that is fully and immediately available to an application view. Software program that is used to manage NetWorker servers and clients. The Console server also provides reporting and monitoring capabilities for all NetWorker processes.
See nonpersistent snapshot. Any volume containing system state files or files for an installed service, including volumes mounted as NTFS directories which contain such files. The volume where a critical volume is mounted is also considered to be critical. This is required to perform an offline restore, however maybe optional for this release depending upon the difficulties of implementing this feature.
D domain controller
Data Mover (DM)
data retention policy datawheel datazone Dynamic Drive Sharing (DDS) device
Computer that stores directory data and manages user interactions within a domain, including logon, authentication, directory searches, and access to shared resources. Client system or application, such as NetWorker, that moves the data during a backup, recovery, or snapshot operation. See also proxy client.
See retention policy. See library. Group of hosts administered by a NetWorker server. Feature that allows NetWorker software to recognize shared drives. 1. Storage unit that reads from and writes to backup volumes. A storage unit can be a tape device, optical drive, autochanger, or file connected to the server or storage node. 2. When dynamic drive sharing (DDS) is enabled, refers to the access path to the physical drive.
Distributed File System (DFS) directed recovery
directive
disk subsystem
Microsoft Windows add-on that allows you to create a logical directory of shared directories that span multiple machines across a network. Method of recovery that recovers data that originated on one client computer and re-creates it on another client computer. Instruction that directs NetWorker software to take special actions on a given set of files for a specified client during a backup or recovery operation. Directives are ignored in manual (unscheduled) backups. Integrated collection of storage controllers or HBAs, disks, and any required control software that provides storage services to one or more hosts, such as CLARiiON arrays.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
147
Glossary
F file index file system
See client file index. 1. The software interface used to save, retrieve, and manage files on storage media by providing directory structures, data transfer methods, and file association. 2. The entire set of all files.
full backup
See level.
G group
Client or group of client computers that are configured to back up files at a designated time of day.
granular recovery
Granular recovery provides the ability to recover specific files in seconds from a single backup. This dramatically reduces the recovery time and the footprint of the backup on storage resources.
H high-available system
host ID
System of multiple computers configured as cluster nodes on a network that ensures that the application services continue despite a hardware or software failure. Each cluster node has its own IP address with private resources or disks that are available only to that computer. Serial number that uniquely identifies a host computer.
I inactivity timeout incremental backup
Number of minutes to wait before a client is considered to be unavailable for backup. Backup level in which only files that have changed since the last backup are backed up.
See also level. instant backup
Process of creating a point-in-time copy (snapshot) of data from a single client and saving it on a primary storage volume, which can be immediately recovered as a backup copy.
instant restore
Process of copying data created during an instant backup to its original location, or to an alternate location, during a recover operation.
J jukebox label
legacy method
148
See library. Electronic header on a volume used for identification by NetWorker or other Data Mover application. Use of special-case Microsoft APIs to back up and recover operating system components, services, and applications.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Glossary
level
Backup configuration option that specifies how much data is saved during a scheduled or manual backup. A full (f) backup backs up all files, regardless of whether they have changed. Levels one through nine [1-9] backup files that have changed since the last lower numbered backup level. An incremental (incr) backup backs up only files that have changed since the last backup.
library
Hardware device that contains one or more removable media drives, as well as slots for pieces of media, media access ports, and a robotic mechanism for moving pieces of media between these components. Libraries automate media loading and mounting functions during backup and recovery. The term library is synonymous with autochanger, autoloader, carousel, datawheel, jukebox, and near-line storage.
library sharing
Shared access of servers and storage nodes to the individual tape drives within a library.
local cluster client
locale settings
NetWorker client that is not bound to a physical machine, but is instead managed by a cluster manager. It is also referred to as a logical or virtual client. Settings that specify the input and output formats for date and time, based on local language conventions.
LUN (logical unit)
Logical unit of storage on a CLARiiON system. This refers to a device or set of devices, usually in a CLARiiON storage array.
LUN address
SCSI identifier of a logical unit number (LUN) within a device target. Each LUN address identifies a device on a SCSI bus that can perform input/output (I/O) operations.
M manual backup
media
media database
media index metadata document
mount
mount point
Backup that a user performs from the client, also known as an unscheduled backup or an ad hoc backup. The user specifies the files, file systems, and directories to back up. Physical storage medium, such as magnetic tape, optical disk, or file system to which backup data is written. Database that contains indexed entries of storage volume location and the life cycle status of all data and volumes managed by the NetWorker server. See also volume.
