Veritas Netbackup 6 5 System Administration Guide Volume I for Windows(1)

784
Veritas NetBackup Administrator’s Guide, Volume I for Windows Release 6.5 12308280

Transcript of Veritas Netbackup 6 5 System Administration Guide Volume I for Windows(1)

Veritas NetBackup Administrators Guide, Volume Ifor Windows

Release 6.5

12308280

Veritas NetBackup Administrators Guide, Volume I

Copyright 1993-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo, and NetBackup are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Portions of this software are derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Printed in the United States of America.

Third-party legal noticesThird-party software may be recommended, distributed, embedded, or bundled with this Veritas product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.Windows is a registered trademark of Microsoft Corporation.

Licensing and registrationVeritas NetBackup is a licensed product. See the NetBackup Installation Guide for license installation instructions.

Technical supportFor technical assistance, visit http://entsupport.symantec.com and select phone or email support. Use the Knowledge Base search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and our customer email notification service.

Contents

Chapter 1

IntroductionOverview ................................................................................................................31 NetBackup administration interfaces ...............................................................34 Running the Windows-based NetBackup Administration Console ......35 Running the Java-based Windows Display Console ...............................36 Administering remote servers ...................................................................36 Using the NetBackup Administration Console ...............................................38 NetBackup configuration wizards .............................................................39 Activity Monitor ...........................................................................................40 NetBackup Management .............................................................................40 Reports ...................................................................................................40 Policies ...................................................................................................40 Storage ...................................................................................................40 Catalog ...................................................................................................41 Host Properties .....................................................................................42 Media and Device Management .................................................................42 Device Monitor .....................................................................................42 Media ......................................................................................................42 Devices ...................................................................................................42 Credentials ............................................................................................43 Access Management ....................................................................................43 Standard and user toolbars ........................................................................43 Customizing the administration console .................................................43 Using LiveUpdate to distribute NetBackup updates ......................................44 How to configure NetBackup .............................................................................44 Online documents ................................................................................................46

Chapter 2

Activity MonitorIntroduction to the Activity Monitor ................................................................48 Activity Monitor menu bar .........................................................................49 Status bar ......................................................................................................52 Activity Monitor topology ..................................................................................52 Topology connections .................................................................................53 Selecting topology objects ..........................................................................54 Jobs tab ..................................................................................................................55

6

Parent jobs .................................................................................................... 55 Services tab ........................................................................................................... 57 More about services ..................................................................................... 60 Other Symantec services ............................................................................ 60 Processes tab ........................................................................................................ 62 Monitoring NetBackup processes ............................................................. 66 Drives tab .............................................................................................................. 67 Drive cleaning functions .................................................................... 67 Media mount errors ............................................................................................. 69 Queued media mount errors ...................................................................... 69 Canceled media mount errors .................................................................... 69 Managing the jobs database ............................................................................... 69 Retaining job information in the database .............................................. 70 Changing the default on a permanent basis .................................... 70 BPDBJOBS_OPTIONS environment variable ................................... 71 bpdbjobs debug log ...................................................................................... 72

Chapter 3

ReportsIntroduction to the Reports utility ................................................................... 74 Reports window ................................................................................................... 75 Shortcut menus ............................................................................................ 75 Reports settings ........................................................................................... 76 Date/Time range .................................................................................. 76 Client ...................................................................................................... 76 Disk pool ................................................................................................ 76 Disk type ................................................................................................ 77 Job ID ..................................................................................................... 77 Media ID ................................................................................................ 77 Media owner ......................................................................................... 77 Media server ......................................................................................... 77 Path ........................................................................................................ 77 Storage unit .......................................................................................... 77 Verbose listing ...................................................................................... 77 Volume ID ............................................................................................. 77 Volume pool .......................................................................................... 78 Run report ............................................................................................. 78 Stop report ............................................................................................ 78 NetBackup report types ...................................................................................... 79 Status of Backups report ........................................................................... 79 Client Backups report ................................................................................. 79 Problems report .......................................................................................... 79 All Log Entries report .................................................................................. 79 Images on Media report .............................................................................. 79

7

Media Logs report ........................................................................................80 Tape Reports .................................................................................................80 Images on Tape report .......................................................................80 Tape Logs report .................................................................................80 Tape Contents report ..........................................................................80 Tape Summary report ........................................................................81 Tape Written report ............................................................................81 Tape Lists report .................................................................................81 Disk Reports ..................................................................................................82 Images on Disk report ........................................................................82 Disk Logs report ..................................................................................82 Disk Storage Unit Status report ........................................................82 Disk Pool Status report ......................................................................83 Using the Troubleshooter within reports ........................................................83

Chapter 4

PoliciesUsing the Policies utility .....................................................................................86 Tree and detail views ...................................................................................86 Policies menu bar .........................................................................................87 Configuring backup policies ...............................................................................87 Changing policies .................................................................................................88 Using the composite change dialog ...................................................91 Policy Attributes tab ............................................................................................93 Policy type .....................................................................................................94 Data classification ........................................................................................96 Policy storage ..............................................................................................97 Considerations before a storage destination is selected ................98 Policy volume pool .......................................................................................99 Volume pool override example ........................................................100 Checkpoint restart for backup jobs .........................................................101 Checkpoint frequency .......................................................................101 Checkpoint restart support ..............................................................101 Checkpoint restart for restore jobs .................................................103 Limit jobs per policy ..................................................................................103 Notes on the Limit jobs per policy attribute ..................................103 Job priority ..................................................................................................104 Media owner ...............................................................................................105 Active. Go into effect at .............................................................................105 Backup network drives ..............................................................................106 Setup example with UNC paths .......................................................106 Example using the Backup network drives attribute ...................107 Follow NFS ..................................................................................................107 Notes on Follow NFS ..........................................................................108

8

Advantages of the Follow NFS attribute ........................................108 Disadvantages of the Follow NFS attribute ................................... 108 Cross mount points .................................................................................... 109 Notes on cross mount points ...........................................................109 Cases that can require separate policies ........................................110 How the Cross mount points attribute interacts with Follow NFS 110 Cross mount point examples ............................................................ 110 Compression ............................................................................................... 111 Advantages of the Compression attribute ..................................... 112 Disadvantages of the Compression attribute ................................ 112 How much compression can be expected? ..................................... 112 Encryption ..................................................................................................113 Collect disaster recovery information for IDR ......................................114 Collect disaster recovery information for Bare Metal Restore ........... 114 Collect true image restore information .................................................. 114 Collect true image restore information with move detection ............ 115 What happens during true image restores .................................... 116 Notes on true image restores and move detection ....................... 117 Allow multiple data streams .................................................................... 118 When to use multiple data streams ................................................ 118 Enable document restore .......................................................................... 121 Keyword phrase ......................................................................................... 121 Snapshot Client options ............................................................................ 121 Schedules tab ...................................................................................................... 123 Schedule Attributes tab .................................................................................... 124 Name ............................................................................................................ 124 Type of backup ........................................................................................... 125 Full backup .......................................................................................... 125 Cumulative incremental backup ..................................................... 126 Differential incremental backup ..................................................... 126 User backup ........................................................................................ 126 User archive ........................................................................................ 126 Application backup ............................................................................ 127 Automatic backup ..............................................................................127 Automatic incremental backup ....................................................... 127 Automatic cumulative incremental backup .................................. 127 Automatic differential incremental backup .................................. 127 Automatic full backup ....................................................................... 127 Automatic Vault ................................................................................. 128 Vault catalog backup ......................................................................... 128 More on incremental backups .........................................................128 Determining files due for backup on Windows clients ................ 131 Determining files due for backup on UNIX clients ....................... 132

9

Synthetic backup ........................................................................................134 Calendar schedule type .............................................................................134 Retries allowed after runday ............................................................134 Frequency schedule type ..........................................................................134 Guidelines for setting backup frequency .......................................135 Backup frequency determines schedule priority ..........................136 Instant recovery .........................................................................................137 Snapshots and copy snapshots to a storage unit ..........................137 Snapshots only ...................................................................................137 Multiple copies ...........................................................................................137 Multiple copies and disk staging storage units .............................138 Multiple copies and storage lifecycle policies ...............................138 Multiple copies configuration ..........................................................139 Restoring from a specific backup copy ...........................................142 Override policy storage selection ............................................................143 Override policy volume pool ....................................................................143 Override media owner ...............................................................................143 Retention .....................................................................................................144 Guidelines for assigning retention periods ....................................144 Precautions for assigning retention periods .................................145 Changing retention periods ..............................................................146 Mixing retention levels on tape volumes .......................................146 Media multiplexing ....................................................................................147 Final destination storage unit ..................................................................147 Final destination volume pool .................................................................147 Start Window tab ...............................................................................................148 Exclude dates tab ...............................................................................................151 Calendar schedule tab .......................................................................................152 Schedule by specific dates ........................................................................152 Schedule by recurring week days ............................................................153 Schedule by recurring days of the month ..............................................154 How calendar scheduling interacts with daily windows ......................155 Automatic-backup schedule examples ...................................................157 Considerations for user schedules ..........................................................157 Planning user backup and archive schedules ................................157 Creating separate policies for user schedules ...............................158 Using a specific policy and user schedule ......................................158 Example policies ................................................................................................159 Policy planning guidelines for backups ..................................................160 Group the clients ................................................................................160 Gather information about clients ....................................................160 Consider storage requirements .......................................................160 Consider backup schedules ...............................................................161

10

Group by general attributes ............................................................. 162 Clients tab ........................................................................................................... 165 Backup Selections tab ....................................................................................... 167 Lists for different policy types ................................................................ 167 Backup selections list for standard policies .................................. 167 Backup selections list for database policies ................................... 169 Methods for faster backups ...................................................................... 171 Dividing file lists between multiple policies .................................. 171 Allowing multiple data streams ...................................................... 171 Verifying the backup selections list ........................................................ 172 Rules to indicate paths in the backup selections list ................................... 174 Path rules for Microsoft Windows clients ............................................. 174 File backups ........................................................................................ 174 Windows disk-image (Raw) backups ............................................... 175 Microsoft Windows registry backup ............................................... 177 Hard links to files (NTFS volumes or UNIX) .................................. 178 Path rules for NetWare NonTarget clients ............................................ 179 Path rules for NetWare Target clients ................................................... 181 Path rules for clients running extension products .............................. 181 Backup selections list directives: General discussion .......................... 181 ALL_LOCAL_DRIVES directive ........................................................ 182 SYSTEM_STATE directive ................................................................ 182 Shadow copy components:\ directive ............................................. 183 Directives for multiple data streams .............................................. 184 Directives for specific policy types ................................................. 184 Backup selections list directives for multiple data streams ............... 185 NEW_STREAM directive and multiple data streams ...................185 ALL_LOCAL_DRIVES directive and multiple data streams ........ 188 UNSET, UNSET_ALL directives, and multiple data streams ...... 189 Excluding files from backups ................................................................... 190 Files that are excluded from backups by default .......................... 190 Excluding files from automatic backups ........................................191 Windows excluded files .................................................................... 191 Disaster Recovery tab ....................................................................................... 193 Path .............................................................................................................. 194 Logon ........................................................................................................... 194 Password ..................................................................................................... 194 Send in an email attachment ................................................................... 194 Identifying critical policies ...................................................................... 195 Creating a Vault policy ..................................................................................... 196 Performing manual backups ............................................................................ 197 More about synthetic backups ......................................................................... 198 Policy considerations and synthetic backups .......................................198

11

Two types of synthetic backups ...............................................................200 Synthetic full backups .......................................................................200 Synthetic cumulative incremental backups ..................................201 Recommendations for synthetic backups ..............................................203 Notes on synthetic backups ......................................................................204 Displaying synthetic backups in the Activity Monitor ........................207 Logs produced during synthetic backups ...............................................207 Synthetic backups and directory and file attributes ............................208

Chapter 5

Storage units, unit groups, and lifecycle policiesIntroduction to the Storage utility ..................................................................210 Using the Storage utility ...........................................................................211 Storage units .......................................................................................................212 Creating a storage unit ..............................................................................213 Changing storage unit settings ................................................................214 Deleting storage units ...............................................................................214 Media Manager storage unit considerations .........................................216 Disk storage unit considerations .............................................................218 Disk storage model .............................................................................218 Disk storage units in storage lifecycle policies .............................220 Maintaining available space on disk storage units .......................221 NDMP storage unit considerations .........................................................223 Storage unit settings .........................................................................................224 Absolute pathname to directory/volume ...............................................224 Density .........................................................................................................225 Disk pool ......................................................................................................225 Disk type ......................................................................................................225 Enable block sharing .................................................................................225 Enable multiplexing ...................................................................................226 High water mark ........................................................................................226 Low water mark ..........................................................................................226 Maximum concurrent write drives .........................................................227 Maximum concurrent jobs .......................................................................227 Using the Maximum concurrent jobs setting to control the storage unit and media server load ...............................................................228 Maximum streams per drive ....................................................................229 Media server ...............................................................................................229 NDMP host ..................................................................................................231 On demand only .........................................................................................231 Only use the following media servers .....................................................232 Properties button .......................................................................................232 Reduce fragment size ................................................................................234 Robot number ............................................................................................235

12

Robot type ..................................................................................................235 Staging relocation schedule (for basic disk staging only) ...................235 Storage device ............................................................................................ 235 Storage unit name ..................................................................................... 235 Storage unit type ....................................................................................... 236 Temporary staging area ........................................................................... 236 Transfer throttle ........................................................................................ 236 Use any available media server ............................................................... 236 Staging backups to initial storage, then final storage ................................. 238 Two staging methods ................................................................................ 238 Basic disk staging .............................................................................................. 240 Disk staging storage unit size and capacity considerations ............... 241 Finding the potential free space on a BasicDisk disk staging storage unit 242 Creating a basic disk staging storage unit ............................................. 243 Disk Staging Schedule dialog ................................................................... 245 Name .................................................................................................... 245 Priority of relocation jobs started from this schedule ................. 246 Final destination storage unit ..........................................................246 Final destination volume pool .........................................................246 Final destination media owner ........................................................ 246 Use alternate read server ................................................................. 247 Basic disk staging limitations .................................................................. 247 Initiating a relocation schedule manually ............................................. 247 Storage Lifecycle Policies ................................................................................. 249 Storage lifecycle overview ........................................................................ 249 To create a storage lifecycle policy .........................................................250 Adding storage destinations to a lifecycle policy ................................. 251 Writing multiple copies using a lifecycle .......................................252 Storage lifecycle policy name ..........................................................254 Duplication job priority .................................................................... 254 Storage destinations .......................................................................... 254 Use storage destination for: backup or duplication ..................... 255 Storage unit ........................................................................................ 255 Volume pool ........................................................................................ 255 Media owner ....................................................................................... 255 Retention type: Fixed ........................................................................ 256 Retention type: Staged capacity managed ..................................... 256 Retention type: Expire after duplication ........................................258 Alternate read server ........................................................................ 258 Data classification ..................................................................................... 258 How backup data is associated with a data classification ........... 259 Creating or changing a data classification .................................... 259

13

Optional duplication job configuration ..................................................260 MIN_KB_SIZE_PER_DUPLICATION_JOB .......................................260 MAX_KB_SIZE_PER_DUPLICATION_JOB ......................................260 MAX_MINUTES_TIL_FORCE_SMALL_DUPLICATION_JOB .......260 LIFECYCLE_PARAMETERS file example ........................................261 Using nbstlutil to administrate lifecycle operations ............................261 When to use nbstlutil ........................................................................261 Storage unit groups ...........................................................................................263 Storage unit selection criteria within a group ......................................263 Prioritized ...........................................................................................263 Failover ................................................................................................263 Round robin ........................................................................................263 Load balance .......................................................................................263 Exception to the storage unit selection criteria ............................266 Disk spanning within storage unit groups .............................................267 Creating a storage unit group ..................................................................267 Deleting a storage unit group ..................................................................269

Chapter 6

NetBackup CatalogWhat is a NetBackup catalog? ..........................................................................272 Parts of the catalog ....................................................................................272 Image database ...........................................................................................273 Image files ...........................................................................................274 Image .f files ........................................................................................274 NetBackup relational database ................................................................276 Enterprise Media Manager (EMM) database ..................................277 Catalog protection .............................................................................................278 Catalog backups ..........................................................................................278 Online, hot catalog backup method .................................................279 Running online, hot catalog backups concurrently with other backups 290 Notes on catalog policy schedules ...................................................290 Offline, cold catalog backup method ...............................................291 Recovering the catalog ......................................................................................310 Disaster recovery emails and the disaster recovery file ..............................310 Archiving the catalog ........................................................................................311 Catalog archiving process .........................................................................311 Creating a catalog archiving policy .........................................................312 Policy name .........................................................................................312 Deactivate policy ................................................................................313 Type of backup ...................................................................................313 Retention level setting ......................................................................313 Catalog archiving commands ...........................................................314

14

Recommendations for using catalog archiving ............................ 316 Using Vault with the catalog archiving feature ............................ 316 Browsing offline catalog archive ..................................................... 316 Extracting images from the catalog archives ................................ 316 Using the Catalog utility ................................................................................... 318 Searching for backup images ................................................................... 318 Notes on searching for an image ............................................................. 320 Verifying backup images .......................................................................... 320 Viewing job results .................................................................................... 321 Promoting a copy to a primary copy ....................................................... 322 Duplicating backup images ...................................................................... 324 Notes on multiplexed duplication ................................................... 324 Procedure for duplicating backups ................................................. 325 Jobs displayed while making multiple copies ........................................329 Importing NetBackup or Backup Exec images ......................................330 Importing expired images ................................................................ 336 Importing images from Backup Exec media .................................. 337 Host properties for Backup Exec ..................................................... 337 Considerations concerning importing Backup Exec media ......... 337 Differences between importing, browsing, and restoring Backup Exec and NetBackup images .............................................................. 338 Expiring backup images ............................................................................ 341 Catalog maintenance and performance optimization ................................. 342 Determining catalog space requirements .............................................. 342 File size considerations ..................................................................... 343 Backing up catalogs manually ................................................................. 345 How do I know if a catalog backup succeeded? ............................. 346 Strategies to ensure successful catalog backups .................................. 347 About the binary catalog format ............................................................. 348 Catalog conversion utility ................................................................ 348 Binary catalog file limitations .........................................................349 Moving the image catalog ........................................................................ 349 Indexing the catalog for faster access to backups ................................ 350 Compressing and uncompressing the image catalog ........................... 351 Uncompressing the image catalog .................................................. 353

Chapter 7

Host propertiesIntroduction to host properties ....................................................................... 356 Viewing host properties ............................................................................ 356 Changing host properties ................................................................................. 357 Interpreting the initial settings ............................................................... 358 Selecting multiple hosts ........................................................................... 359 Required permissions ....................................................................................... 360

15

Master server, media server, and client host properties .............................361 Access Control properties .........................................................................361 Symantec Product Authentication and Authorization ................361 Symantec Product Authentication and Authorization tab within the Access Control properties ..............................................................................362 Networks list .......................................................................................362 Add button ..........................................................................................363 Remove button ...................................................................................364 Authentication Domain tab within the Access Control properties ....364 Add button ..........................................................................................365 Remove button ...................................................................................367 Authorization Service tab within the Access Control properties .......367 Host name ...........................................................................................367 Customize the port number of the authorization service ...........368 Authorization properties ..........................................................................369 User ......................................................................................................369 Domain\Group ....................................................................................370 Host ......................................................................................................370 Group/Domain type ...........................................................................370 User must be an OS administrator ..................................................370 Backup Exec Tape Reader properties ......................................................371 Add button ..........................................................................................371 GRFS advertised name ......................................................................371 Actual client name .............................................................................372 Actual path ..........................................................................................372 Change button ....................................................................................372 Remove button ...................................................................................372 Bandwidth properties ................................................................................373 How bandwidth limiting works ........................................................373 Bandwidth throttle setting for the range of IP addresses ...........374 From IP address ..................................................................................374 To IP address .......................................................................................374 Bandwidth ...........................................................................................374 Bandwidth throttle settings list .......................................................374 Add button ..........................................................................................374 Remove button ...................................................................................375 Notes on bandwidth limits ................................................................375 Busy File Settings properties ...................................................................376 For the Busy File Settings to take effect .........................................376 Working directory ..............................................................................377 Operators email address ..................................................................377 Process busy files ...............................................................................377 File action file list ...............................................................................377

16

Add button .......................................................................................... 377 Add to all button ................................................................................ 377 Remove button ................................................................................... 378 Busy file action ................................................................................... 378 Retry count ......................................................................................... 378 Clean-up properties ................................................................................... 379 Keep logs ............................................................................................. 379 Keep vault logs ................................................................................... 379 Image cleanup .................................................................................... 380 Catalog cleanup wait time ................................................................ 380 Keep true image restoration (TIR) information ............................ 380 Move restore job from incomplete state to done state ................ 381 Move backup job from incomplete state to done state ................ 381 Client Attributes properties ..................................................................... 382 Allow client browse ........................................................................... 382 Allow client restore ........................................................................... 382 Clients list ........................................................................................... 383 General tab ..................................................................................................383 Maximum data streams .................................................................... 384 Browse and restore ability ................................................................ 384 Free browse ......................................................................................... 384 Connect Options tab .................................................................................. 385 BPCD connect back ............................................................................ 385 Ports ..................................................................................................... 385 Daemon connection port .................................................................. 386 Windows Open File Backup tab ............................................................... 387 Add and remove buttons ................................................................... 387 Enable Windows Open File Backups for this client ...................... 388 Use Veritas Volume Snapshot Provider (VSP) .............................. 388 Use Microsoft Volume Shadow Copy Service (VSS) ..................... 388 Individual drive snapshot ................................................................. 389 Global drive snapshot ....................................................................... 389 Abort backup on error ....................................................................... 390 Disable snapshot and continue ........................................................ 390 Client Name properties .............................................................................391 Client name ......................................................................................... 391 Client Settings (NetWare) properties ..................................................... 392 Back up migrated files ....................................................................... 392 Uncompress files before backing up ............................................... 392 Keep status of user-directed backups, archives, and restores .... 392 Client Settings (UNIX) properties ...........................................................393 Locked file action ...............................................................................393 Keep status of user-directed backups, archives, and restores .... 393

17

Reset file access time to the value before backup .........................394 Megabytes of memory to use for file compression .......................394 Use VxFS file change log for incremental backups ......................394 Default cache device path for snapshots ........................................396 Do not compress files ending with ..................................................397 Add button ..........................................................................................397 Add to all button .................................................................................397 Remove button ...................................................................................397 Client Settings (Windows) properties .....................................................398 General level logging .........................................................................398 TCP level logging ................................................................................398 Wait time before clearing archive bit .............................................399 Use change journal in incrementals ...............................................399 Incrementals based on timestamp ..................................................401 Incrementals based on archive bit ..................................................401 Time overlap .......................................................................................401 Communications buffer size ............................................................402 User directed timeouts ......................................................................402 Maximum error messages for server ..............................................402 Keep status of user-directed backups, archives, and restores ....402 Perform default search for restore ..................................................402 Data Classification properties ..................................................................403 Rank .....................................................................................................403 Name ....................................................................................................404 Description ..........................................................................................404 Classification ID .................................................................................404 Encryption properties ...............................................................................405 Encryption permissions ....................................................................405 Enable encryption ..............................................................................406 Enable standard encryption .............................................................406 Client cipher ........................................................................................406 Use legacy DES encryption ...............................................................406 Encryption strength ..........................................................................406 Encryption libraries ...........................................................................407 Encryption key file .............................................................................407 Exchange properties ..................................................................................408 Snapshot verification I/O throttle ...................................................408 Backup option for log files during full backups ............................409 Mailbox for message level backup and restore ..............................409 Enable single instance backup for message attachments ...........409 Exclude Lists properties ............................................................................410 Use case sensitive exclude list .........................................................410 Exclude list ..........................................................................................410

18

Exceptions to the exclude list ..........................................................411 Add buttons ........................................................................................ 411 Add to all buttons ...............................................................................411 Remove buttons ................................................................................. 412 Shared fields in exclude lists ................................................................... 412 Policy ...................................................................................................412 Schedule .............................................................................................. 412 Files/Directories ................................................................................. 413 Exclude lists for specific policies or schedules ..................................... 413 Syntax rules for exclude lists ................................................................... 414 Traversing excluded directories .............................................................. 416 Fibre Transport properties ....................................................................... 418 Preferred ............................................................................................. 418 Always .................................................................................................419 Never .................................................................................................... 419 Maximum concurrent FT connections ........................................... 419 Use defaults from the master server configuration ..................... 419 Firewall properties .................................................................................... 420 Default connect options .................................................................... 420 Hosts list .............................................................................................. 422 Attributes for selected hosts ............................................................ 423 Example setup for using the vnetd port ......................................... 425 General Server properties ........................................................................ 427 Delay on multiplexed restores .........................................................427 Check the capacity of disk storage units ........................................427 Must use local drive ........................................................................... 428 Use direct access recovery for NDMP restores ............................. 428 Document-level restore options ...................................................... 428 Media host override ........................................................................... 429 Add button .......................................................................................... 429 Add to all button ................................................................................ 429 Change button .................................................................................... 429 Remove button ................................................................................... 430 Global Attributes properties .................................................................... 431 Job retry delay .................................................................................... 431 Schedule backup attempts ............................................................... 431 Policy update interval ....................................................................... 432 Priority of restore jobs ...................................................................... 432 Maximum jobs per client .................................................................. 432 Maximum backup copies .................................................................. 433 Compress catalog interval ................................................................ 434 Maximum vault .................................................................................. 434 Administrator email address ...........................................................434

19

Setting up email notifications ..................................................................434 Configuring the nbmail.cmd script .................................................435 Installing the email utility ................................................................436 Indicating email notification in the NetBackup host properties 437 Email contents ....................................................................................438 Troubleshooting the notification ....................................................439 Logging properties .....................................................................................440 Types of logging .................................................................................440 Enable robust logging ........................................................................441 Global logging level ...........................................................................442 Process specific overrides .................................................................442 Debug logging levels for NetBackup services ................................443 Lotus Notes properties ..............................................................................445 Path ......................................................................................................445 INI file ..................................................................................................445 Media properties ........................................................................................446 Allow media overwrite ......................................................................446 Enable SCSI reserve ...........................................................................447 Allow multiple retentions per media ..............................................449 Allow backups to span tape media ..................................................449 Allow backups to span disk ...............................................................450 Enable standalone drive extension .................................................450 Enable job logging ..............................................................................450 Enable unrestricted media sharing for all media servers ............450 Media ID prefix (non-robotic) ...........................................................451 Media unmount delay ........................................................................451 Media request delay ...........................................................................451 NDMP Global Credentials properties ......................................................452 User name ...........................................................................................453 Password and confirm password .....................................................453 NetWare Client properties ........................................................................453 Network properties ....................................................................................454 NetBackup client service port (BPCD) .............................................454 NetBackup request service port (BPRD) .........................................454 Announce DHCP interval ..................................................................455 Open File Backup (NetWare client) properties .....................................455 Enable open file backup during backups ........................................455 Port Ranges properties ..............................................................................456 Use random port assignments .........................................................457 Client port window .............................................................................457 Client reserved port window ............................................................457 Server port window ............................................................................458 Server reserved port window ...........................................................458

20

Restore Failover properties ...................................................................... 459 Alternate restore failover machines list ........................................460 Add button .......................................................................................... 460 Change button .................................................................................... 461 Remove button ................................................................................... 461 Media server ....................................................................................... 461 Failover restore servers .................................................................... 461 Retention Periods properties ................................................................... 462 Value .................................................................................................... 462 Units .................................................................................................... 462 Retention periods list ........................................................................ 462 Schedules list ...................................................................................... 463 Impact report button ......................................................................... 463 Note on redefining retention periods ............................................. 464 Servers properties ..................................................................................... 465 Master server ...................................................................................... 465 Additional servers ..............................................................................465 Media servers ..................................................................................... 466 Restricting administrative privileges of media servers ............... 466 Multiple masters that share one Enterprise Media Manager host 468 SharedDisk properties ..............................................................................471 SharedDisk mount points directory ................................................ 471 SharePoint 2003 properties ..................................................................... 472 User ID .................................................................................................472 Password ............................................................................................. 472 Consistency check before backup .................................................... 472 Continue with backup if consistency check fails .......................... 473 SharePoint Hosts properties .................................................................... 473 Symantec Products properties ................................................................ 474 Timeouts properties .................................................................................. 475 Client connect timeout ...................................................................... 475 Backup start notify timeout ............................................................. 475 File browse timeout ........................................................................... 476 Use OS dependent timeouts ............................................................. 476 Media mount timeout ........................................................................ 476 Client read timeout ............................................................................ 476 Backup end notify timeout ............................................................... 477 Media server connect timeout .........................................................477 Universal Settings properties .................................................................. 478 Restore retries .................................................................................... 478 Browse timeframe for restores ........................................................ 479 Last full backup .................................................................................. 479 Use specified network interface ...................................................... 479

21

Use preferred group for enhanced authorization .........................480 Allow server file writes .....................................................................481 Accept connections on non reserved ports ....................................481 Enable performance data collection (Windows server only) .......481 Client sends mail ................................................................................481 Server sends mail ...............................................................................481 Client administrators email ............................................................482 UNIX Client properties ..............................................................................483 UNIX Server properties .............................................................................484 NFS access timeout ............................................................................484 VMWare Proxy Servers properties .........................................................485 VSP (Volume Snapshot Provider) properties ........................................486 VSP overview ......................................................................................486 Logging VSP messages ......................................................................488 Cache file volume list ........................................................................488 VSP volume exclude list ....................................................................489 Customize cache size .........................................................................491 Cache size ............................................................................................491 Maximum cache size ..........................................................................491 Busy file wait .......................................................................................492 Busy file timeout ................................................................................493 Using VSP with databases ................................................................493 Windows Client properties .......................................................................495

Chapter 8

Device MonitorChanging the operating mode of a drive ........................................................497 Resetting a drive ................................................................................................498 Managing drive paths ........................................................................................499 Managing pending requests and actions .......................................................499 Pending requests for storage units .........................................................500 Resolving a pending request ....................................................................501 Resolving a pending action ......................................................................502 Resubmitting a request .............................................................................502 Denying a request ......................................................................................503 Freezing media or downing drives ..................................................................503 Cleaning drives ...................................................................................................504 Adding or changing a drive comment ............................................................506 Viewing drive details .........................................................................................506

Chapter 9

MediaVolume operations .............................................................................................509 Adding volumes ..........................................................................................510

22

Adding volumes overview ................................................................ 510 About labeling NetBackup volumes ................................................ 512 Adding volumes by using the Volume Configuration Wizard .... 513 Adding volumes using a robot inventory update .......................... 513 Adding volumes using the Actions menu ......................................514 Volumes properties ........................................................................... 515 Changing volume properties .................................................................... 518 Change Volumes properties ............................................................. 519 Changing the volume pool of a volume .................................................. 520 Changing the volume group of a volume ............................................... 520 Changing the owner of a volume ............................................................. 521 Freezing and unfreezing media ............................................................... 521 Suspending and unsuspending media .................................................... 522 Labeling media ........................................................................................... 522 Label properties ................................................................................. 523 Rescanning and updating barcodes ........................................................ 524 When to rescan and update .............................................................. 524 When not to rescan and update ....................................................... 524 Rescanning/updating barcodes ....................................................... 525 Moving volumes ......................................................................................... 525 Move examples ................................................................................... 525 Moving volumes using the robot inventory update option ......... 526 Moving volumes using the Actions menu ......................................526 Move Volumes properties ................................................................. 527 Multiple Move Volumes dialog boxes ............................................. 528 Erasing media ............................................................................................. 529 Injecting and ejecting volumes ................................................................ 531 Injecting volumes ..............................................................................531 Ejecting volumes ................................................................................ 532 Media ejection timeout periods ....................................................... 534 Deleting volumes ....................................................................................... 534 Deassigning volumes ................................................................................. 535 Deassigning NetBackup volumes .................................................... 536 Deassigning Veritas Storage Migrator volumes ........................... 537 Exchanging volumes ................................................................................. 537 Exchanging a volume and using a new media ID .......................... 537 Exchanging a volume and using the old media ID ........................ 538 Recycling volumes ..................................................................................... 539 Recycling volumes using the existing media ID ........................... 539 Recycling volumes using a new media ID ......................................539 Volume pool operations .................................................................................... 540 Adding a new volume pool ....................................................................... 540 Changing the properties of a volume pool ............................................. 541

23

Volume pool properties .............................................................................541 Catalog backup ...................................................................................542 Description ..........................................................................................542 Maximum number of partially full media ......................................542 Pool name ............................................................................................542 Scratch pool ........................................................................................543 Deleting a volume pool ..............................................................................543 Volume group operations .................................................................................544 Deleting a volume group ...........................................................................544 Robot inventory operations .............................................................................544 When to inventory a robot .......................................................................545 Inventory a robot .......................................................................................547 Robot Inventory dialog box ....................................................................548 Advanced options ...............................................................................549 Compare contents with volume configuration ..............................549 Device host ..........................................................................................549 Empty media access port prior to update .......................................550 Preview changes .................................................................................550 Robot ....................................................................................................551 Show contents ....................................................................................551 Update volume configuration ..........................................................553 Advanced Robot Inventory Options dialog ............................................555 Media Settings tab ...................................................................................555 Media type ...........................................................................................556 Media that have been removed from the robot .............................559 Media that have been moved into or within the robot .................560 Use barcode rules ...............................................................................560 Use the following Media ID prefix ...................................................560 Volume pool ........................................................................................56 1 Barcode Rules tab ......................................................................................561 Barcode tag ..........................................................................................56 2 Description ..........................................................................................563 Max mounts ........................................................................................56 3 Media type ...........................................................................................563 Volume pool ........................................................................................56 4 Media ID Generation tab .........................................................................565 Barcode length ....................................................................................56 5 Media ID generation rule ..................................................................566 Robot number .....................................................................................566 Media Type Mappings tab .......................................................................566 Adding mapping entries ....................................................................56 7 Default and allowable media types ..................................................568 Using the physical inventory utility .......................................................572

24

Features of vmphyinv ....................................................................... 573 Requirements and restrictions for vmphyinv ............................... 573 When to use vmphyinv ..................................................................... 573 How vmphyinv performs a physical inventory ............................. 574 Obtains a list of drives to mount the media ................................... 574 Obtains a list of media to be mounted ............................................ 574 Mounts media and reads the tape header ......................................576 Updates the EMM database .............................................................. 577 Volume configuration update examples ................................................ 579 Example 1: Removing a volume from a robot ................................ 580 Example 2: Adding existing stand-alone volumes to a robot ...... 581 Example 3: Moving existing volumes within a robot ...................583 Example 4: Adding new volumes to a robot ................................... 584 Example 5: Adding cleaning tapes to a robot ................................ 586 Example 6: Moving existing volumes between robots ................. 587 Example 7: Adding existing volumes when barcodes are not used 587 Using WORM media .......................................................................................... 589 Supported drives ........................................................................................ 590 Managing your WORM media in NetBackup ......................................... 590 Using WORM volume pools to manage WORM media ................ 590 Using unique drive and media types to manage WORM media . 591 WORM tape limitations ............................................................................ 592

Chapter 10

DevicesDevice configuration prerequisites ................................................................ 593 The device mapping file .................................................................................... 594 Configuring robots and tape drives ................................................................ 595 Using the Device Configuration Wizard ................................................ 595 Operating system changes ............................................................... 596 Possible EMM server host conflict .................................................. 596 Devices that are partially-configured ............................................. 596 Starting the Device Configuration Wizard .................................... 597 Adding a robot ............................................................................................ 597 Robot properties ................................................................................ 598 Robot control configuration overview ........................................... 602 Adding or changing a drive ...................................................................... 604 Adding a shared drive ....................................................................... 605 Configuring SCSI reserve on a drive path ......................................606 Drive properties ................................................................................. 607 Configuring drive name rules ..........................................................610 Robot drive number for API robots ................................................. 613 No rewind device ................................................................................ 614 Configuring server groups for media sharing ............................................... 614

25

Server group properties ............................................................................616 Server group name .............................................................................616 Server group type ...............................................................................617 State .....................................................................................................617 Description ..........................................................................................617 Servers in group .................................................................................617 Servers not in group ..........................................................................617 Configuring and managing disk pools ............................................................617 Configuring SAN clients and Fibre Transport ..............................................618 Managing your device configuration ..............................................................618 When to perform device configuration changes ...................................619 Using the Device Configuration Wizard for changes ...........................619 Changing a robot configuration ...............................................................619 Changing the configuration of a drive ....................................................619 Changing a drive to a shared drive ..........................................................620 Deleting robots ...........................................................................................620 Deleting drives ...........................................................................................621 Performing device diagnostics .................................................................621 Running a drive diagnostic test .......................................................621 Running a robot diagnostic test .......................................................622 Printing your device configuration .........................................................622 Stopping and restarting the Device Manager ................................................623 Activating and deactivating media servers ...................................................623 Accessing media and devices on other hosts .................................................624 Example SERVER entries ..........................................................................624 The Enterprise Media Manager server ...........................................................625 Managing the EMM server .......................................................................625 EMM server requirements ........................................................................626

Chapter 11 Chapter 12

Credentials Management topicsNetBackup naming conventions ......................................................................629 Using wildcards in NetBackup .........................................................................630 To power down and reboot NetBackup servers .............................................631 Administering NetBackup licenses .................................................................632 To administer a remote master server ...........................................................635 To add a NetBackup server to a server list .............................................635 To choose a remote server to administer ...............................................639 Administer a master server by using a NetBackup client ...................642 Using the Remote Administration Console ...........................................643 If you cannot access a remote server ......................................................644 To administer devices on other servers .........................................................645

26

Using the NetBackup-Java Windows display console .................................. 647 To authorize NetBackup-Java users on Windows ................................. 647 To restrict access on Windows ................................................................ 648 Configuring the NetBackup-Java administration console .......................... 648 NetBackup-Java administration console architectural overview ...... 648 Authorizing NetBackup-Java users .........................................................650 Authorization file characteristics ...........................................................651 To configure nonroot usage ..................................................................... 654 Authorizing nonroot users for specific applications ...................654 Capabilities authorization for jbpSA .............................................. 655 Runtime configuration options ............................................................... 655 BPJAVA_PORT, VNETD_PORT ........................................................ 656 FIREWALL_IN .................................................................................... 656 FORCE_IPADDR_LOOKUP ............................................................... 657 INITIAL_MEMORY, MAX_MEMORY .............................................. 659 MEM_USE_WARNING ...................................................................... 660 NBJAVA_CLIENT_PORT_WINDOW ................................................ 660 NBJAVA_CONNECT_OPTION ..........................................................660 NBJAVA_CORBA_DEFAULT_TIMEOUT ........................................661 NBJAVA_CORBA_LONG_TIMEOUT ................................................ 661 USE_NBJAUTH_WITH_ENHAUTH ................................................ 661 Configuration options relevant to jnbSA and jbpSA ............................ 662 To log the command lines that the NetBackup interfaces use ... 662 To customize jnbSA and jbpSA with bp.conf entries ...................662 NetBackup-java performance improvement hints .......................................662 What it means to be running the java console locally on a UNIX platform 663 What it means to be running the console locally on a Windows platform 663 How do I run a console locally and administer a remote server? ...... 664 How do I enhance console perfor