EMC Networker Administration Guide
EMC Networker Administration Guide
Version 9.0.x
Administration Guide
302-001-764
REV 09
Copyright © 1990-2016 EMC Corporation. All rights reserved. Published in the USA.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Figures 15
Tables 17
Preface 21
Chapter 1 Overview 27
The NetWorker environment.......................................................................... 28
NetWorker components....................................................................28
NetWorker services....................................................................................... 30
Processes on NetWorker hosts ........................................................ 31
Stop and start the NMC server.......................................................... 33
Stop and start a NetWorker server, client, or storage node................35
NetWorker user interfaces............................................................................. 37
NMC user interface...........................................................................37
NetWorker Administration window................................................... 38
NetWorker client interface................................................................ 39
NetWorker character-based interface............................................... 39
NetWorker command-line interface.................................................. 39
Storage nodes...............................................................................................91
Requirements...................................................................................91
Licensing......................................................................................... 91
Storage node configuration.............................................................. 91
Configuring a dedicated storage node.............................................. 98
Troubleshooting storage nodes........................................................ 99
Disk storage devices................................................................................... 100
Example environment.................................................................... 101
Considerations for Client Direct clients...........................................101
Cloud backup devices compared to other device types.................. 103
Differences between FTDs, AFTDs, and DD Boost devices............... 104
Device target and max sessions default values and ranges............ 107
Advanced file type devices.............................................................107
DD Boost devices........................................................................... 121
CloudBoost devices....................................................................... 122
Atmos Cloud devices......................................................................128
Libraries and silos.......................................................................................133
Overview of tape device storage.....................................................133
Support for LTO-4 hardware-based encryption................................133
Linux device considerations........................................................... 133
Solaris device considerations........................................................ 134
HP-UX device considerations..........................................................134
AIX device considerations.............................................................. 138
SCSI and VTL libraries.................................................................... 138
Silo libraries...................................................................................175
NDMP libraries............................................................................... 183
NetWorker hosts with shared libraries............................................184
Dynamic drive sharing....................................................................186
File type devices..........................................................................................191
FTD capacity issues........................................................................ 191
Full FTD prevention.........................................................................192
Stand-alone devices....................................................................................192
Autodetecting and configuring a stand-alone tape drive.................192
Adding a stand-alone device manually........................................... 193
Auto Media Management for stand-alone devices.......................... 193
Mounting or unmounting a volume in a stand-alone tape drive...... 194
Labeling and mounting a volume in one operation (stand-alone tape
drive)............................................................................................. 195
Labeling volumes without mounting...............................................196
Mounting uninventoried volumes...................................................196
Labeling volumes........................................................................................ 197
Labeling or re-labeling library volumes........................................... 197
Verifying the label when a volume is unloaded...............................198
Troubleshooting devices and autochangers................................................ 198
Additional attributes in the Autochanger resource..........................198
Maintenance commands................................................................199
Autodetected SCSI jukebox option causes server to stop responding
...................................................................................................... 199
Autochanger inventory problems....................................................199
Destination component full messages............................................199
Tapes do not fill to capacity............................................................200
Tapes get stuck in drive when labeling tapes on Linux Red Hat
platform.........................................................................................200
Increasing the value of Save Mount Time-out for label operations.. 201
Server cannot access autochanger control port.............................. 201
Changing the sleep times required for TZ89 drive types..................202
Glossary 829
1 NetWorker components................................................................................................. 28
2 NMC GUI window........................................................................................................... 38
3 Associating a jnlp file with Java (TM) web Start Launcher for Mozilla Firefox................... 44
4 Administration window.................................................................................................. 47
5 Monitoring window........................................................................................................ 51
6 Recover window.............................................................................................................58
7 Labeling a volume by using a label template..................................................................70
8 Identifying WORM tapes in the NetWorker Console........................................................ 88
9 Example NetWorker disk backup configuration in a mixed backup environment...........101
10 Paths for CIFS AFTD......................................................................................................103
11 How library sharing works............................................................................................184
12 Dynamic Drive Sharing.................................................................................................187
13 Data Protection Policy..................................................................................................207
14 Platinum policy configuration...................................................................................... 208
15 Gold policy configuration.............................................................................................208
16 Silver policy configuration........................................................................................... 209
17 Bronze policy configuration......................................................................................... 209
18 Data protection policy example....................................................................................210
19 All possible workflow actions for a traditional backup..................................................216
20 Workflow path from a traditional backup action...........................................................216
21 Visual representation of a workflow............................................................................. 232
22 Workflow path from a server database backup action.................................................. 236
23 Workflow path from an NMC server backup action....................................................... 236
24 Visual representation of the Server Protection workflows............................................. 241
25 Workflow path from a clone action...............................................................................248
26 Visual representation of a clone workflow....................................................................253
27 Example of a policy with separate workflows for backup and cloning........................... 254
28 Workflow path from a snapshot backup action............................................................ 269
29 Workflow path from a probe action.............................................................................. 270
30 Workflow path from a server backup action................................................................. 270
31 Workflow path from a check connectivity action...........................................................270
32 Workflow path from a clone action...............................................................................270
33 Workflow path from a discover action.......................................................................... 271
34 Workflow path from a generate index action................................................................ 271
35 Workflow path from a VBA checkpoint discover action................................................. 271
36 Traditional backup workflow........................................................................................271
37 Incremental and cumulative incremental backup levels............................................... 298
38 Synthetic full backups................................................................................................. 299
39 Default weekly backup schedule..................................................................................308
40 Staggered weekly backup schedule for multiple groups of clients................................308
41 Default weekly schedule for a traditional backup action.............................................. 310
42 VSS backup process.................................................................................................... 345
43 Paths for CIFS AFTD......................................................................................................397
44 Cloning example..........................................................................................................418
45 Overview of archive operation......................................................................................435
46 A directed recovery from a remote client ..................................................................... 459
47 Connect to Server ....................................................................................................... 525
48 NetWorker Recover window......................................................................................... 526
49 List of clients available for a NetWorker server............................................................. 527
50 Search browse view..................................................................................................... 528
51 Versions side bar.........................................................................................................529
1 Revision history............................................................................................................. 21
2 Style conventions.......................................................................................................... 24
3 NetWorker server processes...........................................................................................31
4 NetWorker storage node processes................................................................................32
5 NMC server processes................................................................................................... 33
6 NetWorker startup commands .......................................................................................36
7 Windows opened from the NMC GUI...............................................................................38
8 Windows that are launched from the Administration window......................................... 47
9 Monitoring window panel ..............................................................................................52
10 Alerts window icons.......................................................................................................53
11 Devices status icons ..................................................................................................... 54
12 Operations window icons.............................................................................................. 55
13 Icons in the Log pane.....................................................................................................57
14 Recovery toolbar options .............................................................................................. 58
15 Save recover configuration job status............................................................................ 59
16 Find options.................................................................................................................. 60
17 Key label template attributes......................................................................................... 71
18 Examples of number sequences for volume labels......................................................... 72
19 Using label template components................................................................................. 73
20 Preconfigured media pools............................................................................................ 77
21 Determining which pool receives backup data............................................................... 79
22 NetWorker hierarchy for resolving media pool conflicts ................................................. 82
23 WORM supported devices ............................................................................................. 87
24 WORM/DLTWORM attributes ......................................................................................... 89
25 A comparison of cloud devices to other device types................................................... 103
26 Differences between disk devices ............................................................................... 104
27 Default values and ranges for target and max sessions attributes ............................... 107
28 CloudBoost appliance system requirements................................................................ 123
29 Determining the major number value........................................................................... 135
30 ioscan output when driver is configured...................................................................... 136
31 ioscan output when driver is not configured................................................................ 136
32 Tape alert severity....................................................................................................... 164
33 Common jbedit options............................................................................................... 166
34 Device settings and environment variables ................................................................. 172
35 StorageTek environment variables .............................................................................. 178
36 Library resource sleep attributes .................................................................................185
37 Shared Devices attributes............................................................................................190
38 Schedule icons............................................................................................................ 217
39 Schedule icons............................................................................................................ 220
40 Schedule icons............................................................................................................ 223
41 Schedule icons............................................................................................................ 228
42 Schedule icons............................................................................................................ 237
43 Save set criteria...........................................................................................................244
44 Schedule icons............................................................................................................ 249
45 Save set criteria...........................................................................................................256
46 Schedule icons............................................................................................................ 259
47 Policy status icons.......................................................................................................264
48 Methods to create an action........................................................................................ 278
49 Methods to open the Policy Action wizard....................................................................280
50 Resource overview.......................................................................................................292
51 Data in the ALL save set .............................................................................................. 293
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions that are described in this document
might not be supported by all versions of the software or hardware currently in use. The
product release notes provide the most up-to-date information on product features.
Contact your EMC technical support professional if a product does not function correctly
or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document describes how to configure and use EMC NetWorker.
Audience
This guide is part of the NetWorker documentation set, and is intended for use by system
administrators who are responsible for setting up and maintaining backups on a network.
Operators who monitor daily backups will also find this guide useful.
Revision history
The following table presents the revision history of this document.
03 December 30, 2015 Updated information for checkpoint restart to indicate the
feature is only supported on Linux and UNIX platforms,
and only for standard save operations.
04 January 15, 2016 Updated the Backing up the Data chapter to include:
l Details about how to configure a client to send data
to only AFTD and Data Domain devices.
Related documentation
The NetWorker documentation set includes the following publications, available on EMC
Online Support:
l EMC NetWorker Online Software Compatibility Guide
Provides a list of client, server, and storage node operating systems supported by the
EMC information protection software versions. You can access the guide at https://
support.emc.com. From the Support by Product pages, search for NetWorker using
"Find a Product", and then select the Install, License, and Configure link.
l EMC NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l EMC NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for NDMP
filers.
l EMC NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers
and clients.
l EMC NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker software
for clients, storage nodes, and servers on all supported operating systems.
l EMC NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed release.
l EMC NetWorker Release Notes
Contains information on new features and changes, fixed problems, known
limitations, environment and system requirements for the latest NetWorker software
release.
l EMC NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
l EMC NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain devices
for data deduplication backup and storage in a NetWorker environment.
l EMC NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
l EMC NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design and plan for a NetWorker disaster recovery. However, it does
not provide detailed disaster recovery instructions. The Disaster Recovery section of
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
Bold Used for names of interface elements, such as names of buttons, fields,
tab names, and menu paths (what the user specifically selects or
clicks)
Italic Used for full titles of publications that are referenced in text
Monospace Used for:
l System code
Overview 27
Overview
NetWorker components
Several components make up the NetWorker environment and provide the ability to
protect against data loss.
The following figure illustrates the main components in a NetWorker environment.
Figure 1 NetWorker components
NMC Server
The NetWorker Management Console (NMC) server or Console server is a Java-based web
application and database server. The NMC Server manages all NetWorker Servers and
Clients. The NMC Server also provides reporting and monitoring capabilities for all
NetWorker Servers and Clients in the environment. NMC Server relies on the NetWorker
Authentication Service for user account authentication.
Datazone
A NetWorker datazone is composed of a single NetWorker Server, its clients, and storage
nodes. You can add additional datazones as backup requirements increase.
NetWorker Server
The NetWorker Server provides services to back up and recover the data of any NetWorker
host in a datazone. The NetWorker Server also acts as a storage node and can control
multiple remote storage nodes.
NetWorker client
A NetWorker client is a physical computer that you install the NetWorker client software
on. The NetWorker client computer can be any computer in a datazone that contains data
you want to back up. The NMC server, NetWorker server, and NetWorker storage node
hosts are also NetWorker clients.
NetWorker components 29
Overview
Restricted datazones
Restricted datazones provide NetWorker administrators with the ability to organize a
NetWorker environment into a multi-tenancy configuration.
In a multi-tenancy configuration, each restricted datazone contains one NetWorker server
and other associated NetWorker resources. Global administrators oversee the setup and
management of several restricted data zones and assign tenant administrators with
access to a restricted datazone. A tenant administrator can only manage NetWorker
resources within an assigned restricted datazone.
Virtual environments
NetWorker clients can be created for virtual machines for either traditional backup or
VMware Consolidated Backup (VCB). Additionally, the NetWorker software can
automatically discover virtual environments and changes to those environments on either
a scheduled or on-demand basis and provides a graphical view of those environments.
NetWorker services
The main services and programs for the NetWorker server are the NetWorker storage
node, NetWorker client, and NetWorker Management Console (NMC) server.
This section includes information on the NetWorker services, and how to start and stop
the services.
For more information about:
l Main NetWorker services—The EMC NetWorker Command Reference Guide or the UNIX
man pages provides more information.
l Service port requirements when configuring a firewall—The EMC NetWorker Security
Configuration Guide provides more information.
Process Function
nsrd l The master service that controls other services on the NetWorker
server, clients, and storage nodes.
l Monitors active save or recover program sessions.
l In response to a recover session, nsrd spawns an agent process,
ansrd.
nsrmmdbd Provides media database management services to the local nsrd and
nsrmmd services and records entries in the media database.
nsrlogd Supports the NetWorker audit log service, which is configured to run on
the NetWorker server by default.
nsrcpd l Starts automatically when a user accesses the Hosts Task window in
the NetWorker Administration interface.
Process Function
nsrdispd Handles RPC-based calls for the nsrd process, from remote third party
processes.
nsrdisp_nwbg Started by nsrdispd to handle NMC server requests for information from
the RAP and media databases on the NetWorker server.
nsrlmc l Supports licensing requests.
l For the traditional licensing model, nsrlmc requests a license from
the lgtolmd process.
l For the CLP/ELMS licensing model, nsrlmc requests capacity and
update licenses from the ELMS server.
nsrctld The top-level NetWorker server process that monitors, stops, and starts all
NetWorker server processes.
nsrvmwsd Provides a web service to manage VMware VM backups that are part of
the NetWorker VMware protection feature.
tomcat7 Tomcat web server instance for the NetWorker Authentication Service.
(Windows), tomcat
(UNIX)
Process Function
nsrmmd l Provides device support, generates mount requests, multiplexes save set data
during a multi client backup, and de-multiplexes recover data. It writes the data
sent by save to storage media.
l Forwards storage information to the nsrmmdbd process on the NetWorker server,
which the NetWorker server adds to the media database.
nsrsnmd l Provides an RPC-based service to manage all the device operations that the
nsrmmd process handles on behalf of the nsrd process on the NetWorker server.
l Ensures that the necessary device operations are actually performed when
needed by nsrd.
l Automatically run by nsrd as required.
l Only one nsrsnmd runs on each storage node that has configured and enabled
devices.
Process Function
l Manages the library subsystem media, slot, drive, and port resources providing
control to move and access the resources within the library subsystems.
l One nsrlcpd starts for each configured tape library.
NMC server
The following table summarizes the processes that support the NMC server software.
Process Function
nsrexecd Authenticates and processes the NetWorker server remote
execution requests and runs the save and savefs programs on
the client.
gstd Known as the Generic Services Toolkit (GST), controls other
services that are provided by the NMC server.
httpd Starts the NMC Console GUI on the client through a web
browser.
postgres A database server that manages information pertaining to NMC
server management. For example, Console reports.
gstsnmptrapd l Monitors SNMP Traps on a managed Data Domain system.
l Provides the ability to report SNMP Trap events in the NMC
Events task.
l Started only when SNMP Trap monitoring is configured for
the Data Domain system.
Note
The EMC GST Service stops the EMC GST Database Service and the EMC GST Web
Service.
Note
The EMC GST Service starts the EMC GST Database Service and the EMC GST Web
Service.
When the client process is running, a message similar to the following appears:
root 240 1 0 ? 0:04 /usr/sbin/nsrexecd -s mysrvr
If nsrexecd is not running, type /etc/init.d/networker start to start the
process.
2. To start the NMC server daemon, postgres, and httpd processes., type /etc/
init.d/gst start
3. To confirm that the gstd, postgres, and httpd processes have started, type ps -
ef | grep lgtonmc.
When the processes have started, output similar to the following appears:
root 3064 1 0 10:03 ? 00:00:01 /opt/lgtonmc/bin/gstd
dbuser 3329 1 0 10:04 ? 00:00:00 /opt/lgtonmc/postgres/bin/
postgres -D /opt/lgtonmc/nmcdb/pgdata
root 3969 1 0 10:04 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd
-f /opt/lgtonmc/apache/conf/httpd.conf
nobody 3970 3969 0 10:04 ? 00:00:00 /opt/lgtonmc/apache/bin/
httpd -f /opt/lgtonmc/apache/conf/httpd.conf
Note
On a NetWorker server, the NetWorker Remote Exec Service stops the NetWorker
Backup and Recovery and the NetWorker Message Queue Adaptor services. On an
NMC server, the NetWorker Remote Exec Service also stops the EMC GST Service.
Note
The NetWorker Backup and Recover Server service also starts the NetWorker
Remote Exec Service and the NetWorker Message Queue Adaptor service.
l NetWorker client or storage node: Right-click the NetWorker Remote Exec Service
and select Start.
2. To confirm that the NetWorker processes are not running, type the following command
from a prompt:
ps -ef | grep /usr/sbin/nsr
AIX /etc/rc.nsr
Note
NMC GUI
Use the NMC GUI to manage an NMC server and NetWorker servers.
The following figure illustrates the NMC GUI.
The NMC window is the first point of access for NMC and NetWorker tasks. The following
table lists the task-based windows that can be opened from the NMC window taskbar.
Enterprise Select a NetWorker server to manage and monitor the server and its
backup clients. The Enterprise window provides the ability to open the
Administration window for a NetWorker server.
nsradmin
For more information about nsradmin, the EMC NetWorker Command Reference Guide or
the UNIX man pages provides more information.
Getting Started 41
Getting Started
Figure 3 Associating a jnlp file with Java (TM) web Start Launcher for Mozilla Firefox
Note
If the Start button does not appear but you see a warning message, which states that
Java Runtime Environment cannot be detected, click the here hyperlink.
4. For Internet Explorer only, if a security warning appears, select I accept the risks and
want to run this application, then click Run.
5. In the Log in page, specify the NetWorker Authentication Service administrator
username and password, and then click OK.
6. In the Licensing Agreement page, select Accept.
7. If you did not install a support version of JRE on the host, then a prompt to install JRE
appears. Cancel the installation, install JRE, and then re-run the installation.
8. In the Welcome to the NMC Server Configuration Wizard page, click Next.
9. In the Set authentication server service account for the NMC server page, review the
setting and click Next.
10. In the Define Database Backup Server page, specify the name of the NetWorker server
that will backup the NMC server database, and then click Next.
11. In the Specify a list of managed NetWorker Servers page:
a. Specify the names of the NetWorker Server that the NMC Server will manage, one
name per line.
Note
If the NMC Server is also the NetWorker Server, specify the name of the NetWorker
Server.
b. Leave the default options Capture Events and Gather Reporting Data
enabled.
Consider the following:
l Enable the Capture Events option to allow the NMC Server to monitor and
record alerts for events that occur on the NetWorker Server.
l Enable the Gather Reporting Data option to allow the NMC Server to collect
data about the NetWorker Server and generate reports.
12. Click Finish. The installation starts the default web browser and connects to the NMC
server. The NetWorker Management Console window and the Getting Started window
appear.
13. In the Enterprise window, right-click the NetWorker Server, and then select Launch
Application.
Note
If you do not specify any NetWorker Servers in the Specify a list of managed
NetWorker servers window, then the NMC Enterprise window does not display any
NetWorker Servers. To add a host, right-click Enterprise in the left navigation pane
and select New > Host. The Add New Host wizard appears.
Double-click the desktop button , if one was configured by using the Java Web
Start Application Manager.
Note
If you changed the default NMC server ports, specify the correct port numbers.
javaws http://localhost:9000/gconsole.jnlp
Administration window
NetWorker servers are managed through the Administration window.
The following figure illustrates the NetWorker Administration window.
You can toggle between the Administration window and the NMC UI.
The following table lists the windows that can be launched from the Administration
window taskbar.
Monitoring Monitor various activities that are related to the NetWorker server. For
example, you can monitor the progress of a policy and view any alerts. A
portion of the Monitoring window always appears at the bottom of the
Administration window, providing information on Log messages and
Alerts.
Devices Add, configure, and operate single or multiple devices, libraries, and silos
for the NetWorker server.
Media Manage the activities and the resources that are related to backup
volumes. For example, you can mount a backup volume or create a label
template for backup volumes.
Hosts View information about known NetWorker hosts such as the NetWorker
version, CPU type, and operating system. Manage the NetWorker client
resource database. Perform software upgrades on NetWorker hosts by
using client push.
Administration window 47
Getting Started
3. Right-click in that column and select from the list of available options. The options
include Edit, Add to, and Remove from, depending on the column selected.
Only the columns that appear in the window can be selected for multiple resource
editing. To add a column that is not currently in view:
a. Right-click a table header and select Add Column from the drop-down.
b. Select from the list of available attributes.
Drag-and-drop functionality
Drag-and-drop functionality is available in the Console and Administration interfaces for
many tasks.
Note
Only one object may be selected for drag-and-drop in the navigation tree.
Note
Drag-and-drop operations from the operating system clipboard to a table are not
supported.
Drag-and-drop functionality 49
Getting Started
customize the view. You can select multiple types from the panel to create multiple
floating windows that can be viewed simultaneously. The following table describes the
various types of information available in the docking panel, and the details each one
provides.
Policies/Actions The Policies tab provides you with status information about all
configure policies and the associated workflows and actions.
The Actions tab provides you with status information for all
actions. Policies/Actions pane on page 643 provides more
information.
Alerts Lists the priority, category, time, and message of any alerts.
Alerts pane on page 53 provides more information.
Operations Lists the status of all library and silo operations, including
nsrjb operations that are run from the command prompt. Also
lists user input, libraries, origin, operation data, operation start
time, duration of the operation, progress messages, and error
messages.
Sessions window
Use the Sessions window to view the sessions that are running on a NetWorker server.
You can change the view of this window to display these sessions:
The Sessions pane below the Policies/Actions pane provides details on individual save,
recover, clone, and synthetic full sessions by client.
Click the tabs at the bottom of the Sessions pane to view all sessions or to limit the list of
sessions by the session type. Session types include:
l Save
l Recover
l Clone
l Browse
l Synthetic Full/Rehydrated Sessions
l All
To change the displayed session types go to View > Show, and select the type of sessions
to display. To display all sessions currently running on the NetWorker Server, regardless
of type, select All Sessions.
You can stop a session (backup, synthetic full backup, clone, and recovery sessions)
from the Monitoring window, even if the session was started by running the savegrp
command.
To stop a session, right-click the session in the pane, and select Stop from the drop-
down.
Alerts pane
The Alerts pane displays alerts that are generated by a particular NetWorker server or
Data Domain system that has devices that are configured on the NetWorker server. The
Alerts pane includes priority, category, time, and message information.
An icon represents the priority of the alert. The following table lists and describes each
icon.
When items on the Alerts pane are sorted by the Priority column, they are sorted in
alphabetical order based on the label of the icon.
Removing alerts
Remove individual alert messages from the Events tables by removing them from the
Events table. To delete a message in the Events table, right-click the message, and select
Dismiss.
Note
The alert message remains in the Log window in the NetWorker Administration program.
Devices pane
The Devices pane allows you to monitor the status of all devices, including NDMP
devices. If the NetWorker server uses shared and logical devices, the window is adjusted
dynamically to present a set of columns appropriate for the current configuration.
The Devices pane provides the following information:
l Status of the operation.
l Name of the device.
l Name of the storage node that contains the device.
l For tape devices, the name of the library that contains the device.
l Name of the volume in the device.
l Name of the pool that is associated with the volume.
l Last message generated for the device.
l Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the
system should overwrite the label on a tape.
Entering user input on page 56 provides instructions on how to deal with a user
input notification.
If the current server configuration includes a shared device, a Shared Device Name
column appears on the Devices pane. The name of the shared device appears in the
Shared Device Name column. If other devices for that configuration are not shared
devices, then the Shared Device Name column is blank for those devices. Only a single
device per hardware ID can be active at any particular moment. The information for
inactive shared devices is filtered out, and as a result, only one device per hardware ID is
presented on the window at any time.
An icon represents the device status. The following table lists and describes each icon.
When you sort items in the Devices pane by the Status column, NetWorker sorts the
devices in alphabetical order based on the label name of the icon.
Operations window
The Operations window displays information about device operations. It provides the
following information:
l Status of the operation.
l Name of the library.
l Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the
system should overwrite the label on a tape. Entering user input on page 56
provides instructions on how to deal with a user input notification.
l The origin, or source, of the operation.
For example, the interface, nsrjb or the NetWorker server.
l Time the operation started.
l Type of operation.
l Duration of the operation.
l Status messages from the operation.
l Any error messages.
NOTICE
Only the last error message of the operation appears in the Error Messages column.
Move the mouse pointer over the cell containing the last error message to display the
entire list of error messages.
The operation status is represented by an icon. The following table lists and describes
each of the icons.
When items on the Operations window are sorted by the Status column, they are sorted
in alphabetical order based on the label of the icon.
Stopping an operation
Certain operations can be stopped from the Operations window.
Procedure
1. From the Administration window, click Monitoring.
2. Click Operations in the docking panel.
3. Right-click the operation to stop, then select Stop.
4. Click Yes to confirm the stop.
Note
Operations that were started from a command line program, such as the nsrjb
command, cannot be stopped from the Operations window. To stop these operations,
press Ctrl-c from the window where the command was started.
Note
If two users try to respond to the same user input prompt, the input of the first user
takes precedence, and the second user receives an error message.
l If No, and input is not supplied, the operation will time out and fail.
Log window
To view the most recent notification logs, click the Log window from the docking panel in
the Monitoring window. The Log window provides the priority, time, source, category, and
message for each log.
Note
If a particular log file is no longer available, check the log file on the NetWorker server.
The log files are located in NetWorker_install_path\logs directory.
An icon represents the priority of the log entry. The following table lists and describes
each icon.
When you sort items on the Log pane by using the Priority column, NetWorker sorts the
icons in alphabetical order based on the name of the label.
Recover window
The Recover window displays information about recover configurations that are created
with the NMC Recovery wizard.
You can use this window to:
l Start the NMC Recovery wizard to create recover configurations or modify saved
recover configurations.
l Identify the status of a recover configuration that is created with the NMC Recovery
wizard.
Recover toolbar
The Recover toolbar provides you with the ability to quickly perform common recover
operations. The following table summarizes the function of each toolbar button.
Button Function
Button Function
Start the recover operation for a selected saved recover
configuration. This option is only available for a recover
configuration that has a Never run, or Failed status.
Note
The Recover toolbar does not appear by default. To display the Recover toolbar, select
View > Show toolbar.
Recover Summary
The Recover Summary section displays a high-level overview of recover jobs.
This section includes the following information:
l Total Recovers—The total number of successful recover jobs.
l Since—The number of successful recover jobs since this date.
Configured Recovers
The Configured Recovers window displays a list of saved recover configurations in a
tabular format. You can sort the information by column. The Configured Recovers table
displays the following information for each saved recover configuration:
l Status—The job status of a saved recover configuration.
l Name
l Source client
l Destination client
l Recovery list
l Recover type—For example, file system or BBB.
l Comment
l OS—The operating system of the source host.
l Recover requestor—The Windows or UNIX account used to create the recover
configuration.
l Start Time
l End Time
l Start date
Icon Description
The last recover attempt failed.
Icon Description
The recover job has never run.
Currently running
The Currently Running window displays a list of in progress recover jobs in a tabular
format. You can sort the information by column. The Currently Running table displays the
following information for each job:
l Status
l Name
l Source client
l Destination client
l Recovery list
l Recover type—For example, file system or BBB
l Volume
l Comment
l Device
l Size
l Total size
l % complete
l Rate (KB/s)
l Start time
l Duration
l Currently running
Find
The Find section appears along the bottom of the Recover window, after you select the
Find button on the Recover toolbar. Find allows you to search for keywords in the
Configured Recovers window. The following table summarizes the available find options.
Find Highlight the first saved recover configuration that contains the
specified keyword.
Highlight All Highlights each saved recover configuration that contains the
specified keyword.
Device configuration
You can configure devices to test the NetWorker software.
Labeling media
You can label tapes from the NMC GUI.
Procedure
1. Log in to the NMC GUI as an administrator of the NetWorker server.
2.
Click the Enterprise button on the taskbar.
3. Highlight a host in the navigation tree, right-click NetWorker and select Launch
Application. The NetWorker Administration window appears.
4.
Click the Devices button on the taskbar.
5. In the navigation tree view, expand Libraries and highlight a library, or select Devices.
6. In the Device list, right-click a device and select Label.
Scheduling backups
Perform scheduled backups to automatically backup client data on an ongoing basis.
Data protection policies enable you to define the client resources, schedule, and other
settings for the backup. The client resources and backup storage resources must also be
configured.
Procedure
1. Configure the backup storage resources:
a. Configure the storage node that will own the backup storage devices.
b. Configure the backup storage device.
c. Create a label template for labeling volumes, or use one of the preconfigured label
templates.
d. Create media pools for sorting and storing backup data.
Backup Storage on page 69 provides more information on configuring backup
storage resources.
2. Configure one or more client resources for each client computer by using either the
Client Backup Configuration Wizard or the Client Properties dialog box.
When you configure a client resource, you specify backup settings for the client,
including:
l The save sets for the client, which define the data to back up on the client.
l Whether to automatically restart failed backups from a known good point, which is
called checkpoint restart.
l Whether to bypass the storage node and send backup data directly to AFTD or DD
Boost storage devices, which is called Client Direct.
l Directives that control how the NetWorker server processes files and directories
during the backup.
l Probe resources for probe-based backups, where the NetWorker server probes the
client for a user-defined script before the backup starts.
l Whether to back up each save set for the client by using multiple parallel save
streams.
l Backup command customizations.
Client resources on page 403 provides more information on configuring client
resources.
b. Create a policy.
Policies provide a container for the workflows, actions, and groups that support
and define the backup.
l The retention setting for the backup, which specifies how long to retain the
backup data.
where:
l -s NetWorker_server—Specifies the name of the NetWorker server. Use this
option when you use the nsrlogin command on a NetWorker host that is not the
NetWorker server.
l -H authentication_host—Specifies the name of the NetWorker Authentication
Service host. Use this option when you use the nsrlogin command on a
NetWorker host that is not the NetWorker server. This option is only required when
you do not use the -s option.
l -P port—Specifies the NetWorker Authentication Service port number. Use this
option when you do not use the -s option and when the NetWorker Authentication
Service does not use the default port number 9090 for communications.
l -t tenant— Specifies the tenant name that the NetWorker Authentication Service
should use to verify the username and password. When you omit this option,
NetWorker Authentication Service uses the Default tenant to verify the user
credentials.
l -d logindomain—Specifies the domain name that the NetWorker Authentication
Service should use to verify the username and password with an external
authentication authority. When you omit this option, the NetWorker Authentication
Service uses the local user database to verify the user credentials.
l -u username—Specifies the username that the NetWorker Authentication Service
should validate to generate a token.
l -p "password"—Specifies the password that the NetWorker Authentication
Service should use to verify the username. If you do not specify the password, the
nsrlogin command prompts you to provide the password.
For example, to generate a token for user Konstantin in the idddomain domain and the
idd tenant, type the following command:
Authentication succeeded.
When NetWorker Authentication Service successfully validates the user, the service
issues an authentication token to the requesting host.
2. Type the NetWorker command, at the command prompt.
If the validated user does not have the appropriate privileges to run the command, an
error message appears or the command does not return the expected result. For
example, when you try to perform an operation with a user account that does not have
the required privilege, a message similar to the following appears:
Permission denied, user must have the 'Operate NetWorker'
privilege'.
Results
The CLI command uses the authenticated token, until the token expires. By default the
token expiration period is 4800 minutes, or 8 hours. When the token expires and the user
tries to run a CLI command, the command fails with a permissions error and a message
similar to the following appears to indicate that the token has expired:
To resolve this issue, run the nsrlogin command again to generate a new
authenticated token.
Note
To revoke the user token and enable the CLI commands to use the Users attribute in the
Usergroups resources to authenticate users, use the nsrlogout command. The
nsrlogout UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information about the nsrlogout command.
l Review the NetWorker daemon.raw log file on both the NetWorker server and
client hosts. Use the nsr_render_log program to review the log file in a readable
format. The EMC NetWorker Command Reference Guide describes how to use the
nsr_render_log program.
The location of the daemon.raw file is different on Windows and UNIX:
n On Windows, the log file appears in the C:\Program Files\EMC
NetWorker\nsr\logs directory.
n On UNIX, the log file appears in the /nsr/logs directory.
l To determine the cause, refer to the Troubleshooting chapter.
l Review the operating system log files (Application event log on a Windows client)
for more information.
The UNIX man pages describe how to use the save program.
l Label templates.................................................................................................... 70
l Media pools.......................................................................................................... 76
l Storage nodes.......................................................................................................91
l Disk storage devices........................................................................................... 100
l Libraries and silos...............................................................................................133
l File type devices..................................................................................................191
l Stand-alone devices............................................................................................192
l Labeling volumes................................................................................................ 197
l Troubleshooting devices and autochangers........................................................ 198
Backup Storage 69
Backup Storage
Label templates
The NetWorker server creates a unique label for each volume by applying a label
template. This section describes how label templates and media pools are used to sort,
store, and track data on media volumes.
l The next sequential label from the label template that is associated with the
chosen pool.
If a recyclable volume from the same pool is relabeled, the volume label name
and sequence number remain the same, but access to the original data on the
volume is destroyed. The volume becomes available for new data.
l An override volume name that was entered by the user.
mars.001
jupiter.054
jupiter.archive.197
Attribute Guidelines
Name Keep the label name consistent with the media pool name, so that the label name
reflects how the data is organized. For example, a label template named "AcctFull"
would identify volumes that belong to a media pool called "Accounting Full."
/\*?[]()$!^;’"’~<>&|{}:-._
Fields A label template is made up of one or more fields. Each field, or component, provides
a layer of specificity to your organizational structure. There can be any number of
Attribute Guidelines
components, but it is best to keep the template simple with as few as necessary. The
label cannot exceed 64 characters.
Each range includes a start value, a dash (-), and an end value. The start value
and the end value must have the same number of characters. For example, use
01-99 (not 1-99) or aaa-zzz (not aa-zzz).
The order in which you enter each component of the Field attribute is important.
The NetWorker server applies each component in a left-to-right order, starting
with the first one entered.
Separator Choose the symbol to appear between component entries. Use the period, dash,
colon, or underscore to separate each component of the label template. If label
components do not have separators (for example, AA00aa), the labels can be difficult
to read.
Next Choose the next sequence number to write on the label that the NetWorker server
places on a volume (according to the template).
l To force a label to start the label scheme at a particular point, type a start label
value. The server continues to generate labels from that point on, according to
the rules of the template.
l To have the NetWorker server generate the first label, leave this attribute blank.
When the NetWorker server recycles a storage volume, the volume label does not
change as long as the volume remains in the same media pool. That is, if a
storage
volume labeled "Dev.006" is recycled, it retains the volume label "Dev.006" and
does not
receive a new label with the next sequence number.
The following table lists examples of number sequences for volume labels.
ac.00,...ac.99,
az.00...az.99,
ba.00,...ba.99
zz.00,...zz.99
The label template should allow for expansion of the backup media storage system. For
example, it is better to create a template for 100 tapes and not use all of them, than it is
to create a template for only 10 tapes and run out of labels. When the server reaches the
end of the template numbering sequence, it wraps to the starting value. For example,
after zz.99 (used for the 67,600th label), the next label the server uses is aa.00 for label
67,601.
Note
When the NetWorker server recycles a volume, the volume label does not change if the
volume remains in the same media pool. That is, if a volume labeled Dev.006 is recycled,
it will retain the volume label Dev.006 and will not receive a new label with the next
sequence number. The original data on the volume, however, will be overwritten by the
new data.
jupiter.001
Consider that the simpler a convention is, the easier it can be understood by operators
and administrators.
The maximum length for a volume name is 63 characters. With advanced file type devices
(adv_file), the maximum length is 60 characters.
Each volume should have a physical (adhesive) label attached to it. Since the NetWorker
server keeps track of the backups and which volumes they are on, you can name the
volumes with any convenient name. For example, you can label your volumes 1, 2, 3, or
Monday.1, Tuesday.1, Wednesday.1. You can assign a volume any name as long as each
one is unique.
The adhesive label on the volume should match the name generated by NetWorker. For
example, if you physically label a volume mars.1, its NetWorker name should also be
mars.1.
5. Click OK.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
Media pools
NetWorker uses media pools and volume labels to sort backup and clone data on media.
Media is a specific collection of volumes to which the NetWorker server writes data. For
example, a tape volume or a Data Domain device. A volume is identified with a unique
label based on user configurable label templates.
Media pools act as filters that tell the NetWorker server which backup volumes should
receive specific data. The NetWorker server uses media pools along with label templates
to track what data is on which specific volume. When you use a barcode-enabled tape
library, the NetWorker server uses media pools along with the volume barcode Labels to
track which data is on a specific volume.
Note
NetWorker does not use media pools for backup and clone operations to deduplication
devices.
Pool Description
name
Archive Receives archived backup data when you use the nsrarchive command and use -
b option to specify the pool name. NetWorker does not assign a retention policy to
an archived save set, and the save set never expires. When you enable Archive
Services on a client resource and you configure the backup action to send data to the
Archive pool, NetWorker does not write information about the archive save set to the
client file index for the client.
Archive Receives the clone copy of archived backup data. when you use the nsrclone
Clone command with -b option to specify the pool name. NetWorker does not assign an
expiration date to the clone copy of an archive save set. NetWorker does not write
information about the clone save set to the client file index for the client.
Indexed Receives archived backup data. NetWorker does not assign a retention policy to an
Archive archived save set, and the save set never expires. When you enable Archive Services
on a client resource and you configure the backup action to send data to the Indexed
Pool Description
name
Archive pool, NetWorker writes information about the archive save set to the client
file index for the client.
Indexed Receives the clone copy of an indexed archive. NetWorker does not assign an
Archive expiration date to the clone copy of an archive save set. NetWorker does not write
Clone information about the clone save set to the client file index for the client.
Note
The Modify Client wizard does not display the Pools, Retention, Save set, and Level
attributes.
l Action resource—Destination Pool and Retention attributes on the Specify the
Backup Options and Specify the Clone Options wizard windows. The backup levels
are defined for the action schedule on the Specify the Action Information wizard
window.
l Pool resource—Clients, Save sets, and Retention policy attributes on the Legacy tab.
The values that appear in these attributes were defined in 8.2.x. After the migration
completes, the NetWorker 9.0.1 server retains the values and these legacy attributes
become read-only. You cannot modify the values in these fields after migration.
The Action resource includes an attribute that is called Client Override Behavior. The
value that is selected for this attribute determines which resource attribute has
precedence over the attributes in other resources that determine the same behavior. By
default, the migration process enables Legacy Backup Rules on an Action resource.
Legacy Backup Rules allow NetWorker to use the values during the pool selection criteria
process.
Note
By default, the NetWorker Administration window does not show the legacy attributes. To
view the legacy attributes in the Client Properties window, go to the View menu and
select Diagnostic Mode.
the Action resource. Additionally, the Pool resource contains 8.2.x legacy attributes that
provide you with the ability to define backup data criteria for the pool.
How and when NetWorker uses the attributes values defined in the Pool, Action, and
Client resources to determine which backup pool will receive data depends on the value
that you select in the Client Override Behavior attribute of the Action resource:
l Client Can Override—The value in Pool attribute of the client resource takes
precedence over the Destination pool value that is defined in the Action resource.
NetWorker does not use the values that are defined in the Client, Save set, and
Levels attributes of the Pool resources when deciding which pool receives backup
data for a client.
l Client Can Not Override—The value defined Destination Pool attribute in the Action
resource takes precedence over the value that is defined in the Pool attribute of the
Client resource. NetWorker does not use the values that are defined in the Client,
Save set, and Levels attributes of the Pool resources when deciding which pool
receives backup data for a client.
l Legacy Backup Rules—Enabled for migrations only. NetWorker uses the values that
are defined in the Client, Save set, and Levels attributes of the pool resource to
determine which pool receives backup data from a client. The values that are defined
in the Client, Save set, and Levels of the pool resource take precedence over the
Destination Pool value that is defined in the Action resource, and the Pool value that
is defined in the Client resource.
Note
You cannot modify the legacy attributes in the migrated Pool resources.
The following table summarizes how NetWorker determines which pool receives the
backup data, which is based on the configuration of the Action, Client, and Pool resource
attributes.
Client Can Override Defined Undefined Defined and criteria Pool defined in
matches Action resource
Legacy Backup Defined Undefined Defined and criteria Pool that matches
Rules matches legacy criteria
Legacy Backup Defined Defined Defined and criteria Pool that matches
Rules matches legacy criteria
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is
associated with the protection group contains a backup action.
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is
associated with the protection group contains a backup action.
In this example, NetWorker sends the backup data for Exchange_clnt to App_backups, the
pool that is defined in the backup action. NetWorker sends the backup data for SQL_clnt
to the pool defined in the client resource, SQL_backups.
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is
associated with the protection group contains a backup action.
In this example, NetWorker sends the backup data for SQL_clnt and Exchange_clnt to
App_backups, the pool that is defined in the backup action.
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is
associated with the protection group contains a backup action.
In this example, NetWorker sends the backup data for SQL_clnt and Exchange_clnt to
Backups, the pool that matches the level Full backup criteria.
A Protection group contains two clients, SQL_clnt and Exchange_clnt. The workflow that is
associated with the protection group contains a backup action.
In this example, NetWorker sends the backup data for SQL_clnt and Exchange_clnt to the
Default pool because a pool does not exist with legacy attributes that match the
configuration for the backup data.
Precedence Groups attribute Clients attribute Save sets attribute Levels attribute
Highest x x x x
x x x
x x x
Precedence Groups attribute Clients attribute Save sets attribute Levels attribute
x x
x x x
x x
x x
x x x
x x
x x
x x
Lowest x
Note
When you do not configure the Media type required or Media type preferred attribute,
you can write data across several volumes of different media types (for example,
magnetic disk and tapes), if the volumes mounted on the storage devices have the
appropriate label associated with the media pool.
Attribute Definition
Auto Media Select this attribute to perform automated media verification while
Verify data is written to a volume labeled for this media pool. Auto media
verification on page 86 provides more information.
Max Increase the value to define the maximum number of simultaneous
parallelism save streams that NetWorker writes to each device in the pool. The
default value for this attribute is 0, which means that the attribute
has no effect on other parallelism settings. When you set the Max
parallelism attribute to 1, a prolonged delay might occur between
the backup of save sets. To resolve this issue, increase the Max
parallelism attribute for the pool resource. However, when you
increase the pool parallelism value, the time to recover data on the
volume increases.
Note
For AFTD and DD Boost devices, the Max nsrmmd count attribute
value for a device affects the Max parallelism attribute. For
example, consider an AFTD device (AFTD_1) that has a Max
sessions attribute value of 20 and a Max nsrmmd value of 4. Now
suppose a backup pool with a Pool parallelism attribute of 1
selects AFTD_1 . The total number of save sessions that NetWorker
can start for AFTD_1 is 4, one for each nsrmmd process. Tape and
FTD devices can only spawn one nsrmmd process at a time, so if
the previous example used a tape device, then the total number of
save sessions would be 1.
Attribute Definition
Recycle from Select this option to enable NetWorker to use expired volumes that
other pools are labeled for other media pools in this pool that have the Recycle
to other pools attribute enabled, when the NetWorker server does
not have access to blank volumes or volumes eligible for reuse and
assigned to this pool.
Recycle to Select this option to enable NetWorker to use expired volumes that
other pools are labeled for this media pool in other pools that have the Recycle
from other pools attribute enabled, when the NetWorker server
does not have access to blank volumes or volumes eligible for
reuse and assigned to the other pool.
Recycle start Defines the time to start the automatic relabel process each day.
By default this attribute is empty and the automatic relabeling of
recyclable volumes is not done. Use the format HH:MM.
Automatically relabeling volumes in a media pool on page 86
provides more information.
Recycle interval Defines the interval between two starts of the automatic relabel
processes. The default value is 24:00. Use the format HH:MM.
Max volumes to Defines the maximum number of recyclable volumes that
recycle NetWorker can relabel during each automatic relabel process. The
default value is 200.
Recycle start Select this attribute to start the automatic relabel process of
now recyclable volumes for this pool immediately after you create the
pool. The default value is No.
Store index For archive pools only. Select this attribute to configure an archive
entries pool that creates client file index entries for the archive save sets.
Clear this option to configure an archive pool that will not create
client file index entries for the archive save sets.
Worm pool/ Supported WORM and DLTWORM tape drives on page 86
Create provides more information about how to create Worm pools.
DLTWORM
12. Optionally, on the Restricted Data Zones tab, from the restricted datazone list, select
the restricted datazone in which to add the pool.
13. Click OK
If any of the settings for a new media pool match an existing media pool, this
message appears:
If this message appears, review the media pool configuration and modify any
overlapping criteria.
14. If you did not select a label template when you create the media pool, a message
appears that tells you that NetWorker creates a label template for the media pool,
click OK.
Device Description
HP LTO Ultrium 3 Unique to HP Ultrium-3 and higher:
and higher
l Inquiry VPD page 0xb0, byte 4 bit 0 indicates WORM capable
l Read attribute # 0x0408 bit 7 to indicate WORM media present
Quantum Any drive with product inquiry data of “*DLT*” tape drive that reports WORM
SDLT600, DLT-S4, capability the way these drives do (“Quantum” not required in the vendor
and DLT-V4 (SCSI inquiry data):
and SATA)
l Inquiry data VPD page 0xc0, byte 2, bit 0 to indicate WORM capable
l Read attribute # 0x0408 bit 7 to indicate WORM media present
Sony AIT-2, AIT-3, Any drive with “Sony” in the vendor inquiry data that reports WORM
AIT-4, and SAIT capability like these drives do:
l Mode sense page 0x31, byte 5 bit 0 indicates WORM capable
l Mode sense byte 4 bit 6 indicates WORM tape present
STK 9840A/B/C, Any drive with STK as the vendor data that reports WORM capability like
9940B, T10000 these:
l Standard inquiry data byte 55 bit 2 indicates WORM capable
l Request sense data byte 24 bit 1 indicates WORM tape present
IBM LTO Ultrium 3 These drives use the SCSI-3 method to report WORM capabilities, so there is
and higher, and not a match against any of the inquiry data. Any drive that does not match
Quantum LTO the inquiry data patterns listed above will have the SCSI-3 method applied to
Ultrium 3 and them:
higher
l Inquiry data VPD page
0xb0, byte 4, bit 0 indicates WORM capable
l Mode sense page
0x1d, byte 2 bit 0 indicates WORM tape present
Byte 4, bits 0,1: label restrictions include
- 00 indicates no overwriting allowed
- 01 indicates some labels can be overwritten
l Byte 5, bits 0,1: filemark overwrite restrictions
- 0x02: any filemark at EOD can be overwritten except for the one closest
to the beginning of the tape
- 0x03: any filemark at EOD can be overwritten
The WORM and DLTWORM attributes determine whether or not the NetWorker software
will back up to a write once-read many (WORM) tape. You can apply these tape attributes
to any pool.
Note
Various Quantum drive models (SDLT600, DLT-S4, and DLT-V4) have the ability to create
WORM tapes from ordinary blank DLT tapes supported by that particular drive. You
cannot recycle an existing NetWorker tape to create a DLTWORM volume without first
having bulk-erased the tape. When the DLTWORM attribute is set, labeling one of these
drives into a WORM pool causes the Quantum drive to make the current tape a WORM
tape.
Savegroups that belong to pools that have either the WORM or DLTWORM attribute set,
are considered to be WORM savegroups.
How to identify WORM media
Since WORM media cannot be reused, the tapes are uniquely identified as such so that
they are only used when required. As shown in this figure, a (W) is appended to the
volume names displayed in the Volumes window. If a volume is both read-only and
WORM, an (R) is appended to the volume name.
Figure 8 Identifying WORM tapes in the NetWorker Console
Note
Since WORM tapes can only be used once, attempting to relabel a WORM tape always
results in a write protection error. With the exception of pool selection and relabeling, the
NetWorker software treats WORM tapes exactly the same as all other types of tape.
Note
The WORM capable and DLTWORM capable attributes are dimmed out when the
device in use is WORM capable but does not support DLTWORM (not a Quantum DTL-
type drive).
Attribute Description
WORM pools By default, the NetWorker software only allows WORM tapes into WORM pools.
only hold WORM Deselecting this option lets you add new (non-WORM) tapes to a WORM pool.
tape This is useful when you need WORM functionality but do not have WORM tapes
available.
WORM tapes By default, NetWorker only lets you label WORM tapes into WORM pools. Clear
only in WORM this option when:
pools
You do not want to segregate WORM tapes within WORM pools.
WORM capable This attribute indicates that this drive supports the use of WORM media.
DLTWORM This attribute indicates that this drive can create DLTWORM tapes from a blank
capable tape.
WORM pool This pool should hold WORM tapes (depending on the setting of “WORM pools
only hold WORM tape” in the server).
create If selected, before the NetWorker software labels a tape in a drive capable of
DLTWORM creating DLTWORM volumes, NetWorker will try to convert the tape into a
DLTWORM tape. If that conversion fails, the labeling for that tape will fail. If a
tape drive in a pool where this attribute is set cannot create DLTWORM tapes,
(that is, the tape drive is not a Quantum SDLT600, DLT-S4 or DLT-V4 tape drive,
this attribute is simply ignored.
Refer to the Quantum web site for information on which tapes can be
converted to DLTWORM tapes. Not all firmware revisions for all of these
devices support WORM operation. Check the tape drives website to make
sure that your drive has up-to-date firmware.
Procedure
1. In the Administration window, click Media.
2. In the left pane, select Media Pools.
3. In the right pane, select the appropriate pool.
4. Right-click and select Properties.
5. Click the Configuration tab and select one of these WORM tape handling attributes:
l WORM pools only hold WORM tapes
l WORM tapes only in WORM pools
Note
If you attempt to assign a non-WORM capable drive to a WORM pool an error message
is generated.
Note
You cannot change the name of a media pool. Preconfigured media pools cannot be
modified.
Procedure
1. In the Administration window, click Media.
2. In the left pane, select Media Pools.
3. In the right pane, perform one of the following tasks:
l To modify multiple attributes in a single configuration resource by using the Media
Pool Properties window, right-click the staging configuration and select
Properties.
l To modify a specific attribute that appears in the resource window, place the
mouse in the cell that contains the attribute that you want to change, then right-
click. The menu displays an option to edit the attribute. For example, to modify the
Comment attribute, right-click the resource in the Comment cell and select Edit
Comment.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
Storage nodes
Storage nodes (including the NetWorker server) are host computers with attached storage
devices. A storage node has the physical connection and ownership of the attached
devices, but the NetWorker server maintains the client file index and media database.
With the NetWorker software, client data can be routed directly to a storage node’s
storage devices without the data first going to the NetWorker server. A storage node may
be a client of the NetWorker server, although this is not a requirement. However, the
storage node must have the NetWorker client software installed.
From the NetWorker server, typical storage tasks can be performed, such as:
l Mounting and labeling volumes for the storage node devices.
l Configuring NetWorker resources associated with the storage nodes.
Only users who have the Configure NetWorker privilege can add to or change the
configuration of the NetWorker server, media devices, and libraries. The EMC NetWorker
Security Configuration Guide provides more information.
Requirements
To operate the NetWorker software with storage nodes, certain requirements must be
met.
l On UNIX systems, this software must be installed on the storage nodes. The packages
must be installed in the following order:
1. NetWorker client software
2. NetWorker storage node software
l On Windows systems, the Storage Node Option must be installed. The Storage Node
Option installs both the NetWorker client and storage node software.
Licensing
The EMC NetWorker Licensing Guide provides information on NetWorker licensing support
for storage nodes.
Storage nodes 91
Backup Storage
Note
The silo robotic arm must not be detected by the NDMP storage node.
c. Ready indicates whether the storage node is ready to accept device operations.
6. Set the Device Management attributes:
a. In Max active devices, set the maximum number of devices that NetWorker may
use from this storage node in a DDS environment.
b. In AFTD allowed directories, for AFTD devices, type the pathnames of directories on
the storage host where AFTDs are allowed to be created.
c. In mmds for disabled devices, select a nsrmmd (data mover) option (see note):
l Yes to start nsrmmd processes for disabled devices.
l No to not start nsrmmd processes for disabled devices.
7. In Remote Host, if an NDMP tape library is used by this storage node, type the Remote
User name and Password. Only one user is allowed per storage node.
8. Select the Configuration tab.
9. In Scanning, set the attributes for SCSI library target devices on this storage node:
a. In Device Sharing Mode, select an option:
l Server Default uses the NetWorker server setting for device sharing.
l Maximal Sharing allows sharing of all devices.
l No Sharing disables device sharing.
c. In Use persistent names, choose whether NetWorker uses persistent device names
specific to the storage host operating system when performing device discovery
and autoconfiguration operations.
d. In Skip SCSI targets, list any SCSI targets to exclude from backup operations, one
per line, if the storage node type is set to SCSI. The format is bus.target.lun where
the target and LUN fields are optional. You can exclude a maximum of 63 targets.
10. For AFTD or DD Boost devices, configure the following settings in Advanced Devices:
l In Server network interface, type the unique network interface hostname of the
NetWorker server to be used by the storage nodes.
l In Clone storage nodes, list by priority the hostnames of the storage nodes to be
used for the save or “write source” side of clone operations originating from this
storage node as the “read source.” The clone operation selects the first storage
node in this list that has an enabled device and a functional nsrmmd process.
If the Clone storage nodes attribute does not contain a value, then the device
operations use the value defined in the Clone storage nodes attribute for the
Storage Node resource that was created for the NetWorker server. If the Clone
storage nodes attribute for the storage node resource is empty, then device
operations use the values that are defined in Storage nodes attribute for the client
resource that was created for the NetWorker server.
In backup-to-disk environments, it is possible for a single backup volume to be
shared by multiple storage devices on different storage nodes. This can result in
an ambiguous clone write source.
11. When finished, click OK.
request, the operation stops and an error message is logged. The default value assigned
to Nsrmmd Control Timeout is five minutes.
Procedure
1. In the server’s Administration interface, click the Configuration button.
2. Select View > Diagnostic Node.
3. Right-click the NetWorker server in the left pane and select Properties.
4. Select the Media tab.
5. Modify the attributes as appropriate and click OK.
Note
The Save Mount Timeout applies only to the initial volume of a save request.
To modify the Save Mount Timeout and Save Lockout attributes, perform the following
steps.
Procedure
1. In the server’s Administration interface, click the Devices button.
2. Select View > Diagnostic Node.
3. Right-click the remote device and select Properties.
4. Select the Advanced tab.
5. Modify the attributes as appropriate and click OK.
Note
You can apply this feature to all NetWorker clients or to selected clients. This feature has
two options:
l Max sessions—Distributes save sessions that are based on the setting in the Max
sessions attribute in storage node device resource. This is the default distribution
method.
l Target sessions—Distributes save sessions that are based on the setting defined in
the Target session attribute in each storage node device resource.
The Target sessions option is more likely to spread the backup across multiple storage
nodes. The Max sessions option is more likely to concentrate the backup load on fewer
storage nodes.
When you select the Max sessions option, the NetWorker server distributes the save
sessions for a client among eligible storage nodes as follows:
1. Identifies the available storage nodes in the NetWorker client’s storage node affinity
list.
2. Uses an available device on the first storage node in the list that is working below its
Target sessions level.
3. When all devices on the first storage node are running at their target sessions level
but some are running below their max sessions level, then NetWorker uses the least
loaded device.
4. Continues until all available devices on all storage nodes in the client’s storage node
affinity list are in use.
When you select the Target sessions option, the NetWorker server distributes save
sessions among eligible storage nodes as follows:
1. Identifies the available storage nodes in the storage node affinity list for the client.
2. Uses an available device on the first storage node in the list that is working below its
Target sessions level.
3. When all devices on the first storage node are running at their target sessions levels,
continue to the next storage node even if some devices are running below their max
sessions level.
4. When all devices on all eligible storage nodes are running at their target sessions
level, use the least loaded device that is running below its max session value.
5. Continues to send data to the least loaded device that is running below the max
session value, until all devices on all available storage nodes are running at their max
session levels.
Be aware of the following performance considerations for storage node load balancing:
l Depending on the configuration of the backup environment, there is a potential to
shorten the backup times by using the device Target session option rather than the
device Max session option. However, using the device Target sessions option with
the checkpoint restart feature can result in slower recovery times because a single
save set is more likely to be spread across multiple storage nodes.
l Each NetWorker client has a storage node affinity list. The Save sessions distribution
feature can only distribute a backup session for a client to multiple storage nodes
when the client resource has two or more storage nodes in its storage node affinity
list. The storage node affinity list is specified on the Globals (2 of 2) tab in the
NetWorker Client Properties window.
to direct the data for a client to a storage node device, modify the Storage Nodes attribute
and specify the name of the storage node in the Storage Nodes attribute of the Client
resource on a line above the default nsrserverhost entry.
If you create the Client resource for a storage node after you create the remote device on
the storage node, the default setting of the Storage Nodes attribute is the storage node
and the NetWorker server.
To modify the Storage Nodes attribute for a client, perform the following steps:
Procedure
1. In the Administration window, click Protection.
2. In left navigation pane, expand Clients, right-click the appropriate client, and select
Properties.
3. On the Globals (2 of 2) tab in the Storage Nodes attribute, specify the hostname of the
storage node, and then click OK.
Results
The NetWorker software directs the client data to the first storage node in the affinity list
with an enabled device, capable of receiving the data. The NetWorker software sends
additional saves to the next storage node in the storage node affinity list that is based on
criteria that are specified in Balancing the load on the storage node on page 94.
5. Click OK.
5. Click OK.
NOTICE
When the NetWorker software assesses how many devices need to be involved in
multiple save streams assignments with the same storage node, the device with the
lowest target session value is used as a reference.
Max sessions
The Max sessions attribute on the Configuration tab of the Device resource defines the
maximum number of save sessions for a device. The max sessions value is never less
than the target sessions value.
Procedure
1. On the Administration window, click Devices.
2. In the left navigation pane, expand Storage Nodes, right-click the storage node, and
then select Properties.
3. On the Configuration tab, in the Dedicated Storage Node option, select Yes.
4. Click OK.
Example environment
The following figure shows various backup-to-disk options deployed in a mixed operating
system environment.
l Linux/UNIX Storage Node A writes its backups to either of the following:
n The AFTD through an NFS connection to Disk Device 1.
n The AFTD on Local Disk 1.
l Windows Storage Node B uses a CIFS connection to back up to the NAS AFTD on Disk
Device 2.
l Data Domain system C writes its backups to a DD Boost device on Local Disk 2.
Figure 9 Example NetWorker disk backup configuration in a mixed backup environment.
l If an NFS server provides the AFTD storage for Client Direct backups, then the NFS
server must permit access by using the NFSv3 protocol with AUTH_SYS (AUTH_UNIX)
authentication. The NFS server also must not restrict access to clients by using only
privileged ports.
l If you enable checkpoint restart for a client, then Client Direct backups are supported
only to AFTDs, and not to DD Boost devices. If a client is enabled for checkpoint
restart and a Client Direct backup is tried to a DD Boost device, then the backup
reverts to a traditional storage node backup instead.
For Client Direct backups to AFTDs, checkpoint restart points are made at least 15
seconds apart. Checkpoints are always made after larger files that require more than
15 seconds to back up.
l Archive operations are not currently supported for Client Direct backups.
\\fileserver\aftd1
fileserver:/aftd1
l If you are setting up a UNIX/Linux storage node, specify the NFS path first. For
example:
fileserver:/aftd1
\\fileserver\aftd1
The following figure shows an example set of paths for a CIFS AFTD.
3. If an NFS server provides the AFTD storage for Client Direct backups, then specify the
username and password that is required to access the NFS server for the AFTD in the
Remote user and Password attributes on the Configuration tab of the Device
Properties dialog box for the device.
4. Ensure that the Client direct attribute is enabled on the General tab of the Client
Properties dialog box for each Client Direct client.
Client Direct backups are enabled by default.
Select View > Diagnostic Mode in the Administration interface to access the Client
direct attribute in the Client Properties dialog box.
Function or operation File type device Advanced file type DD Boost device
(FTD) device (AFTD)
Create a device Device Property l Device Configuration l Device
Window Wizard Configuration
Select the media Wizard
l Device Property
type: file. Window l Device
Property
UNIX/Linux storage Select media type:
Window
node: adv_file.
local or NFS only. Select media
UNIX/Linux storage
type:
Windows storage node: local
Data Domain
node: local or NFS only.
path only. CIFS is not
supported for Windows storage
FTDs. node: local or
CIFS using UNC path or
using NFS:
Remote user,
Password.
Concurrent AFTD
recovery operation
limitations on page
120 provides
more information about
performing
concurrent recovery
operations from an
AFTD.
Function or operation File type device Advanced file type DD Boost device
(FTD) device (AFTD)
have set volume savegroup (if you have immediately
recycle to Auto). set volume recycle to remove
Auto). NetWorker aborted save
removes space on the sets, but
AFTD as specified in marks them
the Reclaim Space recyclable. A
Interval of the staging restarted save
policy. can be
deduplicated.
Otherwise,
NetWorker
removes the
aborted save
set during the
next Recover
Space
operation.
Volume default capacity If the file type device Does not apply. Does not apply.
for devices was used before
setting the Volume
Default Capacity
attribute, the data
for that file type
device must be
staged or cloned to
another device.
AFTD Percentage Does not apply. A setting determines the Does not apply.
Capacity capacity that NetWorker
software should stop
writing to an AFTD: spans
from 1% to 100%.
Function or operation File type device Advanced file type DD Boost device
(FTD) device (AFTD)
Save set continuation Yes No. Save sets that start on No. Save sets that
an AFTD must be start on a DD Boost
completed on the same device must be
device. completed on the
same device.
Data format in device EMC Open Tape Save stream (uasm) format Deduplicated
Format (OTF). (uses less space).
Cloning operations Save sets are cloned Save sets are cloned one The EMC NetWorker
one at a time. Both at a time. Automatic Data Domain Boost
automatic and cloning begins after the Integration Guide
manual cloning can save sets are backed up. provides details for
begin only after all Manual cloning of a save advanced CCR
the save sets in a set can begin when it has cloning and
savegroup are finished its backup. replication with DD
backed up. Boost devices.
Two simultaneous clone
operations
can be run from the
command prompt,
provided no backup,
recover, or stage
operations are running
simultaneously. The
syntax is as follows:
nsrclone -S [ssid
/cloneid1]
nsrclone -S [ssid
/cloneid2]
NetWorker archive
operations are not
Function or operation File type device Advanced file type DD Boost device
(FTD) device (AFTD)
supported for
Client Direct
backup.
Table 27 Default values and ranges for target and max sessions attributes
* The recommended session values are guidelines only and are subject to bandwidth, data type,
and device capabilities.
Device target and max sessions default values and ranges 107
Backup Storage
d. Click OK.
4. In the navigation tree, right-click Devices, and select New Device Wizard.
5. In the Select the Device Type window, select AFTD and click Next.
6. In the Select Storage Node window, specify the path to the storage directory that will
contain the AFTDs.
a. In the Storage Node list, select the storage node that you will use.
b. If the directory for the intended AFTDs is on a different storage node or a remote
storage system, select Device storage is remote from this Storage Node and type
the Network Path of the remote host directory that will contain the devices.
For example, if the storage node is a Microsoft Windows system and you use a CIFS
AFTD on a remote storage system host, this path could be something like the
following:
\\dzone1_storhost2.lss.corp.com\share-1
This storage path is not a device. It is the directory location in which the shared
devices are to be created.
7. In Browse or Manual, select which option you will use to specify the pathnames of the
devices:
l Browse Storage Node or network path. The next wizard step will prompt you to
browse and add the devices.
l Manually enter local or remote device paths. Select this to skip the browse step
and manually type unique names for the devices you want to add:
n For remote devices, type the device paths relative to the Network Path that you
specified for the storage directory. For example:
cifsaftd-1
cifsaftd-2
n For local devices, type the absolute paths to these devices. For example:
C:\cifsaftd-1
C:\cifsaftd-2
Multiple devices for a single volume configuration on page 115 provides
details for shared volumes.
8. If the storage host is remote from the storage node, in the Authentication area, type
the appropriate Username and Password to access the storage directory.
9. Click Next.
10. If you selected the Browse option in the previous window:
a. In the Select the Device Path window, verify that the storage node shows the path
of a storage directory.
b. Add devices to the storage directory by clicking New Folder and typing unique
device names. For example:
cifsaftd-1
cifsaftd-2
rd=remote_storagenode_hostname:device_name
For example:
rd=dzone1_storhost2:aftd-1
e. In Max Sessions specify the maximum number sessions the device may handle. If
no additional devices are available on the host, then another available storage
host takes the additional sessions, or retries are tried until sessions become
available.
The default value is 32 for AFTDs, which typically provides best performance. It
cannot be set to a value greater than 60.
Note
The Max Sessions setting does not apply to concurrent recover sessions.
f. Click Next.
12. In the Label and Mount device window, if you select the Label and Mount option,
specify the attributes for:
l Pool Type.
l Pool to use.
13. In the Review the Device Configuration window, review the settings and click
Configure.
14. In the Check results window:
a. Review whether the devices were successfully completed or any messages.
b. Click Finish.
c. To go back, click Back to the appropriate wizard step.
NOTICE
Do not use a temporary directory for AFTDs. The data could be overwritten.
d. Click OK.
4. In the navigation tree, right-click Devices and select New.
The Create Device window opens, with the General tab selected. The Identity area
might show a default device name in the Name field.
rd=remote_snode_hostname:device_name
For example:
rd=snode-1:aftd-1
NFS_host:/path
where:
l NFS_host is the hostname of the NFS file server
l path is the NFS-mountable path that is exported by the file server
This format is required to allow Client Direct access for Windows or non-root
UNIX clients.
Note
Non-root Client Direct access to an NFS AFTD is supported only with the NFSv3
protocol and AUTH_SYS authentication on the NFS host. For Client Direct access
to an AFTD when the backup client is able to run as root on the AFTD host,
provide a mount point or automounter path.
Note
/mnt/aftd-1
/net/storho-1/snode-1/aftd-1
where:
n aftd-1 is the storage device directory name
n storho-1 is the storage system hostname
n snode-1 is the storage node hostname
The first path enables the storage node to access the device via its defined
mount point. The second path enables Client Direct clients to use the
automounter path to directly access the device, bypassing the storage
node.
6. In the Status area, ensure that the Auto Media Management tape feature is not
enabled.
7. In the Cleaning area, leave the options for cleaning at their default (disabled) settings,
so that automatic cleaning is not invoked.
8. Select the Configuration tab.
9. In the Save Sessions area, set the number of concurrent save sessions (streams) and
the number of nsrmmd (data mover) processes the device may handle:
l Target Sessions is the number of sessions that a nsrmmd process on the device
will handle before another device on the host will take the additional sessions.
Use this setting to balance the sessions among nsrmmd processes.
If another device is not available, then another nsrmmd process on the same
device will take the additional sessions.
Typically, set this attribute to a low value. The default values are 4 for AFTDs and 6
for DD Boost devices. It may not be set to a value greater than 60.
Multiple devices for a single volume configuration on page 115 provides details
on volume sharing.
l Max Sessions is the maximum number sessions the device may handle. If no
additional devices are available on the host, then another available storage host
takes the additional sessions, or retries are attempted until sessions become
available.
The default values are 32 for AFTDs and 60 for DD Boost devices, which typically
provides best performance. It cannot be set to a value greater than 60.
The Max Sessions setting does not apply to concurrent recover sessions.
l Max nsrmmd count limits the number of nsrmmd processes that can run on the
device. Use this setting to balance the nsrmmd load among devices. The default
value is 4.
To modify this value, first adjust the sessions attributes, apply, and monitor the
effects, then update max nsrmmd count.
At least one nsrmmd process is reserved for restore or clone operations.
10. In the Local Backup area, leave Dedicated Storage Node at No (the default).
11. In the Remote Host area, if an NFS path is specified in the Device Access Information,
then type a Remote User name and Password.
The remote username is the name of the user on the NFS server. It is recommended
that you also specify the numeric user id (UID) of that user. Do this by appending a
colon (:) and the UID after the username, for example, user_name:4242.
Note
If the device username is changed after labeling, manual action may be required to
change the owner of all files and directories in the AFTD. NetWorker will try to perform
this automatically during the next operation, however the ability to do so depends on
the security configuration of the file server where the AFTD storage resides.
NOTICE
Do not use a temporary directory for AFTDs. The data could be overwritten.
d. Click OK.
4. In the navigation tree, right-click Devices and select New.
The Create Device window opens, with the General tab selected. The Identity area
might show a default device name in the Name field.
rd=remote_snode_hostname:device_name
For example:
rd=snode-1:aftd-1
E:\aftd-1
\\snode-1\aftd-1
The first path enables the storage node to access the device via its local drive.
The second path enables Client Direct clients to access the device directly,
bypassing the storage node.
l For a CIFS-mounted AFTD, specify the complete paths of the directory that is
created by using the Universal Naming Convention (UNC), for example:
\\CIFS_host\share-point-name\path
6. In the Status area, ensure that the Auto Media Management tape feature is not
enabled.
7. In the Cleaning area, leave the options for cleaning at their default (disabled) settings,
so that automatic cleaning is not invoked.
8. Select the Configuration tab.
9. In the Save Sessions area, set the number of concurrent save sessions (streams) and
the number of nsrmmd (data mover) processes the device may handle:
l Target Sessions is the number of sessions that a nsrmmd process on the device
will handle before another device on the host will take the additional sessions.
Use this setting to balance the sessions among nsrmmd processes.
If another device is not available, then another nsrmmd process on the same
device will take the additional sessions.
Typically, set this attribute to a low value. The default values are 4 for AFTDs and 6
for DD Boost devices. It may not be set to a value greater than 60.
Multiple devices for a single volume configuration on page 115 provides details
on volume sharing.
l Max Sessions is the maximum number sessions the device may handle. If no
additional devices are available on the host, then another available storage host
takes the additional sessions, or retries are attempted until sessions become
available.
The default values are 32 for AFTDs and 60 for DD Boost devices, which typically
provides best performance. It cannot be set to a value greater than 60.
The Max Sessions setting does not apply to concurrent recover sessions.
l Max nsrmmd count limits the number of nsrmmd processes that can run on the
device. Use this setting to balance the nsrmmd load among devices. The default
value is 4.
To modify this value, first adjust the sessions attributes, apply, and monitor the
effects, then update max nsrmmd count.
At least one nsrmmd process is reserved for restore or clone operations.
10. In the Local Backup area, leave Dedicated Storage Node at No (the default).
11. In the Remote Host area, if a network path is specified in the Device Access
Information, then type a Remote User name and Password.
12. Click OK when the configuration is complete.
13. If a new password for an AFTD is provided, unmount and re-mount the device to
ensure that the change takes effect.
Note
The Max Sessions setting does not apply to concurrent recover sessions.
remote storage nodes, the Name attributes for the three devices, each created
separately, might be specified by different aliases as follows:
aftd-1a
rd=dzone1-sn2:aftd-1b
rd=dzone1-sn3:aftd-1c
The Device Access Information for each of these aliases would specify a single directory
that must be specified as a valid complete path. For example, if a directory is named
“aftd-1” on the storage host named “storho1,” the path might be specified as follows:
l If the storage node uses an automounter:
/net/storho1/dzone1/aftd-1
l If the storage node uses an explicit system mountpoint, you might specify one of the
following paths:
n /mnt/storho1/dzone1/aftd-1
n /mnt/dzone1/aftd-1
n storho1:/dzone/aftd-1
Note
Starting with NetWorker 8.0, multiple clone sessions can be run from a single AFTD or DD
Boost device if each clone is written to a dedicated tape device. However, the number of
clone sessions that can be run is limited by the value in the device’s max nsrmmd count
attribute. Create and configure an AFTD on page 108 provides more information.
2. In the Pools field, select the media pool to be used for the device.
A label for the storage device is generated and displays in the Volume Label field. The
label name is based on the label template for the selected pool.
It is recommended to use a pool dedicated to AFTD backup devices only.
NOTICE
Immediately following the message, the action that is associated with the "Filesystem
Full — Recover adv_file Space" notification occurs. By default, the action for this
notification uses the nsrim command to delete expired save sets. If enough space is
cleared, the backup continues. If the recycle setting for the volume is manual, then the
expired save sets are not removed from the volume.
The AFTD deletes expired save sets depending on the retention policy and the recycle
setting. If sufficient storage space is not available after 10 minutes from when the expired
savesets begin deletion, the associated "Filesystem Full—Waiting for adv_file Space"
notification action occurs. By default, an email notification is sent to the root user on the
NetWorker server on UNIX and Linux, and a message is logged in the media log file in
NetWorker_install_path\logs on Windows.
When the notification is sent, and the message is logged in the media log file, the backup
stops until space is available for the backup to continue. You can create customized
notifications to change and expand how the NetWorker software behaves when an "AFTD
Filesystem Full" notification occurs. Custom notifications can also run custom scripts and
other programs to expand the capacity of existing AFTDs.
The chapter "Reporting NetWorker Datazone Activities" provides more information about
how to configure notifications.
the user indicates. The wait time after the default notification is approximately 10
minutes.
Procedure
1. In the server’s Administration interface, click Server.
2. Right-click Notifications and select New.
3. For Name, type a unique name for this second custom notification, such as Second
adv_full Notice.
4. For Event, clear all choices except adv_file.
5. For Priority, clear all choices except Critical, Emergency, and Alert.
6. For Action, specify the full path of the custom script to be run, for example: /mybin/
my_second_custom_script.
7. Click OK.
NOTICE
If your device uses compression or deduplication, you can still use the AFTD Percentage
Capacity attribute however, the device will be marked as having reached its threshold
prematurely. In this case, there will be more unused space on the disk than expected.
This is because the threshold limit is based on the amount of data being protected
without accounting for the effect of compression or deduplication.
NOTICE
Do not edit device files and directories. This can cause unpredictable behavior and make
it impossible to recover data.
Disabling a device
Disabling a device prevents further operation of the device. The device may be re-enabled
to restore old data, which is retained but not active.
Procedure
1. In the NMC window for your NetWorker server, click the Devices view and select the
Devices folder in the navigation tree.
2. In the Devices table, right-click the device to be disabled and select Unmount.
3. Right-click this unmounted device and select Enable/Disable to disable.
4. Inspect the Enabled column of the table to verify that the device is disabled.
Deleting a device
The procedure for deleting a device includes an option for also erasing the volume
(access path) that stores the device’s data. The volume can be erased only if no other
device in the system shares the volume.
Procedure
1. In the NetWorker server Device view, click Devices in the navigation tree.
2. In the Devices table, right-click the device to be removed and select Delete.
A confirmation window appears.
Note
If the volume that you want to erase is shared by another device, then an error
message displays the name of the other device. You must delete all other devices
that share the volume until the last one remaining before you can erase the
volume.
When you recover data from an AFTD, NetWorker recovers the save sets concurrently. You
can recover multiple save sets to multiple clients simultaneously and you can clone save
sets from an AFTD to two different volumes simultaneously.
NOTICE
Changing the block size and re-labeling an existing AFTD has the potential to destroy data
if the data is not staged to another location.
Procedure
1. In the server’s Administration interface, click Devices.
2. Select View > Diagnostic Mode.
3. Select Devices in the navigation tree. The Devices detail table appears.
4. Double-click the device in the devices table and select the Advanced tab.
5. In the Device block size attribute, select a value from 128 to 256.
6. Click OK.
7. Relabel the AFTD device for the new setting take effect.
DD Boost devices
DD Boost devices are covered separately in the EMC NetWorker Data Domain Boost
Integration Guide
b. In the Data Domain DDBoost Username field, type the username of the Data
Domain user.
c. In the Data Domain DDBoost Password field, type the password of the Data
Domain user.
d. Specify the required values in the other fields.
e. Click Next.
6. On the Select the Folder to Use as Devices page:
a. Click New Folder to create a folder for the device.
b. Select the newly created folder.
c. Specify the required values in the other fields.
d. Click Next.
7. On the Configure Pool Information page:
a. Under Pool Type, select one of the following pool types:
l Backup
l Backup Clone
b. Under Pool, perform one of the following tasks to select the pool:
l Select Create and use a new pool, and type the pool number in the text box.
l Select Use an existing pool, and select the pool from the drop-down list box.
CloudBoost devices
This section describes how to configure NetWorker 9.0.1 and later to perform backup,
staging, cloning, and recovery operations to a CloudBoost 2.1 appliance. Cloud-based
data protection occurs over a TCP/IP network. You can compress and encrypt the data.
CPU Cores 8-16 EMC recommends 16 cores when you enable site
caching.
Hard Disk 2 750 GB This disk contains the metadata. The deployment
process creates this disk with a size of 41 GB.
You must manually increase the size of the disk.
Hard Disk 3 200 GB This disk contains the site cache. The deployment
process creates this disk. You must manually
increase the size of this disk.
Network dependencies
Cloud backups are highly dependent on the network connection that is used to access
the cloud service. Any disruption in connectivity or a slowdown in network access speed
may adversely affect cloud backups or recoveries.
Proper name resolution and internet access is required for the CloudBoost appliance. The
CloudBoost appliance documentation provides more information.
b. In Hostname (FQDN) field, specify the Fully Qualified Domain Name (FQDN) of the
CloudBoost appliance.
c. In the Username field, type remotebackup.
d. In the Password field, type the password for the remotebackup account, which you
defined on the CloudBoost appliance by using the remote-mount command.
e. In the Configuration Method group box, select one of the following options:
l Browse & Select—Select this option to browse the file system on the
CloudBoost appliance and select the folder that NetWorker will use as the
target data device. When you select this option, NetWorker validates the
CloudBoost username and password that you specified.
l Manual—Select this option to manually specify a folder in the /mnt/magfs
directory on the CloudBoost appliance that NetWorker will use as the target
data device. When you select this option, NetWorker will not validate the
CloudBoost username and password that you specified.
Note
The storage path that you specify must exist in the /mnt/magfs directory with
write access enabled.
l If you selected Browse & Select in the Configuration Method box on the
CloudBoost Configuration Options window, then the Browse and Select the
CloudBoost Device Path window appears. Select or create a path on the /mnt/
magfs file system on which to create the NetWorker device or use the New Folder
option to create a new device folder.
NetWorker updates the NetWorker Device Name and Storage Path fields with the
appropriate information.
12. Click Next.
13. On the CloudBoost Pool Configuration window, perform the following steps:
a. Leave the Configure Media Pools for devices option enabled.
b. In the Devices table, select the NetWorker device for the CloudBoost Appliance.
c. In the Pool Type box, select Backup or Backup Clone.
d. In the Pool box, select Create and use a new Pool, then specify a pool name, or
select Use an existing Pool and select a pool that contains at least one CloudBoost
device.
Note
The pool that you select cannot contain other device types such as AFTD and DD
Boost devices.
e. Leave the Label and Mount device after creation option enabled.
14. Click Next.
15. In the Review the Device Configuration window, review the settings and click
Configure.
16. In the Check results window:
a. Review whether the devices were successfully completed or any messages.
b. Click Finish.
c. To go back, click Back to the appropriate wizard step.
backup activities. You do not require a storage node when backing up Linux hosts by
using Client Direct.
Before you begin
l Create a NetWorker device for the CloudBoost appliance that the storage node
manages.
l Install the NetWorker storage node, client, and extended client software on the Linux
host. It is recommended that you install the NetWorker storage node on a separate
Linux server. The EMC NetWorker Installation Guide describes how to install the
NetWorker software.
l Create a storage node resource on the NetWorker server for the storage node host.
The EMC NetWorker Administration Guide describes how to create the storage node
resource.
Note
Do not use a storage node on the CloudBoost appliance and do not create devices on
the storage node for CloudBoost.
Procedure
1.
Click the Devices button on the taskbar.
2. Expand Devices in the left navigation pane:
a. Right-click the CloudBoost device.
b. Select Copy.
The Create Device window appears.
3. In the Create Device window, perform the following steps:
a. In the Name field, specify the hostname of the new storage node and a new device
path in the format rd=hostname:device_path.
For example, rd=nwsn01.emc.com/ms_server_backups
b. For the Device access information field, specify the hostname of the CloudBoost
appliance, and the device path that you specified in the Name field in the format
hostname/device_path.
c. Click OK.
Note
During device creation, the NetWorker software automatically creates the device
path on the CloudBoost appliance.
Network dependencies
Cloud backups are highly dependent on the network connection that is used to access
the cloud service. Any disruption in connectivity or a slowdown in network access speed
may adversely affect cloud backups or recoveries.
Proper name resolution and internet access is required for the CloudBoost appliance. The
CloudBoost appliance documentation provides more information.
where:
path\filename is the location to store the certificate file on the NetWorker server.
https_server is the hostname of the https server.
For example:
Note
A cloud storage device name does not specify a path to the device. You can use any
combination of alphanumeric characters for the device name.
4. In the Comment field and the Description field, add an optional comment and
description, respectively.
5. In the Media Type field, select Atmos COS as the device type if you are using Atmos as
the cloud server.
6. In the Remote User field, type the username that is used to access the cloud server.
For an Atmos COS device, this is the token-id.
7. In the Password field, type the password that is used to access the cloud server. For
an Atmos device, this is the shared secret.
8. Select the Cloud tab to specify additional information specific to the cloud backup
device.
9. In the Server field, type the IP address or fully qualified domain name of the cloud
server.
10. Use the Parameter options to adjust network communication attributes:
a. In the Network Write Size field, specify the amount of backup data, in kilobytes, to
cache in memory before sending to the cloud. Larger write sizes typically result in
better performance but results vary depending on the underlying network
characteristics. Also be aware that larger sizes consume more memory on the
storage node for the duration of the backup or recover operation.
b. In the Number of Retries field, specify the number of times that NetWorker will
attempt to send backup or receive recover data in the event of a network failure.
c. In the Send/Receive Timeout field, specify the number of seconds that NetWorker
will wait for confirmation that network send and receive transmissions to the cloud
server have occurred successfully. If the timeout period expires, the data
transmission is considered to have failed.
l Set the value of this field in conjunction with the Network Write Size field.
Larger Network Write Size values require larger Send/Receive Timeout values to
avoid failures. Optimal values for the Send/Receive Timeout field vary
depending on the network speed and bandwidth.
l The save group’s Inactivity Timeout value can potentially interact with the
Send/Receive Timeout value in unintended ways. To avoid this possibility,
ensure that the save group’s Inactivity Timeout value (default is 30 minutes) is
greater than the Send/Receive Timeout value (default is 30 seconds).
d. In the Network Failure Retry Interval field, specify the number of minutes that a
backup or recover session must wait before a failed network connection results in
an aborted backup or recover session.
11. In the Compression field, select a compression level for data that is sent to the cloud.
Faster compression speeds result in less data compression but also require less CPU
resources. The fastest compression speed, Compression Speed Fast, performs the
least amount of data compression and is selected by default.
To choose an optimal compression value, balance the potentially longer backup
window of using a slower compression speed against the potential efficiency and cost
savings of sending less backup data to the cloud.
NOTICE
If the NetWorker Cloud Back Option determines that backup data cannot be
compressed effectively, compression may not occur regardless of the setting in this
field.
12. In the Encryption field, specify whether to enable or disable encryption of data sent to
the cloud. Encryption is standard NetWorker AES 256 bit encryption and is selected by
default. If desired a NetWorker datazone pass phrase can be defined that would be
used to recover encrypted data.
If this option is selected, encryption will occur regardless of any client-side encryption
directives. The EMC NetWorker Security Configuration Guide provides more information
about encryption including how to specify a new datazone pass phrase.
NOTICE
If encryption is already enabled for the NetWorker client and encryption is enabled in
this field, backups will be slower because encryption functions will occur twice.
13. Use the Cloud network interface field if the Storage node has multiple network
interfaces. If it does, specify the IP address of the network interface that will send
backup data to the cloud.
To display the Cloud network interface field, select View > Diagnostic Mode from the
menu bar.
14.
Select Throttling and then click the Bandwidth icon to display a dialog box where
you can adjust the maximum internet bandwidth that a cloud backup or recovery
operation can consume at any given time of the day or week. This option enables you
to prevent network congestion by limiting cloud backup and recovery activity during
peak internet usage.
a. Select New to add a bandwidth throttling policy.
b. From the Day field, select the day of week to which the policy applies.
c. Click the up and down arrows to select a time of the day to which the policy starts
and ends. Alternatively, type the times directly into the Start time and End time
fields.
d. Click the up and down arrows to select the maximum possible network bandwidth.
in megabits per second, that a backup or recovery operation can consume when
the policy is in effect. Alternatively, type the values directly in the fields.
You can create as many policies per day as required. You can also modify or delete
existing throttling policies as necessary.
Note
It is recommended that the media pool you select be used for cloud backup devices
only.
A label for the cloud storage device is generated and displayed in the Volume Label
field. The label name is based on the label template that was specified for the cloud
media pool.
The inquire command and the Scan for Devices operation do not detect more than 128 tape
devices
By default, the Linux st kernel module only configures up to 128 SCSI tape devices
(/dev/nst).
When the number of SCSI tape devices exceeds the kernel value ST_MAX_TAPES, the
following error may appear in the /var/log/messages operating system log file:
NOTICE
For some devices, such as the HP Model 48AL autochanger, select one SCSI address for
the entire autochanger. The 48AL uses a different SCSI logical unit number (LUN) for the
device (LUN 0) and robotics (LUN 1). The SCSI LUN appears as the last digit of the H/W
Path field in the ioscan output.
If the schgr driver is not configured on the system, no driver appears to be associated
with the library. The ioscan output line resembles:
NOTICE
Use the inquire command with caution. Running inquire sends the SCSI inquiry
command to all devices detected on the SCSI bus. Using the inquire command during
normal operations may cause unforeseen errors and possible data loss may result.
An example of the output from this command (with the -s option) is as follows:
As of HP-UX 11iv3, two different addressing modes are supported: LEGACY and AGILE.
The inquire program lists devices using the B.T.L. notation for the LEGACY addressing
mode, for example:
scsidev@B.T.L.
For the AGILE addressing mode, it lists devices using the DSF notation, for example:
/dev/rtape/tape106_BESTnb
2. If a library is in use and there is no mounted, appendable volume in the library, the
server determines whether there is an unmounted, appendable volume available. This
includes newly labeled volumes.
3. If multiple unmounted, appendable volumes are available, the volume with the oldest
label time is selected.
4. If no mounted volumes are appendable and Auto Media Management is enabled, a
mounted volume with the mode recyclable is selected. The server relabels and
mounts the volume.
5. If a stand-alone device is being used and Auto Media Management is not enabled, the
server sends a mount request notification.
6. If a library is in use and no unmounted, appendable volumes exist, the server
determines whether there is an unmounted, recyclable volume.
7. If Auto Media Management is not enabled, or if there are no appendable or recyclable
volumes, the server sends a mount request notification.
Managing volumes on page 452 provides information about appendable and
recyclable volumes.
NOTICE
NetWorker will automatically unload volumes that have been placed in a jukebox device
but have never been mounted (for example, nsrjb -l -n <volume>). Any command, such as
the scanner command, that operates on volumes that have never been mounted will be
affected by this behavior. To prevent NetWorker from unloading the volume, the device
should be set to service mode while the command is being run.
Note
You can manually change the mode of a volume to recyclable. Changing the volume
mode on page 452 provides information about changing the mode of a volume.
You can configure a media pool to automatically relabel recyclable volume at a user
defined time and interval. Automatically relabeling volumes in a media pool on page 86
provides more information about configuring the automatic relabel process for recyclable
volumes in a media pool.
VTL licensing
The EMC NetWorker Licensing Guide provides information about NetWorker licensing
support for a Virtual Tape Library.
l Typically, deduplication ratios are initially low when you increase max sessions and
device block size due to re-priming and re-analysis overhead, following which
efficiency improves.
l Heavily used Data Domain systems, with 75% or more disk space that is already
used, can suffer impaired performance when used with multiple sessions.
l As a best practice, do not use client-side or server-side encryption during backup to
the Data Domain system.
Configuring multiplex backup to Data Domain VTL devices
Configure Data Domain VTL devices for multiple session backups as follows.
Procedure
1. Shut down backup service on the NetWorker VTL storage node, or shut down the
NetWorker server if that is possible, and verify that there is no backup activity on the
storage node.
2. Use NMC or the nsradmin command to set the sessions values for each VTL device.
The recommended values are: max sessions=4 (32 maximum); target sessions=4;
and device block size=512KB.
Optimal max sessions and device block size values depend on your environment. For
example, max sessions=2 might provide better stability and deduplication while still
meeting your backup window.
Note
If you shut down the NetWorker server in step 1, you can run the nsradmin
command with the -d resdir option. This option uses the NetWorker resource
database, resdir , without opening a network connection.
nsradmin -i input_file.txt
where input_file.txt is a text file that contains the following lines that you can
customize to your own environment:
option regexp: on
. type: nsr device; media type: LTO Ultrium-3; media family: tape;
name: /dev/rmt*
update max sessions: 4; target sessions: 4; device block size:
512KB
3. Create a no intra-block multiplexing (nibmp) tag file in the NetWorker debug folder on
the NetWorker storage node.
For example, you can use the standard NetWorker installation paths for the tag file.
You can limit the tag file path to a specific pool by adding the _poolname variable as a
suffix to the tag file. The _poolname can include spaces, for example, _My Pool. On
Microsoft Windows systems, ensure the specified pathname is enclosed in quotes.
Unix/Linux system examples.
touch /nsr/debug/nibmp
touch /nsr/debug/nibmp_My Pool
Note
Persistent binding
Persistent binding guarantees that the operating system always uses the same SCSI
target ID for SAN devices, regardless of reboots or other events, by statically mapping a
target's WWN address to a desired SCSI address. On some operating systems, this is
done by default, while on others it has to be set manually. The operating system
documentation provides further information.
In most cases, persistent binding should also be set on the Host Bus Adapter (HBA) by
using the configuration utility that comes with the Fibre Channel HBA. The HBA device
driver documentation provides details.
Persistent binding is required for consistent library operations within NetWorker, because
the NetWorker server communicates with the library controller over a SCSI address that is
chosen during initial library configuration. If the SCSI address changes, the library will
become unavailable. In this case, disable the library and change the “control port”
address to reflect the new SCSI address of the library controller.
If devices have already been configured in NetWorker prior to enabling persistent binding
on the host, delete existing devices from the library resource and perform a re-scan of
devices followed by a reconfiguration of the tape library.
Persistent naming
Persistent naming is used to ensure that the operating system or device driver of a server
always creates and uses the same symbolic path for a device (referred to as device file).
After you create persistently named device files and they are present on the host, enable
the Use persistent names option when scanning for tape devices from the NetWorker
Management Console.
If devices have already been configured in NetWorker prior to enabling persistent naming
on the host, delete existing devices from the library resource and perform a re-scan of
devices followed by a reconfiguration of the tape library.
Configure libraries
A library resource must be created on a storage node for each library, including silos, that
you want to use with NetWorker. Because the NetWorker server is also a storage node,
this procedure applies to a NetWorker server and all storage nodes. You can configure a
library either automatically with the Configure All Libraries wizard or manually with the
user interface.
Before you create devices, you must create the storage node that will manage the
devices. Storage nodes on page 91 provides details. When you create the new devices,
you can use NetWorker to perform a device scan, which searches for new devices across
multiple storage nodes.
NetWorker can only automatically create tape devices that have serial numbers. Use the
inquire or sn commands to determine if a device returns a serial number. UNIX man
page and the EMC NetWorker Command Reference Guide provides detailed information
about how to use the inquire and sn commands.
NetWorker can automatically configure the following library types:
l SCSI
l NDMP
l ACSLS Silo
Use the jbconfig command to configure a library that contains tape devices or a
robotic arm that does not have serial numbers. Use the jbconfig command to
configure IBM tape libraries that are controlled through the use of the IBMs tape driver.
This is because the device autodetection code uses the internal lus driver to control
libraries.
Note
Before you create devices on a storage node, update the devices to the most recent
firmware and driver versions.
NOTICE
Autodetection should not be used for devices on a Storage Area Network (SAN) while any
of the devices are in use, because this may cause the device in use to become
unresponsive. To avoid this situation, do not configure a device in multiple NetWorker
datazones.
NOTICE
If Configure All Libraries is started from the server folder instead of from the Storage
Node folder, then all storage nodes on the NetWorker server are automatically
selected for configuration in the wizard.
The Configure All Libraries wizard appears. This lets you step through library
configuration, including this input (some of which is filled in by default):
l A specific network interface can be used between the NetWorker server and the
storage node when scanning for devices. Identifying a specific network interface for
device scan operations on page 148 provides more information.
Procedure
1. In the Console window, click Enterprise.
2. In the navigation tree, select a NetWorker server.
3. In the Name column of the Host detail table, double-click NetWorker. The NetWorker
Administration window for the selected server opens. Note that while multiple
NetWorker Administration windows can be open simultaneously, each one displays
information about only one host or server.
4. In the Administration window, click Devices.
5. In the navigation tree:
a. Right-click the server name, and select Scan for Devices.
b. Click the storage node to be scanned.
c. If the appropriate storage node is not listed, click Create a New Storage Node.
d. When creating a new storage node, replace the default value in the Name field with
the fully-qualified domain name or short name of the new storage node.
e. Fill in any required information, such as whether to scan for SCSI or NDMP devices
and whether to search all LUNs.
f. Click Start Scan. To monitor the scan activity, click Monitoring, then select the Log
tab. Any relevant status information is displayed there.
6. Return to the Devices navigation tree to view the refreshed device information
(configured and unconfigured):
l To display SCSI and NDMP libraries available to the NetWorker server, select
Libraries in the navigation tree. Any available library or silo appears in the
Libraries detail table.
l To display stand-alone devices available to the NetWorker server, select Devices in
the navigation tree. Any available stand-alone device appears in the Devices detail
table, along with devices available in libraries.
l To display the libraries and devices that are available to a storage node, select the
storage node in the navigation tree. Available storage nodes appear in the table.
Double-click a storage node to see its details, along with the devices that are
available in the storage node.
l Do not use identical barcode labels for any of the NetWorker volumes. The use of
identical labels defeats the purpose of using barcode labels, which is to facilitate the
inventory process and ensure label accuracy.
l Volume names must be unique on the NetWorker server. Give each volume a unique
volume label. If a second volume is labeled with an existing barcode label and the
Match Barcode Labels attribute in the library’s properties is enabled, the NetWorker
server displays an error message and does not allow the second volume to be
labeled. The error message identifies the library slots containing the two volumes
with identical labels and the barcode label.
To correct this problem, either apply a different label to one of the volumes and
restart the labeling process, or disable the Match Barcode Labels attribute in the
library’s properties while labeling the second volume.
l It is not necessary to label existing volumes with barcode labels if they are stored in a
vault or offsite for long periods. These volumes are rarely, if ever, inventoried.
l Before using barcode labels on existing volumes, affix the barcode labels to them.
Then, load and mount each volume individually, so that the NetWorker server can
match the barcode label with the existing volume label.
l Record the volume label on the tape.
l A variety of barcode labels can be purchased from third-party vendors. Choose from
among numeric labels, alphanumeric labels, or a special combination of numbers
and characters. Furthermore, barcode labels can be ordered to match a current
volume labeling scheme.
l Use a consistent labeling scheme. If volumes are labeled with the server name and
an extension such as “001,” order a range of labels starting with “server_name.001”
and ending with “server_name.100”, or as wide a range as necessary. Instructions for
barcode labels should be provided with the library hardware documentation. Contact
the hardware manufacturer with questions about barcode labels. A consistent
labeling scheme helps better organize and track volumes. It also facilitates the
inventory process if all of the volumes, use barcode labels.
Note
If unmatched volume and barcode labels are to be used, ensure that labels are attached
to the outside of the volumes.
Procedure
1. Apply barcode labels to the volumes.
2. Place the volumes with the barcode labels in the library.
3. In the Administration window, click Devices.
4. Open the Libraries folder. The Libraries detail table appears.
5. Right-click the appropriate library, and select Properties. The Properties window
appears.
6. Select the Configuration tab.
7. In the Media Management area of the Configuration tab:
l Select Bar Code Reader.
l Ensure that Match Bar Code Labels is not selected.
8. Click OK. The NetWorker server uses the next available label from the label template
for the volume name. It labels the volumes and records both labels in the media
database.
9. Inventory the volumes to ensure that the NetWorker server has the most current
volume information.
10. Use Media > Volumes to match the correct volume labels to the barcode labels.
Consider making a list of the name correlations.
Note
If the barcode function is enabled, but no barcode label is affixed to the volume, an
error message indicates that a barcode label does not exist.
EMC recommends that you set the Max parallelism attribute of the Library resource to one
less than the number of devices within the library, which allows you to reserve on device
for recovery operations.
To improve the efficiency of library operations that operate on multiple volumes, use
multiple devices in parallel for these operations. However, you may wish to restrict the
number of devices that NetWorker uses for inventorying and labeling operations, to
ensure that some devices are available for other library operations.
If the Auto Media Managment feature is enabled, the NetWorker server considers
volumes that were labeled by a different application to be valid re-label candidates.
Once the NetWorker server re-labels the volume, the previously stored data is lost.
l Mounts the volume.
l Overwrites volumes that are consider to be unlabeled. The NetWorker server
considers a volume to be unlabeled under the following conditions:
n Has no internal label.
n Is labeled with information other than a NetWorker label.
n Is labeled with a NetWorker label, but the density that is indicated on the internal
label differs from that of the device where the volume is mounted.
l Recycles volumes eligible for reuse that are loaded into the device.
When you do not enable the Auto Media Management feature, the NetWorker server
ignores unlabeled volumes and does not use the volume for backup.
The Auto Media Management feature can re-label a volume that has a different density, it
is possible, inadvertently, to overwrite data that still has value. For this reason, be careful
if NetWorker volumes are shared among devices with different densities.
Existing tapes with NetWorker labels
When Auto Media Management is used with tapes that have NetWorker labels that have
not been recycled, the volumes must be removed from the media database before a
utility such as tar is used to overwrite the labels. Also ensure that the tapes have been
fully rewound before overwriting the labels. Auto Media Management can then properly
relabel the tapes.
Auto Media Management for stand-alone devices
The Auto Media Management feature can be enabled for stand-alone devices during
manual device configuration, or from the Properties window after configuration.
When Auto Media Management is enabled for a stand-alone device, the following
processes occur when a volume becomes full during a backup:
l A notification is sent that indicates that the server or storage node is waiting for a
writable volume. Simultaneously, the NetWorker server waits for the full, verified
volume to be unmounted.
l The device is monitored and the software waits for another volume to be inserted into
the device.
l After a volume is detected, a check is performed to determine whether the volume is
labeled. If so:
n The volume is mounted into the device.
n The NetWorker server checks to see whether the newly mounted volume is a
candidate to receive data:
1. If yes, the write operation continues.
2. If no, the NetWorker server continues to wait for a writable volume to continue
the backup.
l If the volume is recyclable and is a member of the required pool, it is recycled the
next time a writable volume is needed.
l If the volume is unlabeled, it is labeled when the next writable volume is needed for a
save. Note that Auto media management does not label disk type devices such as
AFTD and Data Domain.
NOTICE
If a partially full volume is unmounted, the NetWorker server automatically ejects the
volume after a few seconds. If a stand-alone device is shared between storage nodes,
then Auto Media Management should not be enabled for more than one instance of
the device. Enabling Auto Media Management for more than one instance of the
stand-alone device will tie up the device indefinitely. No data is sent to the device
and no pending message is sent.
Labeling volumes
The NetWorker software applies a label template to create a unique internal label for each
volume. The label corresponds to a pool and identifies the pool for the volume during
backup and other operations.
Several preconfigured label templates are supplied with the NetWorker software. You
cannot delete these preconfigured label templates. Naming label templates on page 73
provides more information.
When you label a volume, the labeling process:
NOTICE
A volume that has been set to manual recycle retains that setting, even after the
volume is re-labeled. You must explicitly reset the volume to automatic recycle by
right-clicking the volume in the Media window, selecting Recycle, and then selecting
the Auto option.
b. Click Yes.
Verifying the label when a volume is unloaded
If a SCSI reset is issued during a backup, the volume rewinds and NetWorker may
overwrite the volume label.
To detect if the label is overwritten in this circumstance, select the Verify label on eject
checkbox in the Device resource, or set the Verify label on unload setting in the Jukebox
resource to Yes. With these settings, NetWorker verifies that a volume label exists before
ejecting the volume. If the volume label cannot be read, all save sets on the volume are
marked as suspect and the volume is marked as full.
Note
Libraries include hardware that reads barcode labels. The barcode information is then
forwarded to the NetWorker server. Problems reading barcode labels indicate hardware
problems. In the event of a barcode-related problem, consult the library’s documentation
or the hardware vendor.
The device might also go into service mode, rather than become disabled, if consecutive
errors occur in excess of the maximum consecutive error count specified for the device.
This means that if there are no hardware issues, the tape can be ejected and used in
other drives. Media handling errors on page 174 provides more information about how
to set the maximum consecutive error count.
Note
The drive must be manually reset to Enabled for the NetWorker software to use the device
again.
Reconfiguring a library
Use this procedure to reconfigure a tape library.
Before you begin
To reconfigure a library or to add or remove access paths to the devices in a library, use
an account with the Configure NetWorker privilege. This includes access paths that allow
libraries to be shared.
Note
The following procedure does not support adding NDMP devices to a non-NDMP library if
both the NDMP server and the NetWorker storage node are on the same host. Instead,
use the jbedit command.
Procedure
1. Run Scan for Devices, in case a device path has been added to, or removed from, the
library since the latest scan.
2. In the server’s Administration window, click Devices.
3. Select Libraries in the navigation tree. The Libraries detail table appears.
4. In the navigation tree, right-click the entry for the library to be reconfigured, or open
the Storage Nodes folder, open the library folder, and then right-click the library entry
there.
5. Select Reconfigure Library. The Reconfigure Library window appears. Note that the
storage node name and library name cannot be changed in this window.
6. Make appropriate changes in the Configure devices on various storage nodes using
existing drive connectivity area, selecting or clearing checkboxes as necessary, or
using the buttons at the right side of the area (Check All, Clear All, Reset).
Drives that are already configured to be used by the library display check marks in the
boxes that are adjacent to their names:
8. Run Scan for Devices to refresh the navigation tree and show the reconfiguration
results.
2. In the server’s NetWorker Administration interface, select View > Diagnostic Mode
from the menu bar.
3. Click Devices.
4. Open the Libraries folder in the navigation tree. The Libraries detail table appears.
5. In either the navigation tree or in the Libraries detail table, right-click the library on
which the slots are to be designated, and select Properties.
6. Select the Advanced tab of the Properties window.
7. In the Media Management Area, in the Available slots field, type a range of
contiguous slots, then click + to add the range of slots.
For example (assuming that no slots have already been configured), to designate slots
1 through 3 as available, then skip a defective slot 4, and designate slots 5 through 7
as available, type this information in the Available Slots field:
Reset a library
A library must be reset each time the library and the NetWorker software become out of
sync. A library reset can be done using either the Administration interface or the
command prompt.
Resetting a library in the Administration interface
To reset a library in the Administration interface:
Procedure
1. In the Administration window, click Devices.
2. Open the Libraries folder in the navigation tree. The Libraries detail table appears.
3. Select a library in the navigation tree or double-click a library in the Libraries detail
table to open the double-paned Library Operations view.
The library’s drives are listed in the pane on the left in the Device column. The library’s
slots are listed in the pane on the right.
4. Right-click a library in the Device column, and select Reset. You are prompted to reset
the library.
5. Click Yes. The Library Operation window appears and displays this message:
6. Click OK.
Resetting a library from the command prompt
Use the nsrjb -HE command to reset a library from the command prompt. For example, the
library inventory must be correct after adding drives to an SJI-compliant library, such as
adding DLT7000 drives to an ETL 7/3500 device.
To make the NetWorker software aware of these new drives, run nsrjb -HE to reset the
library. The -E option reinitializes the library’s element status. Some libraries can track
whether there is media in a component in the library. This feature is known as an element
status capability.
A series of commands exists that allow direct interaction with libraries (sji commands)
and tape drives (cdi commands). These commands should only be used by the most
knowledgeable of NetWorker users, as the consequences of using them can be unknown.
For information about these commands, refer to the EMC NetWorker Command Reference
Guide or the UNIX man pages.
Deleting libraries
The library's devices remain, and can still respond to NetWorker operations (such as
monitoring, labeling, deletion, and so on) after the library definition is deleted. A deletion
of a library deletes the library, not its devices.
Procedure
1. In the server’s Administration interface, click Devices.
2. Select Libraries in the navigation tree. The Libraries detail table appears.
3. In either the navigation tree or in the Libraries detail table, right-click the entry for the
library to be deleted, and select Delete.
4. When prompted, click Yes.
This message appears:
"Are you sure you want to delete this jukebox? If so, please re-
attempt
deletion within a minute."
Library notifications
The NetWorker server uses notifications to send messages about NetWorker events.
Several preconfigured notifications, such as the following, provide information about
various situations:
l Volumes in the library are 90% full
l Library needs more volumes to continue
l Library has a mechanical problem
l Library device needs cleaning
Note
When a library is partitioned, the NetWorker software does not become aware of the
partitioning. This means that the entire physical library will be disabled, not just one
partition.
Procedure
1. In the Properties window for the Library, on the General tab, set Status Enabled to
Service.
Note
Putting the library in service mode will cancel all operations or wait for operations to
complete that cannot be canceled, and then put the library into disabled mode.
2. Once the library is in disabled mode, use the library's front panel to add and remove
tapes.
3. In the Properties window for the Library, on the General tab, set Status Enabled to
Enabled.
4. Inventory the library. Inventorying library volumes on page 162 has information about
inventorying libraries.
c. Click OK.
5. To unmount the volume:
a. Right-click the device or the volume in the double-paned table view of the library
and select Unmount.
l The Library Operation window displays this message:
6. Click OK.
a volume makes it impossible for the NetWorker server to recover original data from that
volume.
Procedure
1. In the Administration window, click Devices.
2. Manually insert an unlabeled or recyclable volume in the NetWorker server storage
device, or ensure that a volume of this type is already present for the NetWorker server
to access.
3. Select Devices in the navigation tree. The Devices detail table appears.
4. Right-click the stand-alone device in the detail table, and select Label. The Label
window appears:
a. Type a unique label name, or accept the default name that is associated with the
selected pool.
If the volume is unlabeled, the NetWorker server assigns the next sequential label
from the label template that is associated with the selected pool. If a recyclable
volume from the same pool is being re-labeled, then the volume label name and
sequence number remain the same. Access to the original data on the volume is
destroyed, and the volume becomes available.
b. Select a pool on the Pools menu. The NetWorker server automatically applies the
label template that is associated with the Default pool unless a different pool is
selected.
c. Select the Manual Recycle attribute if the volume should be manually recycled.
If the Manual Recycle attribute is enabled when the volume is labeled, the volume
cannot automatically be marked as recyclable according to the retention policy.
When a volume is marked as manual recycle, the NetWorker server disregards the
assigned browse and retention policies. Therefore, only an administrator can mark
the volume recyclable.
A volume that has been set to manual recycle retains that setting, even after re-
labeling. A Manual Recycle policy cannot be changed back to Auto Recycle by
clearing the Manual Recycle checkbox. The volume must be explicitly reset to use
auto recycle.
d. The Mount After Labeling attribute is selected by default. The NetWorker server
automatically labels the volume, and then mounts the volume into the device.
5. Click OK.
6. If the volume is recyclable, a message warns that the named volume is about to be
recycled, and asks whether to continue. Click Yes to re-label and recycle the volume.
7. After a volume is labeled and mounted in a device, the volume is available to receive
data. Since the NetWorker label is internal and machine-readable, place an adhesive
label on each volume that matches that internal volume label.
Configuring a library to use volumes with barcodes on page 147 provides information
on using barcode labels.
Note
If you are in the process of re-labeling a mounted volume and you choose not to
overwrite the existing label, the volume is left in an unmounted state. To use this
volume, mount it again.
NOTICE
Unlabeled tapes may not be mounted for inventorying. Unlabeled tapes can only be
mounted to be labeled. An attempt to mount an uninventoried volume by using
unlabeled media results in an I/O error. The volume will also be ejected.
the operator to deposit and withdraw cartridges without invalidating the device inventory
list. Normally, if the operator opens the door to load or unload media, the element status
of the autoloader is invalidated, which requires the reinitialization the library. The
NetWorker server does not, however, automatically inventory the volume after a deposit
and withdrawal.
The reinitialization usually consists of the following:
l An inventory of all slots
l A reset of the robotic arm
l A check to see whether each drive is working
The Deposit attribute causes a library to take the first available volume from the CAP and
place it in the first empty library slot. The Eject/Withdraw attribute moves a volume from a
slot (never from a drive) to the CAP.
Depositing a volume by using the import/export feature
Use these general instructions when working with a CAP. Specific instructions for working
with a CAP can vary, depending on the library manufacturer. For specific instructions,
refer to the library’s documentation.
Procedure
1. Ensure that volumes are available in the CAP for deposit.
2. In the Administration window, click Devices.
3. Select Libraries in the navigation tree. The Libraries detail table appears.
4. Double-click the library in which to deposit the volume. The Libraries detail table
changes to the double-paned library operations view.
5. Right-click either the device or the slot, and select Deposit. You are prompted to
deposit the volume.
6. Click Yes. The Library Operation window displays this message:
7. Click OK.
8. Click Monitoring to go to the Monitoring window and select the Operations tab.
9. Right-click the User Input icon for the deposit job and select Supply Input. You are
prompted to load the cartridges into the ports and type Yes to continue.
10. Click Yes.
11. Right-click the User Input icon for the deposit job and select Supply Input again. You
are prompted to continue depositing volumes.
12. Click Yes to continue depositing volumes, or No when done.
Withdrawing a volume by using the import/export feature
Note
If the library is partitioned into logical libraries and the import/export slots are shared
between the partitions, you must withdraw volumes by using the nsrjb command with
the -P option to specify the port or ports from which to withdraw volumes. Refer to the
nsrjb man page or the EMC NetWorker Command Reference Guide for more information.
Procedure
1. Ensure that the volume to be withdrawn is in a known slot, and that the CAP has an
empty port to hold the withdrawn volume.
2. In the Administration window, click Devices.
3. Select Libraries in the navigation tree. The Libraries detail table appears.
4. Double-click the library from which the volume is to be withdrawn. The Libraries detail
table changes to the double-paned library operations view.
5. Right-click the slot that contains the volume, and select Eject/Withdraw. You are
prompted to withdraw the volume.
6. Click Yes.
l The Library Operation window displays this message:
7. Click OK.
l The Library Operation window displays this message:
Library maintenance
Periodically clean a storage library to keep it working correctly. The NetWorker server
provides automatic cleaning of devices located in libraries. The server does not support
automatic cleaning for stand-alone devices. Cleaning is an option set during
configuration.
The service mode feature allows a library to be taken offline temporarily for cleaning or
other maintenance.
Do not enable automated cleaning for silos in the NetWorker software. The automated
device cleaning feature cannot be used in a silo, because it depends on fixed slot
numbers. For information about how to clean devices in a silo, refer to the silo
manufacturer’s software documentation.
Procedure
1. In the server’s NetWorker Administration interface, click Devices.
2. Open the Libraries folder in the navigation tree and select the drive that contains the
mounted volume with the block size being checked. The drive’s detail table appears.
3. Right-click the drive in the detail table, and select Properties. The Properties window
appears.
4. Select the General tab.
5. Set the Cleaning Required attribute to Yes.
Tape alert
The TapeAlert feature provides, among other things, diagnostic information for devices
for which hardware cleaning is enabled. NetWorker provides the following attributes for
tape device cleaning:
l Cleaning required
l Cleaning interval
l Date last cleaned
When the Common Device Interface (CDI) is enabled, TapeAlert attributes provide tape
drive status. SCSI Commands must be selected for the CDI attribute on the Configuration
tab of the relevant device’s Properties. If CDI cannot be enabled, TapeAlert is not
supported.
Devices that are capable of TapeAlert perform constant self-diagnostics and
communicate the diagnostic information via the nsrmmd program to logs that can be
viewed in the Monitoring task.
TapeAlert attributes are found in the device’s Properties, on the Volume tab. Their
respective descriptions are as follows:
l TapeAlert Critical: Displays critical diagnostic information, such as for media or drive
failure, when user intervention is urgent and data is at risk.
l TapeAlert Warning: Displays a message when the media or device needs servicing.
l TapeAlert Information: Displays status information.
The following table describes the nature of the tape alert levels.
Warning X X
Informative X
The messages indicate tape and drive states related to tape drive read/write
management, cleaning management, or drive hardware errors.
Informative messages
Informative messages indicate status information:
l A data or cleaning tape is nearing its end of life.
l A tape format that is not supported.
Note
Warning messages
Warning messages indicate the following types of drive errors:
l Recoverable read or write errors occurred.
l Media is at end of life.
l Read-only tape format is in the drive.
l Periodic cleaning is required.
Critical messages
Critical messages are warnings that a drive might be disabled and requires immediate
attention to avoid data loss:
l Unrecoverable read or write errors occurred.
l Tape is marked read-only.
l Drive require immediate cleaning.
l Drive is predicting hardware failure.
Informative and warning messages should clear automatically by nsrmmd once the
reported issue is handled.
Critical messages about hardware errors are not cleared by nsrmmd because they might
indicate intermittent hardware problems.
2. From the command prompt, type the following command to verify that the library
returns the serial numbers of its devices:
sn -a b.t.l.
where b.t.l. refers to the bus target LUN of the library. If the bus target LUN is not
known, run the inquire command first, to obtain this information.
Option Description
-a Add a drive or device.
The EMC NetWorker Command Reference Guide or the UNIX man page provides a detailed
description of the jbedit command, its options, and associated diagnostic messages.
Device ordering
The NetWorker server uses logical device names assigned by the operating system when
communicating with devices. It is possible for the operating system to re-associate
logical device names with the physical addresses of the devices, generally after rebooting
the host or after plug-and-play events. This may cause device reordering, where the
physical device will have a different device filename. As a result, tape devices configured
in the NetWorker software no longer match the names of the devices as recognized by the
operating system.
If device reordering occurs, the NetWorker software is unable to use any affected drives
until the configuration is manually corrected.
The NetWorker server detects device reordering events by comparing the current serial
number of the device to the serial number of the device at configuration. If the serial
numbers do not match, the NetWorker server stops all operations on that device and an
error message will be posted, similar to the alert identified for device serial number
mismatch in the table Preconfigured notifications on page 617. CDI must be enabled for
this functionality. Setting the common device interface on page 173 provides more
information about enabling CDI.
Detecting device ordering issues
To determine if there is a problem with device ordering in your environment, you first
determine if the device order that appears in nsrjb output matches the device order from
the inquire and sjisn commands, then verify that the device configuration within your
NetWorker configuration conforms to this.
Procedure
1. Execute the inquire command with the -cl option to determine the device path, scsi
address, and serial number of the device.
2. Execute the sjisn command to determine the current order of the devices:
sjisn scsidev@bus.target.lun
where bus.target.lun is the SCSI address of the robotic arm returned by the inquire
command in step 1, for example, 1.2.0.
3. Match the serial numbers of the devices in the sjisn output to the device names that
correspond to these serial numbers in the inquire -cl output. This will give you the
current device order by device filename.
4. Execute the nsrjb command to determine the order of devices as configured in
NetWorker. Drive entries towards the end of the nsrjb output list the device order as
configured in NetWorker.
5. Compare the device ordering as determined in step 3 and step 4. If the device
ordering in these two steps do not match, the device ordering has changed and the
library will need to be reconfigured.
Drive ordering change corrections
After a drive ordering change has taken place and the NetWorker software is no longer
correctly communicating with devices, you can correct the problem within your NetWorker
configuration by using the NetWorker Console or the jbedit command line program.
Using NetWorker Console to correct drive ordering changes
You can correct drive ordering changes by using the NetWorker Console.
Procedure
1. Ensure that you have a current backup of the resource database.
2. Delete the library resource in the NetWorker Console. Deleting libraries on page 155
provides details.
3. Rescan the library. Scanning for libraries and devices on page 145 provides more
information.
Using the jbedit command to correct drive ordering changes
You can correct drive ordering changes by using the jbedit command.
Procedure
1. Use the jbedit command with the -d option to delete devices from the NetWorker
configuration.
2. Use the jbedit command with the -a option to add the devices again.
Library configuration using the jbedit command on page 166, or the UNIX man page
for jbedit or the EMC NetWorker Command Reference Guide provides more information
on the jbedit command.
An Event ID for the error is also created, which will be removed along with the alert when
the problem is resolved. You can resolve the problem and clear the error message.
Procedure
1. Disable the drive.
2. Perform one of the above procedures to correct the problem.
3. Re-enable the drive, and retry the operation that was being performed prior to
receiving the error.
Results
The Alert will be removed and the event dismissed.
Tape drive number reordering (Microsoft Windows only)
If more than one tape drive is attached to the NetWorker server when both the server and
drives are shut down, restart all of the tape drives, either before or immediately after the
NetWorker server is restarted. If Windows does not locate all of its previously configured
tape drives at the time of startup, it automatically reassigns the tape registry name.
For example, assume that these three tape drives are attached to the server:
l The first one, \\.\Tape0, is a 4 mm tape drive.
l The second, \\.\Tape1, is an 8 mm tape drive.
l The third, \\.\Tape2, is also an 8 mm tape drive.
If only the second and third tape drives are restarted, Windows reassigns the tape
registry numbers so that the second storage device becomes \\.\Tape0 and the third
storage device becomes \\.\Tape1. The tape registry numbers no longer match the
defined storage devices within the NetWorker software. As a result, the server
mishandles the drives and their volumes.
It might be easier to leave a nonoperational drive (device) attached to the server until a
replacement is available. If the drive is removed, the name must be deleted, and then the
new drive must be added.
To disable the drive, select No for the Enabled attribute in the device’s Properties.
Device calibration
For information about the frequency and method for calibrating the loading mechanism
for the device, refer to the library manufacturer’s documentation.
NOTICE
In NetWorker 8.0.1 and later, the default block size for an LTO device increases from 128
KB to 256 KB. When NetWorker labels a new or used volume in an LTO device and the
Device block size attribute of the device is handler default, the label operation uses a
256 KB block size.
Note
It is also possible to solve problems with block-size compatibility by changing the block
size for an entire device type. The change, however, must be made on each storage node
where it is to be available. Once the block size is changed, it affects only those volumes
that are labeled after the change. Volumes can be relabeled to use the new block size,
but if they contain data that should be saved, be sure to clone the data beforehand to a
volume that already uses the new block size.
Procedure
1. In the server’s NetWorker Administration interface, click Devices.
2. Select View > Diagnostic Mode on the menu bar.
3. Open the Libraries folder in the navigation tree and select the drive that contains the
mounted volume with the block size being checked. The drive’s detail table appears.
4. Right-click the drive in the detail table, and select Properties. The Properties window
appears.
5. Select the Advanced tab. In the Device Configuration area, the currently configured
Device Block Size value is displayed.
6. Select the appropriate Device Block Size value.
7. Click OK.
Setting the block size for a device type
Procedure
1. Change the block size:
l On UNIX, change the block size by setting this environment variable to the greatest
common value for both systems. For example:
where:
n MEDIA_TYPE is the backup device type available to the NetWorker server (also
found in the Media Type attribute on the General tab of the device’s
properties). The media type syntax must be all uppercase, with underscores (_)
replacing blank spaces and hyphens. Therefore, a device displayed in the
NetWorker software as "8mm Mammoth-2" would be listed as:
8MM_MAMMOTH_2
n value must be a multiple of 32 KB, with a minimum value of 32 KB.
l On Microsoft Windows only, install a later model HBA, or upgrade to drivers that
can support up to 128 KB blocks. Windows also accepts the same environment
variable format as UNIX to set block size.
2. Restart the NetWorker server in order for changed environment variables to take
effect.
Device block size for read and write operations
The block size for a volume is defined during the label operation. The label operation
uses the value defined in the Device block size attribute for the Device or the value
defined by the appropriate block size environment variable.
The block size for both read and write operations uses the block size defined in the
volume header during the label operation rather than the device block size.
Block-size mode (UNIX/Linux only)
Ensure that the block size mode for tape devices that are used with NetWorker software is
set to variable. Otherwise, data recovery might fail. The procedure for setting the device
block size varies depending on the operating system.
The operating system’s documentation provides information about setting the tape
device block size in the operating system.
Note
The media type syntax must be all uppercase, with underscores (_) replacing blank
spaces and hyphens. For example, a device displayed in the NetWorker software as
“8mm Mammoth-2” would be listed as: 8MM_MAMMOTH_2
To determine the media type, right-click the device an select the General tab. The
Media Type attribute contains the media type that should be used in these
environment variables.
NSR_DEV_BLOCK_SIZE_MEDIA_TYPE
NSR_DEV_BLOCK_SIZE_MEDIA_TYPE is organized in units of kilobytes. This environment
variable will cause NetWorker to override the default block-size setting defined for the
tape drive in the operating system. The value set must be a multiple of 32, with a
minimum value of 32. Maximums are determined by platform, SCSI driver, and device.
For example:
NSR_DEV_BLOCK_SIZE_4MM_20GB=64
For information about using this environment variable to set block-size compatibility
between UNIX and Microsoft Windows. SCSI data block size issues between UNIX and
Windows on page 168 provides more information.
NSR_DEV_TAPE_FILE_SIZE_MEDIA_TYPE
NSR_DEV_TAPE_FILE_SIZE_MEDIA_TYPE is organized in units of
NSR_DEV_BLOCK_SIZE_MEDIA_TYPE and is the number of blocks written between
filemarks. These filemarks are used to locate a particular spot on the tape during
recovery, and more filemarks generally lead to faster positioning. For example:
NSR_DEV_TAPE_FILE_SIZE_TZ89=512
On UNIX and Linux platforms, the NetWorker software writes a filemark by closing and
reopening the tape device, which takes one or two seconds. If this value is too small,
throughput could be slowed and recoveries may take longer to complete.
On Microsoft Windows platforms, the NetWorker software writes asynchronous filemarks.
This setting has a minimal effect on performance.
NSR_DEV_LOAD_TIME_MEDIA_TYPE
NSR_DEV_LOAD_TIME_MEDIA_TYPE is the number of seconds that nsrmmd polls and
waits for a drive to become ready after the library inserts a tape into the device.
NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE is used to set the number of seconds
nsrmmd waits between polls during load time.
If the value of NSR_DEV_LOAD_TIME_MEDIA_TYPE is too short, there could be
unnecessary load failures. If it is too long, then labeling new tapes takes longer than
necessary. The minimum allowable value is 10 seconds. The maximum value is 600
seconds. For example:
NSR_DEV_LOAD_TIME_DTL8000=300
NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE
NSR_DEV_LOAD_POLL_INTERVAL_MEDIA_TYPE is the number of seconds that nsrmmd
waits between each attempt to read a newly inserted tape. The minimum allowable value
is 1 second, the maximum value is 30 seconds. For example:
NSR_DEV_LOAD_POLL_INTERVAL_DLT=10
NSR_DEV_LOAD_TRY_LIMIT_MEDIA_TYPE
NSR_DEV_LOAD_TRY_LIMIT_MEDIA_TYPE is the number of times that nsrmmd will attempt
to open a drive. The nsrmmd program will poll the drive until the limit set in
NSR_DEV_LOAD_TIME_MEDIA_TYPE is reached. After the limit is reached, it will retry until
When device parameters are set in this interface, it is not necessary to stop and restart
the NetWorker server in order for the settings to take effect.
Setting device environment variables on Windows
Setting environment variables for the NetWorker software differs on Windows and UNIX
operating systems.
Environment variables on Microsoft Windows are set using the Control Panel System
applet on the NetWorker server.
Procedure
1. Browse to Control Panel > System and Security > System > Advanced System Settings.
2. In the General tab click Environment Variables...
3. Click New.
4. Specify the environment variable name and value.
5. Stop and start the NetWorker Backup and Recover Server service in order for the
environment variables to take effect.
Setting device environment variables on UNIX
Setting environment variables for the NetWorker software differs on Windows and UNIX
operating systems.
On UNIX and Linux NetWorker sources the /nsr/nsrrc file before starting the
NetWorker processes.
Procedure
1. On the NetWorker server, modify the /nsr/nsrrc file. If this file does not exist,
create this file as a Bourne shell script file.
2. Add the environment variables in the following format:
ENV_VAR_NAME = value
export ENV_VAR_NAME
3. Stop and start the NetWorker server processes in order for the environment variables
to take effect.
EMC Licensing Solution
NetWorker 9.0.x introduces the EMC Licensing Solution, a new EMC standard for licensing
in software products. The EMC Licensing Solution uses an EMC License Server and reads
a license file to determine which products are licensed and how much storage space to
request for each datazone in the environment.
All new installations of NetWorker 9.0.x use the EMC Licensing Solution. The chapter
"EMC Licensing Solution" in the EMC NetWorker Licensing Guide provides information on
how to implement the EMC Licensing Solution for new and upgraded installations of
NetWorker 9.0.x. The "EMC Licensing Solution" chapter also describes the new EMC
License Server and the use of the license file.
Setting the common device interface
The common device interface (CDI) allows the NetWorker server to send commands to
tape devices. The CDI feature is not supported within an NDMP environment. CDI support
can be set in the NetWorker Administration interface.
Procedure
1. In the server’s NetWorker Administration interface, click Devices.
2. Select View > Diagnostic Mode.
3. Select Devices in the navigation tree. The Devices detail table appears.
4. Double-click a device in the Devices table (or right-click the device and select
Properties). The Properties window appears, with the General tab selected.
5. Select the Advanced tab. In the Device Configuration area, locate the CDI settings:
l Not Used: Disables the CDI feature and uses standard tape driver calls for tape
operations.
l SCSI Commands: Sends explicit SCSI commands to tape devices.
Note
Use of CDI does not change what is written to tape. A tape written with CDI enabled
can be read with CDI disabled. Conversely, a tape written with CDI disabled can be
read with CDI enabled. The CDI feature enables NetWorker software to collect better
diagnostic information and facilitates tape usage when enabled. Only set or disable
the CDI feature on the advice of an EMC Customer Support representative. If tape or
SCSI issues occur while the CDI feature is enabled, go to the EMC online support.
1. If the disabled drive is part of a library, it might be necessary to reset the device. To do
this:
6. From the command prompt, change the path to the directory that contains the
NetWorker binaries.
7. Type this command:
nsrjb -HE
NOTICE
A device retains it enabled or disabled status in the Properties window and in the
Devices detail table regardless of whether its storage node is enabled or disabled.
Therefore, it is possible that the storage node Properties window is set to disabled
while its devices appear to be enabled in the GUI.
Silo libraries
This section describes silos and silo devices. Silos and libraries are managed similarly by
NetWorker software.
A silo tape library (STL) is a peripheral that usually contains many storage devices.
Silos libraries have a robotic controller that moves tape media between slots and
devices. Silos do not use a SCSI interface to access and control the media movements.
Media movements are controlled by a separate host that is called the silo server. The silo
server uses silo management software to manage media movement requests over the
network. The silo vendor provides the silo management software. The silo server cannot
be the same computer as the NetWorker server.
The silo can be shared among many applications, systems, and platforms. As with
libraries, silos make data and media operations more automatic. Silos can load, change,
and manage volumes, and clean the devices automatically.
NetWorker only supports silos that use the Automated Cartridge System Library Software
(ACSLS) Manager software.
device. Depending on the type of silo, the device name can take several forms. This
section describes the naming conventions of the currently supported silos.
Installing a silo
Procedure
1. Install the silo management software on the silo server.
2. If required, install the STLI library on the NetWorker server. For more information, refer
to the documentation from the silo vendor.
For example, for a NetWorker server or storage node running Windows to control an
STK silo, the libattach program must be installed.
On UNIX systems, do not install the STLI library because all the necessary software is
installed when the NetWorker software is installed.
3. Ensure that the NetWorker server is properly connected to the media devices in the
silo.
4. Add the silo. Configuring silo libraries on page 176 provides further details.
except those libraries that are explicitly excluded in the library exclusion list during
configuration.
Note
If Configure All Libraries is started from the server folder instead of from the Storage
Node folder, then all storage nodes on the NetWorker server are automatically
selected for configuration in the wizard.
The Configure All Libraries wizard appears, and allows the user to step through library
configuration, including the following input (some of which is filled in by default):
In addition to the ssi and mini_el programs, a shared library file (usually called
libstlstk.xxx where xxx is an operating system-dependent extension) is also required. An
appropriate version of this library is installed as part of NetWorker installation.
ACSLS silos and firewalls
With ssi version 2.0, communication with the ACSLS server on a specified port number is
supported, using the -a command line option. This is part of the STK firewall
enhancement. The ACSLS version 7 must be running on the ACSLS server to use this
functionality.
The UNIX man pages for these commands, or see the EMC NetWorker Command Reference
Guide provides information on the ssi and mini_el programs.
6. Click OK.
7. Repeat all steps for each device to be released.
The following commands should also be running on the system and can be
in the NetWorker startup script:
l <binaries_path>/mini_el &
l <binaries_path>/ssi &
ENV_VAR_NAME = value
export ENV_VAR_NAME
3. Stop and start the NetWorker server daemons in order for the environment variables
to take effect.
NOTICE
You cannot deposit a volume from the CAP (I/O Port) using the nsrjb -d command. A
silo volume deposit requires the -T and -a options in sequence to add a volume in the
media database.
The sequence of operations is: nsrjb -d -T Barcode.
Ignore the error message that appears. nsrjb -a -T Barcode.
Barcode IDs
A list of available barcode-labeled volumes is available from the silo management
software. Refer to the silo manufacturer’s documentation for how to generate the list of
barcode IDs.
To specify a barcode identifier or template for the volumes from a command prompt, use
the -T option with the nsrjb command. The nsrjb UNIX man page or the EMC NetWorker
Command Reference Guide provides more information.
Silo volume allocation
When volumes are added, the NetWorker server is directed to the volumes it can use.
NOTICE
Because silos can be used by more than one software application, it is possible that a
different application could read or write to volumes that belong to the NetWorker
software. To prevent this from happening, most silo management software includes
methods to limit access to volumes based on the hostname of the computer on which
various programs run. The NetWorker software does not provide a method for setting up
this sort of protection. The silo management software must configure it.
The addition of a volume causes the NetWorker software to query the silo management
software to verify that the requested volume exists.
If the volume exists, the volume is allocated to the NetWorker software.
Adding a silo volume
Procedure
1. In the Administration window, click Devices.
2. Open the Libraries folder in the navigation tree. The Libraries detail table appears.
3. Double-click a silo in the Libraries detail table to open the double-paned library
operations view. The silo’s drives are listed in the Device column, and its slots are
listed in the Slot column.
4. Right-click a silo in the Device column, and select Add. The Add Library Volumes
window appears, with the option to select either Template or List for barcode
selection.
5. Select either Template or List to enter barcode volume identifiers.
l The Template option allows the use of wildcards in creating a list of barcode IDs.
Each entry should be on a separate line; for example, to name four tapes A01B,
A02B, A03B, and A04B, type:
A0
1-4
B
l The List option allows the entry of barcode IDs, separately. Each entry should be
on a separate line; for example, type the name for each tape:
A01B
A02B
A03B
A04B
6. Type the appropriate volume identifiers in the Barcodes field.
7. Click OK (or Cancel, to continue adding to the list).
l Click "+" to add an entry.
l Click "<-" to insert above a highlighted selection.
l Click "-" to delete an entry.
The Library Operation window displays this message:
NetWorker software interactions with a silo on page 175 provides more information on
STLIs.
NDMP libraries
NDMP libraries or devices are accessed by using the NDMP protocol and are typically
used by network attached storage (NAS) systems. These devices do not allow direct
access to control from the host operating system. Control and data movement is
performed over the network by using the NDMP protocol.
The NDMP guide provides more information.
Unload Sleep Number of seconds that the NetWorker software waits for a 60 seconds
library to complete unloading a cartridge.
Eject Sleep Number of seconds that the NetWorker software waits for an 60 seconds
eject operation to complete.
Deposit Timeout Number of seconds for a library to wait for a tape to be 15 seconds
deposited in the mail slot before it times out.
Cleaning Delay Number of seconds that the NetWorker software waits between 60 seconds
the completion of a drive cleaning operation and the ejection
of the cleaning cartridge from the drive.
Idle Device The number of minutes NetWorker allows a device with a 10 minutes
Timeout volume to be idle before automatically unmounting it. For
specific devices, this value can be overridden. Unmounting
volumes automatically (idle device timeout) on page 157
provides more information.
Port Polling Number of seconds for a library to wait before polling a mail 3 seconds
Period slot to check for the updated status.
Note
For devices, the nsrmmd program will read the Server Network Interface value for the first
enabled device from the list of storage node devices, and each subsequent nsrmmd
started by the NetWorker server will use the same value. Therefore, the NetWorker server
will always use the same Server Network Interface value for every nsrmmd it starts or
restarts, regardless of whether or not the Server Network Interface attribute is different for
each device.
Introduction to DDS
DDS controls application requests for tape media and allows the NetWorker server and all
storage nodes to access and share all attached devices.
A system administrator can configure DDS by setting a sharing policy for devices that are
accessible from multiple storage nodes.
There are two terms that are central to the use of DDS are drive and device. Within the
context of DDS, these terms are defined as follows:
l Drive—The physical backup object, such as a tape drive, disk, or file.
l Device—The access path to the physical drive.
Note
NetWorker only supports DDS in a storage area network (SAN) Fibre Channel
environment and not in a direct-connect SCSI environment.
Benefits of DDS
Enabling DDS on a NetWorker system provides these benefits:
l Reduces storage costs—You can share a single tape drive among several storage
nodes. In fact, since NetWorker software uses the same open tape format for UNIX,
Windows, NetWare and Linux, you can share the same tape between different
platforms (assuming that respective save sets belong to the same pool).
l Reduces LAN traffic—You can configure clients as SAN storage nodes that can send
save sets over the SAN to shared drives.
l Provides fault tolerance—Within a SAN environment, you can configure hardware to
eliminate a single point of failure.
l Provides configuration over a greater distance—You can configure a system over a
greater distance than with SCSI connections.
In this figure:
l Storage nodes sn_1 and sn_2 are attached to the library.
l Each storage node, on its own, has access to drive_1 and drive_2.
l With DDS enabled, both storage nodes have access to both drives and can recognize
when a shared drive is in use.
This configuration requires two DDS licenses, one for each drive.
Note
Ensure that all applicable devices can be seen from each storage node by running the
inquire -l command locally on each storage node.
The settings that relate to Reserve/Release and Persistent Reserve are found in a device’s
Properties window, on the Advanced tab. They are visible only when diagnostic mode is
turned on.
The default setting for Reserve/Release is None. Once any other Reserve/Release setting
is selected, it works automatically, without further user intervention. The Reserve/
Release attribute is supported only on Common Device Interface (CDI) platforms, so if the
CDI attribute in a device’s Properties is set to Not Used, then Reserve/Release settings
are ignored.
For newer hardware, once a Reserve/Release setting (other than None) has been
selected, the appropriate Persistent Reserve commands are automatically issued before
a device is opened for reading or writing, and before the device is closed. With older
hardware, a SCSI-2 Reserve command is issued before opening the device, and a SCSI-2
Release command is issued after the device is closed.
Reserve/Release has these possible settings:
l None (the default)
l Simple
l Persistent Reserve
l Persistent Reserve + APTPL (Activate Persist Through Power Loss)
The Persistent Reserve Key attribute has also been added. It is used with Persistent
Reservation calls.
Hardware ID attribute
The Hardware ID attribute tracks the drives that are shared between multiple hosts.
Device instances that share the same physical drive across multiple hosts have the same
hardware ID. The device autoconfiguration process automatically assigns the Hardware ID
to a device, or it is added when manually configuring a device. Users cannot edit the
Hardware ID.
You can view the Hardware ID in the Properties window for a device, on the General tab,
in the Device Sharing area.
NetWorker generates the Hardware ID when a device is scanned or configured. The
Hardware ID consists of the following components:
l Hardware serial number
l Device type
l Worldwide part number (WWPN)
l Worldwide name (WWN)
Value Description
Enable All When selected, enables all devices with the same Hardware ID.
Disable All When selected, disables all the devices with the same Hardware ID.
Done This value is the default setting. After the server has enabled or disabled all devices
with the same Hardware ID, the attribute value is reset to Done.
You cannot configure the Shared Devices attribute with the jbconfig program.
have access to all the devices in the library, but does not limit the storage node to the
number of devices it can fully optimize.
Data loss will result if a full FTD is made appendable while a backup is pending
completion and a save set is partially written to the full FTD. In this case, the
partial save set (currently in “incomplete” state) will be overwritten.
Note
By contrast, AFTDs ignore the Volume Default Capacity value to allow dynamic expansion
of disk space.
The Volume Default Capacity attribute displays on the Configuration tab of the Device
properties when Diagnostic Mode (View > Diagnostic Mode) is enabled:
l To avoid accidentally filling an FTD, set the Volume Default Capacity attribute to
restrict the size of the device. For example, if a capacity of 100 MB is set, then the
device will be marked full when 100 MB is reached.
l Volume Default Capacity attribute must not be set to a value of more than 4 TB.
l If the Volume Default Capacity of a volume changes, the changes do not take effect
until the FTD is re-created, the directory contents are deleted, and the volume is
relabeled.
NOTICE
If the FTD is used before the Volume Default Capacity attribute is set, then the legacy
data on that FTD must be staged or cloned to another device. Otherwise, this data will
be overwritten.
Stand-alone devices
A Device resource must be created for each stand-alone tape device on a storage node.
Stand-alone drives must be configured individually.
Storage nodes must have been created before devices can be configured to be used by
them. Storage nodes on page 91 provides information about storage nodes and how to
create them. Note that all scanning for devices is done at the storage node level, and can
be done across multiple storage nodes. Only devices that have serial numbers can be
autoconfigured. Use the jbconfig command to configure devices that do not have
serial numbers.
Note
l A notification is sent that indicates that the server or storage node is waiting for a
writable volume. Simultaneously, the NetWorker server waits for the full, verified
volume to be unmounted.
l The device is monitored and the software waits for another volume to be inserted into
the device.
l After a volume is detected, a check is performed to determine whether the volume is
labeled. If so:
n The volume is mounted into the device.
n The NetWorker server checks to see whether the newly mounted volume is a
candidate to receive data:
1. If yes, the write operation continues.
2. If no, the NetWorker server continues to wait for a writable volume to continue
the backup.
l If the volume is recyclable and is a member of the required pool, it is recycled the
next time a writable volume is needed.
l If the volume is unlabeled, it is labeled when the next writable volume is needed for a
save. Note that Auto media management does not label disk type devices such as
AFTD and Data Domain.
NOTICE
If a partially full volume is unmounted, the NetWorker server automatically ejects the
volume after a few seconds. If a stand-alone device is shared between storage nodes,
then Auto Media Management should not be enabled for more than one instance of
the device. Enabling Auto Media Management for more than one instance of the
stand-alone device will tie up the device indefinitely. No data is sent to the device
and no pending message is sent.
b. Select a pool on the Pools menu. The NetWorker server automatically applies the
label template that is associated with the Default pool unless a different pool is
selected.
c. Select the Manual Recycle attribute if the volume should be manually recycled.
If the Manual Recycle attribute is enabled when the volume is labeled, the volume
cannot automatically be marked as recyclable according to the retention policy.
When a volume is marked as manual recycle, the NetWorker server disregards the
assigned browse and retention policies. Therefore, only an administrator can mark
the volume recyclable.
A volume that has been set to manual recycle retains that setting, even after re-
labeling. A Manual Recycle policy cannot be changed back to Auto Recycle by
clearing the Manual Recycle checkbox. The volume must be explicitly reset to use
auto recycle.
d. The Mount After Labeling attribute is selected by default. The NetWorker server
automatically labels the volume, and then mounts the volume into the device.
5. Click OK.
6. If the volume is recyclable, a message warns that the named volume is about to be
recycled, and asks whether to continue. Click Yes to re-label and recycle the volume.
7. After a volume is labeled and mounted in a device, the volume is available to receive
data. Since the NetWorker label is internal and machine-readable, place an adhesive
label on each volume that matches that internal volume label.
Configuring a library to use volumes with barcodes on page 147 provides information
on using barcode labels.
Labeling and mounting a volume in one operation (stand-alone tape drive) 195
Backup Storage
Note
If you are in the process of re-labeling a mounted volume and you choose not to
overwrite the existing label, the volume is left in an unmounted state. To use this
volume, mount it again.
NOTICE
Unlabeled tapes may not be mounted for inventorying. Unlabeled tapes can only be
mounted to be labeled. An attempt to mount an uninventoried volume by using
unlabeled media results in an I/O error. The volume will also be ejected.
Labeling volumes
The NetWorker software applies a label template to create a unique internal label for each
volume. The label corresponds to a pool and identifies the pool for the volume during
backup and other operations.
Several preconfigured label templates are supplied with the NetWorker software. You
cannot delete these preconfigured label templates. Naming label templates on page 73
provides more information.
When you label a volume, the labeling process:
l Writes a label on the volume.
l Adds the volume label to the media database.
l Prepares tape media to have data written to it.
When you re-label tape, the data on the tape is effectively gone.
During data recovery, the server requests the volume that contains the required data,
identifying the required volume by the name with which it was labeled.
NOTICE
A volume that has been set to manual recycle retains that setting, even after the
volume is re-labeled. You must explicitly reset the volume to automatic recycle by
right-clicking the volume in the Media window, selecting Recycle, and then selecting
the Auto option.
NOTICE
Do not edit device files and directories, this can result in unpredictable behavior and
make it impossible to recover data.
NOTICE
Maintenance commands
NetWorker device driver software provides maintenance commands, such as lusbinfo
and lusdebug, that you can use to diagnose problems on tape devices and
autochangers.
The EMC NetWorker Command Reference Guide or the UNIX man pages provide information
about how to use these commands.
nsrjb -Hv
nsrjb -Iv
The EMC NetWorker Command Reference Guide or the UNIX man pages provide complete
details on the nsrjb command.
To resolve the problem, use the nsrjb -H command to reset the autochanger.
Tapes get stuck in drive when labeling tapes on Linux Red Hat platform
When you label a tape in a DDS configuration on an RHEL NetWorker server, the tape may
become stuck in the drive and display the following error message:
unload failure-retrying 30 seconds
To resolve this issue, set the auto_lock setting attribute to “0” (Off) in the /etc/
stinit.def file for the following drive types:
l Sony AIT-2 and AIT-3
l IBM LTO Gen1
l HP LTO Gen1
l IBM LTO GEN2
NOTICE
Use the inquire command with caution. The inquire command sends the SCSI
inquiry command to all devices detected on the SCSI bus. If you use inquire during
normal operations, unforeseen errors and possible data loss may result.
l If inquire reports the serial number of the arm, follow the procedure at Scanning
for libraries and devices on page 145 to scan the library for devices, then enable
the library in NMC:
a. In the Administration window, click Devices.
b. Expand the Libraries folder, then right-click the library and select Enabled/
Disable.
Increasing the value of Save Mount Time-out for label operations 201
Backup Storage
l If inquire does not report the serial number or if the scan for devices operation
does not detect the control port change, use the nsradmin command to change
the control port:
a. Log in as root or as Windows administrator on the NetWorker host that
manages the control port.
b. At the command prompt, type nsradmin The nsradmin prompt appears.
c. To disable the library, type the following commands:
where b.t.l is the bus.target.lun of the library’s robotic arm (as reported by the
inquire command).
f. When nsradmin prompts you to update the resource, type yes.
g. To re-enable the library, type:
To resolve this issue, changes the sleep attributes in the Autochanger resource.
1. Shut down NetWorker services.
2. Shut down and restart the autochanger that contains the TZ89 drives.
3. When the autochanger is back online, restart NetWorker services. NetWorker will not
try to unload the drive again.
4. Use NMC to edit the following autochanger sleep time attributes, and use the
following values:
l Eject Sleep: 18 secs
l Unload Sleep: 40 secs
l Load Sleep: 40 secs
Additional attributes in the Autochanger resource on page 198 provides
information about how to set the sleep attributes.
5. Try to unload the drive again. If the drive fails to unload, repeat this procedure and
increase the sleep times.
To avoid this message, do not enable the CDI attribute for these device types.
Solaris
The st.conf file contains a setting for each device type in use that enables or disables
the SCSI reserve/release feature. The Tape Configuration section of the st man page
provides more information. Use the most up-to-date st driver that is available for the
version of Solaris.
Edit the st.conf file only if one of the following conditions apply:
l The NetWorker configuration includes DDS.
l Solaris st does not support a tape drive that is configured on a Solaris host.
To determine if the Solaris st tape driver supports a tape drive, perform the following
steps:
1. Use the mt command to load a tape in the drive. For example, with the tape device
file 0cbn, the type: mt -f /dev/rmt/0cbn status
l If the output of the mt command includes the line SCSI tape drive or appears
similar to the following, the st tape driver uses generic settings, which do not
support the tape drive:
mt -f /dev/rmt/4cbn status
Vendor 'IBM ' Product 'ULT3580-TD2 ' tape drive:
sense key(0x6)= Unit Attention residual= 0
retries= 0 file no= 0 block no= 0
Message displayed when CDI enabled on NDMP or file type device 203
Backup Storage
Tape operations may appear to work in NetWorker but you may run into problems
when you try to recover saved data.
l If the output of the mt command appears similar to the following, the st tape
driver recognizes the drive and uses the correct internal settings to manage the
drive:
mt -f /dev/rmt/0cbn status
HP Ultrium LTO tape drive:
sense key(0x0)= No Additional Sense residual= 0
retries= 0 file no= 0 block no= 0
In this configuration, you must only edit the st.conf file when you use the drive
in a DDS configuration.
AIX
To reset the reserve/release setting on an AIX operating system, use the SMIT interface.
1. From the Devices menu, select Tapes.
2. Change the value for the RESERVE/RELEASE support attribute from No to Yes.
HP-UX
To reset the reserve/release setting on an HP-UX 11 operating system, perform the
following steps.
1. Change the st_ats_enable kernel variable to a value other than zero.
2. (Optional) Restart the computer to ensure that the operating system implements the
change.
Note
When the mt comamnd reports that the tape drive is online, you can use the
scanner command to scan the save set information into the media database and
client file index of the destination NetWorker server.
pool, a retention period, and a target storage node for the backup action, which can differ
from the subsequent action that clones the data.
You can create multiple actions for a single workflow. However, each action applies to a
single workflow and policy.
The following figure provides a high level overview of the components that make up a
data protection policy in a datazone.
Figure 13 Data Protection Policy
Note
You can also clone traditional, snapshot, bootstrap, and VMware backup data
concurrently with the backup operation, or after the backup operation completes. The
Integration Guides provide detailed information about how to clone Snapshot and
VMware backup data.
Gold policy
The Gold policy provides an example of a data protection policy for an environment that
contains virtual machines and requires backup data redundancy. The policy contains two
workflows, one to protect Hyper-V hosts and one to protect VMware hosts. Each workflow
contains a backup action followed by a clone action.
Figure 15 Gold policy configuration
Silver policy
The Silver policy provides an example of a data protection policy for an environment that
contains non-virtualized machines and requires backup data redundancy. The policy
contains two workflows, one to protect hosts file systems and one to protect database
applications. Each workflow contains a backup action followed by a clone action.
Figure 16 Silver policy configuration
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains non-virtualized machines. The policy contains two workflows, one to protect
hosts file systems and one to protect database applications. Each workflow contains a
backup action.
Figure 17 Bronze policy configuration
5. To define the backup data that you want to protect, configure Client resources, and
then assign the client resources to a protection group.
The following figure illustrates a policy with two different workflows. Workflow 1 performs
a probe and then a backup of the Client resources in Client group 1, and then clones the
save sets from the backups. Workflow 2 performs a backup of the Client resources in
Dynamic client group 1, and then clones the save sets from the backups.
Creating a policy
Procedure
1. On the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field type a name for the policy.
The maximum number of characters for the policy name is 128.
Note
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data
Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To prevent the
actions in the workflow from running when the policy or workflow that contains the
action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the AutoStart
Enabled box, leave the option selected. To prevent the workflow from running at
the time that is specified in the Start time attribute, clear this option.
c. To define the time to start the actions in the workflow, in the Start Time attribute,
use the spin boxes.
The default value is 9:00 P.M.
d. To define how frequently to repeat the actions that are defined in the workflow
over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is less
than 24 hours, the Interval End attribute appears. To define the last time to start a
workflow in a defined interval period, use the spin boxes .
For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour, and the
Interval end time to 11:00 P.M., then the workflow automatically starts every hour
beginning at 7:00 P.M. and the last start time is 11:00 PM.
8. To create the workflow, click OK.
After you finish
Create the actions that will occur in the workflow, and then assign a group to the
workflow. If a workflow does not contain a group, a policy does not perform any actions.
Note
Note
4. From the Group Type list, leave the default selection of Clients.
5. In the Comment field, type a description of the group.
6. Select the workflow in which to assign the group from the Policy-Workflow list.
Note
You can also assign the group to a workflow when you create or edit a workflow.
7. (Optional) On the Restricted Datazones tab, to specify the Restricted Datazone (RDZ)
for the group, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. The Client Configuration wizard and General tab on the Client
Properties dialog box properties page provide you with the ability to assign clients to a
protection group.
Note
Note
You can also assign the group to a workflow when you create or edit a workflow.
7. (Optional) On the Restricted Datazones tab, to specify the Restricted Datazone (RDZ)
for the group, select the RDZ from the list.
8. Click OK.
After you finish
Create Client resources. The Client Configuration wizard and General tab on the Client
Properties dialog box properties page provide you with the ability to assign clients to a
protection group and define one or more tags.
is 0 (zero), then a client backup is required. If the return code is 1, then a client backup is
not required.
Only a backup action can follow a probe action.
Check connectivity
A check connectivity action tests connectivity between clients and the NetWorker server
before a probe or backup action occurs. If the connectivity test fails, then the backup
does not occur on the client.
Traditional backup
A traditional backup is a scheduled backup of the save sets defined for the Client
resources in the assigned group. You must specify the destination storage node,
destination pool, the schedule (period and activity), and the retention period for the
backup.
Clone
A clone action creates a copy of one or more save sets. Cloning allows for secure offsite
storage, transfer of data from one location to another, and verification of backups.
You can configure a clone action to occur after a backup in a single workflow, or
simultaneously with a backup action in a single workflow. You can also use save set and
query groups to define a specific list of save sets to clone, in a separate workflow.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
To check connectivity every day, select Execute from the list, and then click Make All.
Note
Although the Retries, Retry Delay, Inactivity Timeout, or the Send Notification options
appear, the Check Connectivity action does not support these options and ignores the
values.
14. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
15. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
16. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
17. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
18. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
Note
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the following
tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions pane,
and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the action is
started, in the Enabled box, select the option. To prevent the action from running
when the policy or workflow that contains the action is started, clear this option.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
6. When you create the action as part of the workflow configuration, the workflow
appears automatically in the Workflow box and the box is grayed out.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the action
that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent action
from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to probe the client.
The following table provides details on the icons.
To perform a probe every day, select Execute from the list, and then click Make All.
11. Choose whether to start the subsequent backup action only after all probes succeed
by selecting or clearing the Start backup only after all probes succeed checkbox.
l To start the backup only if all the probes associated with Client resources in the
assigned group succeed, select the checkbox.
l To start the backup if any one of the probes are associated with a Client resource
in the assigned group succeed, clear the checkbox.
12. Click Next.
The Specify the Advanced Options page appears.
13. In the Retries box, specify the number of times that NetWorker should retry a failed
probe or backup action, before NetWorker considers the action as failed. When the
Retries value is 0, NetWorker will not retry a failed backup or probe action.
Note
The Retries option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
14. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed
backup or probe action. When the Retry Delay value is 0, NetWorker retries the failed
backup or probe action immediately.
Note
The Retry Delay option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
15. In the Inactivity Timeout field, specify the maximum number of minutes that a job run
by an action is allowed to fail to communicate back to the server.
If the job fails to respond within the timeout value, the server considers the job a
failure. If a job fails, NetWorker retries the job immediately. This ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently aborts due to inactivity. Inactivity
timeouts may occur for backups of large save sets, backups of save sets with large
sparse files, and incremental backups of many small static files.
Note
The Inactivity Timeout option only applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.
16. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
17. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
18. Leave the default selections for the Notification group box. NetWorker does not
support notifications for probe actions and ignores the values that are defined in the
attributes.
19. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
20. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
n Probe
n Check connectivity
Procedure
1. In the expanded left pane, select the workflow, and then perform one of the following
tasks in the right pane to start the Policy Action wizard:
l If this is the first action in the workflow, select Create a new action.
l If the workflow has other actions, right-click an empty area of the Actions pane,
and then select New.
The Specify the Action Information page appears.
2. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
3. In the Comment field, type a description for the action.
4. To ensure that the action runs when the policy or workflow that contains the action is
started, in the Enabled box, select the option. To prevent the action from running
when the policy or workflow that contains the action is started, clear this option.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
Synthetic Full Perform a synthetic backup on this day. A synthetic full backup
includes all data that changed since the last full backup and
subsequent incremental backups to create a synthetic full backup.
To perform the same type of backup on each day, select the backup type from the list
and click Make All.
15. From the Client Override Behavior box, specify how NetWorker uses certain client
configuration attributes that perform the same function as attributes in the Action
resource.
l Client Can Override—The values in the Client resource for Schedule, Pool,
Retention policy, and the Storage Node attributes will take precedence over the
values that are defined in the equivalent Action resource attributes.
l Client Can Not Override —The values in the Action resource for the Schedule,
Destination Pool, Destination Storage Node, and the Retention attributes take
precedence over the values that are defined in the equivalent Client resource
attributes.
l Legacy Backup Rules—This value only appears in actions that are created by the
migration process. The updating process sets the Client Override Behavior for the
migrated backup actions to Legacy Backup Rules.
Note
The Retries option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
18. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed
backup or probe action. When the Retry Delay value is 0, NetWorker retries the failed
backup or probe action immediately.
Note
The Retry Delay option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
19. In the Inactivity Timeout field, specify the maximum number of minutes that a job run
by an action is allowed to fail to communicate back to the server.
If the job fails to respond within the timeout value, the server considers the job a
failure. If a job fails, NetWorker retries the job immediately. This ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently aborts due to inactivity. Inactivity
timeouts may occur for backups of large save sets, backups of save sets with large
sparse files, and incremental backups of many small static files.
Note
The Inactivity Timeout option only applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.
20. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
21. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
22. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
23. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
24. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
25. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
26. In the Send notification attribute when you select the On Completion or On failure
option, the Command box appears. Use this box to configure how NetWorker sends
the notifications. You can use the nsrlog action to write the notifications to a log file
or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file is
located in the /nsr/logs directory on Linux and the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows, by default. You can use the smtpmail
application on Windows or the default mailer program on Linux to send email
messages.
For example:
l To log notifications to a file named policy_notifications.log, type the
following command:
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
l For NetWorker Virtual Edition (NVE), to send a notification email, type the following
command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
To perform cloning every day, select Execute from the list and click Make All.
the time range. The Time filter list includes three options, which define how
NetWorker determines save set eligibility, based on the time criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to
create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes save sets whose save time is within
the time range that is specified by the spin boxes and meet all the other
defined filter criteria.
l Reject—The clone save set list does not include save sets whose save time is
within the time range that is specified by the spin boxes and meet all the other
defined filter criteria.
b. Save Set filter—Use the Save Set section to instruct NetWorker to include or
exclude ProtectPoint and Snapshot save sets, when searching for eligible save
sets to clone in the media database. The Save Set filter list includes three options,
which define how NetWorker determines save set eligibility, based on the save set
criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to
create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint or Snapshot save
sets, when you also enable the ProtectPoint or Snapshot checkboxes.
l Reject—The clone save set list does not include eligible ProtectPoint and
Snapshot save sets when you also enable the ProtectPoint and Snapshot
checkboxes.
c. Clients filter—Use the Client section to define a list of clients to include or exclude,
when NetWorker searches for eligible save sets to clone in the media database.
The Client list includes three options, which define how NetWorker determines
save set eligibility, based on the client criteria:
l Do Not Filter—NetWorker inspects save sets that are associated with the clients
in the media database, to create a clone save set list that meets the filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected
clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to include or
exclude, when NetWorker searches for eligible save sets to clone in the media
database. The Levels filter list includes three options, which define how NetWorker
determines save set eligibility, based on the level criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the media
database, to create a clone save set list that meets all the filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected
backup levels.
l Reject—The clone save set list does not include eligible save sets with the
selected backup levels.
Note
Although the Retries, Retry Delay, or the Inactivity Timeout options appear, the clone
action does not support these options and ignores the values.
15. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
18. In the Send notification attribute when you select the On Completion or On failure
option, the Command box appears. Use this box to configure how NetWorker sends
the notifications. You can use the nsrlog action to write the notifications to a log file
or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file is
located in the /nsr/logs directory on Linux and the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows, by default. You can use the smtpmail
application on Windows or the default mailer program on Linux to send email
messages.
For example:
l To log notifications to a file named policy_notifications.log, type the
following command:
nsrlog -f policy_notifications.log
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
19. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
20. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
The oval icon at the beginning of the visual representation specifies the group to which
the workflow applies, the rounded rectangle icons identify actions, and the parallelogram
icons identify the destination pool for the action.
l Adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.
n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item and
selecting New.
Note
The file system that contains the staging directory must have free disk space that is a
least equal to the size of the current NMC database. The section "Changing the
staging directory for NMC database backups" describes how to change the staging
directory location.
l Creates a group called NMC server.
l Adds the Client resource to the NMC server group.
l Creates a workflow that is called NMC server backup in the Server Protection policy.
The workflow contains the NMC server backup action, which performs a full backup of
the NMC server database every day at 2 P.M.
l Adds the NMC server group to the NMC server backup workflow.
Note
The NMC server database backup only supports the full and skip backup levels. If you
edit the NMC server backup action and change the levels in the backup schedule to a
different level, for example synthetic full, NetWorker performs a full backup of the
database.
Protection groups for NetWorker and NMC server backup and maintenance
When you install or upgrade the NetWorker server, the installation or upgrade process
creates a default protection group for the NetWorker server workflows in the Server
Protection policy.
Server Protection group
The Server Protection group is a default protection group to back up the NetWorker server
bootstrap and client file indexes. The Server Protection group is assigned to the Server
backup workflow in the default Server Protection policy. The Server backup workflow
performs a bootstrap backup, which includes the NetWorker server resource files, media
database, NetWorker Authentication Service database, and client indexes for disaster
recovery. The group is a dynamic client group that automatically generates a list of Client
resources for the NetWorker server.
NMC server group
The NMC server group is a default protection group to back up the NMC database, which
the Console Configuration wizard prompts you to create the first time you log in to the
NMC server. The group is a client group that contains the Client resource for the NMC
server and is created during the initial login and configuration of NMC server. The NMC
server group is assigned to the NMC server backup workflow in the default Server
Protection policy.
Note
If you create custom groups for server backup and maintenance, ensure that they include
both the NetWorker server and the NMC server.
Actions in the server database backup and NMC server backup workflows
Workflows enable you to chain together multiple actions and run them sequentially or
concurrently.
The following sections provide details on supported actions that can follow the lead
action and other actions in a workflow.
Workflow path from a server database backup action
The Clone action is the only supported action after a server database backup action. You
cannot insert an action before a server database backup action.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
l If the action should run concurrently with an action, select the concurrent action
from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to perform cloning.
The following table provides details on the icons.
To perform cloning every day, select Execute from the list and click Make All.
l Reject—The clone save set list does not include save sets whose save time is
within the time range that is specified by the spin boxes and meet all the other
defined filter criteria.
b. Save Set filter—Use the Save Set section to instruct NetWorker to include or
exclude ProtectPoint and Snapshot save sets, when searching for eligible save
sets to clone in the media database. The Save Set filter list includes three options,
which define how NetWorker determines save set eligibility, based on the save set
criteria:
l Do Not Filter—NetWorker inspects the save sets in the media database to
create a clone save set list that meets the filter criteria.
l Accept—The clone save set list includes eligible ProtectPoint or Snapshot save
sets, when you also enable the ProtectPoint or Snapshot checkboxes.
l Reject—The clone save set list does not include eligible ProtectPoint and
Snapshot save sets when you also enable the ProtectPoint and Snapshot
checkboxes.
c. Clients filter—Use the Client section to define a list of clients to include or exclude,
when NetWorker searches for eligible save sets to clone in the media database.
The Client list includes three options, which define how NetWorker determines
save set eligibility, based on the client criteria:
l Do Not Filter—NetWorker inspects save sets that are associated with the clients
in the media database, to create a clone save set list that meets the filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected
clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to include or
exclude, when NetWorker searches for eligible save sets to clone in the media
database. The Levels filter list includes three options, which define how NetWorker
determines save set eligibility, based on the level criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the media
database, to create a clone save set list that meets all the filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected
backup levels.
l Reject—The clone save set list does not include eligible save sets with the
selected backup levels.
Note
Although the Retries, Retry Delay, or the Inactivity Timeout options appear, the clone
action does not support these options and ignores the values.
15. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
18. In the Send notification attribute when you select the On Completion or On failure
option, the Command box appears. Use this box to configure how NetWorker sends
the notifications. You can use the nsrlog action to write the notifications to a log file
or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file is
located in the /nsr/logs directory on Linux and the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows, by default. You can use the smtpmail
application on Windows or the default mailer program on Linux to send email
messages.
For example:
l To log notifications to a file named policy_notifications.log, type the
following command:
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
19. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
20. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
The oval icon at the beginning of the visual representation specifies the group to which
the workflow applies, the rounded rectangle icons identify actions, and the parallelogram
icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following
tasks:
l Adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.
n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item and
selecting New.
l As the head action in workflow that uses a Query or Save set protection group.
Note
The Backup Data Management chapter describes how you can clone save sets manually
by using the nsrclone command.
2. Create a policy. When you create a policy, you specify the name and notification
settings for the policy.
3. Within the policy, create a workflow. When you create a workflow, you specify the
name of the workflow, the schedule for running the workflow, notification settings for
the workflow, and the protection group to which the workflow applies.
4. Create one or more clone actions for the workflow.
Note
To clone save sets in a backup workflow, use basic client group or a dynamic client
group. Strategies for traditional backups on page 210 provides detailed information
about how to create clone actions in a traditional backup workflow.
Create multiple protection groups to perform cloning in different ways as part of separate
workflows, or to perform cloning for different save sets on different schedules. For
example:
l Create a basic client group for a workflow that performs a traditional backup of the a
client file system followed by cloning of the save sets that result from the backup.
l Create a query group that identifies full save sets in the last two days to clone.
Note
When you specify more than one save set criteria, the list of save sets only includes
save sets that match all the specified criteria.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the
range, select Up to now.
To specify a different date and time as the end date for the
range, select Up to, and then select the date and time from the
lists.
Backup level In the Filter save sets by level section, next to the backup
level for the save set, select the checkbox:
l full
l cumulative incr
l logs
l incremental
l manual
Limit the number of clones Specify the number for the limit in the Limit number of clones
list. The clone limit is the maximum number of clone instances
that can be created for the save set.
Note
Client Next to one or more client resources that are associated with the
save set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy
list, select the checkbox.
Workflow Next to the workflow used to generate the save set in the
Workflow list, select the checkbox.
Action Next to the action used to generate the save set in the Action
list, select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Pools Next to the media pool on which the save set is stored in the
Pools list, select the checkbox.
Note
Name In the Filter save sets by name box, specify the name of the
save set.
Note
If you specify multiple criteria, the save set must match all the criteria to belong to the
group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data
Zones tab, and then select the RDZ from the list.
9. Click OK.
Creating a policy
Procedure
1. On the Administration window, click Protection.
2. In the expanded left pane, right-click Policies, and then select New.
The Create Policy dialog box appears.
3. On the General tab, in the Name field type a name for the policy.
The maximum number of characters for the policy name is 128.
Note
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. To specify the Restricted Data Zone (RDZ) for the policy, select the Restricted Data
Zones tab, and then select the RDZ from the list.
8. Click OK.
After you finish
Create the workflows and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To prevent the
actions in the workflow from running when the policy or workflow that contains the
action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the AutoStart
Enabled box, leave the option selected. To prevent the workflow from running at
the time that is specified in the Start time attribute, clear this option.
c. To define the time to start the actions in the workflow, in the Start Time attribute,
use the spin boxes.
The default value is 9:00 P.M.
d. To define how frequently to repeat the actions that are defined in the workflow
over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is less
than 24 hours, the Interval End attribute appears. To define the last time to start a
workflow in a defined interval period, use the spin boxes .
If the restart window has elapsed, NetWorker considers the restart as a new run of
the workflow. NetWorker calculates the restart window from the start of the last
incomplete workflow. The default value is 24 hours.
For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour, and the
Interval end time to 11:00 P.M., then the workflow automatically starts every hour
beginning at 7:00 P.M. and the last start time is 11:00 PM.
8. To create the workflow, click OK.
After you finish
Create the actions that will occur in the workflow, and then assign a group to the
workflow. If a workflow does not contain a group, a policy does not perform any actions.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the action
that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent action
from the Previous box, and then select the Concurrent checkbox.
8. Select whether to use a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
9. Click the icon on each day to specify whether to perform cloning.
The following table provides details on the icons.
To perform cloning every day, select Execute from the list and click Make All.
Note
Although the Retries, Retry Delay, or the Inactivity Timeout options appear, the clone
action does not support these options and ignores the values.
15. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
18. In the Send notification attribute when you select the On Completion or On failure
option, the Command box appears. Use this box to configure how NetWorker sends
the notifications. You can use the nsrlog action to write the notifications to a log file
or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file is
located in the /nsr/logs directory on Linux and the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows, by default. You can use the smtpmail
application on Windows or the default mailer program on Linux to send email
messages.
For example:
l To log notifications to a file named policy_notifications.log, type the
following command:
nsrlog -f policy_notifications.log
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
19. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
20. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
The oval icon at the beginning of the visual representation specifies the group to which
the workflow applies, the rounded rectangle icons identify actions, and the parallelogram
icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following
tasks:
l Adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.
n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item and
selecting New.
Note
The amount of data and length of time that is required to complete the backup can
impact the ability to clone data when the backup and clone workflows are in the same
policy. For example, if the clone action starts before the backup action completes, there
might not be any data yet to clone, or in other cases, only the save sets that completed at
the start time of the workflow is taken into account. In both cases, NetWorker marks the
Clone Workflow as successful, but there is no guarantee that all the data from the backup
workflow was cloned.
Note
To clone save sets in a backup workflow, use basic client group or a dynamic client
group. Strategies for traditional backups on page 210 provides detailed information
about how to create clone actions in a traditional backup workflow.
Create multiple protection groups to perform cloning in different ways as part of separate
workflows, or to perform cloning for different save sets on different schedules. For
example:
l Create a basic client group for a workflow that performs a traditional backup of the a
client file system followed by cloning of the save sets that result from the backup.
l Create a query group that identifies full save sets in the last two days to clone.
Creating a save set group
A save set group defines a static list of save sets for cloning or for snapshot index
generation.
Before you begin
Determine the save set ID or clone ID (ssid/clonid) of the save sets for the group by using
the Administration > Media user interface or the mminfo command.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name box, type a name for the group.
4. From the Group Type list, select Save Set ID List.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy) list,
select the workflow .
You can also assign the group to a workflow when you create or edit a workflow.
7. In the Clone specific save sets (save set ID/clone ID) box, type the save set ID/clone
ID (ssid/clonid) identifiers.
To specify multiple entries, type each value on a separate line.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data
Zones tab, and then select the RDZ from the list.
9. Click OK.
Creating a query group
A query group defines a list of save sets for cloning or snapshot index generation, based
on a list of save set criteria.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, right-click Groups, and then select New.
The Create Group dialog box appears, starting with the General tab.
3. In the Name box, type a name for the group.
4. From the Group Type list, select Save Set Query.
5. In the Comment box, type a description of the group.
6. (Optional) To associate the group with a workflow, from the Workflow (Policy) list,
select the workflow.
You can also assign the group to a workflow when you create or edit a workflow.
7. Specify one or more of the save set criteria in the following table.
Note
When you specify more than one save set criteria, the list of save sets only includes
save sets that match all the specified criteria.
Criteria Description
Date and time range Specify the start date and time range for the save sets.
To specify the current date and time as the end date for the
range, select Up to now.
To specify a different date and time as the end date for the
range, select Up to, and then select the date and time from the
lists.
Backup level In the Filter save sets by level section, next to the backup
level for the save set, select the checkbox:
l full
l cumulative incr
l logs
l incremental
l manual
Limit the number of clones Specify the number for the limit in the Limit number of clones
list. The clone limit is the maximum number of clone instances
that can be created for the save set.
Note
Client Next to one or more client resources that are associated with the
save set in the Client list, select the checkbox.
Policy Next to the policy used to generate the save set in the Policy
list, select the checkbox.
Workflow Next to the workflow used to generate the save set in the
Workflow list, select the checkbox.
Action Next to the action used to generate the save set in the Action
list, select the checkbox.
Group Next to the group associated with the save set in the Group list,
select the checkbox.
Criteria Description
Pools Next to the media pool on which the save set is stored in the
Pools list, select the checkbox.
Note
Name In the Filter save sets by name box, specify the name of the
save set.
Note
If you specify multiple criteria, the save set must match all the criteria to belong to the
group.
8. To specify the Restricted Data Zone (RDZ) for the group, select the Restricted Data
Zones tab, and then select the RDZ from the list.
9. Click OK.
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
8. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To prevent the
actions in the workflow from running when the policy or workflow that contains the
action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the AutoStart
Enabled box, leave the option selected. To prevent the workflow from running at
the time that is specified in the Start time attribute, clear this option.
c. To define the time to start the actions in the workflow, in the Start Time attribute,
use the spin boxes.
The default value is 9:00 P.M.
d. To define how frequently to repeat the actions that are defined in the workflow
over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is less
than 24 hours, the Interval End attribute appears. To define the last time to start a
workflow in a defined interval period, use the spin boxes .
If the restart window has elapsed, NetWorker considers the restart as a new run of
the workflow. NetWorker calculates the restart window from the start of the last
incomplete workflow. The default value is 24 hours.
For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour, and the
Interval end time to 11:00 P.M., then the workflow automatically starts every hour
beginning at 7:00 P.M. and the last start time is 11:00 PM.
9. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection
group, click the + button that is located to the right of the Groups list.
10. Click Add.
The Policy Action Wizard appears.
11. In the Name field, type the name of the action.
The maximum number of characters for the action name is 64.
12. In the Comment field, type a description for the action.
13. To ensure that the action runs when the policy or workflow that contains the action is
started, in the Enabled box, select the option. To prevent the action from running
when the policy or workflow that contains the action is started, clear this option.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
To perform cloning every day, select Execute from the list and click Make All.
l Do Not Filter—NetWorker inspects save sets that are associated with the clients
in the media database, to create a clone save set list that meets the filter
criteria.
l Accept—The clone save set list includes eligible save sets for the selected
clients.
l Reject—The clone save set list does not include eligible save sets for the
selected clients.
d. Levels filter—Use the Levels section to define a list of backup levels to include or
exclude, when NetWorker searches for eligible save sets to clone in the media
database. The Levels filter list includes three options, which define how NetWorker
determines save set eligibility, based on the level criteria:
l Do Not Filter—NetWorker inspects save sets regardless of level in the media
database, to create a clone save set list that meets all the filter criteria.
l Accept—The clone save set list includes eligible save sets with the selected
backup levels.
l Reject—The clone save set list does not include eligible save sets with the
selected backup levels.
Note
Although the Retries, Retry Delay, or the Inactivity Timeout options appear, the clone
action does not support these options, and ignores the values.
23. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
24. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
25. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
26. In the Send notification attribute when you select the On Completion or On failure
option, the Command box appears. Use this box to configure how NetWorker sends
the notifications. You can use the nsrlog action to write the notifications to a log file
or configure an email notification.
The default notification action is to log the information to the
policy_notifications.log file. The policy_notifications.log file is
located in the /nsr/logs directory on Linux and the C:\Program Files\EMC
NetWorker\nsr\logs folder on Windows, by default. You can use the smtpmail
application on Windows or the default mailer program on Linux to send email
messages.
For example:
l To log notifications to a file named policy_notifications.log, type the
following command:
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the smtpmail
program assumes that the message contains a correctly formatted email
header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the
SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
27. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
28. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
29. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
Policy notifications
You can define how a Data Protection Policy sends notifications in the Policy, Workflow,
and Action resources.
The following table summarizes how the notification settings in each resource work
together.
In the Policy resource, the following notification choices are available:
l Never —Select this option when you do not want to send any notifications.
l On Completion—Select this option when you want to send a notification on
completion of the workflows and actions in the policy.
l On Failure—Select this option when you want to send a notification only if one or
more of the workflows in the policy fail.
In the Workflow resource, the following notification choices are available:
l To use the notification configuration that is defined in the policy resource to send the
notification, select Set a policy level.
l To send a notification on completion of all the actions in the workflow, select On
Completion.
l To send a notification only if an action fails to complete, select On Failure.
In the Policy resource, the following notification choices are available:
l To use the notification configuration that is defined in the policy resource to send the
notification, select Set a policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
workflows in the policy, and the + (plus) sign next to a workflow to view the actions for a
workflow.
The Policies pane provides the following information for each item (where applicable):
l Overall status
The following table provides details on the status icons that may appear in the
Policies pane.
Icon Status
Never run
Running
Succeeded
Failed
Probing
When you sort the items on the Policy/Actions pane by using the Status column,
NetWorker sorts the items in alphabetical order that is based on the label of the icon.
Consider the following when a policy/action is in a probing state:
l A message is sent when the group starts and finishes the probe operation.
l The results of the probe operation (run backup/do not run backup) are also logged.
l Probes do not affect the final status of the group, and the group status does not
indicate the results of the probe.
l If probing indicates that a backup should not run, then the group status reverts to its
state before the group running.
l Check the results of the probe in the Log window to ensure that the probe indicates
that the backup can be taken.
Actions pane
To view a list of all actions, click the Actions tab at the bottom of the Policies pane. The
Policies pane becomes the Actions pane.
The Actions pane provides the following information for each action:
l Overall status
Note
The Actions pane displays the same status icons as the Policies pane.
l Name
l Assigned policy
l Assigned workflow
l Type
l Date and time of the most recent run
l Duration of the most recent run
l Percent complete, for actions that are in progress
l Next scheduled runtime
Right-click an action in the Actions pane, and select Show Details to view details on
currently running, completed, and failed activities for the action.
Monitoring cloning
You can view the status of scheduled clone jobs in the Monitoring window. Status
information includes the last start time of the policy, workflow, or clone action, the
duration of the action, the size of the save set, and the target device, pool, and volume.
To determine whether a save set on a volume has been cloned, or is itself a clone, check
the search for the save set by using the Query Save Set tab when you select Save Sets in
the Media window.
where name_jobid is the name of the workflow and the job id of the workflow. Job id is a
value that uniquely identifies a workflow job record in the jobdb.
For example, the log file for a workflow that is called server backup, with a job id of
0010072 appears as follows:
/nsr/logs/policy/server protection/workflow_server
backup_0010072.raw
Use the job id to perform queries of the jobdb with the jobquery command. A workflow
log file can be unrendered or rendered. An unrendered log file has the file name
extension .raw. A rendered log file's extension is .log. Unrendered log files contain
internationalized messages that can be rendered into the local language. The content of
rendered log files has been localized to a single country's language.
View log files on page 791 provides more information about viewing rendered and
unrendered log files.
Action log files
NetWorker creates a workflow directory for each workflow within the policy directory. The
workflow directory contains log files for each action that is assigned to the workflow.
The location of the workflow directory on Linux is:
/nsr/logs/policy/policy_name/workflow_name
where:
l policy_name—is the name of the policy that contains the workflow.
l workflow_name—is the name of the workflow.
The workflow directory contains log files for each action that is assigned to the workflow.
The file name appears in the following format:
action_name_job_id.raw
where:
l action_name—is the name of the action.
l job_id—is the job id of the action in the jobdb.
For example, the server backup workflow has three actions: Backup, Clone, and Clone
more. There are three log files in /nsr/logs/policy/server protection/
server backup directory with the following names:
Backup_ 1408063.raw
Clone_1408080.raw
Clone more_1408200.raw
Note
The .log files are localized to a specific country or the language of the region.
NetWorker clears the information about a job from the jobsdb and deletes the associated
log files at the interval that is defined by the Jobsdb retention in hours attribute in the
properties of the NetWorker Server resource. In NetWorker 9.0.1, the default jobsdb
retention is 72 hours.
Note
You can restart any failed or canceled workflow. However, the restart must happen within
the restart window that you specified for the workflow.
You can also start specific policies and workflows in the Protection window by right-
clicking the policy or workflow, and selecting Start.
Procedure
1. Select the workflow, or action in the Monitoring window.
2. Right-click and select Start, Stop, or Restart.
A confirmation message appears.
3. Click Yes.
Note
You cannot start the actions for specific clients in the Server backup workflow.
Procedure
1. From the Administration window, click Monitoring.
2. In the Policies pane, expand the policy.
3. Right-click the workflow, and select Start Individual Client. The Start Workflow dialog
box appears.
4. Optionally, from the Workflow list, select a different workflow.
5. Select the checkbox next to the names of the clients on which you want to perform all
the actions in the workflow.
6. Click Start.
Policies
Policies enable you to manage all data protection tasks and the data protection lifecycle
from a central location.
A policy contains one or more workflows, which define the actions that should be
performed, the order for the actions to occur, and the group of Client resources or save
sets on which to perform the actions.
Actions include backups, cloning, client/server connectivity checks, and NetWorker
server maintenance activities.
Editing a policy
You can edit the description, notification setting, and RDZ for a policy.
You cannot edit the name of a policy. To rename a policy, first delete the policy, and then
re-create it with the new name.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Right-click the policy, and select Properties.
The Policy Properties dialog box appears.
4. Edit the properties for the policy. The properties are the same properties that you
specified when you created the policy.
5. Click OK.
Deleting a policy
When you delete a policy, the deletion process also deletes all workflows and actions for
the policy.
Groups that are assigned to the workflows in the policy are not deleted, however. The
workflow assignment for the group is removed from the group properties. You can assign
the group to a workflow in a different policy, or delete the group.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Right-click the policy, and select Delete.
A confirmation message appears.
4. Click Yes.
Note
The Policy resource remains in the Monitoring window until all the information about
the workflows and actions within the policy expire in the jobs database. The default
job expiration time is 72 hours. Modifying the retention period for jobs in the jobs
database on page 696 describes how to change the default job expiration time.
Workflows
Workflows define a list of actions to perform sequentially or concurrently, a schedule
window during which the workflow can run, and the protection group to which the
workflow applies.
A workflow can be as simple as a single action that applies to a finite list of Client
resources, or it can be a complex chain of actions that apply to a dynamically changing
list of resources, with some actions occurring sequentially and others occurring
concurrently.
You can also define notification settings for a workflow.
Workflows 269
Data Protection Policies
When you create actions for a workflow, a map provides a visual representation of the
actions in the second right pane of the Protection window of the Administration interface.
The oval icon at the beginning of the visual representation specifies the group to which
the workflow applies, the rounded rectangle icons identify actions, and the parallelogram
icons identify the destination pool for the action.
You can work directly in the visual representation of a workflow to perform the following
tasks:
l Adjust the display of the visual representation by right-clicking and selecting one of
the following options:
n Zoom In—Use to increase the size of the visual representation.
n Zoom Out—Use to decrease the size of the visual representation.
n Zoom Area—Use to limit the display to a single section of the visual
representation.
n Fit Content—Use to fit the visual representation to the window area.
n Reset—Use to reset the visual representation to the default settings.
Workflows 271
Data Protection Policies
n Overview—To view a separate dialog box with a high-level view of the visual
representation and a legend of the icons.
l View and edit the properties for the group, action, or destination pool by right-
clicking the icon for the item and selecting Properties.
l Create a group, action, or destination pool by right-clicking the icon for the item and
selecting New.
nsrlog -f policy_notifications.log
10. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To prevent the
actions in the workflow from running when the policy or workflow that contains the
action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the AutoStart
Enabled box, leave the option selected. To prevent the workflow from running at
the time that is specified in the Start time attribute, clear this option.
c. To define the time to start the actions in the workflow, in the Start Time attribute,
use the spin boxes.
The default value is 9:00 P.M.
d. To define how frequently to repeat the actions that are defined in the workflow
over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is less
than 24 hours, the Interval End attribute appears. To define the last time to start a
workflow in a defined interval period, use the spin boxes .
For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour, and the
Interval end time to 11:00 P.M., then the workflow automatically starts every hour
beginning at 7:00 P.M. and the last start time is 11:00 PM.
11. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection
group, click the + button that is located to the right of the Groups list.
12. The Actions table displays a list of actions in the workflow. To edit or delete an action
in the workflow, select the action and click Edit or Delete. To create one or more
actions for the workflow, click Add.
Workflows 273
Data Protection Policies
The Actions table organizes the information in sortable columns. Right-click in the
table to customize the attributes that appear.
13. To create the workflow, click OK.
nsrlog -f policy_notifications.log
l On Linux, to send a notification email, type the following command:
where:
7. In the Running group box, define when and how often the workflow runs.
a. To ensure that the actions contained in the workflow run when the policy or
workflow is started, in the Enabled box, leave the option selected. To prevent the
actions in the workflow from running when the policy or workflow that contains the
action is started, clear this option.
b. To ensure that the workflow starts at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the AutoStart
Enabled box, leave the option selected. To prevent the workflow from running at
the time that is specified in the Start time attribute, clear this option.
c. To define the time to start the actions in the workflow, in the Start Time attribute,
use the spin boxes.
The default value is 9:00 P.M.
d. To define how frequently to repeat the actions that are defined in the workflow
over a 24 hour period, In the Interval attribute, use the spin boxes.
The default value is 24 hours, or once a day. When you select a value that is less
than 24 hours, the Interval End attribute appears. To define the last time to start a
workflow in a defined interval period, use the spin boxes .
For example, when you set the Start Time to 7:00 PM, the Interval to 1 hour, and the
Interval end time to 11:00 P.M., then the workflow automatically starts every hour
beginning at 7:00 P.M. and the last start time is 11:00 PM.
8. To create the workflow, click OK.
After you finish
Create the actions that will occur in the workflow, and then assign a group to the
workflow. If a workflow does not contain a group, a policy does not perform any actions.
Editing a workflow
You can edit all the properties for a workflow, including the name, description, schedule,
notification settings, group, and actions.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
Workflows 275
Data Protection Policies
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
6. Edit the properties for the workflow. The properties are the same properties that you
specified when you created the workflow.
Note
When you add actions to an existing workflow that is associated with a group, you
only see the action types that are allowed in the action sequence.
7. Click OK.
Deleting a workflow
When you delete a workflow, the deletion process also deletes all actions for the
workflow.
The group that is assigned to the workflow is not deleted, however. The workflow
assignment for the group is removed from the group properties. You can assign the group
to a different workflow or delete the group.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Policies.
3. Select the policy for the workflow.
4. In the right pane of the window, select the Workflows tab.
5. Right-click the workflow, and select Delete.
A confirmation message appears.
6. Click Yes.
Protection groups
Protection groups enable you to define a set of Client resources or save sets.
Note
When you specify multiple tag values, the query uses an OR operation to match
the tags. For example, if you specify Sales and Support tag values, then the
query builds a list of clients that contain the tag Sales or Support.
l To modify the clients in a Client group, from the Clients table, perform one of the
following actions in the Selected Clients column:
n To add a Client resource to the group, select the checkbox beside the name of
the Client resource.
n To remove Client resources from the group, clear the checkbox next to the
name of the Client resource.
5. Click OK.
Actions
Actions are the key resources in a workflow for a data protection policy. An action is a
task that occurs on a work list. A work list is a list of pending work items, such a group of
Client resources or save sets.
You can chain multiple actions together to occur sequentially or concurrently in a
workflow.
Creating an action
The Policy Action wizard walks you through the steps to create an action. You can create
an action either when you are creating or editing a workflow, or as a separate process
from the workflow configuration.
Before you begin
Create the policy and workflow that contains the action.
Procedure
1. Open the Policy Action wizard by using one of the methods in the following table.
Method Steps
To create an action Click Add in either the New Workflow dialog box or the Workflow
during the workflow Properties dialog box.
configuration
Method Steps
Note
Note
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
Actions 279
Data Protection Policies
7. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, select the action
that should precede this action from the Previous box.
l If the action should run concurrently with an action, select the concurrent action
from the Previous box, and then select the Concurrent checkbox.
8. The steps to go through the wizard depend on the action type that you select.
Editing an action
You can edit all the properties of an existing action.
Perform one of the following tasks to edit an action.
Procedure
l Open the Policy Action wizard for the action by using one of the methods in the
following table.
Method Steps
During workflow configuration Select the action and then click Edit in either the New
Workflow dialog box or the Workflow Properties
dialog box.
From the Actions tab of the workflow 1. In the Administration window, click Protection.
From the visual representation of the Right-click the action in the visual representation of the
workflow workflow, and select Properties.
l Use the quick edit option in the Actions window of a Workflow resource. To modify a
specific attribute that appears in the resource window, place the mouse in the cell
that contains the attribute that you want to change, then right-click. The menu
displays an option to edit the attribute. For example, to modify the Comment attribute,
right-click the resource in the Comment cell and select Edit Comment.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
Deleting an action
You can delete an action in a workflow either when you are creating or editing a workflow,
or as a separate process from the workflow configuration.
If the action that you delete is part of a sequence of actions in a workflow, then you can
only delete the action if the removal of the action from the sequence would still result in a
valid workflow. The properties for other actions in a sequence are updated to reflect the
new sequence of actions after the deletion.
Procedure
l To delete an action when you are creating or editing a workflow:
a. Select the action in either the New Workflow dialog box or the Workflow Properties
dialog box.
b. Click Delete.
A confirmation message appears.
c. Click Yes.
l To delete an action as a separate process from workflow configuration:
a. In the Administration window, click Protection.
b. In the expanded left pane, select Policies.
c. Select the policy.
d. Select the workflow.
e. In the right pane, select the Actions tab.
f. Right-click the action and select Delete.
A confirmation message appears.
g. Click Yes.
The UNIX man pages and the EMC NetWorker Command Reference Guide provide detailed
information about how to use the nsrpolicy command.
b. To create a protection Group resource and add existing clients to the Group
resource, type: nsrpolicy group create client -g group_name -C
"client_name1,client_name2,client_name3..."
where:
l group_name is a unique name of the Group resource.
l client_name1,client_name2,client_name3... is a comma separated list of client
names to add to the group.
c. To create a workflow and associate the workflow with the new Policy and Group
resources, type: nsrpolicy workflow create --policy_name policy_name
--workflow_name workflow_name --group_name group_name
where:
l policy_name is the name of the Policy resource.
l group_name is the name of the Group resource.
l workflow_name is a unique name for the Workflow resource.
3. Use the nsrpolicy display command to display the attributes for the new Data
Protection Policy resource.
l To display a Policy resource, type: nsrpolicy action display --policy_name
policy_name
Where policy_name is the name of the Policy resource.
l To display a Workflow resource, type: nsrpolicy action display --
workflow_name workflow_name
Where workflow_name is the name of the Workflow resource.
l To display a Group resource, type: nsrpolicy action display --group_name
group_name
For example:
l To create a traditional backup action and add this action to the SQL workflow in
the SQL_hosts policy resource, type: nsrpolicy action create backup
traditional --policy_name SQL_hosts --workflow_name SQL -A
SQL_backup.
l To create a clone action and insert the clone action immediately after a backup
action created in the SQL workflow, type: nsrpolicy action create backup
traditional --policy_name policy_name SQL_hosts --workflow_name
SQL -A SQL_clone -d SQL_backup.
Note
Note
You can use this command to start actions for failed clients in a workflow that is
currently running.
where:
l "policy_name" is the name of the Policy resource that contains the workflow that you
want to start.
l "workflow_name" is the name of the Workflow resource that you want to start.
l client_list is a comma-separated list of host names for the clients in the workflow
whose actions you want to start.
Stopping all actions in a workflow from a command prompt
To stop all actions in a specific workflow in a policy, type the following command:
nsrpolicy start --policy_name "policy_name" --workflow_name
"workflow_name"
where:
l "policy_name" is the name of the Policy resource that contains the workflow that you
want to stop.
l "workflow_name" is the name of the Workflow resource that you want to stop.
Restarting a workflow from a command prompt
To restart all actions in a workflows that a Policy resource contains, type the following
command: nsrpolicy restart --policy_name "policy_name" --workflow_name
"workflow_name"
where:
l "policy_name" is the name of the Policy resource that contains the workflow that you
want to restart.
l "workflow_name" is the name of the Workflow resource that you want to restart.
Running a workflow with action overrides
Before an action starts NetWorker defines how to run the action by reviewing the
attributes values of the policy, workflow, and action resources. In NetWorker 9.0.1 and
later, the nsrworkflow command line option -A enables you to override attribute
values that NetWorker uses to run the action. Actions which support override values are:
traditional and snapshot backups, probe, and clone.
Specify the -A option in the format -A "action_name cmd_line_flags", where:
l action_name—Specifies the name of the action resource.
l cmd_line_flags—Defines a list of command line flags and the new parameter value.
Use escaped double quotes or single quotes for action names or parameters that contain
spaces or special characters. For example: -A "\"actionname\" -l full" or -A
"'action name' -l full"
For example, to specify an override on the level of a backup action and the retention time
of the backup and clone actions in the workflow, type the following command:
To specify a backup level override of 3 and a retention period of 3 years for the backup
and clone actions for a workflow named fs_backup_clone, an backup action named
backup and a clone action named clone, type the following command:
{
"policyName": "Server Protection",
"policyComment": "Default policy for server that includes
server backup and maintenance",
"policySummaryNotification": {
"policyCompletionNotificationAction": "nsrlog -f
policy_notifications.log",
"policyCompletionNotificationExecuteOn": "completion"
},
"policyWorkflows": [
{
"workflowName": "Server backup",
"synthesisRoot": [
"NSR group/Server backup",
"NSR Snapshot Policy/Server backup"
],
"workflowActions": [
{
"actionName": "Server db backup",
"actionSpecific": {
"actions": {
"actionType": "server backup",
"asbDestinationPool": "Default",
"asbDestinationStorageNode": "nsrserverhost",
"asbPerformBootstrap": true,
"asbPerformCFI": true,
"asbRetentionPeriod": "1 Months"
}
},
"actionSchedulePeriod": "month",
"actionScheduleActivity": [
"full",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1",
"1"
],
"actionComment": "Perform server database backup that is
required for disaster r
ecovery",
"actionCompletionNotification": {
"policyCompletionNotificationAction": "",
"policyCompletionNotificationExecuteOn": "ignore"
},
"actionConcurrent": false,
"actionDrivenBy": "",
"actionEnabled": true,
"actionFailureImpact": "continue",
"actionHardLimit": "00:00",
"actionInactivityTimeout": 30,
"actionParallelism": 0,
"actionRetries": 1,
"actionRetryDelay": 30,
"actionSoftLimit": "00:00"
},
{
"actionName": "Expiration",
"actionSpecific": {
"actions": {
"actionType": "expire"
}
},
"actionSchedulePeriod": "week",
"actionScheduleActivity": [
"exec",
"exec",
"exec",
"exec",
"exec",
"exec",
"exec"
],
"actionComment": "Expire the savesets",
"actionCompletionNotification": {
"policyCompletionNotificationAction": "",
"policyCompletionNotificationExecuteOn": "ignore"
},
"actionConcurrent": false,
"actionDrivenBy": "Server db backup",
"actionEnabled": true,
"actionFailureImpact": "continue",
"actionHardLimit": "00:00",
"actionInactivityTimeout": 30,
"actionParallelism": 0,
"actionRetries": 1,
"actionRetryDelay": 30,
"actionSoftLimit": "00:00"
}
],
"workflowAutostartEnabled": true,
"workflowComment": "Perform server backup",
"workflowCompletionNotification": {
"policyCompletionNotificationAction": "",
"policyCompletionNotificationExecuteOn": "ignore"
},
"workflowDescription": "server backup action;expire action;",
"workflowEnabled": true,
"workflowGroups": [
"Server Protection"
],
"workflowInterval": "24:00",
"workflowNextstart": "2015-06-13T10:00:00-0400",
"workflowRestartWindow": "12:00",
"workflowStarttime": "10:00"
},
{
"workflowName": "NMC server backup",
"synthesisRoot": [
"NSR group/NMC server backup",
"NSR Snapshot Policy/NMC server backup"
],
"workflowActions": [
{
"actionName": "NMC server backup",
"actionSpecific": {
"actions": {
"actionType": "backup",
"actionBackupSubtypeSpecific": {
"backupSubtypes": {
"abBackupSubtype": "traditional",
"abtDestinationPool": "Default",
"abtEstimate": false,
"abtFileInactivityAlertThreshold": 0,
"abtFileInactivityThreshold": 0,
"abtRevertToFullWhenSyntheticFullFails": true,
"abtTimestampFormat": "none",
"abtVerifySyntheticFull": true
}
},
"abDestinationStorageNode": [
"nsrserverhost"
],
"abRetentionPeriod": "1 Months",
"abOverrideRetentionPeriod": false,
"abOverrideBackupSchedule": false,
"abClientOverridesBehavior": "clientCanOverride"
}
},
"actionSchedulePeriod": "week",
"actionScheduleActivity": [
"full",
"full",
"full",
"full",
"full",
"full",
"full"
],
"actionCompletionNotification": {
"policyCompletionNotificationAction": "",
"policyCompletionNotificationExecuteOn": "ignore"
},
"actionConcurrent": false,
"actionDrivenBy": "",
"actionEnabled": true,
"actionFailureImpact": "continue",
"actionHardLimit": "00:00",
"actionInactivityTimeout": 30,
"actionParallelism": 100,
"actionRetries": 1,
"actionRetryDelay": 30,
"actionSoftLimit": "00:00"
}
],
"workflowAutostartEnabled": true,
"workflowComment": "Perform NMC database backup",
"workflowCompletionNotification": {
"policyCompletionNotificationAction": "",
"policyCompletionNotificationExecuteOn": "ignore"
},
"workflowDescription": "Traditional Backup to pool Default,
with expiration 1 Months;",
"workflowEnabled": true,
"workflowGroups": [
"NMC server"
],
"workflowInterval": "24:00",
"workflowNextstart": "2015-06-12T14:00:00-0400",
"workflowRestartWindow": "12:00",
"workflowStarttime": "14:00"
}
]
}
Troubleshooting policies
This section provides information about issues related to the configuration and
management of policy resources.
Unable to start because the Group for this workflow is empty
This message appears when you use the Start Individual Client option to start actions for
specific clients in the Server backup workflow. NetWorker does not support the Start
Individual Client option for the Server backup workflow. To resolve this issue, start all
actions for all the clients in the workflow.
Schedules Defines the backup level to perform on Perform a full backup on Sunday, and
each day. an incremental backup on all other
days of the week.
Time policies Defines time periods. Use time policies Backups for a client are maintained in
to define save set retention. Save set the database, and can be browsed for
retention is how long the save set entries recovery for a month.
are maintained in the media database
and client file indexes.
Directives Specifies resources that contain special A directive specifies that the backup
instructions that control how the should skip files with a .tmp
NetWorker server processes files and extension.
directories during backup and recovery.
For example, encryption and
compression.
Save sets
The collection of data items that are backed up during a backup session between the
NetWorker server and a Client resource is called a save set.
A save set can consist of the following:
l A group of files or entire file systems.
l Application data, such as a database, or operating system settings.
You can use the predefined save sets for scheduled backups, or specify a list of save sets
to back up for a client resource in the Save set attribute on the General tab of the Client
Properties dialog box.
Predefined save sets include the DISASTER_RECOVERY:\ save set and the ALL save
set.
When you specify a list of save sets for a client resource, the following guidelines apply:
l For Windows operating systems, use the same pathname case that the Windows file
system uses. Although most file systems are case-independent, the NetWorker
C:\Docs\CustomerLogs
D:\accounting
l For clients that use non-ASCII locales on UNIX platforms, or for Windows clients that
are configured from a UNIX host that uses non-ASCII locales, special considerations
apply when you type a path or file name in the Save set attribute:
n Type the path or file name in the locale that was used when you created the path
or file. If using a different locale when you type a path or file name, backups fail
with a No such file or directory error message.
n Either use the ALL save set in this situation, or log in to the client by using the
correct locale and then configure the client from that computer.
l To back up a UNIX or Linux host that contains path or file names with multiple
locales, create a separate Client resource for each locale. For example, to configure a
multi-locale UNIX host with data in both Japanese and French, create two different
Client resources. One Client resource to define the save sets for the Japanese data,
and one Client resource to define the save sets for the French data.
Operating Files
system
Windows l DISASTER_RECOVERY:\
l Noncritical volumes
UNIX l When the backup starts, the savefs process reads the contents of
the /etc/vfstab file on Solaris clients, the /etc/fstab file on HP-UX
and Linux clients, or the /etc/filesystems file on AIX clients. The
contents of the file are compared to the currently mounted file systems and
BTRFS sub-volumes. Only currently mounted file systems and BTRFS sub-
volumes that are configured in these files are backed up. When NetWorker
encounters a sub-directory that has a sub-volume ID that differs from the
parent sub-volume ID, NetWorker will not backup the contents of the
subdirectory, unless you specify the save -x in the Backup command field in
the properties of the Client resource.
l For a Solaris sparse or whole root zone client, all mounted file systems in the
sparse or whole root zone that are not normally skipped, such as NFS, are
backed up.
Operating Files
system
NOTICE
When you use the ALL save set for a backup, the NetWorker software creates a temporary
file similar to a directive under each drive. The file name uses the format drive
guid.txt and lists the files that are excluded from the backup. The file is temporary
and is automatically deleted when the backup completes.
all-local l For a global zone client, the file systems in the sparse or whole root
zone on the physical host are backed up. File systems in the global zone
are skipped.
l For a sparse or whole root zone client, the all-local save set is
equivalent to the ALL save set.
all-global l For a global zone client, all file systems in the global zone are backed
up. All sparse and whole root zone file systems on the physical host are
skipped.
l For a Solaris sparse or whole root zone client, the all-global save
set is equivalent to the ALL save set.
Backup levels
You can specify the level of the backup to be performed during scheduled backups.
When you limit the frequency of full backups, you help maintain server efficiency while
still ensuring that data is protected. Different backup levels enable you to balance the
amount of time that is required to complete a backup with the number of volumes that
are required to recover from a disk failure.
The following table describes the available backup levels.
Incremental Results in the back up of the files that have changed since the last backup,
regardless of the level of the last backup.
Cumulative Results in the back up of all files that have changed since the last full backup.
incremental
Logs only Results in the back up of the transaction log for databases that are created by
a NetWorker module. For example, the NetWorker Module for Databases and
Applications, the NetWorker Module for Microsoft, or the NetWorker Module
for SAP.
Skip Skips the scheduled backup. For example, you can skip a backup on a
holiday if no one is available to change or add more media volumes.
Synthetic full l Faster than a full backup l High load on the storage node
l Faster recovery l Requires at least two volume
drives
l Low load on the server, client, and
network l Uses the most volume space
l Requires fewer volumes for
recovery
l If you have only one stand-alone storage device and the full backup does not fit on a
single piece of media, an operator must be available to monitor the backup, and
change the media.
l Full backups cause the online indexes to grow more rapidly than incremental or
cumulative incremental backups.
l Cumulative incremental backups serve as checkpoints in schedules because they
collect all the files that have changed over several days, or even weeks, into a single
backup session.
l Synthetic full backups provide the same benefits at the same cost as full backups.
The difference is that synthetic full backups are less taxing on the network and client
because a new full backup is created from a previously created full or synthetic full
backup and subsequent incremental backups.
Note
You can also reduce the size and the time it takes to back up data by using directives. For
example, use a directive to skip certain files or file systems when performing a backup.
The following example illustrates how the backup levels affect the requirements for data
recovery.
In the following figure:
l Day 1—A full backup is run.
l Day 2— An incremental backup saves all files that have changed since the full
backup.
l Day 3—Another incremental backup saves all files that have changed since Day 2.
l Day 4—A cumulative incremental backup saves all files that have changed since the
full backup on Day 1.
To recover all data from a disk failure on Day 4, you need the data from the full backup
from September 30 and the cumulative incremental backup on Day 4. You no longer need
the data from Day 1, 2, and 3, because the volume with the cumulative incremental
backup includes that information.
Synthetic full backups do not eliminate the requirement for full backups. It is
recommended to perform full backups on a monthly or quarterly basis, and limit the
number of incremental backups.
In this example, the synthetic full backup operation creates the incremental backup at T4.
Then a synthetic full backup is created by combining the full backup at T1 with the
subsequent incremental backups at T2, T3, and T4 to form a synthetic full backup at T4 +
Delta. The save set at T4 + Delta is equivalent to a full backup that is taken at T4.
The T4 + Delta represents a small time change of one or two seconds from the time of T4,
since two separate save sets cannot be assigned the exact same save set time. For
example, if T4 is created at 1334389404, then T4+Delta is created at 1334389405, with
a difference of one second.
The synthetic full save set includes only files that are covered by save sets up to T4 at
1334389404. The incremental backup after the synthetic full backup at 1334389405
includes all changes since 1334389404. Note that the synthetic full backup does not
include the changes since T4, since only one save set can exist at any particular time.
After a synthetic full backup is performed, the next synthetic full backup combines the
previous synthetic full backup and subsequent incremental backups.
NOTICE
Under most conditions, synthetic full backups can free network bandwidth and client
resources. However, a synthetic full backup might take longer to run on the storage node
than a full backup because incremental backups are combined into a synthetic full
backup. Without proper planning, synthetic full backups might affect the performance of
the storage node.
To manage resource usage, perform synthetic full operations outside of the normal
backup window. Also, synthetic full backups do not eliminate the requirement for full
backups. It is best practice to schedule and perform full backups on a monthly or
quarterly basis and limit the number of incremental backups.
the Administration interface to access the Backup renamed directories attribute in the
Client Properties dialog box.
If you configure multiple policy workflows to run concurrently, set the Parallelism
attribute to 40 for the Client resource for the NetWorker server. The Parallelism attribute
is available on the Globals (1 of 2) tab of the Client Properties dialog box. Setting the
attribute to 20 limits the number of concurrent synthetic full operations to 20. Divide the
parallelism setting by two to control the number of concurrently running synthetic full
operations. The best number of concurrent synthetic full operations depends on the
following criteria:
l Configuration of the NetWorker server.
l Size of the save sets and number of clients.
l Number of nsrpolicy instances that are concurrently running.
For example, if a full backup occurs once a week, you can replace the full backup with an
incremental backup followed by a synthetic full backup without increasing the backup
space usage.
If you perform a full backup on Sunday and then incremental backups on Monday
through Saturday, then consider changing to the following schedule:
l Full backup on the first Sunday of the month.
l Incremental backups on Monday through Saturday.
l Synthetic full backups on the second, third, fourth, and fifth Sunday of the month.
NOTICE
l On the Options page, leave the Verify synthetic full option selected to verify the
integrity of the new index entries that are created in the client file index for the
synthetic full backup.
l On the Options page, leave the Revert to full when synthetic full fails option
selected to perform a full backup of the save set if the synthetic full backup fails.
mminfo –q syntheticfull –c client -N Queries all synthetic full save sets for the specified
save_set client and save_set.
Validating synthetic full backups in the Media window of the Administration interface
When you search for save sets in the Media window of the Administration interface, you
can limit the save set results to synthetic full save sets by selecting the Synthetic Full
checkbox on the Query Save Set tab. Searching for save sets on page 449 provides
instructions.
Validating synthetic full backups in the backup action logs
The following excerpt from the backup action log file illustrates the type of messages
NetWorker displays when performing a synthetic full backup:
1707:97860:nsrconsolidate: Synthetic full save set hostname:/
sat-tree at savetime 1358188522 was created by using non-
virtual synthetic mode
95773:nsrrecopy: Virtual synthetic succeeded for hostname:/
test1
Table 57 Comparison of traditional synthetic full and virtual synthetic full backups
Read/write for all types of volumes is Only Data Domain devices are supported, and
supported. the source and destination volumes must
belong to the same Data Domain system.
However, the volumes can belong to different
MTrees in the same Data Domain system.
The client file index is created by nsrrecopy. The client file index is created by
nsrconsolidate.
Requirement Details
DDOS version Version 5.3 or later for both Data Domain systems and Data Domain
Archivers.
Requirement Details
NOTICE
Backup storage All constituent backups for the VSF backup must be on the same Data
Domain system. The save sets can be distributed across multiple storage
nodes and located in different MTrees on the Data Domain system.
Client resource l Enable the Client direct attribute on the General tab of the Client
configuration
Properties dialog box for the client resource.
Device resource Specify a value in the volume location attribute for the device resource for
configuration the Data Domain system. NetWorker updates the volume location attribute
during the device mount operation.
NOTICE
Before you update a storage node that uses Data Domain devices, unmount
each device. Once the update completes, mount each device.
NetWorker If you upgrade the NetWorker client to release 8.1 or later from a release
upgrade before 8.1, you must perform a full backup before you perform a VSF backup.
requirements Otherwise, file-by-file recovery fails.
The EMC NetWorker Data Domain Boost Integration Guide provides details on configuring
the NetWorker environment for use with a Data Domain system.
Support for directives
Directives do not apply to VSF backups because the VSF backup is created by the Data
Domain system.
Support for concurrent operations
The volume of concurrent VSF operations that a Data Domain system can handle depends
on the model of the Data Domain system and the capacity of the NetWorker host. The
following scenarios have been tested and verified to work:
l Concurrent VSF backups.
l A VSF backup concurrent with a cloning operation.
mminfo –q syntheticfull –c client -N Queries all synthetic full save sets for the specified
save_set client and save_set.
Backup scheduling
When you schedule backups, you define the days on which backups occur and the level
of backup (full, incremental, and so on) that occurs each day.
Depending on the size of a network, you could perform full backups for all clients
simultaneously. For example, if no one works over the weekend you could schedule full
backups during this time.
Alternatively, you may need to configure backups to balance the backup load on and
increase the efficiency of a NetWorker server. Since full backups transfer large amounts
of data and typically take longer than other backup levels, you might want to stagger
them throughout the week. For example, you could configure backups so that full
backups occur for one group of clients on Sunday, for a second group of clients on
Tuesday, and a third group of clients on Thursday, as illustrated in the following figure.
Figure 40 Staggered weekly backup schedule for multiple groups of clients
Note
Consider using a synthetic full backup in environments with a short backup window
period when you must create a full backup.
NOTICE
When you create explicitly list save sets, any files or file systems not in that list are
omitted from the backup, including any new disk volumes that you add to the system.
Remember to configure backups for any new disk volumes after you add them.
You can also configure the schedule for a backup action on a monthly basis instead of on
a weekly basis.
Click the icon in the schedule to change the type of backup that is performed on that day.
The following table provides details on the backup type that each icon represents.
Synthetic Full Perform a synthetic full backup on this day. A synthetic full backup
includes all data that changed since the last full backup and
subsequent incremental backups to create a synthetic full backup.
Preconfigured schedules
When you override the policy backup schedule for a client resource, you can select or
customize one of the preconfigured schedules that are available when you install or
upgrade the NetWorker software.
The following table describes the preconfigured schedules.
Forever Incremental Monthly schedule that performs a synthetic full backup every day.
Full Every Day Weekly schedule that performs a full backup every day.
Full Every Friday Weekly schedule that performs a full backup every Friday and
incremental backups on all other days.
Full on 1st Friday of Monthly schedule that performs a full backup on the first
Month Friday of the month and incremental backups on all other days.
Full on 1st of Month Monthly schedule that performs a full backup on the first calendar day
of the month, and incremental backups on all other days.
Quarterly Monthly schedule that performs a full backup on the first day of a
quarter, a cumulative incremental backup once a week after the full
backup, and then incremental backups on all other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on the first
1st Friday of Month Friday of every month, and incremental backups on all other days.
Synthetic Full Weekly schedule that performs a synthetic full backup on every Friday
Every Friday and incremental backups on all other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on the first
on 1st of Month calendar day of the month, and incremental backups on all other days.
Synthetic Full Monthly schedule that performs a synthetic full backup on the first day
Quarterly of each quarter, a cumulative incremental backup once a week after the
synthetic full backup, and then incremental backups on all other days.
You can edit all preconfigured schedules except for schedules that contain overrides,
which are indicated by an asterisk next to a backup level in the schedule calendar. You
cannot delete a preconfigured schedule.
Note
If you override backup levels by using the nsradmin command line program, you can
also specify relative date values such as full first friday every 2 week.
The nsr_schedule man page or the EMC NetWorker Command Reference Guide
contain more information about overriding backup levels.
9. Click OK.
Editing a schedule
You can edit all custom schedules, and all preconfigured schedules, except for
preconfigured schedules that contain overrides. Overrides are indicated by an asterisk
next to a backup level in the schedule calendar. You can edit all schedule settings except
for the name.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule and select Properties.
The Schedule Properties dialog box appears.
4. Edit the settings for the schedule and click OK.
Copying a schedule
You can create a new backup schedule by copying an existing schedule and then editing
the copy.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule to copy and select Copy.
The Create Schedule dialog box appears with the same information as the copied
schedule except for the name.
4. In the Name box, type a name for the new schedule.
5. Edit the settings for the schedule and click OK.
Deleting a schedule
You can delete any custom schedules that you have created. You cannot delete
preconfigured schedules.
Before you begin
Ensure that the schedule has not been applied to any Client resources by verifying the
setting in the Schedule list on the General tab of the Client Properties dialog box for each
Client resource.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Schedules.
3. In the right pane, right-click the schedule and select Delete.
A confirmation message appears.
4. Click Yes.
Backup retention
The retention setting for a save set determines how long the NetWorker server maintains
save set entries in the media database and client file indexes. Until the retention period
expires, you can recover client backup data from backup storage either by browsing the
data or by recovering the entire save set.
Removing expired save sets on page 455 describes how to remove save sets from
backup storage after the retention period expires.
Note
If you set a retention policy on February 29 of a leap year, the last day in which the policy
applied is 1 day earlier than you might expect. For example, if you set a retention policy
to 1 year on March 3, 2015, the save set will expire on March 3, 2016 as expected, which
is 366 days. If you set a retention policy to 1 year on February 29, 2016, you might expect
that the policy will expire March 1, 2017. However, the policy will actually expire on
February 28, 2017, which is 365 days. This behavior is only seen when a retention policy
is set on February 29 for one or more years.
retains the value that is defined in the Retention attribute of a Pool resource as a read-
only value.
Order of precedence for Retention resource attributes
EMC recommends that you use the configuration settings in an Action resource to
determine which pool received backup data. NetWorker provides you with the ability to
configure a Pool attribute in the client resource, which can override the value defined in
the Action resource. Additionally, the Pool resource contains 8.2.x legacy attributes that
provide you with the ability to define backup data criteria for the pool. How and when
NetWorker uses the attributes values defined in the Pool, Action, and Client resources to
determine which backup pool will receive data depends on the value that you select in
the Client Override Behavior attribute of the Action resource:
l Client Can Override—The value in Retention attribute of the Client resource takes
precedence over the Retention value that is defined in the Action resource.
l Client Can Not Override—The value defined Retention attribute in the Action resource
takes precedence over the value that is defined in Retention attribute of the Client
resource and the Retention attribute of the Pool resource.
l Legacy Backup Rules—Enabled for migrations only. NetWorker uses the values that
are defined in the Retention attribute of the Pool resource to determine which the
retention policy to assign to backup data from a client. The value that is defined in
the Retention attribute of the Pool resource take precedence over the Retention value
that is defined in the Action resource and the Retention value that is defined in the
Client resource.
Note
You cannot modify the legacy attributes in the migrated Pool resources.
Procedure
1. (Optional) Create or customize the retention policy that you plan to assign to the
Client resource.
a. In the NetWorker Administration window, click Server.
b. In the expanded left pane, select Time Policies.
c. Create a policy or modify a retention Policy resource:
l To create a policy, from the File menu, select New.
l To modify a policy, right-click the retention policy and select Properties.
d. For a new policy only, in the Name box, type a name for the retention policy.
e. Optionally, in the Comment box, type a description of the retention policy.
f. From the Number of periods and Period lists, specify the duration of the retention
period.
g. Click OK.
2. In the NetWorker Administration window, select View > Diagnostic Mode to enable
diagnostic mode view.
A check mark next to Diagnostic Mode in the View menu indicates that diagnostic
mode view is enabled.
3. In the NetWorker Administration window, click Protection.
4. In the expanded left pane, select Clients.
5. In the right pane, right-click the client resource and select Modify Client Properties.
The Client Properties dialog box appears, starting with the General tab.
6. From the Retention policy list, select the retention policy to apply to all backups of the
client resource, regardless of the retention setting for any data protection policies that
apply to the client resource.
7. Click OK.
The following command updates the retention time for save set ID 3315861249 to two
years from the current date and time:
Renamed directories
When you rename a directory, a full backup is performed on all subdirectories and files of
the renamed directory.
If you then rename the directory back to its original name, then files and subdirectories of
the directory are not eligible for backup until the files or subdirectories are updated or the
next full backup occurs.
You can change this default behavior by clearing the Backup renamed directories
checkbox on the General tab of the Client Properties dialog box for a Client resource. You
must select View > Diagnostic Mode in the Administration interface to access the Backup
renamed directories attribute in the Client Properties dialog box.
When you clear the Backup renamed directories checkbox for a Client resource,
unchanged files and folders under the renamed directory are skipped during a non-full
backup. This behavior can cause unexpected results during a recovery operation. If you
try to recover data under a renamed directory from a date between the time that the
directory was renamed and the next full backup, it may appear that data is missing. For
that recovery period, any files or folders that were unchanged do not appear under the
renamed directory. Instead, they appear under the previous directory name.
You must leave the Backup renamed directories checkbox selected for clients that
perform synthetic full backups.
Raw partitions
The NetWorker software must have exclusive access to a file system to perform a raw
backup. Close as many applications as possible before doing a raw disk backup. If the
raw partition contains data that are managed by an active database management system
(DBMS), ensure that the partition is offline and the database manager is shut down. For
greater flexibility when backing up partitions that contain DBMS data, use a NetWorker
Module application.
Raw partitions on Windows
Back up raw disk partitions on Windows by specifying the raw disk partition in a save set
with the save command. Identify the raw partition as a physical drive or logical drive. For
example:
the Parallelism attribute is different for the NetWorker server than it is for all other Client
resources:
l For the NetWorker server Client resource, the default value is 12. This higher default
value enables the server to complete a larger number of index backups during a file
system backup of the server or other index backups.
l For all other clients, the default value is 4.
Enabling PSS results in significant performance improvements due to save set
aggregation, where the NetWorker server starts a single save process per client with all
client save sets that are passed to the single process for various processing
optimizations, such as minimal Windows VSS snapshots and support for the following:
l Four parallel streams are started per save set, subject to any client parallelism
limitations that might prevent all save sets from starting simultaneously
l The ability to modify the number of parallel streams per save set by defining the new
PSS:streams_per_ss environment variable save operations attribute in the properties
of a Client resource. For example, setting PSS:streams_per_ss=2,* splits all save sets
into two parallel save streams, whereas PSS:streams_per_ss=3,/data1, 5,/data2
splits /data1 into three parallel save streams and /data2 into five parallel save
streams.
l Automatic stream reclaiming, which dynamically increases the number of active
streams for an already running save set backup to maximize utilization of limited
client parallelism conditions
Note
The EMC NetWorker Performance Optimization Planning Guide provides complete details on
PSS requirements and performance benefits.
clients that reside on a physical host are limited to the value specified for the physical
host.
For example, consider an environment with ten virtual machines running on the same
physical host. Each virtual machine is a NetWorker client, and each client has a client
parallelism setting of 4. This setting can result in a total of 40 save streams occurring on
the same physical host, which would significantly slow down that system. To avoid this
situation, you can specify that the client parallelism values are to be based on the
underlying physical host. In this example, that would result in no more than four save
streams occurring for the backup of the ten virtual clients.
Procedure
1. In the Administration window, select View > Diagnostic Mode to enable diagnostic
mode view.
A check mark next to Diagnostic Mode in the View menu indicates that diagnostic
mode view is enabled.
2. Click Protection.
3. In the expanded left pane, select Clients.
4. Right-click the Client resource for the virtual client and select Modify Client
Properties.
The Client Properties dialog box appears, starting with the General tab.
5. Select the Virtual client checkbox.
6. Type the name of the underlying physical host in the Physical host box.
7. Select the Globals (1 of 2) tab.
8. From the Parallelism list, specify the maximum number of save streams.
9. Select the Physical client parallelism checkbox.
10. Select the Parallel save streams per save set checkbox.
11. Click OK.
12. Repeat these steps for all virtual NetWorker clients that share the same physical host.
Ensure that the value in the Physical host attribute is the same for all virtual
NetWorker Client resources that share the same physical host.
Troubleshooting PSS
It is recommended that you troubleshoot PSS with the guidance of EMC Customer
Support. The EMC NetWorker Performance Optimization Planning Guide provides complete
details on PSS requirements and performance benefits.
Procedure
1. Enable detailed logging for the client:
a. Specify the following value for the Backup command attribute on the Apps &
Modules tab of the Client Properties dialog box:
save -v -D7 (or D9 for more detailed logging)
b. Type the following command at the command prompt on the client computer:
touch /nsr/debug/mbsdfopen
3. Wait for the next backup to occur, or manually start a backup by using one of the
following methods:
l In the Protection window of the Administration interface, right-click the workflow
and select Start.
l Use the nsrpolicy command on NetWorker server:
nsrpolicy start -p "policy" -w "workflow"
where policy is the name of the policy and workflow is the name of the workflow to
start.
4. After the workflow finishes, collect the log files in the following table for EMC
Customer Support.
NetWorker l /nsr/logs/daemon.raw
server
l All log files in /nsr/logs/policy/policy_name/ workflow_name/
action_name_sequence#_logs/*
For example, /nsr/logs/policy/Silver/Filesystem/
Backup_032334_logs/*
l /nsr/tmp/savegrp.log
Open files
Open files are a problem that all data backup applications must solve. Open files that are
not backed up correctly represent a potential data loss. They might be skipped,
improperly backed up, or locked.
NetWorker can open files that are owned by the operating system and files that are
owned by a specific application.
When you use VSS technology with NetWorker to create snapshot backups of volumes
and exact copies of files, the backup includes all open files and files that change during
the backup process.
Files owned by the operating system
Most open files that are owned by the operating system can be backed up. However,
some applications can apply operating system locks to open files. These locks prevent
other applications, such as NetWorker software, from writing to or reading from the open
file.
The NetWorker software normally skips locked files and returns the following message:
save: filename cannot open
Also, the operating system might return a permission denied error.
To back up locked open files, close any open files if possible. To automate this process,
create a pre- and postprocessing backup command that shuts down specific
applications, backs up the open files, and then restarts any applications after the backup
finishes.
You can also use Open File Manager to back up open files.
Files owned by a specific application
The NetWorker software cannot normally back up an open file that belongs to a specific
application, like a database. To back up these open files, use a NetWorker Module. For
example, use the NetWorker Module for SAP to back up open files in an Oracle database.
Files that change during the backup
If a file changes during a backup, the NetWorker software displays the following message
in the Monitoring window:
warning: filename changed during save
To ensure that the changed file is backed up, either rerun the scheduled backup or
perform a manual backup of the file.
NetWorker Modules can back up these types of files correctly if they are files that are
related to the database that the module is backing up.
Data deduplication
Data deduplication is a type of data compression that removes duplicate information to
reduce the amount of backup data sent to storage devices and reduce the bandwidth that
is required for the data transport. You can implement data deduplication of NetWorker
backup data by storing backups on Data Domain Boost deduplication devices.
The EMC NetWorker Data Domain Boost Integration Guide provides details on system
requirements and configuration steps.
Directives
Directives are resources that contain special instructions that control how the NetWorker
server processes files and directories during backup and recovery. Directives enable you
to customize the NetWorker software, maximize the efficiency of backups, and apply
special handling to individual files or directories.
Types of directives
There are three types of directives.
l Global directives—Stored as resources on the NetWorker server and can be
selectively applied to individual clients by using the Directive attribute of the Client
resource.
l NetWorker User local directive—On Windows clients only, users with local Windows
Administrator or Backup Operator privileges can create a local directive in the
NetWorker User program. A file that is named networkr.cfg on the client file
system contains the directive configuration information. NetWorker uses the directive
that is specified in the networkr.cfg during a scheduled backup, a backup that is
started with the NetWorker User application, and save operations that do not
include the -i option.
l Local directive files—User-created files named nsr.dir (Windows) or .nsr (UNIX)
anywhere on a client file system where they have permission to create files. These
directives apply only to the immediate data within the path where the directive file is
located.
If there is a conflict between directives, global directives are enforced over local
directives. Also, NetWorker User program local directives are enforced over local directive
files (nsr.dir files) on Windows hosts.
NOTICE
If you use the Windows BMR feature, implement user-defined directives with caution.
Using such directives in directories with system state files can lead to an incomplete BMR
backup image and potentially render the BMR backup image unusable. If you create user-
defined directives, test the BMR backup image to ensure that you can recover the
Windows system state correctly.
Directives 323
Backup Options
<<"directory_specification">>
[+] ASM: pattern
save_environment_keyword
# comment
where:
l The directive statement does not include blank lines.
l directory_specification is the absolute path to the highest-level directory for which the
ASM in the directive applies. The directory_specification cannot include wildcards.
Consider the following:
n When you specify multiple directory specifications, directives that follow a
directory specification apply to that directory until the next directory specification.
n Mount points, including nested mount points, must have their own directory
specification.
n File and directory names are not case-sensitive for directives that are applied to
clients on Windows systems. If there is a colon (:) in the pathname, enclose the
entire path in quotation marks.
l [+] Optional. The presence of the plus (+) sign indicates that the directive applies to
the directory defined by the absolute path and all subdirectories.
l ASM is the ASM that specifies the action to take on one or more files in the current
directory.
l save_environment_keyword is NetWorker keyword that controls how the current ASM
and subsequent ASMs that apply to the current directory and subdirectories are
applied in the directive statement. NetWorker supports the following
save_environment_keyword values:
n forget—Instructs the NetWorker server to no longer apply inherited directives
(those directives that begin with a +). The forget keyword works only if the
corresponding directories are also explicitly specified in the NetWorker client
resource Save Set attribute.
n ignore—Instructs the NetWorker server to ignore all directives that are applied
to the subdirectories below the current directory.
n allow—Used in subdirectories that currently have the ignore keyword applied
to them, and overrides the ignore.
l pattern is a list of file or directory names, in the current directory on which to apply
the ASM. The pattern can include multiple names that are separated by spaces, and
wildcards. Wildcards can replace a single character or string of characters. Directive
statement support the use of standard shell command interpreter file matching
patterns. You cannot specify subdirectories in the pattern.
Note
File names are case-sensitive for directives that are applied to Windows clients.
l comment is a user-defined description of the directive statement. A hash (#) character
must precede the comment.
Note
If an ASM or pattern name includes a space, enclose the name or argument in double
quotation marks.
The UNIX man page and the EMC NetWorker Command Reference Guide provides detailed
information about directives in the nsr and nsr_directive commands.
<<"C:\Program Files">>
skip
<<./tmp>>
+skip: * .?*
Note
<<"G:\SRC">>
+skip: *.o
<<"G:\SRC\SYS">>
forget
This example uses the skip ASM to instruct the NetWorker server to skip all files that are
named *.o in the SRC directory and all subdirectories. It then uses the forget keyword
to instruct the server to not apply the skip ASM to the SYS subdirectory.
Both the G:\SRC and the G:\SRC\SYS directories must be explicitly specified on
separate lines in the client resource Save Set attribute.
Using the ignore save environment keyword
The following example allows directives in the HOMEDOC directory to be applied to the
preceding example for the ignore keyword:
<<HOME>>
ignore
<<HOMEDOC>>
allow
<<HOME>>
ignore
Global directives
Global directives are stored as resources on the NetWorker server and can be selectively
applied to individual clients by using the Directive attribute of the Client resource.
Global directives are listed when you select Directives in the expanded left pane of the
Server window in the Administration interface. You can add, edit, copy, and delete global
directives.
Directive Description
resource
AES Encrypts backup data with the aes ASM, which provides 256-bit data
encryption.
Mac OS with Contains the same set of directives as the Mac OS standard directive, along with
compression applying the compressasm ASM to specific directories.
Mac OS Contains a set of directives that are used to back up standard Mac OS clients.
standard Applies these ASMs:
l The skip ASM is applied to these files and directories:
/Desktop DB
/Desktop DF
/cores
/VM_Storage
/TheVolumeSettingsFolder
/private/var/db/netinfo
/private/var/db/openldap
/private/tmp
/.Spotlight-V100
/.hotfiles.btree
l The allow save environment keyword is applied to the /nsr directory to
ensure that local directives in /nsr and subsequent subdirectories are
applied.
l The logasm ASM is applied to the /nsr/logs and /var directories.
l The swapasm ASM is applied to the /private/var/vm
NT standard Is used to back up Windows clients. By default, this resource has no directives.
NT with Used to back up and compress Windows clients. It applies the compressasm
compression ASM to all files.
Directive Description
resource
UNIX standard Contains a set of directives that are used to back up standard UNIX clients.
Applies these ASMs:
l The skip ASM is applied to the tmp_mnt directory.
l The skip ASM is applied to core files on the file system.
l The allow save environment keyword is applied to the /nsr directory to
ensure that local directives in /nsr and subsequent subdirectories are
applied.
l The skip ASM is applied to the /tmp directory.
l The swapasm ASM is applied to the /export/swap directory. If swap files
are located in a different directory, modify this directive to use the
appropriate directory.
l The logasm ASM is applied to the /nsr/logs, /var, /usr/adm,
and /usr/spool directories. You can apply this ASM to other directories
as well.
l The mailasm ASM is applied to the /usr/spool/mail and /usr/mail
directories. If email files are located in different directories, modify these
directives to use the appropriate locations.
UNIX with Contains the same set of directives as the UNIX standard directive, along with
compression applying the compressasm ASM to all files.
VCB directives VCB directives are valid for backing up virtual machines using the VCB
methodology. This directive is supported in the following scenarios:
l When file level incremental backups are performed instead of FULL image
level backups.
l When FULL file level or incremental file level backups are performed when
the save set is ALLVMFS.
For example, the following directive statement skips the C:\TEMP folder on a
Windows system during a backup:
<<"C:\TEMP">>
skip
NOTICE
Format of directive statements on page 323 provides more infromation about how to
create a directive statement.
7. To specify a restricted datazone (RDZ) for the directive, click the Restricted Data Zones
tab and then select the RDZ from the list.
8. Click OK.
After you finish
Apply the global directive to a Client resource by selecting the directive from the Directive
list on the General tab of the Client Properties dialog box for the Client resource.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
4. Edit the settings for the global directive, then click OK.
Procedure
1. Log in to the client computer as a member of either the local Windows Administrators
or Backup Operators security group.
2. Start the NetWorker User Program.
3. From the Options menu, select Local Backup Directives.
4. Set the local directive for each data item. You can clear data items to exclude them
from scheduled backups, and select items for password protection, encryption, and
compression. This applies for both manual and scheduled saves.
Note
5. From the File menu, select Save Backup Directives to save changes.
Depending on user privileges and the operating system version, the networkr.cfg
file is created in one of the following locations:
l If you are logged in with local Windows Administrator or Backup Operator
privileges, networkr.cfg is created in the root of the system volume (usually C:
\).
l If you are not logged in with local Windows Administrator or Backup Operator
privileges, networkr.cfg is created in %SystemDrive%\Documents and
Settings\User_name\Application Data\EMC NetWorker.
Note
For example, the following directive statement skips the C:\TEMP folder on a
Windows system during a backup:
<<"C:\TEMP">>
skip
NOTICE
Format of directive statements on page 323 provides more infromation about how to
create a directive statement.
3. Save the local directive file.
l On Windows, the file must be named nsr.dir. The user account that creates the
file must have the permissions to create files either within the root of the volume
or in a folder within the volume.
l On UNIX, the file must be named .nsr.
Enable NetWorker logging for Backup Operators by modifying the security settings on the
<NetWorker_install_path>\logs directory. For example:
Procedure
1. In Windows Explorer, navigate to the <NetWorker_install_path>\logs directory.
2. Right-click the <NetWorker_install_path>\logs directory icon and select
Properties.
3. On the Security tab of the Properties dialog box, add the Backup Operators group to
the list of groups and users.
4. Select the Backup Operators group and click Allow Write.
5. Click OK.
Encrypted File System NetWorker software will not encrypt or compress a file already
(EFS)—Allows NTFS files encrypted by Windows. Do not use AES encryption when you backup
to be stored in encrypted EFS encrypted files.
format. A user without the
Files can become unusable if the encryption keys
private key to the file
change on the domain controller. For example, when you move
cannot access the file.
the domain controller from one computer to another or the
domain controller failures.
l If you recover the encrypted files and the encrypted folder, the
recovered folder and files are all encrypted.
l If you recover only individual encrypted files (but do not recover
the encrypted folder that contains them) the individual recovered
files are encrypted but the re-created folder is not encrypted.
Windows documentation provides instructions on encrypting the
re-created folder.
l Windows EFS encrypted data is backed up and recovered in its
encrypted state.
Internet Information The NetWorker software uses the active metabase to back up IIS and
Server (IIS)— A web server can restore the backup versions to the metabase location. NetWorker
that enables the supports the recover of the metabase to the default location
publication of information %SystemRoot%\system32\inetsrv\MetaBase.bin or in a
on the Internet or a location that you specify in the registry. The Microsoft documentation
corporate intranet by provides information about how to create a registry key that specifies
using HTTP. an alternate metabase location.
Sparse files— Enables a The NetWorker software provides complete backup and recovery
program to create huge support for sparse files.
files without actually
committing disk space for
every byte.
Windows Print Queues NetWorker backs up and recovers print queues as a part of the file
system backup. During a recover operation, you may have to restart
the host depending on the status of the print queue at the time of the
backup.
Disk quota database The WINDOWS ROLES AND FEATURES save set contains the disk quota
database. During a backup operation, the NetWorker software creates
temporary files to store the disk quota database settings in the root
directory of each drive on the client.
Note
To backup the disk quota database, the local system account must
have full control permissions on the local drive, otherwise a backup
fails with an error message similar to the following: Failed to
write to quota file, 0x80070005
Windows Dynamic Host The WINDOWS ROLES AND FEATURES component of the
Configuration Protocol DISASTER_RECOVERY:\ save set contains the DHCP and WINS
(DHCP) and Windows databases. Use Windows BMR recovery to perform an offline restore
Internet Naming Service of these databases.
(WINS) databases
Native Virtual Hard Disk The ALL save set does not include native VHD volumes. Configure a
(VHD) volumes—Used as separate client resource to backup native VHD volumes. Do not use
a mounted volume on VHD volumes as critical volumes if the volume that contains the
designated hardware native VHD is also a critical volume. This situation creates a conflict
without any other parent during a Windows BMR backup.
operating system, virtual
machine, or hypervisor.
You can use a VHD
volume as a boot volume
or as a data volume.
Windows Content Index The WINDOWS ROLES AND FEATURES component of the
Server (CIS) or Windows DISASTER_RECOVERY:\ save set contains the CIS or Windows Search
Search Index— Index the Index. The CIS or Windows Search is automatically regenerated on
full textual contents and system restart.
property values of files
NetWorker performs the following actions when
and documents that are
performing a CIS or Windows Search backup:
stored on the local
computer. The l Pauses any CIS or Windows Search catalogs. You can still query a
information in the index paused catalog, so the indexing functionality is no lost during the
can be queried from the CIS or Windows Search backup.
Windows search function,
l Backs up all catalog files.
the Indexing Server query
form, or a web browser. l Turns on the catalogs when the backup completes.
l CIS or Windows Search deletes the catalog folder during a
backup and restores it as part of a recovery operation.
Hard links
You can back up and recover files with hard links on a Windows client. However, the hard
links of files that are created by using a Portable Operating System Interface (POSIX)
application are not preserved during recovery.
Support for hard links is disabled by default to improve performance.
Backup and recovery of hard links is disabled by default to improve performance. To
enable backup and recovery of hard links on a client, select the Hard links checkbox on
the Globals (2 of 2) tab of the Client Properties dialog box for the Client resource.
Enable diagnostic mode view by selecting View > Diagnostic Mode in the Administration
window to access the Hard links checkbox.
Microsoft DFS
You can back up and restore Microsoft Distributed File System (DFS) data.
Microsoft DFS is a Windows file system feature that enables you to create a namespace of
shared directories that are physically distributed across a network. With DFS, you can
organize a set of distributed directories logically, according to any scheme you choose, to
provide centralized access to files that reside in a variety of locations.
DFS junctions
A DFS junction is a DFS root or link:
l A DFS root is a namespace for files and DFS links.
l A DFS link is a connection to a shared file or folder.
DFS junctions are file system objects, not files or directories. Therefore, the NetWorker
software does not treat DFS junctions the same as files or directories for backup and
recovery. However, DFS junctions appear as files and directories in the NetWorker User
program.
DFS backups with the ALL-DFSR save set
The All-DFSR save set includes all DFS related save sets for a backup. Unlike other all-
inclusive save set types, ALL-DFSR is not related to any particular file system. ALL-
DFSR backs up all components that are defined by DFS\FRS writers. Backups fail if you
specify ALL-DFSR for a system where DFS or FRS is not installed.
The syntax for this save set is ALL-DFSR. It is not case sensitive.
The ALL-DFSR save set does not support BBB. BBB only creates backups at the volume
level, and DFSR replication folders can be a subfolder, which creates a conflict.
Synthetic full backup is not supported with ALL-DFSR.
The ALL-DFSR save set registers the corresponding writer and writer component nodes
under WINDOWS ROLES AND FEATURES. All Replication folders are restored through
these nodes.
Configuring a scheduled DFS backup
To avoid inconsistencies among the various save sets, configure a scheduled backup that
includes the DFS topology information, junctions, and destination directories.
Alternatively, you can use the ALL-DFSR save set.
NOTICE
When a DFS client resource is run for the first time, the save set sizes should be verified
to ensure that they are correct.
Note
DFS destination directories are also be backed up if you enter the entire volume
(for example, D:\) in the Save Set attribute.
3. For clients where remote DFS destination directories reside, enter the destination
directory paths in the Save Set attribute. For example:
E:\MyRemoteDir
E:\MyOtherRemoteDir
E:\
Note
Due to recovery performance issues observed with optimized backup for Windows
deduplication volumes, EMC recommends non-optimized backup. When you set the
backup to non-optimized, the deduplicated files get rehydrated in memory before they
are backed up. This type of backup requires you to enable VSS. If you disabled VSS (for
example, by specifying VSS:*=off in the Save Operations attribute), the backup will
potentially back up the chunk stores unnecessarily. To back up the deduplicated volume,
EMC recommends using block based backup (BBB) instead. If you still require optimized
backup, you can add VSS:NSR_DEDUP_NON_OPTIMIZED=no to the Save Operations
attribute to restore settings to the traditional (non-BBB) optimized backup. However, EMC
does not recommend using this setting as the recovery performance issues may result in
an unusable backup.
NetWorker supports the data deduplication feature on Windows Server 2012, Windows
Server 2012 R2, Windows Storage Server 2012, and Windows Storage Server 2012 R2.
NetWorker does not support the feature on Windows 8 client computers or computers
that run the older versions of the Windows operating system. On computers that run the
Windows Server operating system, NetWorker supports the feature on volumes that use
the NTFS file system, which can be part of a fail over cluster, including CSV volumes.
By default NetWorker performs an optimized deduplication backup on an optimized
deduplication volume, unless the backup path is a subdirectory of the volume or when
you specify the non-optimized deduplication save option in the Save operations field of
the Client resource. When you define the non-optimized deduplication save option,
NetWorker will not deduplicate the backup. When the path is a subdirectory of a volume,
NetWorker does not create an optimized backup.
To back up and restore Windows Server deduplication volumes or files, you must use a
NetWorker 8.1 or later client. You can only restore deduplicated backups to computers
that run on supported versions of Windows Server that have the data deduplication role
enabled. The data deduplication role is a child role of File Services, which is a File and
Storage Services role.
Detecting Deduplication in a Backup
When a deduplication volume is backed up, you can verify the form of the data that was
backed up. This information is identified in the mminfo extended save set attributes
output. To show all extended save set attributes, use the mminfo output flag -r attrs.
Deduplication backups are indicated with *MSFT_OPTIMIZED_DEDUP_ENABLED:yes.
For more information on mminfo, refer to the EMC NetWorker Command Reference Guide or
the mminfo man pages.
Data Deduplication Backup and Restore
NetWorker supports two types of backup and four types of restores for data stored on a
deduplication volume.
Optimized full-volume backup
Optimized full-volume backups are the default backup type for Windows data
deduplication volumes. The backup type occurs when the non-optimized data
deduplication save option is not specified and the backup path is a mount point, drive
letter or full volume backup. NetWorker full, incremental, and synthetic full backups are
supported with Windows data deduplicated volumes.
The optimized data deduplication files that are part of the backup include:
l Windows data deduplication reparse points
l Chunk store containers and data deduplication meta data files
NetWorker backup does not differentiate whether a volume is configured for data
deduplication, except to add the media database attribute if the volume is deduplicated.
The media database attribute, *MSFT_OPTIMIZED_DEDUP_ENABLED, is set to true and is
saved as part of an optimized data deduplication volume save set.
For Windows BMR, the Windows Server 2012 and Windows Server 2012 R2 data
deduplication writer is not part of the system state. Additionally, data deduplication
volumes can be critical volumes and are supported with Windows BMR.
Unoptimized full and incremental backup
NetWorker creates an unoptimized data deduplication backup under the following
conditions:
l When you specify in the save set attribute of the client resource, a backup path that is
a subdirectory of the volume, except in the case where the subdirectory is the root of
a mount point.
l When you perform a manual backup of the client that does not make up the entire
volume.
member of the NetWorker server's NetWorker Operators User Group. For example, if you
are performing a dedup file level restore on host1, add system@host1 to the group.
NOTICE
Short filenames
You can back up and recover the short filenames that are automatically assigned by the
Windows filename mapping feature.
Windows filename mapping is an operating system feature in which each file or folder
with a name that does not conform to the MS-DOS 8.3 naming standard is automatically
assigned a second name that does. For example, a directory named Microsoft
Office might be assigned a second name of MICROS~2.
D:\mount_point_name1
D:\mount_point_name1\mount_point_name2
D:\mount_point_name1\mount_point_name2\ mount_point_name3
To include mount points in a manual backup with the NetWorker User program, select the
checkbox next to the mount point name within the host volume entry in the Backup
window.
To perform a manual backup of nested mount points and their data, perform a separate
backup for each mount point. When you select a mount point in the Backup window, all
files, directories, and nested mount points beneath the mount point are selected by
default. Before you start the backup, clear the checkboxes next to any nested mount
points. Then perform separate backups for the nested mount points.
Overview of VSS
If the NetWorker Module for Microsoft is installed on the client computer, information in
this chapter may be superseded by information in the NetWorker Module for Microsoft
documentation. The EMC NetWorker Module for Microsoft Administration Guide provides
more information about the NetWorker Module for Microsoft.
Volume Shadow Copy Service (VSS) is a Microsoft technology that acts as a coordinator
among all the components that create, archive, modify, back up, and restore data,
including:
l The operating system
l Storage hardware
l Applications
Note
VSS backups do not use snapshot policies, which are required to perform snapshot
backups. The Snapshot Integration Guide documentation provides more information.
1. NetWorker software (the requestor) asks VSS to enumerate writers and gather their
metadata.
2. Writers provide an XML description of backup components and define the recover
method.
3. VSS asks which providers can support a snapshot for each of the required volumes.
4. Requestor asks VSS to createsnapshot.
5. VSS tells the writers to freeze activity.
6. VSS tells the providers to create the snapshot of the current state on disk.
VSS tells the writers to resume activity.
NetWorker software backs up data from the point-in-time snapshot that is created during
this process. Any subsequent data access is performed on the snapshot, not the live (in-
use) file system. The requestor has no direct contact with the provider; the process of
taking a snapshot is seamlessly handled by VSS. Once the backup is complete, VSS
deletes the snapshot.
Provider support
By default, the NetWorker client always chooses the Windows VSS system provider for
backups. If you want to use a hardware provider or a specific software provider for a
particular NetWorker client, enter the following command in the NetWorker client
resource Save Operations attribute:
VSS:VSS_ALLOW_DEFAULT_PROVIDER=yes
When the previous command is specified for a NetWorker client, a backup provider is
selected based on the following default criteria as specified by Microsoft:
1. If a hardware provider that supports the given volume on the NetWorker client is
available, it is selected.
2. If no hardware provider is available, then if any software provider specific to the given
NetWorker client volume is available, it is selected.
3. If no hardware provider and no software provider specific to the volumes is available,
the Microsoft VSS system provider is selected.
Controlling VSS from NetWorker software on page 347 provides more information
about specifying VSS commands for a NetWorker client. VSS commands on page 348
provides information about other VSS commands.
NOTICE
Windows Bare Metal Recovery backups always use the Windows VSS system provider
even if the VSS:VSS_ALLOW_DEFAULT_PROVIDER=yes command is specified for the
NetWorker client resource.
particular writer, the data that is served by that writer is excluded from the backup
operation.
List of supported writers
During a VSS backup operation, NetWorker software validates each writer against a list of
supported writers. As part of a software release, or between releases, there may be
updates to the list of supported writers. The EMC NetWorker Software Compatibility Guide
provides a list of the currently supported writers.
The EMC NetWorker Command Reference Guide provides more information about the save,
savefs, and nsrarchive commands.
Note
If you change the VSS setting on a client by using the Local Save Operations dialog box or
the command prompt, it does not affect that client’s VSS setting on the server. Likewise,
if you change a client’s VSS setting on the server, it does not affect the Local Save
Operations setting or the command-prompt VSS setting on the client.
a. Create an input file for the nsradmin command. The input file eliminates
interactive prompting as each client gets updated. For example, create a text file
that is named disable-vss.txt and type the following into the file:
To disable VSS only for clients on a particular Windows operating system such as
Windows NT:
b. Create an input text file. For example, create a file that is named disable-vss-nt.txt
and type the following into the file:
VSS commands
This section lists the commands and syntax that are used to control VSS.
Backups fail.
Terminology
The following list provides a description of typical Windows BMR backup and recovery
terminology. The road map indicates which steps you must perform before you try a
Windows BMR. recovery
This chapter uses the following terms to describe NetWorker support for Windows BMR
technology:
Bare Metal Recovery (BMR)
The operation that restores the operating system and data on a host after a
catastrophic failure, such as a hard disk failure or the corruption of critical operating
system components. A BMR is an automated process that does not require the
manual installation of an operating system. NetWorker provides an automated BMR
solution for Windows that uses the Windows ASR writer and other Microsoft VSS
writers to identify critical volumes and perform a full recovery on a disabled
computer.
Offline recovery
A restore operation that is performed from the NetWorker Windows BMR boot image.
A BMR recovery is an offline recovery. You cannot select specific files or save sets to
recover during an offline recovery. You must perform an offline recover to the same
or similar hardware.
Online recovery
A restore operation that is performed from the NetWorker User interface or recover
command. An online recovery requires you to start the computer from an installed
operating system and enables you to recover only specific files or save sets. The
topic Recovering file system data provides more information about online recoveries.
Application data
User data that an application creates, such as log files or a database. For example,
the application data of a SQL server includes databases and log files. You cannot
use Windows BMR to recover the application data. You must back up and recover
application data with NetWorker Module for Microsoft (NMM).
ASR writer
The Volume Shadow Copy Service (VSS) writer that identifies the critical data that
NetWorker must back up to perform an offline recovery.
Critical volume
One of the following:
l Any volume that contains files for an installed service. The volume can be
mounted as an NTFS directory. Exchange 2010 is an example of an installed
service, but the Exchange database and log files are not considered critical.
l Any parent volume with a mounted critical volume.
NOTICE
NetWorker considers all volumes on all dynamic disks critical if at least one of
the volumes is critical.
Recovery
The restoration of the operating system and data for a host after a catastrophic
failure, such as a hard disk failure or the corruption of critical operating system
components. The recovery operation might be an offline recovery (Windows BMR) or
an online recovery.
Non-critical volume
A volume that contains user data and does not contain installed applications that
run as a service.
User data
Data that users generate, typically for the purposes of a business function. For
example, a Microsoft Word document or an Excel spreadsheet. Windows BMR does
not back up or recover user data unless the data resides on a critical volume. The
simplest way to back up all user data is to specify the keyword All in the backup save
set of the client resource. You can recover user data online at any time (on demand)
or after a Windows BMR recovery operation.
WinPE
A bootable stripped-down version of the Windows operating system. The NetWorker
Windows BMR image contains a customized WinPE with NetWorker binaries and a
wizard to control the offline recovery process. WinPE does not support writers,
except for the ASR writer. Therefore, VSS writers are not available with a NetWorker
Windows BMR.
You can use Windows BMR to recover a backup from a physical host. You can also use
Windows BMR to recover a VMware virtual machine or VMware CD to a physical host,
VMware virtual machine, or a VMware CD.
NetWorker uses a special save set called DISASTER_RECOVERY:\, a subset of the ALL
save set, to backup all the data that is required to perform a Windows BMR. NetWorker
performs the BMR backup while the Windows operating system is active. You can recover
an offline BMR backup without first reinstalling the Windows operating system. This
action prevents problems that can occur when you restore operating system files to a
running version of Windows.
To support a NetWorker Windows BMR recovery, download the Windows BMR image from
http://support.emc.com. This image enables you to create a bootable Windows BMR ISO
that contains NetWorker binaries and a wizard, which controls the recovery process.
Note
The EMC NetWorker Online Software Compatibility Guide provides more information about
operating systems support for Windows BMR.
During an incremental backup, the backup operation checks both the modification time
and the archive bit to determine if a file must be backed up. The backup operation
ignores the archive bit when you assign the nsr_avoid_archive variable a value of Yes on
the client host. As a result, NetWorker only uses the modification time to determine which
files to back up.
Use the environment variable nsr_avoid_archive with caution. If you use the environment
variable nsr_avoid_archive, test the BMR backup image to ensure that you can recover the
Windows system state correctly. Performing a BMR recovery to a physical computer on
page 507 provides more information on validating the BMR backup image.
A Windows BMR recovery requires a successful backup of each component save set in
the DISASTER_RECOVERY:\ save set. If one component of the save set fails, then the
backup operation fails. For a scheduled backup, NetWorker retries the
DISASTER_RECOVERY:\ backup. The number of retries that NetWorker performs is
based on the value that is defined in the client retries attribute of the protection group
that the Client resource is assigned to.
Note
In NMC Administration GUI, the Log tab of the Monitoring window, or the Save Set tab of
the Media window displays each component save set of a DISASTER_RECOVERY:\
backup.
Critical volumes
This topic describes critical volumes and the associated management tools.
NetWorker considers a volume as critical when it contains files for an installed Windows
service. NetWorker also considers the following volumes as critical and will include the
volumes in a DISASTER_RECOVERY:\ backup:
l A non-critical volume that has a critical volume mounted on it, or a non-critical
volume that serves as a parent to a critical volume.
l All volumes on a dynamic disk when one of the volumes critical. If one disk in a
dynamic disk pack is critical, then NetWorker must treat all disks in that pack as
critical. This can substantially increase the number of disks that NetWorker includes
in the BMR backup. EMC recommends that you do not install services on a dynamic
disk.
Note
By default, the Windows 2012 System Writer does not report Win32 Service Files as a part
of systems components. As a result, the volumes that contain Win32 Service Files are not
considered critical and the DISASTER_RECOVERY:\ save set will not include a volume that
contains files for an installed service. To configure the Windows 2012 server to report
Win32 Service Files as a part of system components, set the
ReportWin32ServicesNonSystemState registry sub key to 0. Microsoft KB article 2792088
provides more information.
A Windows BMR backup does not back up the following files on a critical volume:
l Files listed in the FilesNotToBackup registry key
l Files excluded by system writers
l Files that an application VSS writer backs up. For example, Exchange databases. Use
NetWorker Module for Microsoft Applications (NMM) to backup these files.
Excluded critical volumes during a Windows BMR backup
A NetWorker Windows BMR backup excludes critical volumes based on the operating
system, disk types, configuration and installation of your computer.
Install applications with third-party services on the system disk, or a disk that already has
other services installed. To identify the disks that contain third-party services, use the
utility, list writers detailed command.
For Windows Server 2008 and 2008 R2, set the ExcludedBinaryPaths registry key to
exclude third-party services from the System Writer. This prevents the disk where the
service is installed from being classified as critical. The Microsoft support document,
System state backup error in Windows Server 2008, in Windows Vista, in Windows 7 and
in Windows Server 2008 R2: “Enumeration of the files failed”, available at http://
support.microsoft.com/kb/980794, describes the use of this registry key.
NetWorker excludes a volume from a backup when one of the following Windows
application service is installed on the host:
l Storage Spaces volume
l Cluster volume
l Cluster Shared Volume
NOTICE
To ensure that you can recover all required files, perform a file system backup of any
excluded disk.
For example:
NetWorker_install_path\bin>save -o VSS:LCV=yes
l Block Based Backups (BBB) do not support the WINDOWS ROLES AND FEATURES
save set.
l You cannot restore the WINDOWS ROLES AND FEATURES save set simultaneously
with data from a file system backup. If you must recover data from both the WINDOWS
ROLES AND FEATURES backup and a file system backup, restore the file system
data first, and then restore the WINDOWS ROLES AND FEATURES data.
l The NetWorker software automatically backs up AD as a component of the WINDOWS
ROLES AND FEATURES save sets. An AD backup or restore includes the AD log
files, database, patch files, and expiry token.
l You can perform an online recovery of the WINDOWS ROLES AND FEATURES save
set to recover the Active Directory, DFSR, or Windows Server Failover Cluster services.
The topicOnline recovery of Active Directory, DFSR, or Cluster services on page 358
provides more information.
l If you cancel a deduplication recovery, the state of the recovered data is not reliable
and may contain corrupted data. To ensure that the recovery is correct, restart the
deduplication recovery process.
l The backup operation will only confirm that the VSS System Writer exists on the
target host. If the backup operation does not detect the writer, the backup of the
DISASTER_RECOVERY:\ or ALL save set fails. The backup operation does not track
and report any other missing VSS writers.
l You can perform a component level granular restore of the WINDOWS ROLES AND
FEATURES save set with a command line recover or the NetWorker User application.
For example, you can recover the system state and replication folders separately. You
cannot use the NMC Recovery UI to perform a component level restore.
l Do not restore the WINDOWS ROLES AND FEATURES system state multiple times
in succession without restarting the computer as required. If you do not restart the
computer, you can put the system in an unreliable operational state.
Note
The NetWorker 8.2 and later clients can only recover WINDOWS ROLES AND FEATURES
save sets. If you try to recover a VSS System State save set that was created with a
NetWorker 8.0 SP1 client or earlier, then the Windows host will not function correctly. To
recover VSS system state save sets that are created with a NetWorker 8.0 SP1 or earlier
backup, use the NetWorker 8.0 SP1 or earlier client to create a backup. EMC recommends
that you restore the WINDOWS ROLES AND FEATURES save set from a NetWorker 8.1
or later backup.
NOTICE
EMC recommends that you detach the physical disks that Storage Spaces use when you
recover critical volumes, and then reattach the physical disks after recovery. A Window
BMR recovery operation can overwrite data on attached Storage Spaces disks.
The topic Windows Storage Pools considerations on page 366 describes how to perform
a Windows BMR recovery of Storage Spaces to a new computer.
NOTICE
To backup and recover data on virtual hard disks and volumes created by Storage
Spaces, use NetWorker file system backup and recovery operations.
A Windows BMR backup of a Windows 2012 host creates a file that is named
OSSR_sysinfo.xml. The file is located at [root]\EMC NetWorker\nsr\tmp. This
file captures pertinent information about the configuration of the backed up host. For
example:
l Host information (name, boot drive, BIOS or EFI).
l NIC cards and their parameters.
l Disk information.
l Storage Spaces information.
The purpose of this file is to support the manual recreation of the Storage Spaces
configuration following a BMR recovery.
Synthetic full backups
A synthetic full backup uses the most recent full and incremental backups to create a full
backup without transferring any data from the client. NetWorker performs all the work to
synthesize a full backup on the NetWorker server. A synthetic full backup gives you the
benefits of a full backup, such as a faster restore, without having to perform a full
backup.
The topic Synthetic full backups on page 298 describes the synthetic full backup feature.
When a client backup includes the DISASTER_RECOVERY:\ save set, NetWorker will
always backup volumes that are identified as critical, at a level full. NetWorker will not
create a synthetic full backup for critical volumes. The DISASTER_RECOVERY:\ save
set is included during full backups when either the ALL or DISASTER_RECOVERY:\
save set is specified in the NetWorker Client resource.
The save set attribute of the Client resource contains the ALL save set and the backup
schedule includes a synthetic full backup on Sundays. The NetWorker client host has four
volumes: two are critical, and two are non-critical.
The save set attribute of the Client resource contains a list of all volumes and the backup
schedule includes a synthetic full backup on Sundays. The save set attribute does not
contain the DISASTER_RECOVERY:\ save set. The NetWorker client host has four
volumes: two are critical, and two are non-critical.
Cluster
SolVe Desktop provides procedures that describe how to recover this service.
NetWorker does not support the online recovery of any other Windows service that the
WINDOWS ROLES AND FEATURES save set contains. Unsupported online recovery of
WINDOWS ROLES AND FEATURES components results in an inconsistent state of the
Windows server.
NOTICE
When you perform an online recovery, you cannot mark the WINDOWS ROLES AND
FEATURES save set and use the Required Volumes option. To determine the volume that
contains the WINDOWS ROLES AND FEATURES save set that you want to restore, mark
the DISASTER RECOVERY:\ save set, then use the Required Volumes option. After you
determine the required volumes, unmark the DISASTER RECOVERY:\ save set and
mark the WINDOWS ROLES AND FEATURES save set.
Note
Verify whether the source critical volumes are part of a larger physical disk. If critical
volumes are on a larger physical disk, all target critical volumes must be large enough
to accommodate the entire underlying physical disk. Use the Windows Disk
Management utility to verify disk configuration and size.
l The number of disks on the target host is greater than or equal to the number of disks
there were on the source host. The disk LUN numbering on the target host must
match the disk LUN numbering on the source host.
l The RAID configuration on the target host should match the disk order of the hard
disks.
l The disk or RAID drivers that are used on the source system are compatible with the
disk or RAID controllers in the target system. The recovery process restores the
backup to the same logical disk number that was used by the source host. You
cannot restore the operating system to another hard disk.
l Windows BMR supports IDE, SATA, or SCSI hard disks. You can make the backup on
one type of hard disk and recover on another type of hard disk. For example, SAS to
SATA is supported.
l The target system can access the Windows BMR image as a bootable CD/DVD volume
or from a network start location.
l The target system has the NIC or storage device drivers installed that match the NIC.
Note
All NIC or storage device drivers must not require a restart to complete the driver
installation process. If the drivers require a restart, then the BMR recovery process
fails and prompts you to install the drivers again.
A host that is a l Specify the ALL save set in l Use the Windows BMR Wizard to
Microsoft Application the Save set attribute in the recover the data contained in the
server. For example, NetWorker Client resource. DISASTER RECOVERY:\ save
a Microsoft Exchange set.
Server, Microsoft SQL l Use NMM to back up the
Server, Hyper-V, or application databases. The l Use NMM to recover the
Microsoft SharePoint NMM provides details. application databases.
Server
NOTICE
Do not mix critical and non-critical volumes on the same physical disk.
Note
Windows BMR does not support FAT and FAT32 file systems as critical volumes.
Note
EMC recommends that you test your BMR solution before a disaster recovery is required.
backup. This restores the directories' files to a rehydrated state, but will take
significantly more time.
Save set considerations
This topic describes limitations and considerations that relate to save sets.
Checkpoint restart backup for Windows DISASTER_RECOVERY:\ save set is not supported
The NetWorker software does not support a checkpoint restart backup for the Windows
DISASTER_RECOVERY:\ save set. When you enable the Checkpoint restart option for a
Client resource that you configure to back up the DISASTER_RECOVERY:\ save set, the
backup fails.
Including DISASTER_RECOVERY:\ in multiple save sets
When you use specify multiple save sets with the save command, you must use the -N
option to specify the symbolic name of DISASTER_RECOVERY:\ save set, and specify
the DISASTER_RECOVERY:\ as the last save set in the save set list.
For example:
where:
save_set1 or save_set2 are unique save set names, such as a drive letter (f:\) or mount
point (n:\mountpoint).
Monitoring save operations
When you monitor Windows BMR save operations, for example, by using the NetWorker
Administration > Monitoring > Sessions window, you might notice that the number of
save sessions differ from the number of save sets that appear in the Save set attribute of
the Client resource. This is because NetWorker optimizes Windows BMR backups to
generate the correct number of Windows BMR backup sessions and save sets.
Cloning considerations
To clone a Windows BMR backup, ensure that you clone all of the critical volumes,
DISASTER_RECOVERY:\, and WINDOWS ROLES AND FEATURES save sets that were
created during the backup operation. While you can clone individual save sets, you
cannot perform a successful BMR recovery unless you recover each save set that the
backup operation created.
To ensure that you clone all of the BMR save sets, review the following information before
you start a clone operation:
l When you use the automatic clone, you enable the Clone attribute on the group
resource that contains the BMR client. The automatic clone operation will clone all of
the required save sets after the scheduled backup operation completes.
Note
Synchronize the NetWorker server and client host clocks before the backup operation
to ensure that all of the save sets are cloned.
l When you use the nsrclone command to perform a manual clone, ensure that you
include the ssid/cloneid for each save set. Use the mminfo or nsrinfo -v
command to report all save set back ups that occurred for the Windows client during
the save session. The Command Reference Guide provides detailed information about
using the mminfo and nsrinfo commands.
l When you use the schedule clone function, do not filter on other attributes such as
save set name. Filter only by client name. When you enable automatic cloning for a
backup group that contains the DISASTER_RECOVERY:\ save set, synchronize the
clocks on the NetWorker server and client host clocks across the network to ensure
that NetWorker clones all save sets.
Security considerations
This section describes security issues related to planning Windows BMR backup and
recovery .
Server role considerations
This section describes considerations for Windows Server Roles in Windows BMR.
Protecting Windows server roles
Several server role components of Windows host store the data in a database. Examples
of Windows server roles with databases include:
l Active Directory Rights Management Services (ADRMS).
l Windows System Resource Manager (WSRM).
l Universal Description, Discovery, and Integrations (UDDI) Services.
l Windows Server Update Services (WSUS).
When you install the Windows server role on a host, the installation process prompts you
to store data on either an existing SQL Server installation or in a Windows Internal
Database (WID).
NetWorker uses the VSS SQL Server writer to back up the role databases that are stored
in WID but does not protect role databases, which the server role component stores in a
SQL Server. Use NMM or a third-party SQL backup product to backup and recovery the
roles databases.
Backup and recovery workflows for server roles that use WID
These are the backup and recovery workflows are as follows:
l Perform a NetWorker Windows BMR backup, which includes all the SQL writer
components for WID. If required, backup user data on the client.
l Perform a NetWorker Windows BMR recovery operation, which recovers all the WID
components.
After the NetWorker Windows BMR system restart, the WID service is available and
Windows server roles have access to their databases.
Saving and recovering SQL Server components with Windows BMR and NMM:
1. Perform a NetWorker Windows BMR backup. If required, backup user data on the SQL
client.
2. Use NMM or a third-party backup application to back up the SQL Server application.
3. Perform a NetWorker Windows BMR recovery operation.
After the recovery and restart operations complete, you cannot start the SQL Server
service. Also, any server roles that store data in SQL databases outside WID will not
work.
4. For non-clustered SQL servers only, ensure that the SQL group is offline.
5. Run the following setup.exe command from a command prompt with elevated
privileges, to rebuild the SQL Server:
Note
The EMC NetWorkerModule for Microsoft Applications Application Guide provides more
information about using NMM to recover SQL databases.
MSCS considerations
Review these considerations before you perform a Windows BMR recovery on a clustered
host.
l Before you start the Windows BMR recovery operation, ensure that you detach the
shared disks. After the Windows BMR recovery operation and the restart completes,
attach the shared disks before you perform the online recovery.
l After an authoritative restore completes, the recovery operation does not bring the
cluster services online on the remote nodes. You must bring the services online
manually.
Windows Storage Pools considerations
When a system failure occurs which damages Storage Pools, perform the following steps
as recommended by Microsoft to perform a BMR recovery to a new host. In the case of a
complete system failure, a Storage Pool may not exist on the target host. There can only
be physical disks. Some of these disks are required to create Storage Pools.
Before beginning Windows BMR wizard, physically remove from the target recovery
computer any physical disks reserved for storage pools. This manual step is required
because the Windows BMR wizard does not have any option to exclude the disks.
To recover Storage Spaces to a new host, perform the following steps:
1. Boot the host with the Windows BMR image.
2. Recover only the critical volumes.
3. Reboot the host.
4. Attach physical disks that are reserved for Storage Pools.
5. Use Windows Server Manager or Powershell Cmdlets to configure the Storage Pools.
6. Perform a volume or file recovery of the Storage Spaces volumes.
7. Perform a volume or file recovery of other volumes on physical disks.
WinPE considerations for SAN boot devices
When you recover to a host that uses a SAN boot device, the WinPE environment requires
that you temporarily diable all but one path to the boot device. After the BMR recovery
and reboot completes you can re-enable the remaining paths.
VMware network interface card driver limitations
The Windows BMR image does not contain a driver for any of the VMware VMXNET,
VMXNET3, or the VMware Paravirtual SCSI NIC models. The Windows BMR image does
contain a driver for the e1000 NIC. When you perform a Windows BMR recovery, ensure
that the VM has at least one configured e1000 NIC, or add custom NIC drivers when you
run the NetWorker BMR wizard.
Tthe VMware Tools installation media in the \Program Files\VMware\VMware
Tools\Drivers folder on the system drive of the VM contains the VMware NIC drivers.
BCD partition limitations
NetWorker requires that the BCD partitions are online during a Windows BMR backup. If a
BCD partition is offline during a Windows BMR backup, the backup fails with an
messages similar to the following:
For application cluster hosts, type the FQDN of the application cluster host. For
example:
l For an Oracle cluster, type the RAC hostname.
l For an Exchange IP DAG, type the DAG name.
Note
If the Client Configuration wizard cannot resolve the specified hostname, an error
message appears after you click Next.
Creating a Client resource with the Client Backup Configuration wizard 367
Backing Up Data
7. Optionally, from the Group list, select a group for the Client resource.
The group to which the client belongs determines the workflow that is used to back up
the client.
Note
You can also assign the client to one or more groups after you create the Client
resource.
8. Click Next.
9. On the Specify the Backup Configuration Type window, select Filesystem, and then
click Next.
10. On the Select the NetWorker Client Properties window, configure the following
options:
Option Description
Priority Enables you to control the order in which the NetWorker server
contacts clients for backup. During a backup operation, the
NetWorker server contacts the client with the lowest priority value
first. If you do not specify a priority for the client resources, then the
backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many
variables affect the order in which clients complete their backups.
For example:
l The backup operation on a client does not begin until the
worklists for each of the save sets on the client are complete.
l The amount of work can vary greatly from one client to the next.
l If a client stops responding and times out, then the backup
operation puts the client backup at the end of the backup order
list.
The only way to guarantee that the backup of one client occurs
before the backup of another client is to configure the workflows for
the clients to start at different times.
Parallelism Specifies the maximum number of data streams that a client can
send simultaneously during a backup action.
Data streams include back data streams, savefs processes, and
probe jobs.
The default value is different for the NetWorker server than it is for all
other client resources:
l For the NetWorker server client resource, the default value is 12.
This higher default value enables the server to complete a larger
number of index backups during a Server backup action.
l For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server,
specify a value that is the same as or fewer than the number of
physical disks on the client that are included in the backup.
Option Description
The EMC NetWorker Performance Optimization Planning Guide provides
more information about recommended client parallelism values and
performance benefits.
Remote Specifies a list of the users that have access to perform remote
Access access operations. For example, users that can perform a directed
recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data
Interface Domain Device. Available selections are IP, Fibre Channel, or Both.
Note
Block Based Enables Block Based Backups for the host. When you select this
Backup (BBB) option, you must also select the Client Direct.
This option applies to Linux only.
Note
Client Direct Allows the client to try to directly connect to the backup storage
device, instead of connecting to a NetWorker storage node. If a direct
connection is not possible, then the backup operation connects to
the NetWorker storage node that you configure to accept data from
the client.
Parallel Save Enables NetWorker to use multiple parallel save streams to backup
Streams each save set defined for the client, to one or more destination
(PSS) devices. PSS does not support Checkpoint Restart backups.
Note
To avoid the over consumption of memory, NetWorker limits the number of files that
you can view when you browse a directory that contain a large number of files, for
example, 200,000 files. When NetWorker determines that displaying the number of
files will exhaust memory resources, NetWorker will display a partial list of the files
and a message similar to the following appears: Expanding this directory
has stopped because the result has too many entries
CIFS, DFS, and msdos file systems do not appear as selectable file system objects.
Modifying_the save_sets defined for a Windows client on page 372 describes how to
modify the save set attribute to define backup a remote file system.
Creating a Client resource with the Client Backup Configuration wizard 369
Backing Up Data
Note
When you select all file system objects and the DISASTER_RECOVERY:\ save set,
the ALL value appears in the Save set attribute for the client resource. When you
select file system objects, enables you to perform granular recoveries of files and
directories. The DISASTER_RECOVERY:\ save set enables you to perform a BMR
restore of the Windows host. To backup Active Directory, DFSR, or Cluster Services,
ensure that you perform DISASTER_RECOVERY:\ backup.
NOTICE
If any of the componets of the Windows BMR backup fail, then NetWorker does not create
a DISASTER_RECOVERY:\ save set and you cannot perform an offline recovery. The
backup process may backup the WINDOWS ROLES AND FEATURES save sets or critical
volumes, which NetWorker makes available for an online recovery.
winworkr -s server_name
If the -s option is not entered and there is only one server detected, that server is
connected automatically. If there are no servers detected, or if there is more than one
server available, the Change Server dialog box appears, enabling you to choose the
server.
where:
l server_name is the name of the NetWorker server.
l client_name is the name of the client that performed the Windows BMR backup.
NOTICE
After you test the wizard, you can safely exit the wizard before completing the entire
recovery process.
Procedure
1. Follow the procedures in Performing a Windows BMR to physical or virtual
computers on page 504.
Verify the following as you step through the BMR recovery wizard screens:
l If DNS is not available, that the host can resolve the NetWorker server name by
some method, such as a local hosts file.
l You can see the network interface that is required to communicate with the
NetWorker server. If you cannot see the network interface, use the wizard to load
the required NIC driver.
l You can see the critical and non-critical disks for the host that is to be recovered. If
you cannot see all of the disks, use the wizard to load the required disk drivers.
Creating a Client resource with the Client Backup Configuration wizard 371
Backing Up Data
Mapped drives
To back up mapped or CIFS drives on a Windows client for either a scheduled or a manual
backup, you must perform additional configuration steps in the Client resource.
Before you begin
l Create a dedicated client resource for the backups of mapped drives. A common user
account must have access to each mapped drive.
l Create a separate Client resource for backups of local drives.
l Ensure that the Administration window is in Diagnostic Mode. To enable Diagnostic
Mode, from the View menu, select Diagnostic Mode.
Procedure
1. In the Administration window, click Protection.
2. In the expanded left pane, select Clients.
3. Right-click the Client resource and select Modify Client Properties.
The Client Properties dialog box appears.
4. On the General tab, in the Save set attribute, specify the Universal Naming
Convention (UNC) path of the drive.
Do not specify the drive letter. For example, to specify the accounts directory on the
jupiter server, type \\jupiter\accounts.
Mapped drives
Backups of mapped drives on a Windows client for either a scheduled or a manual
backup require additional configuration of the Client resource.
Create a dedicated client resource for backups of mapped drives that you access with the
same username and password, and a separate Client resource for backups of local
drives.
On the General tab of the Client Properties dialog box for the Client resource that you use
to back up mapped drives, specify the Universal Naming Convention (UNC) path of the
drive in the Save set attribute. Do not specify the drive letter. For example, to specify the
accounts directory on the jupiter server, type \\jupiter\accounts.
On the Apps & Modules tab of the Client Properties dialog box for the Client resource,
specify the following settings:
l Type the username and password for the account to access the UNC path in the
Remote user and Password boxes.
l In the Backup command box, type the following value:
save -xL
l In the Save operations box, type the following value:
VSS:*=off
You must select View > Diagnostic Mode in the Administration window to enable
diagnostic mode view and access the Save operations attribute.
Linux
You can install the NetWorker client, server, storage node, and NetWorker Management
Console (NMC) server software on Linux.
Backup and recovery operations are supported on the following Linux journaled file
systems:
l ext3
l reiserfs
l jfs
l xfs
For ext3 file systems with the journal set to visible, do not back up or recover the
journal. Recovering the journal may cause the file system to become unstable. Use a
directive to ensure that the file system is excluded from a backup. Directives on page 323
provides information on directives.
Solaris
You can install NetWorker client, server, storage node, and NetWorker Management
Console (NMC) server software on the Solaris platform.
The NetWorker software supports local and global zones for a NetWorker client, server,
and a dedicated storage node. You can install and back up a NetWorker client, server, or
storage node on a computer running in a local zone. The NMC and NetWorker License
Manager can only be installed in a global zone.
Note
Extended file attribute data is in the calculation of the save set file size for Solaris clients.
As a result, the save set file size in NetWorker appears to slightly larger than expected.
HP-UX
You can install NetWorker client, server, storage node, and NetWorker Management
Console (NMC) server software on the HP-UX platform.
Customized backup scripts
On HP-UX, do not use the posix shell (/bin/sh) for customized backup scripts that are
meant to be automatically started by the backup. Use the korn shell (/bin/ksh)
instead.
Symbolic link entries in the fstab file
For HP-UX operating systems, do not use symbolic link entries in the /etc/fstab file. If
you use symbolic links in the fstab file, the backup does not include the file system to
which the symbolic link points.
AIX
You can install the NetWorker client, server, storage node, and NetWorker Management
Console (NMC) server software on the AIX platform.
Note
On AIX, non-root users who are performing a recovery cannot restore group ownership
(the set-group-id-on-execution or setuid permission bit) on binaries or files.
This behavior is to be expected.
For application cluster hosts, type the FQDN of the application cluster host. For
example:
l For an Oracle cluster, type the RAC hostname.
l For an Exchange IP DAG, type the DAG name.
Note
If the Client Configuration wizard cannot resolve the specified hostname, an error
message appears after you click Next.
Creating a Client resource with the Client Backup Configuration wizard 375
Backing Up Data
Note
You can also assign the client to one or more groups after you create the Client
resource.
8. Click Next.
9. On the Specify the Backup Configuration Type window, select Filesystem, and then
click Next.
10. On the Select the NetWorker Client Properties window, configure the following
options:
Option Description
Priority Enables you to control the order in which the NetWorker server
contacts clients for backup. During a backup operation, the
NetWorker server contacts the client with the lowest priority value
first. If you do not specify a priority for the client resources, then the
backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many
variables affect the order in which clients complete their backups.
For example:
l The backup operation on a client does not begin until the
worklists for each of the save sets on the client are complete.
l The amount of work can vary greatly from one client to the next.
l If a client stops responding and times out, then the backup
operation puts the client backup at the end of the backup order
list.
The only way to guarantee that the backup of one client occurs
before the backup of another client is to configure the workflows for
the clients to start at different times.
Parallelism Specifies the maximum number of data streams that a client can
send simultaneously during a backup action.
Data streams include back data streams, savefs processes, and
probe jobs.
The default value is different for the NetWorker server than it is for all
other client resources:
Option Description
l For the NetWorker server client resource, the default value is 12.
This higher default value enables the server to complete a larger
number of index backups during a Server backup action.
l For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server,
specify a value that is the same as or fewer than the number of
physical disks on the client that are included in the backup.
The EMC NetWorker Performance Optimization Planning Guide provides
more information about recommended client parallelism values and
performance benefits.
Remote Specifies a list of the users that have access to perform remote
Access access operations. For example, users that can perform a directed
recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data
Interface Domain Device. Available selections are IP, Fibre Channel, or Both.
Note
Block Based Enables Block Based Backups for the host. When you select this
Backup (BBB) option, you must also select the Client Direct.
This option applies to Linux only.
Note
Client Direct Allows the client to try to directly connect to the backup storage
device, instead of connecting to a NetWorker storage node. If a direct
connection is not possible, then the backup operation connects to
the NetWorker storage node that you configure to accept data from
the client.
Parallel Save Enables NetWorker to use multiple parallel save streams to backup
Streams each save set defined for the client, to one or more destination
(PSS) devices. PSS does not support Checkpoint Restart backups.
Creating a Client resource with the Client Backup Configuration wizard 377
Backing Up Data
Note
When you select all file system objects, the ALL value appears in the Save set
attribute for the client resource. When the backup starts, the savefs process reads
the contents of the /etc/vfstab file on Solaris clients, the /etc/fstab file on
HP-UX and Linux clients, or the /etc/filesystems file on AIX clients. The contents
of the file are compared to the currently mounted file systems and BTRFS sub-
volumes. Only currently mounted file systems and BTRFS sub-volumes that are
configured in these files are backed up. When NetWorker encounters a sub-directory
that has a sub-volume ID that differs from the parent sub-volume ID, NetWorker will
not backup the contents of the subdirectory, unless you specify the save -x in the
Backup command field in the properties of the Client resource. After you create the
client configuration wizard, you can modify the client resource or create a new client
resource to include the excluded file systems. Supported save set configurations for
UNIX hosts on page 378 provides more information.
When you specify the ALL save set:
l For a Solaris sparse or whole root zone client, all mounted file systems in the
sparse or whole root zone that are not normally skipped, such as NFS, are backed
up.
l ZFS file systems are backed up.
l If the save set name includes a symbolic link, a save set recovery is not supported.
The following file systems are excluded from the ALL save set. If you manually define the
file system or directories and files for one of these file systems in the Save set attribute of
the Client resource, the backup operation excludes the object:
l For a Solaris sparse or whole root zone client, all mounted file systems in the sparse
or whole root zone that are not normally skipped, such as NFS, are backed up.
l ZFS file systems are backed up.
l If the save set name includes a symbolic link, a save set recovery is not supported.
all-local
For a global zone client, the file systems in the sparse
or whole root zone on the physical host are backed up. File
systems in the global zone are skipped.
all-global
For a global zone client, all file systems in the global
zone are backed up. All sparse and whole root zone file systems
on the physical host are skipped.
Note
If you explicitly list a BTRFS sub-volume in the Save set field, NetWorker will back up
the files in the sub-volume, even if the sub-volume does not appear in the /etc/
fstab file. When NetWorker encounters a sub-directory that has a sub-volume ID that
differs from the parent sub-volume ID, NetWorker will not backup the contents of the
subdirectory, unless you specify the save -x in the Backup command. To back up
data in the subdirectories, perform one of the following tasks:
l Specify save -x in the Backup command field in the client properties window.
l Explicitly list the path of each sub-volume in the Save set field.
l Mount each sub-volume, include the mount point in the /etc/fstab file, and
then specify ALL or all-btrfs in the Save set field.
5. Click OK.
It is recommended that you specify the fully qualified domain name (FQDN) of the
host. For OS cluster hosts, type the FDQN of the virtual host.
For application cluster hosts, type the FQDN of the application cluster host. For
example:
l For an Oracle cluster, type the RAC hostname.
l For an Exchange IP DAG, type the DAG name.
Note
If the Client Configuration wizard cannot resolve the specified hostname, an error
message appears after you click Next.
Note
You can also assign the client to one or more groups after you create the Client
resource.
8. Click Next.
9. On the Specify the Backup Configuration Type window, select Filesystem, and then
click Next.
10. On the Select the NetWorker Client Properties window, configure the following
options:
Option Description
Priority Enables you to control the order in which the NetWorker server
contacts clients for backup. During a backup operation, the
NetWorker server contacts the client with the lowest priority value
first. If you do not specify a priority for the client resources, then the
backup order is random. The default value is 500.
While the Priority attribute specifies the order of client contact, many
variables affect the order in which clients complete their backups.
For example:
l The backup operation on a client does not begin until the
worklists for each of the save sets on the client are complete.
l The amount of work can vary greatly from one client to the next.
Option Description
l If a client stops responding and times out, then the backup
operation puts the client backup at the end of the backup order
list.
The only way to guarantee that the backup of one client occurs
before the backup of another client is to configure the workflows for
the clients to start at different times.
Parallelism Specifies the maximum number of data streams that a client can
send simultaneously during a backup action.
Data streams include back data streams, savefs processes, and
probe jobs.
The default value is different for the NetWorker server than it is for all
other client resources:
l For the NetWorker server client resource, the default value is 12.
This higher default value enables the server to complete a larger
number of index backups during a Server backup action.
l For all other clients, the default value is 4.
To avoid disk contention for clients other than the NetWorker server,
specify a value that is the same as or fewer than the number of
physical disks on the client that are included in the backup.
The EMC NetWorker Performance Optimization Planning Guide provides
more information about recommended client parallelism values and
performance benefits.
Remote Specifies a list of the users that have access to perform remote
Access access operations. For example, users that can perform a directed
recovery of backup data that originated on this host.
Data Domain Specifies the protocol to use if you send the backup data to a Data
Interface Domain Device. Available selections are IP, Fibre Channel, or Both.
Note
Block Based Enables Block Based Backups for the host. When you select this
Backup (BBB) option, you must also select the Client Direct.
This option applies to Linux only.
Note
Client Direct Allows the client to try to directly connect to the backup storage
device, instead of connecting to a NetWorker storage node. If a direct
connection is not possible, then the backup operation connects to
the NetWorker storage node that you configure to accept data from
the client.
Creating a Client resource with the Client Backup Configuration wizard 383
Backing Up Data
Option Description
Parallel Save Enables NetWorker to use multiple parallel save streams to backup
Streams each save set defined for the client, to one or more destination
(PSS) devices. PSS does not support Checkpoint Restart backups.
Note
When you select all file system objects, the ALL value appears in the Save set
attribute for the Client resource. The ALL save set includes local and mounted
volumes.
5. Click OK.
Note
#slapcat -l /var/backups/networker.ldif
l To back up Password Server database for the Open Directory when the OS-X host
uses LDAP over SSL, type:
# mkdir -p /var/backups/networker.odpdb
# mkpassdb -backupdb /var/backups/networker.odpdb
l To back up the local NetInfo directory domain, type:
The following script file provides an example of how to back up the LDAP directory,
Password Server, and NetInfo databases before each scheduled save:
"/usr/sbin/slapcat -l /var/backups/networker.ldif;
/bin/mkdir -p /var/backups/networker.odpdb;
/usr/sbin/mkpassdb -backupdb /var/backups/networker.odpdb;
/usr/bin/nidump -r / . > /var/backups/networker.nidump"
3. Connect to the NetWorker server by using NMC.
4. In the Administration window, click Protection.
5. In the expanded left pane, select Clients.
6. Right-click the Client resource and select Modify Client Properties.
The Client Properties dialog box appears.
7. On the Apps and Modules tab, in the Pre command attribute, specify the name of the
script file that you require NetWorker to run before a backup.
Note
8. Click OK.
On UNIX/Linux clients, specify the following value in the Save operations attribute:
I18N:mode=nativepath
You must enable diagnostic mode view by selecting View > Diagnostic Mode in the
Administration window to access the Save operations attribute in the Client Properties
dialog box.
Note
Checkpoint restart is only supported on Linux and UNIX environments when performing
standard save operations; you cannot use checkpoint restart with block-based backup or
parallel save streams enabled. Checkpoint restart is not supported on Windows
platforms.
A known good point is defined as a point in the backup data stream where the data is
successfully written to the save set and that data can be located and accessed by
subsequent recovery operations. This feature allows client backups that are part of a
scheduled backup to be restarted, if they fail while running. This prevents the files and
directories that have already been backed up from being backed up again.
Backup failures occur for various reasons. The most common reasons include hardware
failures, loss of network connectivity, and primary storage software failures. If a backup
fails and checkpoint restart is enabled, then failed save sets are marked as partial
instead of as aborted. Partial save sets remain in the index, the media databases, and
media such as AFTD.
You can manually restart a failed backup, or you can configure the backup to restart
automatically. A restarted save set has a new SSID and savetime.
The NetWorker server and storage node components must remain running to manage the
client failure and to create a partial save set. If the NetWorker server or storage node
components fail during a backup, then partial save sets are not created. In this case, the
backup for the checkpoint-enabled client starts from the beginning.
If the checkpoint restart feature is not enabled, a failure that is encountered during a
scheduled backup operation might require a rerun of an entire backup tape set. This can
be costly when a limited backup window of time is available, as a significant portion of
the backup data might have been successfully transferred to tape, and the NetWorker
software cannot resume a save set from the point of interruption.
For example, when performing an 800 GB backup that requires approximately 10 hours to
complete and spans six tapes, if a failure occurs while writing to the last tape, the
previous five tapes representing 9 hours of backup time may need to be rerun. As
datasets continue to increase in size, so does the impact of backup failures.
The second partial save set contains file_d and /disk1/dir, which includes
file_a, file_b, file_c and file_d. However, file_b is not in the save set.
Platform requirements
Checkpoint restart is only supported on Linux and UNIX environments when performing
standard save operations. You cannot use checkpoint restart with block-based backup or
parallel save streams enabled.
Checkpoint restart is not supported on Windows platforms.
Client hostname requirements
Use a consistent convention for all NetWorker client hostnames. Do not configure client
resources with both short and fully qualified domain names (FQDN).
Save set requirements
Backup of the Windows DISASTER_RECOVERY:\ save set is not supported. If a client
with a DISASTER_RECOVERY:\ save set is enabled for checkpoint restart, the backup
fails.
The checkpoint restart option is ignored for index and bootstrap save sets.
Client Direct requirements
Checkpoint restart supports Client Direct backups only to AFTD devices, and not to DD
Boost devices. If a client is enabled for checkpoint restart and a Client Direct backup is
attempted to a DD Boost device, then the backup reverts to a traditional storage node
backup instead.
For Client Direct backups to AFTDs, checkpoints are made at least 15 seconds apart.
Checkpoints are always made after larger files that require more than 15 seconds to back
up.
Performance requirements
Enabling checkpoint restart might impact backup speed, depending on the datazone
environment and configuration.
Checkpoint restart also might increase the size of the index because additional index
records are created for the valid recoverable data. These partial save sets should not be
manually removed from the index.
c. Click Next.
f. On the Action Wizard Summary page, review the settings for the backup action,
and then click Configure .
NOTICE
If you rename a save set, the checkpoint restart fails to find a match against a previous
run and the restart reverts to a complete backup. Also, do not edit retention in between
checkpoint restarts, as an expired partial save set may leave gaps in the backup set.
Probe-based backups
You can configure the NetWorker server to search or probe a NetWorker client for a user-
defined script before the start of a scheduled backup operation. A user-defined script is
any program that passes a return code.
When the NetWorker server detects the script, the NetWorker server runs the script and
interprets two return codes:
l Return code 0 indicates that a client backup is required.
l Return code 1 indicates that a client backup is not required.
NetWorker interprets all other return codes as an error and does not perform a backup.
Procedure
1. Create the Probe resource script, and save the script in the same directory as the
NetWorker binaries on each client that uses the client probe.
The name of the probe script must begin with save or nsr.
Note
Note
f. Click OK.
3. Associate the probe with a Client resource:
a. In the expanded left pane of the Protection window, select Clients.
b. In the right pane, right-click the Client resource, and select Modify Client
Properties.
The Client Properties dialog box appears.
c. Click the Apps & Modules tab.
d. Select the probe resource from the Probe resource name list.
e. Click OK.
4. Configure a data protection policy with a workflow that includes a probe action:
a. Create a group that includes the client with the assigned probe resource.
b. Create a policy.
c. Create a workflow.
d. Create a probe action and a backup action for the workflow.
of a single large file will require less resources than a backup of a dense file system,
where NetWorker must access a large number of small-sized files.
NOTICE
You must specify the password to recover password-protected files. If the password was
configured or changed after the backup occurred, then you must provide the password
that was in effect when the file was originally backed up. Keep password changes to a
minimum.
Do not use the aes ASM for data encryption when backing up files that are encrypted by
using the Microsoft Windows Encrypting File System (EFS). The backup is reported as
successful, but recovery of the file fails and the following message is written to the
NetWorker log file:
recover: Error recovering
filename. The RPC call completed before all pipes were
processed.
When a backup includes EFS encrypted files, the files are transmitted and stored on
backup volumes in their encrypted format. When the files are recovered, they are also
recovered in their encrypted format.
Compression
Compressing data for a backup generates less network traffic. However, compression
uses computing resources, so its benefits may be limited on low-powered systems. If the
storage device also compresses data, the result may be that more data is actually written
to tape.
Compression
You can compress backup data to reduce network traffic and backup storage
requirements.
Compressing data for a backup generates less network traffic. However, compression
uses computing resources, so its benefits may be limited on low-powered systems. If the
storage device also compresses data, the result may be that more data is actually written
to tape.
Note
You can apply password protection alone, encryption alone, password protection and
encryption together, or compression alone. You cannot apply password protection and
compression together or encryption and compression together.
l If you enable checkpoint restart for a client, then Client Direct backups are supported
only to AFTDs, and not to DD Boost devices. If a client is enabled for checkpoint
restart and a Client Direct backup is tried to a DD Boost device, then the backup
reverts to a traditional storage node backup instead.
For Client Direct backups to AFTDs, checkpoint restart points are made at least 15
seconds apart. Checkpoints are always made after larger files that require more than
15 seconds to back up.
l Archive operations are not currently supported for Client Direct backups.
\\fileserver\aftd1
fileserver:/aftd1
l If you are setting up a UNIX/Linux storage node, specify the NFS path first. For
example:
fileserver:/aftd1
\\fileserver\aftd1
The following figure shows an example set of paths for a CIFS AFTD.
3. If an NFS server provides the AFTD storage for Client Direct backups, then specify the
username and password that is required to access the NFS server for the AFTD in the
Remote user and Password attributes on the Configuration tab of the Device
Properties dialog box for the device.
4. Ensure that the Client direct attribute is enabled on the General tab of the Client
Properties dialog box for each Client Direct client.
Client Direct backups are enabled by default.
Select View > Diagnostic Mode in the Administration interface to access the Client
direct attribute in the Client Properties dialog box.
client, NetWorker runs the customized program for each save set instead of the standard
save program.
Procedure
1. Use a text editor to create a script in the networker_installation_dir\bin
directory on Windows clients or the networker_installation_dir/bin on
LINUX or UNIX clients.
The script name must meet the following requirements:
l Starts with save or nsr.
l Ends with the .bat extension.
l Contains a maximum of 64 characters.
For example, script file names that meet these criteria include
save_custom_script.bat and nsr_backup_script.bat.
Note
All commands within the script must complete successfully. Otherwise, the NetWorker
server cannot complete the remaining instructions.
Post-backup Redirects the output of the set DOS command to a set.txt file at the root of
the C:\ drive, and sends all computer system environment information to this
file.
The netstart.txt and set.txt files are placed in the C:\directory. New
information is appended to these files each time a backup is run.
Example script
@ECHO OFF
SETLOCAL
ECHO =======START BATCH FILE================
ECHO =====NetWorker PRE_BACKUP COMMAND======
ECHO =======NET START - creates netstart.txt file and
ECHO =======sends all Started Services information
ECHO =======to the file c:\netstart.txt
:loop
SHIFT
IF %0.==. GOTO save
SET arg=%arg% %0
GOTO loop
REM These are the save commands that run the required
REM NetWorker backup commands.
:save
SET >>C:\SET.TXT
ENDLOCAL
#!/bin/sh
# export the SHELL that we are going to use
SHELL=/bin/sh
export SHELL
# export the correct PATH so that all the required binaries can be
found
case $0 in
/* ) PATH=/usr/atria/bin:/bin:/usr/bin:`/bin/dirname $0`
c=`/bin/basename $0`
;;
* )PATH=/usr/atria/bin:/bin:/usr/bin:/usr/sbin
c=$0
;;
esac
export PATH
# These are the valid statuses that save reports upon completion of
the backup
statuses="
failed.
abandoned.
succeeded.
completed savetime=
"
# Perform the PRECMD (Lock VOB)
/usr/atria/bin/cleartool setview -exec "/usr/atria/bin/cleartoollock -
c \
‘VOB backups in progress’ -vob /cm_data/mis_dev" magic_view >
/tmp/voblock.log 2>&1
# Perform backup on client
save "$@" > /tmp/saveout$$ 2>&1
# cat out the save output
cat /tmp/saveout$$
# search for backup status in output reported by save
for i in ${statuses}; do
result=`grep "${i}" /tmp/saveout$$`
if [$? != 0]; then
echo ${result}
fi
done
# Perform the POSTCMD (Unlock VOB)
/usr/atria/bin/cleartool setview -exec "/usr/atria/bin/
cleartoolunlock -vob
/cm_data/mis_dev" \
magic_view > /tmp/vobunlock.log 2>&
# exit gracefully out of the shell script
exit 0
Selections Description
No selections The nsrpolicy and nsrjobd programs determine the success or failure of
(default behavior) a custom script based on the completion of the save program (end of job).
The following criteria apply:
l If the save job completion status is success, then nsrpolicy and
nsrjobd report that the custom backup job succeeded.
l If the save job completion status is failure, then nsrpolicy and
nsrjobd report that the custom backup job failed.
Selections Description
The exit code of the custom script process is not taken into
consideration.
end on job end A backup job is considered to be ended as soon as an end job message is
only received from the save command.
Select this option when you do not want to wait for the
postprocessing commands of the script to end.
end on process A backup job is considered to be ended as soon as the started process exits.
exit only Background processes started by the backup command could still be running
on the client.
Use this option when you want the custom script to start
background processes and you do not want savegrp or
nsrjobd to wait for the processes to complete.
use process exit Only the process exit code is used to determine the success or failure of the
code only job. An exit code of 0 indicates success. Otherwise, the job is reported as
failed.
Use this option when you want the script postprocessing command status to
have an impact on the status of the
save backup command without having
to unset the NSR_STD_MSG_FD environment variable.
Both end on job Either event can trigger the end of a job.
end and
end on process
exit
Both end on job If an end job message is received before the process exits, then the exit
end and status provided by the end job message is used to determine the success or
use process exit failure of the job.
code
Note
5. Optionally, in the Post command attribute, specify the name of the script file that you
require NetWorker to run after a backup of all the save sets for the client completes.
Note
6. Click OK.
Results
The customized instructions are applied the next time that the client is backed up.
Client resources
A client is both a physical computer with NetWorker client software installed on it and a
NetWorker resource that specifies a set of files and directories to be in a scheduled
backup. A Client resource also controls backup settings for the client, such as the save
sets to back up for the client, the groups to which the client belongs, and whether to
automatically restart failed backups for the client.
You can configure multiple Client resources for a single NetWorker client computer,
although clients with the same save set cannot be in the same group. You might want to
create multiple Client resources for a single client computer in the following scenarios:
l To segregate different types of backup data, such as application data and operating
system files. For instance, to back up the accounting data on a computer on a
different schedule than the operating system files, create two client resources for the
computer: one for accounting data and another for operating system data.
l To back up large client file systems more efficiently. For instance, you could create
separate client resources for each file system on a computer and back them up on
different schedules.
You can create a Client resource either by using the Client Backup Configuration wizard
or the Client Properties dialog box.
You can configure NetWorker clients to use a unique network interface on the NetWorker
server and storage node for backup and recovery operations. Using multihomed
systems on page 773 provides more information.
Note
To avoid the over consumption of memory, NetWorker limits the number of files that
you can view when you browse a directory that contain a large number of files, for
example, 200,000 files. When NetWorker determines that displaying the number of
files will exhaust memory resources, NetWorker will display a partial list of the files
and a message similar to the following appears: Expanding this directory
has stopped because the result has too many entries
When you manually specify the save set value, place multiple entries on separate
lines. For example, to back up a log file directory that is named C:\log and all the
data under the directory that is named D:\accounting, type the following entries:
C:\log
D:\accounting
Follow the guidelines in Mapped drives on page 373 to back up mapped drives on
Windows systems.
To back up all client data, type ALL. For Windows operating systems, the ALL save set
includes the DISASTER_RECOVERY:\ save set, which includes the WINDOWS
ROLES AND FEATURES save set.
NOTICE
Some operating systems contain files and directories that should not be backed up.
Use directives to ensure that these files and directories are not backed up.
Save sets on page 292 provides more information on defining the save sets for a
Client resource.
10. Select the other tabs in the Client Properties dialog box and configure options as
necessary.
11. Click OK.
Results
Verify that the client is enabled for scheduled backups by ensuring that a check mark
appears next to the client in the Scheduled backup column in the right pane for the
client.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
Client priority
The Priority attribute on the Globals (1 of 2) tab of the Client Properties dialog box for a
Client resource enables you to control the order in which the NetWorker server contacts
clients for backup.
The attribute can contain a value between 1 and 1,000. The lower the value, the higher
the priority.
You must select View > Diagnostic Mode in the Administration interface to access the
Priority attribute in the Client Properties dialog box.
During a backup operation, the NetWorker server contacts the client with the lowest
priority value first. If you do not specify a priority for the Client resources, then the backup
order is random.
While the Priority attribute specifies the order of client contact, many variables affect the
order in which clients complete their backups. For example:
l The backup operation on a client does not begin until the worklists for each of the
save sets on the client are complete.
l The amount of work can vary greatly from one client to the next.
l If a client stops responding and times out, then the backup operation puts the client
backup at the end of the backup order list.
The only way to guarantee that the backup of one client occurs before the backup of
another client is to configure the data protection policies for the clients to start at
different times.
Manual backups
Manual backups enable users to make quick backups of a few files from the client host.
When you perform a client-initiated or manual backup, by default NetWorker backs up the
data to a volume assigned to the Default pool on the NetWorker server. The retention
policy that is assigned to the data is one year, and the level is manual.
Perform manual backups on Windows by using the NetWorker User program. Perform
manual backups on UNIX and Linux only from the command line.
Note
You cannot perform data deduplication during backups with the NetWorker User program.
You must perform scheduled backups or manual backups from the command line to
perform data deduplication during the backup.
Procedure
1. In the NetWorker User program, click Backup.
The Backup window appears.
2. Select the data to back up.
To back up critical volumes, UEFI, the system reserved partition, and WINDOWS
ROLES AND FEATURES for disaster recovery purposes, select the
DISASTER_RECOVERY save set.
3. Click Start.
The Backup Status dialog box displays the progress of the backup. When the backup
finishes, a Backup completion time message appears.
If the backup fails due to a problem with VSS or a writer, an error message appears.
Use the Windows Event Viewer to examine the event logs for more information. VSS
backup error messages are also written to the NetWorker log file.
The NetWorker log file in \install_path\logs\networkr.raw contains a
record of every file that was part of an attempted manual backup from the NetWorker
User program. This file is overwritten with the next manual backup. To save the
information in the file, rename the file or export the information by using the
nsr_render_log program.
NOTICE
Certain types of corrupt files or errors on computer disk volumes are not detected.
NetWorker might back up this corrupt data. To avoid this situation, run diagnostic
programs regularly to correct disk volume errors.
Note
When you use the NetWorker User program or the save command to perform a manual
backup, NetWorker performs the backup operation as a single backup stream. To multi-
stream the backup operation, run a scheduled group backup.
Backing Up Data on page 333 provides more information about manual backups.
If you do not specify the -s option with the save command, the files are backed up to
the NetWorker server that is alphabetically listed first in the /nsr/res/servers file on
the client computer.
The EMC NetWorker Command Reference Guide and the UNIX man pages provide
information about save.
BTRFS backups
NetWorker support BTRFS volume backups. When you specify a BTRFS volume or sub-
volume save set, NetWorker performs a recursive back up of the directory tree that you
specified with the save command. When NetWorker encounters a sub-directory that has
a sub-volume ID that differs from the parent sub-volume ID, NetWorker will not back up
the contents of the subdirectory, unless you specify the -x option with the save
command.
If you do not specify the -s NetWorker_server option, the save command contacts the
NetWorker server that is defined in the /nsr/res/servers file. The NetWorker
Command Reference Guide provides more information about the save command.
export CB_CACHE_LOCATION=cache_dir
export CB_LOG_DIR_LOCATION=log_dir
where:
l cache_dir is the directory that stores backup cache files.
l log_dir is the directory that stores for the backup log files.
NOTICE
Procedure
1. Log in as an administrator on the Windows client computer.
2. Open the NetWorker User program.
3. From the Operation menu, select Verify Files.
4. Select the data items to verify.
5. Click Start.
6. Monitor the data verification progress in the Verify Files Status dialog box.
After the verification is complete, the Verify Status dialog box shows any data
discrepancies.
Note
You cannot use the NetWorker software to create an instant clone by writing to two
devices simultaneously. This operation is also referred to as parallel cloning, twinning, or
inline copy. Where parallel cloning or twinning is required, consider using the NetWorker
cloning feature. Using cloning helps ensure that the initial backup completes
successfully. Additional data protection can also be implemented by using the best
devices and bandwidth available for the backup environment.
Note
Clone retention
NetWorker supports the ability to define a retention time for a clone save set that differs
from the original save set.
The following attributes determine the retention time that NetWorker assigns to the
original save set and clone save set.
l Retention policy attribute that is defined for the Client resource.
l Retention policy attribute that is defined for the Action resource that created the save
set.
l Retention policy attribute that is defined for the Pool resource that contains the save
set.
Note
This read-only attribute appears on the Configuration tab of the Pool resource, when
Diagnostic mode is enabled in the NetWorker Administration window. This is a 8.2.x
and earlier attribute, which you cannot modify.
EMC recommends that you define the retention policy for data in the Action resource. If
you define the retention policy for save sets in multiple resources, you might experience
unexpected save set expirations.
Note
EMC recommends that you do not write NDMP and non-NDMP data to the same clone
volume because the number of file marks and positioning on the device differs for both
data types.
Note
You can create a custom, scripted solution that uses the nsrclone command to
manage save set spanning.
Recovery scenarios
When you clone data, you provide the datazone with an alternative data recovery source ,
which helps to protect against media loss or corruption. However, if the media is located
in one of the following locations, then the second copy of the data is still vulnerable to
major disasters that can affect the entire site:
l On the same tape library as the original data volume.
l On a deduplication device within the same data center, in a Data Domain
environment.
l In an onsite safe.
Sometimes, you may require more copies of a save set to ensure that all the recovery
scenarios are accommodated while maintaining the expected return on investment. This
requirement may not apply to all clients and all data, or be practical. However, consider
the reasons for cloning to ensure that the cloning strategy meets requirements and
expectations.
Changing the target device, or moving tapes to a second location after the cloning
operation completes, can provide additional protection.
Retention considerations
A Retention policy value applies to every type of save set. The retention policy value
determines the length of time that the data remains available for recovery in the
NetWorker media database and the client file index. You can specify a retention policy
value for the clone save set that differs from the value that is defined for the original save
set. When the retention policy differs for the original and clone save set, you can expire
the original save set and reclaim the space on the source AFTD but maintain the data on a
clone volume for future recoveries.
Note
The retention setting impacts the amount of disk space that is required by the NetWorker
server. The recovery procedure is likely to be different if retention has expired. The
retention setting should be equal to or greater than the client or data requirements, and
allow for the expected recovery conditions.
Cloning example
In this example, a backup of a client with three data drives creates three save sets. These
save sets are stored on a volume that is accessible through Storage Node A. Once a
cloning action occurs, the copies of these save sets are sent to a clone pool on Storage
Node B.
In this figure:
l A client performs a backup of three data drives to Storage Node A. NetWorker creates
three save sets, one save set for each data drive.
l A clone operation reads the data from the volumes on Storage Node A, and then
copies the save sets to Storage Node B.
Figure 44 Cloning example
Note
Do not use a production storage node to perform cloning operations when the
embedded storage node cloning capability is present.
Advantages
The advantages of cloning data to physical tapes include the following:
l Cloning can occur with the disk libraries under NetWorker control with standard
NetWorker policy support. Multiple retentions policies for different cloned copies of
data can be used.
l Cloning can occur at the save set level.
Note
Disadvantages
The disadvantages of cloning data to physical tapes include the following:
l Requires storage node licenses.
l Requires maintenance of front-end SAN infrastructure to a target tape library as well
as the virtual tape library.
l Consumes SAN bandwidth as data must be from virtual tape over the SAN to a target
device on the SAN.
NOTICE
For disaster recovery, you must replicate the client data to another Avamar deduplication
node and clone the metadata. Both the metadata and the client data are required to
recover client backup data.
You can also output the backup data of Avamar deduplication nodes to tape volumes.
Create a second Client resource for the client, but do not configure the second instance
as a deduplication client. Configure a data protection policy to back up the second client
instance as a normal NetWorker client and store the backups on tape.
The EMC NetWorker and EMC Avamar Integration Guide provides more information.
NOTICE
If the clone source volume is on a remote storage node and is unmounted, a volume
clone operation cannot complete successfully, even if the source volume is mounted
after the clone operation tries to start. The nsrclone program is unavailable with a
message that the server is busy. This issue does not occur when the storage node is on
the NetWorker server (or, not remote) or when you perform a clone controlled replication
(optimized clone) operation.
Note
If the volume is not in a media library, then the list of storage nodes is based only
on the criterion for storage node settings in the NetWorker server Client resource.
Example
Consider the following example for a volume that resides in a media library and is not
mounted:
l The Recover storage nodes attribute in the NetWorker server Client resource lists the
following storage nodes in order:
n Storage node F
n Storage node E
n Storage node D
l The Read Hostname attribute for the Library resource is not set, but the following
devices in the media library are configured with storage nodes:
Note
If the volume is not in a media library, then the list of storage nodes is based only
on the criterion for storage node settings in the NetWorker server Client resource.
l To control the conditions before cloning occurs. For example, following a specific
event or test, or as part of a workflow.
l To control the actions after cloning has been successful. For example, deleting files,
or moving data as part of a workflow.
l To control the cloning as part of an enterprise management scheduler that is
independent of NetWorker scheduling or NMC.
l To create multiple clones. For example, clone 1 on disk, clone 2 to tape, each with
specific dependencies, timing, and logic.
Note
When using the scripted cloning feature, use the latest versions of NetWorker
software. This minimizes the complexity of the logic in the cloning script.
The nsrclone command requires specific privileges which are assigned based on
session authentication. NetWorker supports two types of session authentication. Token-
based authentication, which requires you to run the nsrlogin before you run the
command and authenticates the user that runs the command against entries that are
defined in the External Roles attribute of a User Group resource. Classic authentication,
which is based on user and host information and uses the user attribute of a User Group
resource to authenticate a user. Classic authentication does not require an
authentication token to run the command. For example, if you run the command without
first running nsrlogin, NetWorker assigns the privileges to the user based on the
entries that are specified in the Users attribute of the User Group resource. When you use
nsrlogin to log in as a NetWorker Authentication Service user, NetWorker assigns the
privileges to the user based on the entries that are specified in the External Roles
attributes of the user Group resource. The EMC NetWorker Security Configuration Guide
Using nsrlogin for authentication and authorization on page 65 provides more
information.
Note
Optionally, use the nsrlogin command to authenticate a user and generate a token for
the nsrclone and mminfo commands. Using nsrlogin for authentication and
authorization on page 65 provides more information.
l To clone all save sets created in the last 24 hours for clients mars and jupiter with
save set names /data1 and /data2 for only backup level full, type:
nsrclone -S -e now -c mars -c jupiter -N /data1 -N /data2 -l full
l To clone all save sets that were not copied to the default clone pool in a previous
partially aborted nsrclone session, type:
nsrclone -S -e now -C 1
l To clone all save sets that were not copied to the default clone pool in a previous
partially aborted nsrclone session and then assign the save sets a retention policy
value that differs from the original save set, type:
The following table provides the descriptions of the options that are used in the
nsrclone command example.
Options Description
-S Specifies that the subsequent nsrclone options are
save set identifiers and not volumes names.
Note
Options Description
Note
When the staging process encounters an error after successfully cloning some save
sets, the staging process only removes successfully staged save sets from the source
volume before the process ends. Only a single set of save sets will exist on either the
source or destination volumes after staging.
Staging data allows you to accommodate multiple service levels. You can configure a
staging policy that keep the most recent backups on one storage device for fast recovery
and move other backups with less demanding recovery requirements to more cost-
effective slower storage. For example, you can store the initial backup data on a high
performance file type or advanced file type device to reduce backup time. At a later time,
outside of the normal backup period, you use the staging process to move the data to a
less expensive but more permanent storage medium, such as magnetic tape. After the
backup data moves to the other storage medium, NetWorker deletes the backup data
from the file or advanced file type device so that sufficient disk space is available for the
next backup. Staging does not affect the retention policy of backup data and the staged
data is still available for recovery on the destination device.
You can stage a save set from one disk to another as many times as required. For
example, you could stage a save set from disk 1 to disk 2 to disk 3, and finally to a
remote tape device or cloud device. When the save set is staged to a tape or cloud
device, it cannot be staged again. However, you could still clone the tape or cloud
volume.
Staging bootstrap backups
You can direct bootstrap backups to a disk device such as an AFTD or FTD device.
However, if you stage a bootstrap backup to another device, NetWorker reports the
staging operation as complete although the “recover space” operation has not started,
and the bootstrap remains on the original disk. Therefore, if the staged bootstrap is
accidentally deleted, you can use the original disk to scan in the bootstrap data.
Also, if the bootstrap data is not staged from the original disk, the data on the original
disk is subject to the same retention policies as any other save set backup and is,
therefore, deleted after the retention policy has expired.
7. In the Devices attribute, select the check boxes next to each source device from which
you want to stage data.
You can assign multiple devices to a single staging policy. However, you cannot
assign a single device to multiple staging policies.
8. From the Destination Pool list, select the destination clone pool that contains the
volumes to which NetWorker stages the data.
If you select the clone pool that only uses remote storage node devices, you must also
modify Clone storage nodes setting on the Configuration tab of the storage node
resource for the NetWorker server to include the storage node name. Determining the
storage node for writing cloned data on page 423 Provides details.
9. In the Configuration group box, specify the criteria that starts the staging policy.
The following table summarizes the available criteria that you can define for the
staging policy.
High water mark (%) Use these options to start the stage policy based on the amount of
used disk space on the file system partition on the source device.
Low water mark (%)
You must define a value higher than the value defined in the Low
water mark (%) attribute.
Low water mark (%)—Defines the lower used disk space limit.
When the
percentage of used disk space reaches the value that is defined in
the
Lower water mark (%) attribute, NetWorker stops moving save
sets from the source disk.
Note
Save set selection Use this option to rank the order in which NetWorker stages the
save sets, based on save set size or age. Available values include:
l largest save set—Stage the save sets in order of largest save
set size to smallest save set size.
l oldest save set —Stage the save sets in order of oldest save
set to most recent save set.
Max storage period Use this option to start the stage operation based on the amount of
time that a save set has resided on the volume.
Max storage period unit
Max storage period—Defines the number of hours or days that a
save set can
reside on a volume before the stage process considers the save
eligible to move to a
different volume.
Recover space operation Use this option to determine when the stage operation removes the
interval successfully staged save set from the source volume.
File system check interval Use this option to define when NetWorker automatically starts the
staging process.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
attributes of the user Group resource. The EMC NetWorker Security Configuration Guide ,
and Using nsrlogin for authentication and authorization on page 65 provides more
information.
3. Use the nsrstage command to migrate the save sets to another volume.
For example:
nsrstage -m -S ssid/cloneid
Note
When you do not use the -b option to specify a destination clone pool, the
nsrstage command migrates the save sets to a volume in the Default Clone pool.
The EMC NetWorker Command Reference Guide and the UNIX man pages describes how
to use the nsrstage and mminfo commands.
Archiving data
The archive process captures files or directories as they exist at a specific time, and
writes the data to archive storage volumes, which are not automatically recycled. After
the archive process completes, you can delete (groom) the original files from the disk to
conserve space.
The client archive program (nsrarchive) creates an archive. The client nsrexecd
service starts this archive.
The following figure illustrates how the NetWorker software archives data.
where:
1. Client file systems
2. Backup data tracking structures
3. Data
4. Media database information
5. File index information
Archive save sets
Archive save sets are similar to backup save sets. The main difference is that there is no
retention period for archive save sets, so the archive save sets never expire.
By default, the archive backup level is always set to full.
Licensing
You must purchase and license the archive feature separately from other NetWorker
software components. The EMC NetWorker Licensing Guide provides more information on
licensing procedures.
Encryption of archive data
If the NetWorker client is set up for encryption with the aes ASM, then archive data is also
encrypted.
Limitations
The following limitations apply to the archive feature:
l You cannot archive the WINDOWS ROLES AND FEATURES save set.
l The NetWorker Client Direct feature does not support archiving.
Enabling archiving
After you license the archive service and type the enabler code in the NetWorker server,
all clients for that server are enabled for the NetWorker archive feature by default. You
can specify which clients and users have permission to archive data.
Before you begin
Ensure that the NetWorker server is in diagnostic mode. To enable diagnostic mode, from
the View menu, select Diagnostic mode.
Procedure
1. To control whether a client can archive data, select or clear the Archive services
checkbox on the Globals (2 of 2) tab of the Client Properties dialog box:
l Clear the checkbox to disable archiving for the client.
l Select the checkbox to enable archiving for the client.
You must select or clear the Archive services checkbox for all Client resources that are
associated with the client. You may have multiple Client resources for a single client.
For example, if both the NetWorker module software and the NetWorker client
software are installed on the same computer, there are multiple Client resources.
2. Add users that should have permission to perform archiving to the Archive Users user
group in the Server window of the Administration interface.
Note
Manual archives from a Windows client do not enforce global or local file (nsr.dir)
directives. However, local directives (networkr.cfg) that are created with the
NetWorker User program are enforced.
Procedure
1. In the NetWorker User program, click Archive.
The Archive Options dialog box appears.
2. Type a comment in the Annotation attribute.
The annotation uniquely identifies the archive save set during retrieval. Consider
adopting a consistent naming convention so that you can easily identify archives,
based on the annotation name.
3. From the Archive Pool list, select the archive pool for the data.
4. To clone each archive save set, select the Clone checkbox, and then select the
destination archive clone pool from the Clone Pool list.
5. To check the integrity of the archive data on the storage volume, select the Verify
checkbox.
6. To remove the archived files from the disk after archiving completes, select the Groom
checkbox.
7. Click OK.
The Archive browse dialog box appears.
8. Select the checkbox next to the directories and files to archive, and clear the
checkbox next to the directories and files that you do not want to archive.
9. From the File menu, select Start Archive.
The Archive Status dialog box displays the status of the archive process. When the
archive process completes, a confirmation message appears if you selected the
Groom checkbox.
10. Click Yes to continue with deletion of archived files from the local disk.
Note
The user that recovers archived data becomes the owner of the data. Some operating
systems allow you to change the ownership of archived data to the original owner during
the recovery.
Procedure
1. Mount the archive volume in the storage device.
2. In the NetWorker User program, select Operation > Archive Retrieve.
The Source Client dialog box appears.
3. Select the source client with the data to recover, and click OK.
The Archive Retrieve dialog box appears.
4. In the Annotation string box, type all or part of the annotation string that you specified
for the save set when it was archived.
Leave the box empty to view a list of all archived save sets for the client.
5. Click OK.
The Save Sets dialog box appears.
6. To view a list of volumes that are required to retrieve the data from this archived save
set, click Required Volumes.
7. To type a new path for the location of the recovered data and to indicate what the
NetWorker server should do when it encounters duplicate files, click Recover Options.
8. Select the archived save set to recover and click OK.
The Retrieve Status dialog box displays the status of the recovery.
where:
l NetWorker_server is the hostname of the NetWorker server.
l -A annotation specifies the annotation string for the archive save set. You must
specify at least one annotation or save set ID.
Consider an example where archive A is annotated with Accounting_Fed and
archive B is annotated with Accounting_Local. If you type nsrretrieve -A
Accounting, then no match is found and the archive data is not recovered. If you
type nsrretrieve -A ting_L, then the recovery process recovers the data from
Archive B.
l -S ssid/cloneid specifies the archive save set to recover. To recover a cloned
archive save set, specify both the save set ID and the clone ID. You must specify at
least one annotation or save set ID.
l -i{N|Y|R} specifies how the NetWorker server should handle a naming conflict
between a recovered file and an existing file:
n iN does not recover the file when a conflict occurs.
Archive request succeeds but generates error when nsrexecd is not running
If the nsrexecd process is not running on a remote client during an archive request
operation, NetWorker reports that the archive operations completed successfully, but the
following error message appears in the daemon.raw file and the archive fails:
To resolve this issue, ensure that you start the nsrexecd daemon on a UNIX client or the
NetWorker Remote Exec service on a Windows client before you perform an archive
operation.
Category Description
Volume Name of the volume, which is the same as the name that appears on the volume
Name label in the NetWorker Administration interface.
Category Description
Media Type The type of media for the volume.
Used The amount of space currently in use on the volume, which is shown in KB, MB, or
GB, as appropriate.
Expiration The expiration date for the volume. If the recycle policy is set to manual instead of
automatic, then manual appears in this column.
Category Description
Volume Name of the volume, which is the same as the name that appears on the volume
Name label in the NetWorker Administration interface.
Category Description
Used The amount of space currently in use on the volume, which is shown in KB, MB, or
GB, as appropriate.
% Used An estimate of the percentage that is used, based on the total capacity of the
volume, and on the Media type setting of the device resource.
Expiration The expiration date for the volume. If the recycle policy is set to manual instead of
automatic, then manual appears in this column.
Category Description
Column Description
Client Name of the NetWorker client computer that created the save set.
Save Set Pathname of the file system that contains the save set. This column also
includes clone information. If the save set has a clone, the pathname is
marked has clones and the cloned save set is marked clone save set.
Save Time Date and time when the save set was created.
Level Level of backup that generated the save set. This refers only to scheduled
backups. For manual backups, the level is blank.
Status Status of the save set, such as whether the save set is browsable or
recoverable.
Flags Flags that provide additional details about the save set.
The first flag indicates which part of the save set is on the volume:
l c indicates that the save set is completely contained on the volume.
Column Description
l h indicates that the save set spans volumes and the head is on this
volume.
l m indicates that the save set spans volumes and a middle section is on
this volume.
l t indicates that the save set spans volumes and the tail section is on this
volume.
The third flag is optional and provides the following information for
the save set:
l N indicates that the save set is an NDMP save set.
l R indicates that the save set is a raw partition backup (such as for a
supported module).
l P indicates that the save set is a snapshot backup.
The fourth flag is optional. If the fourth flag appears, the value is
s to indicate that the save set is an NDMP save
set backed up by the nsrdsa_save command to a
NetWorker storage node.
Note
You cannot search for save sets that were created in releases prior to NetWorker 9.0.x.
Criterion Description
Client Name Type the name of the client that is associated with the save set.
Volume Select the volume on which the save set is stored from the list.
Pool Select the media pool for the volume on which the save set is stored from the
list.
Checkpoint ID Type the identifier of the checkpoint for partial save sets.
Copies To limit the save set results to the number of copies of the save set:
a. From the Copies list, select whether the number of copies is less than (>),
equal to (=), or greater than (<) a number that you specify.
b. Specify the number in the second box.
Save Time Select the start and end dates and times for the save time of the save set.
Clone Retention Select the start and end dates and times for the retention time of a cloned
Time save set.
Criterion Description
Maximum Level Select the maximum level of the backup. Save sets that meet the selected
level and backups of levels below the selected level appear in the results.
Column Description
Client Name of the client.
Volume Name Name of the volume on which the save set is stored.
Pool Name of the media pool for the volume on which the save set is stored.
Save Time Date and time at which the save set was saved to backup storage.
Criterion Description
VBA Name Select the checkbox next to VBA Name above the list, and then select the VBAs
from the list.
vCenter Name Type the name of the vCenter for the VBA.
Policy Select the policy that generated the VBA save set.
Volume Select the volume on which the save set is stored from the list.
Pool Select the media pool for the volume on which the save set is stored from the list.
Copies To limit the save set results to the number of copies of the save set:
a. From the Copies list, select whether the number of copies is less than (>),
equal to (=), or greater than (<) a number that you specify.
b. Specify the number in the second box.
Save Time Select the start and end dates and times for the save time of the save set.
Status Select All to view VBA save sets with any status.
Column Description
VBA Name Name of the VBA.
Volume Name Name of the volume on which the save set is stored.
Pool Name of the media pool for the volume on which the save set is stored.
Save Time Date and time at which the save set was saved to backup storage.
Managing volumes
A volume is a physical piece of media such as a tape or disk cartridge. On file type
devices, a volume is a directory on a file system. Volume management tasks include
changing the mode or recycle policy for the volume, relabeling the volume, removing
volumes from the media database and online indexes, and marking a volume as full for
offsite storage.
If a volume is not mounted when a backup is started, then one of three messages
appears, suggesting that one of these tasks be performed:
l Mount a volume.
l Relabel a volume (only when Auto Media Management is enabled).
l Label a new volume (only when Auto Media Management is enabled).
During file recovery, the NetWorker server requests the volume name. If multiple volumes
are needed to recover the files, the server lists all the volumes in the order of which they
are needed. During the recovery process, the server requests each volume, one at a time.
If a library is used, the server automatically mounts volumes that are stored in the library.
ultip
To manage volumes, you must have the correct permissions that are associated with the
NetWorker server and its storage nodes.
expire, the volume is recycled. Recyclable volumes contain save sets that have all
exceeded their retention periods. Appendable volumes can receive additional backup
data.
Procedure
1. Unmount the volume by right-clicking the device in the Devices window and selecting
Unmount.
2. In the Administration window, click Media.
3. In the left pane, select either Disk Volumes or Tape Volumes.
A list of volumes appears in the right pane.
4. Right-click the volume and select Change Mode.
The Change Mode dialog box appears.
5. Select a mode and click OK.
The new volume mode appears in the Mode column.
6. (Optional) Mount the volume by right-clicking the device in the Devices window, and
selecting Mount.
NOTICE
A volume that has been set to manual recycle retains that setting, even after the volume
is relabeled. You must explicitly reset the volume to automatic recycle.
Procedure
1. In the Administration window, click Media.
2. In the left pane, select either Disk Volumes or Tape Volumes.
A list of volumes appears in the right pane.
3. Right-click the volume, and select Recycle.
The Recycle dialog box appears.
4. Select either the Auto or Manual recycle policy.
5. Click OK.
After you finish
Mount the volume by right-clicking the device in the Devices window, and selecting
Mount.
volume as full also marks the volume as read-only. You can also specify the physical
location of the volume for reference purposes in the NetWorker Administration interface.
Procedure
1. Unmount the tape volume by right-clicking the volume in the Devices window, and
selecting Unmount.
2. Use the nsrjb command for libraries or the nsrmm command for stand-alone drives
from the command prompt to mark the volume as full:
l For libraries, type nsrjb -o full volid, where volid is the volume identifier.
l For stand-alone drives, type nsrmm -o full volid, where volid is the volume
identifier.
3. Specify the physical location of the volume for reference purposes:
a. In the Administration window, click Media.
b. Select Tape Volumes.
A list of volumes appears in the right pane.
c. Right-click the volume in the right pane and select Set Location.
The Set Location dialog box appears.
d. Type a description for the physical location of the volume.
e. Click OK.
volume changes to recyclable. You can relabel and overwrite a recyclable volume to
reclaim backup storage.
l Advanced filed type devices—Entries for save sets that are marked browsable are
removed from the client file index and media database. Entries that are recoverable
are removed from the media database. The expire action removes the data that are
associated with the save sets from the disk volume and reclaims the disk space.
The NetWorker server maintains one file index for each client computer (regardless of the
number of client resources for the client), and one media database that tracks data from
all clients and all save sets.
NOTICE
When NetWorker relabels a volume for reuse within the same pool, the volume
identification (the volume name as it appears on the volume label) remains unchanged.
Although the volume has the same label, information that is required by the NetWorker
server to locate and restore data on the volume is destroyed. All existing data is
inaccessible and is overwritten.
If a volume contains one or more deduplication save sets, the resource for the
deduplication node that was used to create the backup must exist when the save sets
pass their retention time. If the resource for the deduplication node has been deleted,
NetWorker cannot mark the volume as recyclable in the media database or relabel the
volume. Furthermore, when deduplication save sets pass their retention time, the
NetWorker server begins the process of deleting the deduplicated data from the
deduplication node. Therefore, deduplication data may not be recoverable by using the
scanner program when the deduplication save set has passed its retention time.
Recovery 457
Recovery
Recovering data
You can recover NetWorker data by using the recover command, the NetWorker User
program on Windows, or the NMC Recovery wizard on the NMC server.
Note
NetWorker 9.0.x does not support the recovery of archive data. Use an older version of
the NetWorker client software to recover archive data.
Recovery types
NetWorker provides you with two types of recoveries.
l Local recover—A single NetWorker host is the administering, source, and destination
host.
l Directed recover—The administering host is the source host or any other NetWorker
host in the datazone. The destination host is not the source host. Use a directed
recovery:
n To centralize the administration of data recoveries from a single host.
n To recover the data to a shared server, when the user cannot recover the data
themselves.
n To recover data to another host because the source host is inoperable or the
network does not recognize the source host.
n To transfer files between two NetWorker hosts.
Directed recoveries
A directed recovery enables a user to recover data to a NetWorker host that differs from
the source of the backup, while retaining the original file ownership and permissions.
A directed recovery is a restricted NetWorker function available only to user accounts that
have the necessary privileges that are required to perform the directed recovery
operation.
A user with directed recovery privileges can:
Host Requirements
Destination Ensure that the destination host:
Host Requirements
l Is the same platform as the source host, for example, UNIX to UNIX or
Windows to Windows.
l Uses the same file system as the source host, for example, UXFS to UXFS or
NTFS to NTFS.
l Contains an entry for the administering host in the servers file. The EMC
NetWorker Security Configuration Guide provides more information about
client-tasking rights and how to modify the servers file.
l Is configured to accept directed recoveries from a remote host. Ensure that
the Disable Directed Recover attribute is set to the default value No, in the
NSRLA database. Editing a client NSRLA database on page 733 describes
how to edit the NSRLA database.
l Has the required access rights to receive data.
n If you run the nsrlogin command on the administering host to create
an authenticated recover session, ensure that the External Roles attribute
of a user group with Remote Access All Clients privileges contains one of
the following entries:
– User DN for the authenticated user
– Group DN for a group that contains the authenticated user
n If you do not run the nsrlogin command on the administering host to
create an authenticated session, the root user or the Administrator user
on the destination host must appear in one of the following
configurations:
– A member of a NetWorker User Group with Remote Access All Clients
privileges. Add an entry to the User attributes for the Root or Admin
account in this format.
– Added to the Remote Access attribute of the source host.
For example:
Administrator@venus
Host Requirements
Administrator@venus
Host Requirements
Note
If you do not use the Operators, the Application Administrators, the Database
Administrators, or the Database Operators user group, ensure that you add
the required user information to a user group that has the following
privileges:
n Remote Access All Clients
n Operate NetWorker
n Monitor NetWorker
n Operate Devices and Jukeboxes
n Backup Local Data
n Recover Local Data
n Recover Remote Data
You must have operator privileges in the Operators user group to perform a
selective file restore from a Microsoft Windows deduplication backup.
Microsoft provides complete documentation for working with the Windows
deduplication functionality.
Windows requirements
NetWorker enables you to perform directed recoveries of data to a local drive on Windows
destination host, when you enable Windows File and Print Sharing option on the
destination host . You cannot perform a directed recovery to a CIFS share.
When you use the recover command on a Windows destination host and the
NetWorker server is also a Windows host, change the account that starts the NetWorker
Backup and Recovery service on the NetWorker server:
l When the NetWorker server and the destination host are in the same domain, start
service with a domain user that is a member of the local Administrators group.
l When the NetWorker server and destination host are not in a domain, or are not in the
same domain, start the service with a local user that meets the following
requirements:
n The same username exists as a local user on the destination host.
n The local user must have the same password on both hosts.
n The local user on the NetWorker server is a member of the local Administrators
group.
Local recoveries
When you perform a local recovery, the administering host is also the source and
destination host. Local recoveries are the simplest way to recover NetWorker data.
Ensure that user account that performs the recovery operation meets the following
requirements:
l Belong to a NetWorker User Group that has the Recover Local Data privilege.
If you use nsrlogin, add the DN or the user or group to the External Roles. If you do not
use nsrlogin, add the account in user@host to the Users attribute. The EMC NetWorker
Security Configuration Guide provides more information.
l Have operating system ownership of the recovered files. The root user on UNIX, and a
Windows Administrator have this privilege.
l Have write privileges to the local destination directories. The root user on UNIX, and a
Windows Administrator have this privilege.
Recover programs
NetWorker provides you with the following tools to recover data.
l NetWorker Recover program—Recover GUI for OS-X hosts.
l NMC Recovery wizard—Recover wizard that you start from the NMC server. The NMC
Recovery wizard provides a NetWorker datazone with a centralized recovery method.
l The recover command—CLI tool available on Windows, UNIX, and OS-X. Use the
recover command to recover data from a command prompt. To perform multiple
recovery operations in parallel, use multiple recover commands.
l NetWorker User program—Recover GUI for Windows hosts. Use the NetWorker User
program to recover file system data when the administering client is Windows.
l The scanner command—CLI tool available on Windows, UNIX, and OS-X. Use the
scanner command to recover data from a volume by save set ID (SSID) to the host
that starts the program. To perform multiple recovery operations in parallel, use
multiple scanner commands.
Note
The NetWorker User, NetWorker Recover, and NMC Recovery wizard programs only
recover data sequentially.
Note
Note
When you use NetWorker server 8.1 and earlier, the Recovery Wizard does not display
NDMP clients in the Select Recovery Hosts window.
l Block Based Backups (BBB), when BBB is enabled for a client and BBB are available
for recovery.
l BBB that you cloned to tape.
You can also use the Recovery wizard to configure an immediate recover of a Snapshot
Management backup.
When you create a recover configuration by using the Recovery Wizard, NetWorker saves
the configuration information in an NSR recover resource in the resource database of the
NetWorker server. NetWorker uses the information in the NSR recover resource to perform
the recover job operation.
When a recover job operation starts, NetWorker stores:
l Details about the job in the nsrjobsd database. Using nsrrecomp on page 612
describes how to query and report on recovery status.
l Output sent to stderr and stdout in a recover log file. NetWorker creates one log file
for each recover job. Troubleshooting Recovery Wizard on page 466 provides more
information.
NOTICE
NetWorker removes the recover log file and the job information from the job database
based on value of the Jobsdb retention in hours attribute in the properties of the
NetWorker server resource. In NetWorker 9.0.1, the default jobsdb retention is 72
hours.
Note
You can recover data from a pre-8.1 backup after you update the source host to
NetWorker 8.1 or later.
l The account you use to connect to the Console server has Configure NetWorker
privileges. The EMC NetWorker Security Configuration Guide provides more
information.
l The appropriate configuration is in place if you will perform a directed recover.
Directed recoveries on page 458 provides more information.
Note
NetWorker names the log file according to the name of the recover resource and
the time of the recovery job: recover_resource_name_YYYYMMDDHHMMSS
l The jobsdb contains job status information for the recover job.
6. In the Recover name field, provide a new name for the recover configuration.
7. Click Run Recover.
8. Monitor the status of the recover job in the option in the Recover window.
9. When the recover completes, review the recover log file.
b. Display the attributes for the Recover resource that you want to troubleshoot. For
example:
c. Make note of the values in the recover, recovery options, and recover stdin
attributes. for example:
where:
l nw_server.emc.com is the name of the NetWorker server.
l mnd.emc.com is the name of the source NetWorker client.
3. To confirm that the nsrd process can schedule the recover job:
a. Update the Recover resource to start the recover job:
d. If the nsrtask process does not start, the review the daemon.raw file on the
NetWorker server for errors.
4. To confirm that the NetWorker server can run the recover command on the remote
host, type the following command on the NetWorker server:
5. When the nsrtask command completes, review the nsrtask output for errors.
6. To confirm that the Recovery UI sends the correct recovery arguments to the recover
process:
a. Open a a command prompt on the destination client.
b. Run the recover command with the recover options that the Recover resource
uses. For example:
c. At the Recover prompt, specify the value in the recover stdin attribute.
Note
Do not include the “ ,”, or the ; that appears with the recover stdin attribute.
d. If the recover command appears to hang, review the daemon.raw file for errors.
e. When the recover command completes, review the recover output for errors. If
the recover command fails, then review the values specified in the Recover
resource for errors.
7. Use the jobquery command to review the details of the Recover job. From a
command prompt on the NetWorker server, type: jobquery.
8. From the jobquery prompt, perform one of the following steps:
a. To set the query to the Recovery resource and display the results of all recovery
jobs for a Recovery resource, type:
b. To set the query to a particular jobid and display the results of the job, type:
Note
Review the daemon.raw file on the NetWorker server to obtain the jobid for the
recovery operation.
Scanner recovery
The scanner program enables you to recover data directly from a NetWorker volume.
Use the scanner program in the following scenarios:
l To perform a by-file-selection recovery, when the save set information is not in the
client file index.
l To recover data directly from a tape.
NMC Recovery Choose whether to specify the volumes or to allow NetWorker to select the
wizard volumes on the Obtain the Volume Information page of the wizard.
NetWorker User You can select the volume when you perform a save set recovery.
program
NetWorker selects the volume when you perform a browsable
recovery.
recover You can specify the clone pool for a browsable recovery or the clone ID for a
command save set recovery.
If you do not specify the clone pool or the clone ID, then NetWorker
selects the volume.
When NetWorker selects the volume from which to recover data, the recovery operation
uses the following logic:
1. The highest priority is assigned to the volume (clone or original volume) that has a
complete, non-suspect save set status. A complete save set that is suspect has a
higher priority than an incomplete non-suspect save set.
2. If the volumes still have equal priority, then priority is assigned to the mounted
volume.
3. If the volumes are mounted, then priority is based on the media type. The media
types from highest to lowest priority are:
l Advanced file type device
l File type device
l Other (such as tape or optical)
4. If the volumes are not mounted, then priority is based on the media location. The
media locations from highest to lowest priority are:
l Volumes in a library.
l Volumes that are not in a library but are onsite (or, the offsite flag is not set).
l Volumes that are offsite (or, the offsite flag is set).
To specify that a volume is offsite, use the nsrmm command. For example:
Browsable recovery
A file selection recovery method, or browsable recovery inspects the client file index that
NetWorker creates for the source host, to gather information about backups. When the
recovery process reviews entries in the client file index, you can browse the backup data
and select the files and directories to recover. The retention policy that NetWorker applies
to a backup determines the earliest versions of files and file systems that are available
for recovery. Backup retention on page 314 provides more information about browse and
retention policies.
Use a browsable recovery in the following scenarios:
l To recover a file or directory when you are not certain of its exact name or location.
l To recover a small number of files or directories. When you select many files and
directories, the process of marking the files for recovery and the recovery process can
take some time to complete, particularly from the NetWorker User program.
l To perform a directed recovery.
l To recover only the files that you select in one or more directories, not all files in a
directory.
Adding information about recyclable save sets to the client file index
Each NetWorker client, including the NetWorker server, has a client file index (CFI). The
CFI is a database that contains information about the files that are in a save set.
When NetWorker adds save set information into the media database and CFI, NetWorker
assigns the save set a retention date, which is based on the retention policy that is
assigned to the backup, clone, or archive. Browsable information about the save set
remains in the CFI until the current date is equal to the retention date.
When the current date is equal to the retention date, NetWorker expires the save set and
identifies the save set as no longer required for recovery, or as eligible for recycling.
When the status of the save set is eligible for recycling, NetWorker removes the
information about the save set from the CFI, and you cannot perform a browsable
recovery of the save set data. Some applications, such as the NetWorker Module for
Databases and Applications, require that a save set is browsable to perform a recovery.
You can make expired save set files browsable for recovery by adding the save set
information back into the client file index.
Criterion Description
Client Name Type the name of the client that is associated with the save set.
Volume Select the volume on which the save set is stored from the list.
Pool Select the media pool for the volume on which the save set is stored from the
list.
Checkpoint ID Type the identifier of the checkpoint for partial save sets.
Copies To limit the save set results to the number of copies of the save set:
a. From the Copies list, select whether the number of copies is less than (>),
equal to (=), or greater than (<) a number that you specify.
Criterion Description
Save Time Select the start and end dates and times for the save time of the save set.
Clone Retention Select the start and end dates and times for the retention time of a cloned
Time save set.
Maximum Level Select the maximum level of the backup. Save sets that meet the selected
level and backups of levels below the selected level appear in the results.
Note
When the level value is anything other than full, ensure that you record the SSID and
Clone ID for the previous full backup and all level backups in between.
The following table summarizes some of the status attributes assigned to the save set
that are relevant to the process of adding save set information back into a CFI.
Status Definition
Browsable The save set is browsable. The save set has not exceeded the defined retention
policy.
Recoverable Information about the save set Information appears only in the media database.
NetWorker does not allow information about some save sets, for example the
bootstrap save set to appear in the CFI for browsing.
Recyclable The save set has expired is eligible for recycling. The save set has exceeded the
defined retention policy.
Incomplete The save set did not complete. NetWorker does not store save set information
about an incomplete save set in a CFI.
where:
l MM/DD/YYYY is the date that is chosen to make the save set browsable from.
l ssid/cloneid is the save set ID/cloneid.
For example:
When more than one SSID was recorded, repeat this step for all SSIDs.
When more than one SSID was recorded, repeat this step for all SSIDs.
When more than one SSID was recorded, repeat this step for all SSIDs.
2. Query the media database to confirm that the index save set for a client is
recoverable:
where client_name is the name of the client to which this save set is located.
3. Confirm that the value in the fl column is cr for an index backup with the time frame of
the client save set to be restored.
NOTICE
If the index save set is not recoverable, the save set expires when the NetWorker
software cross checks the indexes. For example, when the NetWorker server runs the
nsrim -X command.
where ssid is the associated save set id for the data you want to recover.
3. Use the information from the mminfo command for the save set to run the scanner
program. When the save set spans more than one volume, scan the volumes in the
order in which in which they were written:
where:
l mediafile is the starting file number for the save set, obtained from the mminfo
output.
l mediarec is the starting record number for the save set, obtained from the mminfo
output.
l device is the name of the device the volume is loaded in, for example /dev/
rmt0.1 or \\.\Tape0.
4. When the save set spans multiple volumes, the scanner program prompts for a new
volume as needed.
NOTICE
where:
l where client_name is the name of the client with the data to be recovered.
l MM/DD/YYYYis the backup date of the save set.
For example:
When you recover a client file index from a time and date in the past, nsrck adds the
full contents of the index from that time and date to a temporary subdirectory of the
client file index directory. When a time value is not specified, everything for the
specified date (up to 23:59) is included. After the index has been read from the
backup media, the required index data is integrated fully into the client file indexes
and the temporary subdirectory is removed. The “required index data” includes the
indexes from the date specified to the first full backup that occurred prior to the date
specified.
Be aware that if a saveset from the specified date runs into the next day, which would
be Nov 22, 2009 in this example, then the index required to browse the saveset will
not be recovered. To recover this index, you would have to specify Nov 22, 2009 as
the recovery date as shown in the following command:
A check on the required index date may be necessary if index backups are set to be
taken once daily. When the back up of the index does not take place until the
following day, the date of the following day must be specified.
3. Confirm that the client save sets are now browsable:
Browsable save sets contain a b, in addition to other values in the sumflags output.
For example:
NetWorker_install_path\nsr\bin>mminfo -q ssid=4294078835 -r
sumflags
cb
4. Perform a file-by-file recovery by using the NetWorker User program (Windows), the
recover command or the NMC Recovery Wizard.
Adding information about a save set in the client file index and media database
When a volume contains a save set that does not appear in the media database or client
file index, use the scanner command to restore save set information into the media
database and client file indexes.
Procedure
1. Log in as root or a Windows Administrator.
2. Load the first volume that contains the save set information into an available device.
Ensure the Idle Device Timeout value for the device is 0. Refer to Unmounting volumes
automatically (idle device timeout) on page 157 for details.
3. At the command prompt, run the scanner and specify the name of the device that
contains the volume:
scanner device_name
l To repopulate media database and CFIs with the save set information for all save
sets on the volume, type scanner -i device_name
l To repopulate the media database and client file index with the save set
information for a specific save set , type scanner -i -S ssid device_name
NOTICE
When the volume contains data from an earlier version of NetWorker, there may be
no pool information on the volume. In this case, the volume is considered to
belong to the Default pool. To assign the volume to another pool, use the -b
pool_name option in this step. When the volume already belongs to a pool, the -b
option will have no effect.
When an incorrect pass phrase or no pass phrase is entered, encrypted data is not
recovered. Instead, the file names are created without data. However, if unencrypted
data is also selected for recovery, it is recovered.
Note
When a drive letter is not present on the destination client, the drive appears with a
red question mark.
7. Select optional recover options. The following table summarizes the available
recovery options.
Recover Details
option
Change the The Recovery window appears with the latest version of the backup files.
browse time
To change the browse date and time for all files in the Recovery
window:
Click OK.
Recover Details
option
View all The Recovery window appears with the latest version of the backup files. When
versions of a you mark a file system object for example, a file or directory, you recover the last
selected file backup version. To view earlier versions of file system objects:
or directory
Highlight the file or directory that you want to review.
Search for file To search for file system objects in the defined browser time:
system
objects From the File menu, select Find.
Type the name of the file or directory. Use wildcards to expand the
search. Without wildcards, partial file names result in no match being found.
Relocate the By default, NetWorker recovers file system objects to their original location. To
recovered file relocate the files to a different location:
system
objects Select Options > Recover Options
For NDMP data restores, the target path is a string and must match
the path as seen by the NAS filer in its native OS. Otherwise, NetWorker
recovers the files to the original location and overwrites the existing file host
with the same name. EMC NetWorker Network Data Management Protocol (NDMP)
User Guide provides details about NDMP recoveries.
View volumes Before you start the recovery operation, monitor which volumes NetWorker
required for requires to recover the selected file system objects.
recovery
To view the required volumes, select
View > Required Volumes.
Ensure that the listed volumes are available or NetWorker to mount into an
available device.
Resolve name By default, the Naming Conflict window appears each time there is a file name
conflicts conflict during a recovery. To specify the method to automatically resolve all
name conflicts:
Recover Details
option
and so forth, to ~99_file name. When this fails, the recover process does not
automatically rename the file and prompts the user is to specify a name for
the file.
l Discard recovered file: Discards the recovered file and keeps the existing file.
l Overwrite existing file: Replaces the file on the file system with the recovered
version.
l Overwrite and replace a reboot: Replaces the file on the file system with the
recovered version after you restart the destination host.
8. Click Start to begin the recovery. It takes the NetWorker server a few moments to
recover the files, depending on file size, network traffic, server load, and tape
positioning. During this time, messages appear so that you can monitor the progress
of the recovery.
When the recovery is successful, a message similar to this appears:
NOTICE
When an error occurs while recovering Microsoft Exchange Server or Microsoft SQL
Server data by using VSS, you must restart the recovery process. When the recovery
fails due to a problem with VSS or a writer, an error message appears. Use the
Windows Event Viewer to examine the event logs for more information. VSS recovery
error messages are also written to the NetWorker log file.
authentication token to run the command. For example, if you run the command without
first running nsrlogin, NetWorker assigns the privileges to the user based on the
entries that are specified in the Users attribute of the User Group resource. When you use
nsrlogin to log in as a NetWorker Authentication Service user, NetWorker assigns the
privileges to the user based on the entries that are specified in the External Roles
attributes of the user Group resource. The EMC NetWorker Security Configuration Guide
provides more information.
For Windows hosts only, to ensure that you use the NetWorker recover.exe command
and not the Windows OS recover command, perform one of the following tasks:
l Ensure that NetWorker_install_path\bin appears before %SystemRoot%
\System32 in the $PATH environment variable.
l When you start the recover command include the path to the binary. For example:
NetWorker_install_path\bin\recover.exe.
Perform the following steps on the destination host in the data zone.
Procedure
1. Use the mminfo command to display information about the save set of the data that
you want to recover. For example, type:
mminfo -r volume,savetime,client,ssid,cloneid,name
The mminfo command provides you with information that you require to recover the
save set. For example, the name of the volume that contains the save set, the date
that the save set was created and the name of the pool that contains the volume.
NetWorker assigns each backup and clone save set the same save set ID (SSID) and
unique clone ID (cloneid). To recover from a clone volume, the name of the clone pool
is required.
2. Ensure that the volume which contains the save set is available for a device in the
datazone.
3. Use the recover command to select and then to recover the data from the backup
save set or the clone save set.
For example, type:
where:
l date is the date that NetWorker created the save set.
Note
When you do not specify a date, the recover command displays the latest
version of each file in the save set.
l source_host is the original data host.
Note
When you do not specify source host, NetWorker assumes that the source client is
the host where you run the recover program.
l destination_host is the host on which to recover the data.
l pool_name is the name of the pool that contains the volume. Use this option when
you want to recover data from a clone volume.
l - i_recover_option specifies how NetWorker handles a naming conflict
between a recovered file and an existing file.
n iN does not recover the file when a conflict occurs.
n iY overwrites the existing file when a conflict occurs.
n iR renames the file when a conflict occurs. The recover process appends a .R
to each recovered file name.
Note
The recover command requires the -i option when you use the -R option to
perform a directed recovery.
For example, to recover the data from a clone volume from a clone operation that was
performed on July 20, 2015, type:
Note
On Windows, to recover files or directories that begin with a dash (-) such as -
Accounting, try one of the following options:
l Type add ./-Accounting to recover the -Accounting file or directory and
its contents.
l Use the cd command to change directories to -Accounting. Type add . to
add the current directory and the directory contents for recovery.
l When the current directory is /temp and -Accounting resides in the /temp
directory, type add /temp/Accounting. This input adds -Accounting and
the contents of the directory to the recovery list.
c. To view the files or directory that you marked for recovery, type:
recover> list
d. To view the list of the volumes that NetWorker requires to recover the data, type:
recover> volumes
e. To recover the files to a location that differs from the original location, type:
recover> relocate path
When the recovery process completes, messages similar to the following appear:
Received 1 file(s) from NSR server `bu-idd-nwserver2'
Recover completion time: Tue Aug 21 08:33:04 2015
recover>
6. To close the recover program, type Quit.
l To recover data on a host with limited memory resources. A save set recovery requires
less memory than a browsable recovery.
NOTICE
Only members of the Windows Administrators group have permission to perform a save
set recovery.
Procedure
1. Open the NetWorker User program.
To recover data that was encrypted with the current AES pass phrase, no special
action is required. However, to recover data that was encrypted with an AES pass
phrase that is different than the current pass phrase,start the recover command
specify the -p pass_phrase. To enter multiple pass phrases with the -p option,
type: recover -p pass_phrase1 -p pass_phrase2 -p pass_phrase3.
NOTICE
When an incorrect pass phrase or no pass phrase is entered, encrypted data is not
recovered. Instead, the file names are created without data. However, if unencrypted
data is also selected for recovery, it is recovered.
Recover Description
option
Specify file By default, NetWorker recovers all selected files and directories.
system
To recover only certain file system objects in a save set:
objects
Click Files...
Specify the files and directories to recover, one full path per line.
Click OK.
View required Before you start the recovery operation, monitor which volumes NetWorker
volumes requires to recover the selected file system objects.To view the required
volumes, select Required Volumes.
Ensure the listed volumes are available for NetWorker to mount into an
available device.
Recover Description
option
Relocate the By default, NetWorker recovers file system objects to their original location. To
recovered file relocate the files to a different location:Select Recover Options.
system
objects In the Relocate Recovered Data To field, type the full path of the
directory where the data should be relocated and then click OK.
For NDMP data restores, the target path is a string and must match the
path as seen by the NAS filer in its native OS. Otherwise, the recover
process uses the original location and overwrites existing files with the
same name. EMC NetWorker Network Data Management Protocol (NDMP) User Guide
provides details about NDMP recoveries.
Resolve name By default, the Naming Conflict window appears each time there is a file name
conflicts conflict during a recovery. To specify the method to automatically resolve all
name conflicts:
8. Click OK to begin the recovery. The NetWorker server takes a few moments to start the
file recovery, depending on file size, network traffic, server load, and tape positioning.
When NetWorker starts to recover the files, messages appear that enable you to
monitor the progress of the recovery.
When the recovery is successful, a message similar to the following appears:
Received 1 file(S) from NSR server server Recover completion
time: Tue Jan 21 08:33:04 2009
interactive mode to recover data when you know the path to recover and you do not need
to browse through the directory contents of the save set. NetWorker only supports a local
save set recover. You cannot perform directed recover by using a save set recover.
Before you begin
The recover command requires specific privileges which are assigned based on
session authentication. NetWorker supports two types of session authentication. Token-
based authentication, which requires you to run the nsrlogin before you run the
command and authenticates the user that runs the command against entries that are
defined in the External Roles attribute of a User Group resource. Classic authentication,
which is based on user and host information and uses the user attribute of a User Group
resource to authenticate a user. Classic authentication does not require an
authentication token to run the command. For example, if you run the command without
first running nsrlogin, NetWorker assigns the privileges to the user based on the
entries that are specified in the Users attribute of the User Group resource. When you use
nsrlogin to log in as a NetWorker Authentication Service user, NetWorker assigns the
privileges to the user based on the entries that are specified in the External Roles
attributes of the user Group resource. The EMC NetWorker Security Configuration Guide
Procedure
1. Connect to the target host with the root account on UNIX or the Administrator on
Windows.
2. Use the mminfo command to display information about the save set of the data that
you want to recover.
For example, type: mminfo -av -r
volume,savetime,client,ssid,cloneid,name
Output similar to the following appears:
The mminfo command provides you with information that you require to recover the
save set. For example, the name of the volume that contains the save set and the date
that the save set was created. NetWorker assigns each backup and clone save set the
same save set ID (SSID) and unique clone ID (cloneid).
3. Ensure that the volume which contains the save set is available for a device in the
datazone.
4. Use the recover command to recover the data from the backup save set or the clone
save set.
Note
To perform concurrent recoveries from an advanced file type by either using multiple -
S options to identify multiple save sets, or starting multiple recover commands.
l To recover the all the data from a backup save set, type the following command:
where:
n ssid is the SSID of the backup save set.
n - i_recover_option specifies how NetWorker handles a naming conflict
between a recovered file and an existing file.
– iN does not recover the file when a conflict occurs.
– iY overwrites the existing file when a conflict occurs.
– iR renames the file when a conflict occurs. The recover process appends
a .R to each recovered file name.
For example:
recover -S ssid/cloneid
where:
n ssid is the SSID of the backup save set.
n clonied is the cloneid of the clone save set.
For example:
recover -S 3644194209/1362493448
Note
When you do not specify the cloneid of the save set, the recover command
recovers the data from the backup save set.
l To recover a single directory from the clone save set and relocate the data to a new
directory location, type the following command:
where:
n ssid is the SSID of the backup save set.
n cloneid is the cloneid of the clone save set.
n destination_dir is the location to which you want to recover the data.
n original_dir is the directory that is contained in the save set that you want to
recover.
For example, to recover the directory /var/adm on the backup save set to
the /usr/mnd directory, type the following command:
recover -S 3644194209/1362493448 -d /usr/mnd /var/adm
l To recover data that was encrypted with the current AES pass phrase, no special
action is required. However, to recover data that was encrypted with an AES pass
phrase that is different than the current pass phrase,start the recover command
specify the -p pass_phrase. To enter multiple pass phrases with the -p option,
type: recover -p pass_phrase1 -p pass_phrase2 -p pass_phrase3.
NOTICE
When an incorrect pass phrase or no pass phrase is entered, encrypted data is not
recovered. Instead, the file names are created without data. However, if
unencrypted data is also selected for recovery, it is recovered.
NOTICE
You cannot use the scanner command recover data from a NetWorker Module, NDMP or
DSA save set.
Procedure
1. Optionally, use the nsrlogin command to authenticate a user and generate a token
for the
Using nsrlogin for authentication and authorization on page 65 provides more
information.
2. Ensure the value in the Idle device timeout attribute of the device that contains the
volume is 0. Unmounting volumes automatically (idle device timeout) on page 157
provides more information.
3. Use the mminfo program to query the media database for save set information.
For example:
4. Use the save set information from the mminfo command to run the scanner
program:
l To recover all files in a save set on Windows, type:
where:
n ssid specifies the save set ID value that you obtained from the mminfo output.
n mediafile specifies the starting file number of the save set that you obtained
from the mminfo output.
n mediarec specifies the starting file record number of the save set that you
obtained from the mminfo output.
n device is the name of the device that contains the volume. is the name of the
device the volume is loaded in, for example /dev/rmt0.1 or \\.\Tape0
n path is the path on the NetWorker host that contains the uasm binary.
For example, on Windows:
C:\Program Files\EMC NetWorker\bin
where:
l source_dir is the directory where the data resided during the backup.
l dest_dir is the directory where the data is relocated during the recovery.
l filename is the name of the file or directory to recover.
Recover a complete save set on UNIX
To recover all files in a save set on UNIX, type:
The EMC NetWorker Command Reference Guide or the UNIX man pages provide more
information about the scanner program.
Note
The EMC NetWorker Online Software Compatibility Guide provides more information about
operating systems support for Windows BMR.
The first time NetWorker performs a backup of the DISASTER_RECOVERY:\ save set,
NetWorker performs a level Full backup, regardless of the level that is defined for the
backup.
When you configure a level Incremental backup of the DISASTER_RECOVERY:\ save
set, NetWorker backs up some components of the save set at a level Full, and other
components at an Incremental level.
The following table summarizes the backup level of each save set component of the
DISASTER_RECOVERY:\ save set, when you perform an incremental backup:
During an incremental backup, the backup operation checks both the modification time
and the archive bit to determine if a file must be backed up. The backup operation
ignores the archive bit when you assign the nsr_avoid_archive variable a value of Yes on
the client host. As a result, NetWorker only uses the modification time to determine which
files to back up.
Use the environment variable nsr_avoid_archive with caution. If you use the environment
variable nsr_avoid_archive, test the BMR backup image to ensure that you can recover the
Windows system state correctly. Performing a BMR recovery to a physical computer on
page 507 provides more information on validating the BMR backup image.
A Windows BMR recovery requires a successful backup of each component save set in
the DISASTER_RECOVERY:\ save set. If one component of the save set fails, then the
backup operation fails. For a scheduled backup, NetWorker retries the
DISASTER_RECOVERY:\ backup. The number of retries that NetWorker performs is
based on the value that is defined in the client retries attribute of the protection group
that the Client resource is assigned to.
Note
In NMC Administration GUI, the Log tab of the Monitoring window, or the Save Set tab of
the Media window displays each component save set of a DISASTER_RECOVERY:\
backup.
Before backing up the WINDOWS ROLES AND FEATURES save set, consider the
following:
l Block Based Backups (BBB) do not support the WINDOWS ROLES AND FEATURES
save set.
l You cannot restore the WINDOWS ROLES AND FEATURES save set simultaneously
with data from a file system backup. If you must recover data from both the WINDOWS
ROLES AND FEATURES backup and a file system backup, restore the file system
data first, and then restore the WINDOWS ROLES AND FEATURES data.
l The NetWorker software automatically backs up AD as a component of the WINDOWS
ROLES AND FEATURES save sets. An AD backup or restore includes the AD log
files, database, patch files, and expiry token.
l You can perform an online recovery of the WINDOWS ROLES AND FEATURES save
set to recover the Active Directory, DFSR, or Windows Server Failover Cluster services.
The topicOnline recovery of Active Directory, DFSR, or Cluster services on page 358
provides more information.
l If you cancel a deduplication recovery, the state of the recovered data is not reliable
and may contain corrupted data. To ensure that the recovery is correct, restart the
deduplication recovery process.
l The backup operation will only confirm that the VSS System Writer exists on the
target host. If the backup operation does not detect the writer, the backup of the
DISASTER_RECOVERY:\ or ALL save set fails. The backup operation does not track
and report any other missing VSS writers.
l You can perform a component level granular restore of the WINDOWS ROLES AND
FEATURES save set with a command line recover or the NetWorker User application.
For example, you can recover the system state and replication folders separately. You
cannot use the NMC Recovery UI to perform a component level restore.
l Do not restore the WINDOWS ROLES AND FEATURES system state multiple times
in succession without restarting the computer as required. If you do not restart the
computer, you can put the system in an unreliable operational state.
Note
The NetWorker 8.2 and later clients can only recover WINDOWS ROLES AND FEATURES
save sets. If you try to recover a VSS System State save set that was created with a
NetWorker 8.0 SP1 client or earlier, then the Windows host will not function correctly. To
recover VSS system state save sets that are created with a NetWorker 8.0 SP1 or earlier
backup, use the NetWorker 8.0 SP1 or earlier client to create a backup. EMC recommends
that you restore the WINDOWS ROLES AND FEATURES save set from a NetWorker 8.1
or later backup.
l NetWorker uses the following path pattern to backup the UEFI partitions:
\\<root>\Device\HarddiskVolume#
where # is the number of the volume.
l The DISASTER_RECOVERY \: save set contains a backup of the UEFI partitions.
l NetWorker always performs a level Full backup of UEFI partitions, regardless of the
backup level of the DISASTER_RECOVERY \: save set.
l NetWorker does not index the UEFI partitions or make the UEFI partitions available for
online recoveries.
After a successful BMR restore, a host that uses UEFI might fail to start. This can occur
when the UEFI boot manager does not have a valid Boot Order entry, for example, when
you delete the Boot Order entry or restore the Windows BMR backup to different
hardware. In these situations, the operating system recreates the Boot Order entry during
a restart operation but may not use the same path.
To resolve this issue, load Boot Manager and select Boot from the File menu to correct
the Boot Order entry.
NOTICE
EMC recommends that you detach the physical disks that Storage Spaces use when you
recover critical volumes, and then reattach the physical disks after recovery. A Window
BMR recovery operation can overwrite data on attached Storage Spaces disks.
The topic Windows Storage Pools considerations on page 366 describes how to perform a
Windows BMR recovery of Storage Spaces to a new computer.
NOTICE
To backup and recover data on virtual hard disks and volumes created by Storage
Spaces, use NetWorker file system backup and recovery operations.
A Windows BMR backup of a Windows 2012 host creates a file that is named
OSSR_sysinfo.xml. The file is located at [root]\EMC NetWorker\nsr\tmp. This
file captures pertinent information about the configuration of the backed up host. For
example:
l Host information (name, boot drive, BIOS or EFI).
l NIC cards and their parameters.
l Disk information.
l Storage Spaces information.
The purpose of this file is to support the manual recreation of the Storage Spaces
configuration following a BMR recovery.
The save set attribute of the Client resource contains the ALL save set and the backup
schedule includes a synthetic full backup on Sundays. The NetWorker client host has four
volumes: two are critical, and two are non-critical.
The save set attribute of the Client resource contains a list of all volumes and the backup
schedule includes a synthetic full backup on Sundays. The save set attribute does not
contain the DISASTER_RECOVERY:\ save set. The NetWorker client host has four
volumes: two are critical, and two are non-critical.
Note
Verify whether the source critical volumes are part of a larger physical disk. If critical
volumes are on a larger physical disk, all target critical volumes must be large enough
to accommodate the entire underlying physical disk. Use the Windows Disk
Management utility to verify disk configuration and size.
l The number of disks on the target host is greater than or equal to the number of disks
there were on the source host. The disk LUN numbering on the target host must
match the disk LUN numbering on the source host.
l The RAID configuration on the target host should match the disk order of the hard
disks.
l The disk or RAID drivers that are used on the source system are compatible with the
disk or RAID controllers in the target system. The recovery process restores the
backup to the same logical disk number that was used by the source host. You
cannot restore the operating system to another hard disk.
l Windows BMR supports IDE, SATA, or SCSI hard disks. You can make the backup on
one type of hard disk and recover on another type of hard disk. For example, SAS to
SATA is supported.
l The target system can access the Windows BMR image as a bootable CD/DVD volume
or from a network start location.
l The target system has the NIC or storage device drivers installed that match the NIC.
Note
All NIC or storage device drivers must not require a restart to complete the driver
installation process. If the drivers require a restart, then the BMR recovery process
fails and prompts you to install the drivers again.
A host that is a l Specify the ALL save set in l Use the Windows BMR Wizard to
Microsoft Application the Save set attribute in the recover the data contained in the
server. For example, NetWorker Client resource. DISASTER RECOVERY:\ save
a Microsoft Exchange set.
Server, Microsoft SQL l Use NMM to back up the
Server, Hyper-V, or application databases. The l Use NMM to recover the
Microsoft SharePoint NMM provides details. application databases.
Server
NOTICE
Do not mix critical and non-critical volumes on the same physical disk.
Note
Windows BMR does not support FAT and FAT32 file systems as critical volumes.
Note
EMC recommends that you test your BMR solution before a disaster recovery is required.
l You cannot recover data from an optimized and unoptimized deduplication backup
when VSS is disabled. The backups that NetWorker created are corrupt.
l You cannot cancel the recovery of an optimized deduplication backup to a
deduplication volume. If the recovery process is interrupted or fails, the destination
volume becomes unusable. You must repeat the recovery process and the recovery
operation must complete successfully to prevent volume corruption.
l If the optimized deduplication recovery cannot successfully complete, you can
perform a selected files restore of directories from the optimized deduplication
backup. This restores the directories' files to a rehydrated state, but will take
significantly more time.
where:
save_set1 or save_set2 are unique save set names, such as a drive letter (f:\) or mount
point (n:\mountpoint).
Monitoring save operations
When you monitor Windows BMR save operations, for example, by using the NetWorker
Administration > Monitoring > Sessions window, you might notice that the number of
save sessions differ from the number of save sets that appear in the Save set attribute of
the Client resource. This is because NetWorker optimizes Windows BMR backups to
generate the correct number of Windows BMR backup sessions and save sets.
Cloning considerations
To clone a Windows BMR backup, ensure that you clone all of the critical volumes,
DISASTER_RECOVERY:\, and WINDOWS ROLES AND FEATURES save sets that were
created during the backup operation. While you can clone individual save sets, you
cannot perform a successful BMR recovery unless you recover each save set that the
backup operation created.
To ensure that you clone all of the BMR save sets, review the following information before
you start a clone operation:
l When you use the automatic clone, you enable the Clone attribute on the group
resource that contains the BMR client. The automatic clone operation will clone all of
the required save sets after the scheduled backup operation completes.
Note
Synchronize the NetWorker server and client host clocks before the backup operation
to ensure that all of the save sets are cloned.
l When you use the nsrclone command to perform a manual clone, ensure that you
include the ssid/cloneid for each save set. Use the mminfo or nsrinfo -v
command to report all save set back ups that occurred for the Windows client during
the save session. The Command Reference Guide provides detailed information about
using the mminfo and nsrinfo commands.
l When you use the schedule clone function, do not filter on other attributes such as
save set name. Filter only by client name. When you enable automatic cloning for a
backup group that contains the DISASTER_RECOVERY:\ save set, synchronize the
clocks on the NetWorker server and client host clocks across the network to ensure
that NetWorker clones all save sets.
Security considerations
This section describes security issues related to planning Windows BMR backup and
recovery .
NetWorker Strong Authentication and Windows BMR recoveries
This topic describes how to use NetWorker strong authentication.
When you recover a Windows client that uses NetWorker strong authentication
(nsrauth) to communicate with other NetWorker hosts, communications with the
NetWorker server may fail after a Windows BMR recovery. When you perform a Windows
BMR recovery for a host that uses nsrauth authentication only, the Windows PE image
does not have the nsrauth credentials file that the original client used and the NetWorker
server will refuse to allow the recovery operation to complete.
To resolve this issue, before you perform the BMR recovery perform one of the following
tasks:
l Delete the NSR Peer Information resource for the NetWorker client from the NSRLA
database on the NetWorker server. This will cause the NetWorker server to create a
new NSR Peer Information resource for the client.
Note
After the recovery operation and the client reboot completes, the client will attempt to
use the original credentials to authorize communication with the NetWorker server,
and the server will refuse communications. To resolve this issue, delete the NSR Peer
Information resource for the Windows client from the NSRLA database on the
Windows host. Deleting the NSR Peer Information resource in the EMC NetWorker
Security Configuration Guide provides more information.
l Modify the authentication method that the NetWorker server uses to communicate
with the Windows host, to ensure that communication attempts use oldauth. EMC
NetWorker Security Configuration Guide provides more information.
Note
After the recovery operation and the client reboot completes, modify the
authentication method that the NetWorker server uses to communication with the
Windows host back to the original value.
1. Perform a NetWorker Windows BMR backup. If required, backup user data on the SQL
client.
2. Use NMM or a third-party backup application to back up the SQL Server application.
3. Perform a NetWorker Windows BMR recovery operation.
After the recovery and restart operations complete, you cannot start the SQL Server
service. Also, any server roles that store data in SQL databases outside WID will not
work.
4. For non-clustered SQL servers only, ensure that the SQL group is offline.
5. Run the following setup.exe command from a command prompt with elevated
privileges, to rebuild the SQL Server:
Note
The EMC NetWorkerModule for Microsoft Applications Application Guide provides more
information about using NMM to recover SQL databases.
group=Administrators,host=<recovering_host>
user=administrator,host=<recovering_host>
user=system,host=<recovering_host>
where recovering_host is the name of the host that you are performing the BMR to.
Note
A BMR treats the AMD and Intel processors as equivalent if they follow the same
architecture. For example, you can recover the operating system from the backup of AMD
x64 computer to an Intel x64 computer.
2. Browse to the location of the downloaded NetWorker Windows BMR image, and then
complete the steps that are required to create a bootable CD/DVD with the image.
Enabling a protected host to boot from a CD/DVD
Procedure
1. Start the host, and then start the BIOS setup program, by pressing F2.
NOTICE
If you are restoring either from or to a virtual host such as a VMware virtual machine,
you can set up options such as the host boot location within vSphere. The VMware
documentation provides specific steps.
2. Select the boot options menu, and then ensure that the CD/DVD boot option is at the
top of the list of locations from which to boot.
3. Save the changes, and then exit the BIOS program.
Note
If you are restoring to a virtual host such as a VMware virtual machine, you can set up
options such as the host boot location within vSphere. The VMware documentation
provides specific steps.
2. Select BIOS options necessary so that the network boot option is enabled.
The BIOS documentation provides more information.
NOTICE
The selected driver cannot require a restart operation because the recovery process
loads the WinPE environment in memory only and changes are not persistent after a
restart operation.
c. In the Configure desired IP Settings field, choose the tab for the Network Protocol
deployed on the network, either IPv4 or IPv6.
d. In theTCP/IP Address settings section, select either Obtain an IP address
automatically (DHCP) or Use the following IP Address.
e. If you choose Use the following IP Address, type the IP address in the IP address
field.
If applicable, type the subnet mask in the Subnet mask field, and then type the
default gateway in Default gateway field.
f. In the DNS Server section, select either Obtain DNS server address automatically
or Use the following DNS server address:
l If you choose Use the following DNS server address, type the IP address of the
DNS server in the Preferred DNS server field.
l If applicable, type an alternate DNS server address in the Alternate DNS server
field.
NOTICE
If you added the NetWorker server hostname and IP address to the X:\Windows
\System32\Drivers\etc\hosts file, you can ignore the DNS Server
fields.
g. Click Next.
The Available Disks screen displays all detected local disks.
6. If the Windows BMR wizard fails to detect a disk, perform the following steps:
a. Select Load Driver.
b. Browse to the location that contains the disk driver, and then load the required
disk driver.
c. To update the list of detected disks, select Refresh.
d. Click Next.
7. On the Select NetWorker Server screen, complete the fields:
a. In the Server field, specify the NetWorker server that performed the backup:
l Select the NetWorker server from the server list. To update the list of NetWorker
servers, click Search. The Search function locates only those NetWorker servers
on the local subnet.
c. Click Next.
8. On the Select Bare Metal Recovery Backup screen, select the system backup that you
want to recover, and then click Next.
System backups appear in descending order from most recent to oldest.
9. Review the Save Sets to Restore screen, and then click Next.
The recovery process reformats critical volumes. The recovery process reformats non-
critical volumes only if the disk signature on the target disk differs from the original
disk.
For example, to perform a quick format instead of a full format operation if the disk
was replaced, select Perform a quick format of disks.
Note
A quick format is much faster than full format but does not verify each sector on the
volume.
The recovery process does not recover non-critical volume data. Recovering file
system data on page 511 provides more information.
10. On the Bare Metal Recovery Summary screen, select Options to display the Non-
Default Recover Options screen.
11. On the Non-Default Recover Options screen:
a. In the Additional Options field, type any required non-default options with their
corresponding values.
Non-default options are primarily used for troubleshooting purposes.
b. To save and close the Non-Default Recover Options screen, and then return to the
Bare Metal Recovery Summary screen, click OK.
c. To begin the recovery process, click Restore.
12. On the Confirmation screen, select the I confirm that I want to format the disks and
restore the backup option, and then click OK.
NOTICE
All data is lost on all volumes that the recovery process reformats.
After the data recovery completes, the wizard writes the recovery log files to volumes
in the backup media pool being used. If you do not have a volume available, then the
recovery operation appears to be unavailable until media for the media pool becomes
available.
Note
You can cancel the log file backup without affecting the recovery operation.
13. After the wizard and log files complete, click either Reboot or Exit:
l To restart the system when any subsequent application data resources must be
performed, click Reboot. If you are recovering an Active Directory domain
controller, it is recovered in non-authoritative mode by default.
l If you must recover a domain controller in authoritative mode, click Exit. The
computer returns to the WinPE command prompt. Start into Directory Services
Restore Mode (DSRM). See Performing post recovery tasks for active directory
services on page 511 for more information.
Post-recovery tasks
The following sections provide information about recovering data that was not recovered
in the Windows BMR operation.
Using NMM for post-recovery tasks
If the recovered host has applications that are protected with NMM, all application-
recovery operations must be performed by using the NMM client interface. The NMM
documentation provides information on the post-recovery operations.
Before reviewing the NMM documentation, ensure that the following conditions are met:
l After the recovery has completed and the system is rebooted, check the host’s disk
and volume configuration. All disks and volumes should appear as they did on the
original system. However, if disk signatures do not match the original disks, non-
critical disks might be offline or unmounted. Use Microsoft Disk Manager to bring
online or mount the disks. After the disks are online, a reboot operation should result
in disk drive letter reassignments. If these correct drive letter assignments do not
occur, manually assign drive letters to non-critical disks as needed. Non-critical
volumes that are accessed by mount points might have similar issues.
l To recover the host, perform additional online recovery of any required user data on
non-critical volumes by using the NetWorker User program.
l If a folder is encrypted in Windows, for example, by selecting Folder Properties >
Advanced > Encrypt contents to secure data, it is recovered as encrypted. However,
the encryption attribute is not be set on the folder. You can manually reset the
encryption attribute after the recovery operation. This task is a Microsoft limitation.
l Windows BMR supports backup and recovery of files and folders encrypted with
Windows Encrypting File System (EFS), and volumes encrypted with BitLocker. After
BMR, the EFS or BitLocker services might be running but the EFS encryption attributes
on files or folders must be re-enabled and BitLocker volumes must be re-encrypted.
For steps to encrypt with EFS and BitLocker, consult Microsoft documentation.
NOTICE
You cannot install the NetWorker software on volumes that are encrypted with
Microsoft BitLocker.
l Recover any required file system data by completing the steps in the topic,
Recovering file system data on page 511.
l Recover the application data by using the application backup tool, such as NetWorker
User for SQL Server, NME, or any third-party application backup tool. Refer to the
documentation that your application backup tool includes.
Recovering file system data
Perform an online recovery of any required user data on non-critical volumes. Sometimes,
user data on non-critical volumes must be recovered, for instance, when disk hardware
was replaced due to a disaster before the Windows BMR operation.
Procedure
1. Manually remount any non-critical volumes as needed.
2. To connect to the NetWorker server that backed up the source client data, start the
NetWorker User program by using the winworkr command with the -s option.
For example: winworkr -s server_name
If the -s option is not used and there is only one server that is detected, that server is
connected automatically. If there are no servers that are detected or if there is more
than one server available, the Change Server dialog box appears, allowing you to
choose the server.
NOTICE
Do not select Reboot in the wizard. Failure to start into DSRM mode results in a non-
authoritative recovery. If you select Reboot, perform one of the following:
l On restart, start the system in the WinPE operating system instead of the restored
operating system.
l Run the Windows BMR wizard again and ensure that you select Exit.
The numbers and dashes in the previous message form a Globally Unique
Identifier (GUID) that identifies a new entry. In this example, the GUID is for
illustration purposes only. The actual GUID that is generated when you run the
command is unique.
b. To set the safeboot option for the bootloader entry in the BCD store, type the
following command using the generated GUID:
Note
NTDSUTIL: ?
For example:
7. Exit the ntdsutil utility by typing quit at each successive ntdsutil prompt until
the command prompt appears.
8. Type the following command at the WinPE command prompt so that the host does not
start into DSRM mode on restart.
9. Restart the domain controller in normal mode, log in, and then verify that the
authoritative changes are replicated to the Active Directory replication partners.
Performing post-recovery tasks for hosts with Windows server roles that use SQL Server
Procedure
1. On the target host, rebuild the SQL server by running the following Setup command:
The Setup tool is located on the SQL Server installation media and must be run from
the command prompt with Windows Administrator privileges. Before you run this
command, ensure that the SQL group is offline except for the shared disks.
https://msdn.microsoft.com/en-us/library/ms189302
For VMware hypervisors, use either a Windows Server 2008 (32-bit or 64-bit), 2008 R2
(64-bit), or Windows Server 2012 (64-bit) templates as the guest operating system
when you create the VM.
3. On the VM, start the WinPE ISO which starts the BMR wizard.
4. On the VM, use the BMR wizard to configure the hostname and network configuration:
a. On the Select NetWorker Server screen, specify the name of the physical computer
as the NetWorker client.
b. On the Save Sets to Restore screen, review the selected items to restore, and then
click Next.
c. On the Select Bare Metal Recovery Backup screen, select the backup to restore.
Backups are listed in chronological order with the most recent backup first.
d. On the Summary screen, if the save set was created with NetWorker 8.1 or earlier,
select the Restore physical computer to virtual machine (P2V) checkbox.
If the Restore physical computer to virtual machine (P2V) checkbox is not marked,
the VM might not start successfully after the restore is complete.
l WinPE_Wizard.log
To view the following log files, use the nsr_render_log program:
l Ossr_director.raw
l winpe_nw_support.raw
For example, to display the Ossr_director.raw file, type the following command
at a command prompt:
nsr_render_log "C:\logs\Client-bv1\Ossr_director.raw"
To direct the Ossr_director.raw file to a text file that can be viewed in a text
editor, type the following:
wpeutil DisableFirewall
By default, the Windows firewall is enabled on WinPE, and this action blocks the FTP
port from transferring files.
4. To move the log files to another NetWorker host, use the FTP utility.
Accessing log files using a directed recovery operation
Procedure
1. To connect to the NetWorker server that backed up the source client data, start the
NetWorker User program by using the winworkr command with the -s option:
winworkr -s server_name
If the -s option is not included, and there is only one server that is detected, that
server is connected automatically. If there are no servers that are detected or if there
is more than one server available, the Change Server dialog box appears, enabling
you to choose the server.
Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 has 100
MB reserved as the System Reserved Partition. When backing up the system state, VSS
includes the System Reserved Partition (used for BitLocker and Boot files), but the
backup fails because the System Reserved Partition is offline. This can occur if the
Windows automount capability is disabled. Although there are circumstances where the
automount capability must be disabled, it can result in the partition being offline after a
restart. Automount must be enabled for a BMR backup to succeed.
To work around this issue, use either of the following solutions:
Solution 1
From the command prompt, run DISKPART with the following commands:
DISKPART
List volume
If automount is disabled while using third party storage software or if the user manually
disabled the automount for the volume, the volumes can go offline.
This Microsoft KB article 2419286, available at http://support.microsoft.com/kb/
2419286, provides details on preventing volumes from going offline by checking and
setting the system automount attribute.
Solution 2
From the Disk Management console:
1. Access Disk Management from the command prompt:
C:\>Diskmgmt.msc
2. To bring the disk online, assign the drive letter to the 100 MB partition:
a. Right-click the 100 MB volume, and then select Change Drive Letter and Paths.
b. Assign a new drive letter to the volume.
Assigning the drive letter ensures that the volume are online after a restart.
l Verify that the NetWorker server was correctly specified in the Select NetWorker
Server screen.
To verify hostname and IP address values, use the ping utility that is in the WinPE
environment:
1. Exit the NetWorker Bare Metal Recovery wizard but do not restart the host.
You are returned to the WinPE command line.
2. To locate, and then verify hostnames and IP addresses, use the ping utility. For
example:
ping -a hostname
Note
After the wizard has been restarted, you can switch between the wizard and the
WinPE command line without exiting the wizard.
This message is an indication that the NIC selected by the wizard is not the NIC that was
connected to the NetWorker server when the backup was performed and the NIC might
not have connectivity to the server. This applies when searching for an available server or
specifying a specific server. To resolve the issue, select another NIC.
http://support.microsoft.com/kb/980794
The patch that is mentioned in this knowledgebase article is most likely on the Windows
system if it is up-to-date. In this case, you can create and populate the Registry keys as
described in the article.
This issue is most often encountered when backing up a passive node in an MSCS cluster
and a critical volume is not on the physical host of the passive node but is instead on the
physical host of the active node.
The workaround is to run nsradmin from the command line with the following
parameters:
nsradmin -S <jobsdatabse path>
Entry Result
-D x Additional troubleshoot information is in the Windows BMR log
files.
where x is a number from 1 to
9, with 9 providing the most
troubleshoot information and 1
providing the least.
recover -s <NetWorker When the restored data is meant to override the data on other
server> -U -N "WINDOWS nodes, it should be restored using the authoritative mode. Once
this data is restored to one of the nodes, it is propagated to the
Entry Result
ROLES AND FEATURES other nodes and overwrites any newer data on those nodes.
\Cluster Database" Perform Authoritative restore by using the command on the left.
Cluster
SolVe Desktop provides procedures that describe how to recover this service.
NetWorker does not support the online recovery of any other Windows service that the
WINDOWS ROLES AND FEATURES save set contains. Unsupported online recovery of
WINDOWS ROLES AND FEATURES components results in an inconsistent state of the
Windows server.
NOTICE
When you perform an online recovery, you cannot mark the WINDOWS ROLES AND
FEATURES save set and use the Required Volumes option. To determine the volume that
contains the WINDOWS ROLES AND FEATURES save set that you want to restore, mark
the DISASTER RECOVERY:\ save set, then use the Required Volumes option. After you
determine the required volumes, unmark the DISASTER RECOVERY:\ save set and
mark the WINDOWS ROLES AND FEATURES save set.
NOTICE
The NetWorker Save Set Recovery feature does not support recovery of mount points. To
recover mount points and their data, use these special procedures. Recovering a mount
point and its data
Procedure
1. Manually create the mountpoint, if it does not exist already.
2. Start the NetWorker User program and recover the data under the mount point.
Results
Using the NetWorker User program on page 463 provides more information about
performing data recoveries.
NOTICE
When you recover from a save set ALL backup, the recovery operation automatically
recovers the DHCP and WINS, and these procedures are not required.
Microsoft documentation describes how to use the Microsoft WINS administrative tools
to recover the databases.
Procedure
1. Use the NetWorker User program to recover the backup configured in the WINS
backup procedure. DHCP and WINS databases on page 337 provides more
information.
2. Use Microsoft WINS administrative tools to restore the WINS database.
Recovering DFS
Review this section for information about how to recover DFS.
Restoring a DFS
Restore DFSR through the WINDOWS ROLES AND FEATURES save set.
Procedure
1. Restore the DFS topology information:
l To restore a domain-based system, restore the WINDOWS ROLES AND
FEATURES save sets on the domain controller.
2. On the DFS host server:
Note
You cannot restore individual DFS links. If the DFS root has lost a link, restore the
entire DFS root in which that link resided.
$ recover -s NetWorker_server
Note
If you do not specify the -s NetWorker_server option, the save command contacts the
NetWorker server that is defined in the /nsr/res/servers file.
c. Optionally, to automatically overwrite existing files, use the force option at the
recover prompt.
d. To start the recovery operation, type recover:
recover> recover
NOTICE
Do not recover any OS-X operating system start files. For example, do not recover
the OS-X operating system kernel, /mach_kernel.
l When you close the NetWorker Recover GUI, subsequent recover operations will
connect to the last NetWorker server selected, by default. To change the NetWorker
server, perform one of the following steps:
n In the SERVERS section on the side bar, select the NetWorker server, then click
Connect.
n On the Go menu, select Connect to Server. The Connect to Server dialog appears.
After you successfully connect to a NetWorker server, the NetWorker Recover window
appears.
Recovering files and directories by using the NetWorker Recover GUI 525
Recovery
Note
The Clients filter bar, located above the list of client names, enables you to filer the client
list by operating system. For example, select All to show all clients of the NetWorker
server, or select OS-X Clients to display OS-X hosts.
Note
To show hidden files, from the View menu, select Show Hidden Files.
Recovering files and directories by using the NetWorker Recover GUI 527
Recovery
l To perform a save set recover, on the side bar in the SAVE SETS section, select a
save set. NetWorker Recover queries the media database and displays each
instance of the save set, including cloned save sets.
Note
The Save Sets filter bar, located above the list of save sets enables you to filer the
save set list by save set type. For example, to show all the original save set
instance, select Save Sets s or to display cloned save set instances, select Cloned
Save Sets.
When you select an object in the Search Result view, NetWorker Recovery displays the
path to the object in the Status bar at the bottom of the browser view.
3. To display information about an object, right-click the object, and select Get Info.
4. To mark objects in the browser view for recovery, select the checkbox next to each
object that you want to recover. You can only mark one save set or clone instance at a
time.
NetWorker Recover adds each item that you mark to the RECOVERY SETS section on
the side bar. A number appears next to each recovery set in the sidebar, which
represents the total number of items that are selected for recovery.
5. To view or select different versions of a marked file, perform the following steps:
a. Right-click the file and select File Versions. The Versions side bar appears. The
following figure provides an example of the Versions side bar.
6. To review a summary list of the marked files, in the RECOVERY SETS section on the
side bar, perform one of the following actions:
l Select Files to display a list of objects that you marked for a browsable recovery.
l Select Save Sets to display a list of objects that you marked for a save set
recovery.
The Recover Files browse view displays a list of marked files and the list of
volumes that the recovery operation requires.
7. To view the status of the required volumes, click Volume Status. Ensure that the
status of the required volume indicates online, then close the dialog box.
8. To start the recover operation, click the Recover button in the toolbar. The Recover
window appears.
9. In the Recover window, select the recovery options.
l To recover the objects to a directory that differs from the original location, perform
one of the following actions:
n In the Relocate files to field, type the path on the destination host to recover
the data.
n Click Browse and select the target directory.
l Select a conflict resolution option:
n Rename the recovered file — By default, the recover operation appends a tilde
(~) to the beginning of the name of the recovered file ~file_name. When a file
named ~file_name already exists, the recovered file is renamed ~00_file_name,
and so forth, to ~99_file_name. When this fails, the recover process does not
automatically rename the file and prompts the user is to specify a name for the
file.
n Discard recovered file — Discards the recovered file and keeps the existing file.
n Replace local file — Replaces the file on the file system with the recovered
version.
Recovering files and directories by using the NetWorker Recover GUI 529
Recovery
n Prompt me for an action — Each time the recovery operation encounters a file
or folder with the same name in the destination location, the recovery
operation prompts you to select a conflict resolution method.
l To recover the files to a different host, select the hostname from the Direct recover
to drop down.
l Click OK. The recover status dialog box appears. At any time during the recovery,
you can click the Stop button to cancel the operation.
10. To monitor the recovery process, on the Recover progress, select Monitor Server.
The NetWorker Monitor dialog box appears with the following tabs:
l Info — Displays general server information including name, IP, OS type, NetWorker
version, Save totals, and Recover totals.
l Messages — Displays server messages that are logged during the recovery, for
example, errors and warnings.
l Devices — Displays the status for all connected devices.
l Sessions — Displays Save sessions, Recover sessions, and Browse sessions.
l Settings — Allows you to adjust the polling interval for server updates.
11. To review the recover log, after the recovery operation completes, select Recover Log.
The Console application appears and displays the contents of the ~/Library/
Logs/recover.log file.
You can use the same name that was used on the original server, but you cannot
use a name that exists for the new server. When a client with the same name exists
on the new server, use this format to specify the client name:
~hostname-#
where hostname is the hostname of the client.
For example, if the client’s hostname is jupiter, and a client named jupiter already
exists on the new server, type:
~jupiter-1
3. On the new NetWorker server, create each Pool resource that was used to write the
client data on the original NetWorker server.
Note
Ensure that you create each Pool resource with the same name that you used on the
original NetWorker server.
4. Use the scanner command to import the save set information into the new
NetWorker server.
l To import the save set information into the client file index and media database
entries, type the following command:
where client_name is the name of the client that appears on the original NetWorker
server.
l To import the save set information into the media database only, type the
following command: scanner -m -c client_name device_name
where client_name is the name of the client that appears on the original NetWorker
server.
NOTICE
When you use the scanner -i or scanner -m to import data before you configure
the Client resource on the new server:
l Only the media database contains the client ID and save set information for the
imported save sets.
l If the same hostname already exists on the NetWorker server, NetWorker will not
use the original hostname to store the save set information because the client ID is
different. NetWorker associates the save set information with a hostname in the
format clientname-#.
l You must create a Client resource with the name clientname-# and specify the
client ID that you recorded from the original NetWorker server.
l Optionally, after you create the new Client resource, run the scanner -i
command to store the save set information into the client file index. When you use
the scanner command, specify the client name as it appears on the original
NetWorker server.
Note
Use the nsrdr command to recover NetWorker 9.0.1 databases only. To perform a roll
back of the NetWorker server to an earlier version of the NetWorker software, contact EMC
Customer Support.
The databases that are critical to the recovery of a NetWorker server include the bootstrap
and the client file indexes.
A bootstrap includes the:
l Media database—Which contains the volume location of each save set.
l Resource files—Which contains all the resources, such as NetWorker clients and
backup groups, that are defined on the NetWorker server.
l The NetWorker Authentication Service database.
l Lockboxes.
Note
The lockbox folder in the resource directory stores confidential information, for
example, Oracle client passwords and the DD Boost password, in an encrypted
format. NetWorker uses this information to perform backup and recovery operations.
The client file indexes include tracking information for each file that belongs to a client’s
save sets. There is one client file index for each NetWorker client.
The nsrdr command line program simplifies the recovery of the media bootstrap, and
optionally the client file indexes for a NetWorker server. Previous releases of NetWorker
required the mmrecov command to recover the media database and resource files, and
the nsrck command to recover client file indexes. UNIX man page and the EMC
NetWorker Command Reference Guide provides detailed information about the nsrdr
command.
Use the procedures in this section to recover lost or corrupted bootstrap or client file
indexes (CFIs). If the server databases are not corrupted and you only want to restore
expired save set entries into the client file index or the media database, use the
procedures in Adding information about recyclable save sets to the client file index on
page 472. Save sets are removed from the client file index when their browse policy time
has expired. Save set entries are removed from the media database when their retention
policy time expires.
The nsrdr command is flexible. You can run the nsrdr program in fully interactive
mode and respond to questions or you can run the program silently with command line
options. You can recover the media database, resource files, and all CFIs in one
operation, or recover just one item by itself. You can recover individual CFIs or all CFIs for
all clients in one operation.
To help troubleshoot issues with the wizard, the nsrdr command logs messages to the
following locations:
l On UNIX, /nsr/logs/nsrdr.log
l On Windows, NetWorker_install_path\nsr\logs\nsrdr.log
Note
Follow the practices described in the EMC NetWorker Server Disaster Recovery and
Availability Best Practices Guide to reduce the likelihood of encountering a disaster
recovery scenario and to maximize the likelihood of successfully recovering from a
disaster.
The EMC NetWorker SolVe Desktop also includes information about NetWorker
recoveries. To access the EMC NetWorker SolVe Desktop, log on to https://
support.emc.com/ and search for EMC NetWorker SolVe Desktop. You must have a
service agreement to use this site.
l Do not relabel the volume when you create the device. Relabeling a volume with
bootstrap backups, or any other backups, renders the data unrecoverable.
l Additional requirements for disk based devices such as AFTD.
n Do not allow the device wizard to label the disk volume. The Label and Mount
option on the wizard’s Device Label and Mount window has this option selected
by default. Uncheck the Label and Mount option.
n Specify the local path to the AFTD volume in the device wizard Select Storage
Node window. Ensure that this is the same path on which the bootstrap data is
stored.
To locate the datazone ID of the NetWorker server if it is not available complete the
following steps:
1. From the NetWorker Server Administration window, select View > Diagnostic
Mode.
2. Right-click the NetWorker server name in the left pane and select Properties.
3. In the System Summary tab of the NetWorker Server Properties dialog box, record
the value in the Datazone id field.
Note
To prevent data loss, EMC recommends that you create a new AFTD device on the
NetWorker server, to which you can recover the bootstrap data.
3. Optionally, if the SSID of the cloned bootstrap save set is unknown, perform the
following steps:
a. Use the scanner -B device_name command to determine the SSID of the save
set. For example, scanner -B rd=bu-idd-cloudboost.iddlab.local:base/
bkup
b. Use the scanner -m -S SSID command to re-populate the media database with
information about the cloned save set.
4. Use the nsrclone command or create a save set group, to clone the cloned
bootstrap save set to the local device.
Options for running the nsrdr command on page 545 provides more options for
recovering specific client file indexes with the nsrdr command.
Note
Some text editors append .txt to the end of the file name. If this occurs, remove
the .txt extension so that the file name is nsrdr.conf.
2. To specify a non-default path to the NetWorker services, add the following entry:
l On Linux:
NSRDR_SERVICES_PATH = /non_default_path/nsr
l On Windows:
NSRDR_SERVICES_PATH = drive:\non_default_path\EMC NetWorker
\nsr\bin
3. To specify the number of parallel threads that can be spawned when recovering CFIs
for multiple clients, add the following entry:
NSRDR_NUM_THREADS = number
Note
Ensure that a space is added before and after the equals ( = ) sign. If you specify both
tuning parameters, ensure that each value is typed on a separate line.
4. Save the nsrdr.conf file as a plain text file, and then place it in the following
directory:
l On Linux: /nsr/debug/
l On Windows: NW_install_path\nsr\debug
The tuning parameters take effect the next time the nsrdr command is run.
Note
nsrdr -N
Note
The option to scan for a bootstrap save set ID is not supported for non-English
locales. In this case, use the scanner command to find the bootstrap ID.
Note
If you are recovering from a cloud device, you are prompted to type the name of the
cloud volume that contains the bootstrap save set. If you are recovering from a
cloud device, you are prompted to type the datazone ID of the NetWorker server.
Ensure that the datazone ID is for the NetWorker server datazone used to back up
the bootstrap.
The scanner program is run and the bootstrap save set is recovered. Data from the
bootstrap save set replaces the media database.
8. At the Do you want to replace the existing NetWorker resource
configuration database folder, res, with the folder being
recovered?, type Y for yes.
The recover process performs the following tasks:
l The recovered resource database is saved to a temporary folder named res.R.
l The NetWorker server services are shut down because nsrdr cannot overwrite the
resource database while these services are running.
l The recovery process replaces the existing resource database folder with the
recovered resource database. The replaced folder is renamed to
res.timestamp.
The nsrdr command skips the bootstrap recovery and you are prompted to
complete the recovery of the specified client file indexes.
The disaster recovery operation completes after all the client file indexes that
you specified are recovered.
12. Open the Administration window in NMC, and then check that all the NetWorker
Server resources appear as expected.
a. Click the Protection icon, and then check that all resources appear as they were
before recovery.
b. Click the Devices icon, and then check that all resources appear as they were
before recovery.
c. Click the Media icon, and then check that all resources appear as they were before
recovery.
d. Select Tape Volumes or Disk Volumes from the Media screen.
e. Check the mode status of the volume, Tape Volumes, which appears in the window
on the right. All volumes should have the same mode that existed before the
recovery. All devices that are written to should be in the appendable mode.
The scanner -i command can take a very long time to complete, especially on a large
disk volume. For volumes that you do not suspect have save sets that were backed up
after the last bootstrap backup or for volumes where you do not need to keep these
manual backups, you can skip this step and remove the Scan Needed flag from the
volume.
For AFTD volumes that you suspect may have save sets that were saved after the last
bootstrap backup, perform the following steps:
Procedure
1. If you do not know the AFTD device name that corresponds to the AFTD volume, use
the nsrmm command with the -C option:
nsrmm -C
Output similar to the following is displayed:
32916:nsrmm: file disk volume_name mounted on device_name,
write enabled
where device_name is the device that corresponds to the AFTD volume_name.
2. Use the scanner command to repopulate the CFI and media database with the save
set information:
scanner -i device_name
where device_name is the AFTD device name not the AFTD volume name.
3. Unmount the device, remove the Scan Needed status, and then remount the device.
When you remove the Scan Needed status, NetWorker enables recover space
operations for the device:
a. To unmount the AFTD volume, perform the following steps:
a. Use NMC to connect to the NetWorker server. On the Administration window,
select Devices, and then click Devices in the left panel.
b. Identify the device in the right panel that you want to unmount. Note the
volume that is associated with the device.
c. Right-click the device, and then select Unmount.
d. Repeat for all devices that require the Scan Needed status to be removed.
Results
You can now use normal recovery procedures to recover application and user data on the
NetWorker server.
NOTICE
If the recovered NetWorker server was protecting virtual cluster clients or an NMM
protected virtual DAG Exchange server, the nsrdr.log file contains false error
messages that are related to the CFI recovery of the underlying physical hosts. Using an
NMM protected virtual DAG Exchange server as an example, a messages similar to the
following appears:
bootstrap backup, you can run the scanner -i command to populate the recovered
media database and the client file indexes with the missing save set information.
A manual save operation is the only way a save set can get backed up without triggering a
save of the bootstrap and CFI data. If a manual backup was performed before the next
scheduled backup, which always backs up the bootstrap and client file indexes, then the
last saved bootstrap and CFI will not have a record of the save sets that were backed up
manually.
NOTICE
The scanner -i command can take a very long time to complete, especially on a large
disk volume. For volumes that you do not suspect have save sets that were backed up
after the last bootstrap backup or for volumes where you do not need to keep these
manual backups, you can skip this step and remove the Scan Needed flag from the
volume.
For Cloud volumes that you suspect may have save sets that were saved after the last
bootstrap backup, perform the following steps:
Procedure
1. If you do not know the Cloud device name that corresponds to the Cloud volume, use
the nsrmm command with the -C option:
nsrmm -C
Output similar to the following is displayed:
32916:nsrmm: file disk volume_name mounted on device_name,
write enabled
where device_name is the device that corresponds to the Cloud volume_name.
2. To repopulate the CFI and media database with the save set information, use the
scanner command:
scanner -i -V cloud_volume -Z datazone_ID cloud_device
Results
You can now use normal recovery procedures to recover application and user data on the
NetWorker server.
NOTICE
If the recovered NetWorker server was protecting virtual cluster clients or an NMM
protected virtual DAG Exchange server, the nsrdr.log file contains false error
messages that are related to the CFI recovery of the underlying physical hosts. Using an
NMM protected virtual DAG Exchange server as an example, a messages similar to the
following appears:
The scanner -i command can take a very long time to complete, especially on a large
disk volume. For volumes that you do not suspect have save sets that were backed up
after the last bootstrap backup or for volumes where you do not need to keep these
manual backups, you can skip this step and remove the Scan Needed flag from the
volume.
If you used the -N option with the nsrdr command and you try to mount a tape volume
that has save sets that are newer than what is recorded in the media database, a
message similar to the following appears:
For tape volumes that you suspect may have save sets that were saved after the last
bootstrap backup, perform the following steps:
Procedure
1. Make a note of the file number and record number that is displayed in the message.
2. To repopulate the CFI and media database with the save set information, use the
scanner command:
scanner -f file -r record -i device
3. To remove the Scan Needed flag from the tape volume, use the nsrmm command:
nsrmm -o notscan volume_name
Results
You can now use normal recovery procedures to recover application and user data on the
NetWorker server.
NOTICE
If the recovered NetWorker server was protecting virtual cluster clients or an NMM
protected virtual DAG Exchange server, the nsrdr.log file contains false error
messages that are related to the CFI recovery of the underlying physical hosts. Using an
NMM protected virtual DAG Exchange server as an example, a messages similar to the
following appears:
Option Description
-a Runs the command line wizard in non-interactive mode. At a minimum, the -
B and -d options must be specified with this command. Be sure to specify a
valid bootstrap ID with the -B option when running this command in non-
interactive mode. Otherwise, the wizard exits as though it was canceled
without providing a descriptive error message.
-K Use the original resource files instead of the recovered resource files.
-v Verbose mode. Generates troubleshoot information.
-q Quiet mode. Display only error messages.
-c Recover client file indexes only. If specified with the -a option, you must
also specify the -I option.
Option Description
-I Specify which CFIs (client file indexes) to recover. Each client name must be
typed at the command prompt and separated with a space. If no client
-I client1
names are specified, all client file indexes are recovered. When the -I
client2...
option is specified, ensure that it is the last option in the command string
because any entries after the -I option are interpreted as client names.
-f path/file_name Specify which CFIs to recover by using an ASCII text file. Place each client
name on a separate line in the file. Must be used with the -I option. Ensure
that each client name is typed correctly because there is no validation of
client names.
-t date/time Recover CFIs from the specified date or date and time. You must type a date
and optionally, a time, format that is accepted by the nsr_getdate
program. The EMC NetWorker Command Reference Guide or the UNIX man
pages provide more information about nsr_getdate.
-N If tape volumes have save sets that are newer than what is recorded in the
recovered bootstrap backup, they are marked as Scan Needed, to prevent
the possibility of losing backed up data. For AFTD devices, this option
prevents NetWorker from running recover space operations until you remove
the Scan Needed flag. A recover space operation clears the disk device of
any save sets that do not have a corresponding entry in the media database.
-F This option sets the Scan Needed flag on File type devices, AFTD devices,
and Cloud devices only. The nsrdr command will not mark tape volumes as
Scan Needed. This option requires the -N option.
Examples
The following examples depict some common nsrdr commands.
l To recover the bootstrap data and selected client file indexes only, type:
nsrdr -I client1 client2 client3
where file_name is an ASCII text file with one client name on each line.
l To skip the bootstrap recovery and recover selected client file indexes by using an
input file, type:
nsrdr -c -f path\file_name -I
where file_name is an ASCII text file with one client name on each line.
l To skip the recovery of bootstrap data and recover all client file indexes, type:
nsrdr -c -I
l To skip the recovery of bootstrap data and recover selected client file indexes, type:
nsrdr -c -I client1 client2
l To skip the recovery of bootstrap data and recover selected client file indexes from a
specified date, type:
nsrdr -c -t date/time -I client1 client2
where the date/time is the date and/or time from which the client file indexes are
recovered. The date/time format is specified in MM/DD/YYYY format or any date and
Statistical data—Affects all legacy Backup and cloning statistics. One year
Backup Statistics reports and Policy
Statistic reports.
Completion Data (legacy)— Affects Savegroup and save set completion One month
Backup Status reports, except in the data and drive data.
save set output.
Completion Message (legacy)— Messages, such as error messages for Two weeks
Affects Backup Status reports, only in failed save sets.
the save set output).
Recover Statistics — Affects Save Set Save set records. One year
Data in Recover Statistics reports.
You can view the retention policies for data to which they have access by following the
first three steps in Setting expiration policies for data retention on page 552. These
different policies give administrators the flexibility to retain certain types of information
for less time than others, as showed in the following example.
Note
An administrator might want to set the completion message policy to a shorter period
than the completion data policy. The precise error messages about what caused a save
set backup to stop might not be relevant over a longer period. But it might be useful to
save the completion data for a somewhat longer period to help with load balancing and
trends.
The longest period (one or more years) might be a suitable selection for save set data.
This data is used to generate the NetWorker Backup Statistics reports. These reports can
be used to determine historical trends about backups and to help guide capacity
planning.
Note
The expiration policies restrict the data that can be retrieved by NetWorker Console. In
other words, reports cannot include data that is older than the data retention policy. If,
for example, an administrator changed a policy expiration period from 1 year to 1 month
and soon afterwards reset it to 1 year, 11 months of data would be lost. Once data is
cleared because of the retention policy, you can only retrieve the data by recovering the
full database.
Note
There must be adequate space in the NMC database to hold the data. If the data
retention policy settings cause the NMC database to run out of storage space and the
NMC processes to stop running. The EMC NetWorker Installation Guide provides
information about estimating the size of the NMC database.
For example, a shared Group Summary report entitled “Building C Backups” will show
different data for different users if the access permissions for each user includes different
NetWorker servers. This applies even if the users run the report at the same time.
On the Configuration tab of each report, the, configuration parameters will only display to
the user, the allowed NetWorker servers, groups, and clients as sources of report
information. The generated report will only contain data from allowed resources. Users
may only run reports for servers to which they are allowed to manage.
Note
If no data is available for a given server, that server will not appear in any lists, regardless
of the access permissions for the user.
Report categories
The following table describes the various report categories in the NetWorker software.
Each of these categories is discussed in detail in Preconfigured reports on page 561.
Report categories appear as folders within the Reports folder in the Reports window. You
can run these reports from the NMC GUI or from a command prompt.
Recover Statistics Provide the history of recovery operations that have been
performed by NetWorker servers.
Devices Provide information about the way devices are being used.
Manual saves Provides save set information about backup operations that are
initiated by a user with the save command, and details about
clone operations that are initiated by a user with the nsrclone
command.
NetWorker Backup Status Provide status information about group completion and save set
backups.
Inactive Files Manages inactive files on a client or group, and sets the
NetWorker software to automatically generate a list of inactive
files in an environment.
Cloud Backup and Recover Provide information on the Cloud usage for scheduled backups
and recovers that are performed by the NetWorker server to and
from the Cloud storage device.
Data Domain Statistics Provides deduplication backup statistics for each selected
NetWorker client.
EMC NetWorker Data Domain Boost Integration Guide provides
more information.
NetWorker Data Protection Provides details and summaries for VMware Data Protection
Policy Policies. The EMC NetWorker VMware Integration Guide provides
more information.
Icon Description
Basic report
Drill-down report
Interactive mode
Interactive mode displays a report with dynamic components, which allow you to update
the report and display the modified results in real time. The effect of the dynamic
components depends on whether a report is viewed as a table or as a chart.
Table view
The table view in interactive mode enables you to:
l Scroll through rows of the table.
l Sort, rearrange, or resize columns in the table, in the same way you sort data in other
NMC windows.
l Use the Choose Table Columns menu to choose the columns to display, and the order
in which to display them.
l Create and view drill-down reports.
The following images provides an example of the Group Summary report in table view.
Figure 52 Group Summary in table view
Chart view
The chart view in interactive mode displays data in a chart format. You can switch back
and forth between different chart formats by selecting a format from the Chart Type list.
The following image provides an example of a Group Summary report in Bar Chart view.
Some legacy reports in chart view provide a Data Selector option that provides the ability
to control the information that appears in the chart. Use the Data Selector section to
display interesting and useful data groupings in chart format.
For example, in a Group Summary by Server report that is displayed in Bar Chart format,
the bar chart displays the amount of data in each group, and the Data Selector lists the
"Server" control column, making it possible to see—in one place—a summary of groups
across all servers, simply by moving through the list of servers in the Data Selector. This
could be useful for finding the group that backed up the most data, or for balancing
groups on servers.
You can limit the set of X and Y axes in the report by clearing one or more options from
the Chart Selector boxes. This does not apply to Drive Utilization reports.
l For Drive Utilization reports, hover over a chart in Save Set view or Drive view to
display a tool tip that includes this information:
n Drive (Drive view only)
n Save Set Name (Save Set view only)
n Start Time
n End Time
n Client Name
n Throughput (B/Sec)
Note
The tool tip feature for Drive Utilization reports is available only in interactive mode.
Document mode
Document mode displays data in a static table or chart report that resembles the view in
Print Preview as shown by a PDF file viewer.
The following options are available with document mode:
l Orientation (portrait or landscape)
l Table or chart format
When displaying reports in chart format, the size and appearance of the chart may differ
depending on the orientation (portrait or landscape), and the presentation format—that
is, whether viewing it in the Console window, or in other file formats, such as PDF, HTML,
or PostScript. When displaying reports as charts in document mode, or when printing or
exporting to HTML or PostScript, the charts are always displayed on a single page,
regardless of their size. As a result, some data and labels may not display. To see full
report details, view the chart in interactive mode.
The following table shows a simplified version of chart format options.
Stacking Bar Displays data in a way that enables you to group and
measure the data according to more than one
category.
Note
Document mode can display more than one chart in the document. You can insert any or
all available Y axes into the report. When you change to document mode, print or export a
report, or save a configuration, NMC uses the axis selection that is currently set in the
Chart Selector section of the Configuration tab. The exceptions to this are stacked bar
and pie charts, which display all axes when the gstclreport command is used to
generate a report.
in document mode, select a different chart type (bar, pie, or plot) if the report data is
complicated.
When specifying this chart type from the NMC GUI, the Chart Selector includes a radio
button that enables the display of only one element, or axis, at a time. If an additional
element is selected, it replaces the first. This limitation does not occur when this chart
type is specified from the command prompt.
l When you specify this chart type from the NMC GUI, all applicable data axes are
shown.
l When you specify this chart type from the command prompt, the gstclreport
command only displays the requested information.
To appreciate the different ways in which you can use a stacking bar chart, consider
these reports:
l NetWorker Backup Statistics Group Summary by Server — Shows statistics that are
broken down by savegroup for each server. Different blocks of color are used for the
amounts of data that are backed up by each group within the vertical bars that
represent the amount of data backed up by servers.
l NetWorker Backup Statistics Server Summary — Shows data from only one focus, a
server-centric point of view. If a stacking bar chart is selected to display a NetWorker
Backup Statistics Server Summary, the chart would display solid bars of color to
represent the servers. However, there would be no blocks of color within the bars,
because the report focuses only on the server level. The result would therefore look
like a simple bar chart.
Basic reports
The basic reports organize the collected data in a manner that focuses on a specific
datazone component, time span, or attribute. For example:
l A Server Summary of Backup Statistics provides backup statistics in a server-centric
manner.
l A Monthly Summary of Backup Statistics provides the backup statistics in a date-
centric manner.
Select the basic report that best provides the information you need.
Drill-down reports
Drill-down reports present report information in a preset sequence of basic reports. You
can save drill-down reports as customized reports in shared mode. You can only use drill-
down reports from the NMC GUI. You cannot use drill-down reports from a command
prompt.
Select a line of output in a report to generate information about the selected item in the
next report in the drill-down sequence.
For example, configure a Policy Summary Over Time category report, and then click View
report. From the generated Policy Summary report, double-click the output for one of the
policies. NMC generates a Monthly Summary report of data for the policy that you
selected in the Policy Summary report. In the Monthly Summary report, double-click a
month. NMC generates a Daily Summary report of data that is generated on each day of
the month that you selected in the Monthly Summary report. In the Daily Summary report,
double-click a day. NMC generates a Client Summary report with information about
clients for whom data was generated on the day that you selected in the Daily Summary
report. In the Client Summary report, double-click one of the clients. NMC generates a
Save Set Summary report of all save sets associated with the client that you selected in
the Client Summary report, on the day you selected in the Daily Summary report, in the
month that you selected in the Monthly Summary, for the policy you selected in the Policy
Summary report.
Note
In document mode for drill-down reports, the print and export commands do not print or
export the entire drill-down report, just the basic report that is displayed.
Customized reports
A report that is included with NetWorker software is known as a canned reports, and
includes several configuration parameters that allow the tailoring of report data. With
customized reports, report versions can be configured—a single time—to fit the needs of
the enterprise. These reports can then be saved and rerun whenever necessary, without
having to be configured again. This feature saves time, especially with regularly run
reports that include complex combinations of parameters. Customized reports can be run
either on demand, or according to a preset schedule. The owner of a saved report can
also allow it to be shared with all users.
The Hide Other Users Reports option toggles the view of reports between:
l The owner’s reports (private and shared).
l The owner’s reports, plus all shared custom reports.
Customizing and saving reports on page 590 and Sharing a report on page 591
provide more information.
Preconfigured reports
The Reports window contains two folders that contain preconfigured reports.
The Reports folder contains preconfigured reports that enable you to query for
information about data that is created with a NetWorker 9.0.1 server. The Legacy Reports
folder contains preconfigured reports that enable you to query for information about that
created with a NetWorker 8.2.x and earlier server.
Preconfigured reports
The Reports folder contains preconfigured reports that enable you to generate reports
about data that was created with a NetWorker 9.0.1 server :
Policy statistics
The Policy Statistics report category provides you with the ability to create reports that
contain details and summary information about Data Protection Policy resources for each
selected NetWorker server within the enterprise.
The Policy Statistics report category includes basic and drill-down reports.
Policy reports
NMC provides two types of reports that provide information about Policy resources: Policy
Summary reports, and Policy Summary over time reports.
Policy Summary
A basic report that provides information that is gathered from the media database and
client file indexes about data that are generated by backup and clone actions in all
workflows that are associated with a Policy resource. The reported Information includes
the following statistics:
l NetWorker server—Name of the NetWorker server.
l Policy—Name of the Policy resource.
l NetWorker server—By default, the report generates information about all the
NetWorker servers that are managed by the NMC server. The Server Name Selected
field provides a list of NetWorker server on which to report information. The Server
Name Available field provides a list of NetWorker servers for which you do not want to
report information about. Use the Add, Add All, Remove, and Remove All buttons to
modify the list of NetWorker servers on which to report.
l Policy— By default, the report generates information about all policies that are
configured on each NetWorker server. The Policy Name Selected field provides a list
of policies on which to report information. The Policy Name Available field provides a
list of policies for which you do not want to report information about. Use the Add,
Add All, Remove, and Remove All buttons to modify the list of Policy resources on
which to report.
l Group—By default, the report generates information about all groups that are
configured on each NetWorker server. The Group Name Selected field provides a list
of groups on which to report information. The Group Name Available field provides a
list of groups for which you do not want to report information about. Use the Add, Add
All, Remove, and Remove All buttons to modify the list of Group resources on which
to report.
l Workflow start and end times— By default the report generates information about all
workflows that started within one day of the current time. Use the From and To arrows
to select a new date range.
Group Summary
A basic report that provides a list of groups in each policy resource on NetWorker servers
that are managed by the NMC server. The report provides the following information:
l NetWorker server—Name of the NetWorker server.
l Group—Name of the Group resource.
l Policy Name—Name of the Policy resource that is associated with the Group resource.
l Workflow—Name of the workflow that is associated with the Group resource.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
Group Details
A basic report that provides details about all groups on all NetWorker servers that are
managed by the NMC server. The report provides the following information:
l NetWorker server—Name of the NetWorker server.
l Group—Name of the Group resource.
l Policy Name—Name of the Policy resource that is associated with the Group resource.
l Workflow—Name of the workflow that is associated with the Group resource.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Successful save sets—Total number of backup or clone save sets that are created
successfully by the action task.
l Failed save sets—Total number of failed attempts to create backup or clone save sets
by the action task.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
l Successful clones—Total number of clone save sets that are created successfully
Group resource.
l Failed Clones—Total number of failed attempts to create a clone save set Group
resource.
Group Summary Over Time
Drill-down reports that provides a point-in-time basic report about the data that are
generated by all groups that are associated with a Policy resource. You can generate the
following types of drill-down reports:
l Group Summary—A basic report that provides a summary of all groups that are
associated with the selected NetWorker servers.
l Monthly Summary—A summary of monthly activities for the group that you selected in
the Group Summary report.
l Daily Summary—A summary of daily activities for the month that you selected in the
Monthly Summary report
l Client Summary—A summary of client information for the day that you selected in the
Daily Summary report.
l Save Set Details—A summary of information for each save set generated for the client
that you selected in the Client Summary report.
Workflow reports
NMC provides two types of reports that provide information about Workflow resources:
Workflow Summary reports, and Workflow Details reports.
Report parameters
The Parameters section allows you to define the selection criteria to generate a
customized report:
l NetWorker server—By default, the report generates information about all the
NetWorker servers that are managed by the NMC server. The Server Name Selected
field provides a list of NetWorker server on which to report information. The Server
Name Available field provides a list of NetWorker servers for which you do not want to
report information about. Use the Add, Add All, Remove, and Remove All buttons to
modify the list of NetWorker servers on which to report.
l Policy— By default, the report generates information about all policies that are
configured on each NetWorker server. The Policy Name Selected field provides a list
of policies on which to report information. The Policy Name Available field provides a
list of policies for which you do not want to report information about. Use the Add,
Add All, Remove, and Remove All buttons to modify the list of Policy resources on
which to report.
l Workflow—By default, the report generates information about all workflows that are
configured on each NetWorker server. The Workflow Name Selected field provides a
list of workflows on which to report information. The Workflow Name Available field
provides a list of workflows for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of Workflow
resources on which to report.
l Workflow start and end times— By default the report generates information about all
workflows that started within one day of the current time. Use the From and To arrows
to select a new date range.
Workflow Summary
A basic report that provides a list of groups for the resources that you selected in the
Parameter section. The report includes the following Information:
l NetWorker server—Name of the NetWorker server.
l Policy Name—Name of the Policy resource that is associated with the Workflow
resource.
l Number of runs—Number of times that the Workflow resource has run.
l Successful—Number of times that the run of the actions in the workflow have
completed successfully.
l Failed—Number of times the run of the actions in the workflow run failed.
l Interrupted—Number of items that the run of the actions in the workflow were
interrupted.
l Total duration— Total amount of time that the actions in the workflow have run.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
Workflow Details
A basic report that provides detailed information about the backup and clone data that
are generated by all actions that are associated with a Workflow resource. The report
includes the following Information:
l NetWorker server—Name of the NetWorker server.
l Policy Name—Name of the Policy resource that is associated with the Workflow
resource.
l Workflow start time—Start time of the workflow.
l Total duration—Total amount of time that the actions in the workflow have run.
l Workflow status—Status of the workflow. For example, successful or failed.
l Name of the Group that is associated to the workflow.
l Successful save sets—Total number of backup or clone save sets that are created
successfully by the action task.
l Failed save sets—Total number of failed attempts to create backup or clone save sets
by the action task.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
l Successful clones—Total number of clone save sets that are created successfully by
clone actions in the workflow.
l Failed Clones—Total number of failed attempts to create a clone save set by clone
actions in the workflow.
Action reports
NMC provides four types of reports that provide information about Action resources:
Action Summary By Group reports, Action Summary By Policy and Workflow reports,
Action Details reports, and Action Details By workflow reports.
Action Summary reports
NMC provides two types of summary reports that provide information about Action
resources: Action Summary By Group reports, and Action Summary By Policy and
Workflow reports.
Action Summary By Group
A basic report that provides a list of actions that are associated with each Group resource
for a NetWorker server. The report provides the following information:
l NetWorker server—Name of the NetWorker server.
l Policy Name—Name of the Policy resource that is associated with the Group resource.
l Group—Name of the Group that is associated with the Action resource
l Action—Name of the Action resource.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
Action Summary By Policy or Workflow
A basic report that provides a list of actions that are associated with each Group resource
for a NetWorker server. The report provides the following information:
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
Client Summary By Group
Drill-down reports that provide a point-in-time basic report about the data generated for
client in the Group resources that are defined in the Parameter section. You can generate
the following types of drill -own reports:
l Group Summary—A basic report that provides summary information about all groups
that are associated with the NetWorker servers selected in the Parameters section.
l Client Summary—A basic report that provides summary information about all clients
that are associated with the group that you selected in the Group Summary report.
Save set reports
NMC provides one basic report, the Save Set Details report. This report provides detailed
information about the save sets stored in the media database of a NetWorker server.
Report Parameters
The Parameters section allows you to define the selection criteria to generate a
customized report:
l NetWorker server—By default, the report generates information about all the
NetWorker servers that are managed by the NMC server. The Server Name Selected
field provides a list of NetWorker server on which to report information. The Server
Name Available field provides a list of NetWorker servers for which you do not want to
report information about. Use the Add, Add All, Remove, and Remove All buttons to
modify the list of NetWorker servers on which to report.
l Policy— By default, the report generates information about all policies that are
configured on each NetWorker server. The Policy Name Selected field provides a list
of policies on which to report information. The Policy Name Available field provides a
list of policies for which you do not want to report information about. Use the Add,
Add All, Remove, and Remove All buttons to modify the list of Policy resources on
which to report.
l Client—By default, the report generates information about all the save sets for each
client that is configured on the selected NetWorker servers. The Client Name Selected
field provides a list of clients on which to report information. The Client Name
Available field provides a list of clients for which you do not want to report
information about. Use the Add, Add All, Remove, and Remove All buttons to modify
the list of clients on which to report.
l Workflow—By default, the report generates information about all workflows that are
configured on each NetWorker server. The Workflow Name Selected field provides a
list of workflows on which to report information. The Workflow Name Available field
provides a list of workflows for which you do not want to report information about.
Use the Add, Add All, Remove, and Remove All buttons to modify the list of Workflow
resources on which to report.
l Save set name—By default, the report generates information about all save sets for
the selected clients on the selected NetWorker servers. The Save Set Name Selected
field provides a list of save sets on which to report information. The Save Set Name
Available field provides a list of save sets for which you do not want to report
information about. Use the Add, Add All, Remove, and Remove All buttons to modify
the list of save sets on which to report.
l Action type—By default, the report generates information about all action types for
the selected clients on the selected NetWorker servers. The Action Type Selected field
provides a list of action types on which to report information. The Action Type
Available field provides a list of action types for which you do not want to report
information about. Use the Add, Add All, Remove, and Remove All buttons to modify
the list of action types on which to report.
l Workflow start and end times— By default the report generates information about all
workflows that started within one day of the current time. Use the From and To arrows
to select a new date range.
Save Set Details report
A basic report that provides detailed information about the backup and clone save sets
that are stored on a NetWorker server. The report includes the following Information:
l NetWorker server—Name of the NetWorker server.
l Client Name—Name of the Client resource.
l Save Set Name—Name of the save set.
l Save Set ID—The SSID of the save set.
l Clone ID—The cloneid of the save set.
l Action Type—The action type that is defined for the Action resource. For example,
Backup, Clone, or Check Connectivity.
l Policy Name—Name of the Policy resource that is associated with the Workflow
resource.
l Workflow—Name of the workflow that is associated with the Group resource.
l Group—Name of the Group resource.
l Workflow start time—Start time of the workflow.
l Status—The status of the save set. For example, succeeded or failed.
l File count—Total number of files.
l Save set size—The size of the save set, as recorded in the media database.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
Monthly and Daily Summary reports
NMC provides Monthly and Daily Summary reports that provide information backup and
clone data on a NetWorker server.
Report parameters
The Parameters section allows you to define the selection criteria to generate a
customized report:
l NetWorker server—By default, the report generates information about all the
NetWorker servers that are managed by the NMC server. The Server Name Selected
field provides a list of NetWorker server on which to report information. The Server
Name Available field provides a list of NetWorker servers for which you do not want to
report information about. Use the Add, Add All, Remove, and Remove All buttons to
modify the list of NetWorker servers on which to report.
l Policy— By default, the report generates information about all policies that are
configured on each NetWorker server. The Policy Name Selected field provides a list
of policies on which to report information. The Policy Name Available field provides a
list of policies for which you do not want to report information about. Use the Add,
Add All, Remove, and Remove All buttons to modify the list of Policy resources on
which to report.
l Group—By default, the report generates information about all groups that are
configured on each NetWorker server. The Group Name Selected field provides a list
of groups on which to report information. The Group Name Available field provides a
list of groups for which you do not want to report information about. Use the Add, Add
All, Remove, and Remove All buttons to modify the list of Group resources on which
to report.
l Workflow start and end times— By default the report generates information about all
workflows that started within one day of the current time. Use the From and To arrows
to select a new date range.
Monthly and Daily Summary
The Monthly Summary report provides monthly summary information about groups in the
months that are within the range that is specified in the Workflow Start and Workflow End
Time attributes. The Daily Summary report provides daily summary information about
groups in the days that are within the range that is specified in the Workflow Start and
Workflow End Time attributes. The Summary reports provide the following information:
l Month—Monthly Summary only. The month in which the report data was created.
l Date—Daily Summary only. The day in which the report data was created.
l File count—Total number of files.
l Save Sets Count—Total number of save sets that are stored in the media database.
l Amount of data—Total size of backup data that is stored on media.
l Target size— Size of the save set on the target backup or clone device. When the
target device is a Data Domain device, the value represents the size of the data after
deduplication. When the target device is an AFTD device, the value is the same size
as the original save set size.
l Deduplication ratio— Deduplication ratio for the data.
l Clone count—Total number of clone save sets that are stored in the media database.
l Clone size—Total size of cloned data that is stored on media.
The parameters available within the NetWorker Recovery report category are described in
this table. The specific parameters available depend on which NetWorker Recovery
Statistics report is selected.
Source Client Name One or more clients whose Selected client names.
data is being recovered.
Target Client The client where the data is Selected target client names.
being recovered to.
Start time/End time Limits the report to a specified Start time of recover/end time
time range. of recover.
The parameters available for each report type in the NetWorker Recovery Statistics report
category are listed in the user interface.
Recovery Statistics basic reports
Within the NetWorker Recovery Statistics report category, choose any of the basic reports
that are listed in the user interface. Once a report is chosen, the Configuration tab
displays boxes with lists of the selected parameters for that report. To exclude unwanted
parameters from the report, delete them from the list. Customizing and displaying report
output on page 587 provides information on selecting and removing parameters.
Recovery Statistics drill-down report
This drill-down report consists of multiple NetWorker Recovery Statistics basic
reports, which are connected in a predetermined sequence. Drill-down reports on
page 560 provides general information about drill-down reports.
The configuration parameters for a drill-down report are the same as the parameters
for the top-level report in the report sequence. Thus, if the top layer of the drill-down
report is a Server Summary report, the configuration parameters are the same as
they would be for the basic report, Server Summary.
When a report is chosen, the Configuration tab displays boxes that list the selected
parameters for the top-level report.
To exclude unwanted parameters from the report, delete them from the list.
Customizing and displaying report output on page 587 provides information on
selecting and removing parameters.
To generate the Recover Summary Over Time report, you must first specify the same
parameters as those in the Server Summary report, which is the first report that is
displayed in the sequence.
To drill-down to the client level, perform one of the following, depending on the viewing
mode:
l When in table mode, double-click any individual row referencing the desired
NetWorker server
l When in chart mode, click anywhere in the chart area of the desired NetWorker server.
The Client Summary report for the selected NetWorker server appears. Return to the
Server Summary report to select another server to explore.
To drill-down to the Recover Details level, perform one of the following, depending on the
viewing mode:
l When in table mode, double-click any individual row referencing the desired
NetWorker client.
l When in chart mode, click anywhere in the chart area of the desired NetWorker client.
The Recover Details report for the selected NetWorker client appears. Return to the Client
Summary report to select another client to explore.
Recovery data retention policy and configuration
The retention policy for the recover statistics that are used to generate these reports can
be set with the other retention policies currently defined from the Data Retention page in
the Reports task pane. The default retention policy for these statistics is one year.
Device reports
Device reports provide information about the way devices are being used. They show
scheduled and manual backup activity on one or more selected devices over time. You
can identify periods of heavy activity or inactivity. Device reports aid NetWorker
administrators in performance tuning, and they help identify bottlenecks. For example, if
all drives are being used continuously for a long period, at maximum throughput, backup
speeds may improve by adding tape drives or moving clients to another backup server.
Types of Device reports and configuration
The Devices report category includes only one report, the Drive Utilization report. This
report, which is a drill-down report, supports NetWorker servers running NetWorker
software release 7.3 or later. The report includes backup activity data for all device types,
including advanced file type devices and digital data storage devices.
When viewing a Drive Utilization report as a chart, it is automatically displayed as a Gantt
chart, where the backup activity level of one or more devices is depicted in relation to
time. Unlike with other reports, you cannot choose an alternate chart type.
Placing the cursor over the chart in Save Set view displays a tool tip that provides this
information:
Note
One of the activities in the Drive Utilization report is throughput. Since the Drive
Utilization Report provides data for backup activities only, throughput values will
normally be non-zero. However, zero (0) is considered a valid throughput value.
Event reports
These reports provide summary information about current events on NetWorker and
Console servers within the Enterprise. Additional details about a particular event can be
displayed, including annotation contents. While the Events window within the NetWorker
Console displays the current events of the NetWorker servers, the Event reports provide
additional features. The reports enable you to organize, export, and print the event data.
Event reports can include this information:
l Number of events
l Priority of events
l Category of events
l Server name
l Server type
l Event time
l Notes and annotations
Note
When an event has been resolved, it does not remain in the records.
Note
Info
Emergency
Critical
Alert
displaying report output on page 587 provides information on selecting and removing
parameters.
Host reports
The Hosts report category includes only basic reports. There are two basic reports, as
described in this table.
Enterprise on page 658 provides a description of the Enterprise and its folders.
User reports
The Users report category provides information on NetWorker Console user activity. NMC
Server Management provides information about NetWorker Console users and creating
user accounts.
The Users report category includes only basic reports, no drill-down reports. The Full
Name and Description information appears in the User reports only if this information
was specified when the user was created.
Save Set Name Selects one or more save sets. Selected save set names
Backup Type Selects one or more file types. List of supported file types
Level Select one or more backup List of backup levels such as,
levels. Full, Incremental, Skip,
synthetic full, or Level 1–9
The parameters available for each report type in the NetWorker Backup Statistics report
category are listed in the user interface.
Save set data retention policy and configuration
Settings for the save set retention policy impact the data that is available to the
NetWorker Backup Statistics reports. If a save set retention policy of six months is
specified, NetWorker software cannot query the database for a time range that extends
back more than six months. The report cannot display data that has expired because that
data has been removed from the database. Thus, even if a save time parameter of one
year is specified, the report can display only six months of data if the limit of the save set
retention policy is six months.
Backup statistics basic reports
Within the NetWorker Backup Statistics report category, choose any of the basic reports
that are listed in the user interface. Once a report is chosen, the Configuration tab
displays boxes with lists of the selected parameters for that report. To exclude unwanted
parameters from the report, delete them from the list. Customizing and displaying report
output on page 587 provides information on selecting and removing parameters.
Note
These basic reports do not distinguish between regular and deduplication clients.
l Backup level
l Backup type
l Save type
Backup type and save type information
Backup type is one of the configuration parameters for both NetWorker Backup Statistics
and NetWorker Backup Status reports, and it is one of the fields of information that is
included in these reports. The backup type indicates whether the files backed up were
regular files, bootstrap files, indexes, or a particular database file.
Specialized NetWorker modules (such as NetWorker Module for SAP) are used to back up
the various databases. Most of these modules apply a distinct prefix when backing up a
save set. This prefix enables NetWorker software to identify the backup type and include
it in the reports.
A couple of the Backup Status reports (Save Set Details and Save Set Details by Client)
include an additional field of information that is called save type. The save type can be
any one of the following:
l Bootstrap
l Index
l Save
l Save (backup command)
Types of NetWorker backup status reports and configuration
The NetWorker Backup Status Report category includes both basic and drill-down reports.
The report’s Configure tab allows you to limit the scope of the report selected. The choice
of available parameters depends on which report is to be generated.
The parameter options available within the NetWorker Backup Status Report category are
described in this table.
Group Start Time Limits the report to a specified Start and end dates.
time range. The default range
is one day for save set details
reports.
Save Set Name Selects one or more save sets. Selected save set names.
Backup Type Selects one or more file types. List of supported file types.
The parameters available for each report type are listed in the user interface.
Completion data retention and NetWorker backup status
The settings for the completion data policy impact the data that is available to the
NetWorker Backup Status reports. The report cannot display data that has expired,
because it has been removed from the database.
Thus, even if a one-year time range is specified for the Group Start Time parameter, the
report displays only six months if the limit of the completion data policy is six months.
Backup status basic reports
Within the NetWorker Backup Status report category, choose any of the basic reports that
are listed in the user interface. When a report has been chosen, the Configuration tab
displays boxes listing the selected parameters for that report. To exclude unwanted
parameters from the report, remove them from the list. Customizing and displaying report
output on page 587 provides information on selecting and removing parameters.
Backup status drill-down reports
The drill-down reports are composed of multiple NetWorker Backup Status basic reports,
which are connected in a predetermined sequence. Drill-down reports on page 560
provides general information about drill-down reports. When a report has been chosen,
the Configuration tab displays boxes with lists of the selected parameters for the top-
level report. Thus, if the top layer of the drill-down report is a Daily Summary report, the
configuration parameters are the same as they would be for the basic report, Daily
Summary.
To exclude unwanted parameters from the report, remove them from the list. Customizing
and displaying report output on page 587 provides information on selecting and
removing parameters.
Inactive files
A NetWorker administrator can manage inactive files on a client or group and set the
NetWorker software to automatically generate a list of inactive files in an environment.
Inactive files are files that have not been accessed or modified other than being backed
up regularly. The period of time a file has been inactive is called the Inactivity Threshold.
The inactivity files report is not supported on releases earlier than release 7.4 of the
NetWorker servers.
Client support for this feature will be enabled only on Windows platforms.
The Inactive files report is a drill-down report that lists the inactive files from the latest
scheduled backup. The report operates at both the client and group level.
The inactive files report can do the following:
l Generate a report on the percentage of inactive files backed up as part of a group.
l Set the threshold time periods per group so that the percentage of inactive files in
that group does not exceed the threshold time period.
l Set alerts so that the NetWorker software sends an alert when the threshold set for a
group is exceeded.
l Provide a report that details the percentage of inactive files backed up as part of a
group.
l Report the percentage of inactive files per client.
The range limit specification given to configure File Inactivity Threshold and File Inactivity
alert threshold attributes can be configured within the following ranges:
l File Inactivity Threshold attribute can be set between 0-365 days.
l File Inactivity Alert Threshold attribute can be set between 0-99.
Group File Details
The Group file Details report provides statistical information about inactive files that are
included in a scheduled backup. Data will be provided for every requested NetWorker
group at the time of the last backup. Chart mode is the default mode for the report. The
data can also be viewed in tabular mode for more detailed information.
When generating the Group Details report, you can specify the following parameters:
l One or more NetWorker servers. Only servers that have the Gather Reporting Data
attribute turned on will appear in the selection list.
l One or more NetWorker groups for the selected NetWorker servers.
Client File Details
The Client File Details report provides information about inactive files backed up for
selected NetWorker clients. Data will be provided for every requested NetWorker client at
the time of the last backup. Chart mode is the default mode for the report. The data can
also be viewed in tabular mode for more detailed information.
When generating the Client File Details report, you can specify the following parameters:
l One or more NetWorker servers. Only servers that have the Gather Reporting Data
attribute turned on will appear in the selection list.
l One or more NetWorker groups for the selected NetWorker servers.
l One or more NetWorker clients for the selected NetWorker servers.
Device Name Selects the devices that are Selected device names
used for backup and recover.
Save Set Cloned save set name. Selected save set names.
Note
An administrative user can restrict the user that have access to certain servers in the
enterprise, which can limit the scope of the reports that the user can create and view.
Procedure
1. From the NMC GUI, click Reports.
2. Expand a report category folder, and then select an available report type.
The report open on the Configuration tab. The possible parameters for that report
appear by default in the Selected boxes.
3. Define the report criteria:
l To limit the scope of the report, click any of the parameters in the Selected box,
Note
5. Most reports display initially in interactive mode and table format, to modify the
report, right-click the View Report tab and select one of the following options:
Option Description
Table Display the data in Table view.
Option Description
Chart Display the data in Chart view
Document Display the report in Document mode.
Interactive Display the report in Interactive mode.
Portrait Display the data in Portrait format.
Landscape Display the data in Landscape format.
6. To print the report, right-click the View Report tab, and select Print.
7. To export the report, right-click the View Report tab, and select Export. In the Save
dialog box, specify the file name and file location, and then click Save.
You can export the report to one of the following formats:
Option Description
Postscript For printing. Shows data totals.
PDF For printing or viewing with a PDF viewer such as Adobe Acrobat. Shows
data totals.
HTML For viewing in a browser. Shows data totals.
CSV For importing raw data into other programs, such as spreadsheets, that
accept the comma separated values (CSV) format. Does not show data
totals.
Note
The Regional and Language Settings on the system determines whether the times appear
in 12-hour or 24-hour formats.
Input formats
Date and time input formats in the NetWorker software vary. Some acceptable input
formats for a collection of common locales are shown in this table.
Table 107 Date and time input formats for common locales
Note
For Drive Utilization reports, the time range cannot exceed 8 days. That is, the date
entered in the To field cannot exceed 8 days from the date entered in the From field. If
typing a relative time in the To field, the value cannot exceed 8 days.
NOTICE
Note
Only the original owner of a customized report or the Console Application Administrator
can select these additional options. If the Console Application Administrator removes
sharing, the report becomes private again to the original owner, the report’s creator.
Since it is a copy, a customized report can be changed again and resaved, or even
deleted. Reports can be saved either to preserve particular configurations (such as which
servers are polled) or to save the view type (such as pie or bar chart).
Customized reports appear alphabetically in the report hierarchy below the canned report
from which they were created. They are stored in the NMC database, which means that
users can access them from any host that they use to log in to the NMC GUI and can use
the report from a command prompt. Command line reporting on page 592 provides
more information about running reports from the command line.
A customized report stores the following configuration information:
l All options from the report’s Configure tab
l Column display preferences for tables
l Orientation (portrait or landscape)
l Current view type (table or chart). For charts, NMC also saves the current chart type
(bar, pie, plot, or stacked bar) and the chart axis selection. Interactive and document
mode chart types on page 557 provides more information about chart axis selection.
Naming reports
When naming a report to save, keep in mind that the set of usable characters is limited in
the same way as for hostnames and usernames. Report names may not contain:
l Characters having an ASCII representation number less than ASCII 32 (such as
carriage return, bell, newline, escape)
l Comma (,)
l Slash (/) or backslash (\)
l Double quote (“) or single quote (’)
Note
Report names are not case-sensitive. Also, canned reports cannot be deleted or
customized, and then saved under the same name as a report that already exists under
the same parent folder or directory.
Sharing a report
By default, when you save a customized report, the report is private and appears only in
the report hierarchy. The report owner or an NMC user with the Console Application
Administrator role can share the report with other NMC users. Perform the following steps
to share a customized report.
Any user viewing a sharable report may perform these operations on the report:
l Change any runtime parameter of the report (such as configuration or view type).
l Run the report, but not save changes to the report.
l Copy the report by using the Save As command. The user becomes the owner of the
new report, and by default, the report is not shared.
l Choose the Hide Other Users’ Reports option to toggle the view of reports between
only those reports owned by the user (both private and shared), and all shared
custom reports.
Perform the following steps to share a report.
Procedure
1. From the NMC GUI window, click Reports.
2. Expand the report folder that contains the customized report that you want to share.
3. Right-click the customized report, then select Share.
The report is now shared, and is represented in the report hierarchy by a shared-report
icon or .
Results
Once you enable a report for sharing, all users can see the report in the report folder
hierarchy.
Note
The Share option is a toggle. To disable sharing, right-click the shared report and select
Share.
Note
Command line reports may only be printed or run to generate exported output. They
cannot be saved or shared. Drill-down reports cannot be run from the command line.
System performance
Each time the gstclreport command is run, it starts a separate JVM, which can use
many system resources. The gstclreport command runs a database query and
generates report output by using the results. Since this uses both CPU and memory
resources on the host computer, it could affect performance of NetWorker software and of
the host. Consequently, depending on the system used, it is probably not wise to run
more than a few instances of the gstclreport command at the same time.
Security
The gstclreport command must contact the Console server in order to run a report.
The command requires a valid username and password. A user either uses the -P option
to type the password, or the command checks standard input to see whether the
password is there. If a password is not supplied, the program prompts for a password.
On UNIX systems, use of the -P option is a security concern, because a user may type the
ps command and see the commands that were used to start any program that is running.
To solve this problem, use scheduling software that can conceal password input.
Alternatively, ensure that the scheduling system sends the password as standard input.
For example:
A cron command can be used to schedule the report, or the command could be placed
in a secure script file that is invoked by the cron command.
The Success threshold attribute also applies to the save sets displayed in the Monitoring
window.
properties of the NetWorker Server resource. In NetWorker 9.0.1, the default jobsdb
retention is 72 hours.
Using jobquery
The jobquery program provides a CLI similar to the nsradmin program. The
jobquery program contacts the nsrjobd process to query job information that is
stored in the jobsdb. A query is defined by an attribute list that is made up of one or more
attribute names with or without values.
In the query, the attribute name (for example, 'type') is preceded by a period ('.'), and
optionally followed by a colon (':') and a comma-separated list of values (for example,
"host: mars";"job state: STARTED, ACTIVE, SESSION ACTIVE"). When a query consists of
more than one attribute names, attributes are separated by a semi-colon (';'). When an
attribute name is specified without values, any resource descriptor that contains this
attribute is a match. If an attribute name is followed by one or more values, a resource
whose value list matches at least one of the values for the specified attribute satisfies the
criteria.
To launch the jobquery interface, type:
jobquery -s NetWorker_server
Where NetWorker_server is the hostname of the NetWorker server. Use the -s option
when you run the jobquery command from a NetWorker host that is not the NetWorker
server.
Note
When you do not use the -s option, jobquery tries to connect to nsrjobd process on
the local host. If the nsrjobd process is not running on the specified server or the local
host, an error is returned.
The jobquery -s<server> command connects to the specified NetWorker server and
returns jobquery prompt. The data in the job database is queried with the following
commands:
l types — a command that lists all job types currently known by nsrjobd that does not
take any argument (for example, types return a list indicating Known types: save job,
savegroup job, and so on).
l . — a command that sets the query criteria and is followed by one or more attribute
names, or lists current query criteria when not followed by any attribute.
Query criteria may contain several attributes, including job type, host, and job state,
with each attribute separated by a semi-colon and each value separated by a comma,
as in the following example:
This example would return information on all savegroup jobs from the host mars that
are either in progress or in completed state.
l show — restricts the list of attributes that are returned for each resource descriptor
that matches the query. For the above example, specifying the following:
returns the names, job ids, completion status, and completion severity for all
matched completed and active savegroups.
l print — runs the query and displays the results. If show list is in effect, each
resource descriptor in the result list is restricted to desired attributes.
l all — returns all resource descriptors in the jobs database. If show list is in effect,
result is restricted to desired attributes.
l help — displays help text.
l quit — exits jobquery.
Running jobquery -s NetWorker_server -i input_file reads input from the
file for non-interactive usage. The man pages or the EMC NetWorker Command Reference
Guide provides detailed information about the jobquery program.
where policy_name is the name of the policy that contains the workflow and
workflow_name is the name of the workflow.
Note
For example, to query the jobsdb for a workflow named SQL Clients in a policy named
Backup, type the following commands at the jobquery prompt:
\workflow_SQL clients_832031.raw";
job output: \
"133550 1435107602 1 0 0 3376 4996 0 bu-
iddnwserver.iddlab.local nsrworkflow NSR notice 31 Starting %s
'%s' workflow '%s'. 3 11 24 127405:Protection Policy \
0 6 Backup 0 11 SQL clients
123316 1435107602 1 0 0 3376 4996 0 bu-iddnwserver.iddlab.local
nsrworkflow NSR notice 46 Starting action '%s/%s/%s' with
command: '%s'. 4 0 6 Backup 0 11 S\
QL clients 0 6 backup 0 32 savegrp -Z backup:traditional -v
123321 1435107602 1 0 0 3376 4996 0 bu-iddnwserver.iddlab.local
nsrworkflow NSR notice 39 Action '%s/%s/%s's log will be in
'%s'. 4 0 6 Backup 0 11 SQL clie\
nts 0 6 backup 23 83 C:\\Program Files\\EMC NetWorker\\nsr\
\logs\\policy\\Backup\\SQL clients\\backup_832032.raw
123325 1435107619 1 0 0 3376 4996 0 bu-iddnwserver.iddlab.local
nsrworkflow NSR notice 21 Action '%s/%s/%s' %s. 4 0 6 Backup 0
11 SQL clients 0 6 backup 0 6\
failed
133555 1435107619 1 0 0 3376 4996 0 bu-iddnwserver.iddlab.local
nsrworkflow NSR notice 24 Workflow '%s/%s' failed. 2 0 6 Backup
0 11 SQL clients";
job state: COMPLETED;
name: Backup;
ndmp flag: False;
NW Client name/id: ;
override parameters: ;
parent job id: 0;
policy definition changetime: 1434655597016534;
previous job id: 0;
protection groups: SQL clients;
Reason job was terminated: ;
redirect stdio: False;
remote password: ;
remote user: ;
restricted data zone: ;
root parent job id: 0;
savegrp spawned: False;
sibling job id: ;
SSID: ;
start time: 1435107602;
type attributes: ;
type classes: ;
type help: ;
type name: ;
type references: ;
type table: ;
userid: ;
workflow name: SQL clients;
The following table summarizes some of the attributes that appear in workflow job types.
Attribute Description
Job id A unique number value that identifies the job.
Parent job id The job id of the job that started this job. A job may not have a parent
job.
Job state The status of the job. Status values include: CREATED, QUEUED,
STARTED, ACTIVE, SESSION ACTIVE, CANCELLED, and COMPLETED.
Job log file The location and name of the log file that contains detailed information
about the job activities.
Job output The information that is contained in the job log file.
Note
Truncation of the content might occur when the file is large, which results
in only displaying the last 2 KB of information.
Start time The time the job started, in seconds since Jan 1, 1970.
End time The time the job ended, in seconds since Jan 1, 1970.
Completion status The completion status set by the job. Status values include never started,
did not run, succeeded, failed, abandoned, canceled, and
communication lost between job and nsrjobd.
Completion severity The severity level of any error that caused the job to end. Severity levels
include: EMERGENCY, ALERT, CRITICAL, SEVERE, ERROR, INTERVENTION,
WARNING, NOTICE, and INFORMATION.
Data protection policy The name of the policy that contains the workflow.
name
Override parameters A list of parameters that were configured in the Workflow resource, when
the workflow started. Use override parameters to override the value that
is defined for an equivalent action property.
Protection groups The protection groups that are assigned to the workflow.
Policy definition The last change time of the policy that contains the workflow.
changetime
. type:action_name
type attributes: ;
type classes: ;
type help: ;
type name: ;
type references: ;
type table: ;
userid: ;
waiting input count: 0;
waiting input work items: ;
workflow name: Server backup;
The following table summarizes some of the attributes that appear in action job types.
Attribute Description
Job id A unique number value that identifies the job.
Parent job id The job id of the job that started this job. A job may not have a parent job.
Job state The status of the job. Status values include: CREATED, QUEUED, STARTED,
ACTIVE, SESSION ACTIVE, CANCELLED, and COMPLETED.
Job log file The location and name of the log file that contains detailed information
about the job activities.
Note
Start time The time the job started, in seconds since Jan 1, 1970.
End time The time the job ended, in seconds since Jan 1, 1970.
Completion status The completion status set by the job. Status values include never started,
did not run, succeeded, failed, abandoned, canceled, and communication
lost between job and nsrjobd.
Completion severity The severity level of any error that caused the job to end. Severity levels
include: EMERGENCY, ALERT, CRITICAL, SEVERE, ERROR, INTERVENTION,
WARNING, NOTICE, and INFORMATION.
Data protection The name of the policy that contains the action.
policy name
Workflow name The name of the Workflow resource that contains the action.
Input job id The job id of the action that is controlling this action.
Waiting input work For the first or head action in a workflow, this is a list of work items for the
items protection group that is assigned to the workflow that contains the head
action. For subsequent actions, this list displays the value in the
completed output work items attribute, for the action that precedes this
action. When an action starts a work item, the work item value moves
from the waiting input work items attribute to the running input work items
attribute.
Waiting input count The number of work items in the waiting input work items attribute.
Attribute Description
Filtered input work Contains work items that an action has filtered out of the waiting input
items work items attribute.
Filtered input count The number of work items in the filtered input work items attribute.
Running input work A list of in progress work items that were previously in the waiting input
items work items attribute. This list does not display in progress work items that
were previously in the filtered input work items attribute.
Running input count The number of work items in the running input work items attribute.
Successful input A list of input work items that have completed successfully. When an
work items input work item completes successfully, the value moves from the running
input work items to the successful input work items attribute.
Successful input The number of work items in the successful input work items attribute.
count
Failed input work A list of input work items that have not completed successfully. When an
items input work item does not complete successfully, the value moves from the
running input work items to the failed input work items attribute.
Failed input count The number of work items in the failed input work items attribute.
Canceled input work A list of input work items that were canceled and did not complete. When
items an input work item is canceled, the value moves from the running input
work items to the cancelled input work items attribute.
Canceled input count The number of work items in the cancelled input work items attribute.
Completed output The list of work items that are produced by this action.
work items
Completed output The number of work items in the completed output work items attribute.
count
In this example, the server backup workflow failed for a host at 7:54 PM on June 26. We
want to review session information about the action tasks started by the server database
backup and expiration actions.
In this example, two action jobs created child jobs. The server database backup
action created a child process for the nsrdbsave command and the expiration
action created a utility job. Output for the bootstrap save job appears, as follows. The
job id for the failed bootstrap backup action is 832050. The following example
displays some of the attributes that appear in the print output.
type: bootstrap save job;
The jobquery program displays detailed information about the save jobs that are
created by the job. The following example displays some of the attributes that appear
in the print output.
type: save job;
actual exit code: 0;
adhoc job: False;
authtype: ;
automatic: False;
backup_device: ;
Checkpoint restart ID: ;
Checkpoint restart sequence: ;
command: \
"save -q -e \"1 Months\" -b Default -J bu-
iddnwserver.iddlab.local -a \"*polic\
y name=Server Protection\" -a \"*policy workflow name=Server
backup\" -a \"*po\
licy action name=Server db backup\" -g \"Server Protection\"
-l full -LL -LL -\
S -f - -W 78 -N bootstrap \"C:\\\\Program Files\\\\EMC
NetWorker\\\\nsr\\\\res\
\" \"C:\\\\Program Files\\\\EMC NetWorker\\\\nsr\\\\mm\"
\"C:\\\\Program Files\
\\\\EMC NetWorker\\\\nsr\\\\authc-server\\\\tomcat\\\\data
\"";
completed savetime: 1435241284;
completion severity: 10;
completion status: succeeded;
data class: ;
Data set size: ;
data size: 255;
dedupe sent bytes: ;
dependent job id: 0;
end time: 1435241293;
estimated bytes: ;
exit code known: True;
file count: 185;
Files totals: 156, 114497;
first_clone_id_for_ssid: ;
group name: ;
host: bu-iddnwserver.iddlab.local;
Inactive files: 0, 0, 0;
input flag: False;
job id: 832055;
The jobquery program displays detailed session information about the save job.
For example, output similar to the following appears:
type: session info;
client name: bu-iddnwserver.iddlab.local;
completed: 1;
compression ratio: 0;
current pool: Default;
current read/write total: 254;
device family: disk;
Device path: aftd;
device type: adv_file;
extended information: ;
Jobid from session info: 832055;
number of volumes used: 0;
recover file count: 0;
recover file total: 0;
restricted data zone: ;
savegroup name: Server Protection;
saveset id: \
7d52bfb9-00000006-fb8c0b44-558c0b44-00065000-7396bc56;
saveset name: bootstrap;
Session end time: 1435241299;
session id: 18269;
Session mode: 0;
Session start time: 1435241284;
total amount to be read/written: 0;
total volumes needed: 0;
transfer rate: 0;
type attributes: ;
type classes: ;
type help: ;
type name: ;
type references: ;
type table: ;
volume name: bu_iddnwserver.iddlab.local.002;
Policy Workflow Action Job Name Job id Parent Job Job Type Job Status Completio Start Time Duration
id n Status
Backup Default Backup savegrp 32525 32524 Backup COMPLET succeede 5/26/15 00:01:21
act ED d 16:59:43
For example, to provide detailed information about the last active or inactive jobs in a
workflow that is called Default in the Backup Policy, type:
nsrpolicy monitor -p Backup -w Default -d
Table 111 Job details for a Workflow continued
Policy Workflow Action Job Name Job id Parent Job Job Type Job Completio Start Time Duration
id Sta1tus n Status
Backup Default Backup savegrp 32525 32524 Backup COMPLET succeede 5/26/15 00:01:21
act ED d 16:59:43
For example, to display detailed information about the last active or inactive job in a
Workflow resource, in a non-tabular format, type:
Workflow status:
data protection policy name:Backup
workflow name:Default
name:Backup
job id:32524
type:workflow job
job state:COMPLETED
completion status:succeeded
start time: 5/26/15 16:59:43
duration: 00:01:22
Action 1 status:
data protection policy name:Backup
workflow name:Default
policy action name:backup
name:savegrp
job id:32525
parent job id:32524
type:backup action job
job state:COMPLETED
completion status:succeeded
start time: 5/26/15 16:59:43
duration: 00:01:21
Workflow status:
data protection policy name:Backup
workflow name:Default
name:savegrp
job id:32525
type:backup action job
job state:ACTIVE
completion status:
start time: 5/26/15 16:59:43
duration: unknown
authtype: ;
automatic: False;
Checkpoint restart ID: ;
Checkpoint restart sequence: ;
command: ;
completion severity: 10;
completion status: succeeded;
data protection policy name: Backup;
dependent job id: 0;
end time: 1432674065;
exit code known: True;
host: bu-iddnwserver3.iddlab.local;
input flag: False;
job id: 32524;
job log file: \
"C:\\Program Files\\EMC NetWorker\\nsr\\logs\\policy\\Backup\
\workflow_Default\
_032524";
job output: \
"133550 1432673983 1 0 0 4100 3352 0 bu-
iddnwserver3.iddlab.local nsrworkflow \
NSR notice 31 Starting %s '%s' workflow '%s'. 3 11 24
127405:Protection Policy\
0 6 Backup 0 7 Default
123316 1432673983 1 0 0 4100 3352 0 bu-
iddnwserver3.iddlab.local nsrworkflow N\
SR notice 46 Starting action '%s/%s/%s' with command: '%s'. 4 0
6 Backup 0 7 D\
efault 0 6 backup 0 32 savegrp -Z backup:traditional -v
123321 1432673983 1 0 0 4100 3352 0 bu-
iddnwserver3.iddlab.local nsrworkflow N\
SR notice 39 Action '%s/%s/%s's log will be in '%s'. 4 0 6
Backup 0 7 Default \
0 6 backup 23 75 C:\\Program Files\\EMC NetWorker\\nsr\\logs\
\policy\\Backup\\\
Default\\backup_032525
123325 1432674065 1 0 0 4100 3352 0 bu-
iddnwserver3.iddlab.local nsrworkflow N\
SR notice 21 Action '%s/%s/%s' %s. 4 0 6 Backup 0 7 Default 0 6
backup 0 9 suc\
ceeded
133553 1432674065 1 0 0 4100 3352 0 bu-
iddnwserver3.iddlab.local nsrworkflow N\
SR notice 27 Workflow '%s/%s' succeeded. 2 0 6 Backup 0 7
Default";
job state: COMPLETED;
name: Backup;
ndmp flag: False;
NW Client name/id: ;
override parameters: ;
parent job id: 0;
policy definition changetime: 1431525315508563;
previous job id: 0;
protection groups: Default;
Reason job was terminated: ;
redirect stdio: False;
remote password: ;
remote user: ;
restricted data zone: ;
root parent job id: 0;
savegrp spawned: False;
sibling job id: ;
SSID: ;
start time: 1432673983;
type: workflow job;
type attributes: ;
type classes: ;
type help: ;
type name: ;
type references: ;
type table: ;
userid: ;
workflow name: Default;
resource identifier:
223.0.232.10.0.0.0.0.192.87.83.85.172.21.21.102(9);
Using nsrrecomp
Use the nsrreccomp program to query the jobsdb for information about recover jobs
and to create a recover completion report. The name specified for the recover job is the
name of the saved recover configuration. The nsrreccomp program differs from the
jobquery program because it also queries recover log files and is limited to recover job
information only.
Example: Summary report of recover jobs
To generate a summary report of each recover job in the jobsdb, type:
nsrreccomp -L
nsrreccomp -b -1 recover_job_name
where -b -1 is optional and used to override the default 2kb limit for job output.
Example: Summary report of the last recovery job
To generate a summary of last recovery job for a Recover resource, type:
nsrreccomp -H group_name
The man pages or the EMC NetWorker Command Reference Guide provides detailed
information about the nsrsreccomp program.
This message is reported when a savegroup is started. This message reports the names
of the clients that are checkpoint-enabled, and the mode that was selected at the time of
the backup.
savegrp test: checkpoint restartable saveset
client_name:save_set created in previous run(s) of the group.
It will be checkpoint restarted. Checkpoint ID cp_id.
This message reports that a partial save set is detected for a client in the group and a
checkpoint restart occurs for the save set.
savegrp group_name checkpoint restartable saveset
client_name:save_set failed and will not be restarted.
This message is reported when the backup of a checkpoint-enabled client fails and the
backup will not be retried.
Common reasons for this error message include:
l The restart window for the group has been exceeded.
l The maximum number of client retries has been reached.
NOTICE
When this message is reported, the failed save set are removed from an AFTD:
nsrd info, MeDia Info: save set save_set for client
client_name was aborted and removed from volume volume_name
(severity 0, message 71193)Recovering data.
This message reports that the save set for a checkpoint-enabled client successfully
completed during the group backup.
SNMP traps
The NetWorker Simple Network Management Protocol (SNMP) Module allows NetWorker
servers to send notification messages to SNMP management agents.
You must configure SNMP-enabled network management software to accept traps from
the NetWorker server. For detailed information about SNMP management operations refer
to your network management documentation.
The NetWorker SNMP Module uses traps to communicate NetWorker event notifications
to SNMP management stations. A trap is an unsolicited notification sent from the SNMP
agent (the NetWorker server) to the SNMP event manager.
When you configure the SNMP notification in NetWorker, you can define the types of traps
that the NetWorker server sends to the SNMP even manager. Typical traps include
warnings, critical errors, and other messages from the NetWorker server.
Note
Note
You cannot modify the Event and Priority attributes for an existing notification.
6. In the Action attribute, specify the options for the nsrtrap command:
Option Description
-c community Specifies the SNMP community that is authorized to receive
traps from the NetWorker server. You configure SNMP
communities on the SNMP server. The default setting for this
Option Description
option is Public, which means that the public community can
receive traps from the NetWorker server.
-t trap_type Optional, sets the type of trap that the NetWorker SNMP Module
sends to the SNMP server. The default setting is six, which sets
the trap type to “enterprise-specific” and is the correct type for
the notifications (error messages) that the NetWorker server
sends to the SNMP server. Only modify the trap type if you
intend to send a specific trap to the SNMP server and not a
NetWorker notification.
-s specific_trap_type Optional, allows you to customize the identity of the type of trap
that the NetWorker server sends. Set this option to any integer
value. Use this option along with different SNMP notifications to
distinguish different traps from the NetWorker server.
7. Click OK.
NetWorker Notifications
A notification provides information about events that occur in a NetWorker environment.
You can configure the events to be reported and how the NetWorker server reports them
to you. Specific programs can be run when an event occurs, including third-party
programs. By default, the NetWorker server sends notifications to log files that are
located in the NetWorker_install_dir\logs directory on Windows and the /nsr/
logs directory on UNIX.
Preconfigured notifications
NetWorker is preconfigured to provide most of the event notifications that are required to
monitor NetWorker events. The following table lists these preconfigured notifications and
the associated actions that are performed by the NetWorker server.
The action attribute must be modified to replace mailserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623
describes how to customize the smtpmail command.
Linux: Sends an email to the root account stating that a bus or device reset has
been detected.
Client install Windows: Reports the hostname and NetWorker client software version
information to the <NetWorker_install_path>\nsr\logs
\media.log file.
Where host_name is the name of the NetWorker host, and product_version is the
NetWorker client software release and build number.
Device cleaned Windows: Reports that a device has been cleaned to the
<NetWorker_install_path>\nsr\logs\media.log file.
Linux: Sends an email to the root account stating that a device cleaning
operation has completed.
Linux: Sends an email to the root account stating that a device requires
cleaning.
Device disabled Windows: Reports that a device has been automatically disabled to the
<NetWorker_install_path>\nsr\logs\media.log file.
Linux: Sends an email to the root account stating that NetWorker automatically
disabled a device.
Device ordering Windows: Provides the syntax for the smptmail command to send an email to
issue detect the administrator account with the message Check system device
ordering. Moving device on NetWorker_server to
service mode.
To correct this issue, scan for devices in NMC and re-enable the device. The
action attribute must be modified to replace mailserver with the actual
hostname
of the mail server. Using smtpmail to email notifications on page 623
describes how
to customize the smtpmail command.
Linux: Sends an email to the root account with the message “Check system
device ordering. Moving device on NetWorker_server to service mode. To
correct, scan for devices in NMC and re-enable the device.
Event log Windows only. Logs notification events that are triggered by events and
priorities to the Event Log.
File system full - Launches the nsrim program to remove aborted and expired save sets. Used
recovering with advanced file type devices only.
adv_file space
File system full - Windows: Reports that the advanced file volume is full to the C:\Program
waiting for Files\EMC NetWorker\logs\media.log file.
adv_file space
Linux: Sends an email to the root account stating that an advanced file volume
is full.
Inactive Files Windows: Reports that the space occupied by inactive files exceeds configured
Alert threshold to the C:\Program Files\EMC NetWorker\logs\messages
log file.
Linux: Sends an email to the root account stating that the space occupied by
inactive files exceeds configured threshold.
Index size Windows: Reports a message that the size of the index will soon exceed the
space available to the C:\Program Files\EMC NetWorker\logs
\index.log file.
Linux: Sends an email to root with the message Check the size of
the
client file index because it will soon exceed the
space
available.
Log default Windows: Sends data about NetWorker events to the C:\Program Files
\EMC NetWorker\logs\messages log file.
Linux: Directs data about the NetWorker events to logger. The logger utility
sends the event with a tag of daemon.notice to the Operating system log file
defined in the system log configuration file, for example syslog.conf.
NetWorker Windows: Provides the syntax for the smptmail program to send an email to
Daemons Not the administrator account stating that NetWorker daemons are not running on
Running the NetWorker server. The action attribute must be modified to replace
mailserver with the actual hostname of the mail server. Using smtpmail to email
New Virtual Windows: Reports a message that new virtual machines have been detected to
Machine the <NetWorker_install_path>\nsr\logs\messages log file.
Linux: Sends an email to the root account stating that new virtual machines
have been detected.
Registration Windows: Sends messages about the registration status of the NetWorker
products to the <NetWorker_install_path>\nsr\logs\messages log
file. Linux: Sends an email to root with this message Check the
registration status.
Resource File Windows: Provides the syntax for the smptmail program to send an email to
Corruption the administrator account stating that resource file corruption has been
detected on the NetWorker server.
The action attribute must be modified to replace mailserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623 describes
how to customize the smtpmail program.
Linux: Sends an email to the root account stating that resource file corruption
has been detected on the NetWorker server.
Save set Windows: Provides the syntax for the smptmail program to send an email to
marked suspect the administrator account when a save set has been marked suspect.
The action attribute must be modified to replace maillserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623 describes
how to customize the smtpmail program.
Linux: Sends an email to the root account when a save set has been marked
suspect.
Tape mount Windows: Requests that media be mounted in a device and displays a pending
request 1 message in the <NetWorker_install_path>\nsr\logs\messages log
file.
Tape mount Windows: Requests that media be mounted in a device and displays a critical
request 2 message.
Tape mount Windows: Sends a request to mount a backup volume with a priority of Alert, to
request 3 the <NetWorker_install_path>\nsr\logs\media.log file.
Linux: Sends an email to the root account requesting that the tape be
mounted.
Tape mount Windows: Provides the syntax for the smptmail program to send an email to
request 4 the administrator account that a Tape mount request 4 event has occurred.
The action attribute must be modified to replace mailserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623 describes
how to customize the smtpmail program.
Linux: Sends an email to the root account stating that a Tape mount request 4
event has occurred.
Verify Label Windows: Provides the syntax for the smptmail program, to send an email to
failed on unload the administrator account stating that a label verification on unload operation
has failed.
The action attribute must be modified to replace mailserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623 describes
how to customize the smtpmail program.
Linux: Sends an email to the root account stating that a label verification on
unload operation has failed.
Volume Marked Windows: Provides the syntax for the smptmail program to send an email to
full the administrator account stating that a volume has been marked full.
The action attribute must be modified to replace mailserver with the actual
hostname of the mail server. Using smtpmail to email notifications on page
623 describes
how to customize the smtpmail program.
Linux: Sends an email to the root account stating that a volume has been
marked full.
Linux: Sends an email to the root account with a message that a volume with
the Scan needed flag is detected.
Customizing notifications
Notifications require the following three elements:
l Events
l Actions
l Priorities
About Events
An event signals that user intervention is required. For example, if a NetWorker server
needs a new tape, the server alerts users to the situation by posting an event to the
Console window.
NetWorker software generates an event that is based on various factors, including the
following scenarios:
l The software or hardware encounters an error that requires user intervention to
resolve.
l A NetWorker savegroup has failed.
l Drive ordering or serial number mismatch issues — a description of the problem is
provided, along with a corrective action to fix the problem.
l Capacity monitoring — for example, reaching the space threshold on the
deduplication node.
l NetWorker software is unable to poll a host it is monitoring for events or for
generating reports.
l A license or enabler code that is managed by the License Manager is about to expire.
Some situations do not result in the generation of an event. For example, when a license
managed by the NetWorker Console (instead of by the License Manager) approaches its
expiration date. In this situation, a message is recorded in the NetWorker logs, but an
event is not generated until the expired license causes a backup to fail. Check the
Administration window from time to time for important messages.
Actions
The Actions attribute defines the action that the NetWorker server takes after an event
notification occurs. The following table provides a summary of actions.
Action Description
eventlog Windows only, logs the notification message to the event log.
Priority determines whether the notification is an error, warning,
or information-only message.
nsrlog Windows only, sends a message about an event to a file. Use
option -f to identify a specific file. For example:
Action Description
logger UNIX only, uses the UNIX syslog facility (/usr/bin/logger)
to log information or send messages.
lp UNIX only, prints the notification.
mail UNIX only, sends an email to the specified user.
sendmail NetWorker Virtual Appliance (NVE), sends an email to a
specified user.
smtpmail Windows only, sends an email to the specified user.
nsrtrap Sends notifications to an SNMP management console. Use with
the following options:
l -c community (if not specified, then the default public is
used)
l -f file (reads message from a file and sends as snmp trap.)
l -i version (if not specified, then the default version is
SNMPV2)
l -s specific (default is NetWorker enterprise assignment,
which is 1)
l -t trap (default trap is #6 which is the enterprise-specific
trap)
l -u snmp uptime
l -v verbose
Third-party programs can also be used for the action, if the programs support reading
from standard input.
For example:
l On UNIX systems, you can use a third-party email program rather than the mail
program.
l On Windows systems, you can use a third-party email program rather than the
smtpmail program to send the information to other locations, such as an email
address or pager system.
Only users who belong to the NetWorker server Administrators list, or a member of the
Application Administrators user group, can change the Action attribute of an existing
notification.
l An EOF.
l CTRL-Z on console.
l A line consisting of a single period (.).
To use the smtpmail program to email event notifications:
Procedure
1. From the Administration window, click Server.
2. Click Notifications.
3. Right-click the notification, then select Properties. The Properties dialog box appears.
4. In the Action attribute, type:
where:
Priorities
Each NetWorker event has a series of associated messages, and each message has an
associated priority. The preconfigured notifications have selected priorities based on the
importance of the message being sent. For example, the first time the NetWorker server
sends a mount backup volume request, the priority assigned to the message is Waiting.
The priority of the second request is Alert. The priority of the third request is Critical.
The following table lists the priorities upon which notifications are based.
Priority Description
Information Information about the current state of the server.
Waiting The NetWorker server is waiting for an operator to perform a routine task, such as
mounting a backup volume.
Emergency A condition exists that may cause NetWorker to fail unless corrected immediately.
NOTICE
Editing a notification
NOTICE
Procedure
1. From the Administration window, click Server.
2. Click Notifications.
3. In the right pane, perform one of the following tasks:
l To modify multiple attributes in a single configuration resource by using the
Notification Properties window, right-click the staging configuration and select
Properties.
l To modify a specific attribute that appears in the resource window, place the
mouse in the cell that contains the attribute that you want to change, then right-
click. The menu displays an option to edit the attribute. For example, to modify the
Comment attribute, right-click the resource in the Comment cell and select Edit
Comment.
Note
To modify a specific attribute for multiple resources, press and hold the Ctrl key,
select each resource, and then right-click in the cell that contains the attribute that
you want to change. The menu displays an option to edit the attribute.
Copying a notification
Procedure
1. From the Administration window, click Server.
2. Click Notifications.
3. Right-click the notification to copy, then select Copy. The Create Notification dialog
box appears, containing the same information as the notification that was copied, for
Name attribute.
4. In the Name attribute, type a name for the new notification.
5. Edit any other attributes as appropriate, then click OK.
Procedure
1. From the Administration window, click Server.
2. Click Notifications.
3. Right-click the notification to delete, then select Delete.
4. When prompted, click Yes to confirm the deletion.
For example:
For example:
-----Original Message-----
From: Super-User [mailto:root@NWserver.emc.com]
Sent: Thursday, March 22, 2012 12:45 PM
To: debbie@mymailhost.com
Subject: Backup status for client xyz in group abc
cdcsdunndl1c, savefs, "succeeded:full:savefs"
* cdcsdunndl1c:savefs savefs cdcsdunndl1c: succeeded.
cdcsdunndl1c, C:\cmdcons\system32, "<NULL>:full:save"
* cdcsdunndl1c:C:\cmdcons\system32 cdcsdunndl1c:C:\cmdcons
\system32 aborted
* cdcsdunndl1c:C:\cmdcons\system32 Termination request was sent
to job 64006 as requested; Reason given: Aborted
Category Mapped from NetWorker notification event type (server, registration, and so
on).
Event ID Events from NetWorker software always designate the numeral 1 for the ID.
ConnectEMC
ConnectEMC is a reporting tool that allows you to send important configuration
information about the NetWorker environment to help troubleshoot issues. You can
enable the ConnectEMC feature by using NMC or the nsradmin command line tool to
Note
You can use Report home or ConnectEMC but should only enable one of these features
since they provide different delivery methods of the same information. EMC recommends
using ConnectEMC in NetWorker releases 9.0 and later. The configuration information
that is provided by ConnectEMC can be helpful for support engineers to resolve an
escalation.
4. In the General tab, specify a value for Frequency in weeks. By default, this value is set
to 0, which indicates that automatic reporting is disabled. Setting frequency in weeks
to a value greater than 0 enables the schedule. An administrator can then set the hour
of transmission, as well as the day of the week, and the interval.
5. (Optional) Alternatively, you can select Send now to send the information
immediately. On clicking OK, this pushes a copy of the NetWorker RAP database to
EMC's SYR database. When communicating with support engineers, this option can
help reduce issue resolution times.
6. The SMTP host is set by default to localhost. If the NetWorker server does not have
email capability, you can configure another SMTP host to handle the email.
7. Click OK.
The default configuration displays the updates in the Server window.
Note
3. The SMTP host is set by default to localhost. If the NetWorker server does not have
email capability, you can configure another SMTP host to handle the email.
For example, to change the SMTP host in nsradmin to the hostname
mailhub.mynetwork.com, type: update SMTP Host: mailhub.mynetwork.com
The following shows a sample ConnectEMC configuration when you execute print
NSR ConnectEMC:
8. (Optional) To generate copies of the database, use the nsrdump command line tool .
On Windows, the default path for the RAP database output file is located in
NetWorker_install_path\nsr\applogs\rh. On Linux, the path is /nsr/
applogs/rh.
Report home
The installation of the NetWorker server software enables the report home feature by
default. Report home requires email capability on the NetWorker server. Similar to
ConnectEMC, this connection enables the delivery of NetWorker configuration
information to EMC Support when an event in the NetWorker software triggers a default
notification.
The default notification sends an email that includes the NSR RAP attribute data to EMC
Support. The email does not include other information or client data.
On Windows, the default path for the report home output file is located in:
NetWorker_install_path\nsr\applogs\rh
Note
You can use Report home or ConnectEMC but should only enable one of these features
since they provide different delivery methods of the same information. EMC recommends
using ConnectEMC in NetWorker releases 9.0 and later. The configuration information
provided by ConnectEMC can be helpful for support engineers to resolve an escalation.
nsradmin
3. Edit the mail program attribute of the report home resource and type the name of the
default mail server. For example, type:
quit
quit
quit
nsradmin
3. Edit the sender email address attribute, and type the additional email recipients. For
example, type:
3. To edit the additional email recipients attribute and specify additional email
recipients, type:
quit
Note
Event polling for NetWorker libraries can occur a maximum of once per hour.
Setting system options to improve NMC server performance on page 683 provides
information on setting polling intervals.
c. In the SNMP Traps list, select the checkbox next to the Data Domain system events
that you want to monitor with NetWorker.
5. Click OK.
Event viewing
Events appear in the lower right pane of the Console window.
The following table describes the information that appears in the columns for each event.
Column Description
Priority Represents the relative severity of the problem by displaying
one of seven icons.
Server Name Identifies the host that caused the event to be generated.
Server Type Identifies the type of server to which the event belongs. Server
types include but are not limited to NetWorker and Data Domain.
Time Indicates the day of the week and time that the Console server
discovered the problem. The time which an event is reported is
always based on the time zone of the Console server. For
example: If a backup fails at 11:00 A.M. in New York, a Console
server in Los Angeles reports the event as occurring at 8:00 A.M.
The time format depends on the current locale setting. Start date
and time formats on page 588 provides more
information.
Message Displays the text of the error message that generated the event.
Column Description
associated with an event, and can accommodate more
information than the Note column.
Event priorities
Each event is designated with one of seven possible priorities. When the Console window
sorts events by priority, it lists the events in alphabetical order, with Emergency between
Critical and Information.
The following table provides more information on each type of event priority.
Dismissing an event
After you view and act on an event, you can dismiss the event from the Console window
to prevent other users from acting unnecessarily on events that have already been
resolved.
Note
Dismissing an event makes it disappear from the Console window for all NetWorker
users.
Procedure
1. From the Console window, right-click the event and select Dismiss.
A confirmation message appears.
2. Click Yes.
Results
There are slight differences in how event dismissals are handled, depending on the
source:
l Events from NetWorker software are automatically dismissed in the Console window
when the problem that triggered the event is resolved.
l Events from device ordering or serial mismatch issues are automatically dismissed in
the Console window when the problem is resolved via the corrective action provided.
Procedure
1. From the NMC Console window, click Enterprise.
2. In the Enterprise view, right-click the NetWorker server and select Launch Application.
The Administration window appears.
3. Click Monitoring to view the Monitoring window.
Figure 56 Monitoring window
rest of the window. You can click and move the splitter to resize the task monitoring area.
The arrow icon in the upper right corner of the Monitoring window allows you to select
which tasks you want to appear in this view.
Smaller windows appear within the Monitoring window for each window. Each smaller
window, once undocked, is a floating window and can be moved around the page to
customize the view. You can select multiple types from the panel to create multiple
floating windows that can be viewed simultaneously. The following table describes the
various types of information available in the docking panel, and the details each one
provides.
Policies/Actions The Policies tab provides you with status information about all
configure policies and the associated workflows and actions.
The Actions tab provides you with status information for all
actions. Policies/Actions pane on page 643 provides more
information.
Alerts Lists the priority, category, time, and message of any alerts.
Alerts pane on page 53 provides more information.
Operations Lists the status of all library and silo operations, including
nsrjb operations that are run from the command prompt. Also
lists user input, libraries, origin, operation data, operation start
time, duration of the operation, progress messages, and error
messages.
Customizing tables
You can customize the organization and display of tabular information in the Monitoring
window.
Sorting tables
You can change the display of tabular information that appears in the window. You can
sort Table grids by column heading, and then by alphabetic or numeric order within those
columns.
1. Drag-and-drop the column heading to its new position.
2. Click the column heading to sort the items into alphabetic and numeric order. An
arrow appears in the column heading to indicate the sort order.
Sorting selected rows in a table
Selected rows are sorted to the top of the table. This is particularly useful when you
select Highlight All from the Find panel to select all rows matching the Find criteria and
then moving all selected rows to the top of the table to view the results.
1. From the Edit menu, select Find, or press Ctl + F to view the Find panel.
2. To select the rows, click each row or use the Find criteria.
3. Select Sort Selected.
Sorting multiple columns in a table
You can select the column that you want to use as the tertiary sort key, the secondary sort
key, and the primary sort key.
1. Click the column that you want to use as the last sort key.
2. Click the column that you want to use as the next-to-last sort key, and so on, until you
select the primary column.
Displaying columns in a table
You can select which columns to display in a table.
1. From the View menu, select Choose Table Columns.
2. Click a column name to select or clear the column and then click OK. You can also
select the columns to display by right-clicking a table header and selecting Add
Column from the drop-down.
Displaying panes
You can choose to show or hide panes in the Monitoring window.
Perform the following steps to hide or show a pane in the Monitoring window.
Procedure
1. From the View menu, select Show. A check mark appears beside the panes that
appear in the Monitoring window.
2. To hide a pane, select a marked pane.
A check mark does not appear beside the pane.
3. To show a pane, select an unmarked pane.
Policies/Actions pane
The Policies/Actions pane provides you with the ability to review status information
about policies and actions.
This pane has two tabs:
l Policies—Provides a navigation tree that displays all configured policies on the
NetWorker server. Expand each policy to display the workflows that are associated
with each policy. Expand each workflow to display each action that is contained in
the workflow.
l Actions—Provides a list of all Action resources.
Policies pane
The Monitoring window in the NetWorker Administration window enables you to monitor
activities for specific policies, workflows, and actions.
The Policies/Actions pane at the top of the Monitoring window lists the policies on the
NetWorker server by default. Click the + (plus) sign next to a policy in the list to view the
workflows in the policy, and the + (plus) sign next to a workflow to view the actions for a
workflow.
The Policies pane provides the following information for each item (where applicable):
l Overall status
The following table provides details on the status icons that may appear in the
Policies pane.
Icon Status
Never run
Running
Succeeded
Failed
Probing
Interrupted
Queued
Cloning
When you sort the items on the Policies/Actions pane by using the Status column,
NetWorker sorts the items in alphabetical order that is based on the label of the icon.
Consider the following when a policy/action is in a probing state:
l A message is sent when the group starts and finishes the probe operation.
l The results of the probe operation (run backup/do not run backup) are also logged.
l Probes do not affect the final status of the group, and the group status does not
indicate the results of the probe.
l If probing indicates that a backup should not run, then the group status reverts to its
state before the group running.
l Check the results of the probe in the Log window to ensure that the probe indicates
that the backup can be taken.
Actions pane
To view a list of all actions, click the Actions tab at the bottom of the Policies pane. The
Policies pane becomes the Actions pane.
The Actions pane provides the following information for each action:
l Overall status
Note
The Actions pane displays the same status icons as the Policies pane.
l Name
l Assigned policy
l Assigned workflow
l Type
l Date and time of the most recent run
l Duration of the most recent run
l Percent complete, for actions that are in progress
l Next scheduled runtime
Right-click an action in the Actions pane and select Show Details to view details on
currently running, successfully completed, and failed activities for the action.
Workflow operations
This section describes how to use the Monitoring window to start, stop, and restart
workflows.
Note
You can restart any failed or canceled workflow. However, the restart must happen within
the restart window that you specified for the workflow.
You can also start specific policies and workflows in the Protection window by right-
clicking the policy or workflow, and selecting Start.
Procedure
1. Select the workflow, or action in the Monitoring window.
2. Right-click and select Start, Stop, or Restart.
A confirmation message appears.
3. Click Yes.
3. In the Actions pane, right-click the action, and then select Show Details. The details
window for the action appears.
4. Review the information in the Actions Messages pane. To display detailed information
from the action log file, click Show Action Logs, and then select one of the following
options:
l Get Full Log—To display all messages.
l Print—To print the log.
l Save—To save the log to a local file.
l OK—To close the Show Messages window.
5. In one of the Actions detail panes, for example, the Completed successfully pane,
select the action that you want to review.
6. Click Show Messages. In the Show Messages window, select one of the following
options:
l Get Full Log—To display all messages.
l Print—To print the log.
l Save—To save the log to a local file.
l OK—To close the Show Messages window.
Sessions window
Use the Sessions window to view the sessions that are running on a NetWorker server.
You can change the view of this window to display these sessions:
The Sessions pane below the Policies/Actions pane provides details on individual save,
recover, clone, and synthetic full sessions by client.
Click the tabs at the bottom of the Sessions pane to view all sessions or to limit the list of
sessions by the session type. Session types include:
l Save
l Recover
l Clone
l Browse
l Synthetic Full/Rehydrated Sessions
l All
To change the displayed session types go to View > Show, and select the type of sessions
to display. To display all sessions currently running on the NetWorker Server, regardless
of type, select All Sessions.
You can stop a session (backup, synthetic full backup, clone, and recovery sessions)
from the Monitoring window, even if the session was started by running the savegrp
command.
To stop a session, right-click the session in the pane, and select Stop from the drop-
down.
Alerts pane
The Alerts pane displays alerts that are generated by a particular NetWorker server or
Data Domain system that has devices that are configured on the NetWorker server. The
Alerts pane includes priority, category, time, and message information.
An icon represents the priority of the alert. The following table lists and describes each
icon.
When items on the Alerts pane are sorted by the Priority column, they are sorted in
alphabetical order based on the label of the icon.
Removing alerts
Remove individual alert messages from the Events tables by removing them from the
Events table. To delete a message in the Events table, right-click the message, and select
Dismiss.
Note
The alert message remains in the Log window in the NetWorker Administration program.
Devices pane
The Devices pane allows you to monitor the status of all devices, including NDMP
devices. If the NetWorker server uses shared and logical devices, the window is adjusted
dynamically to present a set of columns appropriate for the current configuration.
The Devices pane provides the following information:
l Status of the operation.
l Name of the device.
For example, a labeling operation may want the user to acknowledge whether the
system should overwrite the label on a tape.
Entering user input on page 56 provides instructions on how to deal with a user input
notification.
If the current server configuration includes a shared device, a Shared Device Name
column appears on the Devices pane. The name of the shared device appears in the
Shared Device Name column. If other devices for that configuration are not shared
devices, then the Shared Device Name column is blank for those devices. Only a single
device per hardware ID can be active at any particular moment. The information for
inactive shared devices is filtered out, and as a result, only one device per hardware ID is
presented on the window at any time.
An icon represents the device status. The following table lists and describes each icon.
When you sort items in the Devices pane by the Status column, NetWorker sorts the
devices in alphabetical order based on the label name of the icon.
Operations window
The Operations window displays information about device operations. It provides the
following information:
l Status of the operation.
l Name of the library.
l Whether the operation requires user input.
For example, a labeling operation may want the user to acknowledge whether the
system should overwrite the label on a tape. Entering user input on page 56 provides
instructions on how to deal with a user input notification.
Only the last error message of the operation appears in the Error Messages column.
Move the mouse pointer over the cell containing the last error message to display the
entire list of error messages.
The operation status is represented by an icon. The following table lists and describes
each of the icons.
When items on the Operations window are sorted by the Status column, they are sorted
in alphabetical order based on the label of the icon.
Stopping an operation
Certain operations can be stopped from the Operations window.
Procedure
1. From the Administration window, click Monitoring.
2. Click Operations in the docking panel.
3. Right-click the operation to stop, then select Stop.
4. Click Yes to confirm the stop.
Note
Operations that were started from a command line program, such as the nsrjb
command, cannot be stopped from the Operations window. To stop these operations,
press Ctrl-c from the window where the command was started.
Note
If two users try to respond to the same user input prompt, the input of the first user
takes precedence, and the second user receives an error message.
l If No, and input is not supplied, the operation will time out and fail.
Log window
To view the most recent notification logs, click the Log window from the docking panel in
the Monitoring window. The Log window provides the priority, time, source, category, and
message for each log.
Note
If a particular log file is no longer available, check the log file on the NetWorker server.
The log files are located in NetWorker_install_path\logs directory.
An icon represents the priority of the log entry. The following table lists and describes
each icon.
When you sort items on the Log pane by using the Priority column, NetWorker sorts the
icons in alphabetical order based on the name of the label.
Recover window
The Recover window displays information about recover configurations that are created
with the NMC Recovery wizard.
You can use this window to:
l Start the NMC Recovery wizard to create recover configurations or modify saved
recover configurations.
l Identify the status of a recover configuration that is created with the NMC Recovery
wizard.
l Start and stop a recover job.
The Recover window is divided into five sections:
l Toolbar—The toolbar is hidden by default. To display the recovery toolbar, select View
> Show toolbar
l Summary
l Configured Recovers
l Currently Running
A splitter separates the Configured Recovers section from Currently running window. You
can click and move the splitter to resize these two windows.
The following table shows an example of the Recover window.
Recover toolbar
The Recover toolbar provides you with the ability to quickly perform common recover
operations. The following table summarizes the function of each toolbar button.
Button Function
Note
The Recover toolbar does not appear by default. To display the Recover toolbar, select
View > Show toolbar.
Recover Summary
The Recover Summary section displays a high-level overview of recover jobs.
This section includes the following information:
l Total Recovers—The total number of successful recover jobs.
l Since—The number of successful recover jobs since this date.
Configured Recovers
The Configured Recovers window displays a list of saved recover configurations in a
tabular format. You can sort the information by column. The Configured Recovers table
displays the following information for each saved recover configuration:
l Status—The job status of a saved recover configuration.
l Name
l Source client
l Destination client
l Recovery list
l Recover type—For example, file system or BBB.
l Comment
l OS—The operating system of the source host.
l Recover requestor—The Windows or UNIX account used to create the recover
configuration.
l Start Time
l End Time
l Start date
Icon Description
The last recover attempt failed.
Currently running
The Currently Running window displays a list of in progress recover jobs in a tabular
format. You can sort the information by column. The Currently Running table displays the
following information for each job:
l Status
l Name
l Source client
l Destination client
l Recovery list
l Recover type—For example, file system or BBB
l Volume
l Comment
l Device
l Size
l Total size
l % complete
l Rate (KB/s)
l Start time
l Duration
l Currently running
Find
The Find section appears along the bottom of the Recover window, after you select the
Find button on the Recover toolbar. Find allows you to search for keywords in the
Configured Recovers window. The following table summarizes the available find options.
Find Highlight the first saved recover configuration that contains the
specified keyword.
Highlight All Highlights each saved recover configuration that contains the
specified keyword.
l Security Audit Log feature — This feature provides the NetWorker server and the NMC
Console server with the ability to log specific security audit events related to their
operations.
The EMC NetWorker Security Configuration Guide describes how to use and configure the
Monitor RAP attribute and the Security Audit Log feature.
l Enterprise........................................................................................................... 658
l Customizing the Console window and views........................................................665
l Connecting to the NMC GUI using an ssh connection........................................... 666
l Backing up the NetWorker environment...............................................................666
l Using the NMC Configuration Wizard................................................................... 669
l NMC server authentication.................................................................................. 669
l Adding the NMC service account to the Users user group.................................... 674
l Moving the NMC server........................................................................................675
l Migrating NMC users to the authentication service database...............................677
l Resetting the administrator password................................................................. 678
l Changing the service port used by the NMC database......................................... 680
l Changing database connection credentials......................................................... 682
l Updating the NMC server IP address/hostname...................................................683
l Setting system options to improve NMC server performance................................683
l Displaying international fonts in non-US locale environments............................. 686
l NetWorker License Manager................................................................................ 686
l NMC error messages and corrective actions........................................................ 687
l Console troubleshooting notes and tips.............................................................. 691
Enterprise
The Enterprise is a visual representation of the NetWorker Console control zone. You can
monitor various servers in the enterprise such as the NetWorker and Data Domain servers
for events. You can also generate various reports on events, backups, and user activity.
Enterprise components
Enterprise components include hosts and folders.
Hosts
A host, also known as a managed node, is the NetWorker or Data Domain server
being monitored. A host terminates a branch in the Enterprise.
Folders
The purpose of folders is to enable the Enterprise to contain multiple levels. Each
folder can contain more folders, more hosts, or more of both.
Show the managed applications that are installed on a host Click the host.
computer.
multiple hosts. Adding or deleting multiple servers by using a hostname file on page
663 provides further information.
The server management activities include, but are not limited to, operations that are
related to devices and libraries, and events that require user intervention.
Note
When you configure a Data Domain device with the New Device wizard, the wizard adds
Data Domain servers as a managed host. The EMC NetWorker Data Domain Devices
Integration Guide provides more information about Data Domain as a managed host.
Procedure
1. From the Console window, click Enterprise.
2. In the left pane, right-click Enterprise, then select New > Host. The Add New Host
wizard appears.
3. Type a hostname, IP address, DNS name, or WINS name in the Host Name attribute,
then click Next.
Note
Note
You can also use the Console Configuration wizard to add a host.
Deleting a host
You can delete a single host or multiple hosts within a folder.
Procedure
1. From the Console window, click Enterprise.
2. Right-click the host, then select Delete. The Deleting Host dialog box appears.
l To delete multiple hosts, select multiple hosts in the details pane and select
Delete.
l If additional copies of the host exist in the Enterprise, use the Delete all existing
copies of the host option to delete all instances of that same host in a single
operation.
3. Click Yes to confirm deletion of the host.
Copying a host
You can create multiple copies of a host for a single NetWorker server. For example, you
can create one copy of a host in the logical position of the host in the Enterprise, while
another copy of the host is in a Hosts-to-Watch folder where you can easily monitor it. In
this configuration, you can check the server without browsing through the Enterprise.
Procedure
1. From the Console window, click Enterprise.
2. Right-click the host, then select Copy.
3. Right-click a new location, then select Paste.
Note
You can also use the drag-and-drop feature while press and holding the Ctrl key to
copy hosts.
Moving a host
To move a host from one location to another in an Enterprise, perform the following steps.
Procedure
1. From the Console window, click Enterprise.
2. Right-click the host to move, then select Move.
3. Right-click a new location, then select Paste.
Note
You can also use the drag-and-drop feature while holding down the Ctrl key to move
hosts.
Adding a folder
Procedure
1. From the Console window, click Enterprise.
2. Right-click the location within the Enterprise where you want the new folder to appear,
then select New > Folder.
A new folder appears in the Enterprise with the default name Untitled1.
3. Highlight the default name and type a new name to replace it. The name must meet
these criteria:
l Include at least one, but no more than 80 characters.
l Exclude forward slashes (/).
4. Press Enter.
Deleting a folder
Procedure
1. From the Console window, click Enterprise.
NOTICE
If there are user group restrictions in place that control which hosts a user can
view, the folder might appear empty.
Copying a folder
Procedure
1. From the Console window, click Enterprise.
2. Right-click the folder to copy, then select Copy.
3. Right-click a new location, then select Paste. A copy of the folder appears in its new
location.
NOTICE
You can also use the drag-and-drop feature to copy folders while holding down the
Ctrl key.
Moving a folder
Procedure
1. From the Console window, click Enterprise.
2. Right-click the folder to move, then select Move.
3. Right-click a new location, then select Paste. The folder appears in its new location.
NOTICE
You can also use the drag-and-drop feature to move folders while holding down the
Ctrl key.
Renaming a folder
Procedure
1. From the Console window, click Enterprise.
2. Right-click the folder, then select Rename.
3. Highlight the folder name and type a new name to replace it. The name must meet
these criteria:
l Include at least one, but no more than 80 characters.
l Exclude forward slashes (/).
4. Press Enter.
Restrictions
Before you use the gstmodconf command, review the following restricitions.
If a host already exists anywhere in the Enterprise (either at the base or within a folder),
you cannot use the gstmodconf command to add copies of the host.
You cannot use this command to add a host to a folder. You can only add a host to the
base level of the Enterprise. After you add the host to the Enterprise, use the Console GUI
to move the host to a folder. Moving a host on page 661 provides more information.
When you use the gstmodconf command to delete a host, the command only deletes
hosts from the base level. The command does not delete hosts that are within folders.
Hostname file
#This is a hostname file for XYZ Corporation
apple
banana
grape
kiwi
mango
nectarine
pineapple
strawberry
tangerine
The following output provides an example of the error that appears when you use the
gstmodconf command but you did not specify the administrator password when the
password is not the default value.
Example: Trying to use gstmodconf without specifying the password
2. Click a column name to select or clear the column and then click OK. You can also
select the columns to display by right-clicking a table header and selecting Add
Column from the drop-down.
Note
If you changed the default NMC server ports, specify the correct port numbers.
javaws http://localhost:9000/gconsole.jnlp
Note
The Server Protection policy also includes the server maintenance workflow, which
performs an expire action to mark expired save sets as recyclable.
You can edit the default policy, workflows, groups, and actions, or create a set of policies
for server backup and maintenance.
Note
The file system that contains the staging directory must have free disk space that is a
least equal to the size of the current NMC database. The section "Changing the
staging directory for NMC database backups" in the EMC NetWorker Administration
Guide describes how to change the staging directory location.
l Creates a group called NMC server.
l Adds the Client resource to the NMC server group.
l Creates a workflow that is called NMC server backup in the Server Protection policy.
The workflow contains the NMC server backup action, which performs a full backup of
the NMC server database every day at 2 P.M.
l Adds the NMC server group to the NMC server backup workflow.
Note
The NMC server database backup only supports the full and skip backup levels. If you
edit the NMC server backup action and change the levels in the backup schedule to a
different level, for example synthetic full, NetWorker performs a full backup of the
database.
Note
If the path does not exist, the savepsm process creates the directory at the time of
the backup.
4. Click OK.
savepsm staging_directory
where staging_directory is the location that the backup uses to temporarily store a
copy of the NMC database for backup.
For example:
savepsm e:\nmcdb_stage
establish each trust, update the user groups on each NetWorker server to include the
users and groups that require access to the NetWorker server.
Procedure
1. To establish the trust, type the following command on each NetWorker server that is
not local to the NetWorker Authentication Service that NMC users for authentication:
nsrauthtrust -H Authentication_service_host -P
Authentication_service_port_number
where:
l The location of the nsrauthtrust command differs on Linux and Windows:
n Linux—/usr/sbin
n Windows—C:\Program Files\EMC NetWorker\nsr\bin
l Authentication_service_host is the hostname of the NetWorker server that
authenticates the NMC server host.
l Authentication_service_port_number is the port number used by the NetWorker
Authentication Service. The default port number is 9090.
2. Use the nsraddadmin command to grant the NetWorker Authentication Service user
groups access to the NetWorker server.
nsraddadmin -H Authentication_service_host -P
Authentication_service_port_number
3. From command prompt, use the gstauthcfg command to change the NetWorker
Authentication Service host that is used by the NMC server.
The location of the gstauthcfg command differs on Linux and Windows:
l Linux—/opt/lgtonmc/bin
l Windows—C:\Program Files\EMC NetWorker\Management\GST\bin
For example:
gstauthcfg -c -t -h New_authentication_service_hostname -p
port_number
Note
5. To establish the trust, type the following command on each NetWorker server that is
not local to the NetWorker Authentication Service that NMC users for authentication:
nsrauthtrust -H Authentication_service_host -P
Authentication_service_port_number
where:
l The location of the nsrauthtrust command differs on Linux and Windows:
n Linux—/usr/sbin
n Windows—C:\Program Files\EMC NetWorker\nsr\bin
l Authentication_service_host is the hostname of the NetWorker server that
authenticates the NMC server host.
l Authentication_service_port_number is the port number used by the NetWorker
Authentication Service. The default port number is 9090.
6. Use the nsraddadmin command to grant the NetWorker Authentication Service user
groups access to the NetWorker server.
nsraddadmin -H Authentication_service_host -P
Authentication_service_port_number
Note
If you do not create the service account, the NMC server cannot monitor events or
gather reporting data from the managed NetWorker servers.
Note
EMC recommends that you specify usernames when your user accounts are a member
of a large number of groups.
Modifying user groups for new NetWorker Authentication Service users 673
NMC Server Management
4. Paste the dn value for the group into the External roles attribute.
Note
The EMC NetWorker Security Configuration Guide describes how to use the authc_mgmt
command to query the external authentication authority from a command prompt.
Note
Perform this step and each subsequent step on for each NetWorker server that is not
local to the authentication service that the NMC server uses to authenticate users.
where:
l NetWorker_server is the name of the NetWorker server
l source_NMC_server is the name of the source NMC server.
l AES_Passphrase is the passphrase that was specified for the NMC database
backup.
l staging_dir is the staging directory specified during the backup of the database on
the source NMC server .
Note
When you perform an NMC database backup, the backup operation performs a
backup of the database from the staging directory. As a result, the save set name
is name of the staging directory. Use the mminfo command on the NetWorker
server to determine the name of the staging directory.
The EMC NetWorker Command Reference Guide or the UNIX man pages provide a
complete description of the recoverpsm command line options.
11. If the source NMC server managed NetWorker 8.2.x and earlier servers that use LDAP
authentication, then recover the LDAP configuration authority files. Use the recover
command, the NetWorker User program, or the NMC Recovery wizard to recover all the
files in the console_install_dir/cst directory. Recover these files to the
console_install_dir/cst directory on the target NMC server.
12. Start the NMC server service on the target NMC server and connect to the NMC GUI.
After you finish
If the target NMC server uses a different NetWorker server to provide authentication
services than the NetWorker server that the source NMC server used, then you must use
the gstauthcfg command on the NMC server to update the NetWorker Authentication
Service host, and then run the nsrauthtrust commands on each NetWorker server
that is managed by the NMC server.
When the source NMC server uses a different NetWorker server for authentication and you
do not establish a trust, the following behavior occurs:
l The NMC Events window displays Unable to connect to the server error
messages for each managed NetWorker server.
l When you try to connect to the NetWorker server, a message similar to the following
appears: Unable to connect to the server: Unable to set user
privileges based on user token for SYSTEM: Failed to
validate security token.
Changing the Authentication service hostname and port number on page 670 provides
more information.
Note
By default all users are selected for migration. The migration deletes unselected user
accounts.
b. Leave the default selection for Password Change Required, which ensures that
when the user connects to the NMC Server for the first time, that the log in process
prompts the user to change their password.
c. In the Groups field, if the user will manage user accounts, select the
Administrators group.
Updating the NetWorker User Group resources for migrated NMC users
The NetWorker server uses the membership in the External Roles field of the user group
resources to determine the privileges that are assigned to the NetWorker Authentication
Service local database users. After the log in process migrates NMC users into the
NetWorker Authentication Service local database, update the User Group resources on
each managed NetWorker server, to provide the migrated NMC users with the privileges
to each NetWorker server.
Perform the following steps while logged in to the NMC server with the Administrator
account.
Procedure
1. In the NMC GUI, create an NMC group that contains the local database users. This
group allows you to quickly add multiple users that require the same privileges to one
or more user groups:
a. On the NMC GUI, click Setup.
b. On the User and Roles navigation pane, right-click Groups and select New.
c. In the Name field, specify a unique name for the group.
In the Local Users section, select all the user accounts to add to this group, and
then click OK.
2. In the Administration window, perform the following steps:
a. On the toolbar, select Server.
b. On the left navigation pane, expand User Groups.
c. Right-click the user group to which the NMC users require membership, and select
Properties.
d. In the Configuration section, click the Add (+) button beside the External Roles
attribute.
e. Select each local database user or group that requires the privileges that are
assigned to the user group, and then click OK.
To select multiple successive users or groups, hold the Ctrl key while you select
the first and last user or group. To select multiple individual users or groups in any
order, hold the Shift key while you select each user or group.
Results
The distinguished name (dn) for each selected user and group appears in the External
Roles field.
where mypassword_out.txt is the name of the output file that contains the
Base64 encoded password.
Output similar to the following appears:
Input Length = 10
Output Length = 74
CertUtil: -encode command completed successfully.
The contents of the mypassword_out.txt file contains the following encoded text
for the password value "1.Password":
-----BEGIN CERTIFICATE-----
MS5QYXNzd29yZA==
-----END CERTIFICATE-----
The command displays the encoded text for the password value "1.Password" :
MS5QYXNzd29yZA==
{
"local_users": [
{
"user name": "administrator",
"password": "MS5QYXNzd29yZA=="
}]
}
Note
If the NetWorker server is also the NMC server, start the NMC server service. Type
the following commands: net start gstd
l For Linux, type the following commands:
/etc/init.d/networker stop
/etc/init.d/networker start
When the NetWorker Authentication Service starts, the startup process checks for the
authc-local-config.json. If the file exists and the password adheres to the
minimum password policy requirements defined for a password, the NetWorker
Authentication Service resets the password. Review the authc-server.log file for
errors.
By default, the authc-server.log file is located in /nsr/authc/logs on Linux
and C:\Program Files\EMC NetWorker\authc\tomcat\logs on Windows.
Note
8. Use the authc_mgmt command to confirm that you can connect to the NetWorker
Authentication Service with the new password.
For example:
Note
NOTICE
Multiple Postgres processes appear. Two or more httpd processes appear. The
parent httpd process runs as root and the child process that is run as the username
specified during the installation.
7. To confirm that the NMC server daemons have started, from a command prompt, type:
ps -ef | grep lgtonmc.
Output similar to the following appears when the daemons have started:
root 3064 1 0 10:03 ? 00:00:01 /opt/lgtonmc/bin/gstd
dbuser 3329 1 0 10:04 ? 00:00:00 /opt/lgtonmc/postgres/bin/
postgres -D /opt/lgtonmc/nmcdb/pgdata
root 3969 1 0 10:04 ? 00:00:00 /opt/lgtonmc/apache/bin/httpd
-f /opt/lgtonmc/apache/conf/httpd.conf
nobody 3970 3969 0 10:04 ? 00:00:00 /opt/lgtonmc/apache/bin/
httpd -f /opt/lgtonmc/apache/conf/httpd.conf
Changing the service port used by the NMC database on Windows 681
NMC Server Management
Note
Note
4. Use the regedit command to update the port number in the registry.
a. Browse to \\HKEY_LOCAL_MACHINE\Software\ODBC\ODBC.INI
\lgto_gst_pgsql.
b. Edit the Port registry key.
c. In the Value Data field, specify the new port number.
d. Click OK.
5. Start the EMC GST Service.
2. Browse to the NetWorker bin directory then run the platform-specific commands:
l On Windows, run gstconfig in the NMC_install_dir\GST\bin folder.
l On Linux, as root, run the gstconfig command in the /opt/lgtonmc/bin
directory.
3. Start the gstd service:
l On Linux: /etc/init.d/gst start
l On Windows: Start the EMC GST Service service.
4. For NMC server hostname changes only, delete the Client resource that you created to
perform NMC server database backups, then create a new client resource.
NOTICE
Do not adjust these system options without careful consideration. A mistake in setting
system options can seriously degrade performance.
Range: 1-20
Range: 0-20
4. Click OK.
You must specify the username of the root or system user on the NMC server,
regardless of whether you use individual user authentication.
When you set the User Authentication for NetWorker system option, the NMC server
software creates a separate network connection the NMC server to a NetWorker server for
each Console user that has an Administration window open to that server.
When you do not set the user authentication for NetWorker system option, there is only
one network connection from the NMC server to the managed NetWorker server.
Note
If you plan to use the EMC Licensing Solution introduced in NetWorker 9.0, you do not
require the NetWorker License Manager and EMC recommends that you skip the
NetWorker License Manager software installation during the NetWorker 9.0 install. When
upgrading to NetWorker 9.0, you can back up the NetWorker License Manager by
following the procedure outlined in the section "Backing up the NetWorker License
Manager" in the EMC NetWorker Licensing Guide.
With the NetWorker License Manager, you can move NetWorker software from one host to
another, or change the IP address on an existing NetWorker server without having to
reauthorize the software. You can install the NetWorker License Manager program as an
option during the NetWorker software installation.
The latest EMC NetWorker License Manager Installation and Administration Guide provides
more information on how to install and use the NetWorker License Manager.
The NetWorker server does not A temporary enabler code Log out, then stop and restart
accept the authorization code. has already expired. the NMC server services.
An application window is Insufficient disk space on the l Ensure that the NMC server
unresponsive. file system where the NMC is running. If it is not, close
database is installed. all application windows and
Failed to bind to port Another process is using the Close any running NMC GUIs or
port_mumber message appears gstd service port (default any processes that may be using
in the gstd.raw log file. 9001) or the port is in a the gstd service port. Wait until
timeout (TIME_WAIT/ the timeout period passes so
FIN_WAIT) state. that the operating system can
free up the port. The timeout
period may differ between
operating systems.
Database fetch operation The NMC database is corrupt. Recover the database.
failed messages appears in the
gstd.raw log file.
Display problem: The gstd service is not Restart the NMC server.
running on the NMC server.
In Internet Explorer:
Browser is not pointing to the Check the install log file to
The page cannot be displayed.
correct URL. determine the HTTP port that is
used by the NMC server.
Enabler code not accepted. Temporary enabler code has Close the Console server and log
expired. in again.
Database store operation l Another user is trying to l Wait a few moments and try
failed: An object with add a folder to the same again.
pathname location in the Enterprise l Check whether there is an
“pathname” already exists. simultaneously.
existing object with the
l An object was added same name.
with the same name as
an existing object.
Could not contact License License Manager hostname If you are using the License
Manager on hostname. has not been assigned or Manager and a hostname has
License Manager is not not been assigned:
- or -
running or installed.
Select the Software
Program not registered.
Administration task.
Click Licensing.
Click OK.
License allocation failed. Temporary license for Enter enabler codes and register
NetWorker software is the product.
expired.
License managed event License has been authorized None needed. To remove the
indicates that license is within the last 24 hours. managed event from the display,
expiring/expired even though dismiss the event or it is deleted
it has been authorized. within 24 hours.
Logging of troubleshoot Disk space on the /opt file Allocate more disk space.
messages has stopped. system is nearly full.
Dialog box: "Java Web Start – Java Web Start preferences Check the Preference settings in
Download Error" with the are set to something that is the Java Web Start Application
message, "Unable to launch incompatible with the rest of Manager for compatibility with
NetWorker Console". the environment. the environment. Change any
settings that prohibit the
(For example, a proxy server
download of the Console client
has been set up
software.
that stops Java Web Start
from downloading the In the proxy server example, go
Console client software from to the General tab of
the Console web the Preferences dialog box and
server.) select None, for
This error message may also Proxies.
occur if the If the Java Web Start cache path
Console is being launched contains non-English characters,
on a localized change the path to contain no
operating system and the non-English characters.
Java Web Start cache
path contains non-English
characters.
GC overhead limit exceeds This error message appears Increase the Java heap size to
when you are performing 1400MB.
tasks in NMC and there is
1. Start the Java Control Panel
insufficient Java memory, or
application: javaws -
heap.
viewer.
6. Click OK.
(that is, to administer multiple NetWorker servers), open a separate web browser
instance of the NMC server to run each operation.
l Are the all of the following processes running?
n GST server (gstd)
n Database server dbsrv12)
n Web server (httpd)
l Is the ntpdate command synchronizing at midnight?
In some cases, when you have a cron job that perform an ntpdate synchronization
at exactly midnight, the NMC server may lose connection to the database. To resolve
this issue, modify the time that the cron job performs the ntpdate synchronization or
have ntp run as a service and synchronize continuously.
Unable to connect to host: Please check Security setting and daemon logs on the
NetWorker client and Console server for more information
This message can appear when you perform Client Configuration wizard tasks, Device
Configuration wizard tasks, or when you browse save sets simultaneously while you add
or modify a Client resource.
Check for one of the following scenarios when you receive this error.
l Verify that the SSL key matches between the NMC Server and the NetWorker client
host. The SSL key is in the NSR Peer Information attribute, which is located in each
host’s nsrladb database. A mismatch can occur when the nsrladb on one host is
corrupted.
To resolve this issue, delete the Console Server’s NSR Peer Information from the
NetWorker Client’s nsrladb, and delete the NetWorker Client’s NSR Peer Information
from the Console Server’s nsrladb as following:
n To delete the Console Server’s NSR Peer Information from the NetWorker Client’s
nsrladb, on the client host, type:
nsradmin –p nsrexec
nsradmin> print type:NSR peer information
Note
Identify the Console Server’s NSR Peer Information, and delete it.
n To delete the NetWorker Client’s NSR Peer Information from the Console Server’s
nsrladb, on the Console Server host, type:
nsradmin –p nsrexec
nsradmin> print type:NSR peer information
Note
Identify the NetWorker Client’s NSR Peer Information, and delete it.
l The Client cannot resolve hostname of NMC Server or NW Server. Sometimes, NMC
can resolve the client hostname, but, client cannot resolve the NMC or NetWorker
Server hostname.
To resolve this issue, ping the NetWorker Server and NMC server from the Client. If the
ping fails, DNS is not resolving the hostname issue and add the hostname to the
client hosts file.
l Ensure NetWorker users have at least the “Operate NetWorker” privilege to launch the
Client Wizard. To resolve this issue, add the user to the user_group in the
NetWorker Server.
l The NetWorker Server may not be present in the client's servers file. To resolve this
issue, add the NetWorker Server to the client's servers file.
l The NMC Server, NetWorker Server, and NetWorker client hosts must only use
nsrauth authentication.
Unable to connect to host: Please check Security setting and daemon logs on the NetWorker client and Console server for more 693
information
NMC Server Management
Username/password validation fails when you use the NMC New Device wizard to
configure an AFTD if storage node is UNIX
When you use the NMC New Device wizard to configure an AFTD, the username/password
validation for browsing the file system may fail for a UNIX storage node .
This failure can occur in the following situations:
l The system is missing the Pluggable Authentication Modules (PAM) library.
l The rule in the pam.conf file (/etc/pam.conf) for OTHER service is set to deny.
The operating system documentation provides more information about how to install the
PAM library and how to modify the pam.conf file.
Querying large numbers of save sets in the NetWorker user interface may cause a
Java heap space error
When you query a large number of save sets in the NetWorker user interface, the query
may fail with a Java heap space error.
To resolve this issue, increase the Java heap size that the NMC application uses.
1. On the NMC server host, open the Console_install_dir\web
\gconsole.jnlp file in a text editor.
2. Increase the default max-heap-size value from 700MB to 1400MB.
For example:
<resources>
<j2se version="1.5+" initial-heap-size="64M"
max-heap-size="1400M"/>
Note
To provide meaningful query results and to reduce the chance of encountering this error,
narrow the save set search criteria by specifying selection parameters.
Note
After the expiration of jobsdb, any expired workflows will display a status of never
run.
5. Click OK.
Hostname changes
NetWorker considers each unique client name as a separate client. NetWorker assigns
each unique client name in the datazone a unique identifier called a client ID. NetWorker
stores the client ID for each client in the media database.
The NetWorker software has a built-in mechanism to prevent the nsrd daemon from
starting on the NetWorker server if the startup process detects a change in the name of
the NetWorker server. For example, when you change the hostname of the NetWorker
server or modify the aliases order in the hosts file.
A message similar to the following appears in the daemon.raw file:
This mechanism prevents the NetWorker software from assigning a new client ID to the
NetWorker server, which is based on the new hostname. To resolve this issue, verify the
hostname resolution of the NetWorker server. The Networking and Connectivity chapter
provides more information.
If the startup process did not detect the hostname change, NetWorker assigns the
NetWorker server a new client ID, which can impact NetWorker operations. Use the
nsrclientfix command to analyze the media database and identify client ID
inconsistencies. To resolve client ID issues, use the nsrclientfix command to merge
information about multiple clients in the media database and resource database into one
client resource with the original client ID. The following KB articles on the EMC Support
website provide more information about using the nsrclientfix command:
l For NetWorker server client ID issues: 000185727
l For NetWorker client client ID issues: 000193911
Note
nsrd NSR Index Warning: Detected error with client id(s): hostname
You can use the nsradmin program to modify the schedule of the scan.
Procedure
1. On the NetWorker server, start the nsradmin program from a command prompt.
2. At the nsradmin prompt, set the current query to select the NSR task resource
named DefaultNsrclientfixTask:
NetWorker server runs the nsrclientfix command. Acceptable values are exec
and skip.
Note
The action attribute specifies the name of the NSR Client Fix resource, which contains
the nsrclientfix command.
For example, to specify that the task should run every day of the week at 1:00 P.M.
except for Sunday, type the following command:
update: start time: "13:00"; plan: skip exec exec exec exec exec
exec
The Command Reference Guide provides more information about the nsrtask and
NSR client fix resources.
Parallelism
You can use several attributes in various NetWorker resources to adjust the volume of
data that a host processes to improve overall performance.
The following attributes are related to parallelism:
l Client parallelism
l Server parallelism
l Action parallelism
l Max active devices
l Media library parallelism
These attributes are described in detail in the following sections.
To define client parallelism, use the Parallelism attribute of the Client resource. You can
find the parallelism attribute on the Globals(1 of 2) tab of the Client property dialog box,
in the NetWorker Administration window.
The EMC NetWorker Network Data Management Protocol (NDMP) User Guide provides more
information about recommended parallelism settings for NDMP clients.
To avoid disk contention for clients other than the NetWorker server, specify a value that
is the same as or fewer than the number of physical disks on the client that are included
in the backup.
For a Windows client with the ALL keyword save set attribute, the backup includes the
local disks, for example C: and D: drives as well as the System State and System DB. In
this example, you can keep the default parallelism setting of 4. If you define multiple
save sets on the same disk, for example, C:\users, C:\system, C:\docs and so on ,
a higher client parallelism will result in multiple save streams attempting to access the
disk at the same time.
The EMC NetWorker Performance Optimization Planning Guide provides more information
about recommended client parallelism values and performance benefits.
Enabling the parallel save streams (PSS) feature for a Client resource allows you to back
up each save set for the client by using multiple parallel save streams to one or more
destination backup devices. PSS is used for the scheduled, file-based backup of file
systems.
You can use PSS for clients with supported UNIX, Linux, and Windows operating systems.
Supported save sets for PSS include the Save Set ALL, and individual save points
including Disaster_Recovery, deduplicated, and CSV volumes (Windows only).
Checkpoint restart is not supported when you use PSS.
When you enable PSS, you can specify the maximum number of save streams that a
client can send simultaneously for one or more save set backups concurrently running by
using the Parallelism attribute in the Client Properties dialog box. The default value for
the Parallelism attribute is different for the NetWorker server than it is for all other Client
resources:
l For the NetWorker server Client resource, the default value is 12. This higher default
value enables the server to complete a larger number of index backups during a file
system backup of the server or other index backups.
l For all other clients, the default value is 4.
Enabling PSS results in significant performance improvements due to save set
aggregation, where the NetWorker server starts a single save process per client with all
client save sets that are passed to the single process for various processing
optimizations, such as minimal Windows VSS snapshots and support for the following:
l Four parallel streams are started per save set, subject to any client parallelism
limitations that might prevent all save sets from starting simultaneously
l The ability to modify the number of parallel streams per save set by defining the new
PSS:streams_per_ss environment variable save operations attribute in the properties
of a Client resource. For example, setting PSS:streams_per_ss=2,* splits all save sets
into two parallel save streams, whereas PSS:streams_per_ss=3,/data1, 5,/data2
splits /data1 into three parallel save streams and /data2 into five parallel save
streams.
l Automatic stream reclaiming, which dynamically increases the number of active
streams for an already running save set backup to maximize utilization of limited
client parallelism conditions
Note
The EMC NetWorker Performance Optimization Planning Guide provides complete details on
PSS requirements and performance benefits.
Server parallelism
To define the server parallelism for a NetWorker server, use the Parallelism attribute of
the Server resource. The Parallelism attribute appears in the NetWorker Administrator
window on the Setup tab of the Server property dialog box.
Server parallelism defines the number of simultaneous data streams that the NetWorker
server allows.
Data streams include back data streams, savefs processes, and probe jobs.
The default and the maximum server parallelism values vary depending on the edition of
NetWorker software. Each storage node that you enable and connect to the NetWorker
server can increase the parallelism maximum value. The maximum parallelism value for
any NetWorker server and storage node combination can vary. The EMC NetWorker Release
Notes provides more information.
Optimally, configure the NetWorker server to process enough data streams to keep all the
backup devices in the datazone writing at their maximum speed. When you tune the
server parallelism setting, along with other settings discussed in this section, you can
maximize the speed that NetWorker writes the data to backup devices.
Action parallelism
Use the Parallelism attribute on the Specify the Advanced Options page in the Action
wizard to define the parallelism for an action.
Action parallelism defines the maximum number of simultaneous data streams that can
occur on all clients in a group that is associated with the workflow that contains action.
Data streams include back data streams, savefs processes, and probe jobs.
For a Backup action, the default parallelism value is 100. For a clone action, the default
parallelism value is 10. For all other action types, the default value is 0, or unlimited.
Parallelism 701
NetWorker Server Management
Multiplexing
Multiplexing is the ability to write multiple data streams simultaneously to the same
storage device. It is often more efficient for the NetWorker server to multiplex multiple
save sets to the same device. There are also times when limiting the number of data
streams to a particular device improves performance of the NetWorker environment.
Use the Target sessions, Max sessions, and Pool parallelism attributes to increase or
limit the number of data streams that NetWorker writes to a device.
Target sessions
Use the Target sessions attribute on the Configuration tab of the Device resource to
define the optimal number of backup sessions to assign to an active device.
Target sessions is not a hard limit; to set a hard limit for the number of sessions that a
particular device can accept, use the Max sessions attribute.
The Target sessions attribute aids in load balancing devices by determining when the
NetWorker software should write save streams to a device.
When a save session starts, the following actions occur:
l If a device is already receiving the number of backup sessions determined by the
target sessions value, the NetWorker server uses the next underutilized device for the
backups.
l If all available devices are receiving the number of backup sessions determined by
their target sessions value, the NetWorker server overrides the set value and uses the
device with the least activity for the next backup session.
Because it is often more efficient for the NetWorker server to multiplex multiple save sets
to the same device, rather than write each save set to a separate device, the NetWorker
server attempts to assign to each device a number of save sets, up to the value of target
sessions, before assigning a save set to another device.
NOTICE
When the NetWorker software assesses how many devices need to be involved in
multiple save streams assignments with the same storage node, the device with the
lowest target session value is used as a reference.
Max sessions
The Max sessions attribute on the Configuration tab of the Device resource defines the
maximum number of save sessions for a device. The max sessions value is never less
than the target sessions value.
Pool parallelism
The Max parallelism attribute on the Configuration tab of the Pool resource defines the
parallelism for a pool.
Pool parallelism determines the maximum number of simultaneous save streams for
each device that belong to a NetWorker pool. The default value for this attribute is 0,
which means that the attribute has no effect on other parallelism settings.
You can use pool parallelism to increase recovery times. For example, you can create a
pool to back up business critical data and use this attribute to restrict the number of save
sets that NetWorker writes in parallel to the media in the pool. As a result, recovery speed
increases for data on that media.
However, when you set the Max parallelism attribute to 1,a prolonged delay between the
backup of save sets may occur. To resolve this issue, increase the Max parallelism
attribute for the pool resource.
Note
For AFTD and DD Boost devices, the Max nsrmmd count setting for a device affects the
Max parallelism attribute. For example, consider an AFTD device (AFTD_1) that has a Max
sessions attribute of 20 and a Max nsrmmd count of 4. Now suppose a backup pool with
a Pool parallelism attribute of 1 selects AFTD_1 . The total number of save sessions that
NetWorker can initiate for AFTD_1 is 4, one for each nsrmmd process. Tape and FTD
devices can only spawn one nsrmmd process at a time, so if the previous example used a
tape device, then the total number of save sessions would be 1.
Resource databases
Information about the NetWorker server resides in series of files in the following
directories:
NetWorker_install_path\res\nsrdb\00
.
NetWorker_install_path\res\nsrdb\09
NetWorker stores each resource in a separate numbered file. As you create resources, for
example, a new Client, Group, or Pool resources, the NetWorker server adds files to the
directories.
A Client resource database (nsrexec) also exists on each NetWorker host and contains
configuration information about each NetWorker host. The nsrexec database resides in
a series of files in the following directories:
NetWorker_install_path\res\nsrladb\00
.
NetWorker_install_path\res\nsrladb\09
The EMC NetWorker Security Configuration Guide provides more information about the
Client resource database.
nsradmin -s server_name
l To access the client resource database, use the following command :
nsradmin -p nsrexec
l To access the Package Manager database, use the following command:
nsradmin -p nsrcpd
The NetWorker server removes any corrupt resource files from the nsrdb directory
structure and places them in the dbg directory. NetWorker creates the dbg directory only
after resource database file corruption has occurred. To correct this issue, open the
corrupt file with a text editor and review the file contents, then re-create the resource. You
can delete the corrupted resource file.
Note
If you do not know the cause of the resource file corruption, contact Technical Support
assistance.
Indexes
The NetWorker server tracks the files it backs up in two databases, which are stored on
the local file system of the server:
l The client file index tracks the files that belong to a save set. There is one client file
index for each client.
l The media database tracks:
n Volume name
n Backup dates of the save sets on the volume
n File systems in each save set
Unlike the client file indexes, there is only one media database per server.
The client file indexes and media database can grow to become prohibitively large over
time. Managing the size of the online indexes on page 710 provides information about
managing the size of these indexes.
NOTICE
If the file system that contains the indexes gets full, the NetWorker server cannot access
the media database and cannot recover data. Unless you use browse and retention
policies to control the size of the online indexes, the indexes continue to grow until they
exceed the capacity of the file system.
NetWorker uses browse and retention policies to manage the lifecycle of the data, and to
automatically control the size of the client file index. Backup retention on page 314
provides information about policies.
Indexes 705
NetWorker Server Management
nsrck -L5
If the index is still corrupt, recover the index by using the procedure that is outlined in
Adding information about recyclable save sets to the client file index on page 472.
EMC recommends that you periodically run the nsrck -F and nsrim -X commands to
check the integrity of the client and media indexes. The EMC NetWorker Command
Reference Guide or the UNIX man pages provide more information about these
commands.
Column Description
Client Name Names of the NetWorker clients that have been backed up by the current server.
Size Amount of disk space currently allocated to the client file index. As the index size
increases, the allocated disk space automatically grows.
Procedure
1. From the Administration window, click Media.
2. In the left pane, click Indexes. The right pane displays index information for all clients
of the server.
Column Description
Save Set Name Name of the save set.
Size Estimated amount of the index space used by the save set in the client file index.
Cycles Number of backup cycles available for browsing. A cycle starts with a full backup
and ends with the next full backup, and includes any incremental and level 1–9
backups that occur between full backups.
Reduce the size of the client file index on page 710 provides information about
reducing the size of the client file indexes by using the Remove Oldest Cycle button.
Procedure
1. From the Administration window, click Media.
2. Click Indexes.
3. Right-click the client whose save sets you want to view, then click Show Save Sets.
The Index Save Sets dialog box appears.
4. To view detailed information about a save set, click the save set name.
NOTICE
If the query is unsuccessful, an error dialog box appears, which indicates that
NetWorker could not find save sets that matched the specified query. Click OK to
close the dialog box.
Results
You can also use the mminfo -av command to query the media database. The EMC
NetWorker Command Reference Guide or the UNIX man pages provides detailed
information about how to use the mminfo command.
4. Click Yes to continue. The NetWorker server displays a status box until the cross-
checking is complete.
2. Right-click Clients, then select New. The Create Client dialog box appears.
3. Click the Globals (2 of 2) tab.
4. In the Index Path attribute, type the full path of the directory where the client file
index resides.
5. For the remaining tabs, type information as necessary to create the new client.
6. Click Ok.
Note
NOTICE
Depending on the size of the client file index, running either nsrck or nsrls can
take a considerable amount of time. Running the nsrck -L6 command, as shown in
the example, also checks the index for corruption.
If no problems are found, then all future client file index information is saved to the
new location.
NOTICE
You will gain very little disk space from removing a media database entry. Leaving
index entries of a volume in the media database prevents the accidental labeling of
another volume with the same name.
l Recycle volumes that contain recyclable save sets. Changing the volume mode on
page 452 provides details.
When a volume mode changes to recyclable, the volume becomes eligible for reuse
and NetWorker can performs the following operations:
n Relabel the volume
n Remove information about the save sets on the volume from the media database
n Reinitialize the volume
Once NetWorker relabels a volume, you cannot recover the contents.
To increase the number of currently recyclable save sets, modify the retention
policy associated with the current media database by using the nsrmm -e
command. Editing retention for a save set on page 316 provides details.
l Compress the media database.Compressing the media database on page 713
provides details.
2. Use mminfo to determine the save set ID. At the command prompt, type:
mminfo -v -c client_name
The UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information about the nsrmm and mminfo commands.
Results
When NetWorker marks a save set as recoverable, you cannot browse to recover these
files. Use the save set recover procedure to recover data from a recoverable save set.
command to recover the data. Adding information about recyclable save sets to the client
file index on page 472 provides details.
Typically, do not remove both the client file index and media database entries at the
same time unless the volume is damaged or destroyed.
NOTICE
The presence of a clone of a particular volume prevents the deletion of the volume entry
in the media database. This is because the NetWorker server accesses the cloned volume
rather than the original volume as needed. NetWorker does not purge the entry of the
volume in the media database. Because of this functionality, removing volume entries
from the media database is not a particularly effective way to reduce index size.
nsrmm -d -S ssid
To remove information about the volume from the client file index only, type the following
command:
nsrmm -d -P volume_name
4. Select one of these options to determine how volume entries will be removed:
l File and Media Index Entries to remove the volume information from the media
database and client file indexes.
l File Index Entries Only to remove the volume information from the client file
indexes only.
Internationalization
NetWorker releases 7.4 and later have been internationalized. As a result, the NetWorker
software now supports language packs, which you can install as part of the NetWorker
installation, or you can install the language packs separately after you have installed the
NetWorker software. The EMC NetWorker Installation Guide provides more information.
Internationalization support in the NetWorker software depends on internationalization
support of the underlying operating system. If you plan to use non-English data in the
NetWorker software, ensure that you install and configure the appropriate support for
that language on the operating system.
The following sections describe a number of issues and limitations that relate to the use
of NetWorker software in a multi-language environment.
Internationalization 713
NetWorker Server Management
Display issues
There are number of issues and limitations associated with displaying characters in
various locales.
Synthetic Full Perform a synthetic backup on this day. A synthetic full backup
includes all data that changed since the last full backup and
subsequent incrementals to create a synthetic full backup.
To perform the same type of backup on each day, select the backup type from the list
and click Make All.
7. Click Next.
The Server Backup Options page appears.
8. From the Destination Storage Node list, select the storage node with the devices on
which to store the backup data.
9. From the Destination Pool list, select the media pool in which to store the backup
data.
10. From the Retention lists, specify the amount of time to retain the backup data.
After the retention period expires, the save set is marked as recyclable during an
expiration server maintenance task.
11. To print information about the bootstrap save set, type the printer name in the Printer
name to print backup information box.
12. Specify whether to include the client file indexes in the server backup by selecting or
clearing the Perform CFI checkbox.
When you clear this option, the action will only backup the bootstrap.
13. Specify whether to include a bootstrap backup in the server backup by selecting or
clearing the Perform Bootstrap checkbox.
When you clear this option, the action will only backup the client file indexes.
NOTICE
You must select either the Perform CFI checkbox, the Perform Bootstrap checkbox, or
both checkboxes. Otherwise, the server backup action does not back up any data.
Note
The Retries option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
16. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed
backup or probe action. When the Retry Delay value is 0, NetWorker retries the failed
backup or probe action immediately.
Note
The Retry Delay option only applies to probe actions, and the backup actions for the
Traditional and Snapshot action types. When you specify a value for this option in
other actions, NetWorker ignores the values.
17. In the Inactivity Timeout field, specify the maximum number of minutes that a job run
by an action is allowed to fail to communicate back to the server.
If the job fails to respond within the timeout value, the server considers the job a
failure. If a job fails, NetWorker retries the job immediately. This ensures that no time
is lost due to failures.
Increase the timeout value if a backup consistently aborts due to inactivity. Inactivity
timeouts may occur for backups of large save sets, backups of save sets with large
sparse files, and incremental backups of many small static files.
Note
The Inactivity Timeout option only applies to probe actions, and the backup actions
for the Traditional and Snapshot action types. When you specify a value for this option
in other actions, NetWorker ignores the values.
18. In the Parallelism field, specify the maximum number of concurrent operations for the
action.
Note
19. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
20. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
21. From the Soft Limit list, specify the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no limit.
22. From the Hard Limit list, specify the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no limit.
23. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
Note
NetWorker only supports one action after the server backup action.
Note
When you clear the Enabled option, any action that occurs after a disabled action will
not start, even if the succeeding options are enabled.
To perform expiration every day, select Execute from the list, and click Make All.
9. Click Next.
The Expiration Options page appears.
10. Click Next.
The Specify the Advanced Options page appears.
11. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue
with subsequent actions in the workflow, select Abort action.
Note
The Abort action option only applies to probe actions, and the backup actions for
the Traditional and Snapshot action types.
l To abort the entire workflow if there is a failure with one of the jobs in the action,
select Abort workflow.
Note
If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
12. From the Send Notifications list box, select whether to send notifications for the
action:
l Select Set at policy level to use the notification configuration that is defined in the
Policy resource to send the notification.
l Select On Completion to send a notification on completion of the action.
l Select On Failure to send a notification only if the action fails to complete.
13. (Optional) Configure overrides for the task that is scheduled on a specific day.
To change the month on which to schedule the override, use the navigation buttons
and the month list box. To change the year, use the spin boxes. You can set an
override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week,
select Specified day, then use the drop downs. Click Add Rules based override.
n To perform the action task on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
n In the Override field, type an override.
Note
Scheduled backup Add the long and shortname of the NetWorker server.
Remote Directed Restore Add the long and shortname of the administering client to the
server file on the destination client.
NDMP DSA backups Add the long and shortname of the NetWorker client that starts
the backup.
The EMC NetWorker Security Configuration Guide provides more information about client-
tasking rights and how to modify the servers file.
The Host window contains a taskbar and two window panels, the summary panel and a
task monitoring panel.
The information that appears in summary panel changes based on the task option that
you select on the taskbar. The following table provides an overview of the information
that appears in the summary panel when you select a task on the taskbar.
The task monitoring panel is always visible for each task option. A splitter separates the
task monitoring panel from the summary panel. You can click and move the splitter to
resize the task monitoring panel.
The task monitoring panel contains three window panes:
l Software Operations—Displays status information about operations that are
performed for each task option.
l Log—Displays the most recent notification logs for the NetWorker server.
l Alerts—Displays alerts that are generated by a NetWorker server.
Monitoring NetWorker server activities in the Administration window on page 50 provides
detailed information about the Log and Alerts window panes.
Changing the location of the software repository from the command line
Use the nsradmin command to change the location of the software repository.
Procedure
1. Log in to the NetWorker server as root on UNIX or Administrator on Windows.
2. Use the nsradmin command to connect to the nsrcpd database:
nsradmin -p nsrcpd
Note
When you update the attribute on a Windows host, enclose the path in quotes and
specify \\ for each delimiting character. For example, to specify the path c:\repo, type:
7. Exit nsradmin.
8. Stop and restart the NetWorker services on the NetWorker server.
9. Use nsradmin to connect to the nsrcpd database and verify that the actual
repository location value is correct in the NSR Client Push Master resource.
nsrpush -l
Products in the repository
================================
NetWorker 8.1
win_x64
Storage Node
Server
License Manager
Language Packs
English Language Pack
French Language Pack
Japanese Language Pack
Korean Language Pack
Chinese Language Pack
Client
Management Console
If the remove operation fails, then review the nsrcpd.raw file that is located
in /nsr/logs on UNIX or NetWorker_install_path\nsr\logs on Windows
for further details.
When you choose a directory on the Proxy host to store the source files, ensure that the
directory:
l Resides on a local file system.
l Uses a path that does not contain spaces or special characters.
where:
l proxy_host is the hostname of the host that contains the source files and folders.
l proxy_source_path is the folder on the Proxy host that contains the source files and
folders.
l -U specifies a UNIX cross platform host and -W specifies a Windows cross
platform. Use the appropriate option for the target host.
l -all transfers the source files and folders to all inventoried NetWorker hosts that
are not in the exclude list.
l -IF input_filetransfers the source files and folder to all inventoried NetWorker
hosts that are listed, one per line, in the input file. When specifying input_ file,
include the name of the file and the path to the file on the NetWorker server.
l hostname is the name of the target host. Separate multiple hostnames with
spaces.
A NetWorker datazone uses a NetWorker 9.0.1 server on Windows and has two NetWorker
UNIX clients, pwd.emc.com and lad.emc.com that require new DD Boost libraries in
the /nsr/bin directory. The directory /usr/ddlib/bin on UNIX host mnd.emc.com
contains the files.
Performing same platform file and folder transfers with Package Manager
Use the Known hosts section of the Hosts window to transfer files and folders from the
NetWorker server to NetWorker hosts in the datazone.
Before you begin
Create a Client resource for the destination NetWorker host and perform an inventory of
the host before you try to transfer files.
Procedure
1. On the NetWorker Administration window, click the Hosts button.
2. On the Known Hosts view, select the clients that receive the files. Use the Ctrl or Shift
key to select multiple hosts.
3. Right-click and select Transfer.
4. In the pop-up window, click Yes, Continue to perform the software upgrade.
The Transfer Files window appears.
5. In the Location field, specify the directory or file that contains the objects that you
want to transfer.
6. In the Destination Hosts window pane, select the clients that receive the files. Use the
Ctrl or Shift key to select multiple hosts.
7. Click Transfer.
where:
l source_path specifies the path on the NetWorker server that contains the source files.
l -all transfers the source files and folders to all inventoried NetWorker hosts that
are not in the exclude list.
l -IF input_file transfers the source files and folder to all inventoried NetWorker hosts
that are listed, one per line, in the input file. When specifying input_ file, include the
name of the file and the path to the file on the NetWorker server.
l hostname is the name of the target host. Separate multiple hostnames with spaces.
A NetWorker datazone uses a NetWorker 9.0.1 server on Windows and has two Windows
clients, dmd.emc.com and jad.emc.com that require new DD Boost libraries. The directory
c:\ddlib on the NetWorker server contains the files.
l From the Administration window, click Start on the main menu, and select NetWorker
User... If the NetWorker Module for Microsoft Applications (NMM) is installed on the
client computer, this operation starts NMM instead.
The NetWorker client package must be installed on the host where you start the
NetWorker User program. Otherwise, you see an error message similar to the
following:
Administrators Administrators
Administrators
Toolbar buttons
The NetWorker User program has a toolbar with buttons for common User program tasks.
The following table describes the function of each button.
Recover Starts a recovery operation to retrieve copies of saved data back to the client
computer.
Archive Starts an archive operation to save copies of data to a server for storage on
an archive volume. Once the data is stored on the archive volume, you have
the option of removing the data from the disk.
Verify Starts a verification operation to ensure that the data items just backed up
are the same as those currently on the disk.
Browse window
If you select menu items or buttons, a browse window opens in the NetWorker User
program .
A browse window opens if you select any of the following items:
l A toolbar button.
l A Backup, Recover, Archive, Verify, or Local Directive command from the NetWorker
User File menu.
The browse window, which is shown in the following figure, displays the directory tree of
the file system that is being browsed.
Figure 64 Example of the browse window
NOTICE
When you mark a disk volume or directory for an operation, all its nested subdirectories
and files are also marked.
A check mark beside an item name indicates that the item is selected for backup,
recovery, archiving, or verification.
The Attributes column indicates any special handling option that was applied:
l P — The item is marked for password-protection.
l E — The item is marked for password-protection and encryption, using the PW2 ASM.
l C — The item is marked for compression.
2. In the Change Server dialog box, select a server from the list of available NetWorker
servers. If the server is not listed, do one of the following:
l Click Update List to search the network for available NetWorker servers.
l Type the server’s hostname.
3. Click OK.
nsradmin -p nsrexec
3. To determine the current settings for attributes in the NSRLA resource, perform the
following two steps:
a. To determine the current settings for any hidden attributes (such as the Disable
Directed Recover attribute), type the following at the nsradmin prompt:
option Hidden
print type:NSRLA
4. To change the value of attributes in the NSRLA resource, type the following line at the
nsradmin prompt:
update attribute:value;
For example, to update the Disable Directed Recover attribute, type the following:
Note
Results
NOTICE
When you modify an attribute with the nsradmin program, you must specify the
attribute name and value correctly. If you do not specify the attribute name and value
correctly, the nsradmin program does not update the attribute and nsradmin does not
provide an error message.
The EMC NetWorker Security Configuration Guide provides more information about the
nsrexec database and how to modify attributes in the nsrexec database.
administrator can divide and assign specific tasks and privileges among the tenant
administrators of that RDZ.
l Tenant/Restricted User—A user that exists only within the RDZ to which they are
assigned, and who has no administrative privileges in that datazone. NetWorker does
not support a tenant user in two RDZs simultaneously.
Administrator roles
Management and use of RDZs is divided among global administrators and tenant
administrators. A global administrator creates and manages RDZs. The global
administrator can perform all the RDZ tasks, or associate specific tasks and privileges
within each RDZ to one or more RDZ users as tenant administrators.
Although there are many possibilities for the roles of administrators, most setups fall into
the following two approaches:
l Global administrator sets up the initial configuration, and also configures everything,
so there is no need for a tenant administrator. This approach may be preferred for a
customer with a very large environment, where one individual controls the network
and sets up RDZs for various divisions within their company.
l Global administrator sets up the initial configuration, and tenant Administrators can
configure and operate clients and create, view, operate, manage, and modify the
NetWorker resources that are associated with their own RDZ according to the
privileges assigned by the global administrator. Controls can be put in place to limit a
tenant administrator's impact on the server. The global administrator can restrict the
NetWorker resources that each RDZ can use, such as the maximum number of clients,
devices, jukeboxes, or storage nodes.
Figure 66 Create Restricted Data Zone in the NetWorker Administration Server window
2. Create the RDZ (for example, RDZ1) by naming the RDZ and specifying any restrictions.
Use the Restrictions subsection to set limits on the clients, devices, storage nodes,
and jukeboxes that can be owned by the restricted datazone to prevent resource
abuse and limit what the tenant administrator can create. Setting restrictions can
provide more control for major events that may impact the server, licensing
limitations, and so on. These restrictions are in place even if using the RDZ as a global
administrator.
Note
Setting a resource restriction to a value of 0 indicates that the user cannot create this
resource.
3. In the left navigation pane of the Protection window, right-click the desired resource
(for example, Client) and select Properties to configure the resource with the RDZ.
Note that in addition to using an existing resource, you can also create the resource
for the RDZ.
Resources that you can associate to an RDZ displays a Restricted Datazone tab in
NMC (or the Restricted Datazone attribute in nsradmin).
4. Select the Restricted Datazone tab. Resources automatically get associated to the
Restricted Datazone a user belongs to when they create a resource.
5. (Optional) In the left navigation pane of the Devices window, select a device if you
want to give this RDZ client access to a specific device by right-clicking the device and
selecting Properties. Give the RDZ client access to this device.
Figure 68 Restricted Data Zones in Device Properties window
Note
The RDZ can access the shared devices without any further device setup requirements
for the shared resource if these devices are configured. Note, however, that multiple
RDZs cannot simultaneously access the same device.
6. Create a policy. In the Protection window, right-click Policy in the left navigation pane
and select Create Policy.
7. In the General tab, specify a name for the policy (in this example, RDZ1). In the
Restricted Data Zone tab, select the RDZ from the drop-down, then click OK.
Figure 69 Restricted Data Zones in Create Policy window
8. Create a group. In the Protection window, right-click Group, and select New.
9. Name the group and select the desired client(s). In the Restricted Datazone tab, select
the RDZ from the drop-down, then click OK.
10. In the Protection window, highlight the new policy and create a workflow. Associate
this workflow with the new group.
Figure 70 New workflow associated with RDZ group
Note
You only must configure the policy and group resources for RDZ when using policies.
The workflows and actions that are created as a result of it are kept within the policy
feature and do not need any further RDZ configuration.
11. Return to the Server window and highlight Restricted Datazones. Right-click and
select Properties.
12. Browse to the Clients tab. This tab now shows the clients that are associated with this
RDZ. When a user belongs to an RDZ and creates a resource, this resource is
automatically set to being owned by that RDZ.
Note
Backward compatibility
RDZ is a feature of the server and storage node, so that the client does not necessarily
have to be upgraded to match the server version. RDZ is backward compatible with the
NetWorker client if that client is supported with the NetWorker 9.0.1 server.
l Overview............................................................................................................. 746
l Block based backups.......................................................................................... 749
l Block based recoveries....................................................................................... 754
l Troubleshooting block based backup and recovery issues.................................. 760
Overview
The NetWorker block based backups are high-performance backups which are supported
on Windows and Linux.
During block based backups, the backup application scans a volume or a disk in a file
system, and backs up all the blocks that are in use in the file system. Block based
backups use the following technologies:
l The Volume Shadow Copy Service (VSS) snapshot capability on Windows and Logical
Volume Manager (LVM) and Veritas Volume Manager (VxVM) on Linux to create
consistent copies of the source volume for backups.
l The Virtual Hard Disk (VHDx), which is sparse, to back up data to the target device.
Block based backups support only the following Client Direct enabled devices as target
devices:
l Advanced File Type Devices (AFTDs)
l Data Domain devices
The block based incremental backups use the Change Block Tracking (CBT) driver to
identify the changed blocks, and back up only the changed blocks.
Block based full and incremental backups are fast backups with reduced backup times
because the backup process backs up only the occupied disk blocks and changed disk
blocks respectively. Block based backups can coexist with traditional backups.
Block based backups provide instant access to the backups. The block based backups
enable you to mount the backups by using the same file systems that you used to back
up the data.
Block based backups provide the following capabilities:
l Mounting of a backup as a file system
l Mounting of an incremental backup
l Sparse backup support
l Backups to disk-like devices
l Backups of operating system-deduplicated file systems as source volumes on
Windows
l Forever virtual full backups to Data Domain
l 38 incremental backups to AFTD
l Synthetic full backups to AFTD
l Backups of volumes up to 63 TB each
l NetWorker-supported devices as secondary devices for backups
l Recoveries from Data Domain without using CIFS share
l Recovery of multiple save sets in a single operation
The following table lists the backup scenarios and the recovery scenarios that block
based backups support.
– SLES 11 SP4
– SLES 12
– SLES 12 SP1
– Community Enterprise Operating System (CentOS) 6.0
– CentOS 6.1
– CentOS 6.2
– CentOS 6.3
– CentOS 6.4
– CentOS 6.5
– CentOS 6.6
– CentOS 7.0
– CentOS 7.1
– CentOS 7.2
l Operating systems on x86:
n Windows client 8.1
n Windows client 8
l File systems:
n Windows:
– New Technology File System (NTFS)
– Resilient File System (ReFS)
n Linux:
– Third extended file system (ext3)
– Fourth extended file system (ext4)
l Client Direct target devices
l Concurrent backups of multiple volumes
l Windows Server 2012 and Windows Server 2012 R2 deduplicated volumes without
rehydrating the deduplicated data
l Windows Server core installation role
l Unified Extensible Firmware Interface (UEFI) based systems
l GUID Partition Table (GPT) and Master Boot Record (MBR) volumes
l Data Domain systems in a Fibre Channel environment
l Full backup of Windows Server 2012 Cluster Shared Volumes on File Servers and
Windows Clusters
l LVM2 and VxVM managed volumes on Linux
Note
Each volume group on LVM2 and VxVM must have at least 10% free space for a block
based backup to succeed.
Limitations
NetWorker's block based backups and recoveries do not support the following
capabilities and configurations:
l Backup levels 1 through 9
l Backups of Microsoft 2012 clusters without Cluster Shared Volumes
l Incremental backups of Microsoft clusters
l Cloning of AFTD incremental backups
l Granular save sets at either the folder level or the file level, for example, D:\data
l Checkpoint restart
l Standard NetWorker directives
l The scanner command with the -i option for rebuilding indexes for block based
backups
l Staging and the nsrclone command with the -m option for migrating block based
backup save sets to other volumes
l Image recovery to a system volume
l Recoveries of ReFS volumes on Windows Server 2008 R2 and Windows 8 (x86 and
x64)
l Recoveries of Windows deduplicated volumes to Windows Server 2008 R2 and
Windows 8 (x86 and x64)
l Troubleshoot kernel on RHEL, and Trace and Xen kernels on SLES
Note
If you want to make a local AFTD Client Direct enabled, specify either the CIFS path or the
NFS path in the Device access information field of the Create device properties dialog
box.
Limitations 749
Block Based Backup and Recovery
install the package, block based full backups succeed, but incremental backups and
recoveries fail.
Procedure
1. Ensure that the NetWorker client is installed.
2. On RHEL, ensure that the lsb package from the operating system installation media
has been installed.
On SUSE Linux, ensure that the lsb-release package from the operating system
installation media has been installed.
[Optional] Creating an AFTD CIFS share on Windows for block based recoveries
You must enable a CIFS share to access save sets on the device to recover data from an
AFTD. The access credentials are the same as the administrator’s credentials on the host.
Procedure
1. Right-click the folder that you want to share, and select Share with > Specific people....
2. In the File Sharing dialog box, select or add the people with whom who want to share
the folder, and click Share.
Scheduled backups
NetWorker supports block based backups for all scheduled backups.
The scheduled backup process is transparent to you and does not require any additional
actions or considerations.
Incremental backups
You must perform an incremental backup of a volume only to the same device, to which a
full backup of the volume was performed.
Note
Incremental backups can span across multiple storage units on the same Data Domain
device.
On AFTDs, selecting any backup level apart from full or incremental results in performing
an incremental backup.
An incremental backup shifts to a full backup when any of the following conditions occur:
l You restart the client host for any reason when the backup is either in progress or
scheduled.
l The preceding incremental backup failed.
Note
Note
After you perform a full backup, you can perform a maximum of 38 incremental
backups.
l You add a volume for the backup of the ALL save set.
l You change the size of the volume.
The incremental backup process is transparent to you and does not require any
additional actions or considerations.
Note
On Data Domain devices, selecting any backup level apart from full results in performing
a virtual full backup.
Note
When you perform a synthetic full backup to a non-Windows remote storage node, you
must create a client configuration for the storage node.
/<mount_point_name1/mount_point_name2/mount_point_name3>
(for nested mount points)
CSV backups
You can simultaneously see Cluster Shared Volumes (CSVs) across all nodes. The block
based backups support only full backups of CSVs, even in the case of a failover. If you try
to perform an incremental backup, the backup shifts to a full backup with a warning
message.
To list the block based virtual full backup save sets, run the following command:
To list the block based synthetic full backup save sets, run the following command:
mminfo -avot -q "ssattr=*Synthetic full"
2. Verify whether all the selected save sets have been successfully backed up.
Note
You cannot recover Block Based Backup (BBB) backup data from a CloudBoost device. To
recover the data, clone the data from the CloudBoost device to a AFTD or Data Domain
device, and then recover the data from the clone device.
d. Click Next.
6. On the Select the Recovery Options page, perform one of the following tasks that
depend on the type of the recovery that you have selected:
l For a file level recovery, select a file path for recovery and an appropriate option for
duplication, and click Next.
l For an image level recovery, select a file path for recovery, and click Next.
7. On the Obtain the Volume Information page, click Next.
8. On the Perform the Recovery page:
a. Under Identity, in the Recover name field, type a name for the recovery.
b. Select one of the following recovery start times:
l Start recovery now—Immediately starts the recovery.
l Schedule recovery to start at—Schedules the recovery according to the choice.
c. If you want to stop the recovery at a certain time, in the Specify a hard stop time
field, type the time.
d. Select the Recover Resource persistence option according to the choice.
e. Click Run Recovery.
The recovery log appears when the recovery progresses.
After the recovery succeeds, a successful completion message appears at the
bottom of the recovery log.
To export the log file, click Export Log File.
For Windows hosts only, to ensure that you use the NetWorker recover.exe command
and not the Windows OS recover command, perform one of the following tasks:
l Ensure that NetWorker_install_path\bin appears before %SystemRoot%
\System32 in the $PATH environment variable.
l When you start the recover command include the path to the binary. For example:
NetWorker_install_path\bin\recover.exe.
Procedure
1. On Windows:
a. Run the following command to mount the backup and start the command prompt
at the mount point:
recover.exe -S <save_set_ID>
Use the Windows copy option and paste option to recover the backup.
After you perform the recovery, close the command prompt to exit the process.
b. Run the following command to mount the backup and copy specific files from the
input file to the destination:
recover.exe -S <save_set_ID> -I <input_file> -d <destination>
2. On Linux:
Ensure that you meet the following prerequisites before you perform a file level
recovery:
a. You have disabled Security-Enhanced Linux (SELinux) by running one of the
following relevant commands:
l setsebool -P nis_enabled 1, if you use either RHEL 7.x or CentOS 7.x
l setsebool -P allow_ypbind 1, if you use either RHEL 6.x or CentOS 6.x
b. You have installed the iscsiadm utility by installing one of the following relevant
packages on the Linux client:
l iscsi-initiator-utils<version_number>.rpm, if you use either
RHEL or CentOS
l open-iscsi<version_number>.rpm, if you use SLES
c. On SLES, if you want to start the iscsiadm utility for the first time, restart the iSCSI
services by running the following command:
service open-iscsi restart
Open a new terminal, and use Linux copy and paste commands to recover the
data.
After you perform the recovery, type quit to exit the process.
b. Run the following command to mount the backup and copy specific files from the
input file to the destination:
recover.exe -S <save_set_ID> -I <input_file> -d <destination>
Table 140 Key options for the block based recover.exe command
Option Description
-r [volume GUID or Specifies the supported destinations for save set recovery on
mount point] (On Windows) Windows:
-S [save set ID or Specifies the save set ID or the clone ID that you want to
clone ID] recover.
-I [input file] Specifies a file that contains a list of files that you want to
recover. This is useful to perform the disaster and remote
recoveries.
NOTICE
To perform either a file level recovery or an image recovery of data from a CloudBoost
device, first clone the data to a Client Direct enabled device and then recover the data
from the Client Direct enabled device.
c. For the type of backup that you want to recover, select Block Based Backup
(cloned to tape).
d. Click Next.
5. On the Select a Block-Based Backup Clone page:
a. Under Found in, specify the period during which you performed the clone and click
Query.
The cloned save set groups appear in the Block-Based backups field.
e. Click Next.
l If you have selected File level recovery in step d, the Copying the Backup to
Disk page appears.
After the cloning succeeds, click Next.
The Select the Data to Recover page appears.
l If you have selected Image level recovery in step d, the Select the Data to
Recover page appears.
b. Click Next.
7. On the Select the Recovery Options page, perform one of the following tasks that
depend on the type of the recovery you have selected:
l For a file level recovery, select the File path for Recovery and Duplicate File
Options, and click Next.
l For an image level recovery, select the File path for Recovery, and click Next.
8. On the Perform the Recovery page:
a. Under Identity, in the Recover name field, type a name for the recovery.
b. Select one of the following recovery start times:
l Start recovery now—Immediately starts recovery.
c. If you want to stop the recovery at a certain time, in the Specify a hard stop time
field, type the time.
d. Select the Recover Resource persistence option according to the choice.
e. Click Run Recovery.
The recovery log appears when the recovery progresses.
After the recovery succeeds, a successful completion message appears at the
bottom of the recovery log.
To export the log file, click Export Log File.
No save sets clone to clone device. Block based backups clone only full backup save sets.
Block based backups do not clone incremental backup
save sets.
Unable to construct the recover list Perform an image recovery if applicable. Otherwise,
from input file. select all the files except the system files such as,
Table 141 Troubleshooting block based backup and recovery issues (continued)
Failed to recover save set with error: To In the Client Properties dialog box, select Client
perform the recovery of a block based Direct.
backup save set, the device must be
enabled for Client Direct.
Though the size of a target volume is To enable the target volume file system to use its
more than the size of a source volume, volume to the actual size, extend the file system:
after performing an image recovery, the
1. In the command prompt, type diskpart and press
target volume file system can use its
<Enter>.
volume only up to the same size as the
size of the source volume. 2. In the DISKPART command prompt, select the target
volume to extend the file system by running the
following command:
select volume <target_volume>
On Windows Server 2008 R2, EDNS0 queries increase the size of the DNS UDP packet
and some firewalls block UDP packets larger than 512 bytes. EMC recommends that
you disable EDNSprobes on hosts that operate in a firewall environment, as a DNS
Server or Domain Controller. To disable EDNSprobes, run the following command:
NetWorker supports the use of Internet Protocol version 6 (IPv6) in a dual stack or in a
pure IPv6 environment. NetWorker does not support NetWorker resource configurations
that use temporary or link-local IPv6 addresses.
When a NetWorker host uses IPv6 addressing, ensure that you add the IPv6 address for
the host in DNS Server or the hosts file and to the alias field in the client resource. The
EMC NetWorker Installation Guide provides information about using NetWorker in an IPv6
environment.
network connectivity exists between the source and the destination hosts. Run each
command from the source host and destination host and use each command with the
shortname, FQDN, and the IP address of the destination host.
In the following example, the source host mnd.emc.com is a Linux host with the IP
address 10.1.1.10. The destination host pwd.emc.com is a Windows host with the IP
address 10.1.1.20.
Procedure
1. On the pwd.emc.com host, run the following pathping commands:
pathping pwd.emc.com
pathping pwd
pathping 10.1.1.20
pathping mnd.emc.com
pathping mnd
pathping 10.1.1.10
C:>pathping mnd.emc.com
Tracing route to mnd.emc.com [10.1.1.10]
over a maximum of 30 hops:
0 pwd.emc.com [10.1.1.20]
1 mnd.emc.com [10.1.1.10]
Computing statistics for 25 seconds...
Source to Here This Node/Link
Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address
0 pwd.emc.com [10.1.1.20]
0/ 100 = 0% |
1 0ms 0/ 100 = 0% 0/ 100 = 0% mnd.emc.com [10.1.1.10]
Trace complete.
C:>pathping 10.1.1.10
Tracing route to 10.1.1.10 over a maximum of 30 hops
0 pwd.emc.com [10.10.10.20]
1 * * *
Computing statistics for 0 seconds...
Source to Here This Node/Link
Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address
0 pwd.emc.com [10.10.10.20]
Trace complete.
ping pwd.emc.com
ping pwd
ping 10.1.1.20
ping mnd.emc.com
ping mnd
ping 10.1.1.10
traceroute pwd.emc.com
traceroute pwd
traceroute 10.1.1.20
traceroute mnd.emc.com
traceroute mnd
traceroute 10.1.1.10
Ensure that each ping and traceroute command succeeds. Lost packets can
indicate a slow connection between hosts. If any try to transmit a packet fails with
an error message, then verify the name resolution and ensure that all routers
between the source host and destination hosts are operational.
nsrrpcinfo -p hostame_of_NetWorker_server
nsrrpcinfo -pFQDN_of_NetWorker_server
nsrrpcinfo -p IP_address_of_NetWorker_server
nsrrpcinfo -p shortname_of_destination_host
nsrrpcinfo -p FQDN_of_destination_host
nsrrpcinfo -p IP_address of the destination host
Note
When the nsrrpcinfo command runs successfully, the output displays a list of port
numbers and names. For example:
# nsrrpcinfo -p
program vers proto port
100000 2 tcp 7938 nsrportmapper
100000 2 udp 7938 nsrportmapper
390436 1 tcp 7943 nsrexecd
390435 1 tcp 9549 nsrexecd
390113 1 tcp 7937 nsrexecd
Ensure that the correct program number appears for each NetWorker process. If you do
not see the correct program number or the appropriate NetWorker ports, and a personal
or external firewall exists between the source and the destination hosts, then review the
NetWorker configuration port requirements.
The EMC NetWorker Security Configuration Guide provides more information about how to
configure NetWorker in a firewall environment and the correct program numbers for each
NetWorker daemon.
hosts=local,bind4
n The /etc/irs.conf file.
For example, when the operating system checks the hosts file first and then the
DNS (IPv4 address), the hosts entries in irs.conf file appear as follows:
hosts local
hosts dns4
Note
The NSORDER environment variable setting overrides the settings in the /etc/
netsvc.conf file and the /etc/irs.conf file. The /etc/netsvc.conf file
setting overrides the /etc/irs.conf file setting.
l Windows Server 2008 R2 operating systems use the following search order: WINS,
network broadcast, LMhosts file, hosts file, then DNS. Windows Server 2008 and
earlier operating systems use a similar search order with the exception that the
network broadcast occurs before the WINS lookup.
::1 localhost
127.0.0.1 localhost
Note
The IPv6 loopback entry must remain in the hosts file when the host exists in a pure
IPv4, pure IPv6, or dual stack configuration.
Shortname_of_source_host
Shortname_of_source_host
Shortname_of_source_host
FQDN_of_source_host
FQDN_of_source_host
FQDN_of_source_host
IP_address_of_source_host
IP_address_of_source_host
IP_address_of_source_host
Shortname_of_destination_host
Shortname_of_destination_host
Shortname_of_destination_host
FQDN_of_destination_host
FQDN_of_destination_host
FQDN_of_destination_host
IP_address_of_destination_host
IP_address_of_destination_host
IP_address_of_destination_host
Note
EMC recommends that you resolve every name and IP address for each host three
times to ensure that successive queries return correct and consistent values.
3. Complete the following steps when the host uses multiple DNS Servers for name
resolution:
a. Change the DNS Server that nslookup uses for name resolution.
In this example, the ipconfig /all command on a Windows host returns two
DNS Servers, the Primary DNS Server 10.5.5.10 and secondary DNS Server
10.5.5.11.
To configure nslookup to use the IP address 10.5.5.11, type the following
commands:
C:\>nslookup
Default Server: lad.emc.com
Address: 10.5.5.10
> server 10.5.5.11
Default Server: dmd.emc.com
Address: 10.5.5.11
Shortname_of_source_host
Shortname_of_source_host
Shortname_of_source_host
FQDN_of_source_host
FQDN_of_source_host
FQDN_of_source_host
IP_address_of_source_host
IP_address_of_source_host
IP_address_of_source_host
Shortname_of_destination_host
Shortname_of_destination_host
Shortname_of_destination_host
FQDN_of_destination_host
FQDN_of_destination_host
FQDN_of_destination_host
IP_address_of_destination_host
IP_address_of_destination_host
IP_address_of_destination_host
Note
EMC recommends that you resolve every name and IP address for each host three
times to ensure that successive queries return correct and consistent values.
4. Use the nslookup command in interactive mode to validate reverse name resolution
lookups in the reverse lookup zone with the Primary DNS Server:
a. From a command prompt, type: nslookup.
b. In the nslookup command prompt, type:
set q=ptr
IP_address_of_source_host
IP_address_of_destination_host
ipconfig /displaydns
Use the appropriate command to even the contents of the resolver cache:
l On AIX and HP-UX:
n For bind 9, type:
rndc flush
n For bind 8, type:
refresh -s named
l On Solaris and Linux, restart the nscd daemon.
l On Windows, type:
ipconfig /flushdns
host name, NetWorker operations can fail despite correct host name resolution and when
an established connection exists between the source and destination hosts.
Ensure that the name that NetWorker uses primarily for a host appears consistently in all
NetWorker resources. For example:
l Names of Client and Storage node resources. For example, if you specify the FQDN in
the Name attribute when you create the Client resource for a storage node, ensure
that you specify the FQDN in the Name attribute when you create the Storage Node
resource.
l Names of the index database directory.
l Names specified in the Remote Access and Administrator attributes.
l Hostname references in resource attributes such as the Storage Node and Recover
Storage Node attributes of a Client resource.
l Cached host certificates (NSR Peer information).
If you receive this message but the requesting host requires access, then manually edit
the servers file on the destination host and add each short name and FQDN for the
requesting host, on a separate line.
NOTICE
After you make changes to the servers file, stop and then restart the NetWorker
services on the host. The EMC NetWorker Security Configuration Guide provides more
information about how to modify the servers file.
Each storage node device sends The Server network interface attribute of each
metadata to the NetWorker Storage Node resource must contain the
server by using a specific FQDN of the NetWorker server NIC.
NetWorker server NIC.
The Aliases attribute of the NetWorker server
Metadata includes the device Client
control session resource must contain an entry for the
information and the media shortname
database operations and FQDN of each NIC.
that connect back to the
nsrmmdbd process on the
NetWorker server.
Each storage node library sends The Server network interface attribute of
metadata to the NetWorker Library resource must contain the FQDN of the
server by using a specific NIC on NetWorker server NIC.
the NetWorker server.
The Aliases attribute of the NetWorker
The metadata includes SCSI server Client resource must contain an entry
commands for for
the tape movements and the the shortname and FQDN of each NIC.
library inventory
operations that connect back to
nsrmmgd process.
Storage node The client sends backup data to The Storage Nodes attribute of each Client
a NetWorker storage node over a resource must contain the FQDN of the
specific NIC. storage node NIC.
Client The NetWorker server When you create a Client instance for the
communicates with a client over client, specify a hostname for the client that
a specific NIC. is only reachable over the desired NIC.
Figure 73 Configuring the Aliases attribute for NetWorker server Client resource
2. Create a Client resource for the storage node. Update the Aliases attribute to include
the FQDN and the shortname for each storage node NIC. This figure shows the values
in the Aliases attribute.
Figure 74 Configuring the Aliases attribute for NetWorker storage node Client resource
3. Update the Storage Nodes attribute for each Client resource in VLAN1 to contain the
hostname of the NIC for the storage node to which the client connects. For example,
for NetWorker client VLAN1_client, specify the storage node hostname sn1. This figure
shows the values in the Storage node attribute.
4. Update the Aliases attribute for each Client resource in VLAN1 to contain the FQDN
and shortname of the client. The Server network Interface attribute must contain the
hostname of the NIC for the NetWorker server to which the client connects. This figure
shows the values in the Aliases and Server network interface attributes.
Figure 76 Aliases and Server network interface attributes for VLAN1 clients
5. Update the Storage Nodes attribute for each Client resource in VLAN2 to contain the
hostname of the NIC interface for the storage node to which the client connects. For
example, for NetWorker client VLAN2_client, specify the storage node hostname sn2.
This figure shows the values in the Storage node attribute.
6. Update the Aliases attribute for each Client resource in VLAN2 to contain the FQDN
and shortname of the client. The Server network Interface must contain the hostname
of the NIC interface for the NetWorker server to which the client connects. This figure
shows the values in the Aliases and Server network interface attributes.
Figure 78 Aliases and Server network interface attributes for VLAN2 clients
7. Create the Device resource on the remote storage node by specifying either one of the
hostnames for the storage node.
NIC Teaming
NIC Teaming is a term that describes the use of multiple network interfaces in parallel.
NIC teaming increases the link speed beyond the limits of any one cable or any one port
and increases redundancy for higher availability.
Other terms for NIC Teaming include link aggregation, Ethernet trunk, port channel, port
teaming, port trunking, link bundling, EtherChannel, Multi-Link Trunking (MLT), and NIC
bonding.
NIC Teaming at the TCP level, regardless of the protocol or algorithm used, has no effect
on a single TCP session. When you combine multiple links into a single link, the backup
performance of a single session does not improve.
Depending on the algorithm used, starting parallel backup jobs with multiple NICs
produces load balancing and can improve backup performance. To achieve load
balancing, use a TCP session-based link aggregation algorithm and not a host-based
algorithm. For example, use the IEEE 803.3ad/802.1ax Link Aggregation Control Protocol
(LACP).
The use of trunked interfaces is transparent from a NetWorker point of view and the
configuration of trunked interfaces inside NetWorker does not differ from the
configuration of stand-alone interfaces. You can combine TCP trunking with multihoming,
for example, by trunking some NICs on the system and leaving other NICs to work on
separate subnets.
EMC recommends that you do not configure the NetWorker server as a DHCP client. If
the NetWorker server is a DHCP client, then the NetWorker server must use a reserved
address that the DHCP server synchronizes with the DNS server.
Troubleshooting 781
Troubleshooting
NOTICE
When you do not use the Client Configuration wizard to create the client, NMC
updates the NetWorker version attribute after the first backup. When you update the
NetWorker software on a client, the NetWorker version attribute does not reflect the
new version until the first backup after the update.
nsradmin -p nsrexecd
The nsradmin output displays the version of NetWorker software running on each client.
Windows:
l C:\Program Files\EMC
NetWorker\nsr\logs
\client_fix
l C:\Program Files\EMC
NetWorker\nsr\logs
\client_fix.raw
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs
\messages
NetWorker server Log file name and location that is UNIX only, OS log file.
generated syslog defined by the system log
configuration file. Note
messages
local0.notice and NetWorker does not modify the
local0.alert syslog.conf file to
configure local0.notice
and local0.alert. Vendor
specific documentation
describes how to configure
local0.notice and
local0.alert
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs
\DefaultReportHome_YYMMDD
xxxxxx
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs
\hyperv-flr-ui\hyperv-
flr-ui.log
Windows:
C:\Program Files\EMC
NetWorker\logs\rap.log
Window:
C:\Program Files\EMC
NetWorker\logs
\Networker_server_sec_aud
it.raw
Windows:
C:\Program Files\EMC
NetWorker\Management
\logs
\gstdbupgrade.log
Windows:
C:\Program Files\EMC
NetWorker\Management
\logs\web_output
NMC server database log Linux: Contains messages for the embedded
files PostgreSQL database server on the
/opt/lgtonmc/ NMC server.
management/nmcdb/
pgdata/db_output
Windows:
C:\Program Files\EMC
NetWorker\Management
\nmcdb\pgdata
\db_output
Windows Bare Metal The following files in the X: Contains the recovery workflow
Recovery (BMR) \Program Files\EMC of the
NetWorker\nsr\logs\ DISASTER_RECOVERY:\ and
directory: any errors that are related to
recovering the save set files or
ossr_director.raw
Windows ASR writer errors. Use
the nsr_render_log
program to view the contents of
the log file.
recover.log Contains the output that is
generated by the NetWorker
recover.exe program and
error messages that are related
to critical volume data
recovery.
winPE_wizard.log Contains workflow information
that is related to the
NetWorker BMR wizard user
interface.
winpe_nw_support.raw Contains output from the
winpe_nw_support.dll
library. The output provides
information about
communications between the
NetWorker BMR wizard and
the NetWorker server.
CloudBoost - NetWorker The following log files in the These files appear on a client
client direct-enabled NetWorker
/nsr/logs/cloudboost
client and contain information
directory: about data stored on a
CloudBoost device. The
MagFS.log.ERROR.date- severity of the message
timestamp.pid.txt determines which log file that
MagFS.log.FATAL.date- error message is written to.
timestamp.pid.txt The maximum size of the log
files are 100 MB.
Note
CloudBoost - CloudBoost The following log files in These files appear on the
Appliance the /nsr/logs/cloudboost CloudBoost appliance and
directory: contain information about
operations performed on a
MagFS.log.ERROR.date-
CloudBoost device. The
timestamp.pid.txt
severity of the message
MagFS.log.FATAL.date- determines which log file that
timestamp.pid.txt error message is written to.
where:
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to
where:
n hostname is the name of the host that contains the .raw file.
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to
n -c suppresses the category
n -e suppresses the error number
n -m suppresses the message ID
n -p suppresses the process ID
n -a suppresses the activity ID
n -t suppresses the thread ID
n -h suppresses the hostname
n -y suppresses the message severity
l To render a .raw file and only view log file messages for a specific device, type:
nsr_render_log -c -empathy -F devicename raw_filename
1>output_filename 2>&1
l To render a .raw file and only view certain messages severities, type:
nsr_render_log -c -empath -Y message_severity 1>output_filename
2>&1
where message_severity is one of the severity types listed in the following table.
Type Description
Informational Information that may be useful, but does not require any specific action.
Warning A temporary problem that NetWorker software may resolve or prompt you to
resolve.
Critical Errors that you are required to resolve, to ensure successful NetWorker operations.
The UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information aboutthe nsr_render_log program and the available options.
nsradmin -p nsrexec
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 2;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\
\gstd.raw";
5. Use the Runtime rendered log attribute to define the path and file name for the
rendered log file.
For example, to save rendered messages to the file rendered.log in the default
NetWorker logs directory on a Windows host, type:
name: daemon.raw;
log path: C:\\Program Files\\EMC NetWorker\\Management\\GST\
\logs\\daemon.raw;
Table 147 Raw log file attributes that manage log file size
Attribute Information
Maximum size Defines the maximum size of the log files.
MB
Default: 2 MB
Default: 10
Runtime rollover When set, this attribute invokes an automatic hourly check of the log file size.
by size
When you configure the runtime rendered log attribute, NetWorker
trims the runtime rendered log file and the associated .raw
file simultaneously.
Default: disabled
Runtime rollover When set, this attribute runs an automatic trimming of the log file at the
by time defined time, regardless of the size. The format of the variable is
HH:MM (hour:minute).
When you configure the runtime rendered log attribute, NetWorker trims the
runtime rendered log file and the associated .raw file simultaneously.
Table 147 Raw log file attributes that manage log file size (continued)
Attribute Information
Default: undefined
Note
After setting this attribute, restart NetWorker services for the change to take
effect.
How the trimming mechanism trims the log files differs depending on how you define the
log file size management attributes. The following table summarizes the trimming
behavior.
Table 148 Raw log file attributes that manage the log file trimming mechanism
Note
When you do not l NetWorker checks the log file size when the nsrexecd process starts
configure runtime on the computer.
rollover by time or
runtime rollover by
l When the log file size exceeds the size that is defined by the
size maximum size MB attribute, NetWorker renames the existing log file
to log_file_name_date_time.raw then creates a new empty
log file.
Note
When the nsrd daemon or NetWorker Backup and Recover Server service
runs for a long time, the size of the log file can become much larger than
the value defined by maximum size MB.
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw files
To configure the NetWorker software to rollover the .raw file by time, perform the
following steps.
Procedure
1. Log in to the NetWorker host with root on UNIX or in to Administrator for Windows.
2. Use the nsradmin program to access the NSRLA database:
nsradmin -p nsrexec
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 2;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\
\gstd.raw";
6. Update the runtime rollover by time attribute with the time that you want to rollover
the log file.
For example, to configure the gstd.raw file to rollover at 12:34 AM, type:
2. Start the daemon from a command prompt and specify the troubleshoot level.
For example:
l To start the nsrexecd daemon in troubleshoot mode, type:
source /opt/nsr/admin/networkerrc
source /opt/nsr/admin/nsr_serverrc
nsrctld -D9 1>filename2>&1
where filename is the name of the text file that NetWorker uses to store the
troubleshoot messages.
3. After you collect the necessary troubleshoot information, perform the following steps:
a. Stop the NetWorker processes by using the nsr_shutdown command.
b. Restart the processes by using the NetWorker startup script:
l On Solaris and Linux, type:
/etc/init.d/networker start
l On HP-UX, type:
/sbin/init.d/networker start
l On AIX, type:
/etc/rc.nsr
c. Click Start.
4. To put the nsrd process in troubleshoot mode:
a. Right-click the NetWorker Backup and Recover service and select Properties.
b. In the Startup Parameters field, type -D x.
where x is a number between 1 and 99.
c. Click Start.
Results
NetWorker stores the troubleshoot information in the daemon.raw file.
After you finish
After you capture the troubleshoot information, stop the NetWorker services, remove the -
D parameter, and then restart the services.
2. Edit the file and specify the following at beginning of the file:
GST_DEBUG=x
export GST_DEBUG
/etc/init.d/gst stop
then
/etc/init.d/gst start
l AIX: Type:
/etc/rc.gst start
then
/etc/rc.gst stop
Results
NMC stores the troubleshoot information in the gstd.raw file.
After you finish
After you capture the troubleshoot information, stop the gstd daemon, remove the
environment variable from the startup file, and then restart the gstd daemon.
Note
If you do not see the PID for each process on the Process tab, browse to View >
Select Columns, and then select PID (Process Identifier)
l On UNIX, use the ps command. For example, type ps -ef | grep nsr to get a
list of all the NetWorker processes that start with nsr.
where:
l PID is the process id of the process.
l x is a number between 0 and 9.
Note
Results
NetWorker logs the process troubleshoot information in the daemon.raw file.
After you finish
To turn off troubleshoot, type:
where:
l x is a number between 1 and 99.
l file_sytem_objects is the name of the files or directory to backup.
l filename is the name of the file that stores the troubleshoot information.
Note
The EMC NetWorker Command Reference Guide provides detailed information about all the
available backup options and how to use the save command.
Note
2. Use the Recovery wizard to create or modify the recover job. On the Select the
Recovery Options window, select Advanced Options.
3. In the Debug level attribute, select a troubleshooting level between 0 and 9.
c. Make note of the values in the recover, recovery options, and recover stdin
attributes. For example:
recover command: recover;
recover options: -a -s nw_server.emc.com -c mnd.emc.com -I
- -i R;
recover stdin:
“<xml>
<browsetime>
May 30, 2013 4:49:57 PM GMT -0400
</browsetime>
<recoverpath>
C:
</recoverpath>
</xml>”;
where:
l nw_server.emc.com is the name of the NetWorker server.
l mnd.emc.com is the name of the source NetWorker client.
3. Confirm that the nsrd process can schedule the recover job:
a. Update the Recover resource to start the recover job:
update: name: recover_resource_name;start time: now
where recover_resource_name is the name of the Recover resource.
b. Exit the nsradmin application
c. Confirm that the nsrtask process starts.
If the nsrtask process does not start, the review the daemon.raw file on the
NetWorker server for errors.
4. To confirm that the NetWorker server can run the recover command on the remote
host, type the following command on the NetWorker server:
d. When the recover command completes, review the recover output for errors. If
the recover command fails, then review the values that are specified in the
Recover resource for errors.
7. Use the jobquery command to review the details of the Recover job. From a
command prompt on the NetWorker server, type: jobquery
8. From the jobquery prompt, perform one of the following steps:
l Set the query to the Recovery resource and display the results of all recovery jobs
for a Recovery resource:
Where jobid is the jobid of the Recover job that you want to review.
Note
Review the daemon.raw file on the NetWorker server to obtain the jobid for the
recovery operation.
where:
l x is a number between 1 and 99.
l file_sytem_objects is the name of the files or directory to recover.
l filename is the name of the file that stores the troubleshoot information.
Note
The EMC NetWorker Command Reference Guide provides detailed information about all the
available recovery options and how to use the recover command.
Windows:
C:\Program Files\EMC NetWorker\nsr\authc
\tomcat\logs\authc-server.log
Refer to the Apache website for detailed information about the Apache Tomcat log files.
Note
After you make changes to the log4j.properties file you must stop and start the
NetWorker Authentication Service daemon to reset the configuration settings.
Authentication Service renames the log file for archival purposes and creates log file.
By default, NetWorker Authentication Service sets the maximum size to 100 KB.
To increase the size of the log file to 2MB, modify the log4j.appender.app.MaxFileSize
attribute to appear as follows: log4j.appender.app.MaxFileSize=2MB
Note
After you make changes to the authc-cli-log4j.properties file you must stop
and start the NetWorker Authentication Service daemon to reset the configuration
settings.
NOTICE
Bare Metal Recovery (BMR) enabled clients do not support the restart a single save set.
This is because BMR workflows report all save sets within a save group as failure or
success.
# nsradmin
nsradmin> . type: Nsr group; name: GroupName|Default
nsradmin> update client subset: client1:ss1,ss2, client2:ss3,ss4;
autorestart: restart now
savegrp
The savegrp program enables you to restart failed clients or save sets while a group is
running. From the command line, type:
Note
During a bootstrap backup, the savegrp program does not accept requests to restart
individual save sets.
Improper font size for the Client wizard with Netscape on Solaris
When you use the Netscape browser on Solaris, the font size of the Client wizard may
appear too small.
To change the font type and size:
1. Open the /usr/bin/nwwiz script file in a text editor.
2. Edit the following line to change the font size:
NSR_WIZARD_FONT_SIZE=size
3. Save and close the nwwiz file.
Note
You cannot use NMC to delete the NSR Peer Information resource for a NetWorker host
that does not have an existing client resource that is configured on the NetWorker server.
Procedure
1. On the Administration window, select Hosts.
The Hosts Management window appears.
2. Right-click the NetWorker host with the NSR Peer Information resource that you want
to delete and select Host Details.
Note
The NetWorker host does not appear in the Local Hosts section when a client resource
does not exist on the NetWorker server.
The Certificate window displays a list of NSR Peer Information resources stored in the
nsrexec database on the host.
3. In the Certificate pane, right-click the certificate that you want to delete and select
Delete.
4. When prompted to confirm the delete operation, select Yes.
If you receive the error, User username on machine hostname is not on
administrator list, you cannot modify the resource until you configure the
NSRLA access privileges on the target host. The section "Configuring NSRLA access
privileges" provides more information.
Results
The target host creates a new NSR Peer Information resource for the initiating host the
next time that the initiating host attempts to establish a connection with the target host.
Deleting the NSR Peer Information resource by using nsradmin
Use the nsradmin command on the target host to delete the NSR Peer Information
resource for the initiating host.
Before you begin
Connect to the target host with an account that has administrator access to the NSRLA
database. The section Configuring access privileges to the NetWorker client database
describes how to update the administrator list in the NetWorker client database.
Procedure
1. Connect to the nsrexec database:
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
show
4. Print the attributes for the NSR Peer Information resource and confirm that the name
and peer hostname attributes match the hostname of the initiating host:
delete
quit
Results
The target host creates a new NSR Peer Information resource for the initiating host the
next time that the initiating host attempts to establish a connection with the target host.
Backups fail to start when the daylight savings time change occurs
When you schedule backup operations to occur during the hour in which the operating
system moves the clock ahead or behind by one hour, NetWorker skips the backup
operation. For example, the operating system is configured to move the clock forward one
hour at precisely 2:00 A.M. and backups are scheduled to occur at 2:01 A.M. At 2:00
A.M., the operating system moves the clock forward to 3:00 A.M. NetWorker will skip all
Backups fail to start when the daylight savings time change occurs 813
Troubleshooting
backup operations that are scheduled to start between 2:01 to 2:59 and NetWorker does
not initiate the backup operation.
To avoid this situation, set the backup time to occur at least one minute before the time
change occurs.
Note
When you use the mminfo command to get a weekly save set usage summary for the
time period during the change to daylight savings time, mminfo does not display any
information for the day of the change.
Shut down NetWorker services prior to any significant changes to system date
If you need to make a significant change to the system clock or date, for example, a
change of more than a day, then ensure that you shutdown the NetWorker services before
you make the change. NetWorker services depend heavily on the system clock for many
operations such as active sessions, volume mount and unmount operations, the
expiration of save sets, and license enforcement.
Clone ID timestamp does not reflect the time the clone was created
To guarantee that the cloned save sets that NetWorker creates on different storage nodes
do not have the same timestamp, the NetWorker software assigns a timestamp to cloned
save sets that does not reflect the actual time that NetWorker creates the clone.
If the server can find the correct position, media verification succeeds and a successful
completion message appears:
media info: verification of volume "jupiter.007" volid 30052
succeeded.
If this message appears, specify a block size that is greater than or equal to 32.
To resolve this issue, ensure that you recover indexes to the original location then move
the indexes to another directory. Moving a client file index on page 709 describes how to
move indexes to another directory.
The updated entry, with a desktop heap allocation of 1024 KB appears as:
%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows
SharedSection=1024,3072,1024 Windows=On SubSystemType=Windows
ServerDll=basesrv,1
ServerDll=winsrv:UserServerDllInitialization,3
ServerDll=winsrv:ConServerDllInitialization,2
ProfileControl=Off
MaxRequestThreads=16
4. Restart the NetWorker server.
The Microsoft Knowledge Base article 18480 on the Microsoft website provides more
information.
Hostname aliases
When you incorrectly define an alias for a client, the backup fails. Under certain
conditions, such as improperly configured DNS servers or hosts files, the NetWorker
software does not create any aliases for a new client. If you use TCP/IP, ensure that you
specify the hostname and the fully qualified domain name (FQDN) for a client in Aliases
field of the client properties window.
When the alias field is incorrectly defined you can see the following behavior:
l Backup operations for the client fail with the following error message:
No Client resource for client_name
l NetWorker always performs backups for a client at a level full, regardless of the level
of the scheduled backup.
l Automatic index management, as set up in the browse and retention policies, does
not work.
l The /nsr/index directory, which contains the indexes for all the clients that are
configured on the NetWorker server contains two directories for the same client, but
each directory uses a different client name.
You must update the alias field for a client to include all hosts names for the client in the
following situations:
l When a host have two or more network interfaces.
l When sites use a mixture of short and FQDNs for the same servers, for example, mars
and mars.jupiter.com.
l When the datazone uses both (Network Information Services (NIS) and DNS.
NOTICE
Do not include aliases that are shared by other hosts in the datazone.
This message indicates that NetWorker has not previously performed a back up of the
specified save set. Before you can perform an incremental or level backup on a save set,
perform a full backup of the save set.
If a level full backup exists for this save set, this error message can appear in the
following situations:
l The clocks on the client and server are not synchronized.
l The savegrp session begins before midnight and ends after midnight.
l Multiple client ids exist for the client.
last incremental backup, and any non-full scheduled backup of the file system will not
back up the file.
To ensure the file is backed up, use the touch command or otherwise modify the file so
that the ctime is updated. Alternatively, perform a manual backup of the file. Manual
backups on page 408 provides more information.
To resolve this issue, use the nsrck -L2 clientname to create a client file index for the
client, then try the scanner command again.
nsrck -L5
If the command does not resolve the index corruption, refer to Adding information about
recyclable save sets to the client file index on page 472 for more information.
Aborting a recovery
When you stop a recovery operation on a client, the following could occur:
l The recovery might stop immediately.
l The recover program will display a list of the files that were not recovered.
l Messages similar to the following appears, which indicates that the recovery
operation did not stop cleanly:
Recover: ***Canceled***
Recover: Unable to read checksum from save stream
Recover: error recovering C:\WINDOWS\CURSORS\APPSTART.ANI
Didn't recover requested file C:\WINDOWS\CURSORS
\APPSTART.ANI
Cannot use the Console interface to stop the savegrp command 819
Troubleshooting
l Use the DiskProbe utility to set the serial numbers to unique numbers. The
DiskProbe utility is part of the Windows Support Tools and is available for all
versions of Windows supported by NetWorker software.
l Avoid using the All save set. Instead, specify each drive letter or the VSS SYSTEM
save set separately. The DISASTER_RECOVERY:\ save set on page 355 provides more
information about the All save set.
Note
After you perform one of the resolutions, stop and then restart the NetWorker services on
the NetWorker server that performs the backups.
cp recovered_filename zero_filled_filename
NOTICE
Ensure that you have enough free disk space to accommodate a duplicate of each copied
sparse file.
This can occur when the backup operation does not write any data to the backup media
during the compression operation and time the backup is idle reaches the time that is
specified by the group Inactivity Timeout attribute. To resolve this issue, increase the
Inactivity Timeout attribute for the backup group.
To help determine an adequate timeout limit:
1. Set the Inactivity Timeout value to zero. A value of zero results in no timeout limit.
2. Determine the time that the backup requires to complete a full save of the file
system, and specify this time as the inactivity timeout limit.
Note
NetWorker will only backup renamed directories with unchanged files and subfolders
only when you explicitly list directory names in the save set attribute of the Client
resource.
For example, if the save set field contains E:\ and you rename the E:\test directory to
E:\test1, NetWorker does not back up the E:\test1 directory when you enable
Backup renamed directories. When the save set field contains E:\test and you rename
the E:\test directory to E:\test1, NetWorker performs a backup of the E:\test1
directory when you enable Backup renamed directories.
Successful save sets listed as failed in the Group Backup Details window
Certain backup operations, such as on some NetWorker modules, create multiple
sessions to perform a single backup job. If one of these sessions fails, the Console
reports that the entire backup job has failed.
To determine the status of each session, click the Show Messages button in the Failed
table of the Savegroup Completion dialog box. This information also appear in the Logs
tab, under monitoring, and in the savegroup completion report.
Successful save sets listed as failed in the Group Backup Details window 823
Troubleshooting
Ignore the message, and continue to add the client to the UNIX server. To avoid the
message, add the UNIX server hostname to the servers file on the client after you add
the client to the UNIX server.
To resolve this issue, add all of the server aliases that are related to any additional
network interfaces to the alias list of Client resource for the NetWorker server.
Note
If you type a hostname or host=hostname in the Remote Access attribute, you allow
any user on that host to recover files for the client. To enter a username without
specifying the host, type user=name.
The following users have permission to recover any files on any client, regardless of the
users who are listed in the Remote Access attribute:
l ‘Root’ user on a UNIX host
l Member of the ‘Administrators’ local group on a Windows host
l Members of a ‘Application Administrator’ User group on the NetWorker Server
l Members of a NetWorker Server User group that has the ‘Change Security Settings’
privilege
Other users can only recover files for which they have read permission, which is based on
file permissions at the time of backup. Files recovered by a user other than root, operator,
or the operator group are owned by that user.
Note
The nsrim -C command can take a long time to complete and you cannot perform
NetWorker server operations until the command completes.
Reduce the size of the media database size on page 710 provides more information
about reducing the size of the media database.
Note
If you are using DHCP, use a static IP address for the NetWorker server.
These messages indicate that one or more NetWorker services are not running on the
NetWorker server. The following table summarizes the startup commands that you can
use to startup the services on a UNIX NetWorker server.
AIX /etc/rc.nsr
NOTICE
If you manually delete the newdotnet.dll file, the system will become unusable.
access control list (ACL) List that specifies the permissions assigned to a specific file or directory.
See administrator
active group NetWorker backup group that has its Autostart attribute enabled.
administrator Person who normally installs, configures, and maintains software on network computers,
and who adds users and defines user privileges.
Administrators group Microsoft Windows user group whose members have the rights and privileges of users in
other groups, plus the ability to create and manage the users and groups in the domain.
advanced file type device Disk storage device that uses a volume manager to enable multiple concurrent backup and
(AFTD) recovery operations and dynamically extend available disk space.
agent Term used by Sun Microsystems to denote a cluster server. Also known as a package (HP-
UX), and a virtual server (Microsoft).
application specific Program that is used in a directive to specify how a set of files or directories is to be
module (ASM) backed up or recovered. For example, compressasm is a NetWorker directive used to
compress files.
archive Process that backs up directories or files to an archive volume to free up disk space for
regular backups. Archived data is not recyclable. See groom
archive volume Volume used to store archive data. Archive data cannot be stored on a backup volume or a
clone volume.
authentication Process by which a user or software process is determined to be trusted or not trusted.
authorization code Unique code that in combination with an associated enabler code unlocks the software for
permanent use on a specific host computer. See license key.
auto media management Feature that enables the storage device controlled by the NetWorker server to
automatically label, mount, and overwrite a volume it considers unlabeled.
backup cycle Full or level 0 backup and all the subsequent incremental backups that are dependent on
that backup.
Backup Operators group Microsoft Windows user group whose members have the capability to log in to a domain
from a workstation or a server, whose data they may back up and restore. Backup
Operators can also shut down servers or workstations.
backup volume A volume used to store backup data. NetWorker backup data cannot be stored on an
archive volume or a clone volume.
bootstrap Save set that is essential for disaster recovery procedures. The bootstrap consists of three
components that reside on the NetWorker server: the media database, the resource
database, and a server index.
browse policy NetWorker policy that specifies the period of time during which backup entries are retained
in the client file index. Backups listed in the index are browsable and readily accessible for
recovery.
client Host on a network, such as a computer, workstation, or application server whose data can
be backed up and restored with the backup server software.
client file index Database maintained by the NetWorker server that tracks every database object, file, or file
system backed up. The NetWorker server maintains a single index file for each client
computer. The tracking information is purged from the index after the browse time of each
backup expires.
Client resource NetWorker server resource that identifies the save sets to be backed up on a client. The
Client resource also specifies information about the backup, such as the schedule, browse
policy, and retention policy for the save sets.
clone 1. Duplicate copy of backed-up data, which is indexed and tracked by the NetWorker
server. Single save sets or entire volumes can be cloned.
2. Type of mirror that is specific to a storage array.
clone volume Exact duplicate of a backup or archive volume. NetWorker software can index and track
four types of volumes (backup, archive, backup clone, and archive clone). Save sets of
these different types may not be intermixed on one volume. Clone volumes may be used in
exactly the same way as the original backup or archive volume.
cluster Group of linked virtual or physical hosts, each of which is identified as a node, with shared
storage that work together and represent themselves as a single host.
common internet file Formerly known as Server Message Block (SMB). Message format used by Microsoft DOS
system (CIFS) and Windows to share files, directories, and devices.
Console application Console server user role whose members can configure features, except security features,
administrator in the Console sever application.
Console security Console server user role whose members can add Console users and assign them to
administrator Console roles.
consolidate To create a full backup by merging a new level 1 backup with the last full level backup.
continued save set Save set data that is continued from a previous volume.
conventional storage Storage library attached to the NetWorker server or storage node, used to store backups or
snapshot backups. Also known as secondary storage. See primary storage .
daemon Process on UNIX systems that runs in the background and performs a specified operation
at predefined times or in response to certain events.
database 1. Collection of data arranged for ease and speed of update, search, and retrieval by
computer software.
2. Instance of a database management system (DBMS), which in a simple case might be
a single file containing many records, each of which contains the same set of fields.
data management Application that manages a backup or recovery session through an NDMP connection.
application (DMA)
data mover (DM) Client system or application, such as NetWorker software, that moves data during a
backup, recovery, snapshot, or migration operation. Also See proxy host.
data server agent (DSA) Functionality that enables the NetWorker server to communicate with a non-NetWorker
NDMP host and package images of save streams. For example, an NDMP host that
generates proprietary save data may send that data to a NetWorker storage device to have
a save set associated with it.
data service provider Feature that controls access to disk storage during an NDMP back up.
(DSP)
datazone Group of clients, storage devices, and storage nodes that are administered by a NetWorker
server.
deduplication backup Type of backup in which redundant data blocks are identified and only unique blocks of
data are stored. When the deduplicated data is restored, the data is returned to its original
native format.
destination client Computer to which database files are restored in a directed recovery.
device 1. Storage folder or storage unit that can contain a backup volume. A device can be a
tape device, optical drive, autochanger, or disk connected to the server or storage
node.
2. General term that refers to storage hardware.
3. Access path to the physical drive, when dynamic drive sharing (DDS) is enabled.
Device Central Interface from which one can manage all NetWorker libraries.
DFS component 1. A namespace for files and DFS links, called a DFS root.
2. A connection to a shared file or folder, called a DFS child node.
See distributed File System (DFS)
direct access restore NDMP operation that can recover data in the middle of a tape set without having to parse
(DAR) the tape set sequentially, thereby reducing the recovery time of large backups.
directed recovery Method that recovers data that originated on one client host and re-creates it on a different
client host, known as the destination client.
directive Instruction that directs NetWorker software to take special actions on a given set of files for
a specified client during a backup or recovery operation. Directives are ignored in manual
(unscheduled) backups.
disaster recovery Restore and recovery of data and business operations in the event of hardware failure or
software corruption.
distributed File System Microsoft Windows add-on that creates a logical directory of shared directories that span
(DFS) multiple hosts across a network.
document mode Display mode that presents static reports such as charts or tables in a format that
resembles the Print Preview mode in a PDF viewer.
drill-down Organization of report information by granularity. For example, within a group summary
report, a client report may be viewed, and then a report for a selected save set for that
client.
drive Hardware device through which media can be read or written to. See device.
DSA save set Save sets of an NDMP client that are backed up to non-NDMP tape device. See data server
agent (DSA)
dynamic drive sharing Feature that allows NetWorker software to recognize and use shared drives and when they
(DDS) are available.
event Notification generated by an application that could require user action, such as the
impending expiration of a software enabler key that appears in the daemon log of the
Console server.
exit code Indicator that specifies whether a backup or recovery session succeeded. An exit code of
zero (0) indicates the session completed successfully. A nonzero exit code indicates that
the session did not complete successfully.
expired save set Save set that has exceeded its browse time and has been removed from the NetWorker
client file index. Expired save sets can no longer be browsed.
file system 1. Software interface used to save, retrieve, and manage files on storage media by
providing directory structures, data transfer methods, and file association.
2. Entire set of all files.
3. Method of storing files.
firewall Security software designed to prevent unauthorized access to or from a private network.
full backup Type of backup that backs up all data objects or files, including the transaction logs
contained in databases, regardless of when they last changed. See level.
generic services toolkit Software framework that underlies the Console server.
(GST)
groom Process that removes the original files from a local disk after a successful archive
operation.
group One or more client computers that are configured to perform a backup together, according
to a single designated schedule or set of conditions.
hash Number generated from a string of text that is used to encrypt a user password. See salted
hash
heterogeneous network Network with systems of different platforms and operating systems that interact across the
network.
high-availability system System of multiple computers configured as cluster nodes on a network that ensures that
the application services continue despite a hardware or software failure. Each cluster node
has its own IP address with private resources or disks that are available only to that
computer.
high-water mark Percentage of disk space that, when filled, automatically starts the staging process.
host authentication Encryption and verification services between NetWorker hosts. See user authentication
hostname Name or address of a physical or virtual host computer that is connected to a network.
inactivity timeout Time in minutes to wait before a client is considered to be unavailable for backup.
individual user Process by which Console administrators restrict or grant user access to NetWorker
authentication servers, based on Console usernames.
insertion time Time that the save set record was most recently introduced into the save set database.
Interactive mode Console mode that displays reports (as charts or tables) that users can interact with. For
example, one can sort, rearrange, and resize columns in a table-format report that was run
in this mode.
Internationalization Process of adapting software to accept input and output of data in various languages and
(I18N) locales.
JAR (Java Archive) A file that contains compressed components needed for a Java applet or application.
Java Type of high-level programming language that enables the same, unmodified Java program
to run on most computer operating systems. See Java Virtual Machine (JVM)
Java plug-in JVM that can be used by a web browser to run Java applets.
Java Virtual Machine Execution environment for interpreting the Java programming language. Each operating
(JVM) system runs a unique JVM to interpret Java code.
legacy method Use of special-case Microsoft APIs to back up and recover operating system components,
services, and applications.
level Backup configuration option that specifies how much data is saved during a scheduled or
manual backup:
l A full backup backs up all data objects or files, regardless of when they last changed.
l An incremental backup backs up only data objects or files that have changed since the
previous backup.
library Hardware device that contains one or more removable media drives, as well as slots for
pieces of media, media access ports, and a robotic mechanism for moving pieces of media
between these components. Libraries automate media loading and mounting functions
during backup and recovery. The term library is synonymous with autochanger, autoloader,
carousel, datawheel, jukebox, and near-line storage.
library sharing Shared access of servers and storage nodes to the individual tape drives within a library.
The drives are statically assigned to hosts.
license key Combination of an enabler code and authorization code for a specific product release to
permanently enable its use. Also called an activation key.
License Manager (LLM) Application that provides centralized management of product licenses.
local cluster client NetWorker client that is not bound to a physical machine, but is instead managed by a
cluster manager. It is also referred to as a logical or virtual client.
localization (L10N) Translation and adaptation of software for the user language, time formats, and other
conventions of a specific locale.
logical device Virtual device used in the integration of NetWorker software with SmartMedia. Many logical
devices can be assigned to a single physical device.
low-water mark Percentage of disk space filled that, when reached, automatically stops the migration
process.
LUS Driver used by EMC software products as a proprietary device driver that sends arbitrary
SCSI commands to an autochanger. Also known as the EMC User SCSI.
managed application Program that can be monitored or administered, or both from the Console server.
managed node Storage management application under the control of Console. For example, a system
running NetWorker on a backup server or storage node is considered to be a managed
node.
man pages Online technical reference manual, normally provided on UNIX servers, for the syntax and
function of program commands that may be issued from the command line.
manual backup Backup that a user performs from the client, also known as an unscheduled, on-demand,
or ad hoc backup.
media Physical storage, such as a disk file system or magnetic tape, to which backup data is
written. See volume.
media index Database that contains indexed entries of storage volume location and the life cycle status
of all data and volumes managed by the NetWorker server. Also known as media database.
member Physical host that occupies a node in a cluster environment. Each member has its own IP
address.
mount To make a volume physically available for use, such as the placement of a removable disk
volume or tape into a drive for reading or writing.
mount host Host in a network that is used to mount storage array snapshot volumes to perform
snapshot restore and rollover operations.
multiplex To simultaneously write data from more than one save set to the same storage device.
NDMP server Instance of one or more NDMP services, such as a data, tape, or SCSI server, that is
managed by a single control connection.
NDMP service Virtual machine that is controlled by a data management application (DMA) such as
NetWorker software. Example services include:
l Server with a directly attached storage appliance
l Storage device system with one or more tape drives
l Software process that reads two datastreams and multiplexes them into one stream
NDMP storage node Host or open system with NDMP services. For example, Netapp Filer and EMC Filer.
network attached storage Disk array or storage device (NAS filer) that connects directly to the messaging network or
(NAS) LAN interfaces and uses the common communication protocols of TCP/IP or NDMP.
Network Data Software component that uses TCP/IP standards to specify how heterogeneous network
Management Protocol components communicate for the purposes of backup, recovery, and transfer of data
(NDMP) between storage systems.
NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker application NetWorker server user who may operate NetWorker software, configure the NetWorker
administrator server, and create and modify NetWorker resources.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC server
Console (NMC) also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker security NetWorker server user who may add, change, or delete NetWorker server user groups.
administrator
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on the
same network.
NetWorker Snapshot EMC technology that provides point-in-time snapshot copies of data. NetWorker software
Management (NSM) backs up data from the snapshot. This allows applications to continue to write data during
the backup operation, and ensures that open files are not omitted.
network file system (NFS) Communications protocol that enables users to access shared files on different types of
computers over a network.
NFS server Host that contains exported file systems that NFS clients can access. See network file
system (NFS)
non-critical volume A volume that contains files that are not part of the system state or an installed service.
notification Message sent to the NetWorker administrator about important NetWorker events.
offline backup Backup of database objects performed while the corresponding database or instance is
shut down and unavailable to users. Also known as a cold backup.
offline restore Automated restore that does not require the manual installation of an operating system. A
bare metal recovery (BMR) is an offline restore.
online backup Backup of database objects performed while the corresponding database or instance is
running and available to users. Also known as a hot backup.
online indexes Databases located on the NetWorker server that contain all the information pertaining to
the client backups (client file index) and backup volumes (media index).
online restore Restore operation that is performed from a NetWorker recover program. An online restore
requires that the computer has been booted from an installed operating system. See also
offline restore.
operator Person who performs day-to-day data storage tasks such as loading backup volumes into
storage devices, monitoring volume locations and server status, verifying backups, and
labeling volumes.
override Different backup level that is used in place of the regularly scheduled backup.
package A term used by HP-UX to denote a cluster server. Also known as an agent (Sun) or virtual
server (Microsoft).
parallelism Feature that enables a maximum number of concurrent streams of data during backup or
restore operations. For example, parallelism values can be set for the NetWorker server,
clients, pools, and groups.
peer NetWorker host that is involved in an authentication process with another NetWorker host.
permanent enabler Enabler code that has been made permanent by the application of an authorization code.
See enabler code
physical cluster client Backup client that is bound to a physical host in the cluster and can have its own
resources (private or local).
point-in-time copy (PIT Fully usable copy of a defined collection of data, such as a consistent file system,
copy) database, or volume that contains an image of the data as it appeared at a specific point in
time. A PIT copy is also called a snapshot or shadow copy.
policy Set of defined rules for client backups that can be applied to multiple groups. Groups have
dataset, schedule, browse, and retention policies.
pool 1. NetWorker sorting feature that assigns specific backup data to be stored on specified
media volumes.
2. Collection of NetWorker backup volumes to which specific data has been backed up.
primary storage Server storage subsystem, such as a disk array, that contains application data and any
persistent snapshots of data.
probe-based backup Type of scheduled backup, also known as an event-based backup, where the NetWorker
server initiates the backup only when specified conditions are met, as determined by one
or more probe settings.
proxy host Surrogate host computer that performs backup or clone operations in place the production
host by using a snapshot copy of the production data. See mount host
purge Operation that deletes file entries from the client file index.
quiesce State in which all writes to a disk are stopped and the file system cache is flushed.
Quiescing the database prior to creating the snapshot provides a transactionally
consistent image that can be remounted.
recover To restore data files from backup storage to a client and apply transaction (redo) logs to
the data to make it consistent with a given point-in-time.
recyclable save set Save set whose browse and retention policies have expired. Recyclable save sets are
removed from the media database.
recyclable volume Storage volume whose data has exceeded both its browse and retention policies and is
now available to be relabeled and reused.
Registry Microsoft Windows database that centralizes all Windows settings and provides security
and control of system, security, and user account settings.
remote device 1. Storage device that is attached to a storage node that is separate from the NetWorker
server.
2. Storage device at an offsite location that stores a copy of data from a primary storage
device for disaster recovery.
remote procedure call Protocol used by the backup server to perform client requests over a network.
(RPC)
requestor A VSS-aware application that creates and destroys a shadow copy. NetWorker software is a
requestor. See shadow copy
resource Software component whose configurable attributes define the operational properties of
the NetWorker server or its clients. Clients, devices, schedules, groups, and policies are all
NetWorker resources.
resource owner Logical cluster host that owns the resource. If a Cluster resource, such as a shared disk, is
not owned by a virtual host, it is assumed to be owned by the physical node that hosts the
resource.
restore To retrieve individual data files from backup media and copy the files to a client without
applying transaction logs.
retention policy NetWorker setting that determines the minimum period of time that backup data is
retained on a storage volume and available for recovery. After this time is exceeded, the
data is eligible to be overwritten.
retry mechanism Action that NetWorker software performs when client operations fail. This situation might
occur because the rate of transmission is either low or undetectable.
role Grant of user privileges to the Console. There are three roles: Console Application
Administrator, Console Security administrator, and the Console User. See user groups
roll forward To apply transactional logs to a recovered database to restore it to a state that is
consistent with a given point-in-time.
rollover Backup of a snapshot to conventional storage media, such as disk or tape. Previously
known as a live backup.
rollover-only backup Rollover whereupon the snapshot copy is deleted. Previously known as a serverless
backup, live backup, or nonpersistent backup.
salted hash Added string of random data that provides a unique identifier to a user's password. See
hash
save NetWorker command that backs up client files to backup media volumes and makes data
entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
save set consolidation Process that performs a level 1 backup and merges it with the last full backup of a save set
to create a new full backup.
save set recover To recover data by specifying save sets rather than by browsing and selecting files or
directories.
save set status NetWorker attribute that indicates whether a save set is browsable, recoverable, or
recyclable. The save set status also indicates whether the save set was successfully
backed up.
save stream Data and save set information that is written to a storage volume during a backup. A save
stream originates from a single save set.
scanner NetWorker command used to read a backup volume when the online indexes are not
available.
scheduled backup Type of backup that is configured to start automatically at a specified time for a group of
one or more NetWorker clients. A scheduled backup generates a bootstrap save set.
secondary storage Storage media managed by a NetWorker server or storage node that stores conventional or
snapshot data. Configure a storage device on a NetWorker server or storage node for each
secondary storage.
service port Port used to listen for backup and recover requests from clients through a firewall.
shadow copy Temporary, point-in-time copy of a volume created using VSS technology. See VSS (Volume
Shadow Copy Service).
silo Repository for holding hundreds or thousands of volumes. Silo volumes are identified by
bar codes, not by slot numbers.
simple network Protocol used to send messages to the administrator about NetWorker events.
management protocol
(SNMP)
skip Backup level in which designated files are not backed up. See level
Smart Media EMC software application that manages media resources within a distributed environment.
snapshot Point-in-time, read-only copy of specific data files, volumes, or file systems on an
application host. Operations on the application host are momentarily suspended while the
snapshot is created on a proxy host. Also called a PiT copy, image, or shadow copy.
snapshot policy Sets of rules that control the life cycle of snapshots. These rule specify the frequency of
snapshot creation, how long snapshots are retained, and which snapshots will be backed
up to conventional storage media.
snapshot save set Group of files or other data included in a single snapshot. Previously called a snapset.
stage To move data from one storage medium to a less costly medium, and later removing the
data from its original location.
stand-alone In a cluster environment, a NetWorker server that starts in noncluster (stand-alone) mode.
stand-alone device Storage device that contains a single drive for backing up data. Stand-alone devices
cannot automatically load backup volumes.
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a “remote”
storage node that resides on a host other than the NetWorker server.
synthetic full backup Backup that combines a full backup and its subsequent incremental backups to form a
new full backup. Synthetic full backups are treated the same as ordinary full backups.
tape service NDMP DSP service that controls access to tape storage. A system can simultaneously host
multiple tape services corresponding to multiple backup streams.
target client NetWorker client on which data is to be restored This may be the same as the original
source client from which the data was backed up, or it may be a different client.
target database Database that the NetWorker server backs up as a safeguard against data loss.
target sessions The number of simultaneous backup data streams accepted by a backup device.
temporary enabler Code that enables operation of the software for an additional period of time beyond the
evaluation period. See enabler code
transaction log Record of named database transactions or list of changed files in a database, stored in a
log file to execute quick restore and rollback transactions.
transmission control Standard set of communication protocols that connects hosts on the Internet.
protocol / internet
protocol (TCP/IP)
trap Setting in an SNMP event management system to report errors or status messages.
update enabler Code that updates software from a previous release. It expires after a fixed period of time.
user 1. A NetWorker user who can back up and recover files from a computer.
2. A Console user who has standard access privileges to the Console server.
user alias Username seen by the NetWorker server when a Console user connects to the NetWorker
server.
user authentication Feature that validates user sign-on attempts. NetWorker can validate sign-on attempts
against either a central authority, such as an LDAP database, or a local Console database.
See host authentication
user data Data that is generated by users, typically for the purposes of a business function. A
Microsoft Word document or an Excel spreadsheet is an example of user data.
virtual cluster client NetWorker client that is not permanently bound to one physical host but is managed by a
cluster manager. It is also referred to as a logical cluster client or a virtual client.
virtual server 1. Server, usually a web server, that shares resources with other virtual servers on the
same computer to provide low-cost hosting services.
2. In a cluster configuration, a set of two nodes, which are physical computers, and
virtual servers. Each node and virtual server has its own IP address and network name.
Each virtual server also owns a subset of shared cluster disks and is responsible for
starting cluster applications that can fail over from one cluster node to another.
virtual tape library (VTL) Software emulation of a physical tape library storage system.
volume 1. Unit of physical storage medium, such as a disk or magnetic tape, to which backup
data is written.
2. Identifiable unit of data storage that may reside on one or more computer disks.
volume ID (volid) Internal identification that NetWorker software assigns to a backup volume.
volume mount point Disk volume that is added into the namespace of a host disk volume. This allows multiple
disk volumes to be linked into a single directory tree, and a single disk or partition to be
linked to more than one directory tree.
volume name Name that you assign to a backup volume when it is labeled.
VSS (Volume Shadow Microsoft technology that creates a point-in-time snapshot of a disk volume. NetWorker
Copy Service) software backs up data from the snapshot. This allows applications to continue to write
data during the backup operation, and ensures that open files are not omitted
Windows disaster Bare metal recovery of a host. NetWorker provides an automated bare metal recovery
recovery solution for Windows.
writer Database, system service, or application code that works with VSS to provide metadata
about what to back up and how to handle VSS components and applications during
backup and restore. See VSS (Volume Shadow Copy Service).