Sie sind auf Seite 1von 856

UnitrendsAdministratorsGuide Version7.3.

05
release1.02112014

7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300

Contents

About this Guide ................................................................................................................................23


Typographical conventions ......................................................................... 23 Terminology ................................................................................................ 23 Contacting Unitrends Support..................................................................... 25 Case severity levels ............................................................................. 27 Customer Portal ................................................................................... 28 Unitrends website support information................................................. 31

Chapter 1

Introducing Unitrends ................................................................................................33


The Unitrends Administrator Interface ........................................................ 33 Navigation pane options ...................................................................... 36 Status icon ........................................................................................... 37 Backup icon ......................................................................................... 37 Restore icon......................................................................................... 37 Archive icon ......................................................................................... 37 Replication icon.................................................................................... 37 Reports icon......................................................................................... 37 Settings icon ........................................................................................ 38 About icon ............................................................................................ 38 Log out icon ......................................................................................... 39

Chapter 2

Getting Started............................................................................................................41
Prerequisites for physical systems.............................................................. 41 Site preparation.................................................................................... 41 Physical system preparation ................................................................ 42 Prerequisites for virtual systems ................................................................. 43 Initial configuration of Unitrends systems ................................................... 43
3

System setup .............................................................................................. 45 Setup Wizard overview ........................................................................ 45 Complete the configuration .................................................................. 46 Subsystem configuration settings ............................................................... 47 About the welcome screen................................................................... 47 About product registration.................................................................... 47 About date and time configuration ....................................................... 48 About hostname settings ..................................................................... 50 About configuring notifications ............................................................. 50 About root password configuration ...................................................... 53 About user configuration ...................................................................... 54 About the installation type.................................................................... 56 About expanding storage ..................................................................... 57 About adding clients............................................................................. 61 About global retention and deduplication............................................. 64 Setup complete .................................................................................... 66

Chapter 3

Advanced Configuration Options .............................................................................67


About licensing the system ......................................................................... 67 About network configuration ....................................................................... 68 Ethernet settings .................................................................................. 68 DNS settings ........................................................................................ 70 Hosts settings ...................................................................................... 71 About configuring root passwords............................................................... 72 Operating system root password configuration.................................... 73 Administrator interface root password configuration ............................ 73 Auto-login feature................................................................................. 73 About working with clients........................................................................... 74 About renaming clients ........................................................................ 75 Client trust credentials ......................................................................... 77 About system updates ................................................................................ 79 Shutting down the Unitrends system .......................................................... 80 About remote system management ............................................................ 83 Granting privilege for remote management ......................................... 84 About credential management .................................................................... 85 About Active Directory authentication ......................................................... 87 About storage configuration ........................................................................ 91 Storage types....................................................................................... 92

Contents

Adding storage to the system .............................................................. 93 Configuring storage.............................................................................. 97 Storage allocation and distribution..................................................... 104 Balancing backup performance and retention ................................... 105 About retention control.............................................................................. 106 About system notifications ........................................................................ 109 About SNMP trap notifications ........................................................... 109 SNMP trap conditions ........................................................................ 110 SNMP agent....................................................................................... 113 About encryption ....................................................................................... 114 Archiving with encryption ................................................................... 117 Encryption limitations ......................................................................... 117 About security levels ................................................................................. 118 Open ports and security levels........................................................... 119 About device configuration........................................................................ 122 About the NTFS change journal................................................................ 125 Change journal operation for master backup ..................................... 126 Change journal operation for incremental backup ............................. 126 Configuring the change journal .......................................................... 127 Change journal configurable file types ............................................... 128 Change journal per volume................................................................ 129 Change journals and remote mounts ................................................. 129

Chapter 4

Backups.....................................................................................................................131
File-level backup types ............................................................................. 132 Using selection lists ........................................................................... 133 File-level backup strategies ...................................................................... 138 About executing backups.......................................................................... 139 Maximum file pathname lengths ........................................................ 139 Working with the Computer backup subsystem........................................ 139 Working with the Enterprise backup subsystem ....................................... 146 Enterprise backup elements .............................................................. 147 About calendars ................................................................................. 147 About Enterprise selection lists .......................................................... 152 About backup options ........................................................................ 159 About Enterprise backup schedules .................................................. 166 Protecting NAS devices ............................................................................ 172 Working with client aliases........................................................................ 172
5

Contents

Viewing backups ....................................................................................... 175 Monitoring running jobs............................................................................. 182 Standard restore procedures .................................................................... 184 Working with the Backup Browser ............................................................ 185

Chapter 5

Archiving ...................................................................................................................187
Archiving basics ........................................................................................ 187 How does archiving work? ................................................................. 187 Types of archives ............................................................................... 189 Options on the main Archive screen .................................................. 189 General archiving steps ..................................................................... 190 About archive media ................................................................................. 190 Archive media types........................................................................... 191 Managing archive media........................................................................... 195 Archiving backups..................................................................................... 200 Archive considerations ....................................................................... 201 Archiving replicated backups ............................................................. 202 Archive settings.................................................................................. 203 Recommended date range strategies ................................................ 207 Scheduling strategies for tape archive ............................................... 210 On-demand archive ........................................................................... 211 Archive schedules .............................................................................. 213 Viewing and restoring archives ................................................................. 217 Archive search options and results .................................................... 217 Viewing archives ................................................................................ 221 Archive restore................................................................................... 224 Restoring from tape ........................................................................... 230 Removing and importing archive sets....................................................... 230 Stopping and starting the archive process................................................ 234 Archive to tape setup ................................................................................ 234 Tape archive terminology................................................................... 234 Tape barcodes ................................................................................... 235 Tape archive prerequisites................................................................. 236 Connecting the device ....................................................................... 237 Configuring the device in the Unitrends system................................. 240 Setting up the tape archiving process ................................................ 242

Contents

Chapter 6

Replication ................................................................................................................243
About replication ....................................................................................... 243 About secure tunnels for Unitrends systems ..................................... 244 Replication Features ................................................................................. 245 Replication requirements .......................................................................... 246 Supported systems ............................................................................ 246 System requirements ......................................................................... 247 Replication limitations ............................................................................... 247 Replication and legacy vaulting comparison............................................. 248 Retention............................................................................................ 248 Deduplication ..................................................................................... 249 Encryption handling ........................................................................... 249 Restore .............................................................................................. 250 Installation types and replication............................................................... 250 Replication setup ...................................................................................... 251 Standard replication setup ................................................................. 252 Cross-replication setup ...................................................................... 260 Configuring replication after the initial setup ............................................. 268 Configuring connection options and process control ......................... 269 Seeding the initial data set ................................................................. 270 Configuring backups for replication.................................................... 271 Tuning bandwidth and throttling options ............................................ 272 Setting replication report options ....................................................... 272 Suspending replication....................................................................... 273 Moving a source to a different replication target ................................ 273 Removing replication ......................................................................... 274 Upgrading from legacy vaulting to replication ........................................... 275 Migration limitations ........................................................................... 275 Navigating replicating systems ................................................................. 280 From the source system .................................................................... 280 From the target system ...................................................................... 280 Viewing replicated backups ............................................................... 282 Working with the replication dashboard .................................................... 283 Completed Replication Operations pane ........................................... 283 Active Replication Operations pane ................................................... 287 Pending Replication Operations pane ............................................... 291 Dashboard controls............................................................................ 295 Archiving replicated backups .................................................................... 295
7

Contents

Restoring replicated backups.................................................................... 295 Bare metal restore from the replication target.................................... 296 Restore a Linux or non-x86 client from the replication target............. 299 Deleting replicated backups...................................................................... 300 Replication reports .................................................................................... 301

Chapter 7

Legacy Vaulting ........................................................................................................303


Vaulting overview...................................................................................... 303 Vaulting setup ........................................................................................... 306 Vaulting continuous Exchange protection data .................................. 312 Data protection vault restore..................................................................... 314 Working with the vaulting dashboard ....................................................... 314 Completed Vaulting Operations pane ................................................ 314 Active Vaulting Operations pane........................................................ 315 Pending Vaulting Operations pane .................................................... 316 Vaulting dashboard controls .............................................................. 317 Vaulting reports......................................................................................... 317 Granular restore from vault ....................................................................... 318 Export vaulted data to an archive device .................................................. 318

Chapter 8

Restore ......................................................................................................................323
Basic steps for restoring backups ............................................................. 323 Restoring backups from a client with aliases ............................................ 324 Restore file exclusion options ................................................................... 325 Full restore with exclusions....................................................................... 325 Advanced execution options for restore.................................................... 325 AIX restore considerations........................................................................ 326 Linux restore considerations ..................................................................... 327

Chapter 9

Reports, Alerts, and Monitoring..............................................................................329


Reports ..................................................................................................... 329 Standard system reports (system generated) .................................... 329 User-generated reports...................................................................... 333 Alerts ........................................................................................................ 373 Monitoring ................................................................................................. 374 Failures and warnings ........................................................................ 374

Contents

System load ....................................................................................... 374 Support toolbox.................................................................................. 375

Chapter 10

Disaster Recovery ....................................................................................................379


Archive or replicate ................................................................................... 380 Preparation ............................................................................................... 380 Restoring the system ................................................................................ 382 Scenario 1: Restoring a backup system .................................................. 382 Selecting storage devices during DR................................................. 383 Configuring the newly imaged system ............................................... 383 System restore from the replication target ......................................... 384 System restore from archive .............................................................. 386 Scenario 2: Recovering from a corrupt backup device ............................. 388 Scenario 3: Recovering from a corrupt RAID............................................ 389 Scenario 4: Recovering a corrupt internal drive ....................................... 390 Post-recovery considerations ................................................................... 390 Restoring backup data to the clients......................................................... 391 Bare metal basic steps....................................................................... 391 File-level and application restore basic steps .................................... 391

Chapter 11

Legacy Disaster Recovery.......................................................................................393


Archive or vault ......................................................................................... 394 Preparation ............................................................................................... 394 Restoring the system ................................................................................ 396 Scenario 1: Restoring a backup system .................................................. 396 Scenario 2: Recovering from a corrupt backup device ............................. 397 Scenario 3: Recovering from a corrupt RAID............................................ 398 Scenario 4: Recovering a corrupt internal drive ....................................... 399 Additional requirements for restoring to a virtual system .......................... 399 Storage setup............................................................................................ 399 Disaster recovery from vault .................................................................... 400 Automatic disaster recovery from vault..................................................... 401 Create an automatic disaster recovery profile.................................... 402 View an automatic disaster recovery profile....................................... 402 Remove an automatic disaster recovery profile ................................. 403 Change, stop, or suspend an automatic disaster recovery profile ..... 403
9

Contents

Disaster recovery from archive ................................................................. 403 Post-recovery considerations ................................................................... 404 Restoring backup data to the clients......................................................... 405 Bare metal basic steps....................................................................... 405 File-level and application restore basic steps .................................... 405

Chapter 12

Protecting Windows Environments ........................................................................407


Windows agent versions ........................................................................... 407 Windows agent requirements ................................................................... 409 Push installing the Windows agents ......................................................... 410 Agent push install requirements......................................................... 411 Manually installing the Windows agents ................................................... 412 Agent installer for Windows XP, 2003, and up................................... 413 Agent installer for Windows 2000 client ............................................. 416 Command-line installer for Windows clients ...................................... 417 Windows agent installer command-line examples ............................. 418 Windows protection software deployment using Group Policy .......... 419 Removing or repairing Windows agents ................................................... 421 Maintenance mode for Windows XP, 2003, and up ........................... 421 Maintenance mode for Windows 2000 client ..................................... 422 Updating the Windows agents .................................................................. 422 Push installing agent updates ............................................................ 422 Manually updating Windows agents .................................................. 424 About Windows protection ........................................................................ 425 Volume Shadow Copy Service on Windows Server .......................... 425 Backing up a Windows Server ........................................................... 425 Backing up Windows applications...................................................... 426 Protecting deduplication-enabled Windows 2012 Servers................. 426 System state backup and restore on Windows Server ...................... 426 Protecting Windows DFS Servers...................................................... 427 Active Directory backup and restore on Windows Server .................. 427 Bare metal restore of Active Directory Server on Windows Server ... 428 Microsoft IIS meta-directory backup and restore ............................... 429 Certificate Services database backup and restore ............................ 429 Cluster database backup and restore on Windows Server ............... 430 Protecting file clusters ........................................................................ 430 Windows bare metal .......................................................................... 431 Features of the Windows agent ......................................................... 431 Windows Instant Recovery ....................................................................... 436

10

Contents

Overview ............................................................................................ 436 Windows Instant Recovery and bare metal recovery......................... 436 How Windows Instant Recovery works .............................................. 437 Recommended backup strategy ....................................................... 438 Supported configurations ................................................................... 439 Windows Instant Recovery tips .......................................................... 442 Windows Instant Recovery steps....................................................... 443 Modes of operation ............................................................................ 444 System resource considerations and prerequisites ........................... 445 Storage allocation .............................................................................. 446 Virtual network setup ......................................................................... 447 Setting up a virtual client .................................................................... 449 Modifying a virtual client..................................................................... 453 Virtual client restore status................................................................. 454 Viewing the status of virtual clients .................................................... 456 Changing the mode of operation........................................................ 458 Accessing the virtual client while in Audit or Live mode..................... 459 When disaster strikes......................................................................... 460 Reports and notifications ................................................................... 461 Troubleshooting ................................................................................. 462

Chapter 13

Microsoft SQL Server Protection ............................................................................463


About SQL Server protection .................................................................... 463 Agent prerequisites for Microsoft SQL ............................................... 464 System requirements ......................................................................... 464 SQL Server agent backups ................................................................ 465 Display of SQL Server in the backup system..................................... 465 Executing SQL backups............................................................................ 466 SQL Server backups status ...................................................................... 470 Restoring SQL backups ............................................................................ 471 Restoring the master database .......................................................... 471 Restoring the model and msdb databases ........................................ 472 Restoring SQL Full backups .............................................................. 473 Restoring SQL differential and transaction backups .......................... 474 Restoring a backup when the SQL icon does not display.................. 475 SQL restore from the replication target..................................................... 476 Replicated SQL restore requirements and considerations................. 476

Chapter 14

Microsoft Exchange Server Protection ..................................................................479


About Exchange protection....................................................................... 479
11

Contents

Requirements for using Exchange Server protection......................... 480 Installing Exchange protection ........................................................... 481 Recommended configurations for Exchange ..................................... 481 Data protection strategies for Exchange ............................................ 482 Automatic exclusion of Exchange data during file-level backups....... 483 About the circular logging setting for Exchange................................. 483 Snapshot and streaming backups for Exchange ............................... 483 Executing Exchange backups................................................................... 484 About Exchange 2013 and 2010 backup ........................................... 489 About Exchange 2007/2003 backup .................................................. 489 About protecting clustered Exchange environments.......................... 489 About Exchange 2000 backup ........................................................... 492 Exchange archiving............................................................................ 492 Exchange replication.......................................................................... 493 Microsoft Exchange recovery.................................................................... 493 Restoring an Exchange database or storage group .......................... 493 Restoring Exchange items ................................................................ 499 About restoring Exchange 2013 and 2010 from a backup................. 503 About restoring Exchange 2007 from a backup ................................. 503 About restoring Exchange 2003 from a backup ................................. 504 About restoring Exchange 2000 from a backup ................................. 504 Restoring Exchange from archives .................................................... 504 Restoring Exchange from a legacy vault ........................................... 504 Restoring a backup when the Exchange icon does not display ......... 504

Chapter 15

Microsoft SharePoint Protection.............................................................................507


About SharePoint protection ..................................................................... 507 SharePoint agent requirements ......................................................... 508 SharePoint configuration prerequisites .............................................. 510 SharePoint backup considerations .................................................... 511 Display of SharePoint agent in the backup system............................ 512 Executing SharePoint backups ................................................................. 512 Viewing SharePoint backups .................................................................... 515 Restoring SharePoint backups ................................................................. 516 SharePoint restore considerations ..................................................... 516 Restoring items with Kroll .................................................................. 520 Restoring a backup when the SharePoint icon does not display ....... 521

Chapter 16
12

Oracle Protection......................................................................................................523
About Oracle protection ............................................................................ 523

Contents

Oracle agent requirements ................................................................ 524 Oracle credential considerations........................................................ 524 Oracle backup considerations............................................................ 527 Display of Oracle agent in the backup system ................................... 527 Executing Oracle backups ........................................................................ 528 Viewing Oracle backups ........................................................................... 532 Oracle restore from the backup system .................................................... 532 Oracle restore requirements and considerations ............................... 532 Oracle for Windows restore from the replication target............................. 535 Replicated Oracle restore considerations .......................................... 535

Chapter 17

Protecting Hyper-V Environments ..........................................................................539


About Hyper-V protection.......................................................................... 539 Hyper-V HOS agent requirements ..................................................... 540 Registering the Hyper-V server to the Unitrends system ................... 542 About Hyper-V backups ..................................................................... 543 Executing Hyper-V backups...................................................................... 545 Viewing the status of Hyper-V backups ............................................. 549 Restoring Hyper-V virtual machines ......................................................... 549 Restoring files from Hyper-V backups................................................ 553 Protecting Hyper-V virtual machines at the Guest OS level ..................... 559 Special consideration for Domain Controllers on Hyper-V........................ 560 Converting from VHD to VHDX................................................................. 561

Chapter 18

Protecting VMware Infrastructure...........................................................................563


Best practices for protecting VMware virtual machines ............................ 563 About the Virtualization Protector ............................................................. 566 Virtualization Protector requirements........................................................ 567 Raw device mapped disk limitations .................................................. 569 Adding vCenter and ESX servers ............................................................. 570 Setting VM credentials .............................................................................. 571 Working with VM credentials.............................................................. 572 Deleting vCenter and ESX servers ........................................................... 575 About VMware backups ............................................................................ 575 VMware backup strategies................................................................. 577 VMware SAN-direct backups ............................................................. 578 VMware disk exclusions..................................................................... 581
13

Contents

Executing VMware backups............................................................... 582 Restoring the VMware virtual infrastructure.............................................. 586 Restoring the entire virtual machine .................................................. 586 Restoring files from VMware backups................................................ 588 Instant recovery for VMware ..................................................................... 595 Instant recovery in audit mode........................................................... 597 Instant recovery mode ....................................................................... 599 Recovering peripheral devices........................................................... 600 Protecting VMware templates ................................................................... 600 Executing backups of VMware templates .......................................... 601 Restoring VMware templates ............................................................. 605 Troubleshooting ................................................................................. 607

Chapter 19

Protecting Cisco UCS Environments .....................................................................609


Working with UCS blade and rack-mount servers .................................... 609 Protecting UCS blade and rack-mount servers.................................. 610 Restoring UCS client backups ........................................................... 612 Disaster recovery of UCS clients ....................................................... 613 Working with Cisco UCS service profiles.................................................. 616 About protecting Cisco UCS service profiles ..................................... 616 Viewing UCS service profile backups ....................................................... 623 Restoring UCS service profile backups .................................................... 626 UCS service profile restore requirements and considerations ........... 626

Chapter 20

AIX protection ...........................................................................................................633


AIX agent versions.................................................................................... 633 AIX agent restrictions................................................................................ 634 Installing protection software for AIX ........................................................ 634 AIX client backup and restore ................................................................... 635 Uninstalling protection software on AIX client........................................... 635

Chapter 21

HP-UX protection......................................................................................................637
HP-UX agent versions .............................................................................. 637 Installing protection software on an HP-UX client..................................... 638 Installation of the HP UNIX agent ............................................................. 638 Uninstalling HP UNIX client protection software ...................................... 639

14

Contents

Chapter 22

iSeries protection ....................................................................................................641


Getting started with iSeries protection ...................................................... 641 Space requirements and maximum file size for successful backup... 642 iSeries master backup and restore considerations ................................... 643 iSeries backup operation .......................................................................... 644 The iSeries backup menu ......................................................................... 645 iSeries profile ............................................................................................ 646 iSeries backup now option ........................................................................ 646 Schedule an iSeries backup ..................................................................... 647 iSeries restore operation........................................................................... 647 iSeries disaster recovery........................................................................... 648 iSeries log files.......................................................................................... 648

Chapter 23

Linux protection .......................................................................................................649


Linux agent versions ................................................................................. 649 Installing Linux protection software .......................................................... 651 Downloading the Linux agent installation file ........................................... 651 File-level backup and restore.................................................................... 652 Default exclusions .............................................................................. 652 Bare metal backup and disaster recovery................................................. 653 Uninstalling Linux protection software ..................................................... 653

Chapter 24

Mac OS X protection ...............................................................................................655


MAC OS X agent versions ........................................................................ 655 Mac OS X 10.8 ......................................................................................... 656 Installing Mac OS X protection software ................................................... 656 Additional protection software notes ......................................................... 657

Chapter 25

Novell NetWare protection.......................................................................................659


Novell NetWare agent versions ................................................................ 659 Installing protection software on a Novell client ........................................ 660 Upgrading protection software on a Novell client...................................... 662 Uninstalling protection software from a Novell client ................................ 663 GroupWise configuration during Novell NetWare agent install ................. 663 Using TSA-based client to backup GroupWise......................................... 664
15

Contents

GroupWise backups without TSA on Novell client.................................... 664 Using TSA-based client to restore GroupWise ......................................... 665 Out-of-place GroupWise restore using NetWare agent ............................ 665 In-place GroupWise restore using NetWare agent ................................... 666 ConsoleOne recovery using NetWare agent ............................................ 666 eDirectory backup and restore using Novell agent ................................... 667 Switching between TSA and non-TSA backups ....................................... 672 Novell NetWare agent restrictions and limitations .................................... 672

Chapter 26

OES on Linux protection .........................................................................................673


OES on Linux agent versions ................................................................... 673 Installing OES protection software............................................................ 674 Fine-tuning SMS performance .................................................................. 675 Changing root password on OES agent ................................................... 676 Protection software for OES with AppArmor............................................. 676 Upgrading OES protection software ......................................................... 677 GroupWise configuration for OES agent install ........................................ 678 Using TSA-based client to restore GroupWise on OES client .................. 679 Out-of-place GroupWise restore on OES agent ....................................... 679 In-place GroupWise restore on OES agent .............................................. 680 ConsoleOne recovery on OES agent........................................................ 681 eDirectory backup and restore using OES agent...................................... 681 OES agent restrictions and limitations ...................................................... 685 Uninstalling protection software for OES .................................................. 685

Chapter 27

SCO OpenServer protection ...................................................................................687


SCO OpenServer agent versions ............................................................. 687 Installing protection software for SCO OpenServer .................................. 688 Uninstalling protection software on SCO OpenServer client .................... 689

Chapter 28

Solaris protection .....................................................................................................691


Solaris agent versions............................................................................... 691 Installing Solaris protection software ....................................................... 692 Uninstalling Solaris protection software ................................................... 693

16

Contents

Chapter 29

UnixWare protection ................................................................................................695


UnixWare agent versions.......................................................................... 695 Installing protection software for UnixWare .............................................. 696 Master backup of the UnixWare client ...................................................... 697 Uninstalling protection software on UnixWare client................................. 697

Chapter 30

Xen on OES 2 Protection .........................................................................................699


Xen virtualization architecture................................................................... 699 Domain Management and Control (Xen DM&C)....................................... 700 Xen backup scenarios............................................................................... 701 Scenario 1: Protecting Xen host only (recommended method).......... 702 Scenario 2: Protecting Xen virtual machines only.............................. 703 Scenario 3: Protecting Xen host and virtual machines together ........ 704

Chapter 31 Chapter 32

Bare Metal Protection Overview..............................................................................707


Bare metal test restores..................................................................... 710

Windows Hot Bare Metal Protection.......................................................................711


Windows bare metal overview .................................................................. 711 Windows hot bare metal features ...................................................... 711 Windows bare metal system requirements ........................................ 712 Implementing bare metal protection.......................................................... 713 Creating the Windows bare metal boot media ................................... 713 Testing bare metal media .................................................................. 716 Bare metal restore procedures ................................................................. 717 Physical to Virtual (P2V) restores of Windows clients........................ 717 Dissimilar bare metal restore for Windows 2003 and 2003 R2 .......... 719 Dissimilar bare metal restore for Vista and later environments.......... 721 Additional considerations for Windows bare metal ................................... 723 Windows bare metal Interface ........................................................... 723 When a system does not boot following a bare metal restore ........... 726

Chapter 33

Bare Metal for Linux .................................................................................................729


Linux bare metal overview and requirements ........................................... 729 Linux hot bare metal recovery requirements and limitations.............. 729 Implementing Linux bare metal protection ................................................ 730 Creating Linux hot bare metal boot media ......................................... 731 Linux bare metal restore procedure .......................................................... 731
Contents

17

Linux bare metal menu options .......................................................... 733 Initiate Linux client restore from backup system ................................ 734 Linux cold bare metal protection ............................................................... 734 Creating the iso for use with cold bare metal backups....................... 735 Performing cold bare metal backups and restores............................. 736

Chapter 34

Bare Metal for x86 Platforms ...................................................................................739


Intel platforms bare metal disaster recovery ............................................. 740 Specifying bare metal settings for a client ................................................ 742 Testing bare metal backups...................................................................... 743 Recovering from a crash with the bare metal boot CD ............................. 744 Using the bare metal crash recovery boot CD .......................................... 744 Bare metal boot CD menu options............................................................ 745 Bare metal boot CD tasks option ....................................................... 745 Bare metal boot CD backup option .................................................... 745 Bare metal boot CD restore option .................................................... 746 Bare metal boot CD utilities option..................................................... 747 Manual bare metal backup........................................................................ 748 When to perform a cold bare metal backup .............................................. 749 Recovering from a crash using cold bare metal........................................ 749 Configuration settings for CD only version of bare metal.......................... 751 Bare metal optimization ............................................................................ 751 Novell agent bare metal optimizer utility .................................................. 752 Usage................................................................................................. 753

Chapter 35

Bare Metal for non-x86 Platforms ...........................................................................755


Bare metal for AIX..................................................................................... 755 AIX client hot bare metal restore........................................................ 755 Generating bare metal media for an AIX client .................................. 756 Starting the bare metal restore for an AIX client ................................ 756 Bare metal for AIX menu options ....................................................... 757 Initiate AIX client restore from backup system ................................... 758 Reasons for AIX bare metal restore................................................... 758 Bare metal for Mac OS X .......................................................................... 759 Hot bare metal disaster recovery using Mac OS X ............................ 759 Creating a hot bare metal Mac OS X boot DVD ................................ 760 Mac OS X hot bare metal restore ...................................................... 760 Bare metal for UnixWare........................................................................... 761

18

Contents

UnixWare bare metal disaster recovery ............................................ 762 Bare metal rapid recovery CD for UnixWare 7.13/7.14...................... 764 Bare metal for UnixWare features...................................................... 765 UnixWare bare metal Jump Start booting .......................................... 765 UnixWare bare metal AIR-BAG main menu system .......................... 766 UnixWare bare metal diagnostic/confidence test ............................... 766 UnixWare bare metal single filesystem restore ................................. 766 UnixWare bare metal fully automated restore.................................... 767 UnixWare bare metal restore to same hard disk................................ 767 UnixWare bare metal restoring to a new partition or hard disk .......... 767 UnixWare bare metal filesystem status report ................................... 767 UnixWare bare metal adjusting filesystem sizes................................ 768 UnixWare bare metal hard disk parameter information...................... 768 UnixWare bare metal view controllers................................................ 768 UnixWare bare metal load BTLD modules......................................... 769 UnixWare bare metal view PCI, ISA, PCM/CIA cards........................ 769 UnixWare bare metal modify resource manager database................ 769 UnixWare bare metal hard disk single user mode ............................. 769 UnixWare bare metal deleting filesystems from master list ............... 769 UnixWare bare metal slice manager .................................................. 769 UnixWare bare metal restore from the backup system ...................... 772 Bare metal for Solaris SPARC .................................................................. 774 Solaris SPARC bare metal restore .................................................... 774 Generate and boot from the bare metal media .................................. 775 Bare metal recovery from a Jump Start boot server .......................... 778 Bare metal for Xen virtual machines ......................................................... 780

Chapter 36

PSA Integration with ConnectWise.........................................................................783


Introduction ............................................................................................... 783 Configuring the PSA tool........................................................................... 784 Configuring settings in ConnectWise ................................................. 784 Configuring the Unitrends PSA Integration feature............................ 786 Modifying or deleting a PSA configuration ......................................... 788 Viewing ticket history ................................................................................ 788 Invoking the billing script........................................................................... 789

Chapter 37

Troubleshooting .......................................................................................................791
Archive troubleshooting ............................................................................ 791 Troubleshooting backups and schedules.................................................. 792
19

Contents

Troubleshooting bare metal restore .......................................................... 793 Troubleshooting encryption....................................................................... 794 Troubleshooting file restore ...................................................................... 794 Troubleshooting iSeries ........................................................................... 795 Troubleshooting license management ...................................................... 795 Troubleshooting Novell NetWare agent .................................................... 796 Troubleshooting backup system messages.............................................. 797 Troubleshooting tape devices ................................................................... 798 Troubleshooting VMware ESX ................................................................. 799 Troubleshooting Windows event IDs ........................................................ 800 Starting event ..................................................................................... 800 VSS events leading up to execution of a volume snapshot ............... 801 Troubleshooting Windows legacy Exchange agent .................................. 804 Troubleshooting Windows legacy SQL Server agent ............................... 805 Troubleshooting Xen bare metal backup and restore ............................... 806

Appendix A Windows Legacy Operations ..................................................................................809


Working with the Windows agent.............................................................. 809 Launching the Windows agent ........................................................... 809 Windows agent preferences .............................................................. 809 Windows agent profiles...................................................................... 811 Performing backups with the Windows agent .................................... 812 Performing restores with the Windows agent .................................... 814 Verifying or comparing a backup ...................................................... 816 Options and other functions .............................................................. 817 Legacy SQL Server agent......................................................................... 821 Launching the legacy SQL Server agent ........................................... 822 Log in to legacy SQL Server agent ................................................... 822 Features of the SQL Server agent ..................................................... 823 Creating or modifying a legacy SQL backup schedule ...................... 823 Legacy SQL backup plan optimization .............................................. 824 Legacy SQL backup types and schedules ......................................... 824 Assigning or removing a legacy SQL backup schedule ..................... 825 Legacy SQL on-demand backups...................................................... 826 Legacy SQL restore options .............................................................. 826 Legacy SQL Server point in time restore ........................................... 828 Viewing legacy SQL backup and restore history ............................... 829 Legacy SQL Server audit and error logs............................................ 829
20

Contents

Testing Legacy SQL Server database restore................................... 829 Legacy Exchange agent ........................................................................... 830 Legacy Exchange information store setup ........................................ 831 Legacy Exchange agent setup........................................................... 831 Legacy Exchange client registration .................................................. 831 Legacy Exchange and Active Directory ............................................. 832 Legacy Exchange and the Samba share ........................................... 832 Working with Legacy Exchange information stores ........................... 832 Legacy Exchange store level log in ................................................... 833 Legacy Exchange Quantum Recovery setup .................................... 833 Legacy Exchange EQR system requirements ................................... 833 Installing Ontrack PowerControls on legacy Exchange ..................... 835 Licensing Ontrack PowerControls for legacy Exchange .................... 836 About the Ontrack PowerControls license ......................................... 836 Legacy Exchange store level functionality ......................................... 838 Legacy Exchange information store level security ............................. 838 Legacy Exchange backup and purge options .................................... 839 Legacy Exchange define information store level items ...................... 839 Legacy Exchange launch information store level master .................. 839 Legacy Exchange launch information store level differential ............ 840 Legacy Exchange store level history ................................................. 840 Legacy Exchange store level purge ................................................... 841 EIR and EQR backup schedules ....................................................... 841 Legacy Exchange information store scheduling ................................ 842 Legacy Exchange master or differential schedule ............................ 843 Legacy Exchange recovery options ................................................... 844 Legacy Exchange Quantum Recovery .............................................. 845 Legacy Exchange directories for Ontrack PowerControls.................. 845 Using the Ontrack PowerControls ExtractWizard .............................. 846 Setting up Ontrack PowerControls for legacy Exchange ................... 848 Restoring Legacy Exchange data via Ontrack PowerControls .......... 851 Restoring Exchange messages via Ontrack PowerControls .......... 851 Testing the legacy Exchange agent setup ......................................... 854 Testing Exchange information store backups .................................... 854

Appendix B Unitrends Open Source Compliance ......................................................................855

Contents

21

22

Contents

AboutthisGuide
TheUnitrendsAdministratorsGuideprovidesdetailedinstructionsoninstallation, configuration,andadministrationoftheUnitrendsbackupsolution.Thetarget audienceforUnitrendsproductsaresystemadministratorsforsmall,medium,and largecompanies. AllproceduresarerunfromtheUnitrendsAdministratorInterface(AI),unless otherwisespecified.Seethefollowingtopicsfordetails:

Typographicalconventionsonpage 23 Terminologyonpage 23 ContactingUnitrendsSupportonpage 25

Typographicalconventions
Menucommandsareinbold,andasequenceofcommandsisdesignatedusing thefollowingstyle,Settings>Notifications. Textyoutypeinisincourierbold,forexample,root. Linksandcrossreferencesareinblue,forexample, http://www.unitrends.com/support/customercarecenter.html

Terminology
Thefollowingtabledescribesthetermsusedinthisdocument.Lookoutfor dinosaurslurking!Termshavechangedandyoumayrunintoinstanceswhere deprecatednamesarestillused.

23

Term backup system

Definition Unitrends backup system, administered through the Unitrends AI. Equivalent to legacy terms DPU, appliance, Rapid Recovery Console (RRC), and BP. A Unitrends backup system that is managed by another Unitrends backup system. You can administer multiple managed systems from the AI through a single pane of glass. Equivalent to legacy term MDPU. A Unitrends backup system located off-site to which backups are replicated from other Unitrends systems. This can be another system owned by your company, or the Unitrends Cloud service. Replication is not supported on systems running versions older than 7.0.0. Instead, legacy vaulting is used. A vault is the target system to which backup data is replicated. This can be another system owned by your company, or the Unitrends Cloud service. Equivalent to legacy term DPV. For systems running version 7.0.0 or later, the installation type determines whether the system functions as a backup system, replication target, or both a backup system and replication target. For systems running older versions, legacy vaulting is used. Installation types include backup system, vault, or cross-vault if performing both roles. Equivalent to legacy terms system personality or system identity.

managed system

target system

vault

installation type

24

ContactingUnitrendsSupport
YoucancontacttheUnitrendsSupportCenterbytelephone,email,orthroughthe CustomerPortal.AnyregisteredTechnicalContactfromanorganizationwitha currentSupportAgreementmaycontacttheUnitrendsSupportCenterusingany ofthesemethods. YoucanalsosubmitaticketthroughtheKnowledgeBaseorinitiatealivechatwith Support.(YoucansearchforadditionalinformationontheUnitrendswebsite.See Unitrendswebsitesupportinformationonpage 31formoreinformation.) Herearedetailsaboutthesupportoptions:
Support Options Telephone Support Description Contact Unitrends Support by telephone:

At 1.888.374.6124 for North America At 1.855.593.2861 for International UK (toll-free) 0808 101 7687 France (toll-free) 0805 080 429 Germany (toll-free) 0800 723 8445 You can call at any time during the hours specified in your Unitrends support service level contract. This is the recommended method for logging high priority support issues.

