Backup Exec For Windowsnt

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Backup Exec For Windowsnt as PDF for free.

More details

  • Words: 372,093
  • Pages: 1,439
VERITASTM Backup Exec 9.1 for Windows Servers Administrator’s Guide

N120578

Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. VERITAS Legal Notice Copyright © 2003 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS, VERITAS Backup Exec for Windows Servers, the VERITAS logo, Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650–527–8000 Fax 650–527–2908 www.veritas.com Third-Party Copyrights Douglas C. Schmidt and his research group at Washington University and University of California, Irvine ACE (TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University and University of California, Irvine, Copyright (c) 1993-2002, all rights reserved.

Apache Software Foundation Apache Tomcat 4.0, Apache Xerces C++ 1.2.0 and 1.3.0 Apache Software License Version 1.1 Copyright (c) 2000 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: “This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appears. 4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation. For more information on the Apache Software Foundation, please see . Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.

Crystal Decisions, Inc. (formerly Seagate Software Information Management Group, Holdings, Inc. Crystal Reports 8.5 Use, duplication, reproduction, or transfer of this commercial software and accompanying documentation is restricted in accordance with FAR 12.212 and DFARS 227.7202 and by a license agreement. Contact: Crystal Decisions, Inc., Attn: Contrcts Department, 895 Emerson Street, Palo Alto, CA 94301.

Nebiru Software Inc. (dba DomAPI) DomAPI LIbrary 5.0 Copyright 2001-2003

Boris Fornitchev STLPort 3.2.1 Copyright 1999,2000 Boris Fomitchev This material is provided "as is", with absolutely no warranty expressed or implied. Any use is at your own risk. Permission to use or copy this software for any purpose is hereby granted without fee, provided the above notices are retained on all copies. Permission to modify the code and to distribute modified code is granted, provided the above notices are retained, and a notice that the code was modified is included with the above copyright notice. The Licensee may distribute binaries compiled with STLport (whether original or modified) without any royalties or restrictions. The Licensee may distribute original or modified STLport sources, provided that: (i) The conditions indicated in the above permission notice are met; (ii) The following copyright notices are retained when present, and conditions provided in accompanying permission notices are met: Copyright 1994 Hewlett-Packard Company Copyright 1996,97 Silicon Graphics Computer Systems, Inc. Copyright 1997 Moscow Center for SPARC Technology. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett- Packard Company makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Silicon Graphics makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Moscow Center for SPARC Technology makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.

Carnegie Mellon University and The Regents of the University of California ucd-snmp 4.1.1 Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work -Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Ronald L. Rivest Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.

License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.

Wei Dai Compilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved. This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any particular file in the package. The following files are copyrighted by their respective original authors, and their use is subject to additional licenses included in these files. mars.cpp - Copyright 1998 Brian Gladman. All other files in this compilation are placed in the public domain by Wei Dai and other contributors. I would like to thank the following authors for placing their works into the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Michael Paul Johnson - diamond.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp, md5mac.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is hereby granted without fee, subject to the following restrictions: 1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include the above copyright notice and this license. 2. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice. 3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written consent in each case. 5. Export of this software from the United States may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting. 6. Certain parts of this software may be protected by patents. It is the users' responsibility to obtain the appropriate licenses before using those parts. If this compilation is used in object code form in an application software, acknowledgement of the author is not required but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated.

Maarten Hoeben ReportCtrl.h 2.0.1

Stac Electronics Copyright (C) Stac Electronics 1993, including one or more U.S. patents No. 4701745, 5016009, 5126739 and 5146221 and other pending patents.

Administrator’s Guide - Table of Contents Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Chapter 1. Introducing Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 What’s New in This Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Backup Exec Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 How Backup Exec Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Chapter 2. Installing Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Changing Windows Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Installing Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Installing Backup Exec Using the Installation Program . . . . . . . . . . . . . . . . . . . . . . . 50 Installing Backup Exec Options on a Local Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Installing Backup Exec Media Servers to Remote Computers . . . . . . . . . . . . . . . . . 54 Installing Backup Exec Remote Agents and Options on Remote Servers . . . . . . . . 58 Installing Backup Exec from the Command Line (Silent Mode) . . . . . . . . . . . . . . . . 60 Registering Backup Exec Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Repairing Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Starting and Stopping Backup Exec Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Uninstalling Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Installing the Backup Exec Remote Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Using VERITAS Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Upgrading from Previous Versions of Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Upgrading Backup Exec Options on Remote Computers . . . . . . . . . . . . . . . . . . . . . . . . 77 1

Chapter 3. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Before Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 First Time Startup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Using the Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Using Backup Exec Dialog Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Using the Overview View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Using the Backup Exec Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Backup Exec Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Changing Default Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Changing General Job Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Chapter 4. Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Viewing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Viewing Media Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Hot Swap for Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Pausing, Resuming, and Renaming Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Using Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Creating Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Adding Drives to a Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Setting Priorities for Drives in a Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Deleting Drives from a Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Deleting Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Retargeting Jobs from a Deleted Drive Pool or Media Set . . . . . . . . . . . . . . . . . . . 109 Renaming a Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Viewing Drive Pool Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Using Cascaded Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Requirements for Using Cascaded Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

2

Administrator’s Guide

Creating a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Adding Drives to a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Deleting Drives from a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Deleting a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Renaming a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Viewing Properties of a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Viewing Server Properties and Running Server Diagnostics . . . . . . . . . . . . . . . . . . . . 118 Viewing and Using Drive Properties and Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Viewing General Drive Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Viewing Drive Configuration Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Viewing Drive SCSI Information Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Viewing Drive Statistics Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Viewing Drive Cleaning Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Viewing and Specifying a Drive’s Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Using Robotic Libraries with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Configuring a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Viewing Properties of a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Creating Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Redefining Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Using Backup-to-Disk Folders and Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Adding a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Renaming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Changing the Path of a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Deleting a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Recreating a Backup Folder and Its Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Pausing and Resuming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Viewing Backup Folder Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Renaming a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Deleting a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Recreating a Deleted Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Administrator’s Guide - Table of Contents

3

Viewing and Changing Backup File Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Using Microsoft’s Removable Storage Feature with Backup Exec . . . . . . . . . . . . . . . 167 Using Media in Drives Managed by Removable Storage . . . . . . . . . . . . . . . . . . . . 168 Creating Utility Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Inventorying Media in Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Erasing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Erasing Backup Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Retensioning a Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Formatting Media in a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Labeling Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Ejecting Media from a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Setting Up Cleaning Jobs for Robotic Library Drives . . . . . . . . . . . . . . . . . . . . . . . 184 Importing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Exporting Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Locking the Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Unlocking the Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Chapter 5. Managing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Media Overwrite Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Default Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Media Overwrite Protection Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Media Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Media Overwrite Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Media Append Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Overwriting Allocated or Imported Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Removing Damaged Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Media Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Imported Media Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Bar Code Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Renaming Media Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

4

Administrator’s Guide

Setting Default Media Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Media Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Creating User-defined Media Vaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Finding Media in a Location or Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Renaming a User-defined Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Adding Media to the Offline Location or a User-Defined Vault . . . . . . . . . . . . . . . 217 Moving Media by Dragging and Dropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Deleting a User-defined Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Media Rotation Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Father/Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Grandfather Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Running the Media Rotation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Media Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Deleting Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Moving Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Viewing General Media Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Viewing Media Management Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Viewing Media Statistical Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Viewing Media Cleaning Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Running the Media Set Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Creating Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Deleting a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Renaming a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Editing and Viewing Media Set Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Chapter 6. Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Creating a Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Using the Backup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Administrator’s Guide - Table of Contents

5

Creating a Manual Backup Job by Configuring Job Properties . . . . . . . . . . . . . . . 242 Selecting Data to Back Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 About Selecting Distributed File System (Dfs) Links for Backup . . . . . . . . . . . . . 268 Including or Excluding Files for Backup Using Advanced File Selection . . . . . . 269 Changing the Order for Processing Backup Selections . . . . . . . . . . . . . . . . . . . . . . 272 Changing Logon Accounts for Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Using Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Creating Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Using Selection Lists to Create a Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Merging and Replacing Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Deleting Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Editing Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 About the Excludes Selection List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Setting Up User-defined Selections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Using Backup Job Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Creating a New Backup Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Editing a Backup Job Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Creating a Copy of a Backup Job Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Creating a New Backup Job from a Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Reapplying a Template to Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Using Backup Exec’s Windows Explorer Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Specifying or Changing Backup Settings for Windows Explorer . . . . . . . . . . . . . 294 Submitting a Backup Job from Windows Explorer . . . . . . . . . . . . . . . . . . . . . . . . . 297 Running a One-button Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Archiving Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Archiving Data Using Disk Grooming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Using Resource Discovery to Search for New Resources . . . . . . . . . . . . . . . . . . . . . . . 302 General Options for Resource Discovery Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Resources Options for a Resource Discovery Job . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Duplicating Backed Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 6

Administrator’s Guide

General Options for a Duplicate Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 Advanced Options for a Duplicate Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 Verifying a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Creating a Test Run Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 General Options for Test Run Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Setting Test Run Default Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Setting Default Backup Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Setting Default Pre/Post Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Specifying Backup Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Specifying the Default Backup Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Changing the Backup Network for a Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Using Backup Exec with Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Browsing Systems Through a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Protecting Windows Server 2003 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 About the Backup Exec Shadow Copy Components File System . . . . . . . . . . . . . . 343 Protecting Upgraded Windows Server 2003 Resources . . . . . . . . . . . . . . . . . . . . . . 347 Backing Up Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Backing Up NetWare Network Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 About Backup Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Choosing a Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Understanding Backup Methods and Their Advantages . . . . . . . . . . . . . . . . . . . . 355 Understanding the Archive Bit and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 360 Understanding Modified Time and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 361 Chapter 7. Administrating Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Configuring Logon Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Default Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 Backup Exec System Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Creating a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Editing a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368

Administrator’s Guide - Table of Contents

7

Replacing a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Deleting a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Changing Your Default Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . 371 Creating a New Backup Exec System Logon Account . . . . . . . . . . . . . . . . . . . . . . . 371 Viewing and Clearing the Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Scheduling Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Editing the Job Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 Configuring Default Schedule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Configuring Holiday Scheduling for Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Monitoring Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Viewing and Filtering Jobs in the Job List View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Viewing and Filtering Jobs in the Calendar View . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Viewing and Changing Active Job Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Viewing and Modifying Scheduled Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Viewing Completed Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Error-Handling Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Configuring Error-Handling Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Configuring Database Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Using ExecView in Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Configuring ExecView . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Chapter 8. Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Restore Operations and the Catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 Cataloging Media in a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Setting Catalog Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Catalog Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Restoring Data to a Server or Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Using the Restore Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Creating a Manual Restore Job by Configuring Job Properties . . . . . . . . . . . . . . . 420 Restoring File Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

8

Administrator’s Guide

Restoring System State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Restoring Windows Server 2003 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Restoring Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Restoring Distributed File System (Dfs) Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 Restoring Media Created With Other Backup Software . . . . . . . . . . . . . . . . . . . . . 441 Selecting Data to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Using the Resource View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Using the Media View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Changing Resource Credentials for Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Using Advanced File Selection to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Searching for Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449 Restore Operations and Media Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Redirecting a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Setting Restore Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Specifying the Restore Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 Canceling a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 Catalog Icon Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 Chapter 9. Alerts and Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 Viewing and Filtering Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 Viewing Alert Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 Responding to Active Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 Viewing the Job Log for Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 Clearing Informational Alerts from the Active Alerts Pane . . . . . . . . . . . . . . . . . . . . . 478 Enabling or Disabling Alerts from the Active Alerts Pane . . . . . . . . . . . . . . . . . . . . . . 478 Configuring Alert Category Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Viewing and Clearing the Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 Deleting Alerts from the Alert History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482 Configuring E-mail and Pager Notification Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 483 Administrator’s Guide - Table of Contents

9

Configuring SMTP E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 Configuring MAPI E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485 Configuring VIM E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 Configuring a Pager for Alert Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 Configuring Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488 Configuring SMTP Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Configuring MAPI Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 Configuring VIM Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Configuring a Pager for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 Configuring a Net Send Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Configuring a Printer Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 Configuring a Group Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Scheduling Notification for Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 Editing Recipient Notification Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Editing Recipient Notification Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Removing Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 Assigning Recipients to Alert Categories for Notification . . . . . . . . . . . . . . . . . . . . . . 508 Selecting Recipients for Job Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 Configuring SNMP Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 Adding Windows Management Instrumentation Capability . . . . . . . . . . . . . . . . . . . 516 Uninstalling WMI Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517 Chapter 10. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 Viewing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 Running and Viewing a New Report Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Viewing Report Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 Available Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 Active Alerts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 Alert History Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533

10

Administrator’s Guide

Audit Log Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Backup Sets by Media Sets Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Configuration Settings Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536 Device Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537 Error-Handling Rules Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 Event Logs Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 Media Set Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 Media Vault Contents Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 Operations Overview Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 Robotic Library Inventory Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 Scratch Media Availability Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Test Run Results Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 Chapter 11. Disaster Preparation and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Key Elements of a Disaster Preparation Plan (DPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 Disaster Preparation of the Windows Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 Returning to the Last Known Good Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 Creating a Hardware Profile Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 Creating an Emergency Repair Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 Using Windows’ Automated System Recovery and System Restore to Recover a Windows XP or Windows Server 2003 System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Creating and Using an Emergency Boot Diskette . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Manual Disaster Recovery of Windows Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 Disaster Recovery of a Local Windows NT Computer . . . . . . . . . . . . . . . . . . . . . . . 559 Disaster Recovery of a Remote Windows NT Computer . . . . . . . . . . . . . . . . . . . . . 562 Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller) . . . . . . . . 565 Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller) . . . . . . . . 567

Administrator’s Guide - Table of Contents

11

Chapter 12. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571 General Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571 Hardware-related Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 Backup Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580 Restore Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 Chapter 13. VERITAS Backup Exec - Workstation Agents . . . . . . . . . . . . . . . . . . 587 The Backup Exec Windows 98 and Windows Me Agents . . . . . . . . . . . . . . . . . . . . . . 588 Requirements for Running the Backup Exec Windows 98/Me Agent . . . . . . . . . 588 Installing the Backup Exec Windows 98/Me Agent on the Workstation . . . . . . . 589 Configuring the Backup Exec Windows 98/Me Agent . . . . . . . . . . . . . . . . . . . . . . 590 Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent 592 Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent . . 594 The Backup Exec Macintosh Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 Requirements for Running the Backup Exec Macintosh Agent . . . . . . . . . . . . . . . 596 Installing and Configuring the Macintosh Agent on a Mac OS X Workstation . . 597 Modifying the NetInfo Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 About the Backup Exec UNIX Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602 Requirements for Running the Backup Exec UNIX Agent . . . . . . . . . . . . . . . . . . . 602 Installing the Backup Exec UNIX Agent on the Workstation . . . . . . . . . . . . . . . . . 603 Configuring the Backup Exec UNIX Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 Troubleshooting Workstation Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 Chapter 14. VERITAS Backup Exec - Command Line Applet . . . . . . . . . . . . . . . . 609 Command Line Applet Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610 Using the Command Line Applet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611 Using Command Line Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611 Switches Used With All Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612

12

Administrator’s Guide

Backup Job Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614 Switches for Administrating Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632 Restore Job Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636 Switches for Viewing and Responding to Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637 Switches for Error Handling Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 Switches for Managing Media and Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642 Backup Exec Services Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658 Logon Account Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659 Report Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660 Setting Default Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662 Using Backup or Restore Job Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Creating a Backup Job Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Creating a Restore Job Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704 Saving and Launching the Backup or Restore Job Script File . . . . . . . . . . . . . . . . . 723 Using Scripts and Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723 Creating a Selection List Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723 Using Scripts and Backup Job Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733 Creating a Backup Job Template Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733 Creating a Backup Job Template Using a Script File . . . . . . . . . . . . . . . . . . . . . . . . 748 Creating a Backup Job from a Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749 Using a Schedule Script with Device and Media Operations . . . . . . . . . . . . . . . . . . . . 749 Understanding Job Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756 Chapter 15. Using VERITAS Backup Exec with Server Clusters . . . . . . . . . . . . . . 759 How Backup Exec Works in a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760 Requirements for Installing Backup Exec on a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . 761 Installing Backup Exec on a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 762 Upgrading Backup Exec on a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763 Installing Additional Backup Exec Options on a Cluster . . . . . . . . . . . . . . . . . . . . . 764 Uninstalling Backup Exec From A Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764

Administrator’s Guide - Table of Contents

13

Creating Drive Pools for Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766 Using Checkpoint Restart on Cluster Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767 Enabling or Disabling Checkpoint Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768 Specifying A Different Failover Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770 Designating a New SAN SSO Database Server in a Cluster . . . . . . . . . . . . . . . . . . . . . 772 Configurations for Backup Exec and Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773 Two-node Cluster with Locally-attached Storage Devices . . . . . . . . . . . . . . . . . . . 774 Two-node Cluster with Tape Devices on a Shared SCSI Bus . . . . . . . . . . . . . . . . . 775 Two-node Clusters on a Fibre Channel SAN with the SAN SSO . . . . . . . . . . . . . . 779 Four-node Clusters on a Fibre Channel SAN with the SAN SSO . . . . . . . . . . . . . 781 Backing Up Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783 Backing Up Windows 2000 and Windows Server 2003 Features . . . . . . . . . . . . . . 784 Backing Up Local Disks in a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785 Backing Up Shared Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785 Backing Up Database Files in a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786 Restoring Data To Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788 Restoring Windows 2000 and Windows Server 2003 Features . . . . . . . . . . . . . . . 788 Restoring the Cluster Quorum for Windows 2000 and Windows Server 2003 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789 Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790 Specifying a New Drive Letter for the Cluster Quorum Disk . . . . . . . . . . . . . . . . 792 Disaster Recovery of A Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794 Using IDR to Prepare for Disaster Recovery of A Cluster . . . . . . . . . . . . . . . . . . . 795 Recovering Nodes on the Cluster Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795 Recovering Backup Exec on a Cluster Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . 797 Recovering the Entire Cluster Using a Manual Disaster Recovery Procedure . . 797 Recovering the Cluster Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799 Recovering All Shared Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800 Recovering Clustered Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801 Troubleshooting Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801 14

Administrator’s Guide

Chapter 16. VERITAS Backup Exec - Web Administration Console . . . . . . . . . . . . 803 Requirements for BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803 Installing BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804 Starting BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804 Differences Between BEWAC and Backup Exec for Windows Servers . . . . . . . . . . . . 804 Accessing Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805 Navigating in BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807 Viewing, Clearing, and Responding to Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808 Chapter 17. Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809 Starting the Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811 Completing Tasks using the Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812 Running Backup Exec Utility General Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 Add a New Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 Create a New Media Server Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815 Delete a Media Server from the All Media Servers Subnode . . . . . . . . . . . . . . . . . 816 Delete a Media Server Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817 Run Backup Exec Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818 View Media Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819 Running Backup Exec Utility Services Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820 Stop Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820 Start Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821 Change Service Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821 Edit Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823 Running Backup Exec Utility SAN SSO Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826 Set the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827 Remove the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827 Configure the SAN SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 828

Administrator’s Guide - Table of Contents

15

Promote a Media Server to a Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . 829 Move the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830 Running Database Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831 Check the Database Consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Age the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Compact a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833 Dump a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833 Rebuild Media Server Database Indices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834 Repair a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834 Recover a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835 Change the SQL Server sa Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836 Change Database Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837 Running Media Server Group Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838 Add Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838 Remove a Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839 Running Cluster Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840 Edit Cluster Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840 Appendix A. VERITAS Backup Exec - Remote Agent . . . . . . . . . . . . . . . . . . . . . . 843 Requirements for the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845 Installing the Remote Agent to Remote Windows Servers . . . . . . . . . . . . . . . . . . . . . . 845 Installing the Remote Agent on a 64-bit Computer Using the Installation Program 846 Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847 Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848 Stopping and Starting the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849 Backing Up Data in a Mixed Environment Using the Remote Agent . . . . . . . . . . . . . 850

16

Administrator’s Guide

Appendix B. VERITAS Backup Exec Admin Plus Pack Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851 Installing the Admin Plus Pack Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851 Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852 Creating a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852 Installing Locally Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852 Installing to a Remote System Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . 853 Copying Jobs, Selection Lists, and Job Templates Between Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855 Advanced Reporting Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857 Scheduling Report Jobs and Setting Notification Recipients . . . . . . . . . . . . . . . . . . 859 Active Alerts by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860 Alert History by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860 Backup Job Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862 Backup Set Details by Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863 Backup Size By Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864 Backup Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865 Daily Job Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866 Daily Network Device Utilization Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867 Device Usage by Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868 Event Recipients Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868 Failed Backup Jobs Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869 Job Distribution by Device Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870 Job Queue Status Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870 Job Templates Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871 Machines Backed Up Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872 Media Required for Recovery Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873 Move Media to Vault Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874 Overnight Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874 Problem Files Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875 Recently Written Media Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876 Administrator’s Guide - Table of Contents

17

Resource Risk Assessment Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877 Retrieve Media from Vault Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878 Scheduled Server Workload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878 Template Definition Usage Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879 Appendix C. VERITAS Backup Exec - Intelligent Disaster Recovery Option . . . 881 Requirements for Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884 Installing the IDR Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884 Using an Evaluation Version of the IDR Option . . . . . . . . . . . . . . . . . . . . . . . . . . . 885 Getting Started with IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885 Setting Data Paths for the *.dr Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888 Creating and Updating Recovery Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891 Choosing Generic or Current SCSI Drivers for Windows NT . . . . . . . . . . . . . . . . 893 Requirements for Running the IDR Preparation Wizard . . . . . . . . . . . . . . . . . . . . 894 Running the IDR Preparation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 896 Creating A Full Set of Diskettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 897 Creating a Bootable CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901 Creating a Bootable Tape Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903 Creating the Intelligent Disaster Recovery Diskettes Only . . . . . . . . . . . . . . . . . . . 905 Updating the Full Set of Disaster Recovery Diskettes . . . . . . . . . . . . . . . . . . . . . . . 907 Updating the Intelligent Disaster Recovery Diskettes Only . . . . . . . . . . . . . . . . . . 909 Updating Bootable Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912 Preparing IDR Media Via Other Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915 Using IDR to Recover a Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917 Changing Hardware in the Computer to be Recovered . . . . . . . . . . . . . . . . . . . . . 918 Using IDR To Recover IBM Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919 Using IDR To Recover Windows 2000 Computers . . . . . . . . . . . . . . . . . . . . . . . . . 919 Booting the Computer in an IDR Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921 Using the Windows Setup in an IDR Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923 Using the Disaster Recovery Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926

18

Administrator’s Guide

Altering Hard Drive Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930 Recovering Computers Requiring OEM-Specific SCSI Drivers . . . . . . . . . . . . . . . 931 Performing a Manual Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932 Performing Remote IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933 Microsoft SQL Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936 Microsoft Exchange Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937 SharePoint Portal Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937 Appendix D. VERITAS Backup Exec - SAN Shared Storage Option . . . . . . . . . . . . 939 Requirements for the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . 941 Installing the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 942 About Devices in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 943 Monitoring Drives in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . . . 944 Viewing Media in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . 946 Using Drive Pools with the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . 947 Using Device Operations with the SAN Shared Storage Option . . . . . . . . . . . . . . 948 Sharing Robotic Libraries Between Backup Exec for NetWare Servers and Backup Exec for Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949 Scheduling and Viewing Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956 Sharing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 958 Cataloging Media in SAN SSO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 958 Media Rotation in SAN SSO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959 Designating a New Database Server and Setting Up Servers . . . . . . . . . . . . . . . . . . . . 960 Tips for Maintaining the Database Server and the ADAMM Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 960 Creating a Standby Primary Database Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 961 Starting and Stopping Backup Exec Services on Multiple Servers . . . . . . . . . . . . . 962 Troubleshooting and Recovering Failed Components . . . . . . . . . . . . . . . . . . . . . . . . . . 963 Checklist for Troubleshooting Devices That Have Gone Offline . . . . . . . . . . . . . . 963 Replacing a Fibre to SCSI Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965 Replacing the Hub or Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966 Administrator’s Guide - Table of Contents

19

Appendix E. VERITAS Backup Exec - ServerFree Option . . . . . . . . . . . . . . . . . . . 967 Understanding ServerFree Backup Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967 ServerFree Backup Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970 Installing the ServerFree option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972 Running the ServerFree Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 Restoring A ServerFree Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975 Appendix F. VERITAS Backup Exec - Advanced Open File Option . . . . . . . . . . . 977 Understanding the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977 Snapshot Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 978 Requirements for Using the Advanced Open File Option . . . . . . . . . . . . . . . . . . . 980 Installing the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981 Installing and Uninstalling the Advanced Open File Option to Remote Windows Servers Using the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982 Uninstalling the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983 Changing the Advanced Open File Option Default Settings . . . . . . . . . . . . . . . . . . . . 984 Using the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987 Selecting the Advanced Open File Option for a Single Backup Job . . . . . . . . . . . 987 Setting Advanced Open File Option as the Default Setting for All Backup Jobs . 989 Checking the Job Log When Using the Advanced Open File Option . . . . . . . . . . 991 Snap Starting a VERITAS Volume Manager Volume . . . . . . . . . . . . . . . . . . . . . . . . . . 992 Advanced Open File Option Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993 Appendix G. VERITAS Backup Exec - Agent for Microsoft SQL Server . . . . . . . 999 Requirements for Using the SQL Agent with SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . 1000 Installing the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001 Using Backup Exec Logon Accounts for SQL 2000 Resources . . . . . . . . . . . . . . . . . . 1002 Backup Strategies for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004 Consistency Checks for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006 Using the Advanced Open File Option with SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . 1007 Setting Backup Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008 20

Administrator’s Guide

Backing Up SQL 2000 Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012 Backing Up SQL 2000 Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014 Backing Up SQL 2000 Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1016 Restore Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018 About Restoring SQL 2000 Databases and Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . 1023 Restoring from SQL 2000 Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024 Restoring from SQL 2000 Transaction Logs Up to a Point in Time . . . . . . . . . . . 1025 Restoring from SQL 2000 Transaction Logs Up to a Named Transaction . . . . . . 1026 Restoring from SQL 2000 Filegroup Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027 Restoring the SQL 2000 Master Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1030 Redirecting Restores for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032 Setting Default Backup and Restore Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . 1035 Preparing for Disaster Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041 Disaster Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042 Manual Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1043 About the Agent for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1047 Requirements for Agent for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048 Installing the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049 Using Backup Exec Logon Accounts for SQL 7.0 Resources . . . . . . . . . . . . . . . . . . . . 1050 Backup Strategies for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1052 Consistency Checks for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054 Setting Backup Options for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055 Backing Up SQL 7.0 Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058 Backing Up SQL 7.0 Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1060 Backing Up SQL 7.0 Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1062 Restore Options for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064 About Restoring SQL 7.0 Databases or Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1068 Restoring from SQL 7.0 Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070 Restoring from SQL 7.0 Transaction Logs Up to a Point in Time . . . . . . . . . . . . . 1071 Restoring from SQL 7.0 Filegroup Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072 Administrator’s Guide - Table of Contents

21

Restoring the SQL 7.0 Master Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074 Redirecting Restores for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076 Setting Default Backup and Restore Options for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . 1079 Preparing for Disaster Recovery of SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1084 Disaster Recovery of SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1085 Manual Recovery of SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086 Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer . . . 1089 Backing up SQL Server Using the SQL Server Writer . . . . . . . . . . . . . . . . . . . . . 1089 Restoring SQL Server Using the SQL Server Writer . . . . . . . . . . . . . . . . . . . . . . . 1090 Appendix H. VERITAS Backup Exec - Agent for Microsoft Exchange Server . . 1093 About Using the Exchange Agent with Exchange 2000 and 2003 . . . . . . . . . . . . . . . 1093 Requirements for Using the Exchange Agent with Exchange 2000 and 2003 . . 1094 Installing the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094 Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources . . . 1095 Backup Strategies for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096 Recommended Configurations for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . 1099 Backup Options for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1100 Backing Up Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104 Reviewing Circular Logging for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . 1105 Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders . . . . . . . . . . . . 1106 Restore Options for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111 Restoring Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1114 . . .Redirecting Exchange 2000 and 2003 Storage Group and Database Restores 1115 Restoring Exchange 2003 Data Using the Recovery Storage Group . . . . . . . . . . . . . 1117 Redirecting Exchange 2003 Restores Using the Recovery Storage Group . . . . . 1119 Restoring Exchange 2000 and 2003 Mailboxes and Public Folders . . . . . . . . . . . . . . 1121 Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003 . . 1123 Setting Default Backup and Restore Options for Exchange 2000 and 2003 . . . . . . . 1127 Preparing for Disaster Recovery of Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . 1131

22

Administrator’s Guide

Disaster Recovery for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1132 About Using the Exchange Agent with Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . 1135 Requirements for Using the Exchange Agent with Exchange 5.5 . . . . . . . . . . . . . . . 1135 Installing the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1136 Using Backup Exec Logon Accounts with Exchange 5.5 Resources . . . . . . . . . . . . . . 1136 Backup Strategies for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137 Recommended Configurations for Exchange 5.5 Server . . . . . . . . . . . . . . . . . . . . 1139 Backup Options for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1140 Backing Up Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1144 Reviewing Circular Logging for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145 Backing Up Exchange 5.5 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . 1145 Restore Options for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149 Restoring Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151 Redirecting Exchange 5.5 Database Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153 Restoring Exchange 5.5 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . . . 1155 Redirecting Mailbox and Public Folder Restores in Exchange 5.5 . . . . . . . . . . . . 1157 Setting Default Backup and Restore Options for Exchange 5.5 . . . . . . . . . . . . . . . . . 1161 Preparing for Disaster Recovery of Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1167 Disaster Recovery for Exchange Server 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168 Protecting Microsoft Exchange Server 2003 Using the Exchange Writer . . . . . . . . . 1171 Backing Up Exchange Server 2003 Using the Exchange Writer . . . . . . . . . . . . . . 1172 Restoring Exchange Server 2003 Using the Exchange Writer . . . . . . . . . . . . . . . . 1173 Appendix I. VERITAS Backup Exec - Library Expansion Option . . . . . . . . . . . . . 1175 Setting Up Robotic Library Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175 Configuring Multi-drive Robotic Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176 Installing the Library Expansion Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177 Starting Backup Exec After Installing the Library Expansion Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177 Viewing Robotic Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179

Administrator’s Guide - Table of Contents

23

Appendix J. Backup Exec Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . 1181 How the Desktop and Laptop Option Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1182 Installing the Backup Exec Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . 1184 Updating DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184 Deploying the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184 Using the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186 Creating Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187 Connecting to a Backup Exec Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187 The DLO Overview View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189 Setting Up DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191 Creating DLO Storage Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191 Setting up a DLO Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195 Configuring the Global Exclude List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1206 Setting up Automated User Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1206 Managing Desktop Agent Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1212 Restoring Files and Folders from the DLO Administration Console . . . . . . . . . . . . 1219 Searching for Desktop Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1222 Deleting a Desktop Computer from DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1223 Monitoring DLO Job Histories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1224 Setting Job History View Filters on the DLO Administration Console . . . . . . . . 1227 Monitoring Alerts on the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . 1228 Configuring Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1232 Managing Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1233 Alert Grooming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1234 Maintaining the DLO Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1235 Clustering the Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1235 Using the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1238 Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1238 System Requirements for the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1239 Using the Desktop Agent Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1240 24

Administrator’s Guide

Installing the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1244 Using the Desktop Agent to Back Up Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . 1245 Modifying Desktop Agent Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1253 Synchronizing Desktop User Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257 Viewing the Desktop Agent Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1262 Restoring Files Using the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1263 Searching for Desktop Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1266 Monitoring Job History in the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1268 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1271 Troubleshooting the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . . . 1271 Troubleshooting the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1275 Glossary of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1277 Appendix K. VERITAS Backup Exec - Agent for Oracle Server . . . . . . . . . . . . . . 1281 Requirements for Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1282 Backup Strategies for An Oracle Database Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1282 Types of Oracle Database Data You Can Protect . . . . . . . . . . . . . . . . . . . . . . . . . . 1283 Requirements for Configuring the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1284 Creating a New Oracle User Account for the Oracle Agent . . . . . . . . . . . . . . . . . 1285 Verifying ARCHIVELOG Mode and Automatic Archival Settings . . . . . . . . . . . 1285 Running Multiple Database Instances on a Single Server . . . . . . . . . . . . . . . . . . . 1287 Using Fully Specified Paths for Oracle Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . 1288 Understanding the Oracle Agent Configuration Utility . . . . . . . . . . . . . . . . . . . . 1289 Installing the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1290 Configuring the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1291 Adding Media Servers to Use with the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . 1294 Backing Up Data Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1295 Backing Up an Entire Online Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1295 Backing Up Individual Online Tablespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1297 Backing Up a Closed Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1298

Administrator’s Guide - Table of Contents

25

Restoring the Oracle Database Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . 1299 Restoring an Online Oracle Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1300 Restoring a Closed Oracle Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1301 Restoring Individual Tablespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1302 Restoring the Database Control File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1303 Disaster Recovery Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1304 Disaster Recovery Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1304 Recovering a Remote Oracle Database Server from a Disaster . . . . . . . . . . . . . . 1305 Recovering a Combination Oracle Database Server/Media Server . . . . . . . . . . 1306 Oracle Agent Error Message Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1307 Appendix L. VERITAS Backup Exec - Agent for Lotus® Domino™ . . . . . . . . . . 1309 Lotus Domino Agent Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1310 Installing the Lotus Domino Agent on the Media Server . . . . . . . . . . . . . . . . . . . . . . 1311 Viewing and Selecting Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1312 Configuring Default Lotus Domino Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1314 Backing Up Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315 Supported Lotus Domino Database Configurations . . . . . . . . . . . . . . . . . . . . . . . 1315 Lotus Domino Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1316 Backup Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1317 Restoring Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1320 Selecting Lotus Domino Databases for Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321 Restore Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1323 Redirecting Restore Jobs for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . 1324 Preparing for Disaster Recovery on a Lotus Domino Server . . . . . . . . . . . . . . . . . . . 1325 Disaster Recovery of a Lotus Domino Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1326 Disaster Recovery of a Lotus Domino Server Using Archive Logging . . . . . . . . 1327 Disaster Recovery of a Lotus Domino Server Using Circular Logging . . . . . . . . 1328

26

Administrator’s Guide

Appendix M. VERITAS Backup Exec - Agent for R/3 for Oracle Server

. . . . . . . 1329

Backup Exec R/3 Agent Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1330 Backup Exec Alerts and the BACKINT Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 1331 Requirements for Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331 Installing the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1332 Using the R/3 Agent to Back Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . 1332 Specifying Backup Exec Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1333 Backing Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1335 Restoring the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1336 Disaster Recovery Using the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . 1337 Disaster Recovery Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338 Recovering a Remote R/3 Database Server from a Disaster . . . . . . . . . . . . . . . . . 1338 Recovering a Combination R/3 Database Server/Media Server . . . . . . . . . . . . . 1339 Appendix N. VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1341 Requirements for the SharePoint Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1342 Installing the SharePoint Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1343 Backing Up a SharePoint Portal Server or Workspace . . . . . . . . . . . . . . . . . . . . . . . . . 1343 Backing Up Folders and Documents from a SharePoint Portal Workspace . . . . 1343 Restoring SharePoint Portal Servers and SharePoint Portal Workspaces . . . . . . . . . 1345 Restoring a SharePoint Portal Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1345 Restoring a SharePoint Portal Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1346 Redirecting SharePoint Portal Server Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . . . 1347 Redirecting SharePoint Portal Workspace Restore Jobs . . . . . . . . . . . . . . . . . . . . . 1348 Disaster Recovery of a SharePoint Portal Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1351 Uninstalling and Reinstalling the SharePoint Portal Server Software . . . . . . . . . 1352 Restoring SharePoint Portal Server Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1352

Administrator’s Guide - Table of Contents

27

Appendix O. VERITAS Backup Exec - Remote Agent for NetWare Servers . . . 1353 Requirements for the Remote Agent for NetWare Servers . . . . . . . . . . . . . . . . . . . . . 1354 Maximizing Remote Agent Performance on the NetWare Server . . . . . . . . . . . . 1354 Installing the Remote Agent for NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . 1355 Using NetWare Servers 5.x and 6.x in a TCP/IP Only Environment . . . . . . . . . 1356 Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server . . . . . . 1356 Unloading the Remote Agent for NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . 1357 About Backing Up NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1358 Backing up the NetWare Directory Services (NDS) . . . . . . . . . . . . . . . . . . . . . . . . 1359 Backing Up NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1361 About Restoring NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1363 Restoring NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1363 Default Settings for the Remote Agent for NetWare Servers . . . . . . . . . . . . . . . . . . . 1365 Saving Configuration Information for the NetWare Server . . . . . . . . . . . . . . . . . . . . 1368 Disaster Recovery of NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1369 Appendix P. VERITAS Backup Exec - Tivoli Storage Manager Option . . . . . . . 1371 Requirements for the TSM Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1371 Backup Exec as a TSM Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1372 TSM Backup Exec Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1373 Preparing the TSM Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1375 Allocating Storage Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1375 Creating The bexpi.dsm Storage Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1376 Running the BEX.MAC Macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378 Enabling TSM Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1379 Changing the Defaults for Backup Exec for Windows Servers . . . . . . . . . . . . . . . . . 1379 BEX.MAC Macro Command Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1383 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386 Viewing TSM-related Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386 TSM Problem Resolutions for Backup Exec for Windows Servers . . . . . . . . . . . 1387

28

Administrator’s Guide

Appendix Q. Accessibility and Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1389 Keyboard Navigation and Shortcuts in Backup Exec 9.1 . . . . . . . . . . . . . . . . . . . . . . . 1390 General Keyboard Navigation Within the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1390 Keyboard Navigation Within Dialog Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1390 Keyboard Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1392 Support for Accessibility Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1395 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1397 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1407

Administrator’s Guide - Table of Contents

29

30

Administrator’s Guide

Using Backup Exec Documentation This comprehensive manual provides detailed information and procedures for using VERITAS Backup Exec for Windows Servers. Topics covered in this manual require the reader to have a working knowledge of the Windows operating environment.

Conventions The following conventions are used in this manual:

Steps

Numbered steps are listed as 1.,

2., …etc.

Text that you type

Text that you are required to type on the keyboard is preceded by the word "Type" and may be followed by any keys that you must press: For example: Type a:install and press <Enter>.

Text that you replace

Text that you must replace is shown in an italic font. For example: JOB_PRIORITY=priority

Items on the interface

Items that are on the Backup Exec interface are shown in a bold font. For example: On the Properties pane, under Settings, click Exchange

Keys

Keys appear in angle brackets (< >). For example: <Enter>, <Esc>, , etc. When two or more keys need to be pressed simultaneously to perform a function, they appear in angle brackets with a plus sign. For example: <Shift + F1>

31

Conventions

32

Administrator’s Guide

Introduction

1

Introducing Backup Exec

Backup Exec is a high-performance data management solution for Windows® servers networks. With its client/server design, Backup Exec provides fast, reliable backup and restore capabilities for servers and workstations across the network. Backup Exec is available in configurations that can accommodate multi-platform networks of all sizes: VERITAS Backup ExecTM for Windows® Servers

Installs on and protects any supported version of Microsoft Windows Server 2003, Windows 2000, or Windows NT 4. Also includes Backup Exec agent software to protect unlimited remote workstations running on Windows XP Professional, Windows 2000 Professional, Windows NT 4 Workstation, Windows Me, Windows 98, UNIX, and Macintosh platforms. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option. Support for protecting additional Windows Server 2003, Windows 2000, or Windows NT 4 servers, NetWare servers, databases, open files, and more can be purchased separately.

33

Small Business Server

Installs on and protects supported versions of Microsoft Small Business Server. Two versions of Backup Exec for Windows Small Business Server are available: Standard and Premium. The Standard version can be installed only on a computer with the Microsoft Small Business Server Standard Edition operating system. It includes the Backup Exec for Windows Servers Agent for Microsoft Exchange Server and the Intelligent Disaster Recovery Option. The Premium version can be installed on a computer with Microsoft Small Business Server for Windows Server 2003, NT 4, or Windows 2000. It includes the Backup Exec for Windows Servers Agent for Microsoft Exchange Server, Agent for Microsoft SQL Server, and Intelligent Disaster Recovery Option. You can purchase Small Business Server versions of the following options to add to either the Standard or Premium versions: Library Expansion Option, Advanced Open File Option, Desktop and Laptop Option (75-user license only), and the Remote Agent for Windows Servers. Both the Standard and Premium versions support client workstations running Windows XP Professional, Windows 2000 Professional, Windows NT 4 Workstation, Windows Me, Windows 98, and Windows XP. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option. To protect additional Windows 2000, or Windows NT 4 servers, NetWare servers, or databases you must upgrade to the Backup Exec for Windows Servers Edition.

QuickStart Edition (OEM release only)

Installs on and protects any supported version of Microsoft Windows Server 2003, Microsoft Windows NT 4 or Windows 2000. Also includes Backup Exec agent software for workstations running on Windows XP Professional, Windows 2000 Professional, Windows NT 4.0 Workstation, Windows Me, Windows 98, UNIX, and Macintosh platforms. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option.

See also: “Backup Exec Options” on page 37

34

Administrator’s Guide

What’s New in This Release This release of Backup Exec includes the following new features and capabilities:

VERITAS Backup Exec Desktop and Laptop Option (DLO)

DLO enables you to protect employees’ data on their desktops and laptops. The Backup Exec Administrator sets the backup and restore rights for each employee. DLO backs up the employee’s data to a storage location on the network. The data on the network can then be backed up to media using Backup Exec.

Support for Windows Storage Server 2003

The Backup Exec Web Administration Console (BEWAC) provides support for Windows Storage Server 2003.

Remote Agent support for The Remote Agent for 64-bit systems provides protection of remote 64-bit systems 64-bit Windows resources. The 64-bit Remote Agent supports the: Š

Shadow Copy Components file system

Š

Backup Exec Advanced Open File Option

Š

Backup Exec Agent for Microsoft SQL Server on a 64-bit version of SQL Server 2000

Microsoft Exchange 2003 Writer/Snaphot support

The Shadow Copy Components file system for Windows Server 2003 has been enhanced to include support for the Microsoft Exchange 2003 Writer, which protects Microsoft Exchange 2003 via the Volume Shadow Copy Service snapshot.

Protection of Microsoft Exchange 2003 via the Exchange Agent

The Exchange Agent protects Microsoft Exchange 2003 data and supports the Recovery Storage group feature.

Microsoft Small Business Two versions of Backup Exec for Windows Small Business Server are Server 2003 Standard and available: Standard and Premium. Premium versions The Standard version can be installed only on a computer with the Microsoft Small Business Server Standard Edition operating system. It includes the Backup Exec for Windows Servers Agent for Microsoft Exchange Server and the Intelligent Disaster Recovery Option. The Premium version can be installed on a computer with Microsoft Small Business Server for Windows Server 2003, NT 4, or Windows 2000. It includes the Backup Exec for Windows Servers Agent for Microsoft Exchange Server, Agent for Microsoft SQL Server, and Intelligent Disaster Recovery Option.

Chapter 1, Introducing Backup Exec

35

Introduction

What’s New in This Release

What’s New in This Release

Admin Plus Pack Option installation selection update

When you select the Admin Plus Pack for installation, the following are selected for installation: Š

Push Install Media Servers

Š

Admin Plus Pack Option Reports

Š

Push of Jobs

If you want to include the Clone CD feature of the Admin Plus Pack Option, you must select it for installation. Quick Installation Guide

36

The Quick Installation Guide is a printed manual that is shipped with Backup Exec. It provides the information you need to install Backup Exec on a local server. It does not replace the Backup Exec Administrator’s Guide, which is available in electronic format on the Backup Exec installation CD or in printed format from the VERITAS DocStore.

Administrator’s Guide

Backup Exec Options You can purchase the following options for your Backup Exec configuration: ◆

VERITAS Backup Exec Library Expansion Option (LEO) enables support for multi-drive tape or optical robotic libraries and library storage systems. When utilizing the Advanced Device And Media Management (ADAMM) features, the Library Expansion Option provides extensive configuration and management capabilities which include unattended backup and restore operations, and bar code reader and portal support. Device partitioning allows you to assign specific robotic library slots for backup targets. For more information, see “VERITAS Backup Exec Library Expansion Option” on page 1175.



VERITAS Backup Exec Advanced Open File Option ensures that all files on your network are protected even if they are being used. Whether used alone or in combination with specific database agents, this option handles open files at the volume level and is seamlessly integrated with Backup Exec. You do not need to know which files are open ahead of time; just set a scheduled backup to use this option. For more information, see “VERITAS Backup Exec - Advanced Open File Option” on page 977.



VERITAS Backup Exec Intelligent Disaster Recovery Option (IDR) provides a recovery solution for both local and remote Windows systems. This option eliminates the need to manually re-install the entire operating system after a system crash. Using diskettes, CD-R/CD-RW or bootable tape, IDR gets you back online fast allowing you to restore from your last complete backup set - including full, incremental, differential and working set backups. For more information, see “VERITAS Backup Exec Intelligent Disaster Recovery Option” on page 881.



VERITAS Backup Exec Admin Plus Pack Option provides features designed for distributed data management of your media and remote servers, including the ability to create a clone CD image so you can install Backup Exec on additional servers using the same installation settings. This option also allows you to copy jobs, selection lists, and templates between media servers and provides advanced reporting capabilities, such as scheduling a report and e-mailing report output. For more information, see “VERITAS Backup Exec - Admin Plus Pack Option” on page 851.



VERITAS Backup Exec Agent for Microsoft Exchange Server provides a fast and flexible way of protecting your online Exchange 5.5 and Exchange 2000 and 2003 Server data. This agent provides complete individual mailbox backup (also utilizing single instance restore), including protection for embedded messages, objects, attributes and all Outlook components. For more information, see “VERITAS Backup Exec - Agent for Microsoft Exchange Server” on page 1093.

Chapter 1, Introducing Backup Exec

37

Introduction

Backup Exec Options

Backup Exec Options

38



VERITAS Backup Exec Agent for Microsoft SQL Server fully protects active databases and verifies all of your SQL v7.0 and SQL 2000 data automatically. SQL 7.0 and SQL 2000 users can customize their data protection needs down to the filegroup level. For fast point-in-time backups, you can use this option to run transaction log backups with truncation. Redirected restores allow you to easily restore SQL data to other SQL servers on the network. Multi-pipe support along with SQL VDI provides users the easiest and fastest way to complete SQL database protection. For more information, see “VERITAS Backup Exec - Agent for Microsoft SQL Server” on page 999.



VERITAS Backup Exec Remote Agent for NetWare Servers expands network-wide data protection by providing a Client Access License (CAL), fully protecting all NDS information across NetWare 5.1 and 6.x environments. In addition to backing up NetWare servers from your Windows media server, you get 100 percent SMS compatibility supporting the current versions of NetWare. The exclusive Agent Accelerator ™ technology maximizes backup performance and reduces network traffic by using source level compression and distributed processing. For more information, see “VERITAS Backup Exec - Remote Agent for NetWare Servers” on page 1353.



VERITAS Backup Exec Remote Agent for Windows® Servers provides a Client Access License (CAL) to enable protection of remote Windows servers. With its exclusive Agent Accelerator™ technology, the Remote Agent uses source compression and distributed processing to optimize backup performance. For more information, see “VERITAS Backup Exec - Remote Agent” on page 843.



VERITAS Backup Exec Agent for Oracle® provides seamless online backup protection for Oracle Database Server versions 8.0.5, 8i-8.1.6, 9i and Oracle Application Server 9i. Integrating Oracle backup with the advanced features of Backup Exec provides data protection of both individual table spaces as well as complete Oracle databases. You can also include archived redo files and control files without taking them offline. For more information, see “VERITAS Backup Exec - Agent for Oracle Server” on page 1281.



VERITAS Backup Exec Agent for R/3™ for Oracle® Server provides superior data protection by allowing backups of critical data while the application is still online and in use. The R/3 Agent, certified by SAP, is a reliable solution that allows Backup Exec to provide both local and remote protection of the latest versions of SAP™R/3™ databases utilizing the SAP (BC-BRI BACKINT) interface while enabling you to efficiently manage your data. For more information, see “VERITAS Backup Exec Agent for R/3 for Oracle Server” on page 1329.



VERITAS Backup Exec Agent for Lotus® Domino™ provides seamless online backup protection for versions 5 and 6. Using Lotus Domino APIs, the Agent for Lotus Domino now fully supports transactional logging, providing users with uncompromising data protection of the entire Lotus Domino server. For more information, see “VERITAS Backup Exec - Agent for Lotus® Domino™” on page 1309. Administrator’s Guide



VERITAS Backup Exec SAN Shared Storage Option (SAN SSO) allows Backup Exec to operate in a Storage Area Network (SAN), providing a high performance LAN-free backup solution. SAN SSO allows multiple distributed media servers to share common, centralized storage devices connected over a SAN. This configuration provides greater efficiency and fault tolerance. In addition to increasing performance and backup speeds in the SAN environment, the Shared Storage Option load balances backup activity across multiple Backup Exec media servers and centralizes management tasks while lowering the total cost of hardware ownership. For more information, see “VERITAS Backup Exec - SAN Shared Storage Option” on page 939.



VERITAS Backup Exec - Tivoli Storage Manager (TSM) Option lets you combine the speed and localized control of Backup Exec with the TSM policy-based system of centralized storage management. This option allows the TSM server’s storage resources to appear as a robotic library in the list of target devices on the Backup Exec server. Backup Exec administrators can then direct the output of any Backup Exec job to the TSM server simply by selecting the name of the TSM robotic library as the destination when submitting the job. For more information, see “VERITAS Backup Exec - Tivoli Storage Manager Option” on page 1371.



VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server protects all of the files and attributes associated with an installation of SharePoint Portal Server. Backup Exec, which offered the first complete backup and recovery solution for SharePoint Portal Server, now allows backup and restore of individual workspaces and documents. Restores can be made to the original SPS information store or redirected to another SPS information store without affecting other workspaces. For more information, see “VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server” on page 1341.



VERITAS Backup Exec - ServerFree Option enables you to increase backup performance by freeing up media server processor resources and moving the backup processing operations to hardware solutions that may be installed in your storage area network environment. Use of this option requires VERITAS Backup Exec Advanced Open File Option and VERITAS Backup Exec SAN Shared Storage Option. For more information, see “VERITAS Backup Exec - ServerFree Option” on page 967.



VERITAS Backup Exec - Desktop and Laptop Option enables you to protect all business data. It provides continuous backup protection whether users are in the office or on the road. Users can synchronize files between their desktop and laptop. For more information, see “VERITAS Backup Exec - Desktop and Laptop Option” on page 1181.

Chapter 1, Introducing Backup Exec

39

Introduction

Backup Exec Options

How Backup Exec Works

How Backup Exec Works In Backup Exec, backup, restore, and utility operations, called jobs, are submitted using the Administration Console. Administrators can run the Administration Console from the media server, a Windows server with storage hardware attached, or from a remote system. After jobs are created, they are processed by the Backup Exec server components running on the media server. All interaction to the Backup Exec system, such as submitting jobs, viewing results, and performing device and media operations, can be done through the Administration Console. The following diagram illustrates how the components work together to provide complete backup and restore functionality to the entire network: How Backup Exec Works Backup Exec administration console

Backup Exec database

storage devices and media

Backup Exec media server running the Backup Exec engine

Backup Exec workstation and server agents

Through the Administration Console, you configure settings, called default options, that you want Backup Exec to use for most jobs. However, you can select to override these default options while setting up a specific jobs, such as a weekly backup of selected workstations. You can create a once-only job, such as a restore of a particular file to a server, or you can schedule recurring jobs, such as daily backup jobs.

40

Administrator’s Guide

Wizards guide you through most Backup Exec operations, including the creation of a backup or restore job, setting up media rotation jobs, and setting media overwrite protection. You can monitor a job’s progress through the Job Monitor, or use Backup Exec’s Calendar to quickly view all jobs scheduled to run for the day. The media server contains media and device databases designed to simplify the process of organizing and allocating storage devices attached to your media server and to aid in preventing media from being accidentally overwritten. Through Backup Exec’s device management functions, you can logically group storage devices together in drive pools. Through the media management function, you can organize, track, and troubleshoot all of the media in your library. You can define overwrite protection periods to ensure that media is not accidentally overwritten, set up automatic media labeling, and view media statistics such as the media’s age, hours of use, number of mounts, bytes written and read, and errors encountered, which are automatically tracked by Backup Exec. After a job has been processed, the job’s results are stored in a job history database. A record of the data that was backed up is kept in Backup Exec’s catalog. The job history is a report of what happened during the processing of the job (statistics, errors, and so on), and the catalog file is the record from which restore selections are made.

Chapter 1, Introducing Backup Exec

41

Introduction

How Backup Exec Works

How Backup Exec Works

42

Administrator’s Guide

Backup Exec installation on the media server includes: ◆

Installing the storage device hardware (controller, drives, robotic libraries) in the media server. Refer to the documentation included with your storage device hardware for installation instructions. Use the appropriate Windows hardware setup functions to configure your controller and storage devices. (Refer to your Microsoft Windows documentation for more information.)



Installing Backup Exec software on the media server. All Backup Exec program files are installed on the media server from the Backup Exec installation CD. During installation, files required for workstation agent installation are also copied to the media server.



Rebooting the media server to initialize changes (when necessary).

The installation program installs Microsoft SQL Server 2000 Desktop Engine (with Service Pack 3a) components required to run Backup Exec. These include SQL Server 2000 core components, MDAC 2.8, and ODBC 3.0. With ODBC, the installation program installs and configures the base 32-bit ODBC administrator v3.0, including runtime DLLs, and the ODBC driver for the Backup Exec catalogs. If you are running applications that use earlier versions of these components, problems may occur due to the upgraded drivers. If problems occur, contact the vendor of the incompatible software to obtain a version compatible with the MDAC. Caution The MDAC version that Backup Exec installs as part of the MSDE 2000 installation is incompatible with a clustered version of Microsoft SQL Server 7.0. Do not install Backup Exec on a clustered version of SQL 7.0 server.

43

Installation

2

Installing Backup Exec

System Requirements

If SQL Server 2000 is already installed on the server, you are prompted to do one of the following: ◆

Install the required Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) components with Backup Exec and create a default Backup Exec instance.



Select a SQL Server 2000 instance that already exists on which to run Backup Exec.

Note If you choose to install Backup Exec into an existing SQL 2000 instance, make sure that SQL 2000 service pack 3a or later is installed before you continue with the installation. When Backup Exec is installed into an existing instance, the automated master database restore feature is not available. To recover the Master database, you must replace it with the Master database copy that Backup Exec automatically creates and updates when the Master database is backed up. When Backup Exec is installed into an instance other than a default Backup Exec instance, the Cluster Configuration Wizard is not available. After installing Backup Exec on the media server, Backup Exec Workstation Agent software can be installed and configured on remote workstations on the network.

System Requirements The following are the minimum system requirements for running this version of Backup Exec: Minimum System Requirements Operating System

Microsoft Windows NT Workstation v4.0 or Microsoft Windows NT Server Operating System v4.0; Service Pack 6a or later. Microsoft Windows 2000 Professional version, Windows 2000 Server version, Windows 2000 Advanced Server, or Windows 2000 Datacenter. Microsoft Windows Server 2003 server family. Microsoft Windows XP Service Pack 1 or later.

44

Internet Browser

Internet Explorer 5.01 or later; however, version 5.5 is recommended.

Processor

Pentium system.

Administrator’s Guide

System Requirements Minimum System Requirements (continued) Memory

Required: 256 MB RAM Recommended: 512 MB (or more for better performance).

Virtual Memory Recommendations: 20 MB above Windows recommended size for total paging file size (total for all disk volumes). To view or set the paging file size: Š

On Windows NT, click the Start button, point to Settings, and then click Control Panel. Double-click System, and then click the Performance tab.

Š

On Windows 2000 or Windows Server 2003, click the Start button, point to Settings, and then click Control Panel. Double-click System, click the Advanced tab, and then click Performance Options.

Disk Space

550 MB hard disk space required after Microsoft Windows is installed (typical installation).

Other Hardware

Š

(Recommended if remote activity is to be performed) Network interface card or a virtual network adapter card.

Š

CD-ROM drive.

Š

(Optional) Printer supported by Microsoft Windows.

Š

(Recommended) A mouse.

Š

(Optional for pager notification) Modem supported by Windows.

Storage Hardware

Chapter 2, Installing Backup Exec

Backup Exec requires at least one storage media drive and/or robotic library and the appropriate controller card. Removable storage devices and non-removable hard drives can also be targeted for backups. Refer to the Backup Exec hardware compatibility list for a complete list of devices that are supported. Support for multi-drive robotic libraries is available separately. Refer to the Windows Hardware Compatibility list for a complete list of supported SCSI controllers.

45

Installation

Note RAM requirements may vary depending on operations performed, the options installed, and the specific machine configuration.

Changing Windows Security

Changing Windows Security You can set up Windows security with the Backup Exec service account to protect your data. Depending on how the Windows network is configured, change security properties for the following scenarios: ◆

Servers in one domain.



Servers and selected workstations in one domain.



Servers in more than one domain.



Servers and workstations in more than one domain.

The following procedures give the Backup Exec service account administrative rights in the appropriate domains and workstations. You must grant the Backup Exec service account administrative rights to give Backup Exec access to the administrative shares (for example, C$) and the ability to protect the Windows registry. Use one of the following procedures, as appropriate for the environment.





For Windows NT 4.0, use the User Manager for Domains tool in the Administrative Tools group.



For Windows 2000, use the Active Directory Users and Computers tool and Domain and Trusts tool in the Active Directory administrative tools group.

If You Are Backing Up Servers (only) in One Domain: ❖



When prompted for a user name in the Service Account window, add the name of an existing or new Service Account (for example, Administrator) as a member of the local Administrators group for the Domain. It is highly recommended that you also enter a password.

If You Are Backing Up Servers and Selected Workstations in One Domain: 1. Add the name of an existing or new Service Account (for example, Administrator) as a member of the Global Domain Admins group. 2. Ensure that on each workstation in the domain you want to back up, the Global Domain Admins group is a member of the workstation’s local Administrators group.

46

Administrator’s Guide

Changing Windows Security ▼

If You Are Backing Up Servers in More Than One Domain:

a. In the Host Domain, permit the Target Domains to trust the Host Domain. b. In each Target Domain, trust the Host Domain. 2. In each Target Domain, add the Host Domain’s name of an existing or new Service Account (for example, Administrator) in the local Administrators group. ▼

If You Are Backing Up Servers and Workstations in More Than One Domain: 1. Establish a One Way Trust Relationship between the Host and Target Domains: a. In the Host Domain, permit the Target Domains to trust the Host Domain. b. In each Target Domain, trust the Host Domain. 2. In each Target Domain, add the Host Domain’s name of an existing or new Service Account (for example, Administrator) in the Local Administrators group. 3. On each workstation to back up, add the Host Domain’s name of an existing or new Service Account (e.g., Administrator) in the Local Administrators group.

Chapter 2, Installing Backup Exec

47

Installation

1. Establish a One Way Trust Relationship between the Host Domain (the domain in which the media server resides) and the Target Domains (the domains that are to be backed up):

Installing Backup Exec

Installing Backup Exec When installing Backup Exec, use the installation program on the Backup Exec CD, or install it from the command line, which is referred to as Silent Mode Installation. The silent mode installation uses the setup.exe program on the Backup Exec CD. If you are installing an evaluation version of Backup Exec, you can install any additional options. To install the Backup Exec Web Administration Console, you must be installing Backup Exec on a server appliance or on a Windows Server 2003 server with the Remote Administration (HTML) components installed. Please note the following information before installing Backup Exec: Minimum system requirements

48

Hardware

Make sure that storage device hardware and associated drivers are properly installed and recognized by the Windows operating system.

System

Exit all programs before installing Backup Exec.

Rights

To install Backup Exec, Administrator rights are required, or the account must belong to an Administrator-equivalent group.

Administrator’s Guide

Installing Backup Exec Minimum system requirements The Backup Exec Service Account

Š

Authenticate as any user and gain access to resources under any user identity.

Š

Create a token object, which can then be used to access any local resources.

Š

Log on as a service.

Š

Administrative rights (provides complete and unrestricted rights to the computer).

Š

Backup operator rights (provides rights to restore files and directories).

Š

Manage auditing and security log.

Due to security implementations in Microsoft Small Business Server, the service account must be "Administrator." On a computer running Windows Server 2003 or Windows XP, you cannot install Backup Exec using a service account that has a blank password. If you attempt to do so, the following error message displays when Backup Exec services are created: "The given password is not correct for account [server]\[username]." You can configure Windows to allow for blank passwords. For more information, see your Windows documentation.

See also: “Installing Backup Exec Using the Installation Program” on page 50 “Installing Backup Exec from the Command Line (Silent Mode)” on page 60

Chapter 2, Installing Backup Exec

49

Installation

All Backup Exec services on the media server run in the context of a user account configured for Backup Exec’s system services. This account can be created during Backup Exec’s installation, or an existing user account can be used. To create a service account for Backup Exec during installation, supply a user name and password when prompted. The account designated for Backup Exec’s services whether it is a new account or an existing user account - will be assigned the following rights:

Installing Backup Exec

Installing Backup Exec Using the Installation Program The Backup Exec CD includes an installation program that guides you through the installation process. Note On Windows NT 4.0 Terminal Server Edition, you must install Backup Exec locally on the Terminal Server using Add/Remove Programs, instead of using the Backup Exec installation program. Because the Add/Remove program does not support UNC paths, you will receive an error message if you attempt to install Backup Exec from a Terminal Server Client. Note If you are installing Backup Exec through Terminal Services and the installation media is on a shared drive (CD-ROM or network share), you must install it using a UNC path. Installation via mapped drives is not supported in this situation. ▼

To install Backup Exec using the installation program: 1. From the installation CD browser, select the option to install VERITAS Backup Exec. The Welcome window appears. 2. Click Next to proceed with the installation. The License Agreement appears. 3. Select I accept the terms of the license agreement, and then click Next. 4. Do any of the following:

50

-

To install to a local computer, select Local Install and Install Backup Exec software and options, click Next, and then continue with step 5 on page 51.

-

To install the Remote Administrator, go to “Installing the Backup Exec Remote Administrator” on page 72.

-

To install Backup Exec media servers and options to remote computers, go to “Installing Backup Exec Media Servers to Remote Computers” on page 54.

-

To install the Backup Exec Remote Agent for Windows Servers or the Advanced Open File Option to remote computers, or the Backup Exec NetWare Agent to a remote NetWare server, go to “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58.

Administrator’s Guide

Installing Backup Exec

Select an option, and then click Next. A dialog that requests your serial numbers appears. 6. You can manually enter the serial numbers for Backup Exec and any options, or you can import an existing besernum.xml file to enter the serial numbers. -

To manually enter the serial numbers for Backup Exec and any additional options, type the serial number into the field, and then click Add. When finished, click Next.

-

To import the serial numbers from a file, click Import, and then browse for and select an existing besernum.xml file. When finished, click Next.

Note When you click Next, the serial numbers you entered are saved to the file besernum.xml, located in the Windows directory. If another installation of Backup Exec 9.1 for Windows Servers is found on the computer, the serial number appears in the Existing Serial Numbers field. To remove an older serial number, select the number and click Remove. A serial number is not required for Backup Exec’s fully functional evaluation version. -

To install a 60-day evaluation copy of the software, click Next without entering serial number information. Installing an evaluation copy enables many options that must be purchased separately and are not included as part of Backup Exec.

Note For information about clustering Backup Exec, see “Installing Backup Exec on a Cluster” on page 762. 7. Review the local features to be installed. All features that are not to be installed have an "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change.

Chapter 2, Installing Backup Exec

51

Installation

5. If Backup Exec Setup detects an existing installation of MS SQL Server 2000, you can allow the required Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) components to be installed with Backup Exec and create a default Backup Exec instance, or you can choose to use a SQL Server 2000 instance that already exists on which to run Backup Exec.

Installing Backup Exec

8. To accept the local features for installation, and to accept the default Destination Folder for Backup Exec, click Next. To select another destination folder for Backup Exec, click Change, and follow the prompts. Note Selecting a mount point as the destination directory is not recommended because the mount point is deleted if Backup Exec is uninstalled. 9. Provide a user name and password that the Backup Exec system services can use (see “The Backup Exec Service Account” on page 49), and then click Next. 10. If prompted, select how to install device drivers for the tape storage devices that are connected to the server, and then click Next. It is recommended that you select Use VERITAS device drivers for all tape devices. 11. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection. 12. Read the Backup Exec installation review, and then click Install. The MSDE 2000 (if selected), VERITAS Update, and Backup Exec program files are installed. 13. When the installation is complete, you can choose to register Backup Exec online, view the readme, create a shortcut to Backup Exec on the desktop, and restart the computer. If Restart System appears, restart the computer in order for the configuration to take effect. If the installation fails, an installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed; this file lists any errors that may have occurred during installation. When prompted, click View Installation Log. See also: “Getting Started” on page 79

52

Administrator’s Guide

Installing Backup Exec

Installing Backup Exec Options on a Local Server

If you have installed the evaluation version of Backup Exec or have installed the Not For Resale (NFR) or the Open Option Suite edition, you can install evaluation versions of the additional options. Note If you are installing Backup Exec through Terminal Services and the installation media is on a shared drive (CD-ROM or network share) you must install using a UNC path. Installation via mapped drives is not supported. ▼

To install an option on a local media server: Note You can also install Backup Exec options using Add/Remove Programs in the Windows Control Panel. 1. Start Backup Exec for Windows Servers or verify that it is running. 2. On the Tools menu, click Serial Numbers and Installation. 3. Click Next when the Welcome window appears. 4. Make sure Local Install and Additional Options are selected, and then click Next. 5. Type the option’s serial number and click Add, or click Import to import the serial number from an existing besernum.xml file, and then click Next. 6. Review the local features to be installed, and then click Next. All features that are not to be installed have an "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. 7. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection.

Chapter 2, Installing Backup Exec

53

Installation

You can install additional options, such as the Library Expansion Option, when you are installing Backup Exec by following the procedures described in “Installing Backup Exec Using the Installation Program” on page 50. However, if you have already installed Backup Exec and want to install additional options, you should first review the section on that option to ensure that you have met all minimum requirements and then continue with the following steps.

Installing Backup Exec

8. Read the Backup Exec installation review, and then click Install. When the installation is complete, you can choose to register Backup Exec online, view the readme, create a shortcut to Backup Exec on the desktop, and restart the computer. 9. Make your selections, and then click Finish. If Restart System appears, you should restart the computer in order for the configuration to take effect. If the installation fails, an installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed; this file lists any errors that may have occurred during installation. If prompted, click View Installation Log, and check this log. 10. After the computer has rebooted, restart Backup Exec for Windows Servers.

Installing Backup Exec Media Servers to Remote Computers You can install Backup Exec media servers and options to remote computers. To install a Backup Exec media server to a remote computer, you must have one of the following installed on the local media server: ◆

The Admin Plus Pack option



An evaluation version of Backup Exec



The Not For Resale (NFR) option

If you are installing Backup Exec through Terminal Services and the installation media is on a shared drive (CD-ROM or network share) you must install using a UNC path. Installation via mapped drives is not supported.

54

Administrator’s Guide

Installing Backup Exec ▼

To install Backup Exec to a remote computer: 1. Do one of the following: If you are installing Backup Exec for the first time, from the installation CD browser, select the option to install VERITAS Backup Exec, and then when prompted, click Next to proceed with the installation. Select I accept the terms of the license agreement, and then click Next.

-

If Backup Exec is already installed, make sure that it is running, and then on the Tools menu, click Serial Numbers and Installation. Click Next when the Welcome window appears.

Note You can also use Microsoft’s Add/Remove Programs utility to install Backup Exec to a remote computer. See your Microsoft documentation for more information. 2. To install Backup Exec media servers and options to remote computers, select Remote Install, and then click Next. Note If you do not need to install any Backup Exec options to the local computer, clear the Local Install selection. 3. On the Backup Exec Remote Features dialog box, in the Destinations Systems pane, right-click Windows Media Servers. 4.

Do one of the following: -

Select Add Remote Computer, browse to select the remote server, and then click Next.

-

Select Add Remote Computer Manually, type the Domain and Computer Name, and then click OK.

5. Enter the user name, password and domain credentials of an account that has administrative rights on the remote computers, and then click OK.

Chapter 2, Installing Backup Exec

55

Installation

-

Installing Backup Exec

6. Select one of the following options:

Item

Description

Remote install with serialized options

Select this option to enter serial numbers for the remote computers. During the install, you are prompted for the serial numbers for the remote computers. If you select this option to install a Backup Exec media server (Windows Media Server) to a remote computer, then you are prompted to select a destination folder. You can accept the default destination folder on the remote computer, or make changes. After selecting this option, continue with step 7 on page 56.

Remote install with cloned local settings

Select this option to install remotely using all of the installation options installed on the local computer. When this option is used, you cannot change any settings on the remote computer. For example, if you have installed the Intelligent Disaster Recovery option locally, this option will also be installed remotely. After selecting this option, continue with step 13 on page 52.

Remote install from clone file settings

Select this option to install remotely using the clone file settings that may be contained on a clone CD image or that could also be contained in a previously created parameter file (see “Creating and Using Installation Parameter Files” on page 66). When this option is selected, you can browse to a parameter file. After selecting this option, continue with step 13 on page 52.

A dialog that requests your serial numbers appears. Note Each remote computer targeted for an option installation must have a unique option serial number. 7. Do one of the following: -

Enter the serial numbers for Backup Exec and any additional options, clicking Add after entering each serial number. When finished, click Next.

-

Click Import, and then browse for and select an existing besernum.xml file. When finished, click Next.

Note When you click Next, the serial numbers you entered are saved to the file besernum.xml, located in the Windows directory. 56

Administrator’s Guide

Installing Backup Exec

8. Provide a user name and password that the Backup Exec system services can use (see “The Backup Exec Service Account” on page 49), and then click Next.

It is recommended that you select Use VERITAS device drivers for all tape devices. 10. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection. 11. Review the features to be installed, and then click Next. All features that are not to be installed have an "X" displayed in the feature icon. 12. Read the Backup Exec installation review, and then click Install. 13. When the installation is complete, click Next, and then click Finish. You may need to restart the computer in order for the configuration to take affect. If the installation fails, an installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed; this file lists any errors that may have occurred during installation. If prompted, click View Installation Log, and check this log.

Chapter 2, Installing Backup Exec

57

Installation

9. If prompted, select how to install device drivers for the tape storage devices that are connected to the server, and then click Next.

Installing Backup Exec

Installing Backup Exec Remote Agents and Options on Remote Servers You can install the Backup Exec Remote Agent to remote Windows computers, the Backup Exec Advanced Open File option to remote computers, and the Backup Exec NetWare Agent to remote NetWare computers. These features are push installed to remote computers from a media server. Push installations save time by eliminating the need for local access at the target computer for the installation to be successful. You cannot push install Backup Exec to a remote Windows XP Professional computer when the operating system on the remote computer is in the ForceGuest configuration and the remote computer is not in a domain. ForceGuest is a configuration that limits incoming users to Guest-level access. Instead, you must locally install the Remote Agent on the Windows XP computer by using the installation CD, or over the network by following the procedure in “Installing Backup Exec from the Command Line (Silent Mode)” on page 60. You cannot push install the 64-bit version of the Remote Agent for Windows Servers. If you are using the Desktop and Laptop Option, you cannot push install the Desktop Agent. Note If you are installing Backup Exec remote agents and options through Terminal Services and the installation media is on a shared drive (CD-ROM or network share) you must install using a UNC path. Installation via mapped drives is not supported. ▼

To install a feature to a remote computer: 1. Do one of the following: -

If you are installing Backup Exec for the first time, from the installation CD browser, select the option to install VERITAS Backup Exec, and then when prompted, click Next to proceed with the installation. Select I accept the terms of the license agreement, and then click Next.

-

If Backup Exec is already installed, make sure that it is running, and then on the Tools menu, click Serial Numbers and Installation. Click Next when the Welcome window appears.

Note You can also use Microsoft’s Add/Remove Programs utility to install Backup Exec to a remote computer. See your Microsoft documentation for more information.

58

Administrator’s Guide

Installing Backup Exec

2. To install Backup Exec remote agents and options to remote computers, select Remote Install, and then click Next.

3. On the Backup Exec Remote Features dialog box, in the Destinations Systems pane, right-click either of the following:

4.

-

Windows Agent/Options Computers. Enables you to install the Backup Exec Remote Agent to a remote Windows computer, or to install the Advanced Open File Options to a remote computer.

-

NetWare Agent Server. Enables you to install the Backup Exec NetWare Agent to a remote NetWare server.

Do one of the following: -

Select Add Remote Computer, browse to select the remote server, and then click Next.

-

Select Add Remote Computer Manually, type the Domain and Computer Name, and then click OK. This option is not available for NetWare servers.

5. Enter the user name, password and domain credentials of an account that has administrative rights on the remote computers, and then click OK. 6. Review the features to be installed, and then click Next. All features that are not to be installed have an "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. 7. Read the installation review, and then click Install. 8. When the installation is complete, click Next, and then click Finish. You may need to restart the computer in order for the configuration to take effect. If the installation fails, an installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed; this file lists any errors that may have occurred during installation. If prompted, click View Installation Log, and check this log. You can try to manually install the Remote Agent for Windows Servers (see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.)

Chapter 2, Installing Backup Exec

59

Installation

Note If you do not need to install any Backup Exec options to the local computer, clear the Local Install selection.

Installing Backup Exec

Installing Backup Exec from the Command Line (Silent Mode) Installing Backup Exec from the command line is referred to as Silent Mode Installation. This method of installation uses the setup.exe program on the Backup Exec CD, a series of command switches, and the -S switch. Silent mode installation is only supported if Backup Exec is being installed on a computer for the first time. Requirements for Command Line Installation include:





Backup Exec installation CD.



Administrator privileges on the computer where you want to install, configure, or uninstall Backup Exec.

To install Backup Exec from the command line: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE. 4. Type setup /TS: and the appropriate switches. For example: setup /TS: /USER:<user> /DOM:domain /PASS:password /SNO:serial number -S For descriptions of the switches, see “Command Line Switches for Backup Exec Silent Mode Installation” on page 61. If you use the command line switches without the -S switch, the Backup Exec installation program launches with the command line parameters as defaults for the installation options. For example, if -S had been left in the above example, the Backup Exec installation program launches with the user name, domain, password, and serial number appearing on the installation dialog boxes. 5. Press <Enter>. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed; this file lists any errors that may have occurred during installation, and is the only source of feedback when running setup.exe. Check this job log to determine if you need to reboot the computer to complete the installation.

60

Administrator’s Guide

Installing Backup Exec

Command Line Switches for Backup Exec Silent Mode Installation The command line switches used for silent mode installation of Backup Exec are described in the following table. Note the following general rules for using these switches: Substitute values appropriate for your environment for values shown in italics; for example substitute your password for password.



Enclose the value in quotation marks if it contains spaces, such as “Operations Weekly Backup”.

Note Additional switches appearing in BOLD are required. Command Line Switches for Silent Mode Installation of Backup Exec Switch

Additional Switches

/TS:

Description Installs Backup Exec using the options specified with the additional switches. The /USER:"user" /DOM:"dm" /PASS:"pw" is required.

/USER:"user" /DOM:"dm" /PASS:"pw"

Required. Specifies an existing user, domain, and password for the Backup Exec system service account. Silent mode installation will not create a user. Note When using /PASS:, if a quote is needed as part of the password, specify it as \". For example, if the password is pass"word, type it as /PASS:pass\"word. If the characters \" are used as part of the password, you must precede each character with a \. For example, if the password is pass\"word, type it as /PASS:pass\\\"word.

Chapter 2, Installing Backup Exec

/DEST:"path"

Specifies the path where Backup Exec will be installed. Otherwise, the default path Program Files\VERITAS\Backup Exec\NT is used.

/DOCS:

Installs online documentation.

61

Installation



Installing Backup Exec Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch

Additional Switches

Description

/NOINSTALL:

Allows you to select all install options without actually installing the Backup Exec software. This option can be used in conjunction with the /CPF: or /XML: switches.

/SNO:serial number

Specifies one or more serial numbers to use for installing Backup Exec and additional options. Serial numbers are not required to install the Remote Administrator. You may specify up to 99 serial numbers. If none are specified, then an Evaluation copy of Backup Exec is installed. The following examples show how the /SNO switch can be used: /SNO:s1 /SNO:s1 s2 s3 s4 /SNO:s1 /SNO:s2 /SNO:s3 /SNO:s4

/TD:NEW or ALL

/TD:NEW installs tape drivers only for drives that do not have drivers loaded. /TD:ALL installs tape drivers for all drives.

/CPF:"file name"

Creates a file containing all of the installation parameters provided. This file is encrypted.

/XML:"file name"

Creates an XML file containing all of the installation parameters provided. Note The XML file is not encrypted, which exposes parameters such as the password.

62

Administrator’s Guide

Installing Backup Exec Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch

Additional Switches

Description

Chapter 2, Installing Backup Exec

/LOADER:

Installs the Library Expansion Option.

/IDR:

Installs the Intelligent Disaster Recovery Option.

/R3:

Installs the Backup Exec Agent for R/3™ for Oracle® Server.

/OFO:

Installs the Advanced Open File Option.

/TSM:IP address:port

Installs the IBM ADSM/TSM Option.

/SSO:

Installs the SAN Shared Storage Option with this server as the primary server.

/SSO:server name

Installs the SAN Shared Storage Option with this server as the secondary and the <server name> as the primary.

/SHAREPT:

Installs the Agent for Microsoft SharePoint Portal Server.

/EXCH:

Installs the Agent for Microsoft Exchange Server.

/LOTUS:

Installs the Agent for Lotus Domino.

/ORACLE:

Installs the Agent for Oracle Server.

/SQL:

Installs the Agent for Microsoft SQL Server.

/NTA:

Installs the Remote Agent for Windows Servers.

/NWA:

Installs the NetWare Agent.

/SVRFREE:

Installs the ServerFree Option.

63

Installation

Note The following switches are designed for use with Not For Resale, Open Option, and Evaluation versions of Backup Exec only.

Installing Backup Exec Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch

Additional Switches

Description

/BEWSA:

Installs the Backup Exec Web Administration Console

/DLO:

Installs the Backup Exec Desktop and Laptop Option.

/ECM:<EIS server 1> <EIS server 2>...

Installs the ExecView Communication Module. Type setup.exe /? to get the syntax. For example: setup.exe /ECM:myserver1 myserver2 myserver3 -s If a server is not specified, ECM will not be enabled.

See also: “Installing Backup Exec Using the Installation Program” on page 50 “Uninstalling Backup Exec from the Command Line” on page 66

Installing the Remote Administrator from the Command Line You can also use Silent Mode Installation to install the Remote Administrator. Options for the Remote Administrator are specified with the use of additional command switches. ▼

To install the Remote Administrator from the command line: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE 4. Type setup /RA: and the appropriate switches. For example: setup /RA: -s

64

Administrator’s Guide

Installing Backup Exec

The command line switches used for silent mode installation of the Remote Administrator are described in the following table. Remember the following general rules for using these switches: Substitute values appropriate for your environment for values in italics; for example, substitute your password for password.

-

Enclose the value in quotation marks if it contains spaces, such as “Program Files\VERITAS\Backup Exec\NT”.

Command Line Switches for Remote Administrator Silent Mode Installation Switch

Additional Switches

/RA:

Description Installs Remote Administrator using the options specified with the additional switches.

/DEST:"path"

Specifies the path where Remote Administrator will be installed. Otherwise, the default path Program Files\VERITAS\Backup Exec\NT is used.

/DOCS:

Installs online documentation.

/NOINSTALL:

Allows you to select all install options without actually installing the Backup Exec software. This option can be used with the /CPF: or /XML: switches.

/CPF:"file name"

Creates a file containing all of the installation parameters provided. This file is encrypted.

/XML:"file name"

Creates an XML file containing all of the installation parameters provided. Note The XML file is not encrypted, which exposes parameters such as the password.

Chapter 2, Installing Backup Exec

65

Installation

-

Installing Backup Exec

Uninstalling Backup Exec from the Command Line If Backup Exec is already installed, you can use the setup.exe program to uninstall Backup Exec program files and Backup Exec data. ▼

To uninstall Backup Exec using the command line: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE. 4. To remove the Backup Exec program files but keep all of the Backup Exec data, type: SETUP

/UNINSTALL:

To remove the Backup Exec program files and the Backup Exec data, type: SETUP

/REMOVEALL:

Creating and Using Installation Parameter Files If you use the command line switches without the -S switch, the Backup Exec installation program launches with the command line parameters as defaults for the installation options. For example, suppose you type: SETUP /TS: /USER:user /DOM:domain /PASS:password /SNO:serial number The Backup Exec installation program is launched. The screens that allow you to enter the logon credentials and the serial number will appear with the information you provided on the command line. Unless you are installing a Not For Resale (NFR) or Open Options Suite edition, you do not have to enter commands for installing options such as Agent for Microsoft SQL Server or Agent for Microsoft Exchange Server. You can also use the /CPF: and /XML: commands to create a parameter file that contains all of the command line options you provided. This parameter file can then be used to provide the options for installing either Backup Exec or the Remote Administrator. ▼

To create a parameter file for Backup Exec: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE.

66

Administrator’s Guide

Installing Backup Exec

4. Type setup /TS: and the appropriate switches, including /CPF: and the full path name of the parameter file. For example, type:

Backup Exec will be installed on your server and a parameter file containing the user name, domain, password, and serial number will be saved to a floppy diskette. You can use this parameter file to install to another computer. ▼

To use this parameter file: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE. 4. Type: SETUP /PARAMS:"A:\file name" -S 5. If you want to overwrite a parameter, specify the new parameter. For example, to change the password, type: SETUP /PARAMS:"A:\file name" /PASS:new password -S Note To create an XML file containing all parameters, use the /XML: switch. The XML file is not encrypted, which exposes parameters such as the password. See also: “Installing Backup Exec from the Command Line (Silent Mode)” on page 60 “Command Line Switches for Backup Exec Silent Mode Installation” on page 61

Chapter 2, Installing Backup Exec

67

Installation

setup /TS: /USER:user /DOM:domain /PASS:password /SNO:serial number /CPF:"A:\file name" -S

Registering Backup Exec Online

Registering Backup Exec Online Launch the VERITAS Backup Exec Online Registration Wizard from either the install program or from the Help menu. ▼

To register Backup Exec online from the Administration Console: 1. On the Help menu, click Register VERITAS Backup Exec. 2. Follow the wizard prompts. The Online Registration Wizard guides you through submitting a registration form to VERITAS Software Corporation and provides a survey designed to aid VERITAS in understanding how you use the product and in better understanding your needs. Note If your LAN uses a proxy server to connect to the Internet, the online registration may fail with the error "Logon request was denied". To correct this error, change the LAN settings to automatically detect the proxy settings. Refer to your web browser documentation for details on how to change the LAN settings.

Repairing Backup Exec If you have missing or corrupted Backup Exec files or registry keys on the local media server, run the Backup Exec installation program and select the Repair option. The program stops all Backup Exec services, reinstalls corrupted files and registry keys, reinstalls tape devices (stand-alone drives and libraries), and restarts the services. The database is not reinstalled. Any changes made to Backup Exec program files and registry keys will be reset to the original settings. ▼

To run the Repair option: 1. Close the Backup Exec application. 2. Click Start, point to Settings, click Control Panel, and then double-click Add/Remove Programs.

68

Administrator’s Guide

Repairing Backup Exec

3. Do one of the following: For Windows NT, on the Install/Uninstall tab on the Add/Remove Programs Properties dialog box, select VERITAS Backup Exec, and then click Add/Remove.

-

For Windows 2000, Windows XP, or Windows Server 2003, at the Add/Remove Programs dialog box, select VERITAS Backup Exec for Windows Servers, and then click Change.

4. Click Next. 5. Select Local Install and Repair, and then click Next. Note Make sure the option Remote Install is not selected. 6. Select Install. 7. Click Finish.

Chapter 2, Installing Backup Exec

69

Installation

-

Starting and Stopping Backup Exec Services

Starting and Stopping Backup Exec Services ▼

To stop or start Backup Exec services: 1. On the Tools menu, click Backup Exec Services. 2. Select the appropriate options as follows: Backup Exec Services Manager options

70

Item

Description

Server

Type the name of a server you want to add to the list, and then click Add. To import a list of servers, click Import List and select the file containing the server list.

Start all services

Click this to start all Backup Exec services for the selected server.

Stop all services

Click this to stop all Backup Exec services for the selected server.

Services credentials

Click this to change service account information or to change startup options.

Refresh

Click this to refresh this dialog box.

Remove Server(s)

Click this to remove a selected server or servers from the server list.

Administrator’s Guide

Uninstalling Backup Exec

Uninstalling Backup Exec

Note When using the Shared Storage Option, you must uninstall Backup Exec from the secondary servers before uninstalling from the primary server. ▼

To uninstall Backup Exec: 1. Close the Backup Exec application. 2. Click Start, point to Settings, click Control Panel, and then double-click Add/Remove Programs. 3. Do one of the following: -

For Windows NT, on the Install/Uninstall tab on the Add/Remove Programs Properties dialog box, select VERITAS Backup Exec, and then click Add/Remove.

-

For Windows 2000, Windows XP, or Windows Server 2003, at the Add/Remove Programs dialog box, select VERITAS Backup Exec for Windows Servers, and then click Remove.

4. When prompted to confirm the deletion of Backup Exec from your computer, click Yes. 5. When prompted to remove Backup Exec program files or all data, click Yes; click No to retain user-created data such as catalogs and job information. 6. If the uninstall program fails, click the View Installation Log File button for additional information. 7. When the uninstall is completed, click Finish. 8. If prompted, reboot the computer after uninstalling Backup Exec. Uninstalling Backup Exec also removes VERITAS tape class drivers. If you reinstall Backup Exec and want to use VERITAS tape class drivers, you must reinstall them. See also: “Uninstalling Backup Exec from the Command Line” on page 66

Chapter 2, Installing Backup Exec

71

Installation

Use Microsoft’s Add/Remove Programs option to remove Backup Exec from a computer. For additional information on Add/Remove Programs, refer to your Microsoft documentation.

Installing the Backup Exec Remote Administrator

Installing the Backup Exec Remote Administrator The Backup Exec Remote Administrator allows you to administrate the media server from a remote Windows server or workstation. To remotely administrate both Backup Exec 9. 0 and 9.1 media servers, install the Remote Administrator for both versions on the same computer but in different directories. To support the Remote Administrator, the media server requires that the Backup Exec system services must be running. Note The Remote Administrator and the media server to which it is connecting must be the same version. ▼

To install the Backup Exec Remote Administrator: 1. From the installation CD browser, choose to install VERITAS Backup Exec. The Welcome window appears. 2. Click Next. The Software License Agreement appears. 3. Select I accept the terms of the license agreement, and then click Next. 4. Select Local Install and Install Administration Console only, and then click Next. A dialog box appears requesting the destination directory for your Backup Exec program files. 5. Click Next to install the Backup Exec program files in the default directory, or click Change to select another directory for the installation, and then click Next. 6. Click Install. The installation copies the Backup Exec program files to the computer. 7. Click Finish. The Remote Administrator is installed. You can begin using Backup Exec. For more information, see “Getting Started” on page 79.

72

Administrator’s Guide

Installing the Backup Exec Remote Administrator ▼

To run the Remote Administrator: 1. Click Start.

Note If you are connecting to a remote administration console from a media server, from the Network menu, click Connect to Local Media Server to break the connection. Click Connect to Media Server to connect to another media server. 3. Select the appropriate options as follows: Connect to Server dialog options Item

Description

Server

Select the name of the media server from the Server drop-down list box or type the name of the server if you are running the Remote Administrator from a media server. The media server should appear in the list if the Backup Exec naming services are running on both machines. Note Each Windows 2000 server in the domain that has Backup Exec installed will automatically appear in the list box.

Low Speed Connection (RAS)

Select this option to minimize the amount of information initially retrieved from the media server to which you are connecting. When this option is selected, views such as the device and media views will not automatically be expanded when the administration console is loaded. This reduces the time required to connect to the remote media server. Information for each view is updated when the view is selected. This option is useful if you are connecting to the media server over a modem line.

Login Information User name

Type an administrator user name for the server to which you are connecting. Note On Windows Server 2003 and Windows XP, you cannot log on to the remote administration console with a user name that has a blank password, unless you set Windows to allow blank passwords. The error message "Logon failure: user account restriction" displays. For more information, see your Windows documentation.

Chapter 2, Installing Backup Exec

73

Installation

2. Point to Programs, and then click VERITAS Backup Exec for Windows Servers.

Installing the Backup Exec Remote Administrator Connect to Server dialog options (continued) Item

Description

Password

Type the password.

Domain

From the drop-down list, select the domain to which the user belongs, or type the appropriate domain name if it does not appear in the list.

Services

Click this to access the Backup Exec Services Manager to stop and start services or to set the logon credentials used to run the services.

The status of the local services appear at the bottom of this dialog box. If you try to connect to a server and the connection fails, this dialog box displays the services status for the server you attempted to connect to. 4. Click OK. The administration console will now connect to the services running on the media server. You should now be able to operate the media server as though you were running the administration console from there. You may be prompted for a user name and password to browse some network shares even if you are logged into the Remote Administrator computer under an account that is valid for those shares. Provide a domain-qualified user name and password when prompted (e.g., domain1\howard). This also applies to workgroup accounts (e.g., machinename\george).

74

Administrator’s Guide

Using VERITAS Update

Using VERITAS Update

VERITAS Update cannot be used if the security setting for Internet Explorer is set to high. ▼

To set Internet Explorer security: 1. On the Internet Explorer Tools menu, click Internet Options, and then click the Security tab. 2. Click the Internet icon, and then click Custom Level. 3. Set the security to medium or lower. 4. Verify that the following settings are set to Enable or Prompt



-

Download signed ActiveX Controls

-

Run ActiveX Controls and plug-ins Script

-

ActiveX Controls marked safe for scripting

-

Active scripting

To configure VERITAS Update: 1. On the Tools menu, click VERITAS Update. 2. On the VERITAS Update Welcome screen, click Configure. 3. Click Notify me when new updates are available.

Chapter 2, Installing Backup Exec

75

Installation

VERITAS Update, which allows users of Backup Exec to be informed of updates, upgrades, and new versions of Backup Exec, automatically installs with Backup Exec. If you enable the automated option, you can configure VERITAS Update to poll the main VERITAS web server for any available updates. You can select to have VERITAS Update poll on a daily, weekly, or monthly interval, and can configure when the polling will start. If updates are available, VERITAS Update alerts you of the update so you can download and install any selected updates.

Upgrading from Previous Versions of Backup Exec

4. Select the date and time for Backup Exec to start polling for updates. 5. Select the Frequency for polling to occur. Options are: -

Daily. If you selected Daily as the polling Frequency, Backup Exec polls every day at the time you selected.

-

Weekly. If you selected Weekly as the polling Frequency, Backup Exec polls every week on the same day of the week and at the same time you selected.

-

Monthly. If you selected Monthly as the polling Frequency, Backup Exec polls every month on the same date and at the same time you selected.

6. Enter Local Task Credentials. 7. Click Apply.

Upgrading from Previous Versions of Backup Exec This current version of Backup Exec for Windows Servers replaces any previous versions; no separate migration or upgrade utility is necessary. Most settings and all data from previous versions of Backup Exec (for example, when the TSM option adds registry settings) are kept. At the end of the installation, the upgrade process is summarized. Only Backup Exec version 8.0 and later can be migrated to this release. When upgrading, only the Backup Exec for Windows Servers options for which you have provided serial numbers are upgraded. Components that are already selected in the Backup Exec Install Options dialog box in the install program must remain selected so that all licensed components are upgraded. It is recommended that you add all previous version serial numbers before installing the new version of Backup Exec so that these options are automatically upgraded. Note Evaluation versions of Backup Exec for Windows Servers will replace any current installation. You cannot have separate installations of different versions on the same server.

76

Administrator’s Guide

Upgrading Backup Exec Options on Remote Computers

Upgrading Backup Exec Options on Remote Computers In order to upgrade options installed on remote computers, you must reinstall them. The following options are push-installed, and will not be upgraded until they are reinstalled: Backup Exec Remote Agent for Windows Servers. For more information, see “Installing the Remote Agent to Remote Windows Servers” on page 845.



Backup Exec NetWare Agent. For more information, see “Installing the Remote Agent for NetWare Servers” on page 1355 and “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58.



Backup Exec Agent for Lotus Domino. For more information, see “Installing the Lotus Domino Agent on the Media Server” on page 1311.



Backup Exec Advanced Open File Option. For more information, see “Installing the Advanced Open File Option” on page 981.

To reinstall these options, repeat the installation steps for each option.

Chapter 2, Installing Backup Exec

77

Installation



Upgrading Backup Exec Options on Remote Computers

78

Administrator’s Guide

3

Getting Started In Getting Started, you’ll find: A checklist that will help you prepare for the First Time Startup Wizard.



Details on the Backup Exec Assistant, Administration Console, and the Information Desk.



Details of default options set when Backup Exec is installed.



Layouts and descriptions of Backup Exec menus.

Before Starting Backup Exec For best results before starting Backup Exec, do the following: ❏

Make sure your storage devices are connected and configured properly.



Decide if your backup will be to a tape device or a disk device. You will be able to configure both during the First Time Startup Wizard. -

If you’re backing up to a tape device, verify that the device is supported. You can install drivers for the devices during the First Time Startup Wizard.

-

If you’re backing up to a disk device using the Backup-to-Disk feature, decide where you can create a backup folder. You should create it on a disk that won’t be included in the backup jobs and that has enough free space to contain the backup job. For more information, see “Using Backup-to-Disk Folders and Files” on page 149.



Understand how Backup Exec provides overwrite protection for your media. For more information, see “Media Overwrite Protection” on page 191.



Understand the default media set and its infinite overwrite protection period. For more information, see “Media Overwrite Protection Levels” on page 196.

79

Getting Started



Starting Backup Exec



Learn about creating new media sets with weekly, monthly, or quarterly retention periods. For more information, see “Default Media Set” on page 195.



Decide what Windows credential you want your Backup Exec logon account to use when browsing and making backup selections. You can use an existing account, or create a new one. You’ll be prompted for a default Backup Exec logon account during the First Time Startup Wizard. For more information, see “Configuring Logon Accounts” on page 363.

Starting Backup Exec ❖

To start the Backup Exec Administration Console, click Start, point to Programs, and then click VERITAS Backup Exec for Windows Servers. If you selected the option to add an icon to your desktop when you installed Backup Exec, you can also double-click the icon to start Backup Exec.

See also: “Using the Administration Console” on page 82 “Using Backup Exec Dialog Boxes” on page 85

First Time Startup Wizard The first time you run Backup Exec, the First Time Startup Wizard appears. The First Time Startup Wizard is a collection of wizards that help you set up the important features of Backup Exec, including media sets, overwrite protection settings, devices, and logon accounts. You must complete the applicable sections of this wizard as it guides you in preparing Backup Exec for operations. To begin the wizard, click Next on the Welcome page. The following wizards are part of the First Time Startup Wizard:

80



Media Management with Media Sets. To learn more about managing media through media sets, read “Media Overwrite Protection” on page 191.



Preferred Overwrite Media Type. Review the circumstances and order in which Backup Exec searches for overwritable media in “Media Overwrite Options” on page 198.



Overwrite Protection Level. The media overwrite protection levels are global settings that designate groups of media as overwritable or write-protected. For more information, see “Media Overwrite Protection Levels” on page 196.

Administrator’s Guide

First Time Startup Wizard ◆

Detected Hardware. The Device Configuration wizard allows you to verify that all of the storage devices attached to your system appear, and to verify that robotic libraries and storage devices are properly configured. If you do not see one or more of your attached storage devices in the Backup Devices window, click the Configure Devices button. This will guide you through installing the appropriate drivers for the storage hardware connected to your system. -

Detected Backup-to-Disk Folders. Click the Add Backup-to-Disk Folder button to set up folders on your hard drive to target for backup jobs. For more information, see “Using Backup-to-Disk Folders and Files” on page 149.

-

Drive Configuration. Verify that Backup Exec has configured all of your drives correctly. If all of your drives do not display on the list, follow the instructions in the wizard to install the VERITAS device drivers.



Configure IDR Options. If you installed the Intelligent Disaster Recovery Option, you’ll be prompted to configure IDR. For details, read “Getting Started with IDR” on page 885.



Logon Accounts. Use the Logon Account Wizard to set up Backup Exec logon accounts to access resources such as servers, shares, and databases. For details, read about logon accounts in “Configuring Logon Accounts” on page 363.

After you use the First Time Startup Wizard, you can access some of the wizards that make up the First Time Wizard individually. To access the wizards individually, from the Tools menu, select Wizards, and then select the wizard you want to use.

Chapter 3, Getting Started

81

Getting Started

The backup folders you add here will be included in the All Drives drive pool, which is Backup Exec’s default target for backup jobs. Backups submitted to the All Drives drive pool may be processed on an attached media device or to one of the backup folders on your hard disk.

Using the Administration Console

Using the Administration Console Backup Exec’s Administration Console has been updated with this release to incorporate new features and to make it easier for you to take advantage of Backup Exec’s features and capabilities. Note If you are using Backup Exec Web Administrative Console (BEWAC), the Administration Console displays differently. For more information, see “Navigating in BEWAC” on page 806.

Administration Console Menu bar Navigation bar

Columns

Task pane Results pane Preview pane

Selection pane Status bar

The main Administration Console screen includes the following components: ◆

82

Menu bar. Backup Exec’s menu bar appears across the top of your screen. To display a menu, click the menu name. Backup Exec operations can be launched by clicking options from a menu. Some options may be unavailable until an item is selected from the console screen. For example, Rename cannot be selected from the Edit menu unless you have first selected an item to be renamed from either the Devices or Media views.

Administrator’s Guide

Using the Administration Console ◆

Navigation bar. The navigation bar appears under the menu bar and allows you to quickly create a backup or restore job or to navigate to Backup Exec’s seven views. Click Backup or Restore to create a job. Change views by clicking the name of the view you want. The seven views that can be accessed through the navigation bar include: Overview. Use this view to access the Information Desk, view a summary of the system you are logged on to, or launch and configure the connection settings for ExecView.

-

Job Setup. Use this view to perform tasks for new backup, restore, and media rotation jobs, as well as to launch some utility jobs.

-

Job Monitor. Use this view to monitor jobs and job history. Through this view, you can also access the Outlook-like job calendar.

Note If you are using BEWAC, the Outlook-like calendar is not available. -

Alerts. Use this to view and respond to alerts, view alert history, apply alert filters, and set up notification recipients to receive e-mail or pager communications when alerts occur.

Note If you are using BEWAC, the Alerts view is not available. You can access alerts through the Status area. For more information, see “Viewing, Clearing, and Responding to Alerts” on page 808. -

Reports. Use this to view, print, save, and schedule reports about your media server, its operations, and its device and media usage.

-

Devices. Use this view to create drive pools, cascaded drive pools, and backup-to-disk folders, and to perform device operations and access device properties pages.

-

Media. Use this view to manage your media, create media sets, and create media locations.



Task pane. The task pane displays on the left side of the Administration Console by default, but can be hidden by selecting View, and then selecting Task Pane. Through the task pane, you can initiate actions such as creating a new backup job or responding to an alert. The contents of the task pane are dynamic, changing according to the view selected from the navigation bar. Some options may be unavailable until an item is selected from the console screen or a prerequisite task is performed. For example, you cannot select Rename from the Devices task pane unless you have first selected an item that can be renamed, such as a user-created drive pool.



Selection pane. The Selection pane is where you select items to work with. For example, it is where you select files to back up or restore.

Chapter 3, Getting Started

83

Getting Started

-

Using the Administration Console ◆

Results pane. The Results pane is the large pane on the right side of the screen that usually contains a list or tree view of items that correspond to items that are selected in the Selection pane. For example, if you select a Backup-to-Disk folder in the Selection pane, the Backup-to-Disk files that are contained in the folder display in the Results pane. This pane may be divided to display a preview pane.



Preview pane. The preview pane displays on the bottom right of the Administration Console. It displays information about the item selected in the list or tree view. This pane can be hidden by selecting View, and then selecting Preview Pane.

Note If you are using BEWAC, the Preview pane is not available.

84



Status bar. The status bar appears on the bottom of the Administration Console and provides information about the media server, jobs running or scheduled to run on the server, alerts, and services running.



Columns. You can change the location of columns by dragging and dropping them. In addition, you can change the order of the entries in a column by clicking the column heading. For example, names of reports display in alphabetical order by default. To display report names in reverse alphabetical order, click the Name column heading on the Reports view.

Administrator’s Guide

Using the Administration Console

Using Backup Exec Dialog Boxes When an option is selected from a menu, a shortcut menu, or the task pane, a dialog box usually displays.

Dialog box

Nodes

Getting Started

Subnodes

Properties pane

Most of Backup Exec’s dialog boxes contain a Properties pane on the left side. Options that correspond to the selected subnode display on the right side of the dialog box.

Using the Overview View The Overview view includes the Information Desk and the System Summary. From the Overview view you also can configure ExecView connection settings. When Backup Exec is started for the first time, the Administration Console’s Information Desk appears. The Information Desk has links to the list of new features in this release, the technical support web site, the supported device list, device configuration information, default options for Backup Exec, and tasks such as backing up data and monitoring jobs. Links are also provided to the ReadMe, the online Administrator’s Guide, the wizards, and the VERITAS company web site.

Chapter 3, Getting Started

85

Using the Administration Console ▼

To view the Information Desk: ❖

On the navigation bar, click Overview, and then under Views on the task pane, click Information Desk.

Information Desk

The System Summary briefly details Backup Exec activity for the last 24, 48, or 72 hours, such as the number of jobs that were run, the number of jobs that failed, the amount of data backed up, and the number of media used. You can also see the number and type of active alerts, the number of scratch media available in the storage devices, a list of upcoming jobs, and the number of jobs that are currently running.

86

Administrator’s Guide

Using the Administration Console ▼

To view the System Summary: ❖

On the navigation bar, click Overview, and then under Views on the task pane, click System Summary.

System Summary

Getting Started

Chapter 3, Getting Started

87

Frequently Asked Questions

Using the Backup Exec Assistant The Backup Exec Assistant provides easy access to commonly used features, such as Backup Exec’s wizards, the job monitor, and job setup. If you want the Backup Exec Assistant to display each time Backup Exec is started, on the Tools menu, select Backup Exec Assistant, and then select the Always show me this at startup checkbox. The Backup Exec Assistant is not available in BEWAC.

Backup Exec Assistant

Frequently Asked Questions How do I run a backup job? There are several ways to run a backup, depending on your backup needs and level of experience with Backup Exec.

88



If you are new to Backup Exec, you can use the Backup Wizard, which helps guide you through the setup of a backup job.



If you are an experienced Backup Exec user: -

On the navigation bar, click Backup to set up the options for a backup job.

-

On the navigation bar, click Job Setup to create a template to use for multiple backup jobs.

Administrator’s Guide

Frequently Asked Questions ◆

To quickly create a backup job to back up the media server, click the one-button backup link on the Information Desk.



Use Windows Explorer to create a backup job.

For details about the various ways to create a backup job, see “Creating a Backup Job” on page 241. Where can I find the wizards? On the Information Desk. On the navigation bar, click Overview, then under View on the task pane, click Information Desk.



On the Tools menu, click Backup Exec Assistant, or further down the Tools menu, click Wizards.

Where can I find the Readme file? ◆

On the Information Desk. On the navigation bar, click Overview, then under View on the task pane, click Information Desk. Under Documentation, click View ReadMe file.



In the directory where Backup Exec was installed.



On the Help menu, click View ReadMe File.

Where can I find the online documentation for Backup Exec? ◆

On the Information Desk. On the navigation bar, click Overview, then under View on the task pane, click Information Desk. Under Documentation, click View VERITAS Backup Exec Administrator’s Guide.



On the Help menu, click Topics to see the online help. Or on the Help menu, click View VERITAS Backup Exec Administrator’s Guide to view an online version of the System Administration Guide in the Adobe Portable Document Format (PDF).

How do I get in touch with Technical Support? ◆

From the Information Desk. On the navigation bar, click Overview, then under View on the task pane, click Information Desk. Under Technical Support, click VERITAS Backup Exec support.

Chapter 3, Getting Started

89

Getting Started



Backup Exec Defaults

Backup Exec Defaults When you start Backup Exec for the first time, defaults are already set. You can adjust the defaults to meet the needs of your environment. Default settings are available for various types of jobs, such as backup, restore, and test run. You also can set defaults for catalogs, media management, bar code rules, and database maintenance. The defaults that will probably affect you the most are the backup job defaults. You will probably want to change many of these defaults after devising a media rotation strategy and creating additional media sets and drive pools. In the short term though, you can run Backup Exec and backup and restore jobs safely by using only the defaults set during installation. See also: “Setting Default Backup Options” on page 320 “Setting Restore Defaults” on page 457 “Setting Test Run Default Options” on page 318 “Setting Default Pre/Post Commands” on page 328 “Configuring Default Job Log Options” on page 400 “Specifying the Default Backup Network” on page 334 “Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on page 989 “Setting Default Backup and Restore Options for SQL 2000” on page 1035 “Setting Default Backup and Restore Options for SQL 7.0” on page 1079 “Setting Default Backup and Restore Options for Exchange 2000 and 2003” on page 1127 “Setting Default Backup and Restore Options for Exchange 5.5” on page 1161 “Configuring Default Lotus Domino Options” on page 1314 “Default Settings for the Remote Agent for NetWare Servers” on page 1365 “Configuring Default Schedule Options” on page 379 “Changing Default Preferences” on page 91 “Setting Catalog Defaults” on page 415 “Setting Default Media Options” on page 209 “Bar Code Labeling in Mixed Media Libraries” on page 205 “Configuring Database Maintenance” on page 405

90

Administrator’s Guide

Backup Exec Defaults

Changing Default Preferences You can set defaults for the way you prefer Backup Exec to display various screens, indicators, and alerts. ▼

To set default preferences: 1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Preferences.

Options - Set Application Defaults - Preferences Item

Description

Show splash screen at startup

Select this option to display the splash screen when you start Backup Exec. If this option is cleared, the Backup Exec Administration Console is the first thing to display on startup.

Inventory all drives on Backup Exec services startup

Select this option to have Backup Exec inventory all of the media in the storage devices when Backup Exec’s services are starting. Depending on the number of storage devices attached to your system, this process may take a few minutes. If you are using a robotic library, all of the robotic library’s slots are inventoried.

Enable backup from Windows Explorer

Select this option to create and submit backup jobs from Windows Explorer. For more information, see “Using Backup Exec’s Windows Explorer Interface” on page 293. If this option is cleared, you will not be able to submit backups using the Backup Exec Windows Explorer interface.

Display the job summary dialog before creating a backup job

Select this option to have Backup Exec display a summary of the backup job options you selected before submitting the job to the job queue.

Chapter 3, Getting Started

91

Getting Started

3. Select the appropriate options as follows:.

Backup Exec Defaults Options - Set Application Defaults - Preferences (continued) Item

Description

Display progress indicators for backup jobs (requires additional time to pre-scan devices)

Select this option to display the percent completed number while a backup job is processing. These indicators appear in the Job Activity tab, and they allow you to monitor the progress of the job. Backups might take a little longer to complete when this option is selected because the target resources must be scanned to determine the amount of data to be backed up. Note Due to the time required to scan the target resources, selecting this option when backing up remote resources is not recommended.

Alerts

92

Automatically display new alerts

Select this option to have alerts automatically appear on the desktop when they are sent. If you do not choose this option, you are required to view and respond to alerts through the Alerts view.

Play sound after receiving alert

Select this option to have Backup Exec send an audible tone when an alert is generated. Information about alerts can be found in the Alerts view.

Administrator’s Guide

Backup Exec Defaults

Changing General Job Defaults You can set the default priority, device, and media set to use for each job created. ▼

To change general job defaults: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click General.

Options-Set General Application Defaults Item

Description

Job priority

Select the default priority that you want to assign to all jobs. The choices are Highest, High, Medium, Low, and Lowest. You can change this default for each job individually.

Device

Select the device that you want to be used as the default device for jobs. You can change this default for each job individually.

Media set

Select the media set that you want to be used as the default media set for jobs. You can change this default for each job individually.

Chapter 3, Getting Started

93

Getting Started

3. Select the appropriate options as follows:

Backup Exec Defaults

94

Administrator’s Guide

4

Managing Devices

Device management in Backup Exec simplifies how you organize and allocate the storage devices recognized by Backup Exec, including: Tape drives or robotic libraries physically attached to a media server.



Virtual devices called Backup-to-Disk Folders created through Backup Exec’s Backup-to-Disk feature.



Shared devices used in a SAN environment.



Removable storage devices shared by applications through the use of Microsoft’s Removable Storage Feature.

For a list of supported devices, see http://support.veritas.com. With Backup Exec, you can maximize your hardware investment by organizing your drives in one or both of the following methods: ◆



Drive pools. Drives are grouped so that jobs assigned to the drive pool are run on the first available drive. Setting up drive pools offers the following benefits: -

Automatic job rescheduling. If a drive fails while a job is running on it, that job is rescheduled and placed on hold. Other scheduled jobs are rerouted to working devices in the drive pool.

-

Concurrent processing. Drives in the drive pool run different jobs at the same time, allowing maximum hardware efficiency.

-

Dynamic load balancing. Jobs are more evenly distributed between all of the drives included in the drive pool when running simultaneous jobs.

Cascaded drive pools. Drives of the same type are linked together so that large backup jobs that exceed the capacity of the media in one drive automatically continue on the media in the next drive that is defined in the pool. The cascaded drives appear logically as one device.

Or, you can use the storage devices as they are configured by Backup Exec at installation, without making any changes. The default drive pool, All Drives (Server Name) is the default destination device when you create a backup job. By default, the All Drives drive

95

Managing Devices



Viewing Devices

pool contains all locally-attached drives, or if you are using the SAN Shared Storage Option, both locally-attached and shared storage devices appear in All Drives (Server Name). In addition to drive pools and cascaded drive pools, Backup Exec provides other device management capabilities. You can: ◆

Identify and monitor the current status of all storage devices.



Change physical tape devices without rebooting the Backup Exec server.



Monitor device usage statistics and track hardware errors. Backup Exec keeps track of the device’s age, hours of use, mounts, number of bytes processed (written and read), errors, when the device was last cleaned, and so on.



Manage the physical drives attached to the media server and perform operations on these devices and the media contained in them.

Note Most of the benefits derived from Backup Exec’s device management functionality are realized when using more than one storage device. However, users with only one drive can still take full advantage of Backup Exec’s device monitoring to help make sure their drives are working properly. See also: “VERITAS Backup Exec - SAN Shared Storage Option” on page 939

Viewing Devices When Backup Exec is installed, all storage devices connected to the media server are automatically recognized as either robotic libraries or stand-alone drives. Note Support for a single robotic library drive is included with Backup Exec for Windows Servers. Licenses for additional robotic library drives are available for purchase. If you group one or more robotic library slots into partitions, the partition drive pools appear in the Devices view under the Drive Pools icon. For information about partitioning robotic library slots, see “Creating Robotic Library Partitions” on page 146. Click Devices on the navigation bar to see how devices are organized logically in drive pools, and how drives are arranged physically on servers. All devices that are displayed under All Devices are available, including drive pools, stand-alone drives, robotic libraries, backup-to-disk folders, and cascaded drive pools. If the Shared Storage Option is installed, you can also view available secondary storage devices on the storage area network.

96

Administrator’s Guide

Viewing Devices Devices view

The default drive pool All Drives (Server Name) contains the server’s locally attached drives as well as any Backup-to-Disk Folders created. Backup-to-Disk Folders are destination devices for backups that are directed to your hard disk. The data from these backups is saved on disk as backup files. If you are using the SAN Shared Storage Option, each server on the SAN will have an All Drives (Server Name) node that contains both local and shared devices available to the server. At installation, all storage devices are automatically assigned to All Drives (Server Name). See also: “Viewing Media Information” on page 98 “Viewing Drive Pool Properties” on page 111 “Viewing Properties of a Cascaded Drive Pool” on page 117 “Viewing and Using Drive Properties and Statistics” on page 122 “About Devices in the Shared Storage Environment” on page 943

Chapter 4, Managing Devices

97

Managing Devices

All logical groupings of the physical drives are displayed under Drive Pools and Cascaded Drive Pools. Cascaded drive pools are displayed under servers because they only consist of drives from that server; they effectively act as a single device under that server.

Viewing Devices

Viewing Media Information If you select a drive or select Slots from the Devices view, information for the media contained in the drive or slot appears in the right pane. This information also appears when All Media is selected from the Media view. Information appearing includes:

98



Slot number. Number of the slot. This field only appears if Slots has been selected.



Bar Code. Label obtained from a bar code reader. This field only appears if Slots has been selected. Bar code information only appears if the robotic library has a bar code reader and a bar code label is on the media.



Media Label. Name of the media label. The name can be: -

Assigned automatically by Backup Exec.

-

Assigned or changed by the administrator.

-

A pre-assigned bar code label.



Media Description. By default, displays the original media label if the media is imported media. If the media description has been edited, the new description appears. Otherwise, this field is blank.



Allocated Date. Date and time that the media was allocated to a media set as a result of an overwrite operation.



Media Set. Name of the media set in which the media is assigned.



Overwrite Protected Until. Date and time on which the media’s overwrite protection ends. Until that date and time, the media cannot be overwritten.



Appendable Until. Date and time until which the media can be appended.



Available Capacity. The amount of expected raw capacity on the media that remains unused. Some tape devices support the ability to read the amount of remaining capacity of the media that is currently loaded in the device. If a tape device supports reading of the remaining capacity amount, then Available capacity is derived from the remaining capacity amount. Otherwise, Available capacity is calculated by subtracting Bytes written from Total capacity. Because Free space is reported in terms of unused raw capacity, review Bytes written and Compression ratio to better estimate if there is enough free space to accommodate a specific job.



Total Capacity. The amount of expected total raw capacity of the media. Some tape devices support the ability to read the amount of Total capacity of the media that is currently loaded in the device. If a tape device supports reading of the total capacity amount, then Total capacity is derived from the total capacity amount. Otherwise, Total capacity is estimated based on past usage of the media.

Administrator’s Guide

Configuring Devices ◆

Bytes Written. The amount of data that has been written into blocks on the media. Bytes written may differ from Used capacity due to the effects of data compression and media flaws. Data compression will tend to increase Bytes written when compared to Used capacity. Media flaws will decrease Bytes written when compared to Used capacity.



Compression Ratio. The ratio of Bytes written to Used capacity. Compression ratio will show the overall effect that data compression and media flaws are having on the amount of data that is being stored on the media.

See also: “VERITAS Backup Exec - Library Expansion Option” on page 1175 “About Devices in the Shared Storage Environment” on page 943

Configuring Devices Backup Exec provides two wizards for configuring and adding storage devices to your media server: The Device Configuration Wizard. This wizard, which appears when Backup Exec is first started, allows you to verify that all of the storage devices attached to your system appear, and to ensure that robotic libraries and storage devices are properly configured. You can also use the Device Configuration Wizard to configure Backup Folders on your hard disk. On the Tools menu, point to Wizards, and then select Device Configuration Wizard to run this wizard at any time.



The Hot-swappable Device Wizard. This wizard allows you to replace or add storage devices without having to reboot the media server.

If you are using a robotic library, make sure the robotic library hardware is configured properly. See also: “First Time Startup Wizard” on page 80 “Hot Swap for Storage Devices” on page 100 “Setting Up Robotic Library Hardware” on page 1175

Chapter 4, Managing Devices

99

Managing Devices



Configuring Devices

Hot Swap for Storage Devices You can replace or add a hot-swappable tape drive on a Backup Exec media server without having to reboot the server, provided the media server is not a Windows NT 4.0 server. The Hot-swappable Device Wizard guides you through the process. After you start the Hot-swappable Device Wizard and close the Backup Exec Administration console, the Hot-Swappable Device Wizard waits until any jobs that were processing are completed. The wizard pauses the Backup Exec media server and stops the Backup Exec services. You can then add or replace any storage devices. The wizard detects the new or replaced device, and adds information about the device to the Backup Exec database. The wizard is then completed, and you can reopen the Backup Exec console. The new storage device is displayed in the Devices view, and usage statistics for the drives begin accumulating. You may want to add the new drive to a drive pool or cascaded drive pool. The replaced storage device is displayed in the Devices view with a status of Offline. To remove the storage device from Backup Exec, you must disable it and then delete it from the Devices view. Note Only tape drives are supported for hot swapping and adding. The tape drives must be hot-swap capable. See the owner’s manual for your tape drive for more details. ▼

To start the Hot-swappable Device Wizard: 1. On Tools menu, point to Wizards, and then click Hot-swappable Device Wizard. 2. Follow the on-screen prompts.

Pausing, Resuming, and Renaming Devices You can pause and resume the media server and all of its storage devices, including robotic library drives, stand-alone drives, and backup-to-disk folders. You can also rename the media server’s storage devices as well as any attached robotic libraries. ▼

To pause or resume the media server: 1. On the navigation bar, click Devices. 2. Click the server icon.

100

Administrator’s Guide

Configuring Devices

3. Under Drive Tasks in the task pane, select Paused. A check mark appears next to the Paused option if the media server is currently paused. If the media server was not already paused, it is now paused. If the media server was already paused, it is now resumed. ▼

To pause or resume a robotic library or drive: 1. On the navigation bar, click Devices. 2. Click the robotic library drive or stand-alone drive. 3. Under Drive Tasks in the task pane, select Paused. A check mark appears next to the Paused option if the drive is currently paused. If the drive was not already paused, it is now paused. If the drive was already paused, it is now resumed. To rename a robotic library or drive:

Managing Devices



1. On the navigation bar, click Devices. 2. Click the robotic library or drive that you want to rename. 3. Under General Tasks in the task pane, click Rename. 4. On the Rename dialog box, type the new name, and then click OK. See also: “Renaming a Backup Folder” on page 154 “Pausing and Resuming a Backup Folder” on page 157 “Renaming a Drive Pool” on page 110 “Renaming a Cascaded Drive Pool” on page 117

Chapter 4, Managing Devices

101

Using Drive Pools

Using Drive Pools A drive pool is a grouping of drives for Backup Exec operations. Drives can belong to more than one drive pool, unless a drive is in a cascaded drive pool. Drive pools can contain different types of drives, including specific drives in multi-drive robotic libraries. In a drive pool, Backup Exec selects the oldest recyclable media in all of the drives in the drive pool to use first. If more than one media meeting the requirements is found, Backup Exec then searches the drives in a drive pool according to drive priority and uses the oldest recyclable media in the drive that has the highest priority. When you submit a backup job to a drive pool, the job is automatically sent to the first available storage device in that drive pool. As other jobs are created and started, they can run concurrently on other storage devices in the drive pool. By dynamically allocating drives as jobs are submitted, Backup Exec processes jobs quickly and efficiently. Drive pools also provide automatic job rescheduling. For example, if a drive pool contains four stand-alone devices and the first device fails because of a hardware error, the job that was running on the failed device is resubmitted and placed on hold, and the other jobs are automatically routed to the working devices in the drive pool. You can assign priorities to drives in a drive pool so that a specific drive is used before other drives in the drive pool. The priority assigned to a drive in one drive pool is unrelated to that drive’s priority in any other drive pool. For example, if Drive 1 is placed in both Drive Pool A and Drive Pool B, you can assign different priorities to it in each drive pool. Drive 1 can have a high priority in Drive Pool A and a low priority in Drive Pool B. You can also send backup jobs to specific drives in a drive pool. However, if that drive is busy, the job must wait until the drive becomes available. When a specific drive is assigned, the job cannot be automatically routed to the next available drive. All Drives (Server Name) is the default drive pool, created when Backup Exec is installed. All devices recognized by Backup Exec at startup are automatically assigned to All Drives (Server Name). You can create other drive pools to meet your particular requirements, and assign and reassign storage devices to these pools. For example, you may want to separate high-performance drives from lower performance drives in a separate drive pool in order to send high-priority jobs to the fast drive pool for quicker completion. See also: “Using Cascaded Drive Pools” on page 112

102

Administrator’s Guide

Using Drive Pools

Creating Drive Pools You can place any stand-alone drives, and any drives in single or multiple drive robotic libraries, into a drive pool. Drives that are in a cascaded drive pool are not available to be placed in another drive pool unless they are deleted from the cascaded drive pool first. ▼

To create a drive pool: 1. On the navigation bar, click Devices. 2. Click Drive Pools. 3. Under Drive Pool Tasks in the task pane, select New drive pool. New Drive Pool dialog box

Managing Devices

4. Select the appropriate options as follows: New Drive Pool fields Item

Description

Drive Pool Name

Type the name of the new drive pool that you want to create.

Select the drives to be Select the drives you want to include in the new drive pool. included in this Drive Pool

5. Click OK. See also: “Using Cascaded Drive Pools” on page 112 “Creating a Cascaded Drive Pool” on page 113

Chapter 4, Managing Devices

103

Using Drive Pools

Adding Drives to a Drive Pool You can add a drive to an existing drive pool, unless the drive is in a cascaded drive pool. Drives that are in a cascaded drive pool will be automatically deleted from the cascaded drive pool if they are placed in another drive pool. ▼

To add a drive to a drive pool: 1. On the navigation bar, click Devices. 2. Select the drive pool. 3. Under Drive Pool Tasks in the task pane, select Add device. Add Drives to Drive Pool dialog box

4. Select the appropriate options as follows: Add Drives to Drive Pool options Item

Description

Drive Pool Name

Displays the name of the drive pool to which you want to add drives.

Select the drives to be Select the drives you want to include in the drive pool. included in this Drive Pool

5. Click OK.

104

Administrator’s Guide

Using Drive Pools

Setting Priorities for Drives in a Drive Pool You can set a priority that determines the order in which the drives in a drive pool are used. The default priority is 10 so all drives have the same priority initially. The drive to which you assign the lowest number is the first drive to be used in the drive pool; for example, a drive with a priority of 1 is used before a drive with a priority of 5. You can set a priority of 1 to 99. Note Overwrite and append periods for media take precedence over drive priority. The Priority option is only displayed when viewing drive properties under a drive pool icon. Drives displayed under the Stand-alone Drives icon or Robotic Libraries icon do not display a Priority option because the drive may belong to multiple drive pools and have a different priority in each drive pool. ▼

To set drive priority in a drive pool: 1. On the navigation bar, click Devices.

3. Select the drive. 4. Under General Tasks in the task pane, select Properties.

Chapter 4, Managing Devices

105

Managing Devices

2. Under Drive Pools, select the drive pool containing the drive for which you want to set a priority.

Using Drive Pools

5. Click Configuration. Configuration tab

6. In Priority, Type a number from 1 to 99, with 1 designating this drive as the first drive to be used in the drive pool. 7. Click OK. See also: “Viewing Drive Configuration Properties” on page 125

106

Administrator’s Guide

Using Drive Pools

Deleting Drives from a Drive Pool You can delete a drive from a drive pool. The drive will still be in the Backup Exec device database and will still be available for use in other drive pools. It is not necessary to delete drives from a drive pool before you delete that pool; the drives are automatically removed when the pool is deleted. ▼

To delete a drive from a drive pool: 1. On the navigation bar, click Devices. 2. Under Drive Pools, select the drive pool from which you want to delete a drive. 3. Select the drive you want to remove from the drive pool. Make sure you select a drive under Drive Pools and not under the server icon; if you delete a drive under the server icon, the drive is deleted from the database, not just from the drive pool. 4. Under Drive Pool Tasks in the task pane, select Remove device.

Managing Devices

Delete Drive From Drive Pool dialog box

5. To remove the displayed drive from a drive pool, click Yes.

Chapter 4, Managing Devices

107

Using Drive Pools

Deleting Drive Pools It is not necessary to delete drives from a drive pool before you delete that pool; the drives are automatically removed when the pool is deleted. You cannot delete the All Drives drive pool, but you can delete all of the drives in it. If there are scheduled jobs assigned to the deleted drive pool, you are prompted to redirect them to another drive pool. ▼

To delete a drive pool: 1. On the navigation bar, click Devices. 2. Under Drive Pools, select the drive pool you want to delete. 3. Under General Tasks on the task pane, select Delete. Delete Drive Pool dialog box

4. Click Yes or Yes to All to delete the drive pool or pools that are displayed. 5. If there are scheduled jobs assigned to the deleted drive pool, you are prompted to redirect the jobs to another drive pool or stand-alone device. See also: “Deleting Drives from a Drive Pool” on page 107 “Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 109

108

Administrator’s Guide

Using Drive Pools

Retargeting Jobs from a Deleted Drive Pool or Media Set If a drive pool or media set is deleted, and there are scheduled jobs assigned to that drive pool or media set, you are prompted to redirect the jobs to another drive pool or stand-alone device, or to another media set. ▼

To redirect a scheduled job: 1. When prompted to redirect the jobs, click Yes. Retarget Job dialog box

2. Click the to see more drive pools, and then select the new drive pool, standalone drive, or media set to which you want to redirect the scheduled jobs. 3. Click Yes or Yes to All to redirect the job or jobs that are displayed to the new drive pool, drive, or media set. Note If you choose not to retarget a job, the job will fail. To later target the job to another device, you will need to manually edit the job.

Chapter 4, Managing Devices

109

Managing Devices

The job to be redirected is displayed in the Retarget Job dialog box. If there are scheduled jobs assigned to the deleted drive pool or media set, you are prompted to redirect the jobs to another drive pool or media set.

Using Drive Pools

Renaming a Drive Pool The default All Drives drive pool cannot be renamed, but you can rename any user-created drive pool using either the Rename option or the drive pool’s Properties dialog box. ▼

To rename a drive pool: 1. On the navigation bar, click Devices. 2. Under Drive Pools, select the drive pool you want to rename. 3. Under General Tasks, select Rename. 4. On the Rename dialog box, type the new name to assign to this drive pool, and then click OK. The drive pool is listed with the new name. See also: “Viewing Drive Pool Properties” on page 111

110

Administrator’s Guide

Using Drive Pools

Viewing Drive Pool Properties Use Properties to view properties for a drive pool, or to rename the drive pool. ▼

To view properties for a drive pool: 1. On the navigation bar, click Devices. 2. Under Drive Pools in the tree view, select the drive pool. 3. Under General Tasks in the task pane, select Properties. Drive Pool Properties dialog box

Managing Devices

Chapter 4, Managing Devices

111

Using Cascaded Drive Pools

The Drive Pool Properties dialog box provides the following information: Drive Pool properties Item

Description

Name

Displays the name of the drive pool. Rename the drive pool by typing a new name in this field.

Creation date

The date and time that this drive pool was created.

Full name

Displays the drive pool name.

4. After viewing the drive pool properties, click OK.

Using Cascaded Drive Pools You can cascade (link) multiple stand-alone drives together to create one logical drive. By cascading the drives, backup jobs can automatically “roll” to the media in the next drive when the media is filled. Although multiple drives are linked to form the cascaded drive pool, only the name of the cascaded drive pool is listed as the destination device when a backup job is created. Drives in a cascaded drive pool are not available for concurrent operations. Only one drive is used at a time. The next drive in the cascaded drive pool is used only when a backup job fills the current media, or when the next job requires a different media (such as an overwrite job). Use cascaded drive pools to run unattended backup jobs, or to make sure a large backup job will complete without operator intervention. You may also want to use cascaded drive pools if you want data from a job or group of jobs to reside on the same tape family. See also: “Using Drive Pools” on page 102

112

Administrator’s Guide

Using Cascaded Drive Pools

Requirements for Using Cascaded Drive Pools In order to cascade drives, the drives must be the same drive type, such as DLT 32K. To determine the drive type, look in the drive’s property page. For more information, see “Viewing and Using Drive Properties and Statistics” on page 122. Caution If a drive that does not support hardware compression is added to a cascaded drive pool, the hardware compression option on all other drives in that pool is automatically disabled. You can enable the hardware compression option on the other drives again, but the pool will then have mixed compression, which could make restore operations difficult.

Creating a Cascaded Drive Pool When you select drives for a cascaded drive pool, only drives of the same drive type are displayed for selection. Note Overwrite and append periods for media take precedence over drive priority.

Managing Devices



To create a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Select Cascaded Drive Pools. 3. Under Drive Pool Tasks in the task pane, select New drive pool. New Cascaded Drive Pool dialog box

Chapter 4, Managing Devices

113

Using Cascaded Drive Pools

4. Select the appropriate options as follows: New Cascaded Drive Pool options Item

Description

Drive Pool Name

Type the name of the new cascaded drive pool that you want to create.

Drive Type

Select the type of drive you want to use in this cascaded drive pool. After you select a drive type, only drives of that same type are displayed in the selection list.

Select the drives to be Add the drives you want to include in the new cascaded drive pool included in the by selecting the drive. Cascaded Drive Pool. Any drives moved to a cascaded drive pool will be removed from any drive pools they are currently in.

5. Click OK. The new cascaded drive pool is displayed in the Cascaded Drive Pool list in the Devices view. See also: “Deleting Drives from a Cascaded Drive Pool” on page 115 “Deleting a Cascaded Drive Pool” on page 116

Adding Drives to a Cascaded Drive Pool You can add a drive to an existing cascaded drive pool provided the drive is of the same type as the drives already in the pool and provided that the drive is not in another cascaded drive pool. Drives that are part of a normal drive pool will be removed from the other pool when added to a cascaded drive pool. Also, drives added to a cascaded drive pool will be removed from other drive pools. ▼

To add a drive to a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Select the cascaded drive pool to which you want to add a drive. 3. Under Drive Pool Tasks in the task pane, select Add device.

114

Administrator’s Guide

Using Cascaded Drive Pools

4. Select the appropriate options as follows: Add Drives to Cascaded Drive Pool fields Item

Description

Drive Pool Name

Displays the name of the drive pool to which you want to add drives.

Select the drives to be Select the drives you want to include in the drive pool. included in this Drive Pool

5. Click OK.

Deleting Drives from a Cascaded Drive Pool

The following instructions describe the menu-driven method. ▼

To delete a drive from a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Select the cascaded drive pool from which you want to delete a drive. 3. Select the drive you want to delete from the cascaded drive pool.

Chapter 4, Managing Devices

115

Managing Devices

Use Delete to remove a drive from a cascaded drive pool, or drag the drive you want to delete from the cascaded drive pool to the Stand-alone Drives icon. If the move is allowed, the mouse arrow icon displays a plus sign (+) in a box. The drive will still be in the Backup Exec device database and will still be available for use in other drive pools. It is not necessary to delete drives from a cascaded drive pool before you delete that pool; the drives are automatically removed when the cascaded drive pool is deleted.

Using Cascaded Drive Pools

4. Under Drive Pool Tasks in the task pane, select Remove device. Delete Drive From Cascaded Drive Pool dialog box

The name of the drive you want to remove from the cascaded drive pool is displayed. 5. Click Yes to remove this drive from the cascaded drive pool. See also: “Deleting a Cascaded Drive Pool” on page 116 “Erasing Media” on page 174

Deleting a Cascaded Drive Pool It is not necessary to delete drives from a cascaded drive pool before you delete that pool; the drives are automatically removed from the pool when the pool is deleted. If there are scheduled jobs assigned to the deleted cascaded drive pool, you are prompted to redirect them to another device or drive pool. ▼

To delete a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Under Cascaded Drive Pools, select the drive pool you want to delete. 3. Click Delete on the shortcut menu. The name of the cascaded drive pool you selected to delete appears. 4. Click Yes. 5. If there are scheduled jobs assigned to the deleted drive pool, you are prompted to redirect the jobs to another drive pool or stand-alone device. See also: “Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 109

116

Administrator’s Guide

Using Cascaded Drive Pools

Renaming a Cascaded Drive Pool You can rename a cascaded drive pool using either the Rename option or by typing a new name on the cascaded drive pool’s Properties dialog box. ▼

To rename a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Under Cascaded Drive Pools, select the drive pool you want to rename. 3. Under General Tasks in the task pane, select Rename. 4. On the Rename dialog box, type the new name for the cascaded drive pool, and click OK.

Viewing Properties of a Cascaded Drive Pool



To view properties of a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Under Cascaded Drive Pools, select the drive pool for which you want to view properties. 3. Under General Tasks in the task pane, select Properties. The Cascaded Drive Pool Properties dialog box provides the following information: Cascaded Drive Pool properties Item

Description

Name

Displays the name of the drive pool. Rename the drive pool by typing a new name in this field.

Creation Date

Displays the date and time that this drive pool was created.

Full Name

Displays the drive pool name.

4. After viewing the properties of the cascaded drive pool, click OK.

Chapter 4, Managing Devices

117

Managing Devices

Use Properties to view properties for a cascaded drive pool, or to rename the cascaded drive pool.

Viewing Server Properties and Running Server Diagnostics

Viewing Server Properties and Running Server Diagnostics Use Properties to view information about your media server, including the version of Backup Exec installed, and system information. From the properties’ System tab, you can also run BE Diagnostics, a Backup Exec diagnostic utility. This utility creates a file (bediag_(machine_name).txt) that includes useful configuration information for the server. For more information on using BE Diagnostics, see “Using Backup Exec’s Diagnostic Utility BEDIAG” on page 572. Technical services can use the results of BE Diagnostics to troubleshoot problems. Note You can also run BE Diagnostics for a remote server (see “Running Diagnostics on Remote Server” on page 575). ▼

To view server properties: 1. On the navigation bar, click Devices. 2. Select the server from the tree view. 3. Under General Tasks in the task pane, select Properties. Server tab

118

Administrator’s Guide

Viewing Server Properties and Running Server Diagnostics

The Server Properties Server tab provides the following information: Server tab Item

Description

Name

The name of the media server.

Status

The status of the media server. An active media server’s status displays “Running”.

Version

Backup Exec version and revision information.

Description

The type of server.

Serial #

The serial number under which Backup Exec is installed. “Eval Edition” is displayed if a serial number was not provided during Backup Exec’s installation.

Server time The date and time Backup Exec was initially installed and launched on this media server.

Current date and time

The current date and time.

Statistics Number of devices

The number of storage devices connected to this media server. In systems with multi-drive robotic libraries attached, each drive in the robotic library represents a separate device.

Number of active jobs

The number of jobs currently in progress on this media server.

Total number of alerts since server startup

The total number of alerts generated on this media server since the Backup Exec services were last started.

Total number of jobs completed since server startup

The total number of jobs executed on this media server since the Backup Exec services were last started.

Chapter 4, Managing Devices

119

Managing Devices

Start date and time

Viewing Server Properties and Running Server Diagnostics

4. Click System to view additional information about the media server. System tab

The Server Properties System tab provides the following information: System tab for media server Properties dialog box Item

Description

Operating system Type

The type of operating system currently running on this media server.

Version

The version of the operating system.

Build

The build number of the operating system.

Processor Type

The type of processor installed in this media server.

Level

The processor level on this server.

Number of processors The number of processors on this server.

120

Administrator’s Guide

Viewing Server Properties and Running Server Diagnostics System tab for media server Properties dialog box (continued) Item

Description

Memory Physical

The amount of hardware RAM installed in the media server.

Page size

The size of a single Windows NT virtual memory page.

Virtual remaining

The amount of virtual memory remaining on the system.

Page file

The size of the Windows NT virtual memory paging file.

Run diagnostics

Note If you call Technical Support with a problem, they may request that you run Diagnostics and provide them with the results. Technical Support can use the results of this utility to pinpoint your problem and quickly solve it.

Š

Account groups, account privileges, and environment settings.

Š

Backup Exec Software version and registry information, Backup Exec Agent listing, Windows NT version information, SCSI hardware configuration, SQL Server information, Driver services information, and NT Services information.

Š

File Server information, supported shared directories, and Windows sockets information.

5. After viewing Properties for the media server, click OK.

Chapter 4, Managing Devices

121

Managing Devices

Click to run the Diagnostics utility to a file (bediag(machine_name).txt) that includes useful configuration information for the server such as:

Viewing and Using Drive Properties and Statistics

Viewing and Using Drive Properties and Statistics Backup Exec provides details on each drive connected to a media server and the first robotic library drive. Note Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option. Most of the details presented in the drive properties tabbed pages are for information only. ▼

To view a drive’s properties: 1.

On the navigation bar, click Devices.

2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3.

Select the drive you want to view properties for.

4. Under General Tasks in the task pane, select Properties. See also: “Viewing General Drive Properties” on page 123 “Viewing Drive Configuration Properties” on page 125 “Viewing Drive SCSI Information Properties” on page 131 “Viewing Drive Statistics Properties” on page 132 “Viewing Drive Cleaning Properties” on page 134

122

Administrator’s Guide

Viewing and Using Drive Properties and Statistics

Viewing General Drive Properties The Drive Properties General tab provides information about the drive. Most of this information is for viewing only; however, you can rename your drive from this tabbed page by typing the new name in the Name field. General drive properties

Managing Devices

The General tab for drive properties provides the following information: General drive properties Item

Description

Name

The name of the drive. You can also rename the device by typing a new name in this field.

Vendor

The name of the vendor of the drive.

Product ID

The product ID from the SCSI Inquiry string.

Firmware version

The version of the firmware used in the device.

Drive type

The media and memory specifications of the device.

Media type

The type of media used in the drive.

Chapter 4, Managing Devices

123

Viewing and Using Drive Properties and Statistics General drive properties (continued) Item

Description

Date in service

The date this device was first detected by this installation of Backup Exec.

Full name

Displays the drive name and server name.

Serial number

The serial number of the drive.

See also: “Viewing and Using Drive Properties and Statistics” on page 122 “Viewing Backup Folder Properties” on page 158

124

Administrator’s Guide

Viewing and Using Drive Properties and Statistics

Viewing Drive Configuration Properties The Drive Properties Configuration tab allows you to: ◆

Enable or disable a device.



Enable or disable hardware compression (if compression is supported by the drive).



Pause and resume the drive.



Change the preferred block size, buffer size, buffer count, and high water count.

Caution Preferred Configuration settings are used to tune the performance of backup and restore operations. Changing Preferred Configuration settings is not generally recommended and may have a negative effect on your backup and system performance. Any changes should be thoroughly tested to make sure system performance does not deteriorate before being put into general use.

Chapter 4, Managing Devices

Managing Devices

Configuration drive properties

125

Viewing and Using Drive Properties and Statistics

The Configuration tab for drive properties provides the following information: Drive configuration properties Item

Description

Enable device for Backup Exec

Select this check box in order for Backup Exec to use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the box is clear, the device is disabled, and cannot be used by Backup Exec. After changing the option, click OK.

Pause device

Select this check box to pause the device, and then click OK. To resume the device, clear the check box and click OK.

Device offline

If the device is offline, this message is displayed. No operations are allowed on the device until it is online again. When the device is online, no message is displayed. The device is displayed as offline if: Š

The device was turned off after Backup Exec was started.

Š

The device was being used by another application (such as a Windows backup utility) when Backup Exec was started.

Š

The device is removed from the computer.

Š

A tape drive failure occurred.

Š

A tape is stuck in the drive.

Š

The firmware of the drive was updated; Backup Exec will behave as if the drive with its old name or identity no longer exists.

To put the device online, try the following:

126

Š

Check to make sure the device has power and that cables are properly attached. Turn the device on and reboot the server, or stop and restart the Backup Exec services.

Š

Stop the utility that is using the device, and then reboot the server, or stop and restart the Backup Exec services. To restart the Backup Exec services: For Windows NT 4.0, go to Settings, select Control Panel, and then select Services. For Windows 2000, Windows XP, and Windows Server 2003, go to Computer Management, select System Tools, select Services, and then select Applications.

Š

If the drive firmware has changed, delete the drive and restart Backup Exec services. After the drive appears with its new firmware identity, retarget all jobs that were using the old drive name to the new drive name.

Administrator’s Guide

Viewing and Using Drive Properties and Statistics Drive configuration properties (continued) Item

Description

Enable compression

If this option is available, this device is capable of supporting hardware compression. Select this check box to enable hardware compression. If a job is configured to use hardware compression, but is run on a drive on which hardware compression is disabled (even though it is supported), hardware compression is considered unavailable and is not used. If a drive that does not support hardware compression is added to a cascaded drive pool, the hardware compression option on all other drives in that pool is automatically disabled. You can enable the hardware compression option on the other drives again, but the pool will then have mixed compression, and could make restore operations difficult.

Priority

Set a priority for a drive that determines the order in which the drives in a drive pool are used. In the Priority box, type a number from 1 to 99, with 1 designating this drive as the first drive to be used in the drive pool, or click the arrows to select a value. The default priority is 10 so all drives have the same priority initially. The drive to which you assign the lowest number is the first drive to be used in the drive pool; for example, a drive with a priority of 1 is used before a drive with a priority of 5. Note Overwrite and append periods for media take precedence over drive priority.

Chapter 4, Managing Devices

127

Managing Devices

The Priority field is only available when the drive belongs to a drive pool and is selected for viewing under the drive pool icon. Drive properties displayed under the Robotic Libraries or Stand-alone Drives icon do not display the Priority field. For more information, see “Setting Priorities for Drives in a Drive Pool” on page 105.

Viewing and Using Drive Properties and Statistics Drive configuration properties (continued) Item

Description

Preferred configuration Note Preferred Configuration settings are used to tune the performance of backup and restore operations. Changing Preferred Configuration settings is not generally recommended and may have a negative effect on your backup and system performance. Any changes should be thoroughly tested to make sure system performance does not deteriorate before being put into general use. Block size (per device)

The default is the preferred size of the blocks of data written to new media in this device. You can change the block size by selecting another size from the scroll list, and then clicking OK. Some devices (for example, DLT drives) provide better performance when larger block sizes are used. The preferred block size can range from 512 bytes to 64 kilobytes. Backup Exec does not ensure that the requested block size is in fact supported by that drive. You should check the drive specifications to make sure that the block size is supported. If the drive does not support a block size, it will default to its standard block size. If the drive does not support block size configuration, this option is unavailable.

Buffer size (per device)

The default is the preferred amount of data sent to the drive on each read or write request. The buffer size must be an even multiple of the block size. You can change the buffer size by selecting another size from the scroll list, and then clicking OK. Depending on the amount of memory in your system, increasing this value may improve drive performance. Each type of drive requires a different buffer size to achieve maximum throughput.

Buffer count

The default is the preferred number of buffers allocated for this device. You can change the buffer count by selecting another count from the scroll list, and then clicking OK. Depending on the amount of memory in your system, increasing this value may improve drive performance. Each type of drive requires a different number of buffers to achieve maximum throughput. If you change the buffer count, you may need to adjust the high water count accordingly.

128

Administrator’s Guide

Viewing and Using Drive Properties and Statistics Drive configuration properties (continued) Item

Description

High water count

The default is the preferred number of buffers to be filled before data is first sent to the drive, and any time after that if the drive underruns. You can change the high water count by selecting another count from the scroll list, and then clicking OK. The high water count cannot exceed the buffer count. A value of 0 disables the use of high water logic; that is, each buffer is sent to the drive as it is filled. The default setting provides satisfactory performance in most instances; in some configurations, throughput performance may be increased when other values are specified in this field. If you increase or decrease the buffer count, the high water count should be adjusted accordingly. If a drive has a high water count default of 0, it should be left at 0. Click this button to return all the Preferred Configuration settings to their defaults, and then click OK.

Read single block mode

Select this check box to have this device read only one block of data at a time. If this check box is selected, the drive will read a single block of data at a time, regardless of the size of the buffer block. VERITAS recommends selecting this option if the drive is a shared storage device.

Write single block mode

Select this check box to have this device write only one block of data at a time. Selecting this check box provides greater control over the handling of data write errors. VERITAS recommends selecting this option if the drive is a shared storage device.

Read SCSI pass-through mode

Select this check box to have this device read data without going through a Microsoft tape device API. Selecting this check box allows the data to pass directly through the device driver and allows more detailed information in the event device errors occur. VERITAS recommends selecting this option if the drive is a shared storage device.

Chapter 4, Managing Devices

129

Managing Devices

Default Settings

Viewing and Using Drive Properties and Statistics Drive configuration properties (continued) Item

Description

Write SCSI pass-through mode

Select this check box to have this device write data without going through the Microsoft tape device API. Selecting this check box allows data to pass directly through the device driver and allows more detailed information in the event device errors occur. VERITAS recommends selecting this option if the drive is a shared storage device.

See also: “Viewing and Using Drive Properties and Statistics” on page 122

130

Administrator’s Guide

Viewing and Using Drive Properties and Statistics

Viewing Drive SCSI Information Properties Drive Properties SCSI Information tab

Drive SCSI properties Item

Description

Inquiry

The device information read from the device firmware.

Port

The identifying number of the port on the server to which the device is attached.

Bus

The identifying number of the bus to which the device is attached.

Target ID

The unique SCSI ID number (physical unit number).

LUN

The Logical Unit Number of the device.

See also: “Viewing and Using Drive Properties and Statistics” on page 122

Chapter 4, Managing Devices

131

Managing Devices

The Drive Properties SCSI Information tab provides the following information about the Small Computer System Interface (SCSI):

Viewing and Using Drive Properties and Statistics

Viewing Drive Statistics Properties The Drive Properties Statistics tab provides the date the drive was last mounted, drive totals such as the total number of bytes written and read, and drive errors. Error rates are affected by media, head cleaning, and head wear. The documentation included with your device should list the acceptable limits for hard and soft errors; if not, check with the hardware manufacturer. Drive Properties Statistics tab

The Statistics tab provides the following information: Drive statistics properties Item

Description

Last mount date

Last date that media was mounted by this device.

Drive totals

132

Total Bytes written

Number of bytes that have been written by this device.

Total Bytes read

Number of bytes that have been read by this device.

Total mounts

Number of times media has been mounted by this device.

Administrator’s Guide

Viewing and Using Drive Properties and Statistics Drive statistics properties (continued) Item

Description

Total seeks

The total number of seek operations (performed when a specific piece of information is being located) that have been performed by this device.

Total Hours in use

The total number of hours that this drive has been in use (performing read, write, mount, and seek operations).

Drive errors The number of errors encountered while trying to locate data.

Soft read errors

The number of recoverable read errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage.

Hard read errors

The number of unrecoverable read errors encountered. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.

Soft write errors

The number of recoverable write errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage.

Hard write errors

The number of unrecoverable write errors encountered. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.

See also: “Viewing and Using Drive Properties and Statistics” on page 122

Chapter 4, Managing Devices

133

Managing Devices

Seek errors

Viewing and Using Drive Properties and Statistics

Viewing Drive Cleaning Properties The Drive Properties Cleaning tab provides statistics on totals and errors since the last cleaning. The documentation included with your device should list the acceptable limits for hard and soft errors; if not, check with the hardware manufacturer. For robotic library drives, the statistics that appear on the Drive Properties Cleaning tab are automatically updated when a cleaning job successfully completes. (Cleaning jobs can only be created for a robotic library drive.) If you want to maintain accurate cleaning statistics for your stand-alone drives, click Reset Cleaning Statistics after the drive has been manually cleaned. Drive Properties Cleaning tab

The Cleaning tab provides the following information: Drive cleaning properties

134

Item

Description

Last cleaning date

The last time a cleaning operation was performed on the drive.

Hours since last cleaning

The number of hours that the drive has been in use since the last cleaning.

Reset Cleaning Statistics

Click this to reset all cleaning statistics to zero (stand-alone drives only). Administrator’s Guide

Viewing and Using Drive Properties and Statistics Drive cleaning properties (continued) Item

Description

Totals since last cleaning Number of bytes that have been written by this device since the last cleaning.

Bytes read

Number of bytes that have been read by this device since the last cleaning.

Total mounts

Number of times media has been mounted by this device since the last cleaning.

Total seeks

The total number of seek operations (performed when a specific piece of information is being located) that have been performed by this device since the last cleaning.

Hours in use

The total number of hours that this drive has been in use (performing read, write, mount, and seek operations) since the last cleaning.

Errors since last cleaning Seek errors

The number of errors encountered since the last cleaning while trying to locate data.

Soft read errors

The number of recoverable read errors encountered since the last cleaning. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage.

Hard read errors

The number of unrecoverable read errors encountered since the last cleaning. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.

Soft write errors

The number of recoverable write errors encountered since the last cleaning. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage.

Chapter 4, Managing Devices

135

Managing Devices

Bytes written

Viewing and Using Drive Properties and Statistics Drive cleaning properties (continued) Item

Description

Hard write errors

The number of unrecoverable write errors encountered since the last cleaning. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.

See also: “Viewing and Using Drive Properties and Statistics” on page 122

Viewing and Specifying a Drive’s Media Types Through the Media Types tab of a drive’s Properties dialog box, you can view all known media types that can be placed in the drive and specify whether these media types can be used for Read or Write operations. Drive Properties - Media Type tab

136

Administrator’s Guide

Viewing and Using Drive Properties and Statistics

The Media Types tab provides the following information: Media type options for a drive Item

Description

Media Type

Type of media, such as 4mm, and any defined category of this media type, such as CLN for cleaning tape. Media types that have numbers appearing in brackets (for example, 4mm [6]) can be used to define specific bar code rules.

Read

Displays Yes if this media type can be read by the drive; otherwise, displays No.

Write

Displays Yes if this media type can be written to by the drive; otherwise, displays No.

By default, the Media Types tab for a drive lists all known media type categories and allows all media types to be used for both read and write operations. If a number appears in brackets behind the media type, that media entry is available for use when creating a bar code rule. You can specify that the drive be limited to performing read and write operations on specific media types. For example, if your drive’s documentation states that the drive cannot perform write operations to a 4MM DDS-4 tape, you can select that media type from this dialog box, clear the Write check box, and then click OK. This information is then incorporated in the ADAMM database, allowing Backup Exec to exclude this media type when searching for media to be used for an operation (such as a backup job) requiring the writing of data to the media. See also: “Viewing and Using Drive Properties and Statistics” on page 122 “Bar Code Labeling in Mixed Media Libraries” on page 205

Chapter 4, Managing Devices

137

Managing Devices

Backup Exec’s ADAMM database maintains a list of media types, such as 4MM, and then further defines the subcategories or specifics of a media type. For example, a 4MM media type can include 4MM DDS-1 with a length of 60m and the storage capacity of 1.3 GB. Another 4MM tape might also be a 4MM DDS-1 but have a length of 90m and a storage capacity of 2.0 GB.

Using Robotic Libraries with Backup Exec

Using Robotic Libraries with Backup Exec Note Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option. Backup Exec’s Advanced Device and Media Management (ADAMM) feature provides powerful functionality for robotic libraries. With typical robotic library modules, you divide slots in the robotic library into defined groups, and then target backups to those groups. This arrangement works fine as long as there is enough media in the group to process the jobs targeted there. Problems occur when the data exceeds the available media in the group, because operations cannot continue until media is physically added. This situation can take place even though slots in the robotic library assigned to other groups contain usable media. Backup Exec’s Device and Media Management feature solves the problems associated with typical robotic library modules. Rather than targeting a backup job to a specific group of slots with a finite number of media, Backup Exec accesses all of the media in the robotic library and uses media that belongs to the job’s targeted media set. If the backup job exceeds the capacity of one piece of media, Backup Exec searches all media contained in the robotic library, finds a suitable media, and uses it for the job. For example: An operator has a robotic library with six slots. She puts in six blank tapes and targets backup jobs to various media sets within the robotic library. Depending on whether the backups are overwrite or append jobs, Backup Exec automatically allocates available tapes in the robotic library. If a job exceeds the capacity of one tape and another overwritable tape is available in the robotic library, the job will automatically continue on that tape. When Backup Exec runs out of tapes, it prompts the operator to add more Scratch media. In a robotic library, Backup Exec selects the oldest recyclable media in the library to use first. If more than one media meeting the requirements is found, Backup Exec then selects the media in the lowest-numbered slot, that is, media in slot 2 would be chosen over equivalent media in slot 4. If a job requiring overwritable media is targeted to a robotic library and no overwritable media is available, the job is skipped and the next job targeted to the robotic library is queued. When overwritable media becomes available either by the addition of media to the robotic library or the overwrite protection period expiring for a media currently in the robotic library, the skipped job will run. See also: “VERITAS Backup Exec - Library Expansion Option” on page 1175

138

Administrator’s Guide

Using Robotic Libraries with Backup Exec

Configuring a Robotic Library Before installing Backup Exec, make sure the SCSI addresses of the robotic library and the storage device are configured properly. If you have not already enabled robotic library support, rerun the installation program and select Enable Robotic Library Support found in the list of install components. Enable Robotic Library Support provides support for a single-drive robotic library or for the first drive in a multi-drive robotic library. For support for each additional single-drive robotic library, or for each additional drive in a multi-drive robotic library, you must purchase and install a Library Expansion Option. After enabling robotic library support, check your robotic library’s configuration in the Device Configuration Wizard. This wizard appears automatically the first time Backup Exec is started, or it can be launched from the Tools menu by selecting Wizards, and then selecting Device Configuration Wizard.

If your robotic library uses a zero-based slot configuration, be sure the Slot Base field on the Configuration tab of the robot’s Properties dialog box displays 0. After completing the configuration of your robotic library, you should perform an Inventory operation to update Backup Exec’s media database. During startup, Backup Exec expects the storage devices in the robotic library to be empty. If there is media in the device, Backup Exec tries to return the media to its original magazine slot. If, for any reason, it cannot return the media to the slot, an error message appears requesting that the media be ejected from the storage device. See also: “Setting Up Robotic Library Hardware” on page 1175 “Installing Backup Exec” on page 48 “First Time Startup Wizard” on page 80 “Setting Up Cleaning Jobs for Robotic Library Drives” on page 184

Chapter 4, Managing Devices

139

Managing Devices

Make sure that each device in the robotic library is properly associated with the robotic library. If a robotic library storage device appears in the device list as a stand-alone device, you can correct the association by clicking and dragging the drive over the robotic library entry. If the robotic arm is not shown, run the installation program and select the Enable Robotic Library Support option.

Using Robotic Libraries with Backup Exec

Viewing Properties of a Robotic Library Through the robotic library’s Properties dialog box, you can rename a robotic library, enable or disable the device for Backup Exec, specify the slot base numbering, and view information about the library. ▼

To view properties of a robotic library: 1.

On the navigation bar, click Devices.

2. Expand the server icon in the tree view, and then click Robotic Libraries. 3. Select the robotic library. 4. Under General Tasks in the task pane, select Properties. See also: “Viewing General Robotic Library Properties” on page 141 “Viewing Robotic Library Configuration Properties” on page 142 “Viewing SCSI Information for a Robotic Library” on page 144 “Viewing Status Information for a Robotic Library” on page 145

140

Administrator’s Guide

Using Robotic Libraries with Backup Exec

Viewing General Robotic Library Properties While most of the information appearing on the General tab for a robotic library’s properties dialog box is for viewing only, you can use this dialog to rename your robotic library. General robotic library properties

Managing Devices

The General tab provides the following information: General properties options for robotic library Item

Description

Name

The name of the robotic library. You can rename the device by typing a new name in this field.

Vendor

The name of the vendor of the robotic library.

Product ID

The product ID from the SCSI Inquiry string.

Firmware version

The version of the firmware used in the device.

Robotic Library type

The manufacturer and model number of the robotic library.

Date in service

The date this device was first detected by Backup Exec.

Chapter 4, Managing Devices

141

Using Robotic Libraries with Backup Exec General properties options for robotic library Item

Description

Full name

Displays the robotic library name and server name; for example, robotic library name(server name).

Serial number

Serial number of the robotic library.

See also: “Viewing Properties of a Robotic Library” on page 140

Viewing Robotic Library Configuration Properties Through the Configuration tab of a Robotic Library’s Properties dialog box, you can enable or disable the robotic library for use by Backup Exec, enable startup initialization for the robotic library, enable bar code rules, enable Removable Storage, and specify slot base numbering. Robotic library configuration properties

142

Administrator’s Guide

Using Robotic Libraries with Backup Exec

The Configuration tab provides the following information: Configuration properties options for robotic library Description

Enable device for Backup Exec

Select this check box to have Backup Exec use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the check box is clear, the device is disabled, and cannot be used by Backup Exec.

Enable startup initialization

Select this option to have Backup Exec initialize the robotic library when Backup Exec is started. Depending upon the robotic library, initialization can include reading all bar code labels on media.

Enable bar code rules

Select this check box to enable bar code rules (see “Bar Code Labeling in Mixed Media Libraries” on page 205).

Enable Removable Storage (RSM)

Select this option if you want to allow Removable Storage to share the devices in robotic libraries between two or more applications. If the device is enabled in Removable Storage, Backup Exec uses Removable Storage for device and media operations; if the device is disabled in Removable Storage, Backup Exec controls the device directly. For more information about using Removable Storage with Backup Exec’s Advanced Device and Media Management feature, see “Using Microsoft’s Removable Storage Feature with Backup Exec” on page 167

Slot base

Depicts the starting slot. Some robotic libraries have slots starting at "0"; others start at "1". If your robotic library uses a zero-based slot configuration you can reassign how the slots are displayed by typing the appropriate number in the Slot Base field.

See also: “Viewing Properties of a Robotic Library” on page 140

Chapter 4, Managing Devices

143

Managing Devices

Item

Using Robotic Libraries with Backup Exec

Viewing SCSI Information for a Robotic Library Robotic library SCSI information

The SCSI Information tab of a robotic library’s Properties dialog box displays the following information: SCSI Information for a robotic library Item

Description

Inquiry

The device information read from the device firmware.

Port

The identifying number of the port on the server to which the device is attached.

Bus

The identifying number of the bus to which the device is attached.

Target ID

The unique SCSI ID number (physical unit number).

LUN

The Logical Unit Number of the device.

See also: “Viewing Properties of a Robotic Library” on page 140

144

Administrator’s Guide

Using Robotic Libraries with Backup Exec

Viewing Status Information for a Robotic Library Robotic library status properties

Status information for a robotic library Item

Description

Slot count

Number of slots in the robotic library.

Drive element count

Number of drive elements contained in the robotic library.

Total mounts

Number of times media has been mounted by this device.

Mount errors

Number of errors encountered while mounting media in a drive.

See also: “Viewing Properties of a Robotic Library” on page 140

Chapter 4, Managing Devices

145

Managing Devices

The Status tab of a robotic library’s Properties dialog box provides the following information:

Using Robotic Libraries with Backup Exec

Creating Robotic Library Partitions You can group one or more robotic library slots into partitions. Partitioning robotic library slots provides more control over which media is used for backup jobs. When you set up robotic library partitions, Backup Exec creates a drive pool for each partition. Jobs targeted to a partition drive pool run on the media located in the partition’s slots. For example, if you set up a partition that contains slots 1 and 2 and you want to run a weekly backup only on the media in these slots, you would submit the job to the partition drive pool containing slots 1 and 2. The partition drive pools appear in the Devices view under the Drive Pools icon. If the robotic library is partitioned, Backup Exec searches for the oldest recyclable media in the targeted partition only. If more than one media meeting the requirements is found, Backup Exec then selects the media in the lowest-numbered slot, that is, media in slot 2 would be chosen over equivalent media in slot 4. In order to fully benefit from Backup Exec’s partition management feature, VERITAS recommends that you create a partitioning scheme that best matches the manner in which you want to control your backups. For example, some administrators may feel that network backups are best managed by allowing access to partitions based on users and groups, while others may want to base their partitions on operation types (Backup, Tape Rotation, Archive, etc.). ▼

To create partitions: 1. On the navigation bar, click Devices. 2. Expand the server icon, and then click Robotic Libraries. 3. Select the robotic library containing the slots that you want to partition. 4. Under Robotic Library Tasks in the task pane, select Configure partitions.

146

Administrator’s Guide

Using Robotic Libraries with Backup Exec

5. Select the robotic library slots to include in each partition by clicking the slots on which each new partition should begin. A partition divider listing the range of slots included in the partition is inserted wherever you click. For example, if you want to create two, 5-slot partitions on a robotic library with 10 slots, click Slot 1 and Slot 6. In this example, Slots 1-5 will be included in the first partition and Slots 6-10 will be included in the second. Partitions can include any number of robotic library slots; however, the first partition cannot be moved or deleted when other partitions exist. Note Depending upon your robotic library configuration, the first slot could be numbered 1 or 0. If your robotic library uses a zero-based slot configuration and you assign the first partition to begin with slot 1, the Partition Utility will actually use slot 0 as the first slot for partition 1 and adjust the starting slot accordingly for all other partitions. Configure Partitions dialog box

Managing Devices

Partition Divider

6. While defining your partitions, use the following buttons to help you make selections: Configure Partitions dialog box Item

Description

Remove Partition

Remove the selected partition. The slots contained in the partition you are removing are added to the partition preceding it.

Move Up

Move the selected partition divider up to increase the number of slots in the partition. (The number of slots in the preceding partition is decreased.)

Chapter 4, Managing Devices

147

Using Robotic Libraries with Backup Exec Configure Partitions dialog box Item

Description

Move Down

Move the selected partition divider down to decrease the number of slots in the partition. (The number of slots in the preceding partition is increased.)

Remove All

Remove all partition settings.

7. Click OK after completing the configuration of your partitions. 8. Click Yes to accept the partitions. The partition drive pools appear under Robotic Libraries for the robotic library on which they were created. All partition drive pools for a robotic library have the same name and display the slot ranges for the partition in parentheses within the name. After defining the partitions, you can submit jobs to those partitions’ drive pools. The partition drive pools appear in the list of devices along with other devices available to the media server. Click the target partition drive pool and run the job as you would any other Backup Exec job.

Redefining Robotic Library Partitions You can reassign slots to different partitions or even create or delete partitions from a partition drive pool by repeating the steps for creating partitions and providing different beginning slot parameters. Suppose, for example, your current setup is a 6-slot robotic library with two partitions (partition 1 = slots 1-3 and partition 2 = slots 4-6). If you want to have three partitions with slots 1-2 in partition 1, slots 3-5 in partition 2, and slot 6 in partition 3, you would select slots 1, 3, and 6. Because the first two partition drive pools maintain the same identity, even though the slots have been reassigned, jobs submitted to those partition drive pools will not have to be retargeted. However, if you change from three partitions to two partitions, any jobs submitted to the third partition must be retargeted since that third partition no longer exists. Also, if you create a new partition that completely contains two or more of the old partitions, jobs submitted to the old partition must be retargeted.

148

Administrator’s Guide

Using Backup-to-Disk Folders and Files

For example, if a robotic library that had been partitioned with partition 1 containing slots 1-2, partition 2 containing slots 3-4, and partition 3 containing slots 5-10 is repartitioned so that partition 1 contains slots 1-4, partition 2 contains slots 5-6, and partition 3 contains slots 7-10. Any jobs targeted to the old partition 2 (slots 3-4) will need to be retargeted. Note If a job is targeted to a particular robotic library drive (or a drive pool that is not a partition drive pool), the job defaults to the first partition in the robotic library. See also: “Creating Robotic Library Partitions” on page 146 “Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 109

Using Backup-to-Disk Folders and Files

Before you can start using Backup-to-Disk, you need to create a backup folder, which is a virtual device that Backup Exec treats as any real tape device. Backup folders can be part of drive pools, but not cascaded drive pools. When you create a new backup folder, Backup Exec automatically assigns a name and a path to it, but you can change both. You can create as many backup folders as you need. When you back up to disk, Backup Exec places the data in a backup file in the backup folder you specify. Backup files are virtual media where backed up data is stored. Backup files are like any other type of media, so you can inventory, catalog, erase, and restore them. Since Backup Exec recognizes the backup folders as devices, you can view them by selecting Devices on the navigation bar. You can view the backup files from both the Devices view and the Media view in Backup Exec. In Windows Explorer, the backup folders display in the path you specified when you added the folders, and the backup files display with a.bkf file extension. Each backup folder also contains a changer.cfg file and a folder.cfg file, which store information about the backup files. Note You should not delete or edit the changer.cfg or folder.cfg files.

Chapter 4, Managing Devices

149

Managing Devices

Backup Exec includes a feature called Backup-to-Disk, which allows you to back up data to a folder on a hard disk instead of to a tape device. Backup-to-Disk provides a faster method of backing up and restoring files, which is useful when you have a short amount of time to back up or restore data. You can use it as part of a two-stage backup process where you back up data to disk first and then transfer the data to a tape when more time is available.

Using Backup-to-Disk Folders and Files

If you use Backup Exec’s Intelligent Disaster Recovery (IDR) option, you must use remote IDR to recover computers that include backup-to-disk files. The backup folders must be available to the Backup Exec server you are using to restore the data. See also: “Viewing Devices” on page 96

Adding a Backup Folder Before you can start using the Backup-to-Disk feature, you must create at least one backup folder. When you create a new backup folder, it is recommended that you create it on a different physical disk than the disk you want to back up. You can create either a backup-to-disk folder or a removable backup-to-disk folder. You can create a backup-to-disk folder in any location where you can write a file, such as: ◆

NTFS partitions (local or remote)



Network Attached Storage (NAS) devices



DFS shares



FAT/FAT32 partitions (local or remote)



VERITAS Volume Manager partitions



RAID drives with any configuration



Mapped drives



NFS volumes

You can create removable backup-to-disk folders on any removable device, provided the device appears as a drive letter and is formatted with a file system. Removable devices can include: ◆

CDR-RW



DVD-RW



ZIP



JAZZ



Removable hard disk

For CDR-RW and DVD-RW, third-party software must be used to format the media with a file system before it can be used with Backup Exec. You can use the following steps to manually add a new backup folder. You also can use the Device Configuration Wizard to create a new backup folder.

150

Administrator’s Guide

Using Backup-to-Disk Folders and Files ▼

To add a backup folder: 1. On the navigation bar, click Devices. 2. Select Backup-to-Disk Folder. 3. Under Backup-to-Disk Tasks in the task pane, select New folder. Note If a Backup-to-Disk Warning appears, read it and then verify that the disk where you want to create the backup folder has sufficient free space. If you do not want to see this message every time you add a new folder, select Do not display this message again. Then, click OK. The Add New Backup-to-Disk Folder dialog box appears. Add New Backup-to-Disk Folder dialog box

Managing Devices

Chapter 4, Managing Devices

151

Using Backup-to-Disk Folders and Files

4. Select the appropriate options as follows: New Backup-to-Disk Folder options Item

Description

Name

Type a name for this folder. Note Backup folder names must not exceed 243 characters.

Path or Drive

Enter the location where the folder is to reside. Path is required if the option Backup-to-Disk folder is selected. Drive is specified if the Removable Backup-to-Disk folder option is selected. Note If you do not know the exact path, click the button next to the Path field to select the correct path.

Backup-to-Disk folder

Select this option if the folder is to exist on a device that has non-removable media. This type of folder supports concurrent operations from one or more media servers. You can create a backup folder in any location where you can write a file, such as: Š

NTFS partitions (local or remote)

Š

Network Attached Storage (NAS) devices

Š

DFS shares

Š

FAT/FAT32 partitions (local or remote)

Š

VERITAS Volume Manager partitions

Š

RAID drives with any configuration

Š

Mapped drives

Š

NFS volumes

Note Backup Exec does not determine if the device is a non-removable device; however, VERITAS recommends that you do not select this option if you want to use removable media, such as a zip drive.

152

Administrator’s Guide

Using Backup-to-Disk Folders and Files New Backup-to-Disk Folder options Item

Description

Removable Backup-to-Disk folder

Select this option if the folder is to exist on a device that has removable media. This type of folder supports spanning of backup sets from one piece of media to another, but does not support concurrent operations. This type of folder should not be shared between media servers. When creating this type of folder, you must specify only a device, not a path. You can create removable backup-to-disk folders on any removable device, provided the device appears as a drive letter and is formatted with a file system. Removable devices can include: Š

CDR-RW

Š

DVD-R

Š

DVD-RW

Š

ZIP

Š

JAZZ

Š

Removable hard disk

Set Default Path

Click this button if you want to set a default path for all future backup folders. Then, type or select the default path.

5. Click OK. The folder appears on the Devices tab below the Backup-to-Disk Folders icon and the All Drives icon. It also appears in Windows Explorer as a folder. You can back up data to this folder now. See also: “Viewing Devices” on page 96

Chapter 4, Managing Devices

153

Managing Devices

For CDR-RW, DVD-R, and DVD-RW, third-party software must be used to format the media with a file system before it can be used with Backup Exec.

Using Backup-to-Disk Folders and Files

Renaming a Backup Folder When you use the Backup Exec Rename option to rename a backup folder, the name changes in Backup Exec, but not on the disk. If you also want to change the name of the Windows folder in Windows Explorer, use the Windows Rename option. ▼

To change the name of a backup folder: 1. On the navigation bar, click Devices. 2. Under Backup-to-Disk Folders, click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 3. Select the backup folder you want to rename. 4. Under General Tasks in the task pane, select Rename. 5. On the Rename dialog box, type the new backup folder name, and then click OK. Note Backup folder names must not exceed 243 characters. 6. If you want to rename the Windows folder in Windows Explorer, use the Windows Rename option.

Changing the Path of a Backup Folder If you want to change the path of a backup folder, you cannot just move it from one place to another. First, you create a new backup folder. Then you move the backup files from the original backup folder to the new backup folder. ▼

To change the path of a backup folder: 1. Add a new backup folder with a name and path that is different than the original backup folder. 2. In Windows Explorer, copy and paste the backup files from the original backup folder to the new backup folder. 3. On the Backup Exec navigation bar, click Devices. 4. Right-click the new backup folder, and then click Refresh on the shortcut menu, or select the new backup folder and press .

154

Administrator’s Guide

Using Backup-to-Disk Folders and Files

5. Click the new backup folder and verify that the backup files appear in the right pane. 6. To rename the new backup folder to match the name of the original backup folder, delete the original backup folder and then rename the new folder. See also: “Adding a Backup Folder” on page 150 “Renaming a Backup Folder” on page 154. “Deleting a Backup File” on page 162

Deleting a Backup Folder When you use the Backup Exec Delete option to delete a backup folder, the backup folder is removed from Backup Exec, but the backup folder and the files in it remain on the disk so you can recreate them later. If you also want to delete the folder from the disk, use the Windows Delete option. However, you cannot recreate the backup folder or files after you delete them from the disk.

Managing Devices



To delete a backup folder: 1. On the navigation bar, click Devices. 2. Under Backup-to-Disk Folders, click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 3. Select the backup folder you want to remove. 4. Under General Tasks in the task pane, select Delete. 5. Click Yes. The backup folder is removed from Backup Exec, but the files and the folder still exist on the disk. You can still recreate the backup folder at a later date if necessary. If you do not want to delete the folder from the disk, you have completed this procedure. 6. If you want to delete the folder from the disk, use Windows Explorer to navigate to the folder. Caution If you delete the folder from the disk you cannot recreate it later. You lose all the files from the folder.

Chapter 4, Managing Devices

155

Using Backup-to-Disk Folders and Files

7. Select the folder you want to delete, and then under General Tasks in the task bar, select Delete. 8. Click Yes. The folder is removed from the disk. You cannot recreate the folder or the files.

Recreating a Backup Folder and Its Contents If you have deleted a backup folder from Backup Exec, but have not deleted it from the disk, you can recreate the backup folder and the files in it. You must know the name and path of the original backup folder in order to recreate it. If you deleted a backup folder from the disk, you cannot recreate it. ▼

To recreate a backup folder and the files in it: 1. Add a new folder to Backup Exec using the same name and path as the deleted folder. 2. On the navigation bar, click Devices. 3. Expand either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 4. Select the new folder. 5. Under Media Tasks in the task pane, select Inventory and create and run an inventory job. When the inventory is complete, the files display on the results pane. See also: “Adding a Backup Folder” on page 150 “Inventorying Media in Devices” on page 171

156

Administrator’s Guide

Using Backup-to-Disk Folders and Files

Pausing and Resuming a Backup Folder When you pause a backup folder, backup jobs do not run on it. If a backup job is already running on a backup folder when you pause it, the job will complete, but any subsequent backup jobs will not run until the folder is resumed. If a backup job fails and the backup folder goes offline, you must pause and resume the folder after you correct the problem. ▼

To pause or resume a backup folder: 1. On the navigation bar, click Devices. 2. Expand the icon for the workstation where the backup folder is located. 3. Under Backup-to-Disk Folders, click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 4. Select the backup folder you want to pause or resume.

5. Under Backup-to-Disk Tasks in the task pane, select Pause. If the folder was not already paused, it is now paused. If the folder was already paused, it is now resumed.

Chapter 4, Managing Devices

157

Managing Devices

A check mark appears next to the Pause option if the backup folder is currently paused.

Using Backup-to-Disk Folders and Files

Viewing Backup Folder Properties Use Properties to view information about the backup folder, and in some cases, to change configuration information for the backup folder. Information that can be changed through the Properties dialog box includes the folder’s name, file management settings, disk space settings, device settings, and concurrent operations settings. ▼

To view or change the properties of a backup folder: 1. On the navigation bar, click Devices. 2. Expand the icon for the workstation where the backup folder is located. 3. Under Backup-to-Disk Folders, click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 4. Select the folder you want to view. 5. Under General Tasks in the task pane, select Properties. General properties of backup folder

158

Administrator’s Guide

Using Backup-to-Disk Folders and Files

General properties of the backup folder include: General Backup Folder Properties dialog box Description

Name

Name of the backup folder. You can type a new folder name here.

Path

The path to the folder. You cannot change the path here.

Enable device for Backup Exec

Select this check box to have Backup Exec use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the check box is clear, the device is disabled, and cannot be used by Backup Exec. After changing the option, click OK.

Priority

The Priority field is only available when the backup folder belongs to a drive pool and is selected for viewing under the drive pool icon. Backup folder properties displayed under the Backup-to-Disk Folders and Removable Backup-to-Disk icons do not display the Priority field. For more information, see “Setting Priorities for Drives in a Drive Pool” on page 105. Set a priority for a backup folder that determines the order in which the devices in a drive pool are used. In the Priority box, type a number from 1 to 99, with 1 designating this device as the first device to be used in the drive pool, or click the arrows to select a value. The default priority is 10 so all devices have the same priority initially. The device to which you assign the lowest number is the first device to be used in the drive pool; for example, a device with a priority of 1 is used before a device with a priority of 5. Note Overwrite and append periods for media take precedence over drive priority.

Pause device

Select this check box to pause the device, and then click OK. To resume the device, clear the box and click OK.

Folder Type

Displays either Backup -to-Disk Folder or Removable Backup-to-Disk Folder, depending on which type of device this folder exists. This option cannot be changed.

Chapter 4, Managing Devices

159

Managing Devices

Item

Using Backup-to-Disk Folders and Files

6. Click Advanced to view or change configuration information. Advanced properties of book folder

7. Select from the following options: Advanced book folder property options Item

Description

Backup-to-Disk file management

160

Maximum size for Backup-to-Disk files

Type the maximum size for each backup-to-disk file contained in this folder and then select either MB or GB as the unit of size. The file size can be as small as 1 MB or as large as 4096 GB. The default is 1 GB.

Maximum number of backup sets per Backup-to-Disk file

Type the maximum number of backup sets to be written to each backup-to-disk file in this folder. The maximum number can range from 1 to 8192. The default is 100.

Administrator’s Guide

Using Backup-to-Disk Folders and Files Advanced book folder property options Item

Description

Disk Space Settings Disk space reserve

Type the minimum number of megabytes or gigabytes of disk space that can remain before the backup-to-disk folder stops accepting jobs. If the backup-to-disk folder is a removable storage folder, the jobs will span to new media after the reserved disk space reaches this minimum.

Device settings Clear this check box if you have a storage device for which you can set buffer reads or writes. Otherwise, when this option is selected Backup Exec will detect the preferred settings for your device.

Buffered reads

Select this check box if you do not want Backup Exec to auto-detect device settings and you know that your device allows buffered reads which is, the reading of large blocks of data.

Buffered writes

Select this check box if you do not want Backup Exec to auto-detect device settings and you know that your device allows buffered writes, which is the writing of large blocks of data.

Concurrent Operations Allow x concurrent operations for this Backup-to-Disk Folder for this server.

This option only appears if the backup-to-disk folder is a non-removable folder. Type the number of concurrent operations that can be performed on this folder. This number can range from 1 to 16.

8. Click OK.

Renaming a Backup File When you rename a backup file, the name changes in Backup Exec and also on disk. The media label also changes. ▼

To rename a backup file: 1. On the navigation bar, click Devices. 2. Double-click the icon for the workstation where the backup folder is located.

Chapter 4, Managing Devices

161

Managing Devices

Auto detect settings

Using Backup-to-Disk Folders and Files

3. Double-click Backup-to-Disk Folders. 4. Click the folder that contains the file you want to rename. 5. On the results pane, select the file you want to rename. 6. Under General Tasks in the task pane, select Rename. 7. Type a new name for the file, and then click OK.

Deleting a Backup File You must move backup files to the Retired Media set before you can delete them. When you delete a backup file from the Media tab in Backup Exec, it is deleted from Backup Exec but the Windows folder and files still exist in Windows Explorer. You can recreate the deleted backup files if you have not used Windows Explorer to delete them from the disk. ▼

To delete a backup file: 1. On the navigation bar, click Media. 2. Click the media set that contains the backup file. 3. Use the Windows drag-and-drop feature to move the backup file into the Retired Media set. 4. On the results pane, select the backup file you want to delete. 5. Under General Tasks in the task pane, select Delete. 6. Click Yes, or if you selected multiple backup files, click Yes to All. The backup file is deleted from Backup Exec, but not from the disk. To delete the backup file from the disk, continue to step 7. If you do not want to delete the backup file from the disk, you have completed this procedure. Caution If you perform step 7 to delete the backup file from the disk, you can no longer restore the deleted file. 7. Using Windows Explorer, navigate to the location where the backup file is stored. 8. Right-click the backup file. 9. Click Delete, and then click Yes.

162

Administrator’s Guide

Using Backup-to-Disk Folders and Files

Recreating a Deleted Backup File If you deleted a backup file from Backup Exec, but did not use Windows Explorer to delete the file from the disk, you can recreate it by running Inventory. ▼

To recreate a backup file: 1. On the navigation bar, click Devices. 2. Expand the icon for the workstation where the backup folder is located. 3. Under Backup-to-Disk Folders, click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. 4. Select the folder where the backup file was located before you deleted it. 5. Under Backup-to-Disk Tasks in the task pane, select Inventory and create and run an inventory job. The backup file appears on the results pane when the inventory job completes.

Managing Devices

See also: “Inventorying Media in Devices” on page 171

Viewing and Changing Backup File Properties The file properties that you can view include the: ◆

File name and description.



Creation, allocation, and modification dates.



Number of bytes written and read, total mounts and seeks, and hours in use.



Types of errors encountered on the file.

In addition to viewing properties, you also can change the file name and description from the Properties dialog box. ▼

To view or change backup file properties: 1. On the navigation bar, click Devices. 2. Expand the icon for the workstation where the backup folder is located. 3. Under Backup-to-Disk Folders, click either Backup-to-Disk Folders or Removable Backup-to-Disk Devices.

Chapter 4, Managing Devices

163

Using Backup-to-Disk Folders and Files

4. Click the backup folder that contains the file you want to view or change. 5. On the results pane, select the file you want to view or change. 6. Under General Tasks in the task pane, select Properties. Backup-to-Disk File General Properties dialog box

The General properties of a backup-to-disk file include: General properties of a backup-to-disk file

164

Item

Description

Name

Name of the backup file. You can change the name of the backup file by entering a new file name.

Description

Description of the backup file. The description displays on the Devices tab. You can type a new description here.

Administrator’s Guide

Using Backup-to-Disk Folders and Files

7. Click Management. Backup-to-Disk File Management Properties dialog box

Managing Devices

The Management properties of a backup-to-disk file include: Management properties of a backup to disk file Item

Description

Creation date

The date and time this backup-to-disk file was created.

Allocation date

The date and time that the backup-to-disk file was allocated to a media set.

Modification date

The date and time when data was last written to the backup-to-disk file.

Chapter 4, Managing Devices

165

Using Backup-to-Disk Folders and Files

8. If you want to view the statistics and errors for this file, select the Statistics tab. Backup-to-Disk File Statistics Properties dialog box

The following information appears: Statistics properties of a backup-to-disk file Item

Description

Totals Total Bytes Written

Number of bytes that have been written to this media.

Total Bytes Read

Number of bytes that have been read from this media.

Total Mounts

Number of times this media has been mounted.

Total Seeks

Total number of seek operations (performed when a specific piece of information is being located) that have been performed on this media.

Total Hours in Use

Total number of hours that this media has been in use.

Errors Seek Errors

166

The number of errors encountered while trying to locate data.

Administrator’s Guide

Using Microsoft’s Removable Storage Feature with Backup Exec Statistics properties of a backup-to-disk file (continued) Item

Description

Soft Read Errors

The number of recoverable read errors encountered.

Hard Read Errors

The number of unrecoverable read errors encountered.

Soft Write Errors

The number of recoverable write errors encountered.

Hard Write Errors

The number of unrecoverable write errors encountered.

9. After viewing properties for the backup-to-disk file, click OK.

Using Microsoft’s Removable Storage Feature with Backup Exec

On the media server, you can allow Removable Storage to share the devices in robotic libraries between two or more applications, or you can allow some or all devices in robotic libraries to be controlled and used exclusively by Backup Exec’s Advanced Device and Media Management (ADAMM). If the device is enabled for Removable Storage through the robotic library’s Properties (see “Viewing Robotic Library Configuration Properties” on page 142), Backup Exec uses Removable Storage for device and media operations; if the Enable Removable Storage is cleared, Backup Exec controls the device directly. Note In some situations, Removable Storage does not support a robotic library, but may still support some drives in the robotic library. When this happens, Removable Storage disables the robotic libraries but enables the supported drives in the robotic libraries. You should use the Removable Storage snap-in in an MMC to disable all of the drives in the robotic library. This allows Backup Exec to control the robotic library and all of the drives.

Chapter 4, Managing Devices

167

Managing Devices

Removable Storage is a feature of Windows 2000, Windows XP, and Windows Server 2003 systems that allows applications to share removable storage devices. Removable Storage performs requests for device access from different applications on a first in, first out basis. It also tracks media usage for online media (media currently mounted in a robotic library) and for offline media that has been installed previously in a robotic library. Removable Storage does not manage single-slot tape drives.

Using Microsoft’s Removable Storage Feature with Backup Exec

If you do not need to share the devices, exclusive use by Backup Exec will allow faster tape backups and restores. If you allow exclusive use by Backup Exec, you can still enable or disable devices in Removable Storage while Backup Exec is running; Backup Exec will respond by switching to other devices in the robotic libraries as appropriate. Note You should not enable Removable Storage for devices used with the SAN Shared Storage Option (SAN SSO). RSM does not appropriately manage devices and media used by multiple servers. The Removable Storage database is automatically backed up by Backup Exec, and can be restored if necessary. For more information, see “Advanced options for restore” on page 428. Note The Backup Exec services account must have Administrator rights to protect the Removable Storage database. If the account does not have Administrator rights, the following error message is recorded in the job log: "An error occurred while exporting the RSM Database files. The RSM Database could not be backed up." Only Microsoft tape class drivers can be used if you plan on using Backup Exec and the Removable Storage feature. If you want to use a third party tape class driver or a VERITAS tape class driver, you must disable the device through Removable Storage before installing the driver.

Using Media in Drives Managed by Removable Storage Use the Removable Storage snap-in to manually control the movement of media into and out of the robotic libraries managed by Removable Storage, to allocate media to one application process or another, and to prepare new, imported, or unrecognized media for use within the Removable Storage domain. You must use appropriate processes to move media between applications. Media that is assigned by Removable Storage to an application other than Backup Exec cannot be accessed by ADAMM. Media in the Removable Storage Import and Free media pools are available for use in Backup Exec, and can be assigned to Backup Exec using one of the following methods:

168



In Computer Management on the local machine, under the Storage node, open Removable Storage, and then open Media Pools. Move media from the Import or Free media pools into a Backup Exec media pool (see your Microsoft Windows 2000 documentation or online help for details). The next time that Removable Storage is scanned, any media that is in the Backup Exec pool is allocated to Backup Exec and marked as "in use" by Backup Exec.



Acquire available media through normal Backup Exec operations. This media is then placed in the Removable Storage Import pool and can be accessed by Backup Exec using the policies you established for Imported media. Administrator’s Guide

Using Microsoft’s Removable Storage Feature with Backup Exec

Media that is in the Removable Storage Free media pool or that is unrecognizable by Removable Storage is marked as unknown media within Backup Exec. You must launch an Inventory job to mount and read the media header. The media is imported into Backup Exec and marked as "in use" by Backup Exec. If you do not want that media used by Backup Exec, delete it from the ADAMM database. For more information, see “Deleting Media” on page 224. Backup Exec cannot append to media prepared initially by Removable Storage. To be able to use this media, you must run an overwrite operation. If media is introduced for the first time into Removable Storage, but it was previously possessed by Backup Exec or written to by Backup Exec during a mount operation, even on another server, then that media is allocated to Backup Exec for exclusive use.

Using Backup Exec Exclusively with Some Devices

VERITAS recommends enabling or disabling devices using Removable Storage only when the device is not in use and the internal drives are empty.

Monitoring Backup Exec and Removable Storage ▼

To view the Removable Storage Work Queue: 1. Click Start and then point to Programs. 2. Point to Administrative Tools, and then click Computer Management. 3. Expand the tree view of Storage. 4. Expand Removable Storage, and then click Work Queue. You can also track the location and status of media by viewing the media and drive objects associated with the loader being shared with Backup Exec. The status of the media is updated as the media is moved.

Chapter 4, Managing Devices

169

Managing Devices

If you want to use Backup Exec exclusively on some devices, ensure the Enable Remote Storage (RSM) option is cleared on the robotic library’s Configuration tab; to allow other applications on the server to access Removable Storage to share other devices, select the Enable Remote Storage (RSM) option (see “Viewing Robotic Library Configuration Properties” on page 142).

Creating Utility Jobs

Removing the Backup Exec Pool from Removable Storage If you must uninstall Backup Exec at some time, you may want to delete the Removable Storage Backup Exec pool. Refer to your Microsoft documentation for details on how to use the Removable Storage snap-in to delete an application media pool.

Creating Utility Jobs Backup Exec allows creation of utility jobs to aid in managing devices and media. You can specify a job priority and select to have a recipient notified when these jobs run. Utility jobs, like backup and restore jobs, generate job history records and an XML job log when they run. Several of these jobs can be scheduled as recurring jobs. These include: ◆

Inventory robotic library or drive



Erase media in a robotic library or drive



Import media



Export media



Lock robotic library



Unlock robotic library



Clean drive

Utility jobs that can be created only as run-once jobs, which are jobs that are scheduled to run now or to run once at a specified date and time, include: ◆

Label media



Format media



Retension media



Eject media



Initialize robotic library

If you have a robotic library, you can perform utility operations on the robotic library, the robotic library drive, all slots, and individual slots. You can perform operations on devices in Backup Exec by doing one of the following:

170



Right-click an object to display options on the shortcut menu.



Select an object, and then click an available task on the task pane.

Administrator’s Guide

Creating Utility Jobs

Inventorying Media in Devices Run Inventory to mount the media in the drive and read the media label, which is then displayed in the Devices view. If this is the first time that Backup Exec has encountered this media, the media label is also added to the Media view. If you change the media in the robotic library or drive, run Inventory so that the current media in the drive is displayed in the views; otherwise, the previous media is still displayed as being in the drive. You should run an inventory operation when Backup Exec is launched for the first time following a new installation or a product upgrade. When Backup Exec is exited and restarted, it saves information pertaining to the location and contents of all of the media from the last Backup Exec session (provided the media in the devices hasn’t changed). With this information, Backup Exec can immediately begin processing operations when it is restarted. When media is changed in a robotic library, you can inventory all of the slots in the robotic library or select the slots to be inventoried. You are not required to re-inventory slots when adding media requested by Backup Exec. For example:

When media that is not requested by Backup Exec is added or removed from the magazine, you should perform an inventory operation on the changed slots. This updates the media database so Backup Exec doesn’t load and unload each media in the magazine searching for the correct media on which to process jobs. You can select specific slots to inventory. If you swap media often you may want Backup Exec to perform an inventory on the robotic library magazine each time Backup Exec services are started.

Chapter 4, Managing Devices

171

Managing Devices

If you are performing a restore operation, and the data is contained on media that is not currently in the robotic library, you are prompted to insert the media for the restore operation. In this case, you are not required to re-inventory the slot where the restore source media is placed.

Creating Utility Jobs

Inventorying All Drives When Backup Exec Services Start You can set a default so that all drives are inventoried whenever Backup Exec services are started. An inventory of all drives on startup is recommended if media is often moved between robotic libraries, but Backup Exec may take longer to start. ▼

To have Backup Exec perform an inventory each time Backup Exec starts: 1. On the Tools menu, click Options. 2. In the Properties pane, under Job Defaults, click Preferences. 3. Click Inventory all drives on Backup Exec services startup. 4. Click OK.

Creating an Inventory Job ▼

To create an inventory job: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the device resides in a robotic library, click Robotic Libraries. 3. If you want to inventory a drive or slot, select the drive or slot containing the media you want to inventory, or select Slots. 4. If you want to inventory a backup file: a. Double-click the icon for the workstation where the backup folder is located. b. Double-click Backup-to-Disk Folders. c. Double-click either Fixed Backup-to-Disk Folders or Removable Backup-to-Disk Folders. d. Click the backup folder that contains the file you want to inventory. e. On the results pane, select the file you want to inventory.

172

Administrator’s Guide

Creating Utility Jobs

5. Under Media Tasks in the task pane, select Inventory. General options for inventory job

Managing Devices

6. Select the appropriate options as follows: Inventory Job Properties options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509).

Chapter 4, Managing Devices

173

Creating Utility Jobs

8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). There may be a delay (up to several minutes for some drives) as the media is mounted and inventoried. The inventory operation can be monitored or canceled through the Job Monitor. See also: “Media Labeling” on page 202 “Inventory all drives on Backup Exec services startup” on page 91

Erasing Media You can choose to erase media using either Quick erase or Long erase. Not all devices support a long erase; those that do not will always perform a quick erase. Quick erase writes an indicator at the beginning of the media that makes the data contained on the media inaccessible. For most uses, a Quick erase is sufficient. Long erase instructs the drive to physically erase the entire media. If you have sensitive information on the media and you want to dispose of it, use Long erase. Running Long erase on media can take several minutes to several hours to complete (depending on the drive and the media capacity). Quick and Long erase do not change the media label. To change a media label, use Label Media or Rename prior to the Erase operation. ▼

To erase media: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the device resides in a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to erase.

174

Administrator’s Guide

Creating Utility Jobs

4. Under Media Tasks in the task pane, select either Erase media, quick or Erase media, long. Note If the drive does not support a long erase, Erase media, long will not be available. The following warning is displayed: Caution This operation will be performed on the current media in the drive or slot. If the media has been changed since the last inventory operation was performed, the media label in the next dialog may not match the media in the drive or slot selected. 5. Click OK to continue. The media displayed was read during the last inventory operation; the display does not change until another inventory operation occurs. Therefore, if you change media in the slot or drive but did not run Inventory, the media label displayed may not match the actual media in the slot or drive.

Managing Devices

6. When prompted, click Yes to erase the media. 7. Select the appropriate options as follows: Erase media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are:

Chapter 4, Managing Devices

Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

175

Creating Utility Jobs

8. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). You can monitor the Erase operation through the Job Monitor. You cannot cancel an Erase operation after it has started; however, you can use Cancel to stop a queued erase operation.

Erasing Backup Files Erasing backup files removes the data from both the backup folder and the disk, and removes the file references from the catalog. However, the backup file remains for use with future backup jobs. You cannot restore the data after you erase it. If you want to remove data from Backup Exec and restore it later, delete the file from the Media view (For more information, see “Deleting a Backup File” on page 162.) Unlike other types of devices, when you erase a file from a backup folder you cannot choose whether to perform a quick erase or a long erase. Backup Exec performs only a quick erase on backup files in backup folders. ▼

To erase a backup file: Caution You cannot restore the data that you erase. Before you erase files, be sure that you no longer need them. 1. On the navigation bar, click Devices. 2. Expand the icon for the workstation where the backup folder is located. 3. Under Backup-to-Disk Folders, click the backup folder that contains the file you want to erase. 4. On the results pane, select the file you want to erase. 5. Under Media Tasks in the task pane, select Erase media, quick. 6. Click OK to continue. 7. Click Yes, or if more than one file was selected, click Yes to All.

176

Administrator’s Guide

Creating Utility Jobs

8. Select the appropriate options as follows: Erase media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

9. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509).

Retensioning a Tape Use Retension media to run the tape in the tape drive from beginning to end at a fast speed so that the tape winds evenly and runs more smoothly past the tape drive heads. Refer to the documentation that came with your tape drive to see how often this utility should be performed. Retensioning is primarily for Mini Cartridge and quarter-inch cartridges and is not supported on most other types of tape drives. ▼

To retension a tape: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to retension.

Chapter 4, Managing Devices

177

Managing Devices

10. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

Creating Utility Jobs

4. Under Media Tasks in the task pane, select Retension media. 5. Select the appropriate options as follows: Retension options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 7. Click Run now. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Retension operation from the Job Monitor. You cannot cancel a Retension operation after it has started; however, you can use Cancel to stop a queued retension operation.

178

Administrator’s Guide

Creating Utility Jobs

Formatting Media in a Drive Use Format media to format the media currently in the drive. Most devices do not support formatting. If formatting is not supported, the option is not available. If you use Format on a DC2000 tape, the formatting may take two or more hours to complete. Caution Formatting erases the media. All data on the media is lost. ▼

To format media in a drive: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to format.

The media label that is displayed was read during the last inventory operation. The media label displayed does not change until another inventory operation occurs. Therefore, if you changed media in the slot or drive but did not run Inventory, the media label displayed may not match the actual media in the slot or drive. 5. To format the media that is displayed, click Yes. 6. Select the appropriate options as follows: Format media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are:

Chapter 4, Managing Devices

Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

179

Managing Devices

4. Under Media Tasks in the task pane, select Format media.

Creating Utility Jobs

7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 8. Click Run now. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Format operation from the Job Monitor. You cannot cancel a Format operation after it has started; however, you can use Cancel to stop a queued Format operation.

Labeling Media Use Label media to immediately write a new media label on the media in the selected device; this operation destroys any data on the media. To change the media label without destroying the data on the media (until an overwrite operation occurs), use Rename. ▼

To label media: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to label. 4. Under Media Tasks on the task pane, select Label media. The following warning is displayed: Caution This operation will be performed on the current media in the drive or slot. If the media has been changed since the last inventory operation was performed, the media label in the next dialog may not match the media in the drive or slot selected.

180

Administrator’s Guide

Creating Utility Jobs

5. Click OK. New Media Label dialog box

6. Type the name you want to use as the recorded media label for this media. Note This media will be overwritten. 7. Click OK to erase all data on the media and re-label the media. Label Media Job Properties

Managing Devices

Chapter 4, Managing Devices

181

Creating Utility Jobs

8. Select the appropriate options as follows: Label media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

9. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 10. Click Run now. 11. Write this same media label on an external label fixed to the outside of the physical media. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Label media operation from the Job Monitor. You cannot cancel a Label media operation after it has started; however, you can use Cancel to stop a queued Label media operation. See also: “Renaming Media Labels” on page 208

182

Administrator’s Guide

Creating Utility Jobs

Ejecting Media from a Drive Use Eject media to eject the media currently in the drive. If the media is a tape, Eject rewinds the media before ejecting it. Some drives do not support a software-driven media eject. If the media is a tape, the tape is rewound and you may be instructed to manually remove the media. ▼

To eject media from a drive: 1. On the navigation bar, click Devices. 2. Expand the server icon, and then click Stand-alone Drives. 3. Select the drive. 4. Under Drive Tasks in the task pane, select Eject media. 5. Select the appropriate options as follows:

Managing Devices

Eject media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 7. Click Run Now. The job will be submitted as a Run now job, unless you submitted the job on hold.

Chapter 4, Managing Devices

183

Creating Utility Jobs

Setting Up Cleaning Jobs for Robotic Library Drives You can submit once-only cleaning jobs for robotic library drives, or set up scheduled cleaning jobs. This option is not available for stand-alone drives. Before submitting a cleaning job, you must define a cleaning slot that contains the cleaning tape. ▼

To define a cleaning slot: 1. On the navigation bar, click Devices. 2. Click Robotic Libraries, and then click the robotic library for which you are setting up the cleaning. 3. Click Slots to display the library’s slots in the right pane. 4. Select the slot that contains the cleaning tape. 5. Under General Tasks in the task bar, select Properties. 6. Select the Cleaning Slot option and click OK. Make sure that the cleaning tape is located in the slot that you defined as the cleaning slot. After defining the cleaning slot, you can set up a cleaning job for the robotic library drive.



To set up a cleaning job: 1. On the navigation bar, click Devices. 2. Click Robotic Libraries, and then click the robotic library containing the drive. 3. Select the drive. 4. Under Drive Tasks in the task pane, select Clean.

184

Administrator’s Guide

Creating Utility Jobs

5. Select the appropriate options as follows: Clean Robotic Library Drive options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509).

You can monitor the cleaning job through the Job Monitor. You can view cleaning statistics for the drive by right-clicking the drive and selecting Properties. For more information, see “Viewing and Using Drive Properties and Statistics” on page 122.

Chapter 4, Managing Devices

185

Managing Devices

7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

Creating Utility Jobs

Importing Media Backup Exec fully supports robotic libraries with portals through its Import and Export utility jobs. It is important to create Import and Export jobs when changing media in your robotic library so that the Backup Exec database is updated. You can select any number of slots to import and export. When you use the Import utility, the slots you highlighted are checked for media. If media is present, it is exported to the portals. After all the media has been exported, you are prompted to insert new media into the portal so it can be imported. This process continues until all of the requested media has been imported into the robotic library. If your robotic library uses a media magazine, make sure no jobs are currently running and that all media are ejected from the drive and are back in the magazine slots before swapping the magazine. ▼

To import media in the robotic library: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Click Slots. 4. On the results pane, select the slots you want to import media to. 5. Under Media Tasks in the task pane, select Import media. 6. Select the appropriate options as follows: Import options

186

Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

Administrator’s Guide

Creating Utility Jobs

7. If you want Backup Exec to inventory the media after the job completes, double-click Settings, click Options and select the following: Auto-inventory option Item

Description

Auto-inventory after import is completed

Select this option to have Backup Exec automatically create an inventory job to run after the import job completes.

8. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). You can monitor the import job through the Job Monitor.

The Import media and Export media utilities allow Backup Exec to fully support robotic libraries with portals. When you use the Export media utility on one or more robotic library slots, the exported media is placed in the portals. If you select more media than there are portals, the robotic library will fill as many slots as possible, then you are prompted to remove the media from the portal. This process continues until all of the selected media has been removed from the robotic library. ▼

To export media: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Click Slots. 4. On the results pane, select the slots you want to export media from. 5. Under Media Tasks in the task pane, select Export media.

Chapter 4, Managing Devices

187

Managing Devices

Exporting Media

Creating Utility Jobs

6. Select the appropriate options as follows: Export media options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). You can monitor the export job through the Job Monitor.

Locking the Robotic Library ▼

To create a job to lock the robotic library’s front panel: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Under Robotic Library Tasks in the task pane, select Lock.

188

Administrator’s Guide

Creating Utility Jobs

4. Select the appropriate options as follows: Lock options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509).

You can monitor the lock job through the Job Monitor.

Unlocking the Robotic Library ▼

To create a job to unlock the robotic library’s front panel: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Under Robotic Library Tasks in the task pane, select unlock.

Chapter 4, Managing Devices

189

Managing Devices

6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

Creating Utility Jobs

4. Select the appropriate options as follows: Unlock options Item

Description

Job name

Type a name for the job or accept the default name.

Job priority

Select the priority for the job. Available options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see “Selecting Recipients for Job Notification” on page 509). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). You can monitor the unlock job through the Job Monitor.

190

Administrator’s Guide

5

Managing Media With Backup Exec’s media management tools you can: ◆

Protect data from being overwritten.



Set up media rotation strategies.



Track the location of media.



Label media automatically.



Read and track media labels with bar codes.



Collect and report media statistics.

On the navigation bar, click Media to view all the media used in Backup Exec, view how the media is organized into media pools, media sets, and media vaults, and view media properties.

With Backup Exec, you are not required to select media for jobs; it is done for you by the Advanced Device and Media Management (ADAMM) component. At any given time, Backup Exec is aware of all media that is loaded into attached storage devices, media that is offline, and media that has been placed in media vaults. Each media has a status that allows Backup Exec to identify which media can be written to and which media is overwrite-protected. Your media rotation strategy must balance between your need to save useful data as long as possible, and the fact that media are not in infinite supply. The trade-off between the longevity of stored backup data and the cost of more media is controlled in Backup Exec by restrictions placed on data that is written to media. A restriction is placed on how long new jobs can be written to the media after the first job has been written (the append period), and another restriction is placed on how long the data is preserved after it is written (the overwrite protection period).

191

Media Management

Media Overwrite Protection

Media Overwrite Protection

These two restrictions, the append period and the overwrite protection period, combine to form a policy that can be applied to groups of media. These policies are called media sets, which are containers for media that have the same append period and the same overwrite protection period. The append period and overwrite protection period are attributes of the container. Media Set

Append Period 5 Days

Overwrite Protection Period 30 Days

The append period is the amount of time that data can be appended (added) to a media. The append period is measured from the time the media was first allocated (assigned) to the media set. It can be specified in hours, days, weeks, or years. The overwrite protection period is the amount of time that media is protected from being overwritten. It can be specified in hours, days, weeks, or years. The overwrite protection period is measured from the time when the last append backup job completed. When the overwrite protection period is over, the media becomes recyclable and can be overwritten.

192

Administrator’s Guide

Media Overwrite Protection

TIME

OVERWRITE_PROTECTION_PERIOD

APPEND_PERIOD

TIME

The Append Period begins when the media is allocated to a Media Set.

The Overwrite Protection Period begins each time data is appended to the media. During the Append Period, data can be added to the media. Any data already on the media is protected against loss. The Append Period ends.

After the Append Period expires, and while the Overwrite Protection Period is still active, data cannot be added to the media. Any data already on the media is protected against loss.

The media cannot be overwritten by another job during this interval. (However, you could erase the media or move it to a scratch pool.)

The Protection Period expires.

TIME

Media Management

New data

After the Overwrite Protection Period expires, the media becomes “Recyclable.” This means that new data can be written to the beginning of the media by a new backup job (causing loss of the original data).

Old data

The append and overwrite protection periods that you specify apply to all the data on the media. Therefore, each time data is appended to a media, the time remaining in the overwrite protection period is reset and the countdown restarted.

Chapter 5, Managing Media

193

Media Overwrite Protection

Time in days

1

Append period = 5 days

Time in days

Append period = 5 days

1

Normal Bkup

2

2

Normal Bkup 1

3

3

4

4

5

5

6

6

7

7

8

8

9

9

10 11

Normal Bkup

Protection Period 14 Days

10 11

12

12

13

13

14

14

15

15

16 17 18 19

19

20

5

Append period = 5 days

Normal Bkup Normal Bkup 1 Normal Bkup 1 2 Normal Bkup 1 2 3 Normal Bkup 1 2 3 4

6 7

Protection Period 14 Days

8 9 10

Protection Period 14 Days

11 12 13 14 15 16 The media can be overwritten at this time

17 18

Fifth Day

19

20

First Day

2 4

17 18

1

3

16 The media can be overwritten at this time

Time in days

Second Day

20

The media can be overwritten at this time

Because the overwrite protection period does not begin until the job completes, the amount of time that the job takes to complete affects the amount of time until the media can be overwritten. For example, suppose you create a media set named Weekly with an overwrite protection period of seven days, and an append period of 0, and you schedule a full backup job to run each Friday at 9 p.m. When it is time for the full backup to run at 9 p.m. the following Friday, the job cannot run because the first backup job that ran the previous Friday did not complete until 10:10 p.m. Therefore, the overwrite protection period for the Weekly media set still has 70 minutes remaining. Typically, to prevent this situation, you would shorten the overwrite protection period to take into account the amount of time a job may run. For this example, the scheduled job recurring at 9 p.m. can run if the overwrite protection period is set to 6 days instead of 7 days.

194

Administrator’s Guide

Media Overwrite Protection

Default Media Set When Backup Exec is installed, three important defaults associated with overwrite protection of media are established: ◆

A media set named Media Set 1 is created.



The append and overwrite protection periods for Media Set 1 are set to Infinite.



All backup jobs you create are targeted to Media Set 1, unless you change the target during the First Time Startup Wizard.

By using these defaults, you can keep all of your backup data safe from overwriting forever (unless you erase, label, or format the media, or move it to Scratch Media). You will eventually run out of overwritable media unless you continually introduce scratch media into Backup Exec. To ensure that Backup Exec has media available, you can: ◆

Create new media sets with append and overwrite protection periods set to intervals of time that accommodate your needs (such as weekly, monthly, etc.) and then assign jobs to these media sets. When the overwrite protection period expires, the media become recyclable and Backup Exec can use them for other overwrite jobs.



Change the append and overwrite protection periods of Media Set 1 to finite periods. The danger with changing the overwrite protection period in Media Set 1 is that if you continue to use Media Set 1 as the default destination media set for all backup jobs, your data may not be protected as long as you need it to be.

See also: “Creating Media Sets” on page 233 “Deleting a Media Set” on page 235 “Renaming a Media Set” on page 236 “Editing and Viewing Media Set Properties” on page 236

Chapter 5, Managing Media

195

Media Management

The media for many jobs can be targeted to the same media set. Allocated media are media that belong to a media set. As long as the append and overwrite protection periods are current, the media are allocated to that media set. Backup Exec automatically allocates media. When the overwrite protection period expires, the media become recyclable. The media are still displayed as being in that media set, but with a status of recyclable. You do not need to move recyclable media to or from a media set; Backup Exec can overwrite the recyclable media in any media set whenever more media are needed for other jobs.

Media Overwrite Protection

Media Overwrite Protection Levels With the media overwrite protection levels, you choose the types of media that you want to be available for overwrite backup jobs. Although the terms are similar, the media overwrite protection levels and the media overwrite protection period are different. The media overwrite protection levels are global settings that designate groups of media as overwritable, whereas the media overwrite protection period is a time interval that changes from one media set to another. The media overwrite protection levels are: ◆

Full. Allows you to overwrite scratch (media that contains data you are willing to discard) and recyclable media (media with an expired overwrite protection period).



Partial. Allows you to overwrite imported media, which is media that was created by another installation of Backup Exec or some other backup product. You can also overwrite scratch media with the Partial protection level.



None. Allows you to overwrite all media, including those that have current overwrite protection periods (allocated media).

Caution The None option is not recommended because it does not protect data from being overwritten.

Section 1 in the figure “Media Overwrite Protection” on page 200 illustrates the Media Overwrite Protection level. See also: “Setting Default Media Options” on page 209

Media Categories Backup Exec recognizes media that is inserted into storage devices and categorizes it as: ◆

All Media. All media that has been introduced into Backup Exec. Any media that is available for overwriting in backup operations, such as scratch or recyclable media, displays in blue. When you click the All Media icon, the Results pane displays properties for the media in Backup Exec. For more information, see “Viewing Media Information” on page 98.



System Media. All media that has been introduced into Backup Exec, except those media that have been allocated to a media set. System Media includes Scratch, Retired, and Imported Media. Scratch media displays in blue in the Media and Devices views. -

196

Scratch Media. Media that do not belong to a media set and can be overwritten, including: Administrator’s Guide

Media Overwrite Protection

-

-

New or blank media.

-

Media that you have moved from another group, such as a media set or Imported Media.

-

Erased media.

Retired Media. Media that you have taken out of service, usually because of an excessive number of errors. After a media has been categorized as retired, it is not selected for use in a media set by Backup Exec. It is still available for restore operations, if it has not been damaged. You can delete media that is in Retired Media to remove it from Backup Exec. You may want to delete media, for example, when you have a lot of offsite media that you do not want to recycle or if you throw away the media. If you decide to use deleted media in Backup Exec, it is recognized as Imported Media and must be cataloged before you can restore from it.

-

-

Backup Exec and Windows NT Backup Media. Media from another installation of Backup Exec.

-

Backup Exec Archive Media. Media that was used for archive jobs.

-

Foreign Media. Media from a product other than Backup Exec.

Media Sets. Media sets are groups of media that have the same overwrite protection period and append period. The overwrite protection period is the length of time that data is retained on a specific media before becoming available for overwriting. The append period is the length of time that data can be added to a media. You can create different media sets, each with different data overwrite protection and append periods. When a backup job is created, you target it to a specific media set that defines the particular data overwrite protection and append periods you want applied to the backup job. Use media sets to set up media rotation strategies. Media sets include: -

Allocated media. Media that belong to a media set. Allocated media are always displayed in the allocated media set, even after the data overwrite protection date expires.

-

Recyclable media. Media that are allocated to a media set, but have expired overwrite protection periods. You can move recyclable media to Scratch Media, or you can let it remain in the media set list. When a backup job runs, by default Backup Exec uses scratch media first, and then selected recyclable media that is in the targeted media set for

Chapter 5, Managing Media

197

Media Management



Imported Media. Media created by a product other than this installation of Backup Exec. By default, Imported media have an overwrite protection period of Infinite, but can still be overwritten if the Media Overwrite Protection Level is set to Partial or None. You can overwrite imported media using several methods. Data can be restored from imported media until that media is overwritten. Other media pools that are contained in Imported Media are:

Media Overwrite Protection

overwriting if no scratch media are available. To change this default, on the Tools menu, click Options, and then under Settings, click Media Management. Recyclable media, along with scratch media, display in blue in the Media and Devices views.

Media Overwrite Options Media overwrite options set the order in which Backup Exec searches for overwritable media. When Backup Exec searches for overwritable media for a backup job, it searches for either scratch media or media that has an expired overwrite protection period. You are prompted to select the type of media that you want Backup Exec to use first: ◆

Overwrite scratch media before overwriting recyclable media contained in the targeted media set. If you choose to overwrite scratch media before recyclable media, more media may be required for the same number of jobs, but the recyclable media may be preserved longer for possible recovery.



Overwrite recyclable media contained in the targeted media set before overwriting scratch media. If you choose to overwrite recyclable media before scratch media, you will re-use the same media more frequently than if you choose to overwrite scratch media before recyclable media.

Note In a drive pool, Backup Exec selects the oldest recyclable media in all of the drives in the drive pool to use first. In a robotic library, Backup Exec selects the oldest recyclable media in the library to use first. If the robotic library is partitioned, Backup Exec searches for the oldest recyclable media in the targeted partition only. Caution It is recommended that you physically write-protect media containing critical data by using the write-protect tab on the media cartridge to protect against unintentional move or erase operations, or expired overwrite protection periods. See also: “Setting Default Media Options” on page 209

198

Administrator’s Guide

Media Overwrite Protection

How Backup Exec Searches for Overwritable Media The following table describes the order in which Backup Exec searches for media to use for an overwrite job, depending on the combination of the overwrite protection level and the media overwrite option you select. How Backup Exec searches for overwritable media Overwrite protection level and overwrite option:

Media is overwritten in this order:

Full + Overwrite scratch media first

1. Scratch media

Note This combination provides the most protection against overwriting media.

2. Recyclable media in the targeted media set

Full + Overwrite recyclable media first

1. Recyclable media in the targeted media set

3. Recyclable media in any media set

2. Scratch media 3. Recyclable media in any media set Partial + Overwrite scratch media first

1. Scratch media 2. Recyclable media in the targeted media set 3. Recyclable media in any media set 4. Imported media

Partial + Overwrite recyclable media first

1. Recyclable media in the targeted media set 3. Recyclable media in any media set 4. Imported media

None - No overwrite protection + overwrite scratch media first Caution This option is not recommended because it does not protect data from being overwritten.

None - No overwrite protection + overwrite recyclable media first Caution This option is not recommended because it does not protect data from being overwritten.

Chapter 5, Managing Media

1. Scratch media 2. Recyclable media in the targeted media set 3. Recyclable media in any media set 4. Imported media 5. Allocated media in any media set 1. Recyclable media in the targeted media set 2. Scratch media 3. Recyclable media in any media set 4. Imported media 5. Allocated media in any media set

199

Media Management

2. Scratch media

Media Overwrite Protection Media Overwrite Protection

1 1 1 Media Overwrite Protection Level

2

Media Overwrite Protection

None

Partial

Full

Media Overwrite Options 2 Recyclable Media (current user media sets)

Scratch Media

Media Overwrite Option can reverse these, causing the Scratch media set to be examined second rather than first.

Scratch Media

Recyclable Media (current user media sets)

Recyclable Media (other media sets)

Imported Media

Recyclable Media (other media sets))

Allocated Media

Imported Media

Allocated Media

With the Media Overwrite Options, you can make Backup Exec favor scratch media over the expired (recyclable) media in the Media Set of the current job (on the right side of this page), or favor the latter over the former (on the left of this page).

When Backup Exec is unable to locate usable media, it prompts you to provide one.

The most obvious candidates for backup jobs requiring overwritable media are scratch media and recyclable media (media with expired overwrite protection periods). These are the first types of media for which Backup Exec searches when a backup requires media to overwrite. The search pattern is different according to whether you have chosen Full, Partial, or None. The media indicate that a type of media set is examined for availability. In addition to setting overwrite protection levels, you must set overwrite options, which set the order in which Backup Exec searches for overwritable media. See also “Media Overwrite Options” on page 198

200

Administrator’s Guide

Media Overwrite Protection

Media Append Options When you set up an append backup job, you can determine how Backup Exec should handle the job. The following append options are located on the Device and Media section of the Backup Job Properties dialog box. ◆

Append to media, overwrite if no appendable media is available. When you are performing an append backup operation and the backup job is set to this option, Backup Exec searches for available media as follows: 1. Searches for appendable media in the Media set that is targeted in the backup operation. 2. If no appendable media can be found, Backup Exec changes the backup operation to overwrite and continues searching for overwritable media as outlined in “How Backup Exec Searches for Overwritable Media” on page 199.

Caution If an append job fills a media, the job continues on another piece of overwritable media. Depending on your configuration, overwritable media is selected from Scratch Media or Recyclable Media. If the media in the drive is not overwritable, a message prompts you to insert overwritable media. ◆

Append to media, terminate job if no appendable media is available. When you are performing an append backup operation and the backup job is set to this option, Backup Exec searches for available media as follows: 1. Searches for appendable media in the media set targeted in the backup operation.

Media Management

2. If no appendable media is found, the backup operation is terminated. See also: “Creating a Backup Job” on page 241

Overwriting Allocated or Imported Media Backup Exec protects allocated and imported media from being overwritten when full or partial overwrite protection is used. However, if necessary, you can allow allocated and imported media to be overwritten by Backup Exec before the data overwrite protection period expires, and without setting the media overwrite protection level to None. Several methods are available: ◆

Move the media to Scratch Media. The media is overwritten when it is selected for an overwrite job.



Erase the media. Erased media is automatically recognized as scratch media and will be overwritten immediately.

Chapter 5, Managing Media

201

Media Labeling ◆

Label the media. The Label Media operation immediately writes a new media label on the media, which destroys any data contained on the media.



Format the media. Formatting destroys any data contained on the media.



Change the overwrite protection period for the media set so that it is expired. Select the media set, and then under General Tasks, click Properties.

See also: “Deleting Media” on page 224 “Editing and Viewing Media Set Properties” on page 236 “Media Overwrite Options” on page 198

Removing Damaged Media Media that meets or exceeds the discard thresholds determined by the media manufacturer should be moved to Retired Media. Based on a measurement of soft errors generated by the storage device firmware, media that exceeds acceptable levels of these errors are reported to Backup Exec as potential candidates to be discarded. To decide which media to retire, run a Media Sets report to see the total number of errors for media, or view the properties for a specific media. Move any media with an unacceptable level of errors to Retired Media so that you are protected against using defective media before critical backup operations begin. After you mark media as retired, it will not be used by Backup Exec for future backup jobs. The media is still available to be restored from if it is not damaged. Media can only be deleted from Backup Exec when it is part of the Retired Media set. See also: “Deleting Media” on page 224 “Viewing Media Statistical Properties” on page 229 “Media Set Report” on page 541

Media Labeling Media used in Backup Exec is identified by its media label. When new, blank, or unlabeled media is used during a backup operation, Backup Exec automatically labels the media. This label consists of a prefix that identifies the cartridge type, and an incrementing number. For example, if the media is a 4mm tape, then the prefix would be 4M, followed by 000001. The next media label generated for an unlabeled 4mm tape would be 4M000002, and so on. 202

Administrator’s Guide

Media Labeling

You can allow the media label to be assigned automatically by Backup Exec, or you can specify a label prefix and number to be assigned for a type of media. For example, you can specify that all 4mm media that are entered for the first time into this installation of Backup Exec are labeled with a prefix of ACCT, and with numbering starting from 1000. You can specify another media type to be labeled with a prefix of FIN, and with numbering starting at 10,000. Customizing labels in this manner can help you recognize and organize media. Another type of media label used by Backup Exec is the media ID, which is a unique label assigned by Backup Exec to individual media used in Backup Exec. The media ID is used internally by Backup Exec in order to keep statistics on each media. Because the media label or bar code label for media can be changed, Backup Exec must use the media ID, which cannot be changed or erased, to preserve continuity in record keeping for each individual media. The media ID has no effect on the media label, or on your ability to rename, label, or erase media. At times, you may need to use the media ID to distinguish media that have duplicate media labels. Duplicate labels can be automatically generated in instances when Backup Exec is reinstalled or media from another Backup Exec installation is used. Use the media ID to distinguish between duplicate labels. You can view the media ID in a media’s property page. Write the media label on an external label fixed to the outside of the physical media. Whenever you change the media label, you should also change the external label to match. Three methods are available in Backup Exec to change a media label: Label Media operation. Writes a new media label on the media. This write operation destroys any data on the media. This option is available on the Devices view.



Rename operation. Changes the name of the media in the display, but does not write the new label to the media until an overwrite operation occurs. The data on the media is viable until the media is overwritten.



Edit the label in the media’s property page. Editing the label changes the name of the media in the display, but does not write the new label to the media until an overwrite operation occurs. The data on the media is viable until the media is overwritten.

See also: “Setting Default Media Options” on page 209 “Labeling Media” on page 180 “Bar Code Labeling” on page 204 “Renaming Media Labels” on page 208 “Viewing General Media Properties” on page 226

Chapter 5, Managing Media

203

Media Management



Media Labeling

Imported Media Labeling Backup Exec does not automatically relabel imported media. The imported media’s existing label is read and displayed in the Media view, in one of the Imported Media sets. Additionally, the imported media’s original media label is displayed under the heading Media Description in the Results pane of the Media view. You can edit the media description in the media’s property page to make it a more descriptive label. If the media overwrite protection level is set to Partial or None, the imported media may be selected for a job and be overwritten. The imported media is automatically labeled when it is overwritten during a job. If you want to label a specific imported media while maintaining full media overwrite protection for other imported media, erase the specific media and then label it. See also: “Viewing General Media Properties” on page 226

Bar Code Labeling If there is a bar code label on the physical cartridge, and the cartridge is in a robotic library that has a bar code reader, the bar code label automatically becomes the media label. You can change the media label in Backup Exec, but as long as the media has a bar code label that can be read, the bar code label takes precedence over the media label. To use the media label you entered using Backup Exec, you must remove the physical bar code label from the media cartridge, or use the media in a device without a bar code reader. Example Robotic Library 1 has bar code support. During a backup operation, Backup Exec requests a new or overwritable media for the operation. A new media with the bar code label 'ABCD' is inserted in the robotic library magazine and the bar code reader scans the bar code ID on the media label. Backup Exec selects this media for the operation and detects that a bar code label has been assigned to the media. Backup Exec automatically uses the bar code label and continues the operation. When you change magazines or insert new media in a magazine, bar code readers allow you to quickly update slot information by right-clicking the slot (or slots) and selecting Scan. See also: “Media Labeling” on page 202

204

Administrator’s Guide

Media Labeling

Bar Code Labeling in Mixed Media Libraries If you are using a robotic library that uses different types of drives and you have bar code support for that library, you can set up Backup Exec to identify which media type can be used in which drive type. You set up a bar code label with a prefix or a suffix that corresponds to a certain type of media. When Backup Exec reads that bar code label, it locates the type of media that corresponds to the prefix or suffix and then mounts the media into a drive that accepts that type of media. You can add both a prefix and a suffix or just one of them. After setting up bar code rules, you must set up two more items in order for the bar code rules to work. You must enable the bar code rules for the robotic library by selecting the bar code rules option on the Configuration tab in the robotic library’s properties. In addition to setting the bar code rules for each type of media you use, for each drive in your mixed media library you should indicate what type of media can be used and whether that media can be used for read or write operations. To set this up, see “Viewing and Specifying a Drive’s Media Types” on page 136. ▼

To set up a bar code label rule: 1. On the Tools menu, click Options. 2. In the Properties pane, under Settings, click Bar Code Rules.

Media Management

Chapter 5, Managing Media

205

Media Labeling Bar Code Rules

3. Click Add. Add Bar Code Rule

206

Administrator’s Guide

Media Labeling

4. Select the appropriate options as follows: Add Bar Code Rule dialog box Item

Description

Select a Media Type

Select the media for which you want to add a bar code rule.

Vendor

Type the name of this library’s manufacturer. You can find the name of the library manufacturer on the library’s property page. This is an optional field. By typing a vendor name here, you restrict the bar code rule to that vendor’s libraries. If you are creating a general bar code rule that applies to libraries from different vendors, do not type anything in this field. This field is not case-sensitive.

Barcode Prefix

Type a code to be placed before the bar code. This code represents a media type. The code can be up to 16 characters, and any combination of letters and numbers. This field is not case-sensitive.

Barcode Suffix

Type a code to be placed after the bar code. This code represents a media type. The code can be up to 16 characters, and any combination of letters and numbers. This field is not case-sensitive.

5. Click OK to save the bar code label rule for the media.



To change a bar code rule: 1. On the Tools menu, click Options. 2. In the Properties pane, under Settings, click Bar Code Rules. 3. Click Modify. 4. Change the options as needed. 5. Click OK to save the changes. 6. Click OK.

Chapter 5, Managing Media

207

Media Management

6. Verify that bar code rules are enabled for the robotic library. The bar code rules do not go into effect until you enable them for the robotic library. For more information, see “Viewing Robotic Library Configuration Properties” on page 142.

Media Labeling ▼

To delete a bar code rule: 1. On the Tools menu, click Options. 2. In the Properties Pane, under Settings, click Bar Code Rules. 3. Select a bar code rule to delete. 4. Click Delete. 5. Click Yes to verify that you want to delete the rule. 6. Click OK.

Renaming Media Labels Use Rename to assign a new label to media. The new label is not actually written to the media until an overwrite operation occurs. All data on the media is preserved until the next overwrite job. However, the new media label is stored in the database, and is displayed for that media. To write a new media label to the media immediately, use Label Media on the media’s property page. The media’s contents will be erased. If you rename a media, and then use it in another installation of Backup Exec, that media is treated as imported media, and the media’s original media label is displayed; the renamed label is not transferred to other installations of Backup Exec. ▼

To rename a media label: 1. Do one of the following: -

If the media is in a drive, then from the navigation bar, click Devices, and then click that drive to display the media.

-

If you don’t know where the media is, from the navigation bar, click Media, and then click All Media to display all media.

2. Select the media you want to rename. 3. Under General Tasks in the task pane, click Rename.

208

Administrator’s Guide

Setting Default Media Options Rename Media Label dialog box

4. In Name, type a new media label. 5. Click OK. 6. Write this media label on an external label fixed to the outside of the physical media. See also: “Viewing General Media Properties” on page 226

Setting Default Media Options This procedure explains how to set options for the media overwrite protection levels, the media overwrite options, the default media labeling, and the default location for Backup-to-Disk Folders. ▼

To set media options:

Media Management

1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Media Management.

Chapter 5, Managing Media

209

Setting Default Media Options Media Options - Set Application Defaults

3. Select the appropriate options as follows: Media Options - Set Application Defaults Item

Description

Media overwrite protection level Full - protect allocated and imported media

Select this option to protect media in media sets and imported media from being overwritten. This is the safest option to choose because the media being protected cannot be overwritten until:

210

Š

The overwrite protection period for the media expires.

Š

You move media that belongs to an active media set to Scratch Media.

Š

You erase, format, or label the media.

Š

You move media from Imported Media to Scratch Media.

Administrator’s Guide

Setting Default Media Options Media Options - Set Application Defaults (continued) Item

Description

Partial - protect only allocated media

Select this option to allow imported and scratch media to be overwritten. Media in a media set that has an overwrite protection period that has not expired (allocated media), cannot be overwritten. This option is recommended if you have media from an earlier version of Backup Exec or another product (imported media) that you want to reuse.

Prompt before overwriting imported media

Select this option to be prompted before Backup Exec overwrites imported media when Partial has been selected.

None

Select this option to disable the media overwrite protection feature. With this option, you are responsible for making sure that the media in your storage devices are not accidentally overwritten.

Caution This option is not recommended because it does not protect data from being overwritten.

For example, when an overwrite job is submitted to a drive, and the media overwrite protection level is set to None, the media in that drive is overwritten.

Prompt before If you selected None (no overwrite protection), it is highly overwriting allocated or recommended that you select this option to be prompted imported media before overwriting allocated or imported media.

Media Management

Chapter 5, Managing Media

211

Setting Default Media Options Media Options - Set Application Defaults (continued) Item

Description

Media overwrite options Overwrite scratch media before overwriting recyclable media contained in the targeted media set

Select this option to have Backup Exec overwrite scratch media first when an overwrite job occurs. If no scratch media are found in any of the storage devices, Backup Exec overwrites recyclable media in the targeted media set. If no recyclable media are found, Backup Exec automatically searches for other media to overwrite. The media that is overwritten depends on the level of overwrite protection that you set (Full, Partial, or None). See “How Backup Exec searches for overwritable media” on page 199. If you select this option, more media may be required for the same number of jobs than if you choose to overwrite recyclable media first. Because this option affects the order in which Backup Exec overwrites media, choosing to overwrite scratch media first may allow the recyclable media to be preserved longer for possible recovery.

Overwrite recyclable media contained in the targeted media set before overwriting scratch media

Select this option to have Backup Exec overwrite recyclable media in the targeted media set when an overwrite job occurs. If no recyclable media are found in any of the storage devices, Backup Exec overwrites scratch media. If no recyclable or scratch media are found, Backup Exec automatically searches for media to overwrite. The media that is overwritten depends on the level of overwrite protection that you set (Full, Partial, or None). See “How Backup Exec searches for overwritable media” on page 199. If you choose to overwrite recyclable media in the targeted media set first, you will re-use the same media more frequently than if you choose to overwrite scratch media first.

Media label configuration Media type

212

Select the type of media for which you want to create default labels. For example, if you select 4mm, then all 4mm-type media that are entered for the first time into this installation of Backup Exec are assigned a label according to what you specify in the following fields.

Administrator’s Guide

Setting Default Media Options Media Options - Set Application Defaults (continued) Item

Description

Prefix

Displays the current default prefix for the selected cartridge type. To specify a new prefix on the label, type from one to eight alpha-numeric characters.

Next value

Displays the next number that will be included in the label of the next media that matches the selected cartridge type when that media is entered for the first time into this installation of Backup Exec. This number is incremented by one each time a media that matches the selected cartridge type is entered into this installation of Backup Exec. For example, if Cartridge type is set to 4mm, and Next value is set to 1, the first time a 4mm media is entered into this installation of Backup Exec, its label will include the number 1. The label on the next 4mm media entered will include the number 2. To enter a new value, type from one to eight numeric characters. This number must not exceed the number specified in the Digits field.

Digits

Displays the length of Next value, including placeholder zeroes. This field defines the minimum size of the numeric portion of the label.

If the Next value exceeds the entry in the Digits field, the extra digit is added. Using the previous example, if label numbering continued until 999,999, the next label would be 1,000,000 even though the value specified in Digits is 6. Rolling over the label numbering to 1,000,000 and 1,000,001 rather than 000,000 and 000,001 prevents the duplication of labels. The number entered in the Digits field must be in the range of three to eight.

Chapter 5, Managing Media

213

Media Management

For example, if Next value is set to 1, and Digits is set to 6, then the Next value for the media label is 000001, 000002, 000003, and so on.

Setting Default Media Options Media Options - Set Application Defaults (continued) Item

Description

Backup-to-Disk default folder location

Type the default path for new backup folders. This default path appears in the New Backup-to-Disk Folder dialog box where you add a new backup folder. For more information, see “Using Backup-to-Disk Folders and Files” on page 149. When making selections for backups you are targeting to a backup folder, avoid including that backup folder in the selections for the job. For example, if you create a new backup folder in c:\Backup Folders and then select the entire c:\ volume for backup, make sure you exclude c:\Backup Folders from the selection list. When adding backup folders, make sure there is sufficient space on the disk for the data you are backing up. Backups that exceed the size of available disk space will fail.

4. Click OK. See also: “Media Overwrite Options” on page 198 “Media Append Options” on page 201 “Media Labeling” on page 202

214

Administrator’s Guide

Media Location

Media Location Backup Exec helps you track the location of your media. There are three categories available for tracking media: ◆

Online location. The online location lists media that reside in a storage device, robotic library slot, or Backup-to-Disk folder. The online location is defined by Backup Exec, so you cannot delete or rename it. In addition, you cannot add media to the online location.

Note If you move media from an online location, its overwrite protection period and append period remain in effect. ◆

Offline location. The offline location displays all media that are onsite but are not in drives or slots, or media vaults. Media are automatically moved to this location if you use Backup Exec to remove media from a device or slot. You can add media to the offline location from another media location. To move offline media back to online, you must run an inventory of the devices or slot, or you must catalog the media. You cannot delete or rename the offline location.



User-defined media vault. A media vault is a logical representation of the actual physical location of media. You can create user-defined media vaults to keep track of where media is physically stored, such as a special media room, a scratch bin, or an offsite location. For example, you could create a media vault where media to be sent offsite are moved. Then print the Media Vault Contents report, which lists the media contained in that vault, to accompany the physical media to their offsite storage. You can create as many user-defined media vaults as necessary.

“Finding Media in a Location or Vault” on page 216 “Renaming a User-defined Media Vault” on page 217 “Adding Media to the Offline Location or a User-Defined Vault” on page 217 “Moving Media by Dragging and Dropping” on page 218 “Deleting a User-defined Media Vault” on page 219 “Media Vault Contents Report” on page 542

Chapter 5, Managing Media

215

Media Management

See also:

Media Location

Creating User-defined Media Vaults Create media vaults to track media stored in specific sites. ▼

To create a user-defined media vault: 1. On the navigation bar, click Media. 2. Under Media Location Tasks on the task pane, click New media vault. 3. Type the name and a description of the new vault. 4. Click OK.

Finding Media in a Location or Vault If you know the media label for a piece of media, but don’t know where it is located, you can search for it using the label. ▼

To find media: 1. On the navigation bar, click Media. 2. On the Media selections pane, click Media Location. 3. Under Media Location Tasks on the task pane, click Find media. 4. Type the name from the media label of the media you want to find. 5. Click OK. Backup Exec highlights the location of the media and displays its properties in the preview pane. Note If you are using BEWAC, the preview pane is not available.

216

Administrator’s Guide

Media Location

Renaming a User-defined Media Vault You can rename a user-defined media vault at any time. You cannot rename the system-defined online and offline media vaults. ▼

To rename a user-defined media vault: 1. On the navigation bar, click Media. 2. On the Media selections pane, click the media vault you want to rename. 3. Under General Tasks in the task pane, click Rename. 4. Type the new name. 5. Click OK.

Adding Media to the Offline Location or a User-Defined Vault You can add media to the offline location or a user-defined vault. You cannot add media to the online vault. When you add media to a different location or vault, Backup Exec removes the media from the original location or vault. ▼

To add media to the offline location or a user-defined media vault:

2. In the Media selections pane, select the media location or vault to which you want to add media. 3. Under Media Location Tasks in the task pane, click Add media to selected vault. 4. Type the media label or scan the bar code label for the media you want to add to this vault. 5. Click Add. 6. Repeat steps 4 and 5 for all the media you want to add. 7. Click OK.

Chapter 5, Managing Media

217

Media Management

1. On the navigation bar, click Media.

Media Location

Moving Media by Dragging and Dropping When you are working with media in a location, you cannot move it using the media move operation that you use when you are working with media in media sets, imported media, or other media areas. To move media from a location, you drag and drop it from one location to another location. The following table lists the drag-and-drop rules for media locations and vaults: Note If you move media from an online location, its overwrite protection period and append period remain in effect. Media Location and Vault Drag-and-Drop Rules From/To

218

Online Location

Offline Location

User-defined Media Vaults Pools/Sets

All Media

Online location No

Yes, with a warning that the media is not physically moved from the online location.

Yes, with a No warning that the media is not physically moved from the online location.

No

Offline location

No

No

Yes

No

No

User-defined vault

No

Yes

Yes

No

No

Media Pools/Sets

No

Yes, with a warning

Yes, with a warning

Yes

No

All Media

No

Yes, with a warning that the media is not physically moved from the online location.

Yes, with a Yes warning that the media is not physically moved from the online location.

No

Administrator’s Guide

Media Location ▼

To move media from a location or vault: 1. On the navigation bar, click Media. 2. On the Media selections pane, click the vault containing the media. 3. Select the media from the Results pane, and drag it to the new location.

Deleting a User-defined Media Vault You can delete an empty user-defined media vault. If there is any media in the vault, you must move it before you can delete the vault. You cannot delete the online or offline locations. ▼

To delete a user-defined vault: 1. On the navigation bar, click Media. 2. On the Media selection pane, select the media vault you want to delete. 3. Under General Tasks in the task pane, click Delete. 4. Click Yes to delete, or, if you are deleting multiple vaults, click Yes to All to delete without prompting for each vault.

Media Management

Chapter 5, Managing Media

219

Media Rotation Strategies

Media Rotation Strategies There are many media rotation strategies you can use to protect your data. They differ mostly by the number of media required and by the amount of time the media is kept before it is rotated back into the schedule. Three of the most commonly used media rotation strategies are: ◆

Son. Uses the same media each day to run a full backup. See “Son Media Rotation Strategy” on page 220.



Father/Son. Uses multiple media, includes a combination of weekly full and daily differential or incremental backups for a two-week schedule, and provides backups for offsite storage. See “Father/Son Media Rotation Strategy” on page 221.



Grandfather. Uses multiple media, includes a combination of weekly and monthly full and daily differential or incremental backups, and provides backups for offsite storage. See “Grandfather Media Rotation Strategy” on page 222.

Son Media Rotation Strategy Number of media required: 1 (minimum) Overwrite protection period: last backup The Son strategy involves performing a full backup every day. Although the Son strategy is simple to administrate, backing up with a single media is not an effective method of backup. This is because magnetic media eventually wears out after many uses and the data you can restore only spans back to your last backup. Son Backup Strategy Mon

Tue

Wed

Thu

Fri

Media 1

Media 1

Media 1

Media 1

Media 1

Week 1

Full Backup

220

Administrator’s Guide

Media Rotation Strategies

Father/Son Media Rotation Strategy Number of media required: 6 (minimum) Overwrite protection period: Two weeks The Father/Son media rotation strategy uses a combination of full and differential or incremental backups for a two-week schedule. In the Father/Son scenario, four media are used Monday through Thursday for differential or incremental backups. The other two media containing full backups are rotated out and stored offsite every Friday. Father/Son Backup Strategy Mon

Tue

Wed

Thu

Fri

Media 1

Media 2

Media 3

Media 4

Media 5

Media 1

Media 2

Media 3

Media 4

Media 6

Week 1

Week 2

Full Backup

Incremental or Differential Backup

The Father/Son strategy is easy to administrate and allows you to keep data longer than the Son strategy, but it is not suitable for the stringent data protection needs of most network environments.

Chapter 5, Managing Media

221

Media Management

Note When this backup strategy is first implemented, you must start with a full backup.

Media Rotation Strategies

Grandfather Media Rotation Strategy Number of media required: 19 (minimum) Overwrite protection period: One year The Grandfather method is one of the most common media rotation strategies. It is simple to administrate and comprehensive enough to allow easy location of files when they need to be restored. In the Grandfather scenario, four media are used Monday through Thursday for incremental or differential backups; another three media are used every Friday for full backups. The remaining 12 media are used for monthly full backups and are kept offsite. Grandfather Backup Strategy Mon Mon 1

Tue Tue 2

Wed Wed 3

Thu Thu 4

Fri Fri 5

Mon 1

Tue 2

Wed 3

Thu 4

Fri 6

Mon 1

Tue 2

Wed 3

Thu 4

Fri 7

Mon 1

Tue 2

Wed 3

Thu 4

Monthly

Week 1

Week 2

Week 3

Week 4

Full Backup

Incremental or Differential Backup

The Grandfather strategy is recommended because it offers a good media number to storage life ratio (19 media/1 year). It is also easy to modify if you want to incorporate more media. For example, you could perform a full backup on the last Saturday of the month to archive permanently.

222

Administrator’s Guide

Media Rotation Strategies

Running the Media Rotation Wizard Backup Exec’s Media Rotation wizard guides you through setting up a media rotation job. This job is based on a modified Grandfather/Father/Son strategy. After running the wizard, the following jobs are set up to protect the data that you select:





A full backup job to start the media rotation job.



A scheduled full backup job that runs at least once a week.



A scheduled differential or incremental backup job that runs on the days that the full backups do not occur.

To run the Media Rotation wizard: 1. From the Tools menu, point to Wizards, and then select Media Rotation Wizard. Note You also can find the Media Rotation wizard on the Job Setup screen. On the navigation bar, click Job Setup. Under Backup Strategy Tasks on the task pane, click Set up media rotation. 2. Follow the on-screen prompts. See also: “Backing Up Data” on page 239 “Media Rotation Strategies” on page 220

Chapter 5, Managing Media

Media Management

“Media Sets” on page 232

223

Media Operations

Media Operations You can perform several types of operations on media. You can delete media from the Retired Media set, move media to a different media set, or create a new catalog for a piece of media. In addition, you can view properties for the media, including the general, management, statistical, and cleaning properties. See also: “Deleting Media” on page 224 “Moving Media” on page 225 “Cataloging Media in a Drive” on page 413 “Viewing General Media Properties” on page 226 “Viewing Media Management Properties” on page 228 “Viewing Media Statistical Properties” on page 229 “Viewing Media Cleaning Properties” on page 231

Deleting Media You may want to delete media when: ◆

You have a lot of offsite media that you do not want to recycle.



You throw away damaged or old media.

Media can only be deleted from Backup Exec when it is part of the Retired Media set. When deleted media is reused in Backup Exec, it is recognized as imported media. Before you can restore from the media it must be cataloged. Note Deleting media from Backup Exec is not the same as erasing media. ▼

To delete media: 1. On the navigation bar, click Media. 2. If the media is not already in Retired Media, you must move it there. To look at the contents of Retired Media, expand the server icon, then expand System Media, then expand Retired Media. To move media to Retired Media, drag the media to the Retired Media icon. 3. Select the media you want to delete.

224

Administrator’s Guide

Media Operations

4. Under General Tasks in the task pane, click Delete. If Delete is unavailable, the media is not in Retired Media. You must move the media to Retired Media before Delete is available. 5. Click Yes or Yes to All to delete the media that are displayed. See also: “Removing Damaged Media” on page 202

Moving Media You may want to move media when: ◆

Media is reported as generating too many errors and needs to be retired.



You no longer want to keep the data on imported media and want to reuse the media.

When you move media to a media set, the media takes the append and overwrite protection period properties of the media set to which it was moved. Note Moving scratch or imported media to a media set is not recommended. ▼

To move media: 1. On the navigation bar, click Media.

3. You can drag the media to a media set, or under Media Tasks on the task pane, click Move. Move Media dialog box

4. Click the Down arrow next to the Move this media to field to display the media set to which you want to move this media, and then click OK.

Chapter 5, Managing Media

225

Media Management

2. Expand All Media to display a list of media, and then select the media you want to move.

Media Operations

Viewing General Media Properties ▼

To view media properties: 1. On the navigation bar, click Media. 2. Expand the All Media icon, and then select the media that you want to view. 3. Under General Tasks on the task pane, click Properties. The General Media Properties tab provides the following information: General Media Properties tab Item

Description

Media Label

Media label that was assigned automatically by Backup Exec, or that was assigned or changed by the administrator, or that was a pre-assigned bar code label. You can edit the media label, which is limited to 32 characters. Editing the label changes the name of the media in the display, but does not write the new label to the media until an overwrite operation occurs. When you edit a media label, try to make it a concise identifier that will remain constant even when the media is reused. You should write this media label on a label fixed to the outside of the physical media. Duplicate labels can be automatically generated. For example, reinstalling Backup Exec or bringing media from another Backup Exec installation could cause duplication in labels. Duplicate labels are allowed, but not recommended. Note If a bar code is available, and a bar code-equipped device is used, then the media label automatically defaults to that bar code.

Media Description

By default, displays the original media label if the media is imported media. You can edit the media description, which is limited to 128 characters, to make it a more descriptive label.

Media Type

226

Media type and subtype (if available). Click the button next to the field to change the media type or subtype.

Administrator’s Guide

Media Operations General Media Properties tab (continued) Item

Description

Used Capacity

The amount of raw capacity on the media that has been used. Used Capacity is calculated by subtracting Available Capacity from Total Capacity. Used Capacity may or may not equal Bytes Written.

Available Capacity

The amount of expected raw capacity on the media that remains unused. Some tape devices support the ability to read the amount of remaining capacity of the media that is currently loaded in the device. If a tape device supports reading of the remaining capacity amount, then Available Capacity is derived from the remaining capacity amount. Otherwise, Available Capacity is calculated by subtracting Bytes Written from Total Capacity. Because Free Space is reported in terms of unused raw capacity, review Bytes Written and Compression Ratio to better estimate if there is enough free space to accommodate a specific job. The amount of expected total raw capacity of the media. Some tape devices support the ability to read the amount of total capacity of the media that is currently loaded in the device. If a tape device supports reading of the total capacity amount, then Total Capacity is derived from the total capacity amount. Otherwise, Total Capacity is estimated based on past usage of the media.

Bytes Written

The amount of data that has been written into blocks on the media. Bytes Written may differ from Used Capacity due to the effects of data compression and media flaws. Data compression will tend to increase Bytes Written when compared to Used Capacity. Media flaws will decrease Bytes Written when compared to Used Capacity.

Compression Ratio (Bytes Written/Used Capacity)

The ratio of Bytes Written to Used Capacity. Compression ratio will show the overall effect that data compression and media flaws are having on the amount of data that is being stored on the media.

Chapter 5, Managing Media

227

Media Management

Total Capacity

Media Operations General Media Properties tab (continued) Item

Description

Media ID

Internal identification number assigned by Backup Exec. You cannot change this number.

See also: “Media Labeling” on page 202 “Creating a Test Run Job” on page 314 “Viewing Media Information” on page 98 “Viewing Media Statistical Properties” on page 229 “Viewing Media Cleaning Properties” on page 231

Viewing Media Management Properties ▼

To view media management properties: 1. On the navigation bar, click Media. 2. Expand the All Media icon, and then select the media that you want to view. 3. Under General Tasks in the task pane, click Properties. 4. Select the Management tab. The Media Management Properties tab provides the following information: Media Management Properties tab

228

Item

Description

Creation date

Date and time when the media was first entered into Backup Exec.

Allocation date

Date and time when the media was added to a media set as a result of an overwrite operation.

Modification date

Date and time when data was last written to the media.

Administrator’s Guide

Media Operations

Note In BEWAC, the server’s date and time format are used instead of the client’s date and time format. 5. Click OK. See also: “Viewing General Media Properties” on page 226 “Viewing Media Cleaning Properties” on page 231

Viewing Media Statistical Properties ▼

To view media statistical properties: 1. On the navigation bar, click Media. 2. Expand the All Media icon, and then select the media that you want to view. 3. Under General Tasks in the task pane, click Properties. 4. Select the Statistics tab. The Media Statistic Properties tab provides the following information:

Item

Media Management

Media Statistic Properties tab Description

Totals Total bytes written

Number of bytes that have been written to this media.

Total bytes read

Number of bytes that have been read from this media.

Total mounts

Number of times this media has been mounted.

Total seeks

The total number of seek operations (performed when a specific piece of information is being located) that have been performed on this media.

Total hours in use

The total number of hours that this media has been in use.

Chapter 5, Managing Media

229

Media Operations Media Statistic Properties tab (continued) Item

Description

Errors Seek errors

The number of errors encountered while trying to locate data.

Soft read errors

The number of recoverable read errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the media for damage.

Hard read errors

The number of unrecoverable read errors encountered. If you receive hard errors, check the media for damage.

Soft write errors

The number of recoverable write errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the media for damage.

Hard write errors

The number of unrecoverable write errors encountered. If you receive hard errors, check the media for damage.

5. Click OK. See also: “Editing and Viewing Media Set Properties” on page 236 “Creating Media Sets” on page 233

230

Administrator’s Guide

Media Operations

Viewing Media Cleaning Properties You can view media cleaning properties only for cleaning media. ▼

To view media cleaning properties: 1. On the navigation bar, click Media. 2. Expand the All Media icon, and then select the media that you want to view. 3. Under General Tasks in the task pane, click Properties. 4. Select the Cleaning tab. The Media Cleaning Properties tab provides the following information: Media Cleaning Properties tab Item

Description

Number of cleanings

Displays the number of cleanings performed so far by this cleaning media.

Maximum number of cleanings

Type the maximum number of times you want to use this media for cleaning. If the media contains Media Auxiliary Memory, the maximum number of cleanings displays automatically.

Media Management

5. Click OK.

Chapter 5, Managing Media

231

Media Sets

Media Sets A media set is a container for media. When you create a new media set, you must set an append period and an overwrite protection period for the set. When media is placed into the media set, that media takes on the attributes of the media set. Media sets can contain allocated media and recyclable media. When you create a backup job, you must identify a media set that will receive the backed up files. You can create media sets manually or using the Media Set Wizard. See also: “Media Overwrite Protection” on page 191 “Creating Media Sets” on page 233 “Deleting a Media Set” on page 235 “Renaming a Media Set” on page 236 “Editing and Viewing Media Set Properties” on page 236

Running the Media Set Wizard The Media Set Wizard guides you through the process of creating a new media set. It explains the choices you can make. The Media Set Wizard is helpful if you are new to Backup Exec or are unfamiliar with the concepts and terminology of media sets. Before you run this wizard you should understand media overwrite protection and append periods. For an overview of these terms, see “Media Overwrite Protection” on page 191. If you do not need a wizard to set up a new media set, see “Creating Media Sets” on page 233. ▼

To run the Media Set Wizard: 1. On the Tools menu, point to Wizards. 2. Click Media Set Wizard. 3. Follow the instructions on the screen. If you set the media overwrite protection level to Full, you must have blank media ready and online before the first backup job runs. If you plan to use imported media, you must inventory it first.

232

Administrator’s Guide

Media Sets

Creating Media Sets ▼

To create a media set: 1. On the navigation bar, click Media. 2. Under Media Set Tasks in the task pane, click New Media Set. 3. Select the appropriate options as follows: New Media Set General tab Item

Description

Name

Type a name for the new media set.

Creation date

Date and time when the media set was created. Backup Exec sets the date and time automatically. You cannot change them.

Media Management

Chapter 5, Managing Media

233

Media Sets New Media Set General tab (continued) Item

Description

Media set periods Overwrite protection period

Enter the length of time in hours, days, weeks, or years to retain the data on the media before the media can be overwritten (unless the media is erased, formatted, labeled, moved to Scratch Media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period begins when the backup job is completed. If there is an append period, the overwrite protection period begins again each time an append job completes. Because the overwrite protection period does not begin until the job completes, the amount of time that the job takes to complete affects the amount of time until the media can be overwritten. You may shorten the overwrite protection period to take into account the amount of time a job may run. For example, setting the overwrite protection period for seven days and the append period for four days ensures that data will not be overwritten for at least seven days, and that data can be appended to the media for the next four days. The last data appended to this media is retained for at least seven days. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The default is Infinite - Don’t Allow Overwrite, which protects the media from being overwritten for 1,000 years, unless the media is erased, formatted, labeled, moved to Scratch Media, or if the media overwrite protection level is set to None.

Append period

Enter the length of time in hours, days, or weeks, that data can be added to media. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The append period starts when the first backup job is written to this media. The default is Infinite - Allow Append, which allows data to be appended until the media capacity is reached.

4. Click OK.

234

Administrator’s Guide

Media Sets

Deleting a Media Set Use Delete to remove a media set from the Media Sets category. If you delete a media set to which scheduled jobs are targeted, you are prompted to retarget the jobs to another media set. You cannot delete a media set that contains media. You must move the media to another media set first. Caution Make sure that the media set to which you move the media has the appropriate overwrite protection and append periods. ▼

To delete a media set: 1. On the navigation bar, click Media. 2. In the Media selection pane, under Media Sets, select the media set that you want to delete. 3. Under General Tasks on the task pane, click Delete. 4. Click Yes to delete the media set, or if you selected multiple media sets to delete, click Yes to All to delete all the selected media sets without further prompting. 5. If there are scheduled jobs allocated to the deleted media set, you are prompted to redirect the jobs to another media set.

Media Management

Retarget Jobs dialog box

The media set you deleted displays. 6. In the Media Set selection box, click the Down arrow to see more options, and then select the new media set to which you want to redirect the scheduled jobs. 7. Click Yes to redirect the displayed job to the selected media set, or if there are multiple scheduled jobs, click Yes to All to redirect all scheduled jobs to this media set without further prompting. The scheduled jobs are redirected. Chapter 5, Managing Media

235

Media Sets

Renaming a Media Set When you rename a media set, properties for any jobs that belong to that media set will still display the previous media set name. To update the media set name for these jobs, select the job from the Job Setup view and then under General Tasks on the task pane, click Properties. The media set name is updated to the new name. ▼

To rename a media set: 1. On the navigation bar, click Media. 2. In the Media selection pane, under Media Sets, select the media set you want to rename. 3. Under General Tasks on the task pane, click Rename. 4. In the Name field, type the new name you want to assign to this media set. 5. Click OK.

Editing and Viewing Media Set Properties You can change the overwrite protection and append periods for a media set at any time. ▼

To edit media set properties: 1. On the navigation bar, click Media. 2. In the Media selection pane, under Media Sets, select a media set. 3. Under General Tasks on the task pane, click Properties. 4. Select the appropriate options as follows: Media Set properties

236

Item

Description

Name

Media set name.

Creation Date

Date when the media set was created.

Administrator’s Guide

Media Sets Media Set properties (continued) Item

Description

Media Set Periods Overwrite protection period

Enter the length of time, in hours, days, weeks, or years to retain the data on the media before the media can be overwritten (unless the media is erased, formatted, labeled, moved to Scratch Media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period is measured from the last time data was appended to the media. For example, setting the Overwrite protection period for seven days and the Append period for four days ensures that data will not be overwritten for at least seven days, and that data can be appended to the media for the next four days. The last data appended to this media is retained for seven days. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The default is Infinite - Don’t Allow Overwrite, which protects the media from being overwritten for 1,000 years, unless the media is erased, formatted, labeled, moved to Scratch Media, or if the Media Overwrite Protection Level is set to None. Enter the length of time, in hours, days, or weeks, that data may be added to the media. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The append period starts when the first backup job is written to this media. The default is Infinite - Allow Append which allows data to be appended until the media capacity is reached.

5. Click OK.

Chapter 5, Managing Media

237

Media Management

Append period

Media Sets

238

Administrator’s Guide

6

Backing Up Data Backups are crucial for data protection, and Backup Exec offers you many choices for creating backup jobs to protect your data, including:

Using the Backup Wizard. Use this wizard to submit a backup job if you are a new or inexperienced Backup Exec user. The wizard guides you through the process of creating a backup job using most of the default options. After you become more experienced with Backup Exec, you will probably create backups by configuring backup job properties.



Configuring backup job properties. Experienced Backup Exec users can create customized backup jobs by selecting resources to protect and setting backup options on the backup job properties pages accessed by either clicking the Backup button or selecting New Job from the Job Setup task pane. Using the backup job properties pages allows you to set some options, such as job priority and database options, that cannot be set per job using the Backup Wizard.



Creating a template. Set all the destination, settings, and schedule options you want to use and save them as a template. You can quickly create a job using a template by combining the template with a selection list. You can use templates for multiple jobs, and, if changes are needed to these jobs’ settings, you can make changes to the template rather than editing the individual jobs.



Creating a selection list. Select the data you want to back up and save the selections as a selection list. You can then choose the selection list when creating a backup job. You can use selection lists for multiple jobs. You can also choose a selection list, and then create a job from a template, combining the template with the chosen selection list.



Using Backup Exec’s Windows Explorer interface. Select and back up files and folders from Windows Explorer without having to launch the Backup Exec Administration Console.



Running a one-button backup job. Select one-button backup from the Backup Exec Assistant or the Information Desk to quickly back up the local media server. One-button backups use the default backup settings.

239

Backing Up Data



Backup Exec allows you to set default options for backup jobs, but also gives you the flexibility to override these options for specific jobs. You can direct all backup jobs to a specified network segment, isolating the backup data so that other connected networks are not affected when backup operations are performed, or you can specify a LAN for a single job. Backup Exec also provides the option of setting up backup jobs that take place on a routine basis (scheduled jobs), or set up one-time backup jobs. In addition to creating backup jobs to protect data, you can create: ◆

A test run of a scheduled backup job to determine whether or not it is likely to complete successfully.



A job that duplicates backup sets either from previously backed up data or data scheduled to be backed up. If the backup sets are to be duplicated from a scheduled job, the duplicate backup data job runs automatically after the backup job completes.



Verify jobs to test the integrity of the media.



Archive jobs to preserve storage space.



Resource discovery jobs to find new resources that may need to be backed up on a regular basis.

Before you begin backing up data, you should develop a backup strategy that includes the method, frequency, and media rotation methods that are appropriate for your organization. You may have different strategies for different areas of the organization. You may also want to configure device and media management before creating backup jobs. You can set up Backup Exec to use physical devices, such as stand-alone drives, or virtual devices, such as backup-to-disk folders. Or, you can have Backup Exec use logical groupings of devices, such as drive pools. Specifically, you might want to perform the following tasks to help you manage storage hardware and media most effectively: ◆

Set up drive pools for systems with more than one storage device. For more information, see “Creating Drive Pools” on page 103.



Create media sets. For more information, see “Creating Media Sets” on page 233.

Caution To protect remote resources, you must install the Backup Exec Remote Agent for Windows Servers on the remote computer. The Remote Agent is a system service that runs on Windows servers and workstations and provides efficient backup processing by locally performing tasks that, in typical backup technologies, require extensive network interaction.

240

Administrator’s Guide

Creating a Backup Job

See also: “Creating a Backup Job” on page 241 “Setting Default Backup Options” on page 320 “About Backup Strategies” on page 352 “VERITAS Backup Exec - Remote Agent” on page 843

Creating a Backup Job Backing up data from a server or workstation involves the creation of a backup job in which you specify the: ◆

Source



Destination



Settings



Frequency

Unless you specify otherwise, the backup job will use the defaults set through the Tools menu by selecting Options. You can use the Backup Wizard to have Backup Exec guide you through the creation of a backup job, but after you become familiar with Backup Exec, you will probably choose to set your options by configuring backup job properties. See also: “Using the Backup Wizard” on page 242 “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Setting Default Backup Options” on page 320 “Specifying Backup Networks” on page 332

Backing Up Data

Chapter 6, Backing Up Data

241

Creating a Backup Job

Using the Backup Wizard If you are new to Backup Exec or are uncertain about how to set up a backup job, you can use the Backup Wizard. The wizard will guide you through the process of creating a backup job. While the wizard will prompt you to select some options, most of the backup job settings will be based on the defaults set through the Tools menu by selecting Options. ▼

To launch the Backup Wizard: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New job using wizard. 3. Follow the on-screen prompts. You can monitor the backup job through the Job Monitor. See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Setting Default Backup Options” on page 320 “Monitoring Jobs” on page 381

Creating a Manual Backup Job by Configuring Job Properties ▼

To create a backup job for a server or workstation: 1. On the navigation bar, click Backup. 2. From the backup selections pane, select the data you want to back up (see “Selecting Data to Back Up” on page 265) or choose an existing selection list from the Selection list name field (see “Using Selection Lists” on page 274). For more information about the Selections options, see “Selections Options for Backup Jobs” on page 245.

242

Administrator’s Guide

Creating a Backup Job

3. On the Properties pane, under Destination, click Device and Media, and complete the options as described in “Device and Media Options for Backup Jobs and Templates” on page 247. 4. On the Properties pane, under Settings, click General and complete the options as described in “General Options for Backup Jobs” on page 252. You can select additional configuration options for your backup job if, before selecting to run or submit the job, you select additional options on the Backup Job Properties dialog box’s Properties pane: -

If you want to set advanced options for the backup job, on the Properties pane, under Settings, click Advanced. Then, complete the options as described in “Advanced Options for Backup Jobs” on page 257.

-

If you want to set commands to run before or after a job, on the Properties pane, under Settings, click Pre/Post Commands and complete the options as described in “Pre/Post Commands for Backup or Restore Jobs” on page 261.

-

If you are using the Advanced Open File Option, on the Properties pane, under Settings, select Advanced Open File and complete the options as described in “Selecting the Advanced Open File Option for a Single Backup Job” on page 987.

-

If you are backing up other platform types or database agents, such as NetWare, Exchange, or SQL, select the platform type or database agent from the Properties pane. Refer to the chapter or appendix for that item for instructions on completing the options.

-

If you want to change the backup network for this job, on the Properties pane, under Settings, click Network, and then set up the backup network for this job (see “Changing the Backup Network for a Job” on page 337).

-

If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509).

Note If you are using Backup Exec Web Administration Console (BEWAC), click Next to run the job or set the scheduling options.

Chapter 6, Backing Up Data

243

Backing Up Data

5. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374), and then click Submit.

Creating a Backup Job

6. If the backup job summary appears, review it, and then click OK to run the job. If you want to turn off the job summary for future backup jobs, from the Tools menu, select Options, and then clear Display the job summary dialog before creating a backup job (see “Backup Exec Defaults” on page 90). Note If you are using BEWAC, click Finish to run the job. If you are not satisfied with the settings you selected, click Back. However, you must reset all of the settings. BEWAC does not save the settings when you click Back. Note If a drive loses power during a backup operation, you should restart the backup job using a different tape. You can restore the data written to the tape up to the point of the power loss, but you should not reuse the tape for subsequent backup operations. See also: “Using the Backup Wizard” on page 242 “Selecting Data to Back Up” on page 265 “Setting Default Backup Options” on page 320 “Creating a New Backup Template” on page 283 “Creating a New Backup Job from a Template” on page 290

244

Administrator’s Guide

Creating a Backup Job

Selections Options for Backup Jobs When the Backup Job Properties dialog box appears, Selections is chosen by default on the Properties pane. Through the Selections options, you choose the data you want to include in the backup job. You can also choose how the data will appear in this dialog box. Selections options for a backup job

Options on this dialog box include: Selections options for backup job Description

Selection list name

If you are creating a job using an existing selection list, select the selection list you want to use (see “Using Selection Lists” on page 274). Otherwise, use the default Selection list name, which creates a new selection list using this name.

Selection list description

Enter a description for the selection list.

Load Selections from Existing List

Click this button if you want to use a previously created selection list or merge existing selection lists (see “Using Selection Lists” on page 274).

Chapter 6, Backing Up Data

245

Backing Up Data

Item

Creating a Backup Job Selections options for backup job (continued) Item

Description

View Format Graphical

Select this option to view selections in a directory tree view.

Show file details

Select this option to display details about the files available for selecting.

Text

Select this option to view selections as a list of files and directories.

Advanced

Click this button if you want to use the Advanced File Selection for selecting files for backing up (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269).

Include subdirectories

Select this option if you want to select the contents of all the subfolders when a directory is selected.

See also: “Selecting Data to Back Up” on page 265 “Changing the Order for Processing Backup Selections” on page 272 “Changing Logon Accounts for Resources” on page 273 “Including or Excluding Files for Backup Using Advanced File Selection” on page 269 “Creating Selection Lists” on page 274 “Setting Up User-defined Selections” on page 282

246

Administrator’s Guide

Creating a Backup Job

Device and Media Options for Backup Jobs and Templates You select the storage device and media set on which the backup job will run by clicking Device and Media on the Backup Job Properties box and completing the options you want. Device and Media options for backup job

Backing Up Data

Chapter 6, Backing Up Data

247

Creating a Backup Job

Options on this dialog box include: Device and Media options for backup job Item

Description

Device

Select a drive pool, stand-alone drive, robotic library drive, or backup folder to be used for processing the backup. If you select a backup folder, be sure it is not on the disk you are backing up. For example, if you are backing up your local C:\ drive, select a backup folder that is not on your local C:\ drive. Backup jobs submitted to a backup folder cannot span disks unless the folder is a removable backup-to-disk folder (see “Using Backup-to-Disk Folders and Files” on page 149). If the size of a backup job exceeds the amount of free space on the disk where the backup folder is located, the job fails. Before you back up data to a disk, verify that there is sufficient free space on the destination disk. To maximize the amount of data that you can store on a disk, use the software compression option. If a backup job fails due to insufficient disk space, the backup folder goes offline. To complete the backup job, you must create more free space on the disk, and then pause and resume the folder. You can create more disk space by: Š

Moving the backup files to another disk or backing up the files to a tape.

Š

Changing the location of the backup folder.

Š

Erasing the backup files.

Š

Overwriting the existing backup files.

If you are unable to create more free space and cannot continue the backup job, you can restore the data that was backed up prior to the failure. Note Backup files are subject to the same overwrite and append options as other media. Make sure that appropriate media (overwritable or appendable) is in the stand-alone drive or drive pool you select. If the media in the drive is not overwritable or appendable, a message is displayed requesting that you insert overwritable media.

248

Administrator’s Guide

Creating a Backup Job Device and Media options for backup job (continued) Item

Description

Media set

Select the media set for the backup (see “Editing and Viewing Media Set Properties” on page 236). If you select Overwrite, the media in the drive is overwritten if the media is scratch, or if its overwrite protection period has expired. If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see “Setting Default Media Options” on page 209. If you selected one of the append options, the backup will be added to an appendable media (if one exists).

Family name

Specify a name for the new or overwritable media. This name is used to identify the media in the Restore Selections dialog boxes. The family name defaults to “Media created date time”. To customize the family name, you can use any combination of the following variables in this field: %s - includes the media server name %j - includes the job name %d - includes the date the media was created %t - includes the time the media was created

Backing Up Data

Chapter 6, Backing Up Data

249

Creating a Backup Job Device and Media options for backup job (continued) Item

Description

When this job begins Overwrite media

Select this option to place this backup on an overwritable media. Make sure that appropriate media is in the stand-alone drive or drive pool you select in the Device field in this dialog box. The media in the drive is overwritten if the media is scratch or recyclable (its overwrite protection period has expired). If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see “Setting Default Media Options” on page 209. Depending on your configuration, overwritable media is selected from scratch media or recyclable media. For more information, see “Media Overwrite Options” on page 198. If the media in the drive is not overwritable, an alert appears requesting that you insert overwritable media.

Append to media, Select this option to append this backup to the media set listed in the overwrite if no appendable Media Set field in this dialog box. The backup set is appended if an media is available appendable media is available in the selected media set; if not, an overwritable media is used and added to the media set. Note If an append job fills a media, the job continues on another piece of overwritable media. If the media in the drive is not overwritable, an alert appears requesting that you insert overwritable 0media. Append to media, terminate job if no appendable media is available

Select this option to append this backup to the media set listed in the Media Set field in this dialog box. The backup set is appended if an appendable media is available in the selected media set; if not, the job is terminated.

Eject media after job completes

Select this option to have Backup Exec automatically eject the media in the drive when the operation completes.

Write checksums to media Select this option if checksums are to be calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If this option is not selected, backup performance may be improved, but there will be no way to verify the integrity of the data on the tape.

250

Administrator’s Guide

Creating a Backup Job Device and Media options for backup job (continued) Item

Description

Retension media before backup

Select this option to have Backup Exec run the tape in the drive from beginning to end at a fast speed, which helps the tape wind evenly and run more smoothly past the tape drive heads. Retensioning is primarily for Mini Cartridge and quarter-inch cartridges and is not supported on most other types of tape drives.

Media Protection Password protect media

Select this option if you are overwriting the media and you want to protect it. When the Enter Password dialog box appears, enter a media password. When a password-protected media is taken to another location, such as another media server, the password is required to catalog the tape. Note Password protected media can be erased without requiring the password.

Change password

Click this button to change the password for the media.

Backing Up Data

Chapter 6, Backing Up Data

251

Creating a Backup Job

General Options for Backup Jobs General options for backup jobs, including the name of the job and the backup method to be used, can be set through the Backup Job Properties dialog box. To set these options, on the Properties pane, under Settings, click General. General settings options for backup job

252

Administrator’s Guide

Creating a Backup Job

Options on this dialog box include: General settings options Item

Description

Job name

Enter the name for this backup job, or accept the default name that appears. The job name must be unique.

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:

Backup set description

Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Type a description of the information you are backing up.

Backing Up Data

Chapter 6, Backing Up Data

253

Creating a Backup Job General settings options (continued)

254

Item

Description

Backup method for files

Select a backup method. Your choices are: Š

FULL - Back Up Files - Reset Archive Bit. Includes all of the selected data on a volume and resets the archive bit to indicate that the files have been backed up.

Š

COPY - Back Up Files. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset.

Š

DIFFERENTIAL - Changed Files. Includes all files that have changed (based on the archive bit) since the last full backup, and does not affect any media rotation scheme because the archive bit is not reset.

Š

INCREMENTAL - Changed Files - Reset Archive Bit. Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up.

Š

FULL - Back Up Files - Allow incrementals and differentials using modified time. Includes all of the selected data on a volume and allows the use of incrementals and differentials using the modified date and time stamp.

Š

DIFFERENTIAL - Using modified time. Includes all files since the last full backup, using the files’ last modified date and time stamp. Make sure that the same script or selection list is used for the differential backup that was used for the full backup.

Š

INCREMENTAL - Using modified time. Includes all files that have changed since the last full or incremental backup, using the files’ last modified date and time stamp. Make sure that the same script or selection list is used for the incremental backup that was used for the full backup.

Š

DAILY - Files that Changed Today. Backs up all files that were created or modified today.

Š

WORKING SET - All files last accessed in (x) days. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate in the Files accessed in x days field that you want to include data that has been accessed in a specific number of days.

Administrator’s Guide

Creating a Backup Job General settings options (continued) Item

Description

Backup method for files (continued)

Š

ARCHIVE - Delete files after successful copy backup. Backs up the selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted.

Note Backup Exec does not delete data from Backup Exec Agent workstations when using the archive feature. For more information, see “Understanding Backup Methods and Their Advantages” on page 355. Files accessed in x days

If you selected the working set backup method in the Backup method for files field, use this field to specify the number of days for which to include accessed files. Note VERITAS recommends that you specify at least 30 days in order to include the data needed to make your system operational if you have to restore a working set backup.

Use the Windows Change Select this option if you want to use Windows’ NTFS Change Journal if available Journal to determine which files have been modified since the last full backup. This option can only be used with NTFS volumes and only when the backup method selected is FULL - Back Up Files Allows incrementals and differentials using modified time, DIFFERENTIAL - Using modified time or INCREMENTAL - Using modified time. Preserve tree on archive

Select this option to retain the directory structure on the hard drive of the files backed up in an archive job. This option is only available when Archive is selected as the backup method.

Verify after backup completes

Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read once the backup has been completed. Verifying all backups is recommended.

Backing Up Data

Chapter 6, Backing Up Data

255

Creating a Backup Job General settings options (continued) Item

Description

Compression type

Select one of the following: Š

None. Select this option to copy the data to the media in its original form (uncompressed). Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive.

Š

Software. Select this option to use STAC™ software data compression, which compresses the data before it is sent to the storage device.

Š

Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed.

Š

Hardware [if available, otherwise software]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature hardware data compression, STAC software compression is used.

See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242

256

Administrator’s Guide

Creating a Backup Job

Advanced Options for Backup Jobs To set Advanced options, such as open file options, for backup jobs or backup job templates, on the Properties pane, under Settings, click Advanced. Advanced options for backup job

Backing Up Data

Chapter 6, Backing Up Data

257

Creating a Backup Job

Advanced options for backup jobs include: Advanced options for backup job Item

Description

Enable single instance backup for NTFS

This option is only available if single instance store is being used. This option ensures that only one instance of a file for NTFS volumes will be backed up regardless of the number of single instance store (SIS) links that point to it.

Caution If the backup job does not run to completion, the file data may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same files. You must run a full or copy backup to ensure that all files are backed up completely. If the 'incremental - using modified time' backup method was used, running the same backup job to completion will back up the files correctly. Back up files and directories by following junction points

Select this check box to back up the information for the junction points and the files and directories to which they are linked. If this check box is not selected, then only the information for the junction points is backed up; the files and directories to which they are linked are not backed up. Note Since Mounted Drives that do not have a drive letter assigned to them cannot be selected, the files and directories to which they are linked are backed up regardless of whether this option is selected. If this option is selected and the actual files and directories to which the junction points are linked are also included in the backup selections, then the files and directories are backed up twice; once during the full file and directory backup, and again via the junction point. WARNING: If a junction point is linked to a location that encompasses it, then recursion (a situation where data is backed up repeatedly) will occur, resulting in an error and job failure. For example, if c:\junctionpoint is linked to c:\, recursion will occur when attempting to back up c:\junctionpoint, and the backup job will fail.

258

Administrator’s Guide

Creating a Backup Job Advanced options for backup job (continued) Item

Description

Back up data in Remote Storage

Select this check box to back up data that has been migrated from primary storage to secondary storage. The data is not recalled to its original location; it is backed up directly to the backup media. If this option is selected, you should not run a backup of your entire system because Backup Exec has to load the data that has been migrated to secondary storage and additional time is required for any set that includes migrated data. If this check box is cleared, only the placeholder that stores the location of the data on secondary storage will be backed up, not the data itself. Note This option should not be selected if the device used for secondary storage and backups contains only one drive because Remote Storage and Backup Exec will compete for use of the drive.

Set Remote Agent priority This option allows you to select the number of CPU cycles the media server will use to maintain optimal server performance while Remote Agent backups are running. The higher the priority, the more the protected server’s CPU processing power is used during backup operations. Note Allocating fewer CPU cycles to a backup job may result in slower backup performance. This field contains the following options: Š

Normal Priority. Select this option to allocate the default number of CPU cycles the protected server will use during a Remote Agent backup.

Š

Below Normal Priority. Select this option to allocate fewer server CPU cycles to the backup job.

Š

Lowest Priority. Select this option to allocate the fewest number of CPU cycles to the backup job.

Backing Up Data

Chapter 6, Backing Up Data

259

Creating a Backup Job Advanced options for backup job (continued) Item

Description

Open file backup when Advanced Open File Option is not used Never

Select this option to have Backup Exec skip open files if they are encountered during the backup operation. A listing of skipped files appears in the job log for the backup.

If closed within x seconds Select this option to have Backup Exec wait the specified time interval for files to close before skipping the open file and continuing the backup operation. If the file does not close during the specified interval, it is skipped. A listing of skipped files appears in the job log for the backup. Note If multiple files are open, Backup Exec waits the specified time interval for each file; depending on the number of open files, this may significantly increase the backup time. With a lock

Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open a file, the file is locked while it is being backed up to prevent other processes from writing to it. Backing up open files is not as effective as closing applications and allowing the files to be backed up in a consistent state.

Without a lock

Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open the file, the file is NOT locked while it is being backed up. This allows other applications to write data to the file during the backup operation. WARNING: This option allows files that contain inconsistent data and possibly corrupt data to be backed up.

Note To back up the Removable Storage database in the \Ntmsdata subdirectory, the WMI repository in the wbem\Repository subdirectory, and the Terminal Services database in the default \LServer subdirectory, select the <Systemroot>\System32 directory. Files that you place in the Systemroot\System32\Ntmsdata subdirectory, the \wbem\Repository subdirectory, or the default \LServer subdirectory may not be backed up; only system files are included in the backup. It is recommended that you do not place user files in the Systemroot\System32 directory or subdirectories. See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on page 989 260

Administrator’s Guide

Creating a Backup Job

Pre/Post Commands for Backup or Restore Jobs To set commands to run before or after a job, on the Properties pane of the Backup Job Properties dialog box, the Restore Job Properties dialog box, or the New Backup Job Template dialog box, under Settings, click Pre/Post Commands. You can run commands before or after a backup or restore job, and set conditions for these commands: ◆

Run the backup or restore job only if the pre-job command is successful



Run the post-job command only if the pre-job command is successful



Run the post-job command even if the backup or restore job fails



Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-job commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error.

If it is critical that the job does not run if the pre-job command fails, then configure Backup Exec to check the return codes of the pre- and post-job commands to determine if the pre-job command failed or completed successfully. For example, if a pre-job command that shuts down a database before a backup is run fails, the database could be corrupted when the backup is run. In this situation, it is critical that the backup job does not run if the pre-job command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-job commands, and the post-job command returns a non-zero code, the job log reports that the post-job command failed. If you also selected to run the job only if the pre-job command is successful, and both the pre-job command and the job ran successfully, Backup Exec will mark the job as failed if the post-job command fails. For example, if the pre-job command runs successfully and shuts down the database and the backup job also runs successfully, but the post-job command cannot restart the database, Backup Exec marks the job and the post-job command as failed.

Chapter 6, Backing Up Data

261

Backing Up Data

If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.

Creating a Backup Job Pre-job and post-job command options

Options for this dialog box include: Pre- and post-job command options Item

Description

Pre-job and post-job commands Pre-job command

Specify a command to be run on the specified server before the backup or restore job is run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported.

Post-job command

Specify a command to be run on the specified server after the backup or restore job has run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported.

262

Administrator’s Guide

Creating a Backup Job Pre- and post-job command options (continued) Item

Description

Run job only if pre-job command is successful

Select this option to run the backup or restore job only if the pre-job command is successful. If the pre-job command fails, the job does not run, and is marked as failed. If it is critical that the job does not run if the pre-job command fails, then select Allow pre- and post-job commands to be successful only if completed with a return code of zero. If a non-zero code is returned, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The job is not run and the job status is marked as Failed.

Run post-job command Select this option to run the post-job command only if the pre-job only if pre-job command is command is successful. successful If it is critical that the post-job command does not run if the pre-job command fails, then select Allow pre- and post job commands to be successful only if completed with a return code of zero. If a non-zero code is returned for the pre-job command, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The post-job command does not run. If you also select Run job only if pre-job command is successful, and both the pre-job command and the job are successful, but the post-job command returns a non-zero code, the job log reports both the job and the post-job command as failed. Run post-job command even if job fails

Select this option if it is critical to run the post-job command regardless of whether the job is successful or not. If you also select Allow pre- and post job commands to be successful only if completed with a return code of zero and the post-job command returns a non-zero code, the job log reports the post-job command as failed.

Backing Up Data

Chapter 6, Backing Up Data

263

Creating a Backup Job Pre- and post-job command options (continued) Item

Description

Allow pre- and post-job commands to be successful only if completed with a return code of zero

Select this option to allow Backup Exec to check the return codes of the pre- and post-job commands to determine if they completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean that the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands. If this option is not selected, the success of the pre- and post-job commands is not determined based on the return code.

Cancel command if not completed within x minutes

Select the number of minutes Backup Exec should wait before canceling a pre-job or post-job command that did not complete. The default time-out is 30 minutes.

Run these commands On this media server

Select this option to run the pre- and post-job commands on this media server only.

On each server backed up Select this option to run the pre- and post-job commands one time on each server backed up. The pre- and post-job command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.

See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Setting Default Backup Options” on page 320 “Setting Default Pre/Post Commands” on page 328

264

Administrator’s Guide

Selecting Data to Back Up

Selecting Data to Back Up When you are setting up a backup job, the first thing you do is select the data you want to back up. You make your selections from the backup selections pane on the Backup Job Properties dialog box. Backup Data Selection Server name Local drives Backup Exec database System State Network shares

Workstation agents User-defined selections

The Local Selections include: ◆

Local Drives. Includes hard drives as well as CD-ROM drives physically residing on the media server.



Backup Exec database. Includes job, schedule, job history, notification, alerts, device, media, and catalog indexes data for Backup Exec.



Shadow Copy Components (Windows Server 2003 only). The Backup Exec Shadow Copy Components file system uses Microsoft’s Volume Shadow Copy Service to protect critical operating system and application service data, and third party application and user data on Windows Server 2003 resources.

-

Service State. Critical operating system and application service data, such as Event Logs, Windows Management Instrumentation (WMI), Removable Storage Manager (RSM), etc.

-

System State. Critical operating system data, such as Windows System File Protection (System Files), COM+ Class Registration Database, Registry, Active Directory, etc.

-

User Data. SQL Server, Exchange Server, third party application and user data, etc.

Chapter 6, Backing Up Data

265

Backing Up Data

A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections. When expanded, the Backup Exec Shadow Copy Components file system includes the following types of Writers:

Selecting Data to Back Up ◆

System State. This collection of system-specific data is selected for backup whenever the Local Selections icon is selected. Backing up System State is recommended; however, you can clear the check box next to System State if you do not want to back it up with the Local Selections. When you double-click the icon for System State, the resources that comprise it appear to the right of it. If a resource is not installed on the computer, then it is not listed. You cannot select or expand the System State resources individually. They are backed up and restored only as a collection, never individually. You can only perform a full backup on System State. However, if you select other items at the same time, you can perform other backup methods on those items. You can back up System State remotely on other computers if Backup Exec Remote Agent is installed on the remote computer. For more information about System State, refer to your Microsoft Windows 2000 or Windows Server 2003 documentation.



Utility Partition. Includes the utility partitions installed on the system and available for backup. Individual utility partition objects are named Utility Partition on Disk Disk_Number (for example, Utility Partition on Disk 0), and cannot be expanded. Backing up utility partitions is recommended when a full system backup is done, such as for disaster recovery preparation. Utility partitions can be backed up individually. If there are not utility partitions on the system, this resource is not available. Administrative rights are required to browse and back up utility partitions. You can only perform a full backup of utility partitions. However, if you select other items at the same time, you can perform other backup methods on those items. You can back up utility partitions remotely on other computers

The Remote Selections include:

266



Network Shares. Includes Microsoft Windows systems protected by the Remote Agent for Windows Servers.



Workstation Agents. The Backup Exec Workstation Agents protect workstations running Windows 98/Me, Macintosh, and UNIX. The Novell SMS devices appear only when the Client (or Gateway) Services for NetWare service is enabled or Novell NetWare Client 32 is installed. If an agent workstation is password-protected, you must enter a password to access the agent’s published data. If some or all of the computer’s shared directories cannot be selected, a gray check box appears next to the agent. If this occurs, only the agent computers that Backup Exec scanned successfully are selected for backup. Review your security and attachment rights to the computers that are not selected. You cannot restore or archive workstation agent shares that are published as read-only. Valid logon accounts are required to access the systems.



User-defined Selections. Lists shortcuts to servers or shares that were created and saved as user-defined selections. Use this feature to quickly access shares that have a very long path or that are offline when you are setting up a backup job.

Administrator’s Guide

Selecting Data to Back Up

When you are browsing remote selections, Backup Exec requires a valid logon account to expand the resources and devices. If the default logon account does not enable access to a remote selection, Backup Exec prompts you to select another existing logon account or create a new logon account that can access the selection. There are several ways you can select data to back up. You can select an entire drive, a folder, files, System State, network share, Backup Exec Agent volume, or user-defined selection. You also can use the Advanced File Selection feature to include or exclude specific files or specific types of files. Or you can set up a selection list that you can reuse for several backups. Note If the account to which you are logged on does not have sufficient rights, you are required to supply another logon account that can be used to view files for backup. To expand the view for an item, click the plus sign (+) next to it or double-click the item name. To collapse the view, click the minus sign (-) next to an item or double-click the item name. To view the contents of an item, double-click the item’s icon. The item’s contents appear in the right frame of the backup selections view. For all items (except System State), you can traverse file levels from either side of the window by clicking folders and subfolders as they appear.

Backing Up Data

Chapter 6, Backing Up Data

267

Selecting Data to Back Up

To select data, select the check box next to the drive or directory you want to back up. The check box and check mark displayed are described in the following. Data selection descriptions A slash in a shaded check box means some items below the check box are selected, but the item itself cannot be selected. A slash in a check box means some items below the directory or drive level are selected. A check mark in a check box means all items at or below the directory or drive level are selected. A clear check box means the item can be selected.

A shaded check box means the item cannot be selected, but items below this item may be selectable.

See also: “Protecting Windows Server 2003 Systems” on page 343 “Backing Up NetWare Network Volumes” on page 351

About Selecting Distributed File System (Dfs) Links for Backup To back up Microsoft’s Distributed File System (Dfs), select the Dfs links on the Dfs server. Only the Dfs links themselves are backed up; the data that the links lead to is not included. To back up the data in the Dfs links, back up the data on the server where the data resides. See also: “Setting Up User-defined Selections” on page 282 “Restoring Distributed File System (Dfs) Links” on page 440

268

Administrator’s Guide

Selecting Data to Back Up

Including or Excluding Files for Backup Using Advanced File Selection Advanced file selection allows you to quickly select or de-select files for backup and archive operations by specifying file attributes. With this feature you can:





Include or exclude files by filename attributes. For example, you can select only files with .txt extensions, or exclude files with .exe extensions from a backup.



Select only files that fall within a specified date range. For example, you can select files that were created or modified during the month of December.



Specify files that have not been accessed in a specified number of days. For example, you can select files that have not been accessed in 30 days from your “My Documents” folder for an archive operation.

To select files using Advanced File Selection: 1. On the navigation bar, click Backup. 2. Select the resource that contains the files you want to include or exclude from the backup. 3. Select the path or file that contains the files you want to include or exclude. 4. Click Advanced. Advanced File Selection dialog box

Backing Up Data

Chapter 6, Backing Up Data

269

Selecting Data to Back Up

5. Select the appropriate options as follows: Note If the data does not match all of the criteria specified in the Advanced Backup File Selection dialog box, Backup Exec does not include or exclude it in the backup.

Advanced File Selection options Field

Description

Drives

If you want to include or exclude files from a backup of a different drive than the one you selected previously on the Backup Job Properties dialog box, select the new drive that contains the files you want to include or exclude.

File Selection Path

If you want to include or exclude a specific file, type the name of the folder and/or subfolder on the selected drive that contains the file. You can use wildcard characters. Use a question mark (?) to represent any single character. Use a single asterisk (*) to represent any number of characters before the next backslash. Use a double asterisk (**) to represent any number of characters, irrespective of any backslashes. For example, on your C: drive you have a My Documents folder that contains a subfolder called Work Files. There are three Work Files subfolders called 1999, 2000, and 2001. Each one of those subfolders has a subfolder called Personnel. If you type the path as \My Documents\**\Personnel, the backup will include or exclude: Š

C:\My Documents\Work Files\2001\Personnel

Š

C:\My Documents\Work Files\2000\Personnel

Š

C:\My Documents\Work Files\1999\Personnel

In addition, every subfolder below the ** wildcard is included or excluded. However, the only files from the subfolders that are included or excluded are those that match the file name you type in the File field. So in the example above, every subfolder of C:\My Documents is included in or excluded from the backup, and only the files that match the file name you type in the File field are included or excluded. After you type the path, type the file name in the File field.

270

Administrator’s Guide

Selecting Data to Back Up Advanced File Selection options (continued) Field

Description

File

Type the name of the file you want to include in or exclude from the backup. You can use wildcard characters. Use a question mark (?) to represent any single character. Use a single asterisk (*) to represent any number of characters. For example, to include all files with the .exe extension, type *.exe. You can use more than one asterisk if you know that a file name has certain letters in it, but not the exact file name. For example, to include or exclude any file that has the name Sam in it, type *Sam*.*. The default entry is *.*, which means every file name with every extension is selected. After you type the file name, indicate whether you want to include or exclude it.

Type Include

(Default) Select this option to include the files in the job.

Exclude

Select this option to exclude the files from the job.

Selection Criteria Select this option if you want to select the contents of all the subfolders when a directory is selected.

Only modified Files

Select this to include or exclude modified files in the path you specify.

Only read-only Files

Select this to include or exclude files that cannot be modified.

Files dated

Select this to include or exclude the files created or modified during a specific time period. Then select the beginning and ending dates.

Files not accessed in x days

Select this to include or exclude files that have not been accessed in a specified number of days. This is useful when you need to migrate older files from your system.

Chapter 6, Backing Up Data

271

Backing Up Data

Include subdirectories

Selecting Data to Back Up

6. After completing your selections, click OK. 7. Submit the operation using the same procedures as required for other backups. For more information, see “Creating a Manual Backup Job by Configuring Job Properties” on page 242.

Changing the Order for Processing Backup Selections After you make selections for a backup job, you can set up Backup Exec to process those selections in a certain order. Please note the following about the order in which selections can be backed up: ◆

You can order resources within a server, but you cannot alternate selections across servers. For example, you can select C: and D: from Server A followed by selections from Server B. However, you cannot order selections as C: from Server A and then C: from Server B and then D: from both servers.



For any given server, system state must be ordered last.

1. On the navigation bar, click Backup. 2. Select the data you want to back up. 3. On the Properties pane, under Source, click Resource Order. 4. Select an item you want to move. 5. Then, click Move Up or Move Down until the item is in the correct order. Click Make First to move an item to the top of the list or click Make Last to move an item to the bottom of the list. 6. Process the backup job (see “Creating a Manual Backup Job by Configuring Job Properties” on page 242).

272

Administrator’s Guide

Selecting Data to Back Up

Changing Logon Accounts for Resources A logon account enables Backup Exec to access resources for backup. ▼

To change a logon account for a resource: Note For remote selections, do not change the logon account information. They rely on the logon account used to connect to the server they reside on, and will ignore the additional logon account you can specify. This applies to drives, Lotus, System State, and Exchange selections (except mailboxes, which can and do use logon accounts). 1. On the navigation bar, click Backup. 2. Select the data you want to back up. 3. On the Properties pane, under Source, click Resource Credentials. 4. Select the resource whose logon account you want to edit. 5. Click Change. 6. Select the Backup Exec logon account you want to use for this backup selection, or click New and create a new Backup Exec logon account (see “Creating a Backup Exec Logon Account” on page 366). 7. Click OK.

Backing Up Data

Chapter 6, Backing Up Data

273

Using Selection Lists

Using Selection Lists Selection lists provide a quick and easy way of selecting files that you back up often. After you choose devices, directories and files, you can save the selections as a selection list that you can use in regularly scheduled operations or once-only operations. Selection lists, which define what is to be backed up, are also automatically created when you create a backup. You can combine a selection list with a template and quickly create a backup job. Backup Exec detects and notifies you about items in a selection list that are no longer on the resource. Notification occurs as a selection list is loaded for local selections, and as any remote server is expanded in the tree. See also: “Creating Selection Lists” on page 274 “Using Selection Lists to Create a Backup Job” on page 277 “Deleting Selection Lists” on page 279 “Editing Selection Lists” on page 280 “About the Excludes Selection List” on page 280

Creating Selection Lists Backup selection lists contain selections from the Backup Job Properties - Source dialog box. Restore and verify selection lists contain selections from the Restore Job Properties Source dialog box. The following steps explain the creation of a backup selection list. ▼

To create a backup selection list: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New selection list.

274

Administrator’s Guide

Using Selection Lists Selections options for new selection list

3. Select the resources you want to back up from the backup selections pane. For more information about selecting data, see “Selecting Data to Back Up” on page 265. 4. Select the appropriate options as follows: Selections options for selection list Description

Selection list name

Enter the name of this selection list.

Selection list description

Enter a description for this selection list.

Load Selections from Existing List

Click this button if you want to load an existing selection list or merge multiple selection lists (see “Merging and Replacing Selection Lists” on page 278).

View format Graphical

Chapter 6, Backing Up Data

Select this option to view selections in a directory tree view.

275

Backing Up Data

Item

Using Selection Lists Selections options for selection list (continued) Item

Description

Show file details

Select this option to display details about the files available for selecting.

Text

Select this option to view selections as a list of files and directories.

Advanced

Click this button if you want to use the Advanced File Selection for selecting files for backing up (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269).

Include subdirectories Select this option if you want to select the contents of all the subfolders when a directory is selected.

5. Click OK. See also: “Using Selection Lists” on page 274 “Using Selection Lists to Create a Backup Job” on page 277 “Deleting Selection Lists” on page 279 “Editing Selection Lists” on page 280 “About the Excludes Selection List” on page 280

276

Administrator’s Guide

Using Selection Lists

Using Selection Lists to Create a Backup Job ▼

To use selection lists to create a backup job: 1. On the navigation bar, click Backup. 2. Click Load Selections from Existing List. Load Selections from Existing List

3. Click the check box next each selection list you want to use for this backup. You can select multiple selection lists. A merged selection list will then be created and used for the job. The merged selection list will be saved separately and can be used for other jobs.

Backing Up Data

Chapter 6, Backing Up Data

277

Using Selection Lists

4. Submit the operation using the same procedures required for other backup operations (see “Creating a Manual Backup Job by Configuring Job Properties” on page 242). You can combine selection lists with a template to quickly create a new backup job. See also: “Using Selection Lists” on page 274 “Creating Selection Lists” on page 274 “Deleting Selection Lists” on page 279 “Editing Selection Lists” on page 280 “About the Excludes Selection List” on page 280 “Creating a New Backup Job from a Template” on page 290

Merging and Replacing Selection Lists You can create a new selection list by merging two or more existing lists with new selections. Merging of selection lists can be done when creating a job (see “Using Selection Lists to Create a Backup Job” on page 277) or by selecting the New selection list option. You can also replace selections in the tree with other selection lists. ▼

To merge or replace selection lists: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New selection list. 3. To merge with an existing selection list: a. On the New Backup Selection List dialog box, select resources to include in the selection list. b. Click Load Existing Selection List. c. On the Use Selections dialog box, select the selection lists you want to merge with the previously selected items. d. Click Merge.

278

Administrator’s Guide

Using Selection Lists

4. To replace selections with an existing selection list: a. Click Load Existing Selection List. b. On the Use Selections dialog box, select the selection lists you want to replace with the previously selected. c. Click Replace. 5. Click OK. 6. Complete the other options on the New Backup Selection List dialog box as described in “Selections options for selection list” on page 275. 7. Click OK.

Deleting Selection Lists ▼

To delete a selection list you are no longer using: 1. On the Edit menu, click Delete Selection List. The Delete Selections dialog appears. The available selection lists are listed in this window. 2. Click the selection list you want to delete, and then click Delete. 3. Click Yes to delete the Selection List; click No to cancel the delete operation. If the selection list is being used by a job, you will not be able to delete it. See also: “Using Selection Lists” on page 274

Backing Up Data

“Creating Selection Lists” on page 274 “Using Selection Lists to Create a Backup Job” on page 277 “Editing Selection Lists” on page 280 “About the Excludes Selection List” on page 280

Chapter 6, Backing Up Data

279

Using Selection Lists

Editing Selection Lists Editing a selection list affects all jobs using that selection list. If you want to only edit selections for a specific job, edit the job rather than the selection list. ▼

To edit a selection list: 1. On the navigation bar, click Job Setup. 2. On the Backup Selection Lists pane, select the selection list you want to edit. 3. Under General Tasks in the task pane, click Properties. 4. If the selection list is being used by jobs, you will be prompted to click Yes to continue. 5. Make the changes you want to Selections, Resource Order, and Resource Credentials. 6. Click OK. See also: “Using Selection Lists” on page 274 “Creating Selection Lists” on page 274 “Using Selection Lists to Create a Backup Job” on page 277 “Deleting Selection Lists” on page 279 “About the Excludes Selection List” on page 280

About the Excludes Selection List The Excludes Selection List provides an easy way for you to specify directories and/or files that you never want to back up. For example, you may have many temporary (*.tmp) files residing on your local disk. By adding them to the Excludes Selection List, these files are not backed up or archived. You can delete the Excludes Selection List. However, if you want to create a new Excludes Selection List, use “Excludes” as the Selection List name.

280

Administrator’s Guide

Using Selection Lists ▼

To edit the Excludes list: 1. On the Edit menu, click Edit Selection List. Edit Selection List dialog box

The Name and Type, such as backup or restore, of each selection list appears. 2. Choose Excludes from the Selection lists. 3. Click Edit. 4. If the Excludes list has been previously edited, you can select the Selection rule you want to edit and click Edit (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269), or select the Selection rule you want to remove and click Delete.

6. Click OK to save your changes and exit the Edit Selection List window. See also: “Deleting Selection Lists” on page 279 “Creating Selection Lists” on page 274

Chapter 6, Backing Up Data

281

Backing Up Data

5. If this is the first time the Excludes list is being edited, click Insert (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269).

Setting Up User-defined Selections

Setting Up User-defined Selections You can create shortcuts to shares and save them as user-defined selections. Use this feature to quickly access shares that have a very long path or that are unavailable when you are setting up a backup job. You can set up direct access to a share by entering its UNC name, IP address, or machine name. A share may be unavailable because the network resources used to locate the machine are offline, even though the machine may still be running and available. In some cases this happens because the machine is on the internet and accessible from within the company’s private network, but cannot be located using just its name or normal browsing methods. ▼

To add a user-defined selection: 1. On the navigation bar, click Backup. 2. On the backup selections pane, expand Remote Selections. 3. Right-click User-defined Selections, and then click User-defined Selections. 4. In the UNC Name field, type the server name and volume name Example: \\Production\graphics Note TCP/IP addresses can also be provided for user-defined selections. For example: \\10.0.0.0. However, Backup Exec does not support virtual servers via IP addresses. You can also use the computer name. 5. Click Add. The share appears in the Selections defined section of the dialog box. Repeat steps 4-5 to add additional user-defined selections. 6. When you are finished adding selections, click Close. The selections that you specified can be selected for backup operations from the User-defined Selections node. See also: “Using Selection Lists” on page 274 “Creating Selection Lists” on page 274 “Using Selection Lists to Create a Backup Job” on page 277 “Deleting Selection Lists” on page 279

282

Administrator’s Guide

Using Backup Job Templates

“Editing Selection Lists” on page 280 “About the Excludes Selection List” on page 280

Using Backup Job Templates Templates are job attributes that define how and when Backup Exec processes a job. Templates specify the device, settings, and schedule options to use, but do not include the resource selections to be used for the backup job. Templates are useful when you want to create new backup jobs that use the same settings. For example, you may want to define your backup strategy (see “About Backup Strategies” on page 352) that includes the media rotation methods. You can reflect this strategy once in your template definition, and then reuse the template for all resources being protected by the media server. Using templates offers another advantage when changes in the settings need to be made to multiple jobs. Rather than editing all jobs that use the same template, you can edit the template. Backup Exec then applies the template change to all jobs using that template during the next job processing interval.

Creating a New Backup Template ▼

To create a new backup template: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New job template.

Backing Up Data

Chapter 6, Backing Up Data

283

Using Backup Job Templates Device and Media options for new template

3. Set up the Device and Media options for this template. See “Device and Media options for backup job” on page 248 for detailed information about these options. 4. On the Properties pane, under Settings, click General and select options as described in “General Options for Backup Job Templates” on page 285. 5. Additional options can be set by selecting on the Properties pane additional Settings options, such as Advanced (see “Advanced Options for Backup Jobs” on page 257) and Pre/Post Commands (see “Pre/Post Commands for Backup or Restore Jobs” on page 261). 6. On the Properties pane, under Frequency, click Schedule to set the schedule options for this template (see “Scheduling Jobs” on page 374). 7. Click OK. See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Using Selection Lists to Create a Backup Job” on page 277

284

Administrator’s Guide

Using Backup Job Templates

General Options for Backup Job Templates General options for backup job templates include the template name and backup method. These options are set on the New Backup Job Template dialog box. To set these options, on the Properties pane, under Settings, click General. New Backup Job Template General options

General options for backup job templates include: General settings options for new backup job template Description

Template name

Type the name for this backup job template.

Backup set description

Type a description of the information you are backing up.

Chapter 6, Backing Up Data

285

Backing Up Data

Item

Using Backup Job Templates General settings options for new backup job template (continued) Item

Description

Backup method for files

Select a backup method. Your choices are: Š

FULL - Back Up Files - Reset Archive Bit. Includes all of the selected data on a volume and resets the archive bit to indicate that the files have been backed up.

Š

COPY - Back Up Files. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset.

Š

DIFFERENTIAL - Changed Files. Includes all files since the last full backup.

Š

INCREMENTAL - Changed Files - Reset Archive Bit. Includes only the files that have changed since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up.

Š

FULL - Back Up Files - Allow incrementals and differentials using modified time. Includes all of the selected data on a volume and allows the use of incrementals and differentials using the modified date and time stamp.

Š

DIFFERENTIAL - Using modified time. Includes all files since last full backup using the files’ last modified date and time stamp.

Š

INCREMENTAL - Using modified time. Includes all files since the last full or incremental backup using the files’ last modified date and time stamp.

Š

DAILY - Files that Changed Today. Backs up all files with today’s date.

Š

WORKING SET - All files last accessed in (x) days. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate in the Files accessed in x days field that you want to include data that has been accessed in a specific number of days.

Š

ARCHIVE - Delete files after successful copy backup. Backs up the selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted.

Note Backup Exec does not delete data from Backup Exec Agent workstations when using the archive feature. For more information, see “Understanding Backup Methods and Their Advantages” on page 355.

286

Administrator’s Guide

Using Backup Job Templates General settings options for new backup job template (continued) Item

Description

Files accessed in x days

If you selected the working set backup method in the Backup method for files field, use this field to specify the number of days for which to include accessed files. Note VERITAS recommends that you specify at least 30 days in order to include the data needed to make your system operational if you have to restore a working set backup.

Use the Windows Change Select this option if you want to use Windows’ NTFS Change Journal to determine which files have been modified since the Journal if available

last full backup. This option can only be used with NTFS volumes and only when the backup method selected is FULL - Back Up Files - Allows incrementals and differentials using modified time, DIFFERENTIAL - Using modified time or INCREMENTAL - Using modified time. Preserve tree on archive

Select this option to retain the directory structure of the files backed up in an archive job.

Verify after backup completes

Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read once the backup has been completed. Verifying all backups is recommended.

Backing Up Data

Chapter 6, Backing Up Data

287

Using Backup Job Templates General settings options for new backup job template (continued) Item

Description

Compression type

Select one of the following: Š

None. Select this option to copy the data to the media in its original form (uncompressed). Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive

288

Š

Software. Select this option to use STAC™ software data compression, which compresses the data before it is sent to the storage device.

Š

Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed.

Š

Hardware [if available, otherwise software]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature hardware data compression, STAC software compression is used.

Administrator’s Guide

Using Backup Job Templates

Editing a Backup Job Template You can quickly update the settings for all jobs that use the same template by editing the template rather than the individual jobs. ▼

To edit a job template: 1. On the navigation bar, click Job Setup. 2. On the Backup Job Templates pane, select the template you want to edit. 3. Under General Tasks in the task pane, select Properties. 4. Make the changes you want, and then click OK. See also: “Creating a New Backup Template” on page 283

Creating a Copy of a Backup Job Template You can make a copy of an existing backup job template. You may want to make a copy if you want to create a new template that uses most of the properties of an existing template. For example, if you want to create both full and differential backup jobs for resources and all other job settings will be identical, you can create a template using the full backup method and copy the template, you can then make changes to the copy through the template’s Properties (see “Editing a Backup Job Template” on page 289). ▼

To make a copy of a template: 1. On the navigation bar, click Job Setup. 2. In the Backup Job Templates pane, select the template you want to copy.

Backing Up Data

3. Under Backup Tasks in the task pane, select Copy template. 4. Enter the name of the new template, and then click OK.

Chapter 6, Backing Up Data

289

Using Backup Job Templates

Creating a New Backup Job from a Template Before you can create a backup job from a template, you must have a template with your specifications for the backup job and a selection list that contains the data you want to back up. If you do not have a template set up, see “Creating a New Backup Template” on page 283. If you do not have a selection list set up, see “Creating Selection Lists” on page 274. If you want to notify a person when the backup job completes, you must also have this person set up in a recipient list. 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks, click New job from template. Template options for new job from template

3. Select the template you want to use for this backup job. If you want to create a new template for this backup job, click New. Then, refer to “Creating a New Backup Template” on page 283. 4. On the Properties pane, under Source, click Backup Selection Lists. 5. Choose the selection list you want to use for this backup job. If you want to create a new selection list for this backup job, click New. Then refer to “Creating Selection Lists” on page 274. 290

Administrator’s Guide

Using Backup Job Templates

6. On the Properties pane, under Settings, click General and set general options for this job as described in “General Options for New Job from Template” on page 291. 7. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 8. Click Run Now. The backup job is submitted according to the schedule options you set in the profile.

General Options for New Job from Template Most options for a backup job created from a template are set when creating the backup job template. However, you can set some general options, such as the job name, from the Backup Job Properties dialog box by selecting on the Properties pane, under Settings, General. General options for new job from template

Backing Up Data

Chapter 6, Backing Up Data

291

Using Backup Job Templates

General options for a job created from a backup job template include: General options for new job from template

292

Item

Description

Job name

Enter a unique name for the backup job.

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Submit job on hold

Select this option if you want to submit the job on hold.

Enable automatic cancellation feature

Select this item if you want Backup Exec to automatically cancel the backup job if it does not complete within a specific amount of time after the scheduled start time. Then, in the Cancel job if not completed within fields, select the amount of time you want Backup Exec to wait before canceling the job.

Cancel job if not completed within x

Indicate the number of minutes or hours you want Backup Exec to wait before it cancels the backup job.

Administrator’s Guide

Using Backup Exec’s Windows Explorer Interface

Reapplying a Template to Jobs If you edit a backup job that was created using a backup job template, you receive a warning that editing the job will break the job’s association with the template. After editing the job, you should then reapply the template. ▼

To reapply the template to a backup job: 1. On the navigation bar, click Job Setup. 2. From the Backup Job Templates pane, select the template you want to reapply. 3. Under Backup Tasks in the task pane, select Reapply Templates to Jobs. 4. A warning message displays the jobs that will be affected. 5. Click Yes.

Using Backup Exec’s Windows Explorer Interface Backup Exec’s Windows Explorer interface allows you to select and back up files from Windows Explorer. Backup Exec’s administration console does not have to be running to create and submit backup jobs from Windows Explorer; however, Backup Exec services must be running on the server. The Windows Explorer interface can be used on the Backup Exec server and any computer running the Backup Exec Remote Administrator (see “Installing the Backup Exec Remote Administrator” on page 72). Backup Exec’s Windows Explorer interface cannot be used to back up databases, such as Microsoft SQL or Exchange server. To back up a database, use the appropriate Backup Exec agent. For more information, see “Backup Exec Options” on page 37. To set up Backup Exec to create backups from Windows Explorer:

Backing Up Data



1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Preferences. 3. Select Enable backup from Windows Explorer.

Chapter 6, Backing Up Data

293

Using Backup Exec’s Windows Explorer Interface

4. Click OK. The Back up with Backup Exec option will now appear on the Windows Explorer shortcut menu. See also: “Backup Exec Defaults” on page 90 “Submitting a Backup Job from Windows Explorer” on page 297 “Archiving Data” on page 300

Specifying or Changing Backup Settings for Windows Explorer The first time you submit a backup job using the Backup Exec Windows Explorer interface, you must specify logon information for the media server and enter a backup device name. The Backup Settings dialog box allows you to save the settings, which are used for subsequent backup jobs submitted from Windows Explorer. If you do not save the settings, you need to enter the logon information and the backup device name each time you submit a backup job from Windows Explorer. ▼

To specify or change settings for a backup job from Windows Explorer: 1. From Windows Explorer, right-click any file or folder. 2. Select Back up with Backup Exec from the shortcut menu. Note If you have already specified and saved backup job settings, the Backup dialog box appears. You can change backup job settings from the Backup dialog box. For more information, see “Submitting a Backup Job from Windows Explorer” on page 297.

294

Administrator’s Guide

Using Backup Exec’s Windows Explorer Interface Backup Settings dialog box

3. Select the appropriate options as follows: Backup Settings options Name

Description

Server Name

Type the name of the media server on which Backup Exec is installed.

Remote Server Login User Name

View or change the user name. The default is the name of the user currently logged on to the machine. You can enter a different user or administrator. Note If you are logged on as part of a workgroup, the user domain is your local machine name.

Chapter 6, Backing Up Data

Backing Up Data

Password

Type the password for the user.

295

Using Backup Exec’s Windows Explorer Interface Backup Settings options (continued) Name

Description

Backup Options Job Name

View or change the job name. The utility generates a unique name for the backup job in the format: Backup . If the job name exceeds 25 characters, the utility truncates the local machine name. For example: For a backup run on a machine named ADMN-30PAYROLL, the utility could generate the job name Backup ADMN-30P 960576233. If you change the default job name, you must ensure it is a unique job name.

Device Name

Type the name of the backup device.

Include subdirectories in Select this option to include all subfolders within the selected backup folders in the backup job. Save Settings

Select this option to save the backup settings as defaults for subsequent backup jobs. Note You must submit a backup job to save the settings in the Registry. Clear this option if you want to change the settings for a single backup job but keep the defaults saved in the Registry.

Job Status

View the status of a job, confirmation and error messages, and the job ID.

4. Click Submit Job. See also: “Archiving Data” on page 300

296

Administrator’s Guide

Using Backup Exec’s Windows Explorer Interface

Submitting a Backup Job from Windows Explorer After you have enabled Backup Exec to use the Windows Explorer interface and specified the backup settings, you can submit backup jobs from Windows Explorer. Note The first time you run a backup on a resource, you must use the Backup Exec graphical user interface. If the first backup on a resource is from the Windows Explorer interface, the job will fail and will continue to fail until you run a job from Backup Exec. ▼

To submit a backup job from Windows Explorer: 1. From Windows Explorer, select the files or folders you want to back up. 2. Right-click the selected files or folders and select Back up with Backup Exec from the shortcut menu. Selecting Back up with Backup Exec from Windows Explorer

Chapter 6, Backing Up Data

297

Backing Up Data

Note If you have not yet saved backup job settings, the Backup Settings dialog box appears. You must specify settings before submitting a backup job. For more information, see “Specifying or Changing Backup Settings for Windows Explorer” on page 294.

Using Backup Exec’s Windows Explorer Interface Backup dialog box

3. Select the appropriate options as follows: Backup options Name

Description

Job Name

View or change the job name. The utility generates a unique name for the backup job in the format: Backup local machine name numeric ID. If the job name exceeds 25 characters, the utility truncates the local machine name. For example: For a backup run on a machine named ADMN-30PAYROLL, the utility could generate the job name Backup ADMN-30P 960576233. If you change the default job name, you must ensure it is a unique job name.

Include Subdirectories in Select this option to include all subfolders within the selected Backup folders in the backup job. Job Status

View the status of a job, confirmation and error messages, and the job ID.

Note The backup job defaults to the options set in the Backup tab. For more information, see “Setting Default Backup Options” on page 320.

298

Administrator’s Guide

Running a One-button Backup Job

4. Click Submit Job. 5. Click Close Dialog after the backup job has been submitted and confirmed. Note To submit another backup job, you must close the Backup dialog box. See also: “Specifying or Changing Backup Settings for Windows Explorer” on page 294 “Submitting a Backup Job from Windows Explorer” on page 297

Running a One-button Backup Job One-button backup quickly backs up the local media server using the backup defaults. With one-button backup, you cannot select data or set options for the backup. After you select one-button backup, the backup job is submitted immediately using your default logon account and the default backup selections and settings. If you want to perform a one-button backup of a system where Backup-to-Disk folders are located, VERITAS recommends that you add the Backup-to-Disk folders to the Excludes Selection List. If you do not exclude Backup-to-Disk folders, data is continuously added to the folders during the one-button backup, which uses all the free drive space. You can back up the following with one-button backup: Local drives that do not use removable media



Lotus Domino resources



Windows NT System State



Windows NT Utility Partition



Windows NT Shadow Copy Device



Microsoft SQL Server databases



Microsoft Sharepoint Portal Server



Microsoft Exchange 5.5 Directory



Microsoft Exchange 5.5 and 2000 Information Store



Microsoft Exchange 2000 Key Management Service (KMS) and Site Replication Service (SRS)

You cannot back up the following types of data with one-button backup: ◆

Microsoft SQL Server filegroup resources



Microsoft Sharepoint Portal Server workspaces

Chapter 6, Backing Up Data

299

Backing Up Data



Archiving Data





Microsoft Exchange individual mailboxes and public folders



Microsoft Exchange 2000 installable filesystem (IFS) drive (usually M:)

To run a one-button backup job: 1. On the navigation bar, click Overview. Note You can also run a one-button backup job from the Backup Exec Assistant. To activate the Backup Exec Assistant, on the Tools menu, select Backup Exec Assistant. 2. On the Properties pane, under Views, select Information desk. 3. On the Information Desk, under Getting Started, click Back up this media server now with One-button backup. Backup Exec submits the job to the job queue.

Archiving Data With Backup Exec’s archive feature, you can free valuable disk space and reduce clutter on your server volume by migrating stagnant directories and files from the server to media. If you select archive as your backup method when creating a job, Backup Exec backs up the selected data, verifies the media, and then deletes the data from the volume. Note For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted. Backup Exec does not delete data from Backup Exec Agent workstations when using the archive feature. During an archive job, Backup Exec automatically performs a verify operation after the data is backed up. If the verify operation fails, the archive job stops and you are notified. If you get a verification failure, investigate the problem by viewing the job log, try to correct the problem, and then retry the archive operation. After the data is backed up and verified, Backup Exec automatically deletes the data included in the archive job. The job log contains a list of the data that was deleted. Note If the checkpoint restart setting is enabled for an archive backup job that is resumed when a cluster failover occurs, the files selected for archive are not automatically deleted from the source volume after the backup completes. 300

Administrator’s Guide

Archiving Data

Archiving Data Using Disk Grooming The archive operation can be used to perform disk grooming, which uses Windows’ last access date to move obsolete files from the server to media. Note The NTFS file system supports the last access date capability as does the VFAT file system under Windows NT. However, files accessed while the VFAT file system is used under DOS are not selected. ▼

To perform an archive operation: 1. On the navigation bar, click Backup. 2. Click Advanced. 3. For each resource you want to archive: a. On Drives selections, select the resource. b. Click Files not accessed in x days. Then, type or select the number of days (up to 999) to use as the criteria for selecting files. At this time, you may specify other criteria for data you want to include in the operation. For example, type *.doc in the File field to groom all of your document files not accessed in the number of days specified in the Files not accessed in x days field. c. Click OK. 4. On the Properties pane, under Settings, click General, and then select Archive as the backup method. 5. Complete the backup job options following the procedures described in “Creating a Manual Backup Job by Configuring Job Properties” on page 242.

“Including or Excluding Files for Backup Using Advanced File Selection” on page 269 “Archive Backups” on page 359

Chapter 6, Backing Up Data

301

Backing Up Data

See also:

Using Resource Discovery to Search for New Resources

Using Resource Discovery to Search for New Resources Backup Exec’s Resource Discovery feature allows detection of new backup resources within a Windows domain. Using this feature, you can create and schedule a job that searches for new server volumes or databases. You can specify which types of resources to include in the search, and can have Backup Exec send a notification when a new resource is discovered. Using the discovered resources identified in the job log, you can then create a backup job to ensure that the new resource is protected. The Remote Agent is required to discover resources on remote computers. However, installing a MAPI client on the media server enables Exchange resources to be discovered on remote resources on which the Remote Agent is not installed. On Windows Server 2003 resources, Backup Exec’s Resource Discovery feature will detect the Shadow Copy Components; it will not detect System State. ▼

To create a resource discovery job: 1. On the navigation bar, click Job Setup. 2. Under Backup Strategy Tasks in the task pane, select New job to automatically discover resources. Target options for resource discovery job

302

Administrator’s Guide

Using Resource Discovery to Search for New Resources

3. Select the domain you want Backup Exec to search for new resources. 4. If you need to change the logon account for the domain, click Change Logon Account and enter or select the logon credentials to access this domain. Note If you are using BEWAC, you can only choose a pre-defined logon account. You cannot create or edit a logon account. 5. If you want to exclude computers from the search, see “Excluding Computers from a Resource Search” on page 306. 6. On the Properties pane, under Settings, click General and complete the options described in “General Options for Resource Discovery Job” on page 304. 7. On the Properties pane, under Settings, click Resources and complete the options described in “Resources Options for a Resource Discovery Job” on page 305. 8. If you want Backup Exec to notify someone when this job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

Backing Up Data

Chapter 6, Backing Up Data

303

Using Resource Discovery to Search for New Resources

General Options for Resource Discovery Job General options for a resource discovery job can be set through the Resource Discover Job dialog box. To set the options, on the Properties pane, under Settings, click General. General settings for resource discovery job

Options on this dialog box include: General settings options for resource discovery job

304

Item

Description

Job name

Enter the name for this job.

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Administrator’s Guide

Using Resource Discovery to Search for New Resources

Resources Options for a Resource Discovery Job You can specify types of resources to discover and set some notification options through the Resources options dialog box. To set resource options, from the Resource Discovery Job dialog box, on the Properties pane, under Settings, click Resources. Options for this dialog box include: Resources options for resource discovery job Item

Description

Select the types of resources to automatically discover Network administrative shares

Select this option if you want Backup Exec to search for new administrative network shares or volumes.

Network user shares

Select this option if you want Backup Exec to search for new user-defined shares.

Microsoft SQL databases

Select this option if you want Backup Exec to search for new Microsoft SQL databases.

Microsoft Exchange servers

Select this option if you want Backup Exec to search for new Microsoft Exchange servers. Backup Exec searches for Information Store, Exchange Directory, or Storage Groups; it does not discover individual databases under storage groups.

Lotus Domino databases

Select this option if you want Backup Exec to search for new Lotus Domino databases.

System State/Shadow Copy Components

Select this option if you want Backup Exec to search for new System State resources or shadow copy components.

When new resources are discovered: Select this option if you want Backup Exec to send separate notifications when each new resource is found.

Send one notification for all new resources found

Select this option if you want Backup Exec to send out a single notification for all new resources found.

Chapter 6, Backing Up Data

305

Backing Up Data

Send separate notification for each new resource found

Using Resource Discovery to Search for New Resources Resources options for resource discovery job (continued) Item

Description

Include previously discovered resources when sending notification

Select this option if you want Backup Exec to send a notification that includes all resources previously found during resource discovery jobs.

Excluding Computers from a Resource Search When creating a resource discovery job, you can select to exclude one or more computers in the domain from the resource search. ▼

To exclude computers from the resource search: 1. After selecting the domains for Backup Exec to search for new resources (see “Using Resource Discovery to Search for New Resources” on page 302), on the Properties pane, under Target, click Exclude. 2. In the Domain field, select the domain that contains the servers you want to exclude. 3. From the list below the Domain field, select the server you want to exclude, and then click Exclude. To select consecutive servers, click the first item, press and hold <Shift>, and then click the last item. To select servers that are not consecutive, press and hold , and then click each item. Note Alternatively, you can type the name of the server in the Servers excluded field, and then click Add. To exclude multiple servers at one time, type a space between the name of each server. Tip

To remove a server from the list of excluded servers, select it and then click Include to return it to the list of included servers. You can also select multiple servers simultaneously.

4. Continue creating the resource discovery job.

306

Administrator’s Guide

Duplicating Backed Up Data

Duplicating Backed Up Data You can create a job to duplicate backup data, selecting either to duplicate existing backup sets or to duplicate backup sets immediately following a scheduled job. If you select to duplicate existing backup sets, the backup sets you select from catalogs are read from the source media and written to the selected destination, such as a drive, drive pool, or backup folder. You can schedule when this type of job runs. If you select to duplicate backup sets following a job, you select a scheduled backup job as the source. That backup job runs first, and then the backup sets it created are copied to the destination you selected for the duplicate job. To duplicate backup sets following a job, the backup job must be scheduled to run and must not be associated with any other duplicate jobs. You cannot schedule this job; instead, the duplicate job runs only after the related, or linked, backup job completes. ▼

To duplicate backup data: 1. From the navigation bar, click Job Setup. 2. Under Backup Tasks, select New job to duplicate backup data. 3. If you want to copy existing backup sets to another destination: a. Select Duplicate existing backup sets, and then click OK. b. Select the backup sets you want to copy. 4. If you want to duplicate backup sets created when a scheduled backup job runs: a. Select Duplicate backup sets following a job, and then click OK. b. Select the scheduled backup job to be used as the source.

6. On the Properties pane, under Settings, click General, and complete these options as described in “General Options for a Duplicate Job” on page 308. 7. On the Properties pane, under Settings, click Advanced, and complete these options as described in “Advanced Options for a Duplicate Job” on page 310.

Chapter 6, Backing Up Data

307

Backing Up Data

5. On the Properties pane, under Destination, select Device and Media, and complete these options as described in “Device and Media Options for Backup Jobs and Templates” on page 247.

Duplicating Backed Up Data

8. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 9. If you are duplicating data from a scheduled backup job, click Run Now. The duplicate job will launch immediately following the completion of the scheduled backup job. 10. If you are duplicating data from an existing backup set, either click Run Now or under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

General Options for a Duplicate Job General options for duplicate job

General options for a duplicate job include: General settings for New Duplicate Job

308

Item

Description

Job name

Type the name for this backup job.

Administrator’s Guide

Duplicating Backed Up Data General settings (continued)for New Duplicate Job (continued) Item

Description

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:

Backup set description

Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Type a description of the information you are backing up.

Preferred source device Select the device used as the destination device for the original backup job.

Backing Up Data

Chapter 6, Backing Up Data

309

Duplicating Backed Up Data

Advanced Options for a Duplicate Job Advanced options for a duplicate job

Advanced options that can be set for a duplicate job include: Advanced options for duplicate job

310

Item

Description

Verify after backup completes

Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read after the backup has been completed. Verifying all backups is recommended.

Administrator’s Guide

Duplicating Backed Up Data Advanced options for duplicate job (continued) Item

Description

Compression type

Select one of the following: Š

None. Select this option to copy the data to the media in its original form (uncompressed). Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive

Š

Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed.

Backing Up Data

Chapter 6, Backing Up Data

311

Verifying a Backup

Verifying a Backup In addition to the verification of files that is done when a backup or archive job runs, you can submit verify jobs to test the integrity of the media. If the Write checksums to media option is selected as a default backup option, checksums are calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If this option is not selected, backup performance may be improved, but there will be no way to verify the integrity of the data on the tape. Performing a verify operation when there are no checksums written for the set only verifies that the set can be read without getting a translation error. If you perform a verify operation and files fail to verify, the media may be bad. Details about files that failed to verify are provided in the job log, which can be viewed from the Job Monitor. ▼

To create a verify job: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New job to verify backup data. 3. Select the media you want to verify. Note The default view is the Resource view, which lists data by the device from which it was backed up. The Media view lists the data that is contained on a piece of media. To switch views, under View by, select the view you want to use. In addition, you can set Backup Exec to display the selections in a graphic format or a text format. To switch the format, select either Graphical or Text from the View format section. 4. On the Properties pane, under Destination, click Device. 5. Select the device that contains the media you want to verify. 6. On the Properties pane, under Settings, click General. 7. Select the appropriate options as follows: General Verify dialog box

312

Item

Description

Job Name

Type a name that describes the data you are verifying.

Administrator’s Guide

Verifying a Backup General Verify dialog box Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

8. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). After verification has completed, you can check the results in the job log. See also: “Setting Default Backup Options” on page 320 “Verify after backup completes” on page 310

Backing Up Data

Chapter 6, Backing Up Data

313

Creating a Test Run Job

Creating a Test Run Job The Backup Exec test run option determines if a scheduled backup will complete successfully. When you run a test job, you can monitor the job just as you would a normal backup job, but no data is backed up. During the test run, the tape capacity, credentials, and media are checked. If there is an error, the job will continue to run and the error will appear in the job log. Notification can also be sent to a designated recipient. During a test run job, the following may cause a job to fail: ◆

The logon credentials are incorrect.



Insufficient media is available.



Media is not in the drive.



There is no overwritable media for an overwrite job.



There is no appendable media for an append job.

Test run jobs that are targeted to All Drives will fail the test if any of the devices in the All Drives drive pool cannot handle the job. For example, if one of the devices does not have any media. A test run job checks media capacity available for the selected job. However, you can check if there is enough available media for multiple test run jobs in the Test Run Results report. Note Before you create a test run job, VERITAS recommends that you run backup jobs to your devices first. Backup Exec does not recognize the capacity of a backup device until an actual backup job is targeted to the device. If you create a test run job before any other jobs, Backup Exec cannot check that the device has sufficient capacity to perform the backup job. After at least one backup job has been targeted to a device, Backup Exec can determine the capacity. ▼

To create a test run of a job: 1. On the navigation bar, click Job Setup. 2. In the Jobs pane, select the job for which you want to create a test run. 3. Under General Tasks, click Test Run. 4. Select General options as described in “General Options for Test Run Jobs” on page 316.

314

Administrator’s Guide

Creating a Test Run Job

5. If you want Backup Exec to notify a recipient when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). See also: “Viewing General Media Properties” on page 226 “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Test Run Results Report” on page 546

Backing Up Data

Chapter 6, Backing Up Data

315

Creating a Test Run Job

General Options for Test Run Jobs General settings options for test run job

General options for a test run job include: General settings options for test run job Item

Description

Job name

Type a name for the test run job.

Credentials check

Select this check box to verify that the Backup Exec logon account is correct for the resources being backed up.

Media capacity check to Select this check box to test if there is enough available capacity on the complete individual job media to complete the job. Note During the test run job, the number of scheduled jobs in the queue is not checked; therefore, jobs that are scheduled before the test run job may use the media that was available when the test run job was performed. Media check

316

Select this check box to test whether the media is online and overwritable.

Administrator’s Guide

Creating a Test Run Job General settings options for test run job (continued) Item

Description

Method for determining job size Use previous job history, if available

Select this option to use past job histories to determine whether there is enough media available to run the scheduled backup job. Checking the previous job history is faster than performing a pre-scan.

Perform Pre-scan

Select this option to enable Backup Exec to scan the scheduled backup job to determine whether there is enough media available to run the job. This is the most accurate method of determining media capacity and should be selected if there is not an existing job history.

Upon any failure, place the scheduled job on hold

Select this option to have the scheduled job placed on hold if any failures are detected during the test run.

Run at priority

Select the priority level for the test job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

See also: “Viewing General Media Properties” on page 226 “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Test Run Results Report” on page 546

Backing Up Data

Chapter 6, Backing Up Data

317

Creating a Test Run Job

Setting Test Run Default Options ▼

To set test run default options: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Test Run. Test Run default options

318

Administrator’s Guide

Creating a Test Run Job

3. Select the appropriate options as follows: Default options for test run jobs Item

Description

Check credentials

Select this check box to verify that the Backup Exec logon account is correct for the resources being backed up.

Check media capacity to complete job

Select this check box to test if there is enough available capacity on the media to complete the job. Note During the test run job, the number of scheduled jobs in the queue is not checked; therefore, jobs that are scheduled before the test run job may use the media that was available when the test run job was performed.

Check media availability

Select this check box to test whether the media is online and overwritable.

Use previous job history, if available

Select this option to use past job histories to determine whether there is enough media available to run the scheduled backup job. Checking the previous job history is faster than performing a pre-scan.

Perform Pre-scan

Select this option to enable Backup Exec to scan the scheduled backup job to determine whether there is enough media available to run the job. This is the most accurate method of determining media capacity and should be selected if there is not an existing job history.

Place the job on hold if Select this option to have the scheduled job placed on hold if any any failure occurs failures are detected during the test run.

4. Click OK.

Backing Up Data

Chapter 6, Backing Up Data

319

Setting Default Backup Options

Setting Default Backup Options You can set up Backup Exec with the settings that you want to use for most backup operations, such as the backup method and compression type. If the default options are not appropriate for a particular backup job, you can override the default options when you set up a backup job. ▼

To configure backup options: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Backup. Default backup options

320

Administrator’s Guide

Setting Default Backup Options

3.

Select the appropriate options as follows: Backup default options Item

Definition

Backup method for files

Select the default Backup method. FULL - Back Up Files - Reset Archive Bit is the typical selection for this field. For more information about backup methods, see “Understanding Backup Methods and Their Advantages” on page 355.

Files accessed in x days

When the Working Set backup method is selected, use this field to specify the number of days for which to include accessed files.

Backing Up Data

Chapter 6, Backing Up Data

321

Setting Default Backup Options Backup default options (continued) Item

Definition

Media overwrite protection

Select one of the following media overwrite options: Š

Overwrite media. Select this option to place this backup on an overwritable media. Make sure that appropriate media is in the stand-alone drive or drive pool you select in the Device field in this dialog box. The media in the drive is overwritten if the media is scratch or recyclable (its overwrite protection period has expired). If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see “Media Overwrite Protection Levels” on page 196. If the media in the drive is not overwritable, a message is displayed requesting that you insert overwritable media.

Š

Append to media, overwrite if no appendable media is available. Select this option to add this backup to the media set listed in the Media Set field in the General applications dialog box (see “Options - Set Application Defaults Preferences” on page 91). The backup set is appended if an appendable media is available in the selected media set; if not, an overwritable media is used and added to the media set. If an append job fills a media, the job continues on another piece of overwritable media. Depending on your configuration, overwritable media is selected from Scratch media or Recyclable media. For more information, see “Media Overwrite Options” on page 198. If the media in the drive is not overwritable, a message is displayed requesting that you insert overwritable media.

Š

322

Append to media, terminate job if no appendable media is available. Select this option to add this backup to the media set listed in the Media Set field in the General applications dialog box (see “Options - Set Application Defaults Preferences” on page 91). The backup set is appended if an appendable media is available in the selected media set; if not, the job is terminated.

Administrator’s Guide

Setting Default Backup Options Backup default options (continued) Item

Definition

Compression type

Select one of the following compression types: Š

None. Select this option to copy the data to the media in its original form (uncompressed).

Note Using some form of data compression can help expedite backups and preserve storage media space. Š

Software. Select this option to use STAC™ software data compression, which compresses the data before it is sent to the storage device.

Š

Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression, the data is backed up uncompressed.

Š

Hardware [if available, otherwise software]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature hardware data compression, STAC software compression is used.

Verify after backup

Select this option if you want backups to be verified after they are completed. Verify operations make sure the media can be read once the backup has been completed. Verifying all backups is recommended.

Write checksums to media

Select this option if checksums are to be calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If this option is not selected, backup performance may be improved, but there is no way to verify the integrity of the data on the tape; Backup Exec can only verify that the data can be read from the device.

Backing Up Data

Chapter 6, Backing Up Data

323

Setting Default Backup Options Backup default options (continued) Item

Definition

Back up files and directories by following junction points

Select this check box to back up the information for the junction points and the files and directories to which they are linked. If this check box is not selected, then only the information for the junction points is backed up; the files and directories to which they are linked are not backed up. If you use junction points created by linkd.exe (or a similar tool) to span volumes, then Advanced Open File Option (AOFO) backups and Change Journal incremental backups will not follow the junction points properly. To perform AOFO and Change Journal incremental backups of volumes with junction points, clear this option. Junction points created by Disk Manager or mountvol.exe are supported. Note Since Mounted Drives that do not have a drive letter assigned to them cannot be selected, the files and directories to which they are linked are backed up regardless of whether this option is selected. If this option is selected and the actual files and directories to which the junction points are linked are also included in the backup selections, then the files and directories are backed up twice; once during the full file and directory backup, and again via the junction point. WARNING: If a junction point is linked to a location that encompasses it, then recursion (a situation where data is backed up repeatedly) will occur, resulting in an error and job failure. For example, if c:\junctionpoint is linked to c:\, recursion will occur when attempting to back up c:\junctionpoint, and the backup job will fail.

324

Administrator’s Guide

Setting Default Backup Options Backup default options (continued) Item

Definition

Back up data in Remote Storage

Select this check box to back up data that has been migrated from primary storage to secondary storage. The data will not be recalled to its original location; it will be backed up directly to the backup media. If this option is selected, you should not run a backup of your entire system because Backup Exec will have to load the data that has been migrated to secondary storage and additional time will be required for any set that includes migrated data. If this check box is cleared, only the placeholder that stores the location of the data on secondary storage will be backed up, not the data itself. Note This option should not be selected if the device used for secondary storage and backups contains only one drive because Remote Storage and Backup Exec will compete for use of the drive.

Use Change Journal if available

Select this option if you want to use Windows’ NTFS Change Journal to determine which files have been modified since the last full backup. This option can only be used with NTFS volumes and only when the backup method selected is FULL - Back Up Files

- Allow incrementals and differentials using modified time, DIFFERENTIAL - Using modified time or INCREMENTAL - Using modified time.

Backing Up Data

Chapter 6, Backing Up Data

325

Setting Default Backup Options Backup default options (continued) Item

Definition

Enable single instance backup for NTFS volumes

Select this option if you want Backup Exec to protect Single Instance Store (SIS) volumes. SIS, which is used by Remote Installation Services to save disk space, maintains a single physical copy of all identical files on a specified volume. If SIS finds an identical file on the volume, a copy of the original file is placed in the SIS and a link is made to the actual physical location. By selecting this option, Backup Exec will back up the physical file one time, no matter how many links have been created.

Caution If the backup job does not run to completion, the file data may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same files. You must run a full or copy backup to ensure that all files are backed up completely. If the incremental - using modified time backup method was used, running the same backup job to completion will back up the files correctly.

326

Administrator’s Guide

Setting Default Backup Options Backup default options (continued) Item

Definition

Open file backup when Advanced Open File Option is not used Never

Select this option to have Backup Exec skip open files if they are encountered during the backup operation. A listing of skipped files appears in the job log for the backup.

If closed within x seconds

Select this option to have Backup Exec wait the specified time interval for files to close before skipping the open file and continuing the backup operation. If the file does not close during the specified interval, it is skipped. A listing of skipped files appears in the job log for the backup. Note If multiple files are open, Backup Exec waits the specified time interval for each file; depending on the number of open files, this may significantly increase the backup time.

With a lock

Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open a file, the file is locked while it is being backed up to prevent other processes from writing to it. Backing up open files is not as effective as closing applications and allowing the files to be backed up in a consistent state.

Without a lock

Select this option to have Backup Exec attempt to open an in use. If Backup Exec is able to open the file, the file is NOT locked while it is being backed up. This allows other applications to write data to the file during the backup operation. WARNING: This option allows files to be backed up that contain inconsistent data and possibly corrupt data.

Chapter 6, Backing Up Data

327

Backing Up Data

For information about the Advanced Open File Option, see “VERITAS Backup Exec - Advanced Open File Option” on page 977.

Setting Default Pre/Post Commands

Setting Default Pre/Post Commands You can set defaults for the commands you want to run before or after all backup and restore jobs. If the default options are not appropriate for a particular job, you can override the default options when you create the job. Conditions that you can set for these commands include: ◆

Run the backup or restore job only if the pre-job command is successful



Run the post-job command only if the pre-job command is successful



Run the post-job command even if the backup or restore job fails



Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-job commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error.

If it is critical that the job not run if the pre-job command fails, then configure Backup Exec to check the return codes of the pre- and post-job commands to determine if the pre-job command failed or completed successfully. For example, if a pre-job command that shuts down a database before a backup is run fails, the database could be corrupted when the backup is run. In this situation, it is critical that the backup job not run if the pre-job command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-job commands, and the post-job command returns a non-zero code, the job log reports that the post-job command failed. If you also selected to run the job only if the pre-job command is successful, and both the pre-job command and the job ran successfully, Backup Exec will mark the job as failed if the post-job command fails. For example, if the pre-job command runs successfully and shuts down the database and the backup job also runs successfully, but the post-job command cannot restart the database, Backup Exec marks the job and the post-job command as failed. If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server. ▼

To set pre/post command options: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Pre/Post Commands.

328

Administrator’s Guide

Setting Default Pre/Post Commands

3. Select the appropriate options as follows: Pre-job and Post-job options Item

Description

Pre-job and post-job commands Run job only if pre-job command is successful

Select this option to run the backup or restore job only if the pre-job command is successful. If the pre-job command fails, the job does not run, and is marked as failed.

Chapter 6, Backing Up Data

329

Backing Up Data

If it is critical that the job not run if the pre-job command fails, then select Allow pre- and post-job commands to be successful only if completed with a return code of zero. If a non-zero code is returned, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The job is not run and the job status is marked as Failed.

Setting Default Pre/Post Commands Pre-job and Post-job options (continued) Item

Description

Run post-job command only if pre-job command is successful

Select this option to run the post-job command only if the pre-job command is successful. If it is critical that the post-job command fail if the pre-job command fails, then select Allow pre- and post job commands to be successful only if completed with a return code of zero. If a non-zero code is returned for the pre-job command, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The post-job command is not run. If you also select Run job only if pre-job command is successful, and both the pre-job command and the job are successful, but the post-job command returns a non-zero code, the job log reports both the job and the post-job command as failed.

Run post-job command even if job fails

Select this option if it is critical to run the post-job command regardless if the job is successful or not. If you also select Allow pre- and post job commands to be successful only if completed with a return code of zero and the post-job command returns a non-zero code, the job log reports the post-job command as failed.

Allow pre- and post-job commands to be successful only if completed with a return code of zero

Select this option to allow Backup Exec to check the return codes of the pre- and post-job commands to determine if they completed successfully. An exit code of zero returned to the operating system by the preor post-job command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the preand post-job commands. If this option is not selected, the success of the pre- and post-job commands is not determined based on the return code.

Cancel command if not completed within x minutes

Select the number of minutes Backup Exec should wait before canceling a pre-job or post-job command that did not complete. The default time-out is 30 minutes.

Run these commands On this media server

330

Select this option to run the pre- and post-job commands on this media server only.

Administrator’s Guide

Setting Default Pre/Post Commands Pre-job and Post-job options (continued) Item

Description

On each server backed up

Select this option to run the pre- and post-job commands one time on each server backed up. The pre- and post-job command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.

4. Click OK. See also: “Pre/Post Commands for Backup or Restore Jobs” on page 261

Backing Up Data

Chapter 6, Backing Up Data

331

Specifying Backup Networks

Specifying Backup Networks The Backup Network feature allows you to direct primary backup traffic generated by Backup Exec to a specific local network. Directing backup jobs to a specified local network isolates the backup data so that other connected networks are not affected when backup operations are performed. You also can use a backup network when restoring data. The feature is enabled on the media server and allows you to protect all the remote computers that reside on the specified local network. When the feature is enabled and a backup job is submitted, Backup Exec verifies that the media server and the remote computer are located on the specified local network. If both the media server and the remote computer are on the backup network, then the backup operation is performed. If the media server or the remote computer is not on the specified local network, the job fails. However, you can set up Backup Exec to use any available network to back up remote computers that are not connected to the backup network. The following diagram shows an example of a basic backup network configuration. Example of backup network Backup Exec media server

IP address: 128.10.0.1

backup network network ID: 128.10.0.0 subnet mask: 255.255.0.0 router A IP address: 128.10.0.3

IP address: 128.10.0.2 IP address: 128.20.0.2

IP address: 128.20.0.3 router B

database server running Remote Agent

mail server running Remote Agent corporate network network ID: 128.20.0.0 subnet mask: 255.255.0.0

database user

332

mail user

database and mail user

Administrator’s Guide

Specifying Backup Networks

In the example, the database server and mail server are connected to both the backup network and the corporate network. When backup operations are performed by the Backup Exec media server, the backup data will use either the backup network or the corporate network to back up the database server. If the backup data goes through the corporate network, the amount of time it takes to back up the database server will increase because the network route between the two computers is longer. This may cause users to experience network latencies when accessing the mail server since there is an increase in network traffic. In contrast, if the Specified Backup Network feature is enabled and you back up the database server, the backup data traffic is isolated to the backup network and users accessing the mail server are not affected. The backup network will be used to perform all backup operations, unless the remote computer is not connected to the backup network. If you want to back up remote computers that are not connected to the backup network, such as the database user’s computer, then choose to use any available network route. This allows you to back up the remote computer even though it does not reside on the backup network. See also: “Using Backup Exec with Firewalls” on page 340 “Browsing Systems Through a Firewall” on page 342

Backing Up Data

Chapter 6, Backing Up Data

333

Specifying Backup Networks

Specifying the Default Backup Network You can specify a network to be used as the default for every Backup Exec job. Before configuring the feature, test for network connectivity between the media server and the remote computers. Note The remote computers that you want to back up must have the most current version of Backup Exec Remote Agent installed. ▼

To set the default backup network: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Network. Network options dialog box

334

Administrator’s Guide

Specifying Backup Networks

3. Select the appropriate options as follows: Network Options - Set Application Defaults Item

Description

Enable selection of default shares

Select this option to enable selection of Windows default shares.

Enable selection of user selections

Select this option to enable selection of Windows user shares.

Default Network Select the name of the network interface card that connects the media server to the network you want to use for the backup network. The list includes all available network interface cards on the media server.

IP address

Displays the IP address of the network interface card you selected for the backup network.

Subnet mask

Displays the 32-bit number that determines the subnet to which the network interface card belongs.

Network ID

Displays the base network that Backup Exec calculated based on the IP address and the subnet mask of the network interface card you selected. This is the network that will be used to perform remote backups and restores.

Physical address

For Windows 2000 and later operating systems, this field displays the Media Access Control (MAC) address for the network identification card you selected. For Windows NT 4 and earlier operating systems, this field lists the service entry name.

Use any available network route for remote agents not bound to the above Network ID

If a remote system that you selected for backup or restore is not part of the specified backup network, select this check box to ensure that the data from the remote system is backed up or restored over any available network. If you do not select this check box and you selected data from a remote system that is not part of the specified backup network, the job fails because Backup Exec cannot back up or restore the data from the remote system

Chapter 6, Backing Up Data

335

Backing Up Data

Network Interface

Specifying Backup Networks Network Options - Set Application Defaults (continued) Item

Description

Enable agents using TCP/IP protocol

Select this option to use the TCP/IP network protocol to communicate with other devices on the network. If you select this option, make sure that all agent workstations are configured to advertise their IP addresses directly to the media server. To set up this protocol, refer to your Windows documentation.

Enable agents using NetWare IPX/SPX protocol

Select this option to use the IPX/SPX network protocol to communicate with other devices on the network. If you are using Backup Exec Agents that communicate using SPX, you should ensure that you are using a consistent IPX frame type on your network. If you do not, and Backup Exec is using a different IPX frame type than the workstations running the Backup Exec Agent software, all SPX packets must be routed through a server that can translate the packets. This generates excessive network traffic and, if the router does not properly handle large SPX packets, some packets may be lost. One symptom of this problem is a backup that times-out with a “Device not responding” error message. Please note that the Auto-Detect frame type will not work if there are any combinations of 802.2 and 802.3 on the network. To set up this protocol, refer to your Windows documentation.

Enable Media Server TCP Select this option if you want to allow the media server to use a dynamic port range range of ports for communications, and then enter the port range. If the first port Backup Exec attempts to use is not available, communications will be attempted through one of the other ports in the range. If none of the ports in the range are available, Backup Exec will use any available dynamic port. Default port ranges are 1025 to 65535. VERITAS recommends using a range of 50 allocated ports for the media server if using Backup Exec with a firewall (“Using Backup Exec with Firewalls” on page 340).

336

Administrator’s Guide

Specifying Backup Networks Network Options - Set Application Defaults (continued) Item

Description

Enable Remote Agent TCP dynamic port range

Select this option if you want to allow remote agents to use a range of ports for communications, and then enter the port range. If the first port Backup Exec attempts to use is not available, communications will be attempted through one of the other ports in the range. If none of the ports in the range are available, Backup Exec will use any available dynamic port. Default port ranges are 1025 to 65535. VERITAS recommends using a range of 25 allocated ports for the remote systems if using Backup Exec with a firewall (“Using Backup Exec with Firewalls” on page 340).

See also: “Changing the Backup Network for a Job” on page 337 “Specifying the Restore Network” on page 460

Changing the Backup Network for a Job When you set up a default network, Backup Exec uses it automatically for every backup and restore job. However, when you are setting up a new backup job, you can change the backup network for that job. When you change the backup network for a job, you also can set that backup network as the new default backup network for all future backup jobs. ▼

To change the backup network for a backup job: 1. On the navigation bar, click Backup. 2. Set up the backup job as usual by selecting data and setting General and Advanced options (see “Creating a Manual Backup Job by Configuring Job Properties” on page 242).

Backing Up Data

Chapter 6, Backing Up Data

337

Specifying Backup Networks

3. On the Properties pane, under Settings, click Network. Network options for backup job

4. Select the appropriate options as follows: Network Backup Job Properties

338

Item

Description

Network Interface

Select the name of the network interface card that connects the media server to the network you want to use for the backup network for this backup job. The list includes all available network interfaces on the media server.

IP address

Displays the IP address of the network you selected as the backup network.

Subnet mask

Displays the 32-bit number that determines the subnet to which the network interface card belongs.

Network ID

Displays the network identification or subnet address that Backup Exec calculated based on the network you selected as the backup network.

Administrator’s Guide

Specifying Backup Networks Network Backup Job Properties (continued) Item

Description

Physical address

For Windows 2000 and later operating systems, this field displays the Media Access Control (MAC) address for the network card you selected. For Windows NT 4 and earlier operating systems, this field lists the service entry name.

Use any available network route for remote agents not bound to the above Network ID

If a remote system that you selected for backup is not part of the specified backup network, select this check box to ensure that the data from the remote system is backed up over any available network. If you do not select this check box and you selected data from a remote system that is not part of the specified backup network, the job fails because Backup Exec cannot back up the data from the remote system.

5. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see “Selecting Recipients for Job Notification” on page 509). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). See also: “Specifying Backup Networks” on page 332 “Specifying the Default Backup Network” on page 334 “Creating a Manual Backup Job by Configuring Job Properties” on page 242

Backing Up Data

Chapter 6, Backing Up Data

339

Using Backup Exec with Firewalls

Using Backup Exec with Firewalls In firewall environments, Backup Exec provides the following advantages: ◆

The number of ports used for receiving incoming connections is kept to a minimum.



Ports opened on the Backup Exec Server and systems using the Remote Agent for Windows Servers are dynamic and offer high levels of flexibility during browsing, backup, and restore operations.



You can set specific firewall port ranges and specify backup and restore networks within these ranges to isolate data traffic and provide high levels of reliability.

Note The Remote Agent for Windows Servers is required to perform remote backups and restores. Because firewalls affect system communications between a media server and remote systems that reside outside the firewall environment, special port requirements must be considered when configuring Backup Exec for use with firewalls. VERITAS recommends having port 10000 open and available on the Backup Exec media server as well as on the remote systems. In addition, you must open the dynamic port ranges specified for communications between the media server and remote agents. The firewall must have a static Network Address Translation (NAT) configuration for these two-way communications to work. When a media server makes a connection with a remote system, the initial connection will be initiated on the well known port 10000. The Remote Agent will be listening for connections on this predefined port. The media server side of this connection will be bound to an available port as specified in the Enable media server TCP dynamic port range. Additional connections from the media server to the Remote Agent will be initiated on an available port selected in the Enable remote agent TCP dynamic port range option, and the media server side of these connections will be bound to an available port as specified in the Enable media server TCP dynamic port range option. Communication between the media server and the Remote Agent for Windows Servers will usually require 2 ports on the media server side and up to 2 ports on the remote agent side per operation. If you plan on supporting multiple backups and restores occurring simultaneously, you must configure your firewall to allow a range of ports large enough to support the maximum number of simultaneous operations desired.

340

Administrator’s Guide

Using Backup Exec with Firewalls

Should a conflict arise, the default port of 10000 can be changed to another port number by modifying the %systemroot%\System32\drivers\etc\services file, and changing the NDMP port to an alternate port number. For example, if you installed Windows 2000 to its default location, from your Windows Explorer, select C:\WINNT\System32\drivers\etc\services. Using a text editor, such as Notepad, modify your NDMP entry, or if necessary, add an NDMP entry with the new port number. This entry should be formatted as follows: ndmp

10000/tcp

#Network Data Management Protocol

Note If the default port is changed, it must be changed on the media server and all remote systems being backed up through the firewall on this port. When setting up TCP dynamic port ranges, VERITAS recommends using a range of 50 allocated ports for the media server (see “Enable Media Server TCP dynamic port range” on page 336), and 25 allocated ports for the remote systems (see “Enable Remote Agent TCP dynamic port range” on page 337). For optimum reliability, port ranges should not overlap. Note The number of dynamic ports used by the media server and remote systems can change based on the number of devices being protected and the number of tape devices in use. You may need to increase these port ranges to maintain the highest level of performance. Backup Exec and the firewall need to have the ranges defined (and port 10000). Unless you specify a range, Backup Exec uses the full range of dynamic ports available. When performing remote backups through a firewall, you should select a specific range on the Network defaults dialog box. Because the backup communications between the media server and the remote agent for Windows servers will usually require multiple two-way connections on different port numbers, you must configure your firewall to support this type of communications.

Chapter 6, Backing Up Data

341

Backing Up Data

Note Firewalls using a many to one Network Address Translation (NAT), or Circuit-level Gateways, may not accept incoming connections destined for a private address behind the firewall. As a result, firewalls utilizing this technology may not be compatible with Backup Exec for Windows Servers firewall backup methods. You can make NAT work with port forwarding or putting Backup Exec on a DMZ host. Please refer to your firewall documentation for more information on these and other configurations.

Using Backup Exec with Firewalls

Browsing Systems Through a Firewall Because most firewalls do not allow a remote system to be displayed in the Microsoft Windows Network tree, you may need to take additional steps to select these remote systems in the Backup Exec administration console. ▼

To view devices in firewall environments: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Network. 3. Verify that a dynamic range of ports has been set for the media server and remote agent and that the firewall is configured to pass these port ranges. 4. Click OK. 5. On the navigation bar, click Backup. 6. On the backup selections pane, expand Remote Selections. 7. Right-click User-defined Selection. 8. From the shortcut menu, click User-defined Selections. 9. In UNC Name, after \\, type the name or IP address of the remote system, and then click Add. 10. Click Close. Under User-defined Selections, you can now select the data to be protected, providing a valid user name and password if prompted, and create a backup job to protect this data by following the procedures described in “Creating a Manual Backup Job by Configuring Job Properties” on page 242.

342

Administrator’s Guide

Protecting Windows Server 2003 Systems

Protecting Windows Server 2003 Systems The Backup Exec Shadow Copy Components file system uses Microsoft’s Volume Shadow Copy Service to protect critical operating system and application service data, and third party application and user data on Windows Server 2003 resources. Volume Shadow Copy Service allows a computer to be backed up while applications and services are running by providing a copy of a volume when a backup is initiated. Applications do not need to be shut down to ensure a successful volume backup. Volume Shadow Copy Service enables third party vendors to create snapshot plug-ins, or Writers, for use with this shadow copy technology. Note To fully protect any local or remote servers running production versions of Windows Server 2003, you should upgrade to the latest version of Backup Exec on all media servers and update the Remote Agent for Windows Servers on any remote computers running Windows Server 2003. Remote Agents from Backup Exec 9.0 Revision 4367 are not supported on production versions of Windows Server 2003.

About the Backup Exec Shadow Copy Components File System A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections. When expanded, the Backup Exec Shadow Copy Components file system includes the following types of Writers: Service State - Critical operating system and application service data, such as Event Logs, Windows Management Instrumentation (WMI), Removable Storage Manager (RSM), etc.



System State - Critical operating system data, such as Windows System File Protection (System Files), COM+ Class Registration Database, Registry, Active Directory, etc.



User Data - SQL Server, Exchange Server, Active Directory Application Mode, third party application and user data, etc.

Only Writers that have been tested for use with Backup Exec are available for selection in the backup selection list. Other Writers may be displayed in the selection list, but cannot be selected for backup.

Chapter 6, Backing Up Data

343

Backing Up Data



Protecting Windows Server 2003 Systems Backup Exec Shadow Copy Components file system

The following table lists the System State Writers and their equivalents in Windows 2000 System State:

344

System State Writer

Windows 2000 System State

Internet Information Services (IIS) Metabase Writer

System State

Registry

Registry

System Files

Boot Files

COM+ Class Registration Database

COM+ Class Registration Database

SYSVOL

SYSVOL

Active Directory

Active Directory Administrator’s Guide

Protecting Windows Server 2003 Systems

System State Writer

Windows 2000 System State

Cluster Quorum

Cluster Quorum

Certificate Services

Certificate Server

The following table lists the Service State Writers and their equivalents in Windows 2000

Service State Writer

Selection for backup in Windows 2000 Selection for restore in Window 2000

Removable Storage Manager (RSM)

At the volume level, by selecting %SystemRoot%\System32\NTmsdata

At the volume level with the Restore Removable Storage data option selected.

Windows Internet Name Service

Volume level

Volume level

Windows Management Instrumentation

At the volume level, with the At the volume level, by selecting %SystemRoot%\System32\wbem\repo Restore Windows sitory Management Instrumentation repository option selected At the volume level, with the Restore Terminal Services database option selected.

Event Logs

Volume level

Volume level

Remote Storage

Volume level

Volume level

Dynamic Host Configuration Protocol

Volume level

Volume level

Chapter 6, Backing Up Data

Backing Up Data

Terminal Server Licensing At the volume level, by selecting %SystemRoot%\System32\LServer

345

Protecting Windows Server 2003 Systems

The following table lists the User Data Writers and the equivalent in Windows 2000

User Data Writer

Selection for backup in Windows 2000 Selection for restore in Window 2000

SQL Server

Backups require the Backup Exec Agent Restores require the SQL for Microsoft SQL Server (SQL Agent) Agent.

Exchange Server

Backups require the Backup Exec Agent Restores require the for Microsoft Exchange Server Exchange Agent (Exchange Agent)

SQL Server Writer Support The Backup Exec Shadow Copy Components file system supports the Microsoft SQL Server Writer, which protects SQL Server and MSDE data. You must enter a Backup Exec SQL Agent serial number in order for the Writer to be displayed. Then, both the Backup Exec SQL Agent and the Writer are available to perform data protection operations of SQL Server on Windows Server 2003 resources. See also: “Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer” on page 1089

Exchange Writer Support The Backup Exec Shadow Copy Components file system supports the Microsoft Exchange Writer, which protects Microsoft Exchange 2003. You must enter a Backup Exec Exchange Agent serial number in order for the Writer to be displayed. Then, both the Backup Exec Exchange Agent and the Writer are available to perform data protection operations of Exchange Server on Windows Server 2003 resources. See also: “Protecting Microsoft Exchange Server 2003 Using the Exchange Writer” on page 1171

346

Administrator’s Guide

Protecting Windows Server 2003 Systems

Windows SharePoint Services Support Microsoft’s Windows SharePoint Services is available in Windows Server 2003 as an optional Windows Component. Since the data is stored in a SQL (MSDE) instance called SHAREPOINT (by default), the SQL data is protected by the Writer instance of SHAREPOINT in the Backup Exec Shadow Copy Components file system. Although a Backup Exec SQL Server Agent license is not required to use the SQL Server Writer to protect Windows SharePoint Services on Windows Server 2003, if you have a license, you can use the Backup Exec SQL Server Agent instead of the Writer to protect the data. If you installed Windows SharePoint Services using an instance name other than SHAREPOINT, the Microsoft SQL Server Writer instance does not display as a backup selection unless you enter a serial number for the Backup Exec Agent for SQL Server. See also: “Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer” on page 1089

Active Directory Application Mode Writer Support The Backup Exec Shadow Copy Components file system supports the Microsoft Active Directory Application Mode Writer (AD/AM Writer). AD/AM provides Active Directory service without the need for a domain controller. AD/AM is available in Windows Server 2003 as a non-operating system service. You can run multiple instances of AD/AM concurrently on a single server and configure each instance independently. See also: “Restoring Windows Server 2003 Systems” on page 438 “Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media” on page 455

After upgrading Backup Exec on media servers and remote computers running production versions of Windows Server 2003, you must edit selection lists and replace the System State selection with the Shadow Copy Components selection. The enhancements made to the Backup Exec Shadow Copy Components file system to support the Volume Shadow Copy Service will cause backup jobs that target Windows Server 2003 resources and include System State to fail. These jobs will also fail if you do not upgrade the media server, but only upgrade Backup Exec on remote computers running production versions of Windows Server 2003.

Chapter 6, Backing Up Data

347

Backing Up Data

Protecting Upgraded Windows Server 2003 Resources

Protecting Windows Server 2003 Systems

If you upgrade Backup Exec on the media server only, and not on remote Windows resources, then existing remote Windows Server 2003 backup jobs that include System State are not affected and will not fail. Note To fully protect any local or remote computers running production versions of Windows Server 2003, you should upgrade to the latest version of Backup Exec on all media servers and update the Remote Agent for Windows Servers on any remote computers running Windows Server 2003. Remote Agents from Backup Exec 9.0 Revision 4367 are not supported on production versions of Windows Server 2003. To prevent backup jobs that target Windows Server 2003 resources and include System State from failing, you must replace the System State selection with the Shadow Copy Components selection. If both the media server and the remote computers running Windows Server 2003 are upgraded to the latest Backup Exec, then the Backup Exec user interface will detect and notify you when obsolete selections such as System State are found. When you select a server or expand it using the graphical view, selections are checked for items that are no longer on the server, such as System State. If invalid items are found, you are prompted to remove them from the selection list (see “To replace the System State selection:” on page 348). If only the remote computers running Windows Server 2003 are upgraded to the latest Backup Exec, but the media server is not, you must manually edit the selection lists (see “To edit selection lists when only the remote computers are upgraded:” on page 349). ▼

To replace the System State selection: 1. On the navigation bar, click Job Setup. 2. On the Backup Selection Lists pane, select the selection list you want to edit. 3. Under General Tasks in the task pane, click Properties. 4. If the selection list is being used by jobs, you will be prompted to click Yes to continue. If System State is in the selection list, the following message is displayed: System State is selected but cannot be found on server LocalTest. If this server has been upgraded to Windows Server 2003 or later, remove this selection, and then select Shadow Copy Components to fully protect your server. Do you want to remove the System State selection?

348

Administrator’s Guide

Protecting Windows Server 2003 Systems

5. Click Yes to remove the System State selection. After removing invalid items from the selection list, backup jobs for that computer do not fail, but the System State-equivalent resource is not backed up. You must include the Shadow Copy Components resource in the backup selection list in order to back up the equivalent resources. Note To protect Windows Server 2003 resources, you must select all Shadow Copy Components resources, the system drive, and the boot drive for backup. Only full backups can be run on the Shadow Copy Components. 6. Add the Shadow Copy Components resource to the selection list. Editing a selection list affects all jobs using that selection list. If you want to only edit selections for a specific job, edit the job rather than the selection list. 7. Make any necessary changes to the job. ▼

To edit selection lists when only the remote computers are upgraded: 1. On the Edit menu, click Edit Selection List. 2. On the Edit Selection List dialog box, click the Edit button. 3. Under View Format, click Text. 4. Highlight the System State selection, and then click Delete. 5. Click OK. See also: “Editing Selection Lists” on page 280

Backing Up Data

Chapter 6, Backing Up Data

349

Backing Up Utility Partitions

Backing Up Utility Partitions Backup Exec allows backing up and restoring of utility partitions. Utility partitions are usually small partitions installed on the disk by OEM vendors like Dell, Compaq, Hewlett-Packard, and IBM. These utility partitions contain system diagnostic and configuration utilities. If utility partitions are on a system, the Utility Partition node appears as a resource in backup selections. Backing up Utility Partitions

You must have Administrator rights to browse and backup utility partitions. If there are no utility partitions on the system, this resource is unavailable for backup. You can only perform a full backup of utility partitions. You can select individual utility partition resources, which appear as Utility Partition On Disk disk_number (such as Utility Partition On Disk 0) when the Utility Partition node is expanded. VERITAS recommends backing up utility partitions when a full system backup is performed, such as during disaster recovery preparation. See also: “Restoring Utility Partitions” on page 439 “Disaster Preparation and Recovery” on page 549

350

Administrator’s Guide

Backing Up NetWare Network Volumes

Backing Up NetWare Network Volumes In order to see NetWare volumes in your backup selections pane, you must have the Client (or Gateway) Services for NetWare service or NetWare Client 32 enabled on the media server. In addition, you may need to use a fully distinguished logon for some NetWare servers you are working with. If you want to back up NetWare Network Volumes, expand Novell Storage Management Services to select files. When you use the Novell Storage Management Services node, the backed up data includes standard file data and additional special data such as Access Control Lists, disk quotas, Macintosh-specific data, partition information, and security data. This additional information is needed to fully restore NetWare. Novell Storage Management Services

While looking at the backup selections pane, you may notice a selection called NetWare or Compatible Networks. Although you can select NetWare files to back up from this node, VERITAS does not recommend that you use it. When you select files from the NetWare or Compatible Networks node, only the standard files are backed up. Special files, such as security, bindery, and ACL, are not included in the backups.

Chapter 6, Backing Up Data

351

Backing Up Data

Note If you use Backup Exec on an IntraNetWare client, there is no NDS node when browsing for a server using Network Neighborhood.

About Backup Strategies

In addition, VERITAS recommends that you use the Backup Exec Remote Agent for NetWare Servers. Because the Remote Agent for NetWare Servers is also a Client Access License (CAL), it enables you to fully protect your NetWare data and to perform accelerated backups of NetWare data. You cannot select all data and special files on resources for a remote NetWare server for backup until a Remote Agent has been installed. See also: “About Backing Up NetWare Servers” on page 1358 “Default Settings for the Remote Agent for NetWare Servers” on page 1365

About Backup Strategies A backup strategy is the collection of procedures you implement for backing up your network, including what methods of backups are performed, when backups are performed, and how media is rotated back into use for your regular backups. A good backup strategy allows minimal time to get a system up and running in the event of a disaster. Backup Exec offers flexible solutions for protecting the data on your network. Use the media rotation feature and let Backup Exec do all the administrative work for you, or design and manage your own media rotation strategy, the procedures for reusing media, that meets your exact specifications. You can create backup job templates that define your backup strategy, and then reuse the templates to implement your strategy for all resources being protected by your media server. See also: “Media Rotation Strategies” on page 220 “Using Backup Job Templates” on page 283

352

Administrator’s Guide

About Backup Strategies

Choosing a Backup Strategy In order to develop a secure and effective plan for managing your data, you should consider the following: ◆

The importance of the data you are backing up.



How often your system needs to be backed up.



How much storage media you will use.



When you will use certain storage media.



How you will keep track of your backup information.

Before choosing a strategy to use with the Backup Exec system, you should answer the following questions: How often should I back up? While there is no requirement on how often to back up your data, there is one consideration that can help you decide: The cost of re-creating data that was added or modified since the last backup. Calculate the manpower, lost time and/or sales, and other costs that would be incurred if the file server or workstation crashed right before the next backup was scheduled to take place (always assume the worst scenario). If the cost is excessive, the strategy should be adjusted accordingly. For example, the cost to re-create an extensive database system that is continually updated by several database operators would be quite substantial. On the other hand, the cost to re-create the data for a user creating one or two inter-office memos would be considerably less. In this scenario, the network administrator would probably opt to back up the database several times daily, and set up daily jobs for the user’s workstation.

How much data must be backed up? The amount of data to be backed up is a key determinant of the media rotation strategy you choose. If you are backing up large amounts of data that needs to be retained on media for long periods of time, you will need to select a strategy that is suitable for these requirements.

Chapter 6, Backing Up Data

353

Backing Up Data

In an ideal environment, one full backup should be performed on workstations every day and servers should be fully backed up more often. Important data files and directories that constantly change may need to be backed up several times a day. Because of time and media constraints, this is not feasible for many environments, so a schedule including incremental or differential backups must be implemented. For safety reasons, a full backup should always be performed before adding new applications or changing the server configuration.

About Backup Strategies

How long does the data need to be stored? The amount of time the data needs to be stored is directly related to the media rotation scheme you use. For example, if you use one media and back up every day, your backups will never be more than a day old. Since storage media is relatively inexpensive when compared to the value of your data, it is a good idea to periodically back up your system on media not used in the media rotation scheme and store it permanently. Some administrators may choose to do this every week, while others may choose to store only one permanent backup per month. The threat of viruses is an issue also. Some viruses take effect immediately, while others may take days or weeks to cause noticeable damage. Because of this, you should have at least the following backups available to restore at any time: ◆

3 daily backups (for example, Monday, Tuesday, Wednesday).



A one-week-old full backup.



A one-month-old full backup.

Having these backups available should allow you to restore your system prior to when it became infected. Which devices am I backing up? Since Backup Exec can back up servers, workstations, and agents, you should consider which devices you want to protect. You will need to coordinate times that are suitable to back up different devices. For example, you may want to back up file servers during the evening and back up workstations at lunchtime. Should I include more than one system in each job? When you are setting up jobs for the network, you must decide if you want to create one job that includes many devices or a job for each device. Here are some of the advantages and disadvantages of each method. ◆

One job per device: -

-

Advantages: -

If a job fails, you know immediately which device was not backed up.

-

If a device is turned off or moved, backups of other devices are not affected.

-

When devices are added to the network you can simply set up new jobs for each device.

Disadvantages: -

354

You have more jobs to keep track of (for example, reviewing job histories, and so forth).

Administrator’s Guide

About Backup Strategies ◆

Multiple devices per job: -

-

Advantages: -

There are fewer jobs to keep track of and create.

-

You know the order in which the data is backed up.

-

You could make it an overwrite job and thus be able to use the same name for the media and the job.

Disadvantages: -

If any of the devices in the job are not available during the backup, the job results in an abnormal completion status.

Understanding Backup Methods and Their Advantages Before you can develop your media rotation strategy, you will need to decide whether you want to perform only full backups or use a strategy that includes Full backups and one of the modified backup methods (differential, incremental or working set backups). The backup methods used by Backup Exec are: ◆

Full



Differential



Incremental



Copy



Daily



Working set



Archive

There are advantages and disadvantages to each backup method.

Backing Up Data

Chapter 6, Backing Up Data

355

About Backup Strategies

Full Backups Full backups include all of the data on a volume and use the full backup method (so Backup Exec detects the device as having been backed up). Backup Exec allows you to select to use either archive bit or modified time to determine if a file has been backed up. The advantages and disadvantages described in this section pertain to either type of full backup. ◆



Advantages -

Files are easy to find - Since full backups include all data contained on a device, you don’t have to search through several media to find a file that you need to restore.

-

There is always a current backup of your entire system on one media or media set - If you should need to restore your entire system, all of the most current information is located on the last full backup.

Disadvantages -

Redundant backups - since most of the files on your file server rarely change, each full backup following the first is merely a copy of what has already been backed up. This requires more media.

-

Full backups take longer to perform - Full backups can be time consuming, especially when you have other devices on the network that need to be backed up (e.g., agent workstations, remote servers).

Note You will need to perform a full backup of your server (including the Windows NT Registry) to establish a baseline for disaster recovery. See also: “Understanding the Archive Bit and Backup Methods” on page 360 “Understanding Modified Time and Backup Methods” on page 361

356

Administrator’s Guide

About Backup Strategies

Differential Backups Differential backups include backing up all files that have changed since the last full backup. The difference between differential and incremental backups is that incremental backups include only the files that have changed since the last full or incremental backup. Backup Exec provides two differential backup methods, one that uses archive bit and one that uses modified time to determine if the file was backed up. If you select to use the FULL - Back Up Files - Reset Archive Bit and want to run differential backups, you must use the DIFFERENTIAL - Changed Files method. If you select to use the FULL - Back Up Files - Allows incrementals and differentials using modified time, you must use the DIFFERENTIAL - Using modified time method. The advantages and disadvantages described in this section pertain to either type of differential backup. ◆



Advantages -

Files are easy to find - Restoring a system backed up with a differential strategy requires a maximum of two backups - the latest full backup and the latest differential backup. This is less time consuming than backup strategies that require the latest full backup and all incremental backups created since the full backup.

-

Less time required for backup and restore - Differential backups take less time to restore than full backups. Faster recovery is possible in disaster situations because you only need the latest full and differential backup media to fully restore a device.

Disadvantage -

Redundant backups - All of the files created or modified since the last incremental backup are included; thus creating redundant backups.

In most schemes, differential backups are recommended over incremental backups. Differential backups allow much easier restoration of an entire device than incremental backups since only two backups are required. Fewer required media also decreases the risk of not being able to restore important data because of media errors.

Incremental backups include only the files that have changed since the last full or incremental backup. Backup Exec provides two incremental backup methods, one that uses archive bit and one that uses modified time to determine if the file was backed up. If you select to use the FULL - Backs Up Files - Reset Archive Bit and want to run incremental backups, you must use the INCREMENTAL - Changed Files method. If you select to use the FULL Backs Up Files - Allows incrementals and differentials using modified time, you must use the INCREMENTAL - Using modified time method. The advantages and disadvantages described in this section pertain to either type of differential backup. Chapter 6, Backing Up Data

357

Backing Up Data

Incremental Backups

About Backup Strategies ◆



Advantages -

Better use of media - Only files that have changed since the last backup are included, so there is much less data storage space required.

-

Less time required for backup - Incremental backups take much less time than full and differential backups to complete.

Disadvantage -

Backups are spread across multiple media - Since multiple media is required in a disaster situation, this can cause recovery of a device to take longer. In addition, the media must be restored in the correct order to effectively bring the system up to date.

Copy Backups Copy backups include all selected data and do not affect any media rotation scheme because the archive bit is not reset. Copy backups are useful when you need to: ◆

Back up data for a special purpose (for example, to send to another site).



Back up specific data.



Perform an additional backup to take off-site.



Back up data that belongs to a media rotation job without affecting the rotation cycle.

Daily Backups Daily Backups may be performed in addition to the media rotation scheme selected. The Daily Backup method backs up all files with today’s date (created or changed today). The Daily Backup method does not affect the files’ backup status because the archive bit is not reset.

Working set Backups The working set backup option allows you to back up data that has been created and modified since the last full or incremental backup, and to specify to include data that has been accessed in the last x days. This option is similar to a differential backup, in which files that have been created or changed since the volume’s last full backup are included; however, the difference lies in that you can also specify to include all files accessed within the last x number of days. This option can speed the recovery of a crashed server because you only need to restore the working set backup to get up and running again, and then restore the latest full backup at a later time (if necessary).

358

Administrator’s Guide

About Backup Strategies

To effectively include the data needed to make your system operational after restoring a working set backup, specifying at least 30 days in the Files accessed in x days field is recommended. With a full/working set backup scheme, the non-full backups will require more media space than full/differential or full/incremental schemes. However, in environments where active data is migrated frequently between machines, or when restore times are especially critical, working set backups can make up the cost of extra media in time savings for restoring data. ◆



Advantages: -

Restoring a system backed up with a working set strategy requires only the media containing the latest working set backup media and the media containing the most recent full backup.

-

You can perform a working set backup, restore the data to a new system, and be up and running faster than if you had to restore a full backup followed by all of the incremental or differential backups.

-

Working set backups take less time to run than full backups.

Disadvantages: -

Along with all files accessed in the specified time, all of the files created or modified since the last full or incremental backup are included on each media, thus creating redundant working set backups.

-

This option is available only on platforms that support the last accessed date (Windows, NetWare, and UNIX). Working set backups will work as differential backups when selected for other platforms.

Archive Backups The archive backup option automatically deletes files from the volume after they have been successfully backed up. This backup method is designed for migrating data from disk to storage media and should not be incorporated in a regular backup schedule.

Note For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up but not deleted. Backup Exec will not delete data from Backup Exec Agent workstations when using the archive feature.

Chapter 6, Backing Up Data

359

Backing Up Data

Using the archive backup method allows you to free valuable disk space and reduce clutter on your server volume by migrating stagnant directories and files from the server to media. An archive backup job backs up the selected data, verifies the media, and then deletes the data from the volume.

About Backup Strategies

Understanding the Archive Bit and Backup Methods Whenever a file is created or changed, the operating system activates the Archive Bit or modified bit. Unless you select to use backup methods that depend on a date and time stamp, Backup Exec uses the archive bit to determine whether a file has been backed up, which is an important element of your backup strategy. Selecting backup methods FULL - Back Up Files - Reset Archive Bit, DIFFERENTIAL Changed Files, and INCREMENTAL - Changed Files - Reset Archive Bit, can affect the archive bit. Whenever a file has been backed up using either the FULL - Back Up Files - Reset Archive Bit or INCREMENTAL - Changed Files - Reset Archive Bit backup method, Backup Exec turns the archive bit off, indicating to the system that the file has been backed up. If the file is changed again prior to the next full or incremental backup, the bit is turned on again, and Backup Exec will back up the file in the next full or incremental backup. Backups using the DIFFERENTIAL - Changed Files backup method include only files that were created or modified since the last full backup. When this type of differential backup is performed, the archive bit is left intact. Consider the following backup strategy scenario: Fred wants to implement a backup strategy for the office fileserver. Fred knows that all backup strategies begin with a full backup (backup of an entire device using the full backup method), so he creates a Selection List (see “Creating Selection Lists” on page 274) for his server and submits the job to run at the end of the day on Friday. Since most files on the server, such as operating system files and application files, seldom change, Fred decides that he can save time and media by incorporating incremental or differential backups in his media rotation scheme. Fred opts to use incremental backups, so he schedules the script to run at the end of the day, Monday through Thursday, with the incremental backup method. Here’s what happens: Fred’s Friday tape contains all of the data on the fileserver and Backup Exec changes all of the files’ statuses to backed up. At the end of the day on Monday, the incremental job runs and only the files that were created or changed (had the archive bit re-set by the operating system) are backed up. When the incremental job completes, Backup Exec will turn the archive bit off, showing that the files have been backed up. On Tuesday through Thursday, the same events happen. If Fred’s fileserver crashed on Thursday morning, after he got it running, he would restore each backup in the order in which it was created (for example, Friday, Monday, Tuesday, and so forth). If Fred had decided to perform differential backups on Monday through Thursday, he would have only needed Friday’s and Wednesday’s tapes: Friday’s tape because it included all of the data, and Wednesday’s tape because it included every file that had been created or changed since Friday’s backup.

360

Administrator’s Guide

About Backup Strategies

Understanding Modified Time and Backup Methods If you select to use FULL - Back Up Files - Allow incrementals and differentials using modified time, DIFFERENTIAL - Using modified time, or INCREMENTAL - Using modified time, Backup Exec uses a file’s modified time rather than the archive bit to determine if it needs to be backed up. When Backup Exec runs a full or incremental backup, the time the backup launches is recorded in the Backup Exec database. The next time an incremental or differential backup launches, Backup Exec compares the file system time to the backup time recorded in the Backup Exec database. If the file system time is later than the database time, the file is backed up. When an incremental backup is run, a new time is recorded in the Backup Exec database. The database time is not updated with differential backups. Using the modified time allows Backup Exec to run differential backups on file system, such as Unix, which do not have an archive bit. If you use want Backup Exec to use modified time to determine if a file has been backed up, the full and incremental (or full and differential) backups must use the same backup selection list. See also: “Using Selection Lists” on page 274

Using the Windows’ NTFS Change Journal to Determine Changed Files For Windows 2000 or later systems, you can enhance incremental and differential backup performance by selecting to have Backup Exec use the information recorded in the NTFS Change Journal. NTFS logs all file system changes in the Change Journal. If you select to use the Change Journal and select DIFFERENTIAL - Using modified time or INCREMENTAL - Using modified time as the backup method, Backup Exec will scan the journal to get a list of changed files rather than scan all files, reducing the amount of time required to perform the incremental or differential backup.

Backing Up Data

Chapter 6, Backing Up Data

361

About Backup Strategies

362

Administrator’s Guide

7

Administrating Backup Exec

Backup Exec includes features that enable you to manage Backup Exec and jobs created in Backup Exec. You can perform the following operations: ◆

Configure logon accounts



Schedule jobs



Monitor Jobs



Configure error-handling rules



Configure Database Maintenance



Connect to ExecView

Configuring Logon Accounts A Backup Exec logon account stores the credentials of a Windows user account. Backup Exec logon accounts enable Backup Exec to manage user names and passwords and can be used to browse resources or process jobs. Using Backup Exec logon accounts enables you to easily apply Windows credential changes to the jobs that use them. Backup Exec logon accounts are used to browse local and remote resources. Backup Exec logon accounts can also be associated with selection list entries at the device level such as shares, databases, etc. If you need to edit the credentials, you can edit the Backup Exec logon account and the changes will be applied to the selected resources that use the Backup Exec logon account. Backup Exec logon accounts are not Windows user accounts. When you create a Backup Exec logon account, an entry for the account is entered into the Backup Exec database; no operating system accounts are created. If your Windows user account credentials change, you must update the Backup Exec logon account with the new information. Backup Exec does not maintain a connection with the Windows user account.

Administrating Backup Exec

363

Configuring Logon Accounts

You can view, create, delete, edit, and replace Backup Exec logon accounts using the Logon Account Management dialog box. The dialog box displays property information for each Backup Exec logon account you create. It also displays your default Backup Exec logon account and the Windows user name that is currently logged on to the media server. To view this information, select the Network menu, and then click Logon Accounts. See also: “Creating a Backup Exec Logon Account” on page 366

Default Backup Exec Logon Account The default Backup Exec logon account enables you to browse, make selections, or restore data. The first time you start Backup Exec, you must specify a default Backup Exec logon account using the Logon Account Wizard. You can select an existing Backup Exec logon account or create a new one. You can create multiple Backup Exec logon accounts; however, each Backup Exec user can only have one default Backup Exec logon account. Your default Backup Exec logon account enables you to perform the following: ◆

Browse resources. Your default Backup Exec logon account enables you to browse local and remote resources when you create backup jobs. To browse resources, each user must have a default Backup Exec logon account that is associated with their Windows user account. The Backup Exec logon account does not have to be the same user name as the Windows user that is used to log on to Backup Exec. For example, you are logged on to a media server named MEDIASERVER as the local Windows administrator. When you start Backup Exec, you are prompted to create a default Backup Exec logon account for the local administrator because one does not exist. You can create a Backup Exec logon account for the local administrator that has the credentials for a domain administrator. The Backup Exec logon account will have the following properties: User name: DOMAIN\Administrator Description: MEDIASERVER\Administrator Default Account Owner: MEDIASERVER\Administrator When you change your default Backup Exec logon account, you can use your new default Backup Exec logon account to browse resources immediately; you do not have to restart your system before the changes take effect.

364

Administrator’s Guide

Configuring Logon Accounts ◆

Make backup selections. You can select a different Backup Exec logon account when you make selections for backup. If your default does not have rights, the Logon Account Selection dialog box appears and enables you to create or select a different Backup Exec logon account. You can also change the Backup Exec logon account when making backup selections using the Connect As command in the context menu.

Note For more information on using Backup Exec logon accounts with Exchange mailbox and SQL backups, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002 and “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095. ◆

Restore. You can assign Backup Exec logon accounts to resources when you create restore jobs. The default Backup Exec logon account is used unless you choose a different Backup Exec logon account when you create the restore job.

See also: “Changing Your Default Backup Exec Logon Account” on page 371

Backup Exec System Logon Account The Backup Exec System Logon Account (SLA) is created when you install Backup Exec. When the SLA is created, the username and password match the credentials provided during install for the Backup Exec Services credentials. The owner of the SLA is the Windows user that installed Backup Exec and is a common account by default. Common accounts are shared accounts that can be accessed by all users. The Backup Exec System Logon Account may have access to most or all of your resources since it contains the Backup Exec Services credentials. If you want to make Backup Exec more secure, you can change the SLA to be a restricted account or you can delete it. However, if you delete the SLA, the jobs in which it is used may fail. If the SLA is deleted, you can re-create it using the Logon Account Management dialog box. The SLA is used for the following tasks and jobs: ◆

Jobs migrated from a previous version of Backup Exec



Windows Explorer interface jobs



One-button backup jobs (if a default Backup Exec logon account does not exist for the user running the job)

365

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Configuring Logon Accounts ◆

Duplicate backup data jobs



Command Line Applet



Backup Exec R/3 Agent

See also: “Creating a New Backup Exec System Logon Account” on page 371

Creating a Backup Exec Logon Account You can create Backup Exec logon accounts using the Logon Account Wizard, which guides you through the creation of a Backup Exec logon account, or by using the Logon Account Management dialog. You can enter Backup Exec logon account property information when you create the Backup Exec logon account; however, Backup Exec assigns the Backup Exec logon account owner to the Windows user name you used to log on to Backup Exec. The owner of the Backup Exec logon account can not be modified. ▼

To launch the Logon Account Wizard: ❖

On the Tools menu, point to Wizards, and then click Logon Account Wizard. The wizard will guide you through the process of creating a Backup Exec logon account.

366

Administrator’s Guide

Configuring Logon Accounts ▼

To create a new Backup Exec logon account using the Logon Account Management dialog: 1. On the Network menu, click Logon Accounts. Logon Account Management dialog box

2. Click New. 3. Enter the appropriate options as follows: Add Logon Credentials dialog box Description

User name

Enter the fully qualified user name for the Backup Exec logon account. For example, DOMAIN\Administrator. The user name is provided when you attempt to connect to a resource. The user name you enter is not case-sensitive for the resources that are accessed.

Password

Enter the password for the account. The password you enter is encrypted for security. You can leave this field blank if this Backup Exec logon account does not need a password.

Confirm password

Re-enter the password for confirmation. The password must match the password you typed in the Password field.

Chapter 7, Administrating Backup Exec

367

Administrating Backup Exec

Item

Configuring Logon Accounts Add Logon Credentials dialog box (continued) Item

Description

Description

Enter the unique name for the Backup Exec logon account. The user name is automatically added if you do not enter information into the field.

Notes

Enter any comments to describe how the Backup Exec logon account will be used.

This is a restricted logon account

Select this check box to enable the Backup Exec logon account to be used only by the owner of the logon account and those who know the password. If this is not selected, the Backup Exec logon account will be a common account. Common accounts are shared accounts that can be accessed by all users.

This is my default logon account

Select this check box to make this your default Backup Exec logon account used to browse, make selections, or restore data on your local and remote resources.

4. Click OK to create the Backup Exec logon account. See also: “Deleting a Backup Exec Logon Account” on page 370 “Replacing a Backup Exec Logon Account” on page 369

Editing a Backup Exec Logon Account When you edit a Backup Exec logon account, the changes will automatically be applied to all the resources that use the Backup Exec logon account. Changes made to a Backup Exec logon account are applied immediately, you do not have to restart your system for the changes to take effect. You can edit the following properties for a Backup Exec logon account:

368



Type (restricted or common)



Description



Password



User name



Notes

Administrator’s Guide

Configuring Logon Accounts ▼

To edit a Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to change, and then click Edit. If you are not logged on to Backup Exec with the same user name as the Backup Exec logon account owner, you must provide the password before you can edit the account. 3. Modify the Backup Exec logon account properties as needed. 4. To change the password for the Backup Exec logon account: a. Click Change password. If you are using the Backup Exec Web Administration Console, select Check here to change the password for this account. b. In Password, type a new password. c. In Confirm, re-type the password. d. Click OK. 5. Click OK.

Replacing a Backup Exec Logon Account You can replace a Backup Exec logon account within all existing jobs and selections lists. The resources and selections lists in existing jobs that use the Backup Exec logon account will be updated to use the new Backup Exec logon account. If the new Backup Exec logon account is restricted, you must provide the password. ▼

To replace a Backup Exec logon account with another Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to replace, and then click Replace. The Replace Logon Account dialog box appears.

369

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Configuring Logon Accounts

3. Select the Backup Exec logon account with which you want to replace the selected Backup Exec logon account. If the Backup Exec logon account is restricted and you are not logged on to Backup Exec with the same user name of the Backup Exec logon account owner, you must provide the password before you can edit the account. 4. Click OK.

Deleting a Backup Exec Logon Account You cannot delete a Backup Exec logon account when it is: ◆

Being referenced by a job.



Owned by a user who is logged on to the media server.



Set as the default Backup Exec logon account of a user who is logged on to the media server.

You can delete a Backup Exec logon account when the owner is logged off and all users who have it set as their default logon account are logged off. ▼

To delete a Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to delete, and then click Delete. 3. Click Yes to confirm the deletion. The Backup Exec logon account is removed from the Backup Exec logon account list.

370

Administrator’s Guide

Configuring Logon Accounts

Changing Your Default Backup Exec Logon Account You can change your default Backup Exec logon account that enables you to browse, make selections, or restore data. To change your default Backup Exec logon account, you must edit the properties for the Backup Exec logon account that you want to use as the new default Backup Exec logon account. ▼

To change your default Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to use as your default Backup Exec logon account, and then click Edit. 3. Select This is my default logon account check box. 4. Click OK.

Creating a New Backup Exec System Logon Account The Backup Exec System Logon Account enables you to perform several operations, such as one-button backup, copy jobs, and Windows Explorer interface jobs. It is also used with Backup Exec R/3 Agent and Command Line Applet. If you delete the Backup Exec System Logon Account, you should create a new one that enables you to perform the specified operations and use the agent and applet. ▼

To create a new Backup Exec System Logon Account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Click System Account. The Edit Logon Credentials dialog box appears.

371

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Configuring Logon Accounts

3. Enter the appropriate options as follows: Edit Logon Credentials dialog box Item

Description

User name

Enter the fully qualified user name for the Backup Exec logon account. For example, DOMAIN\Administrator. The user name is provided when you attempt to connect to a resource. The user name you enter is not case-sensitive for the resources that are accessed.

Change password

Enables you to enter and confirm a new password for the account. The password you enter is encrypted for security. You can leave this field blank if this Backup Exec logon account does not need a password.

Notes

Enter any comments to describe how the Backup Exec logon account will be used.

This is a restricted logon account

Select this check box to enable the Backup Exec logon account to be used only by the owner of the Backup Exec logon account and those who know the password. If this is not selected, the Backup Exec logon account will be a common account. Common accounts are shared accounts that can be accessed by all users.

This is my default logon account

Select this check box to make this your default account used to browse, make selections, or restore data on your local and remote resources.

4. Click OK to create the system logon account.

Viewing and Clearing the Audit Log You can view the audit log to determine when changes were made to Backup Exec logon accounts. The audit log displays the date and time the change was made, the user that made the change, and Backup Exec logon account that was changed. The audit log entries can be viewed, but not edited; however, you can clear all the entries in the log. ▼

To view or clear the audit log: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears.

372

Administrator’s Guide

Configuring Logon Accounts

2. Click Audit Log.

The Logon Account Audit Log dialog box provides the following information: Alerts Audit Log Item

Description

Date/Time

The date and time the change was made to the Backup Exec logon account.

User Name

The user ID that made the change to the Backup Exec logon account.

Message

The name of the Backup Exec logon account to which the change was made.

3. Click Refresh to update the audit log with new entries. 4. Click Clear to remove all entries from the audit log. 5. Click Close.

373

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Scheduling Jobs

Scheduling Jobs The schedule option enables you to configure the time and the frequency you want to run jobs. You can configure a schedule for all types of jobs such as backup, restore, inventory, new catalog, etc. During the job setup, you can choose to run jobs immediately, run once on a specific day and time, or run according to a schedule. ▼

To configure a schedule for a job: 1. Determine the type of job you want to schedule. The job dialog box appears that enables you to select properties for the job. 2. On the Properties pane, under Frequency, click Schedule. Schedule Time and Frequency dialog box

374

Administrator’s Guide

Scheduling Jobs

3. Select one of the following schedule options: -

Click Run now to run the job immediately.

-

Click Run on Date at Time to schedule the job to run one time on the selected date at the selected time, and then type the date and time.

-

Click Run according to schedule to configure a schedule for a recurring job, and then click Edit Schedule Details to configure the schedule. For more information, see “Editing the Job Schedule” on page 376.

4. Click View Schedule Summary to verify your schedule. The Summary dialog box displays the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a six month period with the selected scheduled run dates in bold. 5. Click Submit job on hold if you want to submit the job with an on-hold status. You should select this option if you want to submit the job, but do not want the job to run until you change the job’s hold status. 6. Click Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. This option enables you to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job is queued, not when the job begins. 7. You can start the job after configuring the schedule or select other options from the Properties pane. Note If you are using Backup Exec for Web Administration Console (BEWAC), click Next when you are ready to submit the job to the job queue. Click Finish to run the job after you view the job summary. If you are not satisfied with the settings you selected, click Back. However, you must reset all of the settings. BEWAC does not save the settings when you click Back. See also: “Backing Up Data” on page 239 “Monitoring Jobs” on page 381 “Configuring Default Schedule Options” on page 379

Chapter 7, Administrating Backup Exec

375

Administrating Backup Exec

“Configuring Holiday Scheduling for Jobs” on page 380

Scheduling Jobs

Editing the Job Schedule You can select the time and frequency you want to run a recurring job. When you select the Run according to schedule option, and then click Edit Schedule Details, you must configure the schedule for the recurring job. Schedule options

There are two types of options for configuring a schedule: General Options and Run Day Options. General options enable you to determine the date the schedule goes into effect, the time the job can begin, and the time it can restart during the run day, and the date when the schedule goes into effect. The selected options apply each day the job is scheduled to run. Run day options enable you to select the days on which a job can run. Run days consist of specific dates, a recurring pattern of days, or both. You can also exclude specific dates from a schedule.

376

Administrator’s Guide

Scheduling Jobs ▼

To edit schedule details for a job: 1. Under General Options or Run Day Options in the tree pane, select the appropriate options as follows: Schedule Options Item

Description

General Options Effective Date

Select this option to specify a date when the schedule begins. On the right pane, select the Make the schedule go into effect check box, and then enter the date.

Time Window

Select this option to specify the time window on any scheduled run day during which the job can begin. On the right pane, select both the earliest and the latest time the job can start. A job can run any time between 11:00:00PM and 10:59:59 PM. The time window does not extend beyond 24 hours, or more specifically, beyond 23 hours, 59 minutes, and 59 seconds. For example, you cannot set a time window starting at 3:00 AM and ending at 5:00 AM the following day.

Restart Time Interval

Select this option to specify a time period during which the job can be restarted on the run day. On the right pane, select the Restart task every check box, and then enter the repeat interval in hours, minutes, and second.

Run Day Options Week Days

Select this option to schedule the job for specific days of the week, weeks of each month, or days on specific weeks of the month. On the right pane, select a check box to specify the day that the job is scheduled to run. You can click Select All to select all the days, and then click specific days to clear them. To select an entire column or row, click the heading.

Day Interval

On the right pane, select the Every x days check box, and enter the number of days for the interval. To change the calculated date, in the calculated from option, enter a new date.

Chapter 7, Administrating Backup Exec

377

Administrating Backup Exec

Select this option to schedule a task to run every selected number of days starting from a particular date. By default, the date from which the interval is calculated is the current date.

Scheduling Jobs Schedule Options (continued) Item

Description

Days of the Month

Select this option to schedule a task to run on specific days of each month. On the right pane, select the day or days you want the task to run. You can also select Last to schedule a task to run on the last day of the month, regardless of the actual date the month ends.

Specific Dates

Select this option to schedule specific dates for a task. On the right pane, select the dates you want from the calendar, and then click << to move that date to the Include list. To delete a date from the Include list, select the date and click Delete.

Exclude Dates

Select this option to exclude specific dates, such as holidays, from a run schedule. On the right pane, select the dates you want to exclude from the calendar, and then click << to move that date to the Exclude list. To delete a date from the Exclude list, select the date and click Delete.

Summary

Enables you to verify your schedule. The dialog box includes the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a six month period with the selected scheduled run dates in bold.

2. Click OK to return to the Schedule dialog box. 3. You can start the job after editing the schedule or select other options from the Properties pane. See also: “Configuring Holiday Scheduling for Jobs” on page 380

378

Administrator’s Guide

Scheduling Jobs

Configuring Default Schedule Options You can configure default scheduling parameters for all new jobs you create. If you want to keep a static schedule for all new jobs that you run according to a schedule, you can set a default schedule for all jobs and then use the Run according to schedule option during job setup to make changes, if necessary. ▼

To configure default schedule options for all new jobs that run according to a schedule: 1. On the Tools menu, click Options. The Options - Set Application Defaults dialog box appears. 2. On the Properties pane, under Job Defaults, click Schedule. 3. Click Edit Schedule Details and then select the appropriate options. For more information, see “Schedule Options” on page 377. 4. Click OK to return to the Schedule dialog box. 5. Click View Schedule Summary to verify your schedule. The Summary dialog box displays the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a six month period with the selected scheduled run dates in bold. 6. Click Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. This option enables you to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job actually begins, not when the job is scheduled to begin. 7. Click OK to save the options or select other options from the Properties pane. See also: “Backup Exec Defaults” on page 90

379

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Scheduling Jobs

Configuring Holiday Scheduling for Jobs You can edit the job properties to prevent a job from running on holidays. ▼

To configure holiday scheduling for an existing job: 1. On the navigation bar, click Job Setup. 2. On the Jobs pane, select the job for which you want to configure holiday scheduling. 3. Under General Tasks in the task pane, click Properties. The Properties dialog box for the job appears. 4. On the Properties pane, under Frequency, click Schedule. 5. Click Edit Schedule Details to edit the schedule. 6. Under Run Day Options in the tree pane, click Exclude Dates. 7. On the calendar, click the date of the holiday you want to exclude, and then click << to move the date to the Exclude list. 8. Click OK to return to the Schedule dialog box. The job will resume on the next scheduled day. 9. You can start the job after configuring the schedule or select other options from the Properties pane.

380

Administrator’s Guide

Monitoring Jobs

Monitoring Jobs Backup Exec’s Job Monitor enables you to monitor and perform tasks on active, scheduled, or completed jobs that have been submitted for processing. The Job Monitor has two views for jobs: Jobs list and Job Calendar. You can select filters to limit the type of jobs you want to appear in each view. The Jobs list view displays active and scheduled jobs in the Current Jobs pane and successful, completed, failed, and canceled jobs in the Job History pane. The Job Calendar view displays scheduled, active, and completed jobs in either a day, week, or monthly view.

Viewing and Filtering Jobs in the Job List View The Jobs list view displays active, scheduled and job history jobs in the Current Jobs and Job History panes. You can select filters to limit the jobs that appear in each pane. ▼

To view jobs in the Jobs list view: ❖

On the navigation bar, click Job Monitor and then under Views in the task pane, click Jobs list.

381

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Monitoring Jobs Jobs list view

The information that appears for each job includes the following:

382

-

State

-

Job Name

-

Device Name

-

Job Type

-

Job Status

-

Priority

-

Percent Complete

-

Start Time

-

Elapsed Time

-

Byte Count

Administrator’s Guide

Monitoring Jobs ▼

To set View Filters for Current Jobs and Job History: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list. 3. Under Current Job View Filters or Job History View Filters, select or clear the appropriate filters as follows: Jobs List View Filters Item

Description

Current Job View Filters Show active jobs

Lists jobs currently processing or in the job queue.

Show scheduled jobs

Lists the next occurrence for a job.

Job History View Filters Show successful jobs

Lists all jobs that completed without errors.

Show completed jobs with exceptions

Lists jobs that completed, but may contain one or more minor errors.

Show failed jobs

Lists jobs that were processed, but one or more significant errors occurred.

Show canceled jobs

Lists jobs that were terminated as the operation was running.

Show last 24 hours

Lists all the jobs that were processed in the last 24 hours.

Show last 7 days

Lists all the jobs that were processed in the last 7 days.

Show all

Lists all jobs that were processed.

See also: “Viewing and Changing Active Job Status” on page 386 “Viewing and Modifying Scheduled Jobs” on page 390

Chapter 7, Administrating Backup Exec

383

Administrating Backup Exec

“Viewing Completed Jobs” on page 394

Monitoring Jobs

Viewing and Filtering Jobs in the Calendar View The Job Calendar displays active, scheduled and completed jobs in a day, week, or month view, sorted by the start time. You can also select filters to limit the jobs that appear in each view. ▼

To view jobs in the Calendar view: 1. On the navigation bar, click Job Monitor and then under Views in the task pane, click Calendar. Note Icons at the top of the Job Calendar enable you to select calendar views, navigation, and display filters without using the task pane. Calendar view

384

Administrator’s Guide

Monitoring Jobs

2. Under Calendar Views, select the appropriate view for the jobs as follows: Calendar Views Item

Description

Day

Lists all the jobs and information about each job for the selected day. You can view jobs for a different day by selecting a day from the calendars that appear. Click the arrows at the top of the calendars to view the previous or subsequent months.

Week

Lists all the jobs for the selected week. For recurring jobs, only the next 24 occurrences for the job are listed for a day. You can view previous or subsequent weeks using the scroll bar.

Month

Lists all the jobs for the selected month. You can view previous or subsequent weeks using the scroll bar.

3. If the current day is not selected for a calendar view, under Navigation, click Go To Today. The current day appears in the view. ▼

To set View Filters and Display Filters for the Job Calendar: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Calendar. 3. Under View Filters or Display Filters, select or clear the appropriate filters as follows: Job Calendar View Filters Item

Description

View Filters Lists jobs currently processing or in the job queue.

Show scheduled jobs

Lists the next occurrence for a job.

Show scheduled job recurrences

Lists all occurrences of a recurring job. If the Show scheduled jobs filter is clear, this filter cannot be selected.

Show successful jobs

Lists all jobs that completed without errors.

Chapter 7, Administrating Backup Exec

385

Administrating Backup Exec

Show active jobs

Monitoring Jobs Job Calendar View Filters (continued) Item

Description

Show completed jobs with exceptions

Lists jobs that completed, but may contain one or more minor errors.

Show failed jobs

Lists jobs that were processed, but one or more significant errors occurred.

Show canceled jobs

Lists jobs that were terminated as the operation was running.

Display Filters Show job state icon

Displays the job status icon for the jobs.

Show job time

Displays the time jobs are scheduled to run.

See also: “Viewing and Changing Active Job Status” on page 386 “Viewing and Modifying Scheduled Jobs” on page 390 “Viewing Completed Jobs” on page 394

Viewing and Changing Active Job Status You can view properties and change the status of active jobs that are submitted for processing in the Jobs list or Calendar view in the Job Monitor. If you select the Calendar view and the job is not displayed, click the arrow that appears above the listed jobs to display all the jobs for the selected day. ▼

To view active job properties: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar.

386

Administrator’s Guide

Monitoring Jobs

3. Select the active job you want to view from the Current Jobs pane or the Job Calendar, and then under General Tasks in the task pane, click Properties. The Job Activity dialog box appears. The Job Activity dialog contains two tabs: Job Activity and Job History. The Job Activity tab only appears for active jobs and provides detailed information about the job’s current status. The Job History tab provides a summary of the job as it is being processed. For more information on the job history, see “Viewing Completed Jobs” on page 394. The Job Activity tab provides the following information: Job Activity dialog box Item

Description

Job Name

The job name entered during job configuration.

Job log

The filename of the job log. The job log cannot be viewed until the job has completed and is located in Program Files\VERITAS\Backup Exec\NT\Data.

Status

The status of the operation. Possible statuses for an active job include: Running. The operation is underway. Queued. The job has been initiated, but Backup Exec is actively looking for a suitable drive or media, waiting for the Open File Option to initialize, or waiting for a pre- or post-job command to complete. Cancel Pending. The job has been canceled, but Backup Exec cannot process the request immediately. This status is displayed until the job is actually canceled. The job is then displayed in Job History with a status of Canceled. Loading Media. The media is being loaded and positioned on the target device, or the job is waiting for the Open File Option to initialize. Pre-processing. Backup Exec is calculating the amount of data that will be backed up. Media Request. The job requires additional media because the media is full or there is no available media in the device. Device Paused. The device that the job was sent to is paused. Server Paused. The Backup Exec server is paused. The type of operation currently in progress (Archive, Backup, Catalog, Restore, Verify, Backup Scan and etc.).

Server name

The media server processing the job.

Chapter 7, Administrating Backup Exec

387

Administrating Backup Exec

Operation

Monitoring Jobs Job Activity dialog box (continued) Item

Description

Device name

The name of the storage device processing the job.

Source

The media or share being processed. The icon field to the left of the field name displays either:

Destination

Current Directory

Current File

Š

A disk drive icon when a backup or archive operation is running, or

Š

A tape drive icon when a restore or verify operation is running.

Where the data is being written. The icon field to the left of the field name displays either: Š

A tape device icon when a backup operation is running, or

Š

A disk drive icon when a restore operation is running.

Name of the current directory being processed. The icon field to the left of the field displays either: Š

A folder if the active job is a backup or restore operation

Š

No icon, if the active job is not a backup or restore operation, but a job such as an Erase or Format operation.

Name of the current file being processed. The icon field to the left of the field name displays either: Š

A page, if the active job is a backup or restore operation

Š

No icon, if the active job is not a backup or restore operation, but a job such as an Erase or Format operation.

Statistics

388

Directories

Number of directories processed.

Files

Number of files processed.

Skipped Files

Number of files skipped during the operation.

Corrupt Files

Number of corrupt files encountered during the operation.

Files in use

Number of files in use encountered during the operation.

Job Rate

Amount of data backed up per minute for the entire job.

Bytes

Number of bytes processed.

Administrator’s Guide

Monitoring Jobs Job Activity dialog box (continued)



Item

Description

Start Time

Time the operation started.

Elapsed Time

Length of time that has elapsed since the operation started.

Percent complete

Select percentage of the job that has completed. To display this option, select Display progress indicators for backup jobs in Preferences in the Tools - Options menu.

Estimated total bytes

The total number of bytes for the backup job estimated during a prescan. To display this option, select Display progress indicators for backup jobs in Preferences in the Tools - Options menu.

Estimated time remaining

The estimated time it will take for the job to complete. To display this option, select Display progress indicators for backup jobs in Preferences in the Tools - Options menu.

Cancel Job

Cancels the processing of the job. If the job is scheduled, it will run again at the next scheduled time. Canceling a job may take a considerable amount of time depending on the tape drive selected for the job.

Print

Prints the Job Activity information. You must have a printer attached to your system and configured in order to print the report.

To cancel an active job: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the active job from the Current Jobs pane or the Job Calendar, and then under Active Job Tasks in the task pane, click Cancel. Confirm the cancellation of the job. If the job is scheduled, it will run again at the next scheduled time.

Chapter 7, Administrating Backup Exec

389

Administrating Backup Exec

You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Cancel on more than one job at a time, as long as the jobs are of similar type.

Monitoring Jobs ▼

To place all scheduled occurrences of an active job on hold: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the active job from the Current Jobs pane or the Job Calendar, and then under Active Job Tasks in the task pane, click Hold Schedule. The active job continues and all scheduled occurrences of the job are placed on hold. To remove the hold on future jobs, click Hold Schedule again. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Hold Schedule on more than one job at a time, as long as the jobs are of similar type. See also: “Viewing Completed Jobs” on page 394

Viewing and Modifying Scheduled Jobs You can modify scheduled jobs submitted for processing using the Jobs list or Calendar view in the Job Monitor. The Calendar view also enables you to schedule a new job. The Jobs list view displays a single occurrence of a scheduled job in the Current Jobs pane. The Calendar view can display a single occurrence or all occurrences of a scheduled job depending on the View Filters selected. If you select the Calendar view and the job is not displayed, click the arrow that appears above the listed jobs to display all the jobs for the selected day. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Test Run or Delete on more than one job at a time, as long as the jobs are of similar type.

Running a Scheduled Job Immediately You can run a scheduled job immediately and the job will also run on the next scheduled occurrence. 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar.

390

Administrator’s Guide

Monitoring Jobs

3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Run now. The scheduled job is submitted to the job queue for processing.

Placing a Scheduled Job on Hold You can place a scheduled job on hold to prevent the job from running. The scheduled job will not run until you change the job’s hold status. 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Hold Schedule. The scheduled job is placed on hold. To remove the hold and run the job according to the schedule, click Hold Schedule again. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Hold Schedule on more than one job at a time, as long as the jobs are of similar type.

Changing the Priority for a Scheduled Job The priority determines the order that jobs run. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar.

391

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Monitoring Jobs

3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click the priority you want to select for the job. Priorities include: -

Highest priority

-

High priority

-

Medium priority

-

Low priority

-

Lowest priority

The priority is changed for all occurrences of the scheduled job. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as setting priorities on more than one job at a time, as long as the jobs are of similar type.

Running a Test Job for a Scheduled Job The test run option determines if a scheduled backup will complete successfully. During the test run, the tape capacity, credentials, and media are checked. If the test job determines there is a problem, the job will continue to run and the problem will appear in the job log. ▼

To run a test job for a scheduled job: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the active job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Run test job. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Test Run on more than one job at a time, as long as the jobs are of similar type. 4. Enter test run properties for the job. For more information, see “General settings options for test run job” on page 316.

392

Administrator’s Guide

Monitoring Jobs

5. On the Properties pane, under Settings, click Notification and enter notification information for the items. For more information, see “Selecting Recipients for Job Notification” on page 509. 6. On the Properties pane, under Frequency, click Schedule and then click Submit job on hold if you want to submit the job with an on-hold status. Select this option if you want to submit the job, but do not want the job to run until you change the job’s hold status. 7. Click Run Now to submit the test run job.

Deleting Scheduled Jobs Deleting a scheduled job from the Job Monitor removes a single job occurrence or all occurrences of the scheduled job. ▼

To delete a scheduled job: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Delete. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Delete on more than one job at a time, as long as the jobs are of similar type. 4. After clicking Delete, you are prompted to delete backup selection lists that are no longer in use by any other jobs. Click Yes to all to delete all of the unused backup selection lists, or click No to all to leave the backup selection lists intact. To delete selection lists later, on the Edit menu, click Delete Selection Lists. 5. Confirm the deletion of the scheduled job. If you are deleting the job from the Jobs list view, all occurrences of the job will be deleted. If you are deleting the job from the Calendar view, you can delete a single day’s occurrences or all occurrences of the job.

393

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Monitoring Jobs

Viewing Completed Jobs You can view detailed job-related properties for each job that has been processed. The Job History dialog box contains two tabs: Job History and Job Log. The Job History tab provides summary information for the job. The Job Log tab provides job and file statistics. Most job logs display in XML format. However, some logs may display in text format. ▼

To view completed job properties: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar. 3. Select the completed job you want to view from the Job History pane or the Job Calendar, and then under General Tasks in the task pane, click Properties. The Job History dialog box appears. Click Expand All to view all the information contained in the topics. Click Collapse All to hide the information in the topics. The Job History tab provides the following job summary and set detail information: Job History Item

Description

Job name

The job name entered during job configuration.

Job type

The type of operation that was performed (Archive, Backup, Catalog, Restore, Verify).

Job status

The status of the operation.

Job log

The filename and location of the job log.

Server name

The media server that processed the job.

Selection list name

The selection list processed in the job.

Device Name

The name of the device that processed the job.

Target name

The name of the device selected during job configuration.

Media set name

The name of the media set that processed the job.

Job Summary

394

Administrator’s Guide

Monitoring Jobs Job History (continued) Item

Description

Original start time

Time the job was submitted for processing.

Job started

Time the operation started.

Job ended

Length of time the operation took.

Files

Total number of files processed.

Directories

Total number of directories processed.

Skipped files

Number of files skipped during the operation.

Corrupt files

Number of corrupt files encountered during the operation.

Files in use

Number of open files encountered during the operation.

Byte count

Number of bytes processed.

Job Rate

Amount of data backed up per minute for the entire job. The job rate is calculated by dividing the byte count for the entire job by the elapsed time for the entire job.

Set Detail Information The type of operation that was performed on the media set (Archive, Backup, Catalog, Restore, Verify).

Set status

The status of the operation.

Set description

The job name entered during job configuration.

Resource name

The name of the resource accessed during the operation.

Logon account

The Backup Exec logon account used to access the resource.

Agent used

Displays if an agent was used during the operation.

Advanced Open File Option used

Displays if the Advanced Open File Option was used during the operation.

Start time

Time the operation started.

End time

Length of time the operation took.

Chapter 7, Administrating Backup Exec

395

Administrating Backup Exec

Set type

Monitoring Jobs Job History (continued) Item

Description

Files

Total number of files processed.

Directories

Total number of directories processed.

Skipped Files

Number of files skipped during the operation.

Corrupt files

Number of corrupt files encountered during the operation.

Files in use

Number of open files encountered during the operation.

Byte count

Number of bytes processed.

Rate

Number of megabytes processed per minute.

Media used

Name of the media used during the operation. If the job does not require additional media, this option will not display.

File was skipped

Lists the name of the file that was skipped. If the job does not contain a skipped file, this option will not display.

File is in use

Lists the name of the file in use. If the job does not encounter a file in use, this option will not display.

File is corrupt

Lists the name of the corrupt file. If the job does not contain a corrupt file, this option will not display.

4. Click Job Log to view detailed information about the job. The job log is in an HTML format. Click Expand All to view all the information in the topics or Collapse All to hide the information in the topics. The Job Log tab provides the following information: Job Log

396

Item

Description

Job Information

Displays the job server, job name, job start date and time, job type, and job log name.

Device and Media Information

Displays the robotic library name, drive name, slot number, media label, media ID, media overwrite protection and append date and time, and the targeted media set.

Administrator’s Guide

Monitoring Jobs Job Log (continued) Item

Description

Job Operation

Displays the options selected during job configuration and agents used during job processing.

Job Completion Status Displays the job end time, completion status, error codes, error description, and error category. The job completion section is green, orange, or red, depending on the job status. Errors

Displays a detailed description of the errors encountered during job processing. The errors are grouped by set and labeled. The label includes the operation and destination resource name for that set. The error section is red in the job log.

Exceptions

Displays a detailed description of the minor errors encountered during job processing. The exceptions section is orange in the job log.

5. Click Print if you want to print the job history or job log; however, you must have a printer attached to your system and configured in order to print the report. 6. Click OK. See also: “Understanding Job Log Status” on page 398 “Configuring Default Job Log Options” on page 400

Deleting Completed Jobs You can delete a job from the Job Monitor, or have Backup Exec automatically delete the job history using database maintenance. If you delete a job, it is completely removed from the system and cannot be recovered. ▼

To delete a completed job: 1. On the navigation bar, click Job Monitor. 2. Under Views in the task pane, click Jobs list or Calendar.

397

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Monitoring Jobs

3. Select the job you want to delete from the Job History pane or the Job Calendar, and then under General Tasks in the task pane, click Delete. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Delete on more than one job at a time, as long as the jobs are of similar type. 4. After clicking Delete, you are prompted to delete backup selection lists that are no longer in use by any other jobs. Click Yes to all to delete all of the unused backup selection lists, or click No to all to leave the backup selection list intact. To delete selection lists later, on the Edit menu, click Delete Selection Lists. 5. Confirm the deletion of the job history and associated job log. See also: “Configuring Database Maintenance” on page 405

Understanding Job Log Status Backup Exec includes seven possible job completion statuses for jobs that were processed. Job statuses include the following:

398



Successful. The job completed without errors.



Completed with exceptions. The job completed, but a file in use, skipped, or corrupted file was encountered during the operation.



Failed over. The job ran in a cluster environment and was active on one machine and then the cluster performed a failover and the job was restarted on another server in the cluster. There are two separate sets of job history when a job is failed over. The first job history will have the Failed over status and the second job history will have the status that is appropriate for the completed job.



Resumed. The status is the same as the failed over status, however the Apply CheckPoint Restart option was selected.



Canceled. The administrator terminated the operation as it was running.



Canceled, timed out. The Enable automatic cancellation feature in the Frequency Schedule property was enabled and the job was not completed within the specified timeframe.

Administrator’s Guide

Monitoring Jobs ◆

Failed. The operation took place, but one or more significant errors occurred. The job log should indicate what caused the errors so that you can decide if you want to run the job again. For example, if you get a job failure occurred due to a lost connection during job processing, you could choose to resubmit the job when the connection becomes intact.

Note If a drive loses power during a backup operation, you should restart the backup job using a different tape. You can restore the data written to the tape up to the point of the power loss, but you should not reuse the tape for subsequent backup operations. A failed job will have an error message in the Errors section of the job log. The most common errors are searchable in the VERITAS Online Knowledge Base at support.veritas.com Some reasons a job may fail are: -

Devices specified by the job were not available when the job was run.

-

The logon account information used in the backup job is incorrect. Verify the logon account information is valid for the resource being backed up.

-

There was a problem with the storage device when the job was run.

-

The computer being backed up was shut down prior to or during the backup job.

399

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Monitoring Jobs

Configuring Default Job Log Options You can configure default options for job logs that specify the amount of detail you want to include in the completed job log. For jobs that produce large job logs, for example, a backup of a considerable number of separate files, you may want to reduce the amount of detail in the job log. The size of the job log increases proportionally to the level of detail configured for the job log. ▼

To configure default job log options: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Job Logs. 3. Select the appropriate options as follows: Job Log default options Item

Description

Information to include in log Summary information only

Select this option to include the job name, job type, job log name, media server name, storage device, the starting date and time, any errors encountered, ending date and time, and completion statistics. This option also includes the name of files that were skipped, the media set name, the backup type and results of the verify operation if one was performed.

Summary information and directories processed

Select this option to include summary information and a list of all processed subdirectories.

Summary information, Select this option to include Summary information, processed directories, and files subdirectories, and a list of all the filenames that were processed. processed Summary information, Select this option to include Summary information, processed directories, files and subdirectories, a list of all the filenames and their attributes. file details Selecting this option increases the job log sizes significantly. Job log file base

Enter the prefix to be used for the job logs that are processed.

See also: “Backup Exec Defaults” on page 90 400

Administrator’s Guide

Monitoring Jobs

Using Job Logs with Vertical Applications The Backup Exec Administration Console provides a view of the job logs in HTML format. If necessary, you can convert the job logs to a text format for use with vertical applications. To convert a job log file to a text format, type the following at a command prompt: bemcmd -o31 -f"<pathname\job log filename>" For example, to display the job log C:\program files\Backup Exec\NT\Data\bex00001.xml in text format to the command prompt, you would type: bemcmd -o31 -f"C:\program files\Backup Exec\NT\Data\bex00001.xml" To redirect the job log to a file, you would type: bemcmd -o31 -f"C:\program files\Backup Exec\NT\Data\bex00001.xml" > bex00001.txt See also: “Using the Command Line Applet” on page 611

401

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Error-Handling Rules

Error-Handling Rules Backup Exec has predefined error-handling rules that determine how job errors are handled. They apply to all backup jobs and are defined based on the cause of the failure. The rules can be configured to automatically perform operations such as retry, pause, or cancel a job after a failure occurs. If Backup Exec is running in a cluster environment, you can also configure the cluster failover error-handling rule. However, the rule only appears if the server on which Backup Exec is installed is in a cluster environment. The cluster failover error-handling rule and the Apply CheckPoint Restart option in Cluster Backup Job Properties work together to enable you to resume jobs from the point of failover. The option is dependent on the error-handling rule, so if you disable the rule, the option will automatically be disabled to match the rule’s setting. Error-handling rules are disabled by default, except for cluster failover, which is enabled by default. Error-handling rules can be enabled or disabled for jobs that result in one of the following types of errors: ◆

Resource Errors



Server Errors



Job Cancellation



Job Errors



System Errors



Network Errors



Backup Device Errors



Security Errors



Backup Media Errors



Other Errors (errors that are not in any of the previous categories)



Cluster Failover

See also: “Enabling or Disabling Checkpoint Restart” on page 768

402

Administrator’s Guide

Error-Handling Rules

Configuring Error-Handling Rules You can configure error-handling rules for jobs in which the final status, error category, and error code match a defined rule. The settings for error-handling rules enable you to rename the error-handling rule, activate the rule, and retry, pause, or cancel the job. Note If Backup Exec is running in a cluster environment, the cluster failover error-handling rule appears. You can only enable or disable the rule, there are no additional options you can configure. ▼

To configure an error-handling rule: 1. On the Tools menu, click Configure Error-Handling Rules. The Error-Handling Rules dialog box appears. Each rule displays the Name, Job Status, Error Category, and Enabled status. 2. Select the error-handling rule you want to configure, and then click Settings. 3. Complete the items in the Error-Handling Rule Settings dialog box as follows: Error-Handling Rule Settings Item

Description

Name

The title of the error-handling rule.

Final Job Status

The status for the job that will activate the rule. The job status can be viewed, but not modified. Available statuses include: Error

Š

Canceled

Š

Failed

403

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Š

Error-Handling Rules Error-Handling Rule Settings (continued) Item

Description

Error Category

The category of error for which the rule will be applied. The error category can be viewed, but not modified. Available error categories include:

Enabled

Š

Backup Device

Š

Backup Media

Š

Job

Š

Network

Š

Other

Š

Resource

Š

Security

Š

Server

Š

System

Select this check box to enable the error-handling rule.

Retry Options Retry Job

Select this check box to enable Backup Exec to retry the job.

Maximum retries

Enter the number of times you want to retry the job. The maximum number of times the job can be retried is 99.

Retry Interval

Enter the number of minutes to wait before the job is retried. The maximum number of minutes is 1440.

Final Job Disposition Pause job until error condition has been manually cleared

Select this option to place the job on hold until you can manually clear the error. After you clear the error, you must remove the hold for the job.

Cancel job and Select this option to cancel the current job after the selected number reschedule for its next of retry options has been met. After the job is canceled, it will run at scheduled service the next scheduled time. Notes

404

Enter information for the error-handling rule.

Administrator’s Guide

Configuring Database Maintenance

Configuring Database Maintenance The Database Maintenance option enables you to manage the Backup Exec database and the Desktop and Laptop Option (DLO) database. Each database maintenance operation is performed independently on each database. The Backup Exec database maintains a record of files and data you have configured such as templates, catalogs, and etc. Database maintenance enables you to perform the following: ◆

Optimize database size



Delete expired data



Save the contents of the database files



Perform a database consistency check

You do not have to select all the options; however, each one performs a different process that enables you to protect and maintain your database. Selecting all the options enables you to recover the database quickly and maintain optimal performance. Informational alerts are generated at the beginning and the end of the database maintenance process each time database maintenance is performed. The alerts provide details about the type of maintenance that was performed on each database and the amount of time the maintenance took to complete. If the database maintenance process fails, the alert indicates where the failure occurred and the reason for the failure. ▼

To configure database maintenance: 1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Database Maintenance.

405

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Configuring Database Maintenance

3. Select the appropriate options as follows: Database Maintenance options Item

Descriptions

Enable Backup Exec Select this check box to activate the database maintenance process. database maintenance Last time maintenance The date and time the last database maintenance was performed. was performed Perform database maintenance at

Enter the time you want to perform database maintenance. All the maintenance will occur once a day at the time you specify.

Delete expired data Delete expired data

Select this check box to activate the deletion of expired job history, job logs, alert history, and reports from the Backup Exec database after the specified number of days have passed. Note For the Desktop and Laptop Option (DLO) database, only the Alert History setting applies. DLO does not have job history, job logs, or reports.

Number of days to keep data before deleting it from the Backup Exec database

406

Job history

Enter the number of days to keep job history data in the database before it is deleted. Job history data includes summary statistics for a job and details about media, devices and backup sets used to process the job.

Job logs

Enter the number of days to keep job logs in the database before they are deleted. Job logs includes detailed information about the job.

Alert history

Enter the number of days to keep alert history data in the database before it is deleted. Alert history data includes property and response information for the alert.

Reports

Enter the number of days to keep report data in the database before it is deleted. Report data includes property information about report jobs that were generated. The report itself is not deleted.

Administrator’s Guide

Using ExecView in Backup Exec Database Maintenance options (continued) Item

Descriptions

Perform database consistency check

Select this check box to check the logical and physical consistency of the data in the database. Note The option is not enabled by default, but it is recommended that you run a consistency check periodically at a time when there is minimal activity from Backup Exec.

Optimize database size Select this check box to reorganize fragmented pages and decrease the size of the physical database to 10 percent above what is actually used. Save contents of database to the Backup Exec data directory

Select this check box to dump the data contained in the database into the Backup Exec data directory so that the database backup file (BEDB.bak) can be backed up. The dump file will be maintained in the data directory until the next database maintenance process is performed and then this file will be overwritten. Selecting this option enables you to recover the database in the event of failure. For more information, see “Recover a Media Server Database” on page 835.

4. Click OK.

Using ExecView in Backup Exec ExecView is a web-based monitoring tool that includes a user interface called the ExecView Console. ExecView provides a single management console for locally or remotely monitoring and managing devices, jobs, and alerts for your Backup Exec media servers. The ExecView Console can be launched on Windows servers from Internet ExplorerTM. The ExecView Communication Module (ECM) is installed on your media servers and sends information about your media servers to a database on the ExecView Information Server (EIS), a web server that resides on Windows servers. From the ExecView Console, you can monitor your media servers, devices attached to those servers, jobs, and alerts.

407

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Using ExecView in Backup Exec

Your ExecView Console, EIS, and ECM can run on three separate systems or you can have any combination of these components residing on the same system. For example, your ExecView Console and EIS can reside on the same Windows server. ExecView Components in Common Scenario

ExecView Console Windows servers

ExecView Information Server Windows server

ExecView Communication Module (Backup Exec Servers) Windows servers or NetWare 4.2 and later

You can have multiple EIS and multiple media servers reporting through the same ExecView Console, but the console can only report information about devices, jobs, and alerts from one EIS at a time. To monitor media servers from ExecView, you must first create a profile for the EIS, and then create a server group, a group of media servers that report to the EIS. Placing servers into groups allows you to: ◆

Control the size of the display in ExecView.



Monitor your enterprise network more efficiently.

Servers can be grouped by any category, such as department or function, and can belong to multiple server groups. You can create as many groups as you need, and each group can contain as many servers as necessary.

408

Administrator’s Guide

Using ExecView in Backup Exec

A user can set preferences for how many scheduled and completed jobs are displayed for each server, whether the time displayed on the ExecView Console’s screens will be the local system’s time or the media server time, and set the refresh rate for the ExecView Console. If multiple profiles are created, each profile can have different user preferences set. You can log into to multiple ExecView Consoles using different profiles; however, each ExecView Console only allows one user (profile) to be logged on at a time. For more information about ExecView, see the ExecView documentation in the ExecView\language\Docs directory on the Backup Exec CD.

Configuring ExecView You can configure ExecView connection settings and then save them in Backup Exec. You can also edit the settings at any time using the configuration method. Configuring the connection settings enables you to quickly launch the ExecView console through Backup Exec. ▼

To configure ExecView connection settings: 1. On the Tools menu, point to ExecView, and then click Connection Settings. The ExecView Information Server Settings dialog box appears. 2. Enter the appropriate options as follows: ExecView Information Server Settings dialog box Item

Description

Name of remote host machine on which the ExecView Information Server (EIS) is running

Enter the host machine on which the ExecView Information Server (EIS) runs. EIS is a web server that resides on a Windows system. It is the central server that the ExecView Communication Module (ECM) communicates with and sends data to.

Port number on which Enter the port number on which the EIS listens for console the EIS web server is connections. The console communicates with the EIS using http listening protocol on this port.

3. Click OK.

409

Administrating Backup Exec

Chapter 7, Administrating Backup Exec

Using ExecView in Backup Exec ▼

To launch the ExecView console: ❖

On the Tools menu, point to ExecView, and then click ExecView Console.

If the ExecView Information Server settings are configured, the ExecView Console is launched. If the settings are not configured, you must enter the ExecView Information Server settings using the steps in the previous procedure.

410

Administrator’s Guide

Restoring Data

8

Restoring Data

The restore operation allows you to retrieve information from storage media, including media created with backup software other than Backup Exec, and restore it to any server or remote workstation. In most cases, you will need to restore only one file, but there may be times when directories, groups of files, or (in a disaster situation) an entire system will need to be restored. Backup Exec offers several convenient methods for finding the files you need to restore: ◆

Resource view. The resource view lists backed up data by the resource from which it was backed up. This feature is useful for finding files that were located on a certain server or workstation.



Media view. The media view lists the data that is contained on a piece of media. This feature is useful for viewing the contents of a tape that was backed up from another media server.



Advanced file selection. The Advanced File Selection feature allows you to specify file and date attributes for the data you want to restore.



Search catalogs. The Search Catalogs feature makes it easy to find files that you want to restore, or to make sure that you have backups of certain files. This feature also allows you to see all cataloged, backed up versions of a file, so you can restore earlier versions if needed.

You can select options that you want to use for most restore operations. Backup Exec will use these default options unless you override these options when setting up a specific restore job.

411

Restore Operations and the Catalog

When creating your restore jobs, you can: ◆

Restore data to the system from which it was originally backed up or redirect the restore to another system.



Specify if the restore job should begin processing immediately or schedule it to run at a future time.



Specify which local network is to be used for restoring data, ensuring that other connected critical networks are not affected by this Backup Exec operation.

See also: “Using the Resource View” on page 444 “Using the Media View” on page 444 “Selecting Data to Restore” on page 444 “Using Advanced File Selection to Restore” on page 446

Restore Operations and the Catalog While backing up data from a resource, Backup Exec creates a set of catalog files that reside on the media server and on the media. These catalog files contain information about the contents of all media and are used when selections are made for restore jobs. Media backed up at other Backup Exec installations must be cataloged by the local media server before data can be viewed in the Restore Job Properties dialog box because the catalog for the media does not exist on the media server. The media must have a Catalog operation performed on it before files can be selected to restore. See also: “Cataloging Media in a Drive” on page 413 “Setting Catalog Defaults” on page 415 “Catalog Levels” on page 418

412

Administrator’s Guide

Cataloging Media in a Drive Use Catalog to log the contents of a media created by a product other than this installation of Backup Exec (imported media), or to create a new catalog on the local hard drive if the catalog for the media no longer exists. Media must have a catalog before data can be restored from it or verified. You can also catalog backup-to-disk files. If the media is being used by this system for the first time, you may need to inventory the media first (see “Inventorying Media in Devices” on page 171). ▼

To catalog media: 1. On the navigation bar, click Devices. 2. Select the device containing the media to be cataloged, and then select the media you want to catalog. 3. Under Media Tasks in the task pane, select New catalog. 4. Select the Device options as described in “Device Options for Catalog Jobs” on page 414. 5. On the Properties pane, under Settings, click General, and select the options as described in “General Options for Catalog Jobs” on page 415. 6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and then select the options you want (see “Selecting Recipients for Job Notification” on page 509). 7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). The catalog operation can be monitored or canceled through the Job Monitor. See also: “Using Backup-to-Disk Folders and Files” on page 149 “Monitoring Jobs” on page 381 “Setting Catalog Defaults” on page 415 “Selecting Data to Restore” on page 444 “Canceling a Restore Operation” on page 462

Chapter 8, Restoring Data

413

Restoring Data

Restore Operations and the Catalog

Restore Operations and the Catalog

Device Options for Catalog Jobs When you select to create a catalog job, the first options that appear are the Device options. Catalog Job Properties dialog box These options include:

Device options for catalog job

414

Item

Description

Device

Select the device on which this job will run.

Password

If this media is password protected and being cataloged by this system for the first time, enter the password.

Confirm Password

If this media is password protected and being cataloged by this system for the first time, re-enter the password.

Administrator’s Guide

General Options for Catalog Jobs General options for a catalog job include: General settings options for job Item

Description

Job name

Enter a name for the job or accept the default name.

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Setting Catalog Defaults ▼

To configure catalog defaults: 1. On the Tools menu, select Options. 2. On the Properties pane, under Settings, click Catalog.

Chapter 8, Restoring Data

415

Restoring Data

Restore Operations and the Catalog

Restore Operations and the Catalog Default catalog options

3. Select the appropriate options as follows: Default catalog options Item

Description

Use storage media-based Select this option to allow Backup Exec to read the catalog catalogs information from the media. Media-based catalogs allow quick cataloging of tapes that are not included in the disk-based catalog (for example, media that was written by another installation of Backup Exec). This feature allows tapes to be cataloged in minutes, rather than the hours required with traditional file-by-file cataloging methods. If you want to create a new catalog by having Backup Exec read each file block, clear this option. Clearing this option is only recommended if normal catalog methods are unsuccessful.

416

Administrator’s Guide

Default catalog options (continued) Item

Description

Truncate catalogs after x Select this option to retain only the header information and to days remove all file and directory details after the specified number of days. This option reduces the size of the catalogs considerably. After the catalogs have been truncated, the files and directories cannot be restored unless the media is recataloged.

Note The last access date is not reset when catalogs are truncated. Therefore, if you select to have catalogs truncated after 20 days and then select Remove unused catalogs after 30 days, the catalogs will be truncated on the 20th day. On the 30th day, unless the catalogs have been accessed, they will be removed. Remove unused catalogs This enables Backup Exec to automatically delete disk-stored after x days catalogs that have not been accessed in the specified number of days. Enabling this feature can help manage disk space used by catalogs; however, after removing catalog information for media, the media must then be re-cataloged before data can be selected from it for a restore operation. The access date for disk-stored catalogs is updated each time data is restored from, or appended to the media. Current path

The path where the catalog files are located. This path defaults to \Catalogs in the \Backup Exec\NT directory.

Catalog drive

Select a volume where the catalog files are located. This is useful if you have limited disk space on your media server.

Catalog path

Specify a path on the volume for the catalog files. If the path you provide does not exist, you will be prompted to create the path.

4. Click OK. See also: “Restore Operations and the Catalog” on page 412 “Catalog Levels” on page 418

Chapter 8, Restoring Data

417

Restoring Data

Restore Operations and the Catalog

Restore Operations and the Catalog

Catalog Levels The amount of information that can be viewed through the catalog for media is determined by the media’s “catalog level”. Backup Exec fully catalogs each backup; however, there may be instances where media does not appear as fully cataloged in the Restore Job Properties dialog box. The following are possible catalog levels within the Backup Exec system as show in the Media view and within Restore selections: Media catalog levels Item

Description

Fully Cataloged Media

With fully-cataloged media, you can: Š

View information on all the directories and files contained in each backup set.

Š

Search for files to restore.

Š

Use the file versioning feature.

Truncated Cataloged Media

Truncated cataloged media lists only backup set information. No files or file attributes can be viewed. This version of Backup Exec writes only full catalogs. However, truncated cataloged media that was migrated from earlier versions of Backup Exec, but not cataloged by this version, will appear as truncated cataloged media. Truncated cataloged media will not allow you to make restore selections. You must catalog the media to view and select files to restore.

Uncataloged Media

There is no catalog information for the media. You must catalog the media to view and select files to restore.

See also: “Setting Catalog Defaults” on page 415 “Restore Operations and the Catalog” on page 412

418

Administrator’s Guide

Restoring Data to a Server or Workstation Restoring data to a server or workstation involves the creating of a restore job in which you specify: ◆

Source



Destination



Settings



Frequency

Unless you specify otherwise, the restore job will use the default options set through the Tools menu. You can use the Restore Wizard to have Backup Exec guide you through the creation of a restore job, but after you become familiar with Backup Exec, you will probably choose to set your options by configuring restore job properties. See also: “Setting Restore Defaults” on page 457

Using the Restore Wizard ▼

To launch the Restore Wizard: 1. From the navigation bar, click Job Setup. 2. Under Restore Tasks in the task pane, select New job using wizard. 3. Follow the on-screen prompts.

Chapter 8, Restoring Data

419

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Creating a Manual Restore Job by Configuring Job Properties ▼

To restore data to a server or workstation: 1. On the navigation bar, click Restore. 2. Select the data to be restored (see “Selecting Data to Restore” on page 444), and complete other Selections options as described in “Selections Options for Restore Jobs” on page 423. Note To protect remote resources, you must install the Backup Exec Remote Agent for Windows Servers on the remote computer. 3. On the Properties pane, under Destination, click Device. 4. Select the device containing the data being restored. 5. On the Properties pane, under Settings, click General, and select the options as described in “General Options for Restore Jobs” on page 425. You can select additional configuration options for the restore job before selecting to run or schedule the job. Select additional options on the Restore Job Properties dialog box’s Properties pane: -

420

If you want to redirect this job to another system other than the one from which the data was backed up, on the Properties pane, under Destination, click one of the following (see “Redirecting a Restore Operation” on page 452): -

File Redirection. Select this option to redirect file sets.

-

SQL Redirection. Select this option to redirect SQL Server sets to another SQL server.

-

Exchange Redirection. Select this option to redirect Exchange sets to another Exchange server.

-

Sharepoint Redirection. Select this option to redirect Sharepoint Portal Server sets to another Sharepoint server.

Administrator’s Guide

-

If you want to set advanced options for the restore job, on the Properties pane, under Settings, click Advanced. Then, complete the options as described in “Advanced Options for Restore Jobs” on page 428.

-

If you want to set commands to run before or after the job, on the Properties pane, under Settings, click Pre/Post Commands and complete the options as described in “Pre/Post Commands for Restore Jobs” on page 432.

-

If you are restoring other platform types or database agents, such as SQL, Exchange, or NetWare, select the platform type from the Properties pane, under Settings, and then refer to the chapter or appendix for that item for instructions on completing the options.

-

If you want to specify a local network to be used for this restore job, on the Properties pane, click Network, and then enter the network information (see “Specifying the Restore Network” on page 460).

-

If you want Backup Exec to notify recipients when this job completes, on the Properties pane, under Settings, click Notification, and then select each recipient to be notified when the job completes (see “Configuring E-mail and Pager Notification Methods” on page 483).

Depending on how the default settings for your software are configured, some of the options may or may not already be selected. You can override the default options by selecting or clearing items in these dialog boxes. 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374).

Chapter 8, Restoring Data

421

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

To monitor the job while it is processing, click Job Monitor, and ensure Show active jobs is selected under Current Job View Filters. You can review results of the restore job in the job’s log. Caution When restoring System State, you must reboot your system before performing subsequent restore operations. Note Depending on your file system environment, byte counts for restored data may not match the byte count recorded when the data was backed up. This is normal and does not mean that files were excluded in the restore operation. For more information, see “Restore Questions” on page 584. See also: “Selecting Data to Restore” on page 444 “VERITAS Backup Exec - Remote Agent” on page 843 “Redirecting a Restore Operation” on page 452 “Redirecting Restores for SQL 2000” on page 1032 “Restoring Exchange 2000 and 2003” on page 1114 “Restore Options for Exchange 5.5” on page 1149 “Restoring NetWare Servers” on page 1363 “Restore Options for Lotus Domino Databases” on page 1323 “Viewing Completed Jobs” on page 394 “Restoring File Permissions” on page 436

422

Administrator’s Guide

Selections Options for Restore Jobs When the Restore Job Properties dialog box appears, Selections is chosen by default on the Properties pane. Through the Selections options, you choose the data you want to include in the restore job. You can also choose how the data will appear in this dialog box. Restore Selections

Options on this dialog box include: Selections options for restore job Item

Description

Selection list

If you are creating a job using an existing selection list, select the selection list or lists you want to use. Otherwise, use the default Selection list, which creates a new selection list using this name.

Load Selections from Existing List

Click this button if you want to use a previously created selection list or merge existing selection lists.

Chapter 8, Restoring Data

423

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation Selections options for restore job (continued) Item

Description

View Format

424

Graphical

Select this option to view selections in a directory tree view.

Show file details

Select this option to display details about the files available for selecting.

Text

Select this option to view selections as a list of files and directories.

Advanced

Click this button if you want to use the Advanced File Selection for selecting files for restoring (see “Using Advanced File Selection to Restore” on page 446).

Include subdirectories

Select this option if you want to select the contents of all the subfolders when a directory is selected.

Administrator’s Guide

General Options for Restore Jobs General options for restore jobs, including the name of the job, can be set through the Restore Job Properties dialog box. To set these options, on the Properties pane, under Settings, click General. General settings options for restore job

Options for this dialog box include: General settings options for restore job Item

Description

Job name

Enter a name that describes the data that you are restoring. This is the name that is used to identify this operation in the job schedule.

Chapter 8, Restoring Data

425

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation General settings options for restore job (continued) Item

Description

Job priority

Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Restoring existing files Restore over existing files Select this option to have Backup Exec overwrite files on the target resource that have the same name as files that are being restored. Use this option only when you are sure that you want to restore an older version of a file. Skip if file exists

Select this option to prevent Backup Exec from overwriting files on the target disk with files that have the same names that are included in the restore operation.

Skip if existing file is more Select this option to prevent Backup Exec from restoring over files recent that exist on the target resource if they are more recent than the files included in the restore operation. This option is useful if you are rebuilding a system. For example, after installing the operating system on a crashed computer, you could restore a previous full backup of the system without worrying about overwriting later versions of operating system files. Restore corrupt files

Select this option only if you do not wish to have Backup Exec automatically exclude corrupt files from the restore process. This option is only recommended if a job has failed because a catalog query could not determine the corrupt files on the tape. Normally, when a restore job is run, Backup Exec queries the catalog to determine if any corrupt files are on the tape and excludes them from the restore job. If, during the query process, Backup Exec cannot determine if a file is corrupt, the Restore job will not continue and will be marked as Failed. In the unlikely event that the automatic exclusion of corrupt files cannot be accomplished, you may manually exclude corrupt files in the Restore selections window and run the job with the Restore Corrupt File option enabled.

426

Administrator’s Guide

General settings options for restore job (continued) Item

Description

Restore security

Check this box to restore file-level security information on NTFS partitions, if it exists in the data you selected.

Preserve tree

(This option is on by default.) Check this box to restore the data with its original directory structure intact. If you clear this option, all data (including the data in subdirectories) is restored to the path you specify in the Redirection dialog box. Clearing the Preserve Tree option is useful when restoring several subdirectories or individual files from media, but it should not be cleared when restoring an entire drive.

See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420

Chapter 8, Restoring Data

427

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Advanced Options for Restore Jobs To set Advanced options for restore jobs, on the Properties pane, under Settings, click Advanced. Advanced restore options

Options for this dialog box include: Advanced options for restore Item

Function

Restore Removable Storage data

Select this check box to restore the Removable Storage data. The Removable Storage database is stored in the Systemroot\System32\Ntsmsdata directory and is automatically backed up when the system directory is selected for backup. Removable Storage is a service used to manage removable media and storage devices; it allows applications to access and share the same media resources.

428

Administrator’s Guide

Advanced options for restore (continued) Item

Function

Restore disk quota data

Select this check box to restore disk quota data. Disk quota data is automatically backed up when the root directory of a volume is selected for a backup. Disk quotas track and control disk usage on a per user, per volume basis; the values can be restored to the limits that were set before the backup.

Restore Terminal Services Select this check box to restore the Terminal Services database. The database default location for the Terminal Services database, which contains licensing data for client licenses, is the Systemroot\System32\LServer directory and is automatically backed up when the system directory is selected for backup. Terminal Services allow client applications to be run on a server so that client computers can function as terminals rather than independent systems. Restore Windows Select this check box to restore the Windows Management Management Instrumentation (WMI) repository. The WMI repository is stored in Instrumentation repository the Systemroot\System32\wbem\Repository directory and is automatically backed up when the system directory is selected for backup. The Windows Management Instrumentation repository provides support for monitoring and controlling system resources and provides a consistent view of your managed environment. Restore Cluster Quorum

Select this check box to restore the cluster configuration. For more information about restoring clusters, see “Restoring Data To Clusters” on page 788.

Force the recovery of the cluster quorum even if other nodes are online and/or disk signatures do not match.

Select this check box to restore the cluster configuration if you are not able to take the other nodes in the cluster offline or if the disk that the cluster quorum previously resided on has been changed. If this option is selected, the cluster service for any nodes that are online is stopped. This option also allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum. Any changes made to the cluster quorum after the last backup will be lost. This option is only available if Restore Cluster Quorum is also selected.

Chapter 8, Restoring Data

429

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation Advanced options for restore (continued) Item

Function

Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State.

Select this check box to designate this server as the primary replicator for all members in the set when restoring FRS-managed folders or SYSVOL as part of System State. If all members of a replica set are to be restored, then stop replication, restore all the member servers, and then when restoring the last member server, select this option to designate the server as the primary replicator. If this option is not selected, replication may not function. Note In this version of Backup Exec, all restores of SYSVOL and FRS-managed folders are non-authoritative. An authoritative restore can only be performed by redirecting the restore and then copying the files to the server. Refer to your Microsoft documentation for details on performing an authoritative restore.

Restore Windows NT 4.0 registry

Select this check box to restore registry information if it exists in the data you selected (applies to Windows NT v4.0 only).

Merge the existing hardware configuration and registry services with the data to be restored

Select this option if you want to merge the existing hardware and registry services with the data you selected to be restored. This option should only be used for restoring System State or the NT Registry.

Overwrite the existing hardware configuration and registry services with the data to be restored

Select this option if you want to overwrite hardware configuration and registry services with the data you selected to be restored. This option should only be used for restoring System State or the NT Registry and there have been no hardware changes.

Junction Points Restore junction points, directories, and files from backup media

When this option is selected, the information for the junction points and the files and directories to which they are linked is restored. Selecting this option overwrites existing junction points on your system. Note If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see “Back up files and directories by following junction points” on page 324), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter.

430

Administrator’s Guide

Advanced options for restore (continued) Item

Function

Preserve existing junction points and restore files and directories from backup media

Select this option to restore files and directories backed up from junction point links while retaining the system's current junction points. This option keeps current junction points from being overwritten with the junction point information restored from the backup media. When this option is selected and identical junction points or directory names exist on both the target system and the media, the files and directories are restored to the target system's junction point or directory. If a junction point or directory does not already exist in the same location and with the same name as the junction point to be restored, then the information for the junction point and the files and directories to which they point will be restored. Note If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see “Back up files and directories by following junction points” on page 324), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter.

See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420

Chapter 8, Restoring Data

431

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Pre/Post Commands for Restore Jobs To set up commands to run before or after a restore job, on the Properties pane, under Settings, click Pre/Post Commands. You can run commands before or after a restore job, and set conditions for these commands: ◆

Run the job only if the pre-job command is successful



Run the post-job command only if the pre-job command is successful



Run the post-job command even if the job fails



Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-job commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error.

If it is critical that the job not run if the pre-job command fails, then configure Backup Exec to check the return codes of the pre- and post-job commands to determine if the pre-job command failed or completed successfully. For example, if a pre-job command that shuts down a database before a restore is run fails, the database could be corrupted when the restore is run. In this situation, it is critical that the restore job fail if the pre-job command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-job commands, and the post-job command returns a non-zero code, the job log reports that the post-job command failed. If you also selected to run the job only if the pre-job command is successful, and both the pre-job command and the job ran successfully, Backup Exec will mark the job as failed if the post-job command fails. For example, if the pre-job command runs successfully and shuts down the database and the restore job also runs successfully, but the post-job command cannot restart the database, Backup Exec marks the job and the post-job command as failed. If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.

432

Administrator’s Guide

Pre/post commands options for restore job

Options on this dialog box include: Pre/Post Commands for restore Item

Function

Pre-job command

Specify a command to be run on the specified server before the restore job is run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported.

Post-job command

Specify a command to be run on the specified server after the restore job has run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported.

Chapter 8, Restoring Data

433

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation Pre/Post Commands for restore (continued) Item

Function

Run job only if pre-job command is successful

Select this option to run the restore job only if the pre-job command is successful. If the pre-job command fails, the job does not run, and is marked as failed. If it is critical that the job not run if the pre-job command fails, then select Allow pre- and post-job commands to be successful only if completed with a return code of zero. If a non-zero exit code is returned, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The job is not run and the job status is marked as Failed.

Run post-job command Select this option to run the post-job command only if the pre-job only if pre-job command is command is successful. successful If it is critical that the post-job command fail if the pre-job command fails, then select Allow pre- and post job commands to be successful only if completed with a return code of zero. If a non-zero exit code is returned for the pre-job command, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The post-job command is not run. If you also select Run job only if pre-job command is successful, and both the pre-job command and the job are successful, but the post-job command returns a non-zero code, the job log reports both the job and the post-job command as failed. Run post-job command even if job fails

Select this option if it is critical to run the post-job command regardless if the job is successful or not. If you also select Allow pre- and post job commands to be successful only if completed with a return code of zero and the post-job command returns a non-zero code, the job log reports the post-job command as failed.

434

Administrator’s Guide

Pre/Post Commands for restore (continued) Item

Function

Allow pre- and post-job commands to be successful only if completed with a return code of zero

Select this option to allow Backup Exec to check the return codes of the pre- and post-job commands to determine if they completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands. If this option is not selected, the success of the pre- and post-job commands is not determined based on the return code.

Cancel command if not completed within x minutes

Select the number of minutes Backup Exec should wait before canceling a pre-job or post-job command that did not complete. The default time-out is 30 minutes.

Run these commands On this media server

Select this option to run the pre- and post-job commands on this media server only.

On each server restored to Select this option to run the pre- and post-job commands one time on each server backed up. The pre- and post-job command selections apply to each server independently. The pre- and post-job command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.

See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Setting Default Pre/Post Commands” on page 328

Chapter 8, Restoring Data

435

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Restoring File Permissions This section contains details on restoring data using the Restore Security option, which affects file security. This security feature applies only to NTFS partitions. When restoring data with the Restore Security option selected on the Restore Job Properties dialog box when on the Properties pane, under Settings, you select General, Backup Exec overwrites all directory security information presently on the disk with the security levels associated with the data being restored. This overwrite begins at the root of the restored directory structure and updates each directory in the tree until it reaches the data contained in the last directory. Example: With the following data on the storage media (a backup made prior to making security changes on disk): \(root)Security applied: Users - Full \UsersSecurity applied: Users - Full \User1Security applied: User1 - Full DATA.TXT Security applied: User1 - Full With the following data on the disk (recently changed directory and file security): \(root)Security applied: Users - Read \UsersSecurity applied: Users - Change \User1Security applied: User1 - Full DATA.TXT Security applied: User1 - Full After a restore with the Restore Security option selected, the security level of the data on the disk looks like this: \(root)Security applied: Users - Full \UsersSecurity applied: Users - Full \User1Security applied: User1 - Full DATA.TXT Security applied: User1 - Full If the data is restored without the Restore Security option selected, data.txt would inherit the permissions of the directory in which it was restored. In this case, it would inherit User1 directory’s security level of Full. See also: “General settings options for restore job” on page 425

436

Administrator’s Guide

Restoring System State The system-specific data that comprises System State includes the registry, the COM+ Class Registration database, and boot and system files. The Certificate Services database will also be included if the server is operating as a certificate server. If the server is a domain controller, the data also includes Active Directory services database and SYSVOL directory. The System State data is backed up and restored only as a collection, never individually. To restore System State data to a server that is not a domain controller, you can perform a basic restore. If the target server is currently a domain controller, start the target server in Directory Services Restore Mode before performing a restore of the System State data. Note A System State backup is always a full backup. Therefore, when restoring, only the most recent backup of the System State must be restored. You should not cancel a System State restore operation. Canceling this operation could leave the system unusable. ▼

To start the Backup Exec services and perform a local restore of System State data on a domain controller: 1. Start the target server, press F8 when prompted for Startup Options, and then select the Directory Services Restore Mode option. 2. To open Services, right-click on My Computer, click Manage. 3. Expand Services and Applications. 4. Click Services. 5. For each Backup Exec service listed: a. Click Properties on the shortcut menu. b. Click the Log On tab, click This account, enter a user account with local administrator’s rights, and then click OK. c. Right-click the service, and then click Start on the shortcut menu. 6. After the Backup Exec services have started, run Backup Exec and perform a restore of the System State. Set the following option on the Advanced screen: Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. For more information, see “Advanced Options for Restore Jobs” on page 428.

Chapter 8, Restoring Data

437

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Caution When restoring System State, you must reboot your system before performing subsequent restore operations. Note If you have more than one domain controller in the network and you want Active Directory replicated to the other domain controllers, you must perform an authoritative restore of the Active Directory. To perform an authoritative restore of the Active Directory, you must run Microsoft’s Ntdsutil utility after the Backup Exec restore job completes and you have restored the System State data, but before you restart the server. An authoritative restore ensures that the restored data is replicated to all of the servers. For more information about authoritative restore and the Ntdsutil utility, please refer to your Microsoft documentation. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Advanced options for restore” on page 428

Restoring Windows Server 2003 Systems The Backup Exec Shadow Copy Components file system uses Microsoft’s Volume Shadow Copy Service to protect critical operating system and application service data, and third party application and user data on Windows Server 2003 resources. A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections. When expanded, the Backup Exec Shadow Copy Components file system includes System State Writers, Service State Writers, and User Data Writers. ◆

System State Writers. To restore System State Writers, see “Restoring System State” on page 437.



Service State Writers. To restore Service State Writers, follow normal restore procedures. See “Creating a Manual Restore Job by Configuring Job Properties” on page 420.

The User Data Writers in Backup Exec are the Active Directory Application Mode Writer (AD/AM Writer), the SQL Server Writer, and the Exchange Writer. When restoring data with the AD/AM Writer, Backup Exec stops the service for the AD/AM instance you want to restore before the restore job starts. However, Backup Exec does not restart the AD/AM service when the restore job completes because 438

Administrator’s Guide

post-processing operations, such as authoritative restores using Adamutil.exe, may be needed. You must restart the AD/AM service. If Backup Exec cannot stop the AD/AM service or if Backup Exec cannot restore all of the AD/AM files, the AD/AM restore will fail. To restore data using the SQL Server Writer, see “Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer” on page 1089. To restore data using the Exchange Writer, see “Protecting Microsoft Exchange Server 2003 Using the Exchange Writer” on page 1171 See also: “Protecting Windows Server 2003 Systems” on page 343 “Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media” on page 455

Restoring Utility Partitions Utility partitions, which are usually small partitions installed on the disk by OEM vendors like Dell, Compaq, Hewlett-Packard, and IBM, can be selected for restore. These utility partitions contain system diagnostic and configuration utilities and are usually restored during disaster recovery. However, utility partitions can be selected during a normal restore job provided the following requirements are met: ◆

Utility partitions, but not the data belonging to the partitions, must be present on the system.



You must have Administrator rights to restore utility partitions.



The system on which the utility partition data is being restored should be the same system from which the data was originally backed up, unless you are required to do a redirected restore (see “Performing Redirected Restores of Utility Partitions” on page 440).



Utility partitions being restored must belong to the same vendor. For example, Dell utility partitions cannot be restored to a Compaq system.



The size of the utility partition on which the data is being restored must be equal or greater in size than the utility partition that was backed up.

See also: “Restoring Data to a Server or Workstation” on page 419 “Selecting Data to Restore” on page 444

Chapter 8, Restoring Data

439

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Performing Redirected Restores of Utility Partitions You may need to perform a redirected restore of a utility partition if during a disaster recovery, the system being recovered has been renamed. A redirected restore could also be required if a new system is replacing a crashed system. In the latter case, the system being restored must be the same model as the system originally backed up. When doing a redirected restore of utility partitions, the following conditions must be met: ◆

Utility partitions, but not the data belonging to the partitions, must be present on the system.



You must have Administrator rights to restore utility partitions.



Utility partitions being restored must belong to the same vendor. For example, Dell utility partitions cannot be restored to a Compaq system.



The size of the utility partition on which the data is being restored must be equal or greater in size than the utility partition that was backed up.



The system on which the redirected restore is targeted must be the same make and model and have the same size utility partitions as the system from which the utility partition was backed up.

See also: “Redirecting a Restore Operation” on page 452 “Manual Disaster Recovery of Windows Computers” on page 558

Restoring Distributed File System (Dfs) Links To restore Distributed file system (Dfs) links, select the user-defined selection for the Dfs from the catalog. Only the Dfs links themselves are restored. To restore data in the Dfs links, select specific data from the catalog. Note The Dfs root must exist before the links can be restored. See also: “About Selecting Distributed File System (Dfs) Links for Backup” on page 268

440

Administrator’s Guide

Restoring Media Created With Other Backup Software Media backed up with the following software products can be read with this version of Backup Exec and restored to the system from which it was backed up (or redirected to a compatible system or resource). In addition, Backup Exec can read media backed up with products that record media in the following tape formats: ◆

Microsoft Tape Format (MTF)



SIDF



BrightStor Enterprise Backup and ARCserve Formats



Stac Image Option

Backup Exec also supports restoring NetWare SMS data to non-SMS volumes. For example, data backed up with Backup Exec for NetWare Servers or Novell’s SBackup can be restored to the Windows NT media server or another network share. Media from the following products can be restored with Backup Exec: ◆

Backup Exec for Windows NT 7.3 and later (MTF)



Backup Exec for NetWare Servers 7.x, 8.x, and 9.x (MTF)



Software-compressed media created with previous versions of Backup Exec, such as Backup Exec for Windows NT (5.x, 6.x and 7.x)



Seagate Backup Director (SIDF)



Seagate Storage Exec (SIDF)



BrightStor ARCserve for NetWare 4.x, 5.x and 6.x (Native and embedded SMS tape format. Cannot restore System State from tapes created by ARCserve for NetWare 6.x.)



BrightStor ARCserve for Windows NT 6.x (cannot restore System State from tapes created from this product)



BrightStor ARCserve Backup 9 for Windows



BrightStor Enterprise Backup 10 for Windows



Novell SBackup (SIDF)



Palindrome Backup Director for Windows NT and NetWare (SIDF)



Palindrome Storage Manager for Windows NT and NetWare (SIDF)

Note Software-compressed data backed up with products other than Backup Exec for Windows NT and Windows 2000 cannot be restored.

Chapter 8, Restoring Data

441

Restoring Data

Restoring Data to a Server or Workstation

Restoring Data to a Server or Workstation

Restoring ARCserve Media Backup Exec allows you to restore data from tapes backed up with ARCserve for Windows NT v6.x, ARCserve 9 and 10, and ARCserve for NetWare versions 4.x, 5.x, 6.x and 7.x (native and embedded SMS tape format). Note ARCserve supports the use of SMS to back up data. Data backed up using the SMS option in ARCserve 4.x and 5.x cannot be restored. However, data backed up using the SMS option in ARCserve 6.x and ARCserve 7.x can be fully restored. The following types of data cannot be restored from ARCserve tapes: ◆

System State (from tapes created by ARCserve 6.x for NetWare and ARCserve 6.x for Microsoft Windows



Databases (such as Microsoft SQL and Exchange Server and NetWare Directory Services)



Windows NT registry



Interleaved files



Compressed files



Encrypted files



Long filenames and Extended Attributes for OS/2 files



Long filenames and resource forks for Macintosh files

Note Media containing ARCserve backups can be overwritten; however, backup append operations are not supported. All Backup Exec media utility functions can be performed on ARCserve media.

442

Administrator’s Guide



To restore data from an ARCserve tape: Note If the ARCserve backup spans multiple tapes, you must have all the tapes that were included in the ARCserve backup available. Make sure you start both the catalog and restore operations with the first tape used in the ARCserve backup. 1. Inventory all the tapes included in the ARCserve backup. 2. Catalog all the tapes included in the ARCserve backup. During cataloging, Backup Exec reports file formats that it can read. Files that cannot be read do not appear in the catalogs. The media description that appears in the Backup Exec catalog comes from the session description used by ARCserve. Note Media-based catalogs are not supported on tapes created by other vendors’ backup products. Because of this, cataloging ARCserve tapes takes considerably longer than cataloging a tape made with Backup Exec. 3. Restore selected data to a server or workstation. Note Due to the naming conventions ARCserve uses for some systems, it may be necessary to select a different location for the data using Backup Exec’s File Redirection (see “Redirecting a Restore Operation” on page 452). See also: “Inventorying Media in Devices” on page 171 “Cataloging Media in a Drive” on page 413 “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Redirecting a Restore Operation” on page 452 “Restoring Media Created With Other Backup Software” on page 441

Chapter 8, Restoring Data

443

Restoring Data

Restoring Data to a Server or Workstation

Selecting Data to Restore

Selecting Data to Restore You can view data to restore through the Resource-centric view or the Media-centric view. To change views, right-click anywhere in the middle pane of the Restore Job Properties Selections dialog box and select the view you want to use.

Using the Resource View In the Resource view, restore selections are listed by the resource from which they were backed up. Resource View

Local volume Network volume Backup type Backup set number

Using the Media View The Media view allows you to view and make restore selections from all of the cataloged media in the system. Media View Media family name Backup sets

To expand the view for a resource or piece of media, click the adjacent box that contains the plus sign (+). To collapse the view, click the minus sign (-). When the view is expanded, backup sets contained on the resource or media are displayed. You can expand the backup set to view the data included in the backup. The data that has been backed up from the resource appears in the right pane of the Restore 444

Administrator’s Guide

Job Properties - Selections dialog box. Remember that only media cataloged or backed up at this server will be displayed in the views. If you want to restore data backed up at another installation of Backup Exec, you will need to catalog the media first. You can traverse file levels from either side of the window by clicking folders and subfolders as they appear. To select data, select the check box next to the drives, directory, or file you want to restore. All files and directories at or below the selected directory level are included in the restore operation (if the Include Subdirectories option is selected under the Edit menu). The check box and check mark displayed vary depending on the item’s status. Data Selections A slash in a shaded check box means that some items below the check box are selected, but the item itself cannot be selected. A slash in a check box means some items below the directory or drive level are selected. A check mark in a check box means all items at or below the directory or drive level are selected. A clear check box means the item can be selected.

See also: “Restore Operations and the Catalog” on page 412 “Cataloging Media in a Drive” on page 413 “Creating a Manual Restore Job by Configuring Job Properties” on page 420

Chapter 8, Restoring Data

445

Restoring Data

Selecting Data to Restore

Selecting Data to Restore

Changing Resource Credentials for Restore Jobs If the logon account needed to restore data is different from the default logon account, you can change the account through the Resource Credentials dialog box. You can also use this dialog box to overwrite logon accounts for redirected restores. ▼

To change a logon account for a resource: 1. On the navigation bar, click Restore. 2. Select the data you want to restore. 3. On the Properties pane, under Source, click Resource Credentials. 4. Select the resource whose logon account you want to edit. 5. Click Change. 6. Select the logon account you want to use for this backup selection, or click New and create a new logon account (see “Creating a Backup Exec Logon Account” on page 366). 7. Click OK. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Redirecting a Restore Operation” on page 452

Using Advanced File Selection to Restore Advanced file selection allows you to quickly select files or clear selections for restore operations by specifying file attributes. With this feature you can:





Include or exclude files by filename extensions. You could select only files with *.txt extensions, or exclude files with *.exe extensions from a restore operation.



Select only files that fall within a specified date range. You could select files that were created or modified during the month of December.

To select files using Advanced File Selection: 1. On the navigation bar, click Restore. 2. Click Advanced.

446

Administrator’s Guide

Advanced File Selection dialog box

3. Select the appropriate options as follows: Advanced Restore Selections Item

Description

Media Specification Media

Select the media that contains the files you want to restore.

File Specification Backup Set

Select the backup set for which you want to specify attributes.

Path

Enter any available directory or subdirectory. Enter the full path to the subdirectory.

File

Specify a filename to be included or excluded. The default for this field is *.*, which means every file name with every extension is selected. Wildcard characters are permitted. The asterisk (*) in a file name or extension is a wildcard character that represents all characters occupying any remaining position in the file name or extension. For example, to specify all files with the .EXE extension, type *.EXE The question mark symbol (?) wildcard for a single character is also supported as well as use of a double asterisk (**) to represent any number of characters, irrespective of any backslashes.

Chapter 8, Restoring Data

447

Restoring Data

Selecting Data to Restore

Selecting Data to Restore Advanced Restore Selections (continued) Item

Description

Include Subdirectories

When this option is selected, all subdirectories (and their contents) in the path you have entered are included in (or excluded from) the operation. If you want to process only the directory listed in the Path field, leave this option unchecked.

Type Include

(Default) Select this option to include the files in the operation.

Exclude

Select this option to exclude files from the operation.

Selection Criteria Files Dated

Include or exclude the files created or modified during the specified time period.

4. If you expand the view for the resource from which you included (or excluded) files, you will see check marks in the directories that contain files meeting the criteria you specified. 5. Submit the operation using the same procedures required for other restore operations. See also: “Restoring Data to a Server or Workstation” on page 419 “Redirecting a Restore Operation” on page 452

448

Administrator’s Guide

Searching for Files to Restore You can search the catalog to easily find files that you want to restore, or to make sure that you have backups of certain files. This feature also allows you to see all cataloged, backed up versions of a file, so you can restore earlier versions if you need to. You can also use this feature to make sure that you have multiple copies of a file before removing it with an archive operation. ▼

To search the catalog: 1. On the Edit menu, click Search Catalogs. The Search Catalog dialog box appears. The Catalog Search box contains two tabs: the Name and Location and the Date Modified. 2. Select which method you want to use for searching catalogs: -

To search for a file by name and location, select the Name and Location tab and complete the options described in“Name and Location Options for Catalog Search” on page 450.

-

To search for files by date modified, select the Date Modified tab.

3. Click Find Now. Click Stop to halt the search, or New Search to search for another file. The Catalog Search results window appears. All of the backed up versions of the file appear in the Catalog Search window. Expand a file to view the file’s properties. To sort the listings by filename, size, type or date modified, click the appropriate column heading. 4. Check the version of the file you want to restore and click Restore from the toolbar. The Restore Job window opens. 5. Submit the job using the same procedures required for other restore jobs. Backup Exec will prompt you to insert the correct media if it is not already located in a drive. See also: “Restoring Data to a Server or Workstation” on page 419

Chapter 8, Restoring Data

449

Restoring Data

Selecting Data to Restore

Selecting Data to Restore

Name and Location Options for Catalog Search To display the Name & Location dialog box, on the Edit menu, click Search Catalogs. Search Catalog dialog box

Options on this dialog box include: Name and Location fields Item

Description

Location

The server and share in which to search. If you do not want to limit the search to a particular location, leave this field blank to search all locations.

Path

The directory in which to search. If you do not want to limit the search to a particular directory, leave this field blank to search all directories. To search NetWare catalogs, use a forward slash (/).

450

File Name

The name of the file to be searched. If you do not want to limit the search to a particular file, leave this field blank to search all files.

Media

The cataloged media to search. You can select All Cataloged Storage Media to search the entire catalog, or you can select individual media to narrow the search.

Find directories

Select this option to search for directories listed in the Path or File name fields.

Include subdirectories

Select this option to search all subdirectories below the directory listed under the Location field.

Administrator’s Guide

Date Modified Options for Catalog Search To search for files by date modified, on the Search Catalogs dialog box, select the Date Modified tab. Date Modified tab

Options on this dialog box include: Date Modified options Item

Description

All Files

This option allows you to search for all files.

Find all files created or modified

Select this option to search only for files that have been created or modified in a specified time period.

Between x/x/x and x/x/x

Click this option and enter specific dates by month, day, and year.

During the previous x month(s)

Click this option if you want to restrict the search to the previous month or months. You specify the number of months.

During the previous x day(s)

Click this option if you want to restrict the search to the previous day or days. You specify the number of days.

Chapter 8, Restoring Data

451

Restoring Data

Selecting Data to Restore

Redirecting a Restore Operation

Restore Operations and Media Libraries For restore operations, Backup Exec accesses the source media (if it is contained in the magazine) regardless of its sequential placement in the magazine. For example, if the data specified for a restore operation resides on two media in the magazine, the media do not have to be placed in adjacent slots for Backup Exec to restore the data. Backup Exec’s ability to randomly access media in this manner minimizes the amount of administrator attention required at the media server. If Backup Exec does not find the media required for the restore operation in the robotic library (or other accessible storage devices), an alert is issued requesting the media necessary to complete the operation.

Redirecting a Restore Operation Backup Exec defaults to restoring data to the resource from which the data originated. By using the Restore Job Properties - Redirection dialog boxes, you can restore data to any protected server, share, or Backup Exec agent workstation. ▼

To redirect a file set operation: 1. On the navigation bar, click Restore. 2. Select the data to be restored (see “Selecting Data to Restore” on page 444). 3. On the Properties pane, under Destination, click File Redirection.

452

Administrator’s Guide

Redirect file sets

4. Select the appropriate options as follows: Files destination options Item

Description

Redirect file sets

Click this option to specify target paths or resources other than where the data was originally backed up.

Restore to drive

Select the destination for the restored data. Click the Browse button (...) to view local and network drives.

Chapter 8, Restoring Data

453

Restoring Data

Redirecting a Restore Operation

Redirecting a Restore Operation Files destination options (continued) Item

Description

Server logon account

The current logon account being used by the server appears. If you need to use another logon account, click Change, and then select or create another account (see “Configuring Logon Accounts” on page 363). Click Clear to clear this field.

Restore to path

Specify the target path on the device listed in the Restore to Drive field. If you want to retain the original directory structure, make sure that the Preserve Tree option is selected in the Restore Job Properties - Settings - General dialog box. If the Preserve tree option is not selected, all of the data will be restored to the path designated in this field.

Path logon account

Enter the logon account required for the target path. If you need to use another logon account, click Change, and then select or create another account. Click Clear to clear this field. Note If you are using BEWAC, you can only choose a pre-defined logon account. You cannot create or edit a logon account.

Note Entering a name of an agent drive (Win98, Mac, UNIX) that does not appear in the Restore to drive list box causes the agent restore operation to fail. To resolve this, click Browse, and open the Remote Selections window. After Backup Exec detects the agent, the agent shares will appear in the Restore to drive list and the restore operation can be attempted again. 5. If you want to run the job now, click Run Now. Otherwise, in the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). See also: “Preserve tree” on page 427 “Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media” on page 455 “Redirecting Restores for SQL 2000” on page 1032 “Redirecting SharePoint Portal Server Restore Jobs” on page 1347

“Scheduling Jobs” on page 374

454

Administrator’s Guide

Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media When you want to install a new Windows Server 2003 Server Domain Controller into an existing domain, the Active Directory and SYSVOL data are replicated from the existing Domain Controller that is in the domain to the new Domain Controller. If there is a large amount of data to be replicated or if the connection between the Domain Controllers is slow or intermittent, the replication time can be lengthy. The Active Directory Application Mode replication time is also affected by the amount of data to be replicated and the connection speed. To decrease the replication time for Active Directory and Active Directory Application Mode, you can use the Install from Media feature. For Active Directory, you can use the Install from Media feature to perform a System State backup of an existing Domain Controller in the domain in which you want to add a new Domain Controller. Then, you can perform a redirected restore of the data from the System State backup to the target Domain Controller. For Active Directory Application Mode, you can back up data using the AD/AM Writer. Then, you can perform a redirected restore of the data from the AD/AM backup to the target system. ▼

To install Active Directory using the Install from Media feature: 1. Perform a standard System State backup of an active Windows Server 2003 Server Domain Controller that is in the target domain. 2. Transport the tape to the location of the system that will be installed into the target Domain. Caution The tape is not encrypted or protected. Use caution when transporting it to the location of the target domain. 3. Inventory the drive where the tape is loaded. 4. Catalog the tape. 5. Perform a redirected restore of the System State backup to a temporary location on a volume or directory on the target system. On the Properties pane, under Destination, click File Redirection. And then select redirection options.

Chapter 8, Restoring Data

455

Restoring Data

Redirecting a Restore Operation

Redirecting a Restore Operation

Note When you redirect restored data, Backup Exec creates a sub-directory for each type of System State data being restored. Backup Exec creates the following sub-directories: Active Directory, SYSVOL, Registry, Boot Files, COM+ Class Registration Database, Certificate Server (if installed), and Cluster Quorum (if installed). 6. To begin the Domain Controller installation, click Start on the target system, and then click Run. 7. Type dcpromo /adv 8. Click OK. 9. Click Next when the Active Directory Installation Wizard appears. 10. Select Additional domain controller for an existing domain. 11. Click Next. 12. Select From these restored backup files, and then enter the temporary location to which you redirected the System State data in step 5. 13. Click Next. 14. Complete the Active Directory Installation Wizard by following the prompts on the screen. 15. Complete the Domain Controller installation. 16. Reboot the system that has the new Domain Controller. 17. Delete any remaining temporary redirected System State files. For more information, refer to your Microsoft documentation. See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Inventorying Media in Devices” on page 171 “Cataloging Media in a Drive” on page 413 “Redirecting a Restore Operation” on page 452

456

Administrator’s Guide

Setting Restore Defaults The default options for all restore jobs are set through the Options - Set Application Defaults dialog box. Configure these items to match the settings that you want to use for most restore operations. You can override these defaults while setting up a restore operation, if necessary. ▼

To set application defaults for restore jobs: 1. On the Tools menu, select Options. 2. On the Properties pane, under Job Defaults, click Restore. Default restore options

Chapter 8, Restoring Data

457

Restoring Data

Setting Restore Defaults

Setting Restore Defaults

3. Select the appropriate options as follows: Restore default options Item

Description

Restore existing files Restore over existing files

Select this option to have Backup Exec overwrite files on the target resource that have the same name as files that are being restored. Use this option only when you are sure that you want to restore an older version of a file (or files).

Skip if file exists

Select this option to prevent Backup Exec from overwriting files on the target disk with files that have the same names that are included in the restore operation.

Skip if existing file is more recent

Select this option to prevent Backup Exec from restoring over files that exist on the target resource if they are more recent than the files included in the restore operation. This option is useful if you are rebuilding a system. For example, after installing the operating system on a crashed computer, you could restore a previous full backup of the system without worrying about overwriting later versions of operating system files.

Restoring corrupt files Restore corrupt files

Backup Exec will automatically exclude corrupt files from the restore process unless you select this option.

Caution Corrupt files, which appear in the restore selections window with a red X, could be incomplete files. Restoring corrupt files could result in corrupt data. VERITAS recommends performing redirected restore of corrupt files rather than restoring to the original location.

458

Administrator’s Guide

Restore default options (continued) Item

Description

Junction Points Restore junction points, When this option is selected, the information for the junction files and directories from points and the files and directories to which they are linked is backup media restored. Selecting this option overwrites existing junction points on your system. If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see “Back up files and directories by following junction points” on page 324), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter. Preserve existing junction points and restore files and directories from backup media

Select this option to restore files and directories backed up from junction point links while retaining the system's current junction points. This option keeps current junction points from being overwritten with the junction point information restored from the backup media. When this option is selected and identical junction points or directory names exist on both the target system and the media, the files and directories are restored to the target system's junction point or directory. Note If a junction point or directory does not already exist in the same location and with the same name as the junction point to be restored, then the information for the junction point and the files and directories to which they point will be restored. If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see “Back up files and directories by following junction points” on page 324), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter.

See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420

Chapter 8, Restoring Data

459

Restoring Data

Setting Restore Defaults

Specifying the Restore Network

Specifying the Restore Network By default, Backup Exec will restore data using the default network information set through the Tools menu by selecting Options, and then selecting Network (see “Specifying the Default Backup Network” on page 334). You can, however, specify the local network to be used for a restore job. Isolating the restore job to a specific network ensures other connected critical networks are not affected when the restore job is being processed. ▼

To specify network information for a restore job: 1. On the navigation bar, click Restore. 2. Select the data to be restored (see “Selecting Data to Restore” on page 444). 3. On the Properties pane, under Settings, click Network. Restore Job Properties - Network options

460

Administrator’s Guide

4. Select the appropriate options as follows: Network options for restore job Item

Description

Restore Network Network Interface

Select the name of the network interface card that connects the media server to the network you want to use for the backup network. The list includes all available network interface cards on the media server.

IP address

Displays the IP address for the server.

Subnet mask

Displays the address of the network you selected as the restore network.

Network ID

Displays the 32-bit number that determines the subnet to which the network interface card belongs.

Physical address

Displays the network identification or subnet address that Backup Exec calculated based on the network you selected as the restore network.

Use any available network route for remote agents not bound to the above Network ID

Select this option if you want Backup Exec to attempt to connect using any available network route if a connection cannot be made using the specified network. If you do not select this option, and Backup Exec cannot connect using the specified network interface, the restore job will fail.

5. Continue selecting options for the restore job. 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see “Scheduling Jobs” on page 374). See also: “Restoring Data to a Server or Workstation” on page 419 “Specifying Backup Networks” on page 332

Chapter 8, Restoring Data

461

Restoring Data

Specifying the Restore Network

Canceling a Restore Operation

Canceling a Restore Operation Note Canceling a restore job while it is in progress will result in unusable data, and may leave the drive in an unusable state. You may want to redirect the restore to a noncritical target, and then copy the data to a final destination when the job completes successfully. You should not cancel a System State restore operation. Canceling this operation could leave the system unusable. ▼

To cancel a restore operation: 1. On the navigation bar, click Job Monitor. 2. Under Current Job View Filters, ensure Show active jobs is selected. 3. Select the restore job you want to cancel. 4. Under Active Job Tasks in the task pane, select Cancel. 5. Select Yes when prompted to confirm the cancellation of the job. See also: “Deleting Scheduled Jobs” on page 393

462

Administrator’s Guide

Catalog Icon Definitions Following are icons that can appear in the restore selections. This list can help you identify the type of data you are selecting to restore.

Backup media used for backup jobs.

Backup media is part of a multi backup media set.

A set/resource contained on the backup media.

A set that has been partialized.

A set that contains corrupt data.

A set containing a single SQL database backup.

A set containing a SQL database that has been partialized to remove details of the set.

A set containing a SQL database that is corrupt on the backup media.

A set containing associated transaction logs for a SQL database.

A set containing associated transaction logs for a SQL database that has been partialized.

Chapter 8, Restoring Data

463

Restoring Data

Catalog Icon Definitions

Catalog Icon Definitions

A set containing associated transaction logs for a SQL database that are corrupt on the backup media.

An Exchange Information store set.

An Exchange Information store set that has been partialized to remove details from the catalog.

An Exchange Information store set that is corrupt on the backup media.

An Exchange Information store transaction log set.

An Exchange Information store transaction log set that has been partialized.

An Exchange Information store transaction log set that is corrupt on the backup media.

An Exchange Directory store set.

An Exchange Directory store set that has been partialized.

An Exchange Directory store set that is corrupt on the backup media.

An Exchange Directory store transaction log set.

An Exchange Directory store transaction log set that has been partialized.

464

Administrator’s Guide

An Exchange Directory store transaction log set that is corrupt on the backup media.

An Exchange Mailbox set.

An Exchange Mailbox set that has been partialized.

An Exchange Mailbox set that is corrupt on the backup media.

An Exchange Mailbox transaction log set.

An Exchange Mailbox transaction log set that has been partialized.

An Exchange Mailbox transaction log set that is corrupt on the backup media.

An Exchange 2000 store set.

An Exchange 2000 store set that has been partialized.

An Exchange 2000 store set that is corrupt on the backup media.

An Exchange 2000 store transaction log set.

An Exchange 2000 store transaction log set that has been partialized.

Chapter 8, Restoring Data

465

Restoring Data

Catalog Icon Definitions

Catalog Icon Definitions

An Exchange 2000 store transaction log set that is corrupt on the backup media.

An Exchange 2000 directory store set.

An Exchange 2000 directory store set that has been partialized.

An Exchange 2000 directory store set that is corrupt on the storage media.

An Exchange 2000 directory store transaction log set.

An Exchange 2000 Directory store transaction log set that has been partialized.

An Exchange 2000 Directory store transaction log set that is corrupt on the storage media.

The backup set is incomplete because the backup job was aborted. Review the backup job logs for additional information.

The backup set is incomplete because the backup job failed. Review the backup job logs for additional information.

The Utility partition backup set is corrupt on the storage media. Review the backup job logs for additional information.

A Shadow Copy backup set.

A Shadow Copy backup set that has been partialized.

466

Administrator’s Guide

A Shadow Copy backup set that is corrupt on the backup media.

A System State backup set.

A System State backup set that has been partialized.

A System State backup set that is corrupt on the storage media.

A Service State set.

A Service State set that has been partialized.

A Service State set that is corrupt on the backup media.

A User-defined Share backup set.

A User-defined Share backup set that has been partialized.

A User-defined Share backup set that is corrupt on the backup media.

An undefined (other) backup set.

Chapter 8, Restoring Data

467

Restoring Data

Catalog Icon Definitions

Catalog Icon Definitions

468

Administrator’s Guide

Any event that occurs in Backup Exec that is important enough to present a message to the user or requires a response from the user is an alert. There are 35 alert categories that originate from system, job, media, or device sources. Each alert category may contain one or more events that can generate the alert. Each alert category is also provided with an alert type. The alert type and corresponding colored icon can help you quickly determine the severity of the alert. Backup Exec includes the following alert types: ◆

Attention required - a green icon



Errors - a red icon



Warnings - a yellow icon



Informational - a blue icon

The majority of Backup Exec alerts are enabled by default and automatically display. However, three alert categories are disabled by default: Backup job contains no data, Job Start and Job Success. You can modify alert categories to enable or disable the alerts when you configure alert categories, but attention required and error alerts cannot be disabled. The alert type icons that appear with the alert categories appear shaded in the Alert Categories dialog box for disabled alerts. Alerts remain active in the system until you enter a response, or you can configure the alert category property to automatically clear the alert after a specified length of time. Depending on the alert type, it may not be necessary to respond to the alert to continue with operations. After you respond to an alert, it is moved to the alert history, where the alert remains for the length of time you choose to keep it in the Backup Exec database or until you delete it. Notifications can be configured to notify recipients when alerts occur. To use notifications you must perform the following: ◆

You must first configure the methods you want to use to notify the recipient. The methods of notification are MAPI, SMTP, or VIM (Lotus Notes) e-mail and native and alphanumeric pager configurations. Printer and Net Send notification methods do not require pre-configuration.

469

Alerts and Notifications

9

Alerts and Notifications

Viewing and Filtering Alerts ◆

The second step is to configure recipients. Recipients are individuals, computer consoles, printers, or groups and can be configured to use one or more of the notification methods.



The last step is assigning the recipients to alerts or jobs for notification.

See also: “Responding to Active Alerts” on page 475.

Viewing and Filtering Alerts Alerts appear in Backup Exec when the system needs administrator attention. By default, Backup Exec displays all enabled alerts; however, when you select an alert view, you can choose filters to limit the type of alerts that appear in the pane. Backup Exec has two views for alerts: Active alerts and Alert history. Active alerts display the alerts that are active in the system and need a response from the operator. Alert history displays alerts that have been responded to or alerts that have been automatically cleared from the system. ▼

To view alerts in the Active alerts or Alert history pane: ❖

470

On the navigation bar, click Alerts and then under Views in the task pane, click the type of alerts you want to view, either Active alerts or Alert history.

Administrator’s Guide

Viewing and Filtering Alerts Alerts view

Alerts and Notifications

The information that appears for each alert includes the following: -

Type of alert

-

Category

-

Message displayed by the alert

-

Job Name

-

Device Name

-

Media server on which the alert occurred

-

Source of the alert

-

Time the alert was received

Values, properties, and alert messages for the selected alert also appear in the Active Alert or Alert History Properties pane at the bottom of the view.

Chapter 9, Alerts and Notifications

471

Viewing and Filtering Alerts ▼

To set View Filters for Active alerts and Alert history: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click the view for which you want to set filters, either Active alerts or Alert history. 3. Under View Filters in the task pane, select or clear the filters for the alerts you want to appear in the selected view. The following types of alert filters can be selected for the Active alerts and Alert history views. Alert View Filters Item

Description

Show attention required

Lists alerts that require a response from the user.

Show errors

Lists system, job, media, and device error alerts.

Show warnings

Lists system, job, media, and device warning alerts.

Show information

Lists system, job, media, and device information alerts.

Show system alerts

Lists the alerts that originated from the system.

Show media alerts

Lists the alerts that originated from media.

Show device alerts

Lists the alerts that originated from devices.

Show job alerts

Lists the alerts that originated from a job.

See also: “Responding to Active Alerts” on page 475

472

Administrator’s Guide

Viewing Alert Properties

Viewing Alert Properties



To view alert properties: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts or Alert history, depending on where the alert for which you want to view properties is located. 3. Select the alert from either the Active Alerts or Alert History pane. 4. Under General Tasks in the task pane, click Properties. The Alert Properties dialog box provides the following items: Alert Properties Item

Descriptions

Category

The title of the alert.

Type

The severity of the alert. The type helps you determine how quickly you want to respond. Following are the alert types: Š

Errors

Š

Warnings

Š

Information

Š

Attention Required

Server

Name of the media server on which the alert occurred.

Device

Name of the device on which the alert occurred.

Job Name

The name of the job associated with the alert.

Time alert received

Date and time the alert occurred.

Chapter 9, Alerts and Notifications

473

Alerts and Notifications

Alert properties provide detailed information about each alert. In addition to the alert properties information, you can view category properties and response information, if the alert is in the alert history.

Viewing Alert Properties Alert Properties (continued) Item

Descriptions

Source

The cause of the alert. Alerts can originate from one of the following sources:

SNMP trap Identification

Š

System

Š

Job

Š

Media

Š

Device

The SNMP message from Backup Exec regarding status and error conditions.

Properties of Category Enabled

The alert is activated or disabled.

Send notifications

Notifications are enabled or cleared for the alert. Recipients must be configured in order to use this option.

Send SNMP notifications

SNMP notifications are enabled or cleared for the alert. SNMP must be installed to use this option.

Record in event log

The alert is entered into the Windows Event Viewer. The Windows Event log displays all the property information for the alert. If a link appears in the Windows Event log you can search the VERITAS Technical Support web site for information about the Event ID.

Event ID

The alert’s ID in the Windows Event Viewer.

Automatically clear

Number of hours the alert remains active with no response attempted before it is moved to the alert history.

Include job log

Sends the job log to the recipient configured for notification. This option can only be used for recipients that are configured for e-mail or printer notification.

Response (Alert History Properties

474

User who responded

User ID that responded to the alert.

Response machine

Name of the computer from which the user responded.

Time user responded

Date and time the user responded to the alert. Administrator’s Guide

Responding to Active Alerts Alert Properties (continued) Descriptions

User response

The response the user entered for the alert.

Alerts and Notifications

Item

5. After you view the alert properties, click OK. See also: “Configuring Alert Category Properties” on page 479 “Configuring Recipients” on page 488 “Configuring SNMP Notification” on page 511

Responding to Active Alerts You can respond to active alerts and depending on the alert condition, continue or cancel the operation. By default, Backup Exec displays all enabled alerts. If you have set View Filters (see “Viewing and Filtering Alerts” on page 470), only those alerts that are selected appear. ▼

To respond to an active alert: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts. 3. Select the alert to which you want to respond, and then under Alert Tasks in the task pane, click Respond. Note If you have more than one alert selected, click Respond OK to all to clear the selected alerts to the alert history. The alerts must have an OK response available to be automatically cleared. The alert dialog box appears. If you click Close, you will close the dialog box, but the alert remains active. To clear the alert and move it to the alert history, you must select a response such as OK, Yes, No, or Cancel from the alert dialog box.

Chapter 9, Alerts and Notifications

475

Viewing the Job Log for Alerts

The alert dialog box provides the following information: Alert Options Item

Description

Category Name

The title of the alert.

Message

Describes the event that caused the alert and provides suggestions for responding to the alert.

Server name

The name of the computer on which the alert occurred.

Device name

The name of the device on which the alert occurred.

Job name

The job associated with the alert.

Time

The date and time the alert occurred.

Automatically display new alerts

Select this check box to have alerts automatically appear in the Backup Exec console when they are sent. If you do not select this option, you must respond to alerts through the Active Alerts pane. For more information, see “Changing Default Preferences” on page 91.

4. Click a response for the alert. After the alert condition is resolved, the alert is moved to the Alert history.

Viewing the Job Log for Alerts A job log provides detailed job information, device and media information, job options, file statistics, and job completion status for completed jobs. You can view the job log for job-related alerts from either Active alerts or Alert history, depending on where the alert is located. ▼

To view the job log: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts or Alert history, depending on where the alert for which you want to view the job log is located.

476

Administrator’s Guide

Viewing the Job Log for Alerts

3. Select the alert for which you want to view the job log from either the Active Alerts or Alert History pane.

-

If the alert is in Active alerts, under Alert Tasks in the task pane, click View job log.

-

If the alert is in the Alert history, under Alert History Tasks, click View job log.

5. To print the job log, click Print. You must have a printer attached to your system and configured in order to print the log. 6. After you have finished viewing the job log, click OK. See also: “Viewing Completed Jobs” on page 394

Chapter 9, Alerts and Notifications

477

Alerts and Notifications

4. Perform one of the following:

Clearing Informational Alerts from the Active Alerts Pane

Clearing Informational Alerts from the Active Alerts Pane Informational alerts can originate from the system, jobs, media, or devices. The alerts are set by default to move to the alert history after 24 hours; however, some informational alerts appear frequently and fill the Active alerts pane. You may want to clear these informational alerts to the Alert history pane before they are automatically moved by the system. ▼

To clear informational alerts from the Active alerts pane: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts. 3. Under Alert Tasks in the task pane, click Clear all informational alerts. All the informational alerts in the Active alerts pane are cleared to the Alert history.

Enabling or Disabling Alerts from the Active Alerts Pane You can quickly enable or disable alerts from the task pane instead of configuring them in the alert configuration dialog box. ▼

To enable or disable an alert from the Active Alerts pane: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts. 3. On the Active Alerts pane, select the alert that you want to enable or disable. 4. Under Alert Tasks in the task pane, click Alert category enabled. The alert will be enabled or disabled, depending on the current setting. The error and attention required alert types cannot be disabled.

478

Administrator’s Guide

Configuring Alert Category Properties

Configuring Alert Category Properties



To view or change alert category properties: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Alert Tasks in the task pane, click Configure alert categories.

3. Under Alert Categories, click the alert for which you want to view or change properties. Tip

You can change the options for more than one alert category simultaneously. To select consecutive alert categories, click the first alert, press and hold down <Shift>, and then click the last item. To select alert categories that are not consecutive, press and hold down , and then click each item.

Chapter 9, Alerts and Notifications

479

Alerts and Notifications

You can configure alert categories to enable or disable alerts and determine the type of actions that will be initiated when an alert occurs. Each time you change the alert configuration, it is recorded in the audit log. You can view the audit log at any time to view the changes made to the alert category.

Configuring Alert Category Properties

4. Under Category Properties, select the appropriate options as follows: Alert Category Properties Item

Description

Category name

The title of the alert. This property can be viewed, but not edited.

Enable alerts for this category

Select this check box to activate or disable the alert. You cannot disable alert types such as error and attention required. You can also enable an alert category from the task pane. For more information, see “Enabling or Disabling Alerts from the Active Alerts Pane” on page 478.

Send notifications to selected recipients

Select this check box to send notifications when an alert occurs. You must have recipients configured to use this option. To configure recipients to receive the notification, click Recipients. For more information, see “Configuring Recipients” on page 488.

Include job log with a notification to an e-mail or printer recipient

Select this check box to send the job log to the recipient configured for notification. The recipient must be configured to receive e-mail or printer notifications.

Send SNMP Notifications Select this check box to enable SNMP notifications. SNMP must be installed to use this option. For more information, see “Configuring SNMP Notification” on page 511. Record event in the Windows Event Log

Select this check box to enter the alert into the Windows Event Viewer. The Windows Event log displays all the property information for the alert. If a link appears in the Windows Event log you can search the VERITAS Technical Support web site for information about the Event ID.

Automatically clear after x hours/minutes

Select this check box to enter the number of minutes or hours you want the alert to remain active before it is moved to the Alert history. For attention required alerts, you can set a default response. For more information, see “Edit Server Configurations” on page 823.

480

Administrator’s Guide

Configuring Alert Category Properties

5. Click Apply to apply the properties to the alert and continue configuring additional alerts.

Alerts and Notifications

6. Click OK to exit the Alert Configuration dialog box. See also: “Assigning Recipients to Alert Categories for Notification” on page 508

Viewing and Clearing the Audit Log You can view the audit log to determine the type of changes that were made to the category properties for alerts. The audit log displays the date and time the change was made, the user that made the change, and the information that was changed. The audit log entries can be viewed, but not edited; however, you can clear all the entries in the log. ▼

To view or clear the audit log: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Alert Tasks in the task pane, click Configure alert categories. 3. Under Alert Categories, click Audit Log.

Chapter 9, Alerts and Notifications

481

Deleting Alerts from the Alert History

The Alerts Audit Log dialog box provides the following information: Alerts Audit Log Item

Description

Date/Time

The date and time the change was made to the alert’s category properties.

User Name

The user ID that made the change to the alert’s category properties.

Message

The name of the alert category to which the change was made.

4. Click Refresh to update the audit log with new entries. 5. Click Clear to remove all entries from the audit log. 6. Click Close.

Deleting Alerts from the Alert History Alerts that have been responded to or automatically cleared from the system are kept in the Alert history. All alerts are displayed, except for entries that have been filtered and selected for exclusion. The alerts remain in the Alert history for the length of time you set in the database maintenance option or until you delete the alert. ▼

To delete an alert from the Alert history: 1. On the navigation bar, click Alerts. 2. Under Views in the task pane, click Alert history. 3. Select the alert you want to delete, and then under Alert History Tasks in the task pane, click Delete. 4. Click Yes to confirm that you want to delete the alert. The alert is removed from the Backup Exec database. See also: “Configuring Database Maintenance” on page 405

482

Administrator’s Guide

Configuring E-mail and Pager Notification Methods

Configuring E-mail and Pager Notification Methods

You can configure notification methods for SMTP, MAPI, or Lotus Notes e-mail, and native and alphanumeric pager configurations. Printer and Net Send are also methods of notification, but they do not require you to configure them before creating and configuring a recipient. Configuring the notification method is the first step in assigning recipients to alert categories for notification. After configuring the notification method, the next step is to create recipients and assign a notification method by which the recipient will be notified of an alert. The recipient can then be assigned to an alert category for notification when an alert occurs. See also: “Configuring Recipients” on page 488 “Assigning Recipients to Alert Categories for Notification” on page 508

Configuring SMTP E-Mail for Notification You must have an SMTP-compliant e-mail system such as a POP3 mail server to receive alert notification messages using the SMTP notification method. ▼

To configure the SMTP e-mail notification method: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.

Chapter 9, Alerts and Notifications

483

Alerts and Notifications

Backup Exec has several methods for notifying you of alerts that occur during operations. The notification methods enable you to determine the means by which a recipient will receive a notification.

Configuring E-mail and Pager Notification Methods SMTP configuration dialog box

3. Click the SMTP Configuration tab and select the appropriate options as follows: SMTP Configuration dialog box Item

Description

Enable

Select this check box to activate the notification method.

SMTP mail server

Type the name of an SMTP mail server on which you have a valid user account. Backup Exec will not check the server name or the e-mail address for validity.

SMTP port

Defaults to a standard SMTP port. In most cases, the default should not have to be changed.

Default sender

Type the e-mail address of the user from whom the notification message will be sent. The e-mail address should contain a name that identifies the user to the mail server, followed by an at sign (@) and the host name and domain name of the mail server. For example, [email protected].

4. Click OK. See also: “Configuring Recipients” on page 488

484

Administrator’s Guide

Configuring E-mail and Pager Notification Methods

Configuring MAPI E-Mail for Notification

Note If you install Outlook after installing Backup Exec, you must stop and restart the Backup Exec services for MAPI e-mail notification to work and in order to save the MAPI configuration settings. ▼

To configure MAPI alert notification: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure e-mail and pagers. MAPI configuration dialog box

3. Click the MAPI Configuration tab and select the appropriate options as follows: MAPI Configuration dialog box Item

Description

Enable

Select this check box to activate the notification method.

Mail server name

Type the name of the Exchange server. You must use an Exchange server to which the Backup Exec service account has access. For more information, see “Changing Windows Security” on page 46.

Chapter 9, Alerts and Notifications

485

Alerts and Notifications

You must have a MAPI-compliant e-mail system such as Microsoft Exchange to receive alert notification messages using the MAPI notification method.

Configuring E-mail and Pager Notification Methods MAPI Configuration dialog box (continued) Item

Description

Mailbox name to send e-mail from

Type the mailbox from whom the notification message will be sent, for example, John Smith. The name appears in the From field in the message and does not require a full address. Note The Backup Exec services must be running under a domain account that has rights to the Exchange mailbox used for MAPI notification in order to save the MAPI configuration settings.

4. Click OK. See also: “Configuring Recipients” on page 488

Configuring VIM E-Mail for Notification You must have a VIM (Lotus Notes) compliant e-mail system to receive alert notification messages using the VIM notification method. ▼

To configure VIM alert notification: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.

486

Administrator’s Guide

Configuring E-mail and Pager Notification Methods VIM configuration dialog box

Alerts and Notifications

3. Click the VIM Configuration tab and select the appropriate options as follows: VIM Configuration dialog box Item

Description

Enable

Select this check box to activate the notification method.

Notes client directory

Type the path of the directory in which the Notes client is located.

Mail password

Type the password that enables you to connect to the Notes client.

Confirm mail password

Re-type the password that enables you to connect to the Notes client.

4. Click OK. See also: “Configuring Recipients” on page 488

Configuring a Pager for Alert Notification You can configure Backup Exec to page you with alert notification messages. You must have a modem set up on your system in order to use the pager notification method. You must be sure that the modem you are using can communicate properly with your paging service in order for pager notification to work properly. Before you set up pager notification, contact your paging service for information about the recommended brand of modem to use with your paging service.

Chapter 9, Alerts and Notifications

487

Configuring Recipients

1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure e-mail and pagers. The Notification Configuration Properties dialog box appears. 3. Click the Pager Configuration tab and select Enable to activate this alert notification method. Pager Configuration dialog box

4. Select a modem from the Select a modem for sending pages option. Only modems recognized in Windows appear in the list box. 5. Click OK.

Configuring Recipients Recipients are individuals with a predefined notification method, computer consoles, printers, or groups. Recipient configuration consists of selecting a notification method and defining notification limits. After you create entries for the recipients, you can assign them to alerts or jobs. The following types of recipients can be configured for notifications:

488



Person. An individual that has a predefined method of notification such as SMTP, MAPI, or VIM e-mail, or a pager. You must configure the notification method before you can enable it for the recipient.



Net Send. A computer that serves as a notification recipient.



Printer. A specific printer to which notifications can be sent.

Administrator’s Guide

Configuring Recipients ◆

Group. A group of one or more recipients, including person recipients, Net Send recipients, and other groups.

See also:

Alerts and Notifications

“Configuring E-mail and Pager Notification Methods” on page 483 “Assigning Recipients to Alert Categories for Notification” on page 508

Configuring SMTP Mail for a Person Recipient You can configure a person recipient to receive SMTP e-mail notification messages if you have configured the SMTP notification method. ▼

To configure SMTP mail for a person recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Person in the Recipient Type dialog box, and then click OK.

Chapter 9, Alerts and Notifications

489

Configuring Recipients SMTP Mail dialog box

4. In the Name field, type the name of the recipient that you want to configure. 5. Click the SMTP Mail tab and select the appropriate options as follows: SMTP Mail dialog box Item

Description

Enable

Select this check box to activate this notification method for the recipient.

Address

Type the e-mail address of the recipient to whom the notification message will be sent. For example, [email protected].

Test

Enables you to test the notification configuration for the recipient.

Limit the number of notifications sent Enable

490

Select this check box to activate the option.

Administrator’s Guide

Configuring Recipients SMTP Mail dialog box (continued) Description

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

6. Click OK. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508

Configuring MAPI Mail for a Person Recipient You can configure a person recipient to receive MAPI e-mail notification messages if you have configured the MAPI notification method. ▼

To configure MAPI mail for a person recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears.

Chapter 9, Alerts and Notifications

491

Alerts and Notifications

Item

Configuring Recipients

3. Click New, click Person in the Recipient Type dialog box, and then click OK. MAPI Mail dialog box

4. In the Name field, type the name of the recipient that you want to configure. 5. Click the MAPI Mail tab and select the appropriate options as follows: MAPI Mail dialog box

492

Item

Description

Enable

Select this check box to activate this notification method for the recipient.

Mailbox

Type the e-mail address or mailbox name of the recipient to whom the notification message will be sent. For example, [email protected] or John Smith.

Test

Enables you to test the notification configuration for the recipient.

Administrator’s Guide

Configuring Recipients MAPI Mail dialog box (continued) Item

Description

Enable

Select this check box to activate the option.

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

6. Click OK. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508

Chapter 9, Alerts and Notifications

493

Alerts and Notifications

Limit the number of notifications sent

Configuring Recipients

Configuring VIM Mail for a Person Recipient You can configure a person recipient to receive VIM e-mail notification messages if you have configured the VIM notification method. ▼

To configure VIM mail for a person recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Person in the Recipient Type dialog box, and then click OK. VIM Mail dialog box

4. In the Name field, type the name of the recipient that you want to configure.

494

Administrator’s Guide

Configuring Recipients

5. Click the VIM Mail tab and select the appropriate options as follows: VIM Mail dialog box Description

Enable

Select this check box to activate this notification method for the recipient.

Address

Type the e-mail address of the recipient to whom the notification message will be sent. For example, [email protected].

Test

Enables you to test the notification configuration for the recipient.

Limit the number of notifications sent Enable

Select this check box to activate the option.

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

6. Click OK. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508 Chapter 9, Alerts and Notifications

495

Alerts and Notifications

Item

Configuring Recipients

Configuring a Pager for a Person Recipient You can configure a person recipient to receive notification messages by pager if you have configured the pager notification method. ▼

To configure a pager for a person recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Person in the Recipient Type dialog box, and then click OK. Pager dialog box

4. In the Name field, type the name of the recipient that you want to configure.

496

Administrator’s Guide

Configuring Recipients

5. Click the Pager tab and select the appropriate options as follows: Pager dialog box Description

Enable

Select this check box to activate this notification method for the recipient.

Carrier Phone

Type the area code and phone number to access the paging service provider’s modem. The paging service number may be different from the number you enter to manually enter a page.

Country/region name and Enter the country or region name and country code in which the code pager is located. Pager Pin

Type the pager identification number provided by the paging service provider. You will have a pin if you use TAP services and in most cases, the number is the last seven digits of the pager’s phone number.

Advanced Pager setup options Advanced

Enables you to configure additional settings for the pager. For more information about the options, see “Advanced Pager Information dialog box” on page 498.

Test

Enables you to test the notification configuration for the recipient.

Limit the number of notifications sent Enable

Select this check box to activate the option.

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Chapter 9, Alerts and Notifications

497

Alerts and Notifications

Item

Configuring Recipients Pager dialog box (continued) Item

Description

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

6. Click Advanced to configure advanced pager setup options and select the appropriate options as follows: Advanced Pager Information dialog box Item

Description

Pager Configuration Password

Type the password for the pager, if one is required.

Message Length

Type the maximum number of characters you want to use for messages. The number is determined by the paging service provider.

Retrys

Type the number of times you want the paging service provider to retry the page. The number is determined by the paging service provider.

Pager type

498

Numeric

Select this option if you are configuring a pager that accepts only numbers.

Alpha-numeric

Select this option if you are configuring a pager that accepts letters and numbers.

Administrator’s Guide

Configuring Recipients Advanced Pager Information dialog box (continued) Item

Description

Modem Baud Rate

Select the speed of the modem. The speeds that appear are limits set by the paging service; select the appropriate speed regardless of the modem speed rating.

Data bits, Parity, Stop bit

Select the communication protocol. In most cases, you should use the Windows default.

7. Click OK to save the settings in the Advanced Pager Information dialog box, and then click OK to save the pager configuration settings. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508

Configuring a Net Send Recipient You can configure Net Send to send notification messages to a target computer or user. ▼

To configure a Net Send recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Net Send in the Recipient Type dialog box, and then click OK.

Chapter 9, Alerts and Notifications

499

Alerts and Notifications

Modem Configuration

Configuring Recipients Net Send Recipient Properties dialog box

4. Select the appropriate options as follows: Net Send Recipient Properties dialog box Item

Description

Name

Type the recipient for whom you are configuring the notification.

Target Computer or User Type the name of the computer or user to whom you are sending Name the notification. You should enter a computer rather than a user because the Net Send message will fail if the user is logged off the network.

500

All Computers

Select the check box to send the notification to all the computers in the network.

Test

Enables you to test the notification configuration for the recipient.

Administrator’s Guide

Configuring Recipients Net Send Recipient Properties dialog box (continued) Item

Description

Enable

Select this check box to activate the option.

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

5. Click OK. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508

Chapter 9, Alerts and Notifications

501

Alerts and Notifications

Limit the number of notifications sent

Configuring Recipients

Configuring a Printer Recipient You can select installed printers as a notification method for recipients; however, fax printer devices are not supported by Backup Exec. Only printers that were configured using the same username and password as the Backup Exec service account can be selected. ▼

To configure a printer recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Printer in the Recipient Type dialog box, and then click OK. 4. Click Printer, and then click OK. Printer Recipient Properties dialog box

502

Administrator’s Guide

Configuring Recipients

5. Select the appropriate options as follows: Printer Recipient Properties dialog box Description

Name

Type the recipient for whom you are configuring the notification. You cannot use a fax printer device to receive the notification.

Target Printer

Select the name of the printer to which the notification message will be sent.

Test

Enables you to test the notification configuration for the recipient.

Limit the number of notifications sent Enable

Select this check box to activate the option.

Notify me a maximum of x times within x minutes

Type the total number of notifications you want sent to the recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.

Reset the notification limits after x minutes

Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.

Limit when notifications can be sent Enable

Select this check box to activate the option and configure the length of time the recipient is available for notification.

Schedule

Enables you to select the days and times when notifications can be sent to the recipient. For more information, see “Scheduling Notification for Recipients” on page 505.

6. Click OK. See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508 Chapter 9, Alerts and Notifications

503

Alerts and Notifications

Item

Configuring Recipients

Configuring a Group Recipient Groups are configured by adding recipients as group members. A group contains one or more recipients and each recipient receives the notification message. Members of the group can be a combination of individual persons, computers, printers, or other groups. ▼

To configure a group recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Click New, click Group in the Recipient Type dialog box, and then click OK. Recipient Group Properties dialog box

4. In the Group Name field, type the group for whom you are configuring the notification. 5. To add members to the group, select recipients from the All Recipients list, and then click Add to move them to the Group Members list. 6. To remove members from the group, select recipients from the Group Members list, and then click Remove to move them to the All Recipients list.

504

Administrator’s Guide

Configuring Recipients

7. When you have completed the group, click OK. The new group can be added to other groups.

Alerts and Notifications

See also: “Editing Recipient Notification Methods” on page 506 “Editing Recipient Notification Properties” on page 506 “Assigning Recipients to Alert Categories for Notification” on page 508

Scheduling Notification for Recipients During the recipient configuration process, you can enable the Limit when notifications can be sent option to select the times of the day and the days of the week the recipient is available to receive the notification messages. You can modify the schedule after the recipient is configured by editing recipient notification properties. ▼

To configure the notification schedule for recipients during recipient configuration: 1. Under the Limit when notifications can be sent group box, click Enable to activate the option. 2. Click Schedule. Availability Schedule dialog box

3. Clear the Include work days check box to exclude Monday through Friday from 8 A.M. to 6 P.M. 4. Clear the Include weeknights check box to exclude Monday through Friday from 6 P.M. to 8 A.M. 5. Clear the Include weekends check box to exclude Saturday and Sunday, 24 hours a day. Chapter 9, Alerts and Notifications

505

Configuring Recipients

6. You can select any combination of Include work days, Include weeknights, or Include weekends, or click any single hour of the chart to select or clear that hour. 7. After selecting the days and times you want, click OK.

Editing Recipient Notification Properties You can edit the recipient notification properties at any time and change the recipient information, such as an e-mail address, telephone number or schedule. ▼

To edit the recipient notification properties: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 3. Select the recipient you want to edit, and then click Properties. The Recipient Properties dialog box for the type of recipient you selected appears. 4. Edit the properties for the selected recipient. You can edit any of the properties except for the recipient name in the Name field. To modify the recipient name, you must create a new recipient, and then delete the old one. 5. Click OK.

Editing Recipient Notification Methods You can configure new notification methods or edit existing notification methods after you configure recipients. ▼

To edit notification methods: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Assign recipients to alert categories. The Alert Notification Setup dialog box appears.

506

Administrator’s Guide

Configuring Recipients

3. Under Recipients, click Settings. The Notification Configuration Properties dialog box appears.

-

SMTP Configuration. See “SMTP Configuration dialog box” on page 484.

-

MAPI Configuration. See “MAPI Configuration dialog box” on page 485.

-

VIM Configuration. See “VIM Configuration dialog box” on page 487.

-

Pager Configuration. Click Enable to activate or clear the notification method, and then select a modem from the Configured Modems list.

5. Click OK.

Removing Recipients You can delete recipients that do not want to receive notification messages; however, the recipient is permanently removed upon deletion. If you want to keep the recipient, but do not want the recipient to receive notifications, clear the Enable check box in the recipient properties. ▼

To remove a recipient: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Configure recipients. The Alert Notification Setup dialog box appears. 3. Select the recipient you want to delete, and then click Remove.

Chapter 9, Alerts and Notifications

507

Alerts and Notifications

4. Edit notification properties for the following types of notification methods:

Assigning Recipients to Alert Categories for Notification

Assigning Recipients to Alert Categories for Notification You can assign recipients to alert categories to receive notification messages. When an alert occurs, all the recipients assigned to the alert category receive the notification message. You can also clear a recipient from an alert category and edit properties for the alert categories during the alert notification setup. ▼

To assign a recipient to an alert category: 1. On the navigation bar, click Alerts and then under Views in the task pane, click Active alerts. 2. Under Notification Tasks in the task pane, click Assign recipients to alert categories. Alert Notification Setup dialog box

3. Under Alert Categories, select the alert category to which you want to assign recipients. 4. Under Recipients, select the recipients you want to receive notification messages for the alert category, or click Check All to select all the recipients in the list. 5. Click OK.

508

Administrator’s Guide

Selecting Recipients for Job Notification ▼

To clear a recipient assigned to an alert category: ❖

To modify alert category properties: 1. Under Alert Categories, select the alert category you want to modify. You can select more than one alert category and the properties you modify will be applied to all the selected alert categories. 2. Click Properties. The Alert Category Properties dialog box appears. 3. Enter property information for the alert category. 4. Click OK. See also: “Configuring Alert Category Properties” on page 479 “Configuring E-mail and Pager Notification Methods” on page 483 “Configuring Recipients” on page 488

Selecting Recipients for Job Notification When you set up a new job, you can assign recipients to be notified when the job completes. You can also configure new recipients or edit existing recipients and add a job log to the notification message; however, the job log can only be added for recipients configured for e-mail or printer notification. ▼

To select recipients for notification when you set up a job: 1. Determine the type of job for which you want to configure notifications. The job dialog box appears that enables you to select properties for the job. 2. On the Properties pane, click Notification. 3. Select the recipients you want to assign to the job.

Chapter 9, Alerts and Notifications

509

Alerts and Notifications



Under Alert Categories, select the alert category from which you want to clear the recipient and then under Recipients, click the check box for the recipient you want to clear.

Selecting Recipients for Job Notification

4. If the recipient is using an e-mail or printer notification method, click Include job log with a notification to an e-mail or printer recipient. 5. You can start the job after configuring the notifications or select other options from the Properties pane. ▼

To configure new recipients or edit recipient properties when you set up a job: 1. Determine the type of job for which you want to configure new recipients or edit recipient properties. The job dialog box appears that enables you to select properties for the job. 2. On the Properties pane, click Notification. 3. Perform one of the following: -

To configure a new recipient, click New, select the recipient type you want to configure, and then click OK.

-

To edit recipient properties, select the recipient for which you want to edit properties, and then click Properties.

4. Enter or edit recipient properties for the following types of recipients: -

Person -

SMTP Mail. See “SMTP Mail dialog box” on page 490

-

MAPI Mail. See “MAPI Mail dialog box” on page 492

-

VIM Mail. See “VIM Mail dialog box” on page 495

-

Pager. See “Pager dialog box” on page 497

-

Net Send. See “Net Send Recipient Properties dialog box” on page 500

-

Printer. See “Printer Recipient Properties dialog box” on page 503

-

Group. Perform the following:

a. In the Group Name field, type the group for whom you are configuring the notification. b. To add members to the group, select recipients from the All Recipients list, and then click Add to move them to the Group Members list. c. To remove members from the group, select recipients from the Group Members list, and then click Remove to move them to the All Recipients list.

510

Administrator’s Guide

Configuring SNMP Notification

5. Click OK.

See also: “Backing Up Data” on page 239

Configuring SNMP Notification SNMP (Simple Network Management Protocol) is a method by which a network can be monitored from a central location. SNMP-enabled network applications (like Backup Exec) report to an SNMP Console (a management workstation). The console receives messages (traps) from Backup Exec regarding status and error conditions. A MIB is available in the WINNT\SNMP\language directory on the Backup Exec CD that you can load into your SNMP console. The Object Identifier prefix for VERITAS is: 1.3.6.1.4.1.1302 Backup Exec SNMP Traps (messages) have unique object IDs and may include up to four strings. The following SNMP Trap types are supported:

Trap Type

Object ID

Product Start

1302.3.1.1.9.1

Backup Exec: Application initializing

machine name product, version, revision

Product Stop

1302.3.1.1.9.2

Backup Exec: Application terminating

machine name product, version, revision

Job Canceled

1302.3.1.2.8.2

Backup Exec: machine name job name Job canceled by Operator

local or remote Operator name

Job Failed

1302.3.1.2.8.1

Backup Exec: Job failed

machine name job name

detail message

Backup Exec: machine name job name Storage device requires attention

detail message

Storage device 1302.3.2.5.3.3 requires human intervention Chapter 9, Alerts and Notifications

String 1

String 2

String 3

String 4

511

Alerts and Notifications

6. You can start the job after configuring the new recipients or edit recipient properties or select other options from the Properties pane.

Configuring SNMP Notification

Trap Type

Object ID

Robotic library 1302.3.2.4.3.3 requires human intervention

512

String 1

String 2

String 3

Backup Exec: machine name job name robotic library device requires attention

String 4 detail message

Intelligent Disaster Recovery Message

1302.3.1.4.2.1.1 Copy to alternate path failed

machine name job name

detail message

Intelligent Disaster Recovery Message

1302.3.1.4.2.1.2 Backup complete, update DR disks

machine name job name

detail message

Backup Exec system error

1302.3.1.1.9.3

The machine name job name application has encountered an error

detail message

Backup Exec general information

1302.3.1.1.9.4

Information on machine name job name normal events

detail message

Job Success

1302.3.1.2.8.3

The job succeeded

machine name job name

detail message

Job Success with exceptions

1302.3.1.2.8.4

The job machine name job name succeeded, but there was a problem

detail message

Job Started

1302.3.1.2.8.5

The job has started

machine name job name

detail message

Job Completed 1302.3.1.2.8.6 with no data

The job machine name job name succeeded, but there was no data

detail message

Job Warning

The job has a warning

detail message

1302.3.1.2.8.7

machine name job name

Administrator’s Guide

Configuring SNMP Notification

Trap Type

Object ID

String 1

String 2

String 3

String 4

1302.3.1.5.1.1.1 The device has machine name job name encountered an error

detail message

PVL Device Warning

1302.3.1.5.1.1.2 The device has machine name job name encountered a warning

detail message

PVL Device Information

1302.3.1.5.1.1.3 Normal device machine name job name information

detail message

PVL Device Intervention

1302.3.1.5.1.1.4 Device requires attention

machine name job name

detail message

PVL Media Error

1302.3.1.5.2.1.1 There is an error with the media

machine name job name

detail message

PVL Media Warning

1302.3.1.5.2.1.2 There may be a machine name job name problem with the media

detail message

PVL Media Information

1302.3.1.5.2.1.3 Normal media machine name job name information

detail message

PVL Media Intervention

1302.3.1.5.2.1.4 Media requires machine name job name attention

detail message

Catalog Error

1302.3.1.5.3.1.1 There is an error with the catalog

machine name job name

detail message

Tape Alert Error

1302.3.1.5.4.1.1 There is a machine name job name TapeAlert error

detail message

Tape Alert Warning

1302.3.1.5.4.1.2 There is a TapeAlert warning

machine name job name

detail message

Tape Alert Information

1302.3.1.5.4.1.3 Normal TapeAlert information

machine name job name

detail message

Chapter 9, Alerts and Notifications

513

Alerts and Notifications

PVL Device Error

Configuring SNMP Notification

Trap Type

Object ID

String 1

String 2

String 3

String 4

Database Maintenance Error

1302.3.2.5.5.1.1 There is a database maintenance error

machine name job name

detail message

Database Maintenance Information

1302.3.2.5.5.1.2 Normal database maintenance information

machine name job name

detail message

Software Update Error

1302.3.2.5.6.1.1 There is a software update error

machine name job name

detail message

Software Update Warning

1302.3.2.5.6.1.2 There is a software update warning

machine name job name

detail message

Software Update Information

1302.3.2.5.6.1.3 Normal software update information

machine name job name

detail message

Install Update 1302.3.2.5.7.1.1 There is an machine name job name Warning install warning

detail message

Install Update 1302.3.2.5.7.1.2 Normal Install machine name job name Information information

detail message

In order to receive Backup Exec traps at the SNMP console, you must configure the SNMP system service with the SNMP console's IP address. ▼

To install the SNMP system service and configure it to send traps to the SNMP console for Windows NT: 1. From the Control Panel, click Network. 2. Select the Services tab, and then click Add. 3. Install SNMP Service. 4. From the Network Services list, select SNMP Service, and then click Properties.

514

Administrator’s Guide

Configuring SNMP Notification

5. Click the Traps tab. 6. For Community Name, add PUBLIC.

7. In the Trap Destination field, add the IP address of the SNMP console. Multiple IP addresses can be added. 8. Click OK. 9. Click Close. 10. Restart the computer. When the system restarts, it sends traps to the SNMP console. By checking the console for these traps, you can verify that the SNMP system service is configured correctly. Starting and stopping the system service Backup Exec Job Engine also causes traps to be sent. ▼

To install the SNMP system service and configure it to send traps to the SNMP console for Windows 2000 and Windows Server 2003: 1. Click Start, point to Settings, point to Control Panel, and then double-click Add/Remove Programs. 2. Click Add/Remove Windows Components. 3. In Add/Remove Windows Components, select Management and Monitoring Tools, and then click Details. When selecting the component, do not select or clear its check box.

Chapter 9, Alerts and Notifications

515

Alerts and Notifications

Consult your network administrator for the proper community name to use.

Adding Windows Management Instrumentation Capability

4. Select Simple Network Management Protocol, and then click OK. 5. Click Next. SNMP starts automatically after installation. You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure. See also: “Configuring Alert Category Properties” on page 479

Adding Windows Management Instrumentation Capability Windows Management Instrumentation (WMI) is an infrastructure through which you can monitor and control system resources. Backup Exec includes performance counter and SNMP providers that can be manually installed and used with WMI. Note If you are using Windows NT 4.0, you must install WMI before you install the performance counter and SNMP providers. ▼

To install the WMI performance counter provider: 1. Insert the Backup Exec Installation CD. 2. At the command prompt, type the following: mofcomp :\winnt\wmi\backupexecperfmon.mof



To install the WMI SNMP provider: Note Before you install the SNMP provider included with Backup Exec, you must have the Microsoft SNMP provider installed on your system. For more information, refer to your Microsoft documentation. 1. Insert the Backup Exec Installation CD. 2. At the command prompt, type the following: mofcomp :\winnt\wmi\snmp\eng\bkupexecmib.mof Note To use the WMI SNMP provider you must set up SNMP notification.

516

Administrator’s Guide

Adding Windows Management Instrumentation Capability

Uninstalling WMI Providers ▼

To uninstall the WMI performance counter provider:

Alerts and Notifications



At the command line, type: mofcomp :\winnt\wmi\deletebackupexecperfmon.mof



To uninstall the WMI SNMP provider: ❖

At the command line, type: Smi2smir /d Backup_Exec_MIB

Chapter 9, Alerts and Notifications

517

Adding Windows Management Instrumentation Capability

518

Administrator’s Guide

10

Reports

The Backup Exec Admin Plus Pack Option provides an additional 24 reports and advanced reporting capabilities such as scheduling and notification. See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524 “Available Reports” on page 531 “Advanced Reporting Capabilities” on page 857

519

Reports

Backup Exec includes 13 standard reports that enable you to generate reports that show detailed information about your system. When you generate a report, you can specify filter parameters or a time range for the data that you want to include in the report. You can then run and view the report immediately, or you can create a new job that saves the report data in the Job History. You can also view general properties for each report.

Viewing Reports

Viewing Reports Reports are generated using Crystal Reports and can be viewed and printed in an HTML file format. If the Adobe Acrobat Reader is detected by Backup Exec, reports are displayed in Adobe Portable Document Format (PDF). To go to a web site to download the Adobe Acrobat Reader, on the Help menu, click Adobe® Acrobat® Web Site. To properly format integrated Backup Exec reports, you must configure a default printer using the Windows Control Panel Printers applet. This is required even if you do not have a printer attached to your system. ▼

To view the list of available reports: ❖

On the navigation bar, click Reports.

The Reports pane lists the name, a description, and a category for each report. You can sort the reports in alphabetical or reverse alphabetical order by clicking Name. Available Reports

See also: “Running and Viewing a New Report Job” on page 524 “Viewing Report Properties” on page 530 “Available Reports” on page 531

520

Administrator’s Guide

Running a Report

Running a Report When you run a report, you can specify the criteria that is used to determine the items that will be included in the report. The parameters available for you to select depend on the type of data that can be included in the report. After the report is generated, only the items that match the criteria appear in the report. ▼

To run a report: 1. On the navigation bar, click Reports. 2. On the Reports pane, select the report you want to run.

4. In the Filters tab, select the appropriate filter parameters for the data you want to include in the report. If filter parameters are not available for a report, you will not be able to select the parameter. Select the appropriate options as follows: Report filters Item

Description

Media set

Filters the report based on media set names. Media sets include all the media that is inserted into the storage device. For more information on media sets, see “Media Categories” on page 196.

Job priority

Filters the report based on job priorities. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Available priorities include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Media server

Filters the report based on media server names. The media server is the server on which Backup Exec is installed.

Job status

Filters the report based on job status.

Protected server

Filters the report based on specific protected server names. The protected server is the server that is being backed up.

Chapter 10, Reports

521

Reports

3. Under Report Tasks in the task pane, click Run report now.

Running a Report Report filters (continued) Item

Description

Vault

Filters the report based on specific vault names. A media vault is a virtual representation of the actual physical location of media. For more information on media vaults, see “Media Location” on page 215.

5. Click the Ranges tab and select the appropriate range parameters for the data you want to include in the report. If range parameters are not available for a report, you will not be able to select the parameter. Select the appropriate options as follows: Report ranges Item

Description

Days

Select this check box to enable the date filter.

Number of days before Type the number of days prior to the current day to begin the filter day report runs process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days. Number of days after day report runs

Type the number of days after the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days.

Hours

Select this check box to enable the hours filter.

Number of hours within time report

Type the number of hours either before or after the present hour to filter the data to be included in the report. The time frame depends on the type of report. You can enter a minimum of 0 and a maximum of 32,000 hours.

Event count

Select this check box to enable the event count filter.

Maximum number of events to include

Enter the number of events to include in the report. Events generate alerts and originate from one of the following sources: system, job, media, or device. You can enter a minimum of 0 and a maximum of 32,000 events.

Note Entering a value of zero for the range parameter does not limit the amount of data included in the report; this can result in an extensive report.

522

Administrator’s Guide

Running a Report

6. Click Run report. The report appears and displays data based on the criteria you set when you ran the report. 7. To save the report, click Save As; for a report in PDF, click the Save a Copy icon. When prompted, enter the file name and location where you want to save the report and then click Save. The report is saved in the location you specify. Backup Exec also creates a folder, with the same name as the report, in the same location in which the report is saved. The folder contains images and report pages that enable you to view the saved report.

For reports in an HTML format, do the following: -

To ensure the reports print correctly, in the Layout tab of the Print dialog box, under Orientation, select Landscape.

-

To print all the pages in a multiple page report, in the Options tab of the Print dialog box, select Print all linked documents.

Note If all the data does not print in an HTML-formatted report, you may need to edit the page setup for the report. To edit the page setup, open Microsoft Internet Explorer, and then on the File menu, click Page Setup. Under Header and Footers, delete the Header and Footer and then under Margins, set the Left and Right margins to the minimum setting that your printer will accept. 9. After you have finished viewing the report, click OK. The report will automatically be deleted. See also: “Viewing Report Properties” on page 530 “Available Reports” on page 531

Chapter 10, Reports

523

Reports

8. To print the report, click Print; for a report in PDF, click the Print icon. You must have a printer attached to the computer, and configured in order to print the report.

Running and Viewing a New Report Job

Running and Viewing a New Report Job You can create a report job that saves the report data in the Job History. You can specify filters and ranges and select recipients for notification; however, the report is not included in the notification. Report jobs run immediately and you cannot specify a schedule. After the report is generated, you can view the completed report and job history in the Job Monitor. The report data will also be saved in the Backup Exec database. The Admin Plus Pack Option enables you to perform advanced report tasks such as scheduling a report job and including the report in a notification. ▼

To run a new report job: 1. On the navigation bar, click Reports. 2. On the Reports pane, select the report for which you want to run a job. 3. Under Report Tasks in the task pane, click New report job. New Report Job dialog box

4. On the Properties pane, under Settings, click General and then type the name for the job in Job name and select the Job priority. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. 524

Administrator’s Guide

Running and Viewing a New Report Job

5. On the Properties pane, under Settings, click Filters, and then select the appropriate filter parameters for the data you want to include in the report. If filter parameters are not available for a report, you will not be able to view the parameters. Select the appropriate options as follows. Report filters Description

Media set

Filters the report based on media set names. Media sets include all the media that is inserted into the storage device. For more information on media sets, see “Media Categories” on page 196.

Job priority

Filters the report based on job priorities. The job priority determines which job runs first. Available priorities include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Media server

Filters the report based on media server names. The media server is the server on which Backup Exec is installed.

Job status

Filters the report based on job status.

Protected server

Filters the report based on specific protected server names. The protected server is the server that is being backed up.

Vault

Filters the report based on specific vault names. A media vault is a virtual representation of the actual physical location of media. For more information on media vaults, see “Media Location” on page 215.

Chapter 10, Reports

525

Reports

Item

Running and Viewing a New Report Job

6. On the Properties pane, under Settings, click Ranges and select the appropriate range parameters for the data you want to include in the report. If range parameters are not available for a report, you will not be able to select the parameter. Select the appropriate options as follows Report ranges Item

Description

Days

Select this check box to enable the date filter.

Number of days before Type the number of days prior to the current day to begin the filter day report runs process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days. Number of days after day report runs

Type the number of days after the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days.

Hours

Select this check box to enable the hours filter.

Number of hours within time report

Type the number of hours either before or after the present hour to filter the data to be included in the report. The time frame depends on the type of report. You can enter a minimum of 0 and a maximum of 32,000 hours.

Event count

Select this check box to enable the event count filter.

Maximum number of events to include

Enter the number of events to include in the report. Events generate alerts and originate from one of the following sources: system, job, media, or device. You can enter a minimum of 0 and a maximum of 32,000 events.

Note Entering a value of zero for the range parameter does not limit the amount of data included in the report; this can result in an extensive report. 7. On the Properties pane, under Settings, click Notification and enter notification information for the items. For more information, see “Selecting Recipients for Job Notification” on page 509. When the notification is sent to the recipient, the report is not included.

526

Administrator’s Guide

Running and Viewing a New Report Job

8. On the Properties pane, under Frequency, click Schedule and then click Submit job on hold if you want to submit the job with an on-hold status. Select this option if you want to submit the job, but do not want the job to run until you change the job’s hold status. 9. Click Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. Select this option if you want to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job actually begins, not the scheduled time.

The report is submitted according to the options you selected. Note If you are using BEWAC, click Next to submit the report to the job queue. After viewing the job summary, click Finish. ▼

To view the report in the Job History: 1. On the navigation bar, click Job Monitor. 2. On the Job History pane, select the report you want to view. 3. Under General Tasks in the task pane, click Properties. The report and job history appear and display data based on the criteria you selected when you set up the job. 4. Click Job History to view detailed information about the job or Report to view the contents of the report.

Chapter 10, Reports

527

Reports

10. After you have completed all the items you want to set for the new report job, click Run Now.

Running and Viewing a New Report Job

5. To print the report, click Print; for a report in PDF, click the Print icon. You must have a printer attached to the computer, and configured in order to print the report. For reports in an HTML format, do the following: -

To ensure the reports print correctly, in the Layout tab of the Print dialog box, under Orientation, select Landscape.

-

To print all the pages in a multiple page report, in the Options tab of the Print dialog box, select Print all linked documents.

Note If all the data does not print in an HTML-formatted report, you may need to edit the page setup for the report. To edit the page setup, open Microsoft Internet Explorer, and then on the File menu, click Page Setup. Under Header and Footers, delete the Header and Footer and then under Margins, set the Left and Right margins to the minimum setting that your printer will accept. 6. After you have finished viewing the report, click OK. The report is saved for the length of time you set in the database maintenance option. ▼

To save the report to a new location: 1. On the navigation bar, click Job Monitor. 2. On the Job History pane, right-click the report you want to save. 3. Click Save As. The Save As dialog box appears. 4. Enter the file name and location where you want to save the report and then click Save. The report is saved in the location you specify. Backup Exec also creates a folder, with the same name as the report, in the same location in which the report is saved. The folder contains images and report pages that enable you to view the saved report.

528

Administrator’s Guide

Running and Viewing a New Report Job ▼

To delete the report from Job History: 1. On the navigation bar, click Job Monitor. 2. On the Job History pane, select the report you want to delete. 3. Under General Tasks in the task pane, click Delete. 4. Confirm the job deletion. The report and associated job history are deleted. See also:

Reports

“Configuring Database Maintenance” on page 405 “Viewing Completed Jobs” on page 394 “Available Reports” on page 531 “Advanced Reporting Capabilities” on page 857

Chapter 10, Reports

529

Viewing Report Properties

Viewing Report Properties Report properties provide detailed information about each report. The properties can be viewed, but not edited. ▼

To view a report: 1. On the navigation bar, click Reports. 2. On the Reports pane, select the report for which you want to view properties. 3. Under Report tasks in the task pane, click Properties. The Report dialog box provides the following information: Report Properties

530

Item

Description

Title

The name of the report.

Description

Describes the type of data that is included in the report.

Category

Classification for the report. Available report categories include: Š

Media

Š

Media Vault

Š

Jobs

Š

Devices

Š

Configuration

Š

Alerts

Š

Template

Author

The creator of the report.

Subject

The version of the product for which the report was created.

Keywords

The primary information used to categorize the report.

File name

The location of the report.

File size

The size of the report.

Creation Date

The date the report was installed on the system.

Administrator’s Guide

Available Reports

4. Click OK after you have finished viewing the properties. See also: “Running a Report” on page 521

Available Reports

The following reports are included in Backup Exec: Backup Exec Reports Report Name

Description

Active Alerts

Lists all active alerts chronologically, displaying the most recent alerts first (see “Active Alerts Report” on page 533).

Alert History

Lists all alerts in the alert history chronologically, displaying the most recent alerts first (see “Alert History Report” on page 533).

Audit Log

Lists the contents of the audit logs for selected servers for the specified time period (see “Audit Log Report” on page 535)

Backup Sets by Media Set Lists all backup sets by media set (see “Backup Sets by Media Sets Report” on page 535). Configuration Settings

Lists the contents of the Backup Exec system configuration parameters table (see “Configuration Settings Report” on page 536).

Device Summary

Lists device usage and error summary for each selected media server (see “Device Summary Report” on page 537).

Error Handling Rules

Lists all the defined error-handling rules (see “Error-Handling Rules Report” on page 539).

Event Logs

Lists all Backup Exec and other system and application event logs (see “Event Logs Report” on page 540).

Media Set

Lists all the media sets and media used by Backup Exec servers. The current location is given for each media (see “Media Set Report” on page 541).

Chapter 10, Reports

531

Reports

This section provides detailed information about each report available in Backup Exec. The file name of the report, a description, and the information included in the report are listed for each report. The data included in each report will vary depending on the criteria you selected to include in the report.

Available Reports Backup Exec Reports (continued) Report Name

Description

Media Vault Contents

Lists the media located in each media vault (see “Media Vault Contents Report” on page 542).

Operations Overview

Lists past and future operations data for user-set period (see “Operations Overview Report” on page 543).

Robotic Library Inventory

Lists the contents of slots in robotic libraries attached to media servers. Usage statistics are provided for each piece of media (see “Robotic Library Inventory Report” on page 544).

Scratch Media Availability Lists the aging distribution of media. Shows how many media are available for overwrite and when other media will become available for overwrite (see “Scratch Media Availability Report” on page 545). Test Run Results

Lists the results for the test run jobs set for the selected time period and media servers (see “Test Run Results Report” on page 546).

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524 “Viewing Report Properties” on page 530

532

Administrator’s Guide

Available Reports

Active Alerts Report The Active Alerts report lists all active alerts chronologically, displaying the most recent alerts first. You can limit the number of alerts that appear in the report by entering range parameters for the Event count. Information displayed in the Active Alerts report is described in the following table. Active Alerts Report Description

Time

Date and time the alert occurred.

Media Server

Name of the media server on which the alert occurred.

Job Name

Name of the job associated with the alert.

Device Name

Name of the device on which the job ran.

Category

Title of the alert, such as Service Start or Job Failed.

Message

Describes the event that caused the alert.

Reports

Item

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Alert History Report The Alert History report lists all the alerts in the Alert History chronologically, displaying the most recent alerts first. You can limit the number of alerts that appear in the report by entering range parameters for the Event count. Information displayed in the Active History report is described in the following table. Alert History Report Item

Description

Time

Date and time the alert occurred.

Received

Time the alert occurred.

Chapter 10, Reports

533

Available Reports Alert History Report (continued) Item

Description

Responded

Time the user responded to the alert.

Responding User

User that responded to the alert.

Job Name

The name of the job associated with the alert.

Media Server

Name of the media server on which the alert occurred.

Category

Title of the alert, such as Service Start or Job Failed.

Message

Describes the event that caused the alert.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

534

Administrator’s Guide

Available Reports

Audit Log Report The Audit Log report lists the contents of the audit logs for the selected servers for the selected time period. You can limit the amount of data that appears in the report by entering filter parameters for the Media server option and range parameters for the Days and Event count options. Information displayed in the Audit Log report is described in the following table. Audit Log Report Description

Media Server

Name of the media server on which the audit logs are located.

Category

Category in which the change occurred, such as Logon Account, Alerts, or Job.

Date Entered

Time and date the change occurred.

Message

Description of the change made in Backup Exec.

User Name

User that made the change.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Backup Sets by Media Sets Report The Backup Sets by Media Sets report lists all the backup sets by media set. You can limit the amount of data that appears in the report by selecting filter parameters for the Media Set option. Information displayed in the Backup Sets by Media Sets report is described in the following table. Backup Sets by Media Sets Report Item

Description

Media Set

Name of the media set on which the job ran.

Set

Sequential number for backup sets on the media.

Chapter 10, Reports

535

Reports

Item

Available Reports Backup Sets by Media Sets Report (continued) Item

Description

Method

Specific type of backup. For more information on backup methods, see “Understanding Backup Methods and Their Advantages” on page 355.

Date / Time

Date and time the data was backed up.

Backup Set Description Describes the data that was backed up and the location of the data. / Source Directories

Number of directories backed up.

Files

Number of files backed up.

MB

Amount of data backed up in megabytes.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Configuration Settings Report The Configuration Settings Report lists the contents of the Backup Exec system configuration parameters table. Information displayed in the Configuration Settings report is described in the following table. Configuration Settings Report

536

Item

Description

Parameter Name

Name of the Backup Exec configuration parameter.

Class

Parameters that are associated with the Backup Exec system.

Administrator’s Guide

Available Reports Configuration Settings Report (continued) Item

Description

Value

Value of the configuration parameter. Note The StoreMaintenanceLastrun and StoreMaintenanceRuntime parameters display the date and time in Greenwich Mean Time (GMT).

See also: “Running a Report” on page 521

Reports

“Running and Viewing a New Report Job” on page 524

Device Summary Report The Device Summary report lists all the devices for each selected media server. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option. Information displayed in the Device Summary report is described in the following table. Device Summary Report Item

Description

Server

Name of the server where the device is located.

Device Name

Name of the device, such as the name of the robotic library. This field is left blank for stand-alone drives.

Drive Name

Name of the drive in the robotic library.

Vendor/Product ID

Name of the vendor of the drive, the product ID, and firmware from the SCSI Inquiry string.

SCSI Target

Address of the SCSI Card, SCSI Bus, Target Device ID, and LUN.

State

Device state, such as online.

Created

Date media was created.

Cleaned

Date last cleaning job was run on the drive.

Chapter 10, Reports

537

Available Reports Device Summary Report (continued) Item

Description

Post Cleaning Totals Hours

Hours the device has been in use since the last cleaning job.

Errors

Number of errors occurring since the last cleaning job.

MB

Megabytes written since the last cleaning job.

Mounts

Number of mounts occurring since the last cleaning job.

Totals Hours

Total number of hours the device has been in use.

Errors

Total number of errors occurring on the device.

MB

Total number of megabytes written to the device.

Mounts

Total number of mounts occurring to the device.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

538

Administrator’s Guide

Available Reports

Error-Handling Rules Report The Error-Handling Rules report lists all error-handling rules and provides details about each rule. Information displayed in the Error-Handling Rules report is described in the following table. Error Handling Rules Report Description

Error Handling Rule Name

Name of the Error-Handling rule.

Description

Information entered in the Notes section when the error-handling rule was created.

Job Status

Final job status that activates the rule. Possible statuses are:

Error Code

Š

Error

Š

Canceled

The category of error for which the rule will be applied. Available error categories include: Š

Device

Š

Job

Š

Media

Š

Network

Š

Other

Š

Resource

Š

Security

Š

Server

Š

System

Hold Device

Displays an X if this option is selected for the error-handling rule. The option holds all jobs for the device after the maximum number of retries have been attempted.

Pause Job

Displays an X if this option is selected for the error-handling rule. The option enables Backup Exec to pause the job until you can manually clear the error.

Retry Job

Displays an X if this option is selected for the error-handling rule. The option enables Backup Exec to retry the job.

Chapter 10, Reports

539

Reports

Item

Available Reports Error Handling Rules Report (continued) Item

Description

Maximum Retries

Number of times the job is to be retried.

Postpone Retries (minutes)

Number of minutes the job is to wait before being retried.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Event Logs Report The Event Logs report lists all Backup Exec and other system and application event logs. Information displayed in the Event Logs report is described in the following table. Event Logs Report Item

Description

Server

Name of the server on which the event occurred.

Number

The number assigned to the event in the Windows Event log.

Event

The type of event that occurred.

Date

Date the event occurred.

Time

Time the event occurred.

Source

The source from which the event originated.

Description

Message displayed for the event.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

540

Administrator’s Guide

Available Reports

Media Set Report The Media Set report lists all media sets and media used by Backup Exec servers. Usage statistics are given for each piece of media. You can limit the amount of data that appears in the report by selecting filter parameters for the Media set option. Information displayed in the Media Set report is described in the following table. Media Set Report Description

Media Set

Name of the media set.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Media Type

Type of media cartridge, such as 4mm.

Allocated

Date media was allocated to a media set as a result of an overwrite operation.

Modified

Date data was last written to the media.

Location

Location of the media.

Totals Hours

Total number of hours that this media has been in use.

Mounts

Total number of times this media has been mounted.

Soft Errors

Number of recoverable read errors encountered.

Hard Errors

Number of unrecoverable read errors encountered.

Write MB

Number of bytes that have been written to this media.

Current MB

Estimate of the number of megabytes currently on this media.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Chapter 10, Reports

541

Reports

Item

Available Reports

Media Vault Contents Report The Media Vault Contents report lists all the media in a specified media vault. You can limit the amount of data that appears in the report by selecting filter parameters for the Vault option. Information displayed in the Media Vault Contents report is described in the following table. Media Vault Contents Report Item

Description

Media Vault

Location of the media.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Media Total

Total number of media contained in the media vault.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

542

Administrator’s Guide

Available Reports

Operations Overview Report The Operations Overview report lists details for past and future Backup Exec operations. You can limit the amount of data that appears in the report by entering range parameters for the Days option. Information displayed in the Operations Overview report is described in the following table. Operations Overview Item

Description

Completed (Canceled)

Total number of canceled jobs.

Completed (Failed)

Total number of jobs that failed.

Completed (Success)

Total number of jobs that completed successfully.

Exceptions

Total number of jobs that completed successfully, but may contain one or more skipped files, corrupt files, virus infected files or files in use.

Media Total

Total number of media used to back up the completed jobs.

Total Size (MB)

Total amount of data backed up.

Alerts summary for active alerts Errors

Total number of system, job, media, and device error alerts.

Warnings

Total number of job, media, and device warning alerts.

Information

Total number of system, job, media, and device information alerts.

Attention Required

Total number of alerts that require a response from the user.

Media Availability Scratch Media

Total number of scratch media available.

Overwritable Media

Total number of overwritable media available.

Chapter 10, Reports

543

Reports

Job summary for jobs Details Backup Exec job activity for the specified time period. completed in the past x Hours

Available Reports Operations Overview (continued) Item

Description

Appendable Media

Total number of appendable media available.

Recyclable Media

Total number of recyclable media available.

Job Status

Displays the job status.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Robotic Library Inventory Report The Robotic Library Inventory report lists the contents of slots in robotic libraries attached to media servers. Usage statistics are provided for each piece of media. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option. Information displayed in the Robotic Library Inventory report is described in the following table. Robotic Library Inventory Report

544

Item

Description

Server

Name of the server where the robotic library is located.

Device Name

Name of the robotic library.

Slot

Sequential number of the slot in the robotic library.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

State

State of operation of the slot: paused, disabled, enabled, offline, or online.

Modified

Date the media in the slot was last accessed.

Write MB

Number of bytes that have been written to this media.

Administrator’s Guide

Available Reports Robotic Library Inventory Report (continued) Item

Description

Full

Space available on a media; “1” indicates that media is full and “0” indicates that there is space available on the media.

Hours

Total number of hours this media has been in use.

Mounts

Total number of times this media has been mounted.

Append

The time remaining in the media’s append period.

Reports

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Scratch Media Availability Report The Scratch Media Availability report shows the aging distribution of media, how many media are available for overwrite, and when other media will become available for overwrite. You can limit the amount of data that appears in the report by selecting range parameters for the Days option. Information displayed in the Scratch Media Availability report is described in the following table. Scratch Media Availability Report Item

Description

Category

The media set period configured in media set properties.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Chapter 10, Reports

545

Available Reports Scratch Media Availability Report (continued) Item

Description

Size (MB)

Capacity of the scratch media available to which data can be written.

Available to Append (GB)

Capacity of scratch media available for append.

Group Total

Total number and capacity of scratch media available to the system.

Media Total

Total number of scratch media available.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Test Run Results Report The Test Run Results report displays the results for the test run jobs set for the selected period and the selected media servers. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option and range parameters for the Hours option. Information displayed in the Test Run Results report is described in the following table. Test Run Results Item

Description

Media Server

Name of the media server on which the job ran.

Job Date and Time Run Date and time the backup job was processed. Job Name

The name of the test run job.

Media Capacity Summary

546

Media Type

Type of media used, such as 4mm.

Max Needed

Amount of space needed on the media to run the job.

Administrator’s Guide

Available Reports Test Run Results (continued) Item

Description

Available to Append, MB Online

Capacity of media available in the device to which data can be appended.

Media Total

Total amount of appendable media available to the system.

Available to Overwrite, MB Capacity of media available in the device to which data can be written.

Media Total

Total amount of overwritable media available to the system.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Chapter 10, Reports

547

Reports

Online

Available Reports

548

Administrator’s Guide

11

Disaster Preparation and Recovery

Disaster preparation planning is the implementation of strategies and procedures that will minimize damage in the event a catastrophe destroys your data. While precautions can be taken to minimize the effects of this type of occurrence (UPS devices, password protection, and so forth), unfortunately there is nothing that can safeguard your data 100 percent. The purpose of a Disaster Preparation Plan (DPP) is to return to an operational status as quickly as possible. Backup Exec is a crucial component of the DPP and this section discusses how to apply this powerful data management tool to your DPP. ◆

Manual recovery. This section provides procedures for manually recovering both local and remote Windows Server 2003/XP/2000/NT computers.



Automated recovery. Backup Exec’s Intelligent Disaster Recovery (IDR) option automates the disaster recovery process for Windows Server 2003/XP/2000/NT computers. IDR is an option you must purchase separately.

See also: “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 “Disaster Preparation of the Windows Computer” on page 551 “Manual Disaster Recovery of Windows Computers” on page 558

549

Disaster Preparation

There are two basic methods available for disaster recovery:

Key Elements of a Disaster Preparation Plan (DPP)

Key Elements of a Disaster Preparation Plan (DPP) The DPP you put in place with your Backup Exec system should be tailored to your network environment. While environments vary in different organizations, there are five elements to consider when creating a comprehensive DPP. ◆

Hardware protection. The hardware devices on your network (CPUs, drives, video) are susceptible to damage from many disaster situations. Uninterruptible power supplies (UPS), surge protectors, and security monitoring devices are the equipment most often used today to protect hardware. If you do not already have these items in place, you should consider installing them. The initial investment could be justified many times over in the event of a disaster.



The ability to maintain business operations during a disaster period. Make sure that proper precautions are taken by everyone to implement plans for network interruptions. For example, the phones in the sales department won’t stop ringing because the server is down, so orders may have to be handwritten until the server is up again. Each department should work out strategies for such occurrences. If the proper precautions are taken, the server can be rebuilt quickly and operations can still continue.



A sound backup strategy. A well-designed backup strategy that includes a strong media rotation scheme plays a key role in quickly restoring your file server.



Off-site storage of backups. It is imperative that backed up data be moved off-site regularly. This ensures that if something happens to your facility, all of your backups will not be destroyed. Depending on the importance of your data, you may choose to use several off-site storage facilities. There are companies that provide off-site storage services that pick up and deliver tapes when they are to be rotated.



Effective DPP management. The last element - and possibly the most important - is proper management of your DPP strategy. A person or group of people should be charged with constantly supervising your organization’s disaster preparation efforts. Someone should install and maintain hardware protection devices, make sure all departments have a plan if the server goes down temporarily, and make sure that backups are made and rotated off-site regularly. Also, it is a good idea to document your Disaster Preparation Plan for reference purposes. Backup Exec plays a major role in your DPP by offering an easy, reliable way of backing up and restoring your files. The rest of this chapter describes how to take some precautionary measures to make restoration as straightforward as possible in the event of a disaster.

See also: “Selecting Data to Back Up” on page 265

550

Administrator’s Guide

Disaster Preparation of the Windows Computer

Disaster Preparation of the Windows Computer In a disaster recovery situation, always try the simplest steps first. Using this approach, the greatest amount of information is recovered with the least amount of impact on the users and the network. The following sections detail simple solutions and more complex procedures for getting your Windows computer up and running again. See also: “Creating an Emergency Repair Disk” on page 553 “Manual Disaster Recovery of Windows Computers” on page 558

Returning to the Last Known Good Menu

Note Any changes made to the system since the last time the configuration was saved are lost. ▼

To return to a previous configuration: 1. Reboot the system. 2. For a Windows NT system, press the spacebar during the startup. The Hardware Profile/Configuration Recovery menu appears, which allows you to boot using a previous configuration. For other Windows systems, press during startup. A menu appears that allows you to diagnose and fix system startup problems.

Chapter 11, Disaster Preparation and Recovery

551

Disaster Preparation

Changes to the system configuration may keep the system from booting. If you suspect that boot problems are the result of a configuration change, you may be able to correct the problem by returning to a previous configuration. This method is simple and fast, and in some cases will correct boot problems in a Windows computer. There are slightly different procedures for Windows NT and Windows 2000/XP/Windows Server 2003 computers. This section includes procedures for each type of computers.

Disaster Preparation of the Windows Computer

3. Select one of the following options: -

Safe Mode. This option allows you to diagnose and fix system startup problems. For more information, see your Microsoft documentation.

-

Last Known Good Configuration. This option allows you to return to a previous saved configuration.

See also: “Creating a Hardware Profile Copy” on page 552 “Creating an Emergency Repair Disk” on page 553 “Creating and Using an Emergency Boot Diskette” on page 556

Creating a Hardware Profile Copy Before making a major hardware change, copy the current hardware profile to a new hardware profile and boot into the new profile before adding or changing the hardware. This way, you can return to the previous configuration if something does not work properly. ▼

To create a copy of the current hardware profile and make that the preferred boot option: 1. Right-click the My Computer icon. 2. Click Properties to display the System Properties dialog box. 3. Click Hardware. 4. Click Hardware Profiles. 5. Select the current hardware profile, and then click Copy. 6. Type the name for the new configuration in the To field, and then click OK. 7. To make the new profile the preferred boot option, select it, and then click the up arrow next to the list box to move the new hardware profile to the top of the box.

552

Administrator’s Guide

Disaster Preparation of the Windows Computer

8. Choose whether Windows is to use the new hardware profile automatically (after a delay) during startup, or if the system should wait indefinitely until the hardware profile is chosen by selecting the appropriate option. 9. Click OK. The new configuration is saved, and the startup options are set. See also: “Returning to the Last Known Good Menu” on page 551 “Creating an Emergency Repair Disk” on page 553 “Creating and Using an Emergency Boot Diskette” on page 556

Creating an Emergency Repair Disk

For Windows XP or Windows Server 2003, Emergency Repair Disk has been replaced with Automated System Recovery (ASR). Whenever a major change is made to the system, make a fresh copy of the ERD before and after the change is made. Major changes include adding, removing, or otherwise modifying hard drives or partitions, file systems, configurations, and so forth. As a general rule, update the ERD before and after the hard drive configuration is changed. The addition of a new component to the server, such as Microsoft Exchange Server or Microsoft SQL Server, and changes from Control Panel, are also situations in which the ERD should be refreshed both before and after the change. Also remember to make a backup of the ERD; always keep an ERD from at least one generation back. When creating a fresh ERD, use a floppy disk that can be reformatted, because RDISK.EXE, the program that creates the ERD, always formats the floppy disk. Note The Emergency Repair Disk is a useful and necessary tool; it is NOT a bootable disk. There is not enough space on the disk for the boot files and the repair information files.

Chapter 11, Disaster Preparation and Recovery

553

Disaster Preparation

When Windows NT or Windows 2000 Server is installed, the installation program prompts you to create an Emergency Repair Disk (ERD). This disk contains system information that can help get the system running in the event of a disaster. It is important to keep the ERD updated whenever system changes are made. The ERD is only useful if it is kept current.

Disaster Preparation of the Windows Computer ▼

To create the ERD for Windows NT: 1. Insert a disk into the A: drive. 2. From the Start menu, click Run. 3. Type rdisk, and then click OK to display the Repair Disk Utility dialog box. To back up the user account and file security, add a /S parameter after the rdisk command: rdisk /s This bypasses the initial screen and its confirmation step and directly updates the repair directory information (steps 4 and 5). After the current configuration has been saved, you are prompted to make the ERD (see step 6). 4. Click Update Repair Info. 5. Click Yes to update the repair information. Running rdisk overwrites any previously saved information. When updating after a major change, skip this step until the change has been verified as stable and desirable. Click No to skip. After the repair information has been updated, the system prompts you to create an Emergency Repair Disk. 6. Click Yes to make the disk. 7. Store the disk in a safe and secure place.



To create the ERD for Windows 2000: Note You must not change or delete the systemroot\repair folder because the repair process relies on information saved in this folder. 1. Click Start, point to Programs, and then to Accessories. 2. Point to System Tools, and then click Backup.

554

Administrator’s Guide

Disaster Preparation of the Windows Computer

3. On the Tools menu, click Create an Emergency Repair Disk. 4. Insert a disk into the A: drive and follow the instructions. Note The Also back up the registry to the repair directory option saves your current registry files in a folder within the systemroot/repair folder. This option is beneficial in the event your hard disk fails and you need to recover your system. See also: “Returning to the Last Known Good Menu” on page 551 “Creating a Hardware Profile Copy” on page 552 “Creating and Using an Emergency Boot Diskette” on page 556

The ASR feature, which replaces the Emergency Repair Disk for Windows XP and Windows Server 2003, allows you to restore the operating system to a previous state so that you can start Windows XP Professional or Windows Server 2003 when other recovery methods do not work. Microsoft recommends using System Restore, which saves only incremental changes, or shadow copies, and lets you start Windows XP Professional in normal or safe mode, before resorting to ASR. For more information about ASR or System Restore, refer to your Microsoft documentation.

Chapter 11, Disaster Preparation and Recovery

555

Disaster Preparation

Using Windows’ Automated System Recovery and System Restore to Recover a Windows XP or Windows Server 2003 System

Disaster Preparation of the Windows Computer

Creating and Using an Emergency Boot Diskette If the system will not boot, use the Windows installation disks to boot it or use an Emergency boot diskette, which is a quicker way of getting the system up and running. After booting from the Emergency boot diskette, go directly into the existing Windows partition, even if a critical file in the system partition has been deleted or corrupted.

Tip

Instructions are provided for creating Emergency boot diskettes on the following types of systems: ◆

x86 systems (see “To create an Emergency boot diskette (x86 version):” on page 556)



RISC-based systems (see “To create an Emergency boot diskette (RISC Version):” on page 557)



Mirrored boot partitions (see “To create an Emergency boot diskette (Mirrored boot partition):” on page 557)

Note The boot diskette is NOT generic for every Windows machine. If there is a fairly standard configuration across several machines, however, this disk will work. For example, it will work for all systems that use the same partition and disk controller as their Windows boot partition. ▼

To create an Emergency boot diskette (x86 version): 1. Format a diskette (the diskette must be formatted under Windows). 2. Copy the following files to the diskette from the root directory of the system partition: -

BOOT.INI

-

NTBOOTDD.SYS (if present)

-

NTDETECT.COM

-

NTLDR

The file NTBOOTDD.SYS is present only if a SCSI controller exists that does not use its BIOS to control the boot process. If NTBOOTDD.SYS is not on the boot partition, it is not needed.

556

Administrator’s Guide

Disaster Preparation of the Windows Computer ▼

To create an Emergency boot diskette (RISC Version): 1. Format a diskette (the diskette must be formatted under Windows). 2. Copy the following files to the diskette from the root directory of the system partition: -

OSLOADER.EXE

-

HAL.DLL

On RISC based systems, the information stored in nonvolatile RAM is the equivalent of the information stored in the BOOT.INI file on an x86-based computer. You must modify the boot selection menu to add an option that points to the floppy disk. The Advanced RISC Computing (ARC) name used for the SYSTEM-PARTITION on the floppy disk is: scsi(0)disk(0)fdisk(0) Set the necessary values for: OSLOADER: the pointer to the floppy drive that was just created.

-

OSLOADPARTITION: the primary partition (unless there are mirrored boot partitions, in which case point to the secondary mirror partition).

-

OSLOADFILENAME: the path to the \SYSTEMROOT directory.

To create an Emergency boot diskette (Mirrored boot partition): 1. Format a diskette (the diskette must be formatted under Windows NT/2000). 2. Copy the following files to the diskette from the root directory of the system partition: -

NTLDR

-

NTDETECT.COM

-

NTBOOTDD.SYS (if present)

-

BOOT.INI

The file NTBOOTDD.SYS is present only if a SCSI controller exists that does not use its BIOS to control the boot process. If NTBOOTDD.SYS is not on the boot partition, it is not needed.

Chapter 11, Disaster Preparation and Recovery

557

Disaster Preparation



-

Manual Disaster Recovery of Windows Computers

3. For an Intel x86 processor, edit the BOOT.INI file on the floppy disk to change the ARC name on the boot partition so that it points to the secondary mirror partition rather than to the primary boot partition. For example, if there are a pair of Adaptec 2940 adapters and duplexes boot drives using the SCSI BIOS to boot off the primary partition on the first hard disk, there might be a line similar to this in the BOOT.INI: multi(0)disk(0)rdisk(0)partition(1)\NTS40=”Windows NT Server” 4. Change the line to the following: multi(1)disk(0)rdisk(0)partition(4)\NTS40=”Windows NT Server”

Manual Disaster Recovery of Windows Computers Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for information on automated disaster recovery. The procedures described in the following sections allow you to manually recover a computer not protected by IDR. Different types of computers require different disaster recovery procedures. This section includes separate procedures for recovering the following types of computers: ◆

Local Windows NT computer (see “Disaster Recovery of a Local Windows NT Computer” on page 559)



Remote Windows NT computer (see “Disaster Recovery of a Remote Windows NT Computer” on page 562)



Local Windows 2000 computer - non-authoritative (see “Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 565)



Remote Windows 2000 computer - non-authoritative (see “Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 567)

These procedures will restore your computer’s operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec agents.

558

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

Use these disaster recovery procedures in the following situations: ◆

The Windows operating system has become corrupted and cannot be restored using the Emergency Repair Disks.



The hard drive containing the Windows operating system has encountered an unrecoverable error that requires reformatting the disk.



The hard drive containing the Windows operating system needs to be replaced.

Disaster Recovery of a Local Windows NT Computer Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR.

A media drive must be attached to the computer that is being recovered. You will also need: ◆

A current full backup of the computer to be recovered and any subsequent incremental/differential backups.



The Windows NT installation media.



The Backup Exec for Windows Servers installation media.

Chapter 11, Disaster Preparation and Recovery

559

Disaster Preparation

This procedure will restore your computer’s operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec database agents. If any of your data is protected by Backup Exec agents, see “Backup Exec Options” on page 37 before beginning disaster recovery.

Manual Disaster Recovery of Windows Computers ▼

To recover a local Windows NT computer: 1. Install Windows NT. Note You must also install Windows NT Service Pack 5 or higher. This basic Windows NT installation is necessary to provide Backup Exec with a target to which it can restore the system. This basic installation will later be overwritten by the backed up version, which will restore your system configuration, application settings, and security settings, including the Registry. For this basic Windows NT installation: -

Use the same computer name.

-

Use a workgroup (not a domain).

This will allow you to recover your original Security Information Descriptor (SID) through Backup Exec, so you will not have to re-establish trust relationships with all domains. If you are recovering from an entire hard disk failure, use Windows NT setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure. 2. Install Backup Exec for Windows Servers to a directory other than where it was originally installed (this is a temporary installation). Note Always log on to Windows NT using the Administrator account or its equivalent during this procedure. 3. Using the Device Driver Installation Wizard, install the appropriate device driver for the attached media drive. For more information, see “First Time Startup Wizard” on page 80. 4. Reboot the computer to load the device driver. 5. Start Backup Exec for Windows Servers. 6. On the navigation bar, click Devices. 7. Inventory the media containing the latest full backup of the computer to be recovered (see “Inventorying Media in Devices” on page 171). 8. Catalog the media containing the latest full backup of the computer to be recovered (see “Cataloging Media in a Drive” on page 413). If the subsequent differential/incremental backups are on separate media, catalog those also. 560

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

9. On the navigation bar, click Restore. 10. On the Properties pane, under Source, click Selections, and then select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set. 11. On the Properties pane, under Settings, click General, and then select the following options: -

Restore over existing files

-

Restore security

-

Preserve tree

12. On the Properties pane, under Settings, click Advanced, and then select the following options: Restore Windows NT 4.0 registry

-

Overwrite the existing hardware configuration and registry services with data to be restored

Note If you use a different computer name, on the Properties pane, under Destination, click File Redirection, and then redirect each restore job to the new destination. 13. Click Run Now to start the restore. 14. After the restore completes, reboot the computer. Your computer’s operating system is now restored to its pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Disaster Recovery of a Remote Windows NT Computer” on page 562 “Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 565

Chapter 11, Disaster Preparation and Recovery

561

Disaster Preparation

-

Manual Disaster Recovery of Windows Computers

Disaster Recovery of a Remote Windows NT Computer Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR. You can perform disaster recovery on a remote computer attached to the media server. This procedure will restore your computer’s operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec database agents. If any of your data is protected by Backup Exec database agents, see “Backup Exec Options” on page 37 before beginning disaster recovery. You will need: ◆

A current full backup of the computer to be recovered and any subsequent incremental/differential backups.



The Windows NT installation media.

Note Always log on to Windows NT using the Administrator account or its equivalent during this procedure. ▼

To recover a remote Windows NT computer: At the remote computer: 1. Install Windows NT. Note You must also install Windows NT Service Pack 5 or higher. This basic Windows NT installation is necessary to provide Backup Exec with a target to which it can restore the system. The basic installation will later be overwritten by the backed up version, which will restore your system configuration, application settings, and security settings, including the Registry. For this basic Windows NT installation: -

Use the same computer name.

-

Use a workgroup (not a domain).

This will allow you to recover your original Security Information Descriptor (SID) through Backup Exec, so you will not have to re-establish trust relationships with all domains.

562

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

If you are recovering from an entire hard disk failure, use Windows NT setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure. At the media server: 2. Start Backup Exec for Windows Servers. 3. Inventory the media containing the latest full backup of the computer to be recovered (see “Inventorying Media in Devices” on page 171). 4. Catalog the media containing the latest full backup of the computer to be recovered. If the subsequent differential/incremental backups are on separate media, catalog those also (see “Cataloging Media in a Drive” on page 413). 5. From the navigation bar, click Restore.

7. On the Properties pane, under Settings, click Advanced and make sure the Restore Windows NT 4.0 registry option is cleared. 8. On the Properties pane, under Settings, click General, and select the following options: -

Restore over existing files

-

Restore security

-

Preserve tree

Note If you use a different computer name, you must go to the File Redirection dialog box and redirect each restore job to the new computer name and share (see “Redirecting a Restore Operation” on page 452). 9. Click Run Now. At the remote computer: 10. When the restore operation has completed, reboot the remote computer. All files have now been restored. You must now restore the Windows NT Registry. At the media server: 11. Start Backup Exec for Windows Servers. Chapter 11, Disaster Preparation and Recovery

563

Disaster Preparation

6. Select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set.

Manual Disaster Recovery of Windows Computers

12. From the navigation bar, click Restore. 13. Select only the directory \<SystemRoot>\System32\Config from the last restored backup set. 14. On the Properties pane, under Settings, click General, and select the following options: -

Restore over existing files

-

Restore security

-

Preserve tree

15. On the Properties pane, under Settings, click Advanced, and then select the following options: -

Restore Windows NT 4.0 registry

-

Overwrite the existing hardware configuration and registry services with data to be restored

16. Click Run Now. At the remote computer: 17. When the restore operation has completed, reboot the remote computer using the restored Windows NT system. Your computer’s operating system is now restored to its pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Disaster Recovery of a Local Windows NT Computer” on page 559 “Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 567 “Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 565 “Manual Disaster Recovery of Windows Computers” on page 558

564

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller) Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR. This procedure will restore your computer’s operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec database agents. If any of your data is protected by Backup Exec agents, see “Backup Exec Options” on page 37 before beginning disaster recovery. A media drive must be attached to the computer that is being recovered. You will also need: A current full backup of the computer to be recovered and any subsequent incremental/differential backups.



The Windows 2000/XP/Server 2003 installation media.



The Backup Exec for Windows Servers installation media.

To recover a local Windows 2000/XP/Server 2003 computer: 1. Install Windows 2000/XP/Server 2003. This basic Windows installation is necessary to provide Backup Exec with a target to which it can restore the system. The computer name, Windows directory, and the file system (such as NTFS) must be the same as the previous Windows installation. This installation will be overwritten by the backed up version, which will restore your original system configuration, application settings, and security settings. If you are recovering from an entire hard disk failure, use Windows setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure. Do not join a domain; leave the computer in a Workgroup. Do not install Active Directory.

Chapter 11, Disaster Preparation and Recovery

565

Disaster Preparation





Manual Disaster Recovery of Windows Computers

2. Install Backup Exec for Windows Servers to a directory other than where it was originally installed (this is a temporary installation). Note Always log on to Windows using the Administrator account or its equivalent during this procedure. 3. Using the Device Driver Installation Wizard, install the appropriate device driver for the attached media drive. For more information, see “First Time Startup Wizard” on page 80. 4. Start Backup Exec for Windows Servers. 5. From the navigation bar, click Devices. 6. Inventory the media containing the latest full backup of the computer to be recovered (see “Inventorying Media in Devices” on page 171). 7. Catalog the media containing the latest full backup of the computer to be recovered (see “Cataloging Media in a Drive” on page 413). If the subsequent differential/incremental backups are on separate media, catalog those also. 8. From the navigation bar, click Restore. 9. Select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set. Make sure you include System State as part of the restore selections. 10. On the Properties pane, under Settings, click General, and then select the following options: -

Restore over existing files

-

Restore security

-

Preserve tree

11. On the Properties pane, under Settings, click Advanced, and then select the appropriate options (see “Advanced options for restore” on page 428). If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, select the option Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. 12. Click Run Now. 566

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

13. If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, reboot the computer after the restore job successfully completes. Your computer’s operating system is now restored to its pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Disaster Recovery of a Local Windows NT Computer” on page 559 “Disaster Recovery of a Remote Windows NT Computer” on page 562 “Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 567 “Manual Disaster Recovery of Windows Computers” on page 558

Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR. You can perform disaster recovery on a remote computer attached to the media server. This procedure will restore your computer’s operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec agents. If any of your data is protected by Backup Exec agents, see “Backup Exec Options” on page 37 before beginning disaster recovery. You will need: ◆

A current full backup of the computer to be recovered and any subsequent incremental/differential backups.



The Windows 2000/XP/Server 2003 installation media.

Note Always log on to Windows using the Administrator account or its equivalent during this procedure.

Chapter 11, Disaster Preparation and Recovery

567

Disaster Preparation

Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)

Manual Disaster Recovery of Windows Computers ▼

To recover a remote Windows 2000/XP/Server 2003 computer: At the remote computer: 1. Install Windows 2000/XP/Server 2003. This basic Windows installation is necessary to provide Backup Exec with a target to which it can restore the system. The computer name, Windows directory and the file system (such as NTFS) must be the same as the previous Windows installation. This basic installation will later be overwritten by the backed up version, which will restore your system configuration, application settings, and security settings. If you are recovering from an entire hard disk failure, use Windows setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure. Do not join a domain; leave the computer in a Workgroup. Do not install Active Directory. At the media server: 2. Install the Backup Exec Remote Agent to the remote computer. For more information, see “Installing the Remote Agent to Remote Windows Servers” on page 845. 3. Start Backup Exec for Windows Servers. 4. From the navigation bar, click Devices, and then inventory the media containing the latest full backup of the computer to be recovered (see “Inventorying Media in Devices” on page 171). 5. Catalog the media containing the latest full backup of the computer to be recovered. If the subsequent differential/incremental backups are on separate media, catalog those also (see “Cataloging Media in a Drive” on page 413). 6. From the navigation bar, click Restore, and then select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set. Make sure you include System State as part of the restore selections. 7. On the Properties pane, under Settings, click General, and then select the following options:

568

-

Restore over existing files

-

Restore security

-

Preserve tree

Administrator’s Guide

Manual Disaster Recovery of Windows Computers

8. On the Properties pane, under Settings, click Advanced, and then select the appropriate options (see “Advanced options for restore” on page 428). If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, select the option Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. 9. Click Run Now. 10. After the job completes, reboot the remote computer. Your computer’s operating system is now restored to its pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Disaster Recovery of a Local Windows NT Computer” on page 559

Disaster Preparation

“Disaster Recovery of a Remote Windows NT Computer” on page 562 “Manual Disaster Recovery of Windows Computers” on page 558

Chapter 11, Disaster Preparation and Recovery

569

Manual Disaster Recovery of Windows Computers

570

Administrator’s Guide

12

Troubleshooting

This section provides information about hardware, backup, restore, and error messages. It also includes answers to questions about versions, revisions, and product updates, along with answers to common questions about drives, device drivers, changers, storage devices, tape drives, and hardware errors. Note For more information, the VERITAS web site provides an updated list of Frequently Asked Questions (FAQs), release notes, and a technical knowledge base for each product.

General Questions How can I determine version and revision information for my Backup Exec installations?

How do I update Backup Exec from an evaluation copy to a serialized copy? Obtain a serial number for Backup Exec from your software vendor. Run the Backup Exec installation program to re-install the software on top of your evaluation copy and enter the serial number when prompted. Select the options for which you entered serial numbers. All configuration and backup information from the evaluation copy will be retained in the serialized copy. Only the serial number information will be updated in the registry.

571

Troubleshooting

Locally, the version and build information can be located by selecting the About Backup Exec option from the Help menu. Using ExecView, the versions of remote installations of Backup Exec can be determined by viewing the properties of each remote server.

General Questions

I set up bar code rules through the Tools menu by selecting Options, and then selecting Bar Code Rules. However, my bar code rules don’t seem to be working. Why not? After setting up bar code rules, you must set up two more items in order for the bar code rules to work. You must enable the bar code rules for the robotic library by selecting the bar code rules option on the Configuration tab in the robotic library’s properties. In addition to setting the bar code rules for each type of media you use, for each drive in your mixed media library you should indicate what type of media can be used and whether that media can be used for read or write operations. For more information, see “Bar Code Labeling in Mixed Media Libraries” on page 205. How do I use Backup Exec’s diagnostic utility, BEDIAG.EXE? Using Backup Exec’s Diagnostic Utility BEDIAG Backup Exec includes a diagnostic application (BEDIAG.EXE) that gathers information about a Windows NT, Windows 2000, or Windows Server 2003 computer for troubleshooting purposes. This application is located in the Backup Exec for Windows Servers directory on your hard drive (by default, \Program Files\VERITAS\Backup Exec\NT). The basic syntax for BEDIAG is “BEDIAG COMPUTERNAME”, which will query the selected Windows server and place the contents in a file called bediag.txt. Please use BEDIAG before calling technical support so that you can quickly answer any questions they may ask. To see other BEDIAG options, type “BEDIAG /?”. The type of information collected in the bediag.txt file includes: ◆

Account groups, account privileges and environment settings.



Backup Exec software version and registry information, Backup Exec Agent listing, Windows version information, SCSI hardware configuration, SQL Server information, Driver services information and Windows Services information.



File Server information, supported shared directories and Windows sockets information.

VERITAS Technical Support can use the results of BE Diagnostics to troubleshoot problems. Note You can also run BE Diagnostics for a remote server (see “Running Diagnostics on Remote Server” on page 575)

572

Administrator’s Guide

General Questions ▼

To create a BEDIAG.TXT from within Backup Exec: 1. Start Backup Exec. 2. On the Tools menu, select Backup Exec Diagnostics. Note You can also create a BEDIAG.TXT file from the Devices and Media views. On the navigation bar, click Devices or Media. Select the backup server. On the Properties pane, under General Tasks, click Properties. Then select the System tab. 3. Click Run Diagnostics. The file BEDIAG.TXT will be created in the directory “...\Backup Exec\NT\Data”.



From a command line prompt on the media server: 1. Launch the command prompt. 2. From the directory “...\Backup Exec\NT\Data”, type “bediag servername” (the server can be the media server or remote or if you are running this from a workstation, type “bediag workstationname”). 3. The file “BEDIAG.TXT” will be created in the directory “...\Backup Exec\NT\Data”. 4. The following switches can be used with the command line option (bediag [switches] servername):

Meaning

/a

Dump Agent List

/b:[server]

Specify a Backup Exec server to poll for service account information

/c

Dump Backup Exec software configuration from the registry

/app

Dump Application Event log

/sys

Dump System Event log

/bex

Dump only Backup Exec entries in the Application Event log

/err

Dump only error events from any event log

Chapter 12, Troubleshooting

Troubleshooting

Switch

573

General Questions

Switch

Meaning

/recs:n

Dumps only newest n records from given event logs ***The bex, err and recs switches must be used in conjunction with the app and/or sys switches

/o:[file]

Specifies output job log for append ***Omitting [file] will send output to the screen

574

/h

Dump SCSI hardware subkey from registry

/l

Dump Lotus Notes information

/n

Dump Windows Socket Network Protocols

/p

Dump user privileges

/q

Dump Microsoft SQL Server information

/s

Dump information on Services

/v

Dump Server Information

/w

Dump Windows version information

/x

Dump Microsoft Exchange Server Information

/?

Display usage information

Administrator’s Guide

General Questions

Running Diagnostics on Remote Server You can run diagnostics on a remote server provided:





Backup Exec is installed on the remote server.



Backup Exec services are running.

To run BE diagnostics on a remote system: 1. On the Tools menu, click Backup Exec Diagnostics. Backup Exec Diagnostics dialog box

2. Click Select Server and select the remote system on which you want to run the diagnostic utility.

Troubleshooting

3. Enter the logon credentials for this remote system. 4. Click OK. Diagnostic information appears in a .TXT file. 5. To print this information, on the File menu select Print. 6. After viewing this information, from the File menu, select Exit.

Chapter 12, Troubleshooting

575

Hardware-related Questions

Hardware-related Questions My drive is not listed in the drivers list for Windows NT/2000/XP/Server 2003. Which tape driver should I use? Some drives are repackaged and sold under various brand names. Following are various drive types and recommendations for drivers you can try: ◆

For cartridge tape drives, 150 MB, 250 MB, 525 MB or larger, try using the Archive or Wangtek drivers.



For DAT drives, use the 4mm DAT driver for all drives except Sony. If you have a Sony DAT drive, use the 4mm Sony driver.



For 8mm tape drives (other than Sony), try the two Exabyte drivers.

Driver load failures can occur if Windows NT/2000/XP/Server 2003 does not support the device. Run the Device Configuration wizard on the Tools menu to see if the device is recognized by the operating system. Note For more information on what devices are support by Windows NT/2000/XP/Server 2003, see the Microsoft Hardware Compatibility List contained in Microsoft’s documentation or on their online support knowledge base. For more information on what devices are supported by Backup Exec for Windows Servers, refer to the Hardware Compatibility List available on the VERITAS support web site, at support.veritas.com. My drive appears as offline. Why? If the device is offline, this message is displayed. No operations are allowed on the device until it is online again. When the device is online, no message is displayed. The device is displayed as offline if:

576



The device was turned off after Backup Exec was started.



The device was being used by another application (such as a Windows NT/2000/XP/Server 2003 backup utility) when Backup Exec was started.



The device is removed from the computer.



A tape drive failure occurred.



A tape is stuck in the drive.



The firmware of the drive was updated; Backup Exec will behave as if the drive with its old name or identity no longer exists.

Administrator’s Guide

Hardware-related Questions

To place the device online, try the following:







Check to make sure the device has power and that cables are properly attached. Turn the device on and reboot the server, or stop and restart the Backup Exec services.



Stop the utility that is using the device, and then reboot the server, or stop and restart the Backup Exec services.

To restart the Backup Exec services: ◆

For Windows NT 4.0, go to Settings|Control Panel|Services and restart all services related to Backup Exec.



For Windows 2000, go to Computer Management|System Tools|Services and Applications, and then restart all services related to Backup Exec.

If the drive’s firmware is updated or changed: If the drive firmware has changed, delete the drive and restart Backup Exec services. After the drive appears with its new firmware identity, retarget all jobs that were using the old drive name to the new drive name.

How do I get the latest device drivers for my hardware? The latest hardware device drivers are available on the VERITAS web site, at www.support.veritas.com. Download the file BNT86IDRVxx_xxxxxx.EXE. Instructions are included in the downloadable package. Backup Exec doesn’t detect my robotic library. What could be wrong?

Backup Exec does not display any storage devices for me to select. Why is that? Windows NT/2000/XP/Server 2003 may not recognize the device. Make sure the storage device was powered on before Windows NT/2000/XP/Server 2003 was loaded. If the drive was not on, power down the server and power on the tape device before powering on the server. Check the SCSI cable to make sure the cables are plugged in tightly. If the cable is loose, re-attach it and reboot Windows NT. Make sure each SCSI device (if you have more than one) has its own unique SCSI address (0 - 7). SCSI address 0 is generally reserved for the system’s boot drive. Never change the SCSI address of a device while it is powered on. While configuring your SCSI devices, remember that the SCSI controller card uses a SCSI address (usually set to SCSI address 7).

Chapter 12, Troubleshooting

577

Troubleshooting

Be sure that Windows NT/2000/XP/Server 2003 properly recognizes the device. This can be verified by checking the Tape Devices component in the control panel. For configuration and setup instructions, see “VERITAS Backup Exec - Library Expansion Option” on page 1175. You may also want to read “Using Microsoft’s Removable Storage Feature with Backup Exec” on page 167.

Hardware-related Questions

The SCSI bus must be properly terminated in order for all of the devices on the chain to operate properly. For more information, refer to the documentation that came with the device. Note It is recommended that the tape device be on its own SCSI controller. If you have not installed the correct storage device driver, launch the Device Configuration wizard from the Tools menu within the Backup Exec console. Frequently, I get “Hardware Error” or “Fatal Tape Format Inconsistency” messages. What can I do to fix this? Try the following: ◆

Make sure you have the SCSI bus properly terminated. For more information, refer to the documentation that came with the device.



Make sure you have the correct media for your drive; many media cartridges look the same but are not supported by different media drives. For example DDS3 tapes look similar to DDS2 tapes, but they are incompatible. If the wrong media type is inserted into the drive, the drive may attempt to use the cartridge and experience problems.



Use a new media cartridge; the media may be worn.



Clean the tape device with the correct cleaning cartridge. Tape devices must be routinely cleaned in order to operate properly. For more information, refer to the documentation that came with the device.



Set up the tape device as the only device on the SCSI bus. Sometimes different SCSI devices do not “share” the bus well together.



SCSI cable length and quality can affect performance. If possible, replace the SCSI cable with a shorter SCSI cable.



If your drive and controller support both SCSI 1 and SCSI 2 modes, be sure they are set to use SCSI 2 mode. However, if you have an older drive, it may only operate in SCSI 1 mode even though the controller may support both modes.

My storage device hangs whenever a Catalog operation is started. Why is this? Some storage devices with older firmware may not work correctly with the Use Storage Media-Based Catalogs option selected. From the Tools|Options|Catalog menu within the Backup Exec administration console, de-select the Use Storage Media-Based Catalogs option. Note This will cause catalog operations to take longer.

578

Administrator’s Guide

Hardware-related Questions

Can I restore a hardware-compressed tape using a drive that does not support data compression? Can the tape be reused? A drive that supports hardware compression must be used to restore the data on the tape. Preferably, the same drive type and firmware should be used to ensure compatibility. Because different hardware uses different compression methods, a tape created with hardware compression on one device may not be readable by another device. The tape can only be reused in the non-compression drive if you first perform a quick erase operation on the tape. If the drive supports compression, the media can simply be erased and reused. Note Make sure the tape can be bulk-erased without destroying the media. Some tape manufacturers write a signature, such as DDS2 or DDS3, to the tape that is used for identification. If the tape is bulk-erased, the signature is destroyed and the tape cannot be used for backup operations. Why does my DLT tape drive hang when cataloging some tapes? The DLT tape drive maintains internal information about the tape on a tape directory track. The directory track is updated before the tape is ejected from the drive. If the drive is powered off without ejecting the tape first, this information is lost. Re-generating the tape directory information takes several hours to complete, which makes it seem like the drive is hung. Allow sufficient time for the operation to complete and then eject the tape. Normal operation will resume after the directory track has been updated.

Troubleshooting

Chapter 12, Troubleshooting

579

Backup Questions

Backup Questions I am unable to back up certain files on my system that are being used by other processes. Why is that? When Backup Exec encounters a file that is in use by another process, it either skips the file or waits for the file to become available, depending on the Backup open files setting. When Backup Exec is configured to back up open files, it attempts to open the files in a different mode. It locks these files while they are being backed up to prevent other processes from writing to them. This mode should be a last resort to obtaining a backup of open files; in most circumstances, it is more desirable to close applications that leave files open so their files may be backed up in a consistent state. If you want to back up open files on Windows NT servers and workstations, Backup Exec’s Open File Option (sold separately) provides uninterrupted data protection for network environments. I can’t see any Windows 98 agents from Backup Exec; why is this? Be sure the Enable Agents Using TCP/IP Protocol or Enable Agents Using NetWare IPX/SPX Protocol options are selected in the Network tab of the Tools|Options menu. If IPX/SPX is being used, try configuring the agent to use TCP/IP protocol (see “Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent” on page 594). You may also use the IP address of the media server rather than the actual computer name in the Windows 98 Agent Configuration utility. Why do Backup Exec’s services continue to own a storage device even when it's not running? Backup Exec is a true client/server application that must always be available to process jobs submitted from both local and remote administrative consoles. Because of the Advanced Device and Media Management functionality in v7.x and later, all storage devices attached to the media server are claimed by Backup Exec whenever the server is running. The Advanced Device and Media Management feature in Backup Exec requires constant control of the storage devices in order to perform two important and useful operations: collection of statistics on media and device usage, and media overwrite protection.

580

Administrator’s Guide

Backup Questions

How do I keep storage devices from being managed exclusively by Backup Exec? If you must exclude a storage device from being managed by Backup Exec, there are two methods to consider: ◆

Disabling the storage device for Backup Exec through the administration console.



Including a BESTOP pre-job command and a BESTART post-job command in a script executed by applications other than Backup Exec. The BESTOP and BESTART commands must be copied from the utilities directory on the installation CD. Use this method only if you want to release all drives.

Following are details on these methods. ▼

Disable storage devices for Backup Exec through the administration console: You can change the storage device properties so that the device is not used by Backup Exec. This is the best method to use if you want to: ◆

Permanently exclude a storage device from being managed by Backup Exec.



Specify which storage devices to exclude from Backup Exec.

1. In the Backup Exec administration console, click the Job Monitor tab to view all scheduled and active jobs, and make sure that the device you want to exclude is inactive. 2. Click the Devices tab, and then right-click the device to display the shortcut menu.

4. On the Drive Properties window, click the Configuration tab. If the field Enable Device for Backup Exec is checked, then Backup Exec has exclusive access to this device. 5. Clear the Enable Device for Backup Exec check box to disable the device for Backup Exec, and allow it to be available for other applications. Note If the device is active, it is not released for use by other applications even if it is marked as Disabled in this field. 6. After changing the option, click OK.

Chapter 12, Troubleshooting

581

Troubleshooting

3. On the shortcut menu, click Properties.

Backup Questions ▼

Release storage devices from Backup Exec by including commands in scripts: Include a BESTOP pre-job command and a BESTART post-job command in scripts executed by applications that need to use storage devices that are otherwise owned by Backup Exec. Run BESTOP to stop the services and release the storage device. Then, after the application has completed and no longer needs the storage device, run BESTART to restart the services. You can copy the BESTOP.BAT and BESTART.BAT commands from the WINNT/UTILS directory on the Backup Exec for Windows NT installation CD. This is the best method to use if you want to: ◆

Use many storage devices in other applications.



Return management of all storage devices to Backup Exec each time after other applications are finished.

Note When a storage device is excluded from Backup Exec, the Advanced Device and Media Management services cannot collect statistics on usage for that device and any media used in that device. Therefore, any thresholds set for device and media usage, such as when cleaning jobs are to be performed, or when media should be discarded, are no longer valid since statistics were not collected while the device was excluded from Backup Exec management. Additionally, the Advanced Device and Media Management services cannot provide media overwrite protection for media inserted in a storage device that is excluded from Backup Exec. Any media placed in a storage device that is not managed by Backup Exec may be overwritten. When performing a local backup, the total number of bytes backed up by Backup Exec does not match the number of bytes displayed by Windows NT Explorer, File Manager, or the DIR command. Why? This problem may be caused by the type of partition for which the system is formatted. If you have a Windows NTFS compressed partition, Backup Exec displays the uncompressed byte count of the files being backed up while Windows NT Explorer displays the compressed byte count of the files on the hard drive. For example, a NTFS partition that contains 1 GB of data is compressed by Windows NT to 500 MB. Backup Exec reports that 1 GB of data was backed up, even though Windows NT Explorer displays that only 500 MB of compressed data exists on the hard drive. If you have a FAT partition, Backup Exec reports the actual number of bytes of the files being backed up while File Manager reports an inflated amount of disk space. For example, a 2 GB FAT partition has a 32 K cluster size and File Manager displays 1.9 GB of used space. Backup Exec reports that 1.4 GB of data was backed up. Assuming that a 50 MB pagefile.sys is excluded from the backup, there is a 450 MB difference in the number of bytes.

582

Administrator’s Guide

Backup Questions

Converting to NTFS will regain disk space since it is more efficient and the default cluster size (automatically set by Windows NT) in NTFS is less than FAT. Windows NT allows you to specify a cluster size other than the default; however system performance may decrease. For more information, see the Windows NT documentation. The following tables display the cluster sizes for NTFS partitions. NTFS Partition Cluster Sizes Partition Size (MB)

Cluster Size

<= 255

512

256 - 511

1024

512 - 1023

2048

1024 - 2047

4096

The following tables display the cluster sizes for FAT partitions. FAT Partition Cluster Sizes Cluster Size (K)

<= 127

2

128 - 255

4

256 - 511

8

512 - 1023

16

512 - 1023

32

Chapter 12, Troubleshooting

Troubleshooting

Partition Size (MB)

583

Restore Questions

Restore Questions Sometimes the byte counts for data that I restore don’t match the byte counts indicated when the data was initially backed up. Why? When data backed up from an NTFS volume is restored to an NTFS volume, the byte count will match between the backup and restore operations. However, when data backed up from a NTFS or FAT volume is restored to a FAT volume, the byte count restored is expected to be less than that backed up. The reason for the discrepancy is that the Windows NT operating system returns a default ACL (access control list) for FAT data; the stream of data is backed up (and the bytes are counted) but is discarded during a restore (and the bytes are not counted).

Error Messages

584

Error Message

Problem

Solution

Invalid filename [filename].

The file name contains characters not permitted by Backup Exec for Windows Servers. Refer to your Backup Exec for Windows Servers Administrator’s Guide.

Enter a valid file name.

The path cannot contain The path contains a drive a drive designator. designator (e.g., c:, g:, etc.).

Remove the drive designator and try again.

The path cannot contain The path contains a file name. a file name.

Remove the file name and try again.

Warning: This media is out of sequence.

While using multiple media, you Remove the media and insert the loaded the media out of sequence. correct media in the sequence.

File name is not valid.

The file name contains characters not permitted by Backup Exec for Windows Servers. Refer to your Backup Exec for Windows Servers Administrator’s Guide.

None of the sets matched the requested volume.

The search did not find any backup If the path entered is not correct, sets that matched the correct it and try again. drive/volume specified.

Enter a valid file name.

Administrator’s Guide

Error Messages

Error Message

Problem

Solution

Too many files matched The search criteria was too general. Enter more specific search criteria the selection criteria. or increase the Maximum Search More files were found Results and try again. than will be displayed. The backup set is not completely cataloged. The backup set may have crossed media or cataloging was canceled before it was completed.

Catalog the media again.

This set must be cataloged before it can be viewed.

The set is partially cataloged.

Fully catalog the set by clicking OK in the window.

Storage device not responding.

Backup Exec cannot access the storage device.

Exit Backup Exec, power down the server and the storage device, if it is external. Check the connections on the storage device, and then power on the storage device before you power on the server.

Unable to attach to [computer name]. The network path was not found.

This is a network error. A server may not be available or not responding.

Check your server or check with your network administrator.

Storage device <device There may be a bad drive, cabling, Correct the hardware problem and name> reported an error driver, or SCSI card. try again. on a request to <string describing operation>. Error reported: Timeout before function completed. Storage device <device The drive could be dirty or the name> reported an error media may be bad. There could on a request to <string also be a drive problem. describing operation>. Error reported: Bad data.

Chapter 12, Troubleshooting

Clean the drive and/or try a new or different media.

585

Troubleshooting

This set is not completely cataloged.

Error Messages

Error Message

Problem

Solution

Storage device <device There may be a drive problem or a Correct the problem and try again. name> reported an error problem or conflict with some on a request to <string other peripheral on the same bus. describing operation>. Error reported: Bus reset. Storage device <device There may be a bad drive, cabling, Correct the hardware problem and name> reported an error or SCSI card. try again. on a request to <string describing operation>. Error reported: Hardware failure. WARNING: Media # [number] is out of sequence.

This media is part of a multi-media Remove the media, insert the family and the media you have correct media, and try again. loaded is out of sequence.

The selections for [device name] will be omitted from the operation.

The device specified in the selections is not available.

This media is part of a multi-media Unexpected end of backup set encountered family with a format that requires that the media be processed in on [filename]. sequential order.

Correct the problem and try again.

If you want to catalog this media and restore data from it, you must start the catalog operation with media #1 in the drive.

Media is out of This media is part of a multi-media Remove the media and insert the sequence. Insert media family and the media you have correct media. one of this media family. loaded is out of sequence.

586

Administrator’s Guide

13

VERITAS Backup Exec - Workstation Agents

Workstations interact with the media server through Backup Exec Agents. Installing, configuring, and running the workstation agent software allows drives and directories on the workstation to be protected by Backup Exec. The Backup Exec Windows 98 and Windows Me Agent files, along with the Macintosh and UNIX Agent files are copied automatically during installation from the Backup Exec installation CD to the appropriate subdirectory in Program Files\VERITAS\Backup Exec\NT\Agents on the media server. Instructions for installing the agent files on workstations are given in each of the agent sections. After installing the agent on the workstation, you can configure: ◆

The directories and drives on the workstation that you want the media server to be able to access for operations (these are called published directories or drives).



The level of access that the Backup Exec administrator has to each published directory and/or drive. For example, you can assign a password to any directory or drive. Then, before the directory or drive can be backed up, the administrator must provide that password. You can also designate directories or drives as read-only, which prevents data from being restored to those directories or drives.

Workstation Agents

587

The Backup Exec Windows 98 and Windows Me Agents

The Backup Exec Windows 98 and Windows Me Agents The Backup Exec Windows 98 and Windows Me Agent enables Backup Exec to perform backup and restore operations on Windows 98/Me workstations that are connected to the network. The Backup Exec Windows 98/Me Agent files are copied automatically during installation from the Backup Exec installation CD to the Program Files\VERITAS\Backup Exec\NT\Agents directory on the media server. See also: “Requirements for Running the Backup Exec Windows 98/Me Agent” on page 588 “Installing the Backup Exec Windows 98/Me Agent on the Workstation” on page 589 “Configuring the Backup Exec Windows 98/Me Agent” on page 590 “Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent” on page 592 “Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent” on page 594

Requirements for Running the Backup Exec Windows 98/Me Agent

588



You must have access to the Network option on the workstation’s Control Panel.



The server must run the IPX/SPX or TCP/IP network protocols.

Administrator’s Guide

The Backup Exec Windows 98 and Windows Me Agents

Installing the Backup Exec Windows 98/Me Agent on the Workstation The Backup Exec Windows 98/Me agents supplied on the Backup Exec Installation CD provide several improvements, such as an agent status window, that are not included with the Microsoft agent supplied with Windows 98/Me. Note If an earlier version of the Backup Exec Windows 98/Me agent is already installed and running on the Windows 98/Me workstation, you must shut down the agent before upgrading it. ▼

To install the Windows 98/Me agent on a Windows 98/Me workstation: 1. Log on to the media server from the workstation, and from the Program Files\VERITAS\Backup Exec\NT\Agents\win9x\[language] directory on the media server, double-click Setup.exe. 2. Follow the instructions. 3. When the Help screen appears, follow its directions. Backup Exec Windows 98/Me Agent

Workstation Agents 4. When you have completed the instructions, you are prompted to reboot the Windows 98/Me workstation. You must reboot the workstation for the agent to run properly.

Chapter 13, VERITAS Backup Exec - Workstation Agents

589

The Backup Exec Windows 98 and Windows Me Agents

Configuring the Backup Exec Windows 98/Me Agent By default, when the agent is installed, all local fixed disk drives on the workstation are published at their root level without password protection. You can change the default configuration to publish other directories, or to password-protect the agent. ▼

To change configuration settings on a Windows 98/Me workstation: 1. For Windows 98 or Windows Me, right-click the Network Neighborhood or My Network Places icon on the desktop. 2. Click Properties and then click the Configuration tab. 3. In the list of installed network components, double-click Backup Exec Agent. Backup Exec Agent Publisher dialog box

590

Administrator’s Guide

The Backup Exec Windows 98 and Windows Me Agents

4. Select the appropriate options as follows: Backup Exec Agent Publisher Properties Option

Action

General tab Disable network backup

Keeps the workstation from being backed up by the media server. When Disable Network Backup is on, the agent is not loaded when the workstation is started, and the media server will no longer see the computer as a published agent. If you turn on this option while the agent is running, the agent is stopped.

Enable network backup Enable network backup

Enables the media server to back up or restore to the workstation.

Computer Name

Identifies the workstation with an alphanumeric label (up to 36 characters) to the media server. You can use the default, which is the name used in the Windows 98/Me network.

Password

Used to enter a password (up to 32 characters, upper- or lower-case) in the password field. This password is required before anyone performing a backup or restore from the media server can access the workstation’s published directories or drives. To change a password, select this option, then enter the new password in the password field.

Current Status

Registry Allow Registry to be restored

Enables the workstation’s Windows 98/Me registry to be restored.

Chapter 13, VERITAS Backup Exec - Workstation Agents

591

Workstation Agents

Displays the current status of the agent. Status messages include: Not Running, Idle, and Connected. Not Running indicates the agent is either disabled or shut down. Idle indicates the agent has loaded and is waiting for a connection by a user or the media server. Connected indicates that a user or the media server has connected to the agent and is accessing it.

The Backup Exec Windows 98 and Windows Me Agents Backup Exec Agent Publisher Properties (continued) Option

Action

Published Folders Name, Path, Access Control

Lists any published directories and drives, or their aliases, and the level of access control assigned. By default, all local drives are published.

Add

Used to add directories and drives to the list of published folders.

Remove

Used to remove the selected directory or drive from the list of published folders.

Details

Used to change the access control for published folders.

See also: “Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent” on page 592 “Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent” on page 594

Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent To have the media server back up drives and directories, you must add them (or publish them) to the Published Folders list (all local drives are published by default). You can list up to eight published folders. When you publish the drives and directories, you can also choose to password-protect them, or to designate them as read only. ▼

To publish drives and directories using the Windows 98/Me Agent: 1. For Windows 98 or Windows Me, right-click the Network Neighborhood or My Network Places icon on the desktop. 2. Click Properties and then click the Configuration tab. In the list of installed network components, double-click Backup Exec Agent.

592

Administrator’s Guide

The Backup Exec Windows 98 and Windows Me Agents

3. At the bottom of the General tab, click Details. Folder Details dialog box

4. Select the appropriate options as follows: Folder Details options Description

Path

Enter the path to the folder you want to protect, or click Browse to help locate a folder.

Folder Name

(Optional) In Folder Name, enter an alias that you want to use for this folder.

Access Control

(Optional) Sets or changes access control for a published folder, do one of the following

Requires Password (PW)

Password-protects a published folder. Using a password protects the published folder from unauthorized backup.

Read Only (RO)

Designates the folder as read-only. Clicking Read Only enables only backup operations to be performed on the path; restore operations are not allowed.

5. Click OK. The drives and folders you selected, and any access control that you designated for those folders, are displayed in the Published Folders window on the Backup Exec Agent Properties dialog box.

Chapter 13, VERITAS Backup Exec - Workstation Agents

593

Workstation Agents

Item

The Backup Exec Windows 98 and Windows Me Agents

Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent To use the Backup Exec Windows 98/Me agent, the computer on which Backup Exec is installed must be running either the IPX/SPX or TCP/IP communications protocols. Choosing which protocol to use is your decision; either one can be used, or you can run them both simultaneously. If you use TCP/IP, make sure all Backup Exec Windows 98/Me agent computers are configured to advertise their IP addresses directly to the media server and servers that are used for remote administration purposes. No additional configuration is needed when the IPX/SPX protocol is used. To set up and run the IPX/SPX or TCP/IP protocols on the media server, refer to your Windows documentation. Note If you use Dynamic Host Configuration Protocol (DHCP) on a media server or a server that is used for remote administration purpose, and plan to use the Windows 98 Agent on TCP/IP, read the following: By using DHCP to dynamically configure the IP address of the host computer running Backup Exec for Windows Servers, the possibility exists that a different IP address will be assigned to the host computer each time it is restarted. Because the IP address assigned to the Backup Exec Windows 98/Me agent during agent installation is supposed to match the IP address of the computer running Backup Exec, agent-to-host communication problems may occur since the host’s IP address might change each time it boots. You can also enter a DNS host name instead of an IP address. This eliminates the need for a static IP address. In order to ensure that the Backup Exec Windows 98/Me agent consistently communicates with the Backup Exec host computer, you should RESERVE an IP address for the host running Backup Exec using the Windows DHCP Administrator program. Refer to your Windows documentation for details. ▼

To configure the Windows 98/Me Agent network protocol: 1. For Windows 98 or Windows Me, right-click the Network Neighborhood or My Network Places icon on the desktop. 2. Click Properties and then click the Configuration tab. 3. In the list of installed network components, double-click Backup Exec Agent.

594

Administrator’s Guide

The Backup Exec Windows 98 and Windows Me Agents

4. Click the Protocol tab. Backup Exec Agent Publisher dialog box

5. Select the appropriate options from the following: Backup Exec Agent Publisher options Description

SPX/IPX

Configures the Backup Exec Agent for use with SPX/IPX-based networks. Typically used with Novell NetWare-based networks.

TCP/IP

Configures the Backup Exec Agent for use with TCP/IP-based networks. TCP/IP is the communications protocol typically used in heterogeneous networks.

Configured Media Servers

Shows all previously configured media servers.

6. If you select TCP/IP, click Add.

Chapter 13, VERITAS Backup Exec - Workstation Agents

595

Workstation Agents

Item

The Backup Exec Macintosh Agent

7. In the Adding Media Server box, type the host name or IP address of the media server that will be used to back up this computer, then click OK. 8. Click OK to close the Backup Exec Agent Properties dialog box.

The Backup Exec Macintosh Agent The Backup Exec Macintosh Agent allows Backup Exec to perform backup and restore operations on Macintosh workstations that are connected to the network. This agent must be running on the Macintosh workstation before backup or restore operations can be performed. After the agent is installed, configured and the Macintosh workstation is restarted, the workstation is ready for backup. When backing up data using the Backup Exec Macintosh Agent, Backup Exec allows you to protect data using full or working set backup types. Note The Backup Exec Macintosh Agent only supports Mac OS X; Macintosh Operating System versions 6.x though 9.x are not supported. See also: “Understanding Backup Methods and Their Advantages” on page 355 “Installing and Configuring the Macintosh Agent on a Mac OS X Workstation” on page 597 “Requirements for Running the Backup Exec Macintosh Agent” on page 596

Requirements for Running the Backup Exec Macintosh Agent

596



To install the Mac OS X Agent, the root account must be activated and you must have access to it.



The Mac OS X BSD Subsystem and its associated utilities must be installed.



A media server must be reachable from the host using DNS, NIS, NetInfo, LDAP, or another naming system. Otherwise, the media server must be added to the local NetInfo database on the host. As a third option, you can also use the Backup Exec media server’s IP address, in place of the media server name.



Agents using the TCP/IP protocol must be enabled from the Backup Exec media server.

Administrator’s Guide

The Backup Exec Macintosh Agent

Installing and Configuring the Macintosh Agent on a Mac OS X Workstation ▼

To install the Mac OS X - based Backup Exec Macintosh Agent using a naming service: Caution Having a working knowledge of UNIX is highly recommended and extremely helpful when installing the Mac OS X - based Backup Exec Macintosh Agent. 1. At the Mac OS X workstation, start NetInfo Manager. Using the Finder, click Applications and then Utilities. 2. Log on using an administrative account. Use Domain and then select Security and then Authenticate. 3. Enable the root account. Use Domain and then select Security and then Enable Root User. 4. Log on again if necessary using the same administrative account. Use Domain and then select Security and then Authenticate. 5. Set the root password. Use Domain and then select Security and then Change Root Password. 6. Exit NetInfo Manager. 7. Using Finder, select Applications and then Utilities and then Terminal. 8. In the Terminal window, change to the root user by typing su at the command prompt and then pressing <Enter>.

-

To use a naming service (DNS, NIS, LDAP, etc.), you must configure the Macintosh to use this feature. For more information, see your Macintosh OS X documentation.

-

To use the media server’s IP address, specify it in place of the media server’s name in step 31.

-

To use NetInfo, perform the steps listed in “Modifying the NetInfo Database” on page 601 and then continue with step 10 in this section.

Chapter 13, VERITAS Backup Exec - Workstation Agents

597

Workstation Agents

9. Because the Macintosh Agent must communicate with the Backup Exec media server, you must either specify the IP address, use a naming service or enter the media server’s IP address in the NetInfo database in order for communications to occur.

The Backup Exec Macintosh Agent

10. Copy the be_agnt.tar file, which contains the Macintosh OS X Agent, to a temporary directory on the workstation to be protected. The be_agnt.tar file is located on the Backup Exec installation CD and in the Agents subdirectory of the Backup Exec media server’s Programs directory. You can copy the file to the workstation via the network using FTP, a Macintosh share on the media server, or any other method you prefer. Or you can insert the Backup Exec installation CD in the workstation to be protected and copy the file from the CD. Note If you are pushing the Macintosh OS X Agent from the media server to the workstation using FTP, ensure that you use the binary transfer mode, not the ascii mode. Prior to starting the file transfer, type binary at the command prompt on the media server, and then press <Enter>. 11. At the workstation, from the temporary directory you want to use, type tar -xvf be_agnt.tar 12. Press <Enter>. 13. Then, run the installation script by typing ./INSTALL 14. Press <Enter>. The installation begins by reporting the Macintosh platform to which the agent is being installed. You are prompted for information to complete the installation and configuration of the Backup Exec Macintosh Agent. 15. If prompted, select a language by typing the number that corresponds to the language you want to use, then press <Enter>. 16. Enter the full directory path where you want the Backup Exec Macintosh Agent to be installed. By default, the agent is installed in /etc/bkupexec. You can specify another directory. If the full directory path that you specify does not exist, you are prompted to have it created. 17. Enter the name for this workstation. By default, the network node name is used. If you want to use a different name, make sure it is a unique name not used by other Backup Exec Macintosh agents. 18. You can choose to require a password for this workstation. If you do, you are prompted to enter a password. 598

Administrator’s Guide

The Backup Exec Macintosh Agent

19. You are asked about the number of network interfaces in your workstation. If you have more than one network interface, you are asked if you want to specify which network interface to use. If you answer yes, then you must specify an IP address of a local network interface for the agent to use. Should you have more than one network interface and choose not to specify which one to use, the agent will use an appropriate interface to communicate with a media server 20. Enter the directory path that you want backed up. If you want to back up the Macintosh workstation’s entire hard disk, simply define a directory path as “/”. This allows the network administrator to select the entire disk for backup. You can create and publish up to eight unique directory paths. Note If your computer has more than one file storage volume on the same physical hard disk, or has more than one hard disk, then specifying the root directory (/) for backup will not protect all of the volumes. To back up the desired additional volumes, they must be specified individually. For example, to back up a disk called Videos, you must also specify /Volumes/Videos as one of the directories to be backed up. 21. Enter a unique resource name for each published path. The resource name is used by the media server to identify the contents of each published path. If you chose a directory path of “/”, by default the resource name is [root]. For any other path, the default name is the path name. 22. To allow files to be restored to a published path, type y, when prompted. If you do not want to allow the Backup Exec application to restore files, type n. 23. You can choose to require a password for each published path. If you choose to password-protect the path, the password is required before Backup Exec can perform operations on this path.

25. When you have finished creating published paths, you are prompted to enter the names of the media servers that will back up your workstation. A maximum of twenty media servers is allowed. After entering a media server name, the server is located and added to the list of valid media servers.

Chapter 13, VERITAS Backup Exec - Workstation Agents

599

Workstation Agents

24. You can continue to publish directory paths for backup and restore operations by repeating these steps.

The Backup Exec Macintosh Agent

26. You are prompted to enter the frequency (in seconds) that you want the Backup Exec Macintosh Agent to send advertisement messages to the media servers so that the servers are aware that the workstation is accessible. Note It is recommended that you use the default frequency of 30 seconds. 27. You are prompted to choose a method to back up symbolic links. Choose one of the following methods: -

Method 1: The symbolically linked directory is handled as a special file and only the information required to create the symbolic link is backed up.

-

Method 2: The symbolically linked directory is backed up as a normal directory. All files and subdirectories within the symbolically linked directory are also backed up.

28. After choosing a backup method for symbolic links, your Backup Exec Macintosh Agent configuration is complete. You can edit the agent.cfg file to change your agent configuration at any time. Changes to the configuration file take effect after the Macintosh workstation is rebooted. 29. Start the Mac OS X Agent by moving to the folder where the Backup Exec Macintosh Agent is installed. 30. At the command prompt, type: ./agent.be & The agent starts and runs in the background. The data on the Macintosh is now available for backup.

600

Administrator’s Guide

The Backup Exec Macintosh Agent

Modifying the NetInfo Database If a media server or other host is not reachable using a naming service, add it to the local NetInfo database. ▼

To modify the NetInfo Database: 1. Using Finder, select Applications and then Utilities and then Terminal. In the Terminal window, change to the root user by typing su at the command prompt and then pressing <Enter> 2. Run the following commands in the Terminal window, replacing the myhost name and IP address with the name and IP address of your Backup Exec media server: niutil -create . /machines/myhost niutil -createprop . /machines/myhost name myhost niutil -createprop . /machines/myhost ip_address 10.88.100.201 niutil -createprop . /machines/myhost serves ./local ping -c 3 myhost 3. When finished, type exit to close the terminal window. See also: “Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent” on page 592

Workstation Agents

Chapter 13, VERITAS Backup Exec - Workstation Agents

601

About the Backup Exec UNIX Agent

About the Backup Exec UNIX Agent The Backup Exec UNIX Agent allows Windows Server network administrators to perform backup and restore operations on UNIX workstations and servers that are connected to the network. This agent must be running on the UNIX device before backup or restore operations can be performed. After the agent is configured and the UNIX device is restarted, the workstation is ready for backup. When backing up data using the Backup Exec UNIX Agent, Backup Exec allows you to protect data using multiple backup types. These include: ◆

Full



Differential



Incremental



Working set

See also: “Understanding Backup Methods and Their Advantages” on page 355 “Requirements for Running the Backup Exec UNIX Agent” on page 602 “Installing the Backup Exec UNIX Agent on the Workstation” on page 603 “Configuring the Backup Exec UNIX Agent” on page 606

Requirements for Running the Backup Exec UNIX Agent

602



You must have root privilege on the UNIX computer to install the UNIX agent.



TPC/IP is required on the media server.



The names and IP addresses of each media server used to access UNIX workstations must be in the /etc/hosts file on the UNIX workstations.

Administrator’s Guide

About the Backup Exec UNIX Agent

Installing the Backup Exec UNIX Agent on the Workstation When you install the Backup Exec UNIX agent, you are prompted to configure it as well. The agent configuration information is saved to a text file called agent.cfg that you can edit to change any configuration options. Before installing the Backup Exec UNIX agent on a system using a network name service (for example NIS), you must modify the network’s master database /etc/services file. Make sure you have root privileges at the master server. Note During the initial installation of Backup Exec, the Backup Exec UNIX Agent files are copied automatically from the Backup Exec installation CD to the Program Files\VERITAS\Backup Exec\NT\Agents\UNIX directory on the media server. ▼

To modify the /etc/services files: 1. Edit the input file (/etc/services) for the map you want to change. 2. Add the following line, then save and exit the file: grfs 6101/tcp # Backup Exec Agent 3. Type the following: cd /var/yp make services.byname The make command updates the NIS map according to the changes made to the input file, then propagates the changes to all other NIS servers on the network. The Backup Exec UNIX agent is then installed by using ftp to push the agent files from the server to the workstation.



Installing the Backup Exec UNIX Agent from the Server:

2. The be_agnt.tar file must be transferred to the UNIX workstation. One way to transfer this file is to open a command prompt window, and at the prompt, type ftp xx.xx.xx.xx <Enter> where xx.xx.xx.xx is the IP address of the UNIX workstation where you want to install the agent.

Chapter 13, VERITAS Backup Exec - Workstation Agents

603

Workstation Agents

1. Log on as root on the media server, and put the Backup Exec installation CD in the server’s CD-ROM drive.

About the Backup Exec UNIX Agent

3. Because the UNIX agent file must be pushed from the server to the workstation in binary mode, change from the ASCII default mode to the binary mode by typing the following at the prompt: binary <Enter> 4. Create a temporary directory on the workstation. If you prefer, you can use the /tmp directory. Go to the temporary directory or /tmp directory, and then type put be_agnt.tar <Enter> 5. At the workstation, from the temporary directory you want to use, type tar -xvf be_agnt.tar <Enter> 6. Then, run the installation script by typing ./INSTALL <Enter> The installation begins by reporting the UNIX platform to which the agent is being installed. You are prompted for information to complete the installation and configuration of the Backup Exec UNIX Agent. 7. If prompted, select a language by typing the number that corresponds to the language you want to use, then press <Enter>. 8. Enter the full directory path where you want the Backup Exec UNIX Agent to be installed. By default, the agent is installed in /etc/bkupexec. You can specify another directory. If the full directory path that you specify does not exist, you are prompted to have it created. 9. Enter the name for this workstation. By default, the network node name is used. If you want to use a different name, make sure it is a unique name not used by other Backup Exec UNIX agents. 10. You can choose to require a password for this workstation. If you do, you are prompted to enter a password. 11. You are asked about the number of network interfaces in your workstation. If you have more than one network interface, you are asked if you want to specify which network interface to use. If you answer yes, then you must specify an IP address of a local network interface for the agent to use. Should you have more than one network interface and choose not to specify which one to use, the agent will use an appropriate interface to communicate with a media server.

604

Administrator’s Guide

About the Backup Exec UNIX Agent

12. Enter the directory path that you want backed up. If you want to back up the workstation’s entire hard disk, simply define a directory path as “/”. This allows the network administrator to select the entire disk for backup. You can create and publish up to eight unique directory paths. 13. Enter a unique resource name for each published path. The resource name is used by the media server to identify the contents of each published path. If you chose a directory path of “/”, by default the resource name is [root]. For any other path, the default name is the path name. 14. To allow files to be restored to a published path, type y, when prompted. If you do not want to allow the Backup Exec application to restore files, type n. 15. You can choose to require a password for each published path. If you choose to password-protect the path, the password is required before Backup Exec can perform operations on this path. 16. You can continue to publish directory paths for backup and restore operations by repeating these steps. 17. When you have finished creating published paths, you are prompted to enter the names of the media servers that will back up your workstation. A maximum of twenty media servers is allowed. After entering a media server name, the server is located and added to the list of valid media servers. Note You can also enter the media server’s IP address in place of the media server’s name.

Note It is recommended that you use the default frequency of 30 seconds.

Chapter 13, VERITAS Backup Exec - Workstation Agents

605

Workstation Agents

18. You are prompted to enter the frequency (in seconds) that you want the Backup Exec UNIX Agent to send advertisement messages to the media servers so that the servers are aware that the workstation is accessible.

About the Backup Exec UNIX Agent

19. You are prompted to choose a method to back up symbolic links. Choose one of the following methods: -

Method 1: The symbolically linked directory is handled as a special file and only the information required to create the symbolic link is backed up.

-

Method 2: The symbolically linked directory is backed up as a normal directory. All files and subdirectories within the symbolically linked directory are also backed up.

After choosing a backup method for symbolic links, your Backup Exec UNIX Agent configuration is complete. You can edit the agent.cfg file to change your agent configuration at any time. Changes to the configuration file take effect after the UNIX workstation is rebooted.

Configuring the Backup Exec UNIX Agent To configure the Backup Exec UNIX agent, edit the agent configuration file, agent.cfg, and make changes. By default, the agent.cfg file is installed on each UNIX agent workstation in the /etc/bkupexec subdirectory. You can use any text editor to make changes to the agent.cfg file. The first portion of the agent.cfg file contains instructions that define and explain each of the configuration lines. The actual agent configuration commands are found at the end of the file. The following table lists the commands and parameters used with the Backup Exec UNIX agent.cfg file. Commands are bold; parameters within [] are optional. Agent.cfg Commands Item

Description

name <workstation name> Use this command to enter another name for this workstation. This name appears in the Backup Exec selection screens. This item is optional. If a workstation name is not provided, the workstation’s network node name (for example, uname -n) is used. password <passwd>

606

Use this command to assign a password to this workstation. If you assign a password, then in order to access this workstation, the Backup Exec administrator must enter the password during operations. If a password was not provided during installation, the Backup Exec administrator must press <Enter> when prompted for a password. This item is optional.

Administrator’s Guide

About the Backup Exec UNIX Agent Agent.cfg Commands (continued) Item

Description

export

Use this command to specify a directory tree to publish so that it will be accessed by Backup Exec. The following commands are used with export: ◆



- Use this command to identify the exported paths of the agent workstation. This name appears in the Backup Exec Networks window under Backup Exec Agents. [write_protected] - Use this command if you want the published path to be accessed for backup operations but not for restore operations.



<password> - Use this command to assign a password to a specific published path. The Backup Exec administrator is required to enter the password before the published path can be accessed by backup operations.



[include_remote]- Use this command to access remotely mounted (NFS) file systems through their normal mount points. export / as ROOT include_remote



<no_nfs_locking> - Use this command to prevent locking of files during backup operations if they are located in remotely mounted file systems with mount points within a directory tree.

Example: export as [write_protected] [password <passwd>] [include_remote][no_nfs_locking] Use this command to specify a media server name as an argument. This server name is added to the list of computers to which advertisements will be sent. This machine name must be found in the /etc/hosts file.

tell_interval

Use this command to specify the number of seconds the agent waits before re-advertising itself to the media server. If you enter a number other than the default setting (30 seconds), the number should not be more than a few minutes or less than 60 seconds. Longer numbers cause a delay in the workstation’s network broadcast verification and shorter numbers cause excessive network traffic. Each advertisement transaction requires eight (8) network packets.

follow_symdirs

Use this command to specify that the contents of the linked directories be backed up but not the symbolic links themselves. By default, the contents of symbolically linked directories are not backed up, but the symbolic links themselves are.

Chapter 13, VERITAS Backup Exec - Workstation Agents

607

Workstation Agents

tell <machine name>

Troubleshooting Workstation Agents Agent.cfg Commands (continued) Item

Description

exclude_file

Use this command to specify individual files which should never be backed up. The must include a fully specified path. No wildcards are permitted.

exclude_dir

Use this command to exclude individual directories or directory trees from being backed up. The must be fully specified.

preserve_ctime

Use this command to force the agent to ignore the message which sets object’s (files and directories) attributes when a backup occurs. Normally, during a backup, the backup engine preserves an object’s last access timestamp by resetting the last access timestamp to the value before the backup occurred. When the agent modifies the objects’ last access timestamp, the OS internally updates the object’s “ctime.” An object’s ctime is the time when an object’s attributes (permissions, timestamps, etc.) have been modified. By not attempting to reset the attributes after a backup, the object’s ctime is not updated. This option does not affect object attributes set during restore operations.

Troubleshooting Workstation Agents If the password for a published directory in a workstation is changed, jobs to back up that published directory cannot access it. Additionally, the Change option on the Resource Credentials dialog box is unavailable. If you encounter this problem, do any of the following:

608



Modify the job by clearing the selection of the specified published directory, and then reselecting it. You are prompted for new credentials.



Update the corresponding logon account credentials stored in Backup Exec with the new password for the published directory.



At the workstation, disable access to published directories that use passwords and configure the workstation itself to require password authentication.

Administrator’s Guide

VERITAS Backup Exec - Command Line Applet

14

The Backup Exec Command Line Applet is a convenient way to access some of the most useful features of Backup Exec from a command prompt. The Command Line Applet allows management of only one media server at a time, but allows for remote management of media servers within an enterprise. Backup Exec must be installed and running on a media server in order for the Command Line Applet to target it, but the Command Line Applet does not have to be run from a media server. The Command Line Applet uses functional command switches typed in a command prompt window to perform most Backup Exec functions and utilities, including: ◆

Run or cancel a previously created backup or restore job.



Create and run backup and restore jobs for local or remote file selections, including databases on Microsoft Exchange, SQL, Lotus Domino, Oracle, and SharePoint installations.



Create selection lists.



Create backup job templates.



Create, run, and monitor utility jobs.

Note This release of the Command Line Applet does not support submission of catalog, verify, or rewind jobs. ◆

Set default options for all jobs.



Obtain job status and the number of scheduled, active, and completed jobs.



Create media sets and drive pools.



Perform drive utilities and get information about the status of drives.



Start and stop Backup Exec system services.



Retrieve information on and respond to job alerts.

Command Line

609

Command Line Applet Requirements ◆

Determine if the media server is available on the network.



View and print Backup Exec reports.

Note The Command Line Applet can target clustered media servers. The only limitation is that the Command Line Applet can target a drive pool, but not a specific device in that drive pool.

Command Line Applet Requirements The Backup Exec Command Line Applet works with a local or remote Backup Exec server installation. Minimum system requirements include: Command Line Applet requirements Operating System

Microsoft Windows NT Workstation version 4.0 or Microsoft Windows NT Server version 4.0; Service Pack 6a. Microsoft Windows 2000 Professional or Server version, Microsoft Windows 2000 Advanced Server, or Microsoft Windows 2000 Datacenter. Windows XP Windows Server 2003 family

610

Processor

Pentium system

Memory

Required 16 MB RAM

Disk Space

A minimum of 1 MB of hard disk space after Microsoft Windows is installed

Other Hardware

CD-ROM

Administrator’s Guide

Using the Command Line Applet

Using the Command Line Applet The Backup Exec Command Line Applet is installed with Backup Exec for Windows Servers. After installation, to run the applet on another computer, copy bemcmd.exe to a computer that meets the minimum requirements and is running Windows RPC services. If you copy bemcmd.exe to another computer, the files beclass.dll and sigcomp230.dll must exist on that computer. If they do not already exist, copy them along with bemcmd.exe. To use the Command Line Applet, type bemcmd followed by a series of command switches in a command prompt window. The Command Line Applet will attempt to complete the requested task, and then return a value to the command prompt indicating success or failure. Note The first time you run a job on a resource, you must use the Backup Exec graphical user interface. If the first job on a resource is from the command line, the job will fail and will continue to fail until you run a job from the Backup Exec graphical user interface.

Using Command Line Switches To use the Command Line Applet on your computer, type the appropriate command line switch and any additional information required. For example, to run a previously created backup job named Operations Weekly, type the following at the command prompt: bemcmd -o1 -j"Operations Weekly" In this example, -o1 is the operation to submit the backup job. The command line switch -j specifies the name of the backup job. Because the job name is alphanumeric, quotation marks are required around the job name. The job “Operations Weekly” was previously created through the Backup Exec administration console. By default, the backup will be done on the computer where the Command Line applet is executed. To run this same job on a remote computer named Genesis, type the following at the command prompt: bemcmd -cGenesis -o1 -j"Operations Weekly" The command line switch -c specifies the name of the media server where the job is to be run.

611

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches

When connecting to a remote server, if you are required to provide a user name and password, type the following at the command prompt, substituting the text appearing in italics with the correct names: bemcmd -cGenesis -nuser name -ppassword -o1 -j"Operations Weekly" Note Type quotation marks before and after the user name and password if they contain spaces or a colon. In each of the previous examples, a -1 is returned if the job fails. You can also track the status of the job submission by including the Verbose Output command line switch -v. Command line switches are described in the following sections. Substitute the text that appears in italics next to the command, such as job name, with a value, such as the correct job name. Note If the value contains a space or a colon, enclose the value with quotation marks. If the switch contains more than one letter and you are not using quotation marks to enclose the value, a colon must appear immediately after the switch. Switches that consist of only a single character do no require a colon after the switch. For commands using Job IDs, this version of Backup Exec uses a globally unique identifier (GUID) in a 16-byte hex string format for each job. Note Command line switches appearing in BOLD are required.

Switches Used With All Operations The following command line switches can be used with all operations. Command line switches for all operations

612

Item

Description

-?

Displays help on all command line switches.

-?switch

Displays help about a command line switch.

-cmedia server

Specifies the name of the media server where the operation is to be performed. If a media server name is not specified, the local computer name is used by default.

Administrator’s Guide

Using Command Line Switches Command line switches for all operations Item

Description

-llogfile

Directs all output to a specified logfile and to the console. You must specify the logfile name where the output is to be written.

-la:logfile

Appends all output to the specified logfile and to the console. You must specify the logfile name where the output is to be written.

-nuser name

Specifies the user name credential for logging into a remote Backup Exec server. If a user name is not specified, the current credential is used.

-ppassword

Specifies the password credential for logging into a remote Backup Exec server. If a password is not specified, the current password credential is used.

-tBackup Exec server type

Specifies the type of OS the server is running. The default is Windows. To specify a NetWare server, type -tNW. This switch functions as an ExecView client for Backup Exec for NetWare Server versions 8.0, 8.5, and 9.0. The Backup Exec for NetWare Server must also have ExecView enabled. To specify a Windows server, type -tNT.

-v

Displays information detailing what has occurred while running the Command Line Applet and the specified option. This command is useful when tracing the sequence of events using the command line applet.

The switch -w (Waits for the job to complete before exiting the program) can be used with switches -o1 through -o8, -o17, -o18, -o42, -o46, and -o90. This command returns a 1 if successful or -1 on failure.

613

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches

Backup Job Switches You can run a previously created job or submit a new backup job using the commands presented in the following table. You can also create a backup job script file that the Command Line Applet can use instead of command line switches. Backup Job Commands Operation

Additional Switches

-o1

Function

Description

Run backup job

Runs a backup job that has been previously defined. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. Required. Specifies the name of the previously defined job that Backup Exec should run.

-jjob name

Note If there are jobs with the same name, only one of the jobs will run. To ensure that the correct job runs, you should use the job ID instead of the job name to specify which job will should run. -pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o2

614

Wait for job completion.

Instructs the Command Line Applet to wait for the operation to complete before returning.

Create backup job

Creates and runs a backup job for a specified list of files. This operation returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails.

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

Description

-jjob name

Specifies the name that Backup Exec will assign to this job.

-ddevice name

Specifies the name of the device Backup Exec should use for backup. When backing up a remote server, the device name will be the name of the remote server.

-sd:device name

Use this switch instead of the -d switch to indicate that this device name should be checked against the devices (and device pools) on the target server, and the job should only run if the device exists. If the device does not exist, and if the -v (verbose) switch is used, the following message appears: Device or Device Pool specified does not exist.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

615

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches -sfile list

Function

Description

Specifies the list of files to back up. The list should be comma delimited. Selections that end with a backslash indicate the selection is a directory. Selections that do not end with a backslash indicate the selection is a file. To back up System State, type "\\server name\System?State\*.*" after -s. By default, subdirectories will be recursed; to skip subdirectories during backup, the characters /n should appear before the comma separating the entries, and the last quotation mark. For example, "c:\winnt\*.* /n". The order resource selections are specified is the order in which the resources will be backed up. Please note the following about the order in which selections can be backed up: Š

You can order resources within a server, but you cannot alternate selections across servers. For example, you can select C: and D: from Server A followed by selections from Server B. However, you cannot order selections as C: from Server A and then C: from Server B and then D: from both servers.

Š

For any given server, system state or shadow copy components must be ordered last.

Note This switch cannot be used with the -sf switch. -sf:file name

Specifies the name of a file that contains a list (one per line) of files to be backed up. Note This switch cannot be used with the -s switch.

-mmedia set

616

Specifies the name of the media set Backup Exec should target.

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-mp:media protection level

Description

Specifies the media protection level: Š

0 = Overwrite

Š

1 = Append to media, overwrite if not available

Š

2 = append to media, terminate if not available

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Back up server drive

Creates and runs a backup job to back up the specified drive on the media server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails.

-o3

-jjob name

Specifies the name that Backup Exec will assign to this job.

-ddrive name

Specifies the drive letter of the drive that Backup Exec should backup. If no drive letter is specified, the job will default to C drive. When backing up a remote server, the device name will be name of the remote server.

617

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-pr:priority

Description

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

-o4

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Back up This operation is not for Exchange. If you are Exchange server running Exchange 2000, use operation -o6. Creates and runs a backup job to back up the Microsoft Exchange Server on the media server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. Note While individual mailboxes cannot be selected for backup, all mailboxes are included in a server backup. The Agent for Microsoft Exchange Server must be enabled on the Backup Exec server in order to back up the Exchange Server.

618

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

Description

-jjob name

Specifies the name that Backup Exec will assign to this job.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the Command Line Applet or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

619

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Instructs the Command Line Applet to wait for the operation to complete before returning.

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

-o5

Function

Description

Back up SQL server

This option is not for SQL 2000. If you are running SQL 2000, use operation -o8. Creates and runs a backup job to back up the Microsoft SQL Server on the media server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. Note While individual tables and file groups cannot be selected for backup, all subcontainers (except for the master filegroup) are included in a server backup. The Agent for Microsoft SQL Server must be enabled on the Backup Exec server in order to back up a SQL Server.

-jjob name

Specifies the name that Backup Exec will assign to this job.

-lo:database mode

Specifies the log backup option.

-db:database name

Specifies the name of a database to backup.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

620

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Back up Exchange 2000 server

Creates and runs a backup job for Exchange 2000 Server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails.

-o6

Description

Note The Agent for Microsoft Exchange Server must be enabled from the media server in order for this command to work. -jjob name

Specifies the name that Backup Exec will assign to this job.

-sg:storage group

Required. Specifies the storage group to back up.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

621

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the Command Line Applet or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Back up SQL Server 2000

Creates and runs a backup job for SQL Server 2000. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails.

-o8

Description

Note The Agent for Microsoft SQL Server must be enabled on the media server in order for this command to work. -jjob name

Specifies the name that Backup Exec will assign to this job.

-db:database name

Specifies the name of the database to back up.

-ni:named instance

Specifies the named instance to back up.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

622

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

-lo:database mode

Description

Instructs the Command Line Applet to wait for the operation to complete before returning. Places a Microsoft SQL Server database in either standby mode or in a loading state. Values are: 0 = None. 1 = Standby. Place database in standby mode. 2 = No recover. Place database in a loading state.

-o9

Back up SharePoint Portal Server

Creates and runs a backup job for the Microsoft SharePoint Portal Server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. Note The Agent for Microsoft SharePoint Portal Server must be enabled on the media server in order for this command to work.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

Chapter 14, VERITAS Backup Exec - Command Line Applet

623

Command Line

If this switch is absent, the priority will be set as Medium.

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-r

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

-jjob name

-o17

Description

Instructs the Command Line Applet to wait for the operation to complete before returning. Specifies the name that Backup Exec will assign to this job.

Back up Lotus Notes server

Creates and runs a backup job of the Lotus Notes server. Returns 1 if successful or -1 if there is an error.

-jjob name

Specifies the name that Backup Exec will assign to this job.

-ddrive name

Required. Specifies the drive letter where Lotus Notes is installed.

-tl:path

Specifies the complete path to the transaction log file.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium.

624

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-r

Replace existing Specifies Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the command line or the Backup Exec administration console, as long as that job has already been created and saved.

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Back up Oracle server

Creates and runs a backup job of the Oracle server. Returns 1 if successful or -1 if there is an error.

-o18

Description

Note Only one SID can be specified per command. Use -si to indicate the SID name to back up. -jjob name

Specifies the name that Backup Exec will assign to this job.

-si:SID name

Required. Specifies the SID name to back up.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -r

Chapter 14, VERITAS Backup Exec - Command Line Applet

625

Command Line

Replace existing Instructs Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the Command Line Applet or the Backup Exec administration console, as long as that job has already been created and saved.

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

Description

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Create alias backup job

Creates and runs an alias backup. Files to be backed up are specified as a comma delimited list (for example, “c:\dir\file” or “\\server\share name\...”) with a matching comma delimited list of aliases.

-o19

Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. An alias backup allows you to specify a share to back up, and then specify another share from which the backup will appear to have originated. This type of backup is useful when the location of the data to be backed up is temporary. For example, a temporary share may be created when a mirror is split. Or a share may be cloned and placed on another device while it is backed up in order to off load traffic from a busy device. If a temporary share is backed up, the restore path for the share may not exist if a restore becomes necessary. Instead, you can specify an alias to a location where you want the share to appear to have been backed up from. Alias jobs support both UNC and local devices. However, both the target and the source must be the same, either both UNC or both local devices. You cannot mix them.

626

-jjob name

Required. Specifies the name that Backup Exec will assign to this job.

-mmedia set

Specifies the name of the media set that Backup Exec should target.

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-mp:media protection level

Description

Specifies the media protection level: Š

0 = Overwrite

Š

1 = Append to media, overwrite if not available

Š

2 = append to media, terminate if not available

-ddevice name

Specifies the name of the device that Backup Exec should use for the alias backup.

-sd:device name

Use this switch instead of the -d switch to indicate that this device name should be checked against the devices (and device pools) on the target server, and the job should only run if the device exists. If the device does not exist, and if the -v (verbose) switch is used, the following message appears: Device or Device Pool specified does not exist.

627

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches -sfile list

Function

Description

Specifies the host path of files to be backed up and aliased. The list should be comma delimited. By default, subdirectories will be recursed; to skip subdirectories during backup, /n should be placed before the last quotation mark. For example: “c:\dir\file” or “\\server\ share name\..."/n The order resource selections are specified is the order in which the resources will be backed up. Please note the following about the order in which selections can be backed up: Š

You can order resources within a server, but you cannot alternate selections across servers. For example, you can select C: and D: from Server A followed by selections from Server B. However, you cannot order selections as C: from Server A and then C: from Server B and then D: from both servers.

Š

For any given server, system state or shadow copy components must be ordered last.

Note This switch cannot be used with the -sf switch. -aalias list

Specifies a second host drive (the device alias) for all the selections listed in the -s switch list. The device that you specify must be a drive letter followed by a colon, such as "G:". You must include a matching comma delimited list of aliases for the selections specified in the -s switch list. Note This switch cannot be used with the -sf switch.

628

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

-sf:filename

Description

Use this switch instead of -s and -a to specify the name of a file that contains a list (one per line) of files to be backed up. Note This switch cannot be used with the -s and -a switches.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -r

Replace existing Specifies Backup Exec to replace a previously job defined job with this new one. You can replace a job that was created either through the Command Line Applet or the Backup Exec user interface, as long as that job has already been created and saved.

-w

Wait for job completion

-o90

Specifies that the Command Line Applet should wait for the operation to complete before returning.

Launch job using Executes a job based on the contents of a job script file script file. Return values depend on the type of script. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. For more information about Backup Job Script Files, see “Using Backup or Restore Job Script Files” on page 677. -fscript file

629

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Required. Specifies the name of the Backup Exec script file. If the job is a scheduled job (not a run now job), the -w is ignored.

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

Description

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning. If the job is a scheduled job (not a run now job), the -w is ignored.

Create selection list

Creates a list of resource selections to be used when creating a backup job.

-o220

-sselection name

Required. Specifies the name of the selection list.

-ddescription

A brief description of the selection list.

-fscript file

Required. Specifies the selections to be contained in this selection list. Format for scripts is [MACHINE] MACHINE1=machine name|logon ID Each path must be on a separate line. For example: PATH1=C:\test\*.*|logon ID PATH2=C:\test2\*.* An example script is available in the selectionscript.txt file in the WINNT\UTILS\I386 directory on the Backup Exec CD.

-o230

-o240

630

Create backup job template

Creates a backup job template that can be used for creating jobs. Displays the job ID if successful.

-tn:job template name

Required. Specifies a name for the template being created.

-fscript file

Required. Specifies the name of the Backup Exec script file. For more information about Backup Job Template script files, see “Using Scripts and Backup Job Templates” on page 733. Create backup job from template

Creates a backup job using a previously created backup job template.

Administrator’s Guide

Using Command Line Switches Backup Job Commands (continued) Operation

Additional Switches

Function

Description

-jjob name

Required. Specifies the name that Backup Exec will assign to this job.

-tn:job template name

Required. Specifies the name of the template to use when creating this job.

-s:selection list

Required. Specifies any previously created selection list to be used when creating this job.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -aa:auto cancel time in minutes

Specifies that the job is to be automatically canceled if not completed within the specified number of minutes. Additionally, this switch can be used with backup jobs -o1, -o2, -o3, -o4, -o5, -o6, -o8, -o9, -o17, -o18, and -o19, and with restore job -o7.

-h

631

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Specifies that the job is to be submitted on hold.

Using Command Line Switches

Switches for Administrating Jobs Several command switches allow you to administer your jobs. These switches, which allow you to obtain information about the jobs, view job histories, and cancel a job, include: Job monitoring switches Operation

Additional Switches

Function

Description

Get number of scheduled jobs

Displays the number of scheduled jobs on a computer. Returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump job IDs

Instructs Backup Exec to dump the job IDs to the screen.

-j

Dump job names Instructs Backup Exec to dump the job names to the screen.

-o10

-o11

Get number of active jobs

Displays the number of active jobs on a computer. Returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump job IDs

Instructs Backup Exec to dump the job IDs to the screen.

-j

Dump job names Instructs Backup Exec to dump the job names to the screen. Get number of completed jobs

Displays the number of completed jobs on a computer. Returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump job IDs

Instructs Backup Exec to dump the job IDs to the screen.

-j

Dump job names Instructs Backup Exec to dump the job names to the screen.

-o12

632

Administrator’s Guide

Using Command Line Switches Job monitoring switches (continued) Operation

Additional Switches

-o13

Function

Description

Get number of Displays the number of active utility jobs on a active utility jobs computer. Returns a 1 if the command succeeds or a -1 if the command fails. A utility job is one involving drive utility operations such as inventory, erase, retension, format, label media, and eject.

-o14

Get number of completed utility jobs

Displays the number of completed utility jobs on a computer. Also returns a 1 if the command succeeds or a -1 if the command fails. A utility job is one involving drive utility operations such as inventory, erase, retension, format, label media, and eject.

-o15

Get job status

-i:job ID -o16

Specifies the job ID of a specific job. Dump job status Copies to the console the job information and for scheduled descriptive headings for each item associated and active job with the job ID. Returns 1 if the command was successful or -1 if the command failed.

-i:job ID -a

-o20

Specifies the job ID of a specific job. Abbreviated form

Specifies Backup Exec to display the job information in comma delimited, or data only (no headings) form.

Cancel job

Cancels a job. Returns 1 if the command was successful or a -1 if the command failed. Required. Use this switch to specify the job ID of a specific job.

-i:job ID

Dump completed job status

Chapter 14, VERITAS Backup Exec - Command Line Applet

Displays completed job status. Returns 1 if the command was successful or -1 if the command failed. 633

Command Line

-o21

Displays one of many predefined job statuses if the command was successful. Also returns a 1 if the command succeeds or a -1 if the command fails.

Using Command Line Switches Job monitoring switches (continued) Operation

Additional Switches

Function

-ijob ID

Use this switch to display the last job history for the specified job ID.

-e

Use this switch with -ijob ID to display details for the last instance of the job.

-hi:job history ID

Use this switch to display details of the specified job history record.

-li:job ID

Use this switch to display a list of all job history IDs for the specified job ID.

-o30

Dump job log name of completed job

-o31

Copies to the console the job log name that is associated with the specified job ID. Returns 1 if the command was successful or -1 if the command failed. Required. Use this switch to specify the job ID of a specific job.

-i:job ID

Dump job log contents

Copies to the console the contents of the job log specified on the command line. Returns 1 if the command was successful or -1 if the command failed.

-sfile name

Saves the job log in the specified text file.

-ffile name

Specifies the job log name.

-o200

Place Job on Hold

-o201

Take Job off Hold -jjob name

Places the specified job on hold. Returns 1 if the command is successful or -1 if it failed. Required. Specifies the name of the job to be placed on hold.

-jjob name

634

Description

Takes the specified job off hold. Returns 1 if the command is successful or -1 if it failed. Required. Specifies the name of the job to be taken off hold.

Administrator’s Guide

Using Command Line Switches Job monitoring switches (continued) Operation

Additional Switches

Function

Description

-o202

-i:jobID

Delete scheduled job

Required. Use this switch to specify a job ID of a specific job. Returns 1 if successful or -1 if it failed.

-ds

Delete the selection list if no other jobs are using it

If the scheduled job is not deleted, the selection list is not deleted, and a -1 is returned. If the scheduled job is deleted, the selection list will be deleted, and a 1 is returned. If the selection list is not deleted, a 0 is returned.

-o250

List all backup job templates

Displays all available backup job templates. Returns 1 if the command is successful or -1 if it failed.

-o251

List all backup selection lists

Displays all available backup selection lists. Returns 1 if the command is successful or -1 if it failed.

-o312

Disable error handling rule

Disables an error handling rule.

-irule ID -o506

Specifies the ID of the rule being disabled. Dump Job Information

Displays job, selection, and schedule information stored on this server. Also returns a 1 if the command succeeds or a -1 if the command fails.

-jjob name

Specifies the name of the job that contains information you want dumped.

-foutput file

Specifies a file to direct the output to.

635

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches

Restore Job Switches You can run a previously created restore job or launch a restore job script file through the following command line switches: Restore job commands Operation

Additional Switches

-o7

Function

Description

Restore job

Runs a restore job that has been previously defined for a media server. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails.

-jjob name

Required. Specifies the name of the previously defined job that Backup Exec should run.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o90

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Launch job using Executes a job based on the contents of a job script file script file. Return values depend on the type of script. Returns a job instance ID. Also returns a 1 if the command succeeds or a -1 if the command fails. For more information about Backup Job Script Files, see “Using Backup or Restore Job Script Files” on page 677. -fscript file

636

Required. Specifies the name of the Backup Exec script file. If the job is a scheduled job (not a run now job), the -w is ignored.

Administrator’s Guide

Using Command Line Switches Restore job commands (continued) Operation

Additional Switches

Function

Description

-w

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning. If the job is a scheduled job (not a run now job), the -w is ignored.

See also: “Using Backup or Restore Job Script Files” on page 677

Switches for Viewing and Responding to Alerts Alerts are events that require administrator attention. Several command switches allow you to view and respond to alerts. These include: Managing alerts switches Operation

Additional Switches

Function

Description

Get number of alerts

Displays the number of alerts on the computer. Returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump alert IDs

Displays all the alert IDs on the screen.

-tl

Show titles

Displays titles of alerts.

Dump alert text

Dumps the alert title and message to the console. Returns 1 if the command is successful and -1 if it fails.

-o40

-o42

-i:alert ID

-w

Specifies the alert ID of the text to be displayed. If the -i command switch is not used, all alerts are dumped by default. Instructs the Command Line Applet to prompt for a response to the alert.

Chapter 14, VERITAS Backup Exec - Command Line Applet

637

Command Line

Wait for job completion

Using Command Line Switches Managing alerts switches (continued) Operation

Additional Switches

-o43

Description

Get number of Displays the number of non-critical information only (information only alerts) on the computer. alerts Also returns a 1 if the command succeeds or a -1 if the command fails. -i

Dump all alert IDs

If -i is used with this command, all alert IDs will be displayed on the screen.

-tl

Show titles

Displays alert titles.

Get number of user intervention (critical) alerts

Displays the number of user intervention alerts on the computer. Also returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump all alert IDs

If -i is used with this command, all alert IDs will be displayed on the screen.

-tl

Show titles

Displays alert titles.

-o44

-o45

Clear all Clears all current information only alerts. information only Returns 1 if the command was successful or -1 if the command fails. alerts

-o46

Respond to alert Allows you to respond to an alert. Returns 1 if the command succeeds, 0 if the alert was already responded to, or -1 if the command fails. -i:alert ID

Required. Specifies the alert ID that you want to respond to.

-rresponse

Required. Specifies a response. Responses are OK, YES, NO, CANCEL, RETRY,or IGNORE.

-w

-o47

638

Function

Wait for job completion

Instructs the Command Line Applet to prompt for a response.

Get all warning alerts

Displays the number of warning alerts on the computer. Also returns a 1 if the command succeeds or a -1 if the command fails.

Administrator’s Guide

Using Command Line Switches Managing alerts switches (continued) Operation

Additional Switches

Function

Description

-i

Dump all alert IDs

If -i is used with this command, all alert IDs will be displayed on the screen.

-tl

Show titles

Displays alert titles.

Get all error alerts

Displays the number of error alerts on the computer. Also returns a 1 if the command succeeds or a -1 if the command fails.

-i

Dump all alert IDs

If -i is used with this command, all alert IDs will be displayed on the screen.

-tl

Show titles

Displays alert titles.

List alert categories

Displays alert categories. Returns 1 if command is successful and -1 if the command fails.

-i

Dump all alert IDs

If -i is used with this command, all alert IDs will be displayed on the screen.

-j

Display alert category name

Displays alert names on screen.

-ac

Display event category

Displays the alert category on screen.

Dump alert configuration

Displays the configuration for alerts on screen. Returns 1 if command is successful and -1 if the command fails.

-o48

-o49

-o50

-ialert category ID -o51

Specifies an alert ID to display configuration information for. Set alert configuration

-ialert category ID

Required. Specifies an alert ID to display configuration information for.

639

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Modifies the alert configuration.

Using Command Line Switches Managing alerts switches (continued) Operation

640

Additional Switches

Function

Description

-e

Enable alert

Enables the specified alert for reporting by Backup Exec. Some alerts types such as error and attention required are always enabled.

-d

Disable alert

Disables the specified alert for reporting by Backup Exec. Some alerts types such as error and attention required are always enabled and cannot be disabled.

-no:

Enable notification

Enables the sending of notification when the alert occurs. Recipients must be configured to use this option.

-nn:

Disable notification

Disables the sending of notification when the alert occurs.

-jl:

Enable inclusion Sends the job log to the alert recipient of job log configured for notification.

-nj:

Disable inclusion of job log

Disables the inclusion of the job log to the alert recipient configured for notification.

-s

Enable sending of SNMP notifications

Enables the sending of alert notifications through SNMP.

-ns:

Disable sending Disables the sending of alert notifications of SNMP through SNMP. notifications

-rl:

Enable event logging

Enables logging of events in Windows event log.

-nr:

Disable event logging

Disables logging of events in Windows event log.

-ac:timeout

Set time for automatic clearing of alert

Sets the time in minutes for Backup Exec to automatically clear the alert.

Administrator’s Guide

Using Command Line Switches Managing alerts switches (continued) Operation

Additional Switches

Function

Description

-na:

Disable automatic alert clearing

Disables the automatic clearing of alerts.

Switches for Error Handling Rules Backup Exec has system-defined error-handling rules which determine how job errors are handled. They apply to all backup jobs and are defined based on the cause of the failure. The rules can be configured to automatically perform operations such as retry, pause, or cancel a job after a failure occurs. Error-handling rules are disabled by default. Error Handling Rules switches Operation

Additional Switches

Function

Description

-o310

Display error handling rules

Displays the error handling rules

-o311

Enable error handling rule -irule ID

Required. ID of rule that is to be enabled.

-mr:maximum retries

Indicates retry job and the number of times the job is to be retried. The range for maximum retries is 1 to 99.

-ri:retry interval

Indicates retry job and the number of minutes to wait before the job is retried. The range for the retry interval is 1 to 1,440. Pause job on error

Indicates the job is to be paused until the user has taken action to clear the error. If this switch is absent, the job will be canceled until its next scheduled run.

-cj:

Cancel job on error

Indicates the job is to be canceled if an error occurs.

Chapter 14, VERITAS Backup Exec - Command Line Applet

641

Command Line

-pj:

Using Command Line Switches Error Handling Rules switches (continued) Operation

Additional Switches

-o312

Function

Description

Disable error handling rule

Disables the specified error handling rule.

Required. Specifies the error handling rule that is to be disabled.

-irule ID

Switches for Managing Media and Devices Through the Command Line Applet, you can manage the storage devices attached to your media server, manage media in these devices, launch utility operations, and obtain status of your media server. You can also use commands to stop and start Backup Exec system services and create logon accounts for accessing systems. The device and media management switches available include: Device and media management switches Operation

Additional Switches

-o60

-ddrive name -o61

Function

Description

Pause drive

Pauses the drive specified. Returns a 1 if successful or -1 if the command fails.

.

Required. Specifies the drive’s name.

Resume drive

Resumes a previously paused drive specified on the command line. Returns a 1 if successful or -1 if the command fails. Required. Specifies the drive’s name.

-ddrive name -o62

Is drive paused

Required. Specifies the drive’s name.

-ddrive name -o63

642

Returns 1 if the drive specified on the command line is paused, 0 if not, and -1 if the command failed.

Get number of drives

Displays the number of managed drives. Returns a 1 if the command succeeds or a -1 if the command fails.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

Description

-i

Displays drive IDs for all drives.

-j

Displays names for all drives.

-o64

Get number of drives available

Displays the number of managed drives that are online and not paused. Drives that are being used are considered online and are included in the number displayed. Returns a 1 if the command succeeds or a -1 if the command fails.

-o65

Get number of drives paused

Displays the number of managed drives that are paused. Returns a 1 if the command succeeds or a -1 if the command fails.

-o66

Get number of drives offline

Displays the number of managed drives that are offline. Returns a 1 if the command succeeds or a -1 if the command fails.

-o67

Dump drive properties

Displays general properties of a drive. Returns a 1 if the command succeeds or a -1 if the command fails.

-i:drive ID

Specifies the ID for the drive you want to display properties for.

-ddrive name

Specifies the name for the drive you want to display properties for.

-a

Abbreviated form

-o68

Query devices

-o69

Get number of media sets

Specifies Backup Exec to display the information in comma delimited, or data only (no headings) form.

Displays the number of media sets. Returns a 1 if the command succeeds or a -1 if the command fails. Displays the media set IDs for all media sets.

-j

Displays the names of all media sets.

Chapter 14, VERITAS Backup Exec - Command Line Applet

643

Command Line

-i

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o80

Function

Description

Import drive slots

Imports a list of backup tapes. Returns job ID and 1 if the command was successful, or -1 if the command failed.

-arobotic library

Required. Specifies the robotic library to target for this operation.

-ai:

Auto inventory all slots.

-s:slot numbers

Specifies the slots in the robotic library to target. This list should be comma delimited. If no slots are specified, then all will be targeted by default.

-fschedule file

Schedules the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o81

-arobotic library

644

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Export drive slots

Exports a list of backup tapes. Returns the job ID and a 1 if the command was successful, or a -1 if the command fails. Required. Specifies the robotic library to target for this operation. Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

Description

-s:slot numbers

Specifies the slots in the robotic library to target. This list should be comma delimited. If no slots are specified, then all will be targeted by default.

-fschedule file

Schedule the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

Wait for job completion

-x -o82

Instructs the Command Line Applet to wait for the operation to complete before returning. Specifies the export of expired media only.

Designate cleaning slot

Designates slot to be a cleaning slot. Returns 1 if successful or -1 if the command fails.

-arobotic library

Required. Specifies the robotic library to target for this operation.

-s:slot numbers

Specifies the slots in the robotic library to target. This list should be comma delimited. If no slots are specified, then all will be targeted by default.

645

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o83

Function

Description

Reset slot to be non-cleaning slot

Designates a slot to be a non-cleaning slot. Returns 1 if successful or -1 if the command failed.

-arobotic library

Required. Specifies the robotic library to target for this operation.

-s:slot numbers

Specifies the slots in the robotic library to target. This list should be comma delimited. If no slots are specified, then all will be targeted by default.

-o84

Get number of robots

Displays the number of managed robots. Returns a 1 if the command succeeds or a -1 if the command fails.

-a

Displays the names of managed robots.

-i

Displays the robot IDs.

-o85

Dump robot properties

Displays property information for the specified robotic library. Returns 1 if the command is successful or -1 if the command fails. Required. Either -i or -d must be provided.If both -i and -d are provided, the -d parameter is used.

-irobot ID

Specifies the ID of the robotic library to display properties for. Required. Either -i or -d must be provided. If both -i and -d are provided, the -d parameter is used.

-drobot name

Specifies the name of the robotic library to display properties for. -a

646

Abbreviated form

Specifies Backup Exec to display the robotic library properties information in comma delimited, or data only (no headings) form.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o86

Function

Description

Dump slot content

Displays the slot information with header descriptions. Required. Either -i or -d must be provided. If both -i and -d are provided, the -d parameter is used.

-irobot ID

Specify the robot ID for the library containing the slots. Required. Either -i or -d must be provided. If both -i and -d are provided, the -d parameter is used.

-drobot name

Specify the robot name for the library containing the slots. -s:slot number

-a

-o100

Specify the slot number to display information for. If the slot number is not specified, the contents of all slots for the robotic library are displayed. Abbreviated form

Specifies Backup Exec to display the slot information in comma delimited, or data only (no headings) form.

Create cleaning job

Creates and runs a cleaning job on the specified drive. Returns the job ID and 1 if successful, or -1 if the command failed.

-ddrive name

Required. Specifies the name of the robotic library drive you want to target.

-fschedule file

Schedules the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

647

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

-pr:priority

Description

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o101

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Create media set Creates a media set with the specified name. Returns a 1 if successful or -1 if the command fails. -mmedia name

Required. Specifies the name of the new media set.

-op:overwrite protection period

Required. Specifies the overwrite protection period for the new media set.

-ap:append

Required. Specifies the append period for the new media set.

-o102

Enter the value -1 to set the overwrite protection level to infinite.

Create drive pool

Creates a drive pool with the specified name and assigns the given drives to it. Returns a 1 if successful, 0 if one or more specified drives cannot be found, or -1 if the command fails.

648

-dpdrive pool

Required. Specifies the name of the new drive pool.

-ddrives

Specifies a list of drives to add to the drive pool. The list should be comma delimited.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o103

Function

Description

Create inventory Creates an inventory job on a specified robotic job for robotic library. library Returns the job ID and 1 if successful, or -1 if the command failed. When using this command, you must also use the -arobotic library switch which is used to inventory all slots and drives on a specified robotic library. -arobotic library

Required. Specifies the robotic library to target for this operation.

-fschedule file

Schedules the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-s:slot numbers

Specifies the slots in the robotic library to target. This list should be comma delimited. If no slots are specified, then all will be targeted by default.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

Wait for job completion

Chapter 14, VERITAS Backup Exec - Command Line Applet

Uses media auxiliary memory for inventory, which allows the media to be identified without having to be mounted. 649

Command Line

-x

Instructs the Command Line Applet to wait for the operation to complete before returning.

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o104

Function

Description

Lock library door

Locks the specified robotic library door. Returns the job ID and a 1 if successful, or -1 if the command failed. When using this command, you must also use the -arobotic library switch.

-arobotic library

Required. Specifies the robotic library to target for this operation.

-fschedule file

Schedules the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o105

-arobotic library

650

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Unlock library door

Unlocks the specified robotic library door. Returns the job ID and a 1 if successful, or -1 if the command failed. When using this command, you must also use the -arobotic library switch. Required. Specifies the robotic library to target for this operation.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

Description

-fschedule file

Schedule the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o106

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Set media overwrite protection period

Specifies the media overwrite level and overwrite options.

-ol:overwrite level

Returns 1 if successful or -1 if the command failed. When using this command, you must also use the -o1 and -o0 switches. Required. Specifies the overwrite level; for example, -o1:4. Overwrite Levels include: 1 = None 2 = None with prompt 3 = Partial 4 = Partial with prompt 5 = Full

651

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

Description

Required. Specifies the overwrite options; for example, -o0:0.

-o0:recyclable

Overwrite options include: 0 = Use scratch media first 1 = Use recyclable media first -o111

Erase media

Erases the tape in the specified drive according to the specified erase type (-e). Returns the job ID and a 1 if successful, or -1 if the command failed.

-ddrive name

Required. Specifies the drive name you want to target. If -s is used, -ddrive name will be the name of the robotic library.

-e:erase type

Required. Specifies the erase type. Erase types are: 1 = quick erase 3 = long erase

652

-fschedule file

Schedule the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored. For more information about schedule file scripts, see “Using a Schedule Script with Device and Media Operations” on page 749.

-s:slot numbers

Specifies the slot numbers containing the media to be erased. If this switch is used, -d will represent the robotic library name.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

-pr:priority

Description

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o112

Wait for job completion

Instructs the Command Line Applet to wait for the operation to complete before returning.

Retension media Retensions the tape in the specified drive. Returns the job ID and a 1 if successful, or -1 if the command failed. -ddrive name

Required. Specifies the drive name. If -s is used, -ddrive name will be the name of the robotic library.

-s:slot numbers

Specifies the slot numbers containing the media to be retensioned.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

Chapter 14, VERITAS Backup Exec - Command Line Applet

Instructs the Command Line Applet to wait for the operation to complete before returning.

653

Command Line

Wait for job completion

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o113

Function

Description

Label media

Labels the tape in the specified drive. Returns the job ID and a 1 if successful, or -1 if the command failed.

-ddrive name

Required. Specifies the drive name. If -s is used, -ddrive name will be the name of the robotic library.

-mmedia name

Required. Specifies the media name.

-sslot numbers

Specifies the slot numbers containing the media to be labeled.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

-o114

Wait for job completion

Format media

Instructs the Command Line Applet to wait for the operation to complete before returning. Formats the tape in the specified drive. Returns the job ID and a 1 if successful, or -1 if the command failed. When using this command, you must also use the -ddrive name command.

654

-ddrive name

Required. Specifies the drive name. If -s is used, -ddrive name will be the name of the robotic library.

-s:slot numbers

Specifies the slot numbers containing the media to be formatted.

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

Function

-pr:priority

-w

-o115

Description

Specifies the priority for the job. Priority options include:

Wait for job completion

Š

Low

Š

Lowest

Š

Medium

Š

High

Š

Highest

Instructs the Command Line Applet to wait for the operation to complete before returning.

Eject media from Ejects the tape in the specified drive. drive Returns the job ID and a 1 if successful, or -1 if the command failed. When using this command, you must also use the -ddrive name command. -ddrive name

Required. Specifies the drive name.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -w

Wait for job completion

655

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Instructs the Command Line Applet to wait for the operation to complete before returning.

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o116

Function

Description

Create a backup Creates a Backup Folder. Backup Exec allows folder you to create virtual devices called Backup Folders on the hard disk. These Backup Folders are used as destination devices for backup jobs. When you direct a backup job to a Backup Folder, the data is saved on disk as backup files. Returns 1 if the command is successful or -1 if it failed. -r

Use this switch to make the backup folder being created a removable backup-to-disk folder. Otherwise, the folder will be a fixed (non-removable) folder.

-ffolder name

Specifies the folder name. When you create a Backup Folder, Backup Exec initially assigns it a name and path. You can rename a Backup Folder as long as you use a unique name. Renaming a Backup Folder changes the way it appears in Backup Exec, but does not change the location of the Backup Folder on the disk.

-ddirectory

Specifies the location for the folder. Note Backup jobs submitted to a Backup Folder cannot span disks. If the size of a backup job exceeds the amount of free space on the disk where the Backup Folder is located, the job will fail. Make sure that there is sufficient free space on a disk for a backup job before submitting it. Use the software data compression option to maximize the amount of data that can be stored on a disk. If the backup job fails because of insufficient disk space, the data backed up before the job fails can still be restored.

656

Administrator’s Guide

Using Command Line Switches Device and media management switches (continued) Operation

Additional Switches

-o117

Function

Description

Inventory a stand-alone drive

Creates an inventory job on a specified stand-alone drive. Displays the job instance ID. Returns 1 if the command is successful, or -1 if the command fails.

-ddrive name

Required. Specifies the drive name.

-fschedule file

Schedules the job. If -fschedule file represents a scheduled job (not a run now job), then the -w option is ignored.

-pr:priority

Specifies the priority for the job. Priority options include: Š

Highest

Š

High

Š

Medium

Š

Low

Š

Lowest

If this switch is absent, the priority will be set as Medium. -x

-w

-o120

Uses media auxiliary memory for inventory, which allows the media to be identified without having to be mounted. Wait for job completion

Instructs the Command Line Applet to prompt for a response.

Delete media set Deletes the specified media set. Returns 1 if the command is successful or -1 if it failed. Required. Specifies the name of the media set.

-mmedia set -o121

Delete drive pool -dp:drive pool

Required. Specifies the name of the drive pool.

657

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Deletes the specified drive pool. Returns 1 if the command is successful or -1 or if it fails.

Using Command Line Switches

Backup Exec Services Commands Several command line switches allow you to monitor and manage the Backup Exec services. These commands include: Backup Exec service switches Operation

Additional Switches

Function

Description

-o107

Set wizards as run

Sets the registry so that the startup wizards do not run. Returns 1 if successful or -1 if the command failed.

-o500

Is Backup Exec server available

Checks if the Backup Exec server is available. Returns 1 if the Backup Exec Server is available on the network, 0 if the server is not available, or -1 if the command fails. Required. Specifies the name of the media server.

-cserver_name

658

-o501

Are Backup Exec Checks if the Backup Exec system services are system services running. Returns 1 if the Backup Exec services are running on the computer. If the system running services are not running, a 0 is displayed. If the command fails, a -1 is displayed.

-o502

Start Backup Exec system services

Starts all Backup Exec services on the specified computer. Returns 1 if all services start, 0 if any services fail, or -1 if the command fails.

-o503

Stop Backup Exec system services

Stops all Backup Exec services on the specified computer. Returns 1 if all services stop, 0 if any services fail, or -1 if the command fails.

-o504

Dump Backup Exec system services status

Copies to the console each Backup Exec system service name and status. Returns 1 if successful or -1 if the command fails.

-o505

Dump Backup Exec server properties

This command outputs properties for a specified Backup Exec server. Returns 1 if successful. If an error occurs, a -1 is returned.

Administrator’s Guide

Using Command Line Switches

Logon Account Switches The following switch and subswitches allow you to create logon accounts for accessing specific systems: Logon Account switches Operation

Additional Switches

-o210

-o211

Function

Description

Create logon account

Creates a logon account for accessing specific systems being backed up or restored. This operation returns a logon account ID and 1 if the command is successful, or -1 if the command fails.

-nluser name

Required. Specifies the user name for this logon account.

-plpassword

Specifies the password for this logon account.

-ddescription

Provides a description for this logon account.

-dl:

Use as default login account. Display logon accounts

659

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Displays the logon account information on the console. Returns 1 if the command is successful, or -1 if the command fails.

Using Command Line Switches

Report Switches The following switch and subswitches allow you to view and manage Backup Exec reports from the command line: Report switches Operation

Additional Switches

-o400

Description

Display report

Displays the report on screen.

-i

Lists all available report IDs.

-rreport ID

Specifies the report ID to view.

-j

Lists available parameter names.

-psparamstr

Specifies parameters and values to use in the form ’@param1name=value, =value..., @param2name=value, =value...’.

-o401

Print report

Prints the report on the default printer.

-i

Lists all available report IDs.

-rreport ID

Specifies report ID to view.

-j

Lists available parameter names.

-psparamstr

Specifies parameters and values to use in the form ’@param1name=value, =value..., @param2name=value, =value...’.

-o402

660

Function

Copy report to selected file format

Copies the report to a selected file format.

-i

Lists all available report IDs.

-rreport ID

Specifies report ID to view.

-j

Lists available parameter names.

Administrator’s Guide

Using Command Line Switches Report switches (continued) Operation

Additional Switches

Function

Description

-psparamstr

Specifies parameters and values to use in the form ’@param1name=value, =value..., @param2name=value, =value...’.

-ffilename

Fully qualified filename for storage location of output file. Not valid for -ft:1 (HTML) file types.

-ddirectory

Fully qualified directory name for storage location of output files. Only valid for -ft:1 (HTML) file types.

-ft:format

Use:

-o403

Insert report

Š

-ft:0 to use .rpt with save data file type (default).

Š

-ft:1 for HTML file type.

Š

-ft:2 for XML file type.

Š

-ft:3 for Microsoft Excel file type.

Š

-ft:4 for Microsoft Word file type.

Adds a report to the available file list.

-i

Lists all available report IDs.

-ffilename

Fully qualified filename for storage location of report file.

661

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches

Setting Default Options The command line switch -o300 allows you to set default options to be used for Backup Exec operations. The default options are set through a series of -do parameters and the use of a -dv parameter followed by the default value. For example, to set the job priority default to high, enter: -300 -do"DO_JOB_PRIORITY" -dv"3" or -300 -do:DO_JOB_PRORITY -dv:3 Note If the value contains a space or a colon, enclose the value with quotation marks. If the switch contains more than one letter and you are not using quotation marks to enclose the value, a colon must appear immediately after the switch. The default parameters set through the -o300 switch can be overridden when creating an individual job. The following default options can be set using the -o300 switch: Default option parameters Option Name

Function

Description

General Default Options DO_GENERAL_ ENABLESTATS

Display progress Enter 1 to display the percent indicators for backup jobs complete number and gauge while a backup job is processing; otherwise, enter 0. These indicators allow you to monitor the progress of the job. Backup jobs may take a little longer to complete when this option is set because the target device must be scanned to determine the amount of data to be backed up. Note Due to the time required to scan the target device, selecting is option when backing up remote devices is not recommended.

662

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_GENERAL_ STARTUPINVENTORY

Inventory all drives on Backup Exec services startup

Enter 1 to inventory all of the media in the storage devices when Backup Exec services are starting; otherwise, enter 0. Depending on the number of storage devices attached to the system, this process may take a few minutes. If you are using a robotic library, all of the robotic library’s slots are inventoried.

Set job priority

Specifies the priority for the job. If another job is scheduled to run at the same time as this job, the priority determines which job runs first.

Job Default Options DO_JOB_PRIORITY

If a priority is not entered, the priority will be Medium. Priority options include:

DO_JOB_CMDEXELOC

DO_JOB_RUNJOBIFPRE SUCCESS

Select systems for preand post-job commands

Š

0 = Low

Š

1 = Lowest

Š

2 = Medium

Š

3 = High

Š

4 = Highest

Specifies whether an .EXE or batch file command should run on both local and remote systems, on local systems only, or on remote systems only. Values that can be used with this command are: Š

0 = The command is to run on both local and remote systems.

Š

1 = The command is to run only on the local system.

Š

2 = The command is to run only on the remote systems.

Chapter 14, VERITAS Backup Exec - Command Line Applet

663

Command Line

Run job only if the pre-job Enter 1 to run the job only if the pre-job command is successful. command is successful; otherwise, enter 0. If the pre-job command is not successful, the job does not run, and is marked as failed.

Using Command Line Switches Default option parameters (continued)

664

Option Name

Function

Description

DO_JOB_RUNPOSTIFJOB FAILS

Run post-job command even if the job fails.

Enter 1 to run the post-job command even if the job fails; otherwise, enter 0.

DO_JOB_RUNPOST

Run post-job command if Enter 1 to run the post-job command pre-job command is only if the pre-job command is successful successful; otherwise, enter 0.

DO_JOB_CMDTIMEOUT

Specify time interval for command

DO_JOB_FAILIFCMDFAILS

Mark job as failed if either Enter 1 to have the job marked as command fails failed if either the pre-job or post-job command fails; otherwise, enter 0.

DO_JOB_ CANCELTHRESHOLD

Cancel the job if not completed within the specified time.

Specifies the amount of time Backup Exec should wait for the job to complete before cancelling the job. This value should be provided in minutes.

DO_JOB_ DEVICEGUID

Set default device for job

Specifies the drive pool or stand-alone drive to be used for processing the backup.

DO_JOB_ MEDIASETGUID

Set the default media set

Specifies the media set for the job.

Specifies the amount of time before or after the job in which the pre or post command should run.

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

Select default backup method

Specifies the backup method to be used. Methods are:

Backup Default Options DO_BACKUP_TYPE

Š

0 = Full

Š

1 = Copy

Š

2 = Differential – changed files

Š

3 = Incremental – changed files

Š

4 = Daily

Š

5 = Working set

Š

6 = Incremental – modified time

Š

7 = Differential – modified time

Š

8 = Full – modified time

If 5 is entered as the value, a value must also be entered for DO_BACKUP_ LASTACCCESSEDDAY

DO_BACKUP_ SINGLEBACKUPNTFS

Enable single instance Enter 1 to ensure that only one instance backup for NTFS volumes of the backing file for NTFS volumes will be backed up regardless of the number of single instance store (SIS) links that point to it; otherwise, enter 0.

DO_BACKUP_ LASTACCCESSEDDAYS

Set last access date

Note If 5 was entered as the value for DO_BACKUPT_TYPE, the DO_BACKUP_ LASTACCESSEDDAYS entry must be completed. Enter the number of days to include files last accessed during. For example, to specify a working set backup to include all files last accessed within 30 days, type: -do:DO_BACKUP_ LASTACCESSEDDAYS -dv:30

665

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_BACKUP_ MEDIAOVERWRITE

Set media overwrite protection

Specify one of the following values:

DO_BACKUP_ COMPRESSIONTYPE

666

Set compression method

Š

0 = Overwrite

Š

1 = Append, overwrite if no media available

Š

2 = Append, no overwrite

Enter a number from 0 to 3 that corresponds with the type of compression to use. Options include: Š

0 = Hardware compression

Š

1 = Software compression

Š

2 = Hardware if available, otherwise software

Š

3 = None

DO_BACKUP_AUTOVERIFY Verify after backup

Enter 1 to have Backup Exec automatically perform a verify operation to make sure the media can be read after the backup has been completed; otherwise, enter 0. Verifying all backups is recommended.

DO_BACKUP_ INSERTCHECKSUMS

Calculate checksums

Enter 1 if the checksums are to be calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If 0 is entered, backup performance may be improved, but there will be no way to verify the integrity of the data on the tape.

DO_BACKUP_ TRAVERSEPOINTS

Back up local mount points

Enter 1 to back up mount points that direct a file or directory to a local disk or directory path; otherwise, enter 0. Using this option allows you to back up data that is linked to local files, but stored on another device without having to actually select the data.

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_BACKUP_HSM

Back up data in remote storage

Enter 1 to back up data that has been migrated from primary storage to secondary storage; otherwise, enter 0. When using this option, the data will not be recalled to its original location; it will be backed up directly to the backup media. This option should not be used if: Š

A single device containing one drive is used for secondary storage and backups because Remote Storage and Backup Exec will compete for use of the drive.

Š

You want to run a backup of the entire system because Backup Exec attempts to access all data that has been migrated to secondary storage and this may take a considerable amount of time.

DO_BACKUP_ USECHANGEJOURNAL

Use change journal

Enter 1 to use Windows NTFS Change Journal to determine which files have been modified since the last full backup; otherwise, enter 0. This option can only be used with NTFS volumes and only when the backup method selected is either DIFFERENTIAL Using modified time or INCREMENTAL - Using modified time.

DO_BACKUP_ USEOPENFILEOPTION

Use Open File Option if available

Enter 1 to use the Open File Option if available; otherwise, enter 0.

667

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Default option parameters (continued) Option Name

Function

DO_BACKUP_ OPENFILEMETHOD

Back up open files if Open Enter a number from 0 to 3 to specify File Option is not how to back up open files if the Open available File Option is not available. Values include:

DO_BACKUP_ OPENFILESKIPSECS

Description

Š

0 = Never

Š

1 = With a lock

Š

2 = Without a lock

Š

3 = If closed within x seconds

Back up open file if closed If 3 was entered for the value for within x seconds DO_BACKUP_OPENFILEMETHOD, enter a number from 1 to 999 to specify the number of seconds Backup Exec is to wait for an open file to close before continuing the backup. If the files do not close during the specified interval, they are skipped.

Restore Default Options DO_RESTORE_ EXISTINGMETHOD

Restore over existing files Enter 1 to overwrite files on the target device that have the same name as files that are being restored; otherwise, enter 0.

DO_RESTORE_CORRUPT

Restore corrupt files

Enter 1 to allow Backup Exec to restore corrupted files during the restore process; otherwise, enter 0 to allow Backup Exec to automatically exclude corrupt files from the restore process.

DO_RESTORE_ JUNCMETHOD

Restore junction points method

Enter 0 if you want to restore the information for the junction points and the files and directories to which they are linked, overwriting existing junction points on your system. Enter 1 if you want to restore files and directories backed up from junction point links while retaining the system’s current junction points.

668

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_TRIAL_ CHECKCREDENTIALS

Check logon credentials for trial run job

Enter 1 to verify that the logon account is correct for the volumes being backed up; otherwise, enter 0.

DO_TRIAL_ CHECKCAPACITY

Check media capacity for Enter 1 to test whether enough tape is trial run job available to complete the job; otherwise, enter 0.

Trial Job Default Options

Note During the test run job, the number of scheduled jobs in the queue is not checked; therefore, jobs that are scheduled before the test run job may use the media that was available when the test run job was performed. DO_TRIAL_CHECKMEDIA

Check media for trial run Enter 1 to test whether the media is job online and overwritable for a trial run job; otherwise, enter 0.

DO_TRIAL_ DETERMINESIZEMETHOD

Select method for determining trial run job size

Enter 0 if you want to determine job size from a previous job history, or enter a 1 if you want to perform a pre-scan.

DO_TRIAL_ HOLDONFAILURE

Place job on hold if trial job fails

Enter 1 to have the scheduled job placed on hold if any failures are detected during the test run; otherwise, enter 0.

Advanced Open File Options DO_OPENFILE_METHOD

Š

0 = None

Š

1 = Use Advanced Open File Option

669

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Enter one of the following values:

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

Select summary level for job log

Enter one of the following values for the job log summary level:

Job Log Default Options DO_LOG_SUMMARYLEVEL

DO_LOG_FILEBASE

Specify job log name

Š

0 = Summary only

Š

1 = Summary and directories

Š

2 = Summary, directories, and files

Š

3 = Summary, directories, files, and details.

Specify a job log name FILENAME#.txt. The # starts at 00. The default is BEX#.txt.

SQL Default Options DO_SQL_BACKUPMETHOD Select the SQL backup method

DO_SQL_ CHECBEFOREBACKUP

DO_SQL_ CONTINUEIFCHECKFAILS

670

Select the backup method to be used for SQL databases by entering one of the following values: Š

0 = full

Š

1 = log

Š

2 = log no truncate

Š

3 = differential

Consistency check before Select a consistency check to run before backup a backup. Values are:

Continue with backup if consistency check fails

Š

0 = none

Š

1 = full

Š

2 = full with indexes

Š

3 = physical

Enter 1 if you want the backup job to continue if the consistency check fails; otherwise, enter 0.

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_SQL_ CHECKAFTERBACKUP

Consistency check after backup

Select a consistency check to run after a backup. Values are:

DO_SQL_RESTOREMETHOD SQL restore method

Š

0 = none

Š

1 = full

Š

2 = full with indexes

Š

3 = physical

Select the default restore method for SQL databases. Values include: Š

0 = no recover

Š

1 = recover

Š

2 = standby

DO_SQL_REPLACE

Replace database or filegroups

Enter 1 if you want to replace a Microsoft SQL Server v7.0 or later database or filegroup, even if another database or filegroup with the same name already exists on the server. Otherwise, enter 0.

DO_SQL_ CHECKAFTERRESTORE

Consistency check after restore

Select a consistency check to run after a restore. Values include:

DO_SQL_ ENABLEFGSUPPORT

Š

0 = none

Š

1 = full

Š

2 = full with indexes

Š

3 = physical

Enable filegroup support Enter 1 if you want to enable filegroup support; otherwise, enter 0.

Exchange Default Options DO_XCH_ENABLE

Enable Exchange support Enter 1 if you want to enable Exchange support; otherwise, enter 0.

671

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_XCH_BACKUPMETHOD Exchange backup method Select the default backup method to use for Exchange databases. Values include:

DO_XCH_ MBOXBACKUPMETHOD

672

Exchange mailbox backup method

Š

0 = full

Š

1 = copy

Š

2 = differential

Š

3 = incremental

Select the default method for backing up Exchange mailboxes. Values are: Š

0 = full

Š

1 = copy

Š

2 = differential

Š

3 = incremental

DO_XCH_ SINGLEINSTANCEBACKUP

Enable single instance backup for message attachments

Enter 1 if you want to enable single instance backup for message attachments; otherwise, enter 0.

DO_XCH_NOLOSS

No loss restore

Enter 1 to restore without deleting existing job logs; otherwise, enter 0.

DO_XCH_PUBLIC

Restore public folder

Enter 1 to restore a public folder; otherwise, enter 0.

DO_XCH_PRIVATE

Restore private mailboxes Enter 1 to restore private mailboxes; otherwise, enter 0.

DO_XCH_LOGPATH

Select temporary location Enter the temporary location for log for log and patch files and patch files.

DO_XCH_ AUTOCREATEMAILBOX

Automatically recreate user accounts and mailboxes

Enter 1 to have Backup Exec automatically recreate user accounts and mailboxes if they do not already exist on the server; otherwise, enter 0.

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

Lotus Domino Default Options DO_DOMINO_ BACKUPMETHOD

Lotus Domino backup method

Select the default method for backing up Lotus Domino databases. Values include: Š

0 = full

Š

1 = differential

Š

2 = incremental

DO_DOMINO_ RECYCLELOGS

Mark archive logs for recycling

Enter 1 to mark archive logs for recycling; otherwise, enter 0.

DO_DOMINO_ SECONDSTOWAIT

Seconds to wait for database

Specify the number of seconds for the restore process to wait for a database that is in use by entering a value from 0 to 999.

DO_DOMINO_ RECOVEROPTION

Database identification

Select the default option for handling database IDs during a restore. Values include: Š

0 = retain original IDs

Š

1 = assign new database ID

Š

2 = assign new database ID and replica ID.

NetWare SMS Default Options DO_SMS_ BACKUPASEXPANDED

Back up compressed files Enter 1 to have Backup Exec in decompressed form decompress, or expand, compressed files as they are backed up; otherwise, enter 0.

DO_SMS_ RESTOREVOL RESTRICT

Restore volume restrictions

Enter 1 to restore NetWare volume restrictions; otherwise, enter 0.

Catalog Default Options DO_CAT_USECATALOGS

Chapter 14, VERITAS Backup Exec - Command Line Applet

673

Command Line

Use storage media-based Enter 1 to use the catalog information catalogs from the media; otherwise, enter 0.

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_CAT_TRUNCATEFLAG

Truncate catalogs

Enter 1 to retain only the header information and to remove all file and directory details after the specified number of days; otherwise, enter 0. If you select this option, you must enter a value for DO_CAT_TRUNCATEDAYS.

DO_CAT_TRUNCATEDDAYS Amount of days before truncating catalogs

Enter the amount of days before file and directory details are removed from the catalogs. The value can be between 1 and 999.

DO_CAT_REMOVEFLAG

Remove unused catalogs Enter 1 to remove unused catalogs after a specified number of days; otherwise, enter 0. If you select this option, you must enter a value for DO_CAT_REMOVEDAYS.

DO_CAT_REMOVEDAYS

Amount of days before removing unused catalogs

Enter the amount of days before unused catalogs are removed. The value can be between 1 and 999.

DO_CAT_PATH

Set catalog path

Specify a path on the volume for the catalog files.

Media Default Options

674

DO_MEDIA_B2DLOCATION Backup-to-Disk default folder location

Specify a path on the volume for the Backup-to-Disk folder.

DO_MEDIA_ OVERWRITELEVEL

Enter one of the following values:

Set media overwrite protection level

Š

1 = None

Š

2 = None with prompt

Š

3 = Partial

Š

4 = Partial with prompt

Š

5 = Full

Administrator’s Guide

Using Command Line Switches Default option parameters (continued) Option Name

Function

Description

DO_MEDIA_ OVERWRITEOPTIONS

Set the media overwrite options

Enter one of the following values: Š

0 = Overwrite scratch media before overwriting recyclable media contained in the targeted media set

Š

1 = Overwrite recyclable media contained in the targeted media set before overwriting scratch media

Intelligent Disaster Recovery Default Options DO_DISASTER_DATAPATH

Disaster recovery data path

Specify a path where a copy of the DR files for the protected computers will be stored.

DO_DISASTER_ ALTERNATEPATH

Alternate disaster recovery data path

Specify an alternate data path where a second copy of the DR files can be stored.

Database Maintenance Default Options Remove old data from the Enter 1 if you want Backup Exec to Backup Exec database automatically delete old data from its database, using specified criteria. Otherwise, enter 0.

DO_DB_JOBHISTORYDAYS

Number of days to keep job history data

Enter the number of days for job history data to remain on the Backup Exec database.

DO_DB_ ALERTHISTORYDAYS

Number of days to keep alert history data

Enter the number of days for alert history data to remain on the Backup Exec database.

DO_DB_JOBLOGDAYS

Number of days to keep job logs

Enter the number of days for job logs to remain on the Backup Exec database.

DO_DB_REPORTDAYS

Number of days to keep report data

Enter the number of days for report data to remain on the Backup Exec database.

DO_DB_CONSISTENCY

Perform database consistency check

Enter 1 if you want to perform a database consistency check; otherwise, enter 0.

Chapter 14, VERITAS Backup Exec - Command Line Applet

675

Command Line

DO_DB_GROOM

Using Command Line Switches Default option parameters (continued)

676

Option Name

Function

Description

DO_DB_COMPACT

Compact the Backup Exec Enter 1 if you want to compact the database Backup Exec database; otherwise, enter 0.

DO_DB_DUMP

Dump contents of Backup Enter 1 if you want to dump the Exec database contents of the Backup Exec database to the Backup Exec data directory so that it may be backed up. Otherwise, enter 0.

Administrator’s Guide

Using Backup or Restore Job Script Files

Using Backup or Restore Job Script Files A job script file is a text (.txt) file that the Command Line applet can use with command line switch -o90 to create and launch backup or restore jobs. The backup job script file can contain all of the switches you would normally specify on the command line when using the Command Line Applet as well as additional switches that you set when creating the backup job script file. The backup job script file can also be used in conjunction with some of the switches. A sample backup job script file (bjscript.txt) and restore job script file (rjscript.txt) are included in the UTILS directory on the installation CD. To activate an entry in this sample file, delete the forward slashes (//) that comment out the line.

Creating a Backup Job Script File Use a text editor, such as Notepad, to create a Backup Job Script File that contains seven sections and entries for each section. The seven sections of a Backup Job Script File are: ◆

[General]



[Backup_Options]



[Media_Options]



[Miscellaneous]



[Schedule]



[W2K]



[Selections]



[Machine]

Each entry included for the various sections must be typed in capital letters and be immediately followed by an equal (=) sign. The value for the entry must immediately follow the equal sign and contain no spaces or quotes unless they are part of the value itself. For example, to specify in the script that the job name is Workstation Backups and the job type is backup, the script file for the [General] section would appear as: [General] JOB_TYPE=Backup JOB_NAME=Workstation Backups

Chapter 14, VERITAS Backup Exec - Command Line Applet

677

Command Line

All possible entries for a Backup Job Script File are described in the following table. In creating a script file, you would not want to include all entries. For example, either INTERVAL_DAY or INTERVAL_WEEK, but not both entries, could be present in a script file.

Using Backup or Restore Job Script Files Possible backup job script file entries Section

Entry

Description

JOB_TYPE=job type

This field must be completed with a value of Backup.

JOB_NAME=job name

Type the name of the backup job.

SERVER

Type the name of the Backup Exec server where the operation is to be performed. If a server is not specified, the local server is used by default.

USERNAME=username

Type the user name for logging into a remote Backup Exec server. If a user name is not specified, the current user name is used.

PASSWORD=password

Enter the password for logging into a remote Backup Exec server. If a password is not specified, the current password is used.

JOB_PRIORITY=priority

Enter the priority for the job. If another job is scheduled to run at the same time as this job, the priority set determines which job runs first.

[General]

If a priority is not entered, the priority will be Medium. Options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

[Backup Options] BK_SET_NAME=backup set name

678

Type the name of the backup set to be used by the job.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

BK_METHOD=#

Enter a number 0 through 9 corresponding to the backup method you want. Methods are: Š

0 = Full

Š

1 = Copy

Š

2 = Differential – changed files

Š

3 = Incremental – changed files

Š

4 = Daily

Š

5 = Working set

Š

6 = Incremental – modified time

Š

7 = Differential – modified time

Š

8 = Full – modified time

Š

9 = Archive - Delete files after successful copy backup

If 5 is entered as the value, a value must also be entered for WORKING_SET_DAYS. DEVICE_NAME=device name

Type the name of the device to be used for the backup.

USE_OPEN_FILE_OPTION=YES/NO

Enter YES as the value if you want to use the Advanced Open File Option if available. If Advanced OFO is unavailable, the OPEN_FILES_METHOD specified will be used.

679

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

OPEN_FILES_METHOD=#

Enter a number 0 through 3 to specify how to back up open files. Selections include: Š

0 = Never

Š

1 = If closed within a specified number of seconds. If this method is selected, use flag OPEN_FILE_WAIT_TIME to set the number of seconds for Backup Exec to wait; otherwise, the value set for default options will be used.

Š

2 = With a lock

Š

3 = Without a lock

Note If 1 is entered as the value, Backup Exec will wait the number of seconds specified in OPEN_FILE_WAIT_TIME for the file to close before continuing the backup. If the files do not close during the specified interval, they are skipped.

680

OPEN_FILE_WAIT_TIME=#

Specifies the number of seconds Backup Exec is to wait for a file to close before continuing with the backup.

RETENSION_MEDIA=YES/NO

Enter YES to retension the media before backup; otherwise, enter NO.

PRESERVE_TREE_ON_ARCHIVE= YES/NO

Enter YES to retain the directory structure on the hard drive of the files backed up in an archive job; otherwise, enter NO.

SINGLE_INSTANCE_FOR_NTFS=YES/NO

Enter YES if single instance store is being used, and you want to ensure that only one instance of a file for NTFS volumes will be backed up regardless of the number of single instance store (SIS) links that point to it. Otherwise, enter NO.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

REMOTE_AGENT_PRIORITY=#

Select the number of CPU cycles the media server will use to maintain optimal server performance while Remote Agent backups are running. The higher the priority, the more the protected server’s CPU processing power is used during backup operations. Note Allocating fewer CPU cycles to a backup job results in slower backup performance. This field contains the following options:

WORKING_SET_DAYS=#

Š

MEDIUM. Select this option to allocate the default number of CPU cycles the protected server will use during a Remote Agent backup.

Š

LOW. Select this option to allocate fewer server CPU cycles to the backup job.

Š

LOWEST. Select this option to allocate the fewest number of CPU cycles to the backup job.

Note If 5 was entered as the value for entry BK_METHOD=#, the WORKING_SET_DAYS entry must be completed and included in the Backup Job Script File. Enter the number of days to include files last accessed during. For example, if you want to specify for a working set backup to include all files last accessed within 30 days, type WORKING_SET_DAYS=30.

EXCHANGE_ROOT=Exchange Server name

681

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

If you are backing up an Exchange server, specify the Exchange server name, and then use the EXCHANGE_METHOD entry to specify how the backup is to be done.

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

EXCHANGE_METHOD=#

If you are backing up an Exchange server, use this entry. Enter a number 0 through 3 corresponding to the backup method you want for the Exchange database. Methods are: 0 = Backup All

Š

1 = Backup Copy

Š

2 = Backup Log Differential

Š

3 = Backup Log Incremental

SQL_ROOT=SQL Server name

If you are backing up a SQL server, specify the SQL Server name and then use the SQL_METHOD entry to specify how the backup is to be done.

SQL_METHOD=#

If you are backing up a SQL server, use this entry. Enter a number 0 through 2 corresponding to the backup method you want for the SQL database. Methods are:

LOTUS_DOMINO_METHOD=#

682

Š

Š

0 = Backup All

Š

1 = Backup Log

Š

2 = Backup Log No Truncate

Š

3 = Differential

If you are backing up a Lotus Domino server, use this entry. Enter a number 0 through 2 corresponding to the backup method you want for the Lotus Domino database. Methods are: Š

0 = Full

Š

1 = Differential

Š

2 = Incremental

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

LOTUS_DOMINO_RECYCLE_LOGS= YES/NO

If you are backing up a Lotus Domino server, use this entry to indicate that the Lotus Domino server will reuse the transaction log after it has been backed up. Š

YES = Recycle logs

Š

NO = Do not recycle logs

NW_BK_DECOMPRESS_FILES= YES/NO

If you are backing up NetWare shares or volumes, include this entry in the Backup Job Script File. If you want to back up compressed files in decompressed form, enter YES as the value; otherwise, enter NO.

OVERWRITE_JOB=YES/NO

Enter YES as the value if you want Backup Exec to overwrite a duplicate job if one exists; otherwise, enter NO.

CONTINUE_ON_DBCC=YES/NO

Enter YES if you are backing up a SQL server, have specified that a database consistency check is to be performed before the backup, and want the job to continue if the pre-backup database consistency check failed.

PRE_BK_DBCC=#

If you are backing up a SQL server, include this entry. Enter a value of 0 to 3 corresponding to an option for performing a pre-backup database consistency check. Options are: 0 = None

Š

1 = No Index

Š

2 = Full

Š

3 = Physical only (SQL 2000 only)

683

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Š

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

POST_BK_DBCC=#

If you are backing up a SQL server include this entry. Enter a value of 0 to 3 corresponding to an option for performing a post-backup database consistency check. Options are:

SQL_STANDBY_OPTION=#

Š

0 = None

Š

1 = No Index

Š

2 = Full

Š

3 = Physical only (SQL 2000 only)

This entry is for Microsoft SQL Server 2000 only. Select the Standby value to put the database in standby mode when the job log backup completes. Select the No Recover value to put the database in a loading state when the job log backup completes. Users cannot connect to or query the database while it is in a loading state. Values are: Š

0 = Standby

Š

1=No Recover

[Media Options]

684

MEDIA_NAME=Family Name

Specify a label for the new or overwritable media.

MEDIA_SET=Media Set Name

Enter the name of the media set to be used for the backup.

MEDIA_PASSWORD=Media Password

If the media has a password, specify the password.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

APPEND=YES/NO

To append the job to the media set specified in the MEDIA_SET entry or overwrite if no appendable media is available, enter YES as the value. If you want the job to overwrite the media set specified in the MEDIA_SET entry, enter NO as the value. If you do not enter a value, by default the job will be an overwrite job.

APPEND_NO_OVERWRITE=YES

If you want the job to either append to the media set specified in the MEDIA_SET entry, or if no appendable media is available then to terminate, enter YES. To have the job append to the media set, or overwrite if no appendable media is available, enter No.

VERIFY=YES/NO

Enter YES as the value to have Backup Exec automatically perform a verify operation to make sure the media can be read once the backup has been completed; otherwise, enter NO. Verifying all backups is recommended.

COMPRESSION_TYPE=#

Enter a number from 0 to 3 that corresponds with the type of compression to use. Options include: Š

0 = Hardware compression

Š

1 = Software compression

Š

2 = Hardware if available, otherwise software

Š

3 = None

Note To use the default Backup Exec compression type, do not include this entry in the script.

685

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

CHECKSUM=YES/NO

Enter YES as the value if checksums are to be calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If NO is entered as the value, backup performance may be improved, but there will be no way to verify the integrity of the data on the tape.

EJECT_MEDIA=YES/NO

Enter YES to eject the media when the job completes; otherwise, enter NO.

[Miscellaneous] PRE_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run on the media server before the backup operation starts.

POST_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run after the backup operation completes.

COMMAND_RUN_POST_IF_ PRE_SUCCESS=YES/NO

Enter YES to execute the post-job command only if the pre-job command was successful; otherwise, enter NO.

COMMAND_RUN_JOB_IF_PRE_SUCCESS Enter YES to execute the job only if the =YES/NO pre-job command is successful; otherwise, enter NO. COMMAND_RUN_POST_ IF_JOB_FAILS=YES/NO

686

Enter YES to execute the post-job command even if the job fails; otherwise, enter NO.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

COMMAND_FAIL_JOB_IF_FAILS= YES/NO

Enter YES to allow the pre- and post-job commands to be successful only if completed with a return code of zero. Otherwise, enter NO. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands. If you enter NO, the success of the preand post-job commands is not determined based on the return code.

COMMAND_AUTO_CANCEL_TIME=#

Enter the number of minutes Backup Exec should wait before canceling a command that did not complete.

COMMAND_RUN_OPTION=#

Enter 0 to run the command on this media server or 1 to run the command on each server being backed up.

USE_JOB_DEFAULTS=YES/NO

Enter YES to use the job defaults from the Backup Exec Administration console for this job. All other options will be overwritten. Enter NO if you do not want the job defaults used.

NIC_ENABLED=YES/NO

Enter YES to use the MAC address or service entry name specified with the NIC_ADDRESS entry.

Chapter 14, VERITAS Backup Exec - Command Line Applet

687

Command Line

Enter NO to clear previous settings for the network interface, and to use any available network adapter.

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

NIC_ADDRESS

For Windows 2000 and later operating systems, enter the Media Access Control (MAC) address for the network interface you selected. For Windows NT 4 and earlier operating systems, enter the service entry name. To use this setting, NIC_ENABLED must be set to YES.

NIC_SUBNET_ADDRESS

If the setting used in NIC_ADDRESS is connected to multiple subnets, then enter the network ID based on the IP address and the subnet mask of the network interface card you selected. To view this ID, click the Tools menu, then click Options, then under Properties, click Network, and view the Network ID field. This setting corresponds to the network interface used in NIC_ADDRESS. You must also enter the NIC_SUBNET_MASK.

NIC_SUBNET_MASK

If the setting used in NIC_ADDRESS is connected to multiple subnets, then enter the mask that determines the subnet to which the network interface belongs. To view this ID, click the Tools menu, then click Options, then under Properties, click Network, and view the Subnet mask field. This setting corresponds to the network interface used in NIC_ADDRESS. You must also enter the NIC_SUBNET_ADDRESS.

NIC_SUBNET_AUTOGET=YES/NO

688

Enter YES to have Backup Exec use any available network adapter.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

BACKUP_LOCAL_MOUNT_POINTS= YES/NO

Enter a value of YES to back up mount points which direct a file or directory to a local disk or directory path. Using this command allows you to back up data that is linked to local files, but stored on another device without having to actually select the device.

BACKUP_REMOTE_STORAGE_HSM= YES/NO

Enter a value of YES to back up data that has been migrated from primary storage to secondary storage. The data will not be recalled to its original location; it will be backed up directly to the backup media.

[W2K]

This command should not be used if: Š

A single device is used for secondary storage and backups and it contains one drive because Remote Storage and Backup Exec will compete for use of the drive.

Š

You want to run a backup of your entire system because Backup Exec attempts to access all data that has been migrated to secondary storage and this may take a considerable amount of time.

[Schedule] SCHED_STARTTIME=HH:MM:SS

Enter the start time in HH:MM:SS format for this job.

SCHED_ENDTIME=HH:MM:SS

Enter the latest time this job can start in HH:MM:SS format.

689

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

SCHED_RESTART_INTERVAL=HH:MM:SS Enter the interval in HH:MM:SS format for the job to restart on each run day. For example, if you have set the job up to run every seven days, you can also set it up to run every four hours on its run day by entering SCHED_RESTART_INTERVAL=04:00: 00. SCHED_REPEAT_INTERVAL=X

Enter the interval in days in which the job is to run. For example, if you want the job to run every seven days, enter SCHED_REPEAT_INTERVAL=7.

SCHED_ANCHOR=MM/DD/YYYY

Enter the date in mm/dd/yyyy format the interval is calculated from.

SCHED_EFFECTIVE=MM/DD/YYYY

Enter the date in mm/dd/yyyy format that the schedule becomes effective.

SCHED_DAYSOFMONTH=x

Enter the days of the month you want the job to run in a comma delimited string. For example, to run the job on the first and 15th of the month, type: SCHED_DAYSOFMONTH=1,15

SCHED_DAYSOFWEEK

Enter the day of the week, a forward slash, and the week of the month you want the job to run in a comma delimited string. Enter a value of 1-7 for the day of the week with 1 equaling Sunday, 2 equaling Monday, and so on. For the week of the month, values can be 1 for the first week, 2 for the second week, 3 for the third week, 4 for the fourth week, and 5 for the last week. For example, to run the job on Sunday for the first three weeks of the month, type: SCHED_DAYSOFWEEK=1/1,1/2,1/3

690

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

SCHED_INCLUDEDATEx=MM/DD/YYYY

Enter a specific date when the job should run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to run the first and 15th of August, type: SCHED_INCLUDEDATE1=08/01/2002 SCHED_INCLUDEDATE2=08/15/2002

SCHED_EXCLUDEDATEx=MM/DD/YYYY

Enter a specific date, such as a holiday, when the job should not run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to not run on the first and 25th of August, type: SCHED_EXCLUDEDATE1=08/01/2002 SCHED_EXCLUDEDATE2=08/25/2002

DATE=MM/DD/YYYY

Enter the start date for the job in mm/dd/yyyy format.

TIME=hh:mm:ss

Enter the start time for the job in hh:mm:ss format. Note The hour, minutes, and seconds must be separated by colons.

691

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

INTERVAL_MINUTES=#

If a number is specified, the job is scheduled to run every specified number of minutes. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_HOURS=#

If a number is specified, the job is scheduled to run every specified number of hours. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

692

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

INTERVAL_DAYS=#

If a number is specified, the job is scheduled to run every specified number of days. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_WEEKS=#

If a number is specified, the job is scheduled to run every specified number of weeks. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

693

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

WEEKS=FIRST,SECOND,THIRD, FOURTH,LAST

The job will be scheduled for the specified week of the month. For example, if the entry appears as WEEKS=FIRST, the job will be scheduled to run the first week of the month.

or WEEKS=1,2,3,4,5

Note If this entry is included in the Backup Job Script File, a value must also be provided for the WEEKDAY entry. Do not use this entry in conjunction with the INTERVAL entries, the DAYS, or the DAY_OF_MONTH entries.

WEEKDAY=SUN/MON/TUES/WED/ THU/FRI/SAT

Note If the entry WEEKS is included in the Backup Job Script File, a value must also be provided for this entry. Enter the day of the week the job should be completed. Only one day can be entered in this entry, which works in conjunction with the WEEKS entry.

DAYS=SUN/MON/TUES/WED/THU/FRI/SA If this entry is included in the Backup T Job Script File, the backup job will be scheduled for the indicated day or days. Multiple days can be included, but must be separated by commas. For example: DAYS=MON,WED,FRI Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAY_OF_MONTH entries.

694

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

DAY_OF_MONTH=#

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day of the month. The value can range from 1 to 31. Only one number can be specified. Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAYS entries.

RUN_IMMEDIATE=YES/NO

Enter a value of YES if the job is to run immediately; otherwise, enter NO. Note This entry should be used only if no other entries are specified under the schedule section. If no other scheduling options have been selected and this entry is not set to YES, the job will be created but not scheduled.

HOLD=YES/NO

Enter YES as the value if you want to schedule the job on hold; otherwise, enter NO.

AUTO_CANCEL_TIME=#

Enter the number of minutes after which the job is canceled if it is not completed. Backup Exec starts timing the job when the job is queued, not when the job begins.

HOLD_ON_JOB_FAILURE=

Enter the value of YES to place a job on hold if it fails; otherwise, enter NO.

YES/NO

695

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

PATHx=String

Specify which files or directories get backed up. For example, PATH1=\\Myserver1\Myshare1\Myd ir1\*.*

[Selections]

or PATH2=\\Myserver2\Myshare2\Myd ir2\*.* Selections that end with a backslash indicate the selection is a directory. Selections that do no end with a backslash indicate the selection is a file. For example, PATH1=c:\example (indicates that example is the name of a file on drive C. PATH2=c:\example\ (indicates that example is a directory on drive C. The order resource selections are specified is the order in which the resources will be backed up. To back up System State, use the string \\server name\System?State\*.*

696

INCLUDEx=YES/NO

Enter YES to include this item in the backup job; otherwise, enter NO.

SUBDIRSx-YES/NO

Enter YES to include all subdirectories; otherwise, enter NO.

EXCHANGEx=Exchange Server name

Change x to a unique number and specify the name of the Exchange Server to back up.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

EXCH2ROOT?=Exchange 2000 Server name

Specifies the name of the Exchange 2000 Server that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. Each selection must specify at least the server name and the storage group. See the example in “EXCH2DB?=Exchange 2000 Server database name.”

EXCH2SG?=Exchange 2000 Server storage group name

Specifies the name of the Exchange 2000 Server storage group to back up, or that contains the database to back up. Change ? to the same number used to identify the selection for the Exchange 2000 Server. See the example in “EXCH2DB?=Exchange 2000 Server database name.”

697

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

EXCH2DB?=Exchange 2000 Server database name

Specifies the name of the Exchange 2000 Server database to back up. Change ? to the same number used to identify the selection for the Exchange 2000 Server and storage group. In the following example, SERVER_NAME is an Exchange 2000 server name, and it is the same server in all of the selections. The first selection backs up the First Storage Group, the second selection backs up the Mailbox database in the Second Storage Group, and the third selection backs up the Users database in the Second Storage Group. EXCH2ROOT1=SERVER_NAME EXCH2SG1=First Storage Group EXCH2ROOT2=SERVER_NAME EXCH2SG2=Second Storage Group EXHC2DB2=Mailboxes EXCH2ROOT3=SERVER_NAME EXCH2SG3=Second Storage Group EXHC2DB3=Users

SQLx=SQL Server name

698

Change x to a unique number and specify the name of the SQL Server to back up.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

SQL2S? =SERVER_NAME

Specifies the name of the SQL Server 2000 that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example in “SQL2NI?=SQL Server 2000 named instance name.”

SQL2DB?=SQL Server 2000 database name

Specifies the name of the SQL Server 2000 database to back up. Type *.* to back up all the databases. Change ? to a number that corresponds to the number of the selection.

SQL2NI?=SQL Server 2000 named instance name

Specifies the named instance on the SQL Server 2000 to back up. Change ? to the same number used to identify the selection for the SQL Server 2000. For example, to back up the named instance ONE, the named instance TWO, and the SQL Server 2000 itself, the entries would be: SQL2S1=SERVER_NAME SQL2NI1=ONE SQL2S2=SERVER_NAME SQL2NI2=TWO SQL2S3=SERVER_NAME

699

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

LNSERVER?=SERVER_NAME

Specifies the name of the Lotus Notes server that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example in “LNDRIVE?=Drive letter.”

LNDRIVE?=Drive letter

Change ? to the same number used to identify the selection for the Lotus Notes server. In the following example, SERVER_NAME is a Lotus Notes server name, and it is the same server in all of the selections. To back up the D drive and the E drive on the Lotus Notes server SERVER_NAME, the entries would be: LNSERVER1=SERVER_NAME LNDRIVE1=D LNSERVER2=SERVER_NAME LNDRIVE2=E

ORCLSRV?=SERVER_NAME

Specifies the name of the Oracle server that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example name in “ORCLSID?=System Identifier for database.”

700

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

ORCLSID?=System Identifier for database

Specifies the SID (System Identifier) for the Oracle database to back up. Change ? to the same number used to identify the selection for the Oracle server. In the following example, SERVER_NAME is an Oracle server name, and it is the same server in all of the selections. To back up the databases SID1 and SID2 on the Oracle server, the entries would be: ORCLSRV1=SERVER_NAME ORCLSID1=SID1 ORCLSRV2=SERVER_NAME ORCLSID2=SID2

SPPSx=SharePoint Portal Server name

701

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Change x to a unique number and specify the name of the Microsoft SharePoint Portal Server to back up.

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

APATHx=String

Specify which files or directories get backed up and aliased when running an alias backup. The order resource selections are specified is the order in which the resources will be backed up. Change x to a unique number for each device aliasing backup selection. An alias backup allows you to specify a share to back up, and then specify another share from which the backup will appear to have originated. This type of backup is useful when the location of the data to be backed up is temporary. For example, a temporary share may be created when a mirror is split. Or a share may be cloned and placed on another device while it is backed up in order to off load traffic from a busy device. If a temporary share is backed up, the restore path for the share may not exist if a restore becomes necessary. Instead, you can specify an alias to a location where you want the share to appear to have been backed up from. For example: APATH1=\\MachineA\C$\*.* AINCLUDE1=yes ASUBDIRS1=yes AALIAS1=\\MachineB\D$ indicates that \\MachineA\C$\*.* and all its subdirectories should be backed up and aliased as \\MachineB\D$. Alias jobs support both UNC and local devices. However, both the target and the source must be the same, either both UNC or both local devices. You cannot mix them. Note The schedule option RUN_IMMEDIATE=YES must be included or the alias selection will be ignored.

702

Administrator’s Guide

Using Backup or Restore Job Script Files Possible backup job script file entries (continued) Section

Entry

Description

AINCLUDEx=YES/NO

Enter YES to include this item in the backup job when running an alias backup; otherwise, enter NO. Change x to a unique number for each alias backup selection.

ASUBDIRSx-YES/NO

Enter YES to include all subdirectories when running an alias backup; otherwise, enter NO. Change x to a unique number for each device aliasing backup selection.

AALIASx=String

Specify the share from which the backup will appear to have originated, when running an alias backup. Change x to a unique number for each device aliasing backup selection. For example: AALIAS1=\\MachineB\D$ See also the example for APATHx=String

[Machine] MACHINEx=Machine Name|Logon GUID

703

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Specify the logon account used to log on to remote machines and back up remote data and databases.

Using Backup or Restore Job Script Files

Creating a Restore Job Script File Use a text editor, such as Notepad, to create a restore job script file that contains entries for the restore job options. The restore job script file has similar entries, or values, as those used in the backup job script file. Sections of a Restore Job Script include: ◆

[General]



[Restore_Options]



[Selections]



[Schedule]

Each entry included in the restore job script file must be typed in capital letters and be immediately followed by an equal (=) sign. The value for the entry must immediately follow the equal sign and contain no spaces or quotes unless they are part of the value itself. For example, to specify in the script that the job name is Workstation Restore and the job type is restore, the script file would appear as: [General] JOB_TYPE=Restore JOB_NAME=Workstation Restore All possible entries for a restore job script file are described in the following table. In creating a script file, you would not want to include all entries Note The Job History GUID is required for bemcmd -o90 restores. To obtain the Job History GUID, first use -o12 and /or -o506 to obtain the Job Instance GUID. Then use the Job Instance GUID with -o21 to obtain the Job History GUID. Possible restore job script file entries Section

Entry

Description

JOB_TYPE=job type

This field must be completed with a value of Restore.

JOB_NAME=job name

Type the name of the restore job.

SERVER=server name

Type the name of the media server where the operation is to be performed. If a server is not specified, the local server is used by default.

[General]

704

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

USERNAME=user name

Type the user name for logging into the system being restored. If a user name is not specified, the current user name is used.

PASSWORD=password

Type the password for logging into the system being restored. If a password is not specified, the current password is used.

JOB_PRIORITY=priority

Enter the priority for the job. If another job is scheduled to run at the same time as this job, the priority set determines which job runs first. If a priority is not entered, the priority will be Medium. Options are: Š

Lowest

Š

Low

Š

Medium

Š

High

Š

Highest

[Restore Options] RESTORE_CORRUPT_FILES=YES/NO

Enter YES if you do not want Backup Exec to automatically exclude corrupt files from the restore process; otherwise, enter NO.

RESTORE_EXISTING=x

Values for x are: 0 = Skip if file exists 1 = Restore over existing 3 = Skip if existing file is more recent

RESTORE_SECURITY=YES/NO

705

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Enter YES to restore file level security information on NTFS partitions if it exists in the selected data; otherwise, enter NO.

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

RESTORE_PRESERVE=YES/NO

Enter YES to restore the data with its original directory structure intact. Enter NO to restore all data (including the data in subdirectories) to the path specified in SHARE_REDIRECT_PATH.

DEVICE_NAME=device name

Type the name of the device, such as a drive or backup-to-disk folder, containing the data to be restored.

SHARE_REDIRECT_DRIVE=drive letter

Type a destination drive, other than where the data was originally backed up, to which the data is to be restored.

SHARE_REDIRECT_PATH=path name

Type the target path on the drive specified in SHARE_REDIRECT_DRIVE. To retain the original directory structure, make sure that the value for RESTORE_PRESERVE=YES. If the RESTORE_PRESERVE=NO option is not selected, all of the data will be restored to the path designated in this field.

706

SQL_REDIRECT_SERVER= SQL Server Name

If you are redirecting SQL data, type the name of the SQL server where the data is to be restored.

SQL_REDIRECT_INSTANCE= instance name

If you are redirecting SQL data to a named instance, specify the instance name. Otherwise, the data is restored to the default instance.

SQL_REDIRECT_DATABASE= database name

If you are redirecting this restore to a different database on the target server, specify the target database name. If you are restoring a differential or log backup, and the associated database backup was restored to a renamed database, the new database name must be entered.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

XCH_REDIRECT_SERVER=Exchange server name

If you are redirecting Exchange data, specify the Exchange server where the data is to be restored.

XCH_REDIRECT_MAILBOX=Exchange mailbox name

If you are redirecting an Exchange mailbox, specify the name of the target mailbox. The mailbox must already exist before you can restore to it.

SP_REDIRECT_SETS_SERVER= SERVER/DOCUMENT

Specify whether server sets or document sets are being restored.

SP_REDIRECT_DRIVE=drive name

Enter the name of the local drive or the UNC path to which you want to redirect the restore. If you type a UNC path, use the format server name\share name.

SP_REDIRECT_PATH=path

Type the folder location on the drive to which you want to redirect the restore.

SP_REDIRECT_SERVER=\\server name Type the name of the computer to which you want to redirect the restore. Use the format \\server name. SP_REDIRECT_WORKGROUP= workspace name

Type the name of the workspace to which you want to redirect the restore. Note You must type an entry in this field, even if you are restoring the data to the original workspace. You cannot redirect the restore to a different folder in the workspace. Enter YES to restore the Removable Storage database; otherwise, enter NO.

RESTORE_DISK_QUOTA=YES/NO

Enter YES to restore disk quota data; otherwise, enter NO. Disk quotas track and control disk usage on a per user, per volume basis; the values can be restored to the limits that were set before the backup.

Chapter 14, VERITAS Backup Exec - Command Line Applet

707

Command Line

RESTORE_RSM_DATA=YES/NO

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

RESTORE_TERMINAL_SERVICES= YES/NO

Enter YES to restore the Terminal Services database, which contains licensing data for client licenses; otherwise, enter NO.

RESTORE_WMI=YES/NO

Enter YES to restore the Windows Management Instrumentation (WMI) respository, which provides support for monitoring and controlling system resources and provides a consistent view of your managed environment; otherwise, enter NO.

RESTORE_CLUSTER_DB=YES/NO

Enter YES to restore the cluster configuration; otherwise, enter NO.

RESTORE_FORCE_RECOVERY= YES/NO

Enter YES to force the recovery of the cluster quorum even if other nodes are online the and/or disk signatures do not match option; otherwise, enter NO.

RESTORE_PRIMARY_REPLICA=YES/NO

Enter YES if all the domain controllers in the domain are being restored and you want to designate this server as the primary arbitrator. If you enter NO, replication may not function. Use this option when you perform a restore of a domain controller in a domain that does not have any other domain controllers.

708

RESTORE_REGISTRY=YES/NO

Enter YES to restore registry information if it exists in the selected data; otherwise, enter NO. This option applies to Windows NT 4.0 only.

RESTORE_PNP_MERGE=YES/NO

Enter YES to merge existing hardware configuration and registry services with the data to be restored when restoring registry information; otherwise, enter NO.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

RESTORE_JUNCSASDIRS=YES/NO

Enter YES to restore junction points, files and directories from backup media, or enter NO to preserve existing junction points and restore files and directories from backup media.

PRE_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run on the media server before the backup operation starts.

POST_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run after the backup operation completes.

COMMAND_RUN_POST_IF_ PRE_SUCCESS=YES/NO

Enter YES to execute the post-job command only if the pre-job command was successful; otherwise, enter NO.

COMMAND_RUN_JOB_IF_PRE_SUCCESS Enter YES to execute the job only if the =YES/NO pre-job command is successful; otherwise, enter NO. COMMAND_RUN_POST_ IF_JOB_FAILS=YES/NO

709

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Enter YES to execute the post-job command even if the job fails; otherwise, enter NO.

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

COMMAND_FAIL_JOB_IF_FAILS= YES/NO

Enter YES to allow the pre- and post-job commands to be successful only if completed with a return code of zero. Otherwise, enter NO. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands. If you enter NO, the success of the preand post-job commands is not determined based on the return code.

COMMAND_AUTO_CANCEL_ TIME=#

Enter the number of minutes Backup Exec should wait before canceling a command that did not complete.

COMMAND_RUN_OPTION=#

Enter 0 to run the command on this media server or 1 to run the command on each server being restored to.

SQL_DATABASE_RECOVER=#

Enter one of the following values for recovering the database:

SQL_REPLACE_DATABASE=YES/NO

710

Š

0 = No recover

Š

1 = Recover database

Š

2 = Standby database

Enter YES to replace a database or file group, even if another database or filegroup with the same name already exists on the server; otherwise, enter NO.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

SQL_AUTOMASTER=YES/NO

Enter YES to enable Backup Exec to stop SQL so that the master can be restored; otherwise, enter NO. If you enter YES, all existing users are logged off, and the master is put into single-user mode.

SQL_POSTRESTORE_DBCC=#

Enter one of the following values for performing a consistency check after restore: Š

0 = None

Š

1 = Full check, excluding indexes

Š

2 = Full check, including indexes

Š

3 = Physical check only (SQL 2000 only)

SQL_DEFAULT_DRIVE=drive letter

Enter the drive letter for an alternate drive to which SQL database files will be restored.

SQL_USE_ALLDEFAULT=YES/NO

Enter YES to restore all SQL Server database files to the alternate drive specified in SQL_DEFAULT_DRIVE even if the drive where they originally resided exists. Enter NO to restore SQL database files to the alternate drive specified in SQL_DEFAULT_DRIVE only when the drive where they originally resided does not exist. Enter YES to restore all database files to the target instance’s data location; otherwise, enter NO.

SQL_POINTINTIME=MM/DD/YYYY, HH:MM:SS

Enter the date and time to restore transactions for a transaction log up to and including a point in time in the transaction log. After the point in time, recovery from the transaction log is stopped.

Chapter 14, VERITAS Backup Exec - Command Line Applet

711

Command Line

SQL_USE_DEFAULT_INSTDIR=YES/NO

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

712

Entry

Description

SQL_LOGMARK_NAME=named transaction

Enter the named transaction to include in the recovery of the transaction log. Recovery will be stopped after this named transaction is restored.

SQL_LOGMARK_INCLUDE=YES/NO

Enter YES to restore transactions from a transaction log up to a named transaction in the transaction log. After the named transaction, recovery from the transaction log is stopped. Otherwise, enter NO.

SQL_LOGMARK_TIME=MM/DD/YYYY,HH :MM:SS

Enter the date and time after which the restore operation is to search for the named transaction.

XCH_AUTOCREATE_MAILBOX=YES/NO

Enter YES if you are restoring Exchange data and want Backup Exec to automatically recreate user accounts and mailboxes; otherwise, enter NO.

XCH_NOLOSS_RESTORE=YES/NO

Enter YES if you are restoring Exchange 2000 data and do not want to delete the existing job logs; otherwise, enter NO.

XCH_RESTORE_PUBLIC=YES/NO

Enter YES if you are restoring Exchange data and want to restore public folders; otherwise, enter NO.

XCH_RESTORE_PRIVATE=YES/NO

Enter YES if you are restoring Exchange data and want to restore private mailboxes; otherwise, enter NO.

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

ESE_NOLOSS_RESTORE=YES/NO

Enter YES to preserve the existing transaction logs on the Exchange 2000 server; otherwise, enter NO. If you enter YES, transaction logs from the storage media are then restored and added to the existing set of transaction logs on the Exchange 2000 server. When the restore operation finishes, Exchange 2000 automatically updates its databases with the uncommitted transactions found in the existing and newly-restored transaction logs. This option is selected by default.

ESE_TEMPLOG_PATH=path

Enter a location where the associated log and patch files are to be kept until the database is restored. The default location is \temp. If storage groups are being restored, a subdirectory in \temp is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory. After the database is restored, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted.

713

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

ESE_COMMIT_AFTER=YES/NO

Enter YES to enable the restore operation to play through log files and roll back any uncompleted transactions if your selection contains the last backup set to be restored. If you enter NO, the database is left in an intermediate state and is not yet usable. If this option is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning.

ESE_MOUNT_AFTER=YES/NO

Enter YES to mount the database so that it is available to users; otherwise, enter NO. This checkbox is only available if EXE_LASTSET is set to YES.

LOTUS_WAIT_MSECS=x

Specify the number of seconds for the restore process to wait for a database that is in use. When a Lotus database is restored it must first be taken offline. This will ensure that the database is not being accessed, closed, or deleted while the restore operation is being processed. If the database is still in use and cannot be taken offline after the specified wait time, the restore will fail.

LOTUS_DBRECOVER_OPTION=#

Enter one of the following options for recovering a Lotus Domino database: Š

0 = Retain original IDs

Š

1 = Assign new database IDs

Š

2 = Assign new database IDs and replica IDs

LOTUS_POINTINTIME=MM/DD/YYYY,HH: Enter a date and time from which to MM:SS restore the Lotus Domino database. RESTORE_VOL_RESTRICT=YES/NO

714

Enter YES if you are restoring NetWare data and want to restore volume restrictions; otherwise, enter NO. Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

NIC_ENABLED=YES/NO

Enter YES to use the MAC address or service entry name specified with the NIC_ADDRESS entry. Enter NO to clear previous settings for the network interface, and to use any available network adapter.

NIC_ADDRESS

For Windows 2000 and later operating systems, enter the Media Access Control (MAC) address for the network card you selected. For Windows NT 4 and earlier operating systems, enter the service entry name. An example is 00-B0-D0-D3-99-33. To use this setting, NIC_ENABLED must be set to YES.

NIC_SUBNET_ADDRESS

If the setting used in NIC_ADDRESS is connected to multiple subnets, then enter the network ID based on the IP address and the subnet mask of the network interface card you selected, for example, 10.212.10.113. To view this ID, click the Tools menu, then click Options, then under Properties, click Network, and view the Network ID field. This setting corresponds to the network interface used in NIC_ADDRESS. You must also enter the NIC_SUBNET_MASK.

715

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

NIC_SUBNET_MASK

If the setting used in NIC_ADDRESS is connected to multiple subnets, then enter the mask that determines the subnet to which the network interface belongs, for example, 255.255.254.0. To view this ID, click the Tools menu, then click Options, then under Properties, click Network, and view the Subnet mask field. This setting corresponds to the network interface used in NIC_ADDRESS. You must also enter the NIC_SUBNET_ADDRESS.

NIC_SUBNET_AUTOGET=YES/NO

Enter YES to have Backup Exec use any available network adapter; otherwise, enter NO.

JOBHISTORY_GUID

Required. Specifies the backup job that has already run To obtain the Job History GUID, first use -o12 and /or -o506 to obtain the Job Instance GUID. Then use the Job Instance GUID with -o21 to obtain the Job History GUID.

SCHED_STARTTIME=HH:MM:SS

Enter the start time in HH:MM:SS format for this job.

SCHED_ENDTIME=HH:MM:SS

Enter the latest time this job can start in HH:MM:SS format.

[Selections]

[Schedule]

716

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

SCHED_RESTART_INTERVAL=HH:MM:SS Enter the interval in HH:MM:SS format for the job to restart on each run day. For example, if you have set the job up to run every seven days, you can also set it up to run every four hours on its run day by entering SCHED_RESTART_INTERVAL=04:00: 00. SCHED_REPEAT_INTERVAL=X

Enter the interval in days in which the job is to run. For example, if you want the job to run every seven days, enter SCHED_REPEAT_INTERVAL=7.

SCHED_ANCHOR=MM/DD/YYYY

Enter the date in mm/dd/yyyy format the interval is calculated from.

SCHED_EFFECTIVE=MM/DD/YYYY

Enter the date in mm/dd/yyyy format that the schedule becomes effective.

SCHED_DAYSOFMONTH=x

Enter the days of the month you want the job to run in a comma delimited string. For example, to run the job on the first and 15th of the month, type: SCHED_DAYSOFMONTH=1,15

SCHED_DAYSOFWEEK

Enter the day of the week, a forward slash, and the week of the month you want the job to run in a comma delimited string. Enter a value of 1-7 for the day of the week with 1 equaling Sunday, 2 equaling Monday, and so on. For the week of the month, values can be 1 for the first week, 2 for the second week, 3 for the third week, 4 for the fourth week, and 5 for the last week. For example, to run the job on Sunday for the first three weeks of the month, type:

Chapter 14, VERITAS Backup Exec - Command Line Applet

717

Command Line

SCHED_DAYSOFWEEK=1/1,1/2,1/3

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

SCHED_INCLUDEDATEx=MM/DD/YYYY

Enter a specific date when the job should run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to run the first and 15th of August, type: SCHED_INCLUDEDATE1=08/01/2002 SCHED_INCLUDEDATE2=08/15/2002

SCHED_EXCLUDEDATEx=MM/DD/YYYY

Enter a specific date, such as a holiday, when the job should not run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to not run on the first and 25th of August, type: SCHED_EXCLUDEDATE1=08/01/2002 SCHED_EXCLUDEDATE2=08/25/2002

DATE=MM/DD/YYYY

Enter the start date for the job in mm/dd/yyyy format.

TIME=hh:mm:ss

Enter the start time for the job in hh:mm:ss format. Note The hour, minutes, and seconds must be separated by colons.

718

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

INTERVAL_MINUTES=#

If a number is specified, the job is scheduled to run every specified number of minutes. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_HOURS=#

If a number is specified, the job is scheduled to run every specified number of hours. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

719

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

INTERVAL_DAYS=#

If a number is specified, the job is scheduled to run every specified number of days. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_WEEKS=#

If a number is specified, the job is scheduled to run every specified number of weeks. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

720

Administrator’s Guide

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

WEEKS=FIRST,SECOND,THIRD, FOURTH,LAST

The job will be scheduled for the specified week of the month. For example, if the entry appears as WEEKS=FIRST, the job will be scheduled to run the first week of the month.

or WEEKS=1,2,3,4,5

Note If this entry is included in the Backup Job Script File, a value must also be provided for the WEEKDAY entry. Do not use this entry in conjunction with the INTERVAL entries, the DAYS, or the DAY_OF_MONTH entries.

WEEKDAY=SUN/MON/TUES/WED/ THU/FRI/SAT

Note If the entry WEEKS is included in the Backup Job Script File, a value must also be provided for this entry. Enter the day of the week the job should be completed. Only one day can be entered in this entry, which works in conjunction with the WEEKS entry.

DAYS=SUN/MON/TUES/WED/THU/FRI/SA If this entry is included in the Backup T Job Script File, the backup job will be scheduled for the indicated day or days. Multiple days can be included, but must be separated by commas. For example: DAYS=MON,WED,FRI Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAY_OF_MONTH entries.

721

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Backup or Restore Job Script Files Possible restore job script file entries (continued) Section

Entry

Description

DAY_OF_MONTH=#

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day of the month. The value can range from 1 to 31. Only one number can be specified. Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAYS entries.

RUN_IMMEDIATE=YES/NO

Enter a value of YES if the job is to run immediately; otherwise, enter NO. Note This entry should be used only if no other entries are specified under the schedule section. If no other scheduling options have been selected and this entry is not set to YES, the job will be created but not scheduled.

HOLD=YES/NO

Enter YES as the value if you want to schedule the job on hold; otherwise, enter NO.

AUTO_CANCEL_TIME=#

Enter the number of minutes after which the job is canceled if it is not completed. Backup Exec starts timing the job when the job is queued, not when the job begins.

HOLD_ON_JOB_FAILURE=

Enter the value of YES to place a job on hold if it fails; otherwise, enter NO.

YES/NO

722

Administrator’s Guide

Using Scripts and Selection Lists

Saving and Launching the Backup or Restore Job Script File After creating the backup or restore job script file, save it as a plain text file. When launching the job script file, specify the directory where the file resides along with the filename. To launch a script file, type the following at the command prompt: bemcmd -o90 -fdrive letter\directory\script name For example, suppose you created a directory for your scripts called Scripts and named a script for differential backups of workstations DIFFBKWORK. To launch this script with the verbose command, type: bemcmd -o90 -v -f”c:\scripts\diffbkwork.txt”

Using Scripts and Selection Lists Selection lists provide a quick and easy way of selecting files that you back up often. After you choose devices, directories and files, you can save the selections as a selection list script that you can use in regularly scheduled operations or once-only operations. A sample selection script file (selectionscript.txt) is included in the UTILS directory on the installation CD. To activate an entry in this sample file, delete the forward slashes (//) that comment out the line. The selection list script is used with command -o220 to create a selection list.

Creating a Selection List Script File Use a text editor, such as Notepad, to create a selection script file that contains all data selections for the backup job. Each entry included in the selection list script file must be typed in capital letters and be immediately followed by an equal (=) sign. The value for the entry must immediately follow the equal sign and contain no spaces or quotes unless they are part of the value itself.

723

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Selection Lists

All possible entries for a backup job template script file are described in the following table. In creating your script file, you would not want to include all entries. Values for selection list script Section

Entry

Description

PATHx=String

Specify which files or directories get backed up. For example, PATH1=\\Myserver\Myshare\Mydir \*.*

[Selections]

The order resource selections are specified is the order in which the resources will be backed up. Please note the following about the order in which selections can be backed up:

724

Š

You can order resources within a server, but you cannot alternate selections across servers. For example, you can select C: and D: from Server A followed by selections from Server B. However, you cannot order selections as C: from Server A and then C: from Server B and then D: from both servers.

Š

For any given server, system state or shadow copy components must be ordered last.

INCLUDEx=YES/NO

Enter a value of YES if you want to include this item in the backup job; otherwise, enter NO.

SUBDIRSx-YES/NO

Enter a value of YES if you want to include all subdirectories; otherwise, enter NO.

EXCHANGE_ROOT=Exchange Server name

If you are backing up an Exchange server, specify the Exchange server name, and then use the EXCHANGE_METHOD entry to specify how the backup is to be done.

Administrator’s Guide

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

EXCHANGEx=Exchange Server name

Change x to a unique number and specify the name of the Exchange Server you want to back up.

EXCH2ROOTx=Exchange 2000 Server Specifies the name of the Exchange name 2000 Server that contains this selection. Change x to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. Each selection must specify at least the server name and the storage group. See the example in “EXCH2DB?=Exchange 2000 Server database name” on page 698. EXCH2SGx=Exchange 2000 Server storage group name

Specifies the name of the Exchange 2000 Server storage group that you want to back up, or that contains the database you want to back up. Change x to the same number used to identify the selection for the Exchange 2000 Server.

725

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

EXCH2DBx=Exchange 2000 Server database name

Specifies the name of the Exchange 2000 Server database you want to back up. Change x to the same number used to identify the selection for the Exchange 2000 Server and storage group. In the following example, SERVER_NAME is an Exchange 2000 server name, and it is the same server in all of the selections. The first selection backs up the First Storage Group, the second selection backs up the Mailbox database in the Second Storage Group, and the third selection backs up the Users database in the Second Storage Group. EXCH2ROOT1=SERVER_NAME EXCH2SG1=First Storage Group EXCH2ROOT2=SERVER_NAME EXCH2SG2=Second Storage Group EXHC2DB2=Mailboxes EXCH2ROOT3=SERVER_NAME EXCH2SG3=Second Storage Group EXHC2DB3=Users

726

SQL_ROOT=SQL Server name

If you are backing up a SQL server, specify the SQL Server name and then use the SQL_METHOD entry to specify how the backup is to be done.

SQLx=SQL Server name

Change x to a unique number and specify the name of the SQL Server you want to back up.

Administrator’s Guide

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

SQL2S? =SERVER_NAME

Specifies the name of the SQL Server 2000 that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in a sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example in “SQL2NI?=SQL Server 2000 named instance name.”

SQL2DB?=SQL Server 2000 database name

Specifies the name of the SQL Server 2000 database to back up. Type *.* to back up all the databases. Change ? to a number that corresponds to the number of the selection.

SQL2NI?=SQL Server 2000 named instance name

Specifies the named instance on the SQL Server 2000 to back up. Change ? to the same number used to identify the selection for the SQL Server 2000. For example, to back up the named instance ONE, the named instance TWO, and the SQL Server 2000 itself, the entries would be: SQL2S1=SERVER_NAME SQL2NI1=ONE SQL2S2=SERVER_NAME SQL2NI2=TWO SQL2S3=SERVER_NAME

727

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

LNSERVER?=SERVER_NAME

Specifies the name of the Lotus Notes server that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example in “LNDRIVE?=Drive letter.”

LNDRIVE?=DRIVE_LETTER

Change ? to the same number used to identify the selection for the Lotus Notes server. In the following example, SERVER_NAME is a Lotus Notes server name, and it is the same server in all of the selections. To back up the D drive and the E drive on the Lotus Notes server SERVER_NAME, the entries would be: LNSERVER1=SERVER_NAME LNDRIVE1=D LNSERVER2=SERVER_NAME LNDRIVE2=E

ORCLSRV?=SERVER_NAME

Specifies the name of the Oracle server that contains this selection. Change ? to a number that corresponds to the number of the selection. The selections must be in sequential order. Increase the number by one for each new selection. For example, the first selection would be 1, the second selection would be 2, etc. If the selections are out of sequence, they are not processed. See the example name in “ORCLSID?=System Identifier for database.”

728

Administrator’s Guide

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

ORCLSID?=System Identifier for database

Specifies the SID (System Identifier) for the Oracle database you want to back up. Change ? to the same number used to identify the selection for the Oracle server. In the following example, SERVER_NAME is an Oracle server name, and it is the same server in all of the selections. To back up the databases SID1 and SID2 on the Oracle server, the entries would be ORCLSRV1=SERVER_NAME ORCLSID1=SID1 ORCLSRV2=SERVER_NAME ORCLSID2=SID2

SPPSx=SharePoint Portal Server name

729

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Change x to a unique number and specify the name of the Microsoft SharePoint Portal Server you want to back up.

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

Note Alias selections will be ignored unless RUN_IMMEDIATE=YES in the [Schedule] section of backup job or backup job template.

730

Administrator’s Guide

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

APATHx=String

Note This does not apply to the -o220 command. Also, the schedule option RUN_IMMEDIATE=YES must be included or the alias selection will be ignored. Specify which files or directories get backed up and aliased when running an alias backup. The order resource selections are specified is the order in which the resources will be backed up. Change x to a unique number for each device aliasing backup selection. An alias backup allows you to specify a share to back up, and then specify another share from which the backup will appear to have originated. This type of backup is useful when the location of the data to be backed up is temporary. For example, a temporary share may be created when a mirror is split. Or a share may be cloned and placed on another device while it is backed up in order to offload traffic from a busy device. If a temporary share is backed up, the restore path for the share may not exist if a restore becomes necessary. Instead, you can specify an alias to a location where you want the share to appear to have been backed up from. For example: APATH1=\\MachineA\C$\*.* AINCLUDE1=yes ASUBDIRS1=yes AALIAS1=\\MachineB\D$ indicates that \\MachineA\C$\*.* and all its subdirectories should be backed up and aliased as \\MachineB\D$.

Chapter 14, VERITAS Backup Exec - Command Line Applet

731

Command Line

Alias jobs support both UNC and local devices. However, both the target and the source must be the same, either both UNC or both local devices. You cannot mix them.

Using Scripts and Selection Lists Values for selection list script (continued) Section

Entry

Description

AINCLUDEx=YES/NO

Note This does not apply to the -o220 command. Enter a value of YES if you want to include this item in the backup job when running an alias backup; otherwise, enter NO. Change x to a unique number for each alias backup selection.

ASUBDIRSx-YES/NO

Note This does not apply to the -o220 command. Enter a value of YES if you want to include all subdirectories when running an alias backup; otherwise, enter NO. Change x to a unique number for each device aliasing backup selection.

AALIASx=String

Note This does not apply to the -o220 command. Specify the share from which the backup will appear to have originated, when running an alias backup. Change x to a unique number for each device aliasing backup selection. For example: AALIAS1=\\MachineB\D$ See also the example for APATHx=String

732

Administrator’s Guide

Using Scripts and Backup Job Templates

Using Scripts and Backup Job Templates You can create a backup job template by using a script file with command line switch -o230. A backup job template includes all destination, settings, and schedule options or a backup. After the template has been created, it can be used with command line switch -o240 to quickly create backup jobs. A sample backup job template script file (bjtemplatescript.txt) is included in the UTILS directory on the installation CD. To activate an entry in this sample file, delete the forward slashes (//) that comment out the line.

Creating a Backup Job Template Script File Use a text editor, such as Notepad, to create a backup job template script file that contains all settings and options for a backup job, except for the data selections. Each entry included in the backup job template script file must be typed in capital letters and be immediately followed by an equal (=) sign. The value for the entry must immediately follow the equal sign and contain no spaces or quotes unless they are part of the value itself. For example, to specify in the script that the backup method is working set and that the device name is Backup-to-Disk Folder 1, the script should appear as: BK_METHOD=1 DEVICE_NAME="Backup-to-Disk Folder 1" All possible entries for a backup job template script file are described in the following table. In creating your script file, you would not want to include all entries. Values for backup job template script Section

Entry

Description

[Backup Options] BK_SET_NAME=backup set name

733

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Type the name of the backup set to be used by the job.

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

BK_METHOD=#

Enter a number 0 through 9 corresponding to the backup method you want. Methods are: Š

0 = Full

Š

1 = Copy

Š

2 = Differential – changed files

Š

3 = Incremental – changed files

Š

4 = Daily

Š

5 = Working set

Š

6 = Incremental – modified time

Š

7 = Differential – modified time

Š

8 = Full – modified time

Š

9 = Archive - Delete files after successful copy backup

If 7 is entered as the value, a value must also be entered for WORKING_SET_DAYS.

734

DEVICE_NAME=device name

Type the name of the device to be used for the backup.

USE_OPEN_FILE_OPTION=YES/NO

Enter YES as the value if you want to use the Advanced Open File Option if available; otherwise, enter NO. If Advanced OFO is unavailable, the OPEN_FILES_METHOD specified will be used.

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

OPEN_FILES_METHOD=#

Enter a number 0 through 3 to specify how to back up open files. Selections include: Š

0 = Never

Š

1 = If closed within specified number of seconds. If this method is selected, use flag OPEN_FILE_WAIT_TIME to set the number of seconds for Backup Exec to wait; otherwise, the value set for default options will be used.

Š

2 = With a lock

Š

3 = Without a lock

Note If 1 is entered as the value, Backup Exec will wait the number of seconds specified in OPEN_FILE_WAIT_TIME for the job to close before continuing the backup. If the files do not close during the specified interval, they are skipped. OPEN_FILE_WAIT_TIME=#

Specifies the number of seconds Backup Exec is to wait for a file to close before continuing with the backup.

WORKING_SET_DAYS=#

Note If 5 was entered as the value for entry BK_METHOD=#, the WORKING_SET_DAYS entry must be completed and included in the Backup Job Script File. Enter the number of days to include files last accessed during. For example, if you want to specify for a working set backup to include all files last accessed within 30 days, type WORKING_SET_DAYS=30.

RETENSION_MEDIA=YES/NO

735

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Enter YES if you want Backup Exec to retension the media before backup; otherwise, enter NO.

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

PRESERVE_TREE_ON_ARCHIVE= YES/NO

Enter YES if you want Backup Exec to retain the directory structure on the hard drive of the files backed up in an archive job; otherwise, enter NO.

SINGLE_INSTANCE_FOR_NTFS=YES/NO

Enter YES if single instance store is being used, and you want to ensure that only one instance of a file for NTFS volumes will be backed up regardless of the number of single instance store (SIS) links that point to it. Otherwise, enter NO.

REMOTE_AGENT_PRIORITY=#

Select the number of CPU cycles the media server will use to maintain optimal server performance while Remote Agent backups are running. The higher the priority, the more the protected server’s CPU processing power is used during backup operations. Note Allocating fewer CPU cycles to a backup job results in slower backup performance. This field contains the following options:

736

Š

MEDUM. Select this option to allocate the default number of CPU cycles the protected server will use during a Remote Agent backup.

Š

LOW. Select this option to allocate fewer server CPU cycles to the backup job.

Š

LOWEST. Select this option to allocate the fewest number of CPU cycles to the backup job.

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

EXCHANGE_METHOD=#

If you are backing up an Exchange server, use this entry. Enter a number 0 through 3 corresponding to the backup method you want for the Exchange database. Methods are:

SQL_METHOD=#

LOTUS_DOMINO_METHOD=#

LOTUS_DOMINO_RECYCLE_LOGS= YES/NO

0 = Backup All

Š

1 = Backup Copy

Š

2 = Backup Log Differential

Š

3 = Backup Log Incremental

If you are backing up a SQL server, use this entry. Enter a number 0 through 2 corresponding to the backup method you want for the SQL database. Methods are: Š

0 = Backup All

Š

1 = Backup Log

Š

2 = Backup Log No Truncate

If you are backing up a Lotus Domino server, use this entry. Enter a number 0 through 2 corresponding to the backup method you want for the Lotus Domino database. Methods are: Š

0 = Full

Š

1 = Differential

Š

2 = Incremental

If you are backing up a Lotus Domino server, use this entry to indicate that the Lotus Domino server will reuse the transaction log after it has been backed up. Š

YES = Recycle logs

Š

NO = Do not recycle logs

737

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Š

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

NW_BK_DECOMPRESS_FILES= YES/NO

If you are backing up NetWare shares or volumes, include this entry in the Backup Job Script File. If you want to back up compressed files in decompressed form, enter YES as the value; otherwise, enter NO.

OVERWRITE_JOB=YES/NO

Enter YES as the value if you want Backup Exec to overwrite a duplicate job if one exists; otherwise, enter NO.

CONTINUE_ON_DBCC=YES/NO

Enter YES if you are backing up a SQL server, have specified that a database consistency check is to be performed before the backup, and want the job to continue if the pre-backup database consistency check failed.

PRE_BK_DBCC=#

If you are backing up a SQL server, include this entry and enter a value of 0 to 2 corresponding to an option for performing a pre-backup database consistency check. Options are:

POST_BK_DBCC=#

738

Š

0 = None

Š

1 = No Index

Š

2 = Full

If you are backing up a SQL server include this entry and enter a value of 0 to 2 corresponding to an option for performing a post-backup database consistency check. Options are: Š

0 = None

Š

1 = No Index

Š

2 = Full

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

SQL_STANDBY_OPTION=#

Note This entry is for Microsoft SQL Server 2000 only. Select the Standby value to put the database in standby mode when the job log backup completes. Select the No Recover value to put the database in a loading state when the job log backup completes. Users cannot connect to or query the database while it is in a loading state. Values are: Š

0 = Standby

Š

1=No Recover

[Media Options] MEDIA_NAME=Family Name

Specify a label for the new or overwritable media.

MEDIA_SET=Media Set Name

Enter the name of the media set to be used for the backup.

MEDIA_PASSWORD=Media Password

If the media has a password, specify the password.

APPEND=YES/NO

If you want the job to append to the media set specified in the MEDIA_SET entry or overwrite if no appendable media is available, enter YES as the value. If you want the job to overwrite the media set specified in the MEDIA_SET entry, enter NO as the value. If you do not enter a value, by default the job will be an overwrite job.

739

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

APPEND_NO_OVERWRITE=YES

If you want the job to either append to the media set specified in the MEDIA_SET entry, or if no appendable media is available then to terminate, enter YES. To have the job append to the media set, or overwrite if no appendable media is available, enter NO.

VERIFY=YES/NO

Enter YES as the value to have Backup Exec automatically perform a verify operation to make sure the media can be read once the backup has been completed; otherwise, enter NO. Verifying all backups is recommended.

COMPRESSION_TYPE=#

Enter a number from 0 to 3 that corresponds with the type of compression to use. Options include: Š

0 = Hardware compression

Š

1 = Software compression

Š

2 = Hardware if available, otherwise software

Š

3 = None

Note To use the default Backup Exec compression type, do not include this entry in the script.

740

CHECKSUM=YES/NO

Enter YES as the value if checksums are to be calculated for each data stream written to tape, and then written in a separate stream immediately following the data stream. If NO is entered as the value, backup performance may be improved, but there will be no way to verify the integrity of the data on the tape.

EJECT_MEDIA=YES,NO

Enter YES as the value if you want Backup Exec to eject the media when the job completes; otherwise, enter NO.

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

[Miscellaneous] PRE_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run on the media server before the backup operation starts.

POST_JOB_COMMAND=command

Specify a .EXE or batch file command that is to run after the backup operation completes.

COMMAND_RUN_POST_IF_ PRE_SUCCESS=YES/NO

Enter YES if you want the post-job command to be executed only if the pre-job command was successful; otherwise, enter NO.

COMMAND_RUN_JOB_IF_PRE_SUCCESS Enter YES to execute the job only if the =YES/NO pre-job command is successful; otherwise, enter NO. COMMAND_RUN_POST_ IF_JOB_FAILS=YES/NO

Enter YES to execute the post-job command even if the job fails; otherwise, enter NO.

COMMAND_FAIL_JOB_IF_FAILS= YES/NO

Enter YES to allow the pre- and post-job commands to be successful only if completed with a return code of zero. Otherwise, enter NO. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands.

Chapter 14, VERITAS Backup Exec - Command Line Applet

741

Command Line

If you enter NO, the success of the preand post-job commands is not determined based on the return code.

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

COMMAND_AUTO_CANCEL_TIME=#

Enter the number of minutes Backup Exec should wait before canceling a command that did not complete.

COMMAND_RUN_OPTION=#

Enter 0 if you want the command to run on this media server or 1 if you want the command to run on each server being backed up.

BACKUP_LOCAL_MOUNT_POINTS= YES/NO

Enter a value of YES to back up mount points which direct a file or directory to a local disk or directory path; otherwise, enter NO. Using this command allows you to back up data that is linked to local files, but stored on another device without having to actually select the device.

BACKUP_REMOTE_STORAGE_HSM= YES/NO

Enter a value of YES to back up data that has been migrated from primary storage to secondary storage; otherwise, enter NO. The data will not be recalled to its original location; it will be backed up directly to the backup media.

[W2K]

This command should not be used if:

742

Š

A single device is used for secondary storage and backups and it contains one drive because Remote Storage and Backup Exec will compete for use of the drive.

Š

You want to run a backup of your entire system because Backup Exec attempts to access all data that has been migrated to secondary storage and this may take a considerable amount of time.

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

SCHED_STARTTIME=HH:MM:SS

Enter the start time in HH:MM:SS format for this job.

SCHED_ENDTIME=HH:MM:SS

Enter the latest time this job can start in HH:MM:SS format.

[Schedule]

SCHED_RESTART_INTERVAL=HH:MM:SS Enter the interval in HH:MM:SS format for the job to restart on each run day. For example, if you have set the job up to run every seven days, you can also set it up to run every four hours on its run day by entering SCHED_RESTART_INTERVAL=04:00: 00. SCHED_REPEAT_INTERVAL=X

Enter the interval in days in which the job is to run. For example, if you want the job to run every seven days, enter SCHED_REPEAT_INTERVAL=7.

SCHED_ANCHOR=MM/DD/YYYY

Enter the date in mm/dd/yyyy format the interval is calculated from.

SCHED_EFFECTIVE=MM/DD/YYYY

Enter the date the schedule becomes effective.

SCHED_DAYSOFMONTH=X

Enter the days of the month you want the job to run in a comma delimited string. For example, to run the job on the first and 15th of the month, type: SCHED_DAYSOFMONTH=1,15

743

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

SCHED_DAYSOFWEEK

Enter the day of the week, a forward slash, and the week of the month you want the job to run in a comma delimited string. Enter a value of 1-7 for the day of the week with 1 equaling Sunday, 2 equaling Monday, and so on. For the week of the month, values can be 1 for the first week, 2 for the second week, 3 for the third week, 4 for the fourth week, and 5 for the last week. For example, to run the job on Sunday for the first three weeks of the month, type: SCHED_DAYSOFWEEK=1/1,1/2,1 /3

SCHED_INCLUDEDATEx=MM/DD/YYYY

Enter a specific date when the job should run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to run the first and 15th of August, type: SCHED_INCLUDEDATE1=08/01/2002 SCHED_INCLUDEDATE2=08/15/2002

SCHED_EXCLUDEDATEx=MM/DD/YYYY

Enter a specific date, such as a holiday, when the job should not run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to not run on the first and 25th of August, type: SCHED_EXCLUDEDATE1=08/01/2002 SCHED_EXCLUDEDATE2=08/25/2002

DATE=MM/DD/YYYY

Enter the start date for the job in mm/dd/yyyy format. Note The start date month, day, and year must be separated by forward slashes.

744

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

TIME=hh:mm:ss

Enter the start time for the job in hh:mm:ss format. Note The hour, minutes, and seconds must be separated by colons.

INTERVAL_MINUTES=#

If a number is specified, the job is scheduled to run every specified number of minutes. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

745

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

INTERVAL_HOURS=#

If a number is specified, the job is scheduled to run every specified number of hours. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_DAYS=#

If a number is specified, the job is scheduled to run every specified number of days. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

746

Administrator’s Guide

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

INTERVAL_WEEKS=#

If a number is specified, the job is scheduled to run every specified number of weeks. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

WEEKS=FIRST,SECOND,THIRD, FOURTH,LAST or

The job will be scheduled for the specified week of the month. For example, if the entry appears as WEEKS=FIRST, the job will be scheduled to run the first week of the month.

WEEKS=1,2,3,4,5

Note If this entry is included in the Backup Job Script File, a value must also be provided for the WEEKDAY entry. Do not use this entry in conjunction with the INTERVAL entries, the DAYS, or the DAY_OF_MONTH entries.

WEEKDAY=SUN/MON/TUES/WED/ THU/FRI/SAT

Note If the entry WEEKS is included in the Backup Job Script File, a value must also be provided for this entry.

Chapter 14, VERITAS Backup Exec - Command Line Applet

747

Command Line

Enter the day of the week the job should be completed. Only one day can be entered in this entry, which works in conjunction with the WEEKS entry.

Using Scripts and Backup Job Templates Values for backup job template script (continued) Section

Entry

Description

DAYS=SUN/MON/TUES/WED/THU/ FRI/SAT

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day or days. Multiple days can be included, but must be separated by commas. For example: DAYS=MON,WED,FRI Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAY_OF_MONTH entries.

DAY_OF_MONTH=#

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day of the month. The value can range from 1 to 31. Only one number can be specified. Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAYS entries.

RUN_IMMEDIATE=YES/NO

Enter a value of YES if the job is to run immediately; otherwise, enter NO. Note This entry should be used only if no other entries are specified under the schedule section. If no other scheduling options have been selected and this entry is not set to YES, the job will be created but not scheduled.

Creating a Backup Job Template Using a Script File After a backup job template script file has been created and saved, you can create a backup job template by using command -o230 and its subswitches. For example, if you have created a script file called daily_script and you want to now created a template called daily_backup_template, you would enter the following at the command prompt: bemcmd -o230 -tn:daily_backup_template -fdrive letter\directory\daily_script

748

Administrator’s Guide

Using a Schedule Script with Device and Media Operations

Creating a Backup Job from a Template You can quickly create a backup job using the command switch -o240, a backup job template, and a selection list. For example, suppose you have created a template called daily_backup_template and a selection list called daily_backup_selections. You can now create a backup job called daily_backup by entering the following at the command prompt: bemcmd -o240 -jdaily_backup -tn:daily_backup_template -sdaily_backup_selections

Using a Schedule Script with Device and Media Operations Use a text editor, such as Notepad, to create a schedule script file that contains all settings and options for a device and media operation, such as cleaning a robotic library drive, that can be scheduled as a recurring job. Each entry included in the schedule script file must be typed in capital letters and be immediately followed by an equal (=) sign. The value for the entry must immediately follow the equal sign and contain no spaces or quotes unless they are part of the value itself. All possible entries for a schedule script file are described in the following table. In creating your script file, you would not want to include all entries. The following values are in the schedule script file: Values for schedule script file Section

Entry

Description

SCHED_STARTTIME=HH:MM:SS

Enter the start time in HH:MM:SS format for this job.

SCHED_ENDTIME=HH:MM:SS

Enter the latest time this job can start in HH:MM:SS format.

[Schedule]

749

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

SCHED_RESTART_INTERVAL=HH:MM:SS Enter the interval in HH:MM:SS format for the job to restart on each run day. For example, if you have set the job up to run every seven days, you can also set it up to run every four hours on its run day by entering SCHED_RESTART_INTERVAL=04:00: 00. SCHED_REPEAT_INTERVAL=X

Enter the interval in days in which the job is to run. For example, if you want the job to run every seven days, enter SCHED_REPEAT_INTERVAL=7.

SCHED_ANCHOR=MM/DD/YYYY

Enter the date the day interval is calculated from.

SCHED_EFFECTIVE=MM/DD/YYYY

Enter the date the schedule becomes effective.

SCHED_DAYSOFMONTH

Enter the days of the month you want the job to run in a comma delimited string. For example, to run the job on the first and 15th of the month, type: SCHED_DAYSOFMONTH=1,15

SCHED_DAYSOFWEEK

Enter the day of the week, a forward slash, and the week of the month you want the job to run in a comma delimited string. Enter a value of 1-7 for the day of the week with 1 equaling Sunday, 2 equaling Monday, and so on. For the week of the month, values can be 1 for the first week, 2 for the second week, 3 for the third week, 4 for the fourth week, and 5 for the last week. For example, to run the job on Sunday for the first three weeks of the month, type: SCHED_DAYSOFWEEK=1/1,1/2,1 /3

750

Administrator’s Guide

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

SCHED_INCLUDEDATEx=MM/DD/YYYY

Enter a specific date when the job should run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to run the first and 15th of August, type: SCHED_INCLUDEDATE1=08/01/2002 SCHED_INCLUDEDATE2=08/15/2002

SCHED_EXCLUDEDATEx=MM/DD/YYYY

Enter a specific date, such as a holiday, when the job should not run. For this field, x is a number starting at 1, which allows you to specify multiple dates. For example, if you want the job to not run on the first and 25th of August, type: SCHED_EXCLUDEDATE1=08/01/2002 SCHED_EXCLUDEDATE2=08/25/2002

DATE=MM/DD/YYYY

Enter the start date for the job in mm/dd/yyyy format. Note The start date month, day, and year must be separated by forward slashes.

TIME=hh:mm:ss

Enter the start time for the job in hh:mm:ss format. Note The hour, minutes, and seconds must be separated by colons.

751

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

INTERVAL_MINUTES=#

If a number is specified, the job is scheduled to run every specified number of minutes. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_HOURS=#

If a number is specified, the job is scheduled to run every specified number of hours. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

752

Administrator’s Guide

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

INTERVAL_DAYS=#

If a number is specified, the job is scheduled to run every specified number of days. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

INTERVAL_WEEKS=#

If a number is specified, the job is scheduled to run every specified number of weeks. Note Only one of the INTERVAL values should be specified (i.e., if you specify a value for INTERVAL_MINUTES, do not specify a value for INTERVAL_HOURS, INTERVAL_DAYS, or INTERVAL_WEEKS. Also, use either one of the INTERVAL values, or the WEEKS and WEEKDAYS, or the DAYS, or the DAYS_OF_MONTH entries. Unless specifically noted, these scheduling options should not be used in conjunction with each other.

753

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

WEEKS=FIRST,SECOND,THIRD, FOURTH,LAST

The job will be scheduled for the specified week of the month. For example, if the entry appears as WEEKS=FIRST, the job will be scheduled to run the first week of the month.

or WEEKS=1,2,3,4,5

Note If this entry is included in the Backup Job Script File, a value must also be provided for the WEEKDAY entry. Do not use this entry in conjunction with the INTERVAL entries, the DAYS, or the DAY_OF_MONTH entries.

WEEKDAY=SUN/MON/TUES/WED/ THU/FRI/SAT

Note If the entry WEEKS is included in the Backup Job Script File, a value must also be provided for this entry. Enter the day of the week the job should be completed. Only one day can be entered in this entry, which works in conjunction with the WEEKS entry.

DAYS=SUN/MON/TUES/WED/THU/ FRI/SAT

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day or days. Multiple days can be included, but must be separated by commas. For example: DAYS=MON,WED,FRI Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAY_OF_MONTH entries.

754

Administrator’s Guide

Using a Schedule Script with Device and Media Operations Values for schedule script file (continued) Section

Entry

Description

DAY_OF_MONTH=#

If this entry is included in the Backup Job Script File, the backup job will be scheduled for the indicated day of the month. The value can range from 1 to 31. Only one number can be specified. Note Do not use this entry in conjunction with the INTERVAL entries, the WEEKS, or the DAYS entries.

RUN_IMMEDIATE=YES/NO

Enter a value of YES if the job is to run immediately; otherwise, enter NO. Note This entry should be used only if no other entries are specified under the schedule section. If no other scheduling options have been selected and this entry is not set to YES, the job will be created but not scheduled.

AUTO_CANCEL_TIME=XMINUTES/HOURS Enter a number and select either MINUTES or HOURS to specify to cancel a job if not completed with the selected time. HOLD=YES/NO

755

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Enter YES if you want the job to be submitted on hold; otherwise, enter NO.

Understanding Job Status Messages

Understanding Job Status Messages The Command Line Applet displays job statuses as numeric values. Descriptions of possible job status return values are: Possible job statuses Job Status Code

Description

JOB_STATE_CANCELED = 1

Job is terminal due to cancelation.

JOB_STATE_COMPLETED = 2

Job has been completed by the engine and is waiting final disposition.

JOB_STATE_SUCCESS_WITH_EXCEPTIO NS = 3

Job is terminal with success but there are some exceptions.

JOB_STATE_DISPATCHED = 4

Job has been sent for execution.

JOB_STATE_HOLD = 5

Job is in a hold state.

JOB_STATE_ERROR = 6

Job is terminal with an error.

JOB_STATE_INVALID SCHEDULE = 7

The schedule for the task is invalid.

JOB_STATE_INVALID TIIME WINDOW = 8 The time window is mutually exclusive thus job will never run.

756

JOB_STATE_MISSED = 9

Job is eligible for dispatch and is late.

JOB_STATE_NOT_IN_WINDOW = 10

Date of job makes it eligible to run, but time is not in window.

JOB_STATE_READY_BUT_PAUSED = 11

Job is ready, but dispatcher is paused.

JOB_STATE_PENDING = 12

The job needs to be dispositioned to an actual state.

JOB_STATE_RECOVERED = 13

The system forced recovery of the job.

JOB_STATE_DISABLED = 14

Job has been disabled in the system.

JOB_STATE_RESUMED = 15

The job will be restarted with checkpoint restart enabled, this value is only set in the job history summary.

JOB_STATE_ACTIVE = 16

Job is currently running on server.

Administrator’s Guide

Understanding Job Status Messages Possible job statuses (continued) Job Status Code

Description

JOB_STATE_READY = 17

Job is eligible for dispatch.

JOB_STATE_SCHEDULED = 19

The job has a due date in the future.

JOB_STATE_SUCCESS = 19

Job is terminal with success.

JOB_STATE_SUPERCEDED = 20

Job is ready, but another higher precedence task is eligible to run.

JOB_STATE_THRESHOLD_AUTO_ABORT The job was terminated due to AbortThreshold = 21 time-out. JOB_STATE_TO_BE_SCHEDULED = 22

The job needs to have the due date calculated.

JOB_STATE_LINKED_JOB = 23

The job is linked to another job so will not start until the master job is finished.

757

Command Line

Chapter 14, VERITAS Backup Exec - Command Line Applet

Understanding Job Status Messages

758

Administrator’s Guide

Server Clusters

Using VERITAS Backup Exec with Server Clusters

15

In a server cluster, Backup Exec can protect data on local disks and shared disks, as well as Microsoft SQL and Exchange databases. Server clusters provide high availability of applications and data to users. In a server cluster, several servers (called nodes) are linked in a network, and run cluster software that allows each node access to the shared disks. If a node becomes unavailable, cluster resources migrate to an available node (called failover). The shared disks and the virtual server are kept available. During failover, users experience only a short interruption in service. Backup Exec protects data on the shared disks, as well as data on the nodes’ local disks. Backup Exec can also protect Microsoft SQL Server and Exchange Server databases that are configured as virtual server applications; that is, they contain an IP address resource, a Network Name resource, and are displayed on the network with a unique server name (the virtual server name). See also: “Installing Backup Exec on a Cluster” on page 762 “Configurations for Backup Exec and Clusters” on page 773 “Backing Up Clusters” on page 783 “Restoring Data To Clusters” on page 788 “Requirements for Installing Backup Exec on a Cluster” on page 761 “Installing Additional Backup Exec Options on a Cluster” on page 764 “Specifying A Different Failover Node” on page 770 “Disaster Recovery of A Cluster” on page 794

759

How Backup Exec Works in a Cluster

How Backup Exec Works in a Cluster When you install Backup Exec into a Microsoft Cluster Server (MSCS) environment, you install it as a virtual server application. You assign an IP address resource, a Network Name resource (the virtual server name), and a disk resource to Backup Exec. When a failover occurs, backup jobs that were running are rescheduled. The Backup Exec services are restarted on a designated failover node, and the backup jobs are restarted by default. Backup Exec provides an additional rule for cluster failover restart called Checkpoint Restart. If the rule is enabled to retry jobs on a cluster failover, then an additional option can be specified to do a checkpoint restart when retrying the job. Checkpoint Restart is the only property available for the Cluster Failover Rule. You can change the default so that jobs are not restarted, and you can specify a different failover node if you add a new failover node. Additionally, a checkpoint restart option allows backup jobs to continue from the point at which the jobs were interrupted rather than starting the backup over again, making the backups faster and requiring fewer media. When the failed server comes back online, MSCS can automatically rebalance the workload in a cluster, called failback, by moving cluster groups back to the server that has rejoined the cluster. However, by design, Backup Exec does not failback. The backup jobs will continue to run on the designated failover node. By continuing to run backup jobs on the designated failover node, any further risk of having to restart the jobs again when the failed server rejoins the cluster is avoided. Then, when it is convenient, you can move the Backup Exec cluster group back to the controlling node. Specific details of how Backup Exec runs in a cluster vary depending on the configuration you use in the cluster. See also: “Configurations for Backup Exec and Clusters” on page 773 “Installing Backup Exec on a Cluster” on page 762

760

Administrator’s Guide

Requirements for Installing Backup Exec on a Cluster ◆

Two-node clusters are supported with Backup Exec for Windows NT, Windows 2000, and Windows Server 2003 and Microsoft Windows 2000 Advanced Server and Windows Server 2003 Enterprise.



Two-node, four-node, and eight-node clusters are supported with Backup Exec for Windows NT, Windows 2000, and Windows Server 2003 and Microsoft Windows 2000 DataCenter and Windows Server 2003 DataCenter.



Backup Exec Cluster can be installed on a Windows Server 2003 majority node configuration. However, there must be a shared disk in the configuration in order for Backup Exec to share its database files between nodes. In this type of configuration, if the majority of the cluster nodes fail, then the entire cluster will fail. This configuration normally uses more than two nodes in the cluster configuration.



The cluster administrator software must be installed on all Windows NT 4 and Windows 2000 servers that Backup Exec is installed on, including Backup Exec Remote Administrator installations; you must also have administrator rights to the server cluster. The cluster administrator allows you to view databases by their specific virtual server name; otherwise, databases appear to exist under all virtual server names in the cluster.



The controlling node and designated failover nodes must be online during installation of Backup Exec.



During installation of a Backup Exec cluster, the shared disk should be owned by the node on which the installation is run.



An individually licensed copy of Backup Exec for Windows Servers, as well as any applicable agents and options, is required for each node in the cluster as defined in the End User License Agreement. You must enter a serial number for each node in the cluster (the cluster must have at least two nodes). When installing an evaluation version of Backup Exec, a cluster environment is automatically detected and serial numbers are not required.



When you install Backup Exec clusters in a SAN SSO configuration, all Backup Exec installations must have the same server configuration. Either all nodes should be database servers or all nodes should be secondary member servers.



All Backup Exec installations into a cluster must either be part of a single cluster group, or be locally installed on each node. If cluster-aware Backup Exec is installed in a cluster as well as a locally installed version of Backup Exec (not cluster-aware), then you cannot log on to the locally installed Backup Exec media server. You can only log on using the Backup Exec virtual server name. To be able to log on to the locally installed Backup Exec media server, you must first use the Cluster Configuration Wizard to uninstall cluster-aware Backup Exec from all the nodes in the cluster.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

761

Server Clusters

Requirements for Installing Backup Exec on a Cluster

Installing Backup Exec on a Cluster ◆

If you install your Backup Exec SAN Shared Storage Option (SAN SSO) Primary server to an existing SQL Server 2000 instance, then you must use the Backup Exec Utility to configure secondary cluster-aware Backup Exec media servers in the SAN. First, install the Backup Exec media server as a cluster-aware Backup Exec SAN SSO Primary server that includes all cluster nodes. Then run the Backup Exec Utility (BEUtility.exe) and select the Set Primary SAN SSO Server option to add the cluster-aware Backup Exec servers to the same media server group that the Primary server is in. The Backup Exec Cluster server will be a media server in a SAN with a Primary server installed on a SQL instance.

See also: “Installing Backup Exec on a Cluster” on page 762 “Configurations for Backup Exec and Clusters” on page 773

Installing Backup Exec on a Cluster Note We do not recommend installing Backup Exec on the same disk that the cluster quorum is installed on. If you have to specify a new drive letter for the quorum disk during a recovery process, Backup Exec will not recognize the new drive and will not run. For more information, see “Specifying a New Drive Letter for the Cluster Quorum Disk” on page 792. Note By default, failover from the controlling node to a designated node occurs in alphabetical order according to the machine name of each node. To change the order in which failover will occur on the designated nodes, rename the machines. The Remote Agent is automatically installed on all the nodes in the cluster. If this installation of Backup Exec will be used to back up remote servers outside the cluster, install the Remote Agent on those remote servers as well. For more information about the Remote Agent, see “Installing the Remote Agent to Remote Windows Servers” on page 845. ▼

To install Backup Exec on a cluster: 1. Install Backup Exec on all the nodes that you want in the cluster. 2. From the node that you want to be the active node, start Backup Exec.

762

Administrator’s Guide

3. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 4. Follow the instructions on the screen. Note On the Virtual Server Information screen, Backup Exec automatically displays a default name called BACKUPEXECVRS for the virtual server. You can type a new default name if you do not want to use the default. 5. When the Cluster Configuration Wizard completes, create a drive pool that contains all the locally-attached storage devices on each node to be used when failover occurs. This ensures that jobs can be run on the storage devices that are attached to the failover nodes. For more information, see “Creating Drive Pools for Clusters” on page 766. See also: “Creating Drive Pools for Clusters” on page 766 “Enabling or Disabling Checkpoint Restart” on page 768 “Configurations for Backup Exec and Clusters” on page 773 “Specifying A Different Failover Node” on page 770

Upgrading Backup Exec on a Cluster You can upgrade Backup Exec on the nodes in a cluster without taking the nodes out of the cluster. ▼

To upgrade Backup Exec on a cluster: 1. Select a node to upgrade and make that node active. 2. Run the Backup Exec installation program on the active node. 3. Move the cluster group to the next node you want to upgrade, and then run the Backup Exec installation program on that node. 4. Repeat step 3 for each node in the cluster. See also: “Installing Backup Exec” on page 48

Chapter 15, Using VERITAS Backup Exec with Server Clusters

763

Server Clusters

Installing Backup Exec on a Cluster

Installing Backup Exec on a Cluster

Installing Additional Backup Exec Options on a Cluster Install additional Backup Exec options on each node of the cluster. For details on installing each option, see the appropriate section in this guide, or in online Help. Note If you are using the Advanced Open File Option, set those defaults on each physical node the option is installed on, not on the virtual server. Because the default settings for the static volume can be different on each node, Advanced Open File Option defaults do not fail over. ▼

To install additional Backup Exec options: 1. On the controlling node, make sure the Backup Exec group is online before you start installing additional options. 2. Follow the instructions in “Installing Backup Exec Options on a Local Server” on page 53. 3. After the installation is complete on the controlling node, use the cluster administrator to move the Backup Exec group to the next appropriate node, and repeat step 2. Be sure to install the same options with the same settings for each node in the cluster. Note To install the Backup Exec Agent for Oracle Server and the R/3 Agent for Oracle Server on other nodes, map a drive to the shared disks where Backup Exec is installed on the cluster, and run SETUP. For more information, see “Installing the Oracle Agent” on page 1290 and “Installing the Backup Exec R/3 Agent” on page 1332.

Uninstalling Backup Exec From A Cluster ▼

To uninstall Backup Exec from a cluster: 1. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 2. Use the wizard to remove cluster-aware Backup Exec from all selected servers. You can now uninstall Backup Exec from the node. 3. After Backup Exec has been uninstalled, move any resource disks from the Backup Exec cluster group to another group, and then delete the Backup Exec cluster group.

764

Administrator’s Guide

4. On any node, click Start, point to Settings, and then click Control Panel to uninstall Backup Exec. 5. Double-click Add/Remove Programs, and then in the list of currently installed programs, select VERITAS Backup Exec for Windows Servers and click Change/Remove. 6. Repeat steps 4 and 5 for all nodes. In the following example, you would move Disk Q to Cluster Group, and then delete the group Backup Exec, highlighted under Groups in POWERCLUSTER. Example of Backup Exec cluster group

Chapter 15, Using VERITAS Backup Exec with Server Clusters

765

Server Clusters

Installing Backup Exec on a Cluster

Creating Drive Pools for Clusters

Creating Drive Pools for Clusters When Backup Exec is installed on a cluster, it creates default drive pools named All Drives () for each node in the cluster. If a node has storage devices, those storage devices are automatically assigned to All Drives (), which is also the default destination device on that node when you create backup or restore jobs. However, to allow jobs to run on the storage devices attached to a failover node after a failover occurs, you must create a drive pool that includes the storage devices from all of the nodes. If the cluster is also configured with tape devices on a shared SCSI bus, then add the tape device name used by each node to the drive pool. You must also select this drive pool as the destination device for all jobs that you want to be restarted. You can create either a single drive pool, or you can create drive pools for device or media types so that when jobs fail over they can be restarted on “like” devices and media. ▼

To create a drive pool for a cluster: 1. From the controlling node, open Backup Exec. 2. Create a new drive pool. For information on creating drive pools, see “Creating Drive Pools” on page 103. 3. Add locally-attached storage devices and then exit Backup Exec. If there are tape devices on a shared SCSI bus, then add the tape device name used by each node. For information on adding devices to a drive pool, see “Adding Drives to a Drive Pool” on page 104. 4. Using the cluster administrator, move the Backup Exec resource group to the next appropriate node. 5. Open Backup Exec, add locally-attached storage devices for this node to the previous drive pool and then exit Backup Exec. If there are tape devices on a shared SCSI bus, then add the tape device name used by each node. 6. Repeat step 4 and step 5 for each node in the cluster.

766

Administrator’s Guide

Using Checkpoint Restart on Cluster Failover You can enable or disable checkpoint restart for each backup job run on the cluster (by default, checkpoint restart is enabled). When checkpoint restart is enabled, jobs that were interrupted because of a failover continue from the point of interruption rather than starting over. Files that were already backed up are skipped, and only the remaining files in the job are backed up when the job is restarted. If this option is not selected, jobs are restarted from the beginning. Checkpoint restart works best for the following file types: ◆

NTFS



GRFS



Exchange mailboxes and public folders



SQL database non-snapshot backups

The following types of files cannot use checkpoint restart: ◆

System State



Lotus Domino



Exchange IS and DS



GRFS Oracle



NTFS Image sets



NTFS Snapped volumes



SQL database snapshot backups



SQL transaction log backups



NetWare SMS (the checkpoint restart option should be disabled for NetWare backups using the Remote Agent)

In addition, incremental backups based on the archive bit cannot use checkpoint restart. Jobs that are restarted from the point of failover display a status of ’Resumed’ in the Job Monitor. Before using checkpoint restart, review the following: ◆

If a resource was completely backed up prior to a cluster failover, that resource is skipped upon checkpoint restart, regardless of whether the backup type or file type of that resource is supported by checkpoint restart. This saves media space and backup time.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

767

Server Clusters

Using Checkpoint Restart on Cluster Failover

Using Checkpoint Restart on Cluster Failover ◆

If failover occurs in the middle of backing up a resource, the media that was being used at the time of the failover is left unappendable and new media will be requested upon restart. It is recommended that you select an adequate media overwrite protection level to ensure that media that was used prior to the failover is not overwritten upon restart.



The data that is backed up upon restart is part of a different backup set than the data that was backed up prior to the failover. Separate catalog backup set entries are created for the data backed up prior to the failover and after the failover. In addition, if multiple cluster failovers occur during the backup of a given resource, a different backup set is created each time the job restarts. These multiple backup sets allow potential for duplication of backed up data. It is important to restore the backup sets in the order in which they were backed up. In addition, you should enable the Restore over existing files option when performing a restore operation on these backup sets. For more information about restore settings, see “Restoring Data to a Server or Workstation” on page 419.



If failover occurs during a post-backup verify job, or a pre-backup or post-backup database consistency check job, that job starts at the beginning after failover.



Entries for full-volume backups that were interrupted by a cluster failover and resumed from the point of failover do not display in the IDR Restore Wizard. However, you can restore these backup sets manually after you make the initial recovery using the IDR Restore Wizard.



If the checkpoint restart setting is enabled for an archive backup job that is resumed when a cluster failover occurs, the files selected for archive are not automatically deleted from the source volume after the backup completes.

Enabling or Disabling Checkpoint Restart Note To apply checkpoint restart to backup jobs, make sure that the Error-Handling Rule for Cluster Failover is enabled. See “Error-Handling Rules” on page 402. ▼

To enable or disable checkpoint restart: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click Clusters. 3. Select or clear Apply CheckPoint Restart (resume jobs from point of failover).

768

Administrator’s Guide

Cluster Backup Job Properties

Defaults set in Backup Exec remain the same on the failover nodes as they were on the controlling node when failover occurs. 4. Enable the Cluster Failover error-handling rule. On the Tools menu, select Configure Error-Handling rules. 5. Select the Cluster Failover rule, and then click Settings.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

769

Server Clusters

Using Checkpoint Restart on Cluster Failover

Specifying A Different Failover Node

6. Verify that the Enabled field is selected. Cluster Failover Error-Handling Rule

Specifying A Different Failover Node You can





Change the order in which the nodes fail over.



Add a failover node to the cluster.



Remove a failover node from the cluster.

To change the order in which nodes fail over: ❖

770

By default, in a cluster, failover from the controlling node to a designated node occurs in alphabetical order according to the machine name of each node. To change the order in which failover will occur on the designated nodes, rename the machines in the order in which they should fail over.

Administrator’s Guide



To add or remove a failover node: Before you add a node to the Backup Exec cluster configuration, you must install Backup Exec on it. Cluster services for a node should be online before you add or remove it from the cluster. If you are removing a node, do not run the cluster configuration wizard from the node you want to remove. 1. On the controlling node, on the Tools menu, point to Wizards. 2. Click Cluster Configuration Wizard. 3. Follow the instructions on the screen to add or remove a node. 4. If you have added a failover node, also add any locally attached storage devices that are to be used when failover occurs to the cluster drive pool. This ensures that jobs can be run on the storage devices that are attached to the failover nodes. See also: “Creating Drive Pools for Clusters” on page 766 “Specifying A Different Failover Node” on page 770 “Configurations for Backup Exec and Clusters” on page 773

Chapter 15, Using VERITAS Backup Exec with Server Clusters

771

Server Clusters

Specifying A Different Failover Node

Designating a New SAN SSO Database Server in a Cluster

Designating a New SAN SSO Database Server in a Cluster To designate a new database server for a cluster in a SAN Shared Storage Option environment, use BEUtility.exe. Note In a cluster environment, do not use Change Service Account in BEUtility.exe. ▼

To change a Backup Exec Cluster server from a Database Server to a Member Server: 1. Install the new server as a member server with the Library Expansion Option and SAN Shared Storage Option installed. Make sure connections to the Backup Exec Cluster and other member servers are working properly. 2. Using the cluster administrator, shut down the Backup Exec Cluster services. Be sure to keep the Disk resource online. 3. Move the catalog files from the Backup Exec Cluster installation path to the respective installation paths on the new database server. 4. Use BEUtility.exe to connect all Backup Exec servers to the new database server and to start all Backup Exec services. 5. Stop and restart the Backup Exec Services on the new database server. 6. Using the Cluster Administrator, move the Backup Exec resource group to the failover node and make sure services start on that node. 7. Use BEUtility.exe to stop and restart the Backup Exec Services on all the member servers of the SAN in order for them to connect to the new database server. See also: “Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 779 “Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 781

772

Administrator’s Guide

Configurations for Backup Exec and Clusters Backup Exec supports various cluster configurations of between two and eight nodes on a fibre channel SAN, with locally-attached storage devices, or with storage devices on a shared SCSI bus. You can use any combination of these configurations. Note If you install the cluster on a private network, use the Cluster Administrator to enable public communication if necessary. If you are using a cluster on a fibre channel SAN or with storage devices on a shared SCSI bus, depending on the capability of your various SAN components, media might be orphaned in the tape drive until the failed node becomes active again. If end-of-job markers were not written to the media before the failover occurred, the media may be marked as unappendable by the Backup Exec engine when the next append backup job is run. The media remains unappendable until it is overwritten (or erased, or the retention period expires, etc.). If the storage device is a robotic library, you can review the Robotic Library Inventory report to discover if the media was marked unappendable by the Backup Exec engine. If the Full column reports a 3, the Backup Exec engine has marked the media as unappendable. To add or remove hot-swappable devices in a cluster, run the Hot-swap Device Wizard on all Backup Exec Cluster nodes. If a server is not updated to recognize a new device, any job that is targeted to that device may fail. For more information about hot-swapping devices, see “Hot Swap for Storage Devices” on page 100. See the following for examples of various cluster configurations: “Two-node Cluster with Locally-attached Storage Devices” on page 774 “Two-node Cluster with Tape Devices on a Shared SCSI Bus” on page 775 “Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 779 “Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 781

Chapter 15, Using VERITAS Backup Exec with Server Clusters

773

Server Clusters

Configurations for Backup Exec and Clusters

Configurations for Backup Exec and Clusters

Two-node Cluster with Locally-attached Storage Devices In this configuration, cluster-aware Backup Exec is installed on the controlling node, failover occurs to designated nodes in the cluster, and storage devices are locally-attached to each node. Each node’s locally-attached storage devices are automatically assigned to the All Drives () drive pool, which is also the default destination device on that node when you create backup or restore jobs. You must create a drive pool that includes storage devices on the controlling node and on each failover node in order for jobs to run when failover occurs. For more information, see “Creating Drive Pools for Clusters” on page 766. To restore data in this configuration, media must be moved to the failover node’s locally-attached storage device and reinventoried before a restore operation can be started. Two-node Cluster with Locally-attached Storage Devices

Backup Exec Virtual Server Controlling node Locally-attached storage devices

Failover node Shared SCSI Bus for disks Locally-attached storage devices

Heartbeat LAN

See also: “Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 779 “Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 781

774

Administrator’s Guide

Two-node Cluster with Tape Devices on a Shared SCSI Bus In this configuration, cluster-aware Backup Exec is installed on the controlling node, failover occurs to designated nodes in the cluster, and tape devices are attached to a shared SCSI bus that is separate from any shared SCSI bus for disks. Because each node creates a unique tape device name for the same device, this configuration requires you to create a drive pool that includes the tape device name used by each node in order for jobs to run when failover occurs. For more information, see “Creating Drive Pools for Clusters” on page 766. When failover occurs, a SCSI bus reset is issued. Therefore, tape devices and shared drives should not be connected to the same SCSI bus; each should be connected to separate SCSI buses. For more information, see “Configuring a Shared SCSI Bus for Tape Devices” on page 776. Two-node Cluster with Tape Devices on a Shared SCSI Bus

Backup Exec Virtual Server Controlling node

Failover node Shared SCSI Bus for Disks Shared SCSI Bus for Tape Devices

Heartbeat LAN

See also: “Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 779 “Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 781

Chapter 15, Using VERITAS Backup Exec with Server Clusters

775

Server Clusters

Configurations for Backup Exec and Clusters

Configurations for Backup Exec and Clusters

Configuring a Shared SCSI Bus for Tape Devices Before configuring a shared SCSI bus for tape devices, please read the following carefully. To configure tape devices on a shared SCSI bus, you must have SCSI cables, SCSI terminators, a SCSI adapter in each cluster server to provide a shared external bus between the nodes, and at least one tape device on the shared bus. The tape devices must be connected to a bus that uses the same method of transmission that the device does (single-ended or differential). Only one transmission method can be used on a single SCSI bus, however, if the devices use different transmission methods, you can install a signal converter between the devices. A signal converter converts single-ended SCSI signals to differential SCSI signals. Note You must use a signal converter to connect single-ended and differential devices in order to avoid hardware damage. You must terminate the SCSI bus at both ends so that commands and data can be transmitted to and from all devices on the bus. Each SCSI bus must have two terminators and they must be at each end of the segment. If a tape device is in the middle of the bus, as shown in “Two-node Cluster with Tape Devices on a Shared SCSI Bus” on page 775, remove any internal termination in that device. If the tape device is at the end of the bus, as shown in “Example of a shared bus with tape devices at the end of the bus” on page 776, and the tape device has internal termination, you can use the device’s internal termination to terminate the bus. Example of a shared bus with tape devices at the end of the bus

Backup Exec Virtual Server Controlling node

Failover node Shared SCSI bus for disks Shared SCSI bus for tape devices Heartbeat LAN

Following are methods you can use to terminate a bus:

776

Administrator’s Guide



SCSI adapters. This method is not recommended because if the server is disconnected from the shared bus, or if there is a power supply failure, the bus may not be properly terminated and may be inoperable.



Pass-through (or feed-through) SCSI terminators. These can be used with SCSI adapters and with some tape devices. If the tape device is at the end of the bus, you can attach a pass-through SCSI terminator to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method.

Tip



To ensure termination if a power supply failure occurs, turn off the on-board terminators on the SCSI controller (using the host adapter manufacturer’s recommended method) and physically terminate the controller with a terminator. Y cables. These can be used with some tape devices. If the tape device is at the end of the bus, you can attach a terminator to one branch of a Y cable to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method.

Example of a Y cable



Trilink connectors. These can be used with some tape devices. If the tape device is at the end of the bus, you can attach a terminator to one of the trilink connectors to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

777

Server Clusters

Configurations for Backup Exec and Clusters

Configurations for Backup Exec and Clusters Example of a Trilink connector

Besides terminating the bus, Y-cables and trilink connectors also allow you to isolate the devices from the shared bus without affecting the bus termination. You can maintain or remove that device without affecting the other devices on the shared SCSI bus. ▼

To configure a shared SCSI bus for tape devices: 1. Install the SCSI controllers for the shared SCSI bus. Make sure that the SCSI controllers for the shared SCSI bus are using different SCSI IDs. For example, on the controlling node, set the SCSI controller ID to 6 and on the failover node, set the SCSI controller ID to 7. 2. Prepare the SCSI controllers for the shared SCSI bus. Refer to your SCSI host adapter manufacturer’s documentation for details. Note Do not have power on to both nodes while configuring the systems, or if both nodes have power on, do not connect the shared SCSI buses to both nodes. 3. Connect the shared SCSI tape devices to the cable, connect the cable to both nodes, and then terminate the bus segment using one of the methods discussed in the previous section. See also: “Two-node Cluster with Tape Devices on a Shared SCSI Bus” on page 775

778

Administrator’s Guide

Two-node Clusters on a Fibre Channel SAN with the SAN SSO In this configuration, one or more clusters are attached to a fibre channel storage area network (SAN), with cluster-aware Backup Exec and the SAN Shared Storage Option (SAN SSO) installed on the controlling node in each cluster. Shared secondary storage devices are attached to the fibre channel, although a single storage device can be shared between one or more clusters. Failover occurs to a designated node in the cluster. Note When using multiple clusters in a SAN SSO environment, it is strongly recommended that the cluster nodes be connected to the storage devices using a fibre switch. If you use a hub rather than a fibre switch, the hub will receive a reset command during a failover event that causes all other components attached to the hub to be disconnected. In this configuration, you should create a failover drive pool for the cluster. For details about creating a failover drive pool, see “Creating Drive Pools for Clusters” on page 766. This configuration also offers increased performance since backups are performed locally instead of over a network. Additionally, centralized media catalogs are available. Because the SAN SSO uses a shared catalog database, a tape that has already been cataloged can be physically moved from one device to another and not have to be recataloged.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

779

Server Clusters

Configurations for Backup Exec and Clusters

Configurations for Backup Exec and Clusters

Tip

The SAN SSO option must be installed on each failover node, with the same settings that were used on the primary node. Either all nodes should be database servers or all nodes should be secondary member servers.

Two 2-node Clusters on a Fibre Channel SAN with the SAN SSO

Fibre Channel SAN Secondary Storage Devices

Backup Exec Virtual Server A Controlling node Shared SCSI Busfor disks Failover Heartbeat node

Secondary server

Backup Exec Virtual Server B

Failover node

Shared SCSI Bus for disks Controlling node Heartbeat LAN

Note You can designate any server on the fibre channel SAN as the Shared Storage Option Database server.

780

Administrator’s Guide

Four-node Clusters on a Fibre Channel SAN with the SAN SSO In this configuration, one or more clusters are attached to a fibre channel storage area network (SAN), with cluster-aware Backup Exec and the SAN Shared Storage Option (SAN SSO) installed on the controlling node in each cluster. Shared secondary storage devices are attached to the fibre channel, although a single storage device can be shared between one or more clusters. Failover occurs (in alphabetical order of the machine name) to other designated nodes in the cluster. Note When using multiple clusters in a SAN SSO environment, it is strongly recommended that the cluster nodes be connected to the storage devices using a fibre switch. If you use a hub rather than a fibre switch, the hub will receive a reset command during a failover event that causes all other components attached to the hub to be disconnected. Note You can designate any server on the fibre channel SAN as the Shared Storage Option Database server. In this configuration, you should create a failover drive pool for the cluster. For details about setting up a drive pool, see “Creating Drive Pools for Clusters” on page 766. This configuration also offers increased performance since backups are performed locally instead of over a network. Additionally, centralized media catalogs are available. Because the SAN SSO uses a shared catalog database, a tape that has already been cataloged can be physically moved from one device to another and not have to be recataloged. Tip

The SAN SSO option must be installed on each failover node, with the same settings that were used on the primary node. Either all nodes should be database servers or all nodes should be secondary member servers.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

781

Server Clusters

Configurations for Backup Exec and Clusters

Configurations for Backup Exec and Clusters Four-node Cluster on Fibre Channel SAN with the SAN SSO Secondary server Fibre Channel SAN Shared Drives Secondary Storage Devices Backup Exec Virtual Server Controlling node

Failover nodes

Heartbeat

LAN

For details on installing the SAN SSO, see “Installing the SAN Shared Storage Option” on page 942. See also: “Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 779 “Designating a New SAN SSO Database Server in a Cluster” on page 772

782

Administrator’s Guide

Backing Up Clusters To protect all data in the cluster, including file systems, databases, and the cluster quorum, back up the following: ◆

Local disks and System State on each node. The cluster quorum, which contains recovery information for the cluster and information about changes to the cluster configuration, is included in the System State backup. For more information, see “Backing Up Local Disks in a Cluster” on page 785.



All shared disks, including the data in the MSCS folder on the Quorum disk. For more information, see “Backing Up Shared Disks” on page 785.



Virtual servers, which may contain data or contain applications such as Microsoft SQL Server or Exchange Server. Use Backup Exec database agents to back up databases. For more information, see “Backing Up Database Files in a Cluster” on page 786.

For details on setting up and running backup operations, see “Creating a Backup Job” on page 241. The Command Line Applet can be used with Backup Exec when Backup Exec is installed in a cluster. The only limitation is that you cannot use the Command Line Applet to specify a device for backup. You can use the Command Line Applet to target a drive pool, but not a specific device in that pool. For more information, see “Using the Command Line Applet” on page 611. See also: “Backing Up Local Disks in a Cluster” on page 785 “Backing Up Shared Disks” on page 785 “Backing Up Database Files in a Cluster” on page 786 “Backing Up Windows 2000 and Windows Server 2003 Features” on page 784

Chapter 15, Using VERITAS Backup Exec with Server Clusters

783

Server Clusters

Backing Up Clusters

Backing Up Clusters

Backing Up Windows 2000 and Windows Server 2003 Features You must purchase and install the Backup Exec Remote Agent for Windows Servers on all remote Windows 2000 and Windows Server 2003 systems that you want backed up. Without the Remote Agent, the following Windows 2000 features cannot be correctly backed up: ◆

Encrypted files



SIS files



Disk quota data



Removable Storage data



Remote Storage data



Mount points



Sparse files



Windows Management Instrumentation



Terminal Services



System State data, including: -

COM+ Class Registration database

-

Boot and system files

-

Registry

-

Certificate Services database (if the server is operating as a certificate server)

-

Active Directory (if the server is a domain controller)

-

SYSVOL (if the server is a domain controller)

-

Cluster quorum (if the server is part of a cluster)

Note You can select System State for backup on a remote system only when the Remote Agent is installed on the remote system. See also: “Restoring Windows 2000 and Windows Server 2003 Features” on page 788

784

Administrator’s Guide

Backing Up Local Disks in a Cluster Select local disks for backup from the physical node they are attached to. ▼

To back up local disks in a cluster: 1. On the navigation bar, click Backup. 2. On the Backup selection pane, expand Remote Selections, expand the domain that contains the nodes, and then select the local disks on each node. Note When making backup selections for nodes running Windows 2000, be sure to select System State. For more information, see “Selecting Data to Back Up” on page 265. When making backup selections for nodes running Windows Server 2003, select Shadow Copy Components, which include System State. For more information, see “Protecting Windows Server 2003 Systems” on page 343. 3. Continue with the full backup procedure as usual. For more information, see “Creating a Backup Job” on page 241. Tip

If you created a drive pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.

Backing Up Shared Disks Select shared disks for backup by selecting them from the Microsoft Cluster Server virtual server or from the Backup Exec virtual server. ▼

To back up shared disks: 1. On the navigation bar, click Backup. 2. On the Backup selection pane, expand Remote Selections, expand the domain that contains the nodes, and then select either the Microsoft Cluster Server virtual server or the Backup Exec virtual server. The virtual servers allow your backup jobs to access shared data via any node that controls the disk. 3. Select the drive letters that represent the shared disks.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

785

Server Clusters

Backing Up Clusters

Backing Up Clusters

4. Continue with the full backup procedure as usual. For more information, see “Creating a Backup Job” on page 241. Tip

If you created a drive pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.

Backing Up Database Files in a Cluster Select database files for back up from a database icon on a virtual server. If a virtual server contains a database application such as Microsoft SQL Server or Exchange Server, use the appropriate Backup Exec database agent to perform the backup operations; otherwise, only the file system is backed up, not the database files. ▼

To back up database files in a cluster: 1. On the navigation bar, click Backup. 2. In the Backup selections pane, expand Remote Selections. Expand the domain that contains the cluster, then expand the virtual server that contains the database files. Then select the database icon.

786

Administrator’s Guide

The following example shows the virtual server EXCLUSTER2K selected for backup. Virtual Server Selected for Backup

Refer to the specific Backup Exec database agent documentation for details on how to set backup defaults for the database. 3. After setting any database-specific defaults, continue with the full backup procedure as usual. For more information, see “Creating a Backup Job” on page 241. Tip

If you created a drive pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

787

Server Clusters

Backing Up Clusters

Restoring Data To Clusters

Restoring Data To Clusters For all file restore operations, including redirecting restores, use the normal procedures as described in “Restoring Data to a Server or Workstation” on page 419. When restoring files to shared drives, direct those files to the virtual server or the controlling node of the resource. When restoring individual database files, such as Microsoft SQL Server or Exchange Server, direct those files to the virtual server name of a specific installation of the SQL or Exchange database. See also: “Restoring the Cluster Quorum for Windows 2000 and Windows Server 2003 Systems” on page 789 “Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory” on page 790 “Specifying a New Drive Letter for the Cluster Quorum Disk” on page 792

Restoring Windows 2000 and Windows Server 2003 Features To fully restore Windows 2000 features to a remote Windows 2000 system, the restore operation MUST be performed by a Windows 2000 media server, and the Remote Agent must be installed on the remote system. You cannot use a media server running Windows NT to restore Windows 2000 features to a Windows 2000 system. You can restore Windows Server 2003 features from either a Windows 2000 media server or a Windows Server 2003 media server. You can restore a Windows NT 4 system from a media server running on either Windows NT 4 or Windows 2000. It is not necessary to have the Remote Agent installed to perform the restore.

788

Administrator’s Guide

Restoring the Cluster Quorum for Windows 2000 and Windows Server 2003 Systems The cluster quorum is backed up as part of System State. If Active Directory is running on the target server in the cluster, do not select Restore cluster quorum. For more information, see “Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory” on page 790. If you need to specify a new disk to which the cluster quorum will be restored, see “Specifying a New Drive Letter for the Cluster Quorum Disk” on page 792. ▼

To restore the cluster quorum: Note If possible, take the other nodes in the cluster offline before restoring the cluster quorum. If the nodes cannot be taken offline, you should select the Force the recovery... option on the Advanced Restore Job Properties dialog box (explained in step 4). 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click Advanced. 3. Select Restore Cluster Quorum. 4. Select Force the recovery of the cluster quorum even if other nodes are online and/or disk signatures do not match in the following circumstances: -

If you are not able to take the other nodes in the cluster offline. When this option is selected, the cluster service for any nodes that are online is stopped.

-

If the disk that the cluster quorum previously resided on has been changed. The disk may have been replaced with a new one, or the disk configuration may have been changed so that the cluster quorum now resides on a different disk. This option allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum.

5. Continue the restore operation by following the steps in “Restoring Data to a Server or Workstation” on page 419. 6. When the restore operation is complete, use the cluster administrator software to restart the cluster service on nodes on which it was stopped.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

789

Server Clusters

Restoring Data To Clusters

Restoring Data To Clusters

Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory To restore the quorum to a node that is a domain controller running Active Directory, the node must be in Directory Services Restore Mode. The cluster services cannot run in this mode, so the cluster quorum must be restored separately, after System State is restored and the node has been rebooted. To exclude the cluster quorum from being restored with System State, clear the Restore Cluster Quorum option on the Advanced Restore Job Properties dialog box. When System State is restored, the cluster quorum is copied to a default location. For Windows 2000 the default location is: %SystemRoot%\cluster\BackupExec For Windows Server 2003, the default location is: %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase Then, use the command-line utility clrest.exe to restore the cluster quorum from the default location to the quorum drive. ▼

To restore the cluster quorum to a node running Active Directory without using Backup Exec Cluster: Note If possible, take the other nodes in the cluster offline before restoring the cluster quorum. If the nodes cannot be taken offline, you should use the -f option with the clrest.exe command, explained in step 8. 1. To restore System State, start the computer in safe (repair) mode (restart the computer and then press when prompted to select an operating system) and then select Directory Services Restore Mode. If this is a local restore, you must also start the Backup Exec services before you restore the System State data. For instructions on starting the Backup Exec services, see “Starting and Stopping Backup Exec Services” on page 70. 2. On the Backup Exec navigation bar, click Restore. 3. In the Restore Selections pane, click System State. 4. On the Properties pane, under Settings, click Advanced. 5. Clear the Restore cluster quorum option. This option must not be selected. 6. Start the restore operation.

790

Administrator’s Guide

During the restore, the cluster quorum files are copied to the default location. For Windows 2000 the default location is: %SystemRoot%\cluster\BackupExec For Windows Server 2003, the default location is: %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase 7.

When the restore has completed, reboot the target node.

8. After reboot is complete, run clrest.exe from the command line to restore the cluster quorum from the default location to the quorum disk: clrest path where path is the complete path to the cluster quorum; typically, the pathname is %SystemRoot%\cluster\BackupExec for Windows 2000 and %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase for Windows Server 2003. A path is required. You can include other options on the command line to force the restore to proceed even if other cluster nodes are online, and/or if the disk signatures do not match, and to specify another disk as the quorum disk: clrest path [-f] {drive letter] where [-f] forces the restore to proceed even if other cluster nodes are online and/or the disk signatures do not match. When this option is selected, the cluster service for any nodes that are online is stopped. This option also allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum. [drive letter] specifies another drive letter for the quorum disk. If you use this option, the drive letter that the cluster quorum resides on will be changed to the drive letter specified. Otherwise, the drive letter that the cluster quorum resides on will stay the same as it was previously. 9. After the cluster quorum is restored, use the cluster administrator to bring the other cluster nodes online.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

791

Server Clusters

Restoring Data To Clusters

Restoring Data To Clusters

Specifying a New Drive Letter for the Cluster Quorum Disk ▼

To specify a new drive letter for the cluster quorum disk on Windows 2000: To use the clrest.exe command-line utility to specify a new drive letter for the cluster quorum disk, restore System State, but not the cluster quorum. When System State is restored, the cluster quorum is copied to a default location, %SystemRoot%\cluster\BackupExec. Then, use clrest.exe with the [drive letter] option to restore the cluster quorum to the quorum drive, which will be assigned the drive letter you specified. 1. On the Backup Exec navigation bar, click Restore. 2. In the Restore Selections pane, click System State. 3. On the Properties pane, under Settings, click Advanced. 4. Clear the Restore cluster quorum option. This option must not be selected. 5. Start the restore operation. During the restore, the cluster quorum files are copied to the default location %SystemRoot%\cluster\BackupExec. 6. When the restore has completed, reboot the target node. 7. After reboot is complete, run clrest.exe from the command line to restore the cluster quorum from the default location to the quorum disk. clrest path [-f] [drive letter] where path is the complete path to the cluster quorum; typically, the pathname is %SystemRoot%\cluster\BackupExec. A pathname is required. [-f] forces the restore to proceed even if other cluster nodes are online and/or the disk signatures do not match. When this option is selected, the cluster service for any nodes that are online is stopped. This option also allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum. [drive letter] specifies another drive letter for the quorum disk. If you use this option, the drive letter that the cluster quorum resides on will be changed to the drive letter specified. Otherwise, the drive letter that the cluster quorum resides on will stay the same as it was previously.

792

Administrator’s Guide

8. After the cluster quorum is restored, use the cluster administrator to bring the other cluster nodes online. ▼

To specify a new drive letter for the cluster quorum disk on Windows NT 4: 1. Use the Cluster Administrator to create a ‘Physical Disk’ resource. Refer to your Cluster Administrator documentation for details. 2. Start the cluster services using the -fixquorum startup parameter. 3. Go to Cluster Properties and click the Quorum Resource tab. 4. Change the quorum disk to the new drive letter in the Quorum Disk field and the Partition field. 5. Close the Cluster Administrator, and then restart the cluster services. Do not use the -fixquorum startup parameter.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

793

Server Clusters

Restoring Data To Clusters

Disaster Recovery of A Cluster

Disaster Recovery of A Cluster Prepare for recovery by creating a disaster preparation plan, as described in “Key Elements of a Disaster Preparation Plan (DPP)” on page 550. Prepare to restore SQL, Exchange, Oracle, and Lotus Domino databases in a cluster after a disaster by reading the sections on preparing for disaster recovery in the appropriate chapters. In addition to the initial preparation instructions, further action is required to completely protect the Microsoft cluster servers. If a disaster occurs, the following information is required to successfully recover the cluster: ◆







794

General Cluster Information -

Cluster name

-

Cluster IP address and subnet mask

-

Cluster node names

-

Node IP addresses

-

Local and shared drive letters and partition scheme

-

Disk signatures

Cluster Groups -

Group name

-

Preferred nodes

-

Failover/failback policies

Cluster Resources -

Resource name

-

Resource type

-

Group membership

-

Possible owners

-

Resource dependencies

-

Restart and Looks Alive/Is Alive properties

-

Resource-related parameters

-

Application-specific configuration (SQL Database Character Set)

Run Dumpcfg.exe from the Microsoft 2000 Resource Kit to retrieve the disk signatures from the shared disk. The Microsoft 2000 Resource Kit allows you to replace disk signatures. Administrator’s Guide

Using IDR to Prepare for Disaster Recovery of A Cluster Backup Exec provides a fully-automated disaster recovery solution that you can purchase called the Intelligent Disaster Recovery (IDR) Option, which allows you to quickly and efficiently recover the nodes that comprise the server cluster after a disaster. Exchange, SQL, and Oracle servers, and the R/3 agent cannot be restored using IDR. For more information about disaster recovery for these options, see the appropriate chapters. For details on using IDR to prepare for disaster recovery, see “VERITAS Backup Exec Intelligent Disaster Recovery Option” on page 881. Note If you want to change your setup and use hardware or a hardware configuration that is different from the original configuration, you must perform a manual recovery.

Recovering Nodes on the Cluster Using IDR If you used Backup Exec’s Intelligent Disaster Recovery to prepare for a disaster, you can use IDR to recover the nodes to their pre-disaster state. Note Only one set of diskettes needs to be created for Windows NT 4 cluster nodes; you do not need to create a set of disaster recovery diskettes for each node in the cluster. You do need to include the machine-specific disaster recovery file for both nodes on the disaster recovery diskettes. You must create a set of diskettes for each Windows 2000 cluster node; each set of disaster recovery diskettes is customized for a single computer. You will not be able to use the set of diskettes interchangeably between the nodes in a cluster. When recovering both nodes in a cluster, make sure that the drive letters match the original cluster configuration. The scaled-back version of Windows that runs the recovery wizard may detect the hard drives in a different order than what was originally configured under the original version of Windows. If the original configuration does not match, then to a certain extent, you can control the hard drive numbering scheme that Windows devises. See the table “Windows hard drive numbering scheme” on page 928, which lists the normal order that Windows uses to assign disk drive numbers.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

795

Server Clusters

Disaster Recovery of A Cluster

Disaster Recovery of A Cluster

If you cannot get the IDR Recovery Wizard to properly detect the hard drive order, you can still manually set up hard drive partitions using the Disk Administrator option within the Recovery Wizard. After this is done, you can continue with automated restore of your backup media afterward. Note After Windows has been installed, you cannot change the system drive’s letter. You must restore the system to the same drive letter from which it was backed up. Use the following sequence to recover the nodes. For detailed instructions, see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881. ▼

To recover nodes on the cluster using IDR: 1. If you are recovering more than one node, disconnect the shared disks. If you are recovering only one node, the shared disks do not need to be disconnected. If all nodes in the cluster are unavailable and must be recovered, the cluster cannot fail over. The shared disks should be disconnected before recovery begins. 2. To restore the nodes, follow the steps in “Using IDR to Recover a Computer” on page 917. 3. Bring the shared drives and nodes online. 4. Restore the data files through the virtual server or through the node that controls the resource. 5. To restore a database to the shared drives, use the appropriate Backup Exec agent. For procedures, read the following sections:

796

-

“Disaster Recovery of SQL 2000” on page 1042

-

“Disaster Recovery for Exchange Server 5.5” on page 1168

-

“Disaster Recovery of a Lotus Domino Server” on page 1326

-

“Recovering a Remote Oracle Database Server from a Disaster” on page 1305

Administrator’s Guide

Recovering Backup Exec on a Cluster Using IDR To fully restore a cluster on which Backup Exec is installed, you can restore the cluster node and all shared disks using IDR or you can rebuild the cluster. To restore the cluster remotely, you should catalog the media that contains the backup sets of the cluster nodes and the shared disk. 1. Replace all shared disks, if necessary. 2. Perform IDR on one of the nodes. During this process, use the disk manager to repartition all shared disks to their original configuration. Restore the local disk, system state, and the data files to the shared disk. 3. Reboot the server. The cluster service and all other cluster applications should come online. 4. Perform IDR on all other nodes. Restore only the local disk and system state.

Recovering the Entire Cluster Using a Manual Disaster Recovery Procedure Note If you used Backup Exec’s Intelligent Disaster Recovery to prepare for a disaster, you can use IDR to recover the nodes to their pre-disaster state. For more information, see “Recovering Nodes on the Cluster Using IDR” on page 795. ▼

To recover the entire cluster manually: 1. On the first node you want to recover, reinstall Windows, including the last service pack applied before the failure. For details on how to do this, see “Manual Disaster Recovery of Windows Computers” on page 558. Caution After booting the nodes in a cluster, make sure that the drive letters match the original cluster configuration. If the original configuration does not match, then to a certain extent, you can control the hard drive numbering scheme that Windows devises by using the Disk Administrator. See the table “Windows hard drive numbering scheme” on page 928 that lists the normal order that Windows uses to assign disk drive numbers. 2. On the other nodes you want to recover, reinstall Windows, including the last service pack applied before the failure. Refer to the previous Caution as well.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

797

Server Clusters

Disaster Recovery of A Cluster

Disaster Recovery of A Cluster

3. Reinstall the cluster services and bring the cluster online. 4. Use the Cluster Wizard to reinstall Backup Exec for Windows Servers on the cluster. You must use the same settings used during the initial installation. For more information, see “Installing Backup Exec on a Cluster” on page 762. 5. Catalog the media in the cluster. 6. On the Backup Exec navigation bar on the active node, click Restore. 7. In the Restore selections pane, select the last full backup sets made of the active node, and then select System State. 8. On the Properties pane, under Settings, click Advanced. 9. Select the Restore cluster quorum option. This option must be selected. 10. Start the restore operation. 11. When the restore has completed, reboot the active node. 12. For each node that you need to recover, repeat step 6 through step 11. 13. After all nodes are recovered, restore the Backup Exec data files, and all other data files, to the shared disks. 14. To restore a database to the shared disks, use the appropriate Backup Exec agent. For procedures, read the following sections:

798

-

“Disaster Recovery of SQL 2000” on page 1042

-

“Disaster Recovery for Exchange Server 5.5” on page 1168

-

“Disaster Recovery of a Lotus Domino Server” on page 1326

-

“Recovering a Remote Oracle Database Server from a Disaster” on page 1305

Administrator’s Guide

Recovering the Cluster Data Files To fully recover the cluster, the cluster files in the MSCS folder may need to be restored. If the Quorum disk is still available and has not changed, then you do not have to restore the data files. If the Quorum disk is new, you need to restore the data files to the new Quorum disk. You should disable the cluster disk driver before recovering the data files. ▼

To restore the cluster data files: 1. Shut down the secondary nodes. 2. Start the primary node. 3. On the Computer Management menu, select System Tools. Then select Device Manager. 4. Right-click the cluster disk driver, and then select Disable. 5. Click OK. 6. Reboot the primary node. 7. On the Backup Exec navigation bar, click Restore. 8. In the Restore selections pane, select the most recent backup set of the MSCS folder. Note The cluster service should not be running. 9. Redirect the restore of the MSCS folder to the designated Quorum disk. 10. After the cluster data files have been restored to the Quorum disk, you can enable the cluster disk driver and start the cluster service. 11. After the cluster quorum is restored, use the cluster administrator to bring the other cluster nodes online.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

799

Server Clusters

Disaster Recovery of A Cluster

Disaster Recovery of A Cluster

Recovering All Shared Disks There are two ways to recover shared disks. One way uses the Dumpcfg option from the Microsoft 2000 Resource Kit, which helps automate the recovery process. If you do not have the Microsoft 2000 Resource Kit, you can perform a total manual recovery. ▼

To recover all shared disks using Dumpcfg: 1. Disable the cluster disk driver on all nodes in order to gain access to the new disk. 2. Replace and then repartition the shared disk. Use Disk Manager to verify that all nodes see the shared disk the same. 3. Run Dumpcfg to replace the disk signature for the Quorum disk. 4. Using a remote BE server, restore the cluster files to the Quorum disk via the node that has access to the disk. 5. Enable the cluster disk driver on all nodes. 6. Reboot all cluster nodes.



To recover all shared disks without using Dumpcfg: 1. Uninstall all cluster applications and the cluster software from both nodes. 2. Replace and then repartition the shared disk to the previously saved configuration. 3. Reinstall the cluster software. 4. Reinstall the cluster-aware version of Backup Exec for Windows Servers on the cluster. For more information, see “Installing Backup Exec” on page 48. 5. Reinstall additional cluster-aware software applications on the shared disk. 6. Use Backup Exec to restore any data from the catalogs. For more information, see “Restore Operations and the Catalog” on page 412.

800

Administrator’s Guide

Recovering Clustered Backup Exec If you used the IDR option to prepare disaster recovery diskettes for the shared disks, you must use a manual process to recover Backup Exec on a shared disk. ▼

To use a manual process to recover Backup Exec on a shared disk: 1. Replace the shared disk if necessary, and add that disk to the cluster as a disk resource. 2. Reinstall the cluster-aware version of Backup Exec for Windows Servers on the cluster using the same information used in the original installation. For more information, see “Installing Backup Exec” on page 48. 3. Use Backup Exec to restore any data from the catalogs.

Troubleshooting Clusters After I recovered my cluster and all shared disks, the cluster service will not start. Why won’t it start and how can I get it started? The cluster service may not start because the disk signature on the Quorum disk is different from the original signature. If you have the Microsoft 2000 Resource Kit, use Dumpcfg.exe to replace the disk signature by typing: dumpcfg.exe /s 12345678 0 Replace 12345678 with the disk signature and replace 0 with the disk number. You can find the disk signature and the disk number in the event log. If you do not have the Microsoft 2000 Resource Kit, you can use -Fixquorum to change the Quorum disk signature. 1. Start the cluster service on one node with the -Fixquorum option in the startup parameters. 2. Open the Cluster Administrator and right-click the cluster, and then select Properties. 3. Select the Quorum tab. 4. In the Quorum resource field, select a different disk. 5. Click OK.

Chapter 15, Using VERITAS Backup Exec with Server Clusters

801

Server Clusters

Troubleshooting Clusters

Troubleshooting Clusters

6. Stop the cluster services and then restart them without the -Fixquorum option. Note You may run the -Fixquorum option as many times as needed to redesignate a Quorum disk signature. 7. Bring all other nodes online. I used the Checkpoint Restart option for my backups. During one of my backups, a cluster failover occurred. Multiple backup sets were created. When I try to verify or restore using these backup sets, an "Unexpected End of Data" error occurs on the set that contains the data that was backed up prior to the failover. Why does this occur? Is my data safe? You received this error because failover occurred in the middle of backing up the resource, therefore the backup set was not closed on the media. However, the objects that were partially backed up in the first backup set were completely backed up again during restart, ensuring data integrity. Therefore, all of the objects on the media for the given backup set should still be restored and verified. I clustered a primary SAN server with a secondary SAN server. Now the device and media service on the secondary server fails. Why? This occurs when the secondary server becomes the active node and attempts to connect to the Backup Exec database on the primary server, which is no longer available. To correct this, you must use the Backup Exec Utility (BEUTILITY.EXE) or reinstall the secondary server to be a primary server.

802

Administrator’s Guide

16

The VERITAS Backup Exec Web Administration Console (BEWAC) is an optional user interface for using Backup Exec on Windows Server Powered appliances and Windows 2000 and Windows Server 2003 servers with the Remote Administration (HTML) components installed. You can connect to the Web Administration console on the media server from a client (remote computer) using Internet Explorer and remotely administrate the media server. You can use BEWAC to back up and restore data on the Windows Server Powered appliance on which Backup Exec is installed or on other servers to which the appliance is attached. Note In version 8.6 of Backup Exec, this feature was called Backup Exec for Windows Server Appliances (BEWSA).

Requirements for BEWAC Before you install BEWAC, be sure that you have the following required items. There are different requirements for the server and the client. Server requirements: ◆

Windows 2000 Server or above with Service Pack 2, or Windows Server 2003 with Remote Administration (HTML) components installed



Microsoft Server Appliance Kit 2.0 or Windows Storage Server 2003



Backup Exec for Windows Servers 9.1

Client requirements: ◆

Internet Explorer 5.01 or later



Windows NT 4.0 or later

803

BEWAC

VERITAS Backup Exec - Web Administration Console

Installing BEWAC

Installing BEWAC To install BEWAC, select the Web Administration Console option when you install Backup Exec for Windows Servers. For details about installing Backup Exec, see “Installing Backup Exec Using the Installation Program” on page 50.

Starting BEWAC ▼

To start BEWAC after installing it: 1. Open Internet Explorer. 2. In the Address field, type http://server name:port number Example http://BackupServer:8099 For Windows Server 2003, you need to use a secure channel to access BEWAC. Use the format: https://<servername>:<secureportnumber> Note It is recommended that you add a link to this address for quick access. 3. On the primary navigation bar, click Backup Exec. 4. If this is the first time you have started Backup Exec, run the First Time Startup Wizard.

Differences Between BEWAC and Backup Exec for Windows Servers Although every effort was made to duplicate the user interface of Backup Exec for Windows Servers in BEWAC, some differences exist. The following items are not available in BEWAC:

804



Alerts view. You can view and respond to alerts through the appliance Status area. For more information, see “Viewing, Clearing, and Responding to Alerts” on page 808.



Alternate server selection for Backup Exec Diagnostics



AppleTalk network support



Audit logging



Bar code rules



Calendar view in the Job Monitor. Only the Jobs list view is available. Administrator’s Guide

Differences Between BEWAC and Backup Exec for Windows Servers

Connect to another media server



IDR settings and the ability to create bootable media



Menus. Many of the options that are available through menus in Backup Exec for Windows Servers are available on the Tools tab in BEWAC. For more information, see “Tools” on page 807.



Right-click functionality. The ability to right-click an item and then select an option from a Backup Exec shortcut menu is available only in the Selection pane and Results pane on the Backup Job Properties and Restore Job Properties dialog boxes. For example, if you right-click the icon for the C: drive in the Backup Selection pane, you can refresh the screen, select advanced file selection or user-defined selection options, connect as a different user, check or uncheck the drive, or view properties. If you right-click an item in any other area of BEWAC, the Internet Explorer shortcut menu displays.



Wizards. The wizards that display on the Tools menu in Backup Exec for Windows Servers, such as the Media Rotation Wizard and the Logon Account Wizard, are not available. However, the First Time Startup Wizard is available in both BEWAC and Backup Exec for Windows Servers.



Preview panes for media and device properties. The BEWAC user interface does not have the preview pane that displays in the lower right side of the screen in Backup Exec for Windows Servers.



Pop-up alerts and error messages. BEWAC does not support most pop-up alerts and messages. Alerts display in the status area of the appliance.

Accessing Help To access Help for BEWAC, click the question mark (?) in the upper right corner of each screen. If you click the Help tab on the primary navigation bar or press F1, the Windows Storage Server 2003 help displays. You can refer to the Backup Exec for Windows Servers Administrator’s Guide and Help for overview information and procedures for BEWAC. If a different step is required for BEWAC, the alternate step is indicated in a note in the procedure.

Chapter 16, VERITAS Backup Exec - Web Administration Console

805

BEWAC



Navigating in BEWAC

Navigating in BEWAC Navigation in BEWAC differs from navigation in Backup Exec for Windows Servers. BEWAC contains a status area at the top of the screen, which is where alerts display. This status area replaces the Alerts view in Backup Exec for Windows Servers. Below the status area are two navigation bars. The blue bar is the primary navigation bar. From the primary navigation bar you can select the tab for the application or task you want to work with, such as Backup Exec. The white bar is the secondary navigation bar. From the secondary navigation bar you select BEWAC options, such as backup and restore. The secondary navigation bar in BEWAC is the equivalent of the navigation bar in Backup Exec for Windows Servers. You also can click the icons to access BEWAC options. BEWAC screen layout

Status area Primary navigation bar Secondary navigation bar Help button

806

Administrator’s Guide

Tools

Tools



Start or stop Backup Exec services, and change logon credentials for the services



Configure alert categories



Configure notification recipients



Create and view a diagnostics log



Configure e-mail and pager notification



Configure error-handling rules



Configure default options for Backup, Restore, Media, Database Maintenance, Job Logs, Catalogs, and Agents



Add, delete, edit, and replace logon accounts



Add or remove serial numbers



Initiate VERITAS update



Edit selection lists



View license information

Chapter 16, VERITAS Backup Exec - Web Administration Console

807

BEWAC

The Tools tab serves the same function in BEWAC as the Tools menu in Backup Exec for Windows Servers. When you are following instructions in the Backup Exec for Windows Servers Administrator’s Guide, replace any mention of the Tools menu with the Tools tab. From the Tools tab, you can:

Viewing, Clearing, and Responding to Alerts

Viewing, Clearing, and Responding to Alerts In BEWAC, alerts display in the status area above the primary navigation bar. This takes the place of the Alerts view in Backup Exec for Windows Servers. The alert status displays, but not the details of the alert. For some types of alerts, you can respond to Backup Exec. With other types of alerts, you can only view the details. Both Backup Exec and server appliance alerts display in the status area and on the Status tab. Alerts for Backup Exec are titled Backup Exec Alert, so you can quickly distinguish them from the appliance alerts. You can configure alert categories, notification recipients, and e-mail and pagers using Backup Exec. For details, see “Configuring Alert Category Properties” on page 479, “Configuring Recipients” on page 488, and “Configuring E-mail and Pager Notification Methods” on page 483. ▼

To view the alert details and respond to an alert: 1. Click the alert or click Status in the primary navigation bar. 2. Under Alerts, click the alert for which you want to view details. 3. At the bottom of the screen, click the name of the alert to view details or respond to it. 4. After viewing the alert details or responding to the alert, click OK to clear the alert from the alert list. 5. On the primary navigation bar, click Backup Exec to return to BEWAC.



To clear an alert without viewing it or responding to it: 1. Click the alert or click Status in the primary navigation bar. 2. Under Alerts, click the alert for which you want to clear. 3. At the bottom of the screen, click Clear Message. The alert is cleared from the alert list in BEWAC.

808

Administrator’s Guide

17

Backup Exec Utility

With the Backup Exec Utility, you can: ◆

Reconfigure Backup Exec SAN Shared Storage environments by moving primary media server responsibilities among Backup Exec media servers.



Configure logical groups of Backup Exec media servers, enabling you to perform operations on all computers at the same time in the group. These operations can include starting or stopping services or configuring application service security, such as changing service account information as well as startup options for one or more servers in the group. With the Backup Exec Utility, you can also add or remove media servers from the group.



Start immediate database utility operations on the Backup Exec Database (BEDB) that are normally initiated by the database maintenance utilities themselves. These maintenance operations include database dumps, shrink and grooming operations, along with BEDB database consistency and data integrity checks.

See also: “Starting the Backup Exec Utility” on page 810 “Completing Tasks using the Backup Exec Utility” on page 812 “Running Backup Exec Utility General Tasks” on page 814 “Running Backup Exec Utility Services Tasks” on page 820 “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Running Database Tasks” on page 831 “Running Media Server Group Tasks” on page 838

809

Backup Exec Utility

The Backup Exec Utility (BEUTILITY.EXE) enables you to do various types of configuration and maintenance operations on your Backup Exec for Windows Servers media servers. It is automatically installed in your Backup Exec working directory during the initial Backup Exec for Windows Servers installation.

Starting the Backup Exec Utility

Starting the Backup Exec Utility ▼

To start the Backup Exec Utility: ❖

From the Backup Exec main program directory, double-click BEUtility.exe. By default, the main program directory is Program Files/VERITAS/Backup Exec/NT. The Backup Exec Utility

results pane

task pane

Media Servers pane

preview pane

See also: “Completing Tasks using the Backup Exec Utility” on page 812

810

Administrator’s Guide

Getting Started

Getting Started Before you can reconfigure or modify Backup Exec media servers, you must add the names of the media servers to the list of media servers that the Backup Exec Utility knows about. ▼

To add media servers: 1. On the Media Servers pane, click All Media Servers. 2. On the task pane, under General Tasks, click New Media Server.

Backup Exec Utility

3. Select the appropriate options from the following: New Media Server dialog box options Item

Description

Media Server

Enter the name of a media server you want to add, or click Browse to find a server to add.

Check server status

Validates that the media server is indeed a media server before adding it to the Backup Exec Utility master list of known servers.

Include all servers known by this server

Adds other media servers that may be part of a SAN SSO environment to the Backup Exec Utility master list of known servers.

Get Server Information Shows the properties of the media server entered in the Media server field.

4. Click OK. The media server name appears in the results pane when All Media Servers is selected. See also: “Completing Tasks using the Backup Exec Utility” on page 812

Chapter 17, Backup Exec Utility

811

Completing Tasks using the Backup Exec Utility

Completing Tasks using the Backup Exec Utility The Backup Exec Utility enables you to run media server-related operations on your Backup Exec media servers. Each of these operations (tasks) are found in the Backup Exec Utility’s task pane. Use the following table as a guide to the types of operations the Backup Exec Utility can perform. Note The task pane can be toggled on and off by selecting Task Pane under View. Backup Exec Utility tasks

812

If you want to:

See:

Š

Add a media server

Š

Add a new media server group

“Running Backup Exec Utility General Tasks” on page 814

Š

Delete a media server

Š

Delete a media server group

Š

Run Backup Exec diagnostics

Š

View media server properties

Š

Start and stop services on media servers

Š

Change media server service accounts

Š

Edit media server configurations.

Š

Set or remove the primary SAN SSO server

Š

Configure the SAN Shared Storage Option

Š

Promote a Backup Exec media server to the primary server in a SAN Shared Storage Option environment

Š

Move the primary SAN Shared Storage Option server to a different Backup Exec media server.

“Running Backup Exec Utility Services Tasks” on page 820

“Running Backup Exec Utility SAN SSO Tasks” on page 826

Administrator’s Guide

Completing Tasks using the Backup Exec Utility Backup Exec Utility tasks (continued) See:

Š

Check Backup Exec Database consistencies

“Running Database Tasks” on page 831

Š

Age Backup Exec Databases

Š

Compact Backup Exec Databases, and

Š

Dump Backup Exec Databases.

Š

Rebuild, repair and recover Backup Exec Databases.

Š

Change the SQL Server sa password.

Š

Change the database access

Š

Add a media server to a media server group

Š

Remove a media server from a media server group

“Running Media Server Group Tasks” on page 838

Š

Edit cluster configuration information

“Running Cluster Tasks” on page 840

Chapter 17, Backup Exec Utility

813

Backup Exec Utility

If you want to:

Running Backup Exec Utility General Tasks

Running Backup Exec Utility General Tasks This section guides you through the following Backup Exec Utility tasks: ◆

“Add a New Media Server” on page 814 enables you to add a media server to Backup Exec Utility’s list of known Backup Exec media servers.



“Create a New Media Server Group” on page 815 enables you to create a container where you can logically group together multiple media servers.



“Delete a Media Server from the All Media Servers Subnode” on page 816 enables you to remove Backup Exec media servers from the Backup Exec Utility master list of known servers.



“Delete a Media Server Group” on page 817 enables you to remove user-defined media server groups from the Media Server Groups subnode.



“Run Backup Exec Diagnostics” on page 818 enables you to run Backup Exec for Windows Servers Diagnostics application on media servers listed in the Backup Exec Utility.



“View Media Server Properties” on page 819 enables you to view server and system properties, along with the installed options for any Backup Exec media server that appears in Backup Exec Utility.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

Add a New Media Server New Media Server is used to add a media server to Backup Exec Utility’s list of known Backup Exec media servers. After adding a media server, it appears under the node, All Media Servers. ▼

To add a new media server: 1. On the Media Servers pane, click All Media Servers. 2. On the task pane, under General Tasks, click New Media Server.

814

Administrator’s Guide

Running Backup Exec Utility General Tasks

3. Enter the appropriate options as follows. New Media Server dialog box options Description

Media Server

Enter the name of a media server you want to add, or click Browse to find a server to add.

Check server status

Validates that the media server is indeed a media server before adding it to the Backup Exec Utility master list of known servers.

Include all servers known by this server

Adds other media servers that may be part of a SAN SSO environment to the Backup Exec Utility master list of known servers.

Get Server Information Shows the properties of the media server entered in the Media server field.

4. Click OK. See also: “Delete a Media Server from the All Media Servers Subnode” on page 816 “Completing Tasks using the Backup Exec Utility” on page 812

Create a New Media Server Group New Media Server Group is used to create a container where you can logically group together multiple media servers. After creating the group, Backup Exec media servers are added to it using the task Add Server, which is found under Server Group Tasks in the task pane. Grouping media servers enables you to perform operations such as starting and stopping services on the entire group, at the same time. ▼

To create a new media server group: 1. On the Media Servers pane, click Media Server Group. 2. On the task pane, under General Tasks, click New Server Group.

Chapter 17, Backup Exec Utility

815

Backup Exec Utility

Item

Running Backup Exec Utility General Tasks

3. Enter the appropriate options as follows. New Server Group dialog box options Item

Description

Media Server Group

Enter the name of a media server you want to add, or click Browse to find a server to add.

Create group from SAN Enables you to create the new media server group and populate it SSO configuration with the computers found in your SAN SSO environment. Primary SAN SSO server

The name of your primary SAN SSO server from which this new media server group will be created.

4. Click OK. See also: “Add Media Server” on page 838 “Delete a Media Server Group” on page 817 “Completing Tasks using the Backup Exec Utility” on page 812

Delete a Media Server from the All Media Servers Subnode Delete Media Server enables you to remove Backup Exec media servers from the Backup Exec Utility master list of known servers, which is reflected by the servers that appear in the All Media Servers node. Deleting a media server does not affect the operational status of the media server. Note Delete Media Server cannot be used to remove media servers from the Media Server Groups subnode. To remove media servers from the Media Servers Group subnode, see Remove Media Server. ▼

To delete a media server from the All Media Servers subnode: 1. On the Media Servers pane, click All Media Servers. 2. On the task pane, under General Tasks, click Delete Media Server.

816

Administrator’s Guide

Running Backup Exec Utility General Tasks Delete Server selection box

Backup Exec Utility

3. Select a media server or servers to delete. 4. Click OK. See also: “Remove a Media Server” on page 839 “Add a New Media Server” on page 814 “Completing Tasks using the Backup Exec Utility” on page 812

Delete a Media Server Group Delete Media Server Group enables you to remove user-defined media server groups from the Media Server Groups subnode. Note All media servers contained in the media server group are deleted along with the media server group itself. Although they are deleted from the group, the deleted media servers are not removed from the Backup Exec Utility’s All Media Servers subnode. ▼

To delete a media server group: 1. On the Media Servers pane, click Media Server Groups. 2. On the task pane, under General Tasks, click Delete Media Server Group.

Chapter 17, Backup Exec Utility

817

Running Backup Exec Utility General Tasks Delete Server Group selection box

3. Select a media server group or groups to delete. 4. Click OK. See also: “Create a New Media Server Group” on page 815 “Add Media Server” on page 838 “Completing Tasks using the Backup Exec Utility” on page 812

Run Backup Exec Diagnostics BE Diagnostics enables you to run Backup Exec for Windows Servers Diagnostics application on media servers listed in the Backup Exec Utility. Backup Exec for Windows Servers Diagnostics gathers information about Windows NT, Windows 2000, or Windows Server 2003 computers for troubleshooting purposes. This application is located in the Backup Exec for Windows Servers directory on your hard drive (by default, \Program Files\VERITAS\Backup Exec\NT). ▼

To run BE Diagnostics: 1. On the Media Servers pane, click All Media Servers. 2. On the results pane, select a media server.

818

Administrator’s Guide

Running Backup Exec Utility General Tasks

3. On the task pane, under General Tasks, click BE Diagnostics. Diagnostic output from BEDIAG is sent to a ASCII text file called bediag.txt and is located in the default Backup Exec installation directory (\Program Files \VERITAS\Backup Exec\NT). See also: “Using Backup Exec’s Diagnostic Utility BEDIAG” on page 572 “Completing Tasks using the Backup Exec Utility” on page 812

Properties enables you to view server, options and system properties for any Backup Exec media server that appears in Backup Exec Utility. ▼

To view media server properties: 1. On the Media Servers pane, click All Media Servers. 2. On the results pane, select a media server. 3. On the task pane, under General Tasks, click Properties. 4. After reviewing the media server properties, click OK. See also: “Viewing Server Properties and Running Server Diagnostics” on page 118 “Completing Tasks using the Backup Exec Utility” on page 812

Chapter 17, Backup Exec Utility

819

Backup Exec Utility

View Media Server Properties

Running Backup Exec Utility Services Tasks

Running Backup Exec Utility Services Tasks This section guides you through the following Backup Exec Utility tasks: ◆

“Stop Services” on page 820 enables you to remotely stop Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility.



“Start Services” on page 821 enables you to remotely start Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility.



“Change Service Accounts” on page 821 enables you to configure the credentials that comprise the Backup Exec service account.



“Edit Server Configurations” on page 823 enables you to configure Backup Exec to set automatic responses to several media alerts.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

Stop Services Stop Services enables you to remotely stop Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Caution When stopping services on a clustered Backup Exec media server, the entire Backup Exec cluster group will be taken offline. To bring the entire group back online, restart the services using Start Services. ▼

To stop Backup Exec services on a media server: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Services Tasks, click Stop Services. 3. Click Yes to confirm the stop services operation. 4. After the services stop, click Close on the Operation Progress screen. See also: “Start Services” on page 821 “Running Backup Exec Utility Services Tasks” on page 820 “Completing Tasks using the Backup Exec Utility” on page 812

820

Administrator’s Guide

Running Backup Exec Utility Services Tasks

Start Services Start Services enables you to remotely start Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Caution When starting services on a clustered Backup Exec media server, the entire Backup Exec cluster group will be placed online. To bring the entire group back offline, stop the services using Stop Services. ▼

To start Backup Exec services on a media server:

2. On the task pane, under Services Tasks, click Start Services. 3. After the services start, click Close on the Operation Progress screen. See also: “Stop Services” on page 820 “Running Backup Exec Utility Services Tasks” on page 820 “Completing Tasks using the Backup Exec Utility” on page 812

Change Service Accounts Change Service Account enables you to reconfigure the credentials that comprise the Backup Exec service account. ▼

To change a media server service account: 1. Select a media server from either a media server group or from the All Media Servers subnode. Note If you are changing the service account on a clustered Backup Exec media server, you must first bring the Backup Exec cluster group offline using Stop Services. On the task pane, under Services Tasks, click Change Service Account.

Chapter 17, Backup Exec Utility

821

Backup Exec Utility

1. Select a media server from either a media server group or from the All Media Servers subnode.

Running Backup Exec Utility Services Tasks

2. Enter the appropriate options as follows. Set Service Account dialog box options Item

Description

Server(s)

The name of the media server where the service account is being changed.

Account

The user account designated for the Backup Exec services. The service account must previously exist and be a member of the Administrators or Backup Operators groups. The service account is assigned the following rights: Log on as a service, Act as part of the operating system, and Create a token object.

Password

The password used to access to the service account.

Confirm Password

Used to re-enter the password to ensure it matches the one entered in the Password field.

Start type

Enables you to change the start up behavior of the service. Choices include Automatic, Manual, Disabled.

3. Click OK. 4. Click Close when the service account changes are completed. Before the new service account configuration takes affect, you must stop and restart the services on the media server. See also: “Stop Services” on page 820 “Start Services” on page 821 “Running Backup Exec Utility Services Tasks” on page 820 “Completing Tasks using the Backup Exec Utility” on page 812

822

Administrator’s Guide

Running Backup Exec Utility Services Tasks

Edit Server Configurations Edit Configuration enables you to configure Backup Exec to set automatic responses to several media alerts if those alerts have been configured to use the option, Automatically clear after. This option is found on Backup Exec’s Alert Configuration dialog box. If an alert appears and no user intervention is taken by the user defined specified time, the following responses will occur, based on what you have selected in the following table. These responses include: Automated Alert Responses Description

Yes or OK

Automatically responds Yes or OK to the generated alert, if you take no action.

No

Automatically responds No to the generated alert, if you take no action.

Cancel

Automatically responds Cancel to the generated alert, if you take no action.

The following media alerts can be configured to use automatic responses: Media Overwrite, Media Remove, Media Insert and Library Insert. You can also use the Edit Configuration dialog box to change the amount of time that a media server waits to release a tape drive before attempting to acquire another tape drive. In addition, you can also change the amount of time that the media server keeps possession of a tape drive after a job completes. ▼

To edit a media server configuration: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Services Tasks, click Edit Configuration.

Chapter 17, Backup Exec Utility

823

Backup Exec Utility

Item

Running Backup Exec Utility Services Tasks Edit Server Configuration dialog box

3. Enter the appropriate options as follows: Edit Server Configuration dialog box options Item

Description

Server(s)

The name of the media server where the service account is being changed.

General Delay before mount time (in seconds)

Changes the amount of time the media server waits after releasing a tape drive and before attempting to acquire a storage device. Note In a SAN SSO environment, this option should be used in order to keep one media server from monopolizing the storage device.

824

Administrator’s Guide

Running Backup Exec Utility Services Tasks Edit Server Configuration dialog box options (continued) Item

Description

Next job wait time (in seconds)

Changes the amount of time that the media server keeps possession of a storage device after a job completes.

Caution This option should be set to “0” in a SAN SSO environment.

In a SAN SSO environment, as soon as a job finishes, the media server releases the storage device, which enables the media dismount sequence to begin. When another job is submitted for processing, the media mount sequence is initiated. Each of these mount/dismount sequences take time to complete. In a non-SAN SSO environment, increasing the wait time between jobs delays the start of the media dismount sequence. If an append job is sent to the storage device before the allotted time expires, the media dismount sequence is averted and the job starts immediately. If an append job is not sent to the storage device in the allotted time, the media dismount sequence begins. When finished, the storage device is then released by the media server, enabling it to be accessed by other media servers. Mount poll time

Changes the time interval (in seconds) before Backup Exec retries mounting media in order to run a job, or attempts to acquire a storage device with media in it. Note In a SAN SSO environment, all media servers should use the same time interval, as this gives them all equal opportunity to acquire a storage device when jobs are submitted for processing.

Automated Alert Responses Media Overwrite Alert automated response

Enable you to set the automated response for the Media Overwrite Alert. Responses include: Yes or OK, No, or Cancel.

Media Remove Alert automated response

Enable you to set the automated response for the Media Remove Alert. Responses include: Yes or OK, No, or Cancel.

Chapter 17, Backup Exec Utility

825

Backup Exec Utility

Note This option is useful when multiple append jobs are targeted to a particular media server during the same backup window, and you want to save some time.

Running Backup Exec Utility SAN SSO Tasks Edit Server Configuration dialog box options (continued) Item

Description

Media Insert Alert automated response

Enable you to set the automated response for the Media Insert Alert. Responses include: Yes or OK, No, or Cancel.

Library Insert Alert automated response

Enable you to set the automated response for the Library Insert Alert. Your choices are Yes or OK, No, or Cancel.

See also: “Running Backup Exec Utility Services Tasks” on page 820 “Completing Tasks using the Backup Exec Utility” on page 812

Running Backup Exec Utility SAN SSO Tasks This section guides you through the following Backup Exec Utility tasks: ◆

“Set the Primary SAN SSO Server” on page 827 enables you to add a media server to an existing SAN SSO-enabled storage area network.



“Remove the Primary SAN SSO Server” on page 827 enables you to remove a media server in a SAN SSO storage area network and return it to standalone status.



“Configure the SAN SSO” on page 828 enables you to create a primary SAN SSO Server from one of the media servers found within a Media Server Group.



“Promote a Media Server to a Primary SAN SSO Server” on page 829 enables you to reconfigure a media server as the primary SAN SSO Server.



“Move the Primary SAN SSO Server” on page 830 enables you to change the computer that serves as a primary SAN SSO Server.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

826

Administrator’s Guide

Running Backup Exec Utility SAN SSO Tasks

Set the Primary SAN SSO Server Set Primary SAN SSO Server is used to add a media server to an existing SAN SSO-enabled storage area network by configuring the media server to point to the SAN’s primary SAN SSO server. Note If the media server is currently part of another SAN SSO storage area network, it will first be removed from that SAN. ▼

To add the media server to an existing SAN SSO server:

2. On the task pane, under SAN SSO Tasks, click Set Primary SAN SSO Server. 3. Enter the name of the target SAN SSO storage area network’s primary SAN SSO server. 4. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Completing Tasks using the Backup Exec Utility” on page 812

Remove the Primary SAN SSO Server Remove Primary SAN SSO Server enables you to remove a media server in a SAN SSO storage area network and return it to standalone status. Note When converting to standalone status, the server’s Backup Exec Database reverts to the previous state it was in before the media server was converted to a SAN SSO Server. ▼

To convert a SAN SSO storage area network media server to a standalone media server: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under SAN SSO Tasks, click Remove Primary SAN SSO Server.

Chapter 17, Backup Exec Utility

827

Backup Exec Utility

1. Select a media server from either a media server group or from the All Media Servers subnode.

Running Backup Exec Utility SAN SSO Tasks

3.

When prompted for confirmation of this operation, click Yes.

4. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Completing Tasks using the Backup Exec Utility” on page 812

Configure the SAN SSO Configure SAN SSO enables you to create a primary SAN SSO Server from one of the media servers found within a Media Server Group. Before you modify a SAN SSO configuration, make sure that all servers have a valid SAN SSO license and have SAN SSO installed. You must run the Backup Exec Utility from a licensed server. If you receive the following error when attempting to create a new SAN SSO configuration: Error (1068) - The dependency service or group failed to start Then you must install SAN SSO on that server using the procedure described in the topic “Installing Backup Exec Options on a Local Server” on page 53. Note You must create a Media Server Group that contains at least two media servers to use this option. ▼

To configure a SAN SSO Server: 1. On the Media Server pane, under Media Server Groups, click a Media Server Group containing at least two media servers. 2. On the task pane, under SAN SSO Tasks, click Configure SAN SSO. 3. In the Primary SAN SSO server field’s list box, click the name of a media server. 4. Click OK. 5. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Completing Tasks using the Backup Exec Utility” on page 812

828

Administrator’s Guide

Running Backup Exec Utility SAN SSO Tasks

Promote a Media Server to a Primary SAN SSO Server Promote to Primary SAN SSO Server enables you to reconfigure a media server as the primary SAN SSO Server in a SAN SSO storage area network. This is helpful if for some reason the original primary server goes down. During the reconfiguration process, a fresh copy of the Backup Exec Database is created and installed on the target media server. Although other media servers in the SAN SSO storage area network will point to the new primary server after the reconfiguration finishes, all job configurations contained in the original primary SAN SSO server’s Backup Exec Database must be recreated. To reconfigure a media server as a primary SAN SSO server: 1. On the Media Server pane, under Media Server Groups, click a media server group containing at least two media servers. 2. On the Task pane, under SAN SSO Tasks, click Promote to Primary SAN SSO Server. 3. Select the name of the media server to be promoted. Promote Primary SAN SSO Server dialog box

Promote Primary SAN SSO Server Options. Item

Description

Servers

Lists the names of the media servers that comprise the media server group.

Primary SAN SSO server

The name of the media server to be promoted. The target media server is selected from the list of media servers that appear in the Servers field.

Chapter 17, Backup Exec Utility

829

Backup Exec Utility



Running Backup Exec Utility SAN SSO Tasks

4. Click OK. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Completing Tasks using the Backup Exec Utility” on page 812

Move the Primary SAN SSO Server Move Primary SAN SSO Server enables you to change the computer that serves as a primary SAN SSO Server in a SAN SSO storage area network. This is helpful if for example, you want to permanently change the primary SAN SSO Server to another computer. During the reconfiguration process, the complete Backup Exec Database is physically moved to the new target SAN SSO Server. As such, all job configurations contained in the Backup Exec Database are saved. ▼

To move the primary SAN SSO Server: 1. On the Media Server pane, under Media Server Groups, click a media server group containing at least two media servers. 2. On the Task pane, under SAN SSO Tasks, click Move Primary SAN SSO Server. 3. Select the name of the media server to be promoted. Move Primary SAN SSO Server list box

830

Administrator’s Guide

Running Database Tasks

Move Primary SAN SSO Server List Box Options Item

Description

Servers

Lists the names of the media servers that comprise the media server group.

Old primary SAN SSO server

The name of the existing primary SAN SSO Server.

4. Click OK. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Backup Exec Utility SAN SSO Tasks” on page 826 “Completing Tasks using the Backup Exec Utility” on page 812

Running Database Tasks You can perform the following Backup Exec Utility tasks on the Backup Exec database or the Desktop and Laptop Option (DLO) database. The only exception is the Rebuild Indices operation, which you cannot perform on the DLO database. ◆

“Check the Database Consistency” on page 832 enables you to check the consistency or validity of a media server’s Backup Exec Database)



“Age the Database” on page 832 enables you to age a media server’s Backup Exec Database by deleting information considered old.



“Compact a Media Server Database” on page 833 enables you to shrink the database by removing a database’s unused space.



“Dump a Media Server Database” on page 833 enables you to back up the Backup Exec Database to your hard drive.



“Rebuild Media Server Database Indices” on page 834 enables you to rebuild media server database indices in the event the indices become corrupt.



“Repair a Media Server Database” on page 834 enables you to repair a database.

Chapter 17, Backup Exec Utility

831

Backup Exec Utility

New primary SAN SSO The name of the media server to be converted to the new primary server SAN SSO Server. The target media server is selected from the list of media servers that appear in the Servers field.

Running Database Tasks ◆

“Recover a Media Server Database” on page 835 enables you to recover a database.



“Change the SQL Server sa Password” on page 836 enables you to change a media server’s SQL Server sa password.



“Change Database Access” on page 837 enables you to grant or revoke a user’s database access.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

Check the Database Consistency Check Database Consistency enables you to check the consistency or validity of a media server’s Backup Exec Database before you back it up. A consistency check enables you to find problems in a database before you back it up. ▼

To check the consistency of a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Check Database Consistency. 3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Age the Database Age Database enables you to age a media server’s Backup Exec Database by deleting information considered old, based on user-defined configuration criteria. ▼

To age a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Age Database.

832

Administrator’s Guide

Running Database Tasks

3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Compact a Media Server Database



To compact a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Compact Database. 3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Dump a Media Server Database Dump Database enables you to back up the database to your hard drive. ▼

To dump a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Dump Database. 3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Chapter 17, Backup Exec Utility

833

Backup Exec Utility

Compact Database enables you to shrink the database by removing a database’s unused space.

Running Database Tasks

Rebuild Media Server Database Indices Rebuild Indices enables you to rebuild media server database indices in the event the indices become corrupt. Note This option does not apply to the Desktop and Laptop Option (DLO) database. The DLO database does not maintain indices on its database. ▼

To rebuild media server database indices: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Rebuild Indices. 3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Repair a Media Server Database Repair Database enables you to repair a database after you find problems that may have been uncovered during a database consistency check. ▼

To repair a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Repair Database. 3. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

834

Administrator’s Guide

Running Database Tasks

Recover a Media Server Database Recover Database enables you to recover a database that has been lost or corrupted. ▼

To recover a media server database: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Recover Database.

Item

Description

Server

The name of the media server on which the database is being recovered.

Database instance

Select the database you want to recover, either the Backup Exec database or the Desktop and Laptop Option (DLO) database. You can perform this operation on only one database at a time.

Recovery method Use best recovery method for current configuration

As the Backup Exec Utility default, this option attempts to fix and recover the existing database before either deleting it and creating a new database, or deleting it and recovering from the previous database dump.

Drop existing database Deletes the existing database and restores the backup. and reload from backup This option works in conjunction with the Backup Exec for Windows Servers option, Save contents of database to the Backup Exec data directory, found in the Database Maintenance node. If this option is set, Backup Exec automatically dumps the database to the media server’s hard drive at a predetermined, user-defined schedule. When you run the Backup Exec Utility task Recover Database and select the option, Drop existing database and reload from backup, the existing database is deleted and replaced with the copy of the database that was dumped to Backup Exec’s data directory. For more information, see “Configuring Database Maintenance” on page 405.

Chapter 17, Backup Exec Utility

835

Backup Exec Utility

3. On the Recover Database dialog box, select the appropriate option for your situation.

Running Database Tasks

Item

Description

Drop existing database Deletes the existing database and creates, in its place, a new and and reload from base empty database. For more information, see “Configuring Database Maintenance” on page 405.

4. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Change the SQL Server sa Password Change SQL Server sa Password enables you to change a media server’s SQL Server sa password. ▼

To change a media server’s SQL Server sa password: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Database Tasks, click Change SQL Server sa Password. 3. In the Database instance field, select either the Backup Exec database or the Desktop and Laptop Option (DLO) database. You can perform this operation on only one database at a time. 4. In the Old sa Password field, enter the old password. 5. In the New sa Password field, enter the new password. 6. Confirm the password by re-entering it in the Confirm sa Password field. 7. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

836

Administrator’s Guide

Running Database Tasks

Change Database Access Change Database Access enables you to grant or revoke a user’s database access to the media server’s Backup Exec Database. This is useful for example, if you change the Backup Exec service account. After changing the service account, you can use Change Database Access to give the new account access to the Backup Exec Database. ▼

To change database access: 1. Select a media server from either a media server group or from the All Media Servers subnode.

Backup Exec Utility

2. On the task pane, under Database Tasks, click Change Database Access. 3. In the User Name field, enter a user name. 4. In the Domain field, enter the user’s domain. Note To use a local account, enter the local machine name in the domain field. Backup Exec Utility assumes the local machine name if the field is left blank. 5. Click Grant access or Revoke access. 6. Click OK. 7. After the operation finishes, click Close on the Operation Progress screen. See also: “Running Database Tasks” on page 831 “Completing Tasks using the Backup Exec Utility” on page 812

Chapter 17, Backup Exec Utility

837

Running Media Server Group Tasks

Running Media Server Group Tasks This section guides you through the following Backup Exec Utility tasks: ◆

“Add Media Server” on page 838 enables you to add a media server to a media server group.



“Remove a Media Server” on page 839 enables you to remove a media server from a media server group.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

Add Media Server Add Media Server enables you to add a media server to a media server group; it does not remove a media server from the All Media Servers node. ▼

To add a media server to a media server group: 1. On the Media Servers pane, click a media server group. 2. On the task pane, under Media Servers Group Tasks, click Add Media Server. 3. Select a media server to add. Add Servers To Group selection box

838

Administrator’s Guide

Running Media Server Group Tasks

4. Click OK. See also: “Delete a Media Server from the All Media Servers Subnode” on page 816 “Remove a Media Server” on page 839 “Completing Tasks using the Backup Exec Utility” on page 812

Remove a Media Server Note Remove Media Server does not delete the media server from the All Media Servers node. ▼

To remove a media server from a media server group: 1. On the Media Servers pane, click a media server group. 2. On the task pane, under Media Server Group Tasks, click Remove Media Server. 3. Select a media server to remove. Remove Server selection box

Chapter 17, Backup Exec Utility

839

Backup Exec Utility

Remove Media Server enables you to remove a media server from a media server group.

Running Cluster Tasks

4. Click OK. See also: “Delete a Media Server from the All Media Servers Subnode” on page 816 “Add Media Server” on page 838 “Completing Tasks using the Backup Exec Utility” on page 812

Running Cluster Tasks This section guides you through the following Backup Exec Utility task: ◆

“Edit Cluster Configuration” on page 840 enables you to reset a SCSI bus or reset a specific SCSI LUN on a media server or a group of media servers that are in a clustered environment.

See also: “Completing Tasks using the Backup Exec Utility” on page 812

Edit Cluster Configuration Edit Cluster Configuration enables you to reset either the entire SCSI bus or a specific SCSI LUN in a clustered environment. Cluster configuration options include:

Cluster Configuration Options Item

Description

Server(s)

The name of the selected media server or servers on which the SCSI bus or specific SCSI LUN is being reset.

SCSI Bus Reset

Enables the device and media service to issue a SCSI bus reset to the first device found on the bus. This only occurs when there is a cluster fail-over and this option is enabled. Resetting the bus releases any device that may be reserved at the time of the fail-over. This option is typically enabled if storage device is being shared on a shared SCSI bus; do not use this option in a SAN SSO configuration.

840

Administrator’s Guide

Running Cluster Tasks Cluster Configuration Options Item

Description

SCSI LUN Reset

Enables the device and media service to issue a targeted LUN reset to a storage device that is being reserved in the cluster fail-over configuration. This targeted LUN reset will be issued only if the device (storage device, router, etc.) supports targeted LUN resets. Check your hardware documentation for support of this feature. This option is typically enabled in a Fibre channel SAN SSO configuration and your devices support targeted SCSI LUN reset.

To edit a cluster configuration: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Cluster Task, click Edit Cluster Configuration. 3. Select SCSI Bus Reset if your storage device is being shared on a shared SCSI bus. Caution Do not use the option, SCSI Bus Reset, in a SAN Shared Storage Option configuration. 4. Select SCSI LUN Reset if your device or devices support targeted LUN reset and your environment is using a Fibre Channel Storage Area Network (SAN). 5. Click OK. See also: “Completing Tasks using the Backup Exec Utility” on page 812

Chapter 17, Backup Exec Utility

841

Backup Exec Utility



Running Cluster Tasks

842

Administrator’s Guide

A

VERITAS Backup Exec - Remote Agent

The VERITAS Backup Exec for Windows Servers Remote Agent (Remote Agent) is installed as a separate, add-on component that must be used for the backup and restore of remote Windows resources. It is a system service that runs on remote Windows servers and workstations. The Remote Agent: Enables the remote backup and restore of Windows features.



Increases backup throughput on Windows systems. The Remote Agent provides faster backup processing by locally performing tasks that, in typical backup technologies, require extensive network interaction. The Remote Agent processes backup data into a continuous stream that the media server then processes as a single task. This method provides better data transfer rates over traditional technologies, which require multiple requests and acknowledgments between the media server and the remote server.



Enables you to backup and restore in firewall environments.



Enables you to backup and restore using the Specified Network feature in Backup Exec for Windows Servers.

In order to back up and restore the following platforms, the Remote Agent must be purchased and installed. These platforms include: ◆

Windows Server 2003 (all versions)



Windows 2000 (all Server versions)



Windows NT 4.0 (all Server versions)

Note To protect the Workstation versions of these platforms, you must install the Remote Agent on each platform; however a license is not required. To install the Remote Agent on Workstation versions of the platforms, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.

843

Remote Agent



The Remote Agent is available for both 32-bit and 64-bit systems. Both versions of the Remote Agent provide protection for remote Windows resources. However, the Remote Agent for 64-bit systems differs somewhat from the Remote Agent for 32-bit systems. The 64-bit Remote Agent supports the: ◆

Shadow Copy Components file system.



Backup Exec Advanced Open File Option.



Backup Exec Agent for Microsoft SQL Server on a 64-bit version of SQL Server 2000.

The 64-bit Remote Agent has the following limitations: ◆

Can be installed only on 64-bit Intel Itanium and Itanium 2 computers running the Windows Server 2003 family or Windows XP 64-bit Edition.



Cannot be push installed. A local installation of the Remote Agent on the 64-bit computer is required.



Supports only the VERITAS Volume Snapshot Provider (VSP) and Microsoft Volume Shadow Copy Service (VSS) when used with the Advanced Open File Option.



Does not support the Intelligent Disaster Recovery Option (IDR). See “Disaster Preparation and Recovery” on page 549. The procedures for recovery are the same for 32-bit and 64-bit computers.

Significant performance increases are attained when running modified backups (for example, differential and incremental). This occurs because file selection is performed locally by the Remote Agent, instead of across the network as performed by traditional network backup applications. Network hardware has a major impact on performance. Performance is directly related to the capabilities of the networking hardware in the media server and the remote device. Higher network bandwidth ratings also contribute to faster operation processing. See also: “Requirements for the Remote Agent” on page 845 “Installing the Remote Agent to Remote Windows Servers” on page 845 “Enable Remote Agent TCP dynamic port range” on page 337 “Backing Up Data in a Mixed Environment Using the Remote Agent” on page 850

844

Administrator’s Guide

Requirements for the Remote Agent

Requirements for the Remote Agent Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot fully protect resources on a remote server until a Remote Agent has been installed. At the media server (Backup Exec server), you must enter Remote Agent serial numbers for each remote Windows server that you want to protect. To back up a remote Windows server from more than one media server, you must enter the same Remote Agent serial number on each media server. Backup Exec database agents and the Advanced Open File Option (AOFO) also include a Remote Agent that allows you to protect one remote Windows server. The Remote Agent license is enabled when you install the database agent and the AOFO serial numbers on the media server. However, if you are using the database agent or AOFO on the local media server only, you are entitled to install the Remote Agent that was included with one of those options to one remote Windows server so that resource can be protected by Backup Exec.

See also: “Installing the Remote Agent to Remote Windows Servers” on page 845 “Enable Remote Agent TCP dynamic port range” on page 337

Installing the Remote Agent to Remote Windows Servers Installation of the Remote Agent software on remote 32-bit Windows servers is accomplished from a Backup Exec media server using push installation technology. Push installations save time by eliminating the need for local access at the target computer for the installation to be successful. Installation of the Remote Agent software on remote 64-bit Windows servers is accomplished by mapping a drive to the server. Note If you have a previous version of the Remote Agent installed, it will automatically be upgraded when you initiate a new Remote Agent installation. Previous versions of the Remote Agent are automatically detected on the remote systems and replaced with the new version during installation of the new Remote Agent. Note that the name of the system service may have changed when the upgrade is complete.

Appendix A, VERITAS Backup Exec - Remote Agent

845

Remote Agent

You must install the Remote Agent on XP Professional, Windows 2000 Professional, and Windows NT 4 workstations in order to protect them; however, a Remote Agent serial number is not required for these installations.

Installing the Remote Agent to Remote Windows Servers

To install the Remote Agent on a remote server, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. Note You can also install and uninstall the Remote Agent on remote servers using the Windows command line. See “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.

Installing the Remote Agent on a 64-bit Computer Using the Installation Program The installation program for the 64-bit Remote Agent is separate from the Backup Exec installation program. In addition, the 64-bit Remote Agent installation process differs from the 32-bit Remote Agent installation process. The 32-bit Remote Agent is installed locally or is push installed to a remote computer. The 64-bit Remote Agent can only be installed locally or via a mapped drive. The 64-bit Remote Agent installation program is available on the Backup Exec media server in the default directory \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. A Remote Agent serial number is not required during the installation of the 64-bit Remote Agent. However, you must enter a Remote Agent serial number on the media server before you schedule a backup for the remote server. After you install the 64-bit Remote Agent, you can use the Windows Add/Remove Programs feature to modify or uninstall the option. ▼

To install the 64-bit version of the Remote Agent: 1. On the remote computer, map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64, or you can type a UNC path. 2. Double-click setup.exe. 3. Click Next. 4. Select the type of installation you want, either Complete or Custom. The Complete option installs the 64-bit version of the Remote Agent and the Advanced Open File Option. Select the Custom option if you do not want to install the Advanced Open File Option at this time. You can install it later if needed. 5. Click Next.

846

Administrator’s Guide

Installing the Remote Agent to Remote Windows Servers

6. If you selected the Complete option, go to step 7. If you selected the Custom option, select the option you want to install, and then click Next. You cannot clear the Remote Agent selection because it is a required component and you cannot change the installation destination. 7. Click Install. 8. If you installed the Advanced Open File Option, you must reboot the computer. Backup Exec creates an installation log in \Windows\BKUPINST.log or \WINNT\BKUPINST.log

Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line ▼

1. At a remote computer, map a drive letter to the Backup Exec for Windows Servers media server RANT32 directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 2. Open a command prompt and type the drive letter you mapped in step 2. 3. Run the following command: setup.exe /RANT32: -s The Remote Agent is installed on the remote computer in the following directory: \Program Files\VERITAS\Backup Exec\RANT The Remote Agent installation log file is installed in \WINNT\bkupinst.log. ▼

To uninstall the 32-bit Remote Agent from a remote computer using the Windows command line: 1. At the remote computer, open a command prompt. 2. Change directories to the Remote Agent install directory using the following path: \Program Files\VERITAS\Backup Exec\RANT 3. Run the following command: setup.exe /RANT32: -s -u Note The -s parameter is used to run the operation in silent mode, without the benefit of a user interface. The -u parameter specifies an uninstall operation.

Appendix A, VERITAS Backup Exec - Remote Agent

847

Remote Agent

To install the Remote Agent on a remote computer using the Windows command line:

Installing the Remote Agent to Remote Windows Servers

The Remote Agent is uninstalled from the remote computer.

Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script You can install and uninstall the 64-bit Remote Agent and the Advanced Open File Option using command script files. The command script files are included in the 64-bit Remote Agent download. Two command script files, setupaa64 and setupaofo64, are available to install the 64-bit Remote Agent and Advanced Open File Option. One command script file, Uninstallaaofo64, is available to uninstall both the 64-bit Remote Agent and the Advanced Open File Option. The uninstall command script removes both options together. You cannot remove the options separately using the command script. ▼

To install the 64-bit Remote Agent and Advanced Open File Option using a command script: 1. Map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. Note Scripts do not support UNC paths. 2. Perform one of the following: -

To install the 64-bit Remote Agent, double-click setupaa64.

-

To install the 64-bit Advanced Open File Option, double-click setupaofo64.

The command script installs the option automatically on the remote server in the following directory: \Program Files\VERITAS\Backup Exec\RANT. 3. If you installed the Advanced Open File Option, you must reboot the remote server. Backup Exec creates an installation log in \Windows\BKUPINST.log or \WINNT\BKUPINST.log.

848

Administrator’s Guide

Stopping and Starting the Remote Agent ▼

To uninstall the 64-bit Remote Agent and Advanced Open File Option using a command script: 1. Map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. 2. Double-click Uninstallaaofo64. Both the 64-bit Remote Agent and the 64-bit Advanced Open File Option are removed from the computer. 3. Reboot the remote server.

Stopping and Starting the Remote Agent The Remote Agent is automatically started as a service when Windows is started on the remote server. To stop or start the Remote Agent on a Windows 2000, Windows XP, or Server 2003 system: 1. On the Windows desktop, right-click My Computer, and then click Manage. 2. In the Scope pane of the Management Console, double-click Services and Applications and then click Services. 3. In the Results pane, right-click the Backup Exec Remote Agent for Windows Servers service. Click Stop to stop Remote Agent or click Start to start the Remote Agent. ▼

To stop or start the Remote Agent on a Windows NT system: 1. Click Start, and then point to Settings. 2. Point to Control Panel, and then double-click Services. 3. Select the Backup Exec Remote Agent for Windows Servers service. 4. Click Stop to stop the Remote Agent or click Start to start the Remote Agent. See also: “Enable Remote Agent TCP dynamic port range” on page 337

Appendix A, VERITAS Backup Exec - Remote Agent

849

Remote Agent



Backing Up Data in a Mixed Environment Using the Remote Agent

Backing Up Data in a Mixed Environment Using the Remote Agent You must install the Remote Agent on all remote Windows systems that you want to be backed up. Without the Remote Agent, the following Windows features cannot be backed up correctly: ◆

Encrypted files



SIS files



Disk quota data



Removable Storage data



Remote Storage data



Mount points



Sparse files



System State data, including: -

COM+ Class Registration database

-

Boot and system files

-

Registry

-

Certificate Services database (if the server is operating as a certificate server)

-

Active Directory (if the server is a domain controller)

-

SYSVOL (if the server is a domain controller)

-

Cluster quorum

Note You can select System State for backup on a remote system running Windows 2000, Windows XP, or Windows Server 2003 only when the Remote Agent is installed on the remote system.

850

Administrator’s Guide

VERITAS Backup Exec Admin Plus Pack Option

B

The Admin Plus Pack Option provides features designed for distributed data management of your media and remote servers. Through the Admin Plus Pack Option, you can: ◆

Create a clone CD image so you can install Backup Exec on additional servers using the same installation settings.



Remotely install the same Backup Exec installation parameters to multiple systems.



Copy jobs, scripts, and job templates between media servers.



Run advanced Backup Exec reports.



Schedule recurring reports.



Distribute reports through notification.

Installing the Admin Plus Pack Option

For more information about requirements for media servers, refer to “System Requirements” on page 44. You can install the Admin Plus Pack Option while installing Backup Exec by following the procedures described in “Installing Backup Exec Using the Installation Program” on page 50. If you have already installed Backup Exec and now want to install the Admin Plus Pack Option, complete the procedures described in “Installing Backup Exec Options on a Local Server” on page 53 or “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. When you enter a serial number for the Admin Plus Pack Option, all of this option’s features are selected for installation automatically. If you do not want to use the Clone CD feature, you must select This feature will not be available.

851

Admin Plus Pack

To use the Admin Plus Pack Option features, the media server must have the Admin Plus Pack Option installed. Separate serial numbers are required for each remote server you plan on cloning or using to copy jobs, scripts, or templates.

Using a Clone CD Image

Using a Clone CD Image A clone CD image captures the Backup Exec installation program and your installation settings, such as account information, additional options, and destination directory. You can create this CD image during the installation process provided you have entered a serial number for the Admin Plus Pack Option or are installing Not for Resale, Evaluation, or Open Option Suite editions of Backup Exec. After the CD image has been created, it can be copied to a CD. You can then use that CD to install Backup Exec on additional servers using the same settings. The clone CD image is not removed from your system when Backup Exec is uninstalled.

Creating a Clone CD Image ▼

To create a clone CD image: 1. Begin installing Backup Exec following the procedures described in “Installing Backup Exec” on page 48. You must use the Backup Exec installation CD when creating the clone CD image for the first time. 2. When the list of features being installed appears, ensure that Admin Plus Pack Option is selected, and then ensure Create Clone CD is selected. Features that are not selected will have a red X appearing next to the feature name. 3. Click Next and continue with the installation procedures. 4. When the Create Clone CD Image dialog box appears, ensure the directory listed is the directory where you want the clone CD image file copied. If the location is not correct, click Change and browse to select the correct location. The directory install will be copying the clone CD image file to should be an empty directory. 5. Click Next and continue with the installation procedures. Note If the Backup Exec installation CD is not in your CD drive, Backup Exec will prompt you to specify the path where the CD image is located. If you have not yet created a clone CD image, you must insert the Backup Exec installation CD or be able to access this installation CD from the network.

Installing Locally Using a Clone CD Image After a clone CD image has been created, it can be used to install the identical Backup Exec installation parameters to another system.

852

Administrator’s Guide

Using a Clone CD Image ▼

To use a clone CD image to install to a local system: ❖

Insert the CD containing your clone CD image into the CD drive.

Note If autorun is not enabled on your system, run SETUP.CMD, which is in the root of the installation CD directory. Because the installation parameters, or options, have already been captured in the clone CD image, you will not be prompted for these options.

Installing to a Remote System Using a Clone CD Image ▼

To install remotely using a clone CD image: 1. Begin the Backup Exec installation procedures as described in “Installing Backup Exec” on page 48. 2. Add the remote systems to which you are installing. Remote install options

Admin Plus Pack 3. When the Select Push Method dialog box appears, select from one of the following options: Remote install options Item

Description

Remote install with serialized options

Select this option if you want to enter serial numbers for the remote systems. During the install, a dialog asking for the serial numbers for the remote system appears.

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

853

Using a Clone CD Image Remote install options Item

Description

Remote install with cloned local settings

Select this option if you want to install remotely using all of the installation options installed on the local system. When this option is used, you cannot change any settings on the remote system. For example, if you have installed the Intelligent Disaster Recovery option locally, this option will also be installed remotely.

Remote install from clone file settings

Select this option if you want to install remotely using the clone file settings that may be contained on a clone CD image or could also be contained in a previously created parameter file (see “Creating and Using Installation Parameter Files” on page 66). When this option is selected, you will be able to browse to a parameter file.

4. Follow the on-screen prompts.

854

Administrator’s Guide

Copying Jobs, Selection Lists, and Job Templates Between Servers

Copying Jobs, Selection Lists, and Job Templates Between Servers With the Admin Plus Pack Option, you can copy backup jobs, selection lists, and backup job templates that were created on your media server to another server. ▼

To copy jobs, selection lists, or job templates: 1. On the media server’s navigation bar, click Job Setup. 2. Select the job, template, or backup selection list you want to copy. 3. Under Backup Tasks in the task list, select Copy to media servers. Copy to media server

Admin Plus Pack

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

855

Copying Jobs, Selection Lists, and Job Templates Between Servers

4. Enter the options as described in the following table: Copy options Item

Description

Server Name

Enter the name of the media server you want to copy to, and then click Add. Each server added to the list will receive a copy.

If this item already exists on the destination server, overwrite it

Select this option if you want to overwrite an existing job, selection list, or template having the same name.

5. Click OK. The operation is queued. The default timeout is five minutes; if the transfer cannot be completed within five minutes, the transfer is aborted and an alert is issued. Backup Exec sends an alert with the job success or failure status along with a log file that allows you to view results. The job log for Copy to Media Server jobs does not display with the other job logs in the Job History. ▼

To view the job log for a Copy to Media Server job: 1. On the navigation bar, click Alerts. 2. Click the Source column in either Active Alerts view or the Alert History view. 3. Locate an alert with “Job” as a Source and “Copy to Media Server job” as a Job Name. 4. Right-click the alert, and then select View Job Log. 5. If a Copy to Media Server alert does not exist: a. On the navigation bar, click Configure alert categories and make sure that the alert categories Job Failed and Job Success are enabled. b. On the Tools menu, click Options, and then click Preferences. Make sure that the option Automatically display new alerts is selected.

856

Administrator’s Guide

Advanced Reporting Capabilities

Advanced Reporting Capabilities The Admin Plus Pack Option provides advanced reporting capabilities, including: ◆

Ability to run an additional 24 reports as well as the 13 standard reports available with Backup Exec.



Ability to schedule a report to run at a specified times or specify a recurring schedule for the report to run.



Ability to have Backup Exec distribute reports through notification.

In order to run reports across multiple media servers, you must install the Backup Exec SAN Shared Storage Option in addition to the Admin Plus Pack Option. The following advanced reports are provided with the Admin Plus Pack Option: Advanced Reports Report Name

Description

Active Alerts by Media Server

Lists all active alerts grouped and filtered by media server, displaying the most recent alerts first (see “Active Alerts by Media Server Report” on page 860).

Alert History by Media Server

Lists all alerts in the alert history grouped and filtered by media server, displaying the most recent alerts first (see “Alert History by Media Server Report” on page 860).

Backup Set Details by Resource

Lists all backup sets that ran within the last 72 hours. The sets are grouped by the server and resource (see “Backup Set Details by Resource Report” on page 863).

Backup Size by Resource

Lists the backup size for each resource job for up to seven previous runs and then computes the trailing average for up to seven previous runs for each job run (see “Backup Size By Resource Report” on page 864).

Backup Success Rate

Lists the success rate for backup jobs for a specific number of days for selected servers (see “Backup Success Rate Report” on page 865).

Daily Job Summary

Lists all the jobs that ran within the last 72 hours in chronological order (see “Daily Job Summary Report” on page 866).

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

857

Admin Plus Pack

Backup Job Success Rate Lists the success rate for backup jobs run to protect selected servers (see “Backup Job Success Rate Report” on page 862).

Advanced Reporting Capabilities Advanced Reports (continued) Report Name

Description

Daily Network Device Utilization

Lists drive summary history for each archive device for the past 30 days including daily job count, bytes processed, and the percentage of drive utilization (see “Daily Network Device Utilization Report” on page 867).

Device Usage by Template Lists all the job templates that are targeted to specific drive selections (see “Device Usage by Template” on page 868). Event Recipients

Lists all events registered by each notification recipient (see “Event Recipients Report” on page 868).

Failed Backup Jobs

Lists all the failed backup jobs sorted by the resource server and time frame (see “Failed Backup Jobs Report” on page 869).

Job Distribution by Device Lists all the jobs that have been run on each system device during the specified period (see “Job Distribution by Device Report” on page 870).

858

Job Queue Status

Lists the jobs in the queue sorted by status (see “Job Queue Status Report” on page 870).

Job Templates

Lists all the job templates that are defined for the server (see “Job Templates Report” on page 871).

Machines Backed Up

Lists all the servers that have been protected by Backup Exec (see “Machines Backed Up Report” on page 872).

Media Required for Recovery

Lists the media that contain the backup sets for each system backed up on selected servers for the specified time period. This report can be inaccurate if media overwrite settings allow the media to be overwritten (see “Media Required for Recovery Report” on page 873).

Move Media to Vault

Lists all media that can be moved to a media vault. The media listed are not currently in a media vault and the media’s append period has expired (see “Move Media to Vault Report” on page 874).

Overnight Summary

Lists the results of backup jobs for each resource during the last 24 hours. This report includes backup jobs that were scheduled to run but did not run. Jobs are given a grace period of 24 hours before being marked as past due (see “Overnight Summary Report” on page 874).

Administrator’s Guide

Advanced Reporting Capabilities Advanced Reports (continued) Report Name

Description

Problem Files

Lists all the problem files reported for jobs. The files are grouped by day and resource (see “Problem Files Report” on page 875).

Recently Written Media

Lists all media that have been modified in the last 24 hours (see “Recently Written Media Report” on page 876).

Resource Risk Assessment

Lists job information for resources on which the last backup job run on the resource failed. The data is filtered by resource server (see “Resource Risk Assessment Report” on page 877).

Retrieve Media from Vault

Lists all reusable media currently in the specified vault (see “Retrieve Media from Vault Report” on page 878).

Scheduled Server Workload

Lists the estimated scheduled workload for the next 24-hour period by server (see “Scheduled Server Workload” on page 878).

Template Definition Usage Lists the usage of template definitions by resources (see “Template Definition Usage Report” on page 879).

See also: “Reports” on page 519

With the Admin Plus Pack Option installed, you can create a report job and schedule it to run at a specific time or specify a recurring schedule for a report to run. For information about creating a report job, see “Running and Viewing a New Report Job” on page 524. For information about scheduling the job, see “Scheduling Jobs” on page 374. You can also assign notification recipients to the report job just as you would for other Backup Exec jobs, such as backups and restores. For more information about setting notification recipients, see “Selecting Recipients for Job Notification” on page 509. If you select Include job log with a notification to an e-mail or printer recipient, the report is included with the notification. If this option is not selected, the recipient only gets a message that the report has run.

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

859

Admin Plus Pack

Scheduling Report Jobs and Setting Notification Recipients

Advanced Reporting Capabilities

Active Alerts by Media Server Report The Active Alerts by Media Server report lists all active alerts grouped and filtered by media server, displaying the most recent alerts first. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option. Information displayed in the Active Alerts by Media Server report is described in the following table. Active Alerts by Media Server Report Item

Description

Time

Date and time the alert occurred.

Job Name

The name of the job associated with the alert.

Device Name

Name of the device on which the job ran.

Category

Title of the alert, such as Service Start or Job Failed.

Message

Describes the event that caused the alert.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Alert History by Media Server Report The Alert History by Media Server report lists all alerts in the alert history grouped and filtered by media server, displaying the most recent alerts first. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option. Information displayed in the Alert History by Media Server report is described in the following table. Alert History by Media Server Report

860

Item

Description

Media Server

Name of the media server on which the alert occurred.

Time

Date and time the alert occurred. Administrator’s Guide

Advanced Reporting Capabilities Alert History by Media Server Report (continued) Item

Description

Received

Time the alert occurred.

Responded

Time the user responded to the alert.

Responding User

User that responded to the alert.

Job Name

The name of the job associated with the alert.

Category

Title of the alert, such as Service Start or Job Failed.

Message

Describes the event that caused the alert.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Admin Plus Pack

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

861

Advanced Reporting Capabilities

Backup Job Success Rate Report The Backup Success Rate report lists the success rate for backup jobs run to protect selected servers. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Days option. Information displayed in the Backup Success Rate report is described in the following table. Backup Success Rate Report Item

Description

Server

Name of the server being protected.

Date

Date the backup job was processed.

Total Jobs

Total number of jobs processed by the media server.

Successful

Total number of jobs successfully performed by the media server.

Success Rate

Percentage of successful jobs processed by the media server.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

862

Administrator’s Guide

Advanced Reporting Capabilities

Backup Set Details by Resource Report The Backup Set Details by Resource report lists all jobs that ran within the specified time range on a selected server. The jobs are grouped by the server and resource. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Hours option. Information displayed in the Daily Jobs by Resource report is described in the following table. Backup Set Details by Resource Report Item

Description

Resource

The name of the system being protected.

Start Time

Date and time the operation started.

Job Statistics Length of time the operation took to process.

Size (MB)

Number of megabytes processed.

Files

Number of files processed.

Directories

Number of directories processed.

MB/Minute

Number of megabytes processed per minute.

Admin Plus Pack

Duration

Exceptions Skipped

Number of files skipped during the operation.

Corrupt FIles

Number of corrupt files encountered during the operation.

Files in Use

Number of files in use during the operation.

Status

Status of the operation, such as Completed.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

863

Advanced Reporting Capabilities

Backup Size By Resource Report The Backup Size By Resource report lists the backup size for each resource job for up to seven previous jobs run. It also computes the trailing average, which is the average of the amount of data backed up in the seven previous jobs. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option. Information displayed in the Backup Size by Resource report is described in the following table. Backup Size by Resource Job Report Item

Description

Server

Name of the media server where the data for the backup job was located.

Resource

Name of the resource backed up.

Job

Name of the backup job.

Job Date and Time Run Date and time the backup job was processed. Backup Size, MB

Amount of data backed up in megabytes.

Trailing Avg, MB

Amount of data backed up during the seven previous runs.

Difference %

Amount by which the data backed up in the current job differs from the previous backup jobs.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

864

Administrator’s Guide

Advanced Reporting Capabilities

Backup Success Rate Report The Backup Success Rate report lists the success rate for backup jobs for a specific number of days for selected servers. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Days option. Information displayed in the Backup Success Rate by Resource report is described in the following table. Backup Success Rate by Resource Report Item

Description

Resource

The name of the system being protected.

Date

Date the backup job was processed.

Backup Sets

Total number of backup sets processed by the media server

Successful

Total number of jobs successfully performed by the media server.

Success Rate

Percentage of successful jobs processed by the media server.

See also: “Running a Report” on page 521

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

Admin Plus Pack

“Running and Viewing a New Report Job” on page 524

865

Advanced Reporting Capabilities

Daily Job Summary Report The Daily Job Summary report lists all jobs that have run within the specified time range. The jobs are listed in chronological order. You can limit the amount of data that appears in the report by selecting range parameters for the Hours option. Information displayed in the Daily Jobs report is described in the following table. Daily Job Summary Item

Description

Start Time

Date and time the operation started.

Job Name

The name of the completed job.

Job Statistics Duration

Length of time the operation took to process.

Size (MB)

Number of megabytes processed.

Files

Number of files processed.

Directories

Number of directories processed.

MB/Minute

Number of megabytes processed per minute.

File Exceptions Skipped

Number of files skipped during the operation.

Corrupt FIles

Number of corrupt files encountered during the operation.

Files in Use

Number of files in use during the operation.

Status

Status of the operation, such as Completed.

Type

Specific type of backup. For more information on backup methods, see “Backup method for files” on page 254.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

866

Administrator’s Guide

Advanced Reporting Capabilities

Daily Network Device Utilization Report The Daily Network Device Utilization report lists drive summary history for each archive device for the specified period including daily job count, bytes processed, and the percentage of drive utilization. You can limit the amount of data that appears in the report by selecting range parameters for the Days option. Information displayed in the Daily Network Device Utilization report is described in the following table. Daily Network Device Utilization Report Item

Description

Drive Name

Name of the storage device and the media server where the device is located.

Date

Date the storage device was used.

Jobs

Number of jobs processed by the media server’s storage device.

Bytes Processed

The number of bytes processed by the media server’s storage device.

Utilization (%)

Percentage of device utilization.

See also: “Running a Report” on page 521

Admin Plus Pack

“Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

867

Advanced Reporting Capabilities

Device Usage by Template The Template Drive Usage report lists all the job templates that are targeted to specific drive selections. Information displayed in the Template Drive Usage report is described in the following table. Template Drive Usage Report Item

Description

Drive Name

Name of the storage device and the media server where the device is located.

Method

Specific type of backup. For more information on backup methods, see “Backup method for files” on page 254.

Template Name

Name of the job template.

Set Description

Describes the data that was backed up and the location of the data.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Event Recipients Report The Event Recipient report lists events registered by each notification recipient. Information displayed in the Event Recipient report is described in the following table. Event Recipient Report

868

Item

Description

Recipient Type

The type of recipient, such as Person, Net Send, Printer, or Group.

Recipient Name

Name of the recipient.

Event Type

The alert category or ad hoc job.

Event Name

Detail for the alert category or ad hoc job.

Administrator’s Guide

Advanced Reporting Capabilities

Failed Backup Jobs Report The Failed Backup Jobs report lists all the failed backup jobs sorted by the server and specified time frame. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Days option. Information displayed in the Failed Backup Jobs report is described in the following table: Failed Jobs Report Description

Resource

The name of the system being protected.

Start Time

Date and time the backup job started.

Duration

Length of time the operation took to process.

Type

Specific type of backup. For more information on backup methods, see “Backup method for files” on page 254.

Error Category

The category for the failed job that may be generated by a system, job, media, or device error.

Error Text

Describes the event that caused the alert.

Status

Status of the operation, such as Completed.

Device Name

Name of the device on which the job ran.

Admin Plus Pack

Item

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

869

Advanced Reporting Capabilities

Job Distribution by Device Report The Job Distribution by Device report lists the jobs that have been run on each system device during the specified period. It helps determine the device’s job workload. You can limit the amount of data that appears in the report by selecting range parameters for the Days option. Information displayed in the Job Distribution by Device report is described in the following table. Job Distribution by Device Report Item

Description

Device

Name of the device on which the job ran.

Job Date and Time Run Date and time the job was processed. Names of the jobs that ran on the device.

Job

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Job Queue Status Report The Job Queue Status report provides details about the job queue sorted by status. You can limit the amount of data that appears in the report by selecting filter parameters for the Job status. Information displayed in the Job Queue Status report is described in the following table. Job Queue Status Report

870

Item

Description

Job Status

Displays the job status.

Job

Name of the job.

Next Due Date

Next date and time the job is scheduled to run.

Original Due Date

Original date and time the job was scheduled to run.

Administrator’s Guide

Advanced Reporting Capabilities Job Queue Status Report (continued) Item

Description

Priority

Job priority that determines which job runs first. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Available priorities include: ◗

Highest



High



Medium



Lowest



Low

On Hold

Displays an X if the job is on hold; otherwise, displays a dash (-).

Type

Type of job that was run, such as Backup or Restore.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Job Templates Report The Job Templates report lists all the job templates that are defined for the server.

Job Templates Report Item

Description

Template Name

Name of the job template.

Set Description

Describes the data that will be backed up and the location of the data.

Method

Specific type of backup. For more information on backup methods, see “Understanding Backup Methods and Their Advantages” on page 355.

Type

Type of job that will run, such as Backup.

Device

Name of the device on which the job will run.

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

871

Admin Plus Pack

Information displayed in the Job Templates report is described in the following table.

Advanced Reporting Capabilities Job Templates Report (continued) Item

Description

Media Set

Name of the media set on which the job will run.

Overwrite/Append

The media overwrite protection option configured for the backup job template properties.

See also: “Running a Report” on page 521 “Viewing Report Properties” on page 530

Machines Backed Up Report The Machines Backed Up report lists all the protected servers and the times they were backed up. You can limit the amount of data that appears in the report by selecting range parameters for the Days option. Information displayed in the Machines Backed Up report is described in the following table. Machines Backed Up Report

872

Item

Description

Server

Name of the server that was backed up.

Total Backup Count

Total number of backups performed.

Last Backup

Date of the last backup job for this server.

Administrator’s Guide

Advanced Reporting Capabilities

Media Required for Recovery Report The Media Required for Recovery report lists the media that contain the backup sets for each system backed up on the selected media server for the specified time period. However, this report may be inaccurate if media overwrite settings allow the media to be overwritten. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Days option. Information displayed in the Media Required for Recovery report is described in the following table. Media Required for Recovery Report Item

Description

Resource

Name of the system that was backed up.

Type

Specific type of backup. For more information on backup methods, see “Backup method for files” on page 254.

Date

Date and time the backup job set was created.

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

See also: “Running a Report” on page 521

Admin Plus Pack

“Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

873

Advanced Reporting Capabilities

Move Media to Vault Report Lists all media that you can move to a media vault. The media listed are not currently in a media vault and the append period has expired, but the overwrite protection period is still current (allocated). You can limit the amount of data that appears in the report by entering range parameters for the Days option. Information displayed in the Move Media to Vault report is described in the following table. Move Media to Vault Report Item

Description

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Location

Location of the media.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Overnight Summary Report The Overnight Summary report lists the results of backup jobs for each resource during the last 24 hours. This report includes backup jobs that were due to run but did not run. Jobs are given a grace period of 24 hours before being marked as past due. You can limit the amount of data that appears in the report by entering filter parameters for the Protected server option. Information displayed in the Overnight Summary report is described in the following table. Overnight Summary Report

874

Item

Description

Resource

System being protected.

Type

Specific type of backup. For more information on backup methods, see “Backup method for files” on page 254.

Start time

Date and time the operation started. Administrator’s Guide

Advanced Reporting Capabilities Overnight Summary Report (continued) Item

Description

Status

Status of the operation.

Error Category

The category for the job that may be generated by a system, job, media, or device error.

Media Server

Name of the media server on which the job ran.

Device Name

Name of the device on which the job ran.

Total Tasks

Total number of jobs run within the last 24 hours.

Uncorrected Exceptions Number of jobs that failed and were not run again with successful completion. Service Level

Percentage of jobs that ran successfully.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Problem Files Report

Information displayed in the Problem Files report is described in the following table. Problem Files Report Item

Description

Date

Date the problem file was encountered.

Resource

System on which the problem file is located.

Time

Time the problem file was encountered.

Reason

The error code listed in the job log summary.

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

875

Admin Plus Pack

The Problem Files report lists all the problem files reported for jobs. The files are grouped by day and resource. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option and range parameters for the Days option.

Advanced Reporting Capabilities Problem Files Report (continued) Item

Description

File Name

Name of the problem file.

Type

Specific type of file that caused the problem.

Media Server

Name of the server on which the file is located.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Recently Written Media Report The Recently Written Media report lists all the media that has been modified within the specified period. You can limit the amount of data that appears in the report by selecting range parameters for the Hours option. Information displayed in the Recently Written Media report is described in the following table. Recently Written Media Item

Description

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Location

Location of the media, such as the storage vault name or drive name.

Set

Name of backup set.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

876

Administrator’s Guide

Advanced Reporting Capabilities

Resource Risk Assessment Report The Resource Risk Assessment report shows job information for resources on which the last backup job that was run on the resource failed. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option. Information displayed in the Resource Risk Assessment report is described in the following table. Resource Risk Assessment Report Item

Description

Resource

The system on which the job ran.

Error Text

Describes the event that caused the job to fail.

Start Time

Time the operation started.

Job

Name of the job that failed.

Error Category

The category for the failed job that may be generated by a system, job, media, or device error.

Media Server

Name of the media server on which the job ran.

Device Name

Name of the device on which the job ran.

Admin Plus Pack

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

877

Advanced Reporting Capabilities

Retrieve Media from Vault Report The Retrieve Media from Vault report lists all reusable media currently in a specified media vault. You can limit the amount of data that appears in the report by selecting filter parameters for the Vault option. Information displayed in the Retrieve Media from Vault report is described in the following table. Retrieve Media from Vault Report Item

Description

Media Label

Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label.

Location

Name of the vault where the media is located.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Scheduled Server Workload The Scheduled Server Workload report displays the estimated scheduled workload for a server during the next 24-hour period or a user-defined time period. The report only displays recurring jobs that have already run at least one time, not jobs scheduled to run once. You can limit the amount of data that appears in the report by selecting filter parameters for the Media server option and range parameters for the Hours option. Information displayed in the Scheduled Server Workload report is described in the following table. Scheduled Server Workload Report

878

Item

Description

Media Server

Name of the media server that will process the scheduled jobs.

Job

Name of the job scheduled to run.

Next Due Date

The time and day the next job is scheduled to run.

Administrator’s Guide

Advanced Reporting Capabilities Scheduled Server Workload Report (continued) Item

Description

Backup Size, MB

Estimated amount of data in megabytes to be processed during the next 24 hours.

Total Size (MB)

Total amount of data to be processed on the server during the next 24 hours.

Total Size (MB)

Total amount of data to be processed on all media servers.

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Template Definition Usage Report The Template Definition Usage report shows the usage of template definitions by resource. You can limit the amount of data that appears in the report by selecting filter parameters for the Protected server option. Information displayed in the Template Definition Usage report is described in the following table.

Admin Plus Pack

Template Definition Usage Report Item

Description

Template Name

Name of the job template.

Job

Name of the job that used the template.

Set Description

Describes the data that was backed up and the location of the data.

Resources protected by System being protected. this template

See also: “Running a Report” on page 521 “Running and Viewing a New Report Job” on page 524

Appendix B, VERITAS Backup Exec - Admin Plus Pack Option

879

Advanced Reporting Capabilities

880

Administrator’s Guide

VERITAS Backup Exec - Intelligent Disaster Recovery Option

C

Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR) Option enables you to quickly and efficiently recover Windows computers after a disaster. The IDR wizards guide you in preparing for disaster recovery and in recovering a local or remote computer to its pre-disaster state. A complete intelligent disaster recovery consists of: a. Specifying a location where a copy of the computer-specific disaster recovery file will be stored. b. Running full backups of the hard drives of the computers to be protected. c. Running the IDR Preparation Wizard to create bootable media and recovery diskettes for each computer. d. Recovering a computer using the IDR Recovery Wizard and the recovery media. During initial startup, a wizard guides you through setting an alternate data path for the computer-specific disaster recovery file, called a *.dr file, in which the asterisk (*) represents the name of the computer for which the file was created. A *.dr file contains specific information for the computer you are protecting, including: Hardware-specific information for each computer, such as hard disk partition information (Windows 2000 and NT only), mass storage controller information, and Network Interface Card information.



A list of catalog entries that identify the backup media used to recover the computer.



For Windows XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration information. The ASR files are necessary to recreate partitions on Windows XP and Windows Server 2003 computers during the recovery process.

The default data path for the *.dr file is on the media server’s hard drive, but it is recommended that you specify an alternate data path to store another copy of the *.dr file in case the media server’s hard drive is damaged.

Final: 6 February 2004

881

IDR



The IDR Preparation Wizard guides you through the preparation of bootable media used to recover protected computers and copies the *.dr file and other recovery information to the Intelligent Disaster Recovery diskette. You can create three types of bootable media with the IDR Preparation Wizard: ◆

Diskettes (not supported for Windows XP or Windows Server 2003)



CD-R (CD-Recordable) or CD-RW (CD-Rewritable)



Bootable tape (the tape device must support bootable specifications)

Consider what type of Windows computer is being protected, the available hardware, and the system BIOS when selecting the type of bootable media to create. You can also combine media to make updating the *.dr files easier. If you are using bootable CD-R or CD-RW, or tape, you can still back up the *.dr files to diskette using the IDR Preparation Wizard so that you can easily update them when required. Use the chart below to decide which type of media to use. Bootable Media Comparison Chart Type of Media

Advantages

Disadvantages

Diskettes

Works on most computers.

Requires more preparation and recovery time than CDs and tapes.

Can also be used to protect remote Windows computers on the network. Can create bootable diskettes for remote computers. CD-R, CD-RW

Not supported for Windows XP or Windows Server 2003.

Requires less preparation and Requires a BIOS that supports recovery time than diskettes. booting from a CD. Can also be used to protect remote Windows computers on the network.

Requires a CD burner.

Can create bootable CD images for remote computers. Bootable tape

Requires less preparation and Requires a BIOS that supports recovery time than diskettes. booting from a SCSI CD and a bootable tape device that emulates a SCSI CD drive. Cannot create bootable tape images for remote computers.

882

Administrator’s Guide

Backup Exec creates the *.dr file during a full backup and stores it in the default and alternate storage locations. Catalog entries from subsequent backups are added to the *.dr file as these backups are completed. After setting up an alternate data location for the *.dr file, run full backups for the hard drives, and then run the IDR Preparation Wizard to create the bootable and recovery media. Note When creating a bootable tape image, the bootable tape image must be created before running full backups. You will be prepared to successfully recover local or remote computers, using any of the following recovery methods: ◆

Restore a media server (Backup Exec server) using a locally attached storage device.



Restore a Windows computer by moving the media and the storage device to the computer being restored, and then restoring the computer through the locally attached storage device.



Restore a remote Windows computer using a network connection to the media server

See also: “Getting Started with IDR” on page 885 “Creating and Updating Recovery Media” on page 891

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

883

Requirements for Using IDR ◆

VERITAS Backup Exec for Windows Servers.



The VERITAS Backup Exec for Windows Servers Remote Agent or Backup Exec must be installed on any remote computers to be protected with IDR.



Windows NT recovery requires at least 40 MB of hard drive space to hold the minimal recovery system, as well as sufficient space for the data that is being restored. The required hard drive space for a 2.0 GB partition storing 1.8 GB of data is 1.8 GB plus 128 MB plus 40 MB for a total of 1.97 GB.



Windows 2000/XP/Server 2003 recovery requires sufficient hard drive space to hold an entire Windows installation (600 MB to 2 GB).

Note Disaster recovery from virtual devices, such as Backup-to-Disk devices, must be done via Remote IDR using a media server with access to the virtual device. Mixed media loaders are not supported for local IDR. See also:

“Requirements for Running the IDR Preparation Wizard” on page 894 “Using an Evaluation Version of the IDR Option” on page 885

Installing the IDR Option You can install IDR as an option during the initial installation of Backup Exec for Windows Servers, or it can be installed later. Install the Intelligent Disaster Recovery option on the media server first (the server on which Backup Exec is installed), and then enter a serial number for the Intelligent Disaster Recovery Additional Client option for each additional remote computer. All IDR serial numbers, both local and remote, are entered on the local media server. The Backup Exec Remote Agent must be purchased separately from the IDR option, and must also be installed on any remote computer on which the Intelligent Disaster Recovery Additional Client option is installed. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. The IDR Configuration Wizard runs as part of the First Time Startup Wizard when Backup Exec is started for the first time, and also runs when the IDR option is installed after Backup Exec is installed. See also: “Getting Started with IDR” on page 885 884

Administrator’s Guide

Getting Started with IDR

Using an Evaluation Version of the IDR Option The Intelligent Disaster Recovery option can be installed and evaluated until the evaluation period expires or until Backup Exec and IDR are licensed, but you must recreate the IDR recovery media after the IDR option has been purchased and installed. The recovery media includes the boot media and the Intelligent Disaster Recovery diskette. If you must use the IDR Recovery Wizard to recover a computer after the evaluation period has expired, you will be prompted to enter a valid IDR serial number to continue the recovery process, unless you recreated IDR recovery media after IDR was licensed.

Getting Started with IDR The IDR Configuration Wizard appears the first time Backup Exec is started after IDR is installed. This wizard prompts you to set an alternate data path for the computer-specific disaster recovery file, called a *.dr file. The asterisk (*) represents the name of the computer for which the file was created. A *.dr file contains specific information for the computer being protected, including: ◆

Hardware-specific information for each computer, such as hard disk partition information (Windows 2000 and NT only), mass storage controller information, and Network Interface Card information.



A list of catalog entries that identify the backup media used to recover the computer.



For Windows XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration information. The ASR files are necessary to recreate partitions on Windows XP and Windows Server 2003 computers during the recovery process.

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

885

Getting Started with IDR ▼

To run the IDR Configuration Wizard: 6. On the Welcome screen, click Next. Backup Exec automatically creates a *.dr file for the IDR-protected computer when it is backed up and stores it in the default location on the media server’s hard drive, which is: C:\Program Files\VERITAS\Backup Exec\NT\IDR\Data\.DR. The screen Enter An Alternate Data Path allows you to specify an alternate location where a copy of the *.dr file can be stored so that the *.dr file is available even if the media server has been damaged.

It is recommended that the alternate location be on another computer or on a different physical drive than the default location. Note When using Backup Exec’s Remote Administrator, specifying drive A: as the Alternate Data Path points to the media server’s floppy disk drive. The remote computer’s drive A: is not used as the Alternate Data Path unless the full path is entered and a valid share exists for this drive. Be sure to check the path and make sure that the correct computer and directory path are specified.

886

Administrator’s Guide

Getting Started with IDR

7. Enter the alternate location where a copy of the *.dr file will be stored, and then click Next. Note If you are using IDR to protect a media server in a cluster, or any remote media server, set the alternate data path to a shared drive or to a drive outside the cluster. 8. If the computer does not have a locally attached bootable tape device, the IDR configuration is complete. You are ready to run backups and create bootable media. Go to “Creating and Updating Recovery Media” on page 891 to continue disaster recovery preparation. If a bootable tape device is detected, you are prompted to create a bootable tape image.

9. Do one of the following: a. Click Yes, create the image now (recommended), click Next, and then continue with step 10.

IDR

b. Click No, I will create the image later, and then click Next. The IDR Configuration wizard is finished. Create the bootable image for tape later by running the IDR Preparation Wizard before running the overwrite backup job or the tape will not be bootable. Go to “Creating and Updating Recovery Media” on page 891 to continue disaster recovery preparation.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

887

Setting Data Paths for the *.dr Files

10. When the Starting Tape Image Creation screen appears, the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is selected by default. Selecting this option allows IDR to automatically partition the boot and system drives for a Windows 2000 computer during the recovery process, and to restore any utility partitions that previously existed. 11. If you clear this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition or reformat the boot and system drives. Click Next to continue. The completed IDR Configuration screen appears . The bootable tape image is stored on this computer. When you run an overwrite backup job for this computer, the bootable image is written to the tape. Go to “Creating and Updating Recovery Media” on page 891 to continue disaster recovery preparation. See also: “Using IDR to Recover a Computer” on page 917 “Creating and Updating Recovery Media” on page 891 “Backing Up Data” on page 239 “Creating a Bootable Tape Image” on page 903

Setting Data Paths for the *.dr Files Copies of the *.dr files, which contain the computer-specific information for the computer being protected, are necessary to automate the recovery of an IDR-protected computer. Backup Exec automatically creates the *.dr file during a backup and stores it in the Disaster Recovery Data Path default location on the media server’s hard drive, which is C:\Program Files\VERITAS\Backup Exec\NT\IDR\Data\.DR. It is recommended that you do not change this default. You can also specify an alternate location where a second copy of the *.dr file is stored so that the *.dr file is available even if the media server has been damaged. It is recommended that the alternate location be on another computer or on a different physical drive than the default location.

888

Administrator’s Guide

Setting Data Paths for the *.dr Files ▼

To set the default and alternate data paths for the *.dr file: 1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Intelligent Disaster Recovery.

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

889

Setting Data Paths for the *.dr Files

3. Enter the data paths as described in the following table: Intelligent Disaster Recovery Options - Set Application Defaults Item

Description

Data path

Enter a directory path where a copy of the *.dr file for the protected computer will be stored. Backup Exec automatically creates the *.dr file during a backup and stores it in the default location on the media server’s hard drive, which is C:\Program Files\VERITAS\Backup Exec\NT\IDR\Data\.DR.

Alternate data path

Enter an alternate directory path where a copy of the *.dr files for the protected computers will be stored. Backup Exec automatically creates or updates the *.dr file during a backup and stores it in the specified location. It is recommended that you specify an alternate data path that is not on the media server, or is on a different physical drive than the default location. During a recovery, you can copy the *.dr file from the alternate path to a diskette to recover the target computer if the media server’s hard drive is unavailable. Š

If you are specifying a remote computer’s hard drive as the alternate data path, browse to or type the path to the remote computer’s directory that will contain the disaster recovery data files: \\\ Check the directory later to make sure the *.dr files were copied.

Š

If you are specifying a directory on a different physical hard drive on the local computer, browse to or type the drive name and the path: d:\drfiles

Note When using Backup Exec’s Remote Administrator, specifying drive A: as the Alternate Data Path points to the media server’s floppy disk drive. The remote computer’s drive A: is not used as the Alternate Data Path unless the full path is entered and a valid share exists for this drive. Be sure to check the path and make sure that the correct computer and directory path are specified.

890

Administrator’s Guide

Creating and Updating Recovery Media

Creating and Updating Recovery Media Before running the IDR Preparation Wizard to create or update the recovery media, run a full backup of the hard drive (unless you are creating bootable tape media - see “Creating a Bootable Tape Image” on page 903 for details). The *.dr file is created when a full backup of the entire hard drive is run. After the *.dr file is created, Backup Exec automatically updates it with data from all subsequent backups (except copy backups) in its default location on the computer and in the alternate location you specified. Update all *.dr files on the Intelligent Disaster Recovery diskette by running the IDR Preparation Wizard and selecting Update Intelligent Disaster Recovery diskette only. Whenever backups are run, an alert appears reminding you to use the IDR Preparation Wizard to update the *.dr files on the Intelligent Disaster Recovery diskette, or you can manually copy the *.dr file from a default location to the Intelligent Disaster Recovery diskette or to another diskette. If you use another diskette, label it and store it with the rest of the disaster recovery diskettes. To see the default locations, on the Tools menu, click Options, and then in the Properties pane, click Intelligent Disaster Recovery. If you do not run a full backup before running the IDR Preparation Wizard, you can still create all the media, but the computer-specific *.dr file will not contain the catalog entries for the backup sets, and during the recovery phase, you will have to manually search for and restore the backup sets necessary to recover the computer. The IDR Preparation Wizard guides you through creating or updating bootable media and creating or updating a recovery diskette that together contain all of the files required to recover a Windows computer: Note If the bootable media are diskettes, the Windows operating system CD is also required for recovery; it is not required if the bootable media is tape or CD. ◆

The bootable media contain the system files necessary to make a failed Windows computer operational after a disaster. Create a new bootable image whenever hardware, SCSI drivers, or storage device drivers change on the computer that is being protected.

Prepare and test bootable media before a disaster to make sure that the media was prepared correctly. For more information on testing the bootable media, see “Booting the Computer in an IDR Recovery” on page 921.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

891

IDR

For Windows NT, more information on choosing SCSI drivers during the SCSI host adapter (HBA) detection phase of the IDR Preparation Wizard is in “Choosing Generic or Current SCSI Drivers for Windows NT” on page 893.

Creating and Updating Recovery Media ◆

The recovery diskettes, which you can create and update separately from the bootable media by using the IDR Preparation Wizard, are labeled the Intelligent Disaster Recovery diskette 1 and 2, and contain: -

One or more *.dr files, which include computer-specific information such as hardware-specific information, and catalog entries that identify the media necessary to recover the computer. For XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration information is also included and is required in order to recreate critical partitions on these computers during the recovery process.

-

Any necessary drivers.

-

The Disaster Recovery Wizard. These items are copied to the Intelligent Disaster Recovery diskette. Create and update this diskette separately from the bootable media. At times, the *.dr file may not fit on the Intelligent Disaster Recovery diskettes. If this occurs, copy the *.dr file to a separate diskette.

See also: “Creating A Full Set of Diskettes” on page 897 “Creating a Bootable CD Image” on page 901 “Creating a Bootable Tape Image” on page 903 “Creating the Intelligent Disaster Recovery Diskettes Only” on page 905 “Updating the Full Set of Disaster Recovery Diskettes” on page 907 “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909 “Updating Bootable Media” on page 912

892

Administrator’s Guide

Creating and Updating Recovery Media

Choosing Generic or Current SCSI Drivers for Windows NT For Windows NT only, after you have selected all of the computers for which to prepare recovery media, the IDR Preparation Wizard searches for SCSI host adapter (HBA) information. If a SCSI driver version is detected on any of the selected computers that is different from the version on the Windows installation CD, you are prompted to use either the default SCSI drivers that are on the Windows installation CD, or the SCSI drivers that are installed on those computers. ◆

Select Use default SCSI drivers that are available on the inserted CD when creating disaster recovery media for multiple computers or for a computer other than the selected computer. If you do not know whether or not Windows NT supports a driver, select this option and add the driver at a later time. For more information, see “Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 931.



Select Use SCSI drivers currently installed on this system, which is the default, when creating disaster recovery media for the selected computer. This option adds the drivers currently installed on the selected computer to the Setup diskettes.

Note In most cases, use the SCSI drivers currently installed on the computer being protected because the drivers contained on the Windows installation CD may not be up-to-date. If there is an IDE hard disk greater than 8 GB, select Use SCSI drivers currently installed on this system. Since IDR runs at a Service Pack 0 or 1 level, some SCSI drivers, such as Symbios Logic drivers, will not work because they rely on later Service packs. If there are different SCSI driver versions on the selected computers, the Driver Versions Do Not Match screen appears. Select which driver version is to be put into the bootable image. Options include: First version found. Hardware installation diskettes may be required for the highlighted computers.

-

Latest date time stamp. The newest drivers may not work on older hardware.

-

Only drivers from Windows setup media. Hardware installation diskettes may be required for some computers.

Note Click Back to try a different set of computers. If more computers are highlighted as incompatible, try clearing the first computer name in the list to find a larger set of computers with compatible SCSI driver versions. Consider updating all computers to the same service pack level to eliminate SCSI driver version differences.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

893

IDR

-

Creating and Updating Recovery Media

Requirements for Running the IDR Preparation Wizard Please note the following before running the IDR Preparation Wizard: ◆

Run a full backup of the hard drive before creating the boot and recovery media (unless you are creating a bootable tape image). When running full backups for IDR preparation: -

894

Make sure that volume (C, D, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally: -

For Windows 2000, back up System State.

-

For Windows Server 2003, back up Shadow Copy components.

-

Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors and contain system diagnostic and configuration utilities. Do not include or exclude files from the backup using the Advanced File Selection feature.

-

Make sure that if the computer is a remote computer, a compatible version of the Backup Exec Remote Agent has been installed on it. To determine if the Remote Agent is installed on a remote computer, from Windows Explorer, right-click the remote server and then from the shortcut menu, click Properties. The status of the Remote Agent, if installed, is displayed.

Administrator’s Guide

Creating and Updating Recovery Media ◆

The Windows installation CD that matches the version and language (English, French, etc.) installed on the protected system is required. For example, if you are running the IDR Preparation Wizard from a computer running Windows 2000, but the computer you want to prepare recovery media for is running Windows NT, then you must have a Windows NT installation CD with the same language and type of licensing that is on the Windows NT computer. To prepare recovery media for a remote computer, note that: -

A Windows 2000 computer can create recovery media only for another Windows 2000 computer or for a Windows NT computer.

-

A Windows NT computer can create recovery media only for other Windows NT computers.

-

Windows XP and Windows Server 2003 computers can create recovery media for all Windows 2000, NT, XP, and Windows Server 2003 computers.

Note To prepare recovery media for a computer that is running Windows NT 4.0 Terminal Server edition, insert a standard Windows NT 4.0 installation CD when prompted instead of the Windows NT 4.0 Terminal Server installation CD that matches the operating system in the target computer. ◆

For Windows 2000, XP, and Windows Server 2003: If the Windows product key does not appear on this screen by default, type the Windows product key in the space provided, and then click Next. This product key is saved on the recovery media so that it does not have to be manually entered during recovery.



Administrative privileges for the protected computer are required.

See also:

“Creating A Full Set of Diskettes” on page 897 “Creating a Bootable CD Image” on page 901

IDR

“Creating the Intelligent Disaster Recovery Diskettes Only” on page 905 “Creating a Bootable Tape Image” on page 903 “Updating the Full Set of Disaster Recovery Diskettes” on page 907 “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909 “Updating Bootable Media” on page 912.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

895

Creating and Updating Recovery Media

Running the IDR Preparation Wizard The IDR Preparation Wizard guides you through the creation or update of bootable media used to recover protected computers and through the creation or update of the Intelligent Disaster Recovery diskette. To start the IDR Preparation Wizard, on the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. When running the IDR Preparation Wizard, the local computer that the IDR option is installed on is used by default to create or update the disaster recovery media. However, if the computer does not have the IDR option installed locally, select Choose a different media server to select another media server on which the IDR option is installed in order to create or update the media. See also: “Creating and Updating Recovery Media” on page 891 “Requirements for Running the IDR Preparation Wizard” on page 894 “Preparing IDR Media Via Other Media Servers” on page 915 “Creating A Full Set of Diskettes” on page 897 “Creating a Bootable CD Image” on page 901 “Creating a Bootable Tape Image” on page 903 “Creating the Intelligent Disaster Recovery Diskettes Only” on page 905 “Updating the Full Set of Disaster Recovery Diskettes” on page 907 “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909 “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881

896

Administrator’s Guide

Creating and Updating Recovery Media

Creating A Full Set of Diskettes Use the IDR Preparation Wizard to create the bootable diskettes and the Intelligent Disaster Recovery diskette. The IDR Preparation Wizard also enables you to update the *.dr file on the Intelligent Disaster Recovery diskette on a regular basis and to recreate the bootable diskettes whenever hardware, SCSI drivers, or tape drivers change on the protected computer. In addition to the requirements listed in “Requirements for Running the IDR Preparation Wizard” on page 894, note the following: ◆

For Windows XP or Windows Server 2003, bootable diskettes are not supported.



At least six blank, formatted 1.44 MB diskettes for each set of disaster recovery diskettes to be created are required (for Windows NT computers, at least five diskettes are required). Do not use the Quick Format option when formatting the diskettes. Quick Format removes files from the diskette without scanning it first for bad sectors that can make the diskette unusable.



For Windows NT: -

Since SCSI information for each computer can be included on the disaster recovery media, create a set of disaster recovery diskettes for each computer on the enterprise.

-

The following warning message is displayed when preparing IDR diskettes for Windows NT 4.0 Enterprise Edition: "You are installing Windows NT Server, Enterprise Edition on a system where a Windows NT Service Pack has been installed. Setup for Windows NT Server, Enterprise Edition is only to be used for a new installation. Choose ’Cancel’ and use the Windows NT Upgrade option (winntup.exe) to upgrade your current configuration." There are two workarounds for this situation: Make a bootable CD instead of diskettes.

-

Run the IDR Preparation Wizard from another, non-Windows NT Enterprise Edition computer, and designate the remote Enterprise Edition computer as the target.

For Windows 2000: -

To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery, and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive (Windows 2000 only) when creating recovery media for a computer.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

897

IDR



-

Creating and Updating Recovery Media

If this option is not selected, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. See “Using IDR To Recover Windows 2000 Computers” on page 919. -

If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is selected, create a full set of recovery diskettes for every Windows 2000 computer to be protected with IDR.

-

If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is not selected, you can use the same diskettes 2 through 5 for all IDR-protected Windows 2000 computers, but you must modify diskette 1 for each computer. The Intelligent Disaster Recovery diskette may also store computer-specific *.dr files, and may need to be recreated for each computer as well. For instructions on modifying diskette 1, see “Modifying Diskette Sets for Use with Multiple Windows 2000 Computers” on page 900. For instructions on update the Intelligent Disaster Recovery diskette, see “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909.





Prior to a disaster, test the bootable diskettes to ensure that the computer can boot from them.

To create bootable diskettes: 1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to create the full set of disaster recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to create the disaster recovery diskettes. 2. Do one of the following: a. To use another computer to create the disaster recovery diskettes, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to create disaster recovery diskettes, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

898

Administrator’s Guide

Creating and Updating Recovery Media

3. Select Create - Full set of diskettes to boot the Windows Installation CD, and then click Next. The Starting Bootable Diskettes Creation screen appears. 4. Follow the prompts until the IDR Preparation Wizard is completed. 5. If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is not selected when recovery media is created, you can use the same diskettes 2 through 6 for all IDR-protected Windows 2000 computers, but you must modify diskette 1 for each computer. For details, see “Modifying Diskette Sets for Use with Multiple Windows 2000 Computers” on page 900. See also: “Booting the Computer in an IDR Recovery” on page 921 “Choosing Generic or Current SCSI Drivers for Windows NT” on page 893

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

899

Creating and Updating Recovery Media

Modifying Diskette Sets for Use with Multiple Windows 2000 Computers If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is not selected when recovery media is prepared, create a different diskette 1 for each computer protected with IDR, and then use the same diskettes 2 through 5 for all of the Windows 2000 computers. Diskette 1 contains a file named winnt.sif, which is the script used to automate the installation of Windows 2000 for disaster recovery when using the IDR option. This scripted installation of Windows 2000 requires that a computer name be listed in the winnt.sif file to name the computer during Windows 2000 setup. Winnt.sif file

Because Windows 2000 automated installations allow only one computer name to be listed in this script, edit the winnt.sif file and change the computer name to another Windows 2000 computer to be recovered. If the computer name is not modified, duplicate computer names on the network may result, and may prevent the recovered server from participating on the network. The Intelligent Disaster Recovery diskette may also store computer-specific *.dr files, and may need to be recreated for each computer as well. See also: “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909

900

Administrator’s Guide

Creating and Updating Recovery Media

Creating a Bootable CD Image Use the IDR Preparation Wizard to create a bootable CD image, and then run the wizard again to create the Intelligent Disaster Recovery diskette to complete the disaster recovery media. The IDR Preparation Wizard also enables you to update the *.dr file on the Intelligent Disaster Recovery diskette on a regular basis and to recreate the bootable CD image whenever hardware, SCSI drivers, or tape drivers change on the computer. For Windows XP and Windows Server 2003 computers, you will be prompted to copy the Windows Automated System Recovery (ASR) files to either a diskette or to the CD, along with the bootable image. The ASR files are necessary to recreate critical partitions on these computers during the recovery process. If you choose to add the ASR files to the CD image, it may make the recovery process easier since you would not need to locate the diskette that the files are stored on. In addition to the requirements listed in “Requirements for Running the IDR Preparation Wizard” on page 894, note the following: Backup Exec includes support for burning the disaster recovery CD image to supported CD-R and CD-RW drives. Supported drives include all CD writing systems supported with VERITAS Simple Backup. If a CD-R or CD-RW drive is not supported by this component, use a third party ISO 9660-compliant application. You should verify the image created by third-party CD burning software before you need it for disaster recovery.



CD-R is the recommended media for creating a bootable CD image. If CD-RW media is used, the CD drive must have MultiRead ability; otherwise, inconsistent behavior may occur when running IDR. Test the media with the CD drive before relying on it for disaster recovery.



A blank, writable or rewritable CD is required if the VERITAS IDR CD writing feature is used.



To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive (Windows 2000 only) when creating recovery media for a computer. If you do not select this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. See “Using IDR To Recover Windows 2000 Computers” on page 919.



Prior to a disaster, test the bootable CD to ensure that the computer can boot from it.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

901

IDR



Creating and Updating Recovery Media ▼

To create a bootable CD image: 1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to create a bootable CD image. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to create a bootable CD image. 2. Do one of the following: a. To use another computer to create the bootable CD image, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to create the bootable CD image, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

3. Select Create - Bootable CD Image for use with CD Writers (ISO 9660), and then click Next.

902

Administrator’s Guide

Creating and Updating Recovery Media

4. Follow the prompts until the wizard is completed. During the creation of the CD image, the logging area of the screen is inactive. When the process completes, the logging window can be scrolled or copied to the clipboard by selecting the text and pressing . This logging information can then be pasted into a text editor or e-mailed to Technical Support. 5. When the bootable CD image is complete, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskettes. See also: “Booting the Computer in an IDR Recovery” on page 921 “Creating the Intelligent Disaster Recovery Diskettes Only” on page 905 “Choosing Generic or Current SCSI Drivers for Windows NT” on page 893

Creating a Bootable Tape Image Use the IDR Preparation Wizard to create a bootable tape image, and then run an overwrite backup job so that the image is written to the tape. Next, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskette. The IDR Preparation Wizard also enables you to update the *.dr file on the Intelligent Disaster Recovery diskette on a regular basis, and to recreate the bootable tape image whenever hardware, SCSI drivers, or tape drivers change on the computer. Prior to a disaster, test the bootable tape to ensure that the computer can boot from it. Follow the tape drive manufacturer’s documentation for testing tape drive booting capability. Before starting this procedure, please read the requirements listed in “Requirements for Running the IDR Preparation Wizard” on page 894. ▼

To create a bootable tape image: Note A bootable tape drive and its driver must be detected by the Intelligent Disaster Recovery Preparation Wizard before the option to create a bootable tape image is displayed.

By default, the IDR Preparation Wizard uses this computer to prepare the bootable tape image. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to create the boot image.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

903

IDR

1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard.

Creating and Updating Recovery Media

2. Do one of the following: a. To use another computer to create the bootable tape image, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to create the bootable tape image, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

3. Select Create - Bootable Tape Image for use with bootable tape devices, and then click Next. The Starting Tape Image Creation screen appears. 4. To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery, and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive (Windows 2000 only). If you do not select this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. See “Using IDR To Recover Windows 2000 Computers” on page 919. 5. Continue following the prompts until the wizard is completed.

904

Administrator’s Guide

Creating and Updating Recovery Media

6. When the bootable tape image has completed, run an overwrite backup job so that the bootable image is written to the tape. 7. When the backup job has completed, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskettes. See also:

“Choosing Generic or Current SCSI Drivers for Windows NT” on page 893 “Updating Bootable Media” on page 912 “Booting the Computer in an IDR Recovery” on page 921

Creating the Intelligent Disaster Recovery Diskettes Only Create just the Intelligent Disaster Recovery (IDR) diskettes to complete the disaster recovery media if the computer being protected has a bootable tape image or bootable CD image already created or if the boot image has just been updated. The Intelligent Disaster Recovery diskettes includes necessary drivers, the Disaster Recovery Wizard, and the computer-specific *.dr file. The Intelligent Disaster Recovery Preparation Wizard creates two diskettes. Note This option is not supported in Windows NT. When the Intelligent Disaster Recovery diskettes are complete, click View Disk Configuration to display the Disk Configuration Report. It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives. ▼

To create the Intelligent Disaster Recovery diskettes only: 1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

905

IDR

By default, the IDR Preparation Wizard uses this computer to create the Intelligent Disaster Recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to create the Intelligent Disaster Recovery diskettes.

Creating and Updating Recovery Media

2. Do one of the following: a. To use another computer to create the Intelligent Disaster Recovery diskettes, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to create the Intelligent Disaster Recovery diskettes, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

3. Select Intelligent Disaster Recovery diskettes only, and then click Next. 4. Follow the prompts until the wizard is completed. 5. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report. It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives. 6. Remove the diskette from the drive and store both with the rest of the disaster recovery media.Both diskettes will be labeled as Intelligent Disaster Recovery. See also: “Updating the Intelligent Disaster Recovery Diskettes Only” on page 909

906

Administrator’s Guide

Creating and Updating Recovery Media

Updating the Full Set of Disaster Recovery Diskettes It is recommended that you update the full set of disaster recovery diskettes if there are hardware changes or if SCSI drivers or tape drivers change on the computer being protected. If you only need to update the *.dr file, choose the Update - Intelligent Disaster Recovery diskettes only option, or manually copy this file from the default or alternate locations to the Intelligent Disaster Recovery diskette #2 or to another diskette. If you use another diskette, label it and store it with the rest of the disaster recovery diskettes. To see the default locations, on the Tools menu, click Options, and then in the Properties pane, click Intelligent Disaster Recovery. To be reminded to update the disaster recovery diskettes, create a reminder message using Backup Exec’s Alert Notification Setup feature. When you have finished updating the recovery diskettes, click View Disk Configuration to display the Disk Configuration Report. It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives. Note When updating diskettes for a Windows 2000 computer, you will need to have all of the diskettes available during the update. ▼

To update the disaster recovery diskettes: 1. Run a full backup of the target computer. When running full backups for IDR preparation: -

Make sure that volume (C, D, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally: -

For Windows 2000 and Windows XP, back up System State.

-

For Windows Server 2003, back up Shadow Copy components.

Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors, and contain system diagnostic and configuration utilities. Do not include or exclude files from the backup using the Advanced File Selection feature.

-

Make sure that if the computer is a remote computer, the Backup Exec Remote Agent has been installed on it.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

907

IDR

-

Creating and Updating Recovery Media

2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to update the full set of disaster recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to update the diskettes. 3. Do one of the following: a. To use another computer to update the disaster recovery diskettes, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to update the disaster recovery diskettes, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

4. Under Update, select Full set of diskettes used to boot the Windows Installation CD, and then click Next. 5. Follow the prompts until the wizard is completed.

908

Administrator’s Guide

Creating and Updating Recovery Media

6. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report. It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives. 7. Remove the diskette from the drive and store it with the rest of the disaster recovery media. The full set of diskettes used to boot the Windows installation CD are now updated. See also: “Choosing Generic or Current SCSI Drivers for Windows NT” on page 893

Updating the Intelligent Disaster Recovery Diskettes Only Select this option to update the Intelligent Disaster Recovery diskettes. You do not have to recreate the Intelligent Disaster Recovery diskettes, only update them. When you select this option, the following is updated: ◆

Hardware-specific information for each computer, such as hard disk partition information (Windows 2000 and NT only), mass storage controller information, and Network Interface Card information.



Catalog entries that identify the backup media used to recover the computer.



For Windows XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration files are contained in the asr.sif and adrpnp.sif files. The ASR files are necessary to recreate partitions on Windows XP and Windows Server 2003 computers during the recovery process.

Note If you created a bootable CD image and chose to create and add the ASR files to the CD image, you must recreate the bootable CD image to update the ASR files. ◆

Necessary drivers.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

909

IDR

When you have finished updating the Intelligent Disaster Recovery diskettes, click View Disk Configuration to display the Disk Configuration Report. It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives.

Creating and Updating Recovery Media ▼

To update the Intelligent disaster Recovery diskettes only: 1. Run a full backup of the target computer. When running full backups for IDR preparation: -

Make sure that the default shares on each hard disk volume (C$, D$, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally: -

For Windows 2000, back up System State.

-

For Windows Server 2003, back up Shadow Copy components.

-

Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors, and contain system diagnostic and configuration utilities. Do not include or exclude files from the backup using the Advanced File Selection feature.

-

Make sure that if the computer is a remote computer, the Backup Exec Remote Agent has been installed on it.

2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to update the Intelligent Disaster Recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to update the Intelligent Disaster Recovery diskettes.

910

Administrator’s Guide

Creating and Updating Recovery Media

3. Do one of the following: a. To use another computer to update the Intelligent Disaster Recovery diskettes, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to update the Intelligent Disaster Recovery diskettes, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

4. Select Update - Intelligent Disaster Recovery diskettes only, and then click Next. 5. Follow the prompts until the wizard is completed. 6. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report.

The Intelligent Disaster Recovery diskettes are now updated. 7. Remove diskette #2 from the drive and store both diskettes with the rest of the disaster recovery media.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

911

IDR

It is recommended that you save this report to another drive or to a diskette, since this information may be helpful during recovery if you did not choose to allow IDR to automatically partition the boot and system drives.

Creating and Updating Recovery Media

Updating Bootable Media If the media server hardware configuration changes, run the IDR Preparation Wizard and create a new bootable image. If you initially created a bootable image on CD, create a new bootable CD image, run a full backup of the protected computer, and then run the IDR Preparation Wizard to update the Intelligent Disaster Recovery diskette. For more information, see “Creating a Bootable CD Image” on page 901. If you initially created bootable diskettes, update the full set of diskettes. For more information, see “Updating the Full Set of Disaster Recovery Diskettes” on page 907. To update a bootable tape image, use the following procedure. Note A bootable tape drive and its driver must be detected by the Intelligent Disaster Recovery Preparation Wizard before the option to create a bootable tape image is displayed. ▼

To update the bootable tape image: 1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to update the bootable tape image. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to update the boot image.

912

Administrator’s Guide

Creating and Updating Recovery Media

2. Do one of the following: a. To use another computer to update the bootable tape image, select Choose a different media server, and see “Preparing IDR Media Via Other Media Servers” on page 915 for details. b. To use this computer to update the bootable tape image, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.

3. Select Create - Bootable Tape Image for use with bootable tape devices, and then click Next. The Starting Tape Image Creation screen appears.

If you do not select this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. If you have previously prepared a bootable image for tape, the Disaster Recovery Image Found screen appears.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

913

IDR

4. To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery, and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive (Windows 2000 only), and then click Next.

Creating and Updating Recovery Media

5. Select Delete the existing image to write the new bootable image to the bootable tape when the first overwrite backup job runs. 6. Continue to follow the prompts until the wizard is complete. 7. When the bootable image is completed, run an overwrite backup job so that the image is written to the tape. 8. When the backup job has completed, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskette. See also:

“Booting the Computer in an IDR Recovery” on page 921

914

Administrator’s Guide

Creating and Updating Recovery Media

Preparing IDR Media Via Other Media Servers When running the IDR Preparation Wizard, the local computer that the IDR option is installed on is used by default to create or update the disaster recovery media. However, if the computer does not have the IDR option installed locally, select another media server on which the IDR option is installed in order to create or update the media. ▼

To perform disaster recovery preparations on a different media server: 1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard.

2. On the IDR Preparation Wizard Welcome screen, select the option Choose a different media server, and then click Next.

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

915

Creating and Updating Recovery Media

3. Click Browse to browse the network and select a media server that has the IDR option installed, and then click Next to continue preparing disaster recover media. The media server that you select here will be the computer that actually creates the media.

916

Administrator’s Guide

Using IDR to Recover a Computer

Using IDR to Recover a Computer Caution Disconnect any storage area network (SAN) or cluster that is attached to the computer being recovered; otherwise, the hard drives on those computers may also be repartitioned and reformatted. Restoring the media server to its pre-disaster state with IDR consists of the following phases and requirements: ◆

Planning any hardware changes to the computer being recovered.



Booting the computer using the bootable media created with the IDR Preparation Wizard to install a minimal version of Windows on the computer.



Using the Windows Setup program to repartition and reformat the computer being recovered.



Using the Disaster Recovery Wizard to restore the computer to its pre-disaster state and restore the data files.

Note Boot managers, such as System Commander or the OS/2 Boot Manager, cannot be restored with IDR. Boot managers are usually installed at a very low level that Backup Exec cannot protect. For example, the OS/2 Boot Manager resides in its own hard drive partition that Backup Exec cannot access. Because of the many different boot managers available, an IDR recovery may render the computer unbootable, even though the operating system was restored. If this happens, re-installing the boot manager should fix the problem. Before recovering the computer, note the following: The hardware must be identical to the original computer except for hard disks, video cards, and network interface cards.



There must be enough disks to restore all of the critical system disks. A disk is considered critical if it is required for the computer to boot successfully.



The storage capacity of each critical disk must be greater than or equal to the corresponding original disk. Disk geometries, which may also be called disk parameters, must be compatible.



Floppy and CD devices cannot be external PC-card drives. Because external PC-card devices are not supported during the GUI-mode Windows Setup phase, they cannot be used to access data, and recovery cannot be completed.



If a *.dr file is unavailable for the computer being restored, you can still use IDR to recover the computer, but you must first manually restore the partition information, including utility partitions.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

917

IDR



Using IDR to Recover a Computer ◆

IDR does not recover software mirrored volumes or any kind of RAID with the auto-partitioning feature. You must manually apply the mirror with the Disk Manager.

See also: “Changing Hardware in the Computer to be Recovered” on page 918 “Booting the Computer in an IDR Recovery” on page 921 “Using the Windows Setup in an IDR Recovery” on page 923 “Using the Disaster Recovery Wizard” on page 926

Changing Hardware in the Computer to be Recovered If you plan to change the hardware in the computer being recovered, note the following: ◆

Hard drives. Any hard drives being added should be the same size or larger than the drive being replaced or repartitioning problems may occur.



SCSI cards. Install SCSI cards on the computer before running the IDR recovery process so that the cards can be incorporated during the restore. Only SCSI cards that are running during the recovery process are integrated into the restored Windows computer.

Note For Windows NT: Because IDR runs at a Service Pack 0 or 1 level, some SCSI drivers such as Symbios Logic drivers will not work since they rely on later service packs.

918



Network interface cards. When using IDR to recover a computer remotely, and if different network interface cards (NIC) have been installed, run the Windows Network Control Panel to remove the old NIC drivers and install the new NIC drivers.



Video hardware. If you install different video hardware, install the video driver for that hardware after the original Windows operating system boots into VGA compatibility mode. IDR will not install new video drivers.

Administrator’s Guide

Using IDR to Recover a Computer

Using IDR To Recover IBM Computers To recover an IBM computer equipped with an IBM ServeRAID card, perform the following additional procedures before starting the IDR process: ◆

The IBM ServeRAID controller card and ServeRAID software must be installed and configured in order for a boot partition to be visible to the Windows operating system.



Start the server using the IBM server’s ServeRAID Configuration and Management CD in the CD-ROM drive prior to using the IDR bootable media. This will start IBM ServeRAID utilities configuration and installation process to view and update the current BIOS and firmware levels.

Refer to the IBM ServeRAID documentation for complete installation instructions for installing Windows on an IBM Server with the ServeRAID controller. Create and initialize the ServeRAID disks in order for partitions to be visible to the Windows operating system.

Using IDR To Recover Windows 2000 Computers For Windows 2000, during the recovery phase, critical disks are automatically partitioned before Windows is reinstalled on the computer if the option Let IDR automatically partition the boot and system drive (Windows 2000 only) is selected when boot media are created for the computer. A disk is considered critical if it is required for the computer to boot successfully. Noncritical disks are repartitioned after Windows is installed on the system. To repartition noncritical disks, the boot and system partitions should be on the same partition as in the original layout, and the size of the boot and system partitions should be equal to or greater than the boot and system partitions in the original layout. If the drive letters assigned to the boot and system partitions by the Windows Setup program are not the same as they were in the original layout, they are changed back by the IDR Recovery Wizard. If the boot and system partition layouts are not compatible with the original layout, the disks are not repartitioned. The disks can be repartitioned later by using Windows Disk Administrator.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

919

IDR

For example, on the pre-disaster computer, C: was the boot drive on the first partition of the disk and D: was the system drive on the second partition. When creating the boot media, the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was not selected. During disaster recovery, the disks are replaced and in the new configuration, C: is the boot drive as well as the system drive. In this case, since the drive layouts are not compatible, the disks will not be repartitioned.

Using IDR to Recover a Computer

Only basic disks and upgraded dynamic disks (upgraded from basic) are supported. However if there are any drives created after upgrading the basic disks to dynamic, they are not supported. After disaster recovery, the disks that were upgraded dynamic disks will be basic, but can later be upgraded to dynamic by using the Windows Disk Administrator. For more information about basic and dynamic disks, refer to your Windows documentation. If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was not selected during the IDR preparation for Windows 2000 computers or if the operating system is Windows NT 4, then use the OEM-supplied installation media to boot and re-create any utility partitions before continuing with the instructions in “Booting the Computer in an IDR Recovery” on page 921. Additional steps are necessary to restore Windows 2000 volumes that use Microsoft’s Logical Disk Manager (LDM). If you are prompted to write a signature when running the Disk Manager, reboot before you add or create any volumes after the signature has been written. When the reboot is complete and the Disk Manager dialog is displayed, use the Disk Manager to create the necessary volumes. If you choose the option Run Disk Manager in the Disaster Recovery Wizard to recreate a volume that was originally dynamic, the following error displays: The operation did not complete because the partition/volume is not enabled. Please reboot the computer to enable the partition/volume. You must run the Disk Manager again and make sure that the volumes are assigned the same drive letters as before the disaster. Format the volume, and continue with the Disaster Recovery Wizard.

920

Administrator’s Guide

Using IDR to Recover a Computer

Booting the Computer in an IDR Recovery This section provides details on how to boot the computer being recovered using the bootable diskettes, tape, or CD that were created using the IDR Preparation Wizard. If you use the bootable tape option, then the storage device connected to the computer being recovered must be able to boot from the bootable media. Go to one of the following topics: ◆

“To use bootable diskettes:” on page 921



“To use bootable tapes:” on page 921



“To use a bootable CD:” on page 922

Caution Disconnect any storage area network (SAN) or cluster that is attached to the computer being recovered; otherwise, the hard drives on those computers may also be repartitioned and reformatted. ▼

To use bootable diskettes: The Windows installation CD that was used during the preparation of the disaster recovery diskettes is required. 1. At the computer being recovered, insert the first bootable diskette. 2. Follow the prompts on the screen, and continue with “Using the Windows Setup in an IDR Recovery” on page 923.



To use bootable tapes: 1. At the computer being recovered, insert the last full backup media containing the bootable image into the tape drive. 2. Follow the bootable tape drive manufacturer’s instructions for booting from the tape drive.

After booting the computer, a magenta-colored Backup Exec Intelligent Disaster Recovery Bootstrap screen appears, and displays the following information. Backup Exec Intelligent Disaster Recovery for Windows (NT/W2K/XP/Windows Server 2003) Copyright (c) VERITAS Software Corporation 1984-2002 All Rights Reserved.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

921

IDR

You may have to change the SCSI BIOS settings to enable booting from a SCSI CD-ROM. Some bootable tape drives require that you hold the eject button while powering up the tape drive.

Using IDR to Recover a Computer

You have successfully loaded a Backup Exec Disaster Recovery CD/Tape image. If you are testing the bootable media, the computer successfully booted the image. Remove the boot media and press <Esc> to stop the recovery. DO NOT PRESS <ENTER>. If you are performing a disaster recovery, press the <Enter> key to start the disaster recovery process, which will repartition and reformat the computer’s hard disks and DESTROY ALL EXISTING DATA. The Windows setup program and the Backup Exec Disaster Recovery Wizard are then loaded. 3. Do one of the following:



-

If you are testing the bootable media, when the magenta-colored Backup Exec Intelligent Disaster Recovery Bootstrap screen appears, press <Esc> to cancel the disaster recovery process, and then eject the tape and power cycle the tape drive.

-

If you are performing an actual disaster recovery, press <Enter> to begin the disaster recovery process, and continue with “Using the Windows Setup in an IDR Recovery” on page 923.

To use a bootable CD: 1.

At the computer being recovered, insert the Backup Exec IDR bootable CD into the CD-ROM drive. Make sure the BIOS is enabled to boot from a CD.

2. Reset the computer or power it on. The computer will detect a bootable CD. After booting the computer, a magenta-colored Backup Exec Intelligent Disaster Recovery Bootstrap screen appears, and displays the following information. Backup Exec Intelligent Disaster Recovery for Windows (NT/W2K/XP/Windows Server 2003) Copyright (c) VERITAS Software Corporation 1984-2002 All Rights Reserved.

You have successfully loaded a Backup Exec Disaster Recovery CD/Tape image. If you are testing the bootable media, the computer successfully booted the image. Remove the boot media and press <Esc> to stop the recovery. DO NOT PRESS <ENTER>. 922

Administrator’s Guide

Using IDR to Recover a Computer

If you are performing a disaster recovery, press the <Enter> key to start the disaster recovery process, which will repartition and reformat the computer’s hard disks and DESTROY ALL EXISTING DATA. The Windows setup program and the Backup Exec Disaster Recovery Wizard are then loaded. 3. Do one of the following: -

If you are testing the bootable media, when the magenta-colored Backup Exec Intelligent Disaster Recovery Bootstrap screen appears, press <Esc> to cancel the disaster recovery process, and then eject the CD.

-

If you are performing an actual disaster recovery, press <Enter> to begin the disaster recovery process, and continue with “Using the Windows Setup in an IDR Recovery” on page 923.

Using the Windows Setup in an IDR Recovery Caution Windows Setup may repartition and reformat the hard drive to prepare for the recovery. You may need to use the following keys during the Windows Setup boot process.: Keys to use during the Windows Setup boot process Condition

Action

For Windows XP and Windows Server 2003 only

During the Windows Setup boot process, you must press to enter ASR mode. The option to put ASR files on CD is available only for Windows Server 2003.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

923

IDR

IDR uses Windows Automated System Recovery (ASR) to restore the critical partitions that were previously on the computer. The partitions are created as they were defined in the ASR configuration file.

Using IDR to Recover a Computer Keys to use during the Windows Setup boot process Condition

Action

If the computer being recovered contains OEM-specific SCSI drivers third party

During the Windows Setup boot process, press to manually add the SCSI host adapter drivers or RAID controller drivers before loading Windows. If you do not add the drivers before loading the operating system, hard drive partitions on the computer are not recognized by Windows. For more information, see “Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 931.

Note If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was not selected during the IDR preparation for Windows 2000 computers, then manually repartition the boot and system partitions. Do not change the size of the partitions. When the Windows 2000 Setup screens display the partitions, if utility partitions are present, they appear as either unknown partitions or as EISA utilities. There is no drive letter assigned to these partitions. Do not delete these partitions. ▼

To use the Windows Setup: 1. For bootable tape or bootable CD, go to step 2. For bootable diskettes, do the following: a. Replace the bootable diskettes as prompted. b. When prompted, insert the Windows installation CD in the computer’s CD drive, and then press <Enter>. c. To recover a Windows NT computer, go to step 2. To recover a Windows 2000 computer, go to step 3.

924

Administrator’s Guide

Using IDR to Recover a Computer

2. For Windows NT, select a setup method when prompted: Use Express Setup if you do not want to make changes to the partitions. Use Custom Setup if the SCSI drivers are not present on the boot media, to reconfigure any RAID hardware, or to change the partition configuration during recovery. If a new hard drive is detected on the computer, select a file system (FAT or NTFS) for formatting the drive. To restore the original configuration format the partition using a FAT file system. 3. For Windows 2000, do one of the following: -

If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was selected during the IDR preparation, then the boot and system partitions are automatically created. Install Windows 2000 on the same partition as in the previous configuration.

-

If the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was not selected during the IDR preparation, and if a new hard drive is detected on the computer, then manually create the boot and system drives. Install Windows 2000 on the same partition as in the previous configuration. For more information, see “Using IDR To Recover Windows 2000 Computers” on page 919.

After selecting a file system, press <Enter>. 4. Remove any diskettes or CDs from the drives, and then press <Enter> to reboot the computer. 5. For Windows NT, XP, 2000 and Windows Server 2003, after the reboot, the IDR Wizard is automatically started. Continue with “Using the Disaster Recovery Wizard” on page 926. For Windows 2000, do the following: a. If running a diskette-based IDR only: When prompted, insert the Intelligent Disaster Recovery diskette. After all files are restored, the IDR Disaster Recovery Wizard welcome screen appears.

IDR

b. Continue with “Using the Disaster Recovery Wizard” on page 926

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

925

Using IDR to Recover a Computer

Using the Disaster Recovery Wizard The Disaster Recovery Wizard guides you through: ◆

Restoring the computer to an operational state. You can choose to restore the original layout of the hard disks, or you can make changes.



Restoring the computer’s data from the last backup set (including all Full, Incremental, and/or Differential sets). The Recovery Wizard prompts you for the correct media to use during restore operations by reading the Backup Exec catalog information recorded on the disaster recovery diskettes. You can also restore from other backup media if necessary.

To fully automate the recovery, the current *.dr file for the computer being recovered is required; however, if a *.dr file is unavailable or if the *.dr file is not current, you can still use IDR to recover the computer. Instructions on recovering the computer without using a *.dr file are included in the following procedure. To restore using the IDR Disaster Recovery Wizard, the following are required: ◆

The media set containing the full backup of the target computer being restored.



For recovery on a local computer, a storage device must be connected to the computer being recovered.



If bootable diskettes or bootable CD are being used, a media server that can restore the backup sets to the target computer must be connected on the network.

For Windows Server 2003, when you create new backups with the current version of Backup Exec, legacy System State entries in *.dr files for Windows Server 2003 resources are automatically removed. If you do not upgrade the media server, but upgrade remote Windows Server 2003 resources with the current version of the Remote Agent, you must manually remove legacy System State entries when using the Disaster Recovery Wizard to restore backup sets. To avoid restoring legacy System State entries, when starting the Disaster Recovery Wizard, select the level of assistance Assisted. This option allows you to select which sets to restore.

926

Administrator’s Guide

Using IDR to Recover a Computer ▼

To use the Disaster Recovery Wizard: 1. After reading the Welcome screen, place the diskette containing the *.dr file into Drive A: and click Next. 2. Choose a level of assistance, and then click Next. -

Automated: Uses information saved in the *.dr file to fully automate the recovery process. All of the backup sets found in the *.dr file will be restored to their original locations. Minimal user interaction is required during recovery.

-

Assisted: Backup set information in the *.dr file will be used, but you will have the opportunity to select which sets to restore.

-

Manual: Backup set information from the *.dr file will not be used to automate the recovery process. Individual backup sets will be identified by reading backup media, and you will have the opportunity to select which sets to restore. If a *.dr file is unavailable or is not updated, select this option and refer to “Performing a Manual Restore” on page 932.

-

Return to previous registry settings: Setings from the previous registry are used. The system configuration must be the same except for the hard drives. Any hard drives being added must be the same size or larger than the drive being replaced. Otherwise, repartitioning problems may occur.

3. Select the *.dr file for the computer being recovered, and then click Next. Each *.dr file is labeled using the name of the computer from which it was created, and displays the date and time it was created. If the necessary *.dr file is not displayed, copy the *.dr file from the default or alternate locations on the media server that ran the last backup to any diskette. Insert this diskette into Drive A:, and then click Scan Drive A: to find the file that you just copied. To proceed without selecting a *.dr file, click Next. 4. After selecting a *.dr file, enter a valid serial number to continue (if the evaluation period has expired).

If you are recovering a Windows NT/2000 computer, and you receive messages that one or more of the hard drives are smaller than the originals, the version of Windows NT/2000 that runs the Recovery Wizard may have detected the hard drives in a different order than they were originally configured.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

927

IDR

5. For Windows NT/2000, if the hard disk partition layout changed, you are prompted to keep the current layout or restore the original layout that is contained in the *.dr file.

Using IDR to Recover a Computer

If the original configuration does not match, then to a certain extent, you can control the hard drive numbering scheme that Windows NT/2000 devises. The following chart lists the normal order that Windows NT/2000 uses to assign disk drive numbers. The information in this chart may change if third party drivers are used.

Windows hard drive numbering scheme Primary IDE

Master Slave

Secondary IDE

Master Slave

SCSI Adapter 0

SCSI ID 0 SCSI ID 1 ………… SCSI ID 7 (or 15 if Wide SCSI)

(In order of the lowest I/O port address)

SCSI Adapter 1

SCSI ID 0 SCSI ID 1 ………… SCSI ID 7 (or 15 if Wide SCSI)

SCSI Adapter

SCSI ID 0 SCSI ID 1 ………… SCSI ID 7 (or 15 if Wide SCSI)

Other types of mass storage controllers are usually seen as SCSI controllers by Windows. Note If the IDR Recovery Wizard cannot detect the hard drive order properly, set up hard drive partitions using the Windows Disk Administrator option within the IDR Recovery Wizard. Then, continue with the automated restore of the backup media. For more information, see “Using IDR To Recover Windows 2000 Computers” on page 919.

928

Administrator’s Guide

Using IDR to Recover a Computer

6. When the Modify Hard Disk Layout screen appears, do one of the following: -

To use the original configuration from the *.dr file, click Next.

-

To save the contents of this screen as a text file, click Save Configuration.

-

To make changes to the hard disk layout, click Run Disk Manager. Use Disk Administrator to make additional changes to the partition information. For more information on these programs and fault tolerant configurations, please refer to your Windows documentation, and to “Altering Hard Drive Partition Sizes” on page 930. If a *.dr file does not exist for the computer being recovered, click Run Disk Manager and repartition the hard drive to match the partition layout found on the original computer.

7. If you are restoring with bootable CD or diskettes, select one of the following methods to access the storage device: Note If you are using bootable tape, only the Use locally attached media device option is available. -

Use locally attached media device and then click Next. Select the storage device from which you want to restore, and then click Next.

-

Use the network to restore from a remote media server and then click Next. Follow all prompts in order to acquire network connectivity.

A Finish screen appears. If changes were made to the partitions, the computer is rebooted. 8. After media devices are detected, click Next. 9. Select the drives containing media to be restored, and then click Next. Depending on the level of assistance selected earlier, all backup sets may be automatically restored, or you can select individual backup sets to restore. After the automated restore is complete, you can provide additional media to restore.

10. Select the device that contains the restore media.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

929

IDR

If a *.dr file does not exist, or if there are no catalog entries in the *.dr file, then perform a manual restore and select I will provide my own media, and then go to “Performing a Manual Restore” on page 932.

Using IDR to Recover a Computer

11. Insert the correct media and click Next. Note If a robotic library is being used to recover your computer, the first drive in the robotic library is for the restore. 12. Remove any diskettes and CDs from the drives. 13. To make changes to the computer before starting the operating system, click Run CMD.EXE to open a command prompt window, or click Edit BOOT.INI to modify the boot.ini file on the root of the system partition. Caution Modifying the boot.ini file incorrectly may prevent the computer from restarting. 14. Click Finish to exit the Recovery Wizard and restart the computer.

Altering Hard Drive Partition Sizes When recovering a Windows NT/2000 computer, IDR restores the hard drive partitions to the same sizes they were before the disaster. There may be unused and unallocated space. If the hard drive in the target computer is larger than the hard drive that was in place before the disaster occurred, run the Windows Disk Administrator program (within the IDR Recovery Wizard) to alter the partition sizes to reflect the larger hard drive size. When recovering a Windows 2000 computer, if the option Let IDR automatically partition the boot and system drive (Windows 2000 only) was not selected, specify hard drive partitioning information during setup. Following is an example of why the hard drive partitions should be resized: If the pre-disaster computer hardware contained a 4 GB hard drive with two 2 GB partitions, and it was replaced with a 9 GB model, IDR (using the *.dr file) will rebuild the hard disk partition table using the partition information found on the original 4 GB hard drive. As a result, only 4 GB of space will be allocated on the new 9 GB hard drive, with a partition map consisting of two 2 GB partitions. Use the Disk Administrator program to repartition the hard drive to include the additional space. For information regarding fault tolerant configurations under Windows NT, please refer to the Windows Resource Kit.

930

Administrator’s Guide

Using IDR to Recover a Computer

Recovering Computers Requiring OEM-Specific SCSI Drivers Some third party controller drivers and RAID controller drivers are not bundled with the Windows operating systems. During the Windows Setup boot process, press to manually add the SCSI host adapter drivers or RAID controller drivers before loading Windows. If you do not add the drivers before loading the operating system, hard drive partitions on the computer are not recognized by Windows. In addition, because RAID controllers store their own configuration information that IDR cannot access, they may require configuration before you can perform a recovery. For information on configuring the controller, see the documentation that came with the hardware. Note These steps can also be used to specify the order in which the drivers are loaded. ▼

Perform the following steps using the IDR full set of bootable diskettes: 1. When the blue Windows Setup screen appears after booting with the IDR boot diskette, press and hold down the key. You are prompted for diskette 2. 2. Insert diskette 2 and press and hold the key again. After loading additional drivers, a Setup screen appears that allows you to specify additional devices. 3. Release the key, and then press the <S> key. 4. Follow the on-screen instructions to load the controller driver software. 5. After loading the controller driver software, press <S> again to specify loading another device. 6. Follow the on-screen instructions to load any additional controller drivers.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

IDR

7. When finished, press <Enter> and continue recovering the computer.

931

Using IDR to Recover a Computer

Performing a Manual Restore Caution If the media to be restored contains both Full backup sets and Incremental or Differential backup sets, restore the Full backup sets first. ▼

To perform a manual restore: Note If you are restoring Windows NT 4 computers that have utility partitions, first recreate the utility partitions using the OEM-supplied media. 1. Follow step 1 through step 9 in “Using the Disaster Recovery Wizard” on page 926. 2. If you provided a *.dr file, make sure I will provide my own media is selected and then click Next. 3. Select the tape drive where the restore media resides. The Found a Backup Set dialog box appears, displaying the first backup set found on the media.

4. To restore to a location other than the one displayed, click Change, and then select a location where the data will be restored.

932

Administrator’s Guide

Using IDR to Recover a Computer

5. Do one of the following: a. Click Restore Set to restore the backup set displayed in Media Information and Set Information. IDR begins restoring the data to the selected partition. When the restore is complete, the Found Backup Set dialog box re-appears for the next backup set found on the media. If there are no more backup sets, the Select Tape Drive screen appears. To restore another backup set, click Restore Set again to restore the next backup set. Repeat this step for each backup set found on the media. b. Click Skip Set to skip the restoration of this backup set and search the media for another backup set from which to restore. c. Click Skip Media to eject the media and replace it with different media. 6. After the last backup set is restored, click Finish to end the recovery process and exit Intelligent Disaster Recovery. See also: “Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 931

Performing Remote IDR Remote IDR restores data to a Windows computer over a network from a media server. ▼

To recover a computer using a remote media server: 1. Follow step 1 through step 7 of “Using the Disaster Recovery Wizard” on page 926. 2. Select Install networking and restore from a remote media server, and then click Next.

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

933

IDR

3. To recover a Windows NT computer, click Next, and continue with step 4; otherwise, continue with step 13.

Using IDR to Recover a Computer

4. Select either Automatic or Manual as the method to install networking: a. Select Automatic to use information saved in the recovery file to install networking. You must install the original or identical network adapters before using this method. The computer named in the selected *.dr file is displayed on the screen. b. Select Manual to use the Windows NT Network Setup Wizard. You may need to provide OEM network driver media when prompted. Enter the name of the computer being recovered, and then click Next. The NT Network Setup Wizard appears. 5. Make sure that Wired to the Network is selected, and then click Next. 6. To select a network adapter, do one of the following: -

If the network adapter requires a manufacturer supplied setup diskette, click Select from list, and then click Have disk.

-

If the network adapter does not require a manufacturer supplied setup diskette, either click Select from list or Start search.

A list of network adapters appears. If the network adapter is not listed on the screen that appears, click Select from list, and then click Have disk to add an adapter to the Network Adapter list. On the next wizard screen, the default network protocols are displayed. 7. Select the networking protocols used on the network, and then click Next. 8. Windows NT is ready to install the networking components. Insert the Windows NT installation CD or the IDR bootable CD into the CD-ROM drive, and then click Next to continue. Note Additional setup screens that specifically address the Network Interface Card may appear. If so, follow the screen prompts. 9. If TCP/IP is selected as the network protocol, you are prompted to use DHCP. If you do not want to use DHCP, you are required to enter an IP address. The Windows NT Networking Installation dialog box appears. 10. Click Next to start the network and complete the installation of the networking components.

934

Administrator’s Guide

Using IDR to Recover a Computer

11. Enter the name of the workgroup or domain for the computer, and then click Next. Note Entering the name of a temporary workgroup, rather than the name of a domain, is recommended. The computer will be restored to its original workgroup or domain when the recovery is complete. 12. Click Finish to complete the network installation and continue with recovery. 13. On the Connect to Media Server screen, enter Backup Exec service account information to logon to a media server where the storage device is located, and then click Next. Be sure that the service account you specify can run Backup Exec jobs normally and does not have a blank password. Note If the media server is in a workgroup, enter the server name again in the domain field. Intelligent Disaster Recovery lists drive letters that you can restore; each drive letter corresponds to a backup set listed in the computer’s data recovery file. 14. Select the drives to recover to do an automatic restore or select I will provide my own restore media. 15. Click Next. 16. If you selected I will provide my own restore media, then on the navigation bar on the media server click Restore, and on the Restore Job Properties dialog box, select the backup set to restore. 17. On the Properties pane, under Source, click Resource Credentials, and change the Backup Exec logon account to the Temporary IDR User logon account. The Temporary IDR User logon account was created by the IDR Recovery Wizard on the Connect to Media Server dialog box in a previous step.

18. On the Properties pane, under Destination, click File Redirection, and select Redirect file sets. 19. In Restore to drive, type the UNC path, such as \\server\c$. 20. Change Server logon account and Path logon account to the Temporary IDR User logon account. Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

935

IDR

For Windows NT4 only, complete the following steps. For Windows 2000, XP, and Server 2003, you have completed this procedure.

Using IDR to Recover a Computer

21. In Restore to path, make sure the slash ( \ ) is entered. 22. On the Properties pane, under Settings, click General, and make sure that Restore over existing files is selected. 23. If the system partition is being restored, then on the Properties pane, under Settings, click Advanced, and select Restore Windows NT 4.0 registry. 24. Restore to the target computer being recovered. See also: “Microsoft SQL Server Recovery Notes” on page 936 “Microsoft Exchange Recovery Notes” on page 937 “Using IDR To Recover IBM Computers” on page 919 “Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 931 “Using Backup-to-Disk Folders and Files” on page 149

Microsoft SQL Server Recovery Notes The Backup Exec Agent for Microsoft SQL Server option must be installed on the media server in order to perform a complete SQL Server database recovery. After using Intelligent Disaster Recovery to recover the Windows server, IDR automatically replaces the damaged master and model databases with copies of the master and model databases. SQL is restarted and the latest master database backup and all other system databases are restored. You must still restore all user databases after completing the IDR Recovery. Caution For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are made of the master and model databases. Copies are only made when non-AOFO (Advanced Open File Option) backups of the master and model databases are run. If you are using AOFO for SQL backups, make at least one backup of the master and model databases without using AOFO. If SQL 2000 is upgraded, refresh the master and model database copies with another non-AOFO backup.

936

Administrator’s Guide

Using IDR to Recover a Computer

Microsoft Exchange Recovery Notes The Backup Exec Agent for Microsoft Exchange Server option must be installed on the media server in order to perform a complete Exchange Server database recovery. After using Intelligent Disaster Recovery to recover the Windows server, use Backup Exec to restore the Exchange Server databases from the most recent Exchange Server database backups.

SharePoint Portal Server Recovery Notes After using Intelligent Disaster Recovery to recover the Windows server (after the last reboot), the SharePoint Portal Server software is installed but is not functional; SharePoint Portal Server must be removed and reinstalled before the SharePoint data can be restored.

IDR

Appendix C, VERITAS Backup Exec - Intelligent Disaster Recovery Option

937

Using IDR to Recover a Computer

938

Administrator’s Guide

VERITAS Backup Exec - SAN Shared Storage Option

D

The VERITAS Backup Exec for Windows Servers - Storage Area Network (SAN) Shared Storage Option enables multiple media servers to share secondary storage devices, such as robotic libraries, in a SAN. The secondary storage devices are not directly connected to a single server by SCSI, but are connected to a Fibre Channel Arbitrated Loop (FC-AL) or Fibre Channel Switched Fabric (FC-SW). To allow for sharing of storage devices and media between multiple media servers, a shared Advanced Device and Media Management (ADAMM) database resides on one media server called the database server or primary server. All media servers on the SAN connect to this database to obtain a single, unified view of all shared devices and media. Backup Exec uses this shared database to arbitrate all device and media requests with comprehensive overwrite protection policies to prevent accidental media overwrites. To resolve potential access conflicts between multiple media servers, Backup Exec “reserves” robotic arms and tape devices while operations are being performed. Media catalogs are shared between media servers, so restore operations can be performed using any media servers that share catalogs. If the media must be moved from one device to another on the SAN, the media does not have to be cataloged again. In a shared storage environment, secondary storage devices also can be attached to the local SCSI buses of any media server. However, these local devices, disk or tape drives connected to a server, are only available to the server to which they are attached. Storage devices used with the SAN Shared Storage Option must have a vendor-assigned serial number. In the following example of a shared storage environment, the database server and the media servers transmit data over the FC-AL through a fibre to SCSI bridge (router) to secondary storage devices (SCSI robotic libraries).

Shared Storage

939

Example of the SAN Shared Storage Option using FC-AL

Workstation LAN Server A Database Server

Server B Server C

Fibre Channel Arbitrated Loop

Fibre Channel Arbitrated Loop Hub

Fibre-to-SCSI Bridge

SCSI Tape Library SCSI Tape Library

You can use any media server to change the names of the robotic libraries and drives to names that are more descriptive of your operations. If you have multiple SANs, it is recommended that you treat each SAN independently, with each SAN having its own Backup Exec database server for the shared ADAMM database and catalogs for that loop. Using a single Backup Exec database server for more than one SAN increases the number of single-point failures that can affect the system. Job completion statistics or errors can be viewed through any administration console attached to the server that ran the job. See also: “Sharing Media” on page 958. “Scheduling and Viewing Jobs” on page 956 “Requirements for the SAN Shared Storage Option” on page 941

940

Administrator’s Guide

Requirements for the SAN Shared Storage Option The following are the minimum system requirements for running this release of the SAN Shared Storage Option: ◆

Windows NT 4.0 with service pack 6a or greater, Windows 2000, or Windows Server 2003 must be installed.



Physical Memory Available, as shown in the Windows Task Manager, plus the File Cache should exceed 52 MB (20 MB for file cache and 32 MB for Backup Exec SAN Shared Storage Database services and administration console).



The SAN Shared Storage Option must be locally installed at each server that will be sharing secondary storage devices.



The devices in your SAN must be on the supported device list at www.support.veritas.com.

For a fibre channel-connected installation, note the following additional requirements: ◆

A fibre channel host adapter and its device drivers must be installed and connected to the SAN.



A hub or switch must be connected to all the fibre to SCSI bridges on the SAN.



All the robotic libraries must be connected to the SCSI bridges.



The hub or switch must be powered up before the bridges.



All robotic libraries must be powered up before the bridges.



The bridges must be powered up before Windows loads the fibre channel driver (usually during the boot phase).

Note If the SAN Shared Storage Option is installed on a media server, Backup Exec disables all fibre channel-connected devices in Removable Storage. You cannot re-enable the devices in Removable Storage until the SAN Shared Storage Option and VERITAS device drivers are uninstalled. See also: “Installing the SAN Shared Storage Option” on page 942

941

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

Installing the SAN Shared Storage Option You must install the Backup Exec SAN Shared Storage Option on the shared database server before installing Backup Exec SAN Shared Storage Option on other servers. The server containing the shared database must be running before other media servers can be installed properly. Tip

For best performance, install the shared ADAMM and catalog databases on the fastest server on the SAN that is not heavily loaded with non-Backup Exec tasks.

You can install the SAN Shared Storage Option while installing Backup Exec by following the procedures described in “Installing Backup Exec Using the Installation Program” on page 50. If you have already installed Backup Exec, follow the procedures described in “Installing Backup Exec Options on a Local Server” on page 53. If installing to the database server, select Primary. If the SAN Shared Storage Option has already been installed to the primary, or database, server, and you are installing to a secondary server, select Secondary and enter the name of the database server. If you installed Backup Exec on the database server, reboot the database server before loading Backup Exec on other servers. The server containing the shared database must be running before other media servers can be installed properly. The first time you run Backup Exec, First Time Wizard displays automatically. The First Time Startup Wizard is a collection of wizards that help you set up the important features of Backup Exec, including media sets, overwrite protection settings, devices, and logon accounts. You must complete the applicable sections of this wizard as it guides you in preparing Backup Exec for operations.The Media Overwrite Protection Wizard only appears on the database server. Setting the desired Media Overwrite Protection Level is important since the media is shared throughout the SAN. Note When uninstalling Backup Exec, you must uninstall from the secondary servers before uninstalling from the primary server. For more information about uninstall procedures, see “Uninstalling Backup Exec” on page 71. See also: “VERITAS Backup Exec - Remote Agent” on page 843 “Starting Backup Exec” on page 80 “Scheduling and Viewing Jobs” on page 956

942

Administrator’s Guide

About Devices in the Shared Storage Environment

About Devices in the Shared Storage Environment At startup, Backup Exec recognizes all local storage devices as well as the storage devices on the SAN. If you do not see one or more of your attached storage devices or if the shared storage devices do not appear when Devices is selected from the navigation bar, click Tools, point to Wizards, and then click Device Configuration Wizard. This wizard guides you through installing the appropriate drivers for the storage hardware connected to your system. Note The SAN Shared Storage Option must be installed for Backup Exec to recognize any devices connected to iSCSI or Fibre Channel Switched Fabric (FC-SW). FC-SW is a fibre channel configuration in which the devices are connected in a network using a fibre channel switch. Storage devices are categorized as either robotic libraries or stand-alone drives. The Library Expansion Option is required to support robotic libraries with multiple tape drives (see “VERITAS Backup Exec - Library Expansion Option” on page 1175). If you need to add a new device to the SAN after you install Backup Exec, follow your storage network vendor’s instructions. After you add the new device, reboot the Backup Exec database server to verify that the new device is recognized. You should reboot the other media servers according to your storage network vendor’s instructions because some vendors do not support booting multiple servers concurrently or booting any server while active jobs are running. Backup Exec’s device management feature provides the following functionality for the secondary storage units on a SAN: ◆

Device allocation. Jobs must first reserve the shared secondary backup devices before they can be used. The job that gains a reservation on a drive keeps it reserved while the drive is in use. The drive is released after a job completes, which allows other jobs to compete for it.



Drive pools. You can assign the drives to drive pools in which one or more drives are combined as a backup target. Jobs submitted to a particular drive pool run on the first available drive in that pool. You can also submit a job to a selected individual drive in the drive pool.

Note Cascaded drive pools, in which multiple drives are linked together to create the appearance of one drive with greater capacity, are not recommended for shared storage environments.

“Using Drive Pools with the SAN Shared Storage Option” on page 947 “Using Device Operations with the SAN Shared Storage Option” on page 948

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

943

Shared Storage

See also:

About Devices in the Shared Storage Environment

Monitoring Drives in the Shared Storage Environment When Devices is selected from the navigation bar, you can view all the physical drives attached to your server, as well as the logical groups they are associated with. All the logical groupings of the physical drives are displayed under Drive Pools as well as all devices locally attached (by SCSI) to all servers on the SAN and the secondary storage units accessed through the SAN. Expanding the view for All Devices allows you to view all of the storage devices on the SAN. Robotic libraries are listed below each server that has access to that robotic library, even if the robotic library is not directly connected to the server. View of Storage Devices on the SAN

Default drive pool for local server Shared devices Locally attached drive Default drive pool for server in SAN Shared devices

Stand-alone drive Robotic library Robotic library drives

944

Administrator’s Guide

About Devices in the Shared Storage Environment

You can also run the Device Summary report to monitor drives in the SAN Shared Storage Option. Drive properties for shared devices can be viewed following steps described in “Viewing and Using Drive Properties and Statistics” on page 122. With shared devices, the Write single block mode and Write SCSI pass-through mode options are selected by default. Selecting these options decreases the chances of dropping critical blocks of data and provides more detailed information when write errors occur. See also: “Device Summary Report” on page 537 “Viewing Drive Configuration Properties” on page 125

945

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment

Viewing Media in the Shared Storage Environment If you select a drive or select Slots from the Devices view, information for the media contained in the drive or slot appears in the right pane. This information also appears when All Media is selected from the Media view. For more information about viewing media, see “Viewing Media Information” on page 98. Media List

See also: “Using Drive Pools with the SAN Shared Storage Option” on page 947 “Using Device Operations with the SAN Shared Storage Option” on page 948 “Scheduling and Viewing Jobs” on page 956

946

Administrator’s Guide

About Devices in the Shared Storage Environment

Using Drive Pools with the SAN Shared Storage Option When Backup Exec is installed, the All Drives (<Server Name>) is created by default. In a non-shared storage environment, this default drive pool contains the server’s locally attached drives. In a shared environment, this default drive pool is created for each server using the SAN Shared Storage Option, and contains both locally attached and shared devices. VERITAS recommends creating a shared storage drive pool, which contains only shared devices. For the steps to creating a drive pool, see “Creating Drive Pools” on page 103. You can create other drive pools to meet your particular requirements. For example, you may want to create a drive pool for high-performance drives and create a second drive pool for lower-performance drives. High-priority jobs can then be sent to the high-performance drive pool for faster completion. Drives can belong to more than one drive pool, and drive pools can contain different types of drives. In the shared storage environment, drive pools can contain both local and shared drives, but jobs will run only on those drives in the pool to which the server has access. For example, suppose you create a drive pool that contains the local drives for both media server A and media server B. If a job is submitted at media server B to this drive pool, the job will run only on available drives attached to server B. If all of server B’s drives are in use, the job has to wait for a drive on server B to become available. If a job was submitted from server B to a drive pool that contained both its local and shared devices, the job would run on the first available drive. The steps for creating and deleting drive pools, adding or deleting drives from a drive pool, and setting priorities for drives in a drive pool are the same in a shared storage environment as in a non-shared storage environment. See also: “Managing Devices” on page 95 “Creating Drive Pools” on page 103

947

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment

Using Device Operations with the SAN Shared Storage Option Device operations allow you to manage the physical drives attached to the media servers and perform some operations on the media in the drives. The steps for deleting drives, pausing and resuming drives, completing the inventory drive process, cataloging media, labeling media, and erasing media are identical in the shared and non-shared storage environments. See also: “Managing Devices” on page 95 “Scheduling and Viewing Jobs” on page 956 “About Devices in the Shared Storage Environment” on page 943 “Sharing Media” on page 958

Renaming Robotic Libraries and Drives You cannot rename a server, but you can rename robotic libraries and drives to make them more easily identified. You may want to use names that are more descriptive of your operations, or you may want to identify the device by the user or location, such as DATA_CENTER_ROBOTIC LIBRARY. The names of all servers attached to the SAN appear when Devices is selected from the navigation bar. Press to manually refresh the screen and view new names. The robotic libraries and drives can be renamed from any server sharing the ADAMM database, and the new names will appear on all servers on the SAN. Note The Device Management window on other Backup Exec administration consoles may need to be manually refreshed before the new names appear on them. See also: “Pausing, Resuming, and Renaming Devices” on page 100

948

Administrator’s Guide

About Devices in the Shared Storage Environment

Sharing Robotic Libraries Between Backup Exec for NetWare Servers and Backup Exec for Windows Servers Backup Exec for NetWare Servers and Backup Exec for Windows Servers SAN Shared Storage Options inside the same fibre environment can share robotic libraries, which lowers hardware costs. With robotic library sharing, you first create partitions on the robotic libraries for use with Backup Exec for Windows Servers. Then you can create additional partitions on the same robotic libraries for use with Backup Exec for NetWare Servers. You can use VERITAS ExecView to monitor both the NetWare and Windows servers from one console. Otherwise, you can view NetWare servers from a NetWare console and Windows servers from a Windows console. If a Backup Exec for NetWare Servers job is targeted to a drive being used for a Backup Exec for Windows Servers job, the drive appears as reserved. See also: “Viewing Devices” on page 96 “Library Sharing Prerequisites” on page 949 “Configuring Media Servers for Robotic Library Sharing” on page 950

Library Sharing Prerequisites Before you can share libraries, you must have the following installed: ◆

Backup Exec for Windows Servers on the Windows media servers.



Backup Exec for NetWare Servers version 8.5 or later on the NetWare media servers.



The Backup Exec for Windows Servers SAN Shared Storage Option on each Windows media server you want to operate in the shared environment.



Backup Exec for NetWare Servers SAN Shared Storage Option on each NetWare media server you want to operate in the shared environment.



The Backup Exec for Windows Servers Library Expansion Option or the Backup Exec for NetWare Servers Library Expansion Option.

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

949

Shared Storage

Note The drive licenses you purchase for your robotic library are not platform-specific for this implementation. For example, if you are planning on sharing a ten-drive robotic library, you can purchase nine Backup Exec for Windows Servers or Backup Exec for NetWare Servers drive licenses (the first drive in a robotic library does not require a Library Expansion Option license).

About Devices in the Shared Storage Environment

In order to successfully share robotic libraries, you need a working knowledge of both Backup Exec for Windows Servers and of Backup Exec for NetWare Servers. You also should have complete access to hardware and the ability to restart media servers. Before proceeding with the robotic library sharing configuration, plan how you want to use your robotic library in this shared environment. For example, if you have a robotic library that has 100 slots in it, you may want to partition your robotic library so Backup Exec for Windows Servers uses 50 slots and Backup Exec for NetWare Servers uses 50 slots. Factors affecting how many slots you use for each operating system include media rotation schemes, the number of servers you are protecting, and the types of data stored on each server. Label your media according to operating system or Backup Exec type. Color-coded or unique bar codes identifying whether the tapes are being used with Backup Exec for Windows Servers or Backup Exec for NetWare Servers is recommended. This will help you identify the media when you need to restore data or rotate the media back into your media rotation schedule.

Configuring Media Servers for Robotic Library Sharing You must ensure that no backup activity is occurring during robotic library sharing configuration. Note If you are running Backup Exec for NetWare Servers 9.1 on any of the media servers that will be sharing the library, all Backup Exec for NetWare Servers media servers in the shared storage environment must be installed in the same media handling mode. ▼

To configure Backup Exec for Windows Servers for robotic library sharing: 1. At the Windows server where the SAN Shared Storage Option is installed, start the Backup Exec administration console. 2. Click Devices. The tree pane contains a list of any fibre-attached or locally-attached devices. 3. Select the robotic library you want to share. 4. Under Robotic Library Tasks in the task pane, select Configure partitions. 5. Set up your partitions following the steps provided in “Creating Robotic Library Partitions” on page 146.

950

Administrator’s Guide

About Devices in the Shared Storage Environment

6. From the Devices tree pane, select the drive in this partition that will not be used by your Backup Exec for Windows Servers media servers. 7.

Delete the drive to ensure no jobs run to the unused partition.

8. Repeat steps 6 and 7 for all drives in the unused partition. 9. If you are using Backup Exec for NetWare Servers 8.5, for each drive connected to the shared robotic library, set the block size to 32K: Note Backup Exec for NetWare Servers 8.5 does not support writing tapes higher than 32K block size. Some higher performance devices (such as DLT drives) support block sizes of 64K or higher. If you mix up your tapes and try to read a Backup Exec for Windows Servers tape written with the 64K block size in Backup Exec for NetWare Servers 8.5 it will appear empty and could be overwritten, resulting in data loss. Therefore, you should set the block size to 32K. This change only needs to be made at the Backup Exec for Windows Servers database server. This restriction does not apply if using Backup Exec for NetWare Servers 9.0. a. From the Devices tree pane, right-click a drive included in the partition you will be using, and select Properties. b. From the Configuration tab, check the block size. If it is larger than 32K, change it to 32K, and then click OK to save. c. If you are sharing more than one robotic library, repeat steps a through b for each robotic library. 10. Reboot all other Windows servers and make sure you can see the shared robotic library on each server. Note No fibre activity or backup jobs should be run until all Backup Exec for Windows Servers and all Backup Exec for NetWare Servers are configured for robotic library sharing.

951

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment ▼

To configure Backup Exec for NetWare Servers 8.5 for robotic library sharing: 1. At the Primary Group Server, open the Job Manager. Note Backup Exec for NetWare Servers does not dynamically set 0-based robotic libraries at startup. If you are unsure whether your robotic library is 0-based, go to the Backup Exec for Windows Servers Administration Console and look at the properties for the robotic library. It is critical that the robotic library is set the same way in both Windows and NetWare so you do not overlap slots between the NetWare and Windows partitions. 2. If you are running a 0-based robotic library: a. Press to display the Options menu. b. Select Hardware. c. Select Robotic Library Options. d. From the Robotic Library dialog, highlight any 0-based robotic libraries with the <Spacebar> and press to save your selections. 3. From the Options menu, select Partition Management, and then select Define/Maintain Partitions. 4. Press to delete existing partitions. 5. To create partitions for Backup Exec for NetWare Servers: a. From the Options menu, select Partition Management, and then select Define/Maintain Partitions to create a partition to be used by Backup Exec for NetWare Servers. b. Press to create a new partition. c. From the screen listing the available robotic libraries, move the selection arrows next to a drive that you want to include in the partition, and then press . d. From the Partition Description window, select the starting slot and enter the total number of slots that will be in this partition. e. Repeat steps a and b for each partition in the shared robotic library that will be used by Backup Exec for NetWare Servers.

952

Administrator’s Guide

About Devices in the Shared Storage Environment

6. If you plan to share more than one robotic library, repeat the above steps for each robotic library. 7. Restart Backup Exec for NetWare Servers on the group servers and make sure you can see the shared robotic library on each server. ▼

To configure Backup Exec for NetWare Servers 9.x running in the partition management mode: 1. From the Administration Console, ensure you are connected to the Primary Group Server and that you are running in partition management mode. From the Administration Console for NetWare at the Primary Group Server, ensure you are running in partition management mode. 2. Delete existing partitions. To delete a partition from the Administration Console: a. Click Drives. b. Click Partitions. c. Right-click the partition you want to delete, and click Delete. d. When prompted, click OK. e. Repeat step 3 and step 4 for each partition you want to delete. To delete a partition from the Administration Console for NetWare: a. Select Drives. b. Select Partitions. c. Select the partition you want to delete, and press . d. When prompted, press . e. Repeat step 3 and step 4 for each partition you want to delete.

953

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment

3. Create the partitions in the shared library to be used by Backup Exec for NetWare Servers. To create a partition from the Administration Console: a. From the Administration Console, click Drives. b. Right-click Partitions. c. Click New Partition. d. Enter options on the New Partition dialog box. e. Click OK. 4. Enter options in the New Partition General dialog box. 5. Enter options in the New Partition Configuration dialog box. 6. Click OK. To create a partition from the Administration Console for NetWare: a. From the Administration Console for NetWare, select Drives. b. Select Partitions. c. Press . d. Select a drive to be included in this partition. e. The General dialog box option appears. f.

Ensure Configuration is selected, and press <Enter> to view or edit options on the Configuration dialog box.

g. Press to return to the General dialog box. h. Select Advanced Configuration and then press <Enter> to view or edit options on the Advanced Configuration dialog box.

954

i.

Press to return to the General dialog box.

j.

Press .

Administrator’s Guide

About Devices in the Shared Storage Environment

7. If you plan to share more than one library, repeat step 2 and step 3 for each library that will be shared. 8. Restart Backup Exec for NetWare Servers on the group servers and make sure you can see the shared library on each server. ▼

To configure Backup Exec for NetWare Servers 9.x running in the media management mode: 1. From the Administration Console, ensure you are connected to the Primary Group Server and that you are running in media management mode. From the Administration Console for NetWare at the Primary Group Server, ensure you are running in media management mode. 2. Select Drives. 3. Select Drive Pools. 4. Select All Drives. 5. From the Administration Console, right-click the robot you want to share, and then click Properties. From the Administration Console for NetWare, select the robot you want to share, and press . 6. Select Configuration. 7. Enter the starting slot and number of slots to be used by NetWare servers. 8. From the Administration Console, click OK. From the Administration Console for NetWare, press . 9. Restart Backup Exec for NetWare Servers on the group servers and make sure you can see the shared library on each server. See also: “VERITAS Backup Exec - Library Expansion Option” on page 1175

955

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment

Scheduling and Viewing Jobs Creating backup and restore jobs with the SAN Shared Storage Option is identical to creating jobs in a non-shared storage environment. You can also create test run jobs, resource discovery jobs, and duplicate backup data jobs. While the SAN Shared Storage Option does not provide a central view of the jobs scheduled on all servers on the SAN, you can always view your scheduled, active, and completed jobs on the media server to which you submitted the jobs by selecting Job Monitor from the navigation bar. (ExecView does provide a central view of all servers on the SAN. For more information, refer to ExecView Administrator’s Guide on the installation CD.) View of current jobs

Note If your job is awaiting a storage device, the Job Monitor window will not display a Device Name. Also, if the Job Status displays as Queued, the job is awaiting an available storage device.

956

Administrator’s Guide

About Devices in the Shared Storage Environment

With the SAN Shared Storage Option enabled, all of the media servers share access to the storage devices through the shared ADAMM database. The server that reserves the storage device first runs its job first. Therefore, a job scheduled by a server may not run exactly when scheduled if all the storage devices are being used by other servers. When a server releases control of a device, there is a short delay before the server looks for additional jobs to process. This delay provides a window of opportunity for other media servers to reserve the shared storage device. If a device fails during a nonrecurring job, that job will fail and will be rescheduled on hold. If a device fails during a recurring job, the job is rescheduled. The device is then released for the next job scheduled for that device. But, depending on why the device failed, the second job may become trapped. This might prevent other jobs from seeing the device, running to normal completion, or failing and being rescheduled to an "on hold" status. If you determine that a device is malfunctioning, you may want to retarget jobs to another drive or quickly replace the failed drive and resume the jobs that were placed on hold. See also: “Backing Up Data” on page 239 “Restoring Data” on page 411 “Monitoring Jobs” on page 381 “Viewing Completed Jobs” on page 394

957

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

About Devices in the Shared Storage Environment

Sharing Media The Backup Exec servers can share media within the shared storage devices, but not simultaneously. For example, media server A can write a backup to a media, and when that job is finished, media server B can append another backup to the same media. Or, if overwrite protection is not enabled, media server B may overwrite that media. Media sets are not server-centric. In the shared storage environment, all users have a view of all media and media sets. Each media set can contain media in the shared devices and media in any local devices attached to servers. Note The default media overwrite protection is not server-centric; this option is set in the shared ADAMM database and affects all media, including media in locally attached devices. For example, if media overwrite protection is set to None by one server, all media in the shared storage environment – including media in other servers’ locally attached devices – are immediately available for overwriting. Media stored in locally-attached secondary storage devices are not accessible by other media servers. See also: “Media Sets” on page 232

Cataloging Media in SAN SSO Environments The SAN Shared Storage Option uses a shared catalog database. A tape that has already been cataloged can be physically moved from one device to another and will not have to be recataloged. If the primary server is not available over the network when a secondary server generates catalog information, the information is stored temporarily on the secondary server until automatic catalog synchronization occurs. Because catalogs are shared, information can be restored using any server that has access to a device where the tape resides. If the tape resided in a shared device, or in a local device on the server where you want to perform the restore, simply start a restore job. Otherwise, you have to move the tape into a drive that is accessible. See also: “Cataloging Media in a Drive” on page 413

958

Administrator’s Guide

About Devices in the Shared Storage Environment

Media Rotation in SAN SSO Environments Media rotation jobs are treated the same as backup jobs. You can schedule a media rotation job to run on any device you have access to, such as a local device or a shared storage device. You cannot schedule a media rotation job to run on a device you do not have access to, such as a tape drive attached to the local SCSI bus of another server. If a media rotation job is scheduled to begin, but all available devices are in use, the job will be placed into the queue. To successfully use the Media Rotation Wizard in a shared storage environment, you must use one of the following strategies: ◆

Restrict use of the Media Rotation Wizard to a single media server.



Use the same Overwrite Protection Periods and the same full backup day whenever you use the Media Rotation Wizard on all media servers in the shared storage environment.



Edit the jobs and rename the media sets created by each Media Rotation Wizard used so the jobs and media sets are server-centric.

See also: “Scheduling and Viewing Jobs” on page 956

959

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

Designating a New Database Server and Setting Up Servers

Designating a New Database Server and Setting Up Servers You can change the SAN Shared Storage Option configuration through Backup Exec Utility (BEUTILITY.EXE). This utility allows you to assign a new database server and attach media servers to or disconnect them from the database server. You may wish to replace the database server for several reasons, including: ◆

A newer, faster server has become available.



The database server has stopped functioning.

If the current database server is functioning, you should consider specifying the current database server when installing SAN Shared Storage Option to the new system. This will allow you to test the fibre connections before designating a new database server. If the current database server is not functioning, installing the new system as the database server is recommended. For steps on designating a new database server, see “Running Backup Exec Utility SAN SSO Tasks” on page 826.

Tips for Maintaining the Database Server and the ADAMM Database The ADAMM database and the database server are important components of the SAN Shared Storage Option. To protect against possible loss of the ADAMM and catalog databases, you should run frequent backup jobs of the entire Backup Exec directory tree on the shared database server. When scheduling backups of the database server’s Backup Exec directory, base the frequency of these backup jobs on the rate at which backup sets are being created and the number of tapes affected by all of the media servers on the SAN. All backup sets and tapes affected since the last shared database/catalog server backup would have to be recataloged if all information on the database server was lost. Create a special media set just for backing up the Backup Exec directory tree and the Windows operating system on the database server. This will reduce the number of tapes that must be cataloged to find the files for restoring the ADAMM database and catalogs. Caution If you allow the backups of these files to go to a large media set, you may have to catalog every tape in that large media set in order to find the latest versions of the ADAMM database and catalogs to restore. If the database server is not operational, Backup Exec is unusable on all of the servers on the SAN. The Intelligent Disaster Recovery Option is strongly recommended for protecting the database server. Should this entire system be lost, you can use IDR to quickly recover this system. 960

Administrator’s Guide

Designating a New Database Server and Setting Up Servers

If you deem the Backup Exec functions to have a high availability requirement, you should consider setting up one of the other media servers on the storage network as a standby primary server.

Creating a Standby Primary Database Server You should have a standby server configured and available in case your primary server fails. To avoid data loss if the primary database server fails, VERITAS recommends that you save the bedb.bak file and the Catalogs directory to a separate server after the scheduled daily database maintenance. ▼

To create a standby primary SAN SSO server: 1. Use BEUtility to add all the SAN servers that will use the new primary SAN SSO server (see “Add a New Media Server” on page 814.) 2. Use BEUtility to create a media server group that contains all the servers you added in step 1 (see “Create a New Media Server Group” on page 815.) Note Do not select the Create group from SAN SSO configuration option. 3. Use BEUtility to promote a new SAN SSO server to primary in the media group you created (see “Promote a Media Server to a Primary SAN SSO Server” on page 829.) 4. Use BEUtility to stop the Backup Exec services on all media servers in the media server group (see “Stop Services” on page 820.) 5. On the media server that you promoted to primary, navigate to \Program Files\VERITAS\Backup Exec\NT\Data Directory and rename the bedb.bak file to indicate that this is the original file. Example originalbedb.bak or bedborg.bak 6. On the original primary server, navigate to \Program Files\VERITAS\Backup Exec\NT\Data Directory. Copy the bedb.bak file to the same directory on the new primary server. If the original primary server is unavailable, locate the latest copy of the bedb.bak file and copy it to the new primary server.

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

961

Shared Storage

7. On the media server that you promoted to primary, navigate to \Program Files\VERITAS\Backup Exec\NT. Rename the Catalogs directory to indicate that this is the original.

Designating a New Database Server and Setting Up Servers

8. On the original primary server, navigate to \Program Files\VERITAS\Backup Exec\NT. Copy the Catalogs directory to the same directory on the new primary server. If the original primary server is unavailable, locate the latest copy of the Catalogs directory and copy it to the new primary server. 9. Use BEUtility to restore the database you copied in step 6 (see “Recover a Media Server Database” on page 835.) Be sure to select the Drop existing database and reload from backup option. 10. Use BEUtility to start the Backup Exec services on all the media servers in the media server group (see “Start Services” on page 821.) See also: “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 “Promote a Media Server to a Primary SAN SSO Server” on page 829 “Creating a Manual Restore Job by Configuring Job Properties” on page 420 “Move the Primary SAN SSO Server” on page 830

Starting and Stopping Backup Exec Services on Multiple Servers Stopping Backup Exec services is the first step in system maintenance. After system maintenance, you can start the services again. You can start and stop services at the same time, called "bouncing", which refreshes the database, re-establishes connections, and forces the system back into synchronization. It is similar to rebooting all the servers. For steps for starting and stopping servers, refer to “Starting and Stopping Backup Exec Services” on page 70 and “Running Backup Exec Utility Services Tasks” on page 820.

962

Administrator’s Guide

Troubleshooting and Recovering Failed Components

Troubleshooting and Recovering Failed Components Various problems can occur at any location in a SAN. In order for Backup Exec to work properly, a device has to be recognized in three locations; the bridge/router must recognize it as a SCSI device, the operating system must recognize it as a device, and Backup Exec must recognize it as a supported device. In some cases, there will be a problem with your hardware that will require you to contact your hardware vendor for technical support. You may need to replace a component of your SAN, such as a bridge or hub. For specific steps for replacing your equipment, refer to your hardware vendor’s documentation. See also: “Checklist for Troubleshooting Devices That Have Gone Offline” on page 963 “Replacing a Fibre to SCSI Bridge” on page 965 “Replacing the Hub or Switch” on page 966

Checklist for Troubleshooting Devices That Have Gone Offline If a device in your SAN has gone offline, follow these steps to determine the source of the problem. Note Before you begin troubleshooting, verify that your devices are on the Backup Exec supported device list, which is located at www.support.veritas.com 1. On the navigation bar, click Devices. 2. Verify the device is marked as offline in the tree pane. 3. Select the device. 4. Under General Tasks in the task pane, select Properties. 5. Click Configuration. 6. Clear the Enable this device field. 7. Click Apply.

9. Click OK.

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

963

Shared Storage

8. Select the Enable this device field.

Troubleshooting and Recovering Failed Components

10. As a test, run a short backup job targeted to the device that was offline. 11. If the device is still marked as offline, verify that the operating system recognizes the device: -

For Windows 2000 and Windows Server 2003 - From Computer Management, select Device Manager.

-

For Windows NT - From the Windows Control Panel, select SCSI Devices.

12. Does the operating system recognize the device? -

If yes: Restart Backup Exec services.

-

If no: There is a SAN connectivity problem.

13. If restarting the Backup Exec services did not resolve the problem, reboot the server. 14. If the operating system consistently sees the device, but Backup Exec fails to see it consistently and you are sure that the device is on the supported device list, then there may be a high error rate on the SAN that prevents communication. See also: “SAN Hardware Tips” on page 964

SAN Hardware Tips The following is a list of common hardware errors that occur in a SAN environment. If you find errors with your hardware, please contact your hardware vendor for specific instructions. 1. The proper device drivers might not be installed. To verify that the proper device drivers were installed: a. Run Tapeinst.exe The default location is C:\Program Files\VERITAS\Backup Exec\NT. b. Select Uninstall all device drivers. c. Reboot the server. d. Run Tapeinst.exe again. e. Select Install all device drivers. f. 964

Reboot the server again. Administrator’s Guide

Troubleshooting and Recovering Failed Components

2. Many problems in a SAN environment are caused by SCSI issues. Apply normal SCSI troubleshooting techniques at the fibre to SCSI bridge. Use the bridge administration tool to verify that the bridge can see all of the devices. 3. There may be a bad GBIC on the SAN. Replace the GBIC in the path between the server and the storage device, or contact your SAN hardware vendor. 4. SCSI error 9 or 11 in the system event log indicates faulty hardware or an incorrect version of a driver is installed. If you have verified that the driver is on the supported driver list, contact your hardware vendor. 5. Frequent events 32770 (“Adamm Service Error: Write operation forced success!” or “Adamm Service Error: Read operation retry!”) in the application event log indicate a faulty SAN component. Contact your hardware vendor.

Replacing a Fibre to SCSI Bridge If the fibre to SCSI bridge is replaced, you should manually open and close each job definition after replacement to ensure that jobs already submitted will run. If the new fibre to SCSI bridge changes the SCSI addressing of the devices connected to the bridge (for example, if it is a different model), you must reboot all SAN SSO servers so that Windows NT/2000 will recognize the devices at their new locations. The SCSI bridge has an on-board SCSI host adapter. The firmware in the SCSI bridge may not be compatible with your tape drive. Please consult the SCSI bridge vendor for a list of supported tape devices. The choice of your fibre channel host adapter may also affect which tape drives will work. ▼

To replace a fibre to SCSI bridge: 1. If jobs are running, let the jobs complete and place all other jobs on hold. 2. Stop Backup Exec services on all media servers. 3.

Power down the bridge and all SCSI devices connected to the bridge.

4. Replace the bridge. 5. Power up all devices connected to the bridge.

965

Shared Storage

Appendix D, VERITAS Backup Exec - SAN Shared Storage Option

Troubleshooting and Recovering Failed Components

6. Power up the bridge. 7. Start Backup Exec services on all media servers. See also: “Starting and Stopping Backup Exec Services on Multiple Servers” on page 962 “Starting and Stopping Backup Exec Services” on page 70

Replacing the Hub or Switch There is no configuration required when a hub or switch is replaced. Once the replacement is completed and Backup Exec is resumed, any jobs scheduled will process. ▼

To replace the hub or switch: 1. If jobs are running, let the jobs complete and place all other jobs on hold. 2. Stop all Backup Exec services on all of the servers. 3. Power down all bridge devices. 4. Power down the hub or switch. 5. Replace the hub or switch. 6. Power up the hub or switch. 7. Power up all bridge devices. 8. Start the Backup Exec services on all of the servers. See also: “Starting and Stopping Backup Exec Services on Multiple Servers” on page 962

966

Administrator’s Guide

ServerFree

E

VERITAS Backup Exec - ServerFree Option The VERITAS Backup Exec for Windows Servers ServerFree Option is installed as a separate, add-on component of Backup Exec for Windows Servers.

The ServerFree Option enables you to increase backup performance by freeing up media server processor resources and moving the backup processing operations to hardware solutions that may be installed in your storage area network environment. Note ServerFree backup operations on remote resources outside the SAN are not supported. ServerFree backups can only be run on the media server.

Understanding ServerFree Backup Technology The ServerFree Option is designed to move data from a source such as a fibre disk array, to a target such as a SAN attached tape library, with minimal involvement from the media server. The actual process of moving data from the fibre channel disk array to the target backup device is done by hardware, which acts as a data mover, and is typically found in a Fibre-to-SCSI bridge or router. However, the data mover could actually reside in any hardware component in the SAN; its actual location is determined by the SAN hardware manufacturer. Traditional backup operations (both SAN and direct attached) involve reading the data from the SAN’s disk array into the Backup Exec media server’s memory. The backup data is processed and then sent across the SAN to the target backup device. This type of backup operation is heavily dependent on both the CPU and memory in the Backup Exec media server.

967

Traditional SAN backup operation without using the ServerFree Option Network Backup Exec for Windows Servers

Da

Fibre-to-SCSI bridge or router

ta

Flo w

Fibre Channel Switch and attached disk array storage

SAN-attached target backup device

Backup operations from the disk array to the SAN-attached target backup device use media server CPU and memory cycles to process the backup operation. As such, engaging the media server during backup operations results in a decrease in media server performance.

Unlike traditional SAN backup operations, the VERITAS ServerFree Option keeps the use of Backup Exec media server CPU and memory resources to a minimum during the backup operation, thus enhancing performance. Using the ServerFree Option, the majority of the processing done by the Backup Exec media server is completed at the beginning of the backup operation. The actual process of moving data from the fibre channel disk array to the target backup device is done by the Fibre-to-SCSI bridge or router, where the data mover is located. By using the ServerFree Option, along with the Fibre-to-SCSI bridge or router (data mover), Backup Exec media server processing is kept to a minimum. The media server is now free to use its processing power for other business operations.

968

Administrator’s Guide

ServerFree

SAN backup operations using the ServerFree Option Network

Minimal media server CPU cycles used during the backup operation Fibre-to-SCSI bridge or router

Fibre Channel Switch and attached disk array storage

Data mover operations occur in the Fibre-to-SCSI bridge or router

Data Flow

SAN-attached target backup device Volume snapshot

Using the ServerFree Option, backup operations use minimal media server CPU cycles when backups are running. By essentially bypassing the media server, backup performance is enhanced, while also freeing the media server’s processing resources for other important applications.

Appendix E, VERITAS Backup Exec - ServerFree Option

969

ServerFree Backup Configuration The ServerFree Option works in conjunction with other VERITAS high performance options including the SAN Shared Storage Option (SSO) and a snapshot provider such as the VERITAS Volume Snapshot Provider. By first creating a snapshot (a point in time view of the data) and then sending it directly to the storage device (through the data mover), backup operations and backup windows are optimized.

Required Components If any of the following requirements are not met, the ServerFree backup job you have configured will run as a standard backup job will run. After the backup job completes, the Backup Exec job log will indicate what backup option was used. Hardware In order to benefit from ServerFree Option technology, you must have certified SAN hardware that supports data moving operations. This support is provided by SAN hardware manufacturers. Contact your hardware vendor for a complete list of required and supported components that support data moving operations. VERITAS Software will certify new ServerFree-supported SAN solutions as they become available. For more information on whether your hardware vendor supports this technology, and for a complete list of requirements, please contact the hardware vendor directly. You can also contact VERITAS Software by going to www.support.veritas.com/dsl for information regarding tested solutions. If you presently have storage area network hardware in place, you may need to update both the SAN’s hardware software drivers or firmware in order to use the ServerFree Option. Hardware components that may require updating include:

970



Fibre channel host bus adapter (HBA)



Fibre-to-SCSI bridge or router



Fibre channel disk array



Fibre channel switch

Administrator’s Guide

To install the ServerFree Option on a media server, you need to purchase the following VERITAS Software products: ◆

Backup Exec for Windows Servers



SAN Shared Storage Option



ServerFree Option (includes the Advanced Open File Option)

Note ServerFree Option by default, uses the included VERITAS Volume Snapshot Provider from the Advanced Open File Option, to create a snapshot or frozen image of the volume on the fibre disk array. Alternatively, VERITAS Volume Manager, along with its separately purchased FlashSnap Option can be used to create the point in time snapshot of the volume on the fibre disk array. ◆

(Optional) VERITAS Volume Manager and the Volume Manager FlashSnap Option



One license key for each of the above items for each Backup Exec media server in your SAN. See your Backup Exec for Windows Servers Administrators Guide for more information on these options and how to install them.

See also: “Installing Backup Exec Options on a Local Server” on page 53 Supported Operating Systems for the media server ◆

Windows NT 4.0 SP 6a



Windows 2000

Note Consult your hardware documentation for Windows XP and Windows Server 2003 compatibility.

Supported VERITAS Backup Exec Agents and Options The ServerFree Option works with the following: ◆

VERITAS Backup Exec for Windows Servers Agent for Microsoft SQL Server



Microsoft Windows NTFS file systems

Other agents and options may be supported in future releases of the ServerFree Option.

Appendix E, VERITAS Backup Exec - ServerFree Option

971

ServerFree

Software

ServerFree Backup Component Configuration Network

- Backup Exec for Windows Servers - VERITAS SAN Shared Storage Option - VERITAS ServerFree Option - Windows 2000 or Windows NT 4 SP 6a

Fibre channel host bus adapter (HBA)

- (optional) VERITAS Volume Manager and the Volume Manager FlashSnap Option

Fibre-to-SCSI bridge or router

Fibre Channel Switch with attached fibre channel storage disk array

SAN-attached target backup device

Installing the ServerFree option To install the ServerFree Option, see “Installing Backup Exec Options on a Local Server” on page 53. Note The SAN Shared Storage Option must be installed on the media server before you can install the ServerFree Option.

972

Administrator’s Guide

ServerFree

Running the ServerFree Option Note ServerFree backup operations on remote resources outside the SAN are not supported. ServerFree backups can only be run on the media server. ▼

To set the ServerFree Option for a single backup job: 1. On the navigation bar, click Backup. 2. In the Backup Selections pane, select data to be backed up. Note Only fibre disk arrays that are connected to the same data path as the data mover on the SAN will use ServerFree Option technology for the backup operation. 3. On the Properties pane, under Settings, click Advanced Open File. 4. Select Use Advanced Open File Option. 5. Under Open file configuration, select a snapshot method. Note The ServerFree Option uses the VERITAS Volume Snapshot Provider by default. Note Microsoft Volume Shadow Copy Service cannot be used in a ServerFree backup job configuration. Note The VERITAS Volume Manager FlashSnap Option is compatible with Windows 2000 only. The volumes you want to use with the FlashSnap Option must first be snap-started through VERITAS Volume Manager, using the VERITAS Enterprise Administrator (VEA). For more information, see “Snap Starting a VERITAS Volume Manager Volume” on page 992. 6. Select Use ServerFree Option. Start the backup job or select other options from the Properties pane. Note If the Verify after Backup option is enabled, the byte count reported by the verify operation will be substantially smaller than that reported when the backup completes. Since file data is moved directly from disk to tape during a ServerFree backup, no checksums can be generated and subsequently verified. As a result, the byte count for a verify operation does not count the file data.

Appendix E, VERITAS Backup Exec - ServerFree Option

973



To set the ServerFree Option as the default for all backup jobs: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Advanced Open File. 3. Select Use Advanced Open File Option. 4. Under Open file configuration, select a snapshot method. Note The ServerFree Option uses the VERITAS Volume Snapshot Provider by default. Note Microsoft Volume Shadow Copy Service cannot be used in a ServerFree backup job configuration. Note The VERITAS Volume Manager FlashSnap Option is compatible with Windows 2000 only. The volumes you want to use with the FlashSnap Option must first be snap-started through VERITAS Volume Manager, using the VERITAS Enterprise Administrator (VEA). For more information, see “Snap Starting a VERITAS Volume Manager Volume” on page 992. 5. Select Use ServerFree Option.

974

Administrator’s Guide

ServerFree restore jobs are done in the same manner as any other restore job in Backup Exec. Note Unlike a ServerFree backup operation, a ServerFree restore job does not use the data mover during the restore operation. As a result, the Backup Exec media server’s resources are used to process the job. Caution Canceling a ServerFree restore job while it is in progress will result in unusable data, and may leave the drive in an unusable state. You may want to redirect the restore to a noncritical target and then copy the data to a final destination when the job successfully completes. See also: “Restoring Data” on page 411

Appendix E, VERITAS Backup Exec - ServerFree Option

975

ServerFree

Restoring A ServerFree Backup

976

Administrator’s Guide

F

The VERITAS Backup Exec for Windows Servers - Advanced Open File Option (AOFO) is installed as a separate, add-on component of Backup Exec for Windows Servers. The Advanced Open File Option uses advanced open file and image technologies designed to alleviate issues that are sometimes encountered during backup operations, such as protecting open files and managing shortened backup windows. See also: “Understanding the Advanced Open File Option” on page 977 “Selecting the Advanced Open File Option for a Single Backup Job” on page 987 “Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on page 989 “VERITAS Backup Exec - ServerFree Option” on page 967

Understanding the Advanced Open File Option When a job is submitted for backup with the Advanced Open File Option selected, a virtual point-in-time view of each volume is created. Original data is buffered on the static volume when changes are made to the files during a backup. Buffered data is then backed up, not the changed data. If the files selected for backup reside on more than one volume, Backup Exec creates a static volume for each volume containing data to be backed up. For example, if the data to be backed up resides on a single volume, a single static volume is created. If you have data residing on four volumes, four static volumes are created. After the selected files have been backed up, the static volumes are deleted. Backup Exec automatically calculates the sizes of the static volumes needed for the backup, as well as the location of the static volumes, or you can use the Advanced Open File Option wizard to enter specific values for the size and location of the static volume. However, if the amount of data that you have selected to back up is significantly less (30%) than the total amount of data on the volume, the backup may run faster if you use the Advanced Open File Option wizard to decrease the size of the static volumes, rather

977

Open File Option

VERITAS Backup Exec - Advanced Open File Option

Understanding the Advanced Open File Option

than letting Backup Exec automatically calculate them. Use caution when you manually enter specific sizes for the static volumes since those sizes are used regardless of the sizes of the volumes being backed up. If you don’t allocate enough space, the job could fail. By creating and backing up a snapshot view of the files on a volume, the Advanced Open File Option can back up files even as they are being changed. Note The recommended method for protecting databases is to use Backup Exec database agents. Backup Exec database agents provide selective restores of data and more integration with the database application while preventing backups of partial transactions. Agents also enable backups on a database that is spread across multiple disk volumes. You can also use the Advanced Open File Option on the same volume as a database to provide open file support for other applications. The Advanced Open File Option provides generic protection for data that is not supported by Backup Exec agents.

Snapshot Support When creating a snapshot of a volume, Backup Exec uses advanced snapshot technologies to momentarily suspend write activity to a hard drive so that a point in time, or snapshot of a volume can be created. After creating a snapshot, the data can then be backed up. Note To use snapshot technologies with Backup Exec, you must first purchase the Advanced Open File Option. Backup Exec supports multiple snapshot technologies, which are found in the following options: ◆

VERITAS Advanced Open File Option using the VERITAS Volume Snapshot Provider



VERITAS Volume Manager FlashSnap Option



Microsoft Volume Shadow Copy Service. Operating system vendors, as well as other third party software vendors often provide additional technologies that work in conjunction with the Microsoft Volume Shadow Copy Service. These technologies, called Writers, are used to close any open files residing in the computer’s memory before the Microsoft Volume Shadow Copy Service makes a snapshot of the volume to be backed up. Using a Writer along with the Microsoft Volume Shadow Copy Service ensures a complete backup of your volume. See your software documentation for information about Writers that may be provided by the software’s vendor.

978

Administrator’s Guide

Understanding the Advanced Open File Option

After making backup selections and then choosing the Advanced Open File Option, you can increase backup performance by configuring Backup Exec to use the snapshot technologies installed on your systems. Use the following table as a guide.

VERITAS Advanced Open File Option

Open File Option

If you are running:

These are the available options: VERITAS Volume Snapshot Provider This is the Backup Exec default, as it is compatible with each of Microsoft’s operating environments (Windows NT 4.0, Windows 2000, Windows XP or Windows Server 2003).

VERITAS Volume Manager VERITAS Volume Manager version 3.0, along with Service Pack 1 or with mirrored drives in a greater, along with the FlashSnap Option. Windows 2000 environment Note The volumes you want to use with the FlashSnap Option must only first be snap-started through VERITAS Volume Manager, using the VERITAS Enterprise Administrator (VEA). For more information, see “Snap Starting a VERITAS Volume Manager Volume” on page 992. Vendor-specific, third party software, along with Windows Server 2003

Microsoft Volume Shadow Copy Service Microsoft’s Volume Shadow Copy Service technology enables third party hardware and software vendors to create snapshot plugins for use with Microsoft’s technology. For more information, see “Protecting Windows Server 2003 Systems” on page 343

Appendix F, VERITAS Backup Exec - Advanced Open File Option

979

Understanding the Advanced Open File Option

Requirements for Using the Advanced Open File Option The following requirements must be in place in order to use the Advanced Open File Option with any snapshot technology. For remote Windows computers, and the volumes on those systems, you must purchase the Advanced Open File Option for each server or workstation that you want to protect. The media server must have: ◆

Backup Exec for Windows Servers installed



Pentium class processor



If the Advanced Open File Option is to be used locally, then the media server must also have: -

Advanced Open File Option installed

The remote computer you want to back up with the Advanced Open File Option must have: ◆

Windows NT 4, Windows 2000, Windows XP or Windows Server 2003



Pentium class processor



Advanced Open File Option installed



Backup Exec for Window Servers Remote Agent installed (AOFO automatically installs the Remote Agent)

The volumes you want to back up with the Advanced Open File Option must have: ◆

Enough free disk space to start the AOFO operation. Free diskspace should at least equal the size of the backup job in MBs being backed up.



An NTFS, FAT32, or FAT file system

Note The Advanced Open File Option cannot be used on CD-ROM, floppy diskettes, or removable media. If you are installing the Advanced Open File Option locally to protect the media server’s data, you are entitled to move the Remote Agent that was included with the Advanced Open File Option installation to one remote Windows server so that resource can be protected by Backup Exec. However, if the Advanced Open File Option is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to move it to another Windows server. For instructions on moving the Remote Agent to another Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847. 980

Administrator’s Guide

Installing the Advanced Open File Option

Installing the Advanced Open File Option The Advanced Open File Option is enabled from the Backup Exec server by entering your Advanced Open File Option serial number or numbers.

To use snapshot technologies with Backup Exec, you must first purchase the Advanced Open File Option. A 64-bit version of the Advanced Open File Option is also available. You install it along with the 64-bit Remote Agent for Windows Servers. Caution Backup Exec for Windows Servers will not use older versions of the Open File Option. You must upgrade the Advanced Open File Option by purchasing and re-installing it on the local server and all remote computers on which it currently resides. Note You will need to reboot the computer on which you are installing AOFO after completing the installation. To install the Advanced Open File Option on a local media server, see “Installing Backup Exec Options on a Local Server” on page 53. To install the Advanced Open File Option on a remote media server, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. To install the 64-bit Advanced Open File Option using the 64-bit installation program, see “Installing the Remote Agent on a 64-bit Computer Using the Installation Program” on page 846. To install the 64-bit Advanced Open File Option using a command script, see “Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script” on page 848. Note You can also install and uninstall the Advanced Open File Option on remote servers using the Windows command line. See “Installing and Uninstalling the Advanced Open File Option to Remote Windows Servers Using the Command Line” on page 982. See also: “Upgrading Backup Exec Options on Remote Computers” on page 77

Appendix F, VERITAS Backup Exec - Advanced Open File Option

981

Open File Option

Installing Advanced Open File Option will install the VERITAS Snapshot Provider only; to use the VERITAS Volume Manager FlashSnap Option, you must purchase VERITAS Volume Manager, along with its FlashSnap Option; for Microsoft Volume Shadow Copy Service, you must be using the Windows XP and Windows Server 2003 platforms.

Installing the Advanced Open File Option

Installing and Uninstalling the Advanced Open File Option to Remote Windows Servers Using the Command Line You can also install the Advanced Open File Option using silent mode on a remote server using the Windows command line. Note Silent mode runs the installation operation without the benefit of a user interface. ▼

To install the Advanced Open File Option on a remote server using the Windows command line: 1. Move to a remote server. 2. Map a drive letter to the Backup Exec for Windows Servers media server RANT32 directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 3. Open a command prompt and enter the drive letter you mapped in step 2. 4. Run the following command: setup.exe /AOFO: -s Note The -s parameter is used to run the install operation in silent mode, without the benefit of a user interface. The parameter -boot is used to automatically reboot your computer. If you want to do this, add the parameter -boot; if not, you must reboot the computer manually at your convenience in order to activate the Advanced Open File Option. 5. The Advanced Open File Option files are installed on the remote server in the following directory: \Program Files\VERITAS\Backup Exec\RANT 6. The Advanced Open File Option installation log file is installed in \WINNT\bkupinst.log. After the installation finishes, reboot the system at your convenience in order to activate the Advanced Open File Option.

982

Administrator’s Guide

Installing the Advanced Open File Option ▼

To uninstall the Advanced Open File Option from a remote server using the Windows command line: 1. At the remote server, open a command prompt.

3. Run the following command: setup.exe /AOFO: -s -u Note The -s parameter is used to run the operation in silent mode, without the benefit of a user interface. The -u parameter specifies an uninstall operation. The parameter -boot is used to automatically reboot of your computer. If you want to do this, add the parameter -boot; if not, you must reboot the computer manually at your convenience in order to de-activate the Advanced Open File Option. The Advanced Open File Option is uninstalled from the remote server. After the uninstall finishes, reboot the system at your convenience in order to de-activate the Advanced Open File Option.

Uninstalling the Advanced Open File Option If you uninstall Backup Exec, the Advanced Open File Option is uninstalled as well. Or, you can choose to remove only the Advanced Open File Option from a computer. ▼

To uninstall the Backup Exec Advanced Open File Option: 1. From the Start menu, point to Settings, then click Control Panel. 2. Double-click Add/Remove Programs. 3. Select VERITAS Backup Exec for Windows Servers, and then click Change/Remove. Under Windows NT, click Add/Remove. 4. Click Additional Options and then click Next. 5. Click Continue on the VERITAS Backup Exec Serial Numbers dialog box.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

983

Open File Option

2. Change directories to the Advanced Open File Option install directory using the following path: \Program Files\VERITAS\Backup Exec\RANT

Changing the Advanced Open File Option Default Settings

6. In the Destination pane of the VERITAS Backup Exec Features dialog box, select the computer from which you want to remove the Advanced Open File Option. 7. In the List pane, click the icon preceding the Advanced Open File Option and click This feature will not be available. 8. Click Continue. 9. Click Finish.

Changing the Advanced Open File Option Default Settings Defaults are provided for all the configurable elements in Advanced Open File Option. It is recommended that you allow Backup Exec to automatically calculate the size and location of the static volume for each backup. If you need to change the default settings, use the Advanced Open File Option wizard in the Backup Exec administration console. Note The Advanced Open File Option Wizard only enables you to change the configuration options for the VERITAS Volume Snapshot Provider. Note If the amount of data that you have selected to back up is significantly less (30%) than the total amount of data on the volume, the backup may run faster if you use the Advanced Open File Option Wizard to decrease the size of the static volume, rather than letting Backup Exec calculate it automatically. Use caution when you manually enter a specific size for the static volume since that size is used regardless of the size of the volume being backed up, and the job could fail if there is not enough space. ▼

To change the Advanced Open File Option default settings using the Advanced Open File Option Wizard: 1. On the Tools menu, select Wizards, and then click Advanced Open File Option Wizard. 2. Follow the on-screen prompts. When the Static Volume Setting screen appears, you can specify an alternate location for the static volume or volumes. It is highly recommended that you do not change the defaults.

984

Administrator’s Guide

Changing the Advanced Open File Option Default Settings

3. On the Open File Option Configuration screen, enter new defaults using the following table. Static Volume Settings for VERITAS Volume Snapshot Provider Description

Have Backup Exec calculate the initial and maximum size of the static volume

Enables Backup Exec to automatically calculate the initial and maximum size of the static volume for each backup. If the cache file is located on the volume that is being snapped, Backup Exec uses the following calculations: For the initial size, Backup Exec calculates 10 percent of the used space and 50 percent of the free space, and then uses the smaller number. For the maximum size, Backup Exec calculates 30 percent of the used space and 90 percent of the free space, and then uses the smaller number. If the cache file is located on a different volume than the volume that is being snapped, Backup Exec uses the following calculations: The initial size is zero. For the maximum size, Backup Exec calculates 30 percent of the free space on the target volume and uses that figure. The maximum size cannot be smaller than the initial size. If the maximum size is calculated to be smaller than the initial size, Backup Exec sets the maximum size to match the initial size. Both the initial size and the maximum size must be larger than 50 MB.

Initial size of the static Sets the initial size of the static volume. volume (1 - 100 percent): If you choose not to use the default, then type the percentage of free space you want Advanced Open File Option to use to create the static volume. Increase this percentage if you receive an error message stating that Advanced Open File Option is out of disk space. This increase enables additional free space to be allocated on the volume, which then can be used during the backup. VERITAS recommends that you set the maximum size before you set the initial size.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

985

Open File Option

Item

Changing the Advanced Open File Option Default Settings Static Volume Settings for VERITAS Volume Snapshot Provider (continued) Item

Description

Maximum size that the static volume can grow to:

Sets the maximum size of the static volume. If you choose not to use the default, then type the maximum percentage that you allow for the static volume. If the static volume exceeds the percentage indicated, the job will fail and the error will be listed in the job log. If the cache file is located on the volume that is being snapped, Backup Exec uses the figure you type in this field to calculate the percentage of used space on the volume. Backup Exec also calculates 90 percent of the used space on the volume and uses the smaller number. If the cache file is located on a different volume than the volume that is being snapped, Backup Exec uses the figure you type in this field to calculate the percentage of free space on the volume and uses that number. The maximum size cannot be smaller than the initial size. If the maximum size is calculated to be smaller than the initial size, Backup Exec sets the maximum size to match the initial size. The maximum size must be larger than 50 MB.

Number of seconds during which there can be no disk activity before the static volume is created

Sets the minimum length of quiet time in seconds, in which the application waits for disk inactivity before the static volume is created. Decrease this setting if you have an active system so that the static volume can be created before reaching the maximum length of quiet time. The recommended minimum length is five seconds, but you can choose between two and four seconds.

Number of seconds that the application tries to obtain the minimum quiet time, after which the job fails

986

Sets the maximum length of quiet time in which the application waits for disk inactivity before creating the static volume. Increase this setting if a backup fails repeatedly. Increasing this setting maximizes the length of time used to create the static volume. The default is 2,000 seconds.

Administrator’s Guide

Using the Advanced Open File Option

Using the Advanced Open File Option You can use the Advanced Open File Option for specific backup jobs, or you can set the Advanced Open File Option as the default to be used for every backup job.

Note When using encrypted files with the Advanced Open File Option (AOFO) on Windows 2000 computers, a drive letter for the frozen image will display in Windows Explorer and the Backup Exec Administration Console. Do not attempt to access or back up this drive letter. If no drive letters are available, the job is logged as Complete with Exceptions. After each job is completed, check the Job Log to make sure the Advanced Open File Option was used during the backup.

Selecting the Advanced Open File Option for a Single Backup Job ▼

To set the Advanced Open File Option for a single backup job: 1. On the navigation bar, click Backup. 2. Select the data you want to back up from the Backup Selections tree or choose an existing selection list using the Load Selections from Existing List button. 3. On the Properties pane, under Settings, click Advanced Open File. 4.

Select Use Advanced Open File Option. Selecting this option activates the Advanced Open File Option for use with the job.

Note Backing up files and directories by following junction points is supported only if you are using the Advanced Open File Option on a Windows 2000 volume, and you are using the VERITAS Volume Snapshot Provider.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

987

Open File Option

If the volume selected for backup does not meet the requirements for using the Advanced Open File Option, then other options for backing up open files will apply to the backup. For example, if the option to back up open files with a lock is selected on the Advanced Backup dialog box, that option applies to a backup job if the Advanced Open File Option cannot run on the volume.

Using the Advanced Open File Option

5. Select the appropriate option from the following: Advanced Open File options Item

Description

Use Advanced Open File Option

Activates the Advanced Open File Option for use with Backup Exec for Windows Servers.

Open file configuration Automatically select open file technology

Enables Backup Exec to select the best open file technology to use for the type of data being backed up. If you select this option for a Windows Server 2003 computer, VSS is used when Shadow Copy Components are selected, but VSP is used in all other cases. If the Windows Server 2003 computer does not have VSP installed, Backup Exec looks for VSS and uses it as the default.

VERITAS Volume Snapshot Provider

Backup Exec’s default open file option technology. It is compatible with each of Microsoft’s operating environments (Windows NT 4.0, Windows 2000, Windows XP or Windows Server 2003).

VERITAS Volume Manager FlashSnap Option

VERITAS Volume Manager version 3.0, along with Service Pack 1 or greater, along with the FlashSnap Option. For use with VERITAS Volume Manager in a Windows 2000 environment only. Note The volumes you want to use with the FlashSnap Option must first be snap-started through VERITAS Volume Manager, using the VERITAS Enterprise Administrator (VEA). For more information, see “Snap Starting a VERITAS Volume Manager Volume” on page 992.

Microsoft Volume Shadow Copy Service

For use with vendor-specific, third party software, along with Windows XP or Windows Server 2003 Microsoft’s Volume Shadow Copy Service technology enables third party hardware and software vendors to create snapshot plugins for use with Microsoft’s technology.

Use ServerFree Option

Enables Backup Exec to use third party copy support if your storage hardware supports it and you are running in a SAN environment. For more information, see “VERITAS Backup Exec - ServerFree Option” on page 967.

6. Start the backup job or select other backup options from the Properties pane. 988

Administrator’s Guide

Using the Advanced Open File Option

7. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then expand the job you want to view.

See also: “Selecting the Advanced Open File Option for a Single Backup Job” on page 987 “Selecting Data to Back Up” on page 265 “Using Selection Lists” on page 274 “Creating a Manual Backup Job by Configuring Job Properties” on page 242 “Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on page 989 “Checking the Job Log When Using the Advanced Open File Option” on page 991 “Advanced Open File Option Error Messages” on page 993

Setting Advanced Open File Option as the Default Setting for All Backup Jobs You can set the Advanced Open File Option as the default to be used for all backup jobs. If the volume selected for backup does not meet the requirements for using the Advanced Open File Option, then any other selected options for backing up open files apply to the backup. For example, if the option to back up open files With a lock has been selected on the Backup Job properties dialog box under the Advanced node, that option will apply to all backup jobs if the Advanced Open File Option cannot run on the volume. Note Jobs saved before the Advanced Open File Option was installed will continue to use the previous settings for backing up open files. In order to use the Advanced Open File Option with these jobs, you must edit the job and select Use Advanced Open File Option. ▼

To set the Advanced Open File Option as the default: 1. On the Tools menu, click Options. 2. Under Settings, click Advanced Open File.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

989

Open File Option

8. Check the Job Log to make sure the Advanced Open File Option is being used during the backup.

Using the Advanced Open File Option Options-Set Application Defaults for Advanced Open File Option

3. Select Use Advanced Open File Option. Selecting this option causes Backup Exec to use the Advanced Open File Option for all backup jobs. Note Remember, the Backup Open Files options (Never; If closed within 30 seconds; With a lock; Without a lock) only apply if the volume selected for backup does not meet the requirements for using the Advanced Open File Option. Note Backing up files and directories by following junction points is supported only if you are using the Advanced Open File Option on a Windows 2000 volume, and you are using the VERITAS Volume Snapshot Provider. 4. Select any other appropriate options, and then click OK. See also: “Checking the Job Log When Using the Advanced Open File Option” on page 991 “Advanced Open File Option Error Messages” on page 993 “Setting Default Backup Options” on page 320

990

Administrator’s Guide

Using the Advanced Open File Option

Checking the Job Log When Using the Advanced Open File Option

Job Log Example

If the backup included more than one volume, this information is repeated for each volume. If the Advanced Open File Option fails on initialization, the backup still runs but it is marked as failed in the job log. If the Advanced Open File Option fails during the backup of a device, that backup set is terminated and is reported as an error. Failed AOFO jobs may leave an active image on the computer, causing subsequent jobs to fail with an unknown error. If this occurs, reboot the computer to clear the active image.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

991

Open File Option

If a backup completes successfully while using the Advanced Open File Option, information is displayed in the Job Log.

Snap Starting a VERITAS Volume Manager Volume

Snap Starting a VERITAS Volume Manager Volume ▼

To Snap Start a volume: 1. Start VERITAS Enterprise Administrator (VEA). 2. Expand the Volumes object in the left pane, and then right-click the volume to Snap Start. 3. On the short cut menu, select Snap, and then select Snap Start. 4. On the Snap Start Volume screen, select either Auto select disks or Manually select disks. Note Auto select disks enables Volume Manager to make the disk selection for you, while Manually select disks enables you to make the selection. 5. Click OK to close the Volume Manager. During the Backup Exec backup job, the volume is snapshot (split from the original) in preparation for the backup operation on the local host. These operations are done automatically by the Volume Manager components during the backup job. After the backup job completes, the snapshot is resynchronized to the original volume. Note Snap Starting a volume only needs to be done once. The Snap Start procedure takes a considerable amount of time because it creates a mirror. To make backup selections from the volume, see “Selecting Data to Back Up” on page 265. Caution If you are backing up SQL or Exchange databases on the Snap started volume, you must make your selections using the Backup Exec SQL or Exchange database agents. For more information, see “VERITAS Backup Exec - Agent for Microsoft SQL Server” on page 999 and “VERITAS Backup Exec - Agent for Microsoft Exchange Server” on page 1093.

992

Administrator’s Guide

Advanced Open File Option Error Messages

Advanced Open File Option Error Messages The following table lists common AOFO error messages and their solutions.

Error Message

Problem

Solution

Microsoft Volume Shadow Copy Service error: Bad State

This is a VERITAS Volume Snapshot Provider internal error. More details may be available in the Windows Event Log.

Restart VERITAS Volume Snapshot Provider and Backup Exec for Windows Servers services. If this fails to solve the issue, the VERITAS Volume Snapshot Provider may need to be re-installed.

Microsoft Volume Shadow Copy Service error: Snapshot Provider not registered.

Backup Exec for Windows Servers detected that the underlying Snapshot provider is either not installed or is not working.

Install or re-install the snapshot provider. Reboot the computer.

Microsoft Volume The volume specified by the user is Check the Windows Event Log for Shadow Copy Service not supported for snapshot. details on how to correct the error: problem. Volume not supported for snapshot Microsoft Volume Shadow Copy Service error: Cannot add anymore volumes since the maximum limit has been exceeded.

Maximum number of volumes that Split the job so that fewer volumes can be supported by the Microsoft are involved per job. Volume Shadow Copy Service has been reached. The maximum number of volumes supported is 64.

Microsoft Volume Volume is currently locked by some Shadow Copy Service other process and cannot be Error: snapped. Volume is in use.

Check for the process that has locked the file. Either quiescence it or wait until it is done, and then re-submit the job.

Microsoft Volume Out of disk space during the Shadow Copy Service snapshot. error: Insufficient storage

Make sure that at least one volume has enough space to save the snapshot cache file.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

993

Open File Option

Advanced Open File Option error messages

Advanced Open File Option Error Messages Advanced Open File Option error messages (continued) Error Message

Problem

Solution

Snapshot ran out of memory

This should never be seen.

Check the Windows Virtual Page file size and available disk space. You may need to increase both.

Snapshot reports unable to mount

Snapshot open file option or the provider could not mount the volume specified.

Check the Windows Event Log for more details. Also check to determine if the volume can be mounted manually.

Snapshot version error

Snapshot version number is not supported by Backup Exec for Windows Servers.

Ensure that the Snapshot version number is one supported by Backup Exec. Check the VERITAS website for compatibility (www.veritas.com).

Snapshot timed out mounting volume

Snapshot exceeded the time limit allowed for mounting a volume.

Check the Windows Event Log for more details. Also determine if the volume is locked by another process. You can also verify that the volume can be mounted manually.

Snapshot cannot meet minimum quiet time

Snapshot cannot meet the minimum quiet time specified by the user on the target machine. The default is five (5) seconds.

Either increase the quite time using the Advanced Open File Option wizard, or submit the job when there is less activity on the volume.

Snapshot unable to read real disk

The snapshot provider indicates Check that the disk is readable. that the real disk could not be read. Make sure that the mount points are valid and browsable.

Snapshot is not able to create a snapshot of a virtual snap volume

Volume specified for snapshot is not Remove virtual volumes from your a physical volume. Advanced Open job and provide the physical volume File Option does not support virtual name instead. volumes.

Snapshot not taken The evaluation period has expired You need to either extend the because the for Backup Exec and the Advanced evaluation period or purchase the evaluation period has Open File Option. Advanced Open File Option. expired

994

Administrator’s Guide

Advanced Open File Option Error Messages Advanced Open File Option error messages (continued) Error Message

Problem

Snapshot job specified has incompatible snapshot types. VERITAS Volume Snapshot Provider and Volume Manager cannot be used for shadow copy backups.

The specified backup job includes shadow copy components. These components cannot be snapped using either VERITAS Volume Snapshot Provider and Volume Manager

There must be enough free disk space on one volume to create the Microsoft Volume Shadow Copy Service cache file.

Use Microsoft’s Volume Shadow Copy Service for shadow copy component backup. Volume Shadow Copy Service is available only on Windows XP and Windows Server 2003 servers.

The Advanced Open The AOFO option was upgraded File Option will not be from a previous version of Backup available until the Exec. system is rebooted.

Reboot the system to load the updated AOFO driver.

Static file has grown The static file has outgrown the to maximum size and maximum size specified for the cannot be Advanced Open File Option. incremented anymore.

On the AOFO Wizard Advanced Open File Option Configuration dialog, select the option Have Backup Exec calculate the initial and maximum size of the static volume. This allows Backup Exec to automatically calculate the initial and maximum size of the static volume for each backup. Or, using the AOFO Wizard, increase the space in the Initial size of the static volume (1-100 percent).

Volume name is invalid or not available.

A location for the static file was Enter a valid drive and path for the entered, but the drive does not exist static volume. For more or is not a local or valid drive. information, see “Changing the Advanced Open File Option Default Settings” on page 984.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

995

Open File Option

Microsoft Volume Out of disk space. Shadow Copy Service Snapshot CacheFileBroker was unable to allocate cache files

Solution

Advanced Open File Option Error Messages Advanced Open File Option error messages (continued) Error Message

Problem

Data read error on physical volume.

You may have cross link clusters or Fix the disk errors using scan disk, other disk errors. and then restart the backup for that volume.

Driver failed to load.

The Advanced Open File Option files may have been installed incorrectly, or may have been deleted after installation.

Reinstall the Advanced Open File Option on the machine that failed.

Driver version is incompatible.

A software component that is incompatible with the Advanced Open File Option has been loaded.

Reinstall the Advanced Open File Option on the machine that failed.

Error during backup. Set has been terminated.

An error occurred within AOFO.

Check job log for a more detailed error.

Error while writing to static volume.

A disk error has occurred.

Fix the disk errors using scan disk, and then restart the backup for that volume.

A Win32 error has occurred.

The temporary drive mapping to the static volume does not exist.

Use the AOFO wizard to change the location of the static volume to a path that exists on the drive.

File system is not NTFS or FAT.

This is not a file system supported by Advanced Open File Option.

This is not a file system supported by Advanced Open File Option.

Evaluation period has The evaluation period has been been exceeded. exceeded.

996

Solution

Contact your reseller.

Incompatible major version.

A software component that is incompatible with the Advanced Open File Option has been loaded.

The AOFO version is mismatched with Backup Exec. Reinstall the version of AOFO that came with the Backup Exec installation CD.

Incompatible minor version.

A software component that is incompatible with the Advanced Open File Option has been loaded.

The AOFO version is mismatched with Backup Exec. Reinstall the version of AOFO that came with the Backup Exec installation CD.

Administrator’s Guide

Advanced Open File Option Error Messages Advanced Open File Option error messages (continued) Problem

Solution

Initialization failure on: “Device name”

During initialization of the Advanced Open File Option, an error occurred.

Read the accompanying detailed message for more information on this particular error.

IO attach error has occurred.

This is a network error. A server Check your server or check with may not be available or responding. your network administrator.

Not available on specified volume.

The volume being backed up is a CD-ROM drive or floppy diskette.

Not enough disk space for work volume.

The static volume has exceeded the Check the amount of free space amount of free space available. available; you may need to add more free space. Restart the backup for that volume.

OFO: Volume specified is not snappable. Possible reasons: Volume has NOT been Snap Started or is a non-dynamic (basic) volume.

Volume Manager 3.x can only snapshot dynamic volumes; it cannot snapshot basic volumes.

Unable to get minimum quiet time window for physical volume.

In order to create the static volume, there can be no disk activity for six seconds. Each time the static volume grows, another six seconds of disk inactivity is required.

This is not currently supported.

Do not select basic volumes directly or indirectly (via mount points) for backup with Volume Manager. Jobs with mount points will also fail Instead, back up dynamic volumes by assigning drive letters to the with the same error message. volumes.

Appendix F, VERITAS Backup Exec - Advanced Open File Option

The backup runs, but without using the Advanced Open File Option. Reduce the traffic on this volume, or wait and run the backup when there is less disk activity on the volume.

997

Open File Option

Error Message

Advanced Open File Option Error Messages

998

Administrator’s Guide

VERITAS Backup Exec - Agent for Microsoft SQL Server

G

For information about protecting SQL Server on Windows Server 2003 using the SQL Server Writer, see “Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer” on page 1089 Continue reading for information about using the SQL Agent with SQL 2000 installations, or for information about using the SQL Agent with SQL 7.0 installations, see “About the Agent for SQL 7.0” on page 1047. In SQL 2000 installations, the SQL Agent provides support for: ◆

Backups of multiple instances.



Database, transaction log, differential, and filegroup backups, as well as database recovery and replacement.



Database Consistency Checks (DBCC) for each backup and restore job, including a fast database consistency check of only the physical consistency of the database.



Restores of transaction logs to a specific point in time or to a named transaction when log marks are used.



Full, bulk-logged, and simple recovery models. The simple recovery model is similar to setting the truncate log on checkpoint option in SQL 7.0. With the simple recovery model, copies of the transactions are not stored in the log file, which prevents transaction log backups from being run. Therefore, you can recover the database to the point of the last backup, but you cannot restore the database to the point of failure or to a specific point in time.



Standby database. If the primary SQL server fails, or is shut down for maintenance, another database called a standby database can be brought online. The standby database contains a copy of the primary server's databases so that users can continue to access the database even though the primary server is unavailable. When the

999

SQL Agent

The VERITAS Backup Exec for Windows Servers - Agent for Microsoft SQL Server (SQL Agent) enables network administrators to perform backup and restore operations on installations of SQL that are connected to a network. SQL database backups can be integrated with network backups without separate administration or dedicated hardware.

Requirements for Using the SQL Agent with SQL 2000

primary server is available again, the changes on the standby database must be restored back to the primary server or the changes will be lost. The databases on the primary server should then be backed up and restored on the standby database again. Backup Exec provides a backup option that enables you to put the database in standby mode when the log file backup completes, and a recovery completion state of Leave database read-only and able to restore additional transaction logs to create and maintain a standby database. ◆

An automated restore of the master database.



The Intelligent Disaster Recovery option, which automates the disaster recovery process of SQL 2000.

See also: “Installing the SQL Agent” on page 1001

Requirements for Using the SQL Agent with SQL 2000 The following are required for the SQL Agent: ◆

Backup Exec must have access rights to read both of the following SQL registry keys: -

HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server

-

HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer

If Backup Exec does not have access to these registry keys, a restore to the default directory may not work, and the option Automate master database restore on the Restore Job Properties for SQL dialog box will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on.

1000



The media server must have access to the SQL installation.



The credentials stored in the Backup Exec logon account used for backing up and restoring SQL must have been granted the System Administrator role on the SQL instance.

Administrator’s Guide

Installing the SQL Agent

Installing the SQL Agent The VERITAS Backup Exec Agent for Microsoft SQL Server is installed locally as a separate, add-on component of Backup Exec for Windows Servers, and can protect local or remote SQL Server databases. Whenever the SQL Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the SQL Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources from a remote server for backup until a Remote Agent has been installed.

However, if the SQL Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it on another Windows server. The 64-bit Remote Agent can protect 64-bit SQL databases. For instructions on installing the SQL Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the 32-bit Remote Agent on a remote resource, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847. For instructions on installing the 64-bit Remote Agent to protect remote 64-bit SQL databases, see “Installing the Remote Agent on a 64-bit Computer Using the Installation Program” on page 846

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1001

SQL Agent

If you are using the SQL Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the SQL Agent installation to one remote Windows server so that resource can be protected by Backup Exec.

Using Backup Exec Logon Accounts for SQL 2000 Resources

Using Backup Exec Logon Accounts for SQL 2000 Resources To back up SQL, use a Backup Exec logon account that stores the credentials of a Windows user account. The Windows user account must have been granted the System Administrator role on the SQL instance. In the backup selections list or in the resource credentials list, apply that logon account to the Windows server that SQL is installed on, not to the actual SQL instance.

The Backup Exec logon account containing the Windows credentials is applied to the Windows server that SQL is installed on

1002

Administrator’s Guide

Using Backup Exec Logon Accounts for SQL 2000 Resources

If you are using SQL Server Authentication, then add a Backup Exec logon account that stores the credentials of the SQL user account. In the backup selections list, apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the logon account for the SQL user account to the SQL instance.

If you use a Backup Exec logon account that does not have the proper rights, you will receive an error message stating that the username and password are invalid. See also: “Changing Logon Accounts for Resources” on page 273 “Configuring Logon Accounts” on page 363

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1003

SQL Agent

The Backup Exec logon account containing the SQL user account credentials is applied to the SQL instance

Backup Strategies for SQL 2000

Backup Strategies for SQL 2000 Backup Exec incorporates online, nondisruptive SQL database protection as part of everyday backup routines, which increases the chance of data recovery and minimizes data loss without inhibiting daily database activity. Using database, differential, and log backups provides a good balance between backup windows and minimizes the amount of time that will be spent recovering a database if the need arises. To decide which backup methods to use for the best data protection, consider the following for typical environments: ◆

In small environments, consider running a daily full database backup every evening and daily transaction log backups.



In mid-sized environments, consider running a weekly full database backup and daily transaction log backups along with daily differential backups except on the day when the full backup is run.



In large environments, consider running daily differential database backups, weekly full database backups, and transaction log backups as necessary. Many shops run full backups on a weekly basis, preferring to run differential backups throughout the week to keep backup run time to a minimum. Extremely large environments may need to run filegroup backups in order to split the full backup over several days. Log backups are required to be able to recover a system from a filegroup backup.

The trade-off with running fewer full backups and running more differential backups occurs at recovery time when you must recover using the full database backup as well as the last differential database backup, and all log backups made after the last differential database backup. What will work best for you will be based on the size of your environment, the number of transactions processed each day, and the expectations of your users when a recovery is required. When developing a SQL backup strategy, consider the following: Recommendations for backing up SQL 2000

1004

SQL Server backup strategies:

Description:

Protect the entire SQL Server.

To make sure SQL is completely protected, back up the following on a regular basis: Š

The system drive that SQL is on.

Š

The Windows registry and System State.

Š

SQL databases or filegroups. You do not need to back up both.

Š

Transaction logs.

Administrator’s Guide

Backup Strategies for SQL 2000 Recommendations for backing up SQL 2000 (continued) Description:

Back up both system and user databases and transaction logs regularly.

Copies of the master and model databases are automatically created by Backup Exec whenever you back up the master and model databases. If these databases become corrupted or are missing, and SQL cannot be started, you can replace them with the copies of the master and model databases, and then start SQL. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases, if needed. If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the C: drive, it will automatically replace the damaged databases with the copies of the master and model databases that you made.

When you upgrade, run If you upgrade SQL, run new full database backups. You may not be new full database able to restore backups from one version or service pack level of SQL to backups. other versions. If you have filegroups, back them up instead of databases. Do not back up filegroups and databases.

When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Different filegroups can be backed up at different times and frequencies. A combination of filegroup and log backups provides complete database protection.

Run consistency checks after backups.

We recommend that you run a consistency check after a backup. If a database, transaction log, or filegroup contains errors when it is backed up, the backup will still contain the errors when it is restored, if it is restorable at all. These consistency checks include: Š

A full consistency check, including indexes. This check will have significant impacts on SQL performance; therefore, it should be performed in off-peak hours.

Š

A full consistency check with no index check. While not as thorough as a full consistency check that includes indexes, this check is faster and can be done during peak hours with little impact on system performance.

Š

A physical only check. Another low-overhead check, this method checks only the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1005

SQL Agent

SQL Server backup strategies:

Consistency Checks for SQL 2000 Recommendations for backing up SQL 2000 (continued) SQL Server backup strategies:

Description:

Back up the master Back up the master database whenever procedures are run that change database whenever data information in the database, especially after: is changed in the Š New databases are created. master database. Š Files are added to an existing database. Š

Usernames or passwords are added or changed.

If changes are not backed up before the master database must be restored, the changes are lost. Run one backup at a time.

Do not schedule more than one backup to occur simultaneously against a database or its transaction log, or a filegroup.

Consistency Checks for SQL 2000 If you back up a database, transaction log, or filegroup that contains errors, these errors will still exist when the backup is restored. In some cases, this can prevent a successful restore. Backup Exec enables you to check the logical and physical consistency of the data before and after a backup. SQL reports any consistency check failures in the Backup Exec job log. It is strongly recommended that you always run a consistency check either before or after the backup. Backup Exec’s consistency check uses the following SQL consistency check utilities: ◆

CHECKDB



CHECKCATALOG



CHECKFILEGROUP



PHYSICAL_ONLY

CHECKDB, CHECKCATALOG, and PHYSICAL_ONLY are performed for database-related operations. CHECKFILEGROUP is performed for filegroup-related operations. For more information concerning these utilities, see your Microsoft SQL documentation. See also: “Setting Backup Options for SQL 2000” on page 1008

1006

Administrator’s Guide

Using the Advanced Open File Option with SQL 2000

Using the Advanced Open File Option with SQL 2000 The VERITAS Backup Exec for Windows Servers - Advanced Open File Option (AOFO) is installed as a separate, add-on component of Backup Exec for Windows Servers. The Advanced Open File Option uses advanced open file and image technologies designed to alleviate issues that are sometimes encountered during backup operations, such as protecting open files and managing shortened backup windows. The AOFO supports only SQL Server 2000. When using the AOFO with SQL backups, note the following: It is recommended that SQL backup jobs be run separately from AOFO Volume Shadow Copy Service and Volume Snapshot Provider backup jobs. If you select Microsoft Volume Shadow Copy Service or VERITAS Volume Snapshot Provider, the SQL databases may freeze for several minutes while the snapshot is initiated. All activity on the SQL Server 2000 is stopped while the snapshot is being made. Volume Shadow Copy Service and Volume Snapshot Provider backups also incur additional overhead to the SQL backups. VERITAS Volume Manager FlashSnap Option will freeze the SQL databases for only a few seconds. ◆

SQL backups made with the AOFO are considerably bigger than regular SQL backups.



SQL filegroups can be backed up using AOFO but only one filegroup per database can be backed up in a job.



For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are made of the master and model databases. Copies are only made when non-AOFO backups of master and model are run. If you are using AOFO for SQL backups, make at least one backup of the master and model databases without using AOFO. If SQL 2000 is upgraded, refresh the copies with another non-AOFO backup.

SQL backups made using the AOFO will fail if: ◆

Multiple databases are selected for backup and SQL Service Pack 2 is not installed. If SQL Service Pack 2 is installed, you can select multiple databases at the same time for backup.



A differential or transaction log backup method is selected.

See also: “VERITAS Backup Exec - Advanced Open File Option” on page 977

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1007

SQL Agent



Setting Backup Options for SQL 2000

Setting Backup Options for SQL 2000 This procedure details how to select backup job properties for SQL and provides definitions for SQL-specific backup options. For details on how to create a backup job, and for definitions of all other backup options, see “Creating a Backup Job” on page 241. ▼

To select backup job properties for SQL 2000: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click SQL.

1008

Administrator’s Guide

Setting Backup Options for SQL 2000

3. Select the appropriate options as follows: Backup job properties for SQL Description

Backup method:

Š

Full - Back up entire database or filegroup. Select this to back up the entire database or filegroup. See “Backing Up SQL 2000 Databases” on page 1012. This option is selected by default.

Š

Log - Back up transaction log. Select this to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). Select this option to be able to select No recover or Standby under Enable SQL 2000 advanced log backup options. See “Backing Up SQL 2000 Transaction Logs” on page 1016.

Š

Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See “Backing Up SQL 2000 Transaction Logs” on page 1016.

Š

Differential - Back up database or filegroup changes only. Select this to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point in time that the differential backup was created, you should also create multiple log backups between the differential backups.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1009

SQL Agent

Item

Setting Backup Options for SQL 2000 Backup job properties for SQL (continued) Item

Description

Consistency check before backup

Select a consistency check to run before a backup. Š

None. Select this if you do not want a consistency check to run before a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Š

Physical check only (SQL 2000 only). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Continue with backup if Select this to continue with the backup operation even if the consistency check fails consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.

1010

Administrator’s Guide

Setting Backup Options for SQL 2000 Backup job properties for SQL (continued) Item

Description

Consistency check after Select a consistency check to run after a backup. Because database backup transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup. None. Select this if you do not want a consistency check to run after a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Š

Physical check only (SQL 2000). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Enable SQL 2000 advanced log backup options

This option is available only when the selected backup method is Log - Back up transaction log.

No recover - Place database in loading state

Select this option to put the database in a loading state when the log file backup completes. Users cannot connect to or query the database while it is in a loading state.

Standby - Place database in standby state

Select this option to put the database in standby mode when the log file backup completes. Users can connect to and query the database when it is in standby mode, but cannot update it.

Select this option to choose either the No Recover - Place database in loading state option or the Standby - place database in standby state option to apply to the backup.

Convert a standby database to a live database by restoring the latest transaction log and specifying the recovery completion state Leave database operational. No additional transaction logs can be restored.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1011

SQL Agent

Š

Setting Backup Options for SQL 2000 Backup job properties for SQL (continued) Item

Description

Guide Me

Click this to start a wizard that helps you select backup job properties for SQL.

See also: “Selecting Data to Back Up” on page 265 “Using Selection Lists” on page 274 “Consistency Checks for SQL 2000” on page 1006

Backing Up SQL 2000 Databases Backup Exec includes two methods for backing up databases: full and differential. The full method backs up the entire database including all system tables and filegroups. The differential method backs up only the changes made to the database since the last full backup. A differential backup is smaller and faster than a full backup, so differential backups can be run more often than full backups. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. Using transaction log backups allows you to recover the database to the exact point of failure. Consider using differential backups when only a relatively small amount of data changes between full backups, or if the same data changes often. Differential backups may also work well in your environment if you are using the simple recovery model and need backups more often, but cannot spare the time to do frequent full backups. If you are using the full or bulk-logged recovery models, you can use differential backups to decrease the time it takes to roll forward log backups when restoring a database. If you want to run database backups only, instead of a mix of database and log backups, use the simple recovery model for the database so that the transaction log is automatically truncated when a checkpoint occurs in the database. This helps prevent transaction logs from becoming full since with other recovery models the logs are not cleared after a database backup. With the simple recovery model, copies of the transactions are not stored in the log file, which prevents transaction log backups from being run. Therefore, you can recover the database to the point of the last backup, but you cannot restore the database to the point of failure or to a specific point in time. The master database can only be backed up with the full method; you cannot use the log or differential methods to back up the master database. 1012

Administrator’s Guide

Setting Backup Options for SQL 2000 ▼

To back up SQL 2000 databases: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002.

A list of shared network directories appears, along with an icon that represents the SQL installation. To select all databases in SQL, click the checkbox preceding the SQL icon, or you can select specific databases by clicking the SQL icon, and then selecting individual databases.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1013

SQL Agent

3. To select SQL data from local or remote selections, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server.

Setting Backup Options for SQL 2000

4. To select the SQL backup job properties, on the Properties pane, under Settings, click SQL. 5. After selecting job options, start the backup job or select other backup options from the Properties pane. See also: “Backing Up Data” on page 239 “Backing Up SQL 2000 Transaction Logs” on page 1016 “Setting Backup Options for SQL 2000” on page 1008

Backing Up SQL 2000 Filegroups When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Filegroups can be backed up at different times and frequencies. Filegroups that change often can be backed up more frequently than filegroups that remain more static. In certain situations, filegroup backups can greatly reduce restore time. For example, if a nonprimary filegroup is destroyed or corrupted, only that filegroup has to be restored. Backup Exec includes two methods for backing up filegroups: full and differential. The full method backs up the entire filegroup. The differential method backs up only the changes made to the filegroup since the last full backup. A differential backup is smaller and faster than a full backup, so differential backups can be run more often than full backups. Consider using differential backups when only a relatively small amount of data changes between full filegroup backups, or if the same data changes often. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. Using transaction log backups allows you to recover the filegroup to the exact point of failure. A combination of full and differential filegroup backups and transaction log backups provides complete database protection. Log backups are required to be able to recover a system from a filegroup backup. Before filegroups are displayed on the backup selections pane, you must enable an option on the SQL applications default dialog box. ▼

To display filegroups on the backup selections pane: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click SQL. 3. Select the option Display filegroups when creating new backup jobs.

1014

Administrator’s Guide

Setting Backup Options for SQL 2000 ▼

To back up SQL 2000 filegroups: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002.

Expand the SQL container and select specific filegroups.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1015

SQL Agent

3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server.

Setting Backup Options for SQL 2000

4. To select SQL backup job properties, on the Properties pane, under Settings, click SQL. 5.

After selecting job options, start the backup job or select other backup options from the Properties pane.

See also: “Backing Up Data” on page 239 “Setting Backup Options for SQL 2000” on page 1008.

Backing Up SQL 2000 Transaction Logs Backup Exec includes two methods for backing up transaction logs: Log and Log No Truncate. Use the Log method to back up only the data contained in the transaction log. After the transaction log is backed up, committed transactions are removed (truncated). Do not use this method when the following has occurred: ◆

The transaction log has been truncated, unless you run a full or differential backup after the transaction log truncation occurs and before running a log backup.



Files are added or deleted from the database. You should immediately run a full backup instead.

Use the Log No Truncate method only when the database is corrupted or database files are missing. This method backs up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the last database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. To use the Log No Truncate backup to restore a database, you should also have a database backup that was created before the Log No Truncate backup. The transaction log contains only the log files used in the restore process, which alone are not sufficient to restore a complete database. You must have at least one database backup or a full set of filegroup backups and a log backup of the database to restore a database. Caution Do not run a log backup using either method if the SQL 2000 database is using the simple recovery model. With the simple recovery model, you can recover data only up to the most recent full or differential backup. If you run a log backup on a database using the simple recovery completion state, the backup will fail.

1016

Administrator’s Guide

Setting Backup Options for SQL 2000

To check the database properties, from the Enterprise Manager on the SQL Server, right-click the database, click Properties, click the Options tab, and then view the configuration settings. ▼

To back up SQL 2000 transaction logs: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up.

3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the SQL installation. 4. To select SQL backup job properties, on the Properties pane, under Settings, click SQL. 5.

After selecting job options, start the backup job or select other backup options from the Properties pane.

See also: “Setting Backup Options for SQL 2000” on page 1008 “About Restoring SQL 2000 Databases and Filegroups” on page 1023 “Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1025 “Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on page 1026

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1017

SQL Agent

For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002.

Restore Options for SQL 2000

Restore Options for SQL 2000 This procedure details how to select restore job properties for SQL, and provides definitions for SQL-specific restore options. For details on how to create a restore job, and for definitions of all other restore options see “Restoring Data” on page 411. ▼

To select restore job properties for SQL 2000: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click SQL.

1018

Administrator’s Guide

Restore Options for SQL 2000

3. Select the appropriate options as follows: Restore job properties for SQL Item

Description

Recovery completion state Leave database operational. No additional transaction logs can be restored.

If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. Select this option during a restore if you have additional Leave database nonoperational but able differential or transaction log backups to be restored in another restore job. to restore additional transaction logs (No Recovery) Leave database read-only and able to restore additional transaction logs

Select this option during transaction log and database restore to create and maintain a standby database. See your SQL documentation for information on standby databases.

(Standby) Replace databases or filegroups

Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace Databases or Filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when the REPLACE option is not selected.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1019

SQL Agent

(With Recovery)

Select this option when restoring the last database, differential, or log backup in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable.

Restore Options for SQL 2000 Restore job properties for SQL (continued) Item

Description

Automate master database restore

Select this checkbox to enable Backup Exec to stop SQL so that the master database can be restored. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys, HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server, and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on.

Consistency check after Š restore

None. Select this if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information. If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.

1020

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged. This option is selected by default.

Š

Physical check only (SQL 2000 only). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Administrator’s Guide

Restore Options for SQL 2000 Restore job properties for SQL (continued) Item

Description

Default drive for Use this option to select a default drive to which SQL database files restoring database files: can be restored if the drive where one or more of the database files previously resided no longer exists.

However, if the drive where one or more of the database files previously resided no longer exists, Backup Exec moves those files to their original directory path, but on the default drive specified. Using the same example, if the default drive C: is specified, then the file with the original directory path of E:\MSSQL7\DATA\pubs.mdf is restored to C:\MSSQL7\DATA\pubs.mdf. If no default drive is specified in this situation, the job will fail. Restore all database files to default drive

Select this checkbox to restore all database files to their original directory path on the default drive, even if the drive where they originally resided exists. To make this option available, select a drive letter in Default drive for restoring database files. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from.

Restore all database Select this checkbox to restore files to the default data and log files to the target directories of the destination instance. For example, if you are instance’s data location restoring a database to a different instance of SQL, you would select this option to move the database files to the correct location for the new instance. If this option is not selected, then the files are restored to the directory that the master database is in. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1021

SQL Agent

When a SQL database is backed up, the physical file names (which include the directory path) of the files that make up the database are stored in the backup set by SQL. For example, for the logical file pubs, the physical file name is stored as E:\MSSQL7\DATA\pubs.mdf. If the database must later be restored, SQL uses these same physical file names to target the restore to. During a restore, Backup Exec automatically creates any necessary subdirectories that do not exist.

Restore Options for SQL 2000 Restore job properties for SQL (continued) Item

Description

Point in time log restore Select this checkbox to restore transactions from a transaction log up to and including a point in time in the transaction log. After the point in time, recovery from the transaction log is stopped. In the Date box, select the part of the date you want to change, and then enter a new date or click the arrow to display a calendar from which you can select a date. In the Time box, select the part of the time you want to change, and then enter a new time or click the arrows to select a new time. Restore log up to Select this checkbox to restore transactions from a transaction log named transaction (SQL up to a named transaction (or named mark) in the transaction log; 2000) after that, recovery from the transaction log is stopped. The named transactions are case-sensitive. Check your client application event log to find dates and times of named transactions. Include the named transaction

Select this checkbox to include the named transaction in the restore; otherwise the restore will stop immediately before the named transaction is restored.

Found after

Select this checkbox to specify a date and time after which the restore operation is to search for the named transaction. For example, if you specify a restore from a log up to the named transaction AfternoonBreak, found after 6/02/2000, 12:01 p.m., then the restore operation will not search for AfternoonBreak until after that time.

Guide Me

Click this to start a wizard that helps you select restore job properties for SQL.

See also: “About Restoring SQL 2000 Databases and Filegroups” on page 1023. “Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1025 “Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on page 1026 “Restoring from SQL 2000 Filegroup Backups” on page 1027

1022

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

About Restoring SQL 2000 Databases and Filegroups You can restore a database using one job or using multiple jobs to restore all of the backup sets, depending on the types of backup used to protect the database or filegroup. To restore a database using one job, select all the backup sets that you want to apply, including the full backup, any differential backups, and any log backups, and select the option Leave database operational. No additional transaction logs can be restored. Single-job restores and multiple-job restores can both be used in redirected restore operations. Some restore operations must be completed using separate restore jobs to recover data. These operations include Restoring a database or a primary filegroup from a filegroup backup. Separate restore jobs must be used to restore the primary filegroup, to restore the rest of the filegroup backup sets, and to restore the transaction logs.



Restoring a nonprimary filegroup. After running a Log No Truncate backup, separate restore jobs must be used to restore the missing filegroup from full and differential backups of the filegroups, and to restore the transaction logs.

If you use multiple jobs to restore a database, make sure that you specify the recovery completion state Leave database nonoperational but able to restore additional transaction logs for all the jobs except the last one, for which you should specify the recovery completion state Leave database operational. SQL database files contain unused space so that the disk file does not have be grown every time a small amount of data is added to the database. SQL fills the unused space with zeros. When SQL databases are restored, it is not known how much of the file will actually be used by the restored data, so SQL creates the required database files on disk and then fills them with zeros. With very large databases this process can take several hours to complete. During this time Backup Exec reports that no data is being transferred, and the Byte count field in the Job Monitor view is not updated. When SQL has completed filling the files with zeros, the restore job continues. This occurs for all database restores but is noticeable only on very large databases.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1023

SQL Agent



About Restoring SQL 2000 Databases and Filegroups

For steps on how to create the restore job, and for descriptions of all the options for restoring SQL data, see “Redirecting Restores for SQL 2000” on page 1032. Note SQL 7.0 database backups can be restored to SQL 2000, but SQL 2000 backups cannot be restored to SQL 7.0. See also: “Restoring Data” on page 411 “Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1025 “Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on page 1026 “Restoring from SQL 2000 Filegroup Backups” on page 1027 “Redirecting Restores for SQL 2000” on page 1032

Restoring from SQL 2000 Database Backups If the database is using the simple recovery model, there are no transaction log backups to restore. You only need to restore the most recent full database backup and if you were running differential database backups, restore the most recent differential database backup. For details on all other restore options, see “Restoring Data” on page 411. ▼

To restore from full and differential database backups: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the most recent full database backup set, and the most recent differential database backup set, if any, to restore. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. For information on other SQL restore options, see “Restore Options for SQL 2000” on page 1018. 6. Start the restore job or select other restore options from the Properties pane. See also: “About Restoring SQL 2000 Databases and Filegroups” on page 1023

1024

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

Restoring from SQL 2000 Transaction Logs Up to a Point in Time You can restore transactions from a transaction log up to and including a point in time in the transaction log. After the point in time is reached, recovery from the transaction log is stopped. To find dates and times of transactions, check your client application event log. If the specified point in time is later than the time contained in the most recent transaction log being restored, then the restore operation succeeds, but a warning is generated and the database remains in an intermediate state. If the specified point in time is before the time contained in the transaction log or logs being restored, no transactions are restored.

SQL Agent



To restore up to and including a point in time. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the most recent full database backup set, and the most recent differential database backup set, if any, and all the log backup sets you want to restore. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 6. Select Point in time log restore, and then select a date and time. For information on selecting other options, see “Restore Options for SQL 2000” on page 1018. 7.

Start the restore job or select other restore options from the Properties pane.

See also: “Restoring Data” on page 411 “About Restoring SQL 2000 Databases and Filegroups” on page 1023

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1025

About Restoring SQL 2000 Databases and Filegroups

Restoring from SQL 2000 Transaction Logs Up to a Named Transaction You can restore transactions from a transaction log up to and including a named transaction (or mark). After the named transaction is reached, recovery from the transaction log is stopped. Since named transactions do not necessarily have unique names, you can also specify a date and time after which the restore operation is to search for the named transaction. For example, if you specify a restore from a log up to the named transaction AfternoonBreak, found after 6/02/2000, 12:01 p.m., then the restore operation will not search for AfternoonBreak until after that time. To find dates and times of named transactions, check your client application event log. If the named transaction is not found, then the restore operation succeeds, but a warning is generated and the database remains in an intermediate state. The names of transactions are case-sensitive. Make sure you enter the correct upper- and lower-case characters when specifying a named transaction. ▼

Restore up to and including a named transaction. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the most recent full database backup set, and the most recent differential database backup set, if any, and all the log backup sets you want to restore. 4. On the Properties pane, under Settings, click SQL. 5. On Restore Job Properties for SQL, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 6. Select Restore log up to named transaction, and then enter the name of the transaction. The names are case-sensitive. Make sure you enter the correct upper- and lower-case characters.

1026

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

7. To include the named transaction in the restore, select Include the named transaction. 8. To specify a particular named transaction in the log, select Found after and then select a date and time. If a date and time are not entered, recovery from the transaction log is stopped at the first transaction with the specified name. For information on other SQL restore options, see “Redirecting Restores for SQL 2000” on page 1032. 9. Start the restore job or select other restore options from the Properties pane.

SQL Agent

See also: “Restoring Data” on page 411 “About Restoring SQL 2000 Databases and Filegroups” on page 1023

Restoring from SQL 2000 Filegroup Backups With filegroup backups, you can restore the entire database, a primary filegroup, a filegroup containing a deleted or changed table, and a nonprimary filegroup. The following are conditions for filegroup restores: ◆

All filegroups must be restored to the same point in time. For example, if a table is deleted from a filegroup, you cannot restore that filegroup to a point in time before the table was deleted and then leave it at that time; you must continue restoring the filegroup to the same point in time shared by all existing filegroups. To be able to restore a filegroup to the same point in time as the other filegroups, run one of the following log backups: -

If the database is intact, run a Log backup.

-

If any files or filegroups are missing, run a Log - No Truncate backup.

Note If the primary filegroup is missing, the log backup methods are unavailable. You can restore the database only up to the last log backup. ◆

Filegroup restores can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA then the filegroup must be restored to G:\SQLDATA, regardless of the server the restore is redirected to.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1027

About Restoring SQL 2000 Databases and Filegroups

The options Restore all databases to default drive and Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box do not apply to filegroup restores. Filegroups must be restored to the same drive letter and path that they were backed up from.





When restoring from filegroup backups, separate restore jobs are required.



Previous versions of Backup Exec cannot restore filegroup backups made with Backup Exec v9.1.

To restore the entire database, a missing primary filegroup, or a filegroup containing a deleted or changed table: Note Use separate restore jobs to restore the primary filegroup, the rest of the filegroup backup sets, and the transaction logs. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup set containing the primary filegroup. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs. For information on other SQL restore options, see “Redirecting Restores for SQL 2000” on page 1032. 6. Start the restore job. 7. After the primary filegroup is restored, select the rest of the filegroup backup sets containing the latest full and differential backups. 8.

On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs, and then start the restore job.

9. When the full and differential backups are restored, select the backup set containing the transaction logs.

1028

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

10. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational and restore all of the transaction logs, or select Point in time log restore or Restore log up to named transaction. 11. Start the restore job or select other restore options from the Properties pane. For information on other restore options, see “Restoring Data” on page 411. ▼

To restore a missing or corrupted filegroup: 1. On the navigation bar, click Backup.

SQL Agent

2. On the Properties pane, under Source, click Selections. 3. In the backup selections list, select the database. 4. On the Properties pane, under Settings, click SQL. 5. Select the backup method Log No Truncate, select None for a consistency check, and then start the backup job. 6. After the Log No Truncate backup is complete, restore the missing or corrupted filegroup by selecting the filegroup backup sets containing the latest full and differential backups, and the transaction log backups. 7. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 8. Start the restore job or select other restore options from the Properties pane. See also: “Restoring Data” on page 411

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1029

About Restoring SQL 2000 Databases and Filegroups

Restoring the SQL 2000 Master Database If the master database is damaged, symptoms may include: ◆

An inability to start SQL.



Segmentation faults or input/output errors.



A report generated by SQL Database Consistency Checker utility (DBCC).

If you can still start SQL, you can restore the latest copy of the master database backup using the Automate master database restore option in Backup Exec’s Restore Job Properties for SQL dialog box and then restore any other databases, if needed. If the master database is critically damaged and SQL cannot be started, rather than running the Rebuild Master utility or reinstalling SQL to be able to restart SQL, you can replace the corrupted or missing databases with the copies of the master and model databases that Backup Exec automatically creates and updates whenever backups of those databases are run. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases, if needed. If copies of the master and model databases were not made, then you must use Microsoft’s rebuildm.exe utility to rebuild the master database and start SQL. Because all changes made to the master database after the last backup was created are lost when the backup is restored, the changes must be reapplied. If any user databases were created after the master database was backed up, those databases cannot be accessed until the databases are restored from backups or reattached to SQL. ▼

To restart SQL using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in.

1030

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

2. Open a command prompt window, and delete the original master and model databases and their transaction logs. For example: C:\Program Files\Microsoft SQL Server\MSSQL\Data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names. Type the following

C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename mastlog$4idr mastlog.ldf C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename model$4idr model.mdf C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename modellog$4idr modellog.ldf 4. Use the SQL Service Control Manager to start SQL Server. 5. Continue with the next procedure to restore the latest changes to the master database. ▼

To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. On the restore selections list, select the backup set containing the last master database backup. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select Automate master database restore. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1031

SQL Agent

C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename master$4idr master.mdf

About Restoring SQL 2000 Databases and Filegroups

default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the account that Backup Exec uses has administrator rights to the computer that is running SQL. 6. Select a consistency check to be run after the restore. 7. Start the restore job. After the restore, SQL is restarted in multi-user mode. See also: “Restoring Data” on page 411

Redirecting Restores for SQL 2000 You can redirect the following: ◆

A database backup to a different server, database, or instance.



Differential and log backups to wherever the associated database is restored.



One or more filegroups in a backup to a different server or instance. Filegroups can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA, then it must be restored to G:\SQLDATA, even if it is redirected to another server. Filegroups must be restored to the same drive letter and path that they were backed up from.

Single-job restores and multiple-job restores can both be used in redirected restore operations. ▼

To redirect a restore: 1. Follow the instructions for the appropriate restore: -

“Restoring from SQL 2000 Database Backups” on page 1024.

-

“Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1025.

-

“Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on page 1026.

-

“Restoring from SQL 2000 Filegroup Backups” on page 1027.

2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click SQL Redirection.

1032

Administrator’s Guide

About Restoring SQL 2000 Databases and Filegroups

SQL Agent 3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane: Restore job properties for redirected SQL sets Item

Description

Redirect Microsoft SQL Server sets

Select this checkbox to enable redirection of SQL backup sets.

Restore to server

To redirect this restore to a different server, type the target server name. You can redirect a full database backup to a different server or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box (see Restore Options for SQL 2000 on page 1018).

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1033

About Restoring SQL 2000 Databases and Filegroups Restore job properties for redirected SQL sets (continued) Item

Description

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The Windows user account must have been granted the System Administrator role on the SQL instance. The default logon account is displayed. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002.

SQL logon account

If you are using SQL Server Authentication, use a Backup Exec logon account that stores the credentials of the SQL user account. Apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the logon account for the SQL user account to the SQL instance. To use another logon account, click Change. To remove the SQL logon account displayed in this field, click Clear. For more information about logon accounts, see “Using Backup Exec Logon Accounts for SQL 2000 Resources” on page 1002.

Restore to named instance (SQL 2000)

To redirect this restore to a named instance, type the instance name. If you are restoring to the default instance, leave the field empty.

Restore to database

To redirect the restore to a different database on the target server, type the target database name; otherwise, leave the field blank. You can redirect a full database backup to a different server and/or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or select Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box (see “Redirecting Restores for SQL 2000” on page 1032). If you are restoring a differential or log backup, and the associated database backup was restored to a different server, enter the new database name.

See also: “Restoring Data” on page 411 “About Restoring SQL 2000 Databases and Filegroups” on page 1023

1034

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 2000

Setting Default Backup and Restore Options for SQL 2000 You can use the defaults set by Backup Exec during installation for all SQL backup and restore jobs, or you can choose your own defaults. You can also change the defaults for any specific backup or restore job. ▼

To change backup and restore defaults for SQL: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click SQL.

SQL Agent

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1035

Setting Default Backup and Restore Options for SQL 2000

3. Select the appropriate options as follows: Options - set application defaults for SQL Item

Description

Backup Backup method

Š

Full - Back up entire database or filegroup. Select this to back up the entire database or filegroup. See “Backing Up SQL 2000 Databases” on page 1012. This option is selected by default.

Š

Log - Back up transaction log. Select this to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). See “Backing Up SQL 2000 Transaction Logs” on page 1016.

Š

Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See “Backing Up SQL 2000 Transaction Logs” on page 1016.

Š

1036

Differential - Back up database or filegroup changes only. Select this to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. See “Backing Up SQL 2000 Databases” on page 1012.

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 2000 Options - set application defaults for SQL Item

Description

Consistency check before backup

Select a consistency check to run before a backup. None. Select this if you do not want a consistency check to run before a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Š

Physical check only (SQL 2000 only). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Select this to continue with the backup operation even if the consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1037

SQL Agent

Continue with backup if consistency check fails

Š

Setting Default Backup and Restore Options for SQL 2000 Options - set application defaults for SQL Item

Description

Consistency check after backup

Select a consistency check to run after a backup. Because database transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup. Š

None. Select this if you do not want a consistency check to run after a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Š

Physical check only (SQL 2000 only). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Display filegroups when Select this checkbox if filegroups exist that you want to select for creating new backup jobs backup. If this checkbox is not selected, filegroups are not displayed as backup selections.

1038

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 2000 Options - set application defaults for SQL Item

Description

Restore Recovery completion state

Š

If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. This option is selected by default.

Replace databases or filegroups

Š

Leave database nonoperational but able to restore additional transaction logs (No Recovery). Select this option during a restore if you have additional differential or transaction log backups to be restored in another restore job.

Š

Leave database read-only and able to restore additional transaction logs (Standby). Select this option during transaction log and database restores to create and maintain a standby database. See your SQL documentation for information on standby databases.

Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace databases or filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when the REPLACE option is not selected.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1039

SQL Agent

Leave database operational. No additional transaction logs can be restored (With Recovery). Select this option when restoring the last database, differential, or log backups in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable.

Setting Default Backup and Restore Options for SQL 2000 Options - set application defaults for SQL Item

Description

Consistency check after restore

Š

None. Select this if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information. If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.

1040

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged. This option is selected by default.

Š

Physical check only (SQL 2000 only). Select this to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.

Administrator’s Guide

Preparing for Disaster Recovery of SQL 2000

Preparing for Disaster Recovery of SQL 2000 Backup Exec provides a quicker method for restoring SQL rather than running the Rebuild Master utility or reinstalling SQL to restart SQL. Using Backup Exec, you can replace the corrupted or missing databases with copies of the master and model databases that Backup Exec automatically creates and updates whenever backups of those databases are run. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases, if needed.

Caution For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are made of the master and model databases. Copies are only made when non-AOFO backups of master and model are run. If you are using AOFO for SQL backups, make at least one backup of the master and model databases without using AOFO. If SQL 2000 is upgraded, refresh the copies with another non-AOFO backup.

To prepare for disaster recovery, do the following: ◆

Back up both system and user databases and transaction logs regularly. Copies of the master and model databases are automatically created by Backup Exec whenever you back up the master and model databases. Backup Exec places these copies in the same directory that the databases are in, where they must remain in order to be updated. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* The copies of the master and model databases are named: -

Master$4idr

-

Mastlog$4idr

-

Model$4idr

-

Modellog$4idr

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1041

SQL Agent

If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the C: drive, it will automatically replace the damaged databases with the copies of the master and model databases. You can then restart SQL, and restore the latest master database backup and any other databases that are necessary.

Disaster Recovery of SQL 2000 ◆

Back up the system drives that contain SQL instances. Whenever you back up the system drive that contains a SQL instance, copies of the master and model databases are created. Backing up the system drive that SQL is on also backs up all the executables and registry settings needed for SQL to run.



Back up the master database whenever any changes are made to SQL.



Keep records of any service packs that have been installed.



Review “Disaster Preparation of the Windows Computer” on page 551 to make sure you are prepared to recover the entire server, not just SQL.

To perform a recovery, you will need: ◆

The latest backup of the SQL directory (\Program Files\Microsoft SQL Server\MSSQL), and the Windows registry/System State.



The SQL database or filegroup backups, and differential and log backups.



An Administrator logon account (or an Administrator equivalent) during the recovery.

Disaster Recovery of SQL 2000 You can restore either the entire server, including the SQL databases, from full system backups, or restore only the SQL databases to a newly installed or other available SQL server. Restoring the entire server including the SQL databases Restoring the entire server, including the SQL databases has the added benefit of recovering other applications and data that may have resided on the server at the time of failure, and can be accomplished using one of the following methods:

1042



Manual recovery of the Windows server, and then manual recovery of the SQL databases. This method involves manually restoring the Windows server from full system backups, and then recovering the SQL databases.



The Intelligent Disaster Recovery Option. This option provides an automated method of restoring the Windows server as well as the SQL databases from full system backups. See “Microsoft SQL Server Recovery Notes” on page 936.

Administrator’s Guide

Disaster Recovery of SQL 2000

Restoring only the SQL databases ◆

To restore only the SQL databases to a newly-installed or other available server, the server must be running on the same hardware platform (cross-platform restores are not supported), and the same version of SQL with the same service pack level as the original server.



To restore SQL databases to an existing installation of SQL with other active databases, see “Redirecting Restores for SQL 2000” on page 1032.

Manual Recovery of SQL 2000

In order to restore SQL databases, SQL must be running; however, SQL cannot be started unless the master and model databases are present. You can restore the master and model databases and start SQL using one of the following methods: ◆

Rename the files created by Backup Exec that replace the master and model databases. After the master and model databases are present on SQL, you must start SQL, restore the master database with the Automate master database restore option, and then restore all other databases.



Run the Rebuild Master utility (\Program Files\Microsoft SQL Server\80\Tools\Binn\rebuildm.exe) to rebuild the master database.



Reinstall SQL.

This topic only details how to restart SQL by using the copies of the master and model databases made by Backup Exec. For more information on the Rebuild Master utility, or on reinstalling SQL, refer to your Microsoft SQL documentation. If you are restoring to a new SQL installation, start with “To restore the master database:” on page 1031.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1043

SQL Agent

If necessary, restore the Windows computer by following the instructions in “Manual Disaster Recovery of Windows Computers” on page 558. After recovery of the Windows computer is complete, or after the new server installation is available, recovery of the SQL databases can begin.

Disaster Recovery of SQL 2000 ▼

To restart SQL using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in. 2. Open a command prompt window, and delete the original master and model databases and their transaction logs. Type the following: C:\program files\microsoft sql server\mssql\data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names. Type the following C:\program files\microsoft sql server\mssql\data> rename master$4idr master.mdf C:\program files\microsoft sql server\mssql\data> rename mastlog$4idr mastlog.ldf C:\program files\microsoft sql server\mssql\data> rename model$4idr model.mdf C:\program files\microsoft sql server\mssql\data> rename modellog$4idr modellog.ldf 4. Use the SQL Service Control Manager to start SQL Server. 5. Continue with the next procedure to restore the latest changes to the master database.

1044

Administrator’s Guide

Disaster Recovery of SQL 2000 ▼

To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. On the restore selections list, select the backup set containing the last master database backup. 4. On the Properties pane, under Settings, click SQL.

All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the account that Backup Exec uses has administrator rights to the computer that is running SQL. 6. Select a consistency check to run after the restore. 7. Start the restore job. After the restore, SQL is restarted in multi-user mode. 8. Continue with the next procedure, restoring the remaining SQL databases. ▼

Restore the remaining SQL databases: Note Do not select the master database for restore at this time. If you are restoring the SQL databases from filegroup backups, go to “Restoring from SQL 2000 Filegroup Backups” on page 1027. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1045

SQL Agent

5. On the Restore Job Properties for SQL dialog box, select Automate master database restore.

Disaster Recovery of SQL 2000

3. Select all the backup sets that you want to apply, including the full backup, any differential backups, and any log backups. 4. On the Properties pane, under Settings, click SQL. 5. Select the option Leave database operational. No additional transaction logs can be restored. 6. Select the option Replace Databases or Filegroups. 7. In the Consistency Check After Database Restore field, select Full check, including indexes. 8. Start the restore job or select other options from the Properties pane. If the restore is being redirected, see “Redirecting Restores for SQL 2000” on page 1032. When all of the restore operations have completed successfully, then the recovery of the SQL databases is complete. After the recovery has been completed, it is strongly recommended that a full database backup be performed as soon as possible. See also: “Restoring Data” on page 411

1046

Administrator’s Guide

About the Agent for SQL 7.0

About the Agent for SQL 7.0 The VERITAS Backup Exec for Windows Servers - Agent for Microsoft SQL Server enables network administrators to perform backup and restore operations on installations of SQL 7.0 that are connected to a network. SQL database backups can be integrated with network backups without separate administration or dedicated hardware. Continue reading for information about the Agent for SQL 7.0 installations, or for information about the Agent for SQL 2000 installations, see “VERITAS Backup Exec Agent for Microsoft SQL Server” on page 999. The SQL Agent provides support for: Database, transaction log, differential, and filegroup backups, as well as database recovery and replacement.



Database Consistency Checks (DBCC) before and after each backup job.



Restores of transaction logs to a specific point in time.



Standby database. If the primary SQL server fails, or is shut down for maintenance, another database called a standby database can be brought online. The standby database contains a copy of the primary server's databases so that users can continue to access the database even though the primary server is unavailable. When the primary server is available again, the changes on the standby database must be restored back to the primary server or the changes will be lost. The databases on the primary server should then be backed up and restored on the standby database again. Backup Exec provides a backup option that enables you to put the database in standby mode when the log file backup completes, and a recovery completion state of Leave database read-only and able to restore additional transaction logs to create and maintain a standby database.



An automated restore of the master database.



The Intelligent Disaster Recovery option, which automates the disaster recovery process of SQL 7.0.

See also: “Installing the SQL Agent” on page 1049

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1047

SQL Agent



Requirements for Agent for SQL 7.0

Requirements for Agent for SQL 7.0 The following are required for the SQL Agent: ◆

Backup Exec must have access rights to read both of the following SQL registry keys: -

HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server

-

HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer

If Backup Exec does not have access to these registry keys, a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the Backup Exec logon account used has administrator rights to the Windows server that the SQL instance is installed on.

1048



The media server must have access to the SQL installation.



The credentials stored in the Backup Exec logon account used for backing up and restoring SQL must have been granted the System Administrator role on the SQL instance.

Administrator’s Guide

Installing the SQL Agent

Installing the SQL Agent The VERITAS Backup Exec Agent for Microsoft SQL Server is installed as a separate, add-on component of Backup Exec for Windows Servers, and can be installed locally or remotely to back up SQL Server databases. Whenever the SQL Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the SQL Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources from a remote server for backup until a Remote Agent has been installed.

However, if the SQL Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it on another Windows server. Note The 64-bit Remote Agent does not protect SQL 7.0 databases. For instructions on installing the SQL Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the SQL Agent on a remote resource, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1049

SQL Agent

If you are using the SQL Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the SQL Agent installation to one remote Windows server so that resource can be protected by Backup Exec.

Using Backup Exec Logon Accounts for SQL 7.0 Resources

Using Backup Exec Logon Accounts for SQL 7.0 Resources To back up SQL, use a Backup Exec logon account that stores the credentials of a Windows user account. The Windows user account must have been granted the System Administrator role on the SQL instance. In the backup selections list, apply that Backup Exec logon account to the Windows server that SQL is installed on, not to the actual SQL instance.

The Backup Exec logon account containing the Windows credentials is applied to the Windows server that SQL is installed on

1050

Administrator’s Guide

Using Backup Exec Logon Accounts for SQL 7.0 Resources

If you are using SQL Server Authentication, then add a Backup Exec logon account that stores the credentials of the SQL user account. In the backup selections list, apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the Backup Exec logon account for the SQL user account to the SQL instance.

If you use a Backup Exec logon account that does not have the proper rights, you will receive an error message stating that the username and password are invalid. See also: “Changing Logon Accounts for Resources” on page 273 “Configuring Logon Accounts” on page 363

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1051

SQL Agent

The Backup Exec logon account containing the SQL user account credentials is applied to the SQL instance

Backup Strategies for SQL 7.0

Backup Strategies for SQL 7.0 Backup Exec incorporates online nondisruptive SQL database protection as part of everyday backup routines, which increases the chance of data recovery and minimizes data loss without inhibiting daily database activity. Using database, differential, and log backups provides a good balance between backup windows and minimizes the amount of time that will be spent recovering a database if the need arises. To decide which backup methods to use for best data protection, consider the following for typical environments: ◆

In small environments, consider running a daily full database backup every evening and daily transaction log backups.



In mid-sized environments, consider running a weekly full database backup and daily transaction log backups along with daily differential backups except on the day when the full backup is run.



In large environments, consider running daily differential database backups, weekly full database backups, and transaction log backups as necessary. Many shops run full backups on a weekly basis, preferring to run differential backups throughout the week to keep backup run time to a minimum. Extremely large environments may need to run filegroup backups in order to split the full backup over several days. Log backups are required to be able to recover a system from a filegroup backup.

The trade-off with running fewer full backups and running more differential backups occurs at recovery time when you must recover using the full database backup as well as the last differential database backup and all log backups made after the last differential database backup. What will work best for you will be based on the size of your environment, the number of transactions processed each day, and the expectations of your users when a recovery is required. When developing a SQL backup strategy, consider the following: Recommendations for backing up SQL 7.0 SQL backup strategies: Description: Protect the entire SQL Server.

1052

To make sure SQL is completely protected, back up the following on a regular basis: Š

The system drive that SQL is on.

Š

The Windows registry and System State.

Š

SQL databases or filegroups. You do not need to back up both.

Š

Transaction logs.

Administrator’s Guide

Backup Strategies for SQL 7.0 Recommendations for backing up SQL 7.0 (continued) SQL backup strategies: Description: Create a copy of the master and model databases, and place the copies in the same directory that the databases are in.

If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the C: drive, it will automatically replace the damaged databases with the copies of the master and model databases that you made. For details, see “To create copies of the master and model databases:” on page 1085. When you upgrade, run If you upgrade SQL, run new full database backups. You may not be able to restore backups from one version or service pack level of SQL to new full database other versions. backups. If you have filegroups, run at least one full database backup first, then back up the filegroups instead of databases. Do not back up filegroups and databases.

When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Different filegroups can be backed up at different times and frequencies.

Run consistency checks after backups.

We recommend that you run a consistency check after a backup. If a database, transaction log, or filegroup contains errors when it is backed up, the backup will still contain the errors when it is restored, if it is restorable at all. These consistency checks include:

However, SQL 7.0 databases cannot be restored using only filegroup and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups.

Š

A full consistency check, including indexes. This check will have significant impacts on SQL performance; therefore, it should be performed in off-peak hours.

Š

A full consistency check with no index check. While not as thorough, this check is faster and can be done during peak hours with little impact on system performance.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1053

SQL Agent

Make copies of the master and model databases and place the copies in the same directory that the master and model databases are in. Then, if the master database becomes critically damaged and SQL cannot be started, instead of running the Rebuild Master utility or reinstalling SQL, you can replace the corrupted or missing databases with the copies of the master and model databases, and then start SQL. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases, if needed.

Consistency Checks for SQL 7.0 Recommendations for backing up SQL 7.0 (continued) SQL backup strategies: Description: Back up the master Back up the master database whenever procedures are run that change database whenever data information in the database, especially after: is changed in the Š New databases are created. master database. Š Files are added to an existing database. Š

Usernames or passwords are added or changed.

If changes are not backed up before the master database must be restored, the changes are lost. Run one backup at a time.

Do not schedule more than one backup to occur simultaneously against a database or its transaction log, or a filegroup.

Consistency Checks for SQL 7.0 If you back up a database, transaction log, or filegroup that contains errors, these errors will still exist when the backup is restored. In some cases, this can prevent a successful restore. Backup Exec enables you to check the logical and physical consistency of the data before and after a backup. SQL reports any consistency check failures in the Backup Exec job log. It is strongly recommended that you always run a consistency check either before or after the backup. Backup Exec’s consistency check uses the following SQL consistency check utilities: ◆

CHECKDB



CHECKCATALOG



CHECKFILEGROUP

CHECKDB and CHECKCATALOG are performed for database-related operations. CHECKFILEGROUP is performed for filegroup-related operations. For more information concerning these utilities, see your Microsoft SQL documentation. See also: “Setting Backup Options for SQL 7.0” on page 1055

1054

Administrator’s Guide

Setting Backup Options for SQL 7.0

Setting Backup Options for SQL 7.0 This procedure details how to select backup job properties for SQL and provides definitions for SQL-specific backup options. For details on how to create a backup job, and for definitions of all other backup options see “Creating a Backup Job” on page 241. ▼

To select backup job properties for SQL 7.0: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click SQL.

SQL Agent

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1055

Setting Backup Options for SQL 7.0

3. Select the appropriate options as follows:. Backup job properties for SQL 7.0 Item

Description

Backup Method

Š

Full - Back up entire database or filegroup. Select this to back up the entire database or filegroup. See “Backing Up SQL 7.0 Databases” on page 1058. This option is selected by default.

Š

Log - Back up transaction log. Select this to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). See “Backing Up SQL 7.0 Transaction Logs” on page 1062.

Š

Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See “Backing Up SQL 7.0 Transaction Logs” on page 1062.

Š

Differential - Back up database or filegroup changes only. Select this to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point in time that the differential backup was created, you should also create multiple log backups between the differential backups.

Consistency check before backup

1056

Select a consistency check to run before a backup. Š

None. Select this if you do not want a consistency check to run before a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Administrator’s Guide

Setting Backup Options for SQL 7.0 Backup job properties for SQL 7.0 Item

Description

Continue with backup if Select this checkbox to continue with the backup operation even if consistency check fails the consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.

Guide Me

Š

None. Select this if you do not want a consistency check to run after a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Click this to start a wizard that helps you select backup job properties for SQL.

See also: “Backing Up SQL 7.0 Databases” on page 1058 “Backing Up SQL 7.0 Filegroups” on page 1060 “Backing Up SQL 7.0 Transaction Logs” on page 1062

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1057

SQL Agent

Consistency check after Select a consistency check to run after a backup. Because database backup transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup.

Setting Backup Options for SQL 7.0

Backing Up SQL 7.0 Databases Backup Exec includes two methods for backing up databases: full and differential. The full method backs up the entire database including all system tables and filegroups. The differential method backs up only the changes made to the database since the last full backup. A differential backup is smaller and faster than a full backup, so differential backups can be run more often than full backups. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. Using transaction log backups allows you to recover the database to the exact point of failure. Consider using differential backups when only a relatively small amount of data changes between full database backups, or if the same data changes often. Differential backups may also work well in your environment if you need backups more often, but cannot spare the time to do frequent full database backups. If you want to run database backups only, instead of a mix of database and log backups, use SQL Enterprise Manager to enable the database option truncate log on checkpoint for each database you are backing up. Enabling this option causes the transaction log to be automatically truncated whenever a checkpoint occurs in the database. This helps prevent transaction logs from becoming full since the logs are not cleared after a database backup. If you do not run transaction log backups, you can recover the database to the point of the last backup, but you cannot restore the database to the point of failure or to a specific point in time. The master database can only be backed up with the full method; you cannot use the log or differential methods to back up the master database. ▼

To back up SQL 7.0 databases: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1050. 3. To select SQL data from local or remote selections, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the SQL installation.

1058

Administrator’s Guide

Setting Backup Options for SQL 7.0

To select all databases in SQL, click the checkbox preceding the SQL icon, or you can select specific databases by clicking the SQL icon, and then selecting individual databases.

SQL Agent 4. To select the SQL backup job properties, on the Properties pane, under Settings, click SQL. 5. Select options for the backup job. For details on these options, see “Setting Backup Options for SQL 7.0” on page 1055. 6. Start the backup job. For details on running or scheduling the job, as well as other backup options, see “Backing Up Data” on page 239.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1059

Setting Backup Options for SQL 7.0

Backing Up SQL 7.0 Filegroups When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Filegroups can be backed up at different times and frequencies. Filegroups that change often can be backed up more frequently than filegroups that remain more static. In certain situations, filegroup backups can greatly reduce restore time. For example, if a nonprimary filegroup is destroyed or corrupted, only that filegroup has to be restored. Backup Exec includes two methods for backing up filegroups: full and differential. The full method backs up the entire filegroup. The differential method backs up only the changes made to the filegroup since the last full backup. A differential backup is smaller and faster than a full backup, so differential backups can be run more often than full backups. Consider using differential backups when only a relatively small amount of data changes between full filegroup backups, or if the same data changes often. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. Using transaction log backups allows you to recover the filegroup to the exact point of failure. Caution SQL 7.0 databases cannot be restored using only filegroups and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups. Before filegroups are displayed on the backup selections pane, you must enable an option on the SQL applications default dialog box. ▼

To display filegroups on the backup selections pane: 1.

On the Backup Exec menu bar, click Tools, and then click Options.

2. On the Properties pane, under Job Defaults, click SQL to display the SQL application defaults dialog box. 3. Select the option Display filegroups when creating new backup jobs. ▼

To back up SQL 7.0 filegroups: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up.

1060

Administrator’s Guide

Setting Backup Options for SQL 7.0

For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1050. 3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. Expand the SQL container and select specific filegroups.

SQL Agent

4. To select SQL backup job properties, on the Properties pane, under Settings, click SQL. 5. After selecting job options, start the backup job or select other backup options from the Properties pane. See also: “Backing Up Data” on page 239 “Setting Backup Options for SQL 7.0” on page 1055

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1061

Setting Backup Options for SQL 7.0

Backing Up SQL 7.0 Transaction Logs Backup Exec includes two methods for backing up transaction logs: Log and Log No Truncate. Use the Log method to back up only the data contained in the transaction log. After the transaction log is backed up, committed transactions are removed (truncated). Do not use this method when the following has occurred: ◆

The transaction log has been truncated, unless you run a full or differential backup after the transaction log truncation occurs and before running a log backup.



Files are added or deleted from the database. You should immediately run a full backup instead.

Use the Log No Truncate method only when the database is corrupted or database files are missing. This method backs up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. To use the Log No Truncate backup to restore a database, you should also have a database backup that was created before the Log No Truncate backup. The transaction log contains only the log files used in the restore process, which alone are not sufficient to restore a complete database. You must have at least one database backup or a full set of filegroup backups to be able to restore a database. Do not run a log backup using either method if:

1062



The SQL database option truncate log on checkpoint is enabled. When this option is enabled, every time a checkpoint occurs in the database, the transaction log is truncated without the truncated part of the transaction log being backed up, which prevents more transaction log backups from being created. You should run a database or differential backup instead.



The SQL database option select into/bulkcopy is enabled, and nonlogged operations have occurred in the database since the last database backup was created. Nonlogged operations break the sequence of transaction log backups. The restore of a database using database and transaction log backups is successful only if there is an unbroken sequence of transaction log backups after the last database or differential backup. If these conditions are present, you should run a database or differential backup and then start running log backups again in order to save any changes necessary to restore the database.

Administrator’s Guide

Setting Backup Options for SQL 7.0 ▼

To back up SQL 7.0 transaction logs: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1050.

A list of shared network directories appears, along with an icon that represents the SQL installation. 4. To select SQL backup job properties, on the Properties pane, under Settings, click SQL. 5. After selecting job options, start the backup job or select other backup options from the Properties pane. 6. Start the backup job. For details on other backup options, see See also: “Setting Backup Options for SQL 7.0” on page 1055 “Restoring from SQL 7.0 Transaction Logs Up to a Point in Time” on page 1071

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1063

SQL Agent

3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server.

Restore Options for SQL 7.0

Restore Options for SQL 7.0 This procedure details how to select restore job properties for SQL and provides definitions of SQL-specific restore options. For details on how to create a restore job, and for definitions of all other restore options see “Restoring Data” on page 411. ▼

To select restore job properties for SQL 7.0: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click SQL.

1064

Administrator’s Guide

Restore Options for SQL 7.0

3. Select the appropriate options as follows: Restore job properties for SQL 7.0 Item

Description

Recovery completion state Leave database operational. No additional transaction logs can be restored

If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. This option is selected by default. Leave database Select this option during a restore if you have additional nonoperational but able differential or transaction log backups to be restored in another to restore additional restore job. transaction logs (No Recovery) Leave database read-only and able to restore additional transaction logs

Select this option during transaction log and database restore to create and maintain a standby database. See your SQL documentation for information on standby databases.

(Standby) Replace databases or filegroups

Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace Databases or Filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when the REPLACE option is not selected.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1065

SQL Agent

(With Recovery)

Select this option when restoring the last database, differential, or log backup in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable.

Restore Options for SQL 7.0 Restore job properties for SQL 7.0 Item

Description

Automate master database restore

Select this checkbox to enable Backup Exec to stop SQL so that the master database can be restored. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other data, those jobs will fail. If Backup Exec does not have access to the SQL registry keys, HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server, and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on.

Consistency check after Š restore

None. Select this if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information. If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.

1066

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged. This option is selected by default.

Administrator’s Guide

Restore Options for SQL 7.0 Restore job properties for SQL 7.0 Item

Description

Default drive for Use this option to select a default drive to which SQL database files restoring database files can be restored if the drive where one or more of the database files previously resided no longer exists.

However, if the drive where one or more of the database files previously resided no longer exists, Backup Exec moves those files to their original directory path, but on the default drive specified. Using the same example, if the default drive C: is specified, then the file with the original directory path of E:\MSSQL7\DATA\pubs.mdf is restored to C:\MSSQL7\DATA\pubs.mdf. If no default drive is specified in this situation, the job will fail. Restore all database files to default drive

Select this checkbox to restore all database files to their original directory path on the default drive, even if the drive where they originally resided exists. To make this option available, select a drive letter in Default drive for restoring database files. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from.

Restore all database Select this checkbox to restore files to the default data and log files to the target directories of the destination instance. For example, if you are instance’s data location restoring a database to a different instance of SQL, you would select this option to move the database files to the correct location for the new instance. If this option is not selected, then the files are restored to the directory that the master database is in. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1067

SQL Agent

When a SQL database is backed up, the physical file names (which include the directory path) of the files that make up the database are stored in the backup set by SQL. For example, for the logical file pubs, the physical file name is stored as E:\MSSQL7\DATA\pubs.mdf. If the database must later be restored, SQL uses these same physical file names to target the restore to. During a restore, Backup Exec automatically creates any necessary subdirectories that do not exist.

About Restoring SQL 7.0 Databases or Filegroups Restore job properties for SQL 7.0 Item

Description

Point in time log restore Select this checkbox to restore transactions from a transaction log up to and including a point in time in the transaction log. After the point in time, recovery from the transaction log is stopped. In the Date box, select the part of the date you want to change, and then enter a new date or click the arrow to display a calendar from which you can select a date. In the Time box, select the part of the time you want to change, and then enter a new time or click the arrows to select a new time. Guide Me

Click this to start a wizard that helps you select restore job properties for SQL.

See also: “About Restoring SQL 7.0 Databases or Filegroups” on page 1068 “Restoring from SQL 7.0 Transaction Logs Up to a Point in Time” on page 1071 “Restoring from SQL 7.0 Filegroup Backups” on page 1072

About Restoring SQL 7.0 Databases or Filegroups You can restore a database using one job or using multiple jobs to restore all of the backup sets, depending on the types of backup used to protect the database or filegroup. To restore a database using one job, select all the backup sets that you want to apply, including the full backup, any differential backups, and any log backups, and select the option Leave database operational. No additional transaction logs can be restored. Single-job restores and multiple-job restores can both be used in redirected restore operations. Some restore operations must be completed using separate restore jobs to recover data. These operations include ◆

Restoring a database or a primary filegroup from a filegroup backup. Separate restore jobs must be used to restore the database backup or the primary filegroup backup, to restore the rest of the filegroup backup sets, and to restore the transaction logs.

Caution SQL 7.0 databases cannot be restored using only filegroups and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups.

1068

Administrator’s Guide

About Restoring SQL 7.0 Databases or Filegroups ◆

Restoring a nonprimary filegroup. After running a Log No Truncate backup, separate restore jobs must be used to restore the missing nonprimary filegroup from full and differential backups of the filegroups, and to restore the transaction logs.

If you use multiple jobs to restore a database, make sure that you specify the recovery completion state Leave database nonoperational but able to restore additional transaction logs for all the jobs except the last one, for which you should specify the recovery completion state Leave database operational.

With very large databases this process can take several hours to complete. During this time Backup Exec reports that no data is being transferred, and the Byte count field in the Job Monitor view is not updated. When SQL has completed filling the files with zeros, the restore job continues. This occurs for all database restores but is noticeable only on very large databases. For steps on how to create the restore job, and for descriptions of all the options for restoring SQL data, see “Restoring Data” on page 411. Note SQL 7.0 database backups can be restored to SQL 2000, but SQL 2000 backups cannot be restored to SQL 7.0.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1069

SQL Agent

SQL database files contain unused space so that the disk file does not have be grown every time a small amount of data is added to the database. SQL fills the unused space with zeros. When SQL databases are restored, it is not known how much of the file will actually be used by the restored data, so SQL creates the required database files on disk and then fills them with zeros.

About Restoring SQL 7.0 Databases or Filegroups

Restoring from SQL 7.0 Database Backups If the SQL database option truncate log on checkpoint is set for the database, there are no transaction log backups to restore. You only need to restore the most recent full database backup and if you were running differential database backups, restore the most recent differential database backup. ▼

To restore from full and differential database backups: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the most recent full database backup set, and the most recent differential database backup set, if any, to restore. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. For information on other SQL restore options, see “Restore Options for SQL 7.0” on page 1064. 6. Start the restore job or select other restore options from the Properties pane. See also: “Restoring Data” on page 411 “About Restoring SQL 7.0 Databases or Filegroups” on page 1068

1070

Administrator’s Guide

About Restoring SQL 7.0 Databases or Filegroups

Restoring from SQL 7.0 Transaction Logs Up to a Point in Time You can restore transactions from a transaction log up to and including a point in time in the transaction log. After the point in time is reached, recovery from the transaction log is stopped. To find dates and times of transactions, check your client application event log. If the specified point in time is later than the time contained in the most recent transaction log being restored, then the restore operation succeeds, but a warning is generated and the database remains in an intermediate state. If the specified point in time is before the time contained in the transaction log or logs being restored, no transactions are restored. ▼

To restore up to and including a point in time.

SQL Agent

1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the most recent full database backup set, and the most recent differential database backup set, if any, and all the log backup sets you want to restore. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 6. Select Point in time log restore, and then select a date and time. For information on selecting other options, see “Restore Options for SQL 7.0” on page 1064. 7.

Start the restore job or select other restore options from the Properties pane.

See also: “Restoring Data” on page 411 “About Restoring SQL 7.0 Databases or Filegroups” on page 1068

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1071

About Restoring SQL 7.0 Databases or Filegroups

Restoring from SQL 7.0 Filegroup Backups With filegroup backups, you can restore a primary filegroup, a filegroup containing a deleted or changed table, and a nonprimary filegroup. Caution SQL 7.0 databases cannot be restored using only filegroups and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups. The following are conditions for filegroup restores: ◆

All filegroups must be restored to the same point in time. For example, if a table is deleted from a filegroup, you cannot restore that filegroup to a point in time before the table was deleted and then leave it at that time; you must continue restoring the filegroup to the same point in time shared by all existing filegroups. To be able to restore a filegroup to the same point in time as the other filegroups, run one of the following log backups: -

If the database is intact, run a Log backup.

-

If any files or filegroups are missing, run a Log - No Truncate backup.

Note If the primary filegroup is missing, the log backup methods are unavailable. You can restore the database only up to the last log backup. ◆

Filegroup restores can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA then the filegroup must be restored to G:\SQLDATA, regardless of the server the restore is redirected to. The options Restore all databases to default drive and Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box do not apply to filegroup restores. Filegroups must be restored to the same drive letter and path that they were backed up from.





Previous versions of Backup Exec cannot restore filegroup backups made with Backup Exec v9.1.

To restore a primary filegroup, or a filegroup containing a deleted or changed table: Note Use separate restore jobs to restore the primary filegroup, the rest of the filegroup backup sets, and the transaction logs.

1072

Administrator’s Guide

About Restoring SQL 7.0 Databases or Filegroups

1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup set containing the primary filegroup. 4. On the Properties pane, under Settings, click SQL.

6. Start the restore job. 7. After the primary filegroup is restored, select the rest of the filegroup backup sets containing the latest full and differential backups. 8.

On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs, and then start the restore job.

9. When the full and differential backups are restored, select the backup set containing the transaction logs. 10. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored and restore all of the transaction logs, or select Point in time log restore or Restore log up to named transaction, and then start the restore job. 11. Start the restore job or select other restore options from the Properties pane. For information on other restore options, see “Restoring Data” on page 411. ▼

To restore a missing or corrupted nonprimary filegroup: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selection. 3. In the backup selections list, select the database. 4. On the Properties pane, under Settings, click SQL. 5. Select the backup method Log No Truncate, select None for a consistency check, and then start the backup job.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1073

SQL Agent

5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs. For information on other SQL restore options, see “Redirecting Restores for SQL 7.0” on page 1076.

About Restoring SQL 7.0 Databases or Filegroups

6. After the Log No Truncate backup is complete, restore the missing filegroup by selecting the filegroup backup sets containing the latest full and differential backups, and the transaction log backups. 7. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 8. Start the restore job or select other restore options from the Properties pane. See also: “Restoring Data” on page 411

Restoring the SQL 7.0 Master Database If the master database is damaged, symptoms may include: ◆

An inability to start SQL.



Segmentation faults or input/output errors.



A report generated by SQL Database Consistency Checker utility (DBCC).

If you can still start SQL, you can restore the latest copy of the master database backup using the Automate master database restore option in Backup Exec’s Restore Job Properties for SQL, and then restore any other databases, if needed. If the master database is critically damaged and SQL cannot be started, rather than running the Rebuild Master utility, or reinstalling SQL to be able to restart SQL, you can replace the corrupted or missing databases with the copies of the master and model databases that you created as part of your disaster recovery preparation plan. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases if needed. If copies of the master and model databases were not made, then you must use Microsoft’s Rebuild Master utility (\MSSQL7\binn\Rebuildm.exe) to rebuild the master database and start SQL. For more information, refer to your Microsoft SQL documentation. Because all changes made to the master database after the last backup was created are lost when the backup is restored, the changes must be reapplied. If any user databases were created after the master database was backed up, those databases cannot be accessed until the databases are restored from backups or reattached to SQL.

1074

Administrator’s Guide

About Restoring SQL 7.0 Databases or Filegroups ▼

To restart SQL using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in.

Type the following: C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names. Type the following: C:\ mssql7\data> rename master$4idr master.mdf C:\ mssql7\data> rename mastlog$4idr mastlog.ldf C:\ mssql7\data> rename model$4idr model.mdf C:\ mssql7\data> rename modellog$4idr modellog.ldf 4. Use the SQL Server Service Manager to start SQL. 5. Continue with the next procedure to restore the latest changes to the master database. ▼

To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click SQL. 3. On the restore selections list, select the backup set containing the last master database backup. 4. On the Restore Job Properties for SQL dialog box, select Automate master database restore. All existing users are logged off, and SQL Server is put into single-user mode.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1075

SQL Agent

2. Open a command prompt window, and delete the original master and model databases and their transaction logs.

About Restoring SQL 7.0 Databases or Filegroups

When this option is selected, only the master database can be restored; if this option is selected for any other data, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on. 5. Select a consistency check to be run after the restore. 6. Start the restore job. After the restore, SQL is restarted in multi-user mode. See also: “Restoring Data” on page 411.

Redirecting Restores for SQL 7.0 You can redirect the following: ◆

A database backup to a different server, database, or instance.



Differential and log backups to wherever the associated database is restored.



One or more filegroups in a backup to a different server or instance. Filegroups can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA then it must be restored to G:\SQLDATA, even if it is redirected to another server. Filegroups must be restored to the same drive letter and path that they were backed up from.

Single-job restores and multiple-job restores can both be used in redirected restore operations. ▼

To redirect a restore: 1. Follow the instructions for the appropriate restore:

1076

-

“Restoring from SQL 7.0 Database Backups” on page 1070.

-

“Restoring from SQL 7.0 Transaction Logs Up to a Point in Time” on page 1071.

-

“Restoring from SQL 7.0 Filegroup Backups” on page 1072.

Administrator’s Guide

About Restoring SQL 7.0 Databases or Filegroups

2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click SQL Redirection.

SQL Agent 3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane: Restore job properties for redirected SQL sets Item

Description

Redirect Microsoft SQL Server sets

Select this checkbox to enable redirection of SQL backup sets.

Restore to server

To redirect this restore to a different server, type the target server name. You can redirect a full database backup to a different server or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box (see Restore Options for SQL 7.0 on page 1064).

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1077

About Restoring SQL 7.0 Databases or Filegroups Restore job properties for redirected SQL sets (continued) Item

Description

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The Windows user account must have been granted the System Administrator role on the SQL instance. The default logon account is displayed by default. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1050.

SQL logon account

If you are using SQL Server Authentication, use a Backup Exec logon account that stores the credentials of the SQL user account. Apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the logon account for the SQL user account to the SQL instance. To use another logon account, click Change. To remove the SQL logon account displayed in this field, click Clear. For more information about logon accounts, see “Using Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1050.

Restore to database

To redirect the restore to a different database on the target server, type the target database name in this field; otherwise, leave the field blank. You can redirect a full database backup to a different server and/or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or select Restore all database files to the target instance’s data location on the Restore Job Properties for SQL dialog box (see “Redirecting Restores for SQL 7.0” on page 1076). If you are restoring a differential or log backup, and the associated database backup was restored to a different server, enter the new database name.

See also: “Restoring Data” on page 411 “About Restoring SQL 7.0 Databases or Filegroups” on page 1068

1078

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 7.0

Setting Default Backup and Restore Options for SQL 7.0 You can use the defaults set by Backup Exec during installation for all SQL backup and restore jobs, or you can choose your own defaults. You can also change the defaults for any specific backup or restore job. ▼

To change backup and restore defaults for SQL: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click SQL.

SQL Agent

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1079

Setting Default Backup and Restore Options for SQL 7.0

3. Select the appropriate options as follows: Options - Set Application Defaults for SQL Item

Description

Backup Backup method

Š

Full - Back up entire database or filegroup. Select this to back up the entire database or filegroup. See “Backing Up SQL 7.0 Databases” on page 1058. This option is selected by default.

Š

Log - Back up transaction log. Select this to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). See “Backing Up SQL 7.0 Transaction Logs” on page 1062.

Š

Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See Backing Up SQL 7.0 Transaction Logs on page 1062.

Š

1080

Differential - Back up database or filegroup changes only. Select this to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point in time that the differential backup was created, you should also create multiple log backups between the differential backups. See “Backing Up SQL 7.0 Databases” on page 1058.

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 7.0 Options - Set Application Defaults for SQL (continued) Item

Description

Consistency check before backup

Select a consistency check to run before a backup. None. Select this if you do not want a consistency check to run before a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Continue with backup if consistency check fails

Select this checkbox to continue with the backup operation even if the consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.

Consistency check after backup

Select a consistency check to run after a backup. Because database transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup. Š

None. Select this if you do not want a consistency check to run after a backup. It is strongly recommended that you always run a consistency check either before or after the backup. This option is selected by default.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes. Select this to include indexes in the consistency check. Any errors are logged.

Display filegroups when Select this checkbox if filegroups exist that you want to select for creating new backup jobs backup. If this checkbox is not selected, filegroups exist are not displayed as backup selections.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1081

SQL Agent

Š

Setting Default Backup and Restore Options for SQL 7.0 Options - Set Application Defaults for SQL (continued) Item

Description

Restore Recovery completion state

Š

Leave database operational. No additional transaction logs can be restored (With Recovery). Select this when restoring the last database, differential, or log backups in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable. If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. This option is selected by default.

Replace databases or filegroups

Š

Leave database nonoperational but able to restore additional transaction logs (No Recovery). Select this option during a restore if you have additional differential or transaction log backups to be restored in another restore job.

Š

Leave database read-only and able to restore additional transaction logs (Standby). Select this option during transaction log and database restores to create and maintain a standby database. See your SQL documentation for information on standby databases.

Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace databases or filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when the SQL 7.0 REPLACE option is not selected.

1082

Administrator’s Guide

Setting Default Backup and Restore Options for SQL 7.0 Options - Set Application Defaults for SQL (continued) Item

Description

Consistency check after restore

Š

None. Select this if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information.

Š

Full check, excluding indexes. Select this to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked.

Š

Full check, including indexes.Select this to include indexes in the consistency check. Any errors are logged. This option is selected by default.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1083

SQL Agent

If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.

Preparing for Disaster Recovery of SQL 7.0

Preparing for Disaster Recovery of SQL 7.0 Backup Exec provides a quicker method for restoring SQL rather than running the Rebuild Master utility or reinstalling SQL. You can make copies of the master and model databases (as instructed in the following procedures), and then replace the corrupted or missing databases with those copies, and start SQL. After SQL is running again, you can restore the latest copy of the master database using Backup Exec’s Automate master database restore option, and then restore any other databases, if needed. If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the C: drive, it will automatically replace the damaged databases with the copies of the master and model databases that you made. You can then restart SQL, and restore the latest master database backup and any other databases that are necessary. To prepare for disaster recovery, do the following: ◆

Create a copy of the master and model databases, and place the copies in the same directory that the databases are in (see “To create copies of the master and model databases:” on page 1085).



Back up both system and user databases and transaction logs regularly.



Back up the system drive that contains SQL. Backing up the system drive that SQL is on also backs up all the executables and registry settings needed for SQL to run.



Back up the master database whenever any changes are made to SQL.



Keep records of any service packs that have been installed.



Review “Disaster Preparation of the Windows Computer” on page 551 to make sure you are prepared to recover the entire server, not just SQL.

To perform a recovery, you will need:

1084



The latest backup of the SQL directory (\Program Files\Microsoft SQL Server\MSSQL7), and the Windows registry.



The most recent SQL database or filegroup backup, and the most recent (if any) differential and log backups.



An Administrator logon account (or an Administrator equivalent) during the recovery.

Administrator’s Guide

Disaster Recovery of SQL 7.0 ▼

To create copies of the master and model databases: 1. Use the SQL Server Service Manager to stop the SQL services. 2. Open a command prompt window, and copy the original master and model databases and their transaction logs to the specified file names. In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. Type the following: C:\ mssql7\data> copy master.mdf master$4idr C:\ mssql7\data> copy mastlog.ldf mastlog$4idr

SQL Agent

C:\ mssql7\data> copy model.mdf model$4idr C:\ mssql7\data> copy modellog.ldf modellog$4idr

Disaster Recovery of SQL 7.0 You can restore either the entire server, including the SQL databases, from full system backups, or restore only the SQL databases to a newly installed or other available SQL server. Restoring the entire server including the SQL databases Restoring the entire server, including the SQL databases has the added benefit of recovering other applications and data that may have resided on the server at the time of failure, and can be accomplished using one of the following methods: ◆

Manual recovery of the Windows server, and then manual recovery of the SQL databases. This method involves manually restoring the Windows server from full system backups, and then recovering the SQL databases.



The Intelligent Disaster Recovery Option. This option provides an automated method of restoring the Windows server as well as the SQL databases from full system backups. See “Microsoft SQL Server Recovery Notes” on page 936.

Restoring only the SQL databases ◆

To restore only the SQL databases to a newly-installed or other available server, the server must be running on the same hardware platform (cross-platform restores are not supported), and the same version of SQL with the same service pack level as the original server.



To restore SQL databases to an existing installation of SQL with other active databases, see “Redirecting Restores for SQL 7.0” on page 1076.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1085

Disaster Recovery of SQL 7.0

Manual Recovery of SQL 7.0 If necessary, restore the Windows computer by following the instructions in “Manual Disaster Recovery of Windows Computers” on page 558. After recovery of the Windows computer is complete, or after the new server installation is available, recovery of the SQL databases can begin. In order to restore SQL databases, SQL must be running; however, SQL cannot be started unless the master and model databases are present. You can restore the master and model databases and start SQL using one of the following methods: ◆

Rename the files that replace the master and model databases and move them to the same directory that the original master and model databases are in. After the master and model databases are present on the SQL server, you must restart SQL, restore the master database with the Automate master database restore option, and then restore all other databases.



Run the Rebuild Master utility (\MSSQL7\binn\rebuildm.exe) to rebuild the master database and start SQL.



Reinstall SQL.

This topic only details how to restart SQL by using the copies of the master and model databases made by Backup Exec. For more information on the Rebuild Master utility, refer to your Microsoft SQL documentation. If you are restoring to a new SQL installation, start with “To restore the master database:” on page 1087. ▼

To restart SQL using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in. 2. Open a command prompt window, and delete the original master and model databases and their transaction logs. Type the following: C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf modellog.ldf

1086

Administrator’s Guide

Disaster Recovery of SQL 7.0

3. Rename the copies of the databases back to their original names. Type the following: C:\ mssql7\data> rename master$4idr master.mdf C:\ mssql7\data> rename mastlog$4idr mastlog.ldf C:\ mssql7\data> rename model$4idr model.mdf C:\ mssql7\data> rename modellog$4idr modellog.ldf 4. Use the SQL Server Service Manager to start SQL.



To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup set containing the last master database backup. 4. On the Properties pane, under Settings, click SQL. 5. On the Restore Job Properties for SQL dialog box, select Automate master database restore. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other data, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on. 6. Select a consistency check to run after the restore. 7. Start the restore job. After the restore, SQL is restarted in multi-user mode.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1087

SQL Agent

5. Continue with the next procedure to restore the latest changes to the master database.

Disaster Recovery of SQL 7.0

8. Continue with the next procedure, restoring the remaining SQL databases. ▼

Restore the remaining SQL databases: Note Do not select the master database for restore at this time. If you are restoring the SQL databases from filegroup backups, go to “Restoring from SQL 7.0 Database Backups” on page 1070. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. Select all the backup sets that you want to apply, including the full backup, any differential backups, and any log backups. 4. On the Properties pane, under Settings, click SQL. 5. Select the option Leave database operational. No additional transaction logs can be restored. 6. Select the option Replace Databases or Filegroups. 7. In the Consistency Check After Database Restore field, select Full check, including indexes. 8. Start the restore job or select other options from the Properties pane. If the restore is being redirected, see “Redirecting Restores for SQL 7.0” on page 1076. When all of the restore operations have completed successfully, then the recovery of the SQL databases is complete. After the recovery has been completed, it is strongly recommended that a full database backup be performed as soon as possible. See also: “Restoring Data” on page 411

1088

Administrator’s Guide

Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer

Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections in Backup Exec.

Although both the SQL Agent and the SQL Server Writer can protect SQL Server on Windows 2003 resources, the SQL Agent provides more features than the SQL Server Writer. For example, the SQL Agent provides online, nondisruptive backups of the SQL databases, unlike the SQL Server Writer. Additionally, the SQL Agent supports a variety of backup methods. The SQL Server Writer supports full backups only.

Backing up SQL Server Using the SQL Server Writer When the entire server is selected for backup or if one-button backup is used, and a SQL Agent is installed, the SQL Server Writer will not be selected for backup to avoid redundancy. The SQL Backup Job Properties do not apply to backups using the SQL Server Writer. Only full backups are supported. ▼

To back up SQL Server using the SQL Server Writer: 1. On the navigation bar, click Backup. 2. In the selection pane, expand the following sequentially: Local Selections, Shadow Copy Components, User Data, SQL Server.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1089

SQL Agent

The Backup Exec Shadow Copy Components file system supports the Microsoft SQL Server Writer, which protects SQL Server and MSDE data. You must enter a Backup Exec SQL Agent serial number to display the Writer. Then, both the SQL Agent and the Writer are available to perform data protection operations of SQL Server on Windows Server 2003 resources in Backup Exec.

Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer Selecting SQL data for backup

3. Expand the server, and then select the instance (if needed). 4. In the right pane, select the database you want to back up. 5. Select backup options from the Properties pane or start the backup job. Note The SQL Backup Job Properties do not apply to backups using the SQL Server Writer. See also: “Backing Up Data” on page 239

Restoring SQL Server Using the SQL Server Writer The SQL Server Writer does not handle restores of the system databases (Master, Model, or MSDB) for an instance automatically while the SQL Server is active; user intervention is required. If you use the Writer to restore these databases while SQL Server is active, you must put the SQL server into the appropriate mode for that database, and then follow instructions provided in your Microsoft SQL Server documentation. User intervention is not required to restore user-defined databases. 1090

Administrator’s Guide

Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer

If you attempt to restore databases using the SQL Writer in a non-IDR situation and while the SQL Server is active, the following limitations apply: Note During disaster recovery with the Backup Exec for Windows Servers Intelligent Disaster Recovery option, all databases are restored. Limitations of Database Restores Using the SQL Server Writer Databases

Outcome

BKUPEXEC

BEDB (or the equivalent user-defined database name)

The BEDB database is not restored. Backup Exec skips this database and displays the following error message:

(or the equivalent user-defined instance name)

All instances

The active Backup Exec database cannot be restored by Backup Exec. Master MSDB Model

The restore job fails. Backup Exec displays the following error message: The job failed with the following error: A failure occurred restoring because the files cannot be replaced and no alternate location was specified.

The SQL Restore Job Properties and the SQL Redirection option in Backup Exec do not apply to restores using the SQL Server Writer. You can use the File Redirection option in Backup Exec to redirect restores to volume-level resources, but the redirection target must be a Windows Server 2003 system with Backup Exec or the Remote Agent installed. The File Redirection option provides a flat file-level restore of the SQL Server Writer data. ▼

To restore SQL Server using the SQL Server Writer: Note If the databases you want to restore were deleted from the SQL Server, use the SQL Enterprise Manager to attach the restored files to the databases after the restore job is complete. The SQL Server Writer does not automatically recreate the databases during the restore, the SQL Agent does. 1. On the Backup Exec navigation bar, click Restore. 2. In the selection pane, expand the following sequentially: Local Selections, Shadow Copy Components and then select the appropriate backup set. 3. Select User Data, and then select SQL Server.

Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server

1091

SQL Agent

Instance

Protecting SQL Server on Windows Server 2003 Using the SQL Server Writer

4. Expand the server, and then select the instance. 5. In the right pane, select the database you want to restore. 6. Select restore options from the Properties pane. Note The SQL Restore Job Properties do not apply to restores using the SQL Server Writer. 7. If you want to redirect the restore to a volume-level resource, on the Properties pane, under Destination, click File Redirection, and then select the redirection options. Note You cannot redirect a restore to another SQL Writer instance. 8. Start the restore job. See also: “Redirecting a Restore Operation” on page 452

1092

Administrator’s Guide

VERITAS Backup Exec - Agent for Microsoft Exchange Server

H

The VERITAS Backup Exec for Windows Servers - Agent for Microsoft Exchange Server (Exchange Agent) enables network administrators to perform backup and restore operations on installations of Exchange Server that are connected to a network. Exchange database backups can be integrated with network backups without separate administration or dedicated hardware.

About Using the Exchange Agent with Exchange 2000 and 2003 In Exchange 2000 and 2003 installations, the Exchange Agent provides support for: ◆

Backing up and restoring Exchange 2000 and Exchange 2003 resources.



Selecting storage groups for backup and restore, or selecting one or more databases within the storage group for backup and restore.



Increased performance of mailbox backups through: -

Incremental and differential backups.

-

Individual mailbox backup and restore.

-

The ability to globally exclude or include specified subfolders in each mailbox for backup and restore operations.

-

Single-instance storage for message attachments.

-

The ability to back up only a single instance of a message attachment.

1093

Exchange Agent

Continue reading for information about using the Exchange Agent with Exchange 2000 and 2003 installations or for information about using the Exchange Agent with Exchange 5.5 installations, see “About Using the Exchange Agent with Exchange 5.5” on page 1135. For information about using the Exchange Writer to protect Exchange Server 2003, see “Protecting Microsoft Exchange Server 2003 Using the Exchange Writer” on page 1171.

Installing the Exchange Agent ◆

Individual public folder backup and restore with the same capabilities that are available for mailbox backup and restore.



Recovery of individual databases or storage groups using the Recovery Storage Group feature of Exchange 2003.

See also: “Installing the Exchange Agent” on page 1094 “Backup Strategies for Exchange 2000 and 2003” on page 1096 “Recommended Configurations for Exchange 2000 and 2003” on page 1099

Requirements for Using the Exchange Agent with Exchange 2000 and 2003 The following are required for the Exchange Agent in Exchange 2000 and Exchange Server 2002 installations: ◆

The media server must have access to the Exchange Server.



To use Backup Exec's Resource Discovery feature, which allows detection of new backup resources within a Windows domain, you must install Microsoft's Exchange System Manager utility on the media server. The media server must be running Windows 2000 or Windows Server 2003.

See also: “Using Resource Discovery to Search for New Resources” on page 302

Installing the Exchange Agent The VERITAS Backup Exec Agent for Microsoft Exchange Server is installed locally as a separate, add-on component of Backup Exec for Windows Servers to protect local or remote Exchange Server databases. Whenever the Exchange Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the Exchange Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources from a remote server for backup until a Remote Agent has been installed.

1094

Administrator’s Guide

Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources

If you are using the Exchange Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the Exchange Agent installation to one remote Windows server so that resource can be protected by Backup Exec. However, if the Exchange Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it on another Windows server. For instructions on installing the Exchange Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the Remote Agent on a remote Exchange server, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.

In order to back up and restore Exchange Server resources, you must use a Backup Exec logon account that stores the credentials of a user account that has local administrator rights on every Exchange server that you want to back up. In order to back up and restore individual Exchange mailboxes and public folders, use Microsoft’s System Manager utility to grant the Exchange Administrator role to the user account at the Administrative Group level (for all Administrative Groups if there is more than one). Additionally, Backup Exec must have access to a uniquely named mailbox within the Exchange organization. When selecting mailboxes or public folders for backup, Backup Exec will attempt to find a mailbox with the same name as the username stored in the Backup Exec logon account used to connect to the Exchange server. If you use a Backup Exec logon account that stores the credentials of a user account that is unique and has a corresponding mailbox of the same name, then you are not prompted for an additional logon account when selecting mailboxes or public folders. Otherwise, you must choose or create a Backup Exec logon account that stores the name of a unique mailbox within the Exchange organization. A unique name is one that does not exist in the organization as a subset of characters in another mailbox name. For example, if EXCH1 has been entered as the mailbox name, and there are other mailbox names such as EXCH1BACKUP, or BACKUPEXCH1, then Backup Exec will not accept the name and you are prompted to choose another mailbox name. If

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1095

Exchange Agent

Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources

Backup Strategies for Exchange 2000 and 2003

you cannot create a unique mailbox name, you must create a Backup Exec logon account and enter the fully qualified name in the username field of the logon account. For example: /O=Company/OU=Orlando/CN=Test/CN=EXCH1 See also: “Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1106 “Configuring Logon Accounts” on page 363

Backup Strategies for Exchange 2000 and 2003 Backup Exec incorporates online, nondisruptive Exchange database protection as part of everyday backup routines, which increases the chance of data recovery and minimizes data loss without inhibiting daily activity. Backup Exec protects Exchange data, down to the individual storage group, database, mailbox, and public folder with full, copy, incremental, and differential backups. To decide which backup methods to use, consider the following: ◆

In small office environments with relatively small numbers of messages passing through the system, a daily full backup will provide good data protection and the quickest recovery. If log file growth becomes an issue, consider using incremental online backups at midday to provide an added recovery point and manage the log file growth for you automatically.



In large environments, incremental backups should be used to provide more frequent recovery point options throughout the day and to manage log file growth. Many shops run full backups on a weekly basis, preferring to run incremental backups throughout the week to keep backup run time to a minimum. The trade-off with this technique occurs at recovery time when you must not only recover from the full backup but from each incremental backup as well.

What will work best for you is based on the size of your environment, number of transactions processed each day, and the expectations of your users when a recovery is required. Consider the following backup strategies:

1096



Full backups run as frequently as possible, no less than once a day.



Full backups daily with differential backups used at regular periods throughout the day.



Full backups every few days (no less than weekly) with frequent incremental backups in between each full backup.

Administrator’s Guide

Backup Strategies for Exchange 2000 and 2003

We strongly recommend that in addition to backing up Exchange storage groups, you also back up the following on a regular basis: Backup selections for Exchange 2000 configuration data Recommended backup selections for configuration data

Description

File system

Back up folders and drives containing files for Windows and Exchange. Usually, this is the root drive C:\ and the virtual drive created by Exchange during installation, which by default is M:\ but may be different in each environment. Note Back up the C:\ drive, but do not back up the virtual drive created by Exchange. It is intended only to provide Explorer access to the Exchange data, but all files system functions may not be replicated. Backup and restore operations are not recommended or supported.

Windows NT registry

Back up the registry by running a full backup.

System State

Select System State and run a full backup to back up the following: Š

The Internet Information Service (IIS) metabase

Š

The Windows registry

Š

Active Directory

For more information on backing up System State, see “Selecting Data to Back Up” on page 265. If the entire server must be restored, you must restore System State to the server before you can restore Exchange 2000. Key Management Back up the Key Management Service database by selecting the KMS Service (KMS) database icon in Backup Selections, and then running a full backup. Local or remote backups can be performed on the KMS database. Note KMS is not available in Exchange 2003. Site Replication Services (SRS) database

If Exchange 2000 or 2003 is running in an Exchange 5.5 environment, back up the Site Replication Services (SRS) database by selecting the SRS icon in Backup Selections, and then running a full backup. This data is used for interoperability with Exchange 5.5.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1097

Exchange Agent

As a general practice, we recommend that you exclude the Exchange database and log files from the file system backup. The .EDB and .STM files, as well as any active .LOG files, are not backed up when the file system is backed up because they are opened for exclusive use by the Exchange system. However, these files are backed up when the Exchange databases are selected for backup.

Backup Strategies for Exchange 2000 and 2003 Backup selections for Exchange 2000 configuration data (continued) Recommended backup selections for configuration data

Description

Active Directory

To back up Active Directory, select System State on the domain controllers and run a full backup. When there are configuration changes on Exchange 2000 or 2003, such as when objects are added, modified, or deleted, back up the Active Directory on the domain controllers. Note Spread multiple domain controllers throughout each domain for efficient Active Directory replication, and so that if one domain controller fails, redundancy is still provided.

Mailboxes and public folders

When you back up the Exchange server databases, mailboxes and public folders are included in the backup. However, to make restores easier, you can also select one or more mailboxes or public folders for backup separately from the databases. You can also enable features in Backup Exec to make mailbox and public folder backups faster. See “Recommendations for backing up Exchange 2000 and 2003 mailboxes and public folders” on page 1107.

See also: “Backup Options for Exchange 2000 and 2003” on page 1100 “Backing Up Exchange 2000 and 2003” on page 1104 “Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1106 “Setting Default Backup and Restore Options for Exchange 2000 and 2003” on page 1127 “Preparing for Disaster Recovery of Exchange 2000 and 2003” on page 1131

1098

Administrator’s Guide

Backup Strategies for Exchange 2000 and 2003

Recommended Configurations for Exchange 2000 and 2003 Before starting backups for Exchange, read the following recommendations for configuring Exchange 2000 or 2003 in order to make it easier to recover using the backups: Avoid making the Exchange Server a domain controller. For disaster recovery purposes, it is much easier to restore Exchange if you don’t have to first restore the Active Directory.



Install Exchange into a domain that has at least two domain controllers. Active Directory replication is not possible with only one domain controller in a domain. If the domain controller fails and corrupts the Active Directory, some transactions may not be recoverable if they were not included with the last backup. With at least two domain controllers in a domain, databases on the failed domain controller can be updated using replication to fill in missing transactions after the database backups have been restored.



Locate transaction log files on a separate physical disk from the database. This is the single most important configuration affecting the performance of Exchange. This configuration also has recovery implications, since transaction logs provide an additional recovery resource.



Disable Write Cache on the SCSI controller. Windows does not use buffers, so when Exchange (or other applications) receives a write complete notice from Windows, the write-to-disk has been completed. If Write Cache is enabled, Windows responds as though a write-to-disk has been completed, and will provide this information to Exchange (or other applications) incorrectly. The result could be data corruption if there is a system crash before the operation is actually written to disk.



Disable circular logging if possible. Circular logging minimizes the risk that the hard disk will be filled with transaction log files. But, if a solid backup strategy is in place, transaction log files are purged during the backup, thus freeing disk space. If circular logging is enabled, transaction log histories are overwritten, incremental and differential backups of storage groups and databases are disabled, and recovery is only possible up to the point of the last full or copy backup.

See also: “Reviewing Circular Logging for Exchange 2000 and 2003” on page 1105

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1099

Exchange Agent



Backup Options for Exchange 2000 and 2003

Backup Options for Exchange 2000 and 2003 This procedure details how to select backup job options for Exchange Server and provides definitions for Exchange backup options. For details on how to create a backup job, and for definitions of all other backup options, see “Backing Up Data” on page 239. ▼

To select backup job properties for Exchange 2000 and 2003: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click Exchange.

1100

Administrator’s Guide

Backup Options for Exchange 2000 and 2003

3. Select the appropriate options as follows: Backup job properties for Exchange Server Item

Description

Exchange server backup method

Š

FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is selected by default.

Š

COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up. You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.

Š

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required. Š

INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required. Guide Me

Click Guide Me to start a wizard that helps you choose backup job properties for backing up Exchange 2000 or 2003.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1101

Exchange Agent

DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up.

Backup Options for Exchange 2000 and 2003 Backup job properties for Exchange Server (continued) Item

Description

Mailbox backup method Š

FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.

Š

COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.

Š

DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup. The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.

Š

INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the incremental backup.

1102

Administrator’s Guide

Backup Options for Exchange 2000 and 2003 Backup job properties for Exchange Server (continued) Item

Description

Enable single instance backup for message attachments (for mailbox and public folder backups only)

Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each identical copy of a message attachment backed up and kept in order on the backup set.

Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed.

Guide Me

Click Guide Me to start a wizard that helps you choose backup job properties for recreating user accounts and mailboxes.

See also: “Backing Up Exchange 2000 and 2003” on page 1104 “Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1106 “Reviewing Circular Logging for Exchange 2000 and 2003” on page 1105

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1103

Exchange Agent

If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.

Backing Up Exchange 2000 and 2003

Backing Up Exchange 2000 and 2003 To back up Exchange 2000 and 2003, you can select: ◆

Multiple storage groups



Individual storage groups



Individual databases (not recommended)

We recommend that you select individual storage groups for backup rather than selecting individual databases in storage groups. While you can select individual databases in a storage group for backup, the transaction logs for the entire storage group are backed up for each database selected. For example, if you select four databases in a storage group for backup, the entire collection of transaction logs for the storage group is also backed up four times. The transaction logs are not deleted until a full backup is run on every database in the storage group. You can still restore an individual database from a storage group backup. ▼

To back up Exchange storage groups: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095. 3. To select Exchange data from local or remote selections, click the domain name icon or icons that contain the Exchange installations, and then click the actual Windows computer icon that contains the Exchange installation. If you are using a server cluster, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the Exchange installation. To select all storage groups in Exchange, click the checkbox preceding the Microsoft Information Store, or you can select specific storage groups by expanding the Exchange icon, and then individually selecting storage groups.

1104

Administrator’s Guide

Backing Up Exchange 2000 and 2003

4. To select the Exchange server backup method, on the Properties pane, under Settings, click Exchange. For details on these options, see “Backup Options for Exchange 2000 and 2003” on page 1100. Note To perform incremental and differential backups of storage groups, make sure that circular logging is not enabled on the storage group. 5. Select other backup options from the Properties pane or start the backup job. See also: “Backup Strategies for Exchange 2000 and 2003” on page 1096 “Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1106 “Reviewing Circular Logging for Exchange 2000 and 2003” on page 1105 “Backing Up Data” on page 239

Reviewing Circular Logging for Exchange 2000 and 2003

When circular logging is enabled, transaction log files that have already been committed to the database are overwritten, preventing the accumulation of logs. The log files are overwritten whether or not a full or incremental backup has been run, and a history of previous logs since the last full or incremental backup is not maintained. When circular logging is disabled, transaction log files accumulate on the disk until a full or incremental backup is performed, after which the log files that have all transactions committed to the database are deleted. ▼

To review the circular logging setting for Exchange 2000 and 2003: 1. Open the Exchange System Manager utility. 2. Expand the tree to the storage group for which you want to review the circular logging setting. 3. Right-click the storage group and choose Properties.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1105

Exchange Agent

When circular logging is enabled, incremental and differential backups of Exchange databases and storage groups cannot be performed because these types of backups rely on a complete history of logs.

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders

4. On the General tab, review the Enable circular logging setting. 5. If you want to perform incremental and differential backups on databases, make sure that circular logging is not enabled. See also: “Backup Strategies for Exchange 2000 and 2003” on page 1096

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders Mailboxes and public folders are already included in the Exchange server database backups, but if you want to make the restore of a mailbox or folder easier, you can also select one or more mailboxes or public folders for backup separately from the databases. Although mailbox backups will take longer to run than database backups, you can enable features in Backup Exec to make mailbox and public folder backups faster. These features are described in “Recommendations for backing up Exchange 2000 and 2003 mailboxes and public folders” on page 1107. Do not substitute mailbox backups for backups of the entire Information Store. You cannot perform a complete restore of Exchange Server from a mailbox backup - only from backups of the Information Store. Consider using the Exchange System Manager utility to adjust the deletion settings in each Store’s properties so that deleted items are retained for a period of time, allowing them to be recovered rather than restored. See your Microsoft Exchange Server documentation for details.

1106

Administrator’s Guide

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders

To obtain the most efficiency and greatest performance in mailbox and public folder backups, consider the following: Recommendations for backing up Exchange 2000 and 2003 mailboxes and public folders Recommendation

Description

Use full and incremental Consider running full backups of mailboxes or public folders on a backups regular basis, supplemented with incremental or differential backups throughout your schedule to keep backup run time to a minimum. Exclude unwanted or unnecessary folders from the backup

When you select a mailbox or public folder for backup, by default all folders and subfolders are included. You can easily exclude specific folders and subfolders from the backups by using the ** wildcard in the file selection path on the Advanced File Selection dialog box when making backup selections (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269). For example, to exclude all mail in the Deleted Items folder, type: \**\Deleted Items\* \**\Sent Items\* If you also want to exclude all subfolders of the specified folders from the backup, check the Include Subfolders checkbox in the Advanced File Selection dialog.

Use single-instance storage for message attachments

When backing up mailboxes and public folders, you can choose to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to that attachment is retained, and the actual attachment is backed up only once at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once.

Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1107

Exchange Agent

To exclude all mail in the Sent Items folder, type:

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders Recommendations for backing up Exchange 2000 and 2003 mailboxes and public folders Recommendation

Description

Do not back up special system mailboxes created by Exchange

While these special system mailboxes can be backed up, it is not necessary or useful. The following are common examples of special system mailboxes, but there may be others depending on the Exchange server configuration and environment. Š

System Attendant

Š

Any mailbox name starting with SMTP or System Mailbox

Also, when selecting objects from the mailbox tree, all objects are displayed as messages. Some non-message objects can be identified by the subject line. For example, if you create a Calendar event named Appointment1, that name is displayed in the subject line for that object. However, some objects such as Forms and Views do not have a subject line (even though they can be named) and may not be easily identifiable. Select public folders The same public folders may be displayed for multiple Exchange from only one Exchange servers since public folders can be replicated. Selecting public folders server. on multiple Exchange servers will only increase the time and media required for the backup and does not provide any additional protection.

Mailboxes are displayed in a server-centric view; that is, only mailboxes on the selected Exchange server are displayed in the backup selections list. Public folders, however, may be displayed on more than one server since public folders can be replicated to many servers. Note In versions of Backup Exec prior to 8.6, mailboxes could be selected for backup from a site-centric view, which listed all mailboxes in the Exchange Organization, not just mailboxes on the selected server. Even though only the server-centric view is now available for Exchange mailboxes, you can still restore mailbox backup sets created using a site-centric view. If the mailboxes are all selected from the same server, they are placed together in one backup set on the storage media. If the mailboxes are selected from more than one server, then the mailboxes are placed in separate backup sets according to the server. ▼

To back up Exchange mailboxes or public folders: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections.

1108

Administrator’s Guide

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders

3. To select Exchange mailboxes or public folders from local or remote selections, click the domain name icon or icons that contain the Exchange mailboxes, and then click the actual Windows computer icon that contains the Exchange mailboxes. If you are using a server cluster, make backup selections from the virtual server. 4. Expand the Microsoft Exchange Mailbox icon that contains the mailboxes or public folders you want to back up. You can select all mailboxes or individual messages, mailboxes, and folders to back up. When you select a mailbox or public folder, all folders and subfolders are included in the backup by default. For a faster backup, consider using Advanced File Selections to exclude some folders, such as Deleted Items or Sent Items, and subfolders from the backup. Because public folders can be replicated on multiple Exchange servers, select public folders from only one Exchange server.

Exchange Agent

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1109

Backing Up Exchange 2000 and 2003 Mailboxes and Public Folders

5. If prompted, select a logon account that will allow you to connect to the Exchange mailboxes or public folders. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095. 6. To select the mailbox or public folders backup method, on the Properties pane, under Settings, click Exchange. For details on these options, see “Backup Options for Exchange 2000 and 2003” on page 1100. 7. Select other backup options from the Properties pane or start the backup job. See also: “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095 “Recommendations for backing up Exchange 2000 and 2003 mailboxes and public folders” on page 1107 “Backing Up Data” on page 239

1110

Administrator’s Guide

Restore Options for Exchange 2000 and 2003

Restore Options for Exchange 2000 and 2003 This procedure details how to select restore job properties for Exchange 2000 and 2003, and provides definitions for restore options specific to Exchange 2000 and 2003. For details on how to create a restore job, and for definitions of all other restore jobs, see “Restoring Data” on page 411. ▼

To select restore job properties for Exchange 2000 and 2003: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click Exchange.

Exchange Agent

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1111

Restore Options for Exchange 2000 and 2003

3. Select the appropriate options as follows: Restore job properties for Exchange 2000 and 2003 Item

Description

Exchange Server options Automatically recreate user accounts and mailboxes

Select this checkbox to recreate the user accounts and their mailboxes if they do not already exist on the target server. Otherwise, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password you entered on the Exchange Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, on the Tools menu click Options, and then in the Properties pane under Job Defaults, click Exchange. Select Automatically recreate user accounts and mailboxes, and then click Change password. Note This option applies only if mailboxes are being restored to their original location. If the mailbox restore is being redirected, the user account and mailbox must already exist on the target server.

Exchange 2000 No loss restore (do not delete existing transaction logs)

Select this checkbox to preserve the existing transaction logs on the Exchange 2000 or 2003 server. Transaction logs from the storage media are then restored and added to the existing set of transaction logs on the Exchange 2000 or 2003 server. When the restore operation finishes, Exchange 2000 or 2003 automatically updates its databases with the uncommitted transactions found in the existing and newly-restored transaction logs. This option is selected by default. If you are restoring individual databases into a storage group, the No loss restore checkbox should be selected. If this checkbox is not selected, uncommitted transactions for other databases in the storage group may be lost.

1112

Administrator’s Guide

Restore Options for Exchange 2000 and 2003 Restore job properties for Exchange 2000 and 2003 Item

Description

Temporary location for log and patch files

Type a location where the associated log and patch files are to be kept until the database is restored. The default location is \temp, and a subdirectory is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory. Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted.

Commit after restore completes

If your selection contains the last backup set to be restored, select this checkbox to direct the restore operation to replay the log files and roll back any uncompleted transactions. If this option is not selected, the database is left in an intermediate state and is not yet usable.

After the database is restored, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). Mount database after restore

Select this checkbox to mount the database so that it is available to users. This checkbox is only available if Commit after restore completes is selected.

Guide Me

Click Guide Me to start a wizard that helps you choose restore job properties for Exchange 2000 and 2003.

See also: “Restoring Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1121

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1113

Exchange Agent

If Commit after restore completes is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning.

Restoring Exchange 2000 and 2003

Restoring Exchange 2000 and 2003 Following are requirements for restoring Exchange 2000 and 2003: ◆

Use the Exchange System Manager utility to dismount any databases that are being restored.



Check the temporary location for log and patch files to make sure it is empty before you starting the restore. The default location is \temp, and a subdirectory is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory.

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. ▼

To restore Exchange 2000 and 2003 databases: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup sets you want to restore. -

Restore the last full backup, or

-

Restore the last full backup and the last differential backup, or

-

Restore the last full backup and all subsequent incremental backups.

4. On the Properties pane, under Settings, click Exchange. 5. Select the appropriate options. For details, see “Restore Options for Exchange 2000 and 2003” on page 1111. Do not select the Commit after restore completes checkbox and the Mount database after restore checkbox on the Restore Job Properties dialog box for Exchange unless your selections include the last backup set to be restored. These selections direct the Exchange server to replay transactions, roll back uncommitted transactions, and mount the databases to make them available for use after the restore.

1114

Administrator’s Guide

Restoring Exchange 2000 and 2003

6. Start the restore job or select other restore options from the Properties pane. 7. Run a full backup of the restored databases. See also: “Restoring Data” on page 411 “Backing Up Data” on page 239 “Restoring Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1121 “Redirecting Exchange 2000 and 2003 Storage Group and Database Restores” on page 1115 “Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003” on page 1123

Redirecting Exchange 2000 and 2003 Storage Group and Database Restores ◆

The storage groups and databases must already exist on the target server, and have the same names as the original storage groups or databases.



The target server must have the same Organization and Administrative Group name as the source server.



The target databases must be configured so that they can be overwritten. Using the Exchange System Manager utility, right-click the database you want to overwrite, click Properties, and then on the Database tab, select This database can be overwritten by a restore.

You cannot redirect the restore of: ◆

A version of Exchange server database to a different version of the database.



Site Replication Service (SRS) and Key Management Service (KMS). These services are dependent on the computer they reside on; redirection to another computer is not supported and could result in the loss of functionality of these services.

Note KMS is not available in Exchange Server 2003 Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. After completing the restore, it is recommended that a full backup of the restored databases be performed.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1115

Exchange Agent

Following are requirements for redirecting restores:

Restoring Exchange 2000 and 2003 ▼

To redirect a restore of storage groups or databases: 1. Follow the instructions for the restore in “Restoring Exchange 2000 and 2003” on page 1114. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Exchange Redirection.

3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane. After completing the restore, it is recommended that a full backup of the restored databases be performed. Restore job properties for redirected Exchange sets

1116

Item

Description

Redirect Exchange sets

Select this checkbox to enable the Restore to server and Server logon account fields.

Restore to server

Type the name of the computer to which you are restoring, using the format \\server name.

Administrator’s Guide

Restoring Exchange 2003 Data Using the Recovery Storage Group Restore job properties for redirected Exchange sets (continued) Item

Description

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The default logon account is displayed by default. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095.

Restoring Exchange 2003 Data Using the Recovery Storage Group

Following are requirements for restoring Exchange 2003 data using the Recovery Storage Group (RSG): ◆

Mailbox stores in the RSG must come from the same storage group. You cannot add mailbox stores from different storage groups to the RSG at the same time.



Public Folder stores are not supported for restore using the RSG.



Do not mount mailbox stores in the RSG before the restore. If you do mount the stores before the restore, then you must dismount them and select "This database can be overwritten by a restore" on the database property page in Exchange System Manager prior to restoring them.



On the server that hosts the RSG, there must be a storage group with the same name as the original storage group for the data you are restoring. If no such storage group exists on the server, then you can use that name for the RSG when you create it.



The Active Directory topology of the Exchange system must be intact and in the same state it was in when the backup was made. You cannot restore mailbox stores that were deleted and recreated. In addition, you cannot recover mailboxes from stores if the mailboxes were deleted and purged from the system or moved to other servers or mailbox stores.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1117

Exchange Agent

The Recovery Storage Group (RSG) feature in Exchange 2003 allows you to mount a second copy of an Exchange mailbox store on any Exchange server in the same Exchange Administrative Group as the original while the original store is still running and serving clients. This allows you to recover data from an older backup copy of the store without disturbing client access to current data. After the RSG is created and one or more stores are added to it, you can restore online backup sets to it. Then you can use a new version of the EXMerge utility to extract mailbox data from the stores into .PST files, and optionally merge the extracted data back into the online stores.

Restoring Exchange 2003 Data Using the Recovery Storage Group ◆

Only Exchange mailbox stores from Exchange 2000 SP3 or later can be restored to the RSG. Restored mailbox stores are upgraded to the store version currently running on the RSG server.



When the RSG exists on a server, the mailbox stores that it contains are the only stores that can be restored on that server by default. VERITAS recommends that you create the RSG only when you intend to recover data using it, and remove the RSG from the server after the data recovery is complete.

Refer to your Microsoft Exchange Server 2003 documentation for more information on the requirements and restrictions of recovering Exchange data using the RSG. ▼

To restore Exchange 2003 databases using the Recovery Storage Group: 1. Use the Exchange System Manager utility to create the Recovery Storage Group and add the mailbox stores you want to restore. 2. On the navigation bar in Backup Exec, click Restore. 3. On the Properties pane, under Source, click Selections. 4. In the restore selections list, select the backup sets you want to restore. -

Restore the last full backup, or

-

Restore the last full backup and the last differential backup, or

-

Restore the last full backup and all subsequent incremental backups

5. On the Properties pane, under Settings, click Exchange. 6. Select the appropriate options. For details, see “Restore Options for Exchange 2000 and 2003” on page 1111. Do not select the Commit after restore completes check box and the Mount database after restore check box on the Restore Job Properties dialog box for Exchange unless your selections include the last backup set to be restored. These selections direct the Exchange server to replay transactions, roll back uncommitted transactions, and mount the databases after the restore. 7. If the RSG resides on a different Exchange server than the databases you are restoring, see “Redirecting Exchange 2003 Restores Using the Recovery Storage Group” on page 1119. 8. Start the restore job or select other restore options from the Properties pane.

1118

Administrator’s Guide

Restoring Exchange 2003 Data Using the Recovery Storage Group

9. When the restore is complete, use the EXMerge utility in Exchange 2003 to extract the mailbox data you need from the restored mailbox stores and optionally merge the data back into the online stores. See also: “Restoring Data to a Server or Workstation” on page 419 “Redirecting Exchange 2003 Restores Using the Recovery Storage Group” on page 1119

Redirecting Exchange 2003 Restores Using the Recovery Storage Group Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. After completing the restore, it is recommended that a full backup of the restored databases be performed. To redirect a restore using the Recovery Storage Group: 1. Follow the instructions for the restore in “Restoring Exchange 2003 Data Using the Recovery Storage Group” on page 1117. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Exchange Redirection.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1119

Exchange Agent



Restoring Exchange 2003 Data Using the Recovery Storage Group

3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane. After completing the restore, it is recommended that a full backup of the restored databases be performed. Restore job properties for redirected Exchange sets

1120

Item

Description

Redirect Exchange sets

Select this checkbox to enable the Restore to server and Server logon account fields.

Restore to server

Type the name of the server where the RSG resides.

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The default logon account is displayed by default. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095.

Administrator’s Guide

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders How you restore mailbox or public folder data depends on the types of backup used to protect the data, and the type of data you want restored. You can restore individual mailboxes, messages, and public folders from backup sets created when individual mailboxes were backed up from the Microsoft Exchange Mailboxes selection, or when individual public folders were backed up from the Microsoft Exchange Public Folders selection. You cannot restore individual mailboxes, messages, or public folders from storage group or database backups. If you need to restore mailboxes that have been deleted back to their original location, you can choose to have the user account and mailbox automatically recreated. A password that you specify is assigned to the recreated user account. If the mailbox restore is being redirected, the mailbox must already exist on the target server. Following are notes about restoring mailboxes or public folders: ◆

-

Mailboxes that resided on the target server will restore normally.

-

Mailboxes that resided on other servers must be redirected to those servers.



If you restore mailboxes from a backup created with a version of Backup Exec prior to 8.5, and mailboxes with duplicate Display Names reside on the server, select those mailboxes for restore separately and follow the instructions in “Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003” on page 1123.



When messages in mailboxes or public folders are restored to a location where a message with the same name already exists, the restored message does not replace the existing message, but is added to the destination folder; therefore, duplicate messages may result in the destination folder.



The option Restore Over Existing Files in the Advanced Restore Job Properties does not apply to mailboxes or public folders. If other selections are restored in addition to mailboxes or public folders, and the option Restore Over Existing Files is selected, it applies only to the other selections; mailboxes and public folders are not restored over existing objects. For details on this option, see “General settings options for restore job” on page 425.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1121

Exchange Agent

Mailbox backup sets that were created using a site-centric view in versions of Backup Exec prior to 8.6 may require multiple jobs to be run in order to restore all the mailboxes:

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders ◆

Do not restore special system mailboxes created by Exchange. The following are common examples of special system mailboxes, but there may be others depending on the Exchange 2000 or 2003 server configuration and environment. -

System Attendant

-

Any mailbox name starting with SMTP or System Mailbox

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. ▼

To restore Exchange mailboxes and public folders: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, navigate to and select the data you want to restore. 4. On the Properties pane, under Settings, click Exchange. On the Restore Job Properties dialog box, if the user accounts and their mailboxes that are being restored do not already exist on the target server, and they are being restored to their original location, select Automatically recreate user accounts and mailboxes. If this option is not selected, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password entered on the Exchange Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, on the Tools menu click Options, and then in the Properties pane under Job Defaults, click Exchange. Select Automatically recreate user accounts and mailboxes, and then click Change password. 5. Start the restore job or select other restore options from the Properties pane. 6. After the restore is complete, run a full backup of the restored mailboxes. See also: “Restore Options for Exchange 2000 and 2003” on page 1111 “Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003” on page 1123

1122

Administrator’s Guide

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders

Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003 You can redirect the restore of individual mailboxes and public folders from backup sets created when individual mailboxes were backed up from the Microsoft Exchange Mailboxes selection, or when individual public folders were backed up from the Microsoft Exchange Public Folders selection. You cannot restore individual mailboxes or public folders from storage group or database backups. If you select a single mailbox, or one or more messages or folders from a single mailbox, you can redirect that restore to another existing mailbox on the same or a different server. If any of the folders in the original mailbox do not exist in the destination mailbox, they will be created during the restore. If you select more than one mailbox, or folders and messages from more than one mailbox, you can only redirect the restore to another server. Mailboxes with the same names as those selected must already exist on the target server. Following are requirements for redirecting the restore of mailboxes: If the mailboxes do not already exist on the target server, you must create them before redirecting the restore. Automatic recreation of mailboxes on the target server is not enabled for redirected restores.



To ensure that Backup Exec can access mailboxes on the server that you are redirecting messages or mailbox restores to, click the destination server in the backup selections list, select Microsoft Exchange Mailboxes and verify that the target mailbox is displayed in the list of mailboxes. If you are prompted for a logon account, use a logon account that stores the credentials of a user account that is unique and has a corresponding mailbox of the same name. See “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095.



More than one mailbox can exist with the same Display Name. When the restore of a mailbox is redirected in Backup Exec, it is redirected to the target mailbox’s Display Name. If a duplicate Display Name exists, then the data may be restored to the wrong mailbox. To prevent restoring the data to the wrong mailbox, type the name of the target mailbox exactly as it appears when browsing to the mailbox in the backup selections list, including the brackets surrounding the mailbox directory identifier (for example, “Mailbox Name [mailboxname]”).

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1123

Exchange Agent



Restoring Exchange 2000 and 2003 Mailboxes and Public Folders

Following are requirements for redirecting the restore of individual messages to another mailbox. ◆

When redirecting the restore of mailbox data, all destination mailboxes must already exist before the restore begins. The contents of the restored mailboxes are placed in the destination mailboxes. For example, if you back up Mailbox 1, which consists of Top of Information Store, Inbox, and Folders 1 and 2, each containing some mail messages, and then you restore Mailbox 1 to the existing Mailbox 2, then all of Mailbox 1, including the Top of Information Store, Inbox, Folders 1 and 2, and messages, are restored to Mailbox 2. Note that Mailbox 1 itself is not created under Mailbox 2.

Redirecting the restore of Mailbox 1 to Mailbox 2

1124

Administrator’s Guide

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders

If you redirect the restore of Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2, the contents of Mailbox 1\Top of Information Store\Folder 2, Message 5 and Message 6, are placed in Mailbox 2 in the same folder as they were in Mailbox 1, as illustrated in the following graphic. Redirecting Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2



To redirect a mailbox restore: 1. Follow the instructions for the restore in “Restoring Exchange 2000 and 2003 Mailboxes and Public Folders” on page 1121. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Exchange Redirection. 3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane. After completing the restore, it is recommended that a full backup of the restored mailboxes be performed. Restore job properties for redirected Exchange sets Item

Description

Redirect Exchange sets

Select this checkbox to enable the Restore to server and Server logon account fields.

Restore to server

Type the name of the computer to which you are restoring, using the format \\server name.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1125

Exchange Agent

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs.

Restoring Exchange 2000 and 2003 Mailboxes and Public Folders Restore job properties for redirected Exchange sets (continued)

1126

Item

Description

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The default logon account is displayed by default. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095.

Restore to mailbox

Type the name of the target mailbox exactly as it appears when browsing to the mailbox in the backup selections pane, including the brackets surrounding the mailbox directory identifier (for example, “Mailbox Name [mailboxname]”). The mailbox must already exist before you can restore to it. See “Redirecting Mailbox and Public Folder Restores in Exchange 2000 and 2003” on page 1123.

Mailbox logon account

To restore a mailbox or public folder, use a Backup Exec logon account that stores the credentials of the mailbox user account. To use another logon account, click Change. To clear the displayed logon account and use the same logon account specified in the Server logon account field, click Clear. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 2000 and 2003 Resources” on page 1095.

Administrator’s Guide

Setting Default Backup and Restore Options for Exchange 2000 and 2003

Setting Default Backup and Restore Options for Exchange 2000 and 2003 You can use the defaults set by Backup Exec during installation for all Exchange backup and restore jobs, or you can choose your own defaults. You can also change the defaults for any specific backup or restore job. ▼

To change backup and restore defaults for Exchange 2000 and 2003: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Exchange.

Exchange Agent

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1127

Setting Default Backup and Restore Options for Exchange 2000 and 2003

3. Select the appropriate options as follows: Options - Set Application Defaults for Exchange 2000 and 2003 Item

Description

Backup Exchange method

Š

FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is selected by default.

Š

COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up. You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.

Š

DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required. Š

INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required.

1128

Administrator’s Guide

Setting Default Backup and Restore Options for Exchange 2000 and 2003 Options - Set Application Defaults for Exchange 2000 and 2003 (continued) Item

Description

Mailbox method:

Š

FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.

Š

COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.

Š

DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup.

Š

INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the differential backup.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1129

Exchange Agent

The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.

Setting Default Backup and Restore Options for Exchange 2000 and 2003 Options - Set Application Defaults for Exchange 2000 and 2003 (continued) Item

Description

Enable single instance backup for message attachments (for mailbox and public folder backups only)

Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each identical copy of a message attachment backed up and kept in order on the backup set.

Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely. Restore - Exchange 2000 Temporary location for log and patch files

Type a location where the associated log and patch files are to be kept until the database is restored. The default location is \temp. If storage groups are being restored, a subdirectory in \temp is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory. If Commit after restore completes is selected for the restore job, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). To select Commit after restore completes, on the navigation bar, click Restore, and then on the Properties pane, under Settings, click Exchange. Note Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted.

1130

Administrator’s Guide

Preparing for Disaster Recovery of Exchange 2000 and 2003 Options - Set Application Defaults for Exchange 2000 and 2003 (continued) Item

Description

Automatic recreation Automatically recreate user accounts and mailboxes

Select this checkbox to recreate the user accounts and their mailboxes if they do not already exist on the target server. Otherwise, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password you entered on the Exchange Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, see “To restore Exchange mailboxes and public folders:” on page 1122. Note This option applies only if mailboxes are being restored to their original location. If the mailbox restore is being redirected, the user account and mailbox must already exist on the target server. Click this to specify a password to use when user accounts and mailboxes are automatically recreated on the target server.

See also: “Restoring Exchange 2000 and 2003” on page 1114

Preparing for Disaster Recovery of Exchange 2000 and 2003 A disaster preparation plan is an absolute necessity for restoring Exchange efficiently and effectively in the event of a catastrophic failure. Because Exchange uses Windows security for authentication, disaster recovery of Exchange cannot be separated from the disaster recovery of Windows. Planning ahead reduces the time needed to recover. It is critical to build a kit that includes items such as: ◆

An operating system configuration sheet



A hard drive partition configuration sheet



Any RAID configuration



A hardware configuration sheet



EISA/MCA configuration disks

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1131

Exchange Agent

Change password...

Disaster Recovery for Exchange 2000 and 2003 ◆

An Exchange configuration sheet



A Windows emergency repair diskette

To perform the actual recovery, you will need: ◆

An installed copy of Backup Exec for Windows Servers



The latest full, incremental, and differential backups of the Exchange databases you want to recover



The Microsoft Exchange Server Installation CD



Any service packs which were applied to the original installation

Disaster Recovery for Exchange 2000 and 2003 This procedure guides you through a complete restoration of Exchange 2000 and 2003 using Backup Exec. You should have already performed all the appropriate preparation as detailed in “Preparing for Disaster Recovery of Exchange 2000 and 2003” on page 1131. If the Exchange 2000 server being recovered contains the Site Replication Service (SRS) and/or Key Management Service (KMS), then before you begin the disaster recovery, refer to your Microsoft Exchange 2000 Server documentation for details on recovering those databases. Always log in to Windows using the Administrator account (or an Administrator equivalent) during this procedure. If you purchased the Intelligent Disaster Recovery option, see “Microsoft Exchange Recovery Notes” on page 937 for directions on using Intelligent Disaster Recovery to recover the Exchange server. ▼

To perform disaster recovery for Exchange 2000 or 2003: 1. Recover the Windows server first. For instructions, see “Disaster Preparation of the Windows Computer” on page 551. Note Make sure you restore the Exchange 2000 or 2003 files that existed on all disk partitions. When the Windows 2000 server disaster recovery procedure is complete (after the last reboot), you must recover the Exchange 2000 or 2003 server. 2. From the Services applet, verify the Microsoft Exchange Information Store service is started. 3. Start Backup Exec.

1132

Administrator’s Guide

Disaster Recovery for Exchange 2000 and 2003

4. Catalog the media that contains the latest full, incremental, and differential backups of the Exchange 2000 or 2003 storage groups you want to recover. 5. On the navigation bar, click Restore. 6. On the Properties pane, under Source, click Selections. 7. Select the latest full backups of each storage group for restore. Note If the Exchange 2000 server being recovered contains the Site Replication Service (SRS) and/or Key Management Service (KMS), then select those databases for restore as well. 8. Select all subsequent incremental storage group backups. If differential backups are to be restored, only the most recent differential storage group backups need to be selected. 9. On the Properties pane, under Settings, click Exchange.

11. In the field Temporary location for log and patch files, type a location where the associated log and patch files are to be kept until the database is restored. Note Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted. 12. If your selection contains the last backup set to be restored, select Commit after restore completes. Do not select this checkbox if you still have backup sets to restore. If Commit after restore completes is selected when an intermediate backup is being applied, you cannot continue to restore backups and you must restart the restore operation from the beginning. After the database is restored, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories).

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1133

Exchange Agent

10. Clear the Exchange 2000 option No loss restore (do not delete existing transaction logs).

Disaster Recovery for Exchange 2000 and 2003

13. If you want the databases to be immediately available to users after the recovery, select Mount database after restore. This check box is only available if Commit after restore completes is selected. 14. Start the restore job or select other restore options on the Properties pane. 15. After completing the restore, it is recommended that a full backup of the restored databases be performed.

1134

Administrator’s Guide

About Using the Exchange Agent with Exchange 5.5

About Using the Exchange Agent with Exchange 5.5 The Exchange Agent enables network administrators to perform backup and restore operations on installations of Exchange Server 5.5 that are connected to a network. Exchange database backups can be integrated with network backups without separate administration or dedicated hardware. Continue reading for information about using the Exchange Agent with Exchange 5.5 installations, or for information about using the Exchange Agent with Exchange 2000 installations, see “VERITAS Backup Exec - Agent for Microsoft Exchange Server” on page 1093. In Exchange 5.5 installations, the Exchange Agent provides support for: ◆

-

Incremental and differential backups.

-

Individual mailbox backup and restore.

-

The ability to globally exclude or include specified subfolders in each mailbox for backup and restore operations.

-

The ability to back up only a single instance of a message attachment.

Individual public folder backup and restore with the same capabilities that are available for mailbox backup and restore.

See also: “Installing the Exchange Agent” on page 1136 “Recommended Configurations for Exchange 5.5 Server” on page 1139 “Backup Strategies for Exchange 5.5” on page 1137

Requirements for Using the Exchange Agent with Exchange 5.5 The following are required for the Exchange Agent in an Exchange 5.5 installation: ◆

The media server must have access to the Exchange Server.



To use Backup Exec's Resource Discovery feature, which allows detection of new backup resources within a Windows domain, you must install Microsoft's Exchange Administrator utility on the media server.

See also: “Using Resource Discovery to Search for New Resources” on page 302

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1135

Exchange Agent



Increased performance of mailbox backups through:

Installing the Exchange Agent

Installing the Exchange Agent The VERITAS Backup Exec Agent for Microsoft Exchange Server is installed locally as a separate, add-on component of Backup Exec for Windows Servers to protect local or remote Exchange Server databases. Whenever the Exchange Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the Exchange Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources from a remote server for backup until a Remote Agent has been installed. If you are using the Exchange Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the Exchange Agent installation to one remote Windows server so that resource can be protected by Backup Exec. However, if the Exchange Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it on another Windows server. For instructions on installing the Exchange Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the Remote Agent on a remote resource, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847.

Using Backup Exec Logon Accounts with Exchange 5.5 Resources In order to back up and restore Exchange Server resources, you must use a backup Exec logon account that stores the credentials of a user account that has local administrator rights on every Exchange server that you want to back up. In order to back up and restore individual Exchange mailboxes and public folders, use Microsoft’s Exchange Administrator utility to grant the Admin role to the user account at the Site level (for all Sites if there is more than one). Additionally, Backup Exec must have access to a uniquely named mailbox within the Exchange organization. When selecting mailboxes or public folders for backup, Backup Exec will attempt to find a mailbox with the same name as the username stored in the Backup Exec logon account used to connect to the Exchange server. If you use a Backup 1136

Administrator’s Guide

Backup Strategies for Exchange 5.5

Exec logon account that stores the credentials of a user account that is unique and has a corresponding mailbox of the same name, then you are not prompted for an additional logon account when selecting mailboxes or public folders. Otherwise, you must choose or create a Backup Exec logon account that stores the name of a unique mailbox within the Exchange organization. A unique name is one that does not exist in the organization as a subset of characters in another mailbox name. For example, if EXCH1 has been entered as the mailbox name, and there are other mailbox names such as EXCH1BACKUP, or BACKUPEXCH1, then Backup Exec will not accept the name and you are prompted to choose another mailbox name. If you cannot create a unique mailbox name, you must create a Backup Exec logon account and enter the fully qualified name in the username field of the logon account. For example: /O=Company/OU=Orlando/CN=Test/CN=EXCH1 See also: “Backing Up Exchange 5.5” on page 1144 “Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1145

Exchange Agent

“Configuring Logon Accounts” on page 363

Backup Strategies for Exchange 5.5 Backup Exec incorporates online, nondisruptive Exchange database protection as part of everyday backup routines, which increases the chance of data recovery and minimizes data loss without inhibiting daily activity. Backup Exec protects Exchange data, down to the individual database, mailbox, message, or folder with full, copy, incremental, and differential backups. To decide which backup methods to use, consider the following: ◆

In small office environments with relatively small numbers of messages passing through the system, a daily full backup will provide good data protection and the quickest recovery. If log file growth becomes an issue, consider using incremental online backups at midday to provide an added recovery point and manage the log file growth for you automatically.



In large environments, incremental backups should be used to provide more frequent recovery point options throughout the day and to manage log file growth. Many shops run full backups on a weekly basis, preferring to run incremental backups throughout the week to keep backup run time to a minimum. The trade-off with this technique occurs at recovery time when you must not only recover from the full backup but from each incremental backup as well.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1137

Backup Strategies for Exchange 5.5

What will work best for you will be based on the size of your environment, number of transactions processed each day, and the expectations of your users when a recovery is required. For fastest recoveries, consider the following backup options listed in recovery priority sequence: ◆

Full backups run as frequently as possible, no less than once a day.



Full backups daily with differential backups used at regular periods throughout the day.



Full backups every few days (no less than weekly) with frequent incremental backups in between each full backup.

You should also read about best practices for configuring Exchange to provide the fastest and safest recovery in “Recommended Configurations for Exchange 5.5 Server” on page 1139. In addition to the Information Store and Directory Store, we strongly recommend that you also back up the following on a regular basis: Backup selections for Exchange 5.5 configuration data Recommended backup selections for configuration data

Description

File system

Back up folders and drives containing files for Windows and Exchange. Usually, these are on drive C:\ unless a different location was specified during installation.

Windows registry

For Windows NT, back up the registry by running a full backup of the \WINNT directory. For Windows 2000, back up the registry by selecting System State and running a full backup.

Key Management To back up the KMS database, stop the Key Management Server service Service (KMS) database if it is running, and then back up the contents of the directory stored in EXCHSRVR\KMSdata. This directory contains security data that includes encryption keys needed to decipher encrypted mail messages. Without these keys, all previously encrypted messages cannot be opened by recipients. Directory Store for each The Directory Store for each Exchange Server is unique, so it is critical Exchange Server to have a backup of the Directory Store for each Exchange Server.

1138

Administrator’s Guide

Backup Strategies for Exchange 5.5

Recommended Configurations for Exchange 5.5 Server Before starting backups for Exchange, read the following recommendations for configuring Exchange 5.5: Locate transaction log files on a separate physical disk from the database. This is the single most important configuration affecting the performance of Exchange. This configuration also has recovery implications, since transaction logs provide an additional recovery resource.



Disable Write Cache on the SCSI controller. Windows does not use buffers, so when Exchange (or other applications) receives a write complete notice from Windows, the write-to-disk has been completed. If Write Cache is enabled, Windows responds as though a write-to-disk has been completed, and will provide this information to Exchange (or other applications) incorrectly. The result could be data corruption if there is a system crash before the operation is actually written to disk.



Disable circular logging if possible. Circular logging minimizes the risk that the hard disk will be filled with transaction log files. But, if a solid backup strategy is in place, transaction log files are purged during the backup, thus freeing disk space. If circular logging is enabled, transaction log histories are overwritten, incremental and differential backups of databases are disabled, and recovery is only possible up to the point of the last full or copy backup.



In order to enable backup operations for public folders in Exchange 5.5 using all available backup methods, the mailbox used by Backup Exec to access the folders must be granted the Owner role on each public folder to be backed up, either directly or through membership in a Distribution List. The mailbox is determined by the logon account you specify when selecting public folders for backup. The Exchange Administrator program can be used to set the necessary client permissions for the public folders on your Exchange servers. For more information on setting client permissions on public folders, refer to your Exchange server documentation.

See also: “Reviewing Circular Logging for Exchange 5.5” on page 1145

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1139

Exchange Agent



Backup Options for Exchange 5.5

Backup Options for Exchange 5.5 This procedure details how to select backup job options for Exchange Server and provides definitions for Exchange backup options. For details on how to create a backup job, and for definitions of all other backup options, see “Backing Up Data” on page 239. ▼

To select backup job properties for Exchange 5.5 Server: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click Exchange.

1140

Administrator’s Guide

Backup Options for Exchange 5.5

3. Select the appropriate options as follows: Backup job properties for Exchange Server Item

Description

Exchange server backup method

Š

FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is selected by default.

Š

COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up. You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.

Š

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required. Š

INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required. Guide Me

Click Guide Me to start a wizard that helps you choose backup job properties for backing up Exchange 5.5.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1141

Exchange Agent

DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up.

Backup Options for Exchange 5.5 Backup job properties for Exchange Server (continued) Item

Description

Mailbox backup method For information about setting Exchange 5.5 to use all available backup methods, see “Recommended Configurations for Exchange 5.5 Server” on page 1139. Š

FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.

Š

COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.

Š

DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup. The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.

Š

INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the incremental backup.

1142

Administrator’s Guide

Backup Options for Exchange 5.5 Backup job properties for Exchange Server (continued) Item

Description

Enable single instance backup for message attachments (for mailbox and public folder backups only)

Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each identical copy of a message attachment backed up and kept in order on the backup set.

Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed.

Guide Me

Click Guide Me to start a wizard that helps you choose backup job properties for recreating user accounts and mailboxes.

See also: “Backup Strategies for Exchange 5.5” on page 1137 “Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1145 “Reviewing Circular Logging for Exchange 5.5” on page 1145

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1143

Exchange Agent

If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.

Backing Up Exchange 5.5

Backing Up Exchange 5.5 ▼

To back up Exchange 5.5: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136. 3. To select Exchange data from local or remote selections, click the domain name icon or icons that contain the Exchange installations, and then click the actual Windows computer icon that contains the Exchange installation. If you are using a server cluster, make backup selections from the virtual server. A list of shared network directories and resources appears. 4. Click the check boxes preceding the Microsoft Exchange Information Store and Microsoft Exchange Directory. 5. To select the Exchange server backup method, on the Properties pane, under Settings, click Exchange. For details on these options, see “Backup Options for Exchange 5.5” on page 1140. Note To perform incremental and differential backups of storage groups, make sure that circular logging is not enabled on the storage group. See also: “Backup Strategies for Exchange 5.5” on page 1137 “Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1145 “Reviewing Circular Logging for Exchange 5.5” on page 1145

1144

Administrator’s Guide

Backing Up Exchange 5.5 Mailboxes and Public Folders

Reviewing Circular Logging for Exchange 5.5 When circular logging is enabled, incremental and differential backups of the Exchange databases cannot be performed because these types of backups rely on a complete history of logs. When circular logging is enabled, transaction log files that have already been committed to the database are overwritten, preventing the accumulation of logs. The log files are overwritten whether or not a full or incremental backup has been run, and a history of previous logs since the last full or incremental backup is not maintained. When circular logging is disabled, transaction log files accumulate on the disk until a full or incremental backup is performed, after which the log files that have all transactions committed to the database are deleted. ▼

To review the circular logging setting for Exchange 5.5: 1. Run the Exchange Administrator utility.

3. From the File menu, click Properties. 4. Click the Advanced tab. You can set circular logging separately for the Information Store and the Directory Store. 5. If you want to perform incremental and differential backups of the stores, make sure that circular logging is not enabled on the stores.

Backing Up Exchange 5.5 Mailboxes and Public Folders Mailboxes and public folders are already included in the Information Store database backups, but if you want to make the restore of a mailbox or folder easier, you can also select one or more mailboxes or public folders for backup separately from the databases. Although mailbox backups will take longer to run than database backups, you can enable features in Backup Exec to make mailbox and public folder backups faster. These features are described in “Recommendations for backing up mailboxes and public folders” on page 1146. Do not substitute mailbox backups for backups of the entire Information Store. You cannot perform a complete restore of Exchange Server from a mailbox backup - only from backups of the Information Store. Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1145

Exchange Agent

2. Select the server you want to check by clicking Site, then Configuration, and then clicking Servers.

Backing Up Exchange 5.5 Mailboxes and Public Folders

Consider using the Exchange Administrator utility to adjust the deleted item retention settings for the Public and Private Information Store’s properties so that deleted items are retained for a period of time, allowing them to be recovered rather than restored. See your Microsoft Exchange Server documentation for details. To obtain the most efficiency and greatest performance in mailbox and public folder backups, consider the following: Recommendations for backing up mailboxes and public folders Recommendation:

Description:

Use full and incremental Consider running full backups of mailboxes or public folders on a backups regular basis, supplemented with incremental backups throughout your schedule to keep backup run time to a minimum. Exclude unwanted or unnecessary folders from the backup

When you select a mailbox or public folder for backup, by default all folders and subfolders are included. You can easily exclude specific folders and subfolders from the backups by using the ** wildcard in the file selection path on the Advanced File Selection dialog box when making backup selections (see “Including or Excluding Files for Backup Using Advanced File Selection” on page 269). For example, to exclude all mail in the Deleted Items folder, type: \**\Deleted Items\* To exclude all mail in the Sent Items folder, type: \**\Sent Items\* If you also want to exclude all subfolders of the specified folders from the backup, check the Include Subfolders checkbox in the Advanced File Selection dialog.

Use single-instance storage for message attachments

When backing up mailboxes and public folders, you can choose to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to that attachment is retained, and the actual attachment is backed up only once at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. However, if the backup is incomplete, the attachments may not be included on the backup set. The backup should be rerun until it is successfully completed.

1146

Administrator’s Guide

Backing Up Exchange 5.5 Mailboxes and Public Folders Recommendations for backing up mailboxes and public folders (continued) Recommendation:

Description:

Do not back up special system mailboxes created by Exchange

While these special system mailboxes can be backed up, it is not necessary or useful. The following are common examples of special system mailboxes, but there may be others depending on the Exchange 5.5 server configuration and environment. Š

Microsoft Schedule+Free/Busy Connector

Š

System Attendant

Š

Directory Service

Also, when selecting objects from the mailbox tree, all objects are displayed as messages. Some non-message objects can be identified by the subject line. For example, if you create a Calendar event named Appointment1, that name is displayed in the subject line for that object. However, some objects such as Forms and Views do not have a subject line (even though they can be named) and may not be easily identifiable.

Mailboxes are displayed in a server-centric view; that is, only mailboxes on the selected Exchange server are displayed in the backup selections list. Public folders, however, may be displayed on more than one server since public folders can be replicated to many servers. Note In versions of Backup Exec prior to 8.6, mailboxes could be selected for backup from a site-centric view, which listed all mailboxes that resided on Exchange Servers in the same Exchange site, not just mailboxes on the selected server. Even though only the server-centric view is now available for Exchange mailboxes, you can still restore mailbox backup sets created using a site-centric view. ▼

To back up Exchange 5.5 mailboxes or public folders: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections. 3. To select Exchange mailboxes or public folders from local or remote selections, click the domain name icon or icons that contain the Exchange mailboxes, and then click the actual Windows computer icon that contains the Exchange mailboxes. If you are using a server cluster, make backup selections from the virtual server.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1147

Exchange Agent

Select public folders The same public folders may be displayed for multiple Exchange from only one Exchange servers since public folders can be replicated. Selecting public folders server. on multiple Exchange servers will only increase the time and media required for the backup and does not provide any additional protection.

Backing Up Exchange 5.5 Mailboxes and Public Folders

4. Expand the Microsoft Exchange Mailbox icon that contains the mailboxes or public folders you want to back up. You can select all mailboxes or individual messages, mailboxes, and folders to back up. When you select a mailbox or public folder, all folders and subfolders are included in the backup by default. For a faster backup, consider using Advanced File Selections to exclude some folders, such as Deleted Items or Sent Items, and subfolders from the backup. Because public folders can be replicated on multiple Exchange servers, select public folders from only one Exchange server.

5. If prompted, select a logon account that will allow you to connect to the Exchange mailboxes or public folders. For information on using logon accounts when making backup selections, see “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136. 6. To select the mailbox or public folders backup method, on the Properties pane, under Settings, click Exchange. For details on these options, see “Backup Options for Exchange 5.5” on page 1140. 1148

Administrator’s Guide

Restore Options for Exchange 5.5

7. Select other backup options from the Properties pane or start the backup job. See also: “Backing Up Data” on page 239

Restore Options for Exchange 5.5 This procedure details how to select restore job properties for Exchange 5.5 and provides definitions for Exchange 5.5-specific restore options. For details on how to create a restore job, and for definitions of all other restore options, see “Restoring Data” on page 411. ▼

To select restore job properties for Exchange 5.5: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click Exchange.

Exchange Agent

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1149

Restore Options for Exchange 5.5

3. Select the appropriate options as follows. Restore Job Properties for Exchange 5.5 Item

Description

Exchange Server options Automatically recreate Select this checkbox to recreate the user accounts and their user accounts and mailboxes if they do not already exist on the target server. mailboxes during restore Otherwise, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password you entered on the Exchange page in the Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, on the Tools menu click Options, and then in the Properties pane under Job Defaults, click Exchange. Select Automatically recreate user accounts and mailboxes, and then click Change password. Note This option applies only if mailboxes are being restored to their original location. If the mailbox restore is being redirected, the user account and mailbox must already exist on the target server. Exchange v5.5 No loss restore (Do not delete existing transaction logs)

Select this to preserve the existing transaction logs on Exchange 5.5. Transaction logs on the storage media are then restored and added to the existing set of transaction logs on Exchange 5.5. When the restore operation finishes, Exchange 5.5 automatically updates its databases with the uncommitted transactions found in the existing and newly restored transaction logs. This option is selected by default.

Restore public folder

Select this to restore only the Information Store’s public database (PUB.EDB). Although this database cannot be backed up separately from the Information Store’s private database (PRIV.EDB), it can be restored separately.

Restore private mailboxes

Select this to restore only the Information Store’s private database. Although this database cannot be backed up separately from the Information Store’s public database (PUB.EDB), it can be restored separately. If the Restore public folder and Restore private mailboxes options are selected independently, the No loss restore option is automatically selected and cannot be cleared.

1150

Administrator’s Guide

Restoring Exchange 5.5 Restore Job Properties for Exchange 5.5 (continued) Item

Description

Guide Me

Click Guide Me to start a wizard that helps you choose restore job properties for restoring Exchange 5.5 Directory and Information Store data.

Restoring Exchange 5.5 How you restore data depends on the types of backup used to protect the data: ◆

Restore the last full backup, or



Restore the last full backup and the last differential backup, or



Restore the last full backup and all subsequent incremental backups.

Following are requirements for running a restore job for Exchange 5.5 Server: ◆

The Exchange System Attendant service is running on the target server. If you are restoring Exchange data to more than one Windows computer, the System Attendant service must be running on each target computer.



If you are restoring the Exchange Directory, the target server must have access to the original Security Account Manager (SAM) information. If the recovered server does not have access to the SAM information from the original domain, and the Directory Store is restored, none of the Exchange data is accessible after the restore. This is because the Exchange Directory uses SID (Security Identifier) information for authenticating access to objects and the restored SID information will not match SID information from the SAM in the new domain.

Note Restoring an Exchange 5.5 Directory Store to an Exchange Server other than the original is not supported; only Information Store data can be restored to a different computer. Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1151

Exchange Agent

Note The Directory and Information Store services are stopped when the corresponding stores are restored. Users cannot access them until the restore is complete and the services restarted.

Restoring Exchange 5.5 ▼

To restore Exchange 5.5: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup sets you want to restore. -

Restore the last full backup, or

-

Restore the last full backup and the last differential backup, or

-

Restore the last full backup and all subsequent incremental backups.

4. On the Properties pane, under Settings, click Exchange. 5. Select the appropriate options. For details, see “Restore Options for Exchange 5.5” on page 1149. 6. Start the restore job or select other restore options from the Properties pane. 7. After the restore job completes, reboot the destination Exchange server or start the Exchange services manually. You can also put a batch file in a post-job command to restart the services. See “Pre/Post Commands for Restore Jobs” on page 432. 8.

When the Exchange Server is back online, run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information concerning the DS/IS consistency adjuster, refer to your Exchange documentation.

9. After the restore is complete, it is recommended that you run a full backup of the restored databases. See also: “Restoring Data” on page 411

1152

Administrator’s Guide

Restoring Exchange 5.5

Redirecting Exchange 5.5 Database Restores Only the Information Store database can be restored to a server other than its original server. The Directory Store database must be restored to its original server; it cannot be restored through redirection. When you redirect the restore of the Information Store database, the services are stopped while the store is restored. Users cannot access the database until the restore is complete and the services restarted. Following are restrictions for redirecting Exchange 5.5 database restores: Restrictions for redirecting restores of Exchange 5.5 databases Restriction

Description

The Site and Organization Backup Exec does not prevent redirection of an Information names of the original and Store when the Site and Organization names differ. If the Site destination servers must match. and Organization names are different, the redirected restore may appear to complete successfully but the IS service will fail to start afterward. The No loss restore option must be cleared so that any transaction logs on the destination server are removed to avoid an incompatibility that would prevent the Information Store service from starting. The No loss restore option appears on the Restore Job Properties for Exchange 5.5 dialog box. To access this option, on the navigation bar, click Restore, and then in the Properties pane under Settings, click Exchange. The Directory Store cannot be restored through redirection.

You cannot redirect a restore job in which you have selected to restore one or more Exchange 5.5 Directory databases.

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. ▼

To redirect an Information Store restore: 1. Follow the instructions for the restore in “Restoring Exchange 5.5” on page 1151. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Exchange Redirection.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1153

Exchange Agent

The No loss restore option cannot be selected.

Restoring Exchange 5.5

3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane: Restore job properties for redirected Exchange sets

1154

Item

Description

Redirect Exchange sets

Select this checkbox to enable the Restore to server and Server logon account fields.

Restore to server

Type the name of the computer to which you are restoring, using the format \\server name.

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The default logon account is displayed by default. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136.

Administrator’s Guide

Restoring Exchange 5.5 Mailboxes and Public Folders

4. After the restore job completes, reboot the destination Exchange server or start the Exchange services manually. You can also put a batch file in a post-job command to restart the services. See “Advanced options for restore” on page 428. 5. When the Exchange server is back online, run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information concerning the DS/IS consistency adjuster, refer to your Exchange documentation. 6. After the restore is complete, it is recommended that you run a full backup of the restored databases. See also: “Restoring Data” on page 411

Restoring Exchange 5.5 Mailboxes and Public Folders

If you need to restore mailboxes that have been deleted back to their original location, you can choose to have the user account and mailbox automatically recreated. A password that you specify is assigned to the recreated user account. If the mailbox restore is being redirected, the mailbox must already exist on the target server. Please note the following before starting a mailbox or public folder restore job: ◆



Mailbox backup sets that were created using a site-centric view in versions of Backup Exec prior to 8.6 may require multiple jobs to be run in order to restore all the mailboxes: -

Mailboxes that resided on the target server will restore normally.

-

Mailboxes that resided on other servers must be redirected to those servers.

If you restore mailboxes from a backup created with a version of Backup Exec prior to 8.5, and mailboxes with duplicate Display Names reside on the server, select those mailboxes for restore separately and follow the instructions in “Redirecting Mailbox and Public Folder Restores in Exchange 5.5” on page 1157.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1155

Exchange Agent

You can restore mailbox and public folder data from backup sets created when individual mailboxes were backed up from the Microsoft Exchange Mailboxes selection, or when individual public folders were backed up from the Microsoft Exchange Public Folders selection. You cannot restore individual mailboxes or public folders from database backups.

Restoring Exchange 5.5 Mailboxes and Public Folders ◆

When messages in mailboxes or public folders are restored to a location where a message with the same name already exists, the restored message does not replace the existing message, but is added to the destination folder; therefore, duplicate messages may result in the destination folder.



The option Restore over existing files in the Restore Job Properties dialog box does not apply to mailboxes or public folders. If other selections are restored in addition to mailboxes or public folders, and the option Restore over existing files is selected, it applies only to the other selections; mailboxes and public folders are not restored over existing objects. To display the Restore Job Properties dialog box, on the navigation bar click Restore, and then on the Properties pane, click Settings.



Do not restore special system mailboxes created by Exchange. The following are common examples of special system mailboxes, but there may be others depending on the Exchange 5.5 server configuration and environment. -

Microsoft Schedule + Free/Busy Connector

-

System Attendant

-

Directory Service

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. ▼

To restore Exchange mailboxes and public folders: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, navigate to and select the data you want to restore. 4. On the Properties pane, under Settings, click Exchange. On the Restore Job Properties dialog box, if the user accounts and their mailboxes that are being restored do not already exist on the target server, and they are being restored to their original location, select Automatically recreate user accounts and mailboxes. If this option is not selected, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password entered on the Exchange page of the Options - Set Application Defaults dialog box is used as the password for accounts that are recreated.

1156

Administrator’s Guide

Restoring Exchange 5.5 Mailboxes and Public Folders

To change the password, on the Tools menu click Options, and then in the Properties pane under Job Defaults, click Exchange. Select Automatically recreate user accounts and mailboxes, and then click Change password. 5. Start the restore job or select other restore options from the Properties pane. 6. After the restore is complete, run a full backup of the restored mailboxes. See also: “Restoring Data” on page 411 “Restore Options for Exchange 2000 and 2003” on page 1111 “Setting Default Backup and Restore Options for Exchange 2000 and 2003” on page 1127

Redirecting Mailbox and Public Folder Restores in Exchange 5.5

If you select a single mailbox, or one or more messages or folders from a single mailbox, you can redirect that restore to another existing mailbox on the same or a different server. If any of the folders in the original mailbox do not exist in the destination mailbox, they will be created during the restore. If you select more than one mailbox, or folders and messages from more than one mailbox, you can only redirect the restore to another server. Mailboxes with the same names as those selected must already exist on the target server. Following are requirements for redirecting the restore of mailboxes: ◆

If the mailboxes do not already exist on the target server, you must create them before redirecting the restore. Automatic recreation of mailboxes on the target server is not enabled for redirected restores.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1157

Exchange Agent

You can redirect the restore of individual mailboxes and public folders from backup sets created when individual mailboxes were backed up from the Microsoft Exchange Mailboxes selection, or when individual public folders were backed up from the Microsoft Exchange Public Folders selection. You cannot restore individual mailboxes or public folders from database backups.

Restoring Exchange 5.5 Mailboxes and Public Folders ◆

To ensure that Backup Exec can access mailboxes on the server that you are redirecting messages or mailbox restores to, click the destination server in the backup selections list, select Microsoft Exchange Mailboxes and verify that the target mailbox is displayed in the list of mailboxes. If you are prompted for a logon account, use a logon account that stores the credentials of a user account that is unique and has a corresponding mailbox of the same name. See “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136.



More than one mailbox can exist with the same Display Name. When the restore of a mailbox is redirected in Backup Exec, it is redirected to the target mailbox’s Display Name. If a duplicate Display Name exists, then the data may be restored to the wrong mailbox. To prevent restoring the data to the wrong mailbox, type the name of the target mailbox exactly as it appears when browsing to the mailbox in the backup selections list, including the brackets surrounding the mailbox directory identifier (for example, “Mailbox Name [mailboxname]”).

Following are requirements for redirecting the restore of individual messages to another mailbox. ◆

When redirecting the restore of mailbox data, all destination mailboxes must already exist before the restore begins. The contents of the restored mailboxes are placed in the destination mailboxes.

For example, if you back up Mailbox 1, which consists of Top of Information Store, Inbox, and Folders 1 and 2, each containing some mail messages, and then you restore Mailbox 1 to the existing Mailbox 2, then all of Mailbox 1, including the Top of Information Store, Inbox, Folders 1 and 2, and messages, are restored to Mailbox 2. Note that Mailbox 1 itself is not created under Mailbox 2. Redirecting the restore of Mailbox 1 to Mailbox 2

1158

Administrator’s Guide

Restoring Exchange 5.5 Mailboxes and Public Folders

If you redirect the restore of Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2, the contents of Mailbox 1\Top of Information Store\Folder 2, Message 5 and Message 6, are placed in Mailbox 2 in the same folder as they were in Mailbox 1, as illustrated in the following graphic. Redirecting Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2



To redirect a restore: 1. Follow the instructions for the restore in “Restoring Exchange 5.5 Mailboxes and Public Folders” on page 1155. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Exchange Redirection.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1159

Exchange Agent

Before starting the restore job, review “Restoring Data” on page 411 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs.

Restoring Exchange 5.5 Mailboxes and Public Folders

3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane. After completing the restore, it is recommended that a full backup of the restored mailboxes be performed. Restore job properties for redirected Exchange sets

1160

Item

Description

Redirect Exchange sets

Select this checkbox to enable the Restore to server and Restore to mailbox fields.

Restore to server

Type the name of the computer to which you are restoring, using the format \\server name.

Server logon account

To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The default logon account is displayed. To use another logon account, click Change. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136.

Administrator’s Guide

Setting Default Backup and Restore Options for Exchange 5.5 Restore job properties for redirected Exchange sets (continued) Item

Description

Restore to mailbox

Type the name of the target mailbox exactly as it appears when browsing to the mailbox in the backup selections pane, including the brackets surrounding the mailbox directory identifier (for example, “Mailbox Name [mailboxname]”). The mailbox must already exist before you can restore to it. See “Redirecting Mailbox and Public Folder Restores in Exchange 5.5” on page 1157.

Mailbox logon account

To restore a mailbox or public folder, use a Backup Exec logon account that stores the credentials of the mailbox user account. To use another logon account, click Change. To clear the displayed logon account and use the same logon account specified in the Server logon account field, click Clear. For more information about logon accounts, see “Using Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1136.

You can use the defaults set by Backup Exec during installation for all Exchange backup and restore jobs, or you can choose your own defaults. You can also change the defaults for any specific backup or restore job. ▼

To change backup and restore defaults for Exchange: 1. On the Backup Exec menu bar, click Tools, and then click Options. 2. On the Properties pane, under Job Settings, click Exchange.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1161

Exchange Agent

Setting Default Backup and Restore Options for Exchange 5.5

Setting Default Backup and Restore Options for Exchange 5.5

1162

Administrator’s Guide

Setting Default Backup and Restore Options for Exchange 5.5

3. Select the appropriate options as follows: Options - Set Application Defaults for Exchange Item

Description

Backup Exchange method

Š

FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is selected by default.

Š

COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up.

Š

DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required. Š

INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database.

Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1163

Exchange Agent

You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.

Setting Default Backup and Restore Options for Exchange 5.5 Options - Set Application Defaults for Exchange (continued) Item

Description

Mailbox method:

Š

FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.

Š

COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.

Š

DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup. The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.

Š

INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the differential backup.

1164

Administrator’s Guide

Setting Default Backup and Restore Options for Exchange 5.5 Options - Set Application Defaults for Exchange (continued) Item

Description

Enable single instance backup for message attachments

Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each message attachment backed up and kept in order on the backup set.

Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed.

Restore 5.5 No loss restore (do not delete existing transaction logs)

Select this to preserve the existing transaction logs on Exchange 5.5. Transaction logs on the storage media are then restored and added to the existing set of transaction logs on Exchange 5.5. When the restore operation finishes, Exchange 5.5 automatically updates its databases with the uncommitted transactions found in the existing and newly restored transaction logs. This option is selected by default.

Restore public folder

Select this to restore only the Information Store’s public database (PUB.EDB). Although this database cannot be backed up separately from the Information Store’s private database (PRIV.EDB), it can be restored separately.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1165

Exchange Agent

If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.

Setting Default Backup and Restore Options for Exchange 5.5 Options - Set Application Defaults for Exchange (continued) Item

Description

Restore private mailboxes

Select this to restore only the Information Store’s private database. Although this database cannot be backed up separately from the Information Store’s public database (PUB.EDB), it can be restored separately. If the Restore public folder and Restore private mailboxes options are selected independently, the No loss restore option is automatically selected and cannot be cleared.

Automatic recreation Automatically recreate user accounts and mailboxes

Select this checkbox to recreate the user accounts and their mailboxes if they do not already exist on the target server. Otherwise, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this checkbox is selected, the password you entered on the Exchange page on the Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, see “To restore Exchange mailboxes and public folders:” on page 1156. Note This option applies only if mailboxes are being restored to their original location. If the mailbox restore is being redirected, the user account and mailbox must already exist on the target server.

Password

Click this to specify a password to use when user accounts and mailboxes are automatically recreated on the target server.

See also: “Restore Options for Exchange 5.5” on page 1149 “Restoring Data” on page 411

1166

Administrator’s Guide

Preparing for Disaster Recovery of Exchange 5.5

Preparing for Disaster Recovery of Exchange 5.5 A disaster preparation plan is an absolute necessity for restoring Exchange efficiently and effectively in the event of a catastrophic failure. Because Exchange uses Windows security for authentication, disaster recovery of Exchange cannot be separated from the disaster recovery of Windows. Planning ahead reduces the time needed to recover. It is critical to build a kit that includes items such as: An operating system configuration sheet



A hard drive partition configuration sheet



Any RAID configuration



A hardware configuration sheet



EISA/MCA configuration disks



An Exchange configuration sheet



A Windows emergency repair diskette



An Exchange Performance Optimizer settings sheet

Exchange Agent



To perform the actual recovery, you will need: ◆

An installed copy of Backup Exec for Windows Servers



The latest full, incremental, and differential backups of the Exchange databases you want to recover



The Microsoft Exchange Server Installation CD



Any service packs which were applied to the original installation

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1167

Disaster Recovery for Exchange Server 5.5

Disaster Recovery for Exchange Server 5.5 This procedure guides you through a complete restoration of Exchange 5.5 using Backup Exec. You should have already performed all the appropriate preparation as detailed in “Preparing for Disaster Recovery of Exchange 5.5” on page 1167. Always log in to Windows using the Administrator account (or an Administrator equivalent) during this procedure. To properly recover Exchange, the Directory Store needs to be restored to a server that has the same computer name, and Domain, Organization, and Site name as the original. If these conditions are not met, the recovery will not be successful. Even if the only Directory Store backup available is of the original Directory Store, restore it, and then backfill changes from another server in the site. If you purchased Intelligent Disaster Recovery, see “Microsoft Exchange Recovery Notes” on page 937 for directions on using Intelligent Disaster Recovery to recover your Exchange server. ▼

To perform disaster recovery for Exchange 5.5: 1. Recover the Windows server first. For instructions, see “Disaster Recovery of a Local Windows NT Computer” on page 559 or “Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative restore of Active Directory for a domain controller)” on page 567. Note Make sure you restore the Exchange Server files that existed on all disk partitions. When the Windows server disaster recovery procedure is complete (after the last reboot), recover the Exchange server. 2. Do one of the following: Note This step is necessary because the Microsoft Exchange Directory service may hang when there is no database to use because you have not restored it yet. However, if you have tools that can kill a process such as KILL or PVIEWER, then kill the DSAMAIN.EXE process and go to step 4 on page 1169. a. For Windows 2000, click Start, point to Settings, and then click Control Panel. Double-click Administrative Tools, and then double-click Services. Right-click Microsoft Exchange Directory service, and then click Properties. On the General tab, under Startup, click Disabled, and then click OK. b. For Windows NT, click Start, point to Settings, and then click Control Panel, and then double-click Services. Double-click Microsoft Exchange Directory service, change the Startup Type to Disabled, and then click OK.

1168

Administrator’s Guide

Disaster Recovery for Exchange Server 5.5

3. Restart the computer. Note Upon reboot, a message is displayed stating that not all services could be started. 4. Double-click the Microsoft Exchange Directory service, and then change the Startup Type to Automatic. 5. Click OK. 6. Verify that the Exchange System Attendant service is started. 7. Start Backup Exec. 8. Catalog the tapes that contain the latest full, incremental, and differential backups of the Exchange Stores you want to recover. 9. On the navigation bar, click Restore. 10. On the Properties pane, under Source, click Selections.

12. Select all subsequent incremental Directory and Information Store backups. If differential backups are to be restored, only the last differential Directory and Information Store backups (the newest) need to be selected. 13. On the Properties pane, double-click Settings, and then click Exchange. 14. Select the Exchange 5.5 options Restore Public Folder and Restore Private Mailboxes. 15. Clear the checkbox for the Exchange 5.5 option No loss restore (do not delete existing transaction logs). 16. Start the restore job.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1169

Exchange Agent

11. On the restore selections list, select the latest full backups of the Directory and Information Stores for restore.

Disaster Recovery for Exchange Server 5.5

17. After the restore has completed, insert the Microsoft Exchange Server installation CD into the CD-ROM drive, open a command window, and copy the contents of the following directory on the Exchange CD: \setup\\bootenv to the following directory on your hard drive: \exchsrvr\mtadata For example, assuming your Exchange installation is on drive C, your CD-ROM drive is drive D, and your processor type is Intel, you would type the following in a command window: copy d:\setup\i386\bootenv\*.* c:\exchsrvr\mtadata Note If you use File Manager or Windows Explorer to copy the files, you must remove the READ ONLY file attribute from the files after you copy them. If you do not remove this file attribute, the Microsoft Exchange Message Transfer Agent service will not start. 18. Using a command window, execute the following: \EXCHSRVR\BIN\ISINTEG -PRI -test mailbox, message, folder \EXCHSRVR\BIN\ISINTEG -PUB -test mailbox, message, folder \EXCHSRVR\BIN\MTACHECK If these diagnostics report errors, refer to your Exchange documentation regarding these utilities. 19. Do one of the following: a. For Windows 2000, click Start, point to Settings, and then click Control Panel. Double-click Administrative Tools, and then double-click Services. b. For Windows NT, click Start, point to Settings, and then click Control Panel, and then double-click Services. 20. Start ALL of the Exchange services that have Automatic as a Startup Type. This should include:

1170

-

Microsoft Exchange Directory

-

Microsoft Exchange Information Store

-

Microsoft Exchange Message Transfer Agent

-

Microsoft Exchange System Attendant Administrator’s Guide

Protecting Microsoft Exchange Server 2003 Using the Exchange Writer

21. After the Exchange server is back online, it is recommended that you use the Exchange Administrator to run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information about the DS/IS consistency adjuster, refer to your Microsoft Exchange Server documentation. 22. After completing the restore, it is recommended that a full backup of the restored databases be performed.

Protecting Microsoft Exchange Server 2003 Using the Exchange Writer A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections.

Both the Exchange Agent and the Exchange Writer can back up Exchange Server 2003 data. However, the Exchange Agent provides more options than the Exchange Writer for backing up Exchange Server 2003 data. In addition, the Exchange Agent works with the Recovery Storage Group feature in Exchange Server 2003, which enables you to recover individual mailboxes and message data from an Exchange Store backup with no impact on the production store. The Exchange Writer does not support the Recovery Storage Group feature. Backup Exec supports only full backups of storage groups using the Exchange Writer. See also: “Protecting Windows Server 2003 Systems” on page 343

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1171

Exchange Agent

The Backup Exec Shadow Copy Components file system supports the Microsoft Exchange Writer, which protects Microsoft Exchange Server 2003 on Windows Server 2003.You must enter a Backup Exec Exchange Agent serial number to display the Writer. Then, both the Exchange Agent and the Writer are available to perform data protection operations of Exchange Server 2003 on Windows Server 2003 resources in Backup Exec.

Protecting Microsoft Exchange Server 2003 Using the Exchange Writer

Backing Up Exchange Server 2003 Using the Exchange Writer The Exchange Backup Job Properties do not apply to backups using the Exchange Writer. When the entire server is selected for backup or if one-button backup is used, and an Exchange Agent is installed, the Exchange Server Writer will not be selected for backup to avoid redundancy. Backup Exec supports only full backups of storage groups using the Exchange Writer ▼

To back up Exchange Server 2003 using the Exchange Writer: 1. On the navigation bar, click Backup. 2. In the selection pane, expand the following sequentially: Local Selections, Shadow Copy Components, User Data, Exchange Server, Microsoft Exchange Server, Microsoft Information Store .Selecting Exchange data to back up

3. Under Microsoft Information Store, select the Exchange server. 4. In the right pane, select the storage group you want to back up.

1172

Administrator’s Guide

Protecting Microsoft Exchange Server 2003 Using the Exchange Writer

5. Select backup options from the Properties pane or start the backup job. Note The Exchange Backup Job Properties do not apply to backups using the Exchange Writer. See also: “Backing Up Data” on page 239

Restoring Exchange Server 2003 Using the Exchange Writer The Exchange Restore Job Properties and the Exchange Redirection option do not apply to restores using the Exchange Writer. You can use the File Redirection option to redirect restores to volume-level resources, but the redirection target must be a Windows Server 2003 system with Backup Exec 9.1 or the Remote Agent installed. If you create an Exchange Writer backup with Backup Exec 9.1, you cannot restore it with previous versions of Backup Exec. ▼

To restore Exchange Server 2003 Using the Exchange Writer:

If you do not dismount the data stores, the backup will fail and you will receive an error message. 2. On the Backup Exec navigation bar, click Restore. 3. In the selection pane, expand the following sequentially: Local Selections, Shadow Copy Components, and then select the appropriate backup set. 4. Select User Data, Exchange Server, Microsoft Exchange Server, Microsoft Information Store. 5. Under Microsoft Information Store, select the Exchange server name. 6. In the right pane, select the storage group you want to restore. 7. Select restore options from the Properties pane. The Exchange Restore Job Properties do no apply to restores using the Exchange Writer.

Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server

1173

Exchange Agent

1. Use the Exchange System Manager to dismount all of the data stores in the storage group you want to restore.

Protecting Microsoft Exchange Server 2003 Using the Exchange Writer

8. If you want to redirect the restore to a volume-level resource, on the Properties pane, under Destination, click File Redirection, and then select redirection options. Note You cannot redirect a restore to another Exchange Writer. 9. Start the restore job. 10. Use the Exchange System Manager to mount the data stores in the storage group you restored. See also: “Redirecting a Restore Operation” on page 452

1174

Administrator’s Guide

VERITAS Backup Exec - Library Expansion Option

I

Using a robotic library with Backup Exec provides convenient, automated support for large capacity network environments. Support for a single robotic library drive is included with Backup Exec for Windows Servers. To obtain licenses for additional robotic library drives, you must purchase the optional VERITAS Backup Exec for Windows Servers - Library Expansion Option (LEO). This option allows concurrent processing on multi-drive robotic libraries. See also: “Using Robotic Libraries with Backup Exec” on page 138 “Configuring Multi-drive Robotic Libraries” on page 1176

Setting Up Robotic Library Hardware Before installing Backup Exec, you will need to make sure the robotic library hardware is configured properly. Make sure the robotic arm is set to “Random” mode. Please refer to your robotic library documentation for more information.



If you have a multi-LUN robotic library, make sure your controller card is set to support multiple LUNs (if supported).



The SCSI ID of the robotic arm must precede the SCSI address of the drives in the robotic library.

1175

Library Expansion



Setting Up Robotic Library Hardware

The following illustration shows an example of a standalone drive and robotic library configuration. Standalone drive and robotic library configuration

SCSI Address:

2 Standalone drive

3 Standalone drive

4 Robotic Arm

5 and 6 Media drives in the robot

Configuring Multi-drive Robotic Libraries Configuring Backup Exec to work with multiple drive robotic libraries is accomplished by making associations between the robotic library’s media drives, robotic arm, and Backup Exec. Backup Exec supports serialized drives; manual configuration of serialized drives is not required. Each drive in the robotic library and the robotic arm requires its own SCSI ID. Multi-drive robotic libraries require separate SCSI addresses for each device. In addition to separate SCSI IDs, each drive in a multi-drive robotic library has unique drive element addresses. You must know each drive’s element address to properly configure the robotic library to work with Backup Exec (refer to your robotic library documentation to determine the drive element address for each storage device). After determining the drive considered to be the first drive in the robotic library (Storage Device 0), you will need to arrange the SCSI addresses to match the sequence of the drive element addresses. For example, if your robotic library has two drives, the drive with the lowest drive element address should be assigned the lower SCSI address. Example configuration for a Multi-drive robotic library

1176

Data Transfer Element (Storage Devices)

SCSI ID

Drive Element Address

Robotic Arm

4

N/A

Storage Device 0

5

00008000

Storage Device 1

6

00008001

Administrator’s Guide

Installing the Library Expansion Option

Installing the Library Expansion Option Backup Exec’s optional Library Expansion Option installation requires: ◆

Purchasing an Library Expansion Option serial number for each additional robotic library drive.

Note Support for a single robotic library drive is included with Backup Exec for Windows Servers. ◆

Installing the necessary Library Expansion Option files.



Configuring the robotic arm and drives.

Backup Exec’s Library Expansion Option installation copies all necessary robotic library-related files including the software needed to control the robotic arm and storage devices. To install the Library Expansion Option, follow the installation steps described in “Installing Backup Exec Options on a Local Server” on page 53, adding the Library Expansion Option serial number.

Starting Backup Exec After Installing the Library Expansion Option ◆

Backup Exec is started for the first time following the Library Expansion Option installation.



The Confirm Backup Device Availability item is selected from the Backup Exec Assistant.



From the Tools menu, you point to Wizards, and then select Device Configuration Wizard.

This item displays several dialogs, including the Welcome screen: ◆

The Detected Hardware dialog box shows all of the devices attached to the media server. If a drive attached to your media server does not appear in the list, click Configure Devices to install the appropriate driver for the device.



The Drive Configuration dialog box shows how the devices appear to Backup Exec.

Appendix I, VERITAS Backup Exec - Library Expansion Option

1177

Library Expansion

Information is displayed about the configuration of your storage devices when one of the following occurs:

Starting Backup Exec After Installing the Library Expansion Option Detected Hardware dialog box

Devices in the robotic library Robotic library

Drive Configuration dialog box

Make sure that each device in the robotic library is properly associated with the robotic library. Make sure the drives in the library appear in the device configuration wizard under the robotic library in the order matching their drive element address. The drive having the lowest drive element address should appear at the top of the list. If a robotic library storage device appears in the list as a stand-alone device, you can correct the association by clicking and dragging the drive over the robotic library entry.

1178

Administrator’s Guide

Starting Backup Exec After Installing the Library Expansion Option

If this does not work, make sure the SCSI addresses of the robotic library and the storage device are configured properly. Note During startup, Backup Exec expects the storage devices in the robotic library to be empty. If there is media in the device, Backup Exec tries to return the media to its original magazine slot. If, for any reason, it cannot return the media to the slot, an error message appears requesting that the media be ejected from the storage device. See also: “Setting Up Robotic Library Hardware” on page 1175 “Using the Backup Exec Assistant” on page 88 “Viewing Drive Configuration Properties” on page 125

Viewing Robotic Libraries The following is an example of how robotic libraries are depicted when Devices is selected from the navigation bar: Robotic libraries in the Devices view

Robotic library

Library Expansion

Robotic library drive

All slots Individual slots

Depending upon your robotic library configuration, the first slot could be numbered 1 or 0. If your robotic library uses a zero-based slot configuration you can reassign how the slots are displayed in Backup Exec, by right clicking the Robotic Library in the left pane, selecting Properties, and then selecting Configuration. Depending on whether your robotic library begins slot numbering at 0 or 1, specify the appropriate number in the Slot Base field.

Appendix I, VERITAS Backup Exec - Library Expansion Option

1179

Starting Backup Exec After Installing the Library Expansion Option Changer properties for Library|Configuration tab

After completing the configuration of your robotic library, you should perform an Inventory operation to update Backup Exec’s media database. See also: “Inventorying Media in Devices” on page 171

1180

Administrator’s Guide

VERITAS Backup Exec Desktop and Laptop Option

J

The Backup Exec Desktop and Laptop Option (DLO) provides automated file protection for desktops and laptops (collectively referred to as desktops). Protection is provided whether the computer is connected to the network or offline. When the desktop is not connected to the network, the files are backed up to a User Data Folder on the desktop. When the computer reconnects to the network, the files are backed up from the local Desktop User Data Folder to the designated Network User Data Folder. Users who have multiple computers can synchronize the data between their computers so the most up-to-date file versions are available on all of their computers. Note This product is intended to provide file level protection for desktop user data and is not intended to provide a full system backup.

DLO

1181

How the Desktop and Laptop Option Works

How the Desktop and Laptop Option Works DLO is comprised of the DLO Administration Console for the Administrator and the Desktop and Laptop Agent (Desktop Agent) for the desktop user. Note The DLO Administration Console is part of Backup Exec and runs on the Backup Exec media server, but it uses a separate window that you access from Backup Exec. From the DLO Administration Console, the Administrator can: ◆

Create Profiles for groups of users or computers. Profiles enable you to control the desktop user’s level of interaction with the Desktop Agent (from full to none), determine the types of files that can be backed up, set the schedule for backups, and configure additional settings for the Desktop Agent.



Create Network User Data Folders, which are the locations on the network that are assigned to Desktop Agent users, and where the data from their protected desktops is stored. You can use Storage Locations to automatically create Network User Data Folders for each new Desktop Agent user, or you can use existing network shares as Network User Data Folders and add them manually to DLO.



Create Automated User Assignments. Automated User Assignments determine the Storage Location and Profile to which users are assigned when they install the Desktop Agent. Automated User Assignments are not used if users are manually added to DLO.



Add users manually to DLO. Instead of using Automated User Assignments, you can manually add users to DLO and assign a Profile and Storage Location to them. This is particularly useful when network shares already exist for user data storage. Users can be added individually or multiple users can be added at the same time by importing them from a list.



View history log files, receive alerts, and restore files to a desktop from the Administration Console.

The Desktop Agent resides on the desktops and laptops that you want to protect. The desktop user’s level of interaction with the Desktop Agent can vary depending on how the Administrator has configured the Profile assigned to the user. The Desktop Agent may run in the background, automatically protecting files. Alternatively, desktop users with full access to the Desktop Agent interface can schedule backups, select which types of files to back up, restore files, synchronize file versions between different computers, and view the status of their backups.

1182

Administrator’s Guide

How the Desktop and Laptop Option Works Relationship Between Backup Exec and the Desktop and Laptop Option Components

- Backup Exec Administration Console - DLO Administration Console

Administration Console on the media server or a remote server

- Backup Exec media server - Desktop Agent Install Share

Storage Locations and Network User Data Folders

DLO File Server

- Desktop Agent - Desktop User Data Folder

If you use Backup Exec to protect the file servers that host the Network User Data Folders remotely, the Remote Agent for Windows Servers is required.

Desktops and Laptops

DLO File Server

- Desktop Agent - Desktop User Data Folder

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1183

Installing the Backup Exec Desktop and Laptop Option

Installing the Backup Exec Desktop and Laptop Option The VERITAS Backup Exec Desktop and Laptop Option is installed as a separate add-on component of Backup Exec for Windows Servers to protect data on desktops. To install DLO, see “Installing Backup Exec Options on a Local Server” on page 53. If you prefer to install DLO from the Command Line (Silent Mode), see “Installing Backup Exec from the Command Line (Silent Mode)” on page 60 and “Command Line Switches for Backup Exec Silent Mode Installation” on page 61. After you install and configure the settings for the desktop users, you can install the Desktop Agent or direct the desktop users on how to install it. The Desktop Agent is installed from the Desktop Agent install share, which is created when DLO is installed on the Backup Exec media server. See also: “Setting Up DLO” on page 1191 “Deploying the Desktop Agent” on page 1184 “Installing the Desktop Agent” on page 1244 Note Novell E-Directory, NIS+ and other non-Windows Domain or Active Directory authentication schemes are not supported.

Updating DLO VERITAS Update provides updates for both the DLO Administration Console and the Desktop Agent components. The updates are placed on the Backup Exec media server. Updates for the Desktop Agent will be copied to the install share. The Desktop Agent must be reinstalled on each desktop for the updates to take effect. See also: “Using VERITAS Update” on page 75

Deploying the Desktop Agent When you install DLO from the Backup Exec installation CD, the Desktop Agent install set is created on the Backup Exec media server in a directory that is shared and available via a UNC path. There are several ways to deploy the Desktop Agent from the Desktop Agent install share to the desktop computer.

1184

Administrator’s Guide

Installing the Backup Exec Desktop and Laptop Option

Note You cannot push install the Desktop Agent. Desktop Agent Deployment Methods Deployment Methods

Description

E-mail

Send a hypertext link to the install files or include the install files as an attachment.

Web page

Place the install files on your company’s intranet.

Logon scripts

Create a file that includes commands for installing the Desktop Agent. Then assign the script to the User Properties for the employees who need to use DLO. The commands are executed automatically when the user logs on to the network. For more information about logon scripts, refer to your Microsoft Windows documentation.

Microsoft Systems Management Server (SMS)

Use this automated system to distribute the Desktop Agent install set to the desktop computers, which then initiate the installation. For more information about SMS, refer to your Microsoft documentation.

CD-ROM

To distribute the Desktop Agent installation files on a CD-ROM, place the contents of the \\Backup Exec media server\DLO Agent share on the CD-ROM. Users can then run setup.exe from the CD-ROM. The installed Desktop Agent will be correctly associated with the Backup Exec media server.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1185

Using the DLO Administration Console

Using the DLO Administration Console The DLO Administration Console is used to configure DLO and manage desktop backup and restore operations. ▼

To access the DLO Administration Console from Backup Exec or BEWAC: 1. On the navigation bar, click Job Setup. 2. Under Backup Strategy Tasks in the task pane, click Configure desktop and laptop backups. Accessing DLO from the Backup Exec Administration Console

See also: “Setting Up DLO” on page 1191 “Creating DLO Storage Locations” on page 1191 “Setting up a DLO Profile” on page 1195 “Setting up Automated User Assignments” on page 1206 “Managing Desktop Agent Users” on page 1212 1186

Administrator’s Guide

Using the DLO Administration Console

Creating Administrator Accounts The DLO Administration Console can be managed by any user who is in the administrators group where DLO is installed. In addition, DLO administrators can be added using the DLO Administrator Account Management dialog box. Adding these accounts makes browsing User Data Folders for restore selections easier. DLO will prompt for the credentials needed to access the User Data Folders if needed, but these credentials will not be saved. ▼

To add DLO administrators using the Administrator Account Management dialog box: 1. On the DLO Administration Console Network menu, select Administrator Accounts. 2. Click Add. 3. Select a domain in the List all user names in drop-down menu and select a name from the resulting list. Alternately, type a user name in the type a user name field, using the format DomainName\UserName or UserName@DomainName. 4. Click OK twice.

Connecting to a Backup Exec Media Server ▼

To connect to the Backup Exec Media Server: 1. On the DLO Administration Console Network menu select Connect to Media Server. Connecting to a Media Server

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1187

Using the DLO Administration Console

2. Select the appropriate options as follows: Connect to Media Server dialog box options Item

Description

Server

Type the name of the media server or select from the drop-down menu.

Low speed connection

Select this check box if you are using a low speed connection.

Login information User name

Enter the user name for an account with administrator access to the media server.

Password

Enter the password for this account.

Domain

Enter the domain for this account.

3. Click OK.

1188

Administrator’s Guide

Using the DLO Administration Console

The DLO Overview View The DLO Overview view summarizes the DLO status. Backup Exec DLO Console Overview

The following table summarizes the contents of the Overview view: Overview View Content Item

Description

Desktop Computer Status Summary Summarizes the completion status of the last operation performed on computers protected by DLO.

Pending Jobs

Lists restore jobs requested by the DLO administrator that have not yet been run.

Alert Summary Active Alerts

Lists alerts that have not been cleared by the DLO administrators and have not yet been removed by the alert grooming process. Alert grooming is managed from the Backup Exec Administration Console.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1189

DLO

Last Backup Result

Using the DLO Administration Console Overview View Content Item

Description

Server Summary

1190

Server Status

Lists the status of each server that has Storage Locations.

Server Load

Lists the number of desktops being protected by DLO and the total number of installed Desktop Agent users. Both online and offline users are counted.

Administrator’s Guide

Setting Up DLO

Setting Up DLO In order for DLO to back up user data, you must set up the following options in the correct order: 1. Create a Profile, which determines what files are backed up, when files are backed up, and the level of interaction the desktop user has with the Desktop Agent. 2. Determine where user data will be stored on the network. DLO requires an individual User Data Folder on the network for each desktop user. If Storage Locations are used, they will automatically create Network User Data Folders for each new Desktop Agent user. If network data storage folders already exist for each user, they can be added to DLO individually or imported in bulk. 3. Create an Automated User Assignment to automatically assign a Storage Location and Profile to new users, or configure new users manually. You can set up DLO by using wizards or by setting options manually. The DLO configuration wizard provides a series of wizards that help you set up DLO in the correct order. The configuration wizard appears when the DLO Administration Console is opened, unless the Always show this wizard at startup box is unchecked. ▼

To access the Configuration Wizard: 1. On the DLO navigation bar, click Setup. 2. Under Getting Started on the task pane, select DLO Configuration Using Wizard. See also: “Setting up a DLO Profile” on page 1195 “Creating DLO Storage Locations” on page 1191 “Setting up Automated User Assignments” on page 1206 “Managing Desktop Agent Users” on page 1212

DLO

Creating DLO Storage Locations Storage Locations are locations on network computers where Network User Data Folders are automatically created for new Desktop Agent users. Storage Locations are not used if existing network shares are imported into DLO and used as Network User Data Folders.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1191

Setting Up DLO

The Desktop and Laptop Option stores each user’s data in two places. First, it is stored in the Desktop User Data Folder on the desktop to provide protection and restore capabilities even when the computer is disconnected from the network. The data is then additionally stored in a Network User Data Folder, which is located in a DLO Storage Location on the network. This provides an additional level of protection, and enables the files to be backed up to secondary media when the server is backed up. DLO Storage Locations are created from the DLO Administration Console. If network shares already exist for desktop users, they can be manually added to DLO and used as Network User Data Folders. If existing network shares are used as Network User Data Folders, Storage Locations are not used. For additional information on utilizing existing network shares, see “Managing Desktop Agent Users” on page 1212.

Things to Consider Before Creating DLO Storage Locations A Storage Location should be used by only one Backup Exec media server. If you set up multiple Backup Exec media servers to use the same Storage Location and the Storage Location is deleted from one media server, the other media server will no longer be able to access it. Storage Locations must be in a Windows Domain or Active Directory. Computers running the Desktop Agent can be outside of a Windows Domain or Active Directory, but they must authenticate with the domain or directory to access the Backup Exec media server or Storage Locations. You will be prompted to provide domain credentials. If your original files reside on an NTFS volume, then the Desktop User Data Folder and the Network User Data Folder should also be NTFS. If your original files are on NTFS and either the Desktop User Data Folder or Network User Data Folder are on a FAT or FAT32 volume, you may see duplicate entries in the Restore and Restore Search screens. If duplicates do appear, you can select either file to restore and receive the same outcome. Once created, Storage Locations cannot be modified, but they can be deleted if there are no users or Automated User Assignments assigned to them. You can move users to new Storage Locations. For more information, see “Moving a Desktop Agent User” on page 1217. Note If you are using Windows NT 4.0, you may receive errors when you create Storage Locations using the DLO Administration Console. If you encounter these problems, verify that the logon account for the service named MSSQL$BKUPEXECDLO has sufficient rights to create directories and change permissions for the Storage Locations. Use the Windows Service Control Panel to change the MSSQL$BKUPEXECDLO instance. You can avoid these problems if you specify a domain account for the Backup Exec services when you install Backup Exec.

1192

Administrator’s Guide

Setting Up DLO ▼

To create DLO Storage Locations: Note After you create Storage Locations, you cannot modify them. 1. On the DLO navigation bar, click Setup. 2. Click Storage Locations in the selection pane. 3. Under Storage Location Tasks in the task pane, click New Storage Location. 4. Select the appropriate options as follows. New Storage Location Dialog Box Item

Description

Computer name

Type a computer name or browse to a computer on which to create the Storage Location.

Path

Type or browse to a location on the computer where the Storage Location will be created. Note Storage Locations should be in the same domain as the Backup Exec media server or in a domain that trusts the Backup Exec media server’s domain.

Storage Location name Type a name for the new Storage Location. The name cannot contain any of the following characters: \”@#$%^&*()=+|/{}[]’

5. Click OK.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1193

DLO

Note The Summary field displays the location and format of User Data Folders that will be created for new users assigned to this Storage Location. The User Data Folders are automatically created in the Storage Location. DLO uses the %USERDOMAIN% and %USERNAME% macros to determine the actual folder path for each user who is assigned to a Storage Location. DLO uses the user’s domain and user name to create a unique User Data Folder name for that user. The credentials used may be different from the user’s logon ID. The network administrator can access this folder, but cannot configure the macros.

Setting Up DLO

Deleting DLO Storage Locations Before you can delete DLO Storage Locations, you must delete or reassign users and Automated User Assignments that use the Storage Location. The Storage Location associated with a user or Automated User Assignment is listed when you select Users or Automated User Assignments from the Setup view. ▼

To delete Storage Locations: 1. Click Setup on the DLO navigation bar. 2. Click Storage Locations in the selection pane. 3. In the results pane, click the Storage Location you want to delete. 4. Under General Tasks in the task pane, click Delete. 5. Click OK to delete the Storage Location. See also: “Managing Desktop Agent Users” on page 1212 “Modifying Existing Automated User Assignments” on page 1209 “Deleting Automated User Assignments” on page 1211

1194

Administrator’s Guide

Setting Up DLO

Setting up a DLO Profile Profiles define settings for a specific group of users. Create custom Profiles for groups of similar users. For example, a group of highly technical users may require the ability to modify the backup selections and schedules while less experienced users may require a fully automated backup service. In a Profile, you can set the following: ◆

Backup file and folder selections



Desktop and Network User Data Folder storage limits



Backup schedules



The desktop user’s level of interaction with the Desktop Agent



Logging options



Network bandwidth usage

You cannot modify settings for individual DLO users from the DLO Administration Console unless an individual user is the only user assigned to a Profile. However, you can grant permission to Desktop Agent users to modify their own settings.

Default Profiles DLO provides two default Profiles. One is for desktop computer users and the other is for laptop computer users. Both back up the My Documents directory by default. The primary difference between the two Profiles is in the number of revisions retained in the Desktop User Data Folder. DLO Default Profiles Description

Desktop Users

The Desktop Users Profile uses the My Documents (Desktops) backup selection, which retains zero versions in the Desktop User Data Folder and three versions in the Network User Data Folder by default. This minimizes disk space requirements for DLO on desktop computers and assumes that DLO will be able to access backup files in the Network User Data Folder.

Laptop Users

The Laptop Users Profile uses the My Documents (Laptops) backup selection, which retains one version in the Desktop User Data Folder and three versions in the Network User Data Folder by default. This provides offline protection for all files in the laptop My Documents folder.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1195

DLO

Profile

Setting Up DLO ▼

To create a new Profile: 1. On the DLO navigation bar, click Setup. 2. Click Profiles in the selection pane. 3. Under Profile Tasks in the task pane, click New Profile. 4. From the General tab in the New Profile dialog box, select the appropriate options as follows. General Profile Properties Item

Description

Profile Name

Type the name of the new Profile that you want to create. The Profile name cannot contain any of the following characters: \”@#$%^&*()=+|/{}[]’

Description

Type a description for the Profile.

Enable Profile

Clear this check box to disable the Profile. Profiles are enabled by default.

User Bandwidth Settings Yield bandwidth to other Select Yield bandwidth to other programs when running DLO programs with other network-intensive applications, particularly when using a low bandwidth connection. This will reduce data transfer over the network when other applications on the desktop computer are transferring data and automatically resume normal data transfer rates when other applications are not using this resource. Note Data transfer is only limited when data is written to the Network User Data Folder, not when it is written to the Desktop User Data Folder. Limit bandwidth (KB/sec)

Select Limit bandwidth (KB/sec) and enter a specific setting while backing up large files, particularly over a low bandwidth connection. This will throttle the rate at which data is sent to the Network User Data Folder. Note Data transfer is only limited when data is written to the Network User Data Folder, not when it is written to the Desktop User Data Folder.

Storage Limits

1196

Administrator’s Guide

Setting Up DLO General Profile Properties Item

Description

Limit space allocated to: Network User Data Folder (MB)

Select this to limit the disk space available to store DLO backup files, and then type the amount of space you want to use for storage.

Limit space allocated to: Desktop User Data Foldler (MB)

Select this to limit the disk space available to store DLO backup files, and then type the amount of space you want to use for storage.

5. From the Backup Selections tab, add the files and folders that you want to be backed up for users of this Profile. You can add, modify, and delete backup selections for a Profile. For more information, see “Adding Backup Selections” on page 1201. 6. From the User Settings tab, select the appropriate options as follows: Profile User Settings Dialog Box Item

Description

Display Settings

Select one of the following options to determine the desktop user’s level of interaction with the Desktop Agent: Š

Display the complete interface. Select this option to enable desktop users to access all Desktop Agent options.

Š

Display only the status. Select this option to enable desktop users to view the status of backup jobs. With this option, desktop users cannot change settings for the Desktop Agent or access any options other than the status. Desktop users can right click the system tray icon to see a description of the Desktop Agent status, open the status view, or exit the program.

Š

Desktop users can right click on the system tray icon to view a description of Desktop Agent status or exit the program. Š

Do not display anything. Select this option to run the Desktop Agent in the background. The desktop user cannot view the Desktop Agent.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1197

DLO

Display only the tray icon. Select this option to display the Desktop Agent icon in the system tray in the lower right corner of the screen.

Setting Up DLO Profile User Settings Dialog Box Item

Description

Allow Users to

Select the following items to enable desktop users to configure these options in the Desktop Agent:

Suppress error messages from user’s desktop

Š

Restore data

Š

Synchronize files

Š

Encrypt files

Š

Modify backup selections

Š

Modify Profile backup selections

Š

Customize local disk quota

Š

Modify backup schedule

When selected, error messages generated by the Desktop Agent on computers using this Profile will not be displayed in the DLO Administration Console. This will minimize the number of times the Desktop Agent accesses DLO, reducing the load on the DLO server.

7. From the Schedule tab, select the appropriate options as follows: Profile Schedule Dialog Box Item

Description

Run backups Whenever a file changes

Select this option to back up files whenever they change. Note Automatic backup whenever a file changes is available only for Windows 2000 and Windows XP computers with NTFS file systems. For FAT file systems, enter a backup interval. This option does not work with Windows NT4.

According to a schedule Select this option to back up files according to a customized schedule. Click Edit schedule to configure the backup schedule. The backup schedule is described in step 8. When initiated by the user

1198

Select this option to enable desktop users to determine when to back up their files.

Administrator’s Guide

Setting Up DLO

8. If you selected Edit schedule in the previous step, select the appropriate options as follows, and then click OK: Backup Schedule Dialog Box Items

Description

Run on these days

Select the days on which you want to back up files.

Frequency Run once at

Select this option to run backups one time on the day and time you selected.

Run every

Select this option to run backups at a specific time interval on the days you selected, and then select the time interval.

From

If you selected Run every, select the time you want backups to begin.

Until

If you selected Run every, select the time you want the last backup of the day to run. Note This field specifies the end of the time period within which backups will begin. If a backup is in progress at this time, it will continue to run to completion.

Start backup jobs over Select this option to stagger start times for backup jobs. Rather than a period of starting all backup jobs at exactly the time indicated, DLO will distribute the start times over the specified interval, better distributing the demands on the server and network. For example, if backups are set to run every day between 8 AM and 5 PM, and run every 4 hours, backups will occur at 8 AM, 12 PM and 4 PM. If the backup that began at 4pm is still in progress at 5pm, it will continue to run to completion.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1199

Setting Up DLO

9. From the Options tab, select the appropriate options as follows: Note Events such as file copies, file grooms, errors and warnings are logged by DLO and can be viewed as discussed in “Monitoring Alerts on the DLO Administration Console” on page 1228. Additional Profile Options Item

Description

Logging options Logging level

Select one of the following logging options: Š

None. Select this option to prevent logging.

Š

Errors. Select this option to log only errors.

Š

Errors and warnings. Select this option to log only errors and warnings.

Š

All messages. Select this option to log all messages.

Log on/off options Automatically back up when logging on

Select this to begin a backup after the desktop user logs on to the computer.

Automatically back up when logging off

Select this to begin a backup when the desktop user logs off the computer.

Mail options Enable incremental Check to enable incremental backups of Microsoft Outlook backups of Outlook .pst Personal Folder (.pst) files. Incremental backups must be enabled files to allow .pst files to be backed up while they are open. When you restore Microsoft Outlook .pst files, the restored .pst file will differ from the original .pst file as explained in “Restoring Microsoft Outlook Personal Folder Files” on page 1266.

10. When the Profile configuration is complete, click OK. See also: “Modifying Desktop Agent Settings” on page 1253 “Monitoring Alerts on the DLO Administration Console” on page 1228

1200

Administrator’s Guide

Setting Up DLO

Adding Backup Selections Backup selections specify which files and folders you want to back up on desktops. You define backup selections within Profiles. If you have provided users with full access to the Desktop Agent, they can modify the backup selections using the Desktop Agent. Note When a new backup selection is created for a Profile, that backup selection is available for selection in all other Profiles. Revisions are versions of a file at a specific point in time. When a file is changed and backed up, DLO stores a new revision. DLO will store and maintain a specific number of revisions for all files in a backup selection. Because backup selections are configured separately, the number of revisions retained in each backup selection can vary. When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified number of revisions in the Desktop and Network User Data Folders. You can limit the number of revisions retained in a given period of time. If you are working on a document and backing it up frequently, all of your revisions could potentially be just a few minutes apart. By specifying that you want to retain only two revisions every 24 hours, at least 120 minutes apart, you can retain older revisions for a longer period of time. While some intermediate versions will not be retained, it does support situations in which returning to an older revision is needed. Another consideration in determining the number of revisions to retain is the amount of storage space required to store the data. The amount of space required for backups can be estimated by multiplying the number of revisions retained by the amount of data protected. Example If you are have 10 MB disk space consistent

retaining three revisions of each file and of data to back up, approximately 30 MB of will be required if file sizes remain between revisions.

Although compression can improve the space utilization, it varies significantly with file type and other factors. Typical compression ratios are approximately 2:1, so in the previous example, the maximum disk space usage might be reduced to approximately 15 MB.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1201

DLO

Caution VERITAS strongly recommends that you consider disk space when choosing backup selections for desktops and laptops. A large number of local copies may cause the Desktop Agent user's computer to run out of disk space. For example, you may want to avoid selecting entire drives for backup or synchronization.

Setting Up DLO ▼

To add a backup selection: 1. On the DLO navigation bar, click Setup. 2. Click Profile in the selection pane. 3. In the results pane, click the Profile you want to modify. 4. Under General Tasks in the task pane, click Properties. 5. From the Backup Selections tab in the Profile Properties dialog box, click Add. A dialog box explains that if you customize NTFS permissions or directory attributes such as compression or encryption for backed up files or folders, you must reapply these settings after restoring these files. If you use a password for a Microsoft Outlook .pst file, you must reset the password after restoring a .pst file. 6. Click OK to indicate that you understand this message and to open the Backup Selection dialog. Backup Selection Dialog Box

1202

Administrator’s Guide

Setting Up DLO

7. From the General tab in the Backup Selection dialog box, select the appropriate options as follows: Backup Selection General Dialog Box Item

Description

Name

Type a descriptive name for the backup selection.

Description

Type a clear description of the backup selection. This description may include, for example, the folder selected, the group of users it was created for, or the purpose for creating the backup selection.

Folder to back up Type a folder name

Select this option to add a specific folder to the backup selection, and then type the path to the folder, including the folder name. For example, to add a folder named MyData on drive C, type C:\MyData.

Select a pre-defined folder

Select this option to choose a folder that was previously defined by the DLO administrator. Select a folder from the list provided.

Include subfolders

Select this option to also back up all subfolders in the specified directory. This option is selected by default.

8. From the Include/Exclude tab, select the appropriate options as follows: Backup Selection Include/Exclude Dialog Box Item

Description

Include all file types

Select this option to include all file types in this backup selection.

Include only the items listed below

Select this option to include only specific files or file types, and then click Add to specify the file types.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1203

DLO

Exclude the items listed Select this option to exclude certain files or file types, and then click below Add to select the files to exclude.

Setting Up DLO

9. To add files or file types to the Include/Exclude list, select the appropriate options as follows, and then click OK: Add Include/Exclude Filter Dialog Box Item

Description

Add an extension filter

Select this option to add common file types to your include or exclude list. To select multiple file types, click one item and press or <Shift> while clicking the other items.

Add a custom filter

Select this option to add a custom file or file type to your include or exclude list.

File name or extension

If you selected Add a custom filter, type the name of the file or the file type that you want to include or exclude from backup selections.

Description

Type a description of the custom file or file type.

10. From the Revision Control tab, select the appropriate options for both the desktop and Network User Data Folders: Backup Selection Revision Control Dialog Box Item

Description

Specify the number of Select the number of revisions of each file that you want to keep in revisions to keep in the the backup selection. desktop and network User Data Folders Limit to

Select this option to limit the number of revisions retained in a given amount of time, and specify the following: Š

Versions. Select the number of versions to retain.

Š

Within the last x hours. Select the time period during which you want to retain the versions.

Š

At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.

Note The oldest revision is deleted when a new revision is created that exceeds the limit.

1204

Administrator’s Guide

Setting Up DLO

11. From the Options tab, select the appropriate options as follows: Backup Selection Options Item

Description

Compress the files stored in the network User Data Folder

Select this option to compress files in this backup selection for data transfer over the network and for storage in the desktop and network User Data Folders. This affects files created after this feature is activated. Previously stored files will not be compressed.

Encrypt the files for transmission and storage

Select this option to encrypt files for transmission and to store files from this backup selection in an encrypted format in the Desktop User Data Folder and the Network User Data Folder. This affects files transmitted and stored after this feature is activated. Previously stored files will not be encrypted.

When source files are deleted, delete the backed up files from the: Desktop User Data Folder after

Indicate the number of days after which DLO will delete all file versions from the Desktop User Data Folder after the source file has been deleted from the desktop.

Network User Data Folder after

Indicate the number of days after which DLO will delete all file versions from the Network User Data Folder after the source file has been deleted from the desktop.

Modifying a Backup Selection 1. On the DLO navigation bar, click Setup. 2. Click Profile in the selection pane. 3. In the results pane, click the Profile you want to modify.

DLO

4. Under General Tasks in the task pane, click Properties. 5. From the Backup Selections tab, select the backup selection you want to modify, and then click Modify. 6. Change the backup selection as needed, and then click OK. For more information, see step 7 on page 1203.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1205

Setting Up DLO

Deleting Backup Selections Before you can delete a backup selection, you must be sure that it is not in use by any Profiles. When you delete a backup selection from one Profile, DLO deletes it from every Profile. When you delete a backup selection, the backup versions are deleted in the same manner as when source files are deleted. They will be groomed after the number of days specified in the backup selection. For additional information, see “Backup Selection Options” on page 1205. ▼

To delete a backup selection: 1. On the DLO navigation bar, click Setup. 2. Click Profile in the selection pane. 3. In the results pane, click the Profile that contains the backup selection you want to delete. 4. Under General Tasks in the task pane, click Properties. 5. From the Backup Selections tab, select the backup selection you want to delete. 6. Click Delete. 7. Click Yes to verify that you want to delete this backup selection, or click No to cancel.

Configuring the Global Exclude List From the Tools menu in the DLO Administration Console, you can set up the global exclude list. With the global exclude list you can configure the files that you want to exclude from all backups. You can exclude all files of a certain type, such as .tmp files, or a specific file, such as pagefile.sys. The files you exclude are listed on the Include/Exclude tab in the Advanced view on the Desktop Agent and on the Include/Exclude tab for a profile's backup selection on the DLO Administration Console. Items configured for the global exclude list are not available for selection on the selection list.

Setting up Automated User Assignments Automated User Assignments are instructions that are applied when the Desktop Agent is first run on a desktop. The Automated User Assignment assigns a Profile and Network User Data Folder to each user who is automatically configured by DLO. These settings can be changed from the DLO Administration Console at a later time if necessary. 1206

Administrator’s Guide

Setting Up DLO

Note If a user is added manually to DLO, a Storage Location and Profile are selected by the DLO administrator. The Automated User Assignment will not be used. For more information, see “Managing Desktop Agent Users” on page 1212 You specify a domain and group for each Automated User Assignment. Because users may belong to several groups, Automated User Assignments are prioritized. When the Desktop Agent is run for the first time, the Desktop Agent user’s domain and group credentials are checked against those of the Automated User Assignment starting with the highest priority assignment. When a match is made, the share and Profile specified in that Automated User Assignment are assigned to the new user. Modifying Automated User Assignments does not affect users who have already been configured. Only new users configured with the Automated User Assignment will use the new settings. Viewing Automated User Assignments

Automated User Assignments listed in order of priority

DLO You can create, reorder, and modify Automated User Assignments from the Setup view in the DLO Administration Console.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1207

Setting Up DLO

For information on modifying Automated User Assignment priorities, see “Changing the Priority of Automated User Assignments” on page 1209. ▼

To create a new Automated User Assignment: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane. 3. Under Automated User Assignment Tasks in the task pane, click New user assignment. New Automated User Assignment Dialog Box

4. Select the appropriate options as follows: New Automated User Assignment Dialog Box Options Item

Description

User Assignment User assignment name

Type a name for the Automated User Assignment. The Automated User Assignment name cannot contain the following characters: \”@#$%^&*()=+|/{}[]’

Domain and Group this user assignment will apply to

1208

Administrator’s Guide

Setting Up DLO New Automated User Assignment Dialog Box Options Item

Description

Domain

Select the domain to which this Automated User Assignment will apply.

Group

Select the group to which this Automated User Assignment will apply.

Storage Location/Profile Storage Location

Select a Storage Location to be assigned to the users in the selected domain and group.

Profile

Select a Profile to be assigned to the users in the selected domain and group.

Modifying Existing Automated User Assignments Modifying an existing Automated User Assignment affects only users added to the assignment after it has been modified. Existing Desktop Agent users are unaffected. Settings for existing Desktop Agent users can be modified from the Setup view of the DLO Administration Console. For more information see “Modifying DLO Desktop Agent User Properties” on page 1215. ▼

To modify an existing Automated User Assignment: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane. 3. In the results pane, select the Automated User Assignment you want to modify. 4. Under General Tasks in the task pane, select Properties.

Changing the Priority of Automated User Assignments When you create an Automated User Assignment, DLO assigns a priority to it so that when a user is a member of more than one domain and group, it is clear which Automated User Assignment will be used. The most recently created Automated User Assignments have the lowest priority. You can change the priority of Automated User Assignments.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1209

DLO

5. Modify the Automated User Assignment properties. For more information see “New Automated User Assignment Dialog Box Options” on page 1208.

Setting Up DLO ▼

To change the priority of Automated User Assignments: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane. 3. In the results pane, select the Automated User Assignment for which you want to change the priority. 4. Under Automated User Assignment Tasks on the task pane, select Move priority up or Move priority down. Changing the Priority of an Automated User Assignment

Viewing Automated User Assignment Properties ▼

To view Automated User Assignments: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane.

1210

Administrator’s Guide

Setting Up DLO

3. In the results pane, select an Automated User Assignment. 4. Under General Tasks in the task pane, select Properties.

Deleting Automated User Assignments You can delete Automated User Assignments when you no longer need them. ▼

To delete an Automated User Assignment: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane. 3. Click the Automated User Assignment to be deleted. 4. In the task pane under General Tasks, click Delete. 5. Click Yes to delete the Automated User Assignment. See also: “Setting up Automated User Assignments” on page 1206 “Modifying Existing Automated User Assignments” on page 1209 “Changing the Priority of Automated User Assignments” on page 1209 “Deleting Automated User Assignments” on page 1211 “Moving a Desktop Agent User” on page 1217 “Modifying DLO Desktop Agent User Properties” on page 1215

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1211

Setting Up DLO

Managing Desktop Agent Users The DLO Administrator manages the Desktop Agent from the DLO Administration Console. From this interface, users or groups of users can be manually added to DLO, enabled or disabled, moved to a new network share, or assigned a different Profile. Desktop Agent users are added to DLO either automatically using Automated User Assignments, or manually from the DLO Administration Console. See also: “Setting up Automated User Assignments” on page 1206 “Adding a Single Desktop Agent User to DLO” on page 1213 “Importing Multiple Desktop Users Who Have Existing Storage Locations” on page 1214 “Viewing DLO Users” on page 1215 “Modifying DLO Desktop Agent User Properties” on page 1215 “Disabling or Enabling DLO Access For a Desktop User” on page 1216 “Removing a User from DLO” on page 1216 “Moving a Desktop Agent User” on page 1217

Creating a New Network User Data Folder To create or use an existing network share as a Network User Data Folder, the folder must have the appropriate security attributes according to the organization’s needs. For example, determine which users can access the folder. ▼

To create a new Network User Data Folder and set security attributes: 1. Create a network share on the computer where backup files will be stored. 2. Right-click the share you created in step 1, and then select Properties. 3. Click Permissions. 4. Select the following permissions for user Everyone: Full Control, Change, Read 5. Click OK. 6. Select Security.

1212

Administrator’s Guide

Setting Up DLO

7. Clear the Allow inheritable permission from parent to propagate to this object check box. 8. Add Administrator and Everyone and give them full control permissions. 9. Create a data folder for each user who will use this Storage Location. 10. Right-click the data folder you created in step 9, select Properties and then select Security. 11. Clear the Allow inheritable permission from parent to propagate to this object check box. 12. Add Administrator and the user who will be assigned to the user data folder to the share permission list. 13. Set full permission for Administrator and the user.

Adding a Single Desktop Agent User to DLO Desktop users can be configured manually rather than with Automated User Assignments (see “Setting up Automated User Assignments” on page 1206). This allows the use of existing network folders that are dedicated to storing backup data for specific users. These network folders become the DLO Network User Data Folders. Storage Locations are not required when a user is added manually to DLO. The purpose of a Storage Location is to automatically create User Data Folders. Because the User Data Folders are added manually, Storage Locations are not required. However, a new user can be assigned to an existing Storage Location or Network User Data Folder. After adding a desktop user manually, the settings that you assign (the User Data Folder and the Profile) are applied when the desktop user runs the Desktop Agent the first time. To add a single DLO user:

DLO



1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane. 3. Under User Tasks in the task pane, click New user.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1213

Setting Up DLO

4. Enter information in the fields as described in the following table: New User Properties Item

Description

Enable User

Select this option to enable this user to use the Desktop Agent, or clear it to prevent the user from using the Desktop Agent.

User

Browse to the username or type it in the form DomainName\UserName or UserName@DomainName.

Profile

Select the Profile that you want to assign to this user.

User Data Folder

Do one of the following:

Network User Data Folder

Select this option and type the path or browse to an existing Network User Data Folder where this desktop user’s backup files will be stored. This must be an existing folder, and the security attributes must be set for the folder according to your organization’s needs. For example, determine which users can access the folder. Note A Storage Location is not required when an existing network share is used as the Network User Data Folder.

Storage Location

Select this option to choose an existing Storage Location. The Network User Data Folder for the new user will be placed in this Storage Location.

Importing Multiple Desktop Users Who Have Existing Storage Locations If you want to configure multiple users who already have an existing network Storage Location, you can import a list of users from a comma separated values (CSV) file. The file must be in the following format and have the following information for each user: user name, domain, Profile, User Data Folder Example JSmith,enterprise,Default,\\Server1\Userdata\jsmith ▼

To import multiple DLO users from a file: 1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane.

1214

Administrator’s Guide

Setting Up DLO

3. Under User Tasks in the task pane, click Import users using wizard. 4. Follow the wizard prompts.

Viewing DLO Users 1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane to list users in the results pane.

Modifying DLO Desktop Agent User Properties 1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane. Users are listed in the results pane. 3. Select the user you want to modify. 4. Under General Tasks in the task pane, select Properties. User Properties dialog box

DLO

5. Modify the user properties as described in the following table: User Properties Item

Description

Enable User

Select this option to enable this user to use the Desktop Agent, or clear it to prevent the user from using the Desktop Agent.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1215

Setting Up DLO User Properties Item

Description

User

The name of the user. This field cannot be edited.

Profile

Select a Profile to apply to this user.

Network User Data Folder

Select the location where this user’s backup files are to be stored. This location cannot be modified. To move a user to a new location, see

Disabling or Enabling DLO Access For a Desktop User This option prevents a user from backing up the desktop via the Desktop Agent. 1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane. Users are listed in the results pane. 3. Select the user you want to modify. 4. Under General Tasks in the task pane, select Properties. 5. Clear the Enable user checkbox to disallow DLO operations or check the box to allow DLO operations to continue for this user.

Removing a User from DLO If you want to permanently remove a user from the DLO database, you can delete the user’s entry from DLO. Before deleting the user from the DLO Administration Console, you should uninstall the Desktop Agent from the user’s desktop. Otherwise, the user will automatically be re-added if the Desktop Agent is run by the user and a matching user assignment exists in DLO. If you cannot uninstall the Desktop Agent from the user’s computer, disable the user (see “Disabling or Enabling DLO Access For a Desktop User” on page 1216). ▼

To delete a user from the DLO database: 1. On the DLO navigation bar, click Setup. 2. Click Users in the selection pane. Users are listed in the results pane.

1216

Administrator’s Guide

Setting Up DLO

3. Click the user you want to delete. 4. Under General Tasks in the task pane, click Delete. 5. To delete the data stored in the User Data Folder, check Delete data stored in the user data folder. When the Delete data stored... option is selected, backup data is deleted from the Network User Data Folder, but not from the Desktop User Data Folder. When the Desktop Agent is uninstalled from the desktop computer, an option is provided to delete the Desktop User Data Folder. 6. Click Yes to delete the user, or click No to cancel. Note If you delete a user from the DLO Administration Console without first uninstalling the Desktop Agent from the user’s desktop, the Desktop Agent on that user's computers will close automatically.

Moving a Desktop Agent User When a Desktop Agent user is moved, the Network User Data Folder is moved to a new directory. The new directory can be an existing Storage Location or another directory on the network. After the data is successfully moved, the data in the old Network User Data Folder is deleted. Subsequent backups will be stored in the new location. ▼

To move a Desktop Agent user: 1. On the DLO navigation bar, click Setup. 2. Select Users in the selection pane. 3. Select the user to be moved. 4. Under User Tasks in the task pane, click Move user.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1217

Setting Up DLO Move User

5. Enter information in the appropriate fields as described in the following table: Move User Item

Description

An existing Storage Location

Select this option to choose an existing Storage Location from the drop down list.

An alternative location

Select this option to specify a new Storage Location.

6. Click Start.

1218

Administrator’s Guide

Restoring Files and Folders from the DLO Administration Console

Restoring Files and Folders from the DLO Administration Console The administrator can restore files and folders to a desktop computer from the DLO Administration Console. ▼

To restore files and folders from the DLO Administration Console: 1. On the DLO navigation bar, click Restore. 2. In the Computer pane, click the desktop from which the data to be restored originated. 3. In the Backup Folder pane, check the files and/or folders from the tree view that are to be included in the restore. 4. If multiple versions exist for a file, select the radio button for the file version you want to restore. Note In some cases the Restore Search view may contain duplicate entries for the same file. If this occurs, you can select either file to restore and receive the same outcome.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1219

Restoring Files and Folders from the DLO Administration Console Restore view

5. Under Restore Tasks in the task pane, click Restore files. Restore Dialog Box

1220

Administrator’s Guide

Restoring Files and Folders from the DLO Administration Console

6. Select the appropriate options as follows, and then click OK: Restore Dialog Box Item

Description

Restore destination Restore to desktop computer:

Select this option to restore the selected files or folders to the desktop from which they were originally backed up.

Restore to original folder

Select this option to restore the file or folder to its original location.

Redirect the restore to an alternate folder

Select this option to restore the file or folder to a different location on the same desktop.

Redirect the restore to a folder on an alternate computer

Select this option to restore the selected items to a network or local drive other than the one from which they were originally backed up.

Preserve folder structure

Check this box to restore the data with its original directory structure intact. If you clear this option, all data (including the data in subdirectories) is restored to the path you specify.

Restore Options If file already exists:

Select Do not overwrite to cancel the restoration of files that already exist in the destination folder. Select Prompt to be prompted before overwriting the file if it already exists in the destination folder. Select Overwrite to overwrite the file without prompting if it already exists in the destination folder.

7. Click OK.

Note If you customize NTFS permissions or directory attributes such as compression or encryption for files or folders, you must reapply these settings after restoration. If you use a password for your .pst file, you must reset the password after restoring your .pst file.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1221

DLO

8. In the Restore Summary dialog box, review the selected restore settings, and then click Restore to continue with the restore.

Restoring Files and Folders from the DLO Administration Console

Searching for Desktop Files to Restore ▼

To search for desktop files and folders to restore: 1. On the DLO navigation bar, click Restore. 2. In the Computer pane, click the desktop on which you would like to search for files to restore. 3. Under Restore Tasks in the task pane, click Search for files to restore. Search Dialog Box

4. Select the appropriate options as follows, and then click OK: Search Dialog Box Options

1222

Item

Description

Search for file names with this text in the file name

Type all or part of the file name or folder you want to find.

Modified

Select this option to search for files that were modified during a specific time frame, and then select the time frame.

Administrator’s Guide

Restoring Files and Folders from the DLO Administration Console Search Dialog Box Options (continued) Item

Description

Today

Select this option to search for files modified on the current calendar day.

Within the past week

Select this option to search for files modified in the last calendar week.

Between

Select this option to enter dates to search a range of days.

Of the following type

Select this check box to select a file type from the list provided.

Of the following size

Select this check box and then enter information as follows: Š

Select from equal to, at least, or most in the first drop-down menu.

Š

Type a file size.

Š

Select KB, MB, or GB.

Deleting a Desktop Computer from DLO When a desktop is deleted from DLO, the backed up data from that computer is deleted from the user’s Network User Data Folder. ▼

To delete a desktop and its backup data: 1. On the DLO navigation bar, click Restore. 2. In the Computer pane, click the desktop you want to delete. 3. Under General Tasks in the task pane, click Delete.

See also: “Restoring Files Using the Desktop Agent” on page 1263

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1223

DLO

4. When prompted to delete this desktop and all its backup files, click Yes to continue or click No to cancel the operation.

Monitoring DLO Job Histories

Monitoring DLO Job Histories Use the History view on the DLO Administration Console to view information about the status of Desktop Agent jobs that are currently running, scheduled to run, or already complete. These jobs include backup, restore, synchronization, and move user jobs. History logs are generated by each desktop running the Desktop Agent and are viewed in either the DLO Administration Console or the Desktop Agent Console. You can filter history logs so that old or less important messages are not displayed, or you can chose to view only information about backup or restore jobs. By default, the history logs are updated when a job runs and an hour has passed since the last update. However, if the job's status changes, the history log is updated immediately to reflect the new status. ▼

To display the History view in the DLO Administration Console: ❖

On the DLO navigation bar, click History. DLO Administration Console History View

1224

Administrator’s Guide

Monitoring DLO Job Histories

The History view includes a computer history and a job history for each desktop that is displayed. The Computer History pane displays all desktops that are backed up with the Desktop Agent and provides the following summary information: Computer History pane Item

Description

User

The user name of the desktop user who generated this message.

Computer

The name of the desktop that generated this message.

Last Operation

The operation that was running when the message was generated, for example, Backup, Restore, Move user, Upgrade, etc.

Last Operation Result

The outcome of a completed task, for example, Success, Warnings, Failed, Canceled.

Profile

The Profile to which the desktop user who generated the message belongs to.

Backup Mode

Describes the backup mode specified in the Profile. Backup modes include: Š

Continuous. The backup occurs whenever a file changes.

Š

Scheduled. The backup occurs according to a schedule.

Š

Manual. The backup occurs when initiated by the desktop user.

Desktop Data Folder Size

The current size of the Desktop User Data Folder.

Network Data Folder Size

The current size of the Network User Data Folder.

Network Data Folder Path

The location of the Network User Data Folder.

The Job History pane displays the following summary information:

DLO

Job History pane Item

Description

Start Time

The time the job was started.

End Time

The time the job ended.

Operation

The operation performed in this job, such as backup or restore.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1225

Monitoring DLO Job Histories Job History pane (continued)



Item

Description

Status

The current status of the job, such as running, complete, complete with errors, complete with warnings, canceled, or failed.

Files Copied

The number of files copied during the job.

Bytes Copied

The total bytes copied during the job.

Errors

The number of errors, if any, that were generated during the job.

To view a history log in the DLO Administration Console: 1. On the DLO navigation bar, click History. Jobs that meet the current filtering criteria for the History view are displayed in the Job History window. For additional information on filtering, see “To set job history view filters:” on page 1227. 2. To view the contents of a history log, select a desktop, and then under General Tasks on the task pane, click View history log file. The log file viewer displays all log messages for this entry. 3. In the Show box, select one of the following: Show Options for the Log File Viewer Item

Description

All entries

Select this option to show all log entries in the log file viewer.

Failed entries only

Select this option to display only entries for failed operations in the log file viewer.

4. If necessary, scroll and resize the Log Message column to view the messages. Each entry in the log file includes a time stamp and a log message that describes the action performed. 5. Click Close to close the Log File Viewer.

1226

Administrator’s Guide

Monitoring DLO Job Histories

Setting Job History View Filters on the DLO Administration Console ▼

To set job history view filters: 1. On the DLO navigation bar, click History. 2. Click the desktop for which you want to view the history. 3. Determine the type of jobs to view by selecting one of the following filters under Job History View Filters on the task pane: Type of Jobs Viewed in the History View Item

Description

List all jobs

Lists history logs for all jobs that have run on the selected desktop. These may include backup, synchronization, restore, or move user jobs.

List backup jobs only

Lists history logs only for backup jobs that have run on the selected desktop.

List restore jobs only

Lists history logs only for restore jobs that have run on the selected desktop.

4. Filter job history logs based on alerts received by selecting one or more of the following: Selections to Filter Job Histories Based on Alerts Received Description

Show successful jobs

Lists history logs for all successful jobs on the selected desktop.

Show jobs with warnings

Lists history logs for all jobs that generated warnings on the selected desktop.

Show jobs with errors

Lists history logs for all jobs that generated errors on the selected desktop.

Show cancelled jobs

Lists history logs for all jobs that were cancelled on the selected desktop.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1227

DLO

Item

Monitoring Alerts on the DLO Administration Console

5. Select a time frame for filters to be viewed by selecting one of the following: Time Frame for Job Histories viewed Item

Description

Show last 24 hours

Lists history logs that have been generated in the last 24 hours, and that meet all other filtering criteria.

Show last 7 days

Lists history logs that have been generated in the last 7 days, and that meet all other filtering criteria.

Show all

Lists all history logs that have been generated in the last 24 hours, and that meet all other filtering criteria.

Monitoring Alerts on the DLO Administration Console Alerts help the DLO administrator understand the current condition of DLO jobs by displaying information on jobs that did not run as expected. When a task such as a backup or restore does not run as expected, an alert is generated. Alerts contain information about the problem that was encountered, and in some cases, recommendations on how to fix the problem. You can filter Alerts to remove less important or older alerts from the Alerts view. Alerts are filtered by the Desktop Agent in order to minimize the load on DLO. By default, alerts are limited to one of each type in 24 hours. For example, you will see only one “Local Out of Disk Condition” alert in a 24-hour period from a desktop running the Desktop Agent. Note “Backup/Restore complete” alerts cannot be filtered. If you enable these alerts, they are generated each time a backup or restore job completes.

1228

Administrator’s Guide

Monitoring Alerts on the DLO Administration Console DLO Administration Console Alerts View

Following are descriptions of the types of alerts: Alert Categories Description

Informational

Notifies you that an expected action has occurred, such as the successful completion of a backup or restore job.

Warning

Notifies you of a potential issue. For example, an alert is generated when a backup has not been completed on a desktop within a given time frame, or if the disk quota limitations are being approached.

Error

Notifies you of an active or pending danger to the application or its data. An error would be generated, for example, if a backup failed to complete, or if a desktop has exceeded its disk quota limitations.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1229

DLO

Alert Type

Monitoring Alerts on the DLO Administration Console

Possible alerts are listed in the following table: DLO Alerts Type

Name

Description

Server Alerts Warnings Queued Restore Job Has Not Completed

Appears when a queued restore job has not completed within a pre-determined time (7 days, 14 days, and 28 days).

Client Backup Has Not Appears when a specific desktop has not completed a Completed backup within a pre-determined time (7 days, 14 days, and 28 days). Informational Restore Job Queued

Appears when a restore job is initiated from the DLO Administration Console.

Desktop Agent Alerts Errors

1230

Configuration of User Failed

Appears when a new user connects and for an unknown reason and cannot be configured properly.

Exceeded Local Disk Quota

Appears when attempting to add a new version to the Desktop User Data Folder, which would exceed the specified limit.

Exceeded Share Disk Quota

Appears when attempting to add a new version to Network User Data Folder which would exceed the specified limit.

Local Out of Disk Condition

Appears when the available disk space on the desktop computer reaches a pre-determined percentage.

Share Out of Disk Condition

Appears when the available disk space on the network computer reaches a pre-determined percentage.

Backup Job Failed

Appears when a running backup job is unable to be completed and fails.

Administrator’s Guide

Monitoring Alerts on the DLO Administration Console DLO Alerts Type

Name

Description

Restore Job Failed

Appears when a running restore job is unable to be completed and fails.

Warnings No Matching User Assignment

Appears when a new user connects and no matching combination of domain and/or group could be found within the defined User Assignments.

Approaching Local Disk Quota

Appears when a user’s Desktop User Data Folder is approaching the specified size limit.

Approaching Share Disk Quota

Appears when a user’s Network User Data Folder is approaching the specified size limit.

Approaching Local Low-Disk-Space Condition

Appears when the available disk space on the desktop computer reaches a pre-determined percentage.

Approaching Share Low-Disk-Space Condition

Appears when the available disk space on the network computer reaches a pre-determined percentage.

Backup Job Completed Appears when a backup job completes with errors. with Errors Backup Job Completed Appears when a backup job completes with warnings. with Warnings Restore Job Appears when a restore job completes with errors. Completed with Errors Appears when a restore job completes with warnings.

DLO

Restore Job Completed with Warnings Informational Job Completed Successfully

Appears when a backup job completes successfully.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1231

Monitoring Alerts on the DLO Administration Console DLO Alerts Type

Name

Description

Restore Job Completed Successfully

Appears when a restore job completes successfully.

User Configured Successfully

Appears when a new user connects and is successfully configured.

Configuring Alerts The DLO Administrator can select the type of alerts to display in the DLO Administration Console. ▼

To configure DLO alerts: 1. On the DLO navigation bar, click Alerts. 2. Under General Tasks in the task pane, click Configure alerts. Configure Alerts Dialog Box

3. Select the alerts you want to receive, and clear the check boxes for the alerts you do not want to receive. 4. Click OK. 1232

Administrator’s Guide

Monitoring Alerts on the DLO Administration Console

Managing Alerts From the Alerts view in the DLO Administration Console, you can view a subset of alerts, clear alerts, and move alerts from the administration console to a history log. ▼

To view DLO alerts: 1. On the DLO navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts to view active alerts, or Alert history to view alerts that have been cleared. Note Alerts that are older than a specified number of days are cleared and moved into alert history. The number of days is specified in the Backup Exec Administration Console. 3. To filter alerts by type, select one or more options from Active Alerts View Filters or History Alerts View Filters in the task pane as described below: Active Alerts View Filters Item

Description

Show errors

Lists error alerts for the selected view.

Show warnings

Lists warning alerts for the selected view.

Show information

Lists informational alerts for the selected view.

4. To view the properties of an alert, select the alert in the Active Alerts of Alert History list. Properties are displayed in the Alert Properties pane. ▼

To clear alerts:

DLO

1. On the DLO navigation bar, click Alerts. 2. From the alert list, select the alerts you want to clear. 3. Under General Tasks in the task pane, select Clear selected alerts, or to change the status of all alerts to cleared, select Clear all alerts.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1233

Monitoring Alerts on the DLO Administration Console

Alert Grooming Active alerts that are older than a specified number of days are cleared and moved into alert history. The alerts in the history will be deleted if they have been cleared for more than a specified number of days. When alerts in the history have been cleared for a given number of days, which by default is seven days, they are deleted by a Backup Exec archive operation. If an alert is manually cleared, it is moved into the alert history. Deleting an alert manually removes it permanently.

1234

Administrator’s Guide

Maintaining the DLO Database

Maintaining the DLO Database The Desktop and Laptop Option uses an MSDE database instance named BKUPEXECDLO, which operates separately from the Backup Exec database instance. You can maintain both the Backup Exec database and the DLO database using the Backup Exec database maintenance options. Use BEUtility to perform database operations on BKUPEXECDLO. The DLO database is backed up and restored automatically each time the Backup Exec database is backed up or restored. If you use BEUtility to repair or recover the DLO database, all DLO Administration Consoles must be closed. Otherwise, the operation will fail. For more information about performing database maintenance, see “Configuring Database Maintenance” on page 405. For more information about using BEUtility to perform database operations, see “Backup Exec Utility” on page 809.

Clustering the Desktop and Laptop Option In order to cluster DLO in a Backup Exec cluster configuration, you must install DLO on each cluster node. You cannot add DLO to an existing Backup Exec cluster. Either add DLO when you configure a cluster, or uncluster an existing cluster, add DLO, and then reconfigure the cluster. When you uncluster DLO, the desktops on which DLO was installed from an inactive node will not reconnect to a cluster node. ▼

To reconnect to a cluster node after you uncluster DLO: 1. In the .dlo\.notify directory on the desktop user's Storage Location, create a text file named NewMediaServerDesktop machine name. For example, in the file named NewMediaServerAdmin123, the desktop machine name is Admin123.

3. Repeat steps 1 and 2 for all desktops that will use a new DLO server. If the desktop is running, it should connect to the new server. If the desktop is not running, it should connect to the new server the next time it runs. ▼

To move a Storage Location in a DLO cluster environment: Note These steps must be performed before you take DLO out of the cluster.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1235

DLO

2. In the text file, type the name of the new DLO server on the first line and save the file.

Clustering the Desktop and Laptop Option

1. If the Storage Location is on a shared drive or virtual server, you must move the user data for all of the Storage Location users. Move the user data to a Storage Location on the local node. 2. Modify all automated user assignments that are configured to use the Storage Location on the shared drive or virtual server so that they use another Storage Location on the local node. 3. Verify that all user data was moved off the Storage Location on the shared drive or virtual server and then delete it from the shared drive or virtual server. ▼

To upgrade an existing Backup Exec 9.x cluster and add DLO to the cluster: 1. Install Backup Exec 9.x on the active Backup Exec cluster node. Do not select the DLO option. 2. Install Backup Exec 9.x on each failover node. Do not select the DLO option. Note Note Install Backup Exec when the node has access to the shared Backup Exec cluster disk. 3. Use the Cluster Configuration Wizard on the active Backup Exec cluster node to uncluster all nodes. Click No when you are prompted to remove data on the shared drive. Click Yes when you are prompted to make the data available to the local node. 4. Install DLO on all cluster nodes. All nodes must have DLO before you can recluster them. 5. From the server you used in step 3, use the Cluster Configuration Wizard to reconfigure cluster-aware Backup Exec with the same virtual server name. 6. Add all cluster nodes that were upgraded. The DLO services are added to the Cluster Administrator.



To upgrade an existing Backup Exec 8.x cluster and add DLO to the cluster: 1. Uninstall Backup Exec 8.x and the Remote Agent for Windows from all failover nodes. 2. Uninstall the Remote Agent for Windows from the active Backup Exec cluster node. 3. Reboot the active Backup Exec cluster node.

1236

Administrator’s Guide

Clustering the Desktop and Laptop Option

4. Install Backup Exec 9.x on the active Backup Exec cluster node. Do not select the DLO option. When the upgrade completes, the server is the only node in the Backup Exec 9.x cluster configuration. See also: “Using VERITAS Backup Exec with Server Clusters” on page 759 “Uninstalling Backup Exec From A Cluster” on page 764 “Installing the Backup Exec Desktop and Laptop Option” on page 1184 “Installing Backup Exec on a Cluster” on page 762

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1237

Using the Desktop Agent

Using the Desktop Agent The Desktop Agent is the component of the Backup Exec Desktop and Laptop Option that protects files on desktop and laptop computers (desktops) by backing up data to the desktop’s local drive and to a Storage Location. The DLO administrator initially configures the Desktop Agent. If the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings, then you can restore files, synchronize files between multiple desktops, configure backup selections, set schedules, view history and more. Your Profile determines the level of interaction between you and the Desktop Agent. The administrator may also configure the Desktop Agent to run without a user interface, with a fully functional user interface, or somewhere in between.

Features and Benefits The Desktop Agent provides the following features:

1238



Data Protection. Selected files on the desktop are automatically copied to a User Data Folder on the desktop’s local drive and on the network. The Desktop Agent can be configured so that no user interaction is required. Files are protected automatically when the desktop is online or offline. Backup Exec further protects the data by backing up the Network User Data Folders on the DLO file server.



Data Availability. A user can access data from multiple desktops in multiple locations. Users can also restore previous file revisions even when the desktop is offline.



Synchronization. A user that accesses multiple desktops can configure folders to be synchronized with folders on other desktops. When a file is changed on one desktop, the updated file is copied to the Network User Data Folder and also to the other desktop(s) configured for synchronization.

Administrator’s Guide

System Requirements for the Desktop Agent

System Requirements for the Desktop Agent The following are the minimum system requirements for running this version of the Desktop Agent. Minimum System Requirements Item

Description

Operating System

Š

Microsoft Windows 2000

Š

Microsoft Windows XP Service Pack 1 (SP1) or later

Note The Desktop Agent is not supported on any server operating system, including Windows Server 2003, Windows Storage Server 2003, and Windows 2000 Server. Processor

Pentium system

Memory

Required: 256 MB RAM Recommended: 512 MB (or more for better performance).

Internet Browser

Internet Explorer 5.01 or later; however, version 5.5 is recommended.

Disk Space

25 MB hard disk space required after Microsoft Windows is installed (typical installation).

Other Hardware

Network interface card or a virtual network adapter card (recommended if remove activity is to be performed). Mouse (recommended)

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1239

System Requirements for the Desktop Agent

Using the Desktop Agent Console The Desktop Agent Console is the user interface for the Desktop Agent. The Desktop Agent Console has the following components: Desktop Agent Console

Menu bar Tasks bar Views menu

Tasks menu

1240

Administrator’s Guide

System Requirements for the Desktop Agent

Desktop Agent Console Features Item

Description

Menu bar

The menu bar appears across the top of the screen. To display a menu, click the menu name. Some menu items are not available until an item is selected from the console screen.

Tasks bar

The Tasks bar appears on the left side of the Desktop Agent Console. To hide the Tasks bar, from the View menu, select Tasks Bar. Actions are initiated from the tasks bar, and these actions vary with the selected view.

Views menu

The Views menu appears in the Tasks bar and enables you to navigate to the following views:

Status

Provides job status, lists pending jobs, and summarizes recent backup activity.

Backup Selections

Enables you to define what data is protected by the Desktop Agent.

Synchronized Selections

Enables you to configure the Desktop Agent to maintain selected files and folders so that the most recent backed up version is always available.

Restore

Enables the user to restore backed up data and search for backed up files.

History

Displays Desktop Agent error, warning, and informational messages.

Settings

Enables you to modify settings that determine how the Desktop Agent operates.

Tasks menu

Actions are initiated from the tasks menu. These actions vary with the selected view.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1241

DLO

Note To ensure that you have the latest status and settings at any time while using the Desktop Agent, from the Tasks menu, click Refresh.

System Requirements for the Desktop Agent ▼

To reset dialogs and account information: 1. From the Tools menu, select Options. 2. If you want to reset any information dialogs suppressed by the Don’t show me this message again checkbox, click Reset dialogs. 3. Click Yes when prompted if you want to reset the dialogs. 4. If you want to clear any passwords and account information that the Desktop Agent has stored, click Reset accounts. 5. Click Yes when prompted if you want to clear the accounts. 6. Click OK when finished.

Using Alternate Credentials for the Desktop Agent The account used by the Desktop Agent is the logon account by default, but could be an alternate account if one has been specified. For example, an alternate account may be specified to connect across domains. If you are logged on with credentials that are not recognized by the Desktop Agent, you can specify alternate credentials for Desktop Agent operation and save the account information for future sessions. If you prefer, you can disable an account for Desktop Agent operations so that the Desktop Agent will not run when you are logged on with the account currently being used. This dialog allows you to save this account info for future connections. Note If you have a previously established network connection to the media server and it does not match the account the Desktop Agent is using, the Desktop Agent will attempt to reconnect as the Desktop Agent user. If this fails, the following error displays: “Failed to cancel connection for user %username%. Please contact your administrator.” The account used by the Desktop Agent is the logon account by default, but could be an alternate account if one has been specified, for example, to connect across domains.

Using alternate credentials to work across domains In a cross-domain configuration where there is no trust relationship, if multiple users are running the same Desktop Agent, each user must provide a unique user name and password in the Backup Exec media server domain. If different users use the same credentials, DLO displays an error message stating that the user is already connected to the Backup Exec media server. 1242

Administrator’s Guide

System Requirements for the Desktop Agent

Note For information on resetting accounts that have been disabled for Desktop Agent operation, see “To reset dialogs and account information:” on page 1242. ▼

To log on with alternate credentials or disable accounts 1. When you are logged on to the desktop computer with an account that is not recognized by the Desktop Agent, the Alternate Credential dialog box will appear. Alternate Credential Dialog Box

2. Specify Desktop Agent logging options as outlined below: Alternate Credentials Item

Description

Use this account Enter the user name for an account that is authorized for Desktop Agent operation.

Password

Enter the password for the account to be used for Desktop Agent operation.

Domain

Type the domain for the account to be used for Desktop Agent operation.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1243

DLO

Username

System Requirements for the Desktop Agent Alternate Credentials Item

Description

Save this account information

Check if you would like to save this account information for future DLO sessions.

Disable this account Select to prevent the Desktop Agent from running when you are using the account under which you are currently logged on.

3. Click OK.

Installing the Desktop Agent The DLO administrator determines who installs the Desktop Agent. It can be either the administrator or the desktop user. After the Desktop Agent is installed on a desktop, anyone who logs on to that desktop can use the Desktop Agent. The logged on user will only have access to DLO backup files associated with the logged on account. Note You must have administrator rights to the desktop on which you want to install the Desktop Agent. If you need to reboot the desktop during installation, you must use the same administrator login again to ensure that the installation completes successfully. ▼

To install the Desktop Agent 1. From the desktop on which you want to install the Desktop Agent, browse to the location on the network where the Desktop Agent install set is stored. The default location is \\\DLOAgent. If you are unsure of the location, contact the administrator. 2. Double-click the file setup.exe. 3. On the Welcome screen, click Next. 4. Read the license agreement, and then click I accept the terms in the license agreement. 5. Click Next. 6. Type the desktop user’s name and your organization name, and then click Next.

1244

Administrator’s Guide

System Requirements for the Desktop Agent

7. Select either Complete or Custom, and then click Next. Use the Complete option to install all of the Desktop Agent features in the default location C:\Program Files\VERITAS\Backup Exec\NT\DLO. Use the Custom option to change the location on the desktop’s local drive where the Desktop Agent will be installed, or to select the installation set for a language other than English. The Custom option is recommended for advanced users only. 8. If you selected Complete, go to step 10. If you selected Custom, select from the following: -

Click the Installable Languages icon to install the install set in languages other than English.

-

Click Change to change the location on the desktop’s local drive where the Desktop Agent will be installed. Browse to the folder or type the path in the Folder name field and then click OK.

9. Click Next after making your selections. 10. Click Install. 11. Click Finish. The Desktop Agent is installed on the desktop.

Using the Desktop Agent to Back Up Your Data When data is backed up by the Desktop Agent, it is transferred to the User Data Folder on the desktop’s local drive. After this step is complete, the data is transferred to a Network User Data Folder, which is assigned by the DLO Administrator. Network User Data Folders are typically also backed up by Backup Exec, providing an additional level of protection.

Select files that you want to protect from the Backup Selections view. Backup selections are initially assigned by the administrator, but if the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings, then you can choose your backup selections. You can view and modify backup selections using two views: standard and advanced. The standard view lists the contents of your local drives,

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1245

DLO

Caution Backup or restore jobs between computers that have operating systems in different languages will fail. In addition, if you attempt to connect to a server using characters in the share name that do not exist on the code page for the local system, the connection will fail.

System Requirements for the Desktop Agent

allowing you to check off files and folders to be backed up. It also uses default backup selection settings to add new selections. The advanced view provides more configuration options for selections. A backup selection consists of: ◆

A folder or list of folders



Criteria for the files to be included or excluded from the backup



Limits on the number of file revisions to retain



Settings for compression, backup file deletion, and encryption

Managing Revisions Revisions are versions of a file at a specific point in time. When a file is changed and backed up, DLO stores a new revision. DLO stores and maintains a specific number of revisions for all files in a backup selection. Because each backup selection is configured separately, the number of revisions retained can vary for different backup selections. When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified number of revisions in the desktop and Network User Data Folders. You can limit the number of revisions DLO retains in a given period of time. If you are working on a document and backing it up frequently, all of your revisions could potentially be just a few minutes apart. By specifying that you want to retain only 2 revisions every 24 hours, at least 120 minutes apart, you can retain older revisions for a longer period of time. While some intermediate versions will not be retained, it does support situations in which returning to an older revision is needed. Storage Space Considerations Another consideration in determining the number of revisions to retain is the amount of storage space required to store the data. The amount of space required for backups can be estimated by multiplying the number of revisions retained by the amount of data protected. Example If you are retaining 3 revisions of each file and have 10 MB to back up, approximately 30 MB of disk space will be required. Although compression can improve the space utilization, it varies significantly with file type and other factors. See also: “Modifying Backup Selections in the Standard View” on page 1247 “Adding Backup Selections in the Advanced View” on page 1248 1246

Administrator’s Guide

System Requirements for the Desktop Agent

Modifying Backup Selections in the Standard View The Backup Selections Standard view provides a list of drives, folders, and files that you can select for backup. Note You cannot modify backup selections that were specified by the DLO administrator in your Profile. These preset backup selections are displayed in the view with gray check boxes. You can modify only the backup selections that you create on the Desktop Agent. When you create new backup selections in the standard view, the default backup selection settings are used. When you add new subfolders and files to the backup selection using the standard view, these new backup selections will have the same settings as the main folders. Standard View

DLO



To modify backup selections in the Backup Selections Standard view: 1. Under Views in the Tasks Bar, click Backup Selections. 2. Click Standard view. 3. Select the folders and files you want to back up.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1247

System Requirements for the Desktop Agent

Expand selections by clicking the plus sign (+) and collapse selections by clicking the minus sign (-). Note To return to the last saved settings at any time, click Undo changes. 4. Click Save to save the new settings. After clicking Save, previously backed-up selections that were unchecked are treated like deleted backup selections and will no longer be backed up. The backup files for this selection will be deleted after the number of days specified in the backup selection settings. The source files for the deleted backup selection will not be deleted by the Desktop Agent. Checked folders that were not previously checked are added to the backup selections for this desktop.

Adding Backup Selections in the Advanced View ▼

To add a backup selection in the Backup Selections Advanced view: 1. Under Views in the Tasks Bar, click Backup Selections. 2. Click Advanced view. 3. Click Add.

1248

Administrator’s Guide

System Requirements for the Desktop Agent Backup Selection Dialog Box

4. From the General tab in the Backup Selection dialog box, select the appropriate options as follows: Backup Selection General Dialog Box Item

Description

Name

Type a descriptive name for the backup selection.

Description

Type a description of the backup selection.

Folder to back up Select this option to add a specific folder to the backup selection, and then type the path to the folder, including the folder name. For example, to add a folder named MyData on drive C, type C:\MyData.

Select a pre-defined folder

Select this option to choose a folder that was previously defined by the DLO administrator. Select a folder from the list provided.

Include subfolders

Select this option to also back up all subfolders in the specified directory.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1249

DLO

Type a folder name

System Requirements for the Desktop Agent

5. From the Include/Exclude tab, select the appropriate options as follows: Backup Selection Include/Exclude Dialog Box Item

Description

Include all file types

Select this option to include all file types in this backup selection.

Include only the items listed below

Select this option to include only specific files or file types, and then click Add to specify the file types

Exclude the items listed Select this option to exclude certain files or file types, and then click below Add to select the files to exclude.

6. To add an Include/Exclude filter to the Include/Exclude list, click Add. 7. Select the appropriate options as follows, and then click OK: Add Include/Exclude Filter Dialog Box

1250

Item

Description

Add an extension filter

Select this option to add common file types to your include or exclude list. To select multiple file types, click one item and press or <Shift> while clicking the other items.

Add a custom filter

Select this option to add a custom file or file type to your include or exclude list.

File name or extension

If you selected Add a custom filter, type the name of the file or the file type that you want to include or exclude from backup selections.

Description

Type a description of the custom file or file type.

Administrator’s Guide

System Requirements for the Desktop Agent

8. From the Revision Control tab, select the appropriate options for the desktop and Network User Data Folders as follows: Backup Selection Revision Control Dialog Box Item

Description

Specify the number of Select the number of revisions you want to keep of each file in the revisions to keep in the backup selection. desktop and Network User Data Folders Limit to

Check this option to limit the number of revisions retained in a given amount of time, and specify the following: Š

Versions. Select the number of versions to retain.

Š

Within the last x hours. Select the time period during which you want to retain the versions.

Š

At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.

Note The oldest revision is deleted when a new revision is created that exceeds the limit.

9. From the Options tab, select the appropriate options as follows: Backup Selection Options Item

Description

Compress the files stored in the Network User Data Folder

Check this option to compress files in this backup selection for data transfer over the network and for storage in the desktop and Network User Data Folders.

Encrypt the files for transmission and storage

Select this option to encrypt files for transfer and to store files from this backup selection in an encrypted format in the Network User Data Folder.

When source files are deleted, delete the backed up files from the: Desktop User Data Folder after

Indicate the number of days after which DLO will delete all file versions from the Desktop User Data Folder after the source file has been deleted from the desktop.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1251

DLO

The AES (Advanced Encryption Standard) and a 128 bit key length are used. If enabled, versions are stored unencrypted in the Desktop User Data Folder, and encrypted in the Network User Data Folder. Transfer over the network is encrypted.

System Requirements for the Desktop Agent Backup Selection Options Item

Description

Network User Data Folder after

Indicate the number of days after which DLO will delete all file versions from the Network User Data Folder after the source file has been deleted from the desktop.

Modifying Backup Selections in the Advanced View 1. Under Views in the Tasks Bar, click Backup Selections. 2. Click Advanced view. 3. Select the backup selection you want to change, and then click Modify. 4. Change the backup selection properties as needed. For more information see step 4 on page 1249. 5. Click OK.

Deleting Backup Selections in the Advanced View When you delete a backup selection, the backup files are deleted by the Backup Exec grooming process after the number of days specified in the backup selection. For additional information, see “Backup Selection Options” on page 1251. ▼

To delete a backup selection: 1. Under Views in the Tasks Bar, click Backup Selections. 2. Click Advanced view. 3. Select the backup selection you want to delete. 4. Click Remove. 5. Click Yes to verify that you want to delete this backup selection, or click No to cancel.

1252

Administrator’s Guide

System Requirements for the Desktop Agent

Modifying Desktop Agent Settings If the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings, you can use the Settings view to modify the following: ◆

Backup job schedule options



Desktop User Data Folder location



Desktop User Data Folder disk space limits



Log file disk space limits



Logging level



Bandwidth usage

Note The Desktop Agent will continue to use settings specified in the Profile until you specifically elect to use customized schedules or options as described below.

Changing Backup Job Schedule Options You can change backup job schedule options if the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings. ▼

To change schedule options: 1. Under Views in the Tasks Bar, click Settings, and then click the Schedule tab. 2. Select the appropriate options as follows, and then click OK: Job Schedule Options Item

Description

Use Profile schedule

Select this option to use the scheduling options specified in the Profile.

Use customized schedule

Select this option to specify a customized schedule that differs from the Profile schedule. Note This option must be selected to enable access to customized scheduling options.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1253

DLO

Note If this option is selected, additional settings on the Schedule tab cannot be modified.

System Requirements for the Desktop Agent Job Schedule Options (continued) Item

Description

Run jobs: Whenever a file changes Select this option to back up files automatically whenever they change. Note Automatic backup whenever a file changes is available only for NTFS file systems. For FAT file systems, enter a backup interval. Automatic backup whenever a file changes does not work under NT4 operating systems. According to a schedule Select this option to back up files according to a schedule.

The default is to run a backup at 8:00 AM every Monday, Tuesday, Wednesday, Thursday, and Friday. Click Modify... to change this default. Manually

Select this option to run a backup only when you initiate it.

Options: Automatically run jobs when logging on

Select this option to start the backup jobs when you log on.

Automatically run jobs when logging off

Select this option to start the backup jobs when you log off.

Note This option is only applicable when backing up according to a schedule or manually.

Note This option is only applicable when backing up according to a schedule or manually.

Moving the Desktop User Data Folder You can change the location of the Desktop User Data Folder if the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings. ▼

To change the location of the Desktop User Data Folder: 1. Under Views in the Tasks Bar, click Settings. 2. Click the Backup Folders tab. 3. Click Move.

1254

Administrator’s Guide

System Requirements for the Desktop Agent

4. In the Browse for folder dialog box, choose a new location for the Desktop User Data Folder. Settings Dialog Box, Backup Folders tab

5. Click OK twice.

Setting Customized Options You can change additional options, such as disk space used by the Desktop User Data Folder, if the DLO administrator has set your Profile so that you can view the complete Desktop Agent and modify settings. ▼

To set customized options: 1. Under Views in the Tasks Bar, click Settings, and then click the Options tab.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

DLO

2. Select Use custom options from the drop down menu.

1255

System Requirements for the Desktop Agent

3. Select the appropriate options as follows, and then click OK: Options Dialog Box Item

Description

Use Profile options

Select this option to use settings specified in the Profile. Note If this option is selected, additional settings on the Options tab cannot be modified.

Use customized options

Select this option to specify settings that differ from the Profile options. Note This option must be selected to enable access to additional settings on the Options tab.

Limit disk space usage % on my computer to: Select this option to enter a percentage of the hard disk space that can be used to store backup files. MB Select this option to enter a limit in MB on the maximum amount of disk space to be used by the Desktop Agent to store backup files. Delete oldest log files when combined size exceeds:

Type a limit for the maximum combined size of all log files. The oldest log files will be deleted when this limit is reached.

Logging level

Select one of the following to determine the logs generated:

Yield bandwidth to other programs

Š

All messages

Š

Errors

Š

Errors and warnings

Š

None

Select this check box to slow data transfer over the network when other applications on the desktop computer are transferring data. The Desktop Agent automatically resumes normal data transfer rates when other applications are not using this resource. Selecting this option can improve system performance when other network-intensive applications are running at the same time.

1256

Administrator’s Guide

System Requirements for the Desktop Agent Options Dialog Box (continued) Item

Description

Enable incremental backups of Outlook .pst files

Check to enable incremental backups of Microsoft Outlook Personal Folder (.pst) files. Incremental backups must be enabled to allow .pst files to be backed up while they are open. When you restore Microsoft Outlook .pst files, the restored .pst file will differ from the original .pst file as explained in “Restoring Microsoft Outlook Personal Folder Files” on page 1266.

Synchronizing Desktop User Data Your backed up data is stored in the Desktop User Data Folder on the local drive of each desktop running the Desktop Agent, and in the Network User Data Folder. If you have multiple desktops, your Network User Data Folder contains copies of backed up files from each desktop. When a folder is synchronized using the Desktop Agent, only one copy of the folder and its contents is included in the Network User Data Folder. When the file is changed on one desktop, it is stored in the Desktop User Data Folder on that computer, and then uploaded to the Network User Data Folder the next time a DLO job is run. It is then available for download to another synchronized desktop computer the next time that computer runs a job. After a folder is synchronized, the Desktop Agent checks the Network User Data Folder each time the desktop is connected to the network and a job is run. If new file versions are available in any of the synchronized folders, the Desktop Agent downloads the new version to the User Data Folder on the desktop. If you change a file on your current desktop and change the same file on one of your other backed up computers without synchronizing the files, a conflict will occur and you will be prompted to select which file revision to use. By synchronizing backed-up data, you can work on a file on any of your desktops with the knowledge that you are working on the most recent version.

Note If you customize NTFS permissions or folder attributes for compression or encryption, you must reapply these settings after restoration or synchronization.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1257

DLO

The Synchronized Selections view displays folders backed up on your other desktops that are available for synchronization. Select any of these folders that you want to synchronize with on the current desktop.

System Requirements for the Desktop Agent

How Synchronization Works When a DLO job runs, DLO does the following to back up and synchronize files: ◆

Backs up files that changed on the desktop.



Makes synchronized files available to the other computers with which the desktop is synchronized.



Downloads synchronized files that were changed on another computer and uploaded since the last DLO job ran.



Retains all conflicting versions of files. You can then choose which version to use.

When you back up files, you can set various filters, such as which types of files to include or exclude, compression, and encryption. When you synchronize files between computers, the filters are combined. For example, if one of the synchronized files is compressed and encrypted, all synchronized files will be compressed and encrypted automatically. If the number of files backed up on different computers varies, DLO synchronizes the largest number of files. For example, if you back up three files on computer A and back up five files on computer B, DLO synchronizes five files. Synchronized Selections View

You can manage synchronization using the following options: 1258

Administrator’s Guide

System Requirements for the Desktop Agent ◆

Standard view: Enables you to create new synchronization sets.



Advanced view: Enables you to modify settings for each synchronization set. Note In order to use the synchronization feature, the clocks on all of the user’s computers must be synchronized.



To synchronize a folder across multiple desktops: 1. Under Views in the Desktop Agent Tasks Bar, click Synchronized Selections. 2. Click Standard view. Desktops available for synchronization appear in the Remote Computers pane. Note A desktop must have the same owner and must be backed up with the Desktop Agent to appear in the Synchronized Selections view. Only backed up folders are available for synchronization. 3. Select the folders that you want to synchronize. 4. When the Choose Local Folder dialog box appears, type or browse to the location where the synchronized files are to be stored. 5. Click OK. 6. Click Save to save the selections or Undo changes to use the last saved settings.



To view or change a synchronized folder 1. Under Views in the Tasks Bar, click Synchronized Selections. 2. Select the Advanced view radio button. 3. Click on the folder to be viewed or modified. 4. Click Modify.

6. Continue to configure the synchronization folder settings as described for backup selection configuration, beginning with step 5 on page 1250.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1259

DLO

5. From the General tab in the Synchronized Folder dialog box, enter the location on the local computer where you would like to store the synchronized files.

System Requirements for the Desktop Agent ▼

To remove a synchronized folder Note When a synchronized selection is deleted, the backup files are deleted in the same manner as when source files are deleted. They will be groomed away after the number of days specified in the backup selection. 1. Under Views in the Tasks Bar, click Synchronized Selections. 2. Click the Advanced View radio button. 3. Click the synchronization selection to be deleted. 4. Click Remove. 5. When prompted if you want to delete the backup selection, click Yes to continue or No to cancel.

Resolving Conflicts with Synchronized Files If a synchronized file is modified on more than one computer without updating the file with the Desktop Agent, a conflict will occur and you will be prompted to determine which file version to keep. For example, a conflict will occur if the same file is modified on both your desktop computer and your laptop and your laptop is disconnected from the network. When your laptop is subsequently connected to the network, the synchronization will detect a conflict. ▼

To resolve a conflict with a synchronized file: 1. Under Views in the Tasks Bar, click Status. If a conflict is identified, a resolve conflicts button will appear in the Status view.

1260

Administrator’s Guide

System Requirements for the Desktop Agent Resolve Conflicts

2. Click the Resolve conflicts button to open the Resolve Conflicts wizard. 3. Click Next. 4. Select the file you wish to resolve. 5. Click the Open Folder button. 6. Manage the revisions as desired. For example, to keep an older revision, you can delete the newer revision and rename the conflicting revision back to it's original name. 7. Click Finish.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1261

System Requirements for the Desktop Agent

Viewing the Desktop Agent Status The Desktop Agent Status view provides a summary of Desktop Agent operations, including: Desktop Agent Operations Item

Description

Status

Displays the current state of Desktop Agent jobs, displays when backups will run, and summarizes the results of the last backup.

Pending Files

Displays pending jobs.

Activity during the last Displays statistics for the number of files transferred, the number of 24 hours bytes transferred, and the number of errors generated. Desktop Agent Status View

1262

Administrator’s Guide

System Requirements for the Desktop Agent

Starting a Pending Job in the Status View ▼

To run a pending job from the Status view: 1. Under Views in the Tasks Bar, click Status. 2. Under Tasks in the Tasks Bar, click Run job. Note All pending jobs will be run, such as backup, synchronization or restore jobs.

Restoring Files Using the Desktop Agent If the DLO administrator has set your Profile to include restoring files, then you can use the Desktop Agent to restore files to their original directories, or to an alternate directory. If a Desktop Agent user has more than one desktop computer running DLO, files can be selected from all available backups on each of the user’s desktops, but can only be restored to the current desktop computer. Restore View

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1263

System Requirements for the Desktop Agent

Caution Backup or restore jobs between computers that have operating systems in different languages will fail. In addition, if you attempt to connect to a server using characters in the share name that do not exist on the code page for the local system, the connection will fail. If you customize NTFS permissions or directory attributes such as compression or encryption for files or folders, you must reapply these settings after restoration. To restore files that are locked after the computer reboots, you must have local administrator rights. If you disconnect from the network while the Desktop Agent is running, you may encounter a slow response when browsing the Restore view. From the Tasks menu, select Refresh to fix this problem. ▼

To restore data: 1. Under Views in the Tasks Bar, click Restore. 2. In Show, select one of the following revision display options: Restore File Version Display Options Item

Description

All revisions

All file revisions will be displayed and available as restore selections.

Latest revision

Only the latest file revision will be displayed and available as a restore selection.

Revisions modified on If selected, enter a date and time after which revisions will be or after displayed and available as restore selections, then click OK.

3. Select the items you want to restore. Note In some cases the Restore Search view may contain duplicate entries for the same file. If this occurs, you can select either file to restore and receive the same outcome. 4. Click Restore.

1264

Administrator’s Guide

System Requirements for the Desktop Agent Restore Dialog Box

5. Select the appropriate options as follows, and then click OK: Restore Dialog Box Options Item

Description

Restore to the original folders

Select this option to restore files and folders to their original location.

Redirect the restore to an alternate folder

Select this option to restore

Preserve folder structure

Select this to restore the data with its original directory structure intact. If you clear this option, all data (including the data in subdirectories) is restored to the path you specify

If file already exists

Restore deleted files

DLO

Options Select one of the following: Š

Do not overwrite

Š

Prompt

Š

Overwrite

Select this option if you want to restore files even though the source file has been deleted.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1265

System Requirements for the Desktop Agent

Restoring Microsoft Outlook Personal Folder Files When you restore Microsoft Outlook Personal Folder (.pst) files, the following differences will exist between the restored .pst and the original .pst: ◆

The file size will be different.



When you empty the deleted items folder in Microsoft Outlook, the messages are permanently deleted. However, these messages are never permanently deleted from .pst file backups. Therefore, when you restore a .pst file all permanently deleted messages will still be included in the restored .pst file.



Any rule that points to a folder inside a .pst file will no longer work. You must edit the rule to point to the correct folder.



Restored .pst files will have Inbox, Outbox, and Sent Items folders, even if the original files did not have them.



If you use a password for your .pst file, you must reset the password after restoring your .pst file.

Searching for Desktop Files to Restore ▼

To search for desktop files and folders to restore: 1. Under Views in the Tasks Bar, click Restore. 2. Click Search for my files under Tasks in the Tasks bar to open the Search dialog box.

1266

Administrator’s Guide

System Requirements for the Desktop Agent Search Dialog Box

3. Select the appropriate options as follows, and then click OK: Search Dialog Box Options Description

Search for file names with this text in the file name

Type all or part of the file name or folder you want to find.

Modified:

Select this option to search for files that were modified during a specific time frame. Then select the time frame.

Today

Select this option to search for files modified on the current calendar day.

Within the past week

Select this option to search for files modified in the last calendar week.

Between

Select this option to enter dates to search a range of calendar dates.

Of the following type

Select this check box to select a file type from the list provided.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1267

DLO

Item

System Requirements for the Desktop Agent Search Dialog Box Options (continued) Item

Description

Of the following size

Select this check box and then enter information as follows: Š

Select from equal to, at least or most in the first drop-down menu

Š

Type a file size.

Š

Select KB, MB, or GB.

Monitoring Job History in the Desktop Agent When a backup, restore, or synchronization operation takes place, details of that operation are stored in log files. The History View summarizes the following history log information and provides access to the full logs. Job History View Information

1268

Item

Description

Started

The date and time the operation started

Ended

The date and time the operation ended

Operation

The operation performed, such as backup, restore or synchronization

Files Transferred

The total number of files transferred in the operation

Bytes Transferred

The total number of bytes transferred in the operation

Errors

The number of files that failed to copy, producing errors

Administrator’s Guide

System Requirements for the Desktop Agent History View

Viewing Log Files ▼

To view history logs: 1. Under Views in the Tasks Bar, click History. 2. Select the appropriate History view filter from the Show drop down menu as follows: History View Filtering Options Description

All logs

All history logs are displayed

All logs with errors

History logs for all jobs that generated errors are displayed.

Backup logs only

History logs for backup jobs only are displayed.

Backup logs with errors History logs for backup jobs that generated errors are displayed. only Restore logs only

History logs for restore jobs only are displayed.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1269

DLO

Item

System Requirements for the Desktop Agent History View Filtering Options Item

Description

Restore logs with errors History logs for restore jobs that generated errors are displayed. only Logs filtered by date

All lots generated after a specified date and time are displayed. Enter the date and time after which logs are to be displayed in the Filter by date dialog box and click OK.

3. Click the job history entry for which you want to view the history log. 4. Click View details. 5. Select the appropriate filter from the Show drop down menu as follows: History Log View Filtering Options Item

Description

All entries

All entries from the history log are displayed.

Failed entries only

Only entries for failed operations are displayed.

6. Resize the window and columns as necessary to view the log file contents. 7. Click Close when finished.

1270

Administrator’s Guide

Troubleshooting

Troubleshooting This section addresses problems or questions that may be encountered while running the DLO Administration Console or the Desktop Agent, and provides solutions for these problems. It is divided into the following two sections: ◆

“Troubleshooting the DLO Administration Console”



“Troubleshooting the Desktop Agent”

Troubleshooting the DLO Administration Console I modified an Automated User Assignment, but the change isn’t reflected for existing Desktop Agent users. Automated User Assignments are only used once to assign a Profile and Storage Location to a new DLO user. An Automated User Assignment can be modified to change the Profile and Storage Location settings, but these changes will only apply to new users. Users that have already been configured will not be affected by subsequent changes in the Automated User Assignment. This also applies to existing users who install the Desktop Agent on another desktop. The new installation will use the existing user settings and will store data in the user’s existing User Data Folder. Automated User Assignment changes will not affect an existing user, even if the Desktop Agent installation is on a new computer. Settings for an existing desktop user can be changed by modifying the Profile to which the user is assigned, or by reassigning that user to a new Profile or Storage Location. A desktop user ran the Desktop Agent and received an error indicating “Unable to configure the Desktop Agent. No settings found for the current user and no automatic user assignments match.” What does this mean? This message means that DLO could not find the user or an Automated User Assignment that matched the user's domain and group.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

DLO

Users are added to DLO in one of two ways:

1271

Troubleshooting

1. An Automated User Assignment that matches the user’s domain and group assigns a Profile and Storage Location to the Desktop Agent and adds the user to DLO. Check that you have created Automated User Assignments that match the Domain and Group to which the user running the Desktop Agent belongs. You can also create an Automated User Assignment that will cover all domains and all groups in order to catch any users who might not match a more specific Automated User Assignment. Such a “catchall” Automated User Assignment would typically be set to the lowest priority. 2. Users are manually added to DLO. This process requires that you assign a Profile and either a Storage Location or User Data Folder to the new user. Be sure that the user has a matching Automated User Assignment, or is added manually before running the Desktop Agent. See also: “Setting up Automated User Assignments” on page 1206 When do I need a User Data Folder, and when do I need a Storage Location? Every Desktop Agent user must have a Network User Data Folder, which it used to store backup data. Storage Locations are locations on the network where Network User Data Folders are automatically created and maintained, but are not required if existing network shares are used to store user data. If you want DLO to automatically create Network User Data Folders, use a Storage Location. When new users are added to a Storage Location, Network User Data Folders are automatically created for them within the Storage Location. Alternately, if you would like to use existing network shares as Network User Data Folders, or if you want to create Network User Data Folders manually, then do not use Storage Locations. See also: “Setting Up DLO” on page 1191 I'm trying to create a Storage Location on a remote file server, and I am receiving an error indicating the MSDE Database Instance for the Desktop and Laptop Option needs to have access to the remote file server. What do I need to do? In order to create Storage Locations on a remote file server, you must use an account that has administrative rights on the remote file server. To change the account credentials used to create the Storage Location:

1272

Administrator’s Guide

Troubleshooting

1. On the Tools menu, select Manage Service Credentials. 2. Select Change Service Account Information. 3. Enter account credentials as follows: Service Account Information Item

Description

Change service account Check to change the service account information information User name

Enter the user name for the account to be used.

Domain name

Enter the domain for this account.

Password

Enter the password for this account.

Confirm password

Enter the password again to confirm.

Using a Domain Administrator account is recommended. In order to create Storage Locations in another Domain, there must be appropriate trust relationships in effect. I manually added a new user and assigned the user to an existing Storage Location. I don't see a new User Data Folder for the new user in this Storage Location. Isn't it supposed to create one? User Data Folders are created only after the Desktop Agent is both installed on the desktop and run by the new user. How do I prevent a user from backing up data? 1. On the navigation bar, click Setup. In the Settings pane, click Users.

DLO

2. Select the user you do not want to back up. 3. Under General Tasks in the Tasks pane, select Properties. 4. Clear the Enable user check box. 5. Select OK. The user's status will display as Disabled.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1273

Troubleshooting

I modified the Backup Selections in the Profile assigned to a group of Desktop Agent users. Why isn't the change immediately reflected in the Desktop Agent for users in this Profile? The Desktop Agent must connect to DLO to receive updates, so changes you make to the Profile will not be reflected on the Desktop Agent until the Desktop Agent runs a backup or is refreshed. To refresh the Desktop Agent, click Refresh in the Tasks bar. The Desktop Agent also periodically connects to DLO to refresh any settings that may have changed. In a Backup Selection, I selected to encrypt or compress my user's data. However, data that has already been backed up is not encrypted or compressed. Why is this? DLO does not retroactively apply changes to encryption and compression settings to user data that is already backed up. Any data backed up after these settings have changed will use the new settings. I would like to prevent files of specific types from being backed up. How can I set up DLO to always exclude files like *.mp3 or *.gho? On the Tools menu, select Global Excludes. In this dialog box, you can add specific file types that will be excluded in all Backup Selections for all Profiles. Backups do not seem to be running for all users, or specific files are not being backed up. If backup jobs are not running for a group of users, check the Profile for these users to verify that backups are scheduled. If specific files are not being backed up, review the Backup Selections in the Profile to verify that the files are selected for backup. I just tried to restore a file, but it doesn’t appear to have been restored. When restoring existing files to their original location, verify that you have selected Prompt or Overwrite in the Restore dialog box to replace the file. If you select Do not overwrite, the file will not be restored. In a Profile, I configured backup selections to encrypt files. Now I need to recover files for a user. Do I need an encryption key in order to restore this data? As an Administrator running the DLO Administration Console, you can redirect a restore of encrypted user data to an alternate computer or location, and it will be decrypted during the restore.

1274

Administrator’s Guide

Troubleshooting

I would like to restore data to a user's computer, but that user is out of the office. Do I have to wait until that user returns to the office before I can start the restore? DLO can queue restore jobs to desktops. If the user is offline now, you can queue a restore job through the Restore view in the DLO Administration console. Another option is to restore the data to an alternate location, such as the administration computer or a network drive. How can I protect open files? DLO does not protect open files. It will attempt to back up files when they are closed or saved. If a file cannot be backed up because it is open (for example, a Word document you are editing) it will remain in the Desktop Agent's pending list. The Desktop Agent will attempt to back up the file at the next backup time. This also means that certain files opened by the operating system will not be backed up, they never close when the operating system is running. The exception to this is protection of open .pst files. The Desktop Agent is designed to protect open .pst files if they are part of the Profile or user's backup selections. The History view in the DLO Administration Console doesn’t show the most recent backup for all users. The DLO Administration Console is automatically updated when a job runs, but not more than once per hour. This section addresses potential problems or questions that may be encountered while running the Desktop Agent, and provides solutions for these problems.

Troubleshooting the Desktop Agent Do I have to install Backup Exec on every desktop I want to protect? No. You must install the Desktop Agent on every desktop you want to protect. It is not necessary to install Backup Exec.

The Desktop Agent installation program is located in a share where you installed DLO. This share will have a name in the following format: \\\DLOAgent. Using Windows Explorer, browse to this share from the desktop that you want to protect with the Desktop Agent. Run Setup.exe from this share. You must be an administrator on the desktop in order to install the Desktop Agent software.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1275

DLO

I installed the Desktop and Laptop option, but I do not know how to install the Desktop Agent on user’s computers.

Troubleshooting

VERITAS recommends that DLO Administrators run the Configuration Wizard to familiarize themselves with the application. Can I install the Desktop Agent on Windows Servers or Backup Exec Media Servers? Because the Desktop Agent is designed to protect user data rather than critical server data, it cannot be installed on Windows Servers or Backup Exec Media Servers. I am receiving the following error while authenticating through the Desktop Agent to the Backup Exec media server: “Failed to Initialize database. 0x800A0E7D” You attempted to connect to the Backup Exec media server with an account that is not in the same domain, or a trusted domain, as the Backup Exec media server. For DLO to function properly, the Backup Exec media server must be in a Windows Domain. I have a desktop and a laptop computer protected by the Desktop Agent. Why can't I move my laptop to a new Storage Location? When a user has multiple computers running the Desktop Agent, all backup data is stored in the same Network User Data Folder. If you want to move your data to a new Storage Location, you must move the entire Network User Data Folder for all of your computers to that new location. I am trying to synchronize files between my desktop and laptop computers, but I cannot see my other computer in the Synchronization View in the Desktop Agent. In order to synchronize data between two computers, the same user account must be used when running the Desktop Agent on each computer. For example, the user Domain\MyUser must have backed up data on Computer A and Computer B in order for synchronization to take place between these two computers. If you are sure you have backed up data while running the Desktop Agent under the same user account on both of your computers, select Refresh while in the Desktop Agent's Synchronization View to make the synchronization selections available. If this is not successful, Select Exit from the File menu and restart the Desktop Agent application. What files or folders can I synchronize between my computers? Any data backed up by a backup selection are eligible for synchronization. These backup selections may be defined by the DLO Administrator in the Profile or in a Backup Selection created with the Desktop Agent. I would like to share my synchronized data with my co-workers. How can I do this? The Desktop and Laptop Option does not provide functionality for sharing files between users. Synchronization is designed to share files between a single user's computers.

1276

Administrator’s Guide

Glossary of Terms

Glossary of Terms Administrator The user that configures DLO using the Backup Exec DLO Administration Console. This user must have administrative rights to operate the console. Authentication The process of validating a user’s credentials. Automated User Assignments Rules that assigns Profiles and Storage Locations to a specified group of desktop users. Settings are applied the first time a user runs the Desktop Agent. Backup Exec Administration Console The administrator’s interface with Backup Exec. Compression A method of transforming data to reduce transmission time or storage volume. DLO Administration Console The administrator’s interface with the Desktop and Laptop Option. DLO backup selection The files and folders on a desktop or laptop that are selected for backup by the DLO Administrator or desktop user. DLO database The Storage Location for policy settings and status information. DLO file server

Desktop Agent install share The network share where the Desktop Agent install files are located. This folder is set up when DLO is installed, and is accessed to install the Desktop Agent on desktops.

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1277

DLO

The computer that hosts DLO Storage Locations. This computer can be the Backup Exec media server or another server.

Glossary of Terms

DLO Storage Location A shared location on the network in which Network User Data Folders and backup files are stored. Desktop Agent The DLO software that runs on desktop and laptop computers. Desktop Agent console The user interface for the Desktop Agent software. Encryption A process used to ensure data security on disk and during data transfer. Open file handling The process by which open files, or files currently in use, can be backed up. Optimization The process of reducing network traffic and file storage through technologies such as compression. Profile DLO settings that apply to users or groups of users. Revision A version of a file at a specific point in time. Synchronization A process that maintains the most recent version of selected files and folders on multiple desktops. Synchronization is available for files and folders that are backed up by DLO. Task Accessible program functionality which varies with console view. User The person who operates the desktop or laptop computer on which the Desktop Agent is run.

1278

Administrator’s Guide

Glossary of Terms

User data folder The folder in which user backup data is stored. There is a User Data Folder on each desktop that is protected by the Desktop Agent, and one User Data Folder on the network for each Desktop Agent user. User name The user name used for Windows authentication. View The main navigational interface in the DLO Administration Console.

DLO

Appendix J, VERITAS Backup Exec - Desktop and Laptop Option

1279

Glossary of Terms

1280

Administrator’s Guide

VERITAS Backup Exec - Agent for Oracle Server

K

The Backup Exec Agent for Oracle Server (Oracle Agent) is installed as a separate, add-on component of Backup Exec for Windows Servers. The Oracle Agent provides a complete solution for backing up and restoring database servers running single or multiple Oracle databases. When using the Oracle Agent, the Oracle databases do not have to be taken offline or shut down to be backed up. Database users can continue using the databases while the backup is run. This is called an Online Database Backup. The Oracle Agent simplifies the process of backing up an Oracle database by automatically backing up the database’s tablespace data files and the database control file, along with all of the Oracle archived logfiles when you perform a full database backup. The Oracle Agent also gives you a tablespace view of the database from within Backup Exec, which allows you to select individual tablespaces for backup. This feature allows you to schedule the frequency of individual tablespace backups. For example, if your Oracle database has a tablespace that rarely changes, you can schedule its backup to occur less frequently than a tablespace that continuously changes. Because each tablespace is backed up automatically when the entire Oracle database is backed up, the individual data files that comprise a tablespace or an entire database do not need to be manually selected in order to protect the database. If new tablespaces have been added to the Oracle database since the last backup operation was performed, these new tablespaces are automatically detected and backed up during the next full backup operation of the selected Oracle database. When an online tablespace is backed up, the tablespace is placed in Backup Mode and its associated data files are backed up. After backup, the tablespace is placed back online, if it was previously online. When all selected tablespaces have been backed up, the archive redo logfiles are backed up to the same backup set. Backing up the archive redo logfiles after the tablespace is placed online again gives you the ability to restore the tablespace to the state at which the tablespace backup was completed.

1281

Oracle Agent

Note The Oracle Agent takes advantage of the Oracle Database Service’s ability to create a copy of a database’s control file while the database is online. Using this feature, the agent can back up the copy of the database’s control file while the database is actually being backed up online.

Requirements for Using the Oracle Agent

Requirements for Using the Oracle Agent You need to have the following software installed before you can use the Oracle Agent: ◆

Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003



Backup Exec for Windows Servers 9.x or later.



One of the following supported databases: Oracle Database Server Version 8.0.5, 8i, or 9i, and Oracle Application Server 9i.

Backup Strategies for An Oracle Database Server Use the Backup Exec Oracle Agent to back up the database frequently. The more frequently you back up the database, the less time it takes to recover it in the event of data loss. In addition to these regularly scheduled backups, it is recommended that you perform a Closed Database Backup whenever you alter the structure of the database. Closed database backups take place while a database is shut down. When the database is shut down, all data files and control files comprising the database are available for backup by a file system backup operation. Performing a closed database backup of the Oracle server is recommended after making structural changes to the database. A closed database backup speeds the recovery of the database in a disaster situation. One method of performing a closed database backup is to shut down the database and back up the entire volume (disk) where the Oracle database is located. An alternative method is to select only the directories and files that make up the database. When you perform your normal file system backups using the normal Backup Exec methods, make sure the Oracle database control and data files are excluded from the backup set. Because these database files are both locked and unreadable when the database is open, they will appear as Skipped in the Backup Exec Job History job log if you attempt to back them up during your normal file system backup jobs.

1282

Administrator’s Guide

Backup Strategies for An Oracle Database Server

Types of Oracle Database Data You Can Protect Within the Backup Selections in Backup Exec, each Oracle database agent contains a list of one or more database instances. These instances appear as subdevices of the Oracle Agent and contain logical views of the Oracle databases. Oracle Databases You Can Protect Oracle Database Agent Oracle Database Instances Archived Logfiles Directory Database Control File Directory Oracle Tablespaces

Oracle Database Data Types You Can Protect Item

Description

Tablespace Data

Tablespaces appear as subdirectories within the listed database instances. Data files that comprise the tablespace appear as files within the appropriate tablespace directory entry. The datafile path is stored as part of the file name, so Backup Exec changes the display of the file names so that backslashes (\) display as forward slashes (/) and colons (:) display as vertical bars (|). For Oracle 8.1.x and above, do not select a temporary tablespace with local extent management for backup. There is no need to back up temporary tablespaces with local extent management because they are used by Oracle only for the duration of a session and are not recognized during media recovery.

Archived Logfiles

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1283

Oracle Agent

The Oracle Agent creates a directory entry named {Archived Logfiles} in the root directory of the agent device. During a backup operation the Backup Exec administration console does not display any files within this directory. However, the Backup Exec job server has access to the actual Oracle archived redo logfiles when a backup operation takes place.

Requirements for Configuring the Oracle Agent Oracle Database Data Types You Can Protect (continued) Item

Description

Control File Backup

The Oracle Agent creates a directory named {Database Control File} in the root directory of the agent device. The Backup Exec administration console does not display any files within this directory, but the Backup Exec job server will see and back up the file called Becf<Sid_Name>.bak from this directory. When this file is restored from the storage media, it is automatically placed in the Oracle datafile directory on your database server. By default, it is \Orant\Database.

Requirements for Configuring the Oracle Agent Before you install and configure the Oracle Agent, you should verify that the following conditions are met for each Oracle SID (database) that you want to protect: ◆

The Backup Exec Oracle Agent has an Oracle user account assigned to it that it can use to log on to the Oracle database.



The Oracle Server’s Database Log Mode is set to ARCHIVELOG.



The Oracle Server’s Automatic Archival is enabled in the Oracle parameter initialization file (default name: Init<SID>.ora, where <SID> is the name of the instance).



There is a directory on the Oracle Server where Oracle will generate the Archived Logfiles.

See also: “Creating a New Oracle User Account for the Oracle Agent” on page 1285 “Verifying ARCHIVELOG Mode and Automatic Archival Settings” on page 1285

1284

Administrator’s Guide

Requirements for Configuring the Oracle Agent

Creating a New Oracle User Account for the Oracle Agent A user account with appropriate database rights must exist for the Oracle Agent to access the database. You can use either an existing user account that has the required rights, or you can create a new user account with the required rights. To create an Oracle user account specifically for use by the Backup Exec Oracle Agent, use the Oracle Server Manager application and type the following commands at the prompt. Note Make sure you are connected as a DBA. Be sure to replace USERNAME with the assigned login user name and PASSWORD with the appropriate password. create user USERNAME identified by PASSWORD; grant dba to USERNAME; After all of the commands have been entered, the assigned user will have the appropriate rights needed to protect the database.

Verifying ARCHIVELOG Mode and Automatic Archival Settings Before Oracle databases can be backed up, each database’s Oracle Database Log Mode setting must be set to ARCHIVELOG and each database’s Automatic Archival setting must be enabled. ARCHIVELOG must be enabled so the Oracle Agent can put each tablespace in Backup Mode prior to running the backup operation. Note Archivelogs can be replicated to another machine for safe storage and duplication. For more information on Archivelog replication, please see the Oracle documentation. ▼

To verify the Database Log is in ARCHIVELOG mode and Automatic Archival is enabled: 1. Type the following from the Server Manager command prompt: archive log list; You should see: Database Log Mode ARCHIVE LOG Automatic Archival ENABLED

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1285

Oracle Agent

If either parameter is not set correctly, shut down the database and set it correctly.

Requirements for Configuring the Oracle Agent

2. Close the database by typing the command: shutdown; 3. Start the database service without mounting the database. Type the following command: startup nomount; 4. Open the database and mount it in exclusive mode. Type the following command: alter database mount exclusive; 5. Enable ARCHIVELOG mode by typing the command: alter database archivelog; 6. Open the database and mount it for general use. Type the following command: alter database open; 7. IMPORTANT: To enable Automatic Archival, you must edit the Oracle instance initialization parameter file (default Init<SID>.ora where <SID> is the name of the instance). The following item must be specified: log_archive_start = true Note If you cannot enable Automatic Archival in the Oracle instance initialization parameter file, you can enable it using the Oracle Server’s Enterprise Manager. Log on as SYSDBA, and then right-click the Instance Configuration. Select the Recovery tab, and then select Automatic Archival. 8. You may also specify the directory where Oracle will create the Archived log files (LOG_ARCHIVE_DEST). If this parameter is not specified in the Oracle parameter initialization file, Oracle will use the default value of $Oracle_Home\RDBMSxx. You can specify the archive redo logfile location by setting LOG_ARCHIVE_DEST to the appropriate path. log_archive_dest = \orant\database\logs Note Each time a tablespace is backed up, an archive redo logfile is created and backed up. Over time, you may want to delete older archived redo logfiles to help save hard drive space. By default the Oracle installation maintains two instances of redo logs, but recommends three copies of them. Please see the Oracle documentation for more information.

1286

Administrator’s Guide

Requirements for Configuring the Oracle Agent

Shutting Down and Restarting the Database In order for Automatic Archival to be enabled, each database you want to protect must be shut down and restarted. Before shutting down the databases, make sure that:





A user with appropriate rights exists for the Oracle Agent.



The Database Log Mode is set to ARCHIVELOG.



Automatic Archival is enabled in the Oracle initialization file.



A directory has been created (or already exists) for the archive redo log files.

To shut down and start up the Oracle databases: 1. Type the following command from the Server Manager prompt: shutdown; 2. After each database has been shut down, type the following command to bring each of them back online: startup; 3. Verify that Automatic Archival is enabled and the database log is in ARCHIVELOG mode by typing the following command: archive log list; You should see: Database Log Mode ARCHIVE LOG Automatic Archival ENABLED If either parameter is not set correctly, shut down the database and set it correctly.

Running Multiple Database Instances on a Single Server

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1287

Oracle Agent

If you are running multiple database instances on your database server, it is important that you configure each database instance to use different Archive Redo Logfile destination directories. All Oracle databases have instance initialization parameter files associated with them. Each initialization parameter file is named Init<SID>.ora, where <SID> is the name of the instance. This file controls the destination where Oracle creates the archive redo logfiles. Because each database instance requires its own archive redo logfile directory, you must edit the Oracle instance initialization parameter file and change or add the new archive redo logfile directory path.

Requirements for Configuring the Oracle Agent

Using Fully Specified Paths for Oracle Data Files All Oracle data files must be defined with fully specified paths. If you browse an Oracle tablespace folder through the Backup Exec administration console and notice that data files are missing, check the datafile definitions to make sure they use fully specified paths. Use the following SQL command from the SQLDBA program to check the datafile definitions: SVRMGR> SELECT * FROM V$DATAFILE; The "NAME"- field values must all contain fully specified filename paths. If data files are defined and do not specify full paths for the data file name, then you must rename the data files to use full paths. See also: “Renaming Data Files From a Single Tablespace” on page 1288

Renaming Data Files From a Single Tablespace Follow these steps to rename Oracle data files to use full paths. ▼

To rename data files from a single tablespace: 1. Take the non-SYSTEM tablespace that contains the data file offline. 2. Use either the Rename Datafile dialog box of Enterprise Manager/GUI or the SQL command ALTER TABLESPACE with the RENAME DATAFILE option to change the filenames within the database. For example, the following statement renames the datafile 'FILENAME' to 'D:\Orant\Database\Filename' in the tablespace USERS: ALTER TABLESPACE users RENAME DATAFILE filename TO 'd:\orant\database\filename'; 3. Place the tablespace back online.

1288

Administrator’s Guide

Requirements for Configuring the Oracle Agent

Understanding the Oracle Agent Configuration Utility The Oracle Agent configuration utility automatically configures the agent as a Windows system service. After running the Oracle Agent Configuration Utility, you can use the Windows Services control panel to verify that the Backup Exec Oracle Agent is running. The agent service is configured so that it will be automatically started when the system is started. The Oracle Agent uses the application event log to record events that are important to the agent’s operation. Events recorded by the agent include information such as the agent service starting and stopping, as well as any error conditions encountered by the agent. If an error is encountered while interacting with the Oracle database server program, the Oracle error number is also recorded in the application event log. The Oracle Agent does not attempt to log on to the Oracle database server until a Backup Exec administration console or Backup Exec Job Server attempts to access the agent. If the agent is unable to log on to the Oracle server, the agent will not have access to the Oracle tablespace information. There are a number of reasons why the agent cannot log on to the Oracle database service. They include the following: ◆

The Oracle database has been shut down.



The Oracle database has not finished starting up.



An invalid Oracle user account was specified in the agent’s configuration utility.



The Oracle database server has not been installed on the system.

When the agent is unable to log on to Oracle in order to access the Oracle tablespace information, the Backup Exec Backup Source view will display only the {Archived Logfiles} and {Database Control File} directories in the root of the Oracle database server. Note If you have multiple Oracle SIDs (databases) on an Oracle database server, and you want to protect them all, you must run the Oracle Agent Configuration Utility and add a configuration definition for each Oracle SID that resides on the Oracle database server. Oracle SIDs are limited to four characters in length in Oracle 8.0.x and to eight characters in Oracle 8i and 9i.

1289

Oracle Agent

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

Installing the Oracle Agent

Installing the Oracle Agent The Oracle Agent is installed locally as a separate, add-on component of Backup Exec for Windows Servers, and can protect local or remote Oracle databases. Whenever the Oracle Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the Oracle Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources for backup from a remote server until a Remote Agent has been installed. If you are using the Oracle Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the Oracle Agent installation to one remote Windows server so that resource can be protected by Backup Exec. However, if the Oracle Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it to another Windows server. In order to use the Backup Exec Oracle Agent, you must install and enable the agent on the media server, and then install the agent on the Oracle database server. After the agent is installed, you must configure it. For instructions on installing the Oracle Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the Remote Agent on a remote resource, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847. Note The Oracle Agent must be installed on the media server. If Backup Exec is not already installed, see “Installing Backup Exec” on page 43. ▼

To install the Oracle Agent on the Oracle database server: 1. At the Oracle database server, map a drive letter to the volume on the media server that contains the Backup Exec Oracle Agent software. The default location for the agent is: \Program Files\VERITAS\Backup Exec\NT\Agents\Oracle\

1290

Administrator’s Guide

Installing the Oracle Agent

2. Double-click Setup.exe. 3. Follow the instructions on the screen. When the installation is complete, the Readme file is displayed along with the Backup Exec Oracle Agent Configuration Utility. You can now configure the Oracle Agent. See also: “Installing the Remote Agent to Remote Windows Servers” on page 845

Configuring the Oracle Agent ▼

To configure the Oracle Agent: Note The Oracle Agent Configuration Utility displays automatically after you install the Backup Exec for Windows Servers Agent for Oracle Server. If you closed the Configuration utility before setting it up, you can reopen it. To open the Oracle Agent Configuration Utility at the Oracle database server, click Start, and then point to Programs. Then click VERITAS Agent for Oracle Server Configuration Utility. 1. Select the appropriate items as follows: General tab Item

Description

Password

Password used to access the Oracle Agent. When attempting to access the Oracle Agent from the Backup Exec administration console, the password supplied at the administration console’s password prompt must match the password entered here.

Confirm

Retype the password you typed in the Password field. You must provide exactly the same password in the password Confirm field as you did in the Password field.

1291

Oracle Agent

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

Installing the Oracle Agent General tab (continued) Item

Description

Configured Media Servers

Lists the Backup Exec media servers on your network that will have access to this Oracle Agent. At least one media server should be listed. All Backup Exec media servers that appear in this list can be used to process backup and restore jobs from the Oracle database server running the Oracle Agent. Š

When entering a media server, click Add and then type either a media server’s host name or its TCP/IP address.

Š

To remove a media server from the list, click the host name or the address of the machine you want to remove, and then click Remove.

2. Click Database. 3. Click Add to add the Oracle SID (unique identifier) of the databases residing on your Oracle database server. SID Information dialog box

1292

Administrator’s Guide

Installing the Oracle Agent

4. Select the appropriate options as follows:

Item

Definition

SID Name

The SID of an Oracle database residing on the database server. The SID can be up to four characters in Oracle 8.0.x and up to eight characters in Oracle 8i and 9i. Oracle SIDs refer to the unique identifier or name of each Oracle Database on the Oracle Server. The Oracle Agent requires the exact Oracle SID identifier to be configured in order to connect to and backup the Oracle databases.

User

The Oracle user account name you want the agent to use when logging in to the Oracle server. Note The user account must have specific rights for the agent to function properly. For more information, see “Creating a New Oracle User Account for the Oracle Agent” on page 1285.

Password

The password for the user account you want the Oracle Agent to use when logging on to the Oracle database server.

Confirm

Retype the password to verify it.

Archived Logfile Location

The path of the Archive Logfile location for this SID. Make sure the directory you choose actually exists. You can click Browse to set the archived logfile path.

Control File Backup Location

The path where the backup copy of the Database Control File is created. Make sure the directory you choose exists.

5. Click OK.

1293

Oracle Agent

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

Installing the Oracle Agent

Adding Media Servers to Use with the Oracle Agent Follow these steps to add media servers on your network that will have access to the Oracle Agent. ▼

To configure a media server’s host name or IP address for use with the Oracle Agent: 1. At the Oracle database server, click Start, point to Programs, and then click VERITAS Agent for Oracle Server Configuration Utility. 2. Click the General tab. 3. Click Add. Adding Media Server dialog box

4. Type either the media server’s name or its TCP/IP address. 5. Click OK. To add additional media servers, repeat steps 3-5. 6. Click the Database tab and add one or more SID definitions. 7. Click OK to save your configuration information and configure the Oracle Agent as a system service. Following configuration, the service is started. The Oracle Agent is now ready for use.

1294

Administrator’s Guide

Backing Up Data Using the Oracle Agent

Backing Up Data Using the Oracle Agent With the Oracle Agent you can back up three types of data: ◆

An entire online database. This includes the databases’s tablespace data files and the database control file. It also includes all of the Oracle archived log files.



Individual online tablespaces. Use this to protect individual, online tablespaces within an Oracle database.



A closed database. This type of backup takes place while a database is shut down, so all data files and control files comprising the database are available for backup by a file system backup operation. This type of backup is recommended after making structural changes to the database.

See also: “Backing Up an Entire Online Database” on page 1295 “Backing Up Individual Online Tablespaces” on page 1297 “Backing Up a Closed Database” on page 1298

Backing Up an Entire Online Database When you back up an entire online database, the Oracle Agent automatically backs up the database’s tablespace data files and the database control file, along with all of the Oracle archived log files. Note For Oracle 8.1.x and above, do not select a temporary tablespace with local extent management for backup. There is no need to back up temporary tablespaces with local extent management because they are used by Oracle only for the duration of a session and are not recognized during media recovery. ▼

To back up an entire Oracle online database: 1. At the media server, start Backup Exec. 2. On the navigation bar, click Backup. 3. In the Backup Selections pane, expand Remote Selections, and then expand Backup Exec Agents.

A list of database servers running the Backup Exec Oracle Agent appears.

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1295

Oracle Agent

4. Expand Oracle Agent.

Backing Up Data Using the Oracle Agent

5. Expand the Oracle database server that you want to back up. If you have previously password-protected the Oracle Agent, a Backup Exec Attach To dialog box appears. Type the password and click Attach. 6. In the Results pane, click the check box preceding the Oracle database you want to back up. Oracle Database Selection

A check mark appears in the box, indicating that the complete database, including all tablespaces, control files, and archived logfile data will be backed up. 7. Complete the backup settings as normal. For more information, see “Creating a Backup Job” on page 241.

1296

Administrator’s Guide

Backing Up Data Using the Oracle Agent

Backing Up Individual Online Tablespaces If you have tablespaces that are modified more frequently than others, you can use the Oracle Agent to create backup jobs to protect individual, online tablespaces within an Oracle database. Individual tablespaces can be scheduled for backup at a frequency that reflects the rate at which the tablespace’s data is modified. For example, if you have a tablespace that is modified much more frequently than the other tablespaces, then you could schedule that tablespace for more frequent backups. Alternatively, if your database contains a tablespace that rarely changes, you may want to reduce the frequency of its backups. Caution When backing up an individual tablespace, make sure you also select the ARCHIVED LOGFILES folder for backup. Note For Oracle 8.1.x and above, do not select a temporary tablespace with local extent management for backup. There is no need to back up temporary tablespaces with local extent management because they are used by Oracle only for the duration of a session and are not recognized during media recovery. ▼

To back up individual online tablespaces: 1. At the media server, start Backup Exec. 2. On the navigation bar, click Backup. 3. In the Backup Selections pane, expand Remote Selections, and then expand Backup Exec Agents. 4. Expand Oracle Agent to display a list of Oracle database servers. 5. Expand the Oracle database server that contains the database you want to back up. If you have previously password-protected the Oracle Agent, a Backup Exec Attach To dialog box appears. Enter the password and click Attach. 6. Expand the Oracle database that contains the tablespace you want to back up. A list of tablespaces, along with the Database Control File folder and the Archived Logfiles folder appears.

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1297

Oracle Agent

7. Click the box preceding the tablespace folders you want to back up. Make sure you also select the {Archived Logfiles} folder.

Backing Up Data Using the Oracle Agent Individual Tablespace Selection

A check mark appears in the box, indicating that only the specified tablespaces, along with the Archived Logfile data, will be backed up. 8. Complete the backup settings as normal.

Backing Up a Closed Database Closed database backups take place while a database is shut down. When the database is shut down, all data files and control files comprising the database are available for backup by a file system backup operation. Performing a closed database backup of the Oracle server is recommended after making structural changes to the database. A closed database backup also speeds the recovery of the database in a disaster situation. One method of performing a closed database backup simply requires you to shut down the database and back up the entire volume (hard drive) where the Oracle database is located. Another method is to select only the directories and files that make up the database.

1298

Administrator’s Guide

Restoring the Oracle Database Using the Oracle Agent

Restoring the Oracle Database Using the Oracle Agent You can restore full databases, individual tablespaces, and the database control file if they become corrupted or are accidentally deleted. If you need to restore full databases, they can be either online or closed. Caution When creating Oracle database restore jobs, you must always select the option Restore Over Existing Files. To access this option, on the navigation bar, click Restore. And then under Settings, click General. Restore Job Properties

1299

Oracle Agent

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

Restoring the Oracle Database Using the Oracle Agent

Restoring an Online Oracle Database Note This procedure assumes that the Oracle Database Server is operational, and that database administration can be performed. It also assumes that all the tablespaces you want to restore have been defined, and that the Oracle Agent has been started on the database server. The following procedure is used when the database is operational, but you want to restore the entire database to a prior state for which you have an online backup. Restoring an online database requires you to run two separate restore jobs. First, restore the database’s Archived Logfiles directory. Second, restore each of the database’s tablespaces, which completes the database recovery. After each tablespace is restored, the Oracle Agent automatically attempts to perform media recovery for the tablespace. If the media recovery is unsuccessful, the agent creates an application event log entry with the specific Oracle error code. Note A database’s system tablespace cannot be restored while the database is online. The system tablespace can only be restored to a closed database. ▼

Restoring the Archived Logfiles data (1st restore operation): 1. Make sure that the Backup Exec Oracle Agent has been loaded and is running on the Oracle database server. 2. At the media sever, start Backup Exec. 3. On the navigation bar, click Restore. 4. Expand the All Resources icon. A list of previously backed up systems appears. 5. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. 6. Click the box preceding the {Archived Logfiles} directory from the appropriate backup set. 7. Submit the restore job to restore the {Archived Logfiles} data.

1300

Administrator’s Guide

Restoring the Oracle Database Using the Oracle Agent ▼

Restoring the database’s tablespaces (2nd restore operation): 1. After restoring the {Archived Logfiles} directory, on the navigation bar, click Restore. 2. Expand the All Resources icon. A list of previously backed up systems appears. 3. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. Clicking a backup set in the left pane reveals the set’s contents in the right pane. 4. Click the backup set from which you restored the {Archived Logfile} directory. 5. Select each tablespace by clicking the preceding box. A check mark appears within each box. Do not select the {Archived Logfiles} directory. 6. Submit the restore job to restore the tablespaces. After each tablespace is restored, the Oracle Agent automatically attempts to perform media recovery for the tablespace. If the media recovery is unsuccessful, the agent creates an application event log entry with the specific Oracle error code.

Restoring a Closed Oracle Database Use this section to guide you through the process of restoring a closed Oracle database. ▼

To restore a closed Oracle database: 1. Close the database by typing the following command: shutdown; Note If you cannot close the database using the normal shutdown command, you can close the database using the Oracle Enterprise Manager Shutdown Abort mode of the Shutdown Database dialog box, or the SHUTDOWN command with the ABORT option. 2. From the Backup Exec navigation bar, click Restore.

A list of previously backed up systems appears.

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1301

Oracle Agent

3. Expand the All Resources icon.

Restoring the Oracle Database Using the Oracle Agent

4. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. Clicking a backup set in the restore selections pane reveals the set’s contents in the results pane. 5. Determine which backup set contains the entire Oracle database you want to restore. 6. Create a restore job by clicking the check box preceding the backup set you want to restore. 7. Submit the restore job to restore the entire Oracle database.

Restoring Individual Tablespaces If one or more tablespace data files become corrupted or deleted, a single tablespace can be recovered easily with the Oracle Agent. Caution Do not restore individual tablespaces if an entire database becomes corrupted. Instead, restore the entire database, along with the pertinent transaction logs. See your Oracle Administrator’s Manual or call your Oracle Technical Support Center. A corrupted or deleted tablespace usually results in the following error when the database is initialized: Corrupted or Deleted Tablespace Error

Tablespace recovery can also be performed with the Oracle Agent when either of the following conditions exist:

1302



An empty copy of the missing data file cannot be created because the original file was created after the logfiles had been reset.



An old version of the data file cannot be found and restored using a closed database restore procedure.

Administrator’s Guide

Restoring the Oracle Database Using the Oracle Agent ▼

To restore individual tablespaces: 1. At the Oracle database server, start the Oracle Server Manager. For logon information, type the following: Username = System Password = The password assigned to the System account Service (if applicable) = The name of the non-default database Connect as = sysdba 2. Make sure the database is mounted using an exclusive mount, but is not open. 3. Move to the media server and start Backup Exec. 4. On the navigation bar, click Restore. 5. Expand the All Resources icon. 6. Click the database backup set from which you want to restore. 7. Select the tablespaces you want to restore. 8. Restore as normal. 9. When the restore job completes, move back to the Oracle database server. 10. Start the Oracle Server Manager and connect as System, as a SYSDBA. 11. Type Recover. 12. After the recovery of the database completes, shut down and restart the database.

Restoring the Database Control File When restoring the database control file Becf<SID>.bak from your storage media, keep in mind that it is automatically placed in the Oracle datafile directory on your database server. By default, it is \Orant\Database.

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1303

Oracle Agent

After restoring the file, see the Restore Section – Loss of Non-Mirrored Control Files in your Oracle Administrator’s Guide for more information on recovery of the database control file.

Disaster Recovery Using the Oracle Agent

Disaster Recovery Using the Oracle Agent The ability to recover your Oracle databases after a catastrophic failure requires you to implement a plan of protection before a failure happens. When developing a pre-disaster plan, you should use the following recommended backup strategies: ◆

Have at least one closed database backup of your database.



Make a backup of the Windows directory on the Oracle database server, making sure that you also include the Windows Registry.



Perform a full closed database backup if the structure of the database is altered. For example, if you create a new tablespace or drop an old one, a complete closed database backup is recommended.



Schedule regular full online backups of your Oracle database server.

See also: “Recovering a Remote Oracle Database Server from a Disaster” on page 1305 “Recovering a Combination Oracle Database Server/Media Server” on page 1306

Disaster Recovery Prerequisites You should perform the following before a disaster occurs. The following items are needed to fully recover your Oracle database server in the event of a disaster. ◆

Make a full Oracle database server file system backup using Backup Exec. When making this backup, include both the Oracle database directory and the Windows system directory. However, do not include the Oracle database tablespace data files in this backup.



Using the Oracle Agent, make a second backup containing the Oracle database tablespace data files.

After creating these backups, you can now recover your Oracle database server in case a disaster occurs. See also: “Backing Up Individual Online Tablespaces” on page 1297

1304

Administrator’s Guide

Disaster Recovery Using the Oracle Agent

Recovering a Remote Oracle Database Server from a Disaster ▼

If your remote Oracle database server experienced a disaster, such as a hard drive failure, use this procedure to recover your Oracle databases: 1. Re-install Windows on the Oracle database server. During the re-install process, install Windows into a temporary directory that you can delete after your Oracle database server is running. 2. At the media server and using the storage media containing the full Oracle database server file system backup, restore the entire contents of the media to the Oracle database server using Backup Exec. 3. After restore completes, reboot your Oracle database server. Because the full system backup was restored, your computer is now booted using its original version of Windows. The system now contains the original version of Windows, the Backup Exec Oracle Agent, the Oracle databases minus the tablespaces, and any other files contained on the full backup media. If you have a full closed Oracle database backup, continue with step 4. If you do not have a full closed database backup, ignore step 4 and proceed with step 5. 4. Restore your last full closed Oracle database backup and start your database. Your database is now operational. To bring your database up-to-date, restore your most recent online Oracle database backup.



If you could not run step 4, continue from here: 5. At the media server, run another restore operation. This time, use the Oracle Agent to restore the storage media containing all of the Oracle tablespace data files. 6. When the restore operation completes, move to the Oracle database server and start the Oracle Server Manager. 7. Connect as System, as a SYSDBA. 8. Type recover database using backup controlfile. 9. After the recovery of the database completes, type alter database open resetlogs.

Your Oracle database server should now be restored to full working order. Appendix K, VERITAS Backup Exec - Agent for Oracle Server

1305

Oracle Agent

10. After the command completes, shut down and restart the database.

Disaster Recovery Using the Oracle Agent

11. Delete the temporary directory containing the copy of Windows that was used to initially boot the computer. Disaster recovery of the Oracle database server is now complete. See also: “Restoring an Online Oracle Database” on page 1300 “Restoring Individual Tablespaces” on page 1302

Recovering a Combination Oracle Database Server/Media Server Use this section to guide you through the process of recovering a computer running both an Oracle database and a Backup Exec media server. ▼

To recover a combination Oracle database and media server: 1. Re-install Windows on the Oracle database server/media server. During the re-install process, install Windows into a temporary directory that you can delete after your Oracle database server/media server is back up and running. 2. Re-install Backup Exec. 3. After re-installing Backup Exec, recatalog the media. 4. Restore the entire contents of the media containing the full server file system backup. This restore operation restores your original Windows system, along with any services required to run your Oracle databases. 5. Reboot the computer after the restore operation completes. Because the full system backup was restored, your computer now boots using its original version of Windows. The system now contains the original version of Windows, the Backup Exec Oracle Agent, the Oracle databases minus the tablespaces, and any other files contained on the full backup media. 6. Run another restore operation. This time, use the Oracle Agent to restore the media containing all of the Oracle tablespace data files. 7. When the restore operation completes, start the Oracle Server Manager. 8. Connect as System, as a SYSDBA. 9. Type Recover.

1306

Administrator’s Guide

Oracle Agent Error Message Chart

10. After the recovery of the database completes, shut down and restart the database. Your Oracle database server/media server should now be restored to full working order. 11. Delete the temporary directory containing the copy of Windows that was used to initially boot the computer. Disaster recovery of the Oracle database server is now complete. See also: “Disaster Recovery Prerequisites” on page 1304 “Restoring Individual Tablespaces” on page 1302

Oracle Agent Error Message Chart The following chart lists possible Oracle Agent error messages and solutions. Because the Backup Exec Oracle Agent runs as a system service on the Oracle database server, any error message generated is written to the Oracle database server’s Event Application Log. Oracle Agent Error messages Application Log Error Message

Solution

Unable to access database control file backup location = “%1”

Verify that the specified directory is correct and exists. If the specified directory is incorrect, use the Oracle Agent Configuration Utility to set the correct location for the backup copy of the database control file.

Unable to access archived log file location = “%1”

Verify that the specified directory is correct and exists. If the specified directory is incorrect, use the Oracle Agent Configuration Utility to set the correct location of the archive redo logfiles.

System service error “%1”

The Oracle Agent was not installed correctly or its system service control parameters have been corrupted. Uninstall and then re-install the Oracle Agent.

1307

Oracle Agent

Appendix K, VERITAS Backup Exec - Agent for Oracle Server

Oracle Agent Error Message Chart Oracle Agent Error messages Application Log Error Message (continued)

Solution (continued)

(ALTER TABLESPACE “%1” BEGIN BACKUP) failed. Oracle Status = “%2” (ALTER TABLESPACE “%1” OFFLINE IMMEDIATE) failed. Oracle Status = “%2” (ALTER TABLESPACE “%1” END BACKUP) failed. Oracle Status = “%2” (ALTER TABLESPACE “%1” ONLINE) failed. Oracle Status = “%2”

The Oracle Agent was unable to complete the command. Check the Oracle database server code documentation for information about the particular status code.

Unable to access Oracle datafile (%1). Oracle The Oracle Agent is unable to access the named data files must be defined using a full path datafile. specification! Verify that the datafile was defined using a fully specified path. Unable to logon to the Oracle server. Oracle user account name “%1”

Make sure that the Oracle user name and password are valid for this Oracle account. This event will also occur if another instance of Backup Exec for Windows Servers attempts to access the Oracle Agent when the Oracle database instance is shut down.

Unable to resolve the Oracle service name for Verify that the Oracle SQL Net configuration SID = “%1” (Tnsnames.ora) has been set up properly for the named SID.

1308

Administrator’s Guide

Lotus Domino Agent

VERITAS Backup Exec - Agent for Lotus® Domino™

L

The VERITAS Backup Exec for Windows Servers Agent for Lotus Domino (Lotus Domino Agent) is installed as a separate, add-on component of Backup Exec for Windows Servers. The Lotus Domino Agent allows you to back up and restore Lotus Domino versions R5 and later databases and transaction logs on local media servers and on remote computers. You can integrate Lotus Domino database backups with regular server backups without separately administering them or using dedicated hardware. The Lotus Domino Agent provides support for: ◆

Full, incremental, and differential online backups of Lotus Domino databases and transaction logs using Lotus Domino APIs.



Restores of Lotus Domino databases and transaction logs and point in time restores.



Recycling of Lotus Domino transaction logs after a successful backup.



Flexible scheduling capabilities.



Backup and restore of partitioned and clustered Lotus Domino servers.

See also: “Installing the Lotus Domino Agent on the Media Server” on page 1311

1309

Lotus Domino Agent Requirements

Lotus Domino Agent Requirements The Lotus Domino Agent supports Lotus Domino R5 and later. Caution If transaction logging is enabled and you have Lotus Domino Release 5.0.3 or earlier, the transaction log to which the Lotus Domino server is actively writing transactions cannot be completely backed up. This may result in data loss during a restore operation. Following are the requirements for backing up Lotus Domino database files residing on the media server, or for remote Windows computers and workstations. Note Backup Exec does not support two versions of Lotus Domino on the same remote computer. If the Lotus Domino files you want to back up are on the local media server, the server must have: ◆

Backup Exec for Windows Servers



An Intel-compatible processor



The Lotus Domino data directory on the Lotus Domino server

If the Lotus Domino files you want to back up are on a remote computer, the remote computer must have: ◆

Windows operating system



Backup Exec Remote Agent for Windows Servers



An Intel-compatible processor



Corresponding Windows Administrative Share for each volume that contains Lotus Domino databases



The Lotus Domino data directory on the Lotus Domino server

Following are requirements for backing up Lotus Domino transaction logs: ◆

Transaction logging must be enabled to perform differential and incremental backups and to perform point in time recovery.



The Lotus Domino logging style must be set to archive if you want to back up the transaction logs.

See also: “Viewing and Selecting Lotus Domino Databases” on page 1312

1310

Administrator’s Guide

Installing the Lotus Domino Agent on the Media Server The VERITAS Backup Exec Agent for Lotus Domino is installed locally as a separate, add-on component of Backup Exec for Windows Servers, and can protect local or remote Lotus Domino databases. Whenever the Lotus Domino Agent is installed on the media server, the Backup Exec Remote Agent is included as part of the Lotus Domino Agent installation. The Remote Agent is a system service that runs on remote servers and enhances backup and restore performance. Because a Remote Agent is also a Client Access License (CAL), you must install the Remote Agent on any remote Windows server that you want to back up. You cannot select resources from a remote server for backup until a Remote Agent has been installed. If you are using the Lotus Domino Agent to protect databases on the local media server only, you are entitled to install the Remote Agent that was included with the Lotus Domino Agent installation to one remote Windows server so that resource can be protected by Backup Exec. However, if the Lotus Domino Agent is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you are not entitled to install it on another Windows server. For instructions on installing the Lotus Domino Agent on the local media server, see “Installing Backup Exec Options on a Local Server” on page 53. For instructions on installing the Remote Agent on a remote resource, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. For instructions on moving the Remote Agent to another remote Windows computer, see “Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line” on page 847. See also: “Configuring Default Lotus Domino Options” on page 1314 “Backing Up Lotus Domino Databases” on page 1315 “Restoring Lotus Domino Databases” on page 1320

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1311

Lotus Domino Agent

Installing the Lotus Domino Agent on the Media Server

Viewing and Selecting Lotus Domino Databases

Viewing and Selecting Lotus Domino Databases After installing the Lotus Domino Agent, you can view and select existing Lotus Domino databases in the selections pane. To view databases created while Backup Exec is running, select Refresh from the View menu or press . To back up the newly-created database, select it from the volume level, unless the entire volume is already selected for backup. ▼

To view Lotus Domino databases on the local server: ❖

On the navigation bar, click Backup, and then in the selections pane, expand Lotus Domino Databases. All of the Lotus Domino data found on the local server is listed by volume under the Lotus Domino Databases icon. Lotus Domino Databases

Lotus Domino Databases view

Note Lotus Domino transaction logs do not appear under the Lotus Domino Databases; however, when the database is selected for backup, the transaction logs will automatically be included.

1312

Administrator’s Guide



To select Lotus Domino databases: ❖

Select the check box next to the volume to choose all of the databases in a volume, or expand the volume and select specific folders and databases. When selecting databases to back up, the databases must be local to the Lotus Domino server. Lotus Domino Database Selection

The following file types appear in the view for the Lotus Domino server: ◆

filename.nsf - Lotus Domino database files



filename.ntf - Lotus Domino template files



filename.box - shared mail database



filename.dsk - cache files You must back up all of these files in order to properly recover Lotus Domino Databases. Only database files appear under the Lotus Domino Databases view. Domino Program files and other files such as.id and notes.ini appear in the volume in which the Lotus Domino Program directory is located. They must be backed up separately as part of a system backup.



To view Lotus Domino databases on remote computers: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1313

Lotus Domino Agent

Viewing and Selecting Lotus Domino Databases

Configuring Default Lotus Domino Options

3. Click Remote Selections, and then click Microsoft Windows Network. 4. If necessary, click the domain that contains the Lotus Domino installations, and then click the computer in which the Lotus Domino database is located. A list of shared network directories appears, along with an icon that represents the Lotus Domino Databases. See also: “Backing Up Lotus Domino Databases” on page 1315 “Restoring Lotus Domino Databases” on page 1320 “Preparing for Disaster Recovery on a Lotus Domino Server” on page 1325

Configuring Default Lotus Domino Options You can configure default settings for Lotus Domino databases for all new jobs you create. When you create a job, you can use the default settings or modify the Domino properties for the job. ▼

To configure default Domino options for all new jobs: 1. On the Tools menu, click Options. The Options - Set Application Defaults dialog box appears. 2. On the Properties pane, under Job Defaults, click Domino. 3. Select Lotus Domino backup default options. For more information, see the Backup job properties for Lotus Domino databases table in the “Backup Options for Lotus Domino Databases” on page 1317 section. 4. Select Lotus Domino restore default options. For more information, see the Restore job properties for Domino databases table in the “Restore Options for Lotus Domino Databases” on page 1323 section. 5. Click OK to save the options or select other options from the Properties pane.

1314

Administrator’s Guide

Backing Up Lotus Domino Databases When a Lotus Domino backup job is submitted, Backup Exec uses Lotus Domino APIs to obtain the backup of the database. The transaction logs associated with the Lotus Domino databases are automatically included in the backup and are stored in a separate backup set within the Lotus Domino database backup set. The Lotus Domino Agent supports the backup of the following types of files: ◆

.ntf - Lotus Notes Template Files



.nsf - Lotus Notes Database Files



.box - Lotus Mailbox Files



.dsk - Cache Files

You must back up .nsf, .ntf, and .box files to properly recover Lotus Domino databases. If you want to back up .njf, .ncf, .id, .dic, or notes.ini files, you must select them for backup from the volume in which the Lotus Domino Program directory is located. See also: “Lotus Domino Transaction Logs” on page 1316 “Backup Options for Lotus Domino Databases” on page 1317 “Restore Options for Lotus Domino Databases” on page 1323

Supported Lotus Domino Database Configurations You can back up the following types of Lotus Domino database configurations using the Lotus Domino Agent: ◆

Domino Server Databases. Domino Server databases can be Logged or Unlogged. They are located in a folder in the Domino data directory, typically Lotus\Domino\Data, but may also be linked to the Domino data directory using Lotus Linked Databases. -

Logged Domino Server Databases. A logged Domino Server database logs transactions for one or more Lotus databases. If transaction logging is enabled on the server, all database transactions go into a single transaction log.

-

Unlogged Domino Server Databases. An unlogged Domino Server database does not have transaction logging enabled, or the transaction logging has been disabled for specific server databases. Unlogged Domino Server databases will be backed up in their entirety when a full, differential, or incremental backup is performed, but the database can only be restored to the point of the latest database backup.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1315

Lotus Domino Agent

Backing Up Lotus Domino Databases

Backing Up Lotus Domino Databases ◆

Local Databases. Lotus databases are considered Local when they cannot be found in the Domino data directory, cannot be shared, and cannot be logged. This type of database requires a backup of the database itself when using any of the Lotus Domino R5 backup methods. The database can be restored only to the point of the latest database backup.

Lotus Domino Transaction Logs Lotus Domino has the ability to log transactions for one or more Lotus Domino databases. Lotus Domino databases are logged by default when transaction logging is enabled on the Lotus Domino server and the database is in the Domino data directory. When transaction logging is enabled on the server, each Lotus Domino database is assigned a database instance ID (DBIID). Each transaction recorded in the log includes the DBIID, which is used to match transactions to the database during a restore. A new DBIID may be assigned to the database when some Lotus Domino operations are performed. When the new DBIID is assigned, all new transactions recorded in the log use the new DBIID; however, previous transactions have the old DBIID and will not match the new DBIID for the database. To prevent data loss, it is recommended that a full backup be performed when a database receives a new DBIID since transactions with the old DBIID cannot be restored to the database. A full backup includes all current transactions on the database and ensures that only the transactions with the new DBIID are needed to restore the database. You can select only one logging style when transaction logging is enabled on the server. Following are the two styles of logging for Lotus Domino databases: ◆

Archive logging. This logging style produces a transaction log that is limited only by the capacity of your mass storage. Archive logging is the recommended logging style to be used with the Lotus Domino Agent since all the transaction logs can be backed up and marked for recycling. When the transaction logs are recycled the Lotus Domino server reuses the existing transaction logs after they are backed up to create space for new transaction logs.



Circular logging. This logging style reuses the log file after a specific log file size is reached. By reusing the log file you are saving resources; however, you are also limiting your recovery options because the database can only be recovered to the point of the last full backup. If the incremental or differential backup method is selected for a backup job, a full backup of the changed databases is performed since transaction logs cannot be backed up.

Caution When circular logging is enabled, the circular transaction log cannot be backed up, which could result in the loss of changes made to the database since the last backup was performed.

1316

Administrator’s Guide

Backup Options for Lotus Domino Databases This procedure details how to select backup job properties for Lotus Domino databases and provides definitions for Domino-specific backup options. You should back up Lotus Domino databases during off-peak hours and disable Lotus Domino agents before running the backup. The transaction logs will automatically be included in the backup job. For details on how to create a backup job, and for definitions of all other backup options see “Creating a Backup Job” on page 241. Caution All Lotus Domino databases and transaction logs that reside on single or multiple volumes must be backed up by the same media server. In addition, you should not back up a Lotus Domino server simultaneously from multiple media servers. ▼

To select backup job properties for Lotus Domino databases: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Settings, click Domino.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1317

Lotus Domino Agent

Backup Options for Lotus Domino Databases

Backup Options for Lotus Domino Databases Backup Job Properties for Lotus Domino

3. Select the appropriate options as follows: Backup job properties for Lotus Domino databases

1318

Item

Description

Backup method:

Š

Full - Back up Database and Logs - Reset Archive Bit. Select this to back up all the selected databases. To properly back up your Lotus Domino data, you should perform regular full backups of the database. This backup method should also be used when the DBIID for the database has changed since prior transactions cannot be applied to the new database.

Š

Differential - Changed Database and Logs. Select this to back up files that were modified since the last Full backup. This backup method is smaller and faster than a Full backup because only archived transaction logs, unlogged databases, and logged databases with DBIIDs that have changed will be backed up.

Š

Incremental - Changed Database and Logs - Reset Archive Bit. Select this to back up files that were modified since the last Full or Incremental backup. This backup method is smaller and faster than a Full backup because only archived transaction logs, unlogged databases, and logged databases with DBIIDs that have changed will be backed up. Administrator’s Guide

Backup job properties for Lotus Domino databases (continued) Item

Description

Mark archive logs for recycling

Select this check box to reuse the transaction log after it has been backed up. Backup Exec will not delete the transaction log. Selecting this option only indicates that the transaction log is ready to be reused after it has been backed up successfully; the Lotus Domino server actually deletes the transaction logs. This option is selected automatically when you select the full backup method. You cannot clear this option when you are using the full backup method. If the option is selected when you perform a differential or incremental backup job, transaction logs that are needed to maintain the differential backups will be reused. However, it should be selected regularly to create space for new transaction logs. Note This option may not work for Lotus Domino versions prior to 5.0.7. For more information about this limitation of Lotus Domino, go to the Lotus Domino web site.

4. Start the backup job or select other backup options from the Properties pane. See also: “Backing Up Data” on page 239

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1319

Lotus Domino Agent

Backup Options for Lotus Domino Databases

Restoring Lotus Domino Databases

Restoring Lotus Domino Databases The restore of a Lotus Domino database is a two-part process. The first part of the restore copies database files from the media to the server. The second part of the restore is a recovery process that applies data from the transaction logs to the database to bring it up-to-date. You must close the databases that you want to replace. During a restore of the Lotus Domino database, the existing database is taken offline and deleted, the database is restored, and changed records contained in the backup job are applied to the database. If the database is unlogged or local, the database is brought back online. If the database is logged and multiple databases are being restored, the database name is added to a list for recovery. During the restore process, Backup Exec assigns a unique name to databases and then before databases are brought online, reassigns the original name. Changing the name during the restore process has no effect on restored databases. The recovery process begins automatically after the last database is copied to the server. The database is restored to a point in time using transactions from the required transaction logs. Required transaction logs that were backed up and recycled are also included in the recovery process. After the recovery process completes, the Lotus Domino database is brought online. If you back up your Lotus Domino databases regularly, then restoring the most recent backup set containing the Lotus Domino data is all that is required to restore the most recent backups of your Lotus Domino databases. Note If circular logging is enabled and both the databases and the Domino transaction log are lost, the database can only be recovered to the point of the last full backup.

1320

Administrator’s Guide

Selecting Lotus Domino Databases for Restore When you view Lotus Domino databases in the restore selections pane, two backup sets appear for each Lotus Domino backup job. The first backup set contains the Lotus Domino databases and the second backup set contains the transaction logs. To restore data, selections should be made from the backup set that contains the Lotus Domino databases; the required transaction logs are automatically restored with the selected database. Backup Sets for Lotus Domino R5 Backup Job Contains Lotus Domino database files

Contains Lotus Domino transaction logs

Lotus Domino data is usually contained in the most recent backup set. However, some subsequent differential or incremental backup jobs run after a full backup job may not contain data in the backup set because only the transaction log was backed up. If the data you want to restore is not located in the most recent backup set, check the previous backup sets until you find the data. Note If a new DBIID has been assigned to databases and you run a differential or incremental backup, the data will be contained in the most recent backup set since transactions with the new DBIID will not match the old DBIID. For example, LD Server has a Full Backup 0001 and a Differential Backup 0002. If you decide you want to restore data from Differential Backup 0002, you may select the Data directory and find that it is empty.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1321

Lotus Domino Agent

Restoring Lotus Domino Databases

Restoring Lotus Domino Databases Empty data directory for Differential Backup 0002.

The data backed up for Differential Backup 0002 is actually contained in the transaction log backup set. To restore the data, you must select it from the previous Full Backup 0001. The transaction logs from Differential Backup 0002 will be used to bring the database up to date. Transaction Logs backup set for Differential Backup 0002.

1322

Administrator’s Guide

Restore Options for Lotus Domino Databases This procedure details how to select restore job properties for Lotus Domino databases, and provides definitions for Domino-specific restore options. When you select a Lotus Domino R5 backup set to restore, all database files and necessary transaction logs are automatically restored. You can also choose to restore specific database files. ▼

To select restore job properties for Lotus Domino databases: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click Domino. 3. Select the appropriate options as follows: Restore job properties for Lotus Domino databases Option

Description

Seconds to wait for the database to go offline

Enter the number of seconds for the restore process to wait for a database that is in use. When a Lotus database is restored it must first be taken offline. This will ensure that the database is not being accessed, closed, or deleted while the restore operation is being processed. If the database is still in use and cannot be taken offline after the specified wait time, the restore will fail.

Database Identification Retain original IDs

Select this option to restore the original database IDs.

Assign new database ID Select this option to assign new IDs to the database. Assign new database ID Select this option to assign new IDs to the database. A replica ID is and replica ID used to synchronize two or more databases that are being replicated in the Lotus Domino environment. You can assign a new replica ID during a restore to prevent other databases under replication from overwriting the restored database files.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1323

Lotus Domino Agent

Restore Options for Lotus Domino Databases

Restore Options for Lotus Domino Databases Restore job properties for Lotus Domino databases (continued) Option

Description

Point in time restore

Select this option to enter a date and time in which to restore the database. The option is only available for logged databases when the archive logging style is set. Backup Exec will restore the Lotus Domino database you selected in the Restore selections dialog box and then automatically restore the necessary transaction logs required to bring the databases up to the date and time specified. If a point in time is not specified, the databases will be restored up to the last committed transactions in the log file.

Caution If your Lotus Domino database is replicated, the databases on each machine must have identical database and replica IDs. If you want to ensure that the databases continue to be replicated after the restore, select the Retain original IDs option. 4. Start the restore job or select other options from the Properties pane. See also: “Restoring Data” on page 411 “Lotus Domino Transaction Logs” on page 1316

Redirecting Restore Jobs for Lotus Domino Databases The Backup Exec logon account must have administrative credentials on the server to which you want to redirect the backup of the Lotus Domino server. Lotus Domino databases can only be redirected to a different directory on the local server from which the database was backed up. If you are restoring a database to a different location, it must reside in or under the Lotus Domino data directory. ▼

To redirect the restore of a Lotus Domino database: 1. Select the media that contains the data you want to restore. 2. On the navigation bar, click Restore. 3. Select the Lotus Domino databases. 4. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click File Redirection.

1324

Administrator’s Guide

5. Select Redirect file sets. 6. Select the drive to which you are restoring in Restore to drive. You cannot enter the name of the drive, you must make a selection. 7. Enter the logon account for the server in Server logon account. 8. Enter the path to which you are restoring in Restore to path. 9. Enter the logon account for the path in Path logon account. 10. Start the redirection job or select other restore options from the Properties pane. See also: “Restoring Data” on page 411 “Configuring Logon Accounts” on page 363

Preparing for Disaster Recovery on a Lotus Domino Server A Disaster Preparation Plan is necessary for restoring Lotus Domino databases efficiently and effectively in the event of a catastrophic failure. The goal is to minimize the time to recover. Developing a backup strategy for your Windows computers and Lotus Domino databases is the critical part of this plan. When developing a strategy for backing up your Lotus Domino databases, consider the following recommendations: ◆

If you have linked databases, it is best to keep them on one volume. This allows Backup Exec to synchronize the databases before they are backed up.



Back up active databases often. This reduces the amount of effort required to update the databases to the point following the most recent backup.



Ensure that the notes.ini, cert.id, and server.id files are protected and available if a disaster occurs.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1325

Lotus Domino Agent

Preparing for Disaster Recovery on a Lotus Domino Server

Preparing for Disaster Recovery on a Lotus Domino Server

Disaster Recovery of a Lotus Domino Server Before restoring your Lotus Domino server, you must first completely recover the Windows computer and then recover or re-install Lotus Domino to the same location as before the disaster occurred. All of the Lotus Domino system data must be recovered, including log.nsf, names.nsf, template files, notes.ini, mail.box, and ID files. Note If transaction logging is enabled on the Lotus Domino server, go to the section that contains the steps for disaster recovery for the style of logging selected on the server. System recovery can be performed manually (see “Disaster Preparation and Recovery” on page 549) or with Backup Exec’s Intelligent Disaster Recovery option (see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881). After rebuilding the server, you can restore the databases from your most recent backup. ▼

To recover a Lotus Domino server and databases: 1. Restore or re-install the Lotus Domino server program directory to the same location as before the disaster occurred. 2. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus Domino server program directory. 3. Use the Lotus Domino Agent to restore the databases to the Domino data directory. 4. Start the Lotus Domino Server. See also: “Disaster Recovery of a Lotus Domino Server Using Circular Logging” on page 1328 “Disaster Recovery of a Local Windows NT Computer” on page 559 “Restoring Data” on page 411 “Restore Options for Lotus Domino Databases” on page 1323

1326

Administrator’s Guide

Disaster Recovery of a Lotus Domino Server Using Archive Logging If the active transaction log is lost, you can recover the database only up to the transactions contained in the last transaction log. If all of the transaction logs are lost, in order to recover the database you must have an up-to-date Notes.ini file from the Lotus Domino server, the backups of the database, and archived log extents. The following steps provide instructions for recovering the Lotus Domino server, databases, and transaction logs. ▼

To recover the Lotus Domino server, databases, and transaction logs when archive logging is enabled: 1. Restore or re-install the Lotus Domino server program directory (excluding the notes.ini, cert.id, and server.id files) to the same location as before the disaster occurred. 2. Reboot the server. 3. Check that the transaction log directory (logdir) is created and does not contain old files. If the log directory was not created, recreate the directory to the same location as before the disaster occurred. 4. Restore the last transaction logs from the last backup to the logdir directory. Caution Do not start the Lotus Domino server after performing the previous steps. 5. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus Domino server program directory. 6. To have Lotus Domino create the control file when the server starts, set the following parameter in the Notes.ini file: translog_recreate_logctrl=1 Note If you enter the translog_recreate_logctrl=1 parameter on the last line in the Notes.ini file, you must press <Enter> after the parameter. 7. Use the Lotus Domino Agent to restore the databases to the Domino data directory.

Appendix L, VERITAS Backup Exec - Agent for Lotus® Domino™

1327

Lotus Domino Agent

Preparing for Disaster Recovery on a Lotus Domino Server

Preparing for Disaster Recovery on a Lotus Domino Server

8. Start the Lotus Domino server. After the Lotus Domino server is restarted, run a full backup of the server since new DBIIDs have been assigned. See also: “Restore Options for Lotus Domino Databases” on page 1323 “Restoring Data” on page 411

Disaster Recovery of a Lotus Domino Server Using Circular Logging If circular logging is enabled and the transaction log is lost, the Lotus Domino databases can only be recovered to the point of the last backup. ▼

To recover the Lotus Domino server and databases when circular logging is enabled: 1. Restore or re-install the Lotus Domino server program directory (excluding the notes.ini, cert.id, and server.id files) to the same location as before the disaster occurred. 2. Check that the log directory (logdir) is created and does not contain old files. If the log directory was not created, recreate the directory to the same location as before the disaster occurred. Caution Do not start the Lotus Domino server after performing the previous steps. 3. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus Domino server program directory to the same location as before the disaster occurred. 4. To have Lotus Domino create the circular log file in the log directory (created in step 2) when the server starts, set the following parameter in the notes.ini file: translog_path=logdir 5. Use the Lotus Domino Agent to restore the databases to the Domino data directory. See also: “Restoring Data” on page 411 “Restore Options for Lotus Domino Databases” on page 1323

1328

Administrator’s Guide

M

The Backup Exec for Windows Servers Agent for R/3 for Oracle Server (Backup Exec R/3 Agent) is installed as a separate, add-on component of Backup Exec for Windows Servers. The Backup Exec R/3 Agent allows you to submit backup, restore, and archive jobs of SAP® R/3 for Oracle for Windows NT/2000 using the R/3 BACKINT interface to the Backup Exec for Windows Servers. It follows the BC-BRI BACKINT Interface for ORACLE Databases specification, version 3.0. You can use the R/3 tools and the BACKINT interface, along with the Backup Exec R/3 Agent to connect to a Backup Exec server and perform backup and restore on individual files, entire databases, or individual tablespaces in either online or offline mode, as well as archive offline redo logs. The BACKINT implementation acts as a client for Backup Exec. You use the R/3 tools to run the BACKINT executable, which provides command line options that describe the operation to perform, such as backup, restore, or archive. A file is also provided (biparam.ini) in which you set Backup Exec parameters for jobs that you submit from the SAPDBA or CCMS console, such as specifying a server or device to use for the job, or specifying the backup compression mode. The BACKINT executable connects to the specified Backup Exec server, and the requests become Backup Exec operations. Jobs submitted from the SAPDBA or CCMS console, via BACKINT, to Backup Exec are treated as run now jobs. Jobs may be placed in a Backup Exec job queue as queued if all drives are busy. After the jobs are in the queue, the Backup Exec administrator can edit or cancel the job. Note You must always use SAPDBA or CCMS to run database-related operations.

1329

R/3 Agent

VERITAS Backup Exec - Agent for R/3 for Oracle Server

When the job is complete, the Backup Exec server writes a standard job log, as it does for any submitted job. You can view this job log using the standard Backup Exec administration console (remote or local). The BACKINT executable also sends the results of the operations to the SAP R/3 tools. When a job is initiated by SAPDBA or CCMS, a job log with an eight-character name is created to represent that job. The R/3 system stores that job log in a directory: <x>:\Oracle\<SID>\sapbackup

where <x> is the database installation drive and <SID> represents the system ID of the Oracle instance. This file is a plain ASCII text file that you can view with any text editor. A file called Backint.mdb that correlates the R/3 catalog with the Backup Exec catalog is maintained in the Usr\<SID>\sys\exe\run directory. You must be able to restore this file in order to restore data to the R/3 server using the Backup Exec R/3 Agent. The Backup Exec R/3 Agent is capable of supporting multiple media servers running on the same network. See also: “Backup Exec R/3 Agent Security” on page 1330

Backup Exec R/3 Agent Security The BACKINT interface functions as a client to the Backup Exec server. As such, all Windows security limitations that apply to the Backup Exec administration console also apply to the BACKINT interface. You must have the appropriate privileges on both the R/3 and media servers to be able to perform both backup and restore operations. The Backup Exec service account must have: ◆

Access to selections in jobs submitted by the BACKINT interface



Rights to the volumes on which the selections are contained

See also: “Changing Windows Security” on page 46.

1330

Administrator’s Guide

Backup Exec Alerts and the BACKINT Interface Backup Exec generates alerts in some conditions. The BACKINT interface handles these alerts in one of two modes - unattended mode or interactive mode: Unattended mode. In this mode, any alert that requires a response from you causes the job to fail. If such an alert occurs, it appears on the R/3 system console. Any alerts that contain only informative text also appear on the R/3 system console. You can start the operation in attended mode by setting Confirm backup parameters to Yes on the Backup Database screen of SAPDBA. ◆

Interactive mode. In this mode, all alerts appear on the R/3 console. You must respond to these alerts as prompted for the job to continue.

Requirements for Backup Exec R/3 Agent ◆

Windows NT version 4.0 with Service Pack 4, or Windows 2000, Windows XP, or Windows Server 2003



Oracle Enterprise Server version 7.3.x



SAP® R/3 version 3.1h, 4.08, 4.6c and 4.6d



All R/3 databases to be backed up must be placed in the ARCHIVE_LOG mode and Automatic Archival must be enabled using the database administration tools. For more information on how to check or perform this operation, consult the R/3 User Manual or your R/3 Database Administrator's Guide.



All Oracle databases to be protected must be managed by the R/3 system. To protect Oracle databases not managed by R/3, purchase the VERITAS Backup Exec for Windows Servers Agent for Oracle Server.

Note The Backup Exec R/3 Agent does not support data stored on RAW partition types. See also: “Installing the Backup Exec R/3 Agent” on page 1332 “Backup Exec R/3 Agent Security” on page 1330

Appendix M, VERITAS Backup Exec - Agent for R/3 for Oracle Server

1331

R/3 Agent



Using the R/3 Agent to Back Up the R/3 Database

Installing the Backup Exec R/3 Agent Note Before you install the agent, verify that the R/3 system environment variables are set correctly for the server you plan to protect. The Backup Exec R/3 Agent's default directory is the R/3 database's home Usr\<SID>\sys\exe\run directory. If this is the initial installation of Backup Exec, see “Installing Backup Exec” on page 48. To install the Backup Exec R/3 Agent, see “Installing Backup Exec Options on a Local Server” on page 53.

Using the R/3 Agent to Back Up the R/3 Database Use the Backup Exec R/3 Agent to frequently back up the database. The more frequently you back up the database, the less time it takes to recover it in the event of data loss. In addition to these regularly scheduled backups, it is recommended that you close the R/3 database and do a file level backup whenever you alter the structure of the database. The following backup strategies are highly recommended in order to recover your R/3 database server after a catastrophic failure.

1332



Have at least one closed database backup of your database (see your R/3 Database Administrators Guide for details). Do this by using Backup Exec to make a full R/3 database server file system backup. If the structure of the database is altered, you should perform a full closed database backup.



When you perform your full file system backups, make sure the R/3 database control and data files are excluded from the backup set. Because these database files are both locked and unreadable when the database is open, they will appear as Skipped in the Backup Exec Job History job log if you attempt to back them up during your full file system backup jobs.



Create a backup of the Windows directory on the R/3 database server, making sure that you also include the Windows registry.



Always include the Backint.mdb file (in the Usr\<SID>\sys\exe\run directory) in your regular backups of the R/3 database server. This file correlates the R/3 catalog with the Backup Exec catalog. You must have this file in order to restore data.

Administrator’s Guide

Using the R/3 Agent to Back Up the R/3 Database ◆

Use the Backup Exec R/3 Agent to perform regularly-scheduled offline and online backups of the R/3 database server.



Create regular backups of the rest of the data that resides on the server.

Specifying Backup Exec Parameters The BACKINT interface specifications provide for a file that you can use to specify Backup Exec parameters for backup jobs that you submit from the SAPDBA or CCMS console. This backup utility parameter file is maintained in Windows .ini file format, and is called Biparam.ini. A template of this file, named Biparam.ini, is included with the installation. The backup utility parameter file is used for every backup job submitted to Backup Exec from the SAPDBA or CCMS console. If you are directing the backup job to a remote media server, you must edit the backup utility parameter file and change the “Server” entry to reference the media server. If a “Server” entry is not supplied, the backup will be submitted to the local server. You can also create a new .ini file to use with specific jobs. You specify which .ini file is to be used when you submit the job from the SAPDBA or CCMS console. Any valid file name or location can be specified as long as you enter the complete file specification. Note All Backup Exec options not specified in the .ini file will use the values and defaults specified by the media server.

Appendix M, VERITAS Backup Exec - Agent for R/3 for Oracle Server

1333

R/3 Agent

Note All scheduled jobs must be handled by the R/3 database management system. Any attempt to schedule jobs not using the R/3 database management system can potentially damage your database. For more information on how to check or perform this operation, consult the R/3 User Manual or your Oracle Server Administrator's Guide.

Using the R/3 Agent to Back Up the R/3 Database ▼

To edit the backup utility parameter file: 1. Open the Biparam.ini file, located in the Usr\<SID>\sys\exe\run directory (or any .ini file you created for a specific job) and make any changes. 2. Edit any of the following options in the Biparam.ini file to configure the media server.: Options in the Biparam.ini file Use this option:

For this operation:

Server=<server name>

To specify a Backup Exec server to perform this backup job. Note Restore jobs are automatically directed to the Backup Exec server from where the original backup was executed. The default is the local machine.

Device=<device name>

To specify a device, by name, for use in backup operations. The default is the first available device. Note The device name must match the device exactly as it appears in Backup Exec for Windows Servers.

Media=<media name>

To specify a name for new media. Note This option is only effective when new media is used for the backup, otherwise the original media name is retained. The default is a media name automatically specified by Backup Exec, which is a date and time stamp of when the media is created; for example, Media created 07/24/98 10:51:59 PM.

Description= The default is a backup set description automatically specified by Backup Exec, which is an incremental number of the backup sets created since the installation of Backup Exec; for example, Backup 0020. Compression =

To specify the backup compression mode. Allowable values are: Š

Best - Use hardware compression; if not available, then use software compression.

Š

Hardware - Use hardware compression; if not available, then use no compression.

Š

Software - Use software compression.

Š

None - Use no compression.

The default is Hardware.

1334

Administrator’s Guide

Using the R/3 Agent to Back Up the R/3 Database Options in the Biparam.ini file (continued) For this operation:

Auto Verify=<>

To toggle the Verify after backup option. Note Because Verify after backup is not directly supported by the R/3 tools, the results are not sent back to the R/3 system. This option is available for user information only when the backup job is viewed through the Backup Exec administration console. The default is on.

Print Log=<>

To toggle the printing of job history job log information after a backup job completes. The default is off.

See also: “Backing Up the R/3 Database” on page 1335 “Restoring the R/3 Database” on page 1336 “Backup Exec Alerts and the BACKINT Interface” on page 1331

Backing Up the R/3 Database You must have the appropriate privileges on both the R/3 and media servers to be able to perform both backup and restore operations. Before you submit a backup operation, you must: ◆

Enter configuration information for your Backup Exec server in the Biparam.ini file found in your Usr\<SID>\sys\exe\run directory.



Place all SAP R/3 databases to be backed up in the ARCHIVE_LOG mode and enable Automatic Archival using the SAPDBA or CCMS console. For more information on how to check or perform this operation, consult the R/3 User Manual or your Oracle Server Administrator's Guide.

Note The Backup Exec R/3 Agent does not support concurrent backup or restore operations. Attempting to back up or restore the same R/3 database from more than one media server at a time causes the operations to fail.

Appendix M, VERITAS Backup Exec - Agent for R/3 for Oracle Server

1335

R/3 Agent

Use this option:

Restoring the R/3 Database ▼

To submit a backup job to Backup Exec: Note If the BACKINT interface is in unattended mode, any alert that requires a response from you causes the backup job to fail. You can start the backup job in attended mode by setting Confirm backup parameters to Yes in the Backup Database screen of SAPDBA. 1. From the SAPDBA console, select the appropriate backup option (database or archive logs). 2. Select Backup Device Type, and then select util_file for an offline database backup or select util_file_online for an online database backup. 3. Select Backup utility parameter file, and then enter the full path to the Biparam.ini file (or any other .ini file you created), including the file name. 4. Press <Enter>. 5. Verify that you have selected the correct backup type for the utility file type you specified (online, offline, etc.). 6. Start the job.

Restoring the R/3 Database You must have the appropriate privileges on both the R/3 and media servers to be able to perform both backup and restore operations. ▼

To submit a restore job to Backup Exec: 1. From the SAPDBA console, select the Restore Database option. 2. Select Restore Type, and then select the catalog that you want to restore. 3. Start the job. Note Restore jobs are automatically directed to the Backup Exec server from where the original backup was executed.

1336

Administrator’s Guide

Disaster Recovery Using the Backup Exec R/3 Agent

4. When the restore operation completes, open the SAPDBA or CCMS console, and select Check and Repair Database. 5. Select Automatic Recovery, and then follow the online prompts.

The ability to recover your R/3 database server after a catastrophic failure requires you to implement a plan of protection before a failure happens. When developing a pre-disaster plan, the following backup strategies are highly recommended and should be followed: ◆

Have at least one flat file database backup of your database and make regular offline backups using SAPDBA or CCMS (see your R/3 Database Administrator’s Guide for details)



Back up the Windows directory on the R/3 database server, making sure that you also include the Windows registry



If the structure of the database is altered, perform a full offline database backup For example, if you create a new tablespace or remove an old one, a complete offline database backup is recommended



Always include the Backint.mdb file (in the Usr\<SID>\sys\exe\run directory) in your regular flat file backups of the R/3 database server. This file correlates the R/3 catalog with the Backup Exec catalog. You must have this file in order to restore data.



Schedule full online backups of your R/3 database server regularly.

See also: “Disaster Recovery Prerequisites” on page 1338 “Recovering a Remote R/3 Database Server from a Disaster” on page 1338 “Recovering a Combination R/3 Database Server/Media Server” on page 1339

Appendix M, VERITAS Backup Exec - Agent for R/3 for Oracle Server

1337

R/3 Agent

Disaster Recovery Using the Backup Exec R/3 Agent

Disaster Recovery Using the Backup Exec R/3 Agent

Disaster Recovery Prerequisites The following backups are required in order to fully recover your R/3 database server in the event a disaster occurs. ◆

Create a FULL R/3 database server file system backup using Backup Exec. When creating this backup, include both the R/3 database directory and the Windows system directory. However, if the database must remain open, do not include the R/3 database tablespace data files in this backup.



Create a second backup containing the R/3 database tablespace data files (see your R/3 Database Administrators Guide for details).

After creating these backups, you can now recover your R/3 database server in case a disaster occurs. See also: “Backing Up Data” on page 239 “Recovering a Remote R/3 Database Server from a Disaster” on page 1338 “Recovering a Combination R/3 Database Server/Media Server” on page 1339

Recovering a Remote R/3 Database Server from a Disaster ▼

To recover a remote R/3 database server: 1. Re-install Windows on the R/3 database server. During the re-install process, install Windows into a temporary directory that you can delete after your R/3 database server is back up and running. 2. At the media server, and using the storage media containing the FULL flat file R/3 database server file system backup, restore the entire contents of the media to the R/3 database server using Backup Exec. 3. After restore completes, reboot your R/3 database server. Because the full system backup was restored, your computer should now boot using its original version of Windows. The system should now contain the original version of Windows, the Backup Exec R/3 Agent, the R/3 database minus the tablespaces, and any other files contained on the full backup media. 4. If you have a full offline R/3 database backup, restore your last full offline R/3 database backup and start your database. If you do not have a full offline database backup, skip this step and proceed to step 5. Your database is now operational.

1338

Administrator’s Guide

Disaster Recovery Using the Backup Exec R/3 Agent

5. Restore the Backint.mdb file from the latest full server backup. This file correlates the R/3 catalog with the Backup Exec catalog.

7. At the media server, run another restore operation. This time, use the Backup Exec R/3 Agent to restore the storage media containing all of the R/3 tablespace data files. 8. When the restore operation completes, open the SAPDBA or CCMS console, and select Check and Repair Database. 9. Select Automatic Recovery, and then follow the online prompts. Disaster recovery of the R/3 database server is now complete. See also: “Disaster Recovery Prerequisites” on page 1338 “Recovering a Combination R/3 Database Server/Media Server” on page 1339

Recovering a Combination R/3 Database Server/Media Server 1. Re-install Windows on the R/3 database server/media server. During the re-install process, install Windows into a temporary directory that you can delete after your R/3 database server/media server is back up and running. 2. Re-install Backup Exec. 3. Recatalog the media containing the full flat file R/3 database server file system backup, and the media containing the R/3 database tablespace data files. 4. Restore the entire contents of the media containing the full flat file server file system backup. This restores your original Windows system, along with any services required to run your R/3 database. 5. Reboot the computer after the restore operation completes. Because the full system backup was restored, your computer now boots using its original version of Windows. The system now contains the original version of Windows, the Backup Exec R/3 Agent, the R/3 database minus the tablespaces, and any other files contained on the full backup media. 6. Restore the Backint.mdb file from the latest full server backup. This file correlates the R/3 catalog with the Backup Exec catalog. Appendix M, VERITAS Backup Exec - Agent for R/3 for Oracle Server

1339

R/3 Agent

6. To bring your database up-to-date, restore your most recent online or offline R/3 database backup.

Disaster Recovery Using the Backup Exec R/3 Agent

7. Run another restore operation. This time, use the Backup Exec R/3 Agent to restore the media containing all of the R/3 tablespace data files. 8. When the restore operation completes, open the SAPDBA or CCMS console, and select Check and Repair Database. 9. Select Automatic Recovery, and then follow the online prompts. Disaster recovery of the R/3 database server is now complete. See also: “Disaster Recovery Prerequisites” on page 1338 “Recovering a Remote R/3 Database Server from a Disaster” on page 1338

1340

Administrator’s Guide

VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

N

When you are backing up the SharePoint Portal Server, the SharePoint Agent includes the following data in the backup: ◆

Microsoft Web Storage System files, which include database files, log files, and backup patch files



Microsoft Search Service (MSSearch) system resources, which include the property store, subscriptions store, full-text index files, and propagated indexes



SharePoint Portal Server configuration information, including Web Storage System configuration information, content source information, server properties, and access accounts



The Applications folder, which contains a subfolder for each workspace on the server



Shortcuts or content sources that reference the local file system



Individual documents that are contained in the workspaces

SharePoint Agent does not back up the following data: ◆

Content source crawls (a content source is a URL that SharePoint Portal Server uses as a starting point to search, or crawl, for content in documents stored outside the workspace) scheduled using Microsoft Windows 2000 Scheduled Tasks



Scheduled tasks for processing subscriptions

1341

SharePoint Agent

The SharePoint Agent enables network administrators to perform backup and restore operations on SharePoint Portal Server installations that are connected to a network. SharePoint backups can be integrated with network backups without separate administration or dedicated hardware. You can back up and restore the SharePoint Portal Server, an entire SharePoint workspace, or the individual documents that are contained in the SharePoint workspaces. If you choose to back up the individual documents, you can quickly restore them without restoring the entire SharePoint Portal Server.

Requirements for the SharePoint Agent ◆

Gatherer logs



Lotus Notes configuration information

For more information about the various types of data stored on SharePoint Portal Server, see your Microsoft SharePoint Portal Server documentation. Note SharePoint Portal Server is available only for Windows 2000. See also: “Requirements for the SharePoint Agent” on page 1342 “Installing the SharePoint Agent” on page 1343 “Backing Up a SharePoint Portal Server or Workspace” on page 1343 “Restoring SharePoint Portal Servers and SharePoint Portal Workspaces” on page 1345 “Redirecting SharePoint Portal Server Restore Jobs” on page 1347 “Disaster Recovery of a SharePoint Portal Server” on page 1351

Requirements for the SharePoint Agent The SharePoint Agent must be installed on the media server. The Backup Exec Remote Agent for Windows Servers must be installed on each remote SharePoint Portal Server that will be protected. The credentials specified by the logon account used for backing up and restoring SharePoint Portal Server data must have local administrative rights on the server where SharePoint is installed. Additionally, to backup and restore individual documents in workspaces, the account must be granted the Coordinator role in SharePoint on all folders to be accessed in the workspace. For more information on granting permissions on folders in the workspace, see your SharePoint Portal Server documentation.

1342

Administrator’s Guide

Installing the SharePoint Agent

Installing the SharePoint Agent The SharePoint Agent must be installed on the media server. If Backup Exec is not already installed, see “Installing Backup Exec” on page 43. To install the SharePoint Agent, see “Installing Backup Exec Options on a Local Server” on page 53. To install the Backup Exec for Windows Servers Remote Agent, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58.

There are no SharePoint-specific options to configure when you back up a SharePoint Portal Server. When backing up a SharePoint Portal Server, a full backup will be performed, which backs up the entire SharePoint Portal Server database and all relevant data from other dependent data stores. See also: “Creating a Manual Backup Job by Configuring Job Properties” on page 242

Backing Up Folders and Documents from a SharePoint Portal Workspace You can back up the individual documents that are contained in the SharePoint Portal Workspace, which will enable you to quickly restore individual documents without restoring the entire SharePoint Portal Server database. ▼

To back up a folder and document objects from a SharePoint Portal Workspace: 1. Start Backup Exec for Windows Servers. 2. On the navigation bar, click Backup. 3. From the Backup Selections pane, and under Local Selections, expand Microsoft SharePoint Portal Workspaces. If SharePoint Portal Server is installed remotely, expand Remote Selections. 4. Select the folders and/or documents in the workspace that you want to back up.

Appendix N, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

1343

SharePoint Agent

Backing Up a SharePoint Portal Server or Workspace

Backing Up a SharePoint Portal Server or Workspace Backup Job Properties dialog box

5. Start the backup job or select other backup options from the Properties pane. 6. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view.

1344

Administrator’s Guide

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces With the SharePoint Agent, you can restore the entire SharePoint Portal Server or, if they were backed up separately, just the individual documents that are contained in the SharePoint Portal Workspaces. You can redirect the restore of a SharePoint Portal Server to a different server than the one from which it was backed up. In addition, you can redirect the restore of SharePoint Portal Workspaces to an alternate workspace or file share.

Note SharePoint Portal Server must be installed on the target server before you can restore a SharePoint Portal Server. Caution When you restore a SharePoint Portal Server database, all SharePoint data on the target server is overwritten. See also: “Creating a Manual Restore Job by Configuring Job Properties” on page 420

Restoring a SharePoint Portal Server ▼

To restore a SharePoint Portal Server: 1. Place the media containing the data you want to restore in the storage device. 2. On the navigation bar, click Restore. 3. Navigate to and select the SharePoint Portal Server database you want to restore.

Appendix N, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

1345

SharePoint Agent

There are some limitations on what information can be restored in SharePoint Portal Workspaces. The Microsoft SharePoint Portal Workspaces interface in Backup Exec is intended to provide backup and restore of individual documents stored in the Documents subfolder for each workspace and should not be used as a substitute for SharePoint Portal Server database backup. Many of the other files and folders contained in the workspace are controlled by the SharePoint Portal Server software and may not restore successfully into the workspace even though they are available for backup. In addition, when restoring individual documents, the creation date and modification date properties do not restore.

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

4. On the Properties pane, set the appropriate options. 5. Start the restore job. 6. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view.

Restoring a SharePoint Portal Workspace ▼

To restore SharePoint Portal workspace data: 1. Place the media containing the data you want to restore in the storage device. 2. On the navigation bar, click Restore. 3. Navigate to and select the SharePoint workspace data you want to restore. 4. On the Properties pane, set the appropriate options. 5. Start the restore job. 6. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view. See also: “Backing Up Folders and Documents from a SharePoint Portal Workspace” on page 1343 “Redirecting SharePoint Portal Server Restore Jobs” on page 1347

1346

Administrator’s Guide

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

Redirecting SharePoint Portal Server Restore Jobs Before redirecting the restore of a SharePoint Portal Server database, the SharePoint Portal Server software must be installed on the target server. Caution When you restore a SharePoint Portal Server database, all SharePoint data on the target server is overwritten. ▼

To redirect a SharePoint Portal Server restore: 1. Place the media containing the data you want to restore in the storage device.

3. Navigate to and select the SharePoint Portal Server database you want to restore. 4. On the Properties pane, under Destination, click SharePoint Redirection. 5. Check the box labeled Redirect SharePoint Portal Server sets. 6. In the Restore to server field, enter the name of the SharePoint server to which you are restoring. Use the following format: \\servername. Restore Job Properties -Sharepoint Redirection

7. Use the default logon account as indicated, or click Change to select a different one.

Appendix N, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

1347

SharePoint Agent

2. On the navigation bar, click Restore.

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

8. On the Properties pane, select other job properties that might be appropriate for your environment. 9. Start the restore job. 10. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view. After the restore completes, it is recommended that you perform a full backup of the restored SharePoint Portal Server databases. See also: “Backing Up a SharePoint Portal Server or Workspace” on page 1343 “Restoring a SharePoint Portal Server” on page 1345

Redirecting SharePoint Portal Workspace Restore Jobs Before redirecting the restore of SharePoint Portal workspace data, the SharePoint Portal Server software must be installed on the target server. Caution When you restore SharePoint Portal workspace data, all documents that exist in the target location are overwritten by those being restored.

Restoring Workspace Data To Another Workspace ▼

To redirect SharePoint Portal workspace data to another workspace: 1. Place the media containing the data you want to restore in the storage device. 2. On the navigation bar, click Restore. 3. Navigate to and select the SharePoint Portal workspace data you want to restore. 4. On the Properties pane, under Destination, click SharePoint Redirection. 5. Check the box labeled Redirect SharePoint Portal document sets. 6. In the Restore to server field, enter the name of the SharePoint server to which you are restoring. Use the following format: \\servername.

1348

Administrator’s Guide

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

7. In the Restore to workspace field, enter the name of the workspace to which you are restoring. If you have not yet created the workspace, you must do so before starting the restore operation. Restore Job Properties - Sharepoint Redirection

SharePoint Agent 8. Use the default logon account as indicated, or click Change to select a different one. 9. On the Properties pane, select other job properties that might be appropriate for your environment. 10. Start the restore job. 11. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view. See also: “Backing Up Folders and Documents from a SharePoint Portal Workspace” on page 1343 “Restoring a SharePoint Portal Workspace” on page 1346

Appendix N, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

1349

Restoring SharePoint Portal Servers and SharePoint Portal Workspaces

Restoring Workspace Data to a File Path ▼

To redirect SharePoint Portal Workspace data to a file path: 1.

Place the media containing the data you want to restore in the storage device.

2. On the navigation bar, click Restore. 3. Navigate to and select the SharePoint Portal Server data you want to restore. 4. On the Properties pane, under Destination, click SharePoint Redirection. 5. Check the box labeled Redirect SharePoint Portal document sets, and then select Redirect to path. 6. Enter the drive letter and path to which you want to direct the restore in the Restore to drive and Restore to path fields, or click the ellipsis (...) button to browse to the desired location. Note You can also enter a UNC path (\\servername\share) in the Restore to drive field. Restore Job Properties - Sharepoint Redirection

7. Use the default logon account as indicated, or click Change to select a different one.

1350

Administrator’s Guide

Disaster Recovery of a SharePoint Portal Server

8. On the Properties pane, select other job properties that might be appropriate for your environment. 9. Start the restore job. 10. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view. See also: “Backing Up Folders and Documents from a SharePoint Portal Workspace” on page 1343

SharePoint Agent

“Restoring a SharePoint Portal Workspace” on page 1346

Disaster Recovery of a SharePoint Portal Server Because SharePoint Portal Server uses Windows 2000 security for authentication, disaster recovery of a SharePoint Portal Server cannot be separated from the disaster recovery of Windows 2000. If you purchased the Intelligent Disaster Recovery (IDR) option, see “VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 881 for directions on using IDR to recover a Windows 2000 server. For specific notes on using IDR with SharePoint Portal Server, see “SharePoint Portal Server Recovery Notes” on page 937. You must recover the Windows 2000 server first. For more information, see “Manual Disaster Recovery of Windows Computers” on page 558. After recovery of the Windows 2000 server is complete (after the last reboot), the SharePoint Portal Server software is installed but is not functional. You must remove SharePoint Portal Server and then reinstall it before the SharePoint data can be restored. Use the following procedures to complete the recovery of a SharePoint Portal Server and the associated SharePoint data. Always log on to the Windows 2000 server using the Administrator account (or an Administrator equivalent) during this procedure. You need: ◆

A copy of Backup Exec for Windows Servers with the SharePoint Agent installed



The latest backup of the SharePoint Portal Server you want to recover



The SharePoint Portal Server CD



Any SharePoint Portal Server service packs that were applied to the original installation

Caution You cannot completely recover a SharePoint Portal Server database using backups of individual workspaces. You must use a backup of the SharePoint Portal Server database to complete the disaster recovery. Appendix N, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server

1351

Disaster Recovery of a SharePoint Portal Server

Uninstalling and Reinstalling the SharePoint Portal Server Software ▼

To uninstall/reinstall the SharePoint Portal Server software: 1. Use Add/Remove Programs in the Windows Control Panel to uninstall the SharePoint Portal Server software. Restart the server when the uninstall operation completes. 2. Insert the SharePoint CD and install the SharePoint Portal Server software to the desired location using the appropriate options for your environment. When the New Workspace Wizard starts, click Cancel. 3. If applicable, install any SharePoint Portal Server service packs that were applied to the original installation.

Restoring SharePoint Portal Server Data ▼

To restore SharePoint Portal Server data: 1. Place the media containing the data you want to restore in the storage device. 2. On the navigation bar, click Restore. 3. Navigate to and select the SharePoint data you want to restore. 4. On the Properties pane, set the appropriate options. 5. Start the restore job. 6. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job you want to view. After the restore completes, it is recommended that you perform a full backup of the restored SharePoint Portal Server database.

1352

Administrator’s Guide

VERITAS Backup Exec - Remote Agent for NetWare Servers

O

The Backup Exec Remote Agent for NetWare Servers allows network administrators for Windows servers to perform backup and restore operations on NetWare servers that are connected to their network. The Backup Exec Remote Agent for NetWare Servers supports NetWare v4.2, NetWare v5.x, or NetWare 6.x. Because the Remote Agent for NetWare Servers is also a Client Access License (CAL), it enables you to fully protect your NetWare data and to perform accelerated backups of NetWare data. You cannot select data and special files on resources for a remote NetWare server for backup until a Remote Agent has been installed.

The Remote Agent for NetWare Servers consists of NLMs that execute Target Service Agents (TSAs) to provide backup support on the NetWare server. When the Remote Agent for NetWare Servers is installed, the most current versions of the NLMs needed by Backup Exec to process NetWare-specific requests are copied to the NetWare server.

1353

NetWare Agent

The Remote Agent for NetWare Servers is a NetWare Loadable Module (NLM) called BEREMOTE.NLM, and is installed on the NetWare server. The Remote Agent provides faster backups by locally performing tasks that in typical backup technologies require extensive network interaction. For example, instead of waiting for requests and data packets to be sent between the NetWare server and the media server each time a file is selected for backup, the Remote Agent processes backup data into continuous streams that use Novell’s Storage Management Services (SMS) and that the media server then processes as a single task. The Remote Agent is fully Novell SMS-compliant.

Requirements for the Remote Agent for NetWare Servers

Requirements for the Remote Agent for NetWare Servers The following are required to install the Remote Agent for NetWare Servers: ◆

The NetWare server on which the installation is being performed must have access to the media server.



You must be a user with admin object rights to both the directory tree and the NetWare server.



On the media server, you must run one of the following: -

Microsoft Client Services for NetWare

-

Gateway Services for NetWare

-

Novell Client for Windows NT/2000. This is required if the NetWare server is IP-only.

See also: “Maximizing Remote Agent Performance on the NetWare Server” on page 1354 “Installing the Remote Agent for NetWare Servers” on page 1355

Maximizing Remote Agent Performance on the NetWare Server When using Remote Agent on NetWare Servers 5.x or later servers, TCP/IP provides the fastest backups. You also can increase backup speed by running modified backups, such as differential and incremental. During modified backups, file selection is performed locally by the Remote Agent instead of across the network, which is the method used by traditional network backup applications. Tip

Your network hardware can have a major impact on performance. For example, an 8-bit Network Interface Card (NIC) in the server does not provide the performance of a 16- or 32-bit NIC. Bandwidth also plays a major role. For example, 100 Mbps Ethernet provides much better performance than 10 Mbps Ethernet when running concurrent remote backups.

Note When configuring 100 Mbps NICs, ensure that all of the components on the network are using the same duplex setting. Having your NIC cards at full duplex on a switch that is set to half duplex will severely impact performance.

1354

Administrator’s Guide

Installing the Remote Agent for NetWare Servers

Installing the Remote Agent for NetWare Servers When you install the Remote Agent for NetWare Servers on the NetWare server, the following occurs: ◆

A directory called BKUPEXEC is created in the selected volume, and the latest tested versions of the NLMs needed by Backup Exec to process NetWare-specific requests are copied to the BKUPEXEC/NLMS directory. Older versions of the NLMs are renamed with a .ORG extension. For example, if an older version of the TSA500.NLM file was found on the NetWare server, the installation program would rename it to TSA500.ORG and copy the newer TSA500.NLM from the installation CD. If you already have the latest tested or most recent version of the NLMs installed on your server, they are not replaced.



The BESTART.NCF and BESTOP.NCF files are created and placed in the SYS:SYSTEM directory. These files contain commands to load the appropriate NLMs that allow the NetWare server to be backed up.

If you have previously installed the Remote Agent for NetWare Servers on NetWare servers, run BESTOP from each NetWare console before installing the Remote Agent on those servers again. For instructions on installing the Remote Agent for NetWare Servers, see “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58. When Backup Exec is installed, both the TCP/IP and NetWare IPX/SPX protocols are selected for use by default. You can change the default settings through the Options-Set Application Defaults dialog box. For more information, see “Default Settings for the Remote Agent for NetWare Servers” on page 1365. See also: “Installing Backup Exec Remote Agents and Options on Remote Servers” on page 58 “Using NetWare Servers 5.x and 6.x in a TCP/IP Only Environment” on page 1356 “Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server” on page 1356

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1355

NetWare Agent

Note Backup Exec must already be installed before you can install options to remote systems. The Remote Agent for NetWare Servers is installed remotely from the Windows media server.

Installing the Remote Agent for NetWare Servers

Using NetWare Servers 5.x and 6.x in a TCP/IP Only Environment If your network is not configured to allow the use of Service Location Protocol (SLP), or if you are using Microsoft Client Services for NetWare or Gateway Services for NetWare, you must ensure the server names and IP addresses are in your network’s Domain Naming Services (DNS) database. If these names and IP addresses are not in DNS, then you must manually add the names and IP addresses to the media server’s HOSTS file, which usually is found in the Drivers\ETC subdirectory under your SYSTEM32 directory. In addition, you must manually add the server names to Backup Exec’s server list through the Options - Set Application Defaults dialog box (see “Default Settings for the Remote Agent for NetWare Servers” on page 1365).

Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server After installing the Remote Agent for NetWare Servers on the NetWare server, you should load the latest Novell patches. You can also add the BESTART command, which loads the Remote Agent for NetWare Servers whenever the server is booted, to the AUTOEXEC.NCF file. ▼

To edit the NetWare server’s AUTOEXEC.NCF file: 1. Add the command BESTART as the last line in the AUTOEXEC.NCF file so that the Remote Agent for NetWare Servers is automatically started each time the NetWare server is booted. 2. After saving the AUTOEXEC.NCF file, reboot the NetWare server in order for the changes to take effect.

1356

Administrator’s Guide

Installing the Remote Agent for NetWare Servers

Unloading the Remote Agent for NetWare Servers If you added BESTART as the last line in the AUTOEXEC.NCF file on the NetWare server, the Remote Agent for NetWare Servers is automatically loaded whenever the AUTOEXEC.NCF file is executed on the NetWare server. You can unload it by typing a command. ▼

To unload the Remote Agent: ❖

At the NetWare server’s console prompt:, type: unload beremote <Enter> or bestop <Enter> (which unloads all NLMs associated with the Agent)

You can still use the Remote Agent for NetWare Servers to back up the NetWare server when the Remote Agent is unloaded, but the speed of the backup will be significantly less.

NetWare Agent

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1357

About Backing Up NetWare Servers

About Backing Up NetWare Servers The first time you access the NetWare servers for backup, you may be prompted for a username and password. The usernames and passwords you enter to gain initial access to remote servers and workstations are kept in a password database. This database prevents you from having to type usernames and passwords each time you need to access remote devices and also allows Backup Exec to log on to servers and attach to agent workstations for unattended jobs. To back up the NetWare File System, you must have an account on the NetWare server with the following rights: Necessary rights for NFS backup To do this:

You need these rights:

Backup

Read files File scan Modify file attributes Access control

Restore

Write files Create files File scan Modify file attributes Access control

Archive

Read files File scan Modify file attributes Erase files

1358

Administrator’s Guide

About Backing Up NetWare Servers

To back up, and restore when necessary, the NDS Tree, you must have a user account on the NetWare server that has the following rights to the [Root] object of the NDS Tree: Necessary rights for NDS backup To do this:

You need these rights:

Backup/ Restore

Object rights

Property rights, All properties

Supervisor

Supervisor

Browse

Compare

Create

Read

Delete

Write

Rename

Add Self

Inheritable

Inheritable

Backing up the NetWare Directory Services (NDS) Novell strongly recommends using replication to provide the first line of protection for NDS in a multi-server installation. Additionally, the NDS database should still be backed up on a regular basis in case it is needed to replace objects that have been accidentally deleted. Note that if you have multiple servers in the NDS tree, the entire NDS can be backed up from any of those servers. There is no need to back up all of NDS from all of the NDS TSAs in the tree unless you are doing it for redundancy purposes. Depending on your environment (single-server, multi-server, single administrator, or multi-administrator), you must perform replication of partitions and backups to provide protection for NDS. Following are some backup strategies that can be applied: ◆

Single-server strategy. NDS installations that consist of a single network server must rely completely on Backup Exec for Windows Servers to provide protection for the directory database, since the built-in replication feature cannot be used. You should back up the entire NDS database whenever any type of backup (either full or modified) is performed. If the NDS database rarely changes, that is, if the objects stored within and/or their properties and values are seldom modified, then less frequent backups may be performed.

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1359

NetWare Agent

Note White check boxes for these rights will display with black check marks in the Trustees of [Root] dialog box. With default rights only, these check boxes will be gray with gray check marks.

About Backing Up NetWare Servers

As with file system backups, the administrator must consider what might be lost if a disaster occurs on the day the next full backup is to be performed. Be sure to figure in the time it will take to rebuild the changes to the directory manually, if just such a disaster were to occur. ◆

Single administrator - multiple servers strategy. NDS installations that have a single network administrator (a single object with supervisor rights to the entire directory database), and multiple servers should rely almost entirely on the built-in replication features of NDS for fault tolerance. If a disaster occurs on a specific server, NDS remains intact and available from replicas stored on other servers. When the failed server is repaired, NDS is reinstalled using Novell’s INSTALL NLM on NetWare 4.1 and NWCONFIG.NLM on NetWare 5.x and later. Replicas are then placed back onto the server, if required. The NDS database should still be backed up regularly in case it is needed to replace objects that have been accidentally deleted.



Multiple administrator strategy. NDS installations that have multiple network administrators, each with access to only a portion of the directory tree, are faced with additional challenges when designing a backup strategy. Within this type of installation, it is rare that an object has full rights to the entire directory tree, as is the case with many smaller- to medium-sized networks. Instead, the tree is logically broken into smaller components. For example, partitions with specific administrators assigned the responsibility to manage each component. While this type of installation offers the highest level of network security, it brings with it the most complicated level of disaster recovery. The best method for implementing fault tolerance should remain partition replication. Because it is likely that Inherited Rights Filters (IRFs) will be applied at the container level, a properly replicated directory offers a much quicker restoration in the event of a disaster. If possible, you should create an object that has full rights as a trustee of the root of the NDS tree, and perform full backups on the NDS tree, instead of partial backups. Doing so reduces the complexity of rebuilding NDS in the event of a disaster. You should refer to your Novell documentation for more information on configuring and managing NDS replicas and partitions.

1360

Administrator’s Guide

About Backing Up NetWare Servers

Backing Up NetWare Servers Note Backup Exec does not support backing up double-byte character sets for NetWare servers that have a double-byte code page loaded. ▼

To back up a NetWare server: 1. On the navigation bar, click Backup. Backup Selections

NetWare Agent 2. Double–click the NetWare computer icon for the NetWare server you want to back up. NetWare servers should be selected from the Novell Storage Management Services node. If they are not selected from this node, NDS objects and file attributes will not be backed up. When logging on to the NetWare server, you may need to provide a fully distinguished and typeless name, such as .admin.novell. A fully distinguished, or complete, name consists of different object types, such as common name (CN), Organizational Unit (OU) objects, and Organization (O) objects. When the abbreviations for these objects are not included as part of the object’s complete name, the naming is referred to as a typeless name. For more information about complete, partial, typeful, or typeless names, refer to your Novell NetWare documentation. Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1361

About Backing Up NetWare Servers

3. Click the checkbox preceding the volume icon to select the directories that you want to back up, or double-click the volume to select directories. NetWare File System and NetWare Directory Services (Novell Directory) are listed separately. Each directory that you want to back up must be selected. The following screen shows a NetWare server (TRINITY) that has both the file system and the NetWare Directory Services selected for backup: Backup Selections for NetWare server

4. If you want to change the Backup default, on the Properties pane, under Settings, click NetWare SMS. 5. Select or clear the Backup compressed files in decompressed form option. If you select this option, Backup Exec decompresses, or expands, compressed files as they are backed up. If you select this option, the server may run out of memory or disk space. Also, the backup job will take longer due to the extra time involved in file decompression. 6. Continue creating the job by following the procedures in “Creating a Manual Backup Job by Configuring Job Properties” on page 242.

1362

Administrator’s Guide

About Restoring NetWare Servers

About Restoring NetWare Servers Before restoring your NetWare server, you may want to read about restore operations in general in “Restoring Data” on page 411. If you have more than one server in the NDS tree, it is not necessary to restore NDS since a replica should be available from another server. The only time an NDS restore operation needs to be done is to replace objects that have been deleted accidentally. Because information about partitions and replicas would probably change between a backup of NDS and any subsequent restores, this information is not saved by SMS when a backup of NDS is performed. Thus, when NDS is backed up, it appears as though all objects are stored in a single partition. However, if information about partitions is available when the restore operation is performed, objects are restored to the proper partition.

Restoring NetWare Servers To restore files to a NetWare server: 1. On the navigation bar, click Restore. 2. Select the data you want to restore. For details on how to select data, see “Selecting Data to Restore” on page 444. 3. If you want to change the Restore option default, on the Properties pane, under Settings, click NetWare SMS. 4. Select or clear the Restore volume restriction option. If you select this option, Backup Exec restores NetWare volume restrictions. Restoring volume restrictions is not recommended unless you are performing disaster recovery. 5. (Optional) If you want to redirect the restore to another server, under Destination, click File Redirection and complete the options as described in “Files destination options” on page 453.

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1363

NetWare Agent



About Restoring NetWare Servers Restore Redirection Job Properties

If you are redirecting a restore operation, please note the following: -

Only data can be included in a redirected restore operation; NDS objects cannot be redirected.

-

Data backed up from a Novell server can be restored to a Windows NT volume; again, NDS objects cannot be redirected.

6. Complete the restore job by following the procedures described in “Creating a Manual Restore Job by Configuring Job Properties” on page 420.

1364

Administrator’s Guide

Default Settings for the Remote Agent for NetWare Servers

Default Settings for the Remote Agent for NetWare Servers By default, Backup Exec enables agents using either the TCP/IP or IPX/SPX protocols. You can change the default protocols and ensure that the correct protocol is enabled on the Options - Set Application Defaults dialog box. Also through this dialog box, you can set network defaults for all backup and restore operations performed on the NetWare servers by Backup Exec. You can override these defaults each time you create a backup or restore job. ▼

To enable the protocol on the media server: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Network. Network default options

NetWare Agent Note If using TCP/IP with a NetWare 5.x server, ensure that Enable agents using TCP/IP protocol is selected. Otherwise, select Enable agents using NetWare IPX/SPX protocol. For more information about setting default network options, see “Specifying the Default Backup Network” on page 334.

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1365

Default Settings for the Remote Agent for NetWare Servers

3. Select the protocols you want to use, then click OK. 4. ▼

Restart Backup Exec.

To change backup and restore defaults for the NetWare server: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click NetWare SMS. NetWare SMS default options

1366

Administrator’s Guide

Default Settings for the Remote Agent for NetWare Servers

3. Select the appropriate options as follows: NetWare SMS options Item

Description

General Display the following servers

Backup Exec checks the registry for a list of NetWare servers. If the list does not exist, Backup Exec creates it using the wildcard (*) default so that all servers that advertise using the Server Advertising Protocol (if IPX/SPX is being used) and the Service Location Protocol (if TCP/IP is being used) can be seen. Backup Exec displays these servers in this field. You can manually add or delete servers to or from this list. As soon as a server is added, all of the servers that were displayed from the wildcard default are deleted. Only the servers that are added display in the network resources.

To backup up a NetWare server version 4.2, you must load and bind IPX on the server and make sure that the server name is not in the NetWare server list. For these changes to take effect, you must restart the Backup Exec administration console. Backup Back up compressed files in decompressed form

Click this to decompress, or expand, compressed files as they are backed up. If you select this option, the server may run out of memory or disk space. Also, the backup job will take longer due to the extra time involved in file decompression. In most cases, this option should not be selected.

Restore Restore volume restrictions

Click this to restore NetWare volume restrictions. Restoring volume restrictions is not recommended unless you are performing a disaster recovery job.

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1367

NetWare Agent

If you are using an IP-only environment and your network is not configured to allow the use of Service Location Protocol, you must manually add the servers’ names. For more information, see “Using NetWare Servers 5.x and 6.x in a TCP/IP Only Environment” on page 1356.

Saving Configuration Information for the NetWare Server

4. To manually add a server to the server list: a. Click Add. b. Type the name of the server you want to add, and then click OK. 5. To delete a server from the server list: a. Select the server you want to delete. b. Click Delete. 6. After all servers have been added or deleted, and the NetWare SMS default options have been selected, click OK.

Saving Configuration Information for the NetWare Server Use the BEDIAG.NLM utility to create an ASCII file called BEDIAG.FAX that includes useful configuration information for your server. Keep a copy of the BEDIAG.FAX available so that if you have to contact Technical Support, you can quickly provide system configuration information. ▼

To create the BEDIAG.FAX file: 1. At the NetWare system console prompt, type: load SYS:BKUPEXEC/NLMS/BEDIAG The BEDIAG.FAX file is created. Note You can use the following options when loading BEDIAG.NLM: (for example, load bediag /c) /c - outputs the file to the screen /s - gathers information for SCSI devices only /n - exclude information for SCSI devices 2. View the BEDIAG.FAX file with a text editor or word processor. The information in this file includes:

1368

-

The contents of your CONFIG.SYS and AUTOEXEC.BAT files.

-

Contents of the STARTUP.NCF file.

-

The amount of memory available. Administrator’s Guide

Disaster Recovery of NetWare Servers

-

The contents of your AUTOEXEC.NCF file.

-

A listing of the NLMs that are currently loaded on your server, including the version numbers and the date stamp.

-

Configuration settings for your server, including volumes and individual namespace support.

3. On the print-out of the BEDIAG.FAX, write the Supervisor user and password. Note Keep this print-out locked in a safe place.

Disaster Recovery of NetWare Servers To manually recover NetWare servers if a disaster occurs, you must: Reinstall NetWare.



Reinstall the Backup Exec Remote Agent for NetWare Servers.



Use the information from BEDIAG.FAX to restore your server configuration.



Restore your latest backups.

Tip

Intelligent Disaster Recovery for NetWare is available as a separate add-on option to Backup Exec for NetWare Servers. For more information, see the Backup Exec for NetWare Servers Administrator’s Guide.

Appendix O, VERITAS Backup Exec - Remote Agent for NetWare Servers

1369

NetWare Agent



Disaster Recovery of NetWare Servers

1370

Administrator’s Guide

VERITAS Backup Exec - Tivoli Storage Manager Option

P

The Backup Exec for Windows Servers Tivoli Storage Manager (TSM) Option is installed as a separate, add-on component of Backup Exec for Windows Servers. Using the TSM Option, you can combine the speed and localized control of Backup Exec with the TSM policy-based system of centralized storage management. The TSM Option enables the TSM server’s storage resources to appear as a tape robotic library in a list of target devices on the Backup Exec server. Backup Exec administrators can then direct the output of any Backup Exec job to the TSM server by selecting the name of the TSM robotic library as the destination when submitting the job. See also: “Requirements for the TSM Option” on page 1371 “Backup Exec as a TSM Client” on page 1372 “TSM Backup Exec Components” on page 1373



Familiarity with TSM terminology and operation, and the operating system on which the server resides.



TSM versions 3.7 though 5.1



Backup Exec for Windows Servers 9.x or later installed on the media server.



TCP/IP installed on the media server.

Note The Backup Exec TSM Option does not support the following communication protocols: SPX, NetBEUI, NetBIOS or any mainframe protocols such as SNA The Tivoli Storage Manager Administrator’s Guide and Administrator’s Reference Guide may also be helpful.

1371

Tivoli Option

Requirements for the TSM Option

Backup Exec as a TSM Client Backup Exec’s TSM Option enables computers running Backup Exec for Windows Servers to become clients of a Tivoli Storage Manager server. As a TSM client, Backup Exec can use the TSM server as storage volumes for its backup jobs. To become a TSM client, each computer runs Backup Exec for Windows Servers, along with the appropriate TSM option. Note The TSM server must be prepared using the BEX.MAC macro before becoming a TSM client. TSM Example - AIX, AS/400, HP-UX, MVS, OS/390, z/OS, Sun Solaris, VM, and Windows - Tivoli Storage Manager Tivoli Storage Manager

Corporate Network

TSM client

TSM client

Windows NT 4 (SP 6a, Windows 2000, Windows XP, Windows Server 2003 Exchange Server (optional) SQL Server (optional) Backup Exec for Windows Server v9.x or later Backup Exec for Tivoli Storage Manager option

After establishing communication with the TSM Server, Backup Exec recognizes the TSM server as a virtual single tape drive robotic library and stores the contents of its backup jobs on it. Because the TSM option is implemented within Backup Exec as an add-on logical device driver, all standard robotic library features are available except LABM. You can also configure a variable number of logical media slots within the virtual tape robotic library.

1372

Administrator’s Guide

Backup Exec Architecture and the TSM Server

Backup Exec Scheduler and Job Engine

Backup Exec Device Handling Layer

Device Driver

Tape Device

Device Driver

Tape Device

Device Driver

Tape Loader

Device Driver

Virtual Tape Loader

TCP/IP Protocol

TSM Server

See also: “TSM Backup Exec Components” on page 1373 “Requirements for the TSM Option” on page 1371

To prepare the TSM server to receive and store Backup Exec jobs, a new policy domain and policy set are created for Backup Exec on the TSM server. A separate policy domain for Backup Exec is used to distinguish Backup Exec administration console data from other policy domains used by client data. Then, a storage pool and two management classes are created in the new policy domain to help manage the data sent by Backup Exec. Data sent to the TSM server by Backup Exec is contained in two data streams: ◆

The position information (PI) data stream is bound to the new management class named MC_PI. The PI data stream is directed to the newly-created, disk-based storage pool, named backupexec_pi.

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1373

Tivoli Option

TSM Backup Exec Components



Backup Exec uses the backupexec_pi storage pool to retain position information about each backup set that it sends to the TSM server’s BACKUPPOOL storage pool. Migration is turned off, and should remain off, for the backupexec_pi storage pool so that the position information for each stored file is not migrated off the disk to tape, but is always immediately available to Backup Exec. If the position information data were migrated to tape, performance in Backup Exec would be severely impaired.



The virtual tape (VT) data stream is bound to the new management class MC_VT. The VT data stream contains the actual client backup data packaged as objects. This backup data can be stored on disk or migrated to tape, disk, or RCD and is managed automatically by the TSM database.

Note The VT data stream must first be written to a disk-based storage pool, then optionally migrated to tape. Configurations in which the VT data stream is sent directly to tape are not supported. Finally, a node named Backupexec is registered on the TSM server. All of the Backup Exec media servers can share this node, with backup sessions from the servers differentiated on the TSM server by the media server’s file space name. VERITAS includes a TSM server preparation macro named BEX.MAC that automatically performs all steps necessary to prepare the TSM server. Regardless of your experience with TSM, it is extremely important that you use the instructions under Preparing the TSM Server and Running the BEX Macro to properly configure the TSM server. From the Backup Exec interface, you can direct output from Backup Exec jobs to the TSM server by selecting the name of the TSM robotic library as the destination. See also: “Preparing the TSM Server” on page 1375 “BEX.MAC Macro Command Details” on page 1383

1374

Administrator’s Guide

Preparing the TSM Server

Preparing the TSM Server This section explains the details necessary for preparing your TSM Server to accept the Backup Exec server as a TSM client. These details include: ◆

Allocating storage space using the Volume Formatting Wizard.



Creating a storage volume for the backupexec_pi storage pool.



Running the BEX.MAC preparation macro.

Note Regardless of your experience with TSM, it is extremely important to install this TSM option using both the following instructions and the included macro, BEX.MAC. The TSM command conventions used within the BEX.MAC macro file may need to be adjusted to reflect the operating system conventions your TSM server is using. See also: “Allocating Storage Space” on page 1375 “Creating The bexpi.dsm Storage Volume” on page 1376 “Running the BEX.MAC Macro” on page 1378

Allocating Storage Space

Note You must install the Backup Exec for Windows Servers TSM Option to obtain a copy of the BEX.MAC macro. During the install, the BEX.MAC macro is placed in the same directory where Backup Exec was installed. However, for the BEX.MAC macro to run correctly, you must first use the TSM DSMFMT utility to allocate space for the storage pool, backupexec_pi, used by the position information (PI) data stream. The TSM DSMFMT utility is delivered as part of the TSM server, and is used to pre-allocate the space needed when disk-based storage pools are created. For information on the DSMFMT utility parameters, see your TSM Administrator’s Reference Guide. See also: “BEX.MAC Macro Command Details” on page 1383

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1375

Tivoli Option

The high-level macro named BEX.MAC contains commands that automate the process of preparing the TSM server.

Preparing the TSM Server

Creating The bexpi.dsm Storage Volume ▼

To format a file as a storage volume for the backupexec_pi storage pool using the Volume Formatting Wizard: 1. Using the Volume Formatting Wizard, in the Storage Management interface, create a 30MB database file named bexpi.dsm, which will act as the storage volume name for the storage pool backupexec_pi. For example, if you are using TSM on the Windows NT, Windows 2000 or Windows Server 2003 platforms, and you want to format a 30MB file to be located in the root directory, select this location when using the wizard. Other paths can be used, but the other paths must be reflected in the BEX.MAC. 2. After formatting the bexpi.dsm file, edit the BEX.MAC macro to associate the backupexec_pi storage pool with the bexpi.dsm file. The macro also executes commands that complete the preparation of the TSM server. Note For the BEX.MAC macro to run correctly, the BACKUPPOOL storage pool must exist on the TSM server.



To manually format a file as a storage volume for the backupexec_pi storage pool: 1. From the command prompt on the TSM server, format a 30-MB file named bexpi.dsm as the storage volume for the storage pool backupexec_pi, by typing: [drive:][path]dsmfmt [drive:][path]bexpi.dsm 30 Note For TSM version 4.x, you must access the server command window under the Reports option.

TSM command variables Item

Description

[drive:][path]

The drive and directory location of the DSMFMT utility. The location of the DSMFMT utility may vary according to the operating system your TSM server is using.

dsmfmt

1376

Administrator’s Guide

Preparing the TSM Server TSM command variables (continued) Item

Description

[drive:][path]

The drive and directory location where you want to create the bexpi.dsm file. The DSMFMT utility specifies the bexpi.dsm file as a storage volume for the storage pool backupexec_pi.

bexpi.dsm

Important: The BEX.MAC macro looks for the bexpi.dsm file in the root or top-level directory, then associates it with the backupexec_pi storage pool. If you locate the bexpi.dsm file in a directory other than the root or top-level, you must edit the BEX.MAC macro and change the location of the bexpi.dsm file so it can be associated with the backupexec_pi storage pool. 30

Specifies that the size of the bexpi.dsm file is 30MB. (When using the Volume Formatting Wizard, this value is expressed in megabytes by default.) If you require the file to be a size other than 30MB, use the following formula to find the maximum filespace needed: (number of slots +1) x 64K = maximum space required per robotic library. Add the maximum space required for each robotic library to find the total space required by the bexpi.dsm file.

dsmfmt <path>bexpi.dsm 30 where <path> is the directory to create the file in. 2. After formatting the bexpi.dsm file, run the BEX.MAC macro to associate the backupexec_pi storage pool with the bexpi.dsm file. The macro also executes commands that complete the preparation of the TSM server. Note For the BEX.MAC macro to run correctly, the BACKUPPOOL storage pool must exist on the TSM server. See also: “BEX.MAC Macro Command Details” on page 1383

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1377

Tivoli Option

For example, if you are using TSM on the Windows NT, Windows 2000, Windows XP, or Windows Server 2003 platforms and you want to format a 30MB file to be located in the root directory, type:

Preparing the TSM Server

Running the BEX.MAC Macro Note The TSM command conventions used within the BEX.MAC macro file may need to be adjusted to reflect the operating system conventions your TSM server is using. ▼

To run the BEX.MAC Macro: 1. Using the Tivoli Server Administration tools, expand the OBJECT VIEW and then select AUTOMATION and SERVER COMMAND SCRIPTS. See your TSM administrator’s manual for details on creating Server Command Scripts. If any errors occur while the macro is executing, no changes or additions are made to the TSM server, and an error notification number appears on the final line of the server console. For information on the error code, see your TSM administrator’s reference guide. 2. If you want each Backup Exec server to have an individual node, you must register each media server, using a new node name and a new password. Included in the advantages of sharing a node between all the media servers are: -

Easy access of backup data between Backup Exec servers since each server is identified by the file space name of the server submitting the job.

-

Only one administration console and one password are required for any number of Backup Exec servers.

-

A macro, BEX.MAC, included on the TSM Option CD, that automates the association of the new storage pool, and the creation of the necessary policy domain, policy set, management classes, and node registration. With shared nodes, this macro is run once to complete preparation of the TSM server.

Disadvantages of using individual nodes for each Backup Exec server include: -

Difficult access of backup data written by other Backup Exec servers since file space names are not easily shared across nodes.

-

A unique node name and a unique password are required for each Backup Exec server.

3. After the BEX.MAC macro completes with no errors, enable Backup Exec to run with TSM. Refer to “Enabling TSM Support” on page 1379.

1378

Administrator’s Guide

Enabling TSM Support

Enabling TSM Support To install and configure the TSM Option on a Windows computer, see “Installing Backup Exec Options on a Local Server” on page 53. Note During the installation, you will need to know both the TSM server’s IP and port address settings. See also: “Changing the Defaults for Backup Exec for Windows Servers” on page 1379 “Preparing the TSM Server” on page 1375

Changing the Defaults for Backup Exec for Windows Servers When the Backup Exec media server sends backup data to the TSM server, the management class names, node names and passwords used on the two servers must match. If the values on the TSM server do not match the values in the Backup Exec registry key, the TSM Option will not work. When the TSM Option is installed, the BEX.MAC macro contains the same default names that are in the Backup Exec server registry key: HKEY_LOCAL_MACHINE/SOFTWARE/VERITAS/BACKUP EXEC/ADSM

If you do not use the BEX.MAC macro to prepare the TSM server, or if you register a node manually, either use the same values that are in the registry key, or change the registry key values to match whatever values you enter on the TSM server. After you make changes in the registry key, stop and restart the Backup Exec services. The following screen shows the registry key. The values appear in hexadecimal format.

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1379

Tivoli Option

If you change default names in the BEX.MAC macro, you must make the same changes on the Backup Exec server by editing fields in the registry key.

Changing the Defaults for Backup Exec for Windows Servers Registry Key Values For The TSM Option

Following is a description of the values in the registry key that can be changed. The values are given as decimal values: Registry Key Values Item

Description

CommTimeout:

This value must match the Communications Timeout entry in the DSMSERV.OPT file on the TSM server. Minimum: 1 second Maximum: 65535 seconds, Default: 60 seconds If the If closed with X seconds setting is selected in Backup Exec, (under Advanced node in the Backup Job Properties pane) its value should not exceed the Communications Timeout setting on the IBM TSM server. If the time-out value does exceed the TSM CommTimeout value, backups may fail with an I/O device error indicated for the TSM drive. The TSM CommTimeout value must be coordinated with the CommTimeout value on the TSM server, as described in the TSM installation documentation.

1380

Administrator’s Guide

Changing the Defaults for Backup Exec for Windows Servers Registry Key Values (continued) Item

Description

Enabled:

Enables or disables TSM support. When this field is set to 0, TSM is disabled. Default: 1 (on)

FileSpaceName:

Changes the file space name of a media server for which you want to view or restore data. By default, the machine name is used as the file space name. Multiple Backup Exec servers can send backup data to the TSM server. If the media servers are sharing a node, which is the default, the TSM server uses the server’s file space name to distinguish backup sessions. To be able to view or access backup data, you must use the same file space name that was used when the data was sent to the TSM server. For example, if you backed up data to the TSM server using the media server with the file space name of ACCT, but you are now on a media server with the file space name of PUBS, you can view or restore the backup data from ACCT by changing the file space name on PUBS to ACCT and cataloging the tapes/slots you want to view. Maximum length: 1023 characters Default: MachineName Sets the number of slots you can define in any given magazine Minimum: 1 slot, Maximum: 255 slots Default: 10 slots

NodeName:

Sets the name of the node used to communicate with the TSM server. This name must match the node name registered for Backup Exec on the TSM server. Maximum length: 63 characters, Default: BackupExec

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1381

Tivoli Option

LoaderSlots:

Changing the Defaults for Backup Exec for Windows Servers Registry Key Values (continued) Item

Description

ObjectMegSize:

When Backup Exec sends data to the TSM server, it sends the data in blocks. For example, 50MB of data is sent to the TSM server in five 10MB blocks. This key is used to change the default block size. You may want to change the block size from the 10MB default according to your system performance. A recommendation is to set the object size to 1/100 of the available space in the BACKUPPOOL storage pool, if more than 100 MB are available in that pool. An indication that the object size is too large, or that the TSM server is running out of storage space, is if the following errors appear in the Event Log: 7106: Storage device “TSM Storage” reports an error on a request to write a file mark to media. The error reported is “Hardware failure.” 14000: An error occurs while processing an TSM command, “ANS4311E (RC11) Server out of data storage space,” and “ANSO2661 (RC2302) The dsmEndTxn vote is ABORT.” Check the reason field. Minimum: 0MB, Maximum: 3096MB, Default: 10MB

PI_MgmtClass:

Sets the name of the position information management class. This name must match the PI management class name on the TSM server. Maximum length: 29 characters, Default: MC_PI.

Platform:

Used to further identify a session on the TSM Client Console Monitor. Maximum length: 15 characters, Default: MachineName_01

VT_MgmtClass:

Sets the name of the virtual tape management class. This name must match the VT management class name on the TSM server. Maximum length: 29 characters, Default: MC_VT.

See also: “Changing Passwords” on page 1383

1382

Administrator’s Guide

BEX.MAC Macro Command Details

Changing Passwords To change the password for TSM on a Backup Exec server, run ADSMCFG.EXE, found in the Backup Exec program directory. For example: C:\PROGRAM FILES\VERITAS\BACKUP EXEC\NT. You are prompted to enter a new password, and then to re-enter it to confirm it. You must make the same password change on the TSM server or you will receive an authentication failure error when the next Backup Exec session starts. On a shared node, if the password is changed for one Backup Exec server, it must be changed for all servers sharing that node. The TSM server automatically expires node passwords after a specified amount of time. When the password expires, Backup Exec instructs the TSM server to reuse the previous password.

BEX.MAC Macro Command Details The high-level macro BEX.MAC automates the process of preparing the TSM server to run with Backup Exec. By using the BEX.MAC macro, you can save time and prevent errors. In brief, the macro: Associates the storage pool backupexec_pi with the storage volume file bexpi.dsm.



Creates a new policy domain named VERITAS.



Creates a new policy set in the VERITAS domain named bex_backup.



Creates a management class named MC_PI.



Creates a management class named MC_VT, and modifies it to be the default management class for the policy set bex_backup.



Creates a backup copy group (inside the MC_PI management class) with a destination pointing to the backupexec_pi storage pool.



Creates a backup copy group (inside the MC_VT management class) with a destination pointing to the TSM server’s BACKUPPOOL storage pool.



Activates all the changes and additions.



Registers a node on the TSM server named backupexec with a password of bex.

Note If you change any of the default names used in the BEX.MAC macro, you must make the same changes on the Backup Exec server.

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1383

Tivoli Option



BEX.MAC Macro Command Details

The following table describes the BEX.MAC macro commands: BEX.MAC macro commands Item

Description

define stgpool backupexec_pi disk

Creates a storage pool named backupexec_pi using the disk device class without migration capabilities. Backup Exec uses the backupexec_pi storage pool to store information about each file that it backs up and stores in the TSM server’s BACKUPPOOL storage pool. Migration is turned off for the backupexec_pi storage pool so that the information in backupexec_pi will always be immediately available to Backup Exec. If the position information data in backupexec_pi were migrated to tape, performance in Backup Exec would be adversely affected.

1384

define volume backupexec_pi c:\bexpi.dsm access = READWrite

Associates the file c:\bexpi.dsm with the storage pool named backupexec_pi.

define domain VERITAS

Creates a policy domain named VERITAS.

define policyset VERITAS bex_backup

Creates a policy set in the domain VERITAS named bex_backup.

define mgmtclass VERITAS bex_backup MC_PI SPACEMGTECHnique = NONE

Creates a management class named MC_PI for the policy set bex_backup in the domain VERITAS with space management disabled. The MC_PI management class acts like a map for all the backup data files that are stored on the TSM server. It is written to and read from by Backup Exec during almost every operation.

define mgmtclass VERITAS bex_backup MC_VT SPACEMGTECHnique = NONE

Creates a management class called MC_VT for the policy set bex_backup in the domain VERITAS. This class is where the bulk of the data being backed up resides.

assign defmgmtclass VERITAS bex_backup MC_VT

Modifies the management class MC_VT to be the default management class.

Backup Exec stores its data on the TSM server in chunks called objects. By default, the object size is 10MB, but the size can be changed. For details on how to change the object size, and when it might be necessary, see “Changing the Defaults for Backup Exec for Windows Servers” on page 1379.

Administrator’s Guide

BEX.MAC Macro Command Details BEX.MAC macro commands (continued) Item

Description

define copygroup VERITAS bex_backup mc_pi DESTination = backupexec_pi VERExists = 1 VERDeleted = 0 RETExtra = 0 RETOnly = NOLimit

Creates a backup copy group with a destination pointing to the backupexec_pi storage pool.

define copygroup VERITAS bex_backup mc_vt DESTination = BACKUPPOOL VERExists = 1 VERDeleted = 0 RETExtra = 0 RETOnly = NOLimit

Creates a backup copy group for the VT data stream with a destination pointing to the TSM server’s BACKUPPOOL storage pool.

The number of backup versions to keep is set to one because Backup Exec only recognizes one copy of backup data. Because Backup Exec does not use the Length of Time To Retain Only Backup Version feature, it is set to No Limit.

Note The VT data stream must first be written to a disk-based storage pool, then optionally migrated to tape. Configurations in which the VT data stream is sent directly to tape are not supported.

activate policyset VERITAS Activates all the previously listed additions/modifications. bex_backup REGister Node backupexec bex DOMain = VERITAS BACKDELETE = YES

Registers a node on the TSM server called backupexec with a password of bex, using the policy domain called VERITAS, and allowing the deletion of file spaces.

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1385

Tivoli Option

If you are using individual nodes for each Backup Exec server, you can use this node registration for one server. You must manually register all other servers using a unique node name and password, and using the policy domain VERITAS. You must also change the default names on the Backup Exec server to match the new node registration. See “Changing the Defaults for Backup Exec for Windows Servers” on page 1379.

Troubleshooting

Troubleshooting If the TSM server and the Backup Exec server cannot communicate after the TSM Option has been installed, check the following: ◆

Are all the necessary API and OPT files copied to the correct locations?



Does the DSM.OPT file have the correct TCP/IP address and port number entered?



Can you ping the TSM server’s TCP/IP address? If you cannot ping the server, the support will not work.

See also: “TSM Problem Resolutions for Backup Exec for Windows Servers” on page 1387

Viewing TSM-related Errors To view TSM-related errors in Backup Exec for Windows Servers, look in the application log in the Windows event viewer. The DSIERROR.LOG file is located in the directory from which Backup Exec runs. If the IBM client is loaded, you can also view error codes listed in a file named DSMRC.H, located in the TSM API client directory, \ADSM32\API\INCLUDE. The TSM API code also creates an error log file called DSIERROR.LOG. This file can also contain information useful for isolating any TSM-related problems when using Backup Exec. See also: “TSM Problem Resolutions for Backup Exec for Windows Servers” on page 1387

1386

Administrator’s Guide

Viewing TSM-related Errors

TSM Problem Resolutions for Backup Exec for Windows Servers Item: TSM Tape and Robotic Library Devices do not appear in the Devices view. 1. Verify the Registry entries for TSM Tape and Robotic Library Devices: HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\ADAMM\Scsi\Scsi Port xx\Scsi Bus x\Target Id x\... Logical Unit Id 0 DeviceName: REG_SZ: MediumChanger40 Identifier: REG_SZ: ADSM Changer Device Type: REG_SZ: MediumChangerPeripheral Logical Unit Id 1 DeviceName: REG_SZ: Tape41 Identifier: REG_SZ: ADSM Tape Device Type: REG_SZ: TapePeripheral 2. Verify that TSM is enabled in the Registry: HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\Backup Exec\ADSM Enabled: REG_DWORD: 0x1 You may need to restart the Backup Exec services for the changes to take effect.

4. Click Start.

Item: Hardware Error Detected message box says, “No storage device has been detected…”. The Windows Event Viewer will contain an entry under Application Log.

Appendix P, VERITAS Backup Exec - Tivoli Storage Manager Option

1387

Tivoli Option

3. To restart the services, go to Control Panel - Settings. Select the Backup Exec services, and then click Stop.

Viewing TSM-related Errors

Possible error messages and corrective actions for this problem are listed in the following table: TSM Troubleshooting Guide Error Message

Corrective Action

An error occurred while attempting to load the IBM ADSM32.DLL. The files ADSM32.DLL, BLKHOOK.DLL, DSCAMENG.TXT and DSM.OPT must reside in the same directory as Backup Exec.

Verify that these files are present.

An error occurred while processing a TSM command. (610)

The file DSCAMENG.TXT is missing.

An error occurred while processing a TSM command. Options file not found.

The file DSM.OPT is missing.

An error occurred while processing a TSM command. Session rejected: TCP/IP connection failure.

Verify that TCP/IP is installed properly. Ensure the DSM.OPT entry for TCPServeraddress points to a valid TSM server.

An error occurred while processing a TSM command. Session rejected: Unknown or incorrect ID entered.

Ensure that the Backup Exec node exists on the TSM server.

Item: If the object size is set too large, or the TSM server is running out of storage space, the following errors appear in the Event Log:

1388



7106: Storage device “TSM Storage” reports an error on a request to write a file mark to media. The error reported is “Hardware failure.”



14000: An error occurs while processing a TSM command, “ANS4311E (RC11) Server out of data storage space,” and “ANSO2661 (RC2302) The dsmEndTxn vote is ABORT.” Check the reason field.

Administrator’s Guide

Q

Accessibility and Backup Exec VERITAS products meet federal accessibility requirements for software as defined in Section 508 of the Rehabilitation Act: ◆

http://www.access-board.gov/508.htm

Keyboard shortcuts are available for all major graphical user interface (GUI) operations and menu items. VERITAS products are compatible with operating system accessibility settings as well as a variety of assistive technologies. All manuals also are provided as accessible PDF files, and the online help is provided as HTML displayed in a compliant viewer. The following topics detail accessibility features and compliance in Backup Exec: ◆

“Keyboard Navigation and Shortcuts in Backup Exec 9.1” on page 1390



“General Keyboard Navigation Within the GUI” on page 1390



“Keyboard Navigation Within Dialog Boxes” on page 1390



“Keyboard Shortcuts” on page 1392



“Support for Accessibility Settings” on page 1395

Accessibility

1389

Keyboard Navigation and Shortcuts in Backup Exec 9.1

Keyboard Navigation and Shortcuts in Backup Exec 9.1 All program functions and menu items are accessible using the keyboard exclusively. Backup Exec uses standard operating system navigation keys and keyboard shortcuts. For its unique functions, Backup Exec uses its own keyboard shortcuts, which are documented “Keyboard Navigation and Shortcuts in Backup Exec 9.1” on page 1390. To see a table of the standard Microsoft navigation keys and keyboard shortcuts, select your version of Microsoft Windows from the drop-down listbox at: ◆

http://www.microsoft.com/enable/products/keyboard/keyboardsearch.asp

General Keyboard Navigation Within the GUI You can navigate and use Backup Exec with only the keyboard. In the GUI, the current active tree or table has a dark blue highlight, and the current active tab, radio button, or checkbox is enclosed within a rectangle formed by dotted lines. These areas are said to have focus and will respond to commands. All VERITAS GUIs use the following keyboard navigation standards: ◆

Tab moves the focus to the next active area, field, or control, following a preset sequence. Shift+Tab moves the focus in the reverse direction through the sequence.



Ctrl+Tab exits any Console area that you internally navigate with Tab.



Up and Down arrow keys move focus up and down the items of a list.



Alt in combination with the underlined mnemonic letter for a field or command button shifts the focus to that field or button.



Either Enter or the Spacebar activates your selection. For example, after pressing Tab to select Next in a wizard panel, press the Spacebar to display the next screen.

Keyboard Navigation Within Dialog Boxes Dialog boxes contain groups of controls necessary to set options or settings for programs. Here are some general rules about dialog box navigation:

1390



Tab moves focus between controls within the dialog box along a preset sequence.



Controls displaying a mnemonic (an underlined letter) can be selected regardless of focus by typing Alt and the underlined letter.



A dark border indicates the default command button. Press Enter at any time to choose the button with a dark border.



Esc chooses the Cancel button if one exists.

Administrator’s Guide

Keyboard Navigation and Shortcuts in Backup Exec 9.1 ◆

Spacebar chooses a control you select with Tab.



Spacebar changes the state of a checkbox or radio button that has focus. Typing a mnemonic (if one is available) will move the focus to the checkbox or radio button and change its state.



Arrow keys move focus within listboxes, sliders, groups of option controls, or groups of page tabs.



Items that cannot be changed are not visited by the Tab key sequence. Options that are unavailable are grayed-out and can neither be selected nor given focus.

While the controls described here are typically found in dialog boxes, they also can occur in other contexts. The same navigation standards will apply.

Tabbed Dialog Boxes Some dialog boxes use tabbed pages to subcategorize groups of many options. Each tabbed page contains different groups of controls. Use Tab to move the focus between tabs within a dialog box. Typing the mnemonic for a tab also moves the focus to the tab and displays its page of controls. The following table lists keyboard navigation rules within tabbed dialog boxes: Keyboard Navigation within Tabbed Dialog Boxes Keyboard input Result Ctrl+Page Down Switches to the next tab and displays the page or Ctrl+Tab Switches to the previous tab and displays the page

Right arrow or Left arrow

When the focus is on a tab selector, chooses the next or previous tab in the current row and displays the page

Down arrow or Up arrow

If there are two or more rows of tabs, chooses the tab in the next or previous row and displays the page

Appendix Q, Accessibility and Backup Exec

1391

Accessibility

Ctrl+Page Up

Keyboard Navigation and Shortcuts in Backup Exec 9.1

Listboxes Listboxes display a column of available choices. There are different kinds of listboxes with additional navigation conventions: ◆

Drop-down listboxes by default show only the selected item. A small button to the right of the control shows a downward-pointing arrow. Select the arrow to display more items from the listbox. If there are more choices than can fit in the preset listbox area, a slider appears along the side of the listbox. Show or hide the list using Alt+Down arrow, Alt+Up arrow, or F4. Spacebar selects or deselects an item.



Extended selection listboxes support selecting single items, blocks of items, or combinations of the two. After selecting an item, hold down Shift+ or Ctrl+navigation keys to select or deselect additional items or blocks of items.

Keyboard Shortcuts All menu items can be selected by using accelerator or mnemonic keyboard shortcuts. An accelerator is a key combination that provides shortcut access to a GUI function. A mnemonic (sometimes referred to as a “hot key”) is a single-key equivalent (used in combination with the Alt key) for selecting GUI components such as menu items. The mnemonic “hot key” letter is underlined in the GUI. Routine functions such as opening, saving, and printing files can be performed using the standard Microsoft keyboard shortcuts. Other menu items are unique to Backup Exec. The following table lists the keyboard shortcuts unique to Backup Exec: Keyboard Shortcuts Unique to Backup Exec Backup Exec Accelerator

Backup Exec Mnemonic

Result

Alt

F

The File menu expands. From the File menu, you can create new jobs, devices and media, print selected items, view properties, or exit Backup Exec.

Alt

E

The Edit menu expands. From the Edit menu, you can rename, delete, and select items. In addition, you can work with selection lists and search catalogs.

Alt

V

The View menu expands. From the View menu, you can change the information that displays on the screen. The

options on the View menu change according to which item is selected on the navigation bar.

1392

Administrator’s Guide

Keyboard Navigation and Shortcuts in Backup Exec 9.1 Keyboard Shortcuts Unique to Backup Exec (continued) Backup Exec Accelerator

Backup Exec Mnemonic

Result

Alt

N

The Network menu expands. Use the Network menu to work with Backup Exec logon accounts, connect to media servers on the network, or to reconnect to a local media server.

Alt

T

The Tools menu expands. The Tools menu provides many important options for working with Backup Exec, including starting and stopping services, using device and media operations, using Wizards, and setting default options.

Alt

W

The Window menu expands. Use the Window menu to move to a new window or view.

Alt

H

The Help menu expands. Use the Help menu to access Backup Exec documentation and various VERITAS web sites.

Select secondary menu items by opening the main menu and using the Up or Down arrow key until the desired item is highlighted. Press the Right arrow key to open a submenu, and Enter to select your choice. Keyboard shortcuts are not case-sensitive. Mnemonic keystrokes may be pressed either sequentially or simultaneously. All menu items have mnemonics, but not all menu items have accelerators. The following table lists the shortcut keys in Backup Exec Utility.: Keyboard Shortcuts Unique to Backup Exec Utility Backup Exec Mnemonic

Result

Alt

F

The File menu expands. From the File menu, you can create new media servers and media server groups, view properties, or exit Backup Exec Utility.

Alt

E

The Edit menu expands. From the Edit menu, you can

rename, delete, and select items Alt

V

Appendix Q, Accessibility and Backup Exec

The View menu expands. From the View menu, you can change the information that displays on the screen.

1393

Accessibility

Backup Exec Accelerator

Keyboard Navigation and Shortcuts in Backup Exec 9.1 Keyboard Shortcuts Unique to Backup Exec Utility (continued) Backup Exec Accelerator

Backup Exec Mnemonic

Result

Alt

H

The Help menu expands. Use the Help menu to access Backup Exec documentation and various VERITAS web sites.

The following table lists the shortcut keys in the Backup Exec Desktop and Laptop Option Administration Console: Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Administration Console

1394

Backup Exec Accelerator

Backup Exec Mnemonic

Result

Alt

F

The File menu expands. From the File menu, you can create new Profiles and Storage Locations, and add users.

Alt

E

The Edit menu expands. From the Edit menu, you can restore files, search for files to restore, manage alerts, and delete items.

Alt

V

The View menu expands. From the View menu, you can change the information that displays on the screen.

Alt

N

The Network menu expands. Use the Network menu to work with administrator accounts, connect to media servers on the network, or to reconnect to a local media server.

Alt

T

The Tools menu expands. Use the Tools menu to set global excludes.

Alt

W

The Window menu expands. Use the Windowmenu to move to a new window or view.

Alt

H

The Help menu expands. Use the Help menu to access Backup Exec documentation and various VERITAS web sites.

Administrator’s Guide

Support for Accessibility Settings

The following table lists the shortcut keys in the Backup Exec Desktop and Laptop Option Desktop Agent: Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Desktop Agent Backup Exec Accelerator

Backup Exec Mnemonic

Alt

F

Result

The File menu expands. From the File menu, you can

minimize or exit the Desktop Agent. Alt

V

Alt

K

The View menu expands. From the View menu, you can change the information that displays on the screen. The Tasks menu expands. Use the Tasks menu to run a job

or refresh the view. Alt

O

The Tools menu expands. Use the Tools menu to reset dialog boxes and accounts.

Alt

H

The Help menu expands. Use the Help menu to access the online help for the Desktop Agent

Support for Accessibility Settings VERITAS software responds to operating system accessibility settings. VERITAS products are compatible with Microsoft's accessibility utilities. In Windows 2000, accessibility options involving keyboard responsiveness, display contrast, alert sounds, and mouse operation can be set through the Control Panel. ▼

To set accessibility options:

2. Select Accessibility Options. Note You can also set accessibility options through the Accessibility Wizard. On the Start menu, select Programs, and then select Accessories. Select Accessibility, and then select Accessibility Wizard. Note Though all graphics in VERITAS documentation can be read by screen readers, setting your screen reader to ignore graphics may improve performance.

Appendix Q, Accessibility and Backup Exec

1395

Accessibility

1. On the Start menu, select Settings, and then select Control Panel.

Support for Accessibility Settings

1396

Administrator’s Guide

Glossary ADAMM Advanced Device and Media Management, Backup Exec’s database that automates the tracking of media and storage devices and ensuring that backups are written to the appropriate media. Administration Console The user interface that allows you to run Backup Exec operations. The user interface can be run from the media server or a remote system. Agent A component that allows workstations or other servers, for example your SQL server, to interact with the Backup Exec server. Alert An event that usually requires some form of user interaction or acknowledgment. Alert Category One of 35 classes or groups used by Backup Exec in which an alert fits. Examples of alert categories include job success, install warning, and database maintenance failure. Alert Source One of four areas that can generate an alert. Alert sources include job, media, device, and system. Alert Type Determined by the severity of the alert, an alert type has a corresponding colored icon. Backup Exec recognizes four types of alerts: Error, Warnings, Information, and Attention Required.

Glossary

Allocated Media Media that belongs to a user media set. 1397

Append Period The length of time that data may be added to the media. The append period starts when the first backup job is written to this media. Archive - Delete files after successful copy backup One of the available backup methods. Backs up selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise, data will be backed up but not deleted. Archive Bit A file attribute that is set whenever a file is modified. For full and incremental backups that use archive bits, this bit is turned off after the backup completes, indicating to the system that the file has been backed up. If the file is changed again before the next incremental or full backup, the bit will be turned on and Backup Exec will back up the file. Backup A process where files on a server or workstation drive are copied and stored on a reliable form of media. Backup Exec Service Account A user account configured for Backup Exec’s system services that contains a user name and password and provides the rights to log on as a service and act as a Backup Exec administrator. Backup Folder A virtual device that Backup Exec treats as any real tape device. Backup folders can be part of drive pools, but not cascaded drive pools, and are created using Backup Exec’s backup-to-disk feature. Backup Job Template Attributes that define how and when Backup Exec processes a backup job. Templates specify the device, settings, and schedule options to use, but do not include the resource selections to be used for the backup job. Backup Method When you run a backup, you can specify how you want Backup Exec to use and set the file’s backup status. This is necessary when you incorporate a backup strategy. Backup Exec uses the following backup methods: FULL - Back Up Files - Reset Archive Bit. Backs up all selected data on a volume and resets the archive bit to indicate that the files have been backed up. 1398

COPY - Back Up Files. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset. DIFFERENTIAL - Changed Files. Includes all files that have been changed (based on archive bit) since the last full or incremental backup, and does not affect any media rotation scheme because the archive bit is not reset. INCREMENTAL - Changed Files - Reset Archive Bit. Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up. FULL - Back Up Files - Allow incrementals and differentials using modified time. Includes all of the selected data on a volume and allows the use of incrementals and differentials using the modified date and time stamp. DIFFERENTIAL - Using modified time. Includes all files since last full backup using the files’ last modified date and time stamp. INCREMENTAL - Using modified time. Includes all files that have changed since the last full or incremental backup using the files’ last modified date and time stamp. DAILY - Files that Changed Today. Backs up files that were created or modified today. WORKING SET - All files last accessed in (x) days. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate that you want to include data that has been accessed in a specific number of days. ARCHIVE - Deletes files after successful copy backup. Backs up all selected files, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise, data will be backed up but not deleted. Backup Set When a backup job is run, the data selected from a single resource, such as a Microsoft Exchange dataset, for the backup is placed together on media in a backup set. Files selected from multiple resources create multiple backup sets. Backup Strategy The procedures you implement for backing up your network. A good backup strategy allows minimal time to get a system up and running in the event of a disaster.

Glossary

Glossary

1399

Cascaded Drive Pool The grouping of drives of the same drive type so they appear logically as one drive. This grouping allows backups that exceed the capacity of media in one drive to automatically continue on the next drive defined in the group. Catalog A database for keeping track of the contents of media created during a backup or archive operation. You can only restore information from fully cataloged media. Cluster When two or four servers (called nodes) are linked in a network, and run cluster software that allows each node access to the shared disks. Copy Backup One of the available backup methods. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset. Daily Backup One of the available backup methods. Backs up files that were created or modified today. Database Server In a shared storage environment, the server in which the shared Advanced Device and Media Management (ADAMM) database and the shared catalog resides. Differential - Changed Files Backup One of the available backup methods. Includes all files that have been changed (based on archive bit) since the last full or incremental backup, and does not affect any media rotation scheme because the archive bit is not reset. Differential - Using Modified Time Backup One of the available backup methods. Includes all files since the last full backup using the files’ last modified date and time stamp. Drive Pool A grouping of drives for Backup Exec operations. In a non-cascaded drive pool, jobs assigned to the drive pool are run on the first available drive. Event Action that occurs during a Backup Exec operation. For example, the canceling of a job.

1400

Failover When a node in a cluster becomes unavailable and cluster resources migrate to an available node. Fibre Channel A high speed storage network that can operate over copper wire or optical fiber and may support simultaneous transfer of many different data protocols, including SCSI, IPI, HiPPI, IP, and ATM. Fibre Channel Arbitrated Loop (FC-AL) A fibre channel configuration in which the devices are connected in a loop using a fibre channel hub. The bandwidth of the fibre channel is shared between the devices. Fibre Channel Hub A networking device used to connect the components of a Fibre Channel Arbitrated Loop (FC-AL). Fibre Channel Switch A networking device used to connect the components of a Fibre Channel Switched Fabric (FC-SW). Fibre Channel Switched Fabric (FC-SW) A fibre channel configuration in which the devices are connected in a network using a fibre channel switch. The full bandwidth of the fibre channel is available to all the devices. Fibre Channel Tape Controller Compaq’s Fibre to SCSI Bridge. Fibre to SCSI Bridge A device that connects a Fibre Channel and a SCSI bus. Full - Back Up Files - Allows incrementals and differentials using modified time Backup One of the available backup methods. Includes all of the selected data on a volume and allows the use of incrementals and differentials using the modified date and time stamp. Full - Back Up Files - Reset Archive Bit Backup

Glossary

1401

Glossary

One of the available backup methods. Backs up all selected data on a volume and resets the archive bit to indicate that the files have been backed up.

Hub A connecting device in a network that joins communication lines together. Imported Media Media created by a product other than this installation of Backup Exec. Incremental - Changed Files - Reset Archive Bit Backup Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up Incremental - Using modified time Backup Includes all files that have changed since the last full or incremental backup using the files’ last modified date and time stamp. Job An operation that has been scheduled for processing by the media server. For example, if you make selections and submit a backup based on those selections, you have created a backup job. Jobs contain source or destination information, settings, and a schedule. Types of jobs include backup, restore, media rotation, resource discovery, report, test run, and utility jobs. Job Audit Log A running history of all user actions performed on jobs in the Backup Exec system. An entry into the log is created each time a job is modified by the user. Job History A report of what happened during the processing of the job (statistics, errors, and so on). Job Log Created when a job runs, the job log contains the results from the job. You can review the job log to review job errors and details. Local Device A disk or tape drive connected to a server and only available to the server to which it is attached.

1402

Media ID A unique internal label assigned by Backup Exec to individual media and used to keep statistics on each media. The media ID, unlike the media label, cannot be erased or changed. Media Label Used to identify media, the label can be assigned automatically by Backup Exec or you can specify a label prefix and number to be assigned for a type of media. If the media was first used in a library with a bar code reader, the media label will consist of a pre-assigned bar code label. Media Location Location of your media. In Backup Exec, there are three categories available for tracking media: Online location. The online location lists media that reside in a storage device, robotic library slot, or backup-to-disk folder. It is defined by Backup Exec, so you cannot delete or rename it. In addition, you cannot add media to it. Offline location. The offline location displays all media that are onsite but are not in drives or slots, or media vaults. Media are automatically moved to this location if you use Backup Exec to remove media from a device or slot. User-defined media vault. A logical representation of the actual physical location of media. Media Overwrite Protection Level Set system-wide through the Media Overwrite dialog box, this option allows you to protect all, some, or no media from being automatically overwritten. Media Rotation A strategy that determines when media can be reused, or rotated back into use, by Backup Exec. Media Server The Windows server where Backup Exec was installed and the Backup Exec services are running. Media Set

Glossary

1403

Glossary

A group of media on which a backup job is targeted. The media set controls the overwrite protection period, the length of time that data is retained on a specific media before being overwritten, and the append period, the length of time that data can be appended to a media assigned to a media set.

Media Vault A logical representation of the actual physical location of media. Node Servers operating in a cluster environment. A node can also be a selection in a tree view on the administration console (see “Using the Administration Console” on page 82). Overwrite Protection Period The length of time that data is retained on a specific media before being overwritten (unless the media is erased, formatted, moved to scratch media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period is measured from the last time data was appended to the media. Partition A grouping of slots in a robotic library for use in Backup Exec operations. Recyclable Media Media that is assigned to a media set but has expired data overwrite protection periods. Remote Administrator The Backup Exec user interface (administration console) run on remote computers. Remote Agent A Backup Exec system service that runs on Windows or NetWare remote servers and workstations and allows remote backup and restore of these systems and provides increased backup throughput. Resource Data files and databases, such as Windows shares and Microsoft SQL databases, that can be selected for backing up.

Resource Discovery A Backup Exec operation that allows detection of new backup resources within a Windows domain. Restore A process by which data that has been backed up to media is returned to disk.

1404

Retired Media Media that has been taken out of service, usually because of an excessive number of errors. Media that is retired is available for restore but backups will not run to it. Media must be retired before it can be deleted. If you want to use media that has been deleted, Backup Exec will recognize it as imported media. It must be cataloged before you can restore from it. Robotic Library A high-capacity data storage system for storing, retrieving, reading, and writing multiple magnetic tape cartridges. It contains storage racks for holding the cartridges and a robotic mechanism for moving the cartridge to the drive or drives. Scratch Media Media that do not belong to a media set and can be overwritten, including new or blank media, erased media, and media moved from another group to scratch media. SCSI Small Computer System Interface. A processor-independent standard for system level interfacing between a computer and peripheral devices such as printers, hard drives, and CD-ROMs. Selection List The data selected to be backed up or restored. Selection lists can be save and used for multiple jobs. Shared Device A disk or tape drive that can be accessed by multiple servers. Silent Mode Installation The process of installing Backup Exec from the command line using the setup.exe program on the Backup Exec installation CD. Static Volume A point in time view of a volume. System Media

Glossary

1405

Glossary

All media that has been introduced into the Backup Exec system, except those media that have been assigned to a media set.

Wizard A series of instructional dialogs that guide you through the steps needed to accomplish a task, such as creating a backup job. Working Set Backup One of the available backup methods. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate that you want to include data that has been accessed in a specific number of days.

1406

Index

Index Numerics 64-bit Remote Agent installing using command script 848 installing using installation program 846 overview 844 A

1407

Index

accessibility dialog boxes 1390 keyboard navigation 1390 keyboard shortcuts 1392 overview 1389 settings 1395 active alerts defined 470 responding to 475 viewing 470 Active Alerts by Media Server Report 860 active alerts report 533 Active Directory Application Mode Writer 347 Active Directory, backing up in Exchange 2000 and 2003 1098 active history report 533 active jobs canceling 389 removing hold 390 viewing 381 viewing properties 386 AD/AM Writer 347 ADAMM, defined 1397 add users in DLO, CSV file to 1214 Admin Plus Pack advanced reporting capabilities 857 installing 851 overview 37, 851 scheduling report jobs 859 setting notification recipients for reports 859

administrating jobs using command line applet 632 administration console defined 1397 Desktop Agent Console 1240 Desktop and Laptop Option (DLO) 1186 overview 82 role in backup process 40 Advanced Device and Media Management (ADAMM) database overview 939 device management overview 95 Devices view 96 media operations overview 224 Advanced File Selection options described 270 selecting files 269 Advanced Open File Option changing default settings 984 error messages 993 overview 37 requirements 980 uninstalling 983 using for all backup jobs 989 using for single backup job 987 wizard 984 Advanced options for backup 258 for duplicate job 310 for restore 428 Agent for Microsoft SharePoint Portal Server about backing up a SharePoint Server or Workspace 1343 about restoring a SharePoint Server or Workspace 1345 disaster recovery 1351 installing 1343

overview 1341 redirecting restore jobs 1347 system requirements 1342 agent, defined 1397 agent.cfg commands (UNIX Agent) 606 Agents, Backup Exec See also Exchange Server Agent, Lotus Domino Agent, NetWare Agent, Oracle Agent, R/3 for Oracle Server Agent, Remote Agent, SharePoint Agent, SQL Server Agent list of agents with descriptions 37 See also Desktop and Laptop Option upgrading on remote computers 77 alert category, defined 1397 alert history defined 470 viewing 470 alert notification, printers 502, 504 alert source, defined 1397 alert switches for command line applet 637 alert type, defined 1397 alerts alert types 469 assigning recipients 508 clearing recipients 509 configuring 469 configuring default options 92 defined 469, 1397 defined for DLO 1229 deleting in DLO 1234 displaying in DLO 1232 filters 470 managing in DLO 1233 modifying alert category properties 509 monitoring in DLO 1228 notification methods 483 properties 473 responding to 469, 475 setting filter 472 using command line applet 637 viewing 470 viewing job log 476 views 470 Alerts dialog box in DLO, Configure 1232 alias backup, in backup job script file 626, 702, 731 all media, defined 196 allocated media 1408

defined 197, 1397 overwriting 201 append options for media 201 append period defined 191, 234, 1398 setting for media set 234 append to media option 250 Archive - delete files after successful copy, defined 1398 archive bit, defined 360, 1398 archive logging Lotus Domino 1316 recovery of Lotus Domino 1327 archiving freeing disk space 300 NTFS and VFAT file systems 301 using disk grooming 301 ARCserve media, restoring data from 442 ASR files, in IDR copy to diskette or CD 901 defined 881, 885 ASR See Automated System Recovery Assignments dialog box, New Automated User 1208 audit log logon accounts 372 report 535 AUTOEXEC.NCF file, NetWare Agent 1356 auto-inventory media after import job completes 187 Automated System Recovery 555 Automated User Assignment creating 1206 defined 1182 deleting 1211 modifying 1209 priority, changing 1209 properties, viewing 1210 Automated User Assignments dialog box, New 1208 B back up on log on/off option in DLO 1200 backing up clusters database files 786 local disks 785 shared disks 785 Windows 2000 and Windows Server

Administrator’s Guide

Index

Index

installing 845 serial numbers 845 stopping 849 Backup Exec for Windows Servers, described 33 Backup Exec Server in SAN 939 Backup Exec services account, defined 1398 Backup Exec Services Manager dialog box 70 commands 658 managing using command line applet 658 stopping and starting 70 Backup Exec Utility Database Tasks 831 aging the database 832 checking the database consistency 832 compacting the media server database 833 dumping a media server database 833 rebuilding a media server database indices 834 recovering a media server database 835 repairing a media server database 834 General Tasks adding new media servers 814 deleting a media server 816 deleting a media server group 817 deleting media servers from the All Media Servers subnode 816 running Backup Exec Diagnostics 818 viewing media server properties 819 Media Server Group Tasks 838 adding a media server 838 removing a media server 839 SAN SSO Tasks 826 configuring the SAN SSO 828 moving the primary SAN SSO Server 830 promotion to a primary SAN SSO Server 829 removing the primary SAN SSO Server 827 1409

Index

2003 784 desktop data 1245 Exchange 2003 with Exchange Writer 1172 files and directories by following junction points 258 media server using one-button backup 299 R/3 database 1335 remote storage 259 BACKINT alerts 1331 implementation 1329 overview 1330 backup defined 1398 overview 239 Backup Exec accessibility 1389 dialog boxes 1390 keyboard shortcuts 1392 installing command line installation 60 evaluation copy 571 installation requirements 48 overview 48 serialized copy, upgrading to 571 silent mode installation 60 uninstalling 71 upgrading 76 using Repair option 68 overview additional options 37 how it works 40 new features 35 system requirements 44 repairing 68 running devices managed exclusively by 581 release devices 582 starting after installing Library Expansion Option 1177 upgrading options on remote computers 77 overview 76 Backup Exec Assistant, using 88 Backup Exec for Windows Servers Remote Agent hardware requirements 844

setting the primary SAN SSO Server 827 Services Tasks 820 changing service accounts 821 editing server configurations 823 starting services 821 stopping services 820 starting the Backup Exec Utility 810 Backup Exec Web Administration Console accessing help 805 alerts 808 how it differs from Backup Exec for Windows Servers 804 installing 804 navigating 806 requirements 803 starting 804 tools 807 backup file defined 149 deleting 162 recreating a deleted file 163 renaming 161 viewing and changing properties 163 backup folder adding 150 changing the path 154 creating for removable media 153 creating more disk space 248 defined 149 deleting 155 designating location for 152 overview 149 pausing and resuming 157 recreating 156 renaming 154 viewing properties 158 backup job Advanced options 258 alias backup in script file 626, 702, 731 choices for creating 239 copying to another server 855 creating from template 290 creating manually 242 creating using command line applet 614 creating using script file 677 creating using the wizard 242 Device and Media options 248 general options for new job from 1410

template 291 overview 241 pre/post commands 262 running from command line 614 scheduling 374 script file, creating and using 677 script file, saving and launching 723 selecting devices and data 265 Selections options 245, 423 switches for command line applet 614 tasks to do before 240 using command line applet to back up server drive 617 Backup Job Properties dialog box Exchange 2000 and 2003 1100 Exchange 5.5 1140 SQL 2000 1008 SQL 7.0 1055 backup job script file creating 677 saving and launching 723 backup job template copying to another server 855 creating 283 creating a copy 289 creating job using with command line applet 749 creating with command line applet 733 defined 283, 1398 editing 289 setting general options 285 backup job template script file creating 733 values 733 backup methods defined 1398 selecting 254 selecting for template 286 setting default 321 using modified time 361 backup mode, Oracle Agent 1281 backup network changing for a backup job 337 configuring 334 overview 332 setting up 334 backup options backing up data in remote storage 259 contents of mounted local drives 258 Administrator’s Guide

Index

Index

deleting 208 setting up 205 BE Diagnostics, running from server properties 121 bediag.fax file 1368 bediag.nlm utility, saving configuration information 1368 bemcmd command, in command line applet 611 BESTART command, to start NetWare Agent 1356 BESTOP command, to stop NetWare Agent 1357 BEUtility.exe utility clusters, using in 772 DLO database, maintaining 1235 BEWAC, See also Backup Exec Web Administrative Console biparam.ini options 1334 specifying Backup Exec parameters 1333 bjscript.txt 677 bjtemplatescript.txt 733 BKUPEXECDLO MSDE database instance 1235 block size, setting for drives 128 Boot managers, restoring in IDR 917 bootable media for IDR CD image, creating 901 comparing types 882 floppy diskettes, creating 897 tape image, creating 903 types of media 882 box in DLO, Configure Alerts dialog 1232 box in DLO, User Properties dialog 1215 box, Move User dialog 1217 box, New Automated User Assignments dialog 1208 buffer count, setting for drives 128 buffer size, setting for drives 128 build and version information, displaying 571 byte count, incorrect 582 C calendar display filters 385 view filters 385 viewing 384

1411

Index

NetWare network volumes 351 Backup Selection dialog box Desktop Agent 1249 DLO 1202 backup selections, changing order 272 backup set, defined 1399 Backup Size by Resource Job Report 864 backup strategies See also names of individual agents choosing devices to back up 354 defined 352, 1399 frequency of backups 353 increasing throughput with Backup Exec Remote Agent 843 length of data retention 354 multiple devices per job 355 one job per device 354 protecting against viruses 354 Backup Success Rate 862 backup types archive 359 copy 358 daily 358 differential 357 full 356 incremental 357 working set 358 Backup Wizard, launching 242 backups option, Configure desktop and laptop 1186 backup-to-disk properties General tab 164 Management tab 165 Statistics tab 166 renaming file 161 renaming folder 154 viewing folder properties 158 bandwidth settings Desktop Agent, for users in 1256 DLO, for users in 1196 bar code labels and media ID 203 default 204 mixed media libraries 205 overview 204 robotic library support 204 bar code rules changing 207

cartridge tape drives, suggested types to use 576 cartridges, media 578 cascaded drive pools adding drives 114 creating 113 defined 95, 1400 deleting 116 deleting drives 115 overview 112 properties 117 renaming 117 requirements for using 113 using hardware compression in 113 catalog defined 41, 1400 levels 417 media in drive 413 removing unused after x days 417 searching 449 catalog database, in SAN Shared Storage Option 958 catalog operation errors DLT tape drive hangs 579 storage device hangs 578 CHECKCATALOG utility 1006, 1054 CHECKDB utility 1006, 1054 CHECKFILEGROUP utility 1006, 1054 checkpoint restart on cluster failover enabling or disabling 768 overview 767 circular logging Exchange 2000 and 2003, reviewing in 1105 Exchange 5.5, reviewing in 1145 Lotus Domino 1316 recovery of Lotus Domino server 1328 cleaning jobs, submitting for robotic libraries 184 cleaning properties for media 231 Cleaning tab for drive properties 134 client (or gateway) services for NetWare 351 clone CD image creating 852 overview 852 clone, using alias backup for a 626, 702, 731 clrest command 791 clusters adding or removing a failover node 771 1412

all drives pool 766 backing up database files 786 local disks 785 shared disks 785 Windows 2000 and Windows Server 2003 784 BEUtility 772 changing the order in which nodes fail over 770 clrest command 791 configurations four-node on a fibre channel SAN with the SAN SSO 781 overview 773 shared SCSI bus for tape devices 776 two-node on a fibre channel SAN with the SAN SSO 779 two-node with locally-attached storage devices 774 two-node with tape devices on a shared SCSI bus 775 creating drive pools 766 database server, designating new in SAN SSO 772 Desktop and Laptop Option 1235 disaster recovery Backup Exec on a cluster using IDR 797 cluster data files 799 clustered Backup Exec 801 entire cluster manually 797 nodes using IDR 795 overview 794 shared disks 800 using IDR to prepare 795 error-handling rules 402 failover restart 760 installation additional options 764 Backup Exec in a cluster 762 requirements 761 Open File Option, and using 764 overview 783 Remote Agent, installing 762 restoring cluster quorum for Windows 2000 and Windows Server 2003 789 cluster quorum to node running Administrator’s Guide

Index

Index

Configuration tab for drive properties 126 Configuration tab for robotic library 142 Configuration Wizard for DLO 1191 Configure Alerts dialog box in DLO 1232 Configure desktop and laptop backups option 1186 Configure Devices button 81 Configure SAN SSO, See Backup Exec Utility 828 configuring 1291 drives 125 holidays 380 media servers to use with Oracle Agent 1294 Oracle Agent, overview 1289 robotic library 139 consistency check options SQL 2000 1005 SQL 7.0 1056 control file backup, Oracle Agent 1284 controller card 577 copy backups, defined 358, 1400 creating more disk space for backup folder 248 CSV file to add users in DLO 1214 custom setup, when to use in IDR 925 D daily backups, defined 358, 1400 Daily Jobs by Resource Report 863 Daily Jobs Report 866 Daily Network Device Utilization Report 867 damaged media, removing 202 DAT, recommended driver 576 data compression, drive does not support 579 database files, backing up in a cluster 786 database instance, BKUPEXECDLO MSDE 1235 database log mode, Oracle Agent 1284 database maintenance configuring 405 overview 405 database server defined 939, 1400 in clusters 772 Date Modified tab 451 default options

1413

Index

Active Directory 790 specifying a new drive letter for the cluster quorum disk 792 Windows 2000 and Windows Server 2003 788 size 583 system state, backing up 785 troubleshooting 801 uninstalling Backup Exec 764 using with Backup Exec 759 virtual servers, backing up 786 combination R/3 database server/media server recovery 1339 command line applet administrating jobs 632 alert switches 637 alias backup 626, 702, 731 backup and restore script files 677 backup job switches 614 bemcmd command 611 defined 609 error-handling rules 641 job status messages 756 logon account switches 659 managing Backup Exec services 658 managing devices 642 media management switches 642 online help 612 report switches 660 requirements 610 restore job switches 636 setting default options 662 switches for administrating jobs 632 using 611 command line installation of Backup Exec 60 command line switches, used with all operations 612 commands See also names of individual commands completed jobs, job log overview 398 compression Desktop Agent backup selections, setting 1251 DLO backup selections, setting 1205 enable hardware compression option 127 in cascaded drive pools 113 setting backup defaults 323 configuration settings report 536

backup and restore for Exchange 2000 and 2003 1127 backup and restore for Exchange 5.5 1161 IDR, setting 889 NetWare network volumes 351 overview 40 restore 457 setting 90 setting for backup jobs 320 setting using command line applet 662 SQL 2000, backup and restore 1035 SQL 7.0, backup and restore 1079 default preferred configuration settings for drives 129 deleting Automated User Assignment 1211 DLO database entry 1223 drive pools 108 drives from pools 107 media 224 revisions in DLO 1205 Storage Location in DLO 1194 user entry from DLO 1216 user-defined vault 219 Desktop Agent see also Desktop and Laptop Option (DLO) advanced view option 1248 backing up data 1245 Backup Selection dialog box 1249 backup selections compression, setting 1251 encryption, setting 1251 modifying 1247 overview 1245 bandwidth settings 1256 compression, setting for backup selection 1251 console 1240 Desktop User Data Folder, moving 1254 encryption, setting for backup selection 1251 filter options, History view 1269 glossary 1277 History view 1268 include/exclude 1250 install set default location 1244 log files, overview 1268 1414

log on/log off option 1254 logging options 1256 menu bar, described 1241 overview 1238 Reset accounts option 1242 Reset dialogs option 1242 Restore dialog box 1264 restoring files 1263 Revision Control tab 1251 revisions, deleting automatically 1251 schedule, customized 1253 scheduling backup jobs 1253 standard view option 1247 Status view 1262 storage limits for user data 1256 synchronization create new sets 1259 delete synchronized folder 1260 overview 1257 Synchronized Selections view 1257 tasks bar, described 1241 views menu, described 1241 desktop and laptop backups option, Configure 1186 Desktop and Laptop Option clustering 1235 Desktop and Laptop Option (DLO) see also Desktop Agent access, disabling/enabling 1216 adding user 1213 administration console 1186 administrators, creating 1187 alerts categories, defined 1229 Configure Alerts dialog box 1232 deleting 1234 displaying 1232 managing 1233 monitoring 1228 Automated User Assignment creating 1206 defined 1182 deleting 1211 modifying 1209 priority, changing 1209 properties, viewing 1210 backup selection adding 1201 deleting 1206 Administrator’s Guide

Index

Index

user bandwidth settings 1196 User Data Folder 1192 User Properties dialog box 1215 VERITAS Update, using with 1184 View history log file option 1226 viewing users 1215 device allocation in a shared storage environment 943 cleaning cartridge 578 managed by Backup Exec 581 selecting for backup job 248 Device and Media options for backup job 248 device management 95 Device Offline message 126 device operations See also robotic library cataloging media 413 ejecting media 183 Enable Hardware Compression Option 127 erasing media (quick or long) 174 formatting media 179 inventorying a drive 171 labeling media 180 overview of utility jobs 170 retensioning a tape 177 using with SAN Shared Storage Option 948 Device Summary Report 537, 945 devices configuring 99 Hot-swappable Device Wizard 100 managing using command line applet 642 pausing and resuming 100 release from Backup Exec 582 renaming 101 SCSI address 577 troubleshooting 963 viewing 96 viewing with Library Expansion Option 1179 Devices view 96 Dfs See Distributed file system DHCP See Dynamic Host Configuration Protocol dialog box in DLO, Configure Alerts 1232 1415

Index

modifying 1205 BEUtility.exe utility, using 1235 compression, setting for backup selection 1205 Computer History pane 1225 Configuration Wizard 1191 configuring 1191 deleting entry from DLO database 1223 encryption, setting for backup selection 1205 filter options, History view 1227 glossary 1277 History view 1224 import multiple users in CSV file 1214 include/exclude 1203, 1250 installing 1184 Job History pane 1225 Move priority down option 1210 Move priority up option 1210 Move User dialog box 1217 MSDE database instance, maintaining 1235 New Automated User Assignments dialog box 1208 overview 1181 Profile creating 1195 defined 1182 edit schedule 1199 log on/off option 1200 logging options 1200 Schedule tab 1198 properties, changing user 1215 removing user 1216 reset dialogs and accounts 1242 Restore dialog box 1221 restoring 1219 revisions defined 1201 deleting automatically 1205 setting number to keep in DLO 1204, 1251 storage limits for user data 1196 Storage Location creating 1191 defined 1182 deleting 1194 moving users 1217 summary status 1189

dialog box in DLO, User Properties 1215 dialog box, Move User 1217 dialog box, New Automated User Assignments 1208 dialog boxes, overview 85 differential backups advantages and disadvantages 357 changed files, defined 1400 defined 357 using modified time, defined 1400 disable device for Backup Exec 126 disaster preparation Disaster Preparation Plan (DPP) 550 emergency repair disk 553 Exchange 2000 and 2003 1131 Exchange 5.5 1167 hardware protection 550 Lotus Domino Agent 1325 off-site storage 550 overview 549 SQL 2000 1041 SQL 7.0 1084 disaster recovery See also names of individual agents clusters Backup Exec 801 Backup Exec on a cluster using IDR 797 data files 799 entire cluster manually 797 nodes using IDR 795 overview 794 shared disks 800 using IDR to prepare 795 data protected by Backup Exec agents 558 different types of computers, overview 558 Exchange 2000 and 2003 1132 Exchange 5.5 1168 local Windows 2000 computers (non-authoritative) 565 local Windows NT computers 559 Lotus Domino Agent 1326 manual recovery of Windows system 558 NetWare Agent 1369 Oracle Agent 1304 overview 558 1416

remote Windows 2000 computers (non-authoritative) 567 remote Windows NT computers 562 disaster recovery alternate data path, in IDR 890 disaster recovery data path, in IDR 890 disaster recovery file (*.dr file) in IDR defined 881, 885 setting locations for 888 Disaster Recovery Wizard requirements 926 running 926 disk grooming, using for archive job 301 Disk Manager, using in IDR 929 Distributed file system (Dfs) backing up 268 restoring 440 DLO Administration Console, restoring from 1219 DLO see also Desktop and Laptop Option (DLO), Desktop Agent DLO, back up on log on/off option in 1200 DLO, Configuration Wizard for 1191 DLO, Configure Alerts dialog box in 1232 DLO, CSV file to add users in 1214 DLO, glossary for 1277 DLO, Move priority options in 1210 DLO, User Properties dialog box in 1215 DLT tape, drive hangs when cataloging 579 Domain Controller, using redirected restore to install from media 455 domains, host and target, defined 47 DPP See also Disaster Preparation Plan Drive Pool Properties dialog box 112 drive pools See also cascaded drive pools adding drives 104 creating 103 creating in a cluster 766 default for SAN Shared Storage Option 947 defined 95, 1400 deleting 108 deleting drives 107 overview 102 prioritizing drives 105 properties 111 renaming 110 SAN Shared Storage Option 943 Administrator’s Guide

Index

E editing jobs created from templates 293 editions of Backup Exec, listed and described 33 See also names of individual editions eject media after job completes 250 from a drive 183 e-mail configuring MAPI notification 485 configuring SMTP notification 483

Index

configuring VIM notification 486 emergency repair disk, creating 553 enabling bar code rules 143 device for Backup Exec option 126 hardware compression 127 Removable Storage (RSM) 143 robotic library for Backup Exec 143 robotic library initialization on startup 143 encryption backup selections, in Desktop Agent 1251 backup selections, in DLO 1205 erase media operation, quick or long 174 Error Handling Rules Report 539 error-handling rules configuring 403 defined 402 overview 403 using command line applet 641 evaluation version Backup Exec, updating to serialized version 571 event logs report 540 Event Recipients Report 868 event, defined 1400 Exabyte 576 Exchange 2000 and 2003 agent features 1093 agent installation 1094 agent requirements 1094 best practices 1099 disaster recovery 1132 logon accounts, overview 1095 protecting Exchange 2003 with Exchange Writer 1171 Resource Discovery feature, using with 1094 restoring Exchange 2003 with Recovery Storage Group 1117 Exchange 2000 and 2003, backing up Active Directory 1098 Backup Job Properties dialog box 1100 backup methods 1101, 1128 circular logging, reviewing 1105 Exchange 2003 with Exchange Writer 1171 Guide Me wizard 1101, 1103 1417

Index

using the default drive pool 102 viewing properties 112 drive properties Cleaning tab 134 Configuration tab 125 General tab 123 Media Types tab 136 SCSI Information tab 131 Statistics tab 132 viewing 122 drivers archive 576 download latest 577 Exabyte 576 if drive is not listed 576 Sony 576 Wangtek 576 drives block size 128 buffer count 128 buffer size 128 configuring 125 DAT 576 default settings 129 high water count 129 SCSI information 131 specifying media types for 136 statistics on usage 132 statistics since cleaning 134 types 576 using exclusively with Backup Exec 169 duplicate job advanced settings 310 general settings 308 duplicating backup data 307 Dynamic Host Configuration Protocol (DHCP) 594

Internet Information Service (IIS) metabase 1097 Key Management Service (KMS) 1097 mailbox backup methods 1102 public folders 1106 recommended selections 1097 single instance backup for message attachments 1103 Site Replication Services (SRS) database 1097 storage groups 1104 strategies for 1096 system state 1097 Exchange 2000 and 2003, restoring 1112 change password when recreating mailboxes 1131 commit after restore completes option 1113 Exchange 2003 with Exchange Writer 1173 mailboxes and public folders, overview 1121 mailboxes and user accounts, recreating 1112 mount database after restore option 1113 no loss restore option 1112 redirecting mailboxes and public folders 1123 redirecting storage groups and databases 1115 Redirection dialog box 1116, 1119 requirements 1114 restore defaults 1127 Restore Job Properties dialog box 1111 restoring data to server 1111 temporary location for log and patch files 1113 Exchange 5.5 agent features 1135 agent installation 1136 agent requirements 1135 best practices 1139 logon accounts 1136 Resource Discovery feature, using with 1135 Exchange 5.5, backing up Backup Job Properties dialog box 1140 backup methods 1141 circular logging, reviewing 1145 1418

Guide Me wizard 1141 Key Management Service (KMS) 1138 mailbox backup methods 1142 recommended selections 1138 single instance backup for message attachments 1143 strategies for 1137 Exchange 5.5, restoring 1150 change password when recreating mailboxes 1166 defaults 1165 DS/IS consistency adjuster after restore 1152, 1155 mailboxes and user accounts, recreating 1150 no loss restore option 1150 redirecting database restores 1153 redirecting mailboxes and public folders 1157 Redirection dialog box 1153 requirements 1151 Restore Job Properties dialog box 1149 restore private mailboxes option 1150 restore public folder option 1150 restoring data to server 1149 Exchange Server 2003, backing up using the Exchange Writer 1172 Exchange Server Agent, backing up backup job script file method, using 681, 724 command line for Exchange 2000 621 using for backup job 618 Exchange Writer backing up Exchange Server 2003 1172 protecting Exchange 2003 1171 restoring Exchange 2003 1173 executing a command after backup 262 after restore 433 before backup 262 before restore 433 ExecView communication module, defined 407 components 408 information server, defined 407 launching console 410 overview 407 user preferences overview 409 Administrator’s Guide

Index

exporting media 187 express setup, when to use in IDR 925

History view filters, setting in Desktop Agent 1269 History view filters, setting in DLO 1227 job monitor 381 jobs list 383 filters for alerts 470 finding media in a location or vault 216 format media 179 frequently asked questions about using Backup Exec 88 Full - Back Up Files - Allows incrementals and differentials using modified time defined 1401 Full - Back Up Files - Reset Archive Bit defined 1401 full backups advantages and disadvantages 356 defined 356

F

Index

G General drive properties 123 general job defaults, setting 93 general media properties, viewing 226 general options backup job template 285 duplicate job 308 job created from template 291 restore jobs 425 General tab Backup-to-Disk folder 164 robotic library 141 glossary for DLO 1277 grandfather media rotation strategy 222 groups, configuring recipients 504 H hardware compression in cascaded drive pools 113 creating profile 552 enable hardware compression option 127 error message 578 protection in case of disaster 550 high water count, setting for drives 129 host domain, defined 47 hub defined 1402 replacing 966

1419

Index

failback, defined 760 Failed Backup Jobs Report 869 failover adding or removing a failover node 771 changing the order in which nodes fail over 770 defined 759 restart 760 FAT cluster size 583 partition 582 fatal tape format inconsistency message 578 father/son media rotation strategy 221 FC-AL See Fibre Channel Arbitrated Loop Fibre Channel Arbitrated Loop (FC-AL) defined 1401 in SAN SSO 939 fibre channel hub, defined 1401 fibre channel switch, defined 1401 Fibre Channel Switched Fabric (FC-SW), defined 1401 fibre channel tape controller, defined 1401 fibre channel, defined 1401 fibre to SCSI bridge defined 1401 replacing 965 file permissions, restoring 436 file to add users in DLO, CSV 1214 filegroups backing up SQL 2000 1014 SQL 7.0 1060 displaying 1014, 1060 restoring SQL 2000 1027 SQL 7.0 1072 restoring nonprimary SQL 2000 1023 SQL 7.0 1069 restoring primary SQL 2000 1023 SQL 7.0 1068 files, processing open 260, 327 filters calendar 385

I IBM ADSM Option, overview 39 IBM computers, recovering with IDR 919 IDR Configuration Wizard 885 imported media defined 197, 1402 labeled by Backup Exec 204 overwriting 201 importing media 186 include/exclude Desktop Agent backup selections 1250 DLO backup selections 1203 Incremental - Changed Files - Reset Archive Bit, defined 1402 Incremental - Using modified time, defined 1402 incremental backups advantages and disadvantages 358 defined 357 Information Desk, overview 85 installation parameter file creating 66 defined 66 using 67 installation requirements, Backup Exec 48 See also names of individual agents and options installing additional Backup Exec options on a cluster 764 Backup Exec 50 Backup Exec in a cluster 762 Domain Controllers from media 455 Library Expansion Option 1177 locally additional options 53 using clone CD image 852 overview 43 Remote Administrator 72 remotely using clone CD image 853 SharePoint Agent 1343 storage devices 43 using installation program 50 using Repair option 68 Windows Management Instrumentation performance counter 516 Windows Management Instrumentation SNMP provider 516 instance, BKUPEXECDLO MSDE database 1420

1235 Intelligent Disaster Recovery (IDR) alternate data path on a remote computer 890 ASR files 881, 885 boot managers 917 catalog entries, added to *.dr file 883 clusters recovering Backup Exec 797 recovering nodes 795 custom setup, using 925 disaster recovery diskettes, updating 907 disaster recovery file (*.dr file), defined 881, 885 express setup, using 925 First Time Startup Configuration Wizard 885 hard disk partitions, changing for Windows NT 927 hard drive partition, altering sizes using IDR 930 IBM computers 919 installing 884 Microsoft Exchange Server, recovering 937 Microsoft SQL Server, recovering 936 Options - Set Application Defaults dialog box 889 OS/2 boot manager, restoring 917 overview 37, 881 Recovery Wizard, running 926 requirements 884 restoring remote media server 929 Sharepoint Portal Server, recovering 937 System Commander boot manager, restoring 917 utility partitions, backing up 894 virtual devices, using in 884 Windows Automated System Recovery (ASR) files 881, 885 Intelligent Disaster Recovery Additional Client option, installing 884 Internet Information Services (IIS) metabase, backing up 1097 inventory job creating 172 setting job priority 173 inventorying all drives on startup 91 Administrator’s Guide

Index

all drives when Backup Exec starts 172 drives 171

deleting scheduled 393 edit recipients 510 editing schedule 376 holiday scheduling 380 Lotus Domino backup properties 1317 removing hold active jobs 390 scheduled jobs 391 run report 524 running scheduled job 390 running scheduled test job 392 scheduled, modifying 390 scheduled, viewing 390 scheduling 374 selecting recipients for notifications 509 setting general defaults 93 viewing active 381 viewing and filtering calendar 384 jobs list 381 viewing and scheduling in a SAN 956 viewing completed 394 jobs list view filters 383 viewing 381

J

Index

K Key Management Service (KMS) database, backing up 1097, 1138 L labeling media creating default labels 212 imported media label 204 in drive 180 renaming label 208 using bar code labels 204 laptop backups option, Configure desktop and 1186 last known good menu 551 Library Expansion Option overview 37, 1175 SCSI addresses for hardware 1175 setting up hardware 1175 library sharing, configuring server for 950 linked drives See cascaded drive pools local device, defined 1402 local media server, breaking connection with 73 lock open files for backup 260, 327 1421

Index

job audit log, defined 1402 Job Distribution by Device Report 870 job history defined 41, 1402 deleting report 529 History view filters, setting in DLO 1227 saving report 528 viewing 394 viewing in Desktop Agent 1268 viewing report 527 job log configuring default options 400 defined 1402 status overview 398 job monitor command line switches 632 DLO jobs, viewing 1224 filters 381 views 381 job priority setting for cleaning jobs 185 setting for eject job 183 setting for erase job 177 setting for export job 188 setting for format job 179 setting for import job 186 setting for inventory job 173 setting for label media job 182 setting for retension job 178 specifying using command line applet 614 job progress indicators, displaying 92 Job Queue Status Report 870 job status messages, descriptions 756 Job Templates Report 871 jobs active, canceling 389 changing priority for scheduled 391 configuring default Lotus Domino options 1314 configuring default schedule 379 configuring error-handling rules 403 configuring new recipients 510 configuring schedule 374 defined 1402

lock robotic library panel 188 log on/off option in DLO, back up on 1200 logon accounts changing default 371 changing for a resource being backed up 273 clearing audit log 372 command line applet switches 659 default, defined 364 deleting 370 editing 369 Exchange 2000 and 2003 resources, and 1095 Exchange 5.5 resources, and 1136 overview 363 replacing 369 SQL 2000 resources 1002 SQL 7.0 resources 1050 system logon account 365 viewing audit log 372 Lotus Domino Agent APIs 1315 archive logging 1316 backup job script method, using 682, 737 backup options 1317 circular logging 1316 command line, using for backup 624 configuring default options 1314 database backup overview 1315 database backup requirements 1310 disaster preparation 1325 disaster recovery archive logging 1327 circular logging 1328 of server 1326 overview 38 redirecting restore 1324 requirements 1310 restore overview 1320 selecting for restore 1321 selecting restore options 1323 supported configurations 1315 viewing databases 1312 M Machines Backed Up Report 872 Macintosh Agent, system requirements 596 mailboxes Exchange 2000 and 2003

1422

backup methods 1102 best practices 1107 change password when recreating 1131 exclude specific folders 1107 overview of backing up 1106 recreating mailboxes and user accounts 1112 redirecting restores 1123 restore overview 1121 Exchange 5.5 backup methods 1142 best practices 1146 change password when recreating mailboxes 1166 exclude specific folders 1146 overview of backing up 1145 redirecting restores 1157 restore overview 1155 majority node in a cluster 761 Management tab for backup-to-disk folder 165 manually update server list, for NetWare 1368 MAPI e-mail notification method 485 MAPI, configuring recipients 491 master database backup SQL 2000 1006 SQL 7.0 1054 master database restore SQL 2000 1020, 1030 SQL 7.0 1066 media adding to the offline location or user-defined media vault 217 all media, defined 196 allocated, defined 197 append backup to 250 append options 201 cartridges 578 cleaning properties, viewing 231 creating default labels 212 damaged 202 deleting 224 deleting user-defined vault 219 displaying media ID 226 finding in a location or vault 216 general properties 226 hardware-compressed tape 579 Administrator’s Guide

Index

Index

media rotation strategies father/son 221 grandfather 222 son 220 Media Rotation Wizard 223 media rotation, defined 1403 media server backing up using one-button backup 299 connecting 73 defined 1403 running diagnostics on 118 viewing properties 118 media servers configuring for robotic library sharing 950 media set creating 233 default 195 defined 197, 1403 deleting 235 properties 236 renaming 236 selecting for backup job 249 shared storage environments, and 958 wizard, running 232 media sets report 541 media types, specifying for drives 136 media vault defined 215, 1403 finding media in a vault 216 user-defined creating 216 defined 215 renaming 217 media view 411 menu bar, overview 82 menus, described Help 1395 Window 1393 messages device offline 126 error 584 fatal tape format inconsistency 578 hardware error 578 Microsoft Cluster Server, using with Backup Exec 760 Microsoft Exchange Server See also Exchange Server Agent Microsoft SQL Server See also SQL Server 1423

Index

how Backup Exec searches for overwritable media 199 imported, defined 197 management properties, viewing 228 managing using command line applet 642 moving to a media set 225 moving to a new location 218 overwrite for backup 250 overwrite options 198 overwriting allocated or imported 201 properties 226 recyclable, defined 197 retired, defined 197 scratch, defined 196 setting default options 209 sharing 958 statistical properties 229 system, defined 196 testing integrity of 312 using with Removable Storage 168 with excessive errors 202 media capacity, testing before backup runs 319 media catalogs 939 media categories 196 media ID, defined 203, 1403 media label bar code rule changing 207 deleting 208 in mixed media libraries 205 bar codes 204 defined 1403 imported 204 overview 202 renaming 208 media location 215 media name, specifying during backup job 249 media operations deleting media 224 moving media 225 viewing media properties 226 media overwrite protection levels, defined 196, 1403 media overwrite protection, overview 191 Media Required for Recovery Report 873 media rotation in SAN 959

Agent mirror, using alias backup for split mirror 626, 702, 731 mixed media library bar code labeling 205 mounted local drives, backing up files and directories 258 Move Media to Vault Report 874 Move priority options in DLO 1210 Move User dialog box 1217 moving media from user-defined vault 219 media to a media set 225 MSCS, using with Backup Exec 760 MSDE database instance, BKUPEXECDLO 1235 MSDE database instance, DLO 1235

network options, restore job 461 network protocols, IPX/SPX 336 network shares, NetWare volumes 351 New Automated User Assignments dialog box 1208 New Backup-to-Folder dialog box 152 nodes adding or removing a failover node 771 changing the order in which nodes fail over 770 configurations in a cluster 773 defined 759 disaster recovery using IDR 795 nonlogged operations occurring in SQL 7.0 1062 notification assigning recipients to alerts 508 defined 469 notifications assigning alert categories 508 clearing recipients 509 configuring MAPI e-mail 485 configuring pager 487 configuring SMTP e-mail 483 configuring SNMP 511 configuring VIM e-mail 486 methods defined 483 modifying alert category properties 509 modifying recipient properties 506 scheduling recipients 505 selecting recipients for jobs 509 Novell Storage Management Services tree view 351 NTFS cluster size 583 partition 582 numbering, specify for media label 213

N Name & Location dialog box 450 named transaction include in restore, SQL 2000 1022 restore up to, SQL 2000 1022, 1026 navigation bar, overview 83 Net Send, configuring recipients 499 NetWare client (or gateway) services 351 options 1367 NetWare Agent AUTOEXEC.NCF file 1356 installing 1355 overview 38 Remote Agent 1354 system requirements 1354 TCP/IP only environment 1356 NetWare Agent, backing up BEDIAG.NLM utility 1368 create BEDIAG.FAX 1368 decompressed files 1367 password database 1358 rights for backup 1358, 1359 single server backup strategies 1359 strategies for multiple administrators 1360 strategies for single administrator 1360 NetWare Agent, restoring 1363 network changing a backup network for a job 337 overview of backup networks 332 setting up a backup network 334

1424

O offline media location adding media to 217 defined 215, 1403 offline, when devices display as 126 off-site storage of backups 550 on/off option in DLO, back up on log 1200 one-button backup 299 online media location 215, 1403 Online Registration Wizard, using 68 online, putting device back 126

Administrator’s Guide

Index

Index

General tab 1294 INIT.ORA 1287 INITORCL.ORA 1284 instance initialization parameter files 1287 list of configured media servers 1292 multiple database instances on a single database server 1287 Oracle account username 1293 Oracle Server using the Oracle Agent Configuration Utility 1289 overview 1289 removing configured media servers 1292 requirements 1284 server manager 1285 SID 1287 SID name 1293 tablespace data 1283 TCP/IP address 1294 Oracle Agent, disaster recovery file system backup 1304 Oracle database server and media server combination 1306 remote Oracle database server 1305 requirements 1304 tablespace data files 1304 Oracle Agent, restoring closed database 1301 database control file 1303 individual tablespaces 1302 online database 1300 Oracle information manager 1303 over existing files 1299 Oracle server manager 1303 Overnight Summary Report 874 overview tab, using 85 overwritable media, how Backup Exec searches for it 199 overwrite default media label 212 overwrite media option, specifying for backup job 250 overwrite protection levels full 210 none 211 partial 211 overwrite protection period defined 191, 234, 1404 setting for media set 234 overwrite protection, disabling 211 1425

Index

open files backing up 260 setting default for backing up 327 unable to back up 580 optimizing remote backups 259 option in DLO, back up on log on/off 1200 option, Configure desktop and laptop backups 1186 options default for job log 400 Options - Set Application Defaults General 93 Preferences 91 options in DLO, Move priority 1210 options, additional Backup Exec options described 37 Oracle Agent 1291 adding media servers 1294 archived redo logfiles 1281 backup mode, described 1285 backup strategies 1282 error messages 1307 fully specified paths, using 1288 installing 1290 overview 38 renaming data files from a single tablespace 1288 shutting down and restarting the Oracle database 1287 system requirements 1282 troubleshooting 1307 types of data to protect 1283 user account, creating 1285 Oracle Agent, backing up closed database 1298 command line, using for backup 625 online database 1295 online tablespaces 1297 Oracle Agent, configuring Adding Media Server dialog box 1294 archived logfiles directory 1289 ARCHIVELOG mode 1285 automatic archival 1284, 1285 BECF.BAK 1284 control file backup 1284 control file backup location 1293 database control file 1289 database log mode 1284, 1285 Database tab 1294

Problem Files Report 875 product updates, receiving 75 Profile back up on log on/off option 1200 creating 1195 defined 1182 edit schedule 1199 logging options 1200 prompt before overwriting allocated or imported media 211 properties active job 386 alerts 473 Lotus Domino 1317 media cleaning 231 general 226 management 228 statistical 229 report 530 user, changing in DLO 1215 Properties dialog box in DLO, User 1215 public folders Exchange 2000 and 2003 backing up 1106 best practices 1107 exclude specific folders 1107 redirecting restores 1123 restore overview 1121 Exchange 5.5 backing up 1145 best practices 1146 exclude specific folders 1146 redirecting restores 1157 restore overview 1155 restore public folder option 1150 published drives, defined 587

P pager configuring recipients 496 notification method 487 parameter file, editing in R/3 Agent for Oracle Server 1334 partial overwrite protection 211 partition creating for robotic library 146 defined 1404 FAT 582 NTFS 582 redefining for robotic library 148 password database, NetWare Agent 1358 pausing device 101, 126 performance, increasing during backups of remote systems 844 physical check, SQL 2000 1011 PHYSICAL_ONLY utility 1006 placing scheduled job on hold if test run fails 319 point in time log restore option SQL 2000 1022, 1025 SQL 7.0 1068, 1071 portal support 187 post-job command setting for backup job 262 setting for restore job 432 pre/post command options for jobs 329 prefix, creating for media label 213 pre-job command setting for backup job 262 setting for restore job 432 preserve tree option for backup job 255 for backup template 287 for restores 427 primary navigation bar 806 primary server defined 939 printer, configuring recipients 502 priority Automated User Assignment, changing 1209 changing for scheduled job 391 setting for backup job 253 setting for drives in pools 105, 127, 159 setting for restore job 426 priority options in DLO, Move 1210 1426

Q Quick Start Edition of Backup Exec, described 34 R R/3 Agent for Oracle Server backing up the R/3 database 1335 BACKINT implementation 1329 how it works 1329 installing 1332 requirements 1331 security 1330 Administrator’s Guide

Index

Index

982 remote backup and restore 843 Uninstalling using the command line 847, 983 remote storage, back up data 259 Removable Storage feature, Microsoft’s monitoring Backup Exec 169 using with Backup Exec 167 using with the SAN SSO 168 Remove Primary SAN SSO Server 827 renaming cascaded drive pools 117 drive pools 110 media labels 208 robotic library or drive 101 user-defined vault 217 renaming libraries and drives in shared environment 948 reports active alerts 533 Active Alerts by Media Server 860 active history 533 audit log 535 Backup Size by Resource Job 864 Backup Success Rate Report 862 configuration settings 536 Daily Jobs 866 Daily Jobs by Resource 863 Daily Network Device Utilization 867 deleting in job history 529 device summary 537 Error Handling Rules 539 event logs 540 Event Recipients 868 Failed Backup Jobs 869 Job Distribution by Device 870 Job Queue Status 870 Job Templates 871 Machines Backed Up 872 Media Required for Recovery 873 media sets 541 Move Media to Vault 874 Overnight Summary 874 Problem Files 875 Recently Written Media 876 Resource Risk Assessment 877 Retrieve Media from Vault 878 Robotic Library Inventory 544 running 521 1427

Index

R/3 Agent for Oracle Server, restoring disaster recovery requirements 1338 submitting restore jobs 1336 R/3 database server, restoring, remote recovery 1338 reapplying templates to jobs 293 reassigning how slots appear 143 Rebuild Master utility, SQL 7.0 1074 Recently Written Media Report 876 recipients assigning alert categories 508 clearing recipients 509 configuring 494 configuring groups 504 configuring MAPI e-mail 491 configuring Net Send 499 configuring new for jobs 510 configuring pager 496, 502 configuring SMTP 489 defined 488 modifying alert category properties 509 selecting for notifications 509 recovery completion state SQL 2000 1019 SQL 7.0 1065 recovery requirements in IDR 917 Recovery Storage Group 1117 recyclable media, defined 197, 1404 redirected restore See also names of individual agents using to install Domain Controllers from Media 455 redirecting scheduled job 109 registry, restoring 430 Remote Administrator defined 1404 running 73 system requirements 72 Remote Agent 64-bit overview 844 defined 1404 described 38 for NetWare 1354 installing 64-bit using command script 848 installing 64-bit using the installation program 846 installing on a cluster 762 Installing using the command line 847,

running job 524 saving 528 Scheduled Server Workload 878 scheduling report jobs 859 Scratch Media Availability 545 standard in Backup Exec 531 Template Definition Usage 879 using command line applet 660 viewing 520 viewing in job history 527 viewing properties 530 requirements Agent for Exchange 2000 and 2003 1094 Agent for Exchange 5.5 1135 installation, for Backup Exec 48 Lotus Domino Agent 1310 R/3 Agent for Oracle Server 1331 SAN Shared Storage Option 941 system, for Backup Exec 44 TSM option 1371 Reset accounts option, in Desktop Agent 1242 Reset Cleaning Statistics 134 Reset dialogs option, in Desktop Agent 1242 resource credentials, changing for restore job 446 order, changing 272 resource discovery creating job 302 defined 1404 Resource Risk Assessment Report 877 resource, defined 1404 responding to active alerts 475 Restore dialog box Desktop Agent 1264 DLO 1221 restore job Advanced File Selection 446 advanced options 428 canceling 462 copying to another server 855 creating through dialog boxes 420 creating using script file 704 creating with wizard 419 file permissions 436 general options 425 Lotus Domino options 1323 over existing files 426 overview 419 1428

pre/post commands 432 preserve tree option 427 R/3 Agent for Oracle Server 1336 redirecting 452 redirecting Lotus Domino 1324 running from command line 636 security 427 setting defaults 457 specifying network 461 Restore Job Properties dialog box Exchange 2000 and 2003 1111 Exchange 5.5 1149 Exchange Redirection page 1116, 1119, 1153 SQL 2000 1018 SQL 7.0 1064 restore job script file creating 704 saving and launching 723 Restore Selections dialog box 444 restore, defined 1404 restoring ARCserve tapes 442 byte count does not match 584 closed Oracle database 1301 clusters cluster quorum for Windows 2000 and Windows Server 2003 789 cluster quorum on node running Active Directory 790 Windows 2000 and Windows Server 2003 788 Distributed file system (Dfs) 440 Exchange 2000 and 2003 1111 Exchange 2003 using the Exchange Writer 1173 Exchange 5.5 1149 files, using Desktop Agent 1263 files, using DLO Administration Console 1219 individual Oracle tablespaces 1302 Lotus Domino Agent 1321 media view 411 media with hardware compression 579 NetWare Agent volume restrictions 1367 online Oracle database 1300 Oracle database control file 1303 registry 430 resource view 411 Administrator’s Guide

Index

Index

Status tab 145 robotic library sharing between Windows and NetWare servers 949 prerequisites 949 S SAN Shared Storage Option (SSO) device allocation 943 device operations 948 installing 942 overview 39 requirements 941 schedule 380 schedule script file using with device and media operations 749 values 749 scheduled jobs changing priority 391 configuring 374 configuring default options 379 deleting 393 editing 376 modifying 390 removing hold 391 running immediately 390 running test job 392 viewing 390 Scheduled Server Workload Report 878 scheduling backup jobs in Desktop Agent 1253 backup jobs in DLO 1198 notification recipients 505 SAN SSO jobs 956 scratch media creating 201 defined 196, 1405 Scratch Media Availability Report 545 SCSI address 577 address for devices 577, 1175 configuring devices 577 controller card 577 defined 1405 information about drives 131 information about robotic library 144 modes 578 setting address for robotic library drives

1429

Index

searching for files 449 selecting data 444 using the media view 444 using the resource view 444 resuming a drive 101 retarget job 109 retensioning a tape 177 retired media defined 197, 1405 moving damaged media 202 Retrieve Media from Vault Report 878 returning to a previous configuration 551 revisions defined in DLO 1201 deleting automatically in Desktop Agent 1251 deleting automatically in DLO 1205 number to keep, setting in Desktop Agent 1251 number to keep, setting in DLO 1204, 1251 Revision Control tab, Desktop Agent 1251 Revision Control tab, DLO 1204 rjscript.txt 677 robotic library cleaning jobs 184 configuring 139 configuring partitions 146 creating partitions 146 defined 1405 displaying storage devices 1177 example configuration 1176 exporting media 187 importing media 186 lock front panel 188 portal support 187 problem with not displaying 577 redefining partitions 148 setting up hardware 1175 unlock front panel 189 using with Backup Exec 138 viewing 1179 viewing properties 140 Robotic Library Inventory Report 544 robotic library properties Configuration tab 142 General tab 141 SCSI Information tab 144

1175 SCSI bus, configuring for tape devices in a cluster 776 SCSI pass-through mode, setting for drives 129 search catalogs 449 secondary navigation bar 806 security changing for Windows systems 46 R/3 Agent for Oracle Server 1330 restoring 427 select into/bulk copy option, SQL 7.0 1062 selecting devices and data to back up 265 selection lists copying to another server 855 creating 274 creating using script file 723 defined 274, 1405 deleting 279 editing 280 excludes 280 merging and replacing 278 script file using in command line applet 723 values for 724 using for backup job 277 selections deleting 279 Desktop Agent, backup 1245 DLO, backup 1201 editing 281 user-defined, adding 282 user-defined, using TCP/IP addresses 282 Selections options for backup job 245 serial numbers Backup Exec for Windows Servers Remote Agent 845 Backup Exec, adding and removing 51, 56 See also names of individual agents and options serialized copy, Backup Exec 571 server clusters See also clusters server list adding and removing servers 70 manually update for NetWare 1368 server properties viewing 118 1430

viewing server information 119 viewing system properties 120 Server tab 119 ServerFree Option installing 972 overview 39 service account changing 70 described 49 service state 343 services starting and stopping 70 starting and stopping on multiple servers 962 Set Application Defaults, Preferences 91 Set Primary SAN SSO Server, See also Backup Exec Utility Set Remote Agent Priority 259 Shadow Copy Components File System 343 shared catalogs, using 939 shared device, defined 1405 SharePoint Agent 1341 backing up a SharePoint Portal Server or Workspace 1343 disaster recovery 1351 installing 1343 overview 39, 1341 redirecting restore jobs 1347 restoring SharePoint Portal Servers and Workspaces 1345 system requirements 1342 SharePoint Portal Server command line, backing up from 623 disaster recovery 1351 redirecting restore jobs 1347 SharePoint Services 347 sharing media 939, 958 silent mode installation 48, 60, 1405 simple recovery model, SQL 2000 999 single block mode, setting for drives 129 single instance backup for message attachments Exchange 2000 and 2003 1103 Exchange 5.5 1143 single instance backup for NTFS volumes 258 Site Replication Services (SRS) database, backing up 1097 size, cluster 583 Administrator’s Guide

Index

Index

transaction logs 1017 Windows registry 1004 SQL 2000, restoring automate master database restore 1020 create standby database 1019 database files to target instance 1021 disaster recovery 1042 filegroups 1027 Guide Me wizard 1022 Intelligent Disaster Recovery (IDR) option 1041 master database 1030 named transaction, include 1022 named transaction, to a 1022, 1026 point in time log restore option 1025 primary and nonprimary filegroups 1023 recovery completion state 1019 redirecting restores 1032 Redirection dialog box 1032 restore defaults 1035 Restore Job Properties dialog box 1018 very large databases 1023 SQL 2003 backing up using the SQL Server Writer 1089 protecting SQL Server using the SQL Server Writer 1089 restoring using the SQL Server Writer 1090 SQL 7.0 agent features 1047 agent installation 1049 agent requirements 1048 consistency check, recommendations 1053 Database Consistency Check (DBCC), recommendations 1053 disaster recovery preparation 1084 logon accounts 1050 SQL 7.0, backing up Backup Job Properties dialog box 1055 backup job script file method 682, 726 backup methods 1056 command line 620 command line, using for standby or recover 623 consistency check after backup 1081 consistency check options 1056 1431

Index

slot base configuration 143, 1179 Small Business Server Edition of Backup Exec, described 34 SMTP configuring e-mail recipients 489 e-mail notification method 483 SNMP configuring notification 511 configuring system service for Windows 2000 515 configuring system service for Windows NT 514 installing WMI provider 516 object identifier prefix 511 traps, defined 511 WMI 516 software license agreement 50, 72 son media rotation strategy 220 Sony, recommended driver 576 Specified Backup Network feature configuring 334 described 332 splash screen, show at startup 91 SQL 2000 agent features 999 agent installation 1001 agent requirements 1000 Backup Job Properties dialog box 1008 consistency check, recommendations 1005 Database Consistency Check (DBCC), recommendations 1005 disaster recovery preparation 1041 logon accounts 1002 overview 999 SQL 2000, backing up backup job script file method 739 backup methods 1009 command line 622 consistency check after backup 1011 consistency check recommendations 1005 databases 1012, 1013 disaster recovery preparation 1041 filegroups 1015 Guide Me wizard 1012 loading state 1011 standby mode 1011 strategies for 1004

consistency check recommendations 1053 continue with backup if consistency check fails 1081 databases 1058 disaster recovery preparation 1084 filegroups 1060 Guide Me wizard 1057 nonlogged operations occurring 1062 select into/bulk copy option 1062 strategies for 1052 transaction logs 1063 truncate log on checkpoint option 1058, 1062 Windows registry 1052 SQL 7.0, restoring automate master database restore 1066 create standby database 1065 disaster recovery 1085 filegroups 1072 Guide Me wizard 1068 primary and nonprimary filegroups 1068 Rebuild Master utility 1074 recovery completion state 1065, 1082 redirecting restores 1076 Redirection dialog box 1077 restore database files to target instance 1067 restore defaults 1079 restore job properties 1064 Restore Job Properties for SQL dialog box 1064 Standby database 1082 SQL Server Writer backing up SQL Server 1089 protecting SQL Server on Windows Server 2003 1089 restoring SQL Server 1090 standby database SQL 2000 999 SQL 7.0 1047 standby database, creating SQL 2000 1019 SQL 7.0 1065 starting Backup Exec 80 Desktop and Laptop Option (DLO) 1186 services 962 1432

static volume, defined 1405 statistical properties for media 229 statistics drive usage 132 drives since cleaning 134 Statistics tab for backup-to-disk folder 166 Status tab for a robotic library 145 stopping services 962 storage devices installing 43 not being displayed 577 storage limits for user data Desktop Agent 1256 DLO 1196 Storage Location creating 1191 defined 1182 deleting 1194 synchronization create new sets 1259 delete synchronized folder 1260 overview 1257 Synchronized Selections view, in Desktop Agent 1257 system logon account 365 system media, defined 196, 1405 system requirements See also names of individual agents and options Backup Exec 44 System State backing up on remote systems 850 restoring 437 System Summary, overview 86 System tab 120 T tablespace data, Oracle Agent 1283 tape driver, recommended use 576 tape drives, cartridge 576 tapes See also media DLT tape drive 579 target domain, defined 47 task pane, overview 83 TCP/IP adding for user-defined shares 282 enabling protocol 336 required for UNIX Agent 602

Administrator’s Guide

Index

Index

associated with bexpi.dsm file 1384 backupexec_pi storage pool, defined 1374 backuppool 1374, 1384 bex.mac macro, command details 1384 bex.mac macro, defaults created by 1384 bex.mac macro, defined 1375, 1383 bex.mac macro, errors while executing 1378 bex.mac macro, using with shared or individual nodes 1378 bex_backup policy set, default 1384 bexpi.dsm file, as used in bex.mac macro 1384 creating backupexec_pi storage pool 1375 creating the bexpi.dsm file 1376 diserror.log error log 1386 dsmfmt utility, defined 1375 dsmfmt utility, using to create a storage volume 1376 dsmrc.h file 1386 MC_PI management class 1373 MC_VT management class in theory of operation 1374 Position Information (PI) data stream, defined 1373 setting backup versions to keep 1385 storage volume, creating with dsmfmt utility 1376 theory of operation 1373 error logs 1386 individual nodes 1378 registering nodes 1379 registry keys 1379 changing default number of slots in robotic library 1381 changing default password 1383 communications timeout, changing default 1380 file space name, changing in Backup Exec 1381 MC_PI management class in Backup Exec 1382 MC_VT management class, changing default name 1382 node name for Backup Exec 1381 1433

Index

Template Definition Usage Report 879 Terminal Server Edition, installing 50 test run job creating 314 defined 314 running for scheduled job 392 setting defaults 318 Tivoli Storage Manager (TSM) Option, overview 39 transaction logs Lotus Domino DBIID 1316 overview, Lotus Domino 1316 recycling, Lotus Domino 1319 viewing Lotus Domino 1312 transaction logs, backing up SQL 2000 1016 SQL 7.0 1062 troubleshooting clusters 801 Oracle Agent 1307 TSM option 1386 truncate log on checkpoint option, SQL 7.0 1058, 1062 TSM Option Backup Exec as TSM client 1372 commands management classes created by bex.mac macro 1384 MC_PI management class created by bex.mac macro 1384 MC_VT management class created by bex.mac macro 1384 objects, default size 1384 objects, defined 1384 password for backupexec node, default 1385 policy domain VERITAS, default 1384 policy set bex_backup, default 1384 registering nodes 1385 time to retain only backup version, setting 1385 VERITAS policy domain, default 1384 components Backup Exec default node name 1385 Backup Exec default node registration 1385 backupexec_pi storage pool

objects in Backup Exec 1382 shared nodes 1378 system requirements 1371 troubleshooting 1386 Virtual Tape (VT) data stream, defined 1374

Desktop Agent access via Profile 1238 import in CSV file in DLO 1214 properties, changing in DLO 1215 removing from DLO 1216 viewing in DLO 1215 users in DLO, CSV file to add 1214 utility jobs, overview 170 utility partitions backing up 350 backing up in IDR 894 restoring 439 restoring in IDR 897 selecting data for backup 266

U unattended backup jobs 112 uninstalling Backup Exec 71 Backup Exec from a cluster 764 using command line 66 Windows Management Instrumentation SNMP provider 517 UNIX Agent advertise to media server 607 back up symbolic links 600, 606, 607 configuring 606 described 602 installation overview 602 system requirements 602 UNIX Agent commands agent.cfg commands 606 exclude directories/files 608 identify exported paths 607 include remote file systems 607 password-protect published path 607 password-protect workstation 606 preserve ctime 608 publish directory tree 607 write-protect published path 607 unlocking robotic library panel 189 up on log on/off option in DLO, back 1200 user account, Oracle Agent 1285 User Assignments dialog box, New Automated 1208 User Data Folder, defined 1192 User dialog box, Move 1217 User Properties dialog box in DLO 1215 user-defined media vault 215, 1403 adding media to 217 creating 216 deleting 219 renaming 217 user-defined selections, adding 282 Users access, disabling/enabling in DLO 1216 adding in DLO 1213

1434

V verify after backup completes 255, 287 after duplicate backup completes 310 verify job creating 312 defined 312 VERITAS Backup Exec for Windows Servers, described 33 VERITAS update 75 version and build information, displaying 571 view filter, setting 472 viewing active alerts 470 active job properties 386 alert history 470 alert job log 476 alert properties 473 alerts 470 Automated User Assignment properties 1210 calendar 384 completed job 394 job monitor 381 jobs 956 jobs list 381 Lotus Domino databases 1312 Lotus Domino transaction logs 1312 scheduled jobs 390 users in DLO 1215 views, alerts 470 VIM configuring recipients 494 e-mail notification method 486

Administrator’s Guide

Index

virtual devices, using in IDR 884 virtual servers, backing up in a cluster 786 virus, effect on data storage requirements 354 volume restrictions, NetWare Agent 1367 W

Index

1435

Index

Window menu 1393 Windows 2000 remote systems, backing up with Backup Exec Remote Agent 850 System State, backing up on remote systems 850 Windows 98/Me Agent installing 589 password-protecting published folders 593 publishing drives and directories 592 set directories as read-only 593 system requirements 588 Windows 98/Me Agent, configuring allow registry restore 591 current status 591 disable and enable network backup 591 overview 590 publish directories 592 set up network protocol 594 set workstation password 591 using DHCP 594 Windows Automated System Recovery (ASR) files, in IDR, defined 881, 885 Windows Change Journal option to use for backup job 255 using to determine backed up status 361 Windows Explorer, backups creating 293 enabling 91

overview 293 specifying or changing settings 294 submitting 297 Windows Management Instrumentation (WMI), adding WMI capability 516 Windows NT disaster recovery 559 drivers list 576 Windows registry, backing up SQL 2000 1004 SQL 7.0 1052 Windows Server 2003 backing up 343 disaster recovery 555 protecting upgraded resources 347 Windows XP, disaster recovery 555 Wizard for DLO, Configuration 1191 wizards accessing using the Assistant 88 defined 1406 WMI installing performance counter provider 516 installing SNMP provider 516 performance counters 516 uninstalling SNMP provider 517 working set backups, defined 358, 1406 write checksums to media 250 Writers backing up SQL Server using the SQL Server Writer 1089 protecting SQL Server on Windows Server 2003 1089 restoring SQL Server using the SQL Server Writer 1090

Related Documents

Backup
April 2020 27
Backup
October 2019 36
Backup
November 2019 29
Backup
June 2020 24