See media database. VSS Information stored in an XML document that is passed from the writer to the requestor. Metadata includes the Writer name, files, and components to back up, a list of components to exclude from the backup, and the methods to use for recovery. See also shadow copy set. To make a database available for use or to place a removable tape or disk volume into a drive for reading or writing.
See volume mount point.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
149
Glossary
N Network Data Management Protocol (NDMP) NetWorker administrator
NetWorker client
TCP/IP-based protocol that specifies how heterogeneous network components communicate for the purposes of backup and recovery. User who can add to or change the configuration of the NetWorker server, media devices, and libraries. NetWorker administrators must have their usernames included in the NetWorker server Administrator list.
See client.
NetWorker Console server
See console server.
NetWorker Management Console
See console server.
NetWorker server
NetWorker storage node nonclone pool noncritical volume
nonpersistent snapshot
Computer on a network running the NetWorker software, containing the online indexes, and providing backup and recover services to the clients on the same network.
See storage node. Pools that contain data that has not been cloned. A volume containing files that are not part of the system state or an installed service. The backup of non-critical volumes is not supported by either product for their initial releases. Snapshot backup that is moved to secondary storage on the NetWorker server or storage node and is no longer available for instant restore from a supported type of primary storage.
O online indexes
Databases located on the NetWorker server that contain all the information pertaining to the client backups (client file index) and backup volumes (media database).
online restore
A restore operation performed using the normal recover UI, and the computer has been booted from an installed operating system.
offline restore
A restore operation performed from the Windows PE environment.
operator
Person who monitors the server status, loads backup volumes into storage devices, and executes day-to-day NetWorker tasks.
P
150
pathname
Set of instructions to the operating system for accessing a file. An absolute pathname indicates how to find a file starting from the root directory. A relative pathname indicates how to find the file starting from the current directory.
persistent snapshot
Snapshot that is retained on disk. A persistent snapshot may or may not be rolled over to tape.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Glossary
point-in-time copy (PiT)
Fully usable copy of a defined collection of data, such as a consistent file system, database, or volume, which contains an image of the data as it appeared at a single point in time. A PiT copy is also called a shadow copy or a snapshot.
policy
Set of constraints that specify how long the save sets for a client are available for recovery. Each client has a browse policy and a retention policy. When the retention policy expires, the save sets associated with that policy are marked recyclable.
pool PowerSnap
provider
proxy client
Feature to sort backup data to selected volumes. EMC technology that provides point-in-time snapshots of data to be backed up. Applications that are running on the host system continue to write data during the snapshot operation, and data from open files is included in the snapshots. Software component defined by Microsoft VSS, that plugs in to the VSS environment. A provider, usually produced by a hardware vendor, enables a storage device to create and manage snapshots. Surrogate client that performs the NetWorker save operation for the client that requests the backup. A proxy client is required to perform a serverless backup.
Q quiescing
Process in which all writes to disk are stopped and the file system cache is flushed. Quiescing the database prior to creating the snapshot provides a transactionally consistent image that can be remounted without file system checks or database consistency checks. Quiescing a database is the most common way of creating a database snapshot.
R recover Registry
requestor
replica
To recover files from a backup volume to a client disk. Microsoft Windows database that centralizes all Windows settings and provides security and control over system, security, and user account settings. Interface with the Microsoft VSS infrastructure to initiate the creation and destruction of shadow copy. NetWorker software is a requestor.
See shadow copy.
resource
Component that describes the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are all NetWorker resources. Each resource has attributes that define its properties.
restore
Process of retrieving individual datafiles from backup storage and copying the files to disk.
retention policy
NetWorker policy that specifies the minimum period of time that must elapse before backed-up data is eligible to be overwritten on the backup media. Backed-up data that has not exceeded its browse policy time can be recovered more quickly than data that has exceeded its browse policy time but not its retention policy time. See also browse policy.
retrieve
To locate and recover archived files and directories. EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
151
Glossary
rollover
root
Process of backing up a snapshot to a conventional backup medium such as tape. Whether or not the snapshot is retained on disk depends on the snapshot policy. Highest level of the system directory structure.
S save set
save set ID (SSID)
Internal identification number assigned to a save set.
save set recover
To recover data by specifying save sets rather than by browsing and selecting files or directories.
save set status
NetWorker attribute that indicates whether a save set is browsable, recoverable, or recyclable. The save set status also indicates whether the save set was successfully backed up.
save stream
The data and save set information being written to a storage volume during a backup.
server index
See client file index.
serverless backup
service port
Backup method that uses a proxy client to move the data from primary storage on the application server host to secondary storage on another host. Serverless backups free up resources on the application server by offloading the work of processing snapshots to a secondary host. Port used to listen for backup and recover requests from clients through a firewall.
shadow copy
Temporary, point-in-time copy of a volume created using VSS technology. See also Volume Shadow Copy Service (VSS).
shadow copy set
Complete roadmap of what was backed up at a single instant in time. The shadow copy set contains information about the Writers, their components, metadata, and the volumes. A backup components metadata document containing that information is created and returned to the requestor after the snapshot is complete. NetWorker uses this document with the corresponding save set at recover time.
shadow copy technology
skip snap clone
152
Group of files or a file system from a single client computer, which is backed up on storage media.
Defined and standard coordination between business application, file system, and backup application that allows a consistent copy of application and volume data to exist for replication purposes. Backup level in which designated files are not backed up. Exact copy of a snap set data backup. The clone operation is an archive operation without the deletion of the source data. A new snap ID is assigned to the cloned copy.
snap ID
Also known as a snapid, a unique 64-bit internal identification number for a snap set.
snap set
Group of files, volumes, or file systems from a single client, describing the collection of data for which a point-in-time copy is created on an external disk subsystem, such as a storage array.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
Glossary
snapshot
Point in time, read-only copy of data created during an instant backup.
snapshot expiration policy
Policy that determines how long snapshots are retained before their storage space is made available for the creation of a new snapshot.
snapshot policy
Set of rules that control the lifecycle of a snap set. The snapshot policy specifies the frequency of snapshots, and how long snapshots are retained before recycling.
snapshot retention policy staging
stand-alone device
storage device
Policy that determines how many PIT copies are retained in the media database and thus are recoverable. Moving data from one storage medium to a less-costly medium, and later removing the data from its original location. Storage device that contains a single drive for backing up data. Stand-alone devices cannot store or automatically load backup volumes.
See device.
storage node
Storage device physically attached to a computer other than the NetWorker server, whose backup operations are administered from the controlling NetWorker server.
system state
All files that belong to VSS Writers with a usage type of BootableSystemState or SystemService. This is required to perform an offline restore.
V volume
1. A unit of physical storage medium, such as a magnetic tape, optical disk, or file system to which backup data is written. 2. An identifiable unit of data storage that may reside on one or more host disks.
volume ID volume mount point
volume name volume pool Volume Shadow Copy Service (VSS)
VSS VSS component
Internal identification that NetWorker software assigns to a backup volume. Disk volume that is grafted into the namespace of a host disk volume. This allows multiple disk volumes to be linked into a single directory tree, and a single disk or partition to be linked to more than one directory tree. Name assigned to a backup volume when it is labeled. See also label.
See pool. Microsoft technology that creates a point-in-time shadow copyof a disk volume. NetWorker software backs up data from the shadow copy. This allows applications to continue to write data during the backup operation, and ensures that open files are not omitted.
See Volume Shadow Copy Service (VSS). Subordinate unit of a writer.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
153
Glossary
W writer
154
Database, system service, or application code that provides metadata document information about what to back up and how to handle VSS component and applications during backup and recovery operations. A Writer provides information to requestors to ensure that application data is consistent, application files are closed and ready for a slight pause to make a Shadow Copy.
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
INDEX
A Active Directory (AD) disaster backup and recovery 24 granular backup and recovery 24 ADAM authoritative restore 123 nonauthoritative restore 123 All save set considerations for 113 application information attribute Cluster Writer 142 Application Specific Module (ASM) pass phrase 129 authoritative restore ADAM 123 Cluster Writer 144 DFS 125 FRS 127 NTDS 129 Avamar 109 configuration 91
B backup client resource configuring multiple 75 backup command attribute applications 114 Exchange 97, 108 backup groups configuring 72 backup levels, deduplication 93 backup pool creating for snapshots 66 backup save sets specifying 113 backup schedule configuring 72 backup time selecting for recovery 43 backups deduplication 93 browse policy 74 browse time selecting for recovery 43 bulk_logged recovery model 23
cluster server scheduling backups for 79, 112, 143 Cluster tab 144 Cluster Writer recovery authoritative restore 144 for Windows Server 2008 122 nonauthoritative restore 144 common provider See EMC VSS Provider 29 connection port range specifying 54 connection to NetWorker server 41 conventional recovery overview 33
D deduplication Avamar integration 109 backup configuration notes 94 backups 93 configuration 91 configuring client 95 prerequisites 109 querying deduplication save sets with mminfo 98 Deduplication Node configuration 91 DFS recovery options 124 directory services restore mode booting in for FRS recovery 131 booting in for NTDS recovery 131 disaster recovery support in NMM 24 display conventions 39 DNS resolution, NetWorker Deduplication Node 92 DPM disaster backup and recovery 24 granular backup and recovery 24
E EMC VSS Provider overview 29 encryption recovering backup data 115 Exchange disaster backup and recovery 24 granular backup and recovery 24
C CLARiiON provider overview 27 client resource configuring for deduplication 95 configuring multiple 75 configuring when in a cluster 79, 112, 143
F fake objects 39 file system disaster backup and recovery 24 granular backup and recovery 24 recovery options 119, 122
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
155
Index
filestream data 39 FRS recovery booting in directory services restore mode 131 consideration for 115 options 126 full backup level consideration for 72 full recovery model 22
G granular backup and recovery support in NMM 24 groups configuring for backup 72
H hardware providers 27 HIDD_SELECT_VIEWABLE_CLIENTS 52 Hyper-V disaster backup and recovery 24 granular backup and recovery 24
I incremental backup level consideration for 72 instant backup overview 32 instant recovery overview 33 instant snapshot policy example 71 interface overview 35 items searching for recovery 42
L label creating for pool 67 level 1 to 9 backups consideration for 72 level for backup considerations for 72
M marking items indicators 43 partially 43 semantics 40 marking items for recovery 41 Microsoft VSS software provider overview 29 Microsoft Windows Server 2008 28, 121, 122, 140 Microsoft Windows Server 2008 support 122 mminfo, querying deduplication save sets using 98 monitoring a recovery 46, 115, 131 multihomed environment 57 multiple client resources for backup 75
156
N NetWorker client file index 74 media database 74 NetWorker Deduplication Node, DNS resolution 92 Networker recovery options 119, 122 NetWorker server connecting to 41 NetWorker User for SQL Server 40 display conventions 39 fake objects 39 marking items partially 43 nonauthoritative restore ADAM 123 Cluster Writer 144 DFS 125 FRS 127 NTDS 129 nonpersistent backup overview 32 NTDS recovery booting in directory services restore mode 131 consideration for 115 options 128
O overview conventional recovery 33 instant backup 32 instant recovery 33 interface 35 nonpersistent backup 32 persistent backup 32 provider 29 requestor 29 rollover backup 32 software provider 29 VSS writers 27
P partially marking items 43 pass phrase recovering AES encrypted data 129 password changing 55 consideration for changing 55 specifying for backup 55 password-protected recovering backup data 115 persistent backup overview 32 policies for snapshots 68 pool creating for snapshots 66 label for 67 ports service and connection port ranges 54 prerequisites
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
IndexIndex
deduplication 109 provider overview 29 proxy client configuring 78 requirements for 78
R recover.exe 115 recovery ADAM options 123 browse time selection 43 Cluster options 120 default method, choosing 119 DFS options 124 encrypted backup data 115 FRS options 126 marking items 41 NTDS options 128 password-protected backup data 115 performing for system data 116 searching for items 42 selecting a version 43 viewing progress for 46, 115, 131 volumes required for 44 recovery model bulk_logged 23 full 22 simple 23 recovery, deduplication 98, 109 requestor overview 29 resource for backup configuring multiple 75 retention policy 74 rollover backup overview 32 performing 31
pool for 66 rollover operation 31 software provider overview 29 SQL disaster backup and recovery 24 Symmetrix provider overview 27 system recovery performing 116
T time of backup selecting for recovery 43 topology of NetWorker multihomed 59
U unmarking items indicators 43 URL encoding save sets 75 user access control 47
V version selecting for recovery 43 virtual cluster server scheduling backups for 79, 112, 143 Volume Shadow Copy Service (VSS) writers 27 volumes required for recovery 44
W Windows Server 2008 28, 121, 122 Windows Server 2008 Cluster Writer nonauthoritative restore 121 Windows Server Failover Clustering (WSFC) 140
S safe mode, booting in 131 save sets specifying for backup 113 URL encoding 75 searching for a recovery item 42 selecting items for recovery 41 server connecting to NetWorker 41 serverless backup 27 proxy client requirement 78 service port range specifying 54 SharePoint 2007 disaster backup and recovery 24 granular backup and recovery 24 simple recovery model 23 snapshot policies configuring 68 snapshots
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide
157
Index
158
EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide