6.5adminguidevol1 netbackup

792
Veritas NetBackup Administrator’s Guide, Volume I for UNIX and Linux Release 6.5 12308276

Upload: joejr4u9489

Post on 24-Oct-2015

43 views

Category:

Documents


3 download

DESCRIPTION

this is an admin guide for netbackup

TRANSCRIPT

  • VeAd

    for

    Rel

    12308276ritas NetBackup

    ministrators Guide, Volume I

    UNIX and Linux

    ease 6.5

  • Veritas NetBackup Administrators Guide, Volume I

    Copyright 1993-2007 Symantec Corporation. All rights reserved.

    NetBackup 6.5

    Symantec, the Symantec logo, and NetBackup are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

    Portions of this software are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved.

    The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

    The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections 12.212 and DFARS Section 227.7202.

    Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com

    Printed in the United States of America.

  • Third-party legal notices

    Licen

    TechnThird-party software may be recommended, distributed, embedded, or bundled with this Veritas product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.

    sing and registration Veritas NetBackup is a licensed product. See the NetBackup Installation Guide for license installation instructions.

    ical support For technical assistance, visit http://entsupport.symantec.com and select phone or email support. Use the Knowledge Base search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and our customer email notification service.

  • Contents

    Chap

    How to configure NetBackup .............................................................................46

    Chapter 2 Activity Monitor ter 1 Introduction Overview ................................................................................................................31

    Earlier versions of the NetBackup-Java Administration Console on

    Earlier versions of the NetBackup-Java Administration Console on

    NetBackup administration interfaces ...............................................................34

    NetBackup Administration Console setup .......................................................35

    Running the Java-based Windows Display Console ...............................37

    Administering remote servers ...................................................................38

    Administering multiple versions of NetBackup servers ........................38

    UNIX platforms ............................................................................38

    Windows platforms ......................................................................38

    Remote display-back from UNIX servers .........................................38

    Remote display-back from Windows servers ..................................39

    At the console of the server with an earlier version of NetBackup 39

    Using the NetBackup Administration Console ...............................................40

    NetBackup configuration wizards .............................................................41

    Backup, Archive, and Restore ....................................................................42

    Activity Monitor ...........................................................................................42

    NetBackup Management .............................................................................42

    Reports ...................................................................................................42

    Policies ...................................................................................................43

    Storage ...................................................................................................43

    Catalog ...................................................................................................44

    Host Properties .....................................................................................44

    Media and Device Management .................................................................44

    Device Monitor .....................................................................................45

    Media ......................................................................................................45

    Devices ...................................................................................................45

    Credentials ............................................................................................45

    Access Management ....................................................................................45

    Standard and user toolbars ........................................................................46

    Customizing the administration console .................................................46

    Using LiveUpdate to distribute NetBackup updates ......................................46

  • 6

    Introduction to the Activity Monitor ............................................................... 50

    Activity Monitor menu bar ......................................................................... 51

    ChapStatus bar ...................................................................................................... 54

    Setting Activity Monitor options .............................................................. 54

    Jobs tab .................................................................................................................. 56

    Parent jobs .................................................................................................... 56

    Daemons tab ......................................................................................................... 58

    More about daemons ................................................................................... 60

    Other Symantec services ............................................................................ 61

    Processes tab ........................................................................................................ 62

    Monitoring NetBackup processes ............................................................. 66

    Media mount errors ............................................................................................. 67

    Queued media mount errors ...................................................................... 67

    Canceled media mount errors .................................................................... 67

    Managing the jobs database ............................................................................... 67

    Retaining job information in the database .............................................. 68

    Changing the default on a permanent basis .................................... 68

    BPDBJOBS_OPTIONS environment variable ................................... 69

    bpdbjobs debug log ...................................................................................... 70

    Customizing bpdbjobs output .................................................................... 70

    ter 3 Reports Introduction to the Reports utility ................................................................... 72

    Reports window ................................................................................................... 73

    Shortcut menus ............................................................................................ 73

    Reports settings ........................................................................................... 74

    Date/Time range .................................................................................. 74

    Client ...................................................................................................... 74

    Disk pool ................................................................................................ 74

    Disk type ................................................................................................ 74

    Job ID ..................................................................................................... 74

    Media ID ................................................................................................ 74

    Media owner ......................................................................................... 75

    Media server ......................................................................................... 75

    Path ........................................................................................................ 75

    Storage unit .......................................................................................... 75

    Verbose listing ...................................................................................... 75

    Volume ID ............................................................................................. 75

    Volume pool .......................................................................................... 75

    Run report ............................................................................................. 75

    Stop report ............................................................................................ 75

    NetBackup report types ...................................................................................... 76

    Status of Backups report ........................................................................... 76

  • 7

    Client Backups report .................................................................................76

    Problems report ...........................................................................................76

    ChapAll Log Entries report ..................................................................................76

    Images on Media report ..............................................................................76

    Media Logs report ........................................................................................77

    Tape Reports .................................................................................................77

    Images on Tape report .......................................................................77

    Tape Logs report .................................................................................77

    Tape Contents report ..........................................................................77

    Tape Summary report ........................................................................78

    Tape Written report ............................................................................78

    Tape Lists report .................................................................................78

    Disk Reports ..................................................................................................79

    Images on Disk report ........................................................................79

    Disk Logs report ..................................................................................79

    Disk Storage Unit Status report ........................................................79

    Disk Pool Status report ......................................................................80

    Using the Troubleshooter within reports ........................................................80

    ter 4 Policies Using the Policies utility .....................................................................................82

    Tree and detail views ...................................................................................82

    Policies menu bar .........................................................................................82

    Configuring backup policies ...............................................................................82

    Changing policies .................................................................................................84

    Policy Attributes tab ............................................................................................87

    Policy type .....................................................................................................88

    Data classification ........................................................................................90

    Policy storage ..............................................................................................91

    Considerations before a storage destination is selected ................92

    Policy volume pool .......................................................................................93

    Volume pool override example ..........................................................94

    Checkpoint restart for backup jobs ...........................................................95

    Checkpoint frequency .........................................................................95

    Checkpoint restart support ................................................................95

    Checkpoint restart for restore jobs ...................................................97

    Limit jobs per policy ....................................................................................97

    Notes on the Limit jobs per policy attribute ....................................97

    Job priority ....................................................................................................98

    Media owner .................................................................................................99

    Active. Go into effect at ...............................................................................99

    Backup network drives ..............................................................................100

    Setup example with UNC paths .......................................................100

  • 8

    Example using the Backup network drives attribute ...................101

    Follow NFS ..................................................................................................101

    Notes on Follow NFS .........................................................................102

    Advantages of the Follow NFS attribute ........................................102

    Disadvantages of the Follow NFS attribute ...................................102

    Cross mount points ....................................................................................103

    Notes on cross mount points ...........................................................103

    Cases that can require separate policies ........................................104

    How the Cross mount points attribute interacts with Follow NFS 104

    Cross mount point examples ............................................................104

    Compression ...............................................................................................105

    Advantages of the Compression attribute .....................................106

    Disadvantages of the Compression attribute ................................106

    How much compression can be expected? .....................................106

    Encryption ..................................................................................................107

    Collect disaster recovery information for IDR ......................................108

    Collect disaster recovery information for Bare Metal Restore ...........108

    Collect true image restore information ..................................................108

    Collect true image restore information with move detection ............109

    What happens during true image restores ....................................110

    Notes on true image restores and move detection .......................111

    Allow multiple data streams ....................................................................112

    When to use multiple data streams ................................................113

    Enable document restore .......................................................................... 115

    Keyword phrase .........................................................................................116

    Snapshot Client options ............................................................................116

    Schedules tab ......................................................................................................117

    Schedule Attributes tab ....................................................................................118

    Name ............................................................................................................118

    Type of backup ...........................................................................................119

    Full backup ..........................................................................................119

    Cumulative incremental backup .....................................................120

    Differential incremental backup .....................................................120

    User backup ........................................................................................120

    User archive ........................................................................................120

    Application backup ............................................................................121

    Automatic backup ..............................................................................121

    Automatic incremental backup .......................................................121

    Automatic cumulative incremental backup ..................................121

    Automatic differential incremental backup ..................................121

    Automatic full backup .......................................................................121

    Automatic Vault .................................................................................122

    Vault catalog backup .........................................................................122

  • 9

    More on incremental backups ..........................................................122

    Determining files due for backup on Windows clients ................125

    Determining files due for backup on UNIX clients .......................126

    Synthetic backup ........................................................................................128

    Calendar schedule type .............................................................................128

    Retries allowed after runday ............................................................128

    Frequency schedule type ..........................................................................128

    Guidelines for setting backup frequency .......................................129

    Backup frequency determines schedule priority ..........................130

    Instant recovery .........................................................................................131

    Snapshots and copy snapshots to a storage unit ..........................131

    Snapshots only ...................................................................................131

    Multiple copies ...........................................................................................131

    Multiple copies and disk staging storage units .............................132

    Multiple copies and storage lifecycle policies ...............................132

    Multiple copies configuration ..........................................................133

    Restoring from a specific backup copy ...........................................136

    Override policy storage selection ............................................................137

    Override policy volume pool ....................................................................137

    Override media owner ...............................................................................137

    Retention .....................................................................................................138

    Guidelines for assigning retention periods ....................................138

    Precautions for assigning retention periods .................................139

    Changing retention periods ..............................................................140

    Mixing retention levels on tape volumes .......................................140

    Media multiplexing ....................................................................................141

    Final destination storage unit ..................................................................141

    Final destination volume pool .................................................................141

    Start Window tab ...............................................................................................143

    Exclude dates tab ...............................................................................................145

    Calendar schedule tab .......................................................................................146

    Schedule by specific dates ........................................................................146

    Schedule by recurring week days ............................................................147

    Schedule by recurring days of the month ..............................................148

    How calendar scheduling interacts with daily windows ......................149

    Automatic-backup schedule examples ...................................................151

    Considerations for user schedules ..........................................................151

    Planning user backup and archive schedules ................................151

    Creating separate policies for user schedules ...............................152

    Using a specific policy and user schedule ......................................152

    Example policies ................................................................................................153

    Policy planning guidelines for backups ..................................................154

    Group the clients ................................................................................154

  • 10

    Gather information about clients ....................................................154

    Consider storage requirements .......................................................154

    Backup and restore of extended attribute files and named data streams

    Ramifications of backing up extended attributes or named data streams

    Consider backup schedules ..............................................................155

    Group by general attributes .............................................................156

    Clients tab ...........................................................................................................159

    To install client software on trusting UNIX clients .............................160

    To install software on secure UNIX clients ...........................................162

    To install software on Windows clients .................................................162

    To configure a snapshot method .............................................................162

    Backup Selections tab .......................................................................................163

    Lists for different policy types ................................................................163

    Backup selections list for standard policies ..................................163

    Backup selections list for database policies ...................................165

    Methods for faster backups ......................................................................166

    Dividing file lists between multiple policies ..................................166

    Allowing multiple data streams ......................................................167

    Verifying the backup selections list ........................................................167

    Rules to indicate paths in the backup selections list ...................................170

    Path rules for Microsoft Windows clients .............................................170

    File backups ........................................................................................170

    Windows disk-image (Raw) backups ...............................................171

    Microsoft Windows registry backup ...............................................172

    Hard links to files (NTFS volumes or UNIX) ..................................173

    Pathname rules for UNIX clients ............................................................176

    Notes on UNIX pathnames ...............................................................176

    Symbolic links to files or directories ..............................................177

    Hard links to directories ...................................................................178

    Hard links to files ...............................................................................178

    UNIX raw partitions ..........................................................................178

    180

    182

    Restoring extended attributes or named data streams ...............182

    Path rules for NetWare NonTarget clients ............................................183

    Path rules for NetWare Target clients ...................................................185

    Path rules for clients running extension products ..............................185

    Backup selections list directives: General discussion ..........................185

    ALL_LOCAL_DRIVES directive ........................................................186

    SYSTEM_STATE directive ................................................................186

    Shadow copy components:\ directive .............................................187

    Directives for multiple data streams ..............................................188

    Directives for specific policy types .................................................188

  • 11

    Backup selections list directives for multiple data streams ................189

    NEW_STREAM directive and multiple data streams ...................189

    ChapALL_LOCAL_DRIVES directive and multiple data streams .........192

    UNSET, UNSET_ALL directives, and multiple data streams ......193

    Excluding files from backups ...................................................................194

    Files that are excluded from backups by default ..........................194

    Excluding files from automatic backups ........................................195

    Disaster Recovery tab ........................................................................................196

    Path ..............................................................................................................197

    Logon ...........................................................................................................197

    Password .....................................................................................................197

    Send in an email attachment ...................................................................197

    Identifying critical policies ......................................................................197

    Creating a Vault policy ......................................................................................199

    Performing manual backups ............................................................................200

    More about synthetic backups .........................................................................201

    Policy considerations and synthetic backups ........................................201

    Two types of synthetic backups ...............................................................203

    Synthetic full backups .......................................................................203

    Synthetic cumulative incremental backups ..................................204

    Recommendations for synthetic backups ..............................................206

    Notes on synthetic backups ......................................................................207

    Displaying synthetic backups in the Activity Monitor ........................210

    Logs produced during synthetic backups ...............................................210

    Synthetic backups and directory and file attributes ............................211

    ter 5 Storage units, unit groups, and lifecycle policies Introduction to the Storage utility ..................................................................214

    Using the Storage utility ...........................................................................215

    Storage units .......................................................................................................216

    Creating a storage unit ..............................................................................217

    Changing storage unit settings ................................................................218

    Deleting storage units ...............................................................................218

    Media Manager storage unit considerations .........................................220

    Disk storage unit considerations .............................................................222

    Disk storage model .............................................................................222

    Disk storage units in storage lifecycle policies .............................224

    Maintaining available space on disk storage units .......................225

    NDMP storage unit considerations .........................................................227

    Storage unit settings .........................................................................................228

    Absolute pathname to directory/volume ...............................................228

    Density .........................................................................................................229

    Disk pool ......................................................................................................229

  • 12

    Disk type ......................................................................................................229

    Enable block sharing .................................................................................229

    Using the Maximum concurrent jobs setting to control the storage unit

    Finding the potential free space on a BasicDisk disk staging storage unit

    Enable multiplexing ..................................................................................230

    High water mark ........................................................................................230

    Low water mark ..........................................................................................230

    Maximum concurrent write drives .........................................................231

    Maximum concurrent jobs .......................................................................231

    and media server load ...............................................................232

    Maximum streams per drive ....................................................................233

    Media server ...............................................................................................233

    NDMP host ..................................................................................................235

    On demand only .........................................................................................235

    Only use the following media servers ....................................................236

    Properties button .......................................................................................236

    Reduce fragment size ................................................................................238

    Robot number ............................................................................................239

    Robot type ..................................................................................................239

    Staging relocation schedule (for basic disk staging only) ...................239

    Storage device ............................................................................................239

    Storage unit name .....................................................................................239

    Storage unit type .......................................................................................240

    Temporary staging area ...........................................................................240

    Transfer throttle ........................................................................................240

    Use any available media server ...............................................................240

    Staging backups to initial storage, then final storage .................................242

    Two staging methods ................................................................................242

    Basic disk staging ..............................................................................................244

    Disk staging storage unit size and capacity considerations ...............245

    246

    Creating a basic disk staging storage unit .............................................247

    Disk Staging Schedule dialog ...................................................................249

    Name ....................................................................................................249

    Priority of relocation jobs started from this schedule .................250

    Final destination storage unit ..........................................................250

    Final destination volume pool .........................................................250

    Final destination media owner ........................................................250

    Use alternate read server .................................................................251

    Basic disk staging limitations ..................................................................251

    Initiating a relocation schedule manually .............................................251

    Storage Lifecycle Policies .................................................................................253

    Storage lifecycle overview ........................................................................253

  • 13

    To create a storage lifecycle policy .........................................................254

    Adding storage destinations to a lifecycle policy .................................255

    ChapWriting multiple copies using a lifecycle .......................................256

    Storage lifecycle policy name ...........................................................258

    Duplication job priority .....................................................................258

    Storage destinations ..........................................................................258

    Use storage destination for: backup or duplication .....................259

    Storage unit .........................................................................................259

    Volume pool ........................................................................................259

    Media owner ........................................................................................259

    Retention type: Fixed .........................................................................260

    Retention type: Staged capacity managed .....................................260

    Retention type: Expire after duplication ........................................262

    Alternate read server .........................................................................262

    Data classification ......................................................................................262

    How backup data is associated with a data classification ...........263

    Creating or changing a data classification .....................................263

    Optional duplication job configuration ..................................................264

    MIN_KB_SIZE_PER_DUPLICATION_JOB .......................................264

    MAX_KB_SIZE_PER_DUPLICATION_JOB ......................................264

    MAX_MINUTES_TIL_FORCE_SMALL_DUPLICATION_JOB .......264

    LIFECYCLE_PARAMETERS file example ........................................265

    Using nbstlutil to administrate lifecycle operations ............................265

    When to use nbstlutil ........................................................................265

    Storage unit groups ...........................................................................................267

    Storage unit selection criteria within a group ......................................267

    Prioritized ...........................................................................................267

    Failover ................................................................................................267

    Round robin ........................................................................................267

    Load balance .......................................................................................267

    Exception to the storage unit selection criteria ............................270

    Disk spanning within storage unit groups .............................................271

    Creating a storage unit group ..................................................................271

    Deleting a storage unit group ..................................................................273

    ter 6 NetBackup Catalog What is a NetBackup catalog? ..........................................................................276

    Parts of the catalog ....................................................................................276

    Image database ...........................................................................................277

    Image files ...........................................................................................278

    Image .f files ........................................................................................278

    NetBackup relational database ................................................................280

    Enterprise Media Manager (EMM) database ..................................281

  • 14

    Catalog protection .............................................................................................282

    Catalog backups .........................................................................................282

    Running online, hot catalog backups concurrently with other backups

    Differences between importing, browsing, and restoring Backup Exec

    Online, hot catalog backup method ................................................283

    294

    Notes on catalog policy schedules ...................................................294

    Offline, cold catalog backup method ..............................................296

    Recovering the catalog .....................................................................................317

    Disaster recovery emails and the disaster recovery file ..............................317

    Archiving the catalog ........................................................................................318

    Catalog archiving process ........................................................................318

    Creating a catalog archiving policy ........................................................319

    Policy name .........................................................................................319

    Deactivate policy ................................................................................319

    Type of backup ...................................................................................320

    Retention level setting ......................................................................320

    Catalog archiving commands ...........................................................321

    Recommendations for using catalog archiving ............................322

    Using Vault with the catalog archiving feature ............................323

    Browsing offline catalog archive .....................................................323

    Extracting images from the catalog archives ................................323

    Using the Catalog utility ...................................................................................324

    Searching for backup images ...................................................................324

    Notes on searching for an image .............................................................326

    Messages pane ............................................................................................326

    Verifying backup images ..........................................................................327

    Viewing job results .................................................................................... 327

    Promoting a copy to a primary copy .......................................................328

    Duplicating backup images ......................................................................330

    Notes on multiplexed duplication ...................................................330

    Procedure for duplicating backups .................................................331

    Jobs displayed while making multiple copies ........................................334

    Importing NetBackup or Backup Exec images ......................................336

    Importing expired images ................................................................341

    Importing images from Backup Exec media ..................................342

    Host properties for Backup Exec .....................................................342

    Considerations concerning importing Backup Exec media .........342

    and NetBackup images ..............................................................343

    Expiring backup images ............................................................................346

    Catalog maintenance and performance optimization .................................347

    Determining catalog space requirements ..............................................347

    File size considerations .....................................................................348

  • 15

    Backing up catalogs manually .................................................................350

    How do I know if a catalog backup succeeded? .............................351

    ChapStrategies to ensure successful catalog backups ..................................352

    About the binary catalog format .............................................................353

    Catalog conversion utility .................................................................354

    Binary catalog file limitations ..........................................................354

    Moving the image catalog .........................................................................354

    Indexing the catalog for faster access to backups ................................355

    Compressing and uncompressing the image catalog ...........................355

    Uncompressing the image catalog ..................................................357

    ter 7 Host properties Introduction to host properties .......................................................................360

    Viewing host properties ............................................................................360

    Changing host properties .................................................................................361

    Interpreting the initial settings ...............................................................361

    Selecting multiple hosts ............................................................................363

    Required permissions ........................................................................................364

    Master server, media server, and client host properties .............................364

    Access Control properties .........................................................................364

    Symantec Product Authentication and Authorization ................365

    Symantec Product Authentication and Authorization tab within the Access

    Control properties ..............................................................................365

    Networks list .......................................................................................366

    Add button ..........................................................................................366

    Remove button ...................................................................................368

    Authentication Domain tab within the Access Control properties ....368

    Add button ..........................................................................................369

    Remove button ...................................................................................371

    Authorization Service tab within the Access Control properties .......371

    Host name ...........................................................................................371

    Customize the port number of the authorization service ...........372

    Authorization properties ..........................................................................373

    User ......................................................................................................373

    Host ......................................................................................................374

    Domain\Group ....................................................................................374

    Group/Domain type ...........................................................................374

    User must be an OS administrator ..................................................374

    Backup Exec Tape Reader properties ......................................................375

    Add button ..........................................................................................375

    GRFS advertised name ......................................................................375

    Actual client name .............................................................................376

    Actual path ..........................................................................................376

  • 16

    Change button ....................................................................................376

    Remove button ...................................................................................376

    Bandwidth properties ................................................................................377

    How bandwidth limiting works .......................................................377

    Bandwidth throttle setting for the range of IP addresses ...........378

    From IP address .................................................................................378

    To IP address ......................................................................................378

    Bandwidth ...........................................................................................378

    Bandwidth throttle settings list ......................................................378

    Add button ..........................................................................................378

    Remove button ...................................................................................379

    Notes on bandwidth limits ...............................................................379

    Busy File Settings properties ...................................................................380

    For the Busy File Settings to take effect .........................................380

    Working directory .............................................................................381

    Operators email address ..................................................................381

    Process busy files ...............................................................................381

    File action file list ..............................................................................381

    Add button ..........................................................................................381

    Add to all button ................................................................................381

    Remove button ...................................................................................382

    Busy file action ...................................................................................382

    Retry count .........................................................................................382

    Clean-up properties ...................................................................................383

    Keep logs .............................................................................................383

    Keep vault logs ...................................................................................383

    Image cleanup ....................................................................................384

    Catalog cleanup wait time ................................................................384

    Keep true image restoration (TIR) information ............................384

    Move restore job from incomplete state to done state ................385

    Move backup job from incomplete state to done state ................385

    Client Attributes properties .....................................................................386

    Allow client browse ...........................................................................386

    Allow client restore ...........................................................................386

    Clients list ...........................................................................................387

    General tab ..................................................................................................387

    Maximum data streams ....................................................................387

    Browse and restore ability ................................................................388

    Free browse .........................................................................................388

    Connect Options tab ..................................................................................388

    BPCD connect back ............................................................................389

    Ports .....................................................................................................389

    Daemon connection port ..................................................................390

  • 17

    Windows Open File Backup tab ...............................................................391

    Add and remove buttons ...................................................................391

    Enable Windows Open File Backups for this client ......................392

    Use Veritas Volume Snapshot Provider (VSP) ..............................392

    Use Microsoft Volume Shadow Copy Service (VSS) .....................392

    Individual drive snapshot .................................................................393

    Global drive snapshot ........................................................................393

    Abort backup on error .......................................................................394

    Disable snapshot and continue ........................................................394

    Client Name properties .............................................................................395

    Client name .........................................................................................395

    Client Settings (NetWare) properties ......................................................396

    Back up migrated files .......................................................................396

    Uncompress files before backing up ...............................................396

    Keep status of user-directed backups, archives, and restores ....396

    Client Settings (UNIX) properties ............................................................397

    Locked file action ...............................................................................397

    Keep status of user-directed backups, archives, and restores ....397

    Reset file access time to the value before backup .........................398

    Megabytes of memory to use for file compression .......................398

    Use VxFS file change log for incremental backups ......................398

    Default cache device path for snapshots ........................................400

    Do not compress files ending with ..................................................401

    Add button ..........................................................................................401

    Add to all button .................................................................................401

    Remove button ...................................................................................401

    Client Settings (Windows) properties .....................................................402

    General level logging .........................................................................402

    TCP level logging ................................................................................402

    Wait time before clearing archive bit .............................................403

    Use change journal in incrementals ...............................................403

    Incrementals based on timestamp ..................................................405

    Incrementals based on archive bit ..................................................405

    Time overlap .......................................................................................405

    Communications buffer size ............................................................406

    User directed timeouts ......................................................................406

    Maximum error messages for server ..............................................406

    Keep status of user-directed backups, archives, and restores ....406

    Perform default search for restore ..................................................406

    Data Classification properties ..................................................................407

    Rank .....................................................................................................407

    Name ....................................................................................................408

    Description ..........................................................................................408

  • 18

    Classification ID .................................................................................408

    Encryption properties ...............................................................................409

    Encryption permissions ....................................................................409

    Enable encryption ..............................................................................410

    Enable standard encryption .............................................................410

    Client cipher .......................................................................................410

    Use legacy DES encryption ..............................................................410

    Encryption strength ..........................................................................410

    Encryption libraries ..........................................................................411

    Encryption key file ............................................................................411

    Exchange properties ..................................................................................412

    Snapshot verification I/O throttle ..................................................412

    Backup option for log files during full backups ............................413

    Mailbox for message level backup and restore .............................413

    Enable single instance backup for message attachments ...........413

    Exclude Lists properties ...........................................................................414

    Use case sensitive exclude list .........................................................414

    Exclude list ..........................................................................................414

    Exceptions to the exclude list ..........................................................414

    Add buttons ........................................................................................414

    Add to all buttons ...............................................................................415

    Remove buttons .................................................................................416

    Shared fields in exclude lists ...................................................................416

    Policy ...................................................................................................416

    Schedule ..............................................................................................416

    Files/Directories .................................................................................416

    Exclude lists for specific policies or schedules .....................................416

    Syntax rules for exclude lists ...................................................................418

    Traversing excluded directories ..............................................................419

    Fibre Transport properties .......................................................................422

    Preferred .............................................................................................422

    Always .................................................................................................423

    Never .................................................................................................... 423

    Maximum concurrent FT connections ...........................................423

    Use defaults from the master server configuration .....................423

    Firewall properties ....................................................................................424

    Default connect options ....................................................................424

    Hosts list ..............................................................................................426

    Attributes for selected hosts ............................................................427

    Example setup for using the vnetd port .........................................429

    General Server properties ........................................................................431

    Delay on multiplexed restores .........................................................431

    Check the capacity of disk storage units ........................................431

  • 19

    Must use local drive ...........................................................................432

    Use direct access recovery for NDMP restores .............................432

    Document-level restore options ......................................................432

    Media host override ...........................................................................433

    Add button ..........................................................................................433

    Add to all button .................................................................................433

    Change button ....................................................................................433

    Remove button ...................................................................................434

    Global Attributes properties ....................................................................435

    Job retry delay ....................................................................................435

    Schedule backup attempts ................................................................435

    Policy update interval .......................................................................436

    Priority of restore jobs ......................................................................436

    Maximum jobs per client ..................................................................436

    Maximum backup copies ...................................................................437

    Compress catalog interval ................................................................438

    Maximum vault jobs ..........................................................................438

    Administrator email address ............................................................438

    Setting up email notifications ..................................................................438

    Indicating email notification in the NetBackup host properties 439

    Email contents ....................................................................................440

    Logging properties .....................................................................................441

    Types of logging .................................................................................441

    Enable robust logging ........................................................................442

    Global logging level ...........................................................................443

    Process specific overrides .................................................................443

    Debug logging levels for NetBackup services ................................444

    Lotus Notes properties ..............................................................................445

    Path ......................................................................................................445

    INI file ..................................................................................................445

    Media properties ........................................................................................446

    Allow media overwrite ......................................................................446

    Enable SCSI reserve ...........................................................................447

    Allow multiple retentions per media ..............................................449

    Allow backups to span tape media ..................................................449

    Allow backups to span disk ...............................................................450

    Enable standalone drive extension .................................................450

    Enable job logging ..............................................................................450

    Enable unrestricted media sharing for all media servers ............450

    Media ID prefix (non-robotic) ...........................................................451

    Media unmount delay ........................................................................451

    Media request delay ...........................................................................451

    NDMP Global Credentials properties ......................................................452

  • 20

    User name ...........................................................................................453

    Password and confirm password .....................................................453

    NetWare Client properties .......................................................................453

    Network properties ....................................................................................454

    NetBackup client service port (BPCD) ............................................454

    NetBackup request service port (BPRD) .........................................454

    Announce DHCP interval ..................................................................455

    Open File Backup (NetWare client) properties .....................................455

    Enable open file backup during backups ........................................455

    Port Ranges properties .............................................................................456

    Use random port assignments .........................................................457

    Client port window ............................................................................457

    Client reserved port window ............................................................457

    Server port window ...........................................................................458

    Server reserved port window ...........................................................458

    Restore Failover properties ......................................................................459

    Alternate restore failover machines list ........................................460

    Add button ..........................................................................................460

    Change button ....................................................................................461

    Remove button ...................................................................................461

    Media server .......................................................................................461

    Failover restore servers ....................................................................461

    Retention Periods properties ...................................................................462

    Value ....................................................................................................462

    Units ....................................................................................................462

    Retention periods list ........................................................................462

    Schedules list ......................................................................................463

    Impact report button .........................................................................463

    Note on redefining retention periods .............................................464

    Servers properties .....................................................................................465

    Master server ......................................................................................465

    Additional servers ..............................................................................465

    Media servers .....................................................................................466

    Restricting administrative privileges of media servers ...............466

    Multiple masters that share one Enterprise Media Manager host 467

    SharedDisk properties ..............................................................................470

    SharedDisk mount points directory ................................................470

    SharePoint 2003 properties .....................................................................471

    User ID .................................................................................................471

    Password .............................................................................................471

    Consistency check before backup ....................................................471

    Continue with backup if consistency check fails ..........................472

    SharePoint Hosts properties .................................................................... 472

  • 21

    Symantec Products properties .................................................................473

    Timeouts properties ..................................................................................474

    ChapClient connect timeout ......................................................................474

    Backup start notify timeout .............................................................474

    File browse timeout ...........................................................................475

    Use OS dependent timeouts .............................................................475

    Media mount timeout ........................................................................475

    Client read timeout ............................................................................475

    Backup end notify timeout ...............................................................476

    Media server connect timeout .........................................................476

    Universal Settings properties ..................................................................477

    Restore retries ....................................................................................477

    Browse timeframe for restores ........................................................478

    Last full backup ..................................................................................478

    Use specified network interface ......................................................478

    Use preferred group for enhanced authorization .........................479

    Allow server file writes .....................................................................480

    Accept connections on non reserved ports ....................................480

    Enable performance data collection (Windows server only) .......481

    Client sends mail ................................................................................481

    Server sends mail ...............................................................................481

    Client administrators email ............................................................481

    UNIX Client properties ..............................................................................482

    UNIX Server properties .............................................................................483

    NFS access timeout ............................................................................483

    VMWare Proxy Servers properties .........................................................484

    VSP (Volume Snapshot Provider) properties ........................................485

    VSP overview ......................................................................................485

    Logging VSP messages ......................................................................487

    Cache file volume list ........................................................................487

    VSP volume exclude list ....................................................................488

    Customize cache size .........................................................................490

    Cache size ............................................................................................490

    Maximum cache size ..........................................................................490

    Busy file wait .......................................................................................491

    Busy file timeout ................................................................................492

    Using VSP with databases ................................................................492

    Windows Client properties .......................................................................494

    ter 8 Device Monitor Changing the operating mode of a drive ........................................................495

    Resetting a drive ................................................................................................496

    Managing drive paths ........................................................................................497

  • 22

    Managing pending requests and actions .......................................................497

    Pending requests for storage units .........................................................498

    ChapResolving a pending request ....................................................................499

    Resolving a pending action ......................................................................500

    Resubmitting a request .............................................................................500

    Denying a request ......................................................................................501

    Freezing media or downing drives ..................................................................501

    Cleaning drives ...................................................................................................502

    Adding or changing a drive comment ............................................................504

    Viewing drive details .........................................................................................504

    ter 9 Media Volume operations ............................................................................................507

    Adding volumes .........................................................................................508

    Adding volumes overview ................................................................508

    About labeling NetBackup volumes ................................................510

    Adding volumes by using the Volume Configuration Wizard ....511

    Adding volumes using a robot inventory update ..........................511

    Adding volumes using the Actions menu ......................................512

    Volumes properties ...........................................................................513

    Changing volume properties ....................................................................517

    Change Volumes properties .............................................................518

    Changing the volume pool of a volume ..................................................519

    Changing the volume group of a volume ...............................................519

    Changing the owner of a volume .............................................................520

    Freezing and unfreezing media ...............................................................520

    Suspending and unsuspending media ....................................................521

    Labeling media ...........................................................................................521

    Label properties .................................................................................523

    Rescanning and updating barcodes ........................................................ 523

    When to rescan and update ..............................................................523

    When not to rescan and update .......................................................523

    Rescanning/updating barcodes .......................................................524

    Moving volumes .........................................................................................524

    Move examples ...................................................................................525

    Moving volumes using the robot inventory update option .........525

    Moving volumes using the Actions menu ......................................525

    Move Volumes properties .................................................................526

    Erasing media .............................................................................................528

    Injecting and ejecting volumes ................................................................529

    Injecting volumes ..............................................................................530

    Ejecting volumes ................................................................................530

    Media ejection timeout periods .......................................................532

  • 23

    Deleting volumes .......................................................................................532

    Deassigning volumes .................................................................................533

    Deassigning NetBackup volumes .....................................................534

    Deassigning Veritas Storage Migrator volumes ............................535

    Exchanging volumes ..................................................................................535

    Exchanging a volume and using a new media ID ..........................535

    Exchanging a volume and using the old media ID ........................536

    Recycling volumes .....................................................................................537

    Recycling volumes using the existing media ID ............................537

    Recycling volumes using a new media ID ......................................537

    Volume pool operations ....................................................................................538

    Adding a new volume pool ........................................................................539

    Changing the properties of a volume pool .............................................539

    Volume pool properties .............................................................................540

    Catalog backup pool ...........................................................................540

    Description ..........................................................................................540

    Maximum number of partially full media ......................................540

    Pool name ............................................................................................541

    Scratch pool ........................................................................................541

    Deleting a volume pool ..............................................................................542

    Volume group operations .................................................................................542

    Moving a volume group ............................................................................542

    Move volume group properties ........................................................543

    Deleting a volume group ...........................................................................544

    Robot inventory operations .............................................................................544

    When to inventory a robot .......................................................................545

    Inventory a robot .......................................................................................547

    Robot Inventory dialog box ....................................................................548

    Advanced options ...............................................................................548

    Compare contents with volume configuration ..............................549

    Device host ..........................................................................................549

    Empty media access port prior to update .......................................550

    Preview volume configuration changes .........................................550

    Robot ....................................................................................................551

    Show contents ....................................................................................551

    Update volume configuration ..........................................................553

    Advanced Robot Inventory Options dialog ............................................555

    Media Settings tab ...................................................................................555

    Label optical media (Local host only) ..............................................556

    Media type ...........................................................................................556

    Media that have been removed from the robot .............................559

    Media that have been moved into or within the robot .................559

    Use barcode rules ...............................................................................560

  • 24

    Use the following Media ID prefix ..................................................560

    Volume pool ........................................................................................561

    ChapBarcode Rules tab ......................................................................................562

    Barcode tag .........................................................................................562

    Description ..........................................................................................563

    Maximum mounts ..............................................................................563

    Media type ...........................................................................................563

    Volume pool ........................................................................................565

    Media ID Generation tab .........................................................................565

    Barcode length ...................................................................................566

    Media ID generation rule ..................................................................566

    Robot number .....................................................................................566

    Media Type Mappings tab ......................................................................566

    Adding mapping entries ...................................................................567

    Default and allowable media types .................................................568

    Using the physical inventory utility .......................................................572

    Features of vmphyinv .......................................................................573

    Requirements and restrictions for vmphyinv ...............................573

    When to use vmphyinv .....................................................................573

    How vmphyinv performs a physical inventory .............................574

    Obtains a list of drives to mount the media ...................................574

    Obtains a list of media to be mounted ............................................574

    Mounts media and reads the tape header ......................................576

    Updates the EMM database ..............................................................577

    Volume configuration update examples ................................................579

    Example 1: Removing a volume from a robot ................................580

    Example 2: Adding existing stand-alone volumes to a robot ......581

    Example 3: Moving existing volumes within a robot ...................583

    Example 4: Adding new volumes to a robot ...................................584

    Example 5: Adding cleaning tapes to a robot ................................586

    Example 6: Moving existing volumes between robots .................587

    Example 7: Adding existing volumes when barcodes are not used 587

    Using WORM media ..........................................................................................589

    Supported drives ........................................................................................590

    Managing your WORM media in NetBackup .........................................590

    Using WORM volume pools to manage WORM media ................590

    Using unique drive and media types to manage WORM media .591

    WORM tape limitations ............................................................................592

    ter 10 Devices Device configuration prerequisites ................................................................593

    The device mapping file ....................................................................................594

    Configuring robots and tape drives ................................................................595

  • 25

    Using the Device Configuration Wizard .................................................595

    Operating system changes ................................................................596

    Possible EMM server host conflict ..................................................596

    Devices that are partially-configured .............................................596

    Starting the Device Configuration Wizard ....................................597

    Adding a robot ............................................................................................597

    Robot properties .................................................................................598

    Robot control configuration overview ............................................602

    Adding or changing a drive ......................................................................604

    Adding a shared drive .......................................................................605

    Configuring SCSI reserve on a drive path ......................................605

    Drive properties .................................................................................607

    Configuring drive name rules ..........................................................611

    Robot drive number for API robots .................................................613

    No rewind device ................................................................................614

    Configuring server groups for media sharing ...............................................615

    Server group properties ............................................................................617

    Server group name ......................