Upload
joejr4u9489
View
43
Download
3
Tags:
Embed Size (px)
DESCRIPTION
this is an admin guide for netbackup
Citation preview
VeAd
for
Rel
12308276ritas NetBackup
ministrators Guide, Volume I
UNIX and Linux
ease 6.5
Veritas NetBackup Administrators Guide, Volume I
Copyright 1993-2007 Symantec Corporation. All rights reserved.
NetBackup 6.5
Symantec, the Symantec logo, and NetBackup are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Portions of this software are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections 12.212 and DFARS Section 227.7202.
Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com
Printed in the United States of America.
Third-party legal notices
Licen
TechnThird-party software may be recommended, distributed, embedded, or bundled with this Veritas product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.
sing and registration Veritas NetBackup is a licensed product. See the NetBackup Installation Guide for license installation instructions.
ical support For technical assistance, visit http://entsupport.symantec.com and select phone or email support. Use the Knowledge Base search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and our customer email notification service.
Contents
Chap
How to configure NetBackup .............................................................................46
Chapter 2 Activity Monitor ter 1 Introduction Overview ................................................................................................................31
Earlier versions of the NetBackup-Java Administration Console on
Earlier versions of the NetBackup-Java Administration Console on
NetBackup administration interfaces ...............................................................34
NetBackup Administration Console setup .......................................................35
Running the Java-based Windows Display Console ...............................37
Administering remote servers ...................................................................38
Administering multiple versions of NetBackup servers ........................38
UNIX platforms ............................................................................38
Windows platforms ......................................................................38
Remote display-back from UNIX servers .........................................38
Remote display-back from Windows servers ..................................39
At the console of the server with an earlier version of NetBackup 39
Using the NetBackup Administration Console ...............................................40
NetBackup configuration wizards .............................................................41
Backup, Archive, and Restore ....................................................................42
Activity Monitor ...........................................................................................42
NetBackup Management .............................................................................42
Reports ...................................................................................................42
Policies ...................................................................................................43
Storage ...................................................................................................43
Catalog ...................................................................................................44
Host Properties .....................................................................................44
Media and Device Management .................................................................44
Device Monitor .....................................................................................45
Media ......................................................................................................45
Devices ...................................................................................................45
Credentials ............................................................................................45
Access Management ....................................................................................45
Standard and user toolbars ........................................................................46
Customizing the administration console .................................................46
Using LiveUpdate to distribute NetBackup updates ......................................46
6
Introduction to the Activity Monitor ............................................................... 50
Activity Monitor menu bar ......................................................................... 51
ChapStatus bar ...................................................................................................... 54
Setting Activity Monitor options .............................................................. 54
Jobs tab .................................................................................................................. 56
Parent jobs .................................................................................................... 56
Daemons tab ......................................................................................................... 58
More about daemons ................................................................................... 60
Other Symantec services ............................................................................ 61
Processes tab ........................................................................................................ 62
Monitoring NetBackup processes ............................................................. 66
Media mount errors ............................................................................................. 67
Queued media mount errors ...................................................................... 67
Canceled media mount errors .................................................................... 67
Managing the jobs database ............................................................................... 67
Retaining job information in the database .............................................. 68
Changing the default on a permanent basis .................................... 68
BPDBJOBS_OPTIONS environment variable ................................... 69
bpdbjobs debug log ...................................................................................... 70
Customizing bpdbjobs output .................................................................... 70
ter 3 Reports Introduction to the Reports utility ................................................................... 72
Reports window ................................................................................................... 73
Shortcut menus ............................................................................................ 73
Reports settings ........................................................................................... 74
Date/Time range .................................................................................. 74
Client ...................................................................................................... 74
Disk pool ................................................................................................ 74
Disk type ................................................................................................ 74
Job ID ..................................................................................................... 74
Media ID ................................................................................................ 74
Media owner ......................................................................................... 75
Media server ......................................................................................... 75
Path ........................................................................................................ 75
Storage unit .......................................................................................... 75
Verbose listing ...................................................................................... 75
Volume ID ............................................................................................. 75
Volume pool .......................................................................................... 75
Run report ............................................................................................. 75
Stop report ............................................................................................ 75
NetBackup report types ...................................................................................... 76
Status of Backups report ........................................................................... 76
7
Client Backups report .................................................................................76
Problems report ...........................................................................................76
ChapAll Log Entries report ..................................................................................76
Images on Media report ..............................................................................76
Media Logs report ........................................................................................77
Tape Reports .................................................................................................77
Images on Tape report .......................................................................77
Tape Logs report .................................................................................77
Tape Contents report ..........................................................................77
Tape Summary report ........................................................................78
Tape Written report ............................................................................78
Tape Lists report .................................................................................78
Disk Reports ..................................................................................................79
Images on Disk report ........................................................................79
Disk Logs report ..................................................................................79
Disk Storage Unit Status report ........................................................79
Disk Pool Status report ......................................................................80
Using the Troubleshooter within reports ........................................................80
ter 4 Policies Using the Policies utility .....................................................................................82
Tree and detail views ...................................................................................82
Policies menu bar .........................................................................................82
Configuring backup policies ...............................................................................82
Changing policies .................................................................................................84
Policy Attributes tab ............................................................................................87
Policy type .....................................................................................................88
Data classification ........................................................................................90
Policy storage ..............................................................................................91
Considerations before a storage destination is selected ................92
Policy volume pool .......................................................................................93
Volume pool override example ..........................................................94
Checkpoint restart for backup jobs ...........................................................95
Checkpoint frequency .........................................................................95
Checkpoint restart support ................................................................95
Checkpoint restart for restore jobs ...................................................97
Limit jobs per policy ....................................................................................97
Notes on the Limit jobs per policy attribute ....................................97
Job priority ....................................................................................................98
Media owner .................................................................................................99
Active. Go into effect at ...............................................................................99
Backup network drives ..............................................................................100
Setup example with UNC paths .......................................................100
8
Example using the Backup network drives attribute ...................101
Follow NFS ..................................................................................................101
Notes on Follow NFS .........................................................................102
Advantages of the Follow NFS attribute ........................................102
Disadvantages of the Follow NFS attribute ...................................102
Cross mount points ....................................................................................103
Notes on cross mount points ...........................................................103
Cases that can require separate policies ........................................104
How the Cross mount points attribute interacts with Follow NFS 104
Cross mount point examples ............................................................104
Compression ...............................................................................................105
Advantages of the Compression attribute .....................................106
Disadvantages of the Compression attribute ................................106
How much compression can be expected? .....................................106
Encryption ..................................................................................................107
Collect disaster recovery information for IDR ......................................108
Collect disaster recovery information for Bare Metal Restore ...........108
Collect true image restore information ..................................................108
Collect true image restore information with move detection ............109
What happens during true image restores ....................................110
Notes on true image restores and move detection .......................111
Allow multiple data streams ....................................................................112
When to use multiple data streams ................................................113
Enable document restore .......................................................................... 115
Keyword phrase .........................................................................................116
Snapshot Client options ............................................................................116
Schedules tab ......................................................................................................117
Schedule Attributes tab ....................................................................................118
Name ............................................................................................................118
Type of backup ...........................................................................................119
Full backup ..........................................................................................119
Cumulative incremental backup .....................................................120
Differential incremental backup .....................................................120
User backup ........................................................................................120
User archive ........................................................................................120
Application backup ............................................................................121
Automatic backup ..............................................................................121
Automatic incremental backup .......................................................121
Automatic cumulative incremental backup ..................................121
Automatic differential incremental backup ..................................121
Automatic full backup .......................................................................121
Automatic Vault .................................................................................122
Vault catalog backup .........................................................................122
9
More on incremental backups ..........................................................122
Determining files due for backup on Windows clients ................125
Determining files due for backup on UNIX clients .......................126
Synthetic backup ........................................................................................128
Calendar schedule type .............................................................................128
Retries allowed after runday ............................................................128
Frequency schedule type ..........................................................................128
Guidelines for setting backup frequency .......................................129
Backup frequency determines schedule priority ..........................130
Instant recovery .........................................................................................131
Snapshots and copy snapshots to a storage unit ..........................131
Snapshots only ...................................................................................131
Multiple copies ...........................................................................................131
Multiple copies and disk staging storage units .............................132
Multiple copies and storage lifecycle policies ...............................132
Multiple copies configuration ..........................................................133
Restoring from a specific backup copy ...........................................136
Override policy storage selection ............................................................137
Override policy volume pool ....................................................................137
Override media owner ...............................................................................137
Retention .....................................................................................................138
Guidelines for assigning retention periods ....................................138
Precautions for assigning retention periods .................................139
Changing retention periods ..............................................................140
Mixing retention levels on tape volumes .......................................140
Media multiplexing ....................................................................................141
Final destination storage unit ..................................................................141
Final destination volume pool .................................................................141
Start Window tab ...............................................................................................143
Exclude dates tab ...............................................................................................145
Calendar schedule tab .......................................................................................146
Schedule by specific dates ........................................................................146
Schedule by recurring week days ............................................................147
Schedule by recurring days of the month ..............................................148
How calendar scheduling interacts with daily windows ......................149
Automatic-backup schedule examples ...................................................151
Considerations for user schedules ..........................................................151
Planning user backup and archive schedules ................................151
Creating separate policies for user schedules ...............................152
Using a specific policy and user schedule ......................................152
Example policies ................................................................................................153
Policy planning guidelines for backups ..................................................154
Group the clients ................................................................................154
10
Gather information about clients ....................................................154
Consider storage requirements .......................................................154
Backup and restore of extended attribute files and named data streams
Ramifications of backing up extended attributes or named data streams
Consider backup schedules ..............................................................155
Group by general attributes .............................................................156
Clients tab ...........................................................................................................159
To install client software on trusting UNIX clients .............................160
To install software on secure UNIX clients ...........................................162
To install software on Windows clients .................................................162
To configure a snapshot method .............................................................162
Backup Selections tab .......................................................................................163
Lists for different policy types ................................................................163
Backup selections list for standard policies ..................................163
Backup selections list for database policies ...................................165
Methods for faster backups ......................................................................166
Dividing file lists between multiple policies ..................................166
Allowing multiple data streams ......................................................167
Verifying the backup selections list ........................................................167
Rules to indicate paths in the backup selections list ...................................170
Path rules for Microsoft Windows clients .............................................170
File backups ........................................................................................170
Windows disk-image (Raw) backups ...............................................171
Microsoft Windows registry backup ...............................................172
Hard links to files (NTFS volumes or UNIX) ..................................173
Pathname rules for UNIX clients ............................................................176
Notes on UNIX pathnames ...............................................................176
Symbolic links to files or directories ..............................................177
Hard links to directories ...................................................................178
Hard links to files ...............................................................................178
UNIX raw partitions ..........................................................................178
180
182
Restoring extended attributes or named data streams ...............182
Path rules for NetWare NonTarget clients ............................................183
Path rules for NetWare Target clients ...................................................185
Path rules for clients running extension products ..............................185
Backup selections list directives: General discussion ..........................185
ALL_LOCAL_DRIVES directive ........................................................186
SYSTEM_STATE directive ................................................................186
Shadow copy components:\ directive .............................................187
Directives for multiple data streams ..............................................188
Directives for specific policy types .................................................188
11
Backup selections list directives for multiple data streams ................189
NEW_STREAM directive and multiple data streams ...................189
ChapALL_LOCAL_DRIVES directive and multiple data streams .........192
UNSET, UNSET_ALL directives, and multiple data streams ......193
Excluding files from backups ...................................................................194
Files that are excluded from backups by default ..........................194
Excluding files from automatic backups ........................................195
Disaster Recovery tab ........................................................................................196
Path ..............................................................................................................197
Logon ...........................................................................................................197
Password .....................................................................................................197
Send in an email attachment ...................................................................197
Identifying critical policies ......................................................................197
Creating a Vault policy ......................................................................................199
Performing manual backups ............................................................................200
More about synthetic backups .........................................................................201
Policy considerations and synthetic backups ........................................201
Two types of synthetic backups ...............................................................203
Synthetic full backups .......................................................................203
Synthetic cumulative incremental backups ..................................204
Recommendations for synthetic backups ..............................................206
Notes on synthetic backups ......................................................................207
Displaying synthetic backups in the Activity Monitor ........................210
Logs produced during synthetic backups ...............................................210
Synthetic backups and directory and file attributes ............................211
ter 5 Storage units, unit groups, and lifecycle policies Introduction to the Storage utility ..................................................................214
Using the Storage utility ...........................................................................215
Storage units .......................................................................................................216
Creating a storage unit ..............................................................................217
Changing storage unit settings ................................................................218
Deleting storage units ...............................................................................218
Media Manager storage unit considerations .........................................220
Disk storage unit considerations .............................................................222
Disk storage model .............................................................................222
Disk storage units in storage lifecycle policies .............................224
Maintaining available space on disk storage units .......................225
NDMP storage unit considerations .........................................................227
Storage unit settings .........................................................................................228
Absolute pathname to directory/volume ...............................................228
Density .........................................................................................................229
Disk pool ......................................................................................................229
12
Disk type ......................................................................................................229
Enable block sharing .................................................................................229
Using the Maximum concurrent jobs setting to control the storage unit
Finding the potential free space on a BasicDisk disk staging storage unit
Enable multiplexing ..................................................................................230
High water mark ........................................................................................230
Low water mark ..........................................................................................230
Maximum concurrent write drives .........................................................231
Maximum concurrent jobs .......................................................................231
and media server load ...............................................................232
Maximum streams per drive ....................................................................233
Media server ...............................................................................................233
NDMP host ..................................................................................................235
On demand only .........................................................................................235
Only use the following media servers ....................................................236
Properties button .......................................................................................236
Reduce fragment size ................................................................................238
Robot number ............................................................................................239
Robot type ..................................................................................................239
Staging relocation schedule (for basic disk staging only) ...................239
Storage device ............................................................................................239
Storage unit name .....................................................................................239
Storage unit type .......................................................................................240
Temporary staging area ...........................................................................240
Transfer throttle ........................................................................................240
Use any available media server ...............................................................240
Staging backups to initial storage, then final storage .................................242
Two staging methods ................................................................................242
Basic disk staging ..............................................................................................244
Disk staging storage unit size and capacity considerations ...............245
246
Creating a basic disk staging storage unit .............................................247
Disk Staging Schedule dialog ...................................................................249
Name ....................................................................................................249
Priority of relocation jobs started from this schedule .................250
Final destination storage unit ..........................................................250
Final destination volume pool .........................................................250
Final destination media owner ........................................................250
Use alternate read server .................................................................251
Basic disk staging limitations ..................................................................251
Initiating a relocation schedule manually .............................................251
Storage Lifecycle Policies .................................................................................253
Storage lifecycle overview ........................................................................253
13
To create a storage lifecycle policy .........................................................254
Adding storage destinations to a lifecycle policy .................................255
ChapWriting multiple copies using a lifecycle .......................................256
Storage lifecycle policy name ...........................................................258
Duplication job priority .....................................................................258
Storage destinations ..........................................................................258
Use storage destination for: backup or duplication .....................259
Storage unit .........................................................................................259
Volume pool ........................................................................................259
Media owner ........................................................................................259
Retention type: Fixed .........................................................................260
Retention type: Staged capacity managed .....................................260
Retention type: Expire after duplication ........................................262
Alternate read server .........................................................................262
Data classification ......................................................................................262
How backup data is associated with a data classification ...........263
Creating or changing a data classification .....................................263
Optional duplication job configuration ..................................................264
MIN_KB_SIZE_PER_DUPLICATION_JOB .......................................264
MAX_KB_SIZE_PER_DUPLICATION_JOB ......................................264
MAX_MINUTES_TIL_FORCE_SMALL_DUPLICATION_JOB .......264
LIFECYCLE_PARAMETERS file example ........................................265
Using nbstlutil to administrate lifecycle operations ............................265
When to use nbstlutil ........................................................................265
Storage unit groups ...........................................................................................267
Storage unit selection criteria within a group ......................................267
Prioritized ...........................................................................................267
Failover ................................................................................................267
Round robin ........................................................................................267
Load balance .......................................................................................267
Exception to the storage unit selection criteria ............................270
Disk spanning within storage unit groups .............................................271
Creating a storage unit group ..................................................................271
Deleting a storage unit group ..................................................................273
ter 6 NetBackup Catalog What is a NetBackup catalog? ..........................................................................276
Parts of the catalog ....................................................................................276
Image database ...........................................................................................277
Image files ...........................................................................................278
Image .f files ........................................................................................278
NetBackup relational database ................................................................280
Enterprise Media Manager (EMM) database ..................................281
14
Catalog protection .............................................................................................282
Catalog backups .........................................................................................282
Running online, hot catalog backups concurrently with other backups
Differences between importing, browsing, and restoring Backup Exec
Online, hot catalog backup method ................................................283
294
Notes on catalog policy schedules ...................................................294
Offline, cold catalog backup method ..............................................296
Recovering the catalog .....................................................................................317
Disaster recovery emails and the disaster recovery file ..............................317
Archiving the catalog ........................................................................................318
Catalog archiving process ........................................................................318
Creating a catalog archiving policy ........................................................319
Policy name .........................................................................................319
Deactivate policy ................................................................................319
Type of backup ...................................................................................320
Retention level setting ......................................................................320
Catalog archiving commands ...........................................................321
Recommendations for using catalog archiving ............................322
Using Vault with the catalog archiving feature ............................323
Browsing offline catalog archive .....................................................323
Extracting images from the catalog archives ................................323
Using the Catalog utility ...................................................................................324
Searching for backup images ...................................................................324
Notes on searching for an image .............................................................326
Messages pane ............................................................................................326
Verifying backup images ..........................................................................327
Viewing job results .................................................................................... 327
Promoting a copy to a primary copy .......................................................328
Duplicating backup images ......................................................................330
Notes on multiplexed duplication ...................................................330
Procedure for duplicating backups .................................................331
Jobs displayed while making multiple copies ........................................334
Importing NetBackup or Backup Exec images ......................................336
Importing expired images ................................................................341
Importing images from Backup Exec media ..................................342
Host properties for Backup Exec .....................................................342
Considerations concerning importing Backup Exec media .........342
and NetBackup images ..............................................................343
Expiring backup images ............................................................................346
Catalog maintenance and performance optimization .................................347
Determining catalog space requirements ..............................................347
File size considerations .....................................................................348
15
Backing up catalogs manually .................................................................350
How do I know if a catalog backup succeeded? .............................351
ChapStrategies to ensure successful catalog backups ..................................352
About the binary catalog format .............................................................353
Catalog conversion utility .................................................................354
Binary catalog file limitations ..........................................................354
Moving the image catalog .........................................................................354
Indexing the catalog for faster access to backups ................................355
Compressing and uncompressing the image catalog ...........................355
Uncompressing the image catalog ..................................................357
ter 7 Host properties Introduction to host properties .......................................................................360
Viewing host properties ............................................................................360
Changing host properties .................................................................................361
Interpreting the initial settings ...............................................................361
Selecting multiple hosts ............................................................................363
Required permissions ........................................................................................364
Master server, media server, and client host properties .............................364
Access Control properties .........................................................................364
Symantec Product Authentication and Authorization ................365
Symantec Product Authentication and Authorization tab within the Access
Control properties ..............................................................................365
Networks list .......................................................................................366
Add button ..........................................................................................366
Remove button ...................................................................................368
Authentication Domain tab within the Access Control properties ....368
Add button ..........................................................................................369
Remove button ...................................................................................371
Authorization Service tab within the Access Control properties .......371
Host name ...........................................................................................371
Customize the port number of the authorization service ...........372
Authorization properties ..........................................................................373
User ......................................................................................................373
Host ......................................................................................................374
Domain\Group ....................................................................................374
Group/Domain type ...........................................................................374
User must be an OS administrator ..................................................374
Backup Exec Tape Reader properties ......................................................375
Add button ..........................................................................................375
GRFS advertised name ......................................................................375
Actual client name .............................................................................376
Actual path ..........................................................................................376
16
Change button ....................................................................................376
Remove button ...................................................................................376
Bandwidth properties ................................................................................377
How bandwidth limiting works .......................................................377
Bandwidth throttle setting for the range of IP addresses ...........378
From IP address .................................................................................378
To IP address ......................................................................................378
Bandwidth ...........................................................................................378
Bandwidth throttle settings list ......................................................378
Add button ..........................................................................................378
Remove button ...................................................................................379
Notes on bandwidth limits ...............................................................379
Busy File Settings properties ...................................................................380
For the Busy File Settings to take effect .........................................380
Working directory .............................................................................381
Operators email address ..................................................................381
Process busy files ...............................................................................381
File action file list ..............................................................................381
Add button ..........................................................................................381
Add to all button ................................................................................381
Remove button ...................................................................................382
Busy file action ...................................................................................382
Retry count .........................................................................................382
Clean-up properties ...................................................................................383
Keep logs .............................................................................................383
Keep vault logs ...................................................................................383
Image cleanup ....................................................................................384
Catalog cleanup wait time ................................................................384
Keep true image restoration (TIR) information ............................384
Move restore job from incomplete state to done state ................385
Move backup job from incomplete state to done state ................385
Client Attributes properties .....................................................................386
Allow client browse ...........................................................................386
Allow client restore ...........................................................................386
Clients list ...........................................................................................387
General tab ..................................................................................................387
Maximum data streams ....................................................................387
Browse and restore ability ................................................................388
Free browse .........................................................................................388
Connect Options tab ..................................................................................388
BPCD connect back ............................................................................389
Ports .....................................................................................................389
Daemon connection port ..................................................................390
17
Windows Open File Backup tab ...............................................................391
Add and remove buttons ...................................................................391
Enable Windows Open File Backups for this client ......................392
Use Veritas Volume Snapshot Provider (VSP) ..............................392
Use Microsoft Volume Shadow Copy Service (VSS) .....................392
Individual drive snapshot .................................................................393
Global drive snapshot ........................................................................393
Abort backup on error .......................................................................394
Disable snapshot and continue ........................................................394
Client Name properties .............................................................................395
Client name .........................................................................................395
Client Settings (NetWare) properties ......................................................396
Back up migrated files .......................................................................396
Uncompress files before backing up ...............................................396
Keep status of user-directed backups, archives, and restores ....396
Client Settings (UNIX) properties ............................................................397
Locked file action ...............................................................................397
Keep status of user-directed backups, archives, and restores ....397
Reset file access time to the value before backup .........................398
Megabytes of memory to use for file compression .......................398
Use VxFS file change log for incremental backups ......................398
Default cache device path for snapshots ........................................400
Do not compress files ending with ..................................................401
Add button ..........................................................................................401
Add to all button .................................................................................401
Remove button ...................................................................................401
Client Settings (Windows) properties .....................................................402
General level logging .........................................................................402
TCP level logging ................................................................................402
Wait time before clearing archive bit .............................................403
Use change journal in incrementals ...............................................403
Incrementals based on timestamp ..................................................405
Incrementals based on archive bit ..................................................405
Time overlap .......................................................................................405
Communications buffer size ............................................................406
User directed timeouts ......................................................................406
Maximum error messages for server ..............................................406
Keep status of user-directed backups, archives, and restores ....406
Perform default search for restore ..................................................406
Data Classification properties ..................................................................407
Rank .....................................................................................................407
Name ....................................................................................................408
Description ..........................................................................................408
18
Classification ID .................................................................................408
Encryption properties ...............................................................................409
Encryption permissions ....................................................................409
Enable encryption ..............................................................................410
Enable standard encryption .............................................................410
Client cipher .......................................................................................410
Use legacy DES encryption ..............................................................410
Encryption strength ..........................................................................410
Encryption libraries ..........................................................................411
Encryption key file ............................................................................411
Exchange properties ..................................................................................412
Snapshot verification I/O throttle ..................................................412
Backup option for log files during full backups ............................413
Mailbox for message level backup and restore .............................413
Enable single instance backup for message attachments ...........413
Exclude Lists properties ...........................................................................414
Use case sensitive exclude list .........................................................414
Exclude list ..........................................................................................414
Exceptions to the exclude list ..........................................................414
Add buttons ........................................................................................414
Add to all buttons ...............................................................................415
Remove buttons .................................................................................416
Shared fields in exclude lists ...................................................................416
Policy ...................................................................................................416
Schedule ..............................................................................................416
Files/Directories .................................................................................416
Exclude lists for specific policies or schedules .....................................416
Syntax rules for exclude lists ...................................................................418
Traversing excluded directories ..............................................................419
Fibre Transport properties .......................................................................422
Preferred .............................................................................................422
Always .................................................................................................423
Never .................................................................................................... 423
Maximum concurrent FT connections ...........................................423
Use defaults from the master server configuration .....................423
Firewall properties ....................................................................................424
Default connect options ....................................................................424
Hosts list ..............................................................................................426
Attributes for selected hosts ............................................................427
Example setup for using the vnetd port .........................................429
General Server properties ........................................................................431
Delay on multiplexed restores .........................................................431
Check the capacity of disk storage units ........................................431
19
Must use local drive ...........................................................................432
Use direct access recovery for NDMP restores .............................432
Document-level restore options ......................................................432
Media host override ...........................................................................433
Add button ..........................................................................................433
Add to all button .................................................................................433
Change button ....................................................................................433
Remove button ...................................................................................434
Global Attributes properties ....................................................................435
Job retry delay ....................................................................................435
Schedule backup attempts ................................................................435
Policy update interval .......................................................................436
Priority of restore jobs ......................................................................436
Maximum jobs per client ..................................................................436
Maximum backup copies ...................................................................437
Compress catalog interval ................................................................438
Maximum vault jobs ..........................................................................438
Administrator email address ............................................................438
Setting up email notifications ..................................................................438
Indicating email notification in the NetBackup host properties 439
Email contents ....................................................................................440
Logging properties .....................................................................................441
Types of logging .................................................................................441
Enable robust logging ........................................................................442
Global logging level ...........................................................................443
Process specific overrides .................................................................443
Debug logging levels for NetBackup services ................................444
Lotus Notes properties ..............................................................................445
Path ......................................................................................................445
INI file ..................................................................................................445
Media properties ........................................................................................446
Allow media overwrite ......................................................................446
Enable SCSI reserve ...........................................................................447
Allow multiple retentions per media ..............................................449
Allow backups to span tape media ..................................................449
Allow backups to span disk ...............................................................450
Enable standalone drive extension .................................................450
Enable job logging ..............................................................................450
Enable unrestricted media sharing for all media servers ............450
Media ID prefix (non-robotic) ...........................................................451
Media unmount delay ........................................................................451
Media request delay ...........................................................................451
NDMP Global Credentials properties ......................................................452
20
User name ...........................................................................................453
Password and confirm password .....................................................453
NetWare Client properties .......................................................................453
Network properties ....................................................................................454
NetBackup client service port (BPCD) ............................................454
NetBackup request service port (BPRD) .........................................454
Announce DHCP interval ..................................................................455
Open File Backup (NetWare client) properties .....................................455
Enable open file backup during backups ........................................455
Port Ranges properties .............................................................................456
Use random port assignments .........................................................457
Client port window ............................................................................457
Client reserved port window ............................................................457
Server port window ...........................................................................458
Server reserved port window ...........................................................458
Restore Failover properties ......................................................................459
Alternate restore failover machines list ........................................460
Add button ..........................................................................................460
Change button ....................................................................................461
Remove button ...................................................................................461
Media server .......................................................................................461
Failover restore servers ....................................................................461
Retention Periods properties ...................................................................462
Value ....................................................................................................462
Units ....................................................................................................462
Retention periods list ........................................................................462
Schedules list ......................................................................................463
Impact report button .........................................................................463
Note on redefining retention periods .............................................464
Servers properties .....................................................................................465
Master server ......................................................................................465
Additional servers ..............................................................................465
Media servers .....................................................................................466
Restricting administrative privileges of media servers ...............466
Multiple masters that share one Enterprise Media Manager host 467
SharedDisk properties ..............................................................................470
SharedDisk mount points directory ................................................470
SharePoint 2003 properties .....................................................................471
User ID .................................................................................................471
Password .............................................................................................471
Consistency check before backup ....................................................471
Continue with backup if consistency check fails ..........................472
SharePoint Hosts properties .................................................................... 472
21
Symantec Products properties .................................................................473
Timeouts properties ..................................................................................474
ChapClient connect timeout ......................................................................474
Backup start notify timeout .............................................................474
File browse timeout ...........................................................................475
Use OS dependent timeouts .............................................................475
Media mount timeout ........................................................................475
Client read timeout ............................................................................475
Backup end notify timeout ...............................................................476
Media server connect timeout .........................................................476
Universal Settings properties ..................................................................477
Restore retries ....................................................................................477
Browse timeframe for restores ........................................................478
Last full backup ..................................................................................478
Use specified network interface ......................................................478
Use preferred group for enhanced authorization .........................479
Allow server file writes .....................................................................480
Accept connections on non reserved ports ....................................480
Enable performance data collection (Windows server only) .......481
Client sends mail ................................................................................481
Server sends mail ...............................................................................481
Client administrators email ............................................................481
UNIX Client properties ..............................................................................482
UNIX Server properties .............................................................................483
NFS access timeout ............................................................................483
VMWare Proxy Servers properties .........................................................484
VSP (Volume Snapshot Provider) properties ........................................485
VSP overview ......................................................................................485
Logging VSP messages ......................................................................487
Cache file volume list ........................................................................487
VSP volume exclude list ....................................................................488
Customize cache size .........................................................................490
Cache size ............................................................................................490
Maximum cache size ..........................................................................490
Busy file wait .......................................................................................491
Busy file timeout ................................................................................492
Using VSP with databases ................................................................492
Windows Client properties .......................................................................494
ter 8 Device Monitor Changing the operating mode of a drive ........................................................495
Resetting a drive ................................................................................................496
Managing drive paths ........................................................................................497
22
Managing pending requests and actions .......................................................497
Pending requests for storage units .........................................................498
ChapResolving a pending request ....................................................................499
Resolving a pending action ......................................................................500
Resubmitting a request .............................................................................500
Denying a request ......................................................................................501
Freezing media or downing drives ..................................................................501
Cleaning drives ...................................................................................................502
Adding or changing a drive comment ............................................................504
Viewing drive details .........................................................................................504
ter 9 Media Volume operations ............................................................................................507
Adding volumes .........................................................................................508
Adding volumes overview ................................................................508
About labeling NetBackup volumes ................................................510
Adding volumes by using the Volume Configuration Wizard ....511
Adding volumes using a robot inventory update ..........................511
Adding volumes using the Actions menu ......................................512
Volumes properties ...........................................................................513
Changing volume properties ....................................................................517
Change Volumes properties .............................................................518
Changing the volume pool of a volume ..................................................519
Changing the volume group of a volume ...............................................519
Changing the owner of a volume .............................................................520
Freezing and unfreezing media ...............................................................520
Suspending and unsuspending media ....................................................521
Labeling media ...........................................................................................521
Label properties .................................................................................523
Rescanning and updating barcodes ........................................................ 523
When to rescan and update ..............................................................523
When not to rescan and update .......................................................523
Rescanning/updating barcodes .......................................................524
Moving volumes .........................................................................................524
Move examples ...................................................................................525
Moving volumes using the robot inventory update option .........525
Moving volumes using the Actions menu ......................................525
Move Volumes properties .................................................................526
Erasing media .............................................................................................528
Injecting and ejecting volumes ................................................................529
Injecting volumes ..............................................................................530
Ejecting volumes ................................................................................530
Media ejection timeout periods .......................................................532
23
Deleting volumes .......................................................................................532
Deassigning volumes .................................................................................533
Deassigning NetBackup volumes .....................................................534
Deassigning Veritas Storage Migrator volumes ............................535
Exchanging volumes ..................................................................................535
Exchanging a volume and using a new media ID ..........................535
Exchanging a volume and using the old media ID ........................536
Recycling volumes .....................................................................................537
Recycling volumes using the existing media ID ............................537
Recycling volumes using a new media ID ......................................537
Volume pool operations ....................................................................................538
Adding a new volume pool ........................................................................539
Changing the properties of a volume pool .............................................539
Volume pool properties .............................................................................540
Catalog backup pool ...........................................................................540
Description ..........................................................................................540
Maximum number of partially full media ......................................540
Pool name ............................................................................................541
Scratch pool ........................................................................................541
Deleting a volume pool ..............................................................................542
Volume group operations .................................................................................542
Moving a volume group ............................................................................542
Move volume group properties ........................................................543
Deleting a volume group ...........................................................................544
Robot inventory operations .............................................................................544
When to inventory a robot .......................................................................545
Inventory a robot .......................................................................................547
Robot Inventory dialog box ....................................................................548
Advanced options ...............................................................................548
Compare contents with volume configuration ..............................549
Device host ..........................................................................................549
Empty media access port prior to update .......................................550
Preview volume configuration changes .........................................550
Robot ....................................................................................................551
Show contents ....................................................................................551
Update volume configuration ..........................................................553
Advanced Robot Inventory Options dialog ............................................555
Media Settings tab ...................................................................................555
Label optical media (Local host only) ..............................................556
Media type ...........................................................................................556
Media that have been removed from the robot .............................559
Media that have been moved into or within the robot .................559
Use barcode rules ...............................................................................560
24
Use the following Media ID prefix ..................................................560
Volume pool ........................................................................................561
ChapBarcode Rules tab ......................................................................................562
Barcode tag .........................................................................................562
Description ..........................................................................................563
Maximum mounts ..............................................................................563
Media type ...........................................................................................563
Volume pool ........................................................................................565
Media ID Generation tab .........................................................................565
Barcode length ...................................................................................566
Media ID generation rule ..................................................................566
Robot number .....................................................................................566
Media Type Mappings tab ......................................................................566
Adding mapping entries ...................................................................567
Default and allowable media types .................................................568
Using the physical inventory utility .......................................................572
Features of vmphyinv .......................................................................573
Requirements and restrictions for vmphyinv ...............................573
When to use vmphyinv .....................................................................573
How vmphyinv performs a physical inventory .............................574
Obtains a list of drives to mount the media ...................................574
Obtains a list of media to be mounted ............................................574
Mounts media and reads the tape header ......................................576
Updates the EMM database ..............................................................577
Volume configuration update examples ................................................579
Example 1: Removing a volume from a robot ................................580
Example 2: Adding existing stand-alone volumes to a robot ......581
Example 3: Moving existing volumes within a robot ...................583
Example 4: Adding new volumes to a robot ...................................584
Example 5: Adding cleaning tapes to a robot ................................586
Example 6: Moving existing volumes between robots .................587
Example 7: Adding existing volumes when barcodes are not used 587
Using WORM media ..........................................................................................589
Supported drives ........................................................................................590
Managing your WORM media in NetBackup .........................................590
Using WORM volume pools to manage WORM media ................590
Using unique drive and media types to manage WORM media .591
WORM tape limitations ............................................................................592
ter 10 Devices Device configuration prerequisites ................................................................593
The device mapping file ....................................................................................594
Configuring robots and tape drives ................................................................595
25
Using the Device Configuration Wizard .................................................595
Operating system changes ................................................................596
Possible EMM server host conflict ..................................................596
Devices that are partially-configured .............................................596
Starting the Device Configuration Wizard ....................................597
Adding a robot ............................................................................................597
Robot properties .................................................................................598
Robot control configuration overview ............................................602
Adding or changing a drive ......................................................................604
Adding a shared drive .......................................................................605
Configuring SCSI reserve on a drive path ......................................605
Drive properties .................................................................................607
Configuring drive name rules ..........................................................611
Robot drive number for API robots .................................................613
No rewind device ................................................................................614
Configuring server groups for media sharing ...............................................615
Server group properties ............................................................................617
Server group name ......................