Email Support

Contact Unitrends Support via email at:

support@unitrends.com
You can email support twenty-four hours a day, seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during non-business hours are addressed the next business day. (Your support contract determines your support contract hours.) You can also email a question through the Support Chat option on the Unitrends website. See AccessSupportChat onpage 27 for more information.

About this Guide

25

Support Options Access the Customer Portal

Description Contact Unitrends Support through the Customer Portal on the Unitrends website at www.unitrends.com. You can access the Customer Portal 24 hours a day to view current or past cases for currently deployed or disposed assets. You can also log new cases or add notes to open cases. Cases logged through the Customer Portal fall under the same guidelines as contact via telephone. Priority issues should be logged via the telephone in order to assure prompt attention. See CustomerPortalonpage 28 for additional information, including access and login procedures.

Submit a ticket through the KnowledgeBase

You can submit a Support ticket through the KnowledgeBase on the Unitrends website. See Unitrendswebsitesupport informationonpage 31 for more information.

26

Support Options Access Support Chat

Description You can initiate an online, live chat with Unitrends Support through the Unitrends website. Live chat is available Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Your chat request will be answered within 60 seconds. You also have the option to email your question through the Support Chat. Notes: For sales questions, click the Sales Chat button. There is also a Support Chat option on the Customer Portal.

Access the Unitrends website at www.unitrends.com. Click the Support Chat icon on the right side of the home
page. The Live Chat window displays. Note: The Support Chat icon displays on the home page and also on all main pages (such as the Support page). click Email us or Chat with us.

Enter your name, email address, and your question, then Email - You can email support twenty-four hours a day,
seven days a week. Emails are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Emails received during nonbusiness hours are addressed the next business day. (Your support contract determines your support contract hours.) Chat - If you select to chat, you see a chat box with your question. A Unitrends Support Engineer responds to your question, and you can chat back and forth until your question is answered. If your device supports telephone operations, you can click Call Me to initiate a phone call to Unitrends Support.

If you are a registered user and your question cannot be answered via chat, Support opens and assigns a case for you.

Caseseveritylevels
Acaseisadocumentedtrackingofaspecificproblemorquestioninitiatedbya TechnicalContact.Thereareseveralseveritylevelsassociatedwithcases.They are:

About this Guide

27

1Criticalissue.Forexample,yourproductionserveroranothermissioncritical systemisdown. 2Seriousissue.Forexample,aproblemorissueisadverselyimpacting productionoperationsbuttheproductionsystemisnotdown. 3Issue.Forexample,aproblemhasoccurredwithalimitedadverseeffecton yourbusinessoperations. 4Minorissueorquestion.Forexample,thereisaminorissuethatdoesnotaffect theproductfunction.Theseareoftenfeatureordocumentationrequests.

CustomerPortal
YoucanaccesstheCustomerPortal24hoursadaytoviewcurrentorpastcases forcurrentlydeployedordisposedassets.Youcanalsolognewcases,oraddnotes orattachmentstocasesthatarealreadyopen. Note:Youshouldlogpriorityissuesviathetelephoneinordertoassureprompt attention. Seethefollowingtopicsformoreinformation:

TorequestaccesstotheCustomerPortalonpage 28 TonavigatetheCustomerPortalonpage 29 TologacaseintheCustomerPortalonpage 30 TovieworupdateacaseintheCustomerPortalonpage 30 TheSupportChatbuttonintheCustomerPortalonpage 31 AdditionalCustomerPortalinformationonpage 31

TorequestaccesstotheCustomerPortal
AccesstotheCustomerPortalrequiresregistration.Followtheseinstructions. 1 2 3 4 Gotowww.unitrends.com. ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer CareCenterwindow. ClickRequestAccessinthebottomrightoftheCustomerCareCenterwindow.You seetheRequestPortalAccesswindow. EntertherequiredinformationandclickSave. Aconfirmationmessagedisplaysthankingyouforyourrequest.TheUnitrends SupportCenterwillsendyourcredentials(usernameandtemporarypassword) viaemailwithin24hours.
28

5 6 7 8

Onceyouhaveyourcredentials,gobacktowww.unitrends.comandclick CustomerinLogin:Customer. EntertheusernameandtemporarypasswordthattheUnitrendsSupportCenter emailedtoyou,thenclickLogin. Enteryournewpasswordtwice(fornewpasswordandtoverifynewpassword), thenclickChangePassword. YounowhaveaccesstotheCustomerPortal.

TonavigatetheCustomerPortal
TheCustomerPortalcontainsthreedistinctareas. Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTo requestaccesstotheCustomerPortalonpage 28.
Area News Description A News area in the top left area provides a subject with a link to the full article and a brief description of the content. Links to the KnowledgeBase, Video Tutorials, and support levels are in the bottom of the column. You can select the items per page and click through the pages. This information is updated on a regular basis. Assets An Assets area in the top right column displays information about your registered assets, such as name, asset tag, and account. You can collapse this section to remove it from view. You can select to view the type of asset (active, expired, or suspended). You can also select the items per page and click through the pages. You see a New Case button in the right column after you select an asset. For VAR/partners, there is an Asset Heading that displays information such as VAR account and purchase date. There is also an Account column which displays the asset account name for assets that they support (as listed on the asset record in the VAR account field in the Asset Heading area).

About this Guide

29

Area Cases

Description A Cases area in the bottom right area displays information about your cases. When you select an asset in the Assets area, you see the cases for that specific asset. You see information such as case number, subject, asset, description, and opened date. You can collapse this section to remove it from view. You can also enter the asset number and click Go to see the cases associated with that asset number. When you click on a case, you see a Case Details section that provides additional details about the case. You can select to view the type of case (all, open, or closed) or enter search information and press Go. (Click Clear Filters to start the search from scratch.) You can also select the items per page and click through the pages.

TologacaseintheCustomerPortal
Followtheseinstructionstologanewcase. 1 2 3 GototheCustomerCareCentertologintotheCustomerPortal. ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer CareCenterwindow. Enteryourusernameandpassword,thenclickLogin. Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTo requestaccesstotheCustomerPortalonpage 28. 4 SelectanassetintheAssetsareatoseethecasesforthatasset. Note:IfyoucreateacaseonanExpiredorSuspendedasset,thecaseiscreatedas pendinguntilthereisanactivecontract.(UsethedropdownboxintheAssets areatoselectanexpiredorsuspendedasset.ThedefaultisActive.) 5 6 ClickNewCaseintherightcolumn.Youseeawindowwhereyoucanenter informationaboutthenewcase. Enterthesubject,description,andseveritylevelofthecase.

TovieworupdateacaseintheCustomerPortal
Followtheseinstructionstovieworupdateacase.Youcanmakeacommentor uploadanattachment. 1
30

Gotowww.unitrends.comtologintotheCustomerPortal.

2 3

ClickCustomerinLogin:Customerintheupperrightcorner.YouseetheCustomer CareCenterwindow. Enteryourusernameandpassword,thenclickLogin. Note:ForinformationaboutrequestingaccesstotheCustomerPortal,seeTo requestaccesstotheCustomerPortalonpage 28.

4 5 6

UsethedropdownboxintheAssetsareatoselectanexpiredorsuspendedasset, ifnecessary.ThedefaultisActive. SelectanassetintheAssetsareatoseethecasesforthatasset. Note:YoucanalsoentertheassetnumberintheCasesareaandclickGo. ClickontheappropriatecasetoopenaCaseDetailssection.Thisincludes informationaboutthecase.Youmayneedtoscrolldowntoviewallofthe commentsassociatedwiththiscase. Note:ClickClearFilterstoseeallcases. Toenteracomment,clickMakeacomment,enteryourcomment,andclick Commit. Touploadanattachment,clickUploadAttachmentandbrowseforthecorrectfile toattach.

7 8

TheSupportChatbuttonintheCustomerPortal
ThereisaSupportChatbuttonontheCustomerPortal.Clickthisbuttontoinitiate anonline,livechatwithUnitrendsSupport.SeeAccessSupportChatonpage 27 formoreinformation.

AdditionalCustomerPortalinformation
Formoreinformation,seethefollowingKnowledgeBasearticles: HowdoIrequestaccesstotheCustomerPortal? HowdoInavigatethroughtheCustomerPortal? HowdoIloganewcaseorupdateanexistingcaseintheCustomerPortal?

Unitrendswebsitesupportinformation
AccesstheUnitrendsWebsitetolocatehelpfultoolsandinformation.
31

About this Guide

1 2

Gotowww.unitrends.com. HoverovertheSupportoptionorclickSupporttoseethefollowingoptions.
Tools and Information Overview Description Lists Support and Sales contact information, support levels, and other helpful information. Provides details of the hardware and software coverage plans. Provides links to forums discussions. Contains helpful articles about the Unitrends system and provides a Google type search option. You can also submit a ticket through the KnowledgeBase home page. Tickets are monitored Monday through Friday between the hours of 8:00 AM and 8:00 PM, Eastern Standard Time. Tickets received during nonbusiness hours are addressed the next business day. Your support contract determines your support contract hours. Technical Documents Lists technical documents such as data sheets, partner tools, best practices, technical resources, user guides, release notes, and support agreements. Provides informative video tutorials listed by topic. Provides the latest agent releases so you can update your Unitrends product. Information about the Unitrends beta program and the option to sign up. Provides the option to log in to the Customer Portal. (See CustomerPortalonpage 28 for more information.)

Coverage Plans

Forum KnowledgeBase

Video Tutorials Latest Agent Releases

Customer Beta Program

Customer Portal

32

Chapter1 IntroducingUnitrends
Unitrendsproductscomeinawidevarietyofphysicalandvirtualconfigurations, supportingmanyhardwareandsoftwareversionsandfeatures. Unitrendsbackupandreplicationsystemsareintegrated,turnkey,disktodisk backup,restore,anddisasterrecoverysolutions. Thesystemsupportsamultitudeofoperatingsystemplatformsandprovides clientsideagentsforcommondatabaseapplications.Allofthedatathatis protectedonthebackupsystemcanbesynchronizedacrosswideareanetwork (WAN)connectionstoareplicationsystemfortotalsiteprotection. Seethefollowingtopicsfordetails:

TheUnitrendsAdministratorInterfaceonpage 33 Navigationpaneoptionsonpage 36

TheUnitrendsAdministratorInterface
Afteryoulogin,youseetheAdministratorInterface(AI).(Seethefollowing figure.)AllproceduresareexecutedfromtheAI,unlessotherwiseindicated.

33

MAIN MENU

NAVIGATION PANE

CENTER STAGE

34

Chapter 1

ThehighlevelstructureoftheAIconsistsofathreepanewindowwiththe followingcomponents:
AI Components Main menu Description A series of icons used to access the systems primary functions. You can select to view a drop-down list of options when you click on these icons. You can also choose to see the drop-down list in horizontal or vertical order. See Navigationpaneoptionsonpage 36 for more information. Note: The drop-down list does not necessarily show every option on the second level screen and may also include related options that are not on the second level screen. Navigation pane The left-most pane of the AI contains a tree of customers, locations, backup systems, replication systems, and clients (a client is typically a customer's server). The area to the right of the Navigation pane is called the Center Stage. Information displayed here is determined by the elements you have selected from both the Main menu and Navigation pane. The Center Stage may be presented as a single area or a subdivided area based on your selections.

Center Stage

SeethefollowingfordetailsabouttheNavigationoptionsandMainmenu functions:

Navigationpaneoptions Statusicon Backupicon Restoreicon Archiveicon Replicationicon Reportsicon Settingsicon Abouticon Logouticon

Introducing Unitrends

35

Navigationpaneoptions
UsetheiconsatthebottomoftheNavigationpanetochangehowinformation displays.

Clickthedoublecirculararrowicontorefresh/reloadthesystem. ClickthegearicontoseetheSystemPreferenceswindowandcheckthe
optionsyouprefer.

System Preference Window Options Show system Client Show Customer/Locations Show Menu Items in Single Column Show Virtual Machines in Navigation Tree

Description

Check to display the Unitrends system as a client in the navigation pane. Check to display customers and locations in the navigation tree.

Check to display items on the Center Stage pane in a single column.

Check to display virtual machines under the Hyper-V client or ESX server in the Navigation tree. You can then select a given VM to filter information shown on various pages (backup status, reports, etc.). To refresh the VM list, select the Hyper-V client or ESX server, click Backup, then click the reload arrows below the VM list on the Backup page. Check to show the drop-down menu when you click the icons in the Main Menu. Check to see the drop-down menu when clicking the icons in the Main Menu in a horizontal list. Uncheck to see the drop-down menu in a vertical list. For replicating systems, check to switch to Replication View and see replicated backups stored on the target system. See Viewingreplicated backupsonpage 282 for details.

Show Drop Menu?

Horizontal Menu?

Show Replication View

36

Chapter 1

Statusicon
Thefrontstatuspageallowsyoutoquicklychangeviewstoseethepast,present, andfuturestatusofbackupjobs.Changethestatusviewbyclickingonthe perpendicularlabels,orblinds,oneithersideofthestatuspane.Jobsthatare currentlyrunningareviewedonthePresentscreen.Scheduledjobsaredisplayed ontheFuturescreen,andtheweeklybackupstatusisdisplayedonthePast screen.

Backupicon
Usethisfeaturetoscheduleandrunbackupsforclientsregisteredtothebackup system.Fordetails,seetheBackupschapter.Foradditionalinformationabout theclientsyouwishtoprotect,seethechapterfortheapplicableOS.Forexample, ProtectingWindowsEnvironments,ProtectingVMwareInfrastructure,and Linuxprotectionchapters.

Restoreicon
Usethisfeaturetorestorebackupstoagivenclientortorecoverthebackup systemitself.Fordetailsonrestoringclientdata,seetheRestorechapter.For detailsonrecoveringthebackupsystemitself,seetheDisasterRecoveryand LegacyDisasterRecoverychapters.

Archiveicon
Usethisfeaturetoarchivebackups.Archivingtoexternalmediaenablesyouto retainolderbackupsaswellasprovidingthesafetyofoffsitestorage.Fordetails, seetheArchivingchapter.

Replicationicon
UsethisfeaturetoreplicatebackupdatafromoneUnitrendssystemtoanother. Storereplicateddatainanotherlocationforprotectionintheeventofatotalsite disaster.FordetailsseetheReplicationchapter.

Reportsicon
Usethisfeaturetorunreportsonbackups,archives,failures,replicationor vaulting,storage,andmore.Fordetails,seetheReports,Alerts,andMonitoring chapter.
Introducing Unitrends

37

Settingsicon
Usethisfeaturetoviewandmodifyconfigurationofeachsubsystem,suchas customers,clients,andstorage,aswellastomonitorthesesubsystemsusing varioustools.Fordetails,seeSubsystemconfigurationsettingsonpage 47and theAdvancedConfigurationOptionschapter.Foraquicklookattheitems containedineachsubsystem,hoveroverthesubsystemicon.

Favoritepages
PagesintheSettingssubsystemscanbebookmarkedforquicknavigation.The BookmarksfeatureislocatedintheupperrightcorneroftheSettingspage.

Toviewalistbookmarkedpages,clickthedownarrow. Togotoabookmarkedpage,selectitinthelist. Toaddapagetothelist,navigatetothedesiredpage,thenclickthestaricon. Toremoveabookmark,navigatetothebookmarkedpage,thenclickthestar icon.

Abouticon
Usethisfeatureto:

OpentheSystemAdministratorsGuide. Viewalistofvideotutorials. AccesstheKnowledgeBasearticles. Viewreleasenotes. Seesysteminformation(suchasthesystemversionandassetinformation). SendfeedbacktoUnitrends. CreateorcloseasupporttunnelwithaUnitrendsCustomerEngineer.(See Supporttunnelsformoreinformation.) Accesscontextsensitivehelp.(SeeContextsensitivehelpformore information.)

Supporttunnels
SelectAbout>SupportTunneltoopenasupporttunnel.Supporttunnelsareone ofthepreferredmethodsforSupportEngineerstoassistwithtroubleshooting issuesonthesystem.Supporttunnelsprovideasecuremethodofaccessinga systemremotely.

38

Chapter 1

Inadditiontoencryptingthetransmission(whichhelpstoprotectdata),aportis assignedrandomlytodiscourageunwantedaccessattempts(knownasport knocking).Onlyonetunnelcanbeopenatatime.Ifanexistingtunnelisopen, clickSupportTunneltoforcethetunneltoclose.TheSupportTunnelconnection automaticallyclosesifitisinactiveforseveralminutes,orifthereisnoattachment withinafewminutesofbeingopened. Note:YoucanalsoaccessthesupporttunnelinSettings>System,Updates,and Licensing>SupportToolbox(Advanced)>SupportTunnel.

Contextsensitivehelp
ToaccesshelpforanysubsystemwithintheAI,selectAbout>Help,clickthe? icon,orrightclickanareainthesubsystem.Thecontextsensitivehelpprovidesa generaldescriptionofthesystemsfunctionality.TheUnitrendsAdministrators Guideisalsoaccessibleviathecontextsensitivehelpinterface.

Logouticon
Usethisicontologoutofthesystem. Note:Youmustchangetherootuserpasswordtodisabletheautologinfeature. Ifyouhavenotyetchangedthispassword,youareimmediatelyloggedbackin uponloggingout.Tochangethepassword,seeAdministratorinterfaceroot passwordconfigurationonpage 73.

Introducing Unitrends

39

40

Chapter 1

Chapter2 GettingStarted
Thischaptercontainsthefollowingsectionstoguideyouthroughsetupofanew Unitrendssystem: Important!Unitrendsshouldbeyourprimaryandonlysolutionforbackingupyour data.Usingmultiplebackupsolutionsforthesamesetofdatacanresultin performanceissues,VSSrelatedsystemissues,andbrokenlogchainsfor databases.

Prerequisitesforphysicalsystems(seebelow) Prerequisitesforvirtualsystems InitialconfigurationofUnitrendssystems Systemsetup Subsystemconfigurationsettings

Prerequisitesforphysicalsystems
Additionalrequirementsmustbemetwheninstallingphysicalsystems.Complete theproceduresinthissectionbeforeproceedingtoInitialconfigurationof Unitrendssystemsonpage 43.

Sitepreparation Physicalsystempreparation

Sitepreparation
Itisimportanttoensurethatthephysicalenvironmentmeetstherequirementsof thesystem.Properpreparationofthesitehelpstoensureconsistentandstable operationoftheUnitrendssolution.

41

Thesitepreparationrequirementsthatmustbeconsideredpriortoinstallation are:

Spaceandclearancerequirements Loadbearing(weight)requirements Powerrequirements Coolingandenvironmentalrequirements Configurationrequirements TheUnitrendsSitePreparationGuidecontainsdetailedrequirementsforall Unitrendsphysicalsystems.Clicktodownload:SitePreparationGuide.

Physicalsystempreparation
ThefollowingitemsarerequiredtoperformtheinitialconfigurationofaUnitrends physicalsystem:

UnitrendssystemsetupinaccordancewiththeSitePreparationGuide. Peripheralsthesystemmustbeconnectedtoadirectattachedmouse,
keyboard,andmonitororhaveaccesstotheperipheraldevicesviaaKVM (Keyboard,video,mouse)switch. EthernetConnection1GbEEthernetcableconnectedtotheswitching networkbackbone. Unitrendssystemsareconfiguredwiththefollowingdefaultsettings.
Item Default operating system credentials Description Default user: root Default password: unitrends1 Default user: root Default password: unitrends1 The first Ethernet port (eth0) is configured with an IP address of 10.10.10.1 and a subnet mask of 255.255.255.0

Default administrator interface (AI) credentials Network configuration

42

Chapter 2

Item IPMI configuration

Description On some systems, the first Ethernet port (eth0) is also configured for IPMI with DHCP. IPMI can be used for advanced troubleshooting. The default IPMI credentials are: user: ADMIN password: ADMIN. It is strongly recommended that you change this password for security reasons. See KB1067 for details.

Prerequisitesforvirtualsystems
Unitrendsvirtualappliances,knownasUnitrendsEnterpriseBackup(UEB) systems,areavailableforMicrosoftHyperVandVMwareenvironments.For prerequisitesanddeploymentinstructions,seethefollowingdeploymentguides:

UnitrendsEnterpriseBackupDeploymentGuideforVMware UnitrendsEnterpriseBackupDeploymentGuideforHyperV
Onceyoudeploythesystem,proceedtoInitialconfigurationofUnitrends systemsbelow.

InitialconfigurationofUnitrendssystems
ThefirsttimeyoupowerontheUnitrendssystem,youcanconfigurethenetwork settings. Note:ForUEBsystems,thisprocedureisincludedinthedeploymentguides.Ifyou havealreadycompletedtheinitialsystemconfiguration,skiptoSystemsetupon page 45. Toconfigurethesystem 1 Whenyouaccessthesystem,theUnitrendsEnterpriseBackupConsoleInterface displays.Thismaytakeafewminutes.

Getting Started

43

2 3 4 5

Type1inthePlease enter choicefieldtoaccesstheInitialSystemSetup menu. Toconfigurethesystemonyournetwork,type1inthePlease enter choice field. EnteranumberintheSelect a network adapterfield.Forexample,type0to selecteth0. TypeYintheEdit network configuration field.Modifythesesettings:

TypeanIPaddressfortheUnitrendssystem,andpressEnter. TypeanetmaskaddressandpressEnter. TypeagatewayaddressandpressEnter. Reviewthesettings,thentypeYtosaveorNtoexitwithoutsaving. ToconfigureDNSsettings,type2inthePlease enter choicefield,thenYto edit. DNSallowsyoutoresolveIPaddressesandqualifieddomainnames. Note:Toaddclientsbyname,youmustconfigureDNS.IfnotusingDNS,youmust supplyastaticIPforeachregisteredclient.DNSonlyregistrationissupportedonly forWindows,Linux,andMacclients.

TypetheprimarydomainnameserverIPaddress,andpressEnter. Ifdesired,enterasecondaryDNSIP,orpressEntertoleavethissettingblank. ReviewDNSsettingsandtypeYtosaveorNtoexitwithoutsaving.


7 8 ToexittheInitialSystemSetupmenu,type4inthePlease enter choicefield. Tochangethedirectconsolepassword,type2inthePlease enter choicefield. Thisistherootoperatingsystempasswordusedtoaccesstheconsole.

TypethepasswordattheNew UNIX PasswordpromptandpressEnter. TypethepasswordattheRetype New UNIX Passwordpromptandpress


9

Enter. OncetheUnitrendssystemisconfiguredonthenetwork,itcanbesetup, managed,andmonitoredfromanyworkstationorserveronthenetwork.Tolog intothesystem,directawebbrowserto:


https://<system IP address>/

Forexample: https://192.168.238.2/ Note:Ifasecuritycertificateispresented,youmustacceptthecertificateto continue. 10 Clickthelockicon.Attheloginprompt,enterusernamerootandpassword unitrends1.


44
Chapter 2

TheSetupwizardlaunchestoprovidestepbystepguidancethroughthe remainingconfigurationsettings.ProceedtoSystemsetuptocompletethe configuration.

Systemsetup
UsetheSetupWizardtoconfigurethesysteminminutes.WhiletheSetupWizard canbeusedevenaftertheinitialconfiguration,itisdesignedtosignificantly decreaseinstallationtime.Additionalconfigurationchangescanbemadeby clickingontheindividualactivityiconsundertheSettingsmenu.Seethe AdvancedConfigurationOptionschapterfordetails.

SetupWizardoverview
Whenyoulogintothesystemforthefirsttime,theSetupWizardlaunches.The SetupWizardenableseasyconfigurationoftheUnitrendssystembyproviding stepbystepguidancetoconfigurethesesubsystems:
Step Product registration Description For UEB systems only, register your system. This Setup Wizard step does not display for physical systems. Set the system to the local time zone. The system is preconfigured for the time zone: Eastern Time (US & Canada) (UTC-05:00). Configure the hostname of the system. The system supports push and pull notifications. Configure push notifications (email via SMTP) in this step. You also have the option to receive a PDF version of many of the reports in the email. Set the password for the administrative account of the Unitrends system. The system ships with default credentials. It is highly recommended that you change this password.

Date and time

Hostname Notifications

Root password

Getting Started

45

Step Users

Description Unitrends systems can be managed and monitored using different credential levels. This step provides the means to create users with different privilege levels to monitor and/or manage the system. Configure the system as a backup system, replication system, or a backup and replication system. Note: Replication is supported on systems running release 7.0.0 and later. Older releases use the legacy vaulting feature. In these systems the installation type is backup system, vault, or backup system and vault.

Installation type

Expand storage

For Unitrends virtual systems, configure and attach additional backup storage. Register all protected assets to the system. Unitrends uses a common D2D backup and recovery engine to provide protection for over 100 different versions of operating systems, applications, and hypervisors. All protected environments are registered to the Unitrends system as clients.

Clients

Retention

Configure the system to balance retention and backup performance.

Completetheconfiguration
Tocompletethesystemsetup,performtheproceduresinthissectionfromany workstationorserveronthenetwork. ToconfiguresettingsusingtheSetupWizard 1 2 ConnecttotheUnitrendssystembydirectinganybrowserto
https://<system IP address>/recoveryconsole

Clickthelockicon,enterusernamerootandpasswordunitrends1,thenclick Login.

46

Chapter 2

3 4

Ifnecessary,launchthewizardbyselectingSettings>System,Updates,and Licensing>SetupWizard. UsetheSetupWizardtoguideyouthroughconfigurationofeachsubsystem,step bystep.Onceyouhaveenteredsettingsasdesiredonascreen,clickNexttosave andcontinue. Fordetailsonconfiguringeachsubsystem,seeSubsystemconfigurationsettings below.

Subsystemconfigurationsettings
ThefollowingSetupWizardstepsorsubsystemsaredescribedinthissection:

Welcomescreen,seeAboutthewelcomescreenbelow Productregistration,seeAboutproductregistration Dateandtime,seeAboutdateandtimeconfigurationonpage 48 Hostname,seeAbouthostnamesettingsonpage 50 Notifications,seeAboutconfiguringnotificationsonpage 50 Rootpassword,seeAboutrootpasswordconfigurationonpage 53 Users,seeAboutuserconfigurationonpage 54 Installationtype,seeAbouttheinstallationtypeonpage 56 Expandingstorage,seeAboutexpandingstorageonpage 57 Clients,seeAboutaddingclientsonpage 61 Retention,seeAboutglobalretentionanddeduplicationonpage 64 Setupcomplete,seeSetupcompleteonpage 66

Aboutthewelcomescreen
ThewelcomescreendisplaysuponlaunchingtheSetupWizard.TheSetupWizard launchesthefirsttimeyoulogintothesystemorbyselectingSettings>System, Updates,andLicensing>SetupWizard. AcceptthelicenseagreementandclickNexttocontinue.

Aboutproductregistration
RegistrationisrequiredforUnitrendsEnterpriseBackup(UEB)systemsonly.For physicalsystems,proceedtoAboutdateandtimeconfigurationbelow.

Getting Started

47

OnceyoudeployUEBtoavirtualmachine,youhavefivedaysinwhichtoregister andlicensethesystem. ToregisteraUEBsystem 1 AccesstheproductregistrationstepintheSetupWizard,orselectRegisterinthe upperrightcornerofthemaininterface. TheRegisteryourProductpageopensinaseparatebrowsertab. 2 OntheRegisteryourProductpage,selectoneofthefollowing: Selection REGISTER TRYITNOW BUYNOW REQUESTNFR Description
To receive a Free Edition license. To receive a 30-day Enterprise trial license. To purchase an Enterprise Edition license. To request a free 1-year NFR license. This lab version is available only to Microsoft Certified professionals, VMware Certified professionals, or VMUG members. To activate an Enterprise Edition license which youve already purchased.

ACTIVATEITNOW

Completeandsubmittheregistrationform. Note:Unitrendssendsalicensekeyviaemail.YoumaycontinuewiththeSetup Wizardandapplythelicenseatalatertime.Toapplythelicense,seeToaddor updatealicenseonpage 68.

ReturntotheSetupWizardpageandcontinuewithAboutdateandtime configurationbelow.

Aboutdateandtimeconfiguration
Thedateandtimeinterfaceallowsthedateandthetimetobesetonthesystem. Tofunctionproperly,thesystemmustbeconfiguredforthetimezoneinwhichit isdeployed.

48

Chapter 2

Tosetthedateandtime 1 2 3 4 AccessthedateandtimestepintheSetupWizard,orselectSettings>System, Updates,andLicensing>Date/Time. SetadatebyclickingthecalendariconnexttotheSetDatefield. Setthetimebymodifyingthehours:minutesAM/PMsettingsintheSetTime field. SelectthetimezoneintheSetTimeZonefieldandclickSetTimeZonetosave. ThesystemisconfiguredforAmerica/NewYorktimezone(UTC05:00)by default. 5 ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheDate/Timesubsystem. Tosynchronizethesystemtoanexternaldateandtimesource 1 2 AccessthedateandtimestepintheSetupWizard,orselectSettings>System, Updates,andLicensing>Date/Time. ChecktheEnable/DisableInternetTimebox. Note:OnceyouenableInternettime,youcannotexplicitlysetthedate,time,and timezone. 3 SetoptionsasdesiredbyclickingtheShowInternetTimeOptionsbox.Internet timeoptionsinclude: Description
These are the servers, in order, that are periodically queried for the Internet-based time. Use this option to sync the system clock to the NTP time server before starting the NTP service. Do not use this option if the time server cannot be reached regularly. Waiting for synchronization to occur may block use of the system until a timeout has passed. Use this option if there exists, for example, a radio controlled clock device that synchronizes the system clock with an authoritative time source.

Option NTP(NetworkTime Protocol)servers Synchronizesystem clockbeforestarting service

Uselocaltimesource

Getting Started

49

ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheDate/Timesubsystem.

Abouthostnamesettings
Thehostnameofthesystemcanbechangedtoadheretoanynamingconventions inyourenvironment.Thesystemisshippedwithadefaulthostname, HyperV_UEBorVMware_UEBforvirtualsystems,orRecovery<modelnumber> forphysicalsystems. Tochangethehostname 1 2 3 AccessthehostnamestepintheSetupWizard,orselectSettings>Clients, Networking,andNotifications>Networks>Hostname. EnterthenewhostnameintheSystemHostnamefield. EnterthenewlongnameforthesystemintheFullyQualifiedSystemHostname field.Thisenablesnameresolutionlookupswiththelongnameaswellasthe shortname. Ifthesystemisalreadyconfiguredandscheduleshavebeensetuptoprotectthe clientsinyourenvironment,checktheKeepexistinghostnamealiasesbox. Bycheckingthisbox,boththecurrentandprevioushostnamesareresolvedonthe network. 5 ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheHostnamesubsystem.

Aboutconfiguringnotifications
Unitrendssystemsconveyadditionalinformationaboutthesystemviaapush mechanism,meaninginformationispusheddirectlytoyouwithoutneedingtolog intothebackupsystem.ThesystempushesbothSMTPemailandSNMPtraps. ThissectiondescribesthesettingsusedtoconfigureSMTPnotifications.For informationonSNMPtraps,seeAboutSNMPtrapnotificationsonpage 109.For moreinformationonSMTPnotifications,seetheReports,Alerts,and Monitoringchapter.

50

Chapter 2

Emailsetup
Youmustconfigureafullyqualifieddomainnameforthesystembefore configuringemail.Select Settings>Clients,Networking,andNotifications> Networks>Hostname toconfigurethefullyqualifieddomainname(forexample, system.unitrends.com). ToconfigureemailnotificationsfromtheUnitrendssystem 1 AccesstheSMTPemailstepintheSetupWizard OR SelectSettings>Clients,Networking,andNotifications>SMTPServer. 2 EnterthefullyqualifiedSMTPservernameorIPaddressintheSMTPServerfield. IfaDNSrecordhasnotbeenconfiguredforthesystem,usetheIPaddressofthe SMTPserver. 3 4 EnteravalidemailaddressintheTestEMailAddressfield. IfyouhaveanexternallyhostedSMTPserverthatrequiresauthentication, configureauthenticatedmailrelaybycheckingtheSMTPServerAuthentication Requiredboxandenteringusernameandpasswordcredentials. ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheSMTPsubsystem. Atestemailissent,confirmingthattheSMTPsettingshavebeenadministered correctly.Firewallandspamfilterscandelayorpreventdelivery.Seeyour companynetworkadministratorregardingtheseissues.

Emailreportrecipients
Afterensuringthatthemailserversettingsareworkingproperly,setupemail recipientstoreceivereportsandnoticesgeneratedbythesystem,alongwiththe optiontoreceivePDFversionsofthereportsasemailattachments. Note1:Notificationsaresentthroughemailwhenurgentattentionisrequired. NotificationsaresenttotheemailaddressesconfiguredintheSystemReport MailingList. Note2:Ifyouusereplication,aReplicationreportisalsoavailablebutmustbe configuredthroughReplication.SeeTunereplicationattributesonthesource systemonpage 258.Notethatyoucanusevaultingorreplication,butnotboth. TheVaultingreportisincludedintheSystemReportMailinglist.

Getting Started

51

Toconfigureemailrecipients 1 IntheSetupWizard,clickNextafterconfiguringSMTP. OR SelectSettings>Clients,Networking,andNotifications>EmailRecipients. 2 Enteremailaddressesineachrecipientfieldasdesired.Toentermultiple recipients,separatetheemailaddressesusingaspace.


Description Enter email addresses to receive alerts and notifications from the system. Note: Notificationsaresenttotheemailaddressesconfigured

Mailing List

SystemReport MailingList

intheSystemReportMailingList.
Examples include:

Daily system status. This includes the System Status report


Schedule SummaryReport MailingList

(for one system) and the Management Status report (for a rollup status of multiple systems). Note that your selection in the Navigation pane when you configure the email recipients determines which report you receive. Both of these reports are available in PDF format. Vaulting, if used. This includes the Securesync report. (Note that you can use vaulting or replication, but not both. To configure replication reporting, see Tunereplication attributesonthesourcesystemonpage 258.) Windows Instant Recovery, if used. This includes the Recovery Verification report (for source or replicated target), Virtual Client Haled report, and WIR Failure report. Archive report. This is sent for every job upon completion (success or failure) if you check the E-Mail Report checkbox under Archive Options when you perform or schedule an archive. See Archivesettingsonpage 203 for more information. This is sent as a notification. Change in Client Volumes. This is sent as a notification. Alerts, including capacity, licensing, and legal.

Enter the email addresses to receive the Schedule report. This lists information about the last 24 hours of schedule events. The schedule must also be configured to send this report by checking the E-Mail Schedule Report checkbox in the Advanced Execution Options area when creating a schedule. See To createanEnterprisebackupscheduleonpage 167.

52

Chapter 2

Mailing List

Description Enter the email addresses to receive the Schedule Failure report. This is sent when there is a failed schedule event during the previous hour. The schedule must be configured to send this report by checking the E-Mail Failure Report checkbox in the Advanced Execution Options area when creating a schedule. See TocreateanEnterprisebackupscheduleonpage 167. This report does not include non-scheduled events like ondemand backup, restore, etc.

FailureReport MailingList

SelectanEmailReportFormat. ChooseSimpleorEnhancedlayoutandstyleHTMLoutput.Forlegacystyle reports,selectSimple.

ChecktheIncludePDFReportcheckboxtoreceivecertainreportsinPDFformat asanemailattachment.(ThisincludestheSystemStatusreport,theManagement Statusreport,theSchedulereport,andtheScheduleFailurereport.) Note:Thebodyoftheemailstillcontainsthereport,butthereisalsoanPDF attachment.SomePDFversionsofreportsretaintheEmailReportFormatyou selected(simpleorenhanced),butothersareonlyavailableinenhancedformat.

ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheRecipientssubsystem.

Aboutrootpasswordconfiguration
Thesystemautomaticallycreatesasuperusernamedroot.Therootpassword interfaceprovidestheabilitytomaintainsystemsecuritybychangingthedefault passwordfortherootuseroftheUnitrendssystem.Thedefaultpasswordis unitrends1.Itishighlyrecommendedthatyouchangethispasswordfromthe default.Leavingtherootaccountspasswordatthedefaultwillcausethe Unitrendsinterfacetoautomaticallyloginwhenaccessingthesystem.Ifyoudo notchangethepassword,anyuserwithabrowsercanaccesstheUnitrends system. Note:ThisprocedurechangestherootpasswordusedtoaccessUnitrends administratorinterface.Itdoesnotchangetherootpasswordoftheoperating systemitself.

Getting Started

53

1 2 3

AccesstherootpasswordstepintheSetupWizard,orselectSettings> Customers,Locations,andUsers>Users>RootandcheckChangePassword. EnterthecurrentpasswordintheCurrentRootPasswordfield.Thedefaultis unitrends1. EnterthenewrootpasswordintotheNewRootPasswordandConfirmNewRoot Passwordfields.Passwordsmaycontainupperandlowercaseletters,numbers, orspecialcharacterswiththeexceptionofaspaceandtheequalssign(=). ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheUserssubsystem.

Aboutuserconfiguration
Unitrendssystemsaremanagedandmonitoredfromtheadministratorinterface. Basedonthecredentialsprovided,usersprivilegescanbecontrolledtoallow monitorormanagementcapabilitiesforoneormoresystems. Bydefault,asuperusernamedrootiscreatedonthesystem.Youshouldchange thepasswordoftherootuser(thesystemsuperuser)totightensecurity. Useraccountscanonlybeusedtoaccessthesystemforwhichtheywerecreated. UsersarenotsharedacrossUnitrendssystems.Tologintoanothersystem,the usermustbecreateddirectlyonthatsystemorsetupforthatsystemusingActive Directoryauthentication.SeeAboutActiveDirectoryauthenticationonpage 87 forinformation. UseractionsareloggedinthesystemandcanbeviewedintheAuditHistory report.Fordetails,seeAuditHistoryReportonpage 342. Toaddauser 1 IntheSetupWizardaddusersstep,checktheDoyouwanttoaddadditional administratorusersbox,orselectSettings>Customers,Locations,andUsers> Users. ClickAddUser. EnterausernameintheUsernamefield. EnterapasswordinthePasswordandVerifyPasswordfields.Passwordsmay containupperandlowercaseletters,numbers,andspecialcharacterswiththe exceptionofaspaceandanequalssign(=). Ifdesired,checkSuperuser.

2 3 4

54

Chapter 2

Asuperuserhasprivilegestoperformalloperationsprovidedbythe
administratorinterfaceforanysystem,atanycustomerlocationdefinedinthe Navigationpane. Regularusersarenonsuperusersthatareaddedtothesystemtoallowspecific capabilitiestomanageoneormoresystemsintheNavigationpane. Forsuperusers,nofurtherconfigurationisneeded.ClickNexttosavethe settingsandcontinuewiththeSetupWizard,orclickConfirmtosavesettings intheUserssubsystem. Forregularusers,continuewiththisproceduretoaddprivileges. Oneormoreprivilegesmustbeaddedtocreatetheoverallscopeandaccesslevel fortheregularuser.Loginisprohibitedifnoprivilegesaresetforregularusers. 7 ClickAddPrivilegeandmodifysettingsasdesired.Defineaprivilegelevelforeach customer,location,andsystem.Seedescriptionsofeachprivilegeinthetables below. ClickConfirmtosavethesettingsandNexttocontinuewiththeSetupWizard,or clickConfirmtosavesettingsintheUserssubsystem. Privilegeslevelsaregivenhere.
Privilege level None Monitor Description The user cannot access the customer, location, or system. The user is only able to view the status of operations, such as backups or replication, on the front Status page, or run reports. The user cannot start backups or restores, view running jobs, or configure the system in any way other than to modify their own user account password. The user can view statuses and reports, start backups, and perform other management tasks, such as adding or modifying clients and retention settings. They can also view running jobs or processes, but cannot create or modify users other than modifying their own user account password.

Manage

Getting Started

55

Privilege level Administer

Description In addition to monitoring and managing systems, the user can add, edit, or delete customers or customer locations, and add, edit, or delete users. Because administrators can create customers and locations, they can also assign systems to different customers and locations in the navigational tree (using Settings > System, Updates, and Licensing > Grid Management).

Inaddition,regularusersprivilegesmaybedefinedatvariouslevelsofbreadthor scope.
Privilege scope Customer Description The most general privilege scope. The privilege level applies to all systems that are associated with all of this customers locations. By default, systems are assigned to the Default Location for the Default Customer. The privilege applies to all systems that are associated with this location for a selected customer. By default, systems are associated with the Default Location for the Default Customer. The most finely-grained privilege scope. The privilege level applies to a particular system at a defined location for a defined customer.

Location

System

Abouttheinstallationtype
Theinstallationtype,alsoknownassystempersonalityorsystemidentity, determineswhichfunctionsthesystemcanperform.Configurethissettinginthe SetupWizard.Onsystemsthatonlysupportthebackupsysteminstallation,this SetupWizardstepdoesnotdisplay.Foradescriptionofinstallationtypes supportedbyeachsystem,seeInstallationtypesandreplicationonpage 250. Note:Theinstallationtypesdescribedhereapplytosystemsrunning7.0.0and later.Foroldersystems,thereplicationfeatureisnotsupported.Instead,legacy vaultingisused.Intheseoldersystems,theinstallationtypesarelocalbackup system,vault,andlocalbackupsystemandvault.

56

Chapter 2

Selectoneofthefollowinginstallations.
Installation type Local backup system Description The system will be used as an on-premise system to protect physical and virtual environments, structured and unstructured data on the local area network. The system will be used as an off-premise system. One or more on-premise systems can replicate data to the off-premise system for disaster recovery.

Replication target

Note: A system must have a minimum of 128


GB of storage to be used as a replication target. Local backup system and replication target The system will be used as both a backup and disaster recovery system. It can be used to protect data on the local area network as well as receive replicated data from one or more offpremise systems for disaster recovery.

Aboutexpandingstorage
Note:ThissectionappliesonlytoUnitrendsEnterpriseBackupvirtualsystems.For Unitrendsphysicalsystems,clickNexttoskipthisstepintheSetupWizard. UnitrendsEnterpriseBackupvirtualsystemsaredeployedwith138GBofspace availableforbackupstorage.Ifyouwouldliketoprotectmorethan138GBof backupdata,youneedtocreateanewvirtualdisk,thenusetheSetupWizardor Storagesubsystemtoexpandstorage.Toconfigurethesysteminstallationtypefor replication,thesystemmusthaveatleast128GBofstoragespace. AllUEBstorageshouldresideonasinglearray.Forexample,ifyoudeployedtoa diskthatisinternaltothehypervisor,youshouldaddonlydirectattachedstorage (DAS).IfyoudeployedtoanexternalNASorSAN,youshouldonlyaddstorageto thatNASorSAN.Fordetailsaboutstoragestrategies,seetheUEBDeployment GuideforHyperVortheUEBDeploymentGuideforVMware.

Getting Started

57

Warning:Onceyouaddadisktothedatastoreandexpandstorage,thatdiskis addedtoalogicalvolume.Thenewlyaddeddiskandanyexistingdisksarethen treatedasonediskbythesystem.Youcannotremovethediskonceithasbeen added.Removingadiskafterexpandingstorageresultsindatalossand corruption. Toexpandstorage,addavirtualdisktotheUEBvirtualmachineusingthe hypervisor,andthenexpandthebackupdeviceintheUnitrendssystem. Note:ItispossibletoattachexternalNASorSANstoragedirectlytotheUEBVM, butthisfeatureisdeprecatedandwillberemovedinafuturerelease.Adding storagethroughthehypervisoristherecommendedapproach. Seethefollowingtopicsforinstructionsonexpandingstorage:

TocreateadditionalbackupstorageforHyperVbelow TocreateadditionalbackupstorageforVMwareonpage 59 Toexpandstorageonpage 60


TocreateadditionalbackupstorageforHyperV UsethisproceduretoaddbackupstoragefromtheHyperVhypervisor.Ifyouhave deployedUEBtoanexternalNASorSAN,addstorage(throughthehypervisor) thatresidesonthatexternalarray.Ifyouhavedeployedtoadiskthatisinternal tothehypervisor,adddirectattachedstorage(DAS). Warning:ItisstronglyrecommendedthatallUEBstorageiseitherDAS(internal tothehypervisor)orresidesononeexternalNASorSANstoragearray.Ifyou configurestorageacrossmultiplestoragearraysandonebecomesunavailable, allbackupdataiscorrupted,resultingintotaldataloss. 1 2 3 LaunchHyperVManager,rightclicktheUnitrendsVM,andselectShutDown. TheVMshutsdownanditsStatechangestoOff. RightclicktheUnitrendsVMandselectSettings. OntheHardwaretab,selectVMBusSCSIController.InHyperVManager2012 andhigher,selectSCSIController. Note:IDEdisksarenotsupported.YoumustuseSCSIforstorageexpansion. 4
58

IntheSCSIControllerarea,selectHardDriveandclickAdd.

Chapter 2

5 6 7 8

IntheHardDrivearea,reviewtheControllerandLocationinformation,enterafull pathnameforthenew.vhdfile,thenclickNew. OntheChooseDiskTypescreen,selectadisktypeandclickNexttocontinue. Youcanchooseanytype,butforbestperformance,selectFixedSize. SpecifyaNameandLocationforthe.vhdfile,andclickNext. SelectCreateanewblankvirtualharddisk.SelectVHDorVHDXandspecifya SizeinGB. Note:InHyperVManager2012,youcanselecteitherVHDorVHDX.AVHDXdisk canhaveupto64TBofstoragespace,butaUnitrendssystemcanrecognizeonly 2TBofthisspace.

ClickNext.ReviewtheconfigurationsettingsandclickFinishtoaddthedisk. YouseethemessageCreating the new virtual hard disk.

10 Oncethediskiscreated,itdisplaysinthehardwareareaunderVMBusSCSI Controller.ClickOKtoexit. 11 PowerontheVM,thenproceedtoToexpandstorageonpage 60toaddthedisk totheUnitrendsystemsbackupstoragedevice. Note:Thesystemcandetectupto64HyperVdiskswithoutareboot.Ifyouare addingmorethan64disks,arebootmayberequired. TocreateadditionalbackupstorageforVMware UsethisproceduretoaddbackupstoragefromtheVMwarehypervisor.Ifyou havedeployedUEBtoanexternalNASorSAN,addstorage(throughthe hypervisor)thatresidesonthatexternalarray.Ifyouhavedeployedtoadiskthat isinternaltothehypervisor,adddirectattachedstorage(DAS). Warning:ItisstronglyrecommendedthatallUEBstorageiseitherDAS(internal tothehypervisor)orresidesononeexternalNASorSANstoragearray.Ifyou configurestorageacrossmultiplestoragearraysandonebecomesunavailable, allbackupdataiscorrupted,resultingintotaldataloss. 1 2 3 4 LaunchvSphere,selecttheUnitrendsVM,thenselectEditvirtualmachine settings. OntheHardwaretab,clickAdd. ChoosetheHardDiskdevicetypeandclickNext. SelectCreateanewvirtualdiskandclickNext.
59

Getting Started

OntheCreateaDiskscreen,selectthefollowing:


6 7 8 9

Enterthedesireddiskcapacity. Selectaprovisioningoption.Usethickprovisioningforbestperformance. SelecttheStorewiththevirtualmachinelocationoption. ClickNexttocontinue. OntheAdvancedOptionsscreen,clickNexttoacceptthedefaultSCSIdevice node. ReviewtheconfigurationsettingsandclickFinishtoaddthedisk. ReviewthehardwaredevicesandclickOK. ProceedtoToexpandstoragebelowtoaddthedisktotheUnitrendsbackup storagedevice. Note:Thesystemcandetectupto15VMwarediskswithoutareboot.Ifyouare addingmorethan15disks,arebootmayberequired. Toexpandstorage

Warning:Onceyouaddadisktothedatastoreandexpandstorage,thatdiskis addedtoalogicalvolume.Thenewlyaddeddiskandanyexistingdisksarethen treatedasonediskbythesystem.Youcannotremovethediskonceithasbeen added.Removingadiskafterexpandingstorageresultsindatalossand corruption. 1 2 AddadisktothedatastoreusedbytheUnitrendsEnterpriseBackupVM,as describedabove. IntheSetupWizardsystemstoragestep,clickExpandStorage. Note:TousetheStoragesubsysteminstead,seeToexpandabackupdeviceon page 94.

Thesystemexpandsstorageonthedefaultdevicetoincludethediskyou

createdonthedatastore.ThedefaultdeviceisD2DBackupsunlessyouve configuredadifferentone. Whenstorageexpansioniscomplete,thecurrentsizeofthestoragepoolis updatedtoreflecttheexpansion.95%ofthediskyouaddedisallocatedfor backup/replicationstorage.5%oftheexpandedstorage,upto2GB,isallocated forswapspace. WhentheStorage expansion is completemessagedisplays,clickNextto continuewiththeSetupWizard.

60

Chapter 2

Aboutaddingclients
Formostoperatingsystems,alightweightagentmustbeinstalledontheclient whosedatayouwanttoprotect.FormostWindowsandHyperVclients,coreand baremetalagentsareautomaticallyinstalledwhenyouaddtheclienttothe backupsystem.ForVMwareandiSeries,noagentisrequired.Forotheroperating systems,youmustinstallthecoreagentbeforeaddingtheclienttothebackup system.Foradditionalinformationabouttheclientyouareadding,seethe chapterfortheapplicableOS.Forexample,ProtectingWindowsEnvironments, ProtectingVMwareInfrastructure,andLinuxprotectionchapters. Note:TheautomaticinstallationfeatureforWindowsandHyperVclientsis supportedonUnitrendssystemrelease7.0.0andlater.Thisfeatureisnot supportedforWindowsNT,2000,8.1orWindowsServer2012R2clients.For detailedrequirements,seeAgentpushinstallrequirementsonpage 411. InstalltheUnitrendsagentontheseclientoperatingsystemspriortoaddingthe clienttothebackupsystem:

Linux,seeLinuxprotectiononpage 649. MacOS,seeMacOSXprotectiononpage 655. Unix,seeAIXprotectiononpage 633,HPUXprotectiononpage 637,


UnixWareprotectiononpage 695,orUnixWareprotectiononpage 695. OES,seeOESonLinuxprotectiononpage 673. Netware,seeNovellNetWareprotectiononpage 659. Solaris,seeSolarisprotectiononpage 691. Windows2000andWindowsNT,seeManuallyinstallingtheWindows agentsonpage 412. Ifrequired,downloadtheagentfrom: http://www.unitrends.com/support/customercarecenter/latestagent releases.html

Getting Started

61

Toaddaclienttothesystem Youmustaddtheclienttothesystembeforeitsdatacanbeprotected. Note:Forreplicatingsystems,runthisprocedurefromthereplicationtargettoadd clientsthatcanbeusedasrestoretargetsforreplicatedbackups. 1 AccesstheSetupWizardaddcomputersstep,orselectSettings>Clients, Networking,andNotifications>Clients. Note:TheaddcomputersSetupWizardsteponlyappliestothebackupsystem installationtype.Ifyoursystemisconfiguredasbothabackupsystemand replicationtarget,addclientsusingtheClientssubsystem. 2 IntheSetupWizardinstallagentsstep,selectoneofthefollowing: (SkipthisstepifusingtheClientssubsystem.)

Idonothaveanyofthetypesofcomputersinthelistabove,andclickNext.
(YoucanselectthisoptiontocontinuewiththeSetupWizardandreturnto installrequiredagents.) Ihavephysicallyinstalledtheagentoneachofthecomputerswithoperating systemsinthelistabove,andclickNext. Ihavenotphysicallyinstalledtheagentoneachofthecomputerswith operatingsystemsinthelistabove.Installagentsasrequiredbefore proceeding. ClickAddClient. SelectaComputerType. Configurationoptionsdisplayedvarybasedonthisselection. 5 EnterthenameoftheclientintheComputerNamefield.Thisnamemustbe resolvableusingDNSorthehosttableofthesystem.Thereisa15characterlimit forWindowsclients,anda31characterlimitforLinuxclients. Ifnecessary,entertheclientIPAddress.

3 4

ForWindows,Linux,andMacclients,youhavetheoptionofusingDNSorIPto
registerclients.Forallotherclients,youmustenterastaticIPaddress.

IfusingDNS,youmayleavethisfieldempty.Makesurethatboththeclientand
thesystemhaveDNSentriesandthatreverselookupisconfigured. IfusingDHCPforclientIPaddressassignment,youmustconfigureDNS.For details,seeDNSsettingsonpage 70. Dooneofthefollowing:

IfthecomputerisWindows,HyperV,orVMwarebased,checktheEstablish
trustboxandenteranAdministrativeUsernameandPasswordfor authentication.Ifnecessary,enteraDomain.
62

Chapter 2

Thecredentialsprovidedmusthavelocalsystemadministratorprivilegesor domainadministratorprivileges. YoumustenteradomainifthecomputerhasbeensetupinaWindowsdomain.

Forallotherclienttypes,donotsupplycredentials.Instead,uncheckthe
8 9 Establishtrustbox. ForVMwarecomputers,nofurtherconfigurationisrequired.SkiptoStep14. Otherwise,continuewiththenextsteptoconfigureadditionalsettings. TheEnablethiscomputer...boxdefaultstochecked,whichenablestheclientfor dataprotection. Uncheckthisboxtodisabletheclientfordataprotection.Theclientwillnotbe availableforbackuporrestore.Ataskwillfailifanattemptismadetobackupfrom orrestoretoadisabledclient. 10 TheAutomaticallycreateabackupscheduleforthiscomputerandapplyit immediatelyboxdefaultstochecked,whichcreatesafilelevelbackupschedule fortheclientandexecutesitimmediately. Uncheckthisboxtodisabletheautomaticcreationofabackupschedule.Youcan createyourownbackupschedulesatanytime. Note:InUnitrendsEnterpriseBackupfreeedition,thisoptiondoesnotcreatea scheduleorrunabackup,asfilelevelbackupsarenotsupported. 11 Ifdesired,checktheAllbackupsperformedonthiscomputeraretobe replicated...toreplicatethisclientsbackupstoanoffsitesystemfordisaster recoverypurposes.ApplicableonlyifyouhaveareplicationsystemorUnitrends Cloudservice. Note:Thisisoptionisnotavailableforapplications,suchasExchange,Oracle,and SQL,orHyperVandVMwareclients.Applicationdatabasesandvirtualmachines mustbeconfiguredforreplicationindividually.Fordetails,seeConfiguring backupsforreplicationonpage 271. 12 Ifdesired,checktheAllbackupsperformedonthiscomputeraretobeencrypted boxtoencryptallthedataprotectedforthisclientusinganAES256bitalgorithm. Applicableonlyifthesystemislicensedforencryptionandencryptionhasbeen configured(seeAboutencryptiononpage 114fordetails). 13 ChecktheAdvancedoptionsboxandconfigurethefollowing:

Ifdesired,checktheUsetheusername,password,anddomainspecified
aboveasthedefaultcredentialsfortheentiresystembox.Ifenabled,the backupsystemusesthesecredentialsasthedefault.

Getting Started

63

Selectoneofthepriorityoptionstosetthisclientsbackupstohigh,medium,
orlowpriority.Backupsforhighpriorityclientsarerunbeforethoseofmedium orlowpriority. Ifapplicable,selecttheUseSSLboxtoconnecttothiscomputerusingSSL. 14 ClickSetuptoaddtheclient.

ForWindowsandHyperVclients,lightweightcoreandbaremetalagentsare
installedontheclientuponclickingSetup. Oncetheclientisadded,itdisplaysintheAdd all computerswindow. Ifyouseeafailuremessage,theclientcouldnotbeadded.VerifyDNSsettings, andthatports1743and1745areopen. Ifyouseethefollowingerror,theagentcouldnotbeinstalleddueto authenticationissues.Installtheagentmanually(seetheProtectingWindows Environmentschapter),thenaddtheclientwithoutcheckingtheEstablish Trustbox.Errortext: Ifrepeatedlyexperiencingerrors,pleasedownloadandinstallthelatestagent releaseonyourWindowsserverfromtheUnitrendswebsite.After installation,uncheck'EstablishTrust'whensettingupyourclient. 15 Repeatthisproceduretoaddallclients. 16 ClickNexttoproceedtothenextSetupWizardstep. Formoreinformationonworkingwithclients,seeAboutworkingwithclientson page 74.

Aboutglobalretentionanddeduplication
Unitrendssystemsaredesignedtouseallavailablestorageforprotectingdata(see Storageallocationanddistributiononpage 104).Asscheduledorimmediate backupsareperformed,orasbackupsarereplicatedtoatargetsystem,theoldest backupsaredeletedtoingestnewbackups.SeeAboutretentioncontrolon page 106fordetails. Toincreaseretention,Unitrendssystemsutilizeadaptivededuplicationtoremove duplicatedatablocksfrombackups.Withdeduplication,backupsizesdecreaseas duplicateblocksareremoved,therebyincreasingthenumberofbackupsthatcan bestoredonthesystem,alsoreferredtoasonsystemretention. Nativededuplicationisenabledbydefault.Anoutsidededuplicationdevicecanbe usedforUnitrendsEnterpriseBackup,butphysicalsystemsmustusenative deduplication.Ifyouuseanoutsidededuplicationdevice,youcandisablenative deduplicationforbackupsstoredonthisdevicewhenyouaddittothesystem.For details,seeConfiguringstorageonpage 97.

64

Chapter 2

Usethefollowingproceduretobalancesystemperformanceversusretentionto suityourenvironment. Toconfigureglobalretentionsettings 1 2 3 AccesstheSetupWizardretentionandbackupwindowstep,orselectSettings> StorageandRetention>Retention. SelectthedesiredBalanceRetentionandBackupPerformanceoption.Seethe nextsectionforadescriptionofeachoption. ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheRetentionsubsystem.

Balancingbackupperformanceandretention
Youcantunesystemstoragetofitthebackupwindowandretentionobjectivesof yourenvironmentbyselectingfromthefollowingoptions.
Performance/retention options Balance retention and backup performance (recommended setting) Description This is the recommended setting for managing the ingest rate and retention on the system. With this setting, a predictive mechanism is used to dynamically alter the size of the landing zone based on the backup strategies selected. Use this setting where backup window requirements are critical. With this setting, a landing zone (reserve area) is created which is large enough to hold the data set that is being protected. This guarantees the fastest ingest rate. However, to meet the landing zone requirements, older backups are more aggressively deleted. Use this setting where retention is critical. The data protection ingest rate is slower. The landing zone is kept to a minimum to ensure maximum retention.

Minimize backup window

Maximize retention

Getting Started

65

Setupcomplete
OnceyouhaveworkedyourwaythroughtheSetupWizardandreachtheDone step,thesystemisconfiguredandreadytoprotectyourenvironment.ClickFinish toexitthewizard.SeetheBackupschaptertostartprotectingclients.Seethe AdvancedConfigurationOptionschapterforadditionalsetupinformation.

66

Chapter 2

Chapter3 AdvancedConfigurationOptions
Thischapterdescribesadvancedconfigurationprocedures.Seethefollowing topicsfordetails:

Aboutlicensingthesystemonpage 67 Aboutnetworkconfigurationonpage 68 Aboutconfiguringrootpasswordsonpage 72 Aboutworkingwithclientsonpage 74 Aboutsystemupdatesonpage 79 ShuttingdowntheUnitrendssystemonpage 80 Aboutremotesystemmanagementonpage 83 Aboutcredentialmanagementonpage 85 AboutActiveDirectoryauthenticationonpage 87 Aboutstorageconfigurationonpage 91 Aboutretentioncontrolonpage 106 Aboutsystemnotificationsonpage 109 Aboutencryptiononpage 114 Aboutsecuritylevelsonpage 118 Aboutdeviceconfigurationonpage 122 AbouttheNTFSchangejournalonpage 125

Aboutlicensingthesystem
Thelicensingcomponentprovidesaninterfaceforviewingandmanagingthe systemslicense.Licensingproceduresforphysicalsystemsdifferfromthosefor virtual(UEB)systems.

67

Physicalsystemsareshippedfullylicensed.Ifyouneedtoupdatealicense,apply thelicenseyoureceivefromUnitrendsasdescribedinToaddorupdatealicense below. Virtualsystemsaredeployedwithoutalicense.Upondeployingthesystemtoa virtualmachine,youhavefivedaysinwhichtoregisterandlicensethesystem. RegisterthesystemasdescribedinToregisteraUEBsystemonpage 48.Then applythelicenseyoureceivefromUnitrendsasdescribedinToaddorupdatea licensebelow. Toaddorupdatealicense Note:Applyingalicensestopsallrunningjobs. 1 2 3 SelectSettings>System,Updates,andLicensing>License>Enter. EntertheLicenseKey,ExpirationDate,andFeatureStringexactlyastheyappear intheLicenseKeyemailyoureceivedfromUnitrends. ClickConfirmtoapplythelicense.

Aboutnetworkconfiguration
UsetheNetworkssubsystemtoenabletheUnitrendssystemtocommunicatewith othercomputersonthenetwork.Configurethefollowing:

Ethernetsettings DNSsettings Hostnamesetting,seeAbouthostnamesettingsonpage 50 Hostssettings

Ethernetsettings
TheUnitrendssystemshipswithadefaultIPaddressof10.10.10.1andasubnet maskof255.255.255.0.ItisnecessarytochangetheseEthernetsettingsto communicatewiththeUnitrendssystem. Note:AfterconfiguringtheUnitrendssystemwithastaticIP,youmayseeDHCP requestscomingfromthesystemsMACaddress.Thisisbecauseonsomesystems themotherboardhasIPMIthatshareseth0.Ifdesired,youcanreconfigureIPMI LANtouseastaticIP.SeeKB586fordetails.

68

Chapter 3

ToconfigureEthernetsettings 1 2 SelectSettings>Clients,Networking,andNotifications>Networks>Ethernet. EntersettingsandclickConfirm. Seethetablebelowforadescriptionofeachsetting.Thenewnetworksettingsare putintoeffectimmediately.


Ethernet setting IP Description Provide a new IP address for the Ethernet adapter (i.e., eth0 or eth1). Provide a new netmask in accordance to the Class of network configured. The default Class C subnet is 255.255.255.0. Provide a gateway to enable the system to connect to computers on other subnets. This option must be checked for the new network settings to be used when the system is rebooted. Since the network settings are put into effect immediately upon hitting Confirm, the Restore Settings if Not Stopped Within __ Minutes should be checked if you would like the network settings to revert to the previous configuration if the new settings could not be applied for any reason. This option is useful if the system is configured on the network and the network settings have to be changed remotely. It prevents being locked out of the administrator interface if the new network settings could not be configured. Click to stop the restoration of settings.

Netmask

Gateway

Start Card on Boot

Restore Settings if Not Stopped Within __ Minutes

Stop Restore of Previous Settings

Advanced Configuration Options

69

Ethernet setting Additional Information

Description Review to confirm that the network adapter is configured for optimal performance in the environment. For example, if the network infrastructure has a 1GbE backbone, then ensure that the information displays as: Link: true Speed: 1000 Duplex: full

DNSsettings
DNSsettingsmustbeconfiguredfortheUnitrendssystemtoconnecttothe Internet.Inaddition,DNSconfigurationallowstheseamlessresolutionoffully qualifieddomainnames(FQDN)forcomputerstoshortnames,andviceversa.

DNSregistrationforWindows,Linux,andMacclients
Beginninginrelease7.2.0,youcanchoosetoaddaWindowsclienttothebackup systembyenteringastaticIPaddress,orbyrelyingonDNStofacilitatethe connection.TouseDNS,boththebackupsystemandWindowsagentmustbe runningrelease7.2.0orlater.Releases7.3.0andlatersupportDNSforLinuxand Macclients.BoththebackupsystemandLinuxorMacagentmustberunning release7.3.0orlatertouseDNS.DNSonlyregistrationissupportedonlyfor Windows,Linux,andMacclients. ConsiderthefollowingwhenregisteringclientsbyDNS:

IfyoudonotenterastaticIP,makesurethatboththeclientandthebackup
systemhaveDNSentriesandthatreverselookupisconfigured. ForclientsthatutilizeDHCPforIPaddressassignment,DNSonlyregistration shouldbeused. IfyousupplyastaticIP,thesystemattemptstoconnectusingthataddressbut willattemptDNShostnamelookupifthestaticIPconnectionfails. ToconfigureDNSsettings 1 2
70

SelectSettings>Clients,Networking,andNotifications>Networks>DNS. EntertheIPoftheDNSserverintheDNSServerAddressfieldandclickAdd.

Chapter 3

MultipleDNSserverscanbeaddedinthismanner. 3 Ifdesired,changetheprecedenceorderoftheDNSserversintheCurrentDNS ServerAddressOrderareabydraggingaDNSserverIPaddress. ThesystemconnectstotheDNSserversfornameresolutioninthisorder,starting withtheaddressatthetop. 4 EnterthedomainforyourenvironmentintheDNSDomainfieldandclickAdd. Multipledomainnamescanbeaddedinthismanner. Thisallowsshortnamesonthenetworktoberesolvedwiththeprovideddomain name.Ifthisinformationisnotprovided,allcomputernameresolutionis performedusingthefullyqualifieddomainname(forexample, computer.domain.com). 5 Ifdesired,changetheprecedenceorderofthedomainnamesintheCurrentDNS DomainOrderareabydraggingadomainname. Thisistheorderinwhichthesystemwilltrytoresolvetheshortandfullyqualified domainnames. 6 ClickConfirmtosaveyoursettings.

Hostssettings
TheUnitrendssystemshostfilecontainsthenameandIPofeachclientitprotects. Whenyouaddaclienttothesystem,anentryisautomaticallycreatedinthehosts file.Ifnecessary,youcanviewandmodifythesehostsfileentriesusingthese procedures:

ToviewtheUnitrendssystemhostsfile Tomodifyahostsfileentry Toaddahostsfileentry Todeleteanentryfromthehostsfile

ToviewtheUnitrendssystemhostsfile 1 2 3 SelectSettings>Clients,Networking,andNotifications>Networks>Hosts. Thehostname,IPaddress,andfullyqualifiednamearegivenforeachhostsfile entry.Notethatthefullyqualifiednameisoptional. ClickClosetoexittheHostspage.

Advanced Configuration Options

71

Tomodifyahostsfileentry 1 2 3 SelectSettings>Clients,Networking,andNotifications>Networks>Hosts. Selectthedesiredhostentryrow. IntheModifyHostarea,changetheHostName,IPAddress,QualifiedName,or AliasListasdesired.NotethatyoucannotchangetheHostNameorQualified NameoftheUnitrendssystemitself. ClickConfirmtosaveyourchanges,orCanceltoexitwithoutsaving. Toaddahostsfileentry 1 2 3 4 SelectSettings>Clients,Networking,andNotifications>Networks>Hosts. ClickAddAnotherHost. IntheAddHostarea,enterthemachinesHostNameandIPAddress.Ifdesired, enteraQualifiedNameandAliases(theseareoptional). ClickConfirmtosaveyourchanges,orCanceltoexitwithoutsaving. Todeleteanentryfromthehostsfile 1 2 3 SelectSettings>Clients,Networking,andNotifications>Networks>Hosts. SelectthedesiredhostentryrowanddragittotheDeleteHosticon. ClickYestoconfirmyouwishtodeletetheentry,orNotocancel.

Aboutconfiguringrootpasswords
Therootuserisgrantedsuperuserprivilegesandcanperformallsystem administrationtasks.TheUnitrendssystemisconfiguredwithtwodistinctroot useraccounts:

Operatingsystemrootaccount,usedtoaccesstheUnitrendsconsoledirectly
forinitialnetworkconfiguration,iSeriesadministration,andsomebaremetal tasks. Unitrendsadministratorinterfacerootaccount,usedtoaccessthesystemfrom anywebbrowser.

72

Chapter 3

Operatingsystemrootpasswordconfiguration
Bydefault,theoperatingsystemrootpasswordisunitrends1. Tochangetherootoperatingsystempassword 1 2 3 4 AccesstherootpasswordstepintheSetupWizard,orselectSettings>System, Updates,andLicensing>OSPassword. EnterthecurrentpasswordintheCurrentOSRootPasswordfield. EnterthenewrootpasswordintotheNewOSRootPasswordandConfirmNew OSRootPasswordfields. ClickNexttosavethesettingsandcontinuewiththeSetupWizard,orclick ConfirmtosavesettingsintheOSPasswordsubsystem.

Administratorinterfacerootpasswordconfiguration
Bydefault,theadministratorinterfacerootpasswordisunitrends1.Itishighly recommendedthatyouchangethispasswordfromthedefault.

Autologinfeature
Releases6.3andlaterhaveanautologinfeature.Ifyoudonotchangetheroot administratorinterfacepassword,thesystemautomaticallylogsinanyonewitha browserandthesystemsIPaddress. Toupdatetherootadministratorinterfacepassword 1 2 SelectSettings>Customers,Locations,andUsers>Users>Rootandcheck ChangePassword. EnterthenewpasswordinthePasswordandVerifyPasswordfields.The passwordcancontainupperandlowercaseletters,numbers,andspecial characterswiththeexceptionofaspaceandanequalssign(=). ClickConfirmtosave.

Advanced Configuration Options

73

Aboutworkingwithclients
Thissectiondescribesadditionalclientprocedures.Forinstructionsonregistering aclienttothebackupsystem,seeAboutaddingclientsonpage 61. Usetheseprocedurestomanagetheclientswhosedatayouareprotecting:

Tomodifyaclientonpage 74 Todeleteaclientonpage 76 Topushagentupdatestooneclientonpage 76


Tomodifyaclient 1 2 3
Field Computer Type Authentication

AccesstheSetupWizardaddcomputersstep,orselectSettings>Clients, Networking,andNotifications>Clients. Selecttheclient. Modifythefollowingasdesired:


Action Select an operating system or environment from the list. Check the Establishtrust or Usedefaultcredentials box to associate trust credentials for the client. See Clienttrustcredentialsonpage 77 for details. Name of the client. This name must be resolvable using DNS or the host table of the system.

Computer Name

Note:Itisbestnottorenameaclientbecausethiscanhave undesirableresultsforreplicating,vaulting,andarchivingsystems.For details,seeAboutrenamingclientsonpage 75.


IP Address Clients IP address. If using DNS, you may leave this field empty. If not, IP address is required. Available only if the Create New Credential option is selected. Credentials provided must have local system administrator privileges or domain administrator privileges. Available only if the Create New Credential option is selected.

Administrative Username

Password

74

Chapter 3

Field Domain

Action Available only if the Create New Credential option is selected. You must enter a domain if the computer has been setup in a Windows domain. Check to enable the client for data protection, uncheck to disable.

Enable this computer... box Automatically create a backup schedule... box All backups performed on this computer are to be replicated... box All backups performed on this computer are to be encrypted box

Check to create a file-level backup schedule for the client and execute it immediately. Check to replicate this clients backups to an off-premise system for disaster recovery purposes. Applicable only if you have a replication system or Unitrends Cloud service. Check to encrypt all the data protected for this client using an AES-256 bit algorithm. Applicable only if the system is licensed for encryption and encryption has been configured (see Aboutencryptiononpage 114 for details). Check to set this clients backups to high, medium, or low priority and to enable or disable SSL.

Advanced options box

ClickSetuptosaveyourchanges.

Aboutrenamingclients
AlthoughyoucanrenameaclientintheUnitrendssystem,itisbestpracticenot tochangethenameofaclientbecausethiscanhaveundesirableresultsfor replicating,vaulting,andarchivingsystems.Instead,itisrecommendedthatyou addtheclienttothesystemasanewclientwithanewnameusingtheprocedure describedinToaddaclienttothesystemonpage 62.Beforeaddingthenew client,changetheIPaddressoftheexistingclientintheUnitrendssystemtoavoid conflicts.Whenyouhavebuiltupretentionforthenewclient,youcandeletethe originalclient(anditsassociatedbackups).Fordetails,seeTodeleteaclienton page 76. Ifitisnecessarytorenameaclient,usetheproceduredescribedaboveinTo modifyaclient.Youmustsaveanybackupschedulesassociatedwiththisclient afterrenamingit,orbackupjobsfortheclientwillnotqueue.

Advanced Configuration Options

75

Todeleteaclient Caution:Whenaclientisdeleted,allassociatedbackupsofthatclientarealso deleted.Pleaseusecautionbeforedeletingaclient. 1 2 3 AccesstheSetupWizardaddcomputersstep,orselectSettings>Clients, Networking,andNotifications>Clients. Selecttheclient. ClickDeletethisComputer. Note1:Ifamessagedisplaysindicatingthatthisclientisscheduledforbackup,you mustfirstremovetheclientfromallschedulesbeforedeleting. Note2:IfyouareusingWindowsInstantRecoveryandyouremoveavirtualclient whileavirtualrestoreofthatclientisinprogress,thedeletionmaynotbe instantaneous.Thecleanuptakestimebecausetherestoreisshutdownandthe clientisremoved. Topushagentupdatestooneclient Ifpushupdatesaresupportedfortheclient,installupdatesasdescribedhere.For pushupdaterequirements,seeRequirementsforpushingagentupdateson page 422.Topushupdatestomultipleclients,seeTopushinstallagentupdates onpage 423. 1 2 3 SelectSettings>Clients,Networking,andNotifications>Clients. Selectthedesiredclient. ClickUpgradeAgent. NotethattheUpgradeAgentoptiondoesnotdisplayifnoupgradeisavailablefor thisclient. 4 UponclickingUpgradeAgent,updatesarepushedtotheclientiftheseconditions aremet:

Trustcredentialsarevalid. Nobackuporrestorejobiscurrentlyinprogressorscheduledtorunsoonfor
theclient. Pushupdaterequirementshavebeenmet(seepage 422). Updatesareavailablefortheclient(clientisnotrunningthelatestagent release).

76

Chapter 3

Clienttrustcredentials
TrustcredentialsarerequiredforVMwareandHyperVprotection,aswellasto enablepushinstallationofagentsoftwareandagentupdates.Proceduresinthis sectionareforapplyingcredentialsattheclientlevel.Forcentralizedcredential procedures,seeAboutcredentialmanagementonpage 85.Todetermine whetherpushinstallationissupportedforyourclient,seeAgentpushinstall requirementsonpage 411andRequirementsforpushingagentupdateson page 422. Usethefollowingprocedurestomanageaclientstrustcredentials:

Tocreateanewtrustcredentialforaclient Toapplydefaultcredentialstoaclientonpage 78 Toapplyanexistingtrustcredentialtoaclientonpage 78


Tocreateanewtrustcredentialforaclient Usethisproceduretocreateanewcredentialandapplyittoaclient. 1 2 3 4 SelectSettings>Clients,Networking,andNotifications>Clients. Selectthedesiredclient. ChecktheEstablishtrustbox. ClickCreateNewCredentialandenterthefollowing:
Action User must have local system administrator privileges or domain administrator privileges. Password associated with the username you supplied. You must enter a domain if the Windows client has been added to a Windows domain. Otherwise, you may leave this field blank.

Field Administrative Username Password Domain

ClickSetuptocreateandapplythetrustcredential. AcredentialcalledClientNameNewCredentialiscreatedanddisplaysintheUse ExistingCredentialslist.

UponclickingSetup,anyagentupdatesarepushedtotheclientiftheseconditions aremet:

Trustcredentialsarevalid.
Advanced Configuration Options

77

Nobackuporrestorejobiscurrentlyinprogressorscheduledtorunsoonfor
theclient.

Pushupdaterequirementshavebeenmet(seepage 422).
Toapplydefaultcredentialstoaclient Usethisproceduretoapplytheexistingdefaultcredentialtoaclient.Ifnodefault credentialexists,createthecredentialasdescribedinTocreateanewtrust credentialforaclientonpage 77,thensetthecredentialasdefaultasdescribed inTosetadefaultcredentialonpage 86. 1 2 3 4 5 SelectSettings>Clients,Networking,andNotifications>Clients. Selectthedesiredclient. ChecktheUsedefaultcredentialsbox. ClickSetuptosave. UponclickingSetup,anyagentupdatesarepushedtotheclientiftheseconditions aremet:

Trustcredentialsarevalid. Nobackuporrestorejobiscurrentlyinprogressorscheduledtorunsoonfor
theclient.

Pushupdaterequirementshavebeenmet(seepage 422).
Toapplyanexistingtrustcredentialtoaclient Usethisproceduretoapplyanexistingnondefaultcredentialtoaclient. 1 2 3 4 SelectSettings>Clients,Networking,andNotifications>Clients. Selectthedesiredclient. ChecktheEstablishtrustbox. IntheUseExistingCredentiallist,selectthedesiredcredential. Notethatifonlyonecredentialexists,youseethecredentialnameratherthan UseExistingCredential. 5 6 ClickSetuptoapplythetrustcredential. UponclickingSetup,anyagentupdatesarepushedtotheclientiftheseconditions aremet:

Trustcredentialsarevalid. Nobackuporrestorejobiscurrentlyinprogressorscheduledtorunsoonfor
theclient. Pushupdaterequirementshavebeenmet(seepage 422).
78

Chapter 3

Aboutsystemupdates
Theupdatesinterfaceprovidesameansforupdatingsoftwareonthesystemand forpushingagentupdatestocertainclients.Thissectiondescribessystem updates.Foragentupdates,seePushinstallingagentupdatesonpage 422. ItisrecommendedthatyourunthelatestUnitrendsversiononyourbackup system.Whenupdatesareavailable,youseeanalertonthefrontStatuspage. Beforeupdatingthesystem,notethefollowingrequirements:

Whenusinganonpremisebackupsystemthatreplicatestoanoffpremise
target,theoffpremisetargetsystemmustfirstbeupgraded.

Ifanonpremisebackupsystemisbeingremotelymanagedbyanother
Unitrendssystem,themanagingsystemmustfirstbeupgraded. ToupgradesystemsthatarerunningreleasespriortoRelease4.x.x,contact UnitrendsSupportforassistance. Toinstallupdates,thesystemmustberunningLinuxCentOSRelease5. Upgradingthesystemfromaversionpriorto5.0.2requiresmigrationofthe Unitrendsdatabase.Thedatabasemigrationwillbegininthebackground immediatelyaftertheUnitrendspackageshavebeeninstalled.Completion timewilldependlargelyupontheamountofdatabeingmigrated.Duringthe initialphaseofthemigration,itisnormalforcertaininterfacefunctionstobe affected.Forexample,newjobsmaynotlaunch,andrestoreoperationsmay bedisabled.Ifthishappens,waitforthemigrationtocompletebefore rebootingtheUnitrendssystem. Ifarestoreisneededforaspecificbackupwhileadatabasemigrationisactive, selectthebackupformigrationtobeginonthespecificbackup. IfupgradingaRecoveryOS2U(akaDPU2000)systemoraRecoveryOS3U(aka DPU3000)systemfromRelease5.0.0,anewkernelisinstalledbydefault. Rebootthesystemtoensuretheupdatedkernelisusedafterthedatabase migrations.ThisrequirementisnecessarytoensurevProtectFileLevel Recoveryfunctionsproperly. Anactivesupportcontractisrequiredtoupgradethesystem. Updatestobackupsystemsarecompatiblewitholderagentversions.Although itisrecommendedthatyouupgradetothelatestagentversions,thesystem willcontinuetofunctionproperlyrunningolderagents. Donotupgradeaclientsagentsoftwaretoaversionnewerthanthatofits backupsystem.Updatethebackupsystempriortoinstallingneweragents.The backupsystemversionmustbeequaltoornewerthanthatofitsclients. Formoreinformationaboutupgradingtothecurrentversion,seethe UnitrendsUpgradeGuide.

Advanced Configuration Options

79

Toupdatethesystem Note:Formoreinformationaboutupgradingtothecurrentversion,seethe UnitrendsUpgradeGuide. 1 2 SelectSettings>System,Updates,andLicensing>Updates. LookatthemessageontheSystemUpdatestabanddooneofthefollowing:

IfyouseethemessageThesystemisuptodate,therearenoupdatestoinstall.
ClickExittocloseanddonotcontinuewiththesesteps.

IfyouseethemessageTherearexavailableupdates,continuewiththese
3 steps. Toseedetailsonthesoftwarepackagesthatarebeingupdated,clickShowUpdate Details. Packagescanbeselectivelyaddedorremovedbydraggingthepackagestothe rightpaneortheleftpanerespectively.Itishighlyrecommendedtoinstallall availableupdatesatalltimes. 4 ClickInstalltostartupdatingsoftwarepackages. Iftherearesoftwareupdates(likethekernelpackage)thatrequireareboot,you receiveamessagetothisaffectonceupdateshavebeeninstalled.Ifnot,areboot isnotnecessary. Duringinstallationyouseeprogressmessages,suchasinstalling 5 of 20.If updatesseemtostall,orifyoureceiveamessageindicatingthatapackagecould notbeinstalled,itisfinetoclickExitandthenrestarttheupdateprocedure.

ShuttingdowntheUnitrendssystem
Typically,itshouldnotbenecessarytoshutdownyourUnitrendssystemunless youneedto:

Rebootafterinstallinganupdate Powerdownaphysicalappliancetoperformmaintenance
Youcanshutdownfromtheadministratorinterface(UEBorRecoverySeries), fromthehypervisor(UEB),orfromthephysicalapplianceitself.Ifitisnecessary toshutdownyoursystem,Unitrendsrecommendsshuttingdownfromthe administratorinterface.Anyjobsinprogresswhenthesystemisshutdownwill fail.Scheduledjobsdonotrunwhilethesystemisshutdown. OptionsforshuttingdownyourUnitrendssystem:

Toshutdownfromtheadministratorinterface
80

Chapter 3

ToshutdownUEBfromthehypervisor Toshutdownfromthephysicalappliance
Toshutdownfromtheadministratorinterface Thisistherecommendedmethodforshuttingdownyoursystem. 1 SelectthesystemintheNavigationpane.Ifthesystemisconfiguredasalocal backupsystemandreplicationtarget,youmustselectthebrownreplicationicon intheNavigationpanetoperformtheshutdown. GotoSettings>System,Updates,andLicensing>Shutdowntoseethe Shutdown/Restartwindow. Ifyouseethemessage,Shutdown/Restartmaybeperformedonly...,youaretrying toshutdownasystemfromitsmanagingsystem.Youmustlogintotheindividual systemthatyouwanttoshutdown. EnteryourOSRootpassword. Thecheckboxdefaultstochecked.Leavethischeckedtorestartthesystem automaticallyafteritshutsdown.Unchecktheboxonlyifyouneedthesystemto remainshutdown,suchastoperformmaintenance.Notethatifyouuncheck restart,youwillneedtomanuallyrestartUEBfromthehypervisororrestarta RecoverySeriessystemusingthepowerbuttononthephysicalbox. ClickConfirm. ClickOKwhenyouseethemessageSystemisshuttingdown... ClickLogouttoexitthesystem. Loginafterthesystemrestarts.IfyouseethemessageCallwasunsuccessful..., therestartisnotcomplete.Tryagaininafewminutes. Ifyouoptedtoshutdownwithoutrestarting,youneedtopushthepowerbutton onthephysicalapplianceormanuallystarttheUEBVMfromthehypervisor beforeyoucanlogbackintothesystem.

2 3

4 5

6 7 8 9

Advanced Configuration Options

81

ToshutdownUEBfromthehypervisor Usethismethodonlyifyouareunabletoshutdownthesystemthroughthe administratorinterface.ThefollowinginstructionsarebasedontheVMware vSphereClient.Theprocedurecouldvarywithdifferenthypervisors. 1 2 3 4 5 LogintothevSphereClient. GotoHome>Inventory>InventorytoviewyourVMs. RightclickontheVMtowhichtheUEBisdeployedtoseeanoptionmenu. HoveroverPower.ClickPowerOff. Beforeloggingbackintothesystemthroughtheadministratorinterface,youneed topowerontheVMtowhichitisdeployed. Toshutdownfromthephysicalappliance Usethismethodonlyifyouareunabletoshutdownthesystemthroughthe administratorinterface.Toshutdown,pressthepowerbuttononthephysical appliance. Note:Beforeyoucanlogbackintothesystem,youmustpowerontheappliance bypressingthepowerbutton.

82

Chapter 3

Aboutremotesystemmanagement
Unitrendssinglepaneofglassinterfacegivesyoutheabilitytomanagemultiple backupsystemsandreplicationtargetsfromonecentrallocation.Inthisfigure, theuserisloggedintothemanagersystemcalledLucieUEB,andcanadminister anothermanagedsystemcalledreplication35.

ProceedtoGrantingprivilegeforremotemanagementbelowtosetup managementofaremotesystem.

Advanced Configuration Options

83

Grantingprivilegeforremotemanagement
Forareplicationtargetoramanagementsystemtoremotelymanagealocal backupsystem,thebackupsystemhastoexplicitlygrantprivilegetothemanager. Thisisdonetosecureatwowayhandshakebetweenthemanagerandthe managedsystem. Aftergrantingremotemanagementprivilegetoasystem,youcanadminister nearlyallactionsonthemanagedsystemthroughasinglepaneofglass.Thereare afewexceptions.Logonlocallytoasystemtoperformthefollowingfunctions:

Manageandcreatecustomers,locations,andusers. Changethelocalsystempassword.
Certainotheroperationsarerestrictediftheremotesystemisnotthesame versionasthemanager.ItisabestpracticetoalwayshaveallUnitrendssystems onthelatestversion. Fordetails,seethefollowingprocedures:

Togranttheremotemanagementprivilegebelow Torevoketheremotemanagementprivilegeonpage 84
Togranttheremotemanagementprivilege 1 2 3 4 Onthelocalbackupsystem(managedsystem),selectthebluesystemiconinthe Navigationpane. SelectSettings>System,UpdatesandLicensing>GridManagement. SelectAllowRemoteManagementatthebottomleft. Enterthehostnameofthereplicationtargetormanagersystem. Besuretoenterthehostnameexactlyasitappearsinthehostsfileonthetarget ormanagersystem.Toviewasystemshostname,selectSettings>Clients, Networking,andNotifications>Networks>Hostname. 5 6 ClickConfirmtogranttheprivilege. Onthereplicationtargetormanagersystem,refreshtheviewtodisplaythe managedsystemintheNavigationpane. Torevoketheremotemanagementprivilege 1 2
84

Onthelocalbackupsystem(managedsystem),selectthebluesystemiconinthe Navigationpane. SelectSettings>System,UpdatesandLicensing>GridManagement.

Chapter 3

3 4

SelectRevokeRemoteManagementatthebottomright. Enterthehostnameofthereplicationtargetormanagersystem. Besuretoenterthehostnameexactlyasitappearsinthehostsfileonthetarget ormanagersystem.Toviewasystemshostname,selectSettings>Clients, Networking,andNotifications>Networks>Hostname.

5 6

ClickConfirmtorevoketheprivilege. Onthereplicationtargetormanagersystem,refreshtheviewtoremovethe systemthatisnolongermanagedfromtheNavigationpane.

Aboutcredentialmanagement
Credentialsareusedtoestablishatrustrelationshipbetweenthebackupsystem anditsclients.Onceyouapplyacredentialtoaclient,thebackupsystemcanonly accesstheclientusingtheassociatedadministrativeusernameandpassword.If theusernameandpasswordarenotvalid,accessisdenied. Credentialscanbesetateithertheclientorinstancelevel.Clientlevelcredentials areusedforagentpushandbackupoperations.Instancelevelcredentialsareused toperformabackupofaparticularapplicationinstance,suchasavirtualmachine orOracledatabase.CredentialsarerequiredforVMware,HyperV,andOracle protection,recommendedforWindowsclients,andoptionalforotherclient types.ForVMware,credentialsarerequiredforthevCenterorESXserver,but optionalforindividualVMs.SeeSettingVMcredentialsonpage 571fordetails. ForWindowsclients,credentialsarerequiredtopushinstallagentsandagent updates.Fordetails,seeWindowsagentversionsonpage 407.ForOracle databases,credentialsarerequiredtoperformbackupoperations.SeeOracle credentialconsiderationsonpage 524fordetails. Usetheproceduresinthissectiontomanagecredentialsfromacentralized location.Youcanalsocreateandapplycredentialsattheclientlevel,asdescribed inClienttrustcredentialsonpage 77orattheVMlevelforVMwareguests. TheCredentialManagementpagedisplayseachcredentialalongwithits associatedclientsand/orVMwareinstances.Tocollapsetheview,clickthearrow totheleftofacredential.PerformthefollowingtasksusingtheCredential Managementpage:

Tocreateanewcredential Toviewormodifyacredential Tosetadefaultcredential


85

Advanced Configuration Options

Todeleteacredential
Tocreateanewcredential 1 2 SelectSettings>Clients,Networking,andNotifications>Credential Management. ClickNewCredentialandenterthefollowing:
Action Name associated with the credential. This is optional. User must have local system administrator privileges or domain administrator privileges. Password associated with the username you supplied. Enter the password again to confirm. Name of the Windows domain associated with this credential. This is optional.

Field Credential Name Administrative Username Password Confirm Password Domain

ClickSaveNewCredential. Thecredentialiscreated.Clickrefreshtodisplayitinthegrid. Toviewormodifyacredential

1 2 3 4

SelectSettings>Clients,Networking,andNotifications>Credential Management. Selectthedesiredcredentialinthegrid. ClickEditSelectedCredentialandmodifysettingsasdesired.Foradescriptionof eachfield,seeTocreateanewcredentialabove. ClickSaveCredential. Tosetadefaultcredential Onceadefaultcredentialiscreated,youcanassignittoclientsbycheckingthe UsedefaultcredentialsboxontheClientpage.Onceyouhavesetthedefault credential,youcannotchangeyourselection.Instead,youmusteditthedefault credentialordeleteittochooseanotherasthedefault.

86

Chapter 3

1 2 3

SelectSettings>Clients,Networking,andNotifications>Credential Management. SelectthedesiredcredentialinthegridandclickEditSelectedCredential,or createanewcredentialasdescribedinTocreateanewcredentialonpage 86. ChecktheSetasDefaultboxandclickSaveCredential. Todeleteacredential

1 2

SelectSettings>Clients,Networking,andNotifications>Credential Management. Verifythattherearenoclientsassociatedwiththecredential. Acredentialthatisassociatedwithaclientcannotbedeleted. Ifthereisaclientassociated,removetheassociationontheClientspagebyeither uncheckingtheEstablishTrustboxorassociatingadifferentcredential.Fordetails, seeClienttrustcredentialsonpage 77.

SelectthedesiredcredentialinthegridandclickDeleteCredential.

AboutActiveDirectoryauthentication
Thissectiondescribestheproceduresusedtoimplementadministratorinterface (AI)authenticationusingActiveDirectory(AD)domaincredentials.Userscanbe setupasmembersofspecifiedADdomainstoaccesstheUnitrendssystem withoutbeingaddedasusersinthatsystemitself. TheADgrouptowhichauserbelongsdetermineswhichfeaturesthatusercan viewandutilize.Usersaregrantedoneofthefollowingprivilegelevels:monitor, manage,administrator,orsuperuser.Foradescriptionofeach,seeAboutuser configurationonpage 54. UseractionsareloggedinthesystemandcanbeviewedintheAuditHistory report.Fordetails,seeAuditHistoryReportonpage 342. PerformtheseprocedurestomanageActiveDirectoryauthentication:

ToauthenticateusingActiveDirectory TologinusingADauthenticationonpage 90 ToenableordisableActiveDirectoryauthenticationonpage 90

Advanced Configuration Options

87

ToauthenticateusingActiveDirectory 1 CreatethefollowinggroupsinyourActiveDirectorydomain:
Description Members of this group are granted superuser privileges.

Group UnitrendsSuperuser Unitrends-Admin

Members of this group or domain administrators are granted administrator privileges. Members of this group are granted manage privileges. Members of this group are granted monitor privileges.

Unitrends-Manage Unitrends-Monitor

NOTE:Youmaynamethesegroupstosuityourenvironment.Ifyouuseyourown names,besuretoenterthesenameswhenyouconfigureADauthenticationinthe Unitrendssystem.UsergroupnamesinyourADdomainmustmatchthenames youenterinStep7below. 2 AdduserstotheUnitrendsdomaingroupsasdesired. UserswhoarenotdomainadministratorsmustbeassignedtoaUnitrendsgroup tologintotheAIusingADauthentication. 3 4 IntheUnitrendsAI,selectthedesiredsystemintheNavigationpane. Dooneofthefollowing: Note:Thebackupsystemmustberunningrelease7.2.0orlatertousetheDNS option.Forolderreleases,youmustaddtheADservertothesystemshostfile. toStep6. AddtheADservertotheUnitrendssystemshostfileasdescribedinStep5. AddtheActiveDirectoryservertotheUnitrendssystemshostfileasdescribed below.Ifyouvealreadyaddedtheserver,verifythatyouhavesetthefieldsas describedhere.Modifysettingsasnecessary.

CreateaDNSentryfortheADserverwithreverselookupconfigured,thenskip

SelectSettings>Clients,Networking,andNotifications>Networks>Hosts,click AddAnotherHost,enterHostName,IPAddress,andQualifiedNameasdescribed below,thenclickConfirm.

TheADserveristhemachinewheretheActiveDirectorydomainislocated.
88

Chapter 3

ForQualifiedName,entertheactivedirectorydomainonly.Donotincludethe
servername.

Example:foranADservercalledSERVER_ADwhoseIPaddressis
192.168.111.75andADdomainiscompany_domain.com,enterthefollowing: SERVER_ADintheHostNamefield. 192.168.111.75intheIPAddressfield. company_domain.comintheQualifiedNamefield. Important:Thishostentrymustbeaddedbeforecontinuingwiththisprocedure. ThehostentrymustbepresentbeforeconfiguringtheUnitrendssystemforAD authentication. 6 7 SelectSettings>System,Updates,andLicensing>ActiveDirectory. Enterinformationasfollows: Action
Check this box to start using AD authentication, or leave unchecked to start using AD authentication at a later time.

Field EnableActive Directory Authentication UseSSL

Check this box if SSL is configured on the domain controller. Be sure to configure SSL between the Unitrends system and the domain controller. Enter the hostname of the machine where the Active Directory Domain is located. If left blank, the system populates this field using the hosts file entry. If you are using DNS and did not add the AD server to the hosts file, be sure to enter the hostname here. This field is limited to 15 characters. Enter the name of the AD domain. Do not include the AD server name. For example, ad_domain.company_domain.com. This name must be present in the systems host file or resolvable through DNS. (optional) Enter the IP address of the AD server. Enter UnitrendsSuperuser

ActiveDirectory Server

ActiveDirectory Domain

ActiveDirectoryIP UnitrendsSuperuser Group

Advanced Configuration Options

89

Field Unitrends AdministratorGroup UnitrendsManage Group UnitrendsMonitor Group 8

Action
Enter UnitrendsAdmin.

Enter UnitrendsManage.

Enter UnitrendsMonitor.

ClickConfirmtosave,orCanceltoexitwithoutsaving. TologinusingADauthentication ThisprocedureassumesyouhavesetuptheUnitrendsuseraccountinActive DirectoryandhaveconfiguredADauthenticationasdescribedinToauthenticate usingActiveDirectoryabove.

1 2 3

ConnecttotheUnitrendssystembydirectinganybrowserto
https://<system IP address>/recoveryconsole

Clickthelockicon. IntheEnteryourusernamefield,EntertheADdomainandusernameineitherof thefollowingformats:ad_domain\ad_usernameor ad_username@ad_domain.company_domain Forexample,foruserjsmithonADdomainaccountingandcompanydomain americanaccountants.com,enter: accounting\jsmith or jsmith@accounting.americanaccountants.com

4 5

IntheEnteryourpasswordfield,enterthepasswordforthisADuser. ClickLogin. ToenableordisableActiveDirectoryauthentication

1 2

SelectSettings>System,Updates,andLicensing>ActiveDirectory. ChecktheEnableActiveDirectoryAuthenticationboxtoenableAD authentication,oruncheckthisboxtodisableADauthentication.

90

Chapter 3

ClickConfirmtosave.

Aboutstorageconfiguration
TheUnitrendssystemisconfiguredasabackupsystem,areplicationsystem,oras bothabackupandreplicationsystemifperformingbothroles. Note:RackmountedsystemssoldbeforeMay,2011andolderdesktopunitsdonot supportreplication.Instead,legacyvaultingisused.Inthesesystems,the installationtypeisbackupsystem,vaultsystem,orcrossvaultifperformingboth roles.Foradescriptionofsupportedinstallationtypesbysystem,seeInstallation typesandreplicationonpage 250. Thesystemsstorageneedsvarybasedontheroleitplaysintheenvironment.Use thestorageinterfacetodothefollowing:

Optimizedistributionofstoragedependingontheroleofthesystem. AddSANoraNASstorageasrotationalarchivingtargetsusinghighspeed
interconnects,likeFiberChanneland10GbEEthernet.

ProtectaNASsharebymountingitdirectlyontheUnitrendssystem.This
eliminatesthenetworklatencyassociatedwithdatatransferforNASshares backedupasmounteddevicesonprotectedclientsofthesystem. AddbackuporvaultingstoragetoUnitrendsvirtual(UEB)systems.Vaulting storageisonlyusedforsystemsrunningthelegacyvaultingfeature.For replication,dataiswrittentothebackupstoragearea. Optimizestorageutilizationbyselectinganingestratestrategyforthedata beingprotectedcomparedtotheamountofretentiononthesystem. Thestorageinterfacedisplaysallstoragetargetsthathavebeenconfigured.For eachtarget,detailsaboutthestoragearegiven,includingitsusage,associated device,type,mountpoint,size,freespace,andstatus(onlineoroffline).

Advanced Configuration Options

91

Storagetypes
Type Backup storage Description This option applies to Unitrends virtual systems only. Backup storage can be increased by adding a virtual disk to the UEB virtual machine using the hypervisor. Note: It is possible to attach external NAS or SAN storage directly to the UEB VM, but this feature is deprecated and will be removed in a future release. Adding storage through the hypervisor is the recommended approach. Once the storage is added in the hypervisor, go to the Unitrends system and either expand the existing backup device to include the new disk, or add a separate backup device. (See Toexpand abackupdeviceonpage 94 or Toaddbackupstorageand createanewdeviceonpage 95 for details). Within the hypervisor, you can add internal disks to the UEB VM or, if you deployed your UEB to an attached SAN or NAS storage array, you can create datastores (VMware) or volumes (Hyper-V) from that array to add virtual disks (VMDK or VHDX) to the UEB VM.

Warning: It is strongly recommended that all UEB storage is


either direct attached storage (DAS, internal to the hypervisor) or resides on one external storage array. If you configure storage across multiple storage arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss. You can leverage SAN or NAS storage to create datastores (VMware) or volumes (Hyper-V) by connecting the external array to the hypervisor host:

A SAN LUN on the array can be connected to the hypervisor

host and exposed to UEB. You can then add the entire LUN to UEB or create virtual disks (VMDK or VHDX) on the LUN and expose these disks to UEB for added storage. A NAS share can be connected to the hypervisor host over CIFS or NFS protocol to create virtual disks (VMDK or VHDX) for added storage.

92

Chapter 3

Type Vault storage

Description This option applies to Unitrends virtual systems performing legacy vaulting only. Additional vault storage can be added to the virtual system in the following ways:

A SAN iSCSI LUN can be used The Hypervisor can connect to a SAN using iSCSI or Fiber
Archive storage

Channel and expose the LUN as a Raw Device Mapping device An additional virtual disk can be added to the virtual system A NAS NFS share can be leveraged. NAS shares configured with the CIFS protocol are not supported for legacy vaulting.

This option applies to all physical and virtual systems that have been licensed for advanced archiving. Additional archive storage can be added in the following ways:

A SAN iSCSI LUN can be used A NAS share can be leveraged For virtual systems, an additional virtual disk can be added
NAS protection This option applies to all physical and virtual systems. A NAS share configured using the NFS or CIFS protocol can be mounted directly on the system. A backup schedule can then be created to protect the NAS share. This option applies to Unitrends physical systems and UEB on VMware. This options is not available for UEB on Hyper-V. For VMware environments where datastores are hosted on a SAN, configure SAN storage so that data is backed up directly from the SAN to the backup system. For details, see VMwareSAN directbackupsonpage 578.

Protect VMs on a SAN

Addingstoragetothesystem
Thissectionprovidesinstructionsforaddingthefollowingkindsofstorage: Addingbackupstorage Addingarchivestorage Addingvaultstorage

Advanced Configuration Options

93

ProtectingNASstorage ToprotectVMsonaSAN,seeVMwareSANdirectbackupsonpage 578.

Addingbackupstorage
TheseproceduresapplytoUnitrendsvirtualsystemsonly.Youcanaddstorageby expandingthebackupdeviceacrossaddeddisks,orbycreatingaseparatestorage areaforanewbackupdevice. Warning: It is strongly recommended that all UEB storage is either direct attached
storage (DAS, internal to the hypervisor) or resides on one external storage array. If you configure storage across multiple storage arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss.

Toexpandabackupdevice ExpansionissupportedonUnitrendsEnterpriseBackupdeployments. Warning:Onceyouaddadisktothedatastoreandexpandstorage,thatdiskis addedtoalogicalvolume.Thenewlyaddeddiskandanyexistingdisksarethen treatedasonediskbythesystem.Youcannotremovethediskonceithasbeen added.Removingadiskafterexpandingstorageresultsindatalossand corruption. 1 AddadisktothedatastoreusedbytheUnitrendsEnterpriseBackupVM. SeeTocreateadditionalbackupstorageforHyperVonpage 58orTocreate additionalbackupstorageforVMwareonpage 59fordetails. 2 3 4 IntheUnitrendssystem,selectSettings>StorageandRetention>Storage. ClickAddBackupStorage. ChooseExpandyourbackupdeviceacrossaddeddisks,thenclickConfirm.

TheExpandStoragepageshowsthecurrentsizeofthedefaultinternalstorage
pool. Ifyouhavenotyetaddedadatastore,youmayclickShowStepsforAdding AdditionalStoragefordetailedinstructions.Youmustgotoyourhypervisor andaddthedatastorebeforeexpandingstorage. ClickExpandStorage. Thesystemexpandsstorageonthedefaultdevicetoincludethediskyoucreated onthedatastore.ThedefaultdeviceisD2DBackupsunlessyouveconfigureda differentone.

94

Chapter 3

Whenstorageexpansioniscomplete,thecurrentsizeofthestoragepoolis updatedtoreflecttheexpansion. 95%ofthediskyouaddedisallocatedforbackup/replicationstorage.5%ofthe expandedstorage,upto2GB,isallocatedforswapspace.

ClickConfirmtoexit. Toaddbackupstorageandcreateanewdevice Usethisproceduretoaddstorageandanewbackupdevice.Forbestresults,all backupdevicesshouldbeofsimilarsize.(Toaddstoragetoanexistingdevice,see Toexpandabackupdeviceabove.) Warning: It is strongly recommended that all UEB storage is either direct attached
storage (DAS, internal to the hypervisor) or resides on one external storage array. If you configure storage across multiple storage arrays and one becomes unavailable, all backup data is corrupted, resulting in total data loss.

1 2 3 4 5

SelectSettings>StorageandRetention>Storage. ClickAddBackupStorage. ChooseCreateaseparatestorageareaforanalternatebackupdevice,thenclick Confirm. EnteranameforthestoragebeingconfiguredintheStorageNamefield. SelectthestorageTypeandcontinuetotheapplicableprocedure: Note:Ifyouhave attached a NAS or SAN through the hypervisor, select the Added Disk type. UEB treats all storage attached through the hypervisor as internal
storage.

ForiSCSI,seeToconfigureiSCSIstorageonpage 97 ForNAS,seeToconfigureNASstorageonpage 99 ForAddedDisk,seeToconfigureaddedinternalstorageonpage 101

Addingarchivestorage
ThisprocedureappliestoUnitrendsvirtualandphysicalsystems.Youcanarchive toaSANiSCSILUN,aNASshare,orforvirtualsystemsonly,toavirtualdisk. Notethefollowingarchivestoragelimitations:

ForarchivetoNAS,eachbackupsystemmustarchivetoaseparateNASshare.
HavingmorethanonebackupsystemarchivingtoagivenNASshareislikelyto causedatacorruption.

Advanced Configuration Options

95

ForarchivetoiSCSILUN,eachbackupsystemmustarchivetoaseparateLUN.
HavingmorethanonebackupsystemarchivingtoagiveniSCSILUNislikelyto causedatacorruption. Toaddarchivestorage 1 2 3 4 SelectSettings>StorageandRetention>Storage. ClickAddArchiveStorage. EnteranameforthestoragebeingconfiguredintheStorageNamefield. SelectthestorageTypeandcontinuetotheapplicableprocedure:

ForiSCSI,seeToconfigureiSCSIstorageonpage 97 ForNAS,seeToconfigureNASstorageonpage 99 ForFiberChannel,seeToconfigureFiberChannelstorageonpage 99 ForAddedDisk,seeToconfigureaddedinternalstorageonpage 101

Addingvaultstorage
ThisprocedureappliestoUnitrendsvirtualsystemsrunningthelegacyvaulting featureonly.Forvirtualsystemsconfiguredforreplication,vaultstorageisnot neededasreplicateddataiswrittentobackupstorage.YoucanvaulttoaSANiSCSI LUN,anNFSconfiguredNASshare,ortoavirtualdisk. Note:NASsharesconfiguredwiththeCIFSprotocolcannotbeusedforlegacyvault storage. Toaddvaultstorage 1 2 3 4 SelectSettings>StorageandRetention>Storage. ClickAddVaultStorage. EnteranameforthestoragebeingconfiguredintheStorageNamefield. SelectthestorageTypeandcontinuetotheapplicableprocedure:

ForiSCSI,seeToconfigureiSCSIstorageonpage 97 ForNFSconfiguredNAS,seeToconfigureNASstorageonpage 99 ForAddedDisk,seeToconfigureaddedinternalstorageonpage 101

96

Chapter 3

ProtectingNASstorage
ThisprocedureappliestoUnitrendsvirtualandphysicalsystems.Youcanprotect thedatastoredonaNASsharebyaddingNASstoragetothebackupsystem.Upon addingNASstorage,aclientiscreatedanddisplaysintheNavigationpane.Youcan thenschedulebackupsfortheNASasyouwouldanyotherclient.SeeProtecting NASdevicesonpage 172fordetails. ToprotectdatastoredonaNAS 1 2 3 4 SelectSettings>StorageandRetention>Storage. ClickProtectaNAS. EnteranameforthestoragebeingconfiguredintheStorageNamefield. ContinuetoToconfigureNASstorageonpage 99.

Configuringstorage
Thissectionprovidesinstructionsforconfiguringthebackupsystemsconnection toaddedstorage.Thefollowingprotocolsaresupported:

iSCSI,seeToconfigureiSCSIstorageonpage 97. FiberChannel,seeToconfigureFiberChannelstorageonpage 99. NAS,seeToconfigureNASstorageonpage 99. Internal,seeToconfigureaddedinternalstorageonpage 101.

ToconfigureiSCSIstorage 1 Addstorageusingoneoftheseprocedures: Toaddbackupstorageandcreateanewdeviceonpage 95 Toaddarchivestorageonpage 96 Toaddvaultstorageonpage 96 ToconfigureaSANdirectbackupforaRecoverySeriessystemonpage 580 IftheiSCSItargetisconfiguredforCHAPauthentication,youmustsetupCHAPin theUnitrendssystem.SeeAboutCHAPauthenticationonpage 103. EntertheIPaddressoftheSANstoragearrayintheHostIPaddressfield. ThedefaultportusedforiSCSIcommunicationis3260.IftheLUNisconfiguredto useadifferentport,enteritinthePortfield. ClickScanforListofAvailableTargetstoretrievealistoftargetsontheremote storagearray,thenchooseonefromtheSelectTargetlist.
97

2 3 4 5

Advanced Configuration Options

EntertheappropriateLogicalUnitNumberusingtheLUNcounter,orclickScanfor ListofAvailableLUNsandselectoneintheSelectLUNlist. Note:IfyoureceiveanerrorindicatingCHAPauthenticationhasfailed,CHAPhas beenconfiguredonthetargetandeitherCHAPhasnotbeenenabledinthe Unitrendssystem,ortheUnitrendsCHAPcredentialsdonotmatchthoseofthe target.

ClickConfirm.

Ifyouareaddingbackupstorage,continuewiththisproceduretoaddthe
backupdevice. Tousethisstorageforarchiving,selectitasatargetwhenrunningor schedulingarchivejobs.SeetheArchivingchapterfordetails. Tousethisstorageforlegacyvaulting,selectitasatargetwhenaddingthe backupsystemtothevault.Fordetails,seeAddingthebackupsystemtothe vaultonpage 309.Notethatreplicationusesregularbackupstorage.Vault storageisusedforsystemsthatusethelegacyvaultingfeatureonly. OntheAddDevicepage,enteranameforthenewdeviceintheDeviceName field. Thisisthenamethatwillbeusedwheneverthedeviceisselected.Devicenames mustbeuniqueandshouldnotcontainspaces. 9 EntertheamountofdatathatcanbestoredonthenewdeviceintheCapacity field. TheCapacityfieldgovernstheamountofdatathatcanbestoredonthedevice. Thesystemmanagestothecapacitylimitsetandwillassurethatthedataonthe devicedoesnotexceedthecapacitylimit.Ifthecapacitychosenexceedsthe systemlicenseORifthereisnotenoughspaceonthefilesystemtoaccommodate theallocation,amessagedisplaysindicatingtheneedtoadjustthecapacitylimit. OptionsforCapacitysettingsare:

StandardSizeUsethistoselectfromalistofvalues.Clickthedownarrownext
tothedevicesizeandselectthedesiredcapacity. sizelist,selectthisoptiontospecifyacapacity. 10 EnterabriefdescriptionforthedeviceintheDescriptionfield. 11 IntheMaxConcurrentBackupsfield,enterthenumberofbackupsthatcanbe runsimultaneouslyonthesystem. Thedefaultvalueisthree.Therecommendedrangeisthreetoten,dependingon networkthroughput,thenumberofdevicesdefined,andtheresourcesofthe system. 12 Checktheseboxesasapplicable:
98
Chapter 3

CustomSizeIfthedesiredsizeofthedeviceisnotpopulatedinthestandard

Onlineboxtoindicatethatthedeviceisonlineandreadyforbackupstobe
written.

Defaultboxtomakethisthedefaultdevice.Thedefaultdeviceisusedifno
otherdeviceisspecified. SelectStorageboxtoselectexternalstorageforvirtualsystems.Deduplication maybeenabledonexternaldevicesusingthisfeature. Note:ThePathnamedisplaysthelocationonthesystemwherethebackupsare stored.Thisfieldcannotbeedited. 13 ClickConfirmtoaddthedevice. Tostorebackupsonthisdevice,selectitwhenrunningorschedulingbackups.See theBackupschapterfordetails. ToconfigureFiberChannelstorage 1 2 CompletethestepsinToaddarchivestorageonpage 96orToconfigureaSAN directbackupforaRecoverySeriessystemonpage 580. IftheFCLUNisconfiguredforauthentication,providethecredentialsinthe Username,Password,andVerifyPasswordfields. Ifauthenticationisnotused,skipthisstep. 3 4 5 6 ClickScanforListofAvailableTargetstoretrievethetargetLUNsexposedbythe SAN. ChoosethedesiredtargetfromtheSelectTargetlist. EntertheLogicalUnitNumberusingtheLUNcounter,orclickScanforListof AvailableLUNsandselectoneintheSelectLUNlist. ClickConfirmtocompletethesetup. ToconfigureNASstorage 1 Addstorageusingoneoftheseprocedures:

Toaddbackupstorageandcreateanewdeviceonpage 95 Toaddarchivestorageonpage 96 Toaddvaultstorageonpage 96 ToprotectdatastoredonaNASonpage 97 IftheNASshareisconfiguredforauthentication,providethecredentialsinthe Username,Password,andVerifyPasswordfields.

Ifdomaincredentialsarebeingused,entertheusernameas
user@domain.com.
99

Advanced Configuration Options

Ifauthenticationisnotused,skipthisstep.
3 4 EntertheIPaddressoftheNASshareintheHostfield. SelectthedesiredfilesystemtypefromtheProtocollist.TheNASsharecanbe connectedusingtheNFSorCIFSprotocol. Note:Forlegacyvaultstorage,youmustconfiguretheNASusingtheNFSprotocol. TheCIFSprotocolisnotsupportedforvaultstorage. 5 6 7 ThePortfieldcontainsthedefaultfortheprotocolselected.Iftheprotocolusesa customport,enterthatportnumber. EnterthedirectorypathnameoftheNFSorCIFSshareintheShareNamefield. ClickConfirm.

Ifyouareaddingbackupstorage,continuewiththisproceduretoaddthe
backupdevice.

IfyouareprotectingdatastoredonthisNAS,schedulebackupsfortheNASas
youwouldanyotherclient.SeetheBackupschapterfordetails. Tousethisstorageforarchiving,selectitasatargetwhenrunningor schedulingarchivejobs.SeetheArchivingchapterfordetails. Tousethisstorageforlegacyvaulting,selectitasatargetwhenaddingthe backupsystemtothevault.Fordetails,seeAddingthebackupsystemtothe vaultonpage 309.Notethatreplicationusesregularbackupstorage.Vault storageisusedforsystemsthatusethelegacyvaultingfeatureonly. OntheAddDevicepage,enteranameforthenewdeviceintheDeviceName field. Thisisthenamethatwillbeusedwheneverthedeviceisselected.Devicenames mustbeuniqueandshouldnotcontainspaces. 9 EntertheamountofdatathatcanbestoredonthenewdeviceintheCapacity field. TheCapacityfieldgovernstheamountofdatathatcanbestoredonthedevice. Thesystemmanagestothecapacitylimitsetandwillassurethatthedataonthe devicedoesnotexceedthecapacitylimit.Ifthecapacitychosenexceedsthe systemlicenseORifthereisnotenoughspaceonthefilesystemtoaccommodate theallocation,anerrormessageisdeliveredindicatingtheneedtoadjustthe capacitylimit.OptionsforCapacitysettingsare:

StandardSizeUsethistoselectfromalistofvalues.Clickthedownarrownext
tothedevicesizeandselectthedesiredcapacity. sizelist,selectthisoptiontospecifyacapacity. 10 EnterabriefdescriptionforthedeviceintheDescriptionfield.
100

CustomSizeIfthedesiredsizeofthedeviceisnotpopulatedinthestandard

Chapter 3

11 IntheMaxConcurrentBackupsfield,enterthenumberofbackupsthatcanbe runsimultaneouslyonthesystem. Thedefaultvalueisthree.Therecommendedrangeisthreetoten,dependingon networkthroughput,thenumberofdevicesdefined,andtheresourcesofthe system. 12 Checktheseboxesasapplicable: written. Defaultboxtomakethisthedefaultdevice.Thedefaultdeviceisusedifno otherdeviceisspecified. SelectStorageboxtoselectexternalstorageforvirtualsystems.Deduplication maybeenabledonexternaldevicesusingthisfeature. Note:ThePathnamedisplaysthelocationonthesystemwherethebackupsare stored.Thisfieldcannotbeedited. 13 ClickConfirmtoaddthedevice.

Onlineboxtoindicatethatthedeviceisonlineandreadyforbackupstobe

Tostorebackupsonthisdevice,selectitwhenrunningorschedulingbackups.
SeetheBackupschapterfordetails. Toconfigureaddedinternalstorage Note:Thisoptionisonlyavailableforvirtualsystems.UEB treats all storage
attached through the hypervisor as internal storage, whether this is direct attached storage (DAS, internal to the hypervisor) or storage that resides on an external array.

AddadisktothedatastoreusedbytheUnitrendsEnterpriseBackupVM. Fordetails,seeTocreateadditionalbackupstorageforHyperVonpage 58or TocreateadditionalbackupstorageforVMwareonpage 59.

AddstorageoftypeAddedDiskusingoneoftheseprocedures:

Toaddbackupstorageandcreateanewdeviceonpage 95 Toaddarchivestorageonpage 96 Toaddvaultstorageonpage 96


3 4 5 6 SelectadiskfromtheSelectAddedDisklist. ClickConfirm. ChecktheIunderstand...boxtoindicateyouareawarethatanydataonthe selecteddiskwillbedeleteduponaddingstoragetothebackupsystem. ClickConfirm.

Advanced Configuration Options

101

Ifyouareaddingbackupstorage,continuewiththisproceduretoaddthe
backupdevice.

Tousethisstorageforarchiving,selectitasatargetwhenrunningor
schedulingarchivejobs.SeetheArchivingchapterfordetails. Tousethisstorageforlegacyvaulting,selectitasatargetwhenaddingthe backupsystemtothevault.Fordetails,seeAddingthebackupsystemtothe vaultonpage 309.Notethatreplicationusesregularbackupstorage.Vault storageisusedforsystemsthatusethelegacyvaultingfeatureonly. OntheAddDevicepage,enteranameforthenewdeviceintheDeviceName field. Thisisthenamethatwillbeusedwheneverthedeviceisselected.Devicenames mustbeuniqueandshouldnotcontainspaces. 8 EntertheamountofdatathatcanbestoredonthenewdeviceintheCapacity field. TheCapacityfieldgovernstheamountofdatathatcanbestoredonthedevice. Thesystemmanagestothecapacitylimitsetandwillassurethatthedataonthe devicedoesnotexceedthecapacitylimit.Ifthecapacitychosenexceedsthe systemlicenseORifthereisnotenoughspaceonthefilesystemtoaccommodate theallocation,anerrormessageisdeliveredindicatingtheneedtoadjustthe capacitylimit.OptionsforCapacitysettingsare:

StandardSizeUsethistoselectfromalistofvalues.Clickthedownarrownext
tothedevicesizeandselectthedesiredcapacity. CustomSizeIfthedesiredsizeofthedeviceisnotpopulatedinthestandard sizelist,selectthisoptiontospecifyacapacity. EnterabriefdescriptionforthedeviceintheDescriptionfield.

10 IntheMaxConcurrentBackupsfield,enterthenumberofbackupsthatcanbe runsimultaneouslyonthesystem. Thedefaultvalueisthree.Therecommendedrangeisthreetoten,dependingon networkthroughput,thenumberofdevicesdefined,andtheresourcesofthe system. 11 Checktheseboxesasapplicable:

Onlineboxtoindicatethatthedeviceisonlineandreadyforbackupstobe
written.

Defaultboxtomakethisthedefaultdevice.Thedefaultdeviceisusedifno
otherdeviceisspecified.

102

Chapter 3

SelectStorageboxtoselectexternalstorageforvirtualsystems.Deduplication
maybeenabledonexternaldevicesusingthisfeature. Note:ThePathnamedisplaysthelocationonthesystemwherethebackupsare stored.Thisfieldcannotbeedited. 12 ClickConfirmtoaddthedevice. Tostorebackupsonthisdevice,selectitwhenrunningorschedulingbackups.See theBackupschapterfordetails.

AboutCHAPauthentication
UnitrendssupportstheuseofChallengeHandshakeAuthenticationProtocol (CHAP)foriSCSIconnectionstoexternalstorage.ConfiguretheUnitrendssystem toconnectusingCHAPauthenticationasdescribedinToconfigureiSCSIstorage onpage 97. ConsiderthefollowinglimitationsandrequirementswhenimplementingCHAP withtheUnitrendssystem:

YoucanconfiguretheiSCSIconnectionwithCHAPbeforeconfiguringCHAPon
thetarget.Oncethetargetisconfigured,CHAPauthenticationisenforced.

IfCHAPhasnotbeenconfiguredonthetarget,Unitrendsdetectsthisandgains
accesswithoutCHAPauthentication,evenifCHAPhasbeenenabledinthe Unitrendssystem. IfCHAPhasbeenconfiguredonthestoragetarget,youmustenableCHAP authenticationintheUnitrendssystem.Ifnot,anyattempttoaddthetargetto oraccessthetargetfromtheUnitrendssystemfails. AsingleCHAPusernameandpasswordisusedbytheUnitrendssystem. Therefor,allofitsCHAPenablediSCSItargetsmustbeconfiguredwiththis usernameandpassword. CHAPissupportedfromtheinitiator(Unitrendssystem)tothetargetonly. Mutual(bidirectional)CHAPisnotsupported. CHAPauthenticationoccursuponfirstlogintothetarget.Subsequent operationsonthetargetsucceed,withoutfurtherauthentication,forthe durationoftheiSCSIsessionoruntilthetargetsendsarandomchallenge request.

ToenableCHAPauthentication 1 2 ConfigureCHAPauthenticationonalliSCSItargetsaccessedbytheUnitrends system. IntheUnitrendssystem,selectSettings>StorageandRetention>iSCSICHAP Credentials.

Advanced Configuration Options

103

EntercredentialsintheUsername,Password,andVerifyPasswordfields,then clickSaveCHAPcredentials.OnesetofcredentialsisusedtoaccessalliSCSI targets.

Bydefault,UsernamecontainsthebackupsystemsiSCSIqualifiedname(IQN).
Itisrequiredthattheusernameandpasswordontheinitiator(backupsystem) matchthosedefinedonthetargets.ModifytheUsernameentryifnecessary. Thepasswordmustbe1216charactersinlength. TodisableCHAPauthentication Note:BesuretodisableCHAPonalliSCSItargetsbeforedisablingCHAPinthe Unitrendssystem. 1 2 3 DisableCHAPauthenticationonalliSCSItargets. IntheUnitrendssystem,selectSettings>StorageandRetention>iSCSICHAP Credentials. ClickClearCHAPCredentials.

Storageallocationanddistribution
Storageallocationanddistributioncanbeoptimizedandconfiguredbasedonthe rolethesystemplaysinthedataprotectionplan.Storageallocationcanonlybe modifiedonsystemsthatsupportinstantrecovery(seeWindowsInstant Recoveryonpage 436andInstantrecoveryforVMwareonpage 595for details)orareconfiguredwiththelegacylocalbackupsystemandvault installationtype.Forothersystems,storageallocationcannotbemodified. Toconfigurestorageallocation 1 2 SelectSettings>StorageandRetention>StorageAllocation. IntheStorageAllocationwindow,configurethedistributionofthestorageused forbackups/replication,vaulting,andinstantrecoveryasdesired. Tochangethedistributionofallocatedstorage,dragtheedgeofthepietothe desiredsize. Note:Forlegacysystemsconfiguredascrossvaults,thestorageisequally distributedbetweenVaultingandBackupwhenthesystemisinstalled.Ifyou reducetheBackup/Replicationstorageallocationtoprovideadditionalstoragefor InstantRecoveryorVaulting,olderbackupsmayberemovedfromthesystemto makeroomforthenewstorageallocation.Thedevicesthatareconfiguredonthe systemarescaleddownproportionallytoaccommodatethenewallocation.
104

Chapter 3

ClickConfirmtoapplythechanges.

Balancingbackupperformanceandretention
Unitrendssystemsaredesignedtouseallavailablestorageforprotectingdata(see Storageallocationanddistributiononpage 104).Asscheduledorimmediate backupsareperformed,theoldestbackupsaredeletedtoingestnewbackups.See Aboutretentioncontrolonpage 106fordetails. Youcantunesystemstoragetofitthebackupwindowandretentionobjectivesof yourenvironmentbyselectingfromthefollowingoptions.
Performance/retention options Balance retention and backup performance (recommended setting) Description

This is the recommended setting for managing the ingest rate and retention on the system. With this setting, a predictive mechanism is used to dynamically alter the size of the landing zone based on the backup strategies selected. Use this setting where backup window requirements are critical. With this setting, a landing zone (reserve area) is created which is large enough to hold the data set that is being protected. This guarantees the fastest ingest rate. However, to meet the landing zone requirements, older backups are more aggressively deleted. Use this setting where retention is critical. The data protection ingest rate is slower. The landing zone is kept to a minimum to ensure maximum retention.

Minimize backup window

Maximize retention

Tobalancebackupperformanceandretention 1 2 3 SelectSettings>StorageandRetention>Retention. SelectthedesiredBalanceRetentionandBackupPerformanceoption.Seethe tableaboveforadescriptionofeachoption. ClickConfirmtosave.

Advanced Configuration Options

105

Aboutretentioncontrol
Adataretentionpolicyisdeterminedbyanorganization'slegalandbusinessdata retentionrequirements.Youmayneedtokeepdataavailableformonthsoreven years.Howyouachievethismaybeacombinationofonsystemretentionand archivingtoremovablemediaforlongertermstorage. Spaceonthesystemisselfmanagedbasedontheusersettingsforbalancing ingestrateandretention(seeBalancingbackupperformanceandretentionon page 105).Whenyoursystemcapacityisfull,theoldestbackupsarepurgedto makeroomfornewerones.However,theUnitrendssystemwillnotpurgethe latestbackupsofanytypeforagivenclient,oranybackupsforaclientthatareput onlegalhold.Thegreaterthedifferenceintheamountoftotaldataprotectedand thesystemsize,thegreatertheonsystemretention.Ifthedifferenceissmallyou willseelessretentiononthesystem.Ifyourequiremanyweeksofonsystem retention,youmustdeployasystemofsufficientsize. Theretentioncontrolfeatureallowsyoutodecidehowlongbackupsareretained onthesystembeforebeingpurged.Controllingtheorderinwhichbackupsare removedallowsformoreeffectivemanagementofavailablespace,without affectingthemannerinwhichgeneralperformanceisbalancedwithretention. TheRetentiontooltracksbackupsasgroupscontainingamasterorfullbackup, alongwithanyincrementalsordifferentialsthatfollowed.Amasterinafilebased backupgroupmaybegeneratedondemand,byascheduledbackup,or synthesizedbythesystemduringanincrementalforeverprocess. Noretentionpolicyissetfornewlyaddedclients.Withnoretentionpolicyset, backupsforaclientarekeptaslongaspossiblebyasystemuntilthesystemruns outofbackupspace,atwhichpointtheoldestbackupsarepurged.Retention policiesaresetusingthefollowingcontrols.YoumusthaveManageprivilegesor highertochangeretentionsettings.

106

Chapter 3

Retention control Min retention goal

Description A notification mechanism to inform when the desired retention goals are not being met. Setting the minimum retention goal does not guarantee the retention of protected data for the defined period. As newer backups are performed (scheduled or immediate), older backups are purged to reclaim space on the system if necessary. If guaranteed minimum retention is needed, use legal hold. If the minimum retention goal is not met, a message displays on the Alerts Last 7 Days tab of the Status screen. Number of days backups are retained if space allows. Backups are deleted once the master/full is older than this limit. Any differentials or incrementals that are children of the master are deleted as well, even if they are younger than the max retention limit. If you set your maximum limit below the actual retention, backups are deleted and the process cannot be stopped. Unlike Min retention goal, Legal hold allows you to set a hard minimum limit on the number of days a backup will be held. The legal hold setting takes precedence over the Min and Max retention settings. Backups that are younger than the legal hold limit are not purged for any reason, including at the expense of new, incoming backups. For legal hold purposes, the age of a backup is only considered to be as old as the latest backup in a set, e.g., the last incremental before a new full. After passing the legal hold limit, the min retention goal and max retention limit settings take over for the purposes of retention. If legal hold is preventing new backups from occurring, a message displays on the Alerts Last 7 Days tab of the Status screen. Information about backups that have been placed on legal hold can be found in the Legal Hold report. See LegalHoldBackups Reportonpage 355 for details.

Max retention limit

Legal hold

Advanced Configuration Options

107

Legalholdexample
Inthefollowingdiagram,abackup(B1)generatedonMarch21st,2013,issetto LegalHoldforfourdays.Therearesubsequentdifferentialsonthe22nd,23rd,and 24thofMarch2013.B1isfourdaysoldonMarch25th,2013,andthereisanew master,B5.However,B1cannotyetbepurgedbecauseitspurgingwouldresultin thepurgingoftheentireG1group,includingdifferentialsB2,B3,andB4,whichare lessthanfourdaysold.Whenthemostrecentbackupinthegroup(B4)isfourdays oldonMarch28th,theentireG1grouprevertstousingminimumandmaximum retentionsettingsandiseligibleforpurging.Anewbackupisaddedtoagroupas soonasitisqueued,soagroupisonlyasoldasitsmostrecentbackup.

Tosetorviewretentiongoalsandlimits Notes:ModifyingaclientsorapplicationsretentionsettingsontheBackup Retentionpageupdatesthesesettingsonanycomputerlevelbackupschedules thathavebeencreatedfortheclientorapplication(s). Tosetretentionforareplicationtarget,switchtoreplicationviewbeforestarting thisprocedure(seeToshowreplicationviewonpage 282). 1 2 SelectSettings>StorageandRetention>BackupRetention. SelecttheUnitrendssystemintheNavigationpanetoseeretentionsettingsforall clientsanddatabases.Ifdesired,selectanindividualNavigationpaneitemtosee onlyitanditssubitemsretentionsettings.

108

Chapter 3

OntheRetentionSettingspane,highlightindividualmachinesorapplicationsand enterthedesirednumberofdaysintheMinRetentionGoal,theMaxRetention Limit,andLegalHoldfields. Ifamachineorapplicationhasatrianglebesideit,expandtosetgoalsandlimits foranyassociateditems.Enteringthegoalandlimitforthemainitemonatree andclickingApplyconfiguresthesamesettingsforallthesubitems.Otherwise, subitemscanbesetindividually. ClickConfirmtosavethechanges.

Aboutsystemnotifications
TheUnitrendssystemsendsthefollowingnotifications:

Alerts,whichdisplayontheStatuspage. Emailnotifications,whicharesenttotheSystemReportMailingListdefined
underSettings>Clients,Networking,andNotifications>EmailRecipients.

Traps,whicharesenttonotifications.unitrends.com.Tosendtrapstoyour
networkmanagementserver,seeTosetupSNMPtrapnotificationsbelow. Foradescriptionofeachconditionthatgeneratesatrap,seeSNMPtrap conditionsonpage 110.Foreachtrap,anemailoralertmayalsobesent,butbe awarethatmanyimportantmessagesaresentasalertsonly.Besuretomonitor alertsfromtheStatuspage.

AboutSNMPtrapnotifications
Thesystemcanbeconfiguredtosendsystemandapplicationspecificalertstoa networkmanagementserverusingtheSNMPprotocol.Thisprovidesnetwork administratorswiththeabilitytoquicklyrespondtohardwareorsoftware conditionsthatrequireaction.Alertsaredeliveredasincomingtrapmessagesto anetworkmanagementapplication.Theadministratorinterfaceremainsthe primaryinterfaceformanagingaUnitrendssystem. Unitrendssystemscomeconfiguredwithadefaultdestinationof notifications.unitrends.com.ThisenablesUnitrendstodelightourcustomerswith proactiveresolutionofproblems,ifandwhentheyarise.Forexample,ifadisk driveonthesystemisfailing,atrapisreceivedbytheSNMPmanagerat notifications.unitrends.com,allowingUnitrendstoproactivelydispatcha warrantyrequestonthefailedcomponent(ifthesupportcontractonthesystem isuptodate).

Advanced Configuration Options

109

ThroughtheuseoftheUnitrendsSNMPagentandMIB,youcanconfigurealerts tobesenttoyourownRemoteMonitoringandManagement(RMM)software. TosetupSNMPtrapnotifications 1 2 3 SelectSettings>Clients,Networking,andNotifications>SNMP. SelectAddEntrytoenterthedestinationaddressoftheSNMPmanager. IntheDestinationfield,enterthehostnameorIPaddressforthetrapdestination. Ifthemanagementserverhostnameisused,itmustberesolvableeitherusingthe hostsfileonthesystemorusingDNS. 4 5 6 7 8 9 ThedefaultCommunityispublic.Editthisentryifnecessary. VerifythatSendtrapstospecifieddestinationischecked. ClickConfirmtoaddthedestination. ClickTesttotriggeratestSNMPtrap. Thetesttrapissenttoalldestinationsthatareenabledonthesystem. Ifdesired,clickHistorytoviewallSNMPtrapsthathavebeentriggeredbythe system. ClickClosetoexit.

SNMPtrapconditions
ThefollowingtablesdescribetheconditionsthattriggertrapsontheUnitrends system,includingtrapdataandtheassociatedObjectID(OID)foreach.The completeOIDforatrapconsistsofaprefixfollowedbyaspecifictrapnumberin thefollowingformat:
<prefix>.0.<trap>

Theprefixbeginswith.1.3.6.1.4.1.21865,whichexpandsto iso.org.dod.internet.private.enterprises.21865intheMIBtree(21865isthe Unitrendsenterprisenumber),followedby1fortheUnitrendsproduct,thena designationtoindicatethetrapgroup(2.100)andfinally,thetrapnumberitself. Trapsaregeneratedfortheconditionsdescribedinthetablebelow.IPMIevents areonlyavailableforphysicalRecovery712orgreatersystems.Inaddition,emails oralertsmaybesentforthesetraps.Beawarethatinformationalemailsoralerts existforwhichnotrapisgenerated.Thesearenotlistedinthetable.

110

Chapter 3

Notethatforeachtrapcondition,therearemultiplemessagesthatmaybesent, dependingontheexceptionencountered.Ifanalertoremailissentforall exceptionswithinthetrapcondition,yesdisplaysinthetable.Ifnoalertoremail issentforanyexceptionwithinthetrapcondition,nodisplaysinthetable.Ifan emailoralertissentforoneormoreexceptionsbutnotallwithinthetrap condition,somedisplaysinthetable.


Trap condition Trap type # 1 Description Alert Email

Clients state has changed PCI state has changed Process state has changed Disk state has changed CEP state has changed System state has changed Backup state has changed Archiving state has changed Version information Network status has changed

enterprises.21865.1.2.100.0.1

yes

some

enterprises.21865.1.2.100.0.3

yes

no

enterprises.21865.1.2.100.0.5

some

some

enterprises.21865.1.2.100.0.6

some

some

enterprises.21865.1.2.100.0.7

yes

no

enterprises.21865.1.2.100.0.8

yes

some

10

enterprises.21865.1.2.100.0.10

some

some

11

enterprises.21865.1.2.100.0.11

yes

no

12

enterprises.21865.1.2.100.0.12

some

no

14

enterprises.21865.1.2.100.0.14

no

no

Advanced Configuration Options

111

Trap condition

Trap type # 15

Description

Alert

Email

Disk health state has changed IPMI Events Test trap

enterprises.21865.1.2.100.0.15

some

no

16 99

enterprises.21865.1.2.100.0.16 enterprises.21865.1.2.100.0.99

no no

yes no

Themembervariables(extrainformationcarriedinthetrap)haveaprefixof enterprises.21865.1.1followedbytheIDofthevariable.Allvariablesaresentwith eachtrap.ThisinformationisusefulwhenconfiguringtheNotificationsManager tofilterthetrapsforadesiredset.Thefollowingtabledescribesthesevariables andtheirvalues.


Variable description Data type Text Object ID

Trap type, a generic description as given in the above table. The object affected, for example the client that is down; the process that is not running; the disk that failed. Message describing the state change in more detail. Severity: 1=fatal, 2=warning, 3=notice Status: 0=clear/close, 1=raise/open Sender Asset Tag: the asset tag from the system that sent the trap Sender License Identity: The asset tag and MAC address from the system that sent the trap

enterprises.21865.1.1.1

Text

enterprises.21865.1.1.2

Text

enterprises.21865.1.1.3

Integer Integer Text

enterprises.21865.1.1.4 enterprises.21865.1.1.5 enterprises.21865.1.1.6

Text

enterprises.21865.1.1.7

112

Chapter 3

Variable description

Data type Text

Object ID

Sender System Identity: The hostname and system ID of the system that sent the trap

enterprises.21865.1.1.8

SNMPagent
Inrelease7.2.0andabove,UnitrendsoffersanSNMPagentthatcanrespondto SNMPgetrequests.Whenupgradingto7.2.0,theagentisdeployedinadisabled state.TheSNMPagentcancurrentlyacceptSNMPgetrequeststomonitorCPU utilization,memoryutilization,networkutilization,diskI/O,diskusage,and variousotherserverperformanceparameters.Unitrendsspecificdataincluding backup,schedule,replication,andconfigurationinformationisalsoavailable, althoughtheUnitrendsinterfaceremainstheprimarymethodofaccessingthis information.ForacompletelistofallSNMPgetrequeststhattheagentresponds to,seeKB1165. TheUnitrendsSNMPagentsupportsSNMPgetswithSNMPversion1,2c,and3. YoucanconfiguretheSNMPV3usernameandpasswordfromthecommandline asfollows:
/usr/bp/bin/cmc_snmpd script user create<snmp_user><snmp_passwd>

ThescriptdefaultstoauthorizationtypeMD5andprivacy/encryptionofDES. ToenabletheUnitrendsSNMPagent 1 DownloadtheUnitrendsMIBbyclickingtheDownloadMIBbuttonandinstallitin yourRMMenvironment.Thefileisalsoavailableathttp://<Unitrendssystem IP>/snmp/. Note:YouwillalsoneedtheNetSNMPMIBs.ThesecomestandardinmostRMM software.Ifyouneedthem,theyareavailableinthesamelocationabove. 2 3 4 5 FromtheUnitrendsinterface,navigatetoSettings>Clients,Networking,and Notifications>SNMP. UndertheSNMPAgentInformationsectionatthetopofthescreen,clickModify Entry. UnderCommunity,enterthecommunitynametouseforthisSNMPnode. CheckEnabled?ifitisnotalreadychecked.
113

Advanced Configuration Options

ClickConfirm. Note:ThiswillopenUDPport161(SNMP)intheUnitrendssystemssoftware firewall.

Aboutencryption
UnitrendsEncryptiontechnologyoffersITadministratorsasolutionforregulatory andcorporaterequirementstoprotecttheiremployersdatafromunauthorized accessandtheft.Alldataremainsencrypteduntilarequestismadetorestorethe data.Ifthecorrectpassphrasesareinplace,recoveryproceedswithout administratorinvolvement. TheUnitrendssolutionoffersandsupports: Encryptionperclient Abilitytochangepassphrases Passphrasemanagementtooltohelpadministratorsavoidlosingpassphrases Replicationofencrypteddata Archivingofencrypteddata PointstoconsiderbeforeturningonEncryption:

Encryptionwilldegradeperformanceslightlyforbackups,replication,and
restores.Itshouldbedoneonlyifyoureallyneedtohideyourdata. Makesuretokeepthepassphrasesecurebecauseifyouforgetthepassphrase thereisnowaytorecoveritorrestoreanypastbackups. Inlegacyvaultingsystems,whenyoutoggleencryptionfromontoofforvice versa,orwhenyouchangethepassphrase,thenextmasterbackupfor encryptedclientswillhavetoreplicatetothetargetsysteminwholewe cannotsendonlythechangedblocksbecausetogglingencryptionand changingthekeymakesalltheblockslookliketheyhavechanged.Thisisnot thecaseinreplicatingsystemssincebackupsaredecryptedbeforebeing scannedforchangedblocks. Toenablesoftwareencryption,thesystemsoftwarelicensefeaturestringmust includeENC.CheckthelicensefeaturestringbynavigatingtoSettings> System,Updates,andLicensing>License. Onceencryptionhasbeenenabledandconfiguredforaclient,thatclients subsequentbackupsareencrypted.Anybackupsstoredonthesystempriorto configuringencryptionremainunencrypted,asencryptionisdoneduringthe backupprocess.

114

Chapter 3

Toconfigureencryption 1 2 SelectSettings>SystemMonitoring>Encryption. EnterapassphraseinthePassphraseandVerifyPassphrasefields,andclick Confirm. Thepassphrasecanbeaword,numbers,asentence,oracombinationofall.Once youcreateapassphraseyouareloggedin.Thisauthenticatestheuser. Thepassphraseissavedinamasterkeyfile.Allthepassphrasesyousetarestored inthemasterkeyfileinencryptedformat.AnytimeyourestarttheEncryption Manager,youareaskedtoprovidethispassphrase. 3 Tostarttheencryptionprocess,changetheEncryptionStatetoOn.Therearetwo optionsforenablingtheEncryptionManager,On(willbeoffafterreboot)orOn (willbeturnedonagainafterreboot). Note:Afterareboot(ifnotsettoturnonautomatically)orafteraDisaster Recovery,allbackupsandrestoresofclientssetforencryptionwillfailuntilyou restarttheEncryptionManagerandloginagain. 4 BurnthemasterkeyfiletoaCDbydoingoneofthefollowing: systemsbaremetalsshare.Mapthesystemsbaremetalssharetoa workstationthathasaCDburnerandburnthecrypt_image.isokeyfiletoaCD. (Fordetails,seeTomapthesystembaremetalsshareonpage 117.)Ifyou havetroublewritingtotheCD,savethekeyfiletoalocalshareonthe workstationandtryagain. ForotherRecoverySeriessystems,clickBackup,insertaCDintotheRecovery Seriessystem,thenclickOkaytowritethekeyfiletotheCD. OncethemasterkeyfilehasbeencopiedovertoCD,makesuretokeeptheCDin asafeplace.TheCDmayberequiredincaseofasystemfailuretorestorethe masterkeyfile. Note:Themasterkeyisincludedaspartoftheappliancestatebackupforsystems runningversion7.0.0orlater,oraspartofthesystemstateonsystemsrunning olderversions.Thisinformationisincludedwithanyreplicationorlegacyvaulting operation,andiscopiedtoanarchivedevicewithanyarchiveoperation. 6 ProceedtoToconfigurebackupsforencryptiononpage 116toenable encryptionforeachclient.(Thisstepmaynotbenecessaryifconfiguring encryptiononareplicationtargetsystem.)

ForUEBandRecovery943systems,clickBackuptosavethepassphrasetothe

Advanced Configuration Options

115

Toconfigurebackupsforencryption OncetheEncryptiondaemonhasbeenstarted,turnonencryptionforeachclient whosebackupsshouldbeencrypted.Notethatencryptionisdoneduringthe backup.Onceencryptionisconfiguredforaclient,itssubsequentbackupsare encrypted.Anyexistingbackupsfortheclientremainunencrypted. 1 2 3 SelectSettings>Clients,Networking,andNotifications>Clients. SelecttheclientwhosebackupsyouwanttoencryptandchecktheAllbackups performedonthiscomputeraretobeencryptedbox. ClickSetuptosavetheclientsettings. Onceturnedonforaclient,allsubsequentbackupstoaD2Ddeviceareencrypted. (Anyexistingbackupsremainunencrypted.)Thisappliestoall: Masterbackups Differentialbackups Incrementalbackups Selectivebackups MicrosoftSQLdatabasebackups MicrosoftExchangeInformationStorebackups Baremetalbackups HyperVbackups VMwarebackups Localdirectoriesonthesystem Ifyouenableencryptiononaclientbeforeenablingencryptiononthesystem,you willreceiveanerrormessage.IftheEncryptionManagerisnotsatisfiedwitha successfulmasterpassphrase,anysubsequentbackupsorrestoresfail. Tomodifyencryptionsettings 1 2 3 SelectSettings>SystemMonitoring>Encryption. Ifdesired,modifytheEncryptionStatebyselectinganoption. Tochangethepassphrase,clickChangeandYestoconfirm. Warning:IftheEncryptionManagerisrunning(backups,restores,orreplication jobsareinprogress),waitforthosetaskstocompletebeforechangingthe passphrase.Ifreplicating,changingthepassphrasecanuseatremendousamount ofbandwidth.Planyourpassphrasechangecarefully. 4 EnterthepassphraseintheCurrentPassphrasefield,andthenewphraseinthe NewPassphraseandVerifyPassphrasefields,thenclickConfirm.

116

Chapter 3

Todeterminewhetherabackupisencrypted 1 2 ViewbackupdetailsasdescribedinToviewbackupdetailsonpage 176. OntheBackupInformationpage,checktheEncryptioncategory.Yesisencrypted, Noisnotencrypted. TorestorethemasterkeyfromCD TorestorethemasterkeyfilefromtheCD,youwillneedtoinserttheCDintheCD ROMdriveandcopythemasterkeyfile(cryptoDaemonMasterKeys)to /var/lib/misc.AtthispointonlybackupsuptothetimethattheCDwascreated canberestored.Note,thecurrentpassphraseisNOTstoredontheoffpremise systemorthearchivedrives.Youarerequiredtoenterthecurrentpassphrasein theadministratorsinterfacetounlockthekeys. Tomapthesystembaremetalsshare 1 2 3 FromaWindowsworkstation,launchExplorer. RightclickComputerandselectMapNetworkDrive. IntheFolderfield,enterthesystemsIPaddressandbaremetalsshare,thenclick Finish.Forexample,tomapIP192.168.220.99,enter: \\192.168.220.99\baremetals. Thesystemsbaremetalsshareismappedtoyourworkstation.Clicktheshareto viewthecrypt_image.isofile.

Archivingwithencryption
IfyouhaveconfiguredyourarchivescheduleorArchiveNowjobforencryption, databeingarchivedfromthesystemtothetapeordiskwillbeinanencrypted format.Themasterkeyfileisarchivedasapartofthestate.Duringanarchive restore,oncethemasterkeyisrestoredthedatacanbesuccessfullyrestoredto thesystemintheencryptedstateaslongasthepassphrasesetatthetimeof archiveisused.Formoredetails,seetheArchivingchapter.

Encryptionlimitations
EncryptionisnotsupportedonSmallFormFactors(SFF). Ifthepassphraseisforgotten,thereisnowaytoretrieveit.Therewillbenoway torestoreanencryptedbackupinsuchacase. Noencryptionordecryptionisperformedontheclient.
Advanced Configuration Options

117

Noencryptionordecryptionisperformedonalegacyvaultsystem.(Replicated backupsareencryptedonthetargetsystemusingthetargetsencryptionkey.) Thefollowingtypesofbackupsarenotencrypted:

LegacyMSExchangeInformationStorebackups CEPbricklevelbackups AnydatastoredonthesystemviasambaorNFS

Aboutsecuritylevels
Bydefault,thesecuritylevelonthesystemissettoNoSecurity.Thisallowsall portstoremainopen.Theadministratorcanchoosethelevelofsecuritydesired onaparticularsystem.SecuritylevelscanbesetbyselectingSettings>Clients, Networking,andNotifications>Portsandarecategorizedas:

NoSecurity LowSecurity MediumSecurity HighSecurity

Toaccessthesystemusingmediumsecurity Whenusingmediumsecurity,accesstheadministratorinterfacebyentering https://<System_IP_Address>/recoveryconsole/asthebrowseraddress. Accesscontextsensitivehelpbydirectingthebrowserto https://<System_IP_Address>/recoveryconsole/help/main_menu.html. Answeryestoanywarningmessagesreceived. Toaccessthesystemusinghighsecurity Whenhighsecurityisenabled,thesystemcanonlybeaccessedusingaKVMor directlyattachedmonitor,keyboard,andmouseforphysicalsystems,orfromthe VMconsoleforvirtualsystems.Youhaveaccesstothesystemconsoleonly.There isnowaytoaccesstheadministratorinterfacetoviewfunctions(suchasbackups, archives,replication)ormakechangestoanysystemsettings.

118

Chapter 3

Todisablehighsecurity 1 Connecttothesystemconsole.

Forphysicalsystems,connectusingaKVMordirectlyattachedmonitor,
keyboard,andmouse. ForUnitrendsEnterpriseBackupforHyperV,launchHyperVManager,select theUnitrendsVM,andclickConnect. ForUnitrendsEnterpriseBackupforVMware,connecttotheUnitrendsVM usingtheVMwarevSphereClient,VMwarePlayer,orVMwareWorkstation. IntheConsoleInterface,enter3inthePlease enter choicefield. OntheFirewallSecurityLevelscreen,enter1,2,or3inthePlease enter choicefieldtochangesecurityleveltoNone,Low,orMedium.

2 3

Openportsandsecuritylevels
Theportsopenforeachsecuritylevelarelistedinthetablebelow.Additionally,in theGeneralConfigurationsectionoftheSettingsinterface(Settings>System, Updates,andLicensing>GeneralConfiguration),thereisafieldnamed dataport_count.ThisfieldrepresentsthenumberofTCPportsallowedtobe openedfordatatransfer.Thisvalueincludesthecontrolvalueandfouradditional portstodeterminetheactualportnumbersfromwhichtoselect.Whenanylevel ofsecurityisenabled,thecontrolvalueis1745.Thedefaultnumberofadditional portsaddedto1745isfour.Whenconfiguringafirewall,(usingasecuritysetting andadataportcountoffive)ports1745through1749shouldbeopenedbetween thesystemandtheclientsthesystemprotects. Note:Port1mustbeopenduringtheinitialconfigurationofreplicationorlegacy vaulting.Ports1743,1745and5432arerequiredformanagingthesystemfrom thereplicationtargetorvault.Selectthemediumsettingifusingsecuritylock down.Theseportsmustbeopeninthefirewallformanagementofthesystem fromthereplicationtargetorvault.
Security level LOW 1 Replication or legacy vaulting setup Secure shell Ports open Usage

22

Advanced Configuration Options

119

Security level

Ports open 80 139 273 443 445 873 888 1194 1743 1744 1745 1746 1747 1748 1749 2049 4970 5432 5801

Usage HTTP web access Samba share Secure tunnel Secure HTTP web access CIFS Rsync 3ware web access OpenVPN Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Network file system Postgres database access Postgres database access VNC (Java) access

120

Chapter 3

Security level

Ports open 5900 5902 6001

Usage VNC access VNC access VNC HTTP web access

MEDIUM 1 Replication or legacy vaulting setup Secure shell Samba share Secure HTTP web access CIFS OpenVPN Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Postgres database access Postgres database access iSCSI

22 139 443 445 1194 1743 1745 1746 1747 1748 1749 4970 5432 3260

Advanced Configuration Options

121

Security level HIGH

Ports open

Usage

1743 1745 1746 1747 1748 1749

Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon Extended Internet daemon

Aboutdeviceconfiguration
Devicesarethetargetlocationsfordatareceivedfromtheprotectedservers, workstations,andvirtualenvironments.Bydefault,systemsareconfiguredwitha singleD2DdevicelabeledD2DBackups.D2DBackupsisconfiguredtothe maximumbackupstorageofthesystem,basedontheidentityofthesystemand thedistributionofbackupstoragetoinstantrecoveryandlegacyvaulting(see Storageallocationanddistributiononpage 104fordetails). ForUEBsystems,D2DBackupsisdeployedwith138GBofstoragespace.Add backupstorageasdescribedinAddingbackupstorageonpage 94priorto addingadevice. WhilestorageinD2DBackupsisadequateinmanycases,youcanchangethe amountofspaceallocatedtothisdevice.Aswell,additionalD2Ddevicesmaybe addedtohelpbetterorganizebackups.TheoriginalD2DBackupsstorageis logicallydividedintomultipledevices.Forphysicalsystems,thetotalamountof spaceallocatedtoalldevicescombinedmustbewithinthesystemlicenselimits. SomereasonsforcreatingadditionalD2Ddevicesinclude:


122
Chapter 3

Separatingbaremetalbackupsfromfilelevelbackups Keepingapplicationbackupsorganizedtogetherinaseparatearea Organizingserversbasedontheirsizes Separatingserverswithdifferentretentionperiodrequirements

Placingoneclientonaseparatedevicesoitwillrunathighestpriority(notbe
queuedbehindotherjobsononedevice)

Separatingsourcesystemsonreplicationtargets.Thereareadditional
requirementsandconsiderationswhenassociatingadevicetoareplication source.Fordetails,seeAddalogicaldevicetoassociatewithasourcesystem onpage 253. Thoughaddingdevicescanprovidealeveloforganization,italsoaddsalevelof complexity.Iftoomanydevicesexist,balancingspaceallocationbetweenthe devicescanleadtopurgingissuesandotherproblems. Toaddadevice 1 2 3 SelectSettings>StorageandRetention>BackupDevices. ClickAddDevice. EnteranameforthenewdeviceintheDeviceNamefield. Thisisthenamethatwillbeusedwheneverthedeviceisselected.Devicenames mustbeuniqueandmustnotcontainspaces. 4 EntertheamountofdatathatcanbestoredonthenewdeviceintheCapacity field. Notes: Ifthedevicewillbeusedtostorereplicatedbackupsforanassociatedsource system,itscapacitymustbeatleast128GB. Ifyouhaveaphysicalappliance,allavailablestorageisallocatedtothedefault D2DBackupsdevice.Tosplitthisstorageintomultipledevices,youmustfirst decreasetheD2DBackupscapacity(seeTomodifyadevicebelow).Ifyoualready havebackupsonthesystem,proceedwithextremecaution.Decreasing D2DBackupscapacitymaycauseexistingbackupstobepurged. TheCapacityfieldgovernstheamountofdatathatcanbestoredonthedevice. Thesystemassuresthatthedataonthedevicedoesnotexceedthecapacitylimit. IfthecapacitychosenexceedsthesystemlicenseORifthereisnotenoughspace onthefilesystemtoaccommodatetheallocation,anerrormessageisdelivered indicatingtheneedtoadjustthecapacitylimit.OptionsforCapacitysettingsare:

StandardSizeUsethistoselectfromalistofvalues.Clickthedownarrownext
tothedevicesizeandselectthedesiredcapacity. CustomSizeIfthedesiredsizeofthedeviceisnotpopulatedinthestandard sizelist,selectthisoptiontospecifyacapacity. EnterabriefdescriptionforthedeviceintheDescriptionfield.

Advanced Configuration Options

123

IntheMaxConcurrentBackupsfield,enterthenumberofbackupsthatcanbe runsimultaneouslyonthesystem. Thedefaultvalueisthree.Therecommendedrangeisthreetoten,dependingon networkthroughput,thenumberofdevicesdefined,andtheresourcesofthe system.

Checktheseboxesasapplicable: written. Defaultboxtomakethisthedefaultdevice.Thedefaultdeviceisusedifno otherdeviceisspecified. SelectStorageboxtoselectexternalstorageforvirtualsystems.Deduplication maybeenabledonexternaldevicesusingthisfeature. Note:ThePathnamedisplaysthelocationonthesystemwherethebackupsare stored.Thisfieldcannotbeedited.

Onlineboxtoindicatethatthedeviceisonlineandreadyforbackupstobe

ClickConfirmtoaddthedevice. Tomodifyadevice Becarefulwhendecreasingthesizeofadeviceasthismaycausedatatobe purged.

1 2 3 4

SelectSettings>StorageandRetention>BackupDevices. Selectthedesireddevice. Modifysettingsasdesired.Fordetails,seeToaddadeviceabove. ClickConfirmtosavethechanges. Notes: Forreplicationdevices,capacitymustbeatleast128GB.Decreasingthesizeto lessthan128GBisnotsupported. Ifyouhaveaphysicalappliance,allavailablestorageisallocatedtothedefault D2DBackupsdevice.Tosplitthisstorageintomultipledevices,youmustfirst decreasetheD2DBackupscapacity.Ifyoualreadyhavebackupsonthesystem, proceedwithextremecaution.DecreasingD2DBackupscapacitymaycause existingbackupstobepurged.

124

Chapter 3

Todeleteadevice Caution:Onceadeviceisdeleted,anybackupsstoredonthatdevicearenolonger accessible.Thespaceoccupiedonthesystemmaynotbeimmediatelyavailable afterabackupisdeleted.Beforedataisremoved,anyreferenceddeduplicated dataismigratedtootherdevicesbeforethedeleteoperationcancomplete. 1 2 3 SelectSettings>StorageandRetention>BackupDevices. Selectthedesireddevice. ClickDeleteDevice. Note:Forreplicatingsystems,youcannotdeleteadevicethatisassociatedtoa sourcesystem.Youmustremovetheassociationbeforethedevicecanbedeleted. GotoReplication>SystemManagement,selectthesource,unchecktheSelect DeviceifReplicatingSourcebox,andclickConfirm.

AbouttheNTFSchangejournal
Today,customerswithlargenumbersoffiles(typicallyinthemillions)can experienceverylongIncrementalbackuptimes.Twofactorscontributingtothe delayedbackuptimesinclude:

Factor1TheWindowsagentscansallfiles/directoriesonthespecified
volumestodeterminemodificationtimes.Fileswithmodificationtimesmore recentthanthelastsuccessfulmasterareincludedintheincrementalbackup. Factor2TheWindowsagentalsolooksatthearchivepropertyoneachfile whosemodificationtimedoesnotmeetcriteria#1.Ifthepropertyisset,then thefileisincludedinthebackup. Factor1accountsforalargepercentageofthetimespentperformingthebackup, whilefactor2contributesmoreprocessingoverheadfromthemechanicsof examiningthefileproperties.Inaddition,factor2helpstoinflatethesizeofthe backupbyincludingfilesthatdonotmeetthemodificationcriteria.Additionally, fileswiththearchivepropertysetshouldnotautomaticallybeincludedin incrementalbackups. Useofthechangejournalcaneliminatemuchoftheoverheadcontributedby thesefactors.Thechangejournalisarecordofallchangestoanyfile(s)onagiven volume.Whenachangejournaliscreated,Windowsbeginstologchanges immediatelytothatjournalwithoutrequiringarebootoftheserver.Windows logsallfilechangesonagivenvolumealongwiththenatureandtimeofthe change.

Advanced Configuration Options

125

Duringanincrementalbackup,theUnitrendsagentqueriesthechangejournalto discoverthechangesmadetofilesonthevolume.Itqueriesthedataloggedfor eachchangetodetermineifthetimeofthechangequalifiesthedataforbackup. Thisisdonebycomparingthemodifieddatatothetimeofthelastsuccessful masterbackup.Sincejournalrecordsarekeptonlyforchangestofilesor directories,determiningwhichfilestobackuponavolumerequiresjustafraction ofthetimeneededforthetraditionalvolumescan.Asthenumberoffilesona volumeincreases,thebenefitofusingthechangejournalalsoincreases. Thechangejournalfeatureistransparent.Therearenovisibleconfigurationor settingoptionsonthebackupsystemoronUnitrendslocalagentinterface.By default,theagentpreferstousethechangejournalduringincrementalbackups. Ifthejournalcannotbeused,theagentusesthevolumescanningmethodto producethelistoffilestobackup.

Changejournaloperationformasterbackup
WhenamasterbackupisperformedontheUnitrendsagent,thesystemis scannedforanexistingchangejournaloneachvolume.Ifachangejournaldoes notexistonavolume,theagentcreatesone.Ifajournaldoesexist,theagent insuresthatthesizeofthejournalmeetstheminimumsizerequiredbyenlarging thejournalifnecessary.Theminimumsizerequiredforachangejournalis500MB. Afterthejournalcreation/discoveryiscomplete,theagentregisterseach journalbycreatingentriesinthesystemsregistry.Subsequentincremental backupsquerytheseentries.Theregistryentriesexistoutsideofthecurrent Unitrendsregistryentriestoinsurethattheyarenotremovedfollowingagent softwareupdatesorsoftwareremoval.Theagentrecordsaregistryentryforeach volumecontainingachangejournal.Theregistryentrycontainsthefollowing:

auniqueIDgiventothechangejournal thesequentialnumberofthefirstentryinthejournal

Changejournaloperationforincrementalbackup
Whenanincrementalbackupisperformed,thesystemisscannedforanexisting changejournaloneachvolumethatitintendstobackup.Ifajournalexists,the agentqueriestheregistryforthejournalsIDandstartingsequencenumber.This informationwillhavebeenenteredtherebyapreviousmasterbackup.Ifthe entriesexist,thentheagentperformsthefollowingchecks:

126

Chapter 3

AchecktodetermineifthejournalIDintheregistrymatchestheIDofthe
volumescurrentjournal.IftheIDsdonotmatch,thisindicatesthatthejournal thatexistedduringthemasterbackupwasdeletedandthatanewjournalwas created. Achecktodetermineifthestartingsequencenumberintheregistrymatches thatofthevolumescurrentjournal.Ifthesenumbersdonomatch,this indicatesthatthejournalwasfilledtocapacitywithentriesandhaswrapped aroundtothebeginning.Inthiscase,therewillbefilemodificationsthatwere madetothevolumethatarenotrecordedinthejournal. Ifboththesecheckssucceed,thentheagentusesthechangejournaltodetermine whichfilestoincludeinthebackup.Ifoneofthesechecksfails,theagentdoesnot usethejournalandrevertstothevolumescanningmethod.Inthiscase,theagent includessomeinformationinthebackupoutputtowarntheuserthatanew masterbackupmustbecompletedinordertousethejournalforsubsequent incrementalbackups.

Configuringthechangejournal
Ifuseofthechangejournalisnotdesired,itcanbedisabledbymodifyingthe followingentryintheagentsmaster.inifile.
UseChangeJournal=False

TheminimumchangejournalsizemaintainedbytheUnitrendsagentis500MB. Thissizeisconfigurablebyaddinganentryintotheagentsmaster.inifile.Thesize shouldbeindicatedinMB.


ChangeJournalSizeMB=500

Thesizeofthechangejournalcanbeenlargedbycreatingtheaboveentryand settingthevaluetoanumberlargerthan500. Caution:TheMicrosoftbestpracticesforuseofchangejournalrecommendsthat, oncecreated,thechangejournalsizeshouldnotbereduced;norshouldthe changejournalbedeleted.Likewise,theUnitrendsagentcannotguarantee successfulbackupandrestoreoperationsinanenvironmentwherethesizeofthe changejournalhasbeenreduced.Pleaseunderstandthatreducingthesizeofthe changejournalmayresultincorruptbackupoperations,possiblycausingfailureto restore. Eachtimethatamasterbackupcompletes,thechangejournalforeachvolumeis inspectedandenlargedifthesizeindicatedinthemaster.inifileislargerthanthe sizeoftheactualjournal.

Advanced Configuration Options

127

Thechangejournalwrapconditioncausesadelayinthetimeittakesfor incrementalbackupstocomplete.Ifincrementalbackupsbegintotakelonger thanexpected,thismaybearesultofthechangejournalwrapcondition.When backingupserversthatareconfiguredasdomaincontrollers,thechangejournal wrapconditionmayoccurmorefrequently.Thechangejournalwrapconditionis notanerrorandwillnotinterferewithcapturingasuccessfulbackup.Intheevent thatthechangejournalwrapconditionoccurs,expecttoseethefollowing messageinthebackupsummaryforthespecificbackupoperation: ChangejournalforvolumeC:appearstohavewrappedsincethelastmaster backupandwillnotbeusedforthisbackup. Thisisnotanerrorconditionanddoesnotinterferewiththebackup. Ifthisserverisadomaincontroller,thenthisconditionisexpectedtooccurmore frequently.Toenableuseofthechangejournalforthenextincrementalbackup, performamasterbackuptoresynchronizewiththejournal.Ifthechangejournal wrapconditionoccurstoofrequently,youmustenlargethecurrentjournalsize,as describedbelow.

Changejournalconfigurablefiletypes
Thechangejournalcontainsrecordsofchangestofilesonaparticularvolume. Therearetwotypesofdatachangesthatdonotmodifyfilecontentbutare trackedbythejournal:

AuxiliaryDataChangeAnoperationaddsaprivatedatastreamtoafileor
directory.Anexamplemightbeavirusdetectoraddingchecksuminformation. Asthevirusdetectormodifiestheitem,thesystemgenerateschangejournal records.Thistypeoffilechangeindicatesthatthemodificationsdidnotchange theapplicationdata. BasicInformationChangeAuserhaschangedoneormorefileordirectory attributes(i.e.readonly,hidden,system,archive,orsparse),oroneormore timestamps. WhentheagentencountersanAuxiliaryDataChangerecord,thedefault behavioristoignoreitandnotincludethefileinthebackup. WhentheagentencountersaBasicInformationChangerecord,thedefault behavioristoincludethemodifiedfileinthebackup. Inbothcases,ifthedefaultbehaviorisnotthedesiredbehavior,modifythe master.inifiletooverridetheexistingsettings:

128

Chapter 3

ChgJournalBackupAuxChg=1 AddingthisentryforcestheagenttoincludefilesinthebackupwhenanAuxiliary DataChangeisfound. ChgJournalBackupPropChg=0 Addingthisentryforcestheagenttoignorefileswhoseonlychangewasa propertychange.

Changejournalpervolume
Changejournalsarecreatedandmanagedonavolumebyvolumebasis.Ifa systemcontainsmultiplevolumesandasubsetofthevolumescannotsupportuse ofthechangejournal,thevolumesarebackedupusingthevolumescanning method.Volumesthatsupportchangejournalarebackedupusingthechange journal.

Changejournalsandremotemounts
ChangejournalscanbecreatedandaccessedonlocalNTFSvolumesonly.IfNTFS filesystemsaremountedfromremoteservers,theincrementalbackupsthat includethemountedvolumesdonotusethechangejournalforthosevolumes. Forexample: FileServerServerAsharesDirectoryAforanyonetomount. WorkstationUserAmapsDirectoryAasalocaldriveandthenadds/changefiles. IfanincrementalbackupofServerAisperformed:UserAchangesto DirectoryAwillbeseenandbackedupusingthechangejournal. IfanincrementalbackupofUserAisperformedusingthechangejournal:UserA changestoDirectoryAwillnotbebackedupusingthechangejournal.

Advanced Configuration Options

129

130

Chapter 3

Chapter4 Backups
Thischapterdescribestheproceduresusedtoperformfilelevelbackupsof protectedclients,andhotbaremetalbackupsofWindowsclients.Clientsmustbe registeredtothebackupsystembeforerunningtheseprocedures.SeeAbout addingclientsonpage 61fordetails. Seethefollowingtopicsfordetails:

Filelevelbackuptypesonpage 132 Filelevelbackupstrategiesonpage 138 Aboutexecutingbackupsonpage 139 WorkingwiththeComputerbackupsubsystemonpage 139 WorkingwiththeEnterprisebackupsubsystemonpage 146 ProtectingNASdevicesonpage 172 Workingwithclientaliasesonpage 172 Viewingbackupsonpage 175 Monitoringrunningjobsonpage 182 Standardrestoreproceduresonpage 184 WorkingwiththeBackupBrowseronpage 185

Foradditionalconsiderationsabouttheclientyouareprotecting,seethe followingchapters:

ProtectingWindowsEnvironments ProtectingVMwareInfrastructure ProtectingHyperVEnvironments Linuxprotectiononpage 649

131

Forbackupofapplicationdata,seethefollowingchapters:

MicrosoftSQLServerProtection MicrosoftExchangeServerProtection OracleProtection MicrosoftSharePointProtection

Filelevelbackuptypes
ThefollowingtypesoffilelevelbackupcanbeperformedwiththeUnitrends system:
Backup Type Master backup Description Captures all data on the selected client. You have the option to exclude unwanted files (all systems) or include specified files (Windows only). Captures all new or modified files on the client since the date and time of the last successful master backup. You have the option to exclude unwanted files (all systems) or include specified files (Windows only). Any selection lists must match those applied to the previous master backup. Checks the protected system in specified intervals of time and backs up only those files that have changed since the last successful backup (of any type). Any selection lists must match those applied to the previous master backup. Used to back up selected volumes, directories and/or files on a client. You can include specified files, using wildcards if needed.

Differential backup

Incremental backup

Selective backup

132

Chapter 4

Backup Type Bare Metal backup

Description For Windows clients only, used to capture the boot volume (C: drive) allowing for rapid recovery in the event of a system or drive failure. For non-Windows clients, see the Bare MetalProtectionOverview chapter. You cannot use exclude or include lists with Bare Metal backups.

Note: Bare metal backups are not file-level. They create a


block-level image of the C: to be used (along with a boot CD) to recover the client in the event that it cannot boot. Because Windows hot bare metals are executed and scheduled using the same interfaces as file-level backups, they are included in this chapter.

Usingselectionlists
Selectionlistsdefineitemstoincludeorexcludefromthebackup.

Ifneitherinclusionsorexclusionsarespecified,aMasterbackupincludesall
clientfiles.

Whencreatingaschedule,thesameselectionlistsareappliedtoallscheduled
backupsautomatically. ItisimportantthatyoursubsequentIncrementalorDifferentialbackupsuse thesameselectionlistssothatdataacrossallbackupsinthegroupisconsistent throughout.Whencreatingaschedule,thesamelistsareappliedtoall scheduledbackupsautomatically.

UsingEnterpriselevelselectionlists
Youcancreateanincludeorexcludeselectionlisttoapplytoanindividualclient oragroupofclients.SeeAboutEnterpriseselectionlistsonpage 152.

Usingclientlevelselectionlists
WhenrunningonetimeorscheduledbackupsintheComputerbackupsubsystem attheclientlevel,youcanapplyselectionliststoexplicitlyexcludeorincludefiles.

Youcanconfigurethecontentoffilelevelbackups(Master,Differential,and
Incremental)byspecifyingeitheranexcludelist(allclients),anincludelist (Windows,agent7.2only),oracombinationofboth(Windows,agent7.2 only).
133

Backups

YoucanspecifyanexcludelistforMaster,Differential,andIncrementalbackup
typesforallsystems,usingwildcardsifnecessary.

YoucanspecifyanincludelistforMaster,Differential,andIncrementalbackup
typesforWindowsonly.Wildcardsarenotsupported.Boththebackupsystem andtheWindowsagentmustbeversion7.2. UseanincludelistforSelectivebackuptypes,usingwildcardsifnecessary. SelectionlistsdonotapplytoBareMetalbackups. Thefollowingtablespecifieswhenyoucanuseanincludeoranexcludeatthe clientlevel.
Backup Type Includes? Notes about Includes Excludes? Notes about Excludes For all clients. Wildcards okay.

MasterBackup

Sometimes

ForWindows, agent7.2only. Wildcardsnot supported. ForWindows, agent7.2only. Wildcardsnot supported. ForWindows, agent7.2only. Wildcardsnot supported.
Required. Wildcards okay. N/A

YES

Differential Backup

Sometimes

YES

For all clients. Wildcards okay.

Incremental Backup

Sometimes

YES

For all clients. Wildcards okay.

SelectiveBackup BareMetal Backup

YES

NO

N/A

NO

NO

N/A

134

Chapter 4

Thefollowinggraphicsprovideexamplesofafullbackupwithanexclusionlistand aselectivebackup(withtherequiredinclusionlist). Fullbackupwithexclusionlist

Forselectivebackupsonly

Backups

135

Whentouseaselectionlist
Useaselectionlisttoexplicitlyomitfilesfromorincludefilesinthebackup.Here areexampleusesforselectionlists:
Selection list type Exclude list - any client Example uses Create a one-time or scheduled master, differential, or incremental backup. Example uses:

If legal or audit requirements specify a monthly backup for


all files and folders except for process documents, set up a master backup to run monthly that excludes process documents. If company processes require master backups for all files except for training documentation and videos, create a master backup that excludes the folders and files of those types from the training department.

Include list - any client

Create a one-time or scheduled selective backup. Backup contains only files that meet inclusion criteria. Does not impact backup group chain, since selections are stand-alone and not part of a group. Example uses:

Include only certain volumes or paths that have important

data and do not need to run subsequent incremental or differential backups that contain only changes. Backup only a few files or a certain type of file during a single instance. For example, your Finance department is changing spreadsheets for a quarterly audit and would like to back up those spreadsheets.

136

Chapter 4

Selection list type Include list Windows client

Example uses Create a one-time or scheduled master, differential, or incremental backup. Backup contains only files that meet inclusion criteria. Run a new master upon creating or modifying an inclusion list for the client. Example uses:

Prevent accidental inclusion of unwanted external

Include list/Exclude list combination Windows client

volumes. For example, if someone adds a USB drive or maps an external file system, this is included in subsequent file-level backups. Include only certain volumes or paths that have important data without losing the ability to capture only changes in subsequent incremental or differential or backups. Using a selective backup would not allow for incrementals and differentials of included data. Configuring the list of what to include is easier than specifying what to exclude from a backup.

Create a one-time or scheduled backup using an include list to select files to include, then select the files to exclude.

For master, differential, or incremental backups for

Windows, agent 7.2 only. You can select includes, then excludes at the Enterprise or client level. For the selective backup type, you can select includes, then excludes at the Enterprise level. Example uses:

Include a training folder that contains training videos, then


exclude all Word and PowerPoint files within the folder. For example, the training department is updating all of their training videos due to standards changes, and they want to back up all of their video related files except for companion Word and PowerPoint documents. Include a particular volume, then exclude a folder within that file. For example, you want to back up your C:\ drive, but you want to exclude the C:\Status Reports folder.

Backups

137

Filelevelbackupstrategies
Unitrendsrecommendsusinganincrementalforeverstrategyforfilelevel backups.Withthisstrategy,amasterisrunonetime,followedbyincrementals thereafteratthefrequencythatbestsuitsyourenvironment.Thesystemthen synthesizesmastersanddifferentialslocallyfromtheincrementalstoensurequick restores.Thesesyntheticbackupsarealsousedforarchivingandlegacyvaulting, asincrementalbackupsdonotarchiveorvaultdirectly.Formoreinformationon syntheticbackups,seeKB980. IncrementalforeverissupportedonUnitrendsEnterpriseBackupvirtualsystemas wellastheRecovery212andlaterphysicalsystem.AnyWindowsXPorlater, VMwareESXorESXi4.0orlater,HyperV2008R2orlater,orLinuxsystemmayuse theincrementalforeverbackupstrategy.Tousetheincrementalforeverstrategy, itisrecommendedthatthebackupsystembeonthelatestrelease. Unitrendssupportsavarietyofotherstrategyoptions,describedhere:
Objective Your tolerance for data loss is measured in a day or more Strategy Use incremental forever or a weekly master backup with daily differential backups. Use incremental forever or a weekly master backup with daily differential and hourly incremental backups. Use incremental forever or a weekly master backup with daily differential backups. If system resources are taxed and you would like to control when a master backup runs, use a weekly master backup with daily differential and/or incremental backups. Keep in mind that synthetic backups are system-side only and do not impact the client or networks.

Your tolerance for data loss is measured in minutes or hours

Your backups need to complete within a few hours during the week but can run continuously on the weekend You need to control when master backups run

138

Chapter 4

Aboutexecutingbackups
Backupscanberunimmediatelyorscheduledtorunatspecifiedintervalsfrom eithertheComputerbackupsubsystemortheEnterprisebackupsubsystem.Use theComputerBackupsubsystemifyouarenewtoUnitrendsorwishtoexecute thebackupveryquicklywithlittlesetupconfiguration.UsetheEnterprisebackup subsystemtoutilizemoreadvancedfeatures,suchasoptionlists,selectionlists, andcalendars,andtoquicklyaddmultipleclientstoaschedule. Protectedclientsmustbeonlineandnetworkcommunicationsbetweenthe clientsandthebackupsystemmustbeoperationalforbackupstorun.

Maximumfilepathnamelengths
ForsomeUnitrendsagents,thereisamaximumfilepathnamesizelimitation.File pathnamesthatexceedthislimitarenotincludedinthebackup.Agentsaffected bythisrestrictionandsupportedmaximumfilepathnamelengthsarenotedinthe followingtable.
Unitrends agent Windows Linux Solaris Mac OS X Maximum file pathname length 32 KB 4 KB 1 KB 1 KB

WorkingwiththeComputerbackupsubsystem
UsetheComputerBackupsubsystemtorunonetimebackupsorcreatebackup schedulesforaclientcomputer. Note:Theseproceduresareforfilelevelbackupsonly.Toprotectanapplication (suchasSQL)oravirtualmachine,seetheapplicablechapterinthis AdministratorsGuide.

Backups

139

Thefollowingtasksaredescribedinthissection: Torunaonetimebackup Tocreateabackupschedule Toviewormodifyaschedule Todeleteaschedule Formoreinformationaboutselectionlists,seetheUsingselectionlistssection. Thisincludesinformationaboutincludesandexcludesattheclientlevel. Torunaonetimebackup Note:Usethisproceduretobackuponeclient.Torunanondemandbackupofall clientsonaschedule,seeToexecuteanEnterprisebackupscheduleimmediately onpage 170. 1 2 SelectthedesiredclientintheNavigationpaneandclickBackup. Onthe1TimeBackuptab,choosebackuptypeFull,Differential,Incremental, Selective,orBareMetal.SeeFilelevelbackuptypesonpage 132formore information. IntheSelectItemsarea,selecttobackuponeofthefollowing:

Allvolumes(Protectallvolumes) Selectedvolumes(Specifyselectedvolumesandfiles)
4 Ifyouopttobackupselectedvolumesandfiles,seeoneofthefollowing:

TospecifyincludesforMaster,Differential,andIncrementalbackupson
page 143 TospecifyincludesfortheSelectivebackuptypeonpage 144 Tospecifyexcludesonpage 144 TospecifyanincludeandexcludeforWindowsclientsonpage 145 Note:SelectionlistsarenotsupportedforBareMetalbackups. 5 6 Ifdesired,checktheVerifyBackupboxtoperformaninlineverifyofthebackup. Ifleftunchecked,thebackupisnotverified. Ifnecessary,checkExcludeSystemStatetobackupdataonlyandnotincludeOS protection. Warning:Itishighlyrecommendedthatyouincludesystemstateinallfilelevel backupswhereclientaliasesarenotbeingused.Restoringabackupthatdoesnot includethesystemstateislikelytoresultininconsistenciesontheclientandcause highlyundesirableresults.

140

Chapter 4

Noteaboutclientaliases:Ifyouarebackingupanaliasedclient,seeWorking withclientaliasesonpage 172beforedecidingwhethertoincludeorexcludethe systemstate. NoteaboutWindowsInstantRecovery:ThesystemstateisrequiredforWindows InstantRecovery(WIR).Backupswheresystemstatehasbeenexcludedcannotbe usedforWIR.Formoreinformation,seeSystemstatebackupandrestoreon WindowsServeronpage 426. 7 8 Ifdesired,selectabackupdevice.Backupsarewrittentothedefaultdeviceunless otherwisespecified. ClickBackuptoexecutethejob. Toviewthejob,seeMonitoringrunningjobsonpage 182. Tocreateabackupschedule 1 2 3 4 5 6 SelectthedesiredclientintheNavigationpaneandclickBackup. SelecttheScheduleBackuptab. EnteraScheduleName. VerifythattheScheduleenabledboxischecked. EnteraScheduleDescription. Choosethedatatobackupbyselectingoneofthefollowing:

Protectallvolumes Specifyselectedvolumesandfiles
7 Ifyouselectedtospecifyvolumesandfiles,seeoneofthefollowing:

TospecifyincludesforMaster,Differential,andIncrementalbackupson
page 143

TospecifyincludesfortheSelectivebackuptypeonpage 144 Tospecifyexcludesonpage 144 TospecifyanincludeandexcludeforWindowsclientsonpage 145


8 IntheSchedulearea,selectabackupstrategyfromthelist.

ChoosefromIncrementalForever,FullwithIncrementals,Fullwith
Differentials,orCustom.

ForphysicalWindowsclientsonly,checkPerformBareMetalBackupifdesired
toincludehotbaremetalbackupsintheschedule. Backupsfortheselectedstrategydisplaybelow.

Backups

141

Dooneofthefollowing: Foranoncustomstrategy,definethefrequencyatwhichbackupsofeachtype willrunusingthefieldsbeloweachbackup. Foracustomstrategy,clicktheCalendaricontodefinethefrequencyatwhich backupsofeachtypewillrun.Dothefollowingforeachbackupinstance:

recurrence,anddescription(optional),thenclickConfirm. 10 Ifdesired,checkSetRetentionSettingsandmodifytheminimum,maximum,and legalholdvalues.

Dragabackupiconontothecalendar.Dragontotodaysdateorlater. IntheAddBackupwindow,definethebackuptype,startdate,starttime,

IfyouhaveaclientselectedintheNavigationpane,settingsapplytofilelevel
backupsrunforthisclient. IfyouhaveanapplicationselectedintheNavigationpane(suchasSQL,Hyper V,ESX,orExchange)thesevaluesapplytoallselectedVMs,databases,or instancesincludedinthisschedule.Tosetdifferentvaluesforeachselected item,donotentersettingshere.Instead,gotoSettings>Storageand Retention>BackupRetention.SeeAboutretentioncontrolonpage 106for details. ModifyingretentionsettingsherealsoupdatesvaluesdisplayedontheBackup Retentionpage. SeeAboutretentioncontrolonpage 106formoreinformationaboutthese settings.

142

Chapter 4

11 ClickAdvancedSettingsandsetadditionaloptionsasdesired.ClickConfirmto save.
Field Verify Backup Description Check VerifyBackup to perform an inline verify of the backup. If left unchecked, the backup is not verified. Check ExcludeSystemState to back up data only and not include OS protection. This option is used to back up data volumes. Warning: It is highly recommended that you include system state in all file-level backups where client aliases are not being used. Restoring a backup that does not include the system state is likely to result in inconsistencies on the client and cause highly undesirable results. Note about client aliases: If you are backing up an aliased client, see Working withclientaliasesonpage 172 before deciding whether to include or exclude the system state. Note about Windows Instant Recovery: The system state is required for Windows Instant Recovery (WIR). Backups where system state has been excluded cannot be used for WIR. For more information, see Systemstate backupandrestoreonWindowsServeronpage 426. Available Device Mail Options tab Select an Available Device to define the device where backups will be stored.

Exclude System State

Backup Schedule and Failure reports are sent by default. To opt out of email reports, uncheck boxes on the Mail Options tab.

12 ClickConfirmtosavetheadvancedsettingsyouentered. 13 ClickSavetocreatetheschedule. TospecifyincludesforMaster,Differential,andIncrementalbackups Note:IncludeselectionsaresupportedforWindowsclientsrunningagent7.2only. Youcanspecifytheinformationtoincludewhenyourunaonetimebackupor createabackupscheduleforMaster,Differential,orIncrementalbackups (Windowsonly).Youmustdefineinclusionlistsatthevolumeordirectory(folder) levelandcannotusewildcards.

Backups

143

TheincludeselectionisavailableforMaster,Differential,andIncremental
backups(Windowsonly),andyoucanspecifyvolumesandfolders.No wildcards,filelevelincludes,orselectionpatternsaresupported. SelectionlistsarenotsupportedforBareMetalbackups. Note:Formoreinformation,seeToaddselectionpatternstoaselectionliston page 156. 1 2 3 4 ClickCreate/ModifyIncludeList. ClickOpenClientSpecificFileSystemSelection. Browsethroughthefoldersandselecttheappropriatevolumesorfolders. ClickAddtoaddyourselectiontothelist.Repeatthisprocessuntilyoucomplete yourincludelist. (ClickonanitemintheSelectionListandclickRemoveorclickRemoveAllifyou wanttoremoveaselectionorremoveallofyourselectionsfromtheselectionlist, priortoclickingConfirm.) 5 Whenfinished,clickConfirmtosave. TospecifyincludesfortheSelectivebackuptype TheincludeselectionisrequiredforSelectivebackups.Wildcards,filelevel,and selectionpatternsaresupportedforSelectivebackups. Note:Formoreinformation,seeToaddselectionpatternstoaselectionliston page 156. 1 2 3 4 ClickCreate/ModifyIncludeList. ClickOpenClientSpecificFileSystemSelection. Browsethroughthefoldersandselecttheappropriatevolumes,folders,orfiles. ClickAddtoaddyourselectiontothelist.Repeatthisprocessuntilyoucomplete yourincludelist. (ClickonanitemintheSelectionListandclickRemoveorclickRemoveAllifyou wanttoremoveaselectionorremoveallofyourselectionsfromtheselectionlist, priortoclickingConfirm.) 5 Whenfinished,clickConfirmtosave. Tospecifyexcludes Youcanspecifythefoldersandfilestoexcludewhenyourunaonetimebackup oryoucreateabackupschedule.Thisissupportedforallclients.Theexclude selectionisavailableatthefilelevelandsupportswildcards.
144

Chapter 4

TheexcludeselectionisavailableforMaster,Differential,andIncremental
backupsforallclients.Wildcards,filelevelexcludes,andselectionpatternsare supported. TheexcludeselectionisnotsupportedforSelectivebackups. SelectionlistsarenotsupportedforBareMetalbackups. Note:Formoreinformation,seeToaddselectionpatternstoaselectionliston page 156. 1 2 3 4 5 6 ClickCreate/ModifyExcludeList. Enteraselectionpatternorbrowseforfilesorfolders. Tobrowseforfilesorfolders,clickOpenClientSpecificFileSystemSelection. Browsethroughthefoldersandselecttheappropriatefoldersorfiles. ClickAddtoaddaSelectionPatternselectedfolders/filestothelist. Repeatthisprocessuntilyoucompleteyourexcludelist. (ClickonanitemintheSelectionListandclickRemoveorclickRemoveAllifyou wanttoremoveaselectionorremoveallofyourselectionsfromtheselectionlist, priortoclickingConfirm.) 7 Whenfinished,clickConfirmtosave. TospecifyanincludeandexcludeforWindowsclients Youcanspecifythefilestoinclude,thenselectfilesfromthatlisttoexcludewhen yourunaonetimebackuporyoucreateabackupschedule(Windows,agent7.2 only). Ifyoucreateanincludelistandanexcludelist,theincludeisappliedfirst.The excludeisappliedtodefineasubsetofincludedfilestoomit.
Note: For examples, see Usingselectionlistsonpage 133 and AboutEnterprise selectionlistsonpage 152.

Toviewormodifyaschedule Schedulesthatarerunningcannotbemodified. 1 2 3 SelecttheclientprotectedbythescheduleintheNavigationpaneandclick Backup. SelecttheScheduleBackuptab. VerifythedesiredscheduledisplaysintheScheduleNamefield.Ifnot,selectit.

Backups

145

4 5

Modifysettingsasdesired.SeeTocreateabackupscheduleonpage 141for details. ClickSave. Todeleteaschedule Runningschedulescannotbedeleted.

1 2 3 4

SelecttheclientprotectedbythescheduleintheNavigationpaneandclick Backup. SelecttheScheduleBackuptab. VerifythedesiredscheduledisplaysintheScheduleNamefield.Ifnot,selectit. ClickDeleteSchedule,thenYestoconfirm.

WorkingwiththeEnterprisebackupsubsystem
UsetheEnterprisebackupsubsystemtorunonetimebackupsorcreatebackup schedulesforoneormoreclientcomputers.TheEnterprisebackupsubsystem supportsadditionalbackupoptionsthatarenotavailableintheComputerbackup subsystem. Note:Theseproceduresareforfilelevelbackupsonly.Toprotectanapplication (suchasSQL)orvirtualmachine,seetheapplicablechapterinthisAdministrators Guide. AdvancedTip1:Executingmultiplebackupsconcurrentlyresultsingreater aggregatetransferspeedsthanrunningthesamebackupsoneafteranother.For smallerbackups,configuremultipleclientbackupsinthesameschedule.The numberofjobsthatcanrunsimultaneouslyisdeterminedbytheMaxConcurrent BackupssettinginSettings>StorageandRetention>BackupDevices.The defaultsettingvariesdependingonthebackupsystem.Asyoumonitorsystem resourceutilization,adjustthissettingasneeded.SeeAboutdevice configurationonpage 122. AdvancedTip2:Ifyoucreateaschedulewithnewselectionlistsandthereare alreadymastersonthesystemforitsclients,youmustrunamasterbeforethenew schedulerunstoensuredataconsistency.SeeBackupgroupsandselectionlists onpage 152.

146

Chapter 4

Enterprisebackupelements
Enterprisebackupsarerunusingthefollowingelements:
Backup Elements Calendars Description Calendars form the basis for backup schedules by defining backup strategies. Use this feature to create new calendars or modify, delete, or copy existing ones. Selection lists define the items that will be included or excluded from the backup. Default selection lists are provided. You can also create custom selection lists. With options, you can specify additional information, such as the type of verify to use and the target disk device, as well as run pre- and/or post-backup commands. Default options are provided. You can also create custom options.

Selection lists

Options

Setupcalendars,selectionlists,andoptionsasnecessarybeforeexecutingor schedulingbackups.

Aboutcalendars
Usecalendarstoselectbackuptypesandthefrequencywithwhichtheyrun.You thenassociatethecalendarwithaschedule,whereyouchoosetheclientsto protect.Inthisway,multipleclientscanbeprotectedonthesamecalendarand schedule.Foreasieradministration,itisrecommendedthatyoucreateasfew calendarsaspossible. Tip!Aftercreatingacalendar,abackupdoesnotrununtilyouassociatethe calendarwithaschedule. Whencreatingcalendars,considertheclientoperatingsystemsyouwouldliketo protectandthebackupstrategyrequiredforeachclientinyourenvironment.See Filelevelbackupstrategiesonpage 138fordetails.IfyouhavebothWindows andLinuxclients,forexample,youmaywanttocreateoneWindowscalendarthat includesbaremetalsandaLinuxcalendarwithoutbaremetals.Oryoumaywant tocreateonecalendarforallclientsandhaveaseparatebaremetalonlycalendar andschedule.

Backups

147

Anumberofdefaultcalendarsareprovided.Thesecalendarscannotbeeditedbut canbecopiedandusedasthebasisforcreatingcustomizedcalendars.Thegray lockiconontheCalendarspageindicatesthatacalendarisreadonly. Thefollowingcalendarproceduresaredescribedintheremainderofthissection:

Tocreateacalendar Todefinethefrequencyofincrementalbackups Tocreateanhourlycalendar Toviewormodifyacalendar Todeleteacalendar Tocopyacalendar

Tocreateacalendar Note:Youshouldrunanewmasterfirstifyoucreateaschedulewithnewselection listsiftherearealreadymastersonthesystemforthisclient.SeeBackupgroups andselectionlistsonpage 152. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 5 SelecttheCalendarstab. ClickNew. EnteraCalendarNameandCalendarDescription. SelectanOperatingSystemFamily. Forexample,ifthecalendarwillbeusedwithWindowssystemsonly,select Windowsinthelist. 6 Addbackupsbydoingeitherofthefollowing:

ClickShowStrategyList,selectthedesiredstrategy,andclickApply.Instances
ofeachbackuptypeinthestrategydisplayonthecalendar.

Dragabackupiconontothecalendar.Dragontotodaysdateorlater.
7 IntheAddBackuporModifyBackupwindow,definethebackuptype,startdate, starttime,recurrence,anddescription(optional),thenclickConfirm.

Ifyouappliedabackupstrategy,opentheModifyBackupwindowbydouble
clickinganinstanceonthecalendar.Repeatforeachbackuptype.

Ifyoudraggedaninstanceontothecalendar,theAddBackupwindowlaunches
automatically.Repeattheprocessforeachdesiredbackuptype.

148

Chapter 4

Foradditionalinformationonschedulingincrementals,seeTodefinethe
8 frequencyofincrementalbackupsbelow. ClickSavetocreatethecalendar. Todefinethefrequencyofincrementalbackups Thisprocedureprovidesadditionalinformationregardingincrementalcalendars. 1 CreateacalendaranddragtheIncrementalicontothedesiredday.SeeTocreate acalendaronpage 148fordetails. TheAddBackupwindowlaunches. 2 3 SelecttheStartTimeforthebackuptobegin. SelectthetypeofRecurrenceinterval(e.g.,Hourly,Daily,Weekly,etc.).

andenterthenumberofminutesbetweeneachincrementalbackup. Note:Intrahourlyschedulingisonlyenabledwhenyouselecthourlyfrequency.Up tofourquarterhour(15minute)incrementsmaybescheduledperhour,butonly ifthestarttimefortheschedulebeginsatthetopofthehour.Inotherwords,ifthe starttimeforanintrahourlyscheduleissettobeginat10pastthehour,onlythree 15minuteincrementswillbebackedupinanygivenhour. 4 5 ClickConfirm. Eachinstanceoftheincrementalbackupdisplaysonthecalendar. ClickSavetosavechangestothecalendar. Tocreateanhourlycalendar Usethisproceduretocreateacalendarrunningmultiplebackupsduringasingle day(forexample,differentialbackupseverytwohours). 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 5 SelecttheCalendarstab. ClickNew. EnteraCalendarNameandCalendarDescription. SelectanOperatingSystemFamily.

Forhourlyrecurrence,selecteachofthedesiredhourlyintervals. Torunmorefrequentlythanperhour,checktheIntraHourlyFrequencybox

Backups

149

Forexample,ifthecalendarwillbeusedwithWindowssystemsonly,select Windowsinthelist. 6 7 8 Selectadayonthecalendartodisplayanhourlyview. Draganddropbackuptypesontothehourswhentheyshouldexecute.Backup typesmaybethesameoravariety. ClickSavetocreatethecalendar. Toviewormodifyacalendar Note:Readonlycalendarscannotbemodified.Createacopyofthecalendar beforemodifying.SeeTocopyacalendaronpage 151. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 SelecttheCalendarstab. Note:Ifyouseethescreenthatallowsyoutocreateacalendarinsteadofthe calendarlist,clickCancelandthecalendarlistdisplays. 3 4 SelectacalendarinthelistandclickView/Modify. EditsettingsasdesiredandclickSave. Fordetails,seeTocreateacalendaronpage 148. Todeleteacalendar Note:Readonlycalendarscannotbedeleted. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 SelecttheCalendarstab. Note:Ifyouseethescreenthatallowsyoutocreateacalendarinsteadofthe calendarlist,clickCancelandthecalendarlistdisplays. 3 SelectacalendarinthelistandclickDelete. Note:Ifamessagedisplaysindicatingthatthiscalendarisbeingusedbyoneor moreschedules,youmustfirstremovethecalendarfromallschedulesbefore deleting.Fordetails,seeToseeallschedulesreferencingagivencalendaron page 151.
150

Chapter 4

ClickYestoconfirmthatyouwanttodeletethecalendar. Tocopyacalendar Touseanexistingcalendarasatemplate:

SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane.

SelecttheCalendarstab. Note:Ifyouseethescreenthatallowsyoutocreateacalendarinsteadofthe calendarlist,clickCancelandthecalendarlistdisplays.

3 4 5 6 7

SelectacalendarinthelistandclickCopy. AnewcalendarcalledCopyof<existingcalendarname>displaysinthelist. SelectthecopyinthelistandclickView/Modify. Modifythecalendarnameandothersettingsasdesired. Formoreinformation,seeTocreateacalendaronpage 148. ClickSave. SelectRenametosavethecalendarwiththenewname. Toseeallschedulesreferencingagivencalendar

SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane.

SelecttheCalendarstab. Note:Ifyouseethescreenthatallowsyoutocreateacalendarinsteadofthe calendarlist,clickCancelandthecalendarlistdisplays.

3 4

SelectthecalendarinthelistandclickView/Modify. ClicktheclockicontotherightoftheCalendarName.Alistofallschedules referencingthiscalendardisplays.

Backups

151

AboutEnterpriseselectionlists
Selectionlistsdefineitemstoincludeorexcludefromthebackup.Beforerunning abackuporsettingupaschedule,createoreditselectionlistsfortheprotected clients. AnEnterpriseselectionlistcanbecreatedforanindividualclientorcanbeapplied toagroupofclients.Forexample,anexcludeselectionlistcanbecreatedand appliedtoallWindowsclients.Thelistoffilestoexcludefromthebackup(suchas .pstor.tmpfiles)isidentifiedintheexclusionlist.

Backupgroupsandselectionlists
Ifyoucreateaschedulewithnewselectionlistsandtherearealreadymasterson thesystemforitsclients,youmustrunamasterbeforethenewschedulerunsto ensuredataconsistency.

Excludeactivedatabasesfromfilelevelbackups
Itisrecommendedthatallactivedatabasesbeexcludedfromfilelevelbackups. ExchangeandSQLServerdatabasesarebackedupusingtheExchangeandSQL agentsontheclient,respectively(seetheMicrosoftExchangeServerProtection andMicrosoftSQLServerProtectionchaptersfordetails).Onlytheactive databaseneedstobeexcluded.Allotherfilesontheclientcanbebackedup duringthefilelevelbackup.

Selectivebackupsandincludelists
Selectivebackupsmusthaveanassociatedincludeselectionlist.Master, differential,andincrementalbackupscanberunwithanexcludelist(allclients), withanincludelist(Windowsclients,agent7.2only),withaninclude/exclude combination(Windowsclients,agent7.2only),orwithnoselectionlistapplied. Selectionlistsarenotusedforbaremetalbackups.Seethefollowingtablefora descriptionofselectionlisttypes.Forexamples,seeUsingselectionlistson page 133.

152

Chapter 4

Selection list type Include

Description Defines items to include in a file-level backup. Note the following:

For the Selective backup type - Supported for all clients.


Exclude Include is required for selective backups. For Master, Differential, and Incremental backup types Supported for Windows clients, agent 7.2 only.

Defines items to omit from a master, differential, or incremental backup. For selective backups, an include list must be defined. In addition, an exclude list can be applied to define a subset of included files to omit. See AdditionalconsiderationsforLinuxexclusions if applying exclusions to a Linux client.

Any

On the Enterprise > Backup > Schedule Backup tab, used to include specified files when applied to the Inclusions column or to exclude specified files when applied to the Exclusions column.

AdditionalconsiderationsforLinuxexclusions
NotethefollowingconsiderationswhenapplyingexclusionstoLinuxclients:

Bydefault,thesystemexcludescertainLinuxdirectoriesfrombackup.For
details,seeDefaultexclusionsonpage 652. ExclusionsforLinuxclientsomitthefilesfromthebackupbutdonotprevent thesystemfromcheckingtheseexcludedfilesforchangeswhenidentifying dataforincrementalordifferentialbackups.Ifyouareexcludingdirectories containinglargeamountsofhighlychangeabledata,itisrecommendedthat youalsoimplementtheexclusioninKB816. Themaximumnumberoffilesyoucanexcludeis256.Themaximumnumber ofdirectoriesyoucanexcludeisalso256.Themaximumtotalnumberof exclusionsis512.Iftheselimitsareexceeded,thelistisignoredandthebackup runswithoutexcludingfiles.

Backups

153

Selectionlistprocedures
Thefollowingselectionlistproceduresaredescribedintheremainderofthis section:

Tocreateaselectionlist Toviewormodifyaselectionlist Todeleteaselectionlist Toaddselectionpatternstoaselectionlist Toremoveselectionpatternsfromaselectionlist Usingwildcardsinselectionlists Toapplyaselectionlistoroptiontooneclient Toapplyaselectionlistoroptiontomultipleclients Toapplyasplitselectionlistoroption

Tocreateaselectionlist 1 2 3 4 SelectthebackupsystemintheNavigationpaneandclickBackup. ClicktheSelectionListstab. ClickNew. Providethefollowingrequiredinformation:

SelectionListNameEnterauniquenameforthelist.Thisisarequiredfield. SelectionListDescriptionProvideadescriptionfortheselectionlist.Thisisa
requiredfield. SelectanOperatingSystemFamilytodenotetheclientOSfamilytowhichthis selectionlistcanbeassociated.OptionsincludeAny,Windows,Linux,UNIX, NetWare,OES,iSeries,DOS,OS/2,orOther. AssignaSelectionListTypeChooseIncludetoincludespecifiedfiles,Exclude toomitspecifiedfiles,orAnytobeusedaseitheraninclusionoranexclusion list.

154

Chapter 4

5 Field

Checkoptionalboxesasdesired: Description
To back up data only and not include OS protection. This option is used to back up data volumes. Warning: It is highly recommended that you include system state in all filelevel backups where client aliases are not being used. Restoring a backup that does not include the system state is likely to result in inconsistencies on the client and cause highly undesirable results. Note about client aliases: If you are backing up an aliased client, see Workingwithclientaliasesonpage 172 before deciding whether to include or exclude the system state. Note about Windows Instant Recovery: The system state is required for Windows Instant Recovery (WIR). Backups where system state has been excluded cannot be used for WIR. For more information, see Systemstate backupandrestoreonWindowsServeronpage 426.

ExcludeSystem State

TemporaryFiles ReadMounts

To exclude all temporary files. To exclude all read-only mounted file systems on UNIX clients, including mounted CD-ROM drives. This option is highly recommended. Otherwise, backup speed may be slower as a result of reading the contents of a mounted CD-ROM. To exclude all NFS mounted file systems on UNIX clients. It also excludes NFS file systems that are mounted while the backup is in progress. To exclude all file systems other than root (/) on UNIX clients.

NetMounts AllMounts 6 7

AddSelectionPatternsasdesiredtospecifythefilestoincludeorexclude.SeeTo addselectionpatternstoaselectionlistonpage 156fordetails. ClickSave. Toviewormodifyaselectionlist

1 2

SelectthebackupsystemintheNavigationpaneandclickBackup. ClicktheSelectionListstabtoviewtheselectionlist. Note:Ifyouseethescreenthatallowsyoutocreateaselectioninsteadofthe selectionlist,clickCancelandtheselectionlistdisplays.


Backups

155

3 4

SelectthedesiredlistandclickView/Modify. ModifyinformationasdesiredandclickSave.SeeTocreateaselectionliston page 154fordetails. Todeleteaselectionlist

1 2

SelectthebackupsystemintheNavigationpaneandclickBackup. ClicktheSelectionListstab. Note:Ifyouseethescreenthatallowsyoutocreateaselectioninsteadofthe selectionlist,clickCancelandtheselectionlistdisplays.

SelectthedesiredlistandclickDelete. Note:Ifamessagedisplaysindicatingthatthislistisbeingusedbyoneormore schedules,youmustfirstremovethelistfromallschedulesbeforedeleting.Click theclockicontoseetheschedulesreferencingthislist.

ClickYestoconfirmthedeletion. Toseeallschedulesreferencingaselectionlist

1 2

SelectthebackupsystemintheNavigationpaneandclickBackup. ClicktheSelectionListstab. Note:Ifyouseethescreenthatallowsyoutocreateaselectioninsteadofthe selectionlist,clickCancelandtheselectionlistdisplays.

3 4

SelectthedesiredlistandclickView/Modify. ClicktheclockicontotherightoftheSelectionListName.Alistofallschedules referencingthisselectionlistdisplays. Toaddselectionpatternstoaselectionlist Note:Selectionpatternsarenotsupportedforincludesthatareappliedto WindowsMaster,Differentials,andIncrementals.

1 2

Viewthedesiredselectionlist.Fordetails,seeToviewormodifyaselectionlist onpage 155. EnterthedesiredSelectionPatternandclickAddtomoveittotheSelectionList box.

Forincludeselectionlists,filesmatchingthedefinedpatternaretheonlyones
includedinthebackup.Patternscanbeusedforselectivebackupsonly.See Usingwildcardsinselectionlistsonpage 157fordetails.
156

Chapter 4

Forexcludeselectionlists,filesmatchingthedefinedpatternareexcludedfrom
thebackup.

Forexcludes,wildcardsymbolsmaybeusedintheselectionpattern.The*can
beusedtodesignateagroupofunknowncharactersandthe?canbeusedfor asinglecharactersubstitution.Forexample,toaddall.pstfilestothelist,type *.pstintheSelectionPatternboxandclickAdd.SeeUsingwildcardsin selectionlistsonpage 157fordetails. ClickSave. Toremoveselectionpatternsfromaselectionlist 1 2 3 Viewthedesiredselectionlist.Fordetails,seeToviewormodifyaselectionlist onpage 155. SelectthedesiredpatternintheSelectionListboxclickRemove. Toremoveallpatterns,clickRemoveAll. ClickSave.

Usingwildcardsinselectionlists
Wildcardscanbeusedinselectionpatternstoincludeorexcludefilesfromcertain backuptypes.SeeTocreateaselectionlistonpage 154fordetails.Thefollowing chartprovidesareferenceofsupportedwildcardcombinationsandidentifiesthe limitationsassociatedwithusingwildcardsinfilenames,paths,andother referenceditems.

Backups

157

Wild card *

Inclusion list (for selective backups only)

Exclusion list (for any file-level backup type)

An example of how to include all files within specified path that match zero or more characters in the inclusion pattern
C:/PCBP/Lists.dir/*.spr C:/PCBP/Lists.dir/profile*.spr

An example of how to exclude all files with zero or more characters that match exclusion pattern
*.txt

Include all directories within specified path that match zero or more characters within the inclusion pattern.
C:/ProgramFiles/MSsqlserver/mssq*

An example of how to exclude directories with zero or more characters and their contents within a specified path that match the exclusion pattern.
C:/windows/sys*

Limitations:
*folder_abc should not be used to exclude

Limitations:
*.txt should not be used to back up all txt files

on the system. The full path must be provided.


C:\*\*\abc.txt

all folders that match folder_abc on the system. The full path must be provided. If an entire directory is excluded, the directory name will still appear in the backup; however, its contents will be empty. Multiple wildcard matches like the one shown below are not supported.
C:\*\*\abc.txt

Multiple wildcard matches like the one shown are not supported. Wildcards are not supported on Linux/Unix systems. Wildcards are not supported for other file-level backup types (Master, Incremental, Differential).

Wildcards are not supported on Linux/Unix systems. Only 40 wildcard exclude items are supported on Windows.

158

Chapter 4

Wild card ?

Inclusion list (for selective backups only)

Exclusion list (for any file-level backup type)

An example of how to include all files within specified path that match a single character within the inclusion pattern.
C:/Windows/Web/Wallpaper/a?.jpg

An example of how to exclude all files within specified path that matches a single character within exclusion pattern.
C:/PCBP/Lists.dir/pro_client?.spr

Limitations: When using the ? wildcard for inclusions at the end of the file name, files that end with . will not be included. For example, the file a..jpg will not be backed up. An example of how to include all directories and their contents within specified path that matches a single character within the inclusion pattern.
C:/Programfiles/Case?/

An example of how to exclude all directories and their contents within specified path that matches a single character within exclusion pattern.
C:/Programfiles/Case?/

Limitations: If an entire directory is excluded, the directory name itself will still appear in the backup; however its contents will be empty.

*,?

An example of Inclusion lists that have multiple ? wildcards and only one * wildcard
C:/Log/?L*.logs

An example of Exclusion lists that have multiple ? wildcards and only one * wildcard
C:/Log?/*.logs

Limitation: Directory and file level wildcard usage within an inclusion pattern are not supported. For example C:/Log*/*.log will not receive any data for backup.

Limitation: If an entire directory is excluded, the directory name itself will still appear in the backup; however its contents will be empty.

Aboutbackupoptions
Optionsarenotrequired,butcanbeusedtoconfigureadditionalbackupsettings. Forexample,youcanuseoptionstoselectthediskdeviceandverifylevelusedfor abackup,ortorunpreorpostbackupcommands.Beforerunningabackupor creatingaschedule,setuptheoptionsneededfortheclientsyouwishtoprotect.

Backups

159

Ifnooptionsareapplied,backupsarewrittentothedefaultD2DBackupsdevice andanassociatedfilelevelverifyisrunforeachbackupjob. Thefollowingbackupoptionproceduresaredescribedintheremainderofthis section:

Tocreateabackupoption Toviewormodifyabackupoption Todeleteabackupoption Tocopyabackupoption

Tocreateabackupoption 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 5 ClicktheOptionstab.Alistofexistingoptionsdisplays. ClickNewatthebottomofthepage. EnteranOptionsNameandanOptionsDescription. SelectanOperatingSystemFamilyfromthelist. Forexample,iftheoptionswillbeusedwithWindowssystemsonly,select Windowsinthelist. MostoptionslistscanbeappliedtoanyOSfamily.Ifyouareusingdifferentdisk devicesorverifylevelsforspecificoperatingsystems,selecttheappropriateOS family. 6 7 8 FromtheAvailableDevices,chooseadiskdevicetodefinethetargetdevicewhere backupswillbewritten. Theremainingfieldsareoptional.SeeBackupOptionstabonpage 162for details. ClickSavetocreatethebackupoption. Toviewormodifyabackupoption 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 ClicktheOptionstab.SeeBackupOptionstabonpage 162fordetails.

160

Chapter 4

Note:Ifyouseethescreenthatallowsyoutocreateanoptioninsteadoftheoption list,clickCancelandtheoptionlistdisplays. 3 4 SelecttheoptioninthelistandclickView/Modifyatthebottomofthepage. ModifysettingsasdesiredandclickSave. Foradescriptionofthesettings,seeTocreateabackupoptiononpage 160. Todeleteabackupoption Note:Readonlyoptionscannotbedeleted. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 SelecttheOptionstab. Note:Ifyouseethescreenthatallowsyoutocreateanoptioninsteadoftheoption list,clickCancelandtheoptionlistdisplays. 3 SelectanoptioninthelistandclickDelete. Note:Ifamessageindicatingthatthisoptionisbeingusedbyoneormore schedules,youmustfirstremovetheoptionfromallschedulesbeforedeleting. Clicktheclockicontoseewhichschedulesreferencethisoption. 4 ClickYestoconfirmthatyouwanttodeletetheoption. Tocopyabackupoption Copyabackupoptiontouseanexistingoptionasatemplate. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 SelecttheOptionstab.SeeBackupOptionstabonpage 162fordetails. Note:Ifyouseethescreenthatallowsyoutocreateanoptioninsteadoftheoption list,clickCancelandtheoptionlistdisplays. 3 4 5 SelectanoptioninthelistandclickCopy. AnewoptioncalledCopyof<existingoptionname>displaysinthelist. SelectthecopyinthelistandclickView/Modify. Modifytheoptionnameandothersettingsasdesired. Formoreinformation,seeTocreateabackupoptiononpage 160.
Backups

161

6 7

ClickSave. SelectRenametosavetheoptionwiththenewname. Toseeallschedulesreferencinganoption

SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane.

SelecttheOptionstab.SeeBackupOptionstabonpage 162fordetails. Note:Ifyouseethescreenthatallowsyoutocreateanoptioninsteadoftheoption list,clickCancelandtheoptionlistdisplays.

3 4

SelectanoptioninthelistandclickView/Modify. ClicktheclockicontotherightoftheOptionsName.Alistofallschedules referencingthisoptiondisplays. BackupOptionstab ItemsontheBackupOptionstabaredescribedhere.


Item Options Name Clock icon [Show all scheduled references] Description Enter a unique name for the option. Click the clock icon to see the schedule references on the Schedules References window.

Options Description

Enter a description of the option.

162

Chapter 4

Item Operating System Family

Description Operating system to which this option can be applied. If you will be using the option for multiple OS families, select Any. The system only allows the option to be applied to clients belonging to the OS family you select here. For example, if the options will be used with Windows systems only, select Windows in the list. Most options lists can be applied to any OS family. If you are using different disk devices or verify levels for specific operating systems, select the appropriate OS family.

Various Options - Directory Depth A value greater than zero will not back up files below n directories deep. (Zero, full depth, is the default.) Select this toggle button to specify how read locking is performed on files prior to backing them up. Before a file is backed up, the backup attempts to get a read lock on the file, which allows the file to be read without any other process accessing the file. There are three read-locking states:

- Read Locking Level

None - No read locking. Do Not Wait - Do Not Wait (not forced) read

locking attempts to lock the file, but if the lock cannot be gained, continues to back up the file without the lock. Wait Forever - Wait Forever (enforced) read locking stops the backup until the lock can be set. This could potentially take forever.

Backups

163

Item - Verify Level

Description Select one of the following:

None Do not verify the files in the backup. FileLevel Files exist. Verify that the list of files

sent by the client matches the list received by the backup system. The verify runs once the backup completes, as a dependent task. BitLevel Files exist and contents match. Compare, bit by bit, the contents of the files received by the backup system with the source files on the client. The verify runs once the backup completes, as a dependent task. A bitlevel verify often fails when backing up C:\windows due to the some Microsoft processes failing to update modification dates on logs and other files in this folder. Inline Run a file-level verify during the backup by creating and comparing rolling check sums on the client and backup system.

- Create Catalog Entry? [checkbox]

Creates a catalog of files backed up and places it on the client. If space is limited on the client, this option can be unchecked. Check to enable the backup double-buffering scheme to increase the speed of the backup. This uses more backup system resources and might affect performance of other running processes. Click the disk device to define the target device where backups are written. Enter a description of the backups to which this option will be assigned.

- Speed Option? [checkbox]

Available Devices

Backup Description

164

Chapter 4

Item Pre-Backup Commands

Description Use this field to specify commands or scripts to run before the backup (any system command or user script). For example, enter the command to shut down the database before a backup. The output from the command is directed to the backup summary.

Note: For Linux clients, running long pre-backup


commands can cause backups to fail. To prevent this, adjust the timeouts in the clients master.ini file as described in KB1245. To specify a pre-backup command, enter the full path to the command in the PreBackup Commands field. For example, C:\Data\script.bat or /usr/jsmith/script.sh. Execute Pre-Backup Command on System To run the pre-backup command from the Unitrends system, enter its full path and check the Execute PreBackupCommandonSystem box. To run a command from the client, leave this box unchecked. Use this field to specify commands or scripts to run after the backup (any system command or user script). For example, enter the command to restart a database after a backup completes. The output from the command is directed to the backup summary.

Post-Backup Commands

Note: For Linux clients, running long post-backup


commands can cause backups to fail. To prevent this, adjust the timeouts in the clients master.ini file as described in KB1245. To specify a post- backup command, enter the full path to the command in the PostBackup Commands field. For example, C:\Data\script.bat or /usr/jsmith/script.sh.

Backups

165

Item Execute Post-Backup Commands on System [checkbox]

Description To run the command from the Unitrends system, enter its full path and check the ExecutePost BackupCommandonSystem box. To run a command from the client, leave this box unchecked. Click to save your entries. Click to exit the Options tab without saving changes.

Save Cancel

AboutEnterprisebackupschedules
Backupschedulescanbethoughtofasgroupsofclientsthatarebackedupina predeterminedmanneratascheduledtime.AnEnterprisebackupscheduleties acalendartotheclientsyouwishtoprotect.Youthenapplyselectionlistsand optionstoclientsinthescheduleformoregranularcontrol.Beforecreatinga schedule,setupanyrequiredselectionlistsandoptions. Scheduledbackupsformthefoundationforcontinuousdataprotection.Once created,youcanrunthebackupsonascheduleimmediately,butthisisnotthe recommendedapproachforensuringthoroughandconsistentprotection.Run backupsmanuallywhenneeded,butuseschedulesforregularbackupoperations.

Aboutschedulingbaremetalbackups
HotbaremetalbackupscanbescheduledforWindowssystemsinthesame mannerasfilelevelbackups.Selectionlistsarenotsupported.Backupoptionscan beappliedtodesignatethediskdevice,specifywhetheracataloglistiscreated, andtorunpreandpostbackupcommands.Otheroptionsdonotapply. Hotbaremetalbackupsshouldnotbeperformeduntilthebootmediahasbeen createdandtestedsuccessfullyoneachserverwherebaremetalbackupswillbe performed.SeetheWindowsHotBareMetalProtectionchapterfordetails.

Enterprisebackupprocedures
ThefollowingEnterprisebackupproceduresaredescribedintheremainderofthis section:

TocreateanEnterprisebackupschedule Toapplyaselectionlistoroptiontooneclient Toapplyaselectionlistoroptiontomultipleclients


166
Chapter 4

Toapplyasplitselectionlistoroption ToexecuteanEnterprisebackupscheduleimmediately ToviewormodifyanEnterprisebackupschedule Toviewallschedulesbymonthorday TocopyanEnterprisebackupschedule ToenableordisableanEnterprisebackupschedule TodeleteanEnterprisebackupschedule

TocreateanEnterprisebackupschedule 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 ClicktheScheduleBackuptab. EnterauniqueScheduleNameandaScheduleDescription. SelectaCalendarfromthelist. ToviewonlythecalendarsforagivenOS,clickFilterbyOSFamilyintheupper rightandselectanoperatingsystemfromthelist. 5 Checkboxestoselecttheclientsyouwishtoprotect.

Youmustselectatleastoneclient. Toselectallclients,checkthegrayboxabovethefirstclientcheckbox. Thebackupsystemislistedasaclient.Donotselectitforbackup.


6 ClickShowPerClientSelectionandOptionListsinthebottomleftofthescreen. thelistsforagivenOS,clickFilterbyOSFamilyaboveandchooseanOS. TheOptionListsareashowsavailablebackupoptions.Toseeonlytheoptions foragivenOS,clickFilterbyOSFamilyaboveandchooseanOS. Hoveroveralisticontoseeassociateddetails,suchasOSandlisttype. Applyselectionlistsandoptionliststoclientsasdesired.Fordetails,seetheTo applyaselectionlistoroptiontooneclient,Toapplyaselectionlistoroptionto multipleclients,andToapplyasplitselectionlistoroptionproceduresbelow. Note:Forselectivebackups,anincludelistisrequired.Forhotbaremetal, selectionlistsarenotsupported.Formaster,differential,andincremental, inclusionlistsaresupportedforfilelevel(Windowsonly),andexclusionlistsmay beusedbutareoptional.Fordetails,seeAboutEnterpriseselectionlistson page 152andAboutbackupoptionsonpage 159.

TheSelectionListsareashowsavailableincludeandexcludelists.Toseeonly

Backups

167

ClickShowAdvancedExecutionOptionsbelowtheclientgridandcheckthe desiredboxes.

IncludeAllNewClientsInThisScheduleByDefaulttoautomaticallyaddnew
clientstothisschedule. EMailScheduleReporttoreceiveasummaryshowingbackupresultsand performanceforeachclientintheschedule.Thereportismailedtotheaddress oraddressesspecifiedintheScheduleSummaryfieldontheEmailRecipients Configurationpage.YoualsohavetheoptiontoreceiveaPDFattachmentof thereporttotheemail.SeeAboutconfiguringnotificationsonpage 50for details. EMailFailureReporttoreceiveasummaryofallbackupfailuresthatoccurred inthelasthour.Thereportismailedtotheaddressoraddressesspecifiedin theFailureReportsfieldontheEmailRecipientsConfigurationpage.Youalso havetheoptiontoreceiveaPDFattachmentofthereporttotheemail.See Aboutconfiguringnotificationsonpage 50fordetails. ClickScheduletocreatethescheduleandlaunchbackupsinaccordancewiththe associatedcalendar. Toapplyaselectionlistoroptiontooneclient 1 2 3 Viewthedesiredschedule.SeeToviewormodifyanEnterprisebackupschedule onpage 170fordetails. ClickShowPerClientSelectionandOptionListsinthebottomleftcorner. Clickaselectionlistoroptionicon,dragittotheInclusions,Exclusions,orOptions fieldofthedesiredclient,andrelease.TheDefaultsettingisreplacedbythelist. Ifnothinghappenswhenyoureleasetheicon,verifythefollowing:

Youarehoveringoverthecorrectlisttypecolumn.Forexample,aninclude
cannotbeappliedtotheExcludecolumn. ThelistoroptionisdefinedfortheOSoftheclient.Forexample,aWindows selectionlistcannotbeappliedtoaLinuxclient. Thelistoroptionsupportsabackuptypeonthecalendar.Forexample,an excludecannotbeappliedtoaschedulewhosecalendarcontainsonlyselective backups. ClickSave. Toapplyaselectionlistoroptiontomultipleclients 1 2
168

Viewthedesiredschedule.SeeToviewormodifyanEnterprisebackupschedule onpage 170fordetails. ClickShowPerClientSelectionandOptionListsbelowtheclientgrid.

Chapter 4

Clickaselectionlistoroptionicon,dragittotheInclusions,Exclusions,orOptions labelatthetopofthecolumn,andrelease.Thelistisappliedtoallselectedclients whoseOSmatchesthatofthelist. Ifnothinghappenswhenyoureleasetheicon,verifythefollowing:

Youarehoveringoverthecorrectlisttypecolumn.Forexample,aninclude
cannotbeappliedtotheExcludecolumn.

ThelistoroptionisdefinedfortheOSoftheclient.Forexample,aWindows
selectionlistcannotbeappliedtoaLinuxclient. Thelistoroptionsupportsabackuptypeonthecalendar.Forexample,an excludecannotbeappliedtoaschedulewhosecalendarcontainsonlyselective backups. ClickSave. Toapplyalisttoallselectedclients,dragthelisticontotheInclusions,Exclusions, orOptionslabelatthetopofthecolumnandrelease.Thelistisappliedtoall selectedclientswhoseOSmatchesthatofthelist. Toapplyasplitselectionlistoroption Whencreatingaschedulethatincludesmultiplebackuptypes,suchasamaster andanincremental,usethesplittoapplyoneexcludelisttothemasterand anothertotheincremental,forexample. Usethisproceduretoapplydifferentselectionlistsoroptionstoeachbackuptype definedintheschedulescalendar. 1 2 3 Viewthedesiredschedule.SeeToviewormodifyanEnterprisebackupschedule onpage 170fordetails. ClickShowPerClientSelectionandOptionListsbelowtheclientgrid. ClicktheSplitselectionlistoroptionicon,dragittothedesiredInclusions, Exclusions,orOptionsfieldorcolumn,andrelease.TheCreateSplitwindow launches. Dragaselectionoroptionlistsicontoabackuptypeandreleasetoapply.Thelist displaysonthebackup.Repeattomodifyeachbackuptypeasdesired. ClickSave. Splitdisplaysintheclientgridindicatingtheclientstowhichthesplithasbeen applied. ClickSave.

4 5

4 5 6 7

Backups

169

ToexecuteanEnterprisebackupscheduleimmediately 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 ClicktheSchedulestab. SelectthedesiredscheduleinthelistandclickRunNow.

Theschedulemustbeenabledtoexecute.Ayellowlightbulbtotheleftofthe
schedulenameindicatesthescheduleisenabled. Allbackupsscheduledtoruntodayarequeuedandexecuteassoonaspossible. SelectStatus>Presenttoviewqueuedandrunningjobs. ToviewormodifyanEnterprisebackupschedule Active(running)schedulescannotbemodified. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 ClicktheSchedulestab. SelectthedesiredscheduleinthelistandclickView/Modify. ModifysettingsasdesiredandclickSave.Fordetails,seeTocreateanEnterprise backupscheduleonpage 167. Toviewallschedulesbymonthorday Usethisproceduretolookatallschedulesinaconsolidatedviewonareadonly calendar. 1 2 3 SelectthebackupsystemintheNavigationpaneandclickStatus. OnthesideoftheStatuspage,clicktheFutureblind. TheSchedulesCalendardisplaysamonthlyviewofscheduledbackups.

Clickthearrowsatthetopofthepagetoscrolltoanothermonth. Hoveroveracoloredbackupinstancetoseedetailsabouttheschedule. Foradailyview,clickadaytozoomin.Clickthearrowsatthetopofthepage


toscrolltoanotherday.Toexittheday,clickReturntoMonthView.

170

Chapter 4

TocopyanEnterprisebackupschedule 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 4 5 6 7 ClicktheSchedulestab. SelectthedesiredscheduleinthelistandclickCopy. AnewschedulecalledCopyof<existingschedulename>displaysinthelist. SelectthecopyinthelistandclickView/Modify. Modifytheschedulenameandothersettingsasdesired. Formoreinformation,seeTocreateanEnterprisebackupscheduleonpage 167. ClickSave. SelectRenametosavetheschedulewiththenewname. ToenableordisableanEnterprisebackupschedule Aschedulemustbeenabledforitsbackupstoexecute. 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 ClicktheSchedulestab. SelectthedesiredscheduleinthelistandclickEnable/Disable.

Iftheschedulewasdisabled,itisnowenabledandyouseeayellowlightbulb
totheleftoftheschedulename. Iftheschedulewasenabled,itisnowdisabledandyouseeagraylightbulbto theleftoftheschedulename. TodeleteanEnterprisebackupschedule 1 SelectthebackupsystemintheNavigationpaneandclickBackup. Note:Thebluesystemicondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 ClicktheSchedulestab. SelectthedesiredscheduleinthelistandclickDelete.

Backups

171

ProtectingNASdevices
TobackupdatastoredonaNASdevice,itisbesttocreateNASstorageinthe backupsystem.Dataisthenbackedupthroughthenetworkconnection,asifit wereanotherinternaldirectoryorvolume.Dataistransferredmorequicklythan iftheNASismountedononeofthesystemsclients.Oncestoragehasbeen created,theNASisseenasaregularclientofthebackupsystem. WhenyoumounttheNAStothebackupsystem,openfilesdonotgetbackedup. Forthisreason,NASbackupsshouldbescheduledtorunwhenfileactivityisatits lowestlevel. Permissionsofthefilesasseenwhenmappedtothesystemwillnotbeexactlythe sameasthoseontheNAS. ToprotectaNASdevice 1 2 3 AddNASstoragetothebackupsystem.SeeToprotectdatastoredonaNASon page 97fordetails. AfterNASstorageisadded,refreshtheleftNavigationpanetoseethenewNAS client. CreateabackupscheduleorrunaonetimebackupfortheNASclientusingthe Computerbackupsubsystem.SeeWorkingwiththeComputerbackup subsystemonpage 139fordetails. Note:EnterprisebackupsarenotsupportedforNASclients.Whenyouenterthe Enterprisebackupsubsystem,anyNASclientsaredisabledintheNavigationpane. Master,differential,andselectivebackupsaresupportedforNASclients.Backups startattheNASmountpoint.Therefore,itisnotnecessarytoapplyexclusionslists tokeepfilesinothersystemdirectoriesfrombeingincludedintheNASbackup. ForinformationonrestoringNASbackups,seetheRestorechapter.

Workingwithclientaliases
Youcancreatealiasesforasingleclientinordertohavemultiplebackup strategies.Byaddingmultiplealiasclients,youcanconfigureseparateand radicallydifferentschedulesforthesameclient. Note:Makesureyouareusingthe7.2agentorhigherwhenworkingwithclient aliases.

172

Chapter 4

Usingaliases,youcanbreakapartlargedatastores,decreasingthetimerequired toperformthebackup,andreducingthenetworktrafficcausedbylargebackup transfers.Thisalsoallowsyoutheabilitytosee,ataglance,whatthesystemis backingupbecausethedatastoresarebrokenapartandyoucanviewthem separately. Youcanalsohavetwoormoremastersthatyoucanrunatdifferenttimes. Normally,amastercannotgetpurgeduntilanewmasteriscreated.Separatinga largemasterintosmallermastersandlettingthemrunatdifferenttimesincreases theavailablespacebyallowingseparatepurging. Therearespecialconsiderationswhendeterminingwhethertoincludeorexclude thesystemstatewhenrunningabackup,creatingabackupschedule,orcreating aselectionlist.SeeNoteaboutexcludingthesystemstateforclientaliaseson page 175formoreinformation. Tocreatealiasesforasingleclient Therearethreestepsinvolvedincreatingaliasesforaclient:

Creatingthealiasname Addingitasaclient Creatingselectionlists


1 2 3 4 5 Makesureyouareusingthe7.2agentorhigher. EnsurethattheclientisaddedasaprotectedclienttotheUnitrendsdevice. Tocreatealiasnamesfromthehost GotoSettings>Clients,Networking,andNotifications>Networks>Hosts. Clickontheclientnameinthetable. TypeanameintheAliasNamefield. Note:Donotenterspacesinthename.Youarelimitedto15characters.Itis recommendedthatyouwritedownthealiasnamesoyoucanentertheexact namewhenyouadditasanewclient. 6 ClickAdd.YouseethealiasnameintheAliasListarea. Note:ToremoveanaliasnamefromtheAliasListarea,clickonthealiasnameand clickRemove.ToremoveallaliasnamesfromtheAliasListarea,clickRemoveAll. 7 8 Repeattoaddmorealiasnames,ifnecessary. ClickConfirm.Youseeamessagethatthehostentrywassuccessfulorfailed.

Backups

173

Toaddthealiasnameasaclient 9 GotoSettings>Clients,Networking,andNotifications>Clients. 10 ClickAddClient.YouseetheAddClientscreen. 11 SelecttheComputerTypefromthedropdownlist. 12 UncheckEstablishtrustintheAuthenticationarea. 13 UncheckAutomaticallycreateabackupscheduleforthiscomputerandapplyit immediatelyintheOptionsarea. 14 EnteroneofyournewaliasnamesintheComputerNamefield. Note:ThereisnoneedtoaddanIPaddress,sincethisdefaultstoinformationfrom thehostpage. 15 ClickSetup.Youseeaprocessingmessage,thenaReloadNavigationwindow describingthatyouneedtorefreshthesystem. 16 ClickYes,reloadtheSystemorNo,reloadtheSystemlater. Afteryoureloadthesystem,thenewaliasnamedisplaysintheNavigationpane inthelistofclientsprotectedbythesystem. Tocreateselectionlists 17 Nowthatyouhavesetupaclientalias,youcandifferentiatethebackupswith selectionlists. Forexample,youhaveahostthathaslargedirectoriesinaC:driveandaD:drive. Youcreateaclientaliasofthehost.Youcannowcreateaselectionlisttoexclude driveC:fromtheclientaliasandanotherselectionlisttoexcludedriveD:fromthe host.Thisway,youhavesplitthelargedirectoriesbetweentwodifferentclients. Atthispoint,youcancreatedifferentmasterschedulesforthehostandtheclient aliasandrunbackupsseparately. SeeNoteaboutexcludingthesystemstateforclientaliasesonpage 175for informationaboutexcludingorexcludingthesystemstatewhencreatinga selectionlist,runningabackup,orcreatingabackupschedule. Formoreinformation,see:

TospecifyincludesforMaster,Differential,andIncrementalbackupson
page 143 TospecifyincludesfortheSelectivebackuptypeonpage 144 Tospecifyexcludesonpage 144 TospecifyanincludeandexcludeforWindowsclientsonpage 145

174

Chapter 4

Noteaboutexcludingthesystemstateforclientaliases
Whenyourunabackup,createabackupschedule,orcreateaselectionlist,you havetheoptiontocheckanExcludeSystemStatecheckboxtobackupdataand notincludeOSprotection.Ifyouarebackingupanaliasedclient,youmustdecide whethertoincludeorexcludethesystemstate.Keepthefollowinginmind:

DONOTEXCLUDEthesystemstateontheclientthatcontainstheoperating
systemvolumes(thisistypicallytheC:volume). ForallotherclientaliasesthatdonotincludetheOSvolume,doNOTinclude thesystemstate. Onlyoneclientaliascanincludethesystemstate. TherestorefailsifthesystemstateisnotincludedintheOSvolumeandifthe systemstateisincludedintheclientaliasesthatdonotincludetheOSvolume.

Viewingbackups
Tocheckthestatusofbackups,youcanviewrunningjobsasdescribedin Monitoringrunningjobsonpage 182,orviewcompletedjobsasdescribedin theseprocedures:

Toviewbackupscompletedinthelast7days Toviewbackupsbymonth Toviewbackupdetails Tofindfilesinbackups Tobrowsethecontentsofabackup Forreplicatedbackups,seeViewingreplicatedbackupsonpage 282. Note:Ifyourbackupsystemisreplicatingtoatarget,besureyouarenotworking inReplicationView.Thisviewdisplaysreplicatedbackupsonthetargetsystem ratherthanonesstoredonthelocalbackupsystem. Toviewbackupscompletedinthelast7days 1 SelectthebackupsystemintheNavigationpaneandclickStatus. Note:Theblueservericondisplaystotheleftofeachbackupsysteminthe Navigationpane. 2 3 SelectthePast(HistoricalStatus)blind. TheSystemStatuspagedisplaysasnapshotofbackupsforeachprotectedclient overthelast7days.Failuresarered,warningsyellow,andsuccessgreen.

Backups

175

HoveroveranysquareintheBackup:7DaySnapshotcalendarforabackup summaryofagivenclientandday. 4 SelecttheBackup:Last7Daystabbelowforalistofcompletedbackupjobs.

Clickanycolumnheadtochangethesortorder. Tofilterbyclient,selecttheclientintheleftNavigationpane. DoubleclickabackuptoviewadditionaldetailsontheBackupInformation


page.SeeBackupInformationpageonpage 177formoreinformation. Toviewbackupsbymonth 1 SelectaclientintheNavigationpaneandclickStatus. Tip:Forvirtualmachineson7.1andlatersystems,youcanfilterfurtherby selectingaVM.TodisplayVMsundertheHyperVclientorESXserver,clickthe GeariconatthebottomoftheNavigationpane,checkShowVirtualMachinesin NavigationTree,andclickConfirm. 2 3 SelectthePast(HistoricalStatus)blind. TheComputerStatuspagedisplaysasnapshotofbackupscompletedforthisclient duringthecurrentmonth.Failuresarered,warningsyellow,andsuccessgreen.

Hoveroveranysquareinthemonthlycalendarforabackupsummaryofa
4 givenday. Clickthescrollarrowsabovetoviewanothermonth. SelecttheBackup:Monthtabbelowforalistofcompletedbackupjobs.

Clickanycolumnheadtochangethesortorder. DoubleclickabackuptoviewadditionaldetailsontheBackupInformation
page.SeeBackupInformationpageonpage 177formoreinformation. Toviewbackupdetails 1 SelectaclientintheNavigationpaneandclickStatus. Tip:Forvirtualmachineson7.1andlatersystems,youcanfilterfurtherby selectingaVM.TodisplayVMsundertheHyperVclientorESXserver,clickthe GeariconatthebottomoftheNavigationpane,checkShowVirtualMachinesin NavigationTree,andclickConfirm. 2 3 4 SelectthePast(HistoricalStatus)blind. UndertheBackup:MonthorBackup:Last7Daystab,clickthedesiredbackup. DetailsdisplayontheBackupInformationpage.

Clickanycolumnheadtochangethesortorder.
176

Chapter 4

DoubleclickabackuptoviewadditionaldetailsontheBackupInformation
page.SeeBackupInformationpagebelowformoreinformation.

BackupInformationpage
ItemsontheBackupInformationpagearedescribedhere.Notethatsomeitems displayforspecificapplicationbackupsonly.
Category Application Description Application version. For example, VMware, Hyper-V 2008 R2, SQLServer 2008, Exchange 2010, SharePoint 2010, or Oracle 11. Does not display for file-level backups. Unique ID assigned to the backup. Average backup speed, in bytes per minute. Applies to Hyper-V only. Indicates whether the VM is configured in a cluster. Indicates whether the backup job completed. Displays for application backups only.

Backup ID BytesPerMinute Cluster

Complete Database

For VMware or Hyper-V, contains the VM name. For Exchange, contains the database or storage
group name.

For SQL, contains the database name. For Oracle, contains the instance name.
Date Device Date and time the backup started. Device where the backup is stored. Default is D2DBackups. Indicates whether metadata is contained in the backup. Metadata is required for Windows Instant Recovery. Name of the backup system.

DiskMetadata

System

Backups

177

Category Elapsed Time

Description Duration of the backup job in hh:mm:ss format (hours, minutes, seconds). Duration of the backup job, in seconds. Indicates whether this backup is encrypted. Number of files contained in the backup. Average number of files backed up per minute. Applies to Hyper-V only. Virtual machine ID. Displays for application backups, except for Exchange and Oracle.

ElapsedTimeRaw Encrypted Files FilesPerMinute GUID Instance

For VMware, name of the vCenter or ESX server


hosting the guest VM. server.

For Hyper-V, name of the guest VM. For SQL, name of the client running the SQL For SharePoint, instance is Farm.
Instance ID Displays for application backups only. ID associated with the instance. Indicates whether this is the most recent backup of this type for this client. Name of the client whose data was backed up. Name of the associated parent backup. Command issued by the backup system to run this job. Indicates whether this is a replicated backup.

Last

Name Parent Raw Command

Replicated

178

Chapter 4

Category Result (Operation)

Description Status of the backup job: success, warning, or failure. Status of the verify: success, failure, or none (if no verify was performed). Backup size, in megabytes. For replicated backups only, size of the sync object. Indicates how much data was replicated. Indicates whether this backup was synthesized. Synthetic backups are initiated automatically by the system. For clients protected with the incremental forever strategy, synthetic system-side masters and/or differentials are created periodically. Synthetic masters and differentials may also be created for archiving and legacy vaulting, as incrementals are not archived or vaulted directly. For more information, see KB980. Indicates whether this is a backup of a VMware template. Backup type. File-level backup types include full/master, differential, incremental, selective, and bare metal. Application backup types vary by application. Application name is included in the backup type name (for example, Exchange Full). Messages logged during backup. Click to restore files. Applies to file-level backups and the following application backups: VMware, Hyper-V, and Oracle. Applies to Exchange only. Click to restore items using Kroll.

Result (Verify)

Size (MB) SyncSize

Synthesized

Template

Type

Raw Output Restore Files

Restore Items

Backups

179

Category Restore

Description Applies to application backups only. Click for nongranular restore of the backup. To restore the entire application to a specific point in time, use the main Restore menu instead. See Basicstepsfor restoringbackupsonpage 323. Click to delete the backup and any associated dependent backups. Click to exit the Backup Information page.

Delete Backup

Cancel

Tofindfilesinbackups Usethisproceduretosearchforfilesinaclientsbackuphistory. 1 2 3 ClickStatusonthemainmenu. SelectaclientintheNavigationpaneandclickShowSearchOptionsabovethe calendar. Entersearchcriteria.Searchbyname,date,size,oranycombination.

NameTosearchbyname,checktheNameboxandentertext.Forquickest
search,includetheentirepath.Wildcards,suchas*and?,canbeusedin thefilename. An*representsanynumberofcharactersbeforeoraftertheenteredtext. Forexample,*.docreturnsallfilesendingwiththe.docextensionandauto* returnsallfilesstartingwithauto. A?representsjustonecharacter.Forexample,ifthereareanumberoffiles namedfile1,file2throughfile12,file13,file?returnsfile1throughfile9and file??returnsallthefilesuptofile13. Searchesthatfullyspelloutthepathandfilenamecanbeexecutedquickly.The useofwildcardswillincreasethetimerequiredtoreturntheresultsasthe searchmustgothrougheveryfileinthebackuptolocatethematch.

RegularExpressionCheckthisboxtosearchusingregularexpressions.
Regularexpressionsareusedtosymbolicallyrepresentpatternsthatcanoccur intext.Likewildcards,certaincharactershavespecialmeaningwhenspecifying thetextthatcanmatchtheregularexpression.Thesyntaxofregular expressionsismorecomplexandpowerfulthanwildcards.Thistechniqueonly

180

Chapter 4

needstobeusedifwildcardsaretoolimitedtoconstructasufficientlyprecise searchpattern.Somegoodreferencesabouttheuseofregularexpressionscan befoundintheonlineencyclopedia,Wikipedia. Field IgnoreCase Date Size(KB) Include Exclude Description
Check this box to search for filenames regardless of case. Check this box to search for files modified within a certain time frame. Calendar icons are provided to assist with date selection. Check this box and enter a range in kilobytes to narrow the search by file size. Select to return files that meet the search criteria you entered. This is the default setting. Select to return all files other than ones that meet the search criteria you entered. Entered criteria is used to exclude files from search results.

4 5

ClickSearch. FilesmatchingthespecifiedcriteriadisplaybelowontheSearch:FileResultstab. Doubleclickafiletoviewmoredetails.

Todeletethisbackupandanyassociateddependentbackups,clickDelete
Backup.

ToexittheBackupInformationpage,clickCancel. Torestore,proceedtothenextstep.
6 Torestorefromthisbackup,clickRestoreFilesandsetrestoreoptions,thenclick Restore.

Bydefault,thefileyouselectedaboveinStep5istheonlyitemselectedfor

restore.Toaddfiles,browsetheFileSelectionListintheRