veritas netbackup 7 administration guide

792
Veritas NetBackup Administrator’s Guide, Volume I for UNIX and Linux Release 6.5 12308276

Upload: prakashv44

Post on 08-Apr-2015

210 views

Category:

Documents


1 download

TRANSCRIPT

Veritas NetBackup Administrators Guide, Volume Ifor UNIX and Linux

Release 6.5

12308276

Veritas NetBackup Administrators Guide, Volume I

Copyright 1993-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo, and NetBackup are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Portions of this software are derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Printed in the United States of America.

Third-party legal noticesThird-party software may be recommended, distributed, embedded, or bundled with this Veritas product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.

Licensing and registrationVeritas NetBackup is a licensed product. See the NetBackup Installation Guide for license installation instructions.

Technical supportFor technical assistance, visit http://entsupport.symantec.com and select phone or email support. Use the Knowledge Base search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and our customer email notification service.

Contents

Chapter 1

IntroductionOverview ................................................................................................................31 NetBackup administration interfaces ...............................................................34 NetBackup Administration Console setup .......................................................35 Running the Java-based Windows Display Console ...............................37 Administering remote servers ...................................................................38 Administering multiple versions of NetBackup servers ........................38 Earlier versions of the NetBackup-Java Administration Console on UNIX platforms ............................................................................38 Earlier versions of the NetBackup-Java Administration Console on Windows platforms ......................................................................38 Remote display-back from UNIX servers .........................................38 Remote display-back from Windows servers ..................................39 At the console of the server with an earlier version of NetBackup 39 Using the NetBackup Administration Console ...............................................40 NetBackup configuration wizards .............................................................41 Backup, Archive, and Restore ....................................................................42 Activity Monitor ...........................................................................................42 NetBackup Management .............................................................................42 Reports ...................................................................................................42 Policies ...................................................................................................43 Storage ...................................................................................................43 Catalog ...................................................................................................44 Host Properties .....................................................................................44 Media and Device Management .................................................................44 Device Monitor .....................................................................................45 Media ......................................................................................................45 Devices ...................................................................................................45 Credentials ............................................................................................45 Access Management ....................................................................................45 Standard and user toolbars ........................................................................46 Customizing the administration console .................................................46 Using LiveUpdate to distribute NetBackup updates ......................................46 How to configure NetBackup .............................................................................46

Chapter 2

Activity Monitor

6

Introduction to the Activity Monitor ............................................................... 50 Activity Monitor menu bar ......................................................................... 51 Status bar ...................................................................................................... 54 Setting Activity Monitor options .............................................................. 54 Jobs tab .................................................................................................................. 56 Parent jobs .................................................................................................... 56 Daemons tab ......................................................................................................... 58 More about daemons ................................................................................... 60 Other Symantec services ............................................................................ 61 Processes tab ........................................................................................................ 62 Monitoring NetBackup processes ............................................................. 66 Media mount errors ............................................................................................. 67 Queued media mount errors ...................................................................... 67 Canceled media mount errors .................................................................... 67 Managing the jobs database ............................................................................... 67 Retaining job information in the database .............................................. 68 Changing the default on a permanent basis .................................... 68 BPDBJOBS_OPTIONS environment variable ................................... 69 bpdbjobs debug log ...................................................................................... 70 Customizing bpdbjobs output .................................................................... 70

Chapter 3

ReportsIntroduction to the Reports utility ................................................................... 72 Reports window ................................................................................................... 73 Shortcut menus ............................................................................................ 73 Reports settings ........................................................................................... 74 Date/Time range .................................................................................. 74 Client ...................................................................................................... 74 Disk pool ................................................................................................ 74 Disk type ................................................................................................ 74 Job ID ..................................................................................................... 74 Media ID ................................................................................................ 74 Media owner ......................................................................................... 75 Media server ......................................................................................... 75 Path ........................................................................................................ 75 Storage unit .......................................................................................... 75 Verbose listing ...................................................................................... 75 Volume ID ............................................................................................. 75 Volume pool .......................................................................................... 75 Run report ............................................................................................. 75 Stop report ............................................................................................ 75 NetBackup report types ...................................................................................... 76 Status of Backups report ........................................................................... 76

7

Client Backups report .................................................................................76 Problems report ...........................................................................................76 All Log Entries report ..................................................................................76 Images on Media report ..............................................................................76 Media Logs report ........................................................................................77 Tape Reports .................................................................................................77 Images on Tape report .......................................................................77 Tape Logs report .................................................................................77 Tape Contents report ..........................................................................77 Tape Summary report ........................................................................78 Tape Written report ............................................................................78 Tape Lists report .................................................................................78 Disk Reports ..................................................................................................79 Images on Disk report ........................................................................79 Disk Logs report ..................................................................................79 Disk Storage Unit Status report ........................................................79 Disk Pool Status report ......................................................................80 Using the Troubleshooter within reports ........................................................80

Chapter 4

PoliciesUsing the Policies utility .....................................................................................82 Tree and detail views ...................................................................................82 Policies menu bar .........................................................................................82 Configuring backup policies ...............................................................................82 Changing policies .................................................................................................84 Policy Attributes tab ............................................................................................87 Policy type .....................................................................................................88 Data classification ........................................................................................90 Policy storage ..............................................................................................91 Considerations before a storage destination is selected ................92 Policy volume pool .......................................................................................93 Volume pool override example ..........................................................94 Checkpoint restart for backup jobs ...........................................................95 Checkpoint frequency .........................................................................95 Checkpoint restart support ................................................................95 Checkpoint restart for restore jobs ...................................................97 Limit jobs per policy ....................................................................................97 Notes on the Limit jobs per policy attribute ....................................97 Job priority ....................................................................................................98 Media owner .................................................................................................99 Active. Go into effect at ...............................................................................99 Backup network drives ..............................................................................100 Setup example with UNC paths .......................................................100

8

Example using the Backup network drives attribute ...................101 Follow NFS ..................................................................................................101 Notes on Follow NFS ......................................................................... 102 Advantages of the Follow NFS attribute ........................................102 Disadvantages of the Follow NFS attribute ................................... 102 Cross mount points .................................................................................... 103 Notes on cross mount points ...........................................................103 Cases that can require separate policies ........................................104 How the Cross mount points attribute interacts with Follow NFS 104 Cross mount point examples ............................................................ 104 Compression ............................................................................................... 105 Advantages of the Compression attribute ..................................... 106 Disadvantages of the Compression attribute ................................ 106 How much compression can be expected? ..................................... 106 Encryption ..................................................................................................107 Collect disaster recovery information for IDR ......................................108 Collect disaster recovery information for Bare Metal Restore ........... 108 Collect true image restore information .................................................. 108 Collect true image restore information with move detection ............ 109 What happens during true image restores .................................... 110 Notes on true image restores and move detection ....................... 111 Allow multiple data streams .................................................................... 112 When to use multiple data streams ................................................ 113 Enable document restore .......................................................................... 115 Keyword phrase ......................................................................................... 116 Snapshot Client options ............................................................................ 116 Schedules tab ...................................................................................................... 117 Schedule Attributes tab .................................................................................... 118 Name ............................................................................................................ 118 Type of backup ........................................................................................... 119 Full backup .......................................................................................... 119 Cumulative incremental backup ..................................................... 120 Differential incremental backup ..................................................... 120 User backup ........................................................................................ 120 User archive ........................................................................................ 120 Application backup ............................................................................ 121 Automatic backup ..............................................................................121 Automatic incremental backup ....................................................... 121 Automatic cumulative incremental backup .................................. 121 Automatic differential incremental backup .................................. 121 Automatic full backup ....................................................................... 121 Automatic Vault ................................................................................. 122 Vault catalog backup ......................................................................... 122

9

More on incremental backups ..........................................................122 Determining files due for backup on Windows clients ................125 Determining files due for backup on UNIX clients .......................126 Synthetic backup ........................................................................................128 Calendar schedule type .............................................................................128 Retries allowed after runday ............................................................128 Frequency schedule type ..........................................................................128 Guidelines for setting backup frequency .......................................129 Backup frequency determines schedule priority ..........................130 Instant recovery .........................................................................................131 Snapshots and copy snapshots to a storage unit ..........................131 Snapshots only ...................................................................................131 Multiple copies ...........................................................................................131 Multiple copies and disk staging storage units .............................132 Multiple copies and storage lifecycle policies ...............................132 Multiple copies configuration ..........................................................133 Restoring from a specific backup copy ...........................................136 Override policy storage selection ............................................................137 Override policy volume pool ....................................................................137 Override media owner ...............................................................................137 Retention .....................................................................................................138 Guidelines for assigning retention periods ....................................138 Precautions for assigning retention periods .................................139 Changing retention periods ..............................................................140 Mixing retention levels on tape volumes .......................................140 Media multiplexing ....................................................................................141 Final destination storage unit ..................................................................141 Final destination volume pool .................................................................141 Start Window tab ...............................................................................................143 Exclude dates tab ...............................................................................................145 Calendar schedule tab .......................................................................................146 Schedule by specific dates ........................................................................146 Schedule by recurring week days ............................................................147 Schedule by recurring days of the month ..............................................148 How calendar scheduling interacts with daily windows ......................149 Automatic-backup schedule examples ...................................................151 Considerations for user schedules ..........................................................151 Planning user backup and archive schedules ................................151 Creating separate policies for user schedules ...............................152 Using a specific policy and user schedule ......................................152 Example policies ................................................................................................153 Policy planning guidelines for backups ..................................................154 Group the clients ................................................................................154

10

Gather information about clients .................................................... 154 Consider storage requirements ....................................................... 154 Consider backup schedules .............................................................. 155 Group by general attributes ............................................................. 156 Clients tab ........................................................................................................... 159 To install client software on trusting UNIX clients ............................. 160 To install software on secure UNIX clients ........................................... 162 To install software on Windows clients ................................................. 162 To configure a snapshot method ............................................................. 162 Backup Selections tab ....................................................................................... 163 Lists for different policy types ................................................................ 163 Backup selections list for standard policies .................................. 163 Backup selections list for database policies ................................... 165 Methods for faster backups ...................................................................... 166 Dividing file lists between multiple policies .................................. 166 Allowing multiple data streams ...................................................... 167 Verifying the backup selections list ........................................................ 167 Rules to indicate paths in the backup selections list ................................... 170 Path rules for Microsoft Windows clients ............................................. 170 File backups ........................................................................................ 170 Windows disk-image (Raw) backups ............................................... 171 Microsoft Windows registry backup ............................................... 172 Hard links to files (NTFS volumes or UNIX) .................................. 173 Pathname rules for UNIX clients ............................................................ 176 Notes on UNIX pathnames ............................................................... 176 Symbolic links to files or directories .............................................. 177 Hard links to directories ................................................................... 178 Hard links to files ...............................................................................178 UNIX raw partitions .......................................................................... 178 Backup and restore of extended attribute files and named data streams 180 Ramifications of backing up extended attributes or named data streams 182 Restoring extended attributes or named data streams ............... 182 Path rules for NetWare NonTarget clients ............................................ 183 Path rules for NetWare Target clients ................................................... 185 Path rules for clients running extension products .............................. 185 Backup selections list directives: General discussion .......................... 185 ALL_LOCAL_DRIVES directive ........................................................ 186 SYSTEM_STATE directive ................................................................ 186 Shadow copy components:\ directive ............................................. 187 Directives for multiple data streams .............................................. 188 Directives for specific policy types ................................................. 188

11

Backup selections list directives for multiple data streams ................189 NEW_STREAM directive and multiple data streams ...................189 ALL_LOCAL_DRIVES directive and multiple data streams .........192 UNSET, UNSET_ALL directives, and multiple data streams ......193 Excluding files from backups ...................................................................194 Files that are excluded from backups by default ..........................194 Excluding files from automatic backups ........................................195 Disaster Recovery tab ........................................................................................196 Path ..............................................................................................................197 Logon ...........................................................................................................197 Password .....................................................................................................197 Send in an email attachment ...................................................................197 Identifying critical policies ......................................................................197 Creating a Vault policy ......................................................................................199 Performing manual backups ............................................................................200 More about synthetic backups .........................................................................201 Policy considerations and synthetic backups ........................................201 Two types of synthetic backups ...............................................................203 Synthetic full backups .......................................................................203 Synthetic cumulative incremental backups ..................................204 Recommendations for synthetic backups ..............................................206 Notes on synthetic backups ......................................................................207 Displaying synthetic backups in the Activity Monitor ........................210 Logs produced during synthetic backups ...............................................210 Synthetic backups and directory and file attributes ............................211

Chapter 5

Storage units, unit groups, and lifecycle policiesIntroduction to the Storage utility ..................................................................214 Using the Storage utility ...........................................................................215 Storage units .......................................................................................................216 Creating a storage unit ..............................................................................217 Changing storage unit settings ................................................................218 Deleting storage units ...............................................................................218 Media Manager storage unit considerations .........................................220 Disk storage unit considerations .............................................................222 Disk storage model .............................................................................222 Disk storage units in storage lifecycle policies .............................224 Maintaining available space on disk storage units .......................225 NDMP storage unit considerations .........................................................227 Storage unit settings .........................................................................................228 Absolute pathname to directory/volume ...............................................228 Density .........................................................................................................229 Disk pool ......................................................................................................229

12

Disk type ...................................................................................................... 229 Enable block sharing ................................................................................. 229 Enable multiplexing .................................................................................. 230 High water mark ........................................................................................ 230 Low water mark .......................................................................................... 230 Maximum concurrent write drives .........................................................231 Maximum concurrent jobs ....................................................................... 231 Using the Maximum concurrent jobs setting to control the storage unit and media server load ............................................................... 232 Maximum streams per drive .................................................................... 233 Media server ............................................................................................... 233 NDMP host ..................................................................................................235 On demand only ......................................................................................... 235 Only use the following media servers .................................................... 236 Properties button ....................................................................................... 236 Reduce fragment size ................................................................................ 238 Robot number ............................................................................................ 239 Robot type ..................................................................................................239 Staging relocation schedule (for basic disk staging only) ...................239 Storage device ............................................................................................ 239 Storage unit name ..................................................................................... 239 Storage unit type ....................................................................................... 240 Temporary staging area ........................................................................... 240 Transfer throttle ........................................................................................ 240 Use any available media server ............................................................... 240 Staging backups to initial storage, then final storage ................................. 242 Two staging methods ................................................................................ 242 Basic disk staging .............................................................................................. 244 Disk staging storage unit size and capacity considerations ............... 245 Finding the potential free space on a BasicDisk disk staging storage unit 246 Creating a basic disk staging storage unit ............................................. 247 Disk Staging Schedule dialog ................................................................... 249 Name .................................................................................................... 249 Priority of relocation jobs started from this schedule ................. 250 Final destination storage unit ..........................................................250 Final destination volume pool .........................................................250 Final destination media owner ........................................................ 250 Use alternate read server ................................................................. 251 Basic disk staging limitations .................................................................. 251 Initiating a relocation schedule manually ............................................. 251 Storage Lifecycle Policies ................................................................................. 253 Storage lifecycle overview ........................................................................ 253

13

To create a storage lifecycle policy .........................................................254 Adding storage destinations to a lifecycle policy .................................255 Writing multiple copies using a lifecycle .......................................256 Storage lifecycle policy name ...........................................................258 Duplication job priority .....................................................................258 Storage destinations ..........................................................................258 Use storage destination for: backup or duplication .....................259 Storage unit .........................................................................................259 Volume pool ........................................................................................259 Media owner ........................................................................................259 Retention type: Fixed .........................................................................260 Retention type: Staged capacity managed .....................................260 Retention type: Expire after duplication ........................................262 Alternate read server .........................................................................262 Data classification ......................................................................................262 How backup data is associated with a data classification ...........263 Creating or changing a data classification .....................................263 Optional duplication job configuration ..................................................264 MIN_KB_SIZE_PER_DUPLICATION_JOB .......................................264 MAX_KB_SIZE_PER_DUPLICATION_JOB ......................................264 MAX_MINUTES_TIL_FORCE_SMALL_DUPLICATION_JOB .......264 LIFECYCLE_PARAMETERS file example ........................................265 Using nbstlutil to administrate lifecycle operations ............................265 When to use nbstlutil ........................................................................265 Storage unit groups ...........................................................................................267 Storage unit selection criteria within a group ......................................267 Prioritized ...........................................................................................267 Failover ................................................................................................267 Round robin ........................................................................................267 Load balance .......................................................................................267 Exception to the storage unit selection criteria ............................270 Disk spanning within storage unit groups .............................................271 Creating a storage unit group ..................................................................271 Deleting a storage unit group ..................................................................273

Chapter 6

NetBackup CatalogWhat is a NetBackup catalog? ..........................................................................276 Parts of the catalog ....................................................................................276 Image database ...........................................................................................277 Image files ...........................................................................................278 Image .f files ........................................................................................278 NetBackup relational database ................................................................280 Enterprise Media Manager (EMM) database ..................................281

14

Catalog protection ............................................................................................. 282 Catalog backups ......................................................................................... 282 Online, hot catalog backup method ................................................ 283 Running online, hot catalog backups concurrently with other backups 294 Notes on catalog policy schedules ................................................... 294 Offline, cold catalog backup method .............................................. 296 Recovering the catalog ..................................................................................... 317 Disaster recovery emails and the disaster recovery file .............................. 317 Archiving the catalog ........................................................................................ 318 Catalog archiving process ........................................................................ 318 Creating a catalog archiving policy ........................................................ 319 Policy name ......................................................................................... 319 Deactivate policy ................................................................................ 319 Type of backup ................................................................................... 320 Retention level setting ...................................................................... 320 Catalog archiving commands ...........................................................321 Recommendations for using catalog archiving ............................ 322 Using Vault with the catalog archiving feature ............................ 323 Browsing offline catalog archive ..................................................... 323 Extracting images from the catalog archives ................................ 323 Using the Catalog utility ................................................................................... 324 Searching for backup images ................................................................... 324 Notes on searching for an image ............................................................. 326 Messages pane ............................................................................................ 326 Verifying backup images .......................................................................... 327 Viewing job results .................................................................................... 327 Promoting a copy to a primary copy ....................................................... 328 Duplicating backup images ...................................................................... 330 Notes on multiplexed duplication ................................................... 330 Procedure for duplicating backups ................................................. 331 Jobs displayed while making multiple copies ........................................334 Importing NetBackup or Backup Exec images ......................................336 Importing expired images ................................................................ 341 Importing images from Backup Exec media .................................. 342 Host properties for Backup Exec ..................................................... 342 Considerations concerning importing Backup Exec media ......... 342 Differences between importing, browsing, and restoring Backup Exec and NetBackup images .............................................................. 343 Expiring backup images ............................................................................ 346 Catalog maintenance and performance optimization ................................. 347 Determining catalog space requirements .............................................. 347 File size considerations ..................................................................... 348

15

Backing up catalogs manually .................................................................350 How do I know if a catalog backup succeeded? .............................351 Strategies to ensure successful catalog backups ..................................352 About the binary catalog format .............................................................353 Catalog conversion utility .................................................................354 Binary catalog file limitations ..........................................................354 Moving the image catalog .........................................................................354 Indexing the catalog for faster access to backups ................................355 Compressing and uncompressing the image catalog ...........................355 Uncompressing the image catalog ..................................................357

Chapter 7

Host propertiesIntroduction to host properties .......................................................................360 Viewing host properties ............................................................................360 Changing host properties .................................................................................361 Interpreting the initial settings ...............................................................361 Selecting multiple hosts ............................................................................363 Required permissions ........................................................................................364 Master server, media server, and client host properties .............................364 Access Control properties .........................................................................364 Symantec Product Authentication and Authorization ................365 Symantec Product Authentication and Authorization tab within the Access Control properties ..............................................................................365 Networks list .......................................................................................366 Add button ..........................................................................................366 Remove button ...................................................................................368 Authentication Domain tab within the Access Control properties ....368 Add button ..........................................................................................369 Remove button ...................................................................................371 Authorization Service tab within the Access Control properties .......371 Host name ...........................................................................................371 Customize the port number of the authorization service ...........372 Authorization properties ..........................................................................373 User ......................................................................................................373 Host ......................................................................................................374 Domain\Group ....................................................................................374 Group/Domain type ...........................................................................374 User must be an OS administrator ..................................................374 Backup Exec Tape Reader properties ......................................................375 Add button ..........................................................................................375 GRFS advertised name ......................................................................375 Actual client name .............................................................................376 Actual path ..........................................................................................376

16

Change button .................................................................................... 376 Remove button ................................................................................... 376 Bandwidth properties ................................................................................ 377 How bandwidth limiting works ....................................................... 377 Bandwidth throttle setting for the range of IP addresses ........... 378 From IP address ................................................................................. 378 To IP address ...................................................................................... 378 Bandwidth ........................................................................................... 378 Bandwidth throttle settings list ...................................................... 378 Add button .......................................................................................... 378 Remove button ................................................................................... 379 Notes on bandwidth limits ............................................................... 379 Busy File Settings properties ................................................................... 380 For the Busy File Settings to take effect ......................................... 380 Working directory .............................................................................381 Operators email address .................................................................. 381 Process busy files ...............................................................................381 File action file list ..............................................................................381 Add button .......................................................................................... 381 Add to all button ................................................................................ 381 Remove button ................................................................................... 382 Busy file action ................................................................................... 382 Retry count ......................................................................................... 382 Clean-up properties ................................................................................... 383 Keep logs ............................................................................................. 383 Keep vault logs ................................................................................... 383 Image cleanup .................................................................................... 384 Catalog cleanup wait time ................................................................ 384 Keep true image restoration (TIR) information ............................ 384 Move restore job from incomplete state to done state ................ 385 Move backup job from incomplete state to done state ................ 385 Client Attributes properties ..................................................................... 386 Allow client browse ........................................................................... 386 Allow client restore ........................................................................... 386 Clients list ........................................................................................... 387 General tab ..................................................................................................387 Maximum data streams .................................................................... 387 Browse and restore ability ................................................................ 388 Free browse ......................................................................................... 388 Connect Options tab .................................................................................. 388 BPCD connect back ............................................................................ 389 Ports ..................................................................................................... 389 Daemon connection port .................................................................. 390

17

Windows Open File Backup tab ...............................................................391 Add and remove buttons ...................................................................391 Enable Windows Open File Backups for this client ......................392 Use Veritas Volume Snapshot Provider (VSP) ..............................392 Use Microsoft Volume Shadow Copy Service (VSS) .....................392 Individual drive snapshot .................................................................393 Global drive snapshot ........................................................................393 Abort backup on error .......................................................................394 Disable snapshot and continue ........................................................394 Client Name properties .............................................................................395 Client name .........................................................................................395 Client Settings (NetWare) properties ......................................................396 Back up migrated files .......................................................................396 Uncompress files before backing up ...............................................396 Keep status of user-directed backups, archives, and restores ....396 Client Settings (UNIX) properties ............................................................397 Locked file action ...............................................................................397 Keep status of user-directed backups, archives, and restores ....397 Reset file access time to the value before backup .........................398 Megabytes of memory to use for file compression .......................398 Use VxFS file change log for incremental backups ......................398 Default cache device path for snapshots ........................................400 Do not compress files ending with ..................................................401 Add button ..........................................................................................401 Add to all button .................................................................................401 Remove button ...................................................................................401 Client Settings (Windows) properties .....................................................402 General level logging .........................................................................402 TCP level logging ................................................................................402 Wait time before clearing archive bit .............................................403 Use change journal in incrementals ...............................................403 Incrementals based on timestamp ..................................................405 Incrementals based on archive bit ..................................................405 Time overlap .......................................................................................405 Communications buffer size ............................................................406 User directed timeouts ......................................................................406 Maximum error messages for server ..............................................406 Keep status of user-directed backups, archives, and restores ....406 Perform default search for restore ..................................................406 Data Classification properties ..................................................................407 Rank .....................................................................................................407 Name ....................................................................................................408 Description ..........................................................................................408

18

Classification ID ................................................................................. 408 Encryption properties ...............................................................................409 Encryption permissions .................................................................... 409 Enable encryption ..............................................................................410 Enable standard encryption ............................................................. 410 Client cipher ....................................................................................... 410 Use legacy DES encryption .............................................................. 410 Encryption strength .......................................................................... 410 Encryption libraries .......................................................................... 411 Encryption key file ............................................................................ 411 Exchange properties .................................................................................. 412 Snapshot verification I/O throttle .................................................. 412 Backup option for log files during full backups ............................ 413 Mailbox for message level backup and restore ............................. 413 Enable single instance backup for message attachments ........... 413 Exclude Lists properties ........................................................................... 414 Use case sensitive exclude list .........................................................414 Exclude list .......................................................................................... 414 Exceptions to the exclude list ..........................................................414 Add buttons ........................................................................................ 414 Add to all buttons ...............................................................................415 Remove buttons ................................................................................. 416 Shared fields in exclude lists ................................................................... 416 Policy ...................................................................................................416 Schedule .............................................................................................. 416 Files/Directories ................................................................................. 416 Exclude lists for specific policies or schedules ..................................... 416 Syntax rules for exclude lists ................................................................... 418 Traversing excluded directories .............................................................. 419 Fibre Transport properties ....................................................................... 422 Preferred ............................................................................................. 422 Always .................................................................................................423 Never .................................................................................................... 423 Maximum concurrent FT connections ........................................... 423 Use defaults from the master server configuration ..................... 423 Firewall properties .................................................................................... 424 Default connect options .................................................................... 424 Hosts list .............................................................................................. 426 Attributes for selected hosts ............................................................ 427 Example setup for using the vnetd port ......................................... 429 General Server properties ........................................................................ 431 Delay on multiplexed restores .........................................................431 Check the capacity of disk storage units ........................................431

19

Must use local drive ...........................................................................432 Use direct access recovery for NDMP restores .............................432 Document-level restore options ......................................................432 Media host override ...........................................................................433 Add button ..........................................................................................433 Add to all button .................................................................................433 Change button ....................................................................................433 Remove button ...................................................................................434 Global Attributes properties ....................................................................435 Job retry delay ....................................................................................435 Schedule backup attempts ................................................................435 Policy update interval .......................................................................436 Priority of restore jobs ......................................................................436 Maximum jobs per client ..................................................................436 Maximum backup copies ...................................................................437 Compress catalog interval ................................................................438 Maximum vault jobs ..........................................................................438 Administrator email address ............................................................438 Setting up email notifications ..................................................................438 Indicating email notification in the NetBackup host properties 439 Email contents ....................................................................................440 Logging properties .....................................................................................441 Types of logging .................................................................................441 Enable robust logging ........................................................................442 Global logging level ...........................................................................443 Process specific overrides .................................................................443 Debug logging levels for NetBackup services ................................444 Lotus Notes properties ..............................................................................445 Path ......................................................................................................445 INI file ..................................................................................................445 Media properties ........................................................................................446 Allow media overwrite ......................................................................446 Enable SCSI reserve ...........................................................................447 Allow multiple retentions per media ..............................................449 Allow backups to span tape media ..................................................449 Allow backups to span disk ...............................................................450 Enable standalone drive extension .................................................450 Enable job logging ..............................................................................450 Enable unrestricted media sharing for all media servers ............450 Media ID prefix (non-robotic) ...........................................................451 Media unmount delay ........................................................................451 Media request delay ...........................................................................451 NDMP Global Credentials properties ......................................................452

20

User name ........................................................................................... 453 Password and confirm password ..................................................... 453 NetWare Client properties ....................................................................... 453 Network properties .................................................................................... 454 NetBackup client service port (BPCD) ............................................ 454 NetBackup request service port (BPRD) ......................................... 454 Announce DHCP interval .................................................................. 455 Open File Backup (NetWare client) properties ..................................... 455 Enable open file backup during backups ........................................455 Port Ranges properties .............................................................................456 Use random port assignments .........................................................457 Client port window ............................................................................ 457 Client reserved port window ............................................................ 457 Server port window ........................................................................... 458 Server reserved port window ...........................................................458 Restore Failover properties ...................................................................... 459 Alternate restore failover machines list ........................................460 Add button .......................................................................................... 460 Change button .................................................................................... 461 Remove button ................................................................................... 461 Media server ....................................................................................... 461 Failover restore servers .................................................................... 461 Retention Periods properties ................................................................... 462 Value .................................................................................................... 462 Units .................................................................................................... 462 Retention periods list ........................................................................ 462 Schedules list ...................................................................................... 463 Impact report button ......................................................................... 463 Note on redefining retention periods ............................................. 464 Servers properties ..................................................................................... 465 Master server ...................................................................................... 465 Additional servers ..............................................................................465 Media servers ..................................................................................... 466 Restricting administrative privileges of media servers ............... 466 Multiple masters that share one Enterprise Media Manager host 467 SharedDisk properties ..............................................................................470 SharedDisk mount points directory ................................................ 470 SharePoint 2003 properties ..................................................................... 471 User ID .................................................................................................471 Password ............................................................................................. 471 Consistency check before backup .................................................... 471 Continue with backup if consistency check fails .......................... 472 SharePoint Hosts properties .................................................................... 472

21

Symantec Products properties .................................................................473 Timeouts properties ..................................................................................474 Client connect timeout ......................................................................474 Backup start notify timeout .............................................................474 File browse timeout ...........................................................................475 Use OS dependent timeouts .............................................................475 Media mount timeout ........................................................................475 Client read timeout ............................................................................475 Backup end notify timeout ...............................................................476 Media server connect timeout .........................................................476 Universal Settings properties ..................................................................477 Restore retries ....................................................................................477 Browse timeframe for restores ........................................................478 Last full backup ..................................................................................478 Use specified network interface ......................................................478 Use preferred group for enhanced authorization .........................479 Allow server file writes .....................................................................480 Accept connections on non reserved ports ....................................480 Enable performance data collection (Windows server only) .......481 Client sends mail ................................................................................481 Server sends mail ...............................................................................481 Client administrators email ............................................................481 UNIX Client properties ..............................................................................482 UNIX Server properties .............................................................................483 NFS access timeout ............................................................................483 VMWare Proxy Servers properties .........................................................484 VSP (Volume Snapshot Provider) properties ........................................485 VSP overview ......................................................................................485 Logging VSP messages ......................................................................487 Cache file volume list ........................................................................487 VSP volume exclude list ....................................................................488 Customize cache size .........................................................................490 Cache size ............................................................................................490 Maximum cache size ..........................................................................490 Busy file wait .......................................................................................491 Busy file timeout ................................................................................492 Using VSP with databases ................................................................492 Windows Client properties .......................................................................494

Chapter 8

Device MonitorChanging the operating mode of a drive ........................................................495 Resetting a drive ................................................................................................496 Managing drive paths ........................................................................................497

22

Managing pending requests and actions ....................................................... 497 Pending requests for storage units .........................................................498 Resolving a pending request .................................................................... 499 Resolving a pending action ...................................................................... 500 Resubmitting a request .............................................................................500 Denying a request ...................................................................................... 501 Freezing media or downing drives .................................................................. 501 Cleaning drives ...................................................................................................502 Adding or changing a drive comment ............................................................ 504 Viewing drive details ......................................................................................... 504

Chapter 9

MediaVolume operations ............................................................................................ 507 Adding volumes ......................................................................................... 508 Adding volumes overview ................................................................ 508 About labeling NetBackup volumes ................................................ 510 Adding volumes by using the Volume Configuration Wizard .... 511 Adding volumes using a robot inventory update .......................... 511 Adding volumes using the Actions menu ......................................512 Volumes properties ........................................................................... 513 Changing volume properties .................................................................... 517 Change Volumes properties ............................................................. 518 Changing the volume pool of a volume .................................................. 519 Changing the volume group of a volume ............................................... 519 Changing the owner of a volume ............................................................. 520 Freezing and unfreezing media ............................................................... 520 Suspending and unsuspending media .................................................... 521 Labeling media ........................................................................................... 521 Label properties ................................................................................. 523 Rescanning and updating barcodes ........................................................ 523 When to rescan and update .............................................................. 523 When not to rescan and update ....................................................... 523 Rescanning/updating barcodes ....................................................... 524 Moving volumes ......................................................................................... 524 Move examples ................................................................................... 525 Moving volumes using the robot inventory update option ......... 525 Moving volumes using the Actions menu ......................................525 Move Volumes properties ................................................................. 526 Erasing media ............................................................................................. 528 Injecting and ejecting volumes ................................................................ 529 Injecting volumes ..............................................................................530 Ejecting volumes ................................................................................ 530 Media ejection timeout periods ....................................................... 532

23

Deleting volumes .......................................................................................532 Deassigning volumes .................................................................................533 Deassigning NetBackup volumes .....................................................534 Deassigning Veritas Storage Migrator volumes ............................535 Exchanging volumes ..................................................................................535 Exchanging a volume and using a new media ID ..........................535 Exchanging a volume and using the old media ID ........................536 Recycling volumes .....................................................................................537 Recycling volumes using the existing media ID ............................537 Recycling volumes using a new media ID ......................................537 Volume pool operations ....................................................................................538 Adding a new volume pool ........................................................................539 Changing the properties of a volume pool .............................................539 Volume pool properties .............................................................................540 Catalog backup pool ...........................................................................540 Description ..........................................................................................540 Maximum number of partially full media ......................................540 Pool name ............................................................................................541 Scratch pool ........................................................................................541 Deleting a volume pool ..............................................................................542 Volume group operations .................................................................................542 Moving a volume group ............................................................................542 Move volume group properties ........................................................543 Deleting a volume group ...........................................................................544 Robot inventory operations .............................................................................544 When to inventory a robot .......................................................................545 Inventory a robot .......................................................................................547 Robot Inventory dialog box ....................................................................548 Advanced options ...............................................................................548 Compare contents with volume configuration ..............................549 Device host ..........................................................................................549 Empty media access port prior to update .......................................550 Preview volume configuration changes .........................................550 Robot ....................................................................................................551 Show contents ....................................................................................551 Update volume configuration ..........................................................553 Advanced Robot Inventory Options dialog ............................................555 Media Settings tab ...................................................................................555 Label optical media (Local host only) ..............................................556 Media type ...........................................................................................556 Media that have been removed from the robot .............................559 Media that have been moved into or within the robot .................559 Use barcode rules ...............................................................................560

24

Use the following Media ID prefix .................................................. 560 Volume pool ........................................................................................ 561 Barcode Rules tab ...................................................................................... 562 Barcode tag ......................................................................................... 562 Description .......................................................................................... 563 Maximum mounts ..............................................................................563 Media type ........................................................................................... 563 Volume pool ........................................................................................ 565 Media ID Generation tab ......................................................................... 565 Barcode length ................................................................................... 566 Media ID generation rule .................................................................. 566 Robot number ..................................................................................... 566 Media Type Mappings tab ...................................................................... 566 Adding mapping entries ................................................................... 567 Default and allowable media types ................................................. 568 Using the physical inventory utility ....................................................... 572 Features of vmphyinv ....................................................................... 573 Requirements and restrictions for vmphyinv ............................... 573 When to use vmphyinv ..................................................................... 573 How vmphyinv performs a physical inventory ............................. 574 Obtains a list of drives to mount the media ................................... 574 Obtains a list of media to be mounted ............................................ 574 Mounts media and reads the tape header ......................................576 Updates the EMM database .............................................................. 577 Volume configuration update examples ................................................ 579 Example 1: Removing a volume from a robot ................................ 580 Example 2: Adding existing stand-alone volumes to a robot ...... 581 Example 3: Moving existing volumes within a robot ...................583 Example 4: Adding new volumes to a robot ................................... 584 Example 5: Adding cleaning tapes to a robot ................................ 586 Example 6: Moving existing volumes between robots ................. 587 Example 7: Adding existing volumes when barcodes are not used 587 Using WORM media .......................................................................................... 589 Supported drives ........................................................................................ 590 Managing your WORM media in NetBackup ......................................... 590 Using WORM volume pools to manage WORM media ................ 590 Using unique drive and media types to manage WORM media . 591 WORM tape limitations ............................................................................ 592

Chapter 10

DevicesDevice configuration prerequisites ................................................................ 593 The device mapping file .................................................................................... 594 Configuring robots and tape drives ................................................................ 595

25

Using the Device Configuration Wizard .................................................595 Operating system changes ................................................................596 Possible EMM server host conflict ..................................................596 Devices that are partially-configured .............................................596 Starting the Device Configuration Wizard ....................................597 Adding a robot ............................................................................................597 Robot properties .................................................................................598 Robot control configuration overview ............................................602 Adding or changing a drive ......................................................................604 Adding a shared drive .......................................................................605 Configuring SCSI reserve on a drive path ......................................605 Drive properties .................................................................................607 Configuring drive name rules ..........................................................611 Robot drive number for API robots .................................................613 No rewind device ................................................................................614 Configuring server groups for media sharing ...............................................615 Server group properties ............................................................................617 Server group name .............................................................................617 Server group type ...............................................................................617 State .....................................................................................................618 Description ..........................................................................................618 Servers in group .................................................................................618 Servers not in group ..........................................................................618 Configuring and managing disk pools ............................................................618 Configuring SAN clients and Fibre Transport ..............................................619 Managing your device configuration ..............................................................619 When to perform device configuration changes ...................................619 Using the Device Configuration Wizard for changes ...........................620 Changing a robot configuration ...............................................................620 Changing the configuration of a drive ....................................................620 Changing a drive to a shared drive ..........................................................621 Deleting robots ...........................................................................................621 Deleting drives ...........................................................................................621 Performing device diagnostics .................................................................622 Running a drive diagnostic test .......................................................622 Running a robot diagnostic test .......................................................622 Printing your device configuration .........................................................623 Stopping and restarting the device daemon ..................................................624 External access to NetBackup controlled devices .................................624 Activating and deactivating media servers ...................................................625 Accessing media and devices on other hosts .................................................625 Example SERVER entries ..........................................................................626 The Enterprise Media Manager server ...........................................................626

26

Managing the EMM server ....................................................................... 626 EMM server requirements ........................................................................ 627

Chapter 11 Chapter 12

Credentials Management topicsNetBackup naming conventions ..................................................................... 631 Using wildcards in NetBackup ......................................................................... 632 To power down and reboot NetBackup servers ............................................ 633 Displaying active processes with bpps ................................................... 634 Displaying robotic processes with vmps ................................................ 635 Administering NetBackup licenses ................................................................. 635 Using the NetBackup license utility to administer licenses ....................... 638 To administer a remote master server ...........................................................639 To add a NetBackup server to a server list ............................................ 639 To choose a remote server to administer ............................................... 644 Administer a master server by using a NetBackup client ...................646 Using the Remote Administration Console ........................................... 647 If you cannot access a remote server ...................................................... 648 To administer devices on other servers .........................................................649 Using the NetBackup-Java Windows display console .................................. 651 To authorize NetBackup-Java users on Windows ................................. 651 To restrict access on Windows ................................................................ 651 Configuring the NetBackup-Java administration console .......................... 652 NetBackup-Java administration console architectural overview ...... 652 Authorizing NetBackup-Java users .........................................................654 Authorization file characteristics ...........................................................656 To configure nonroot usage ..................................................................... 658 Authorizing nonroot users for specific applications ...................658 Capabilities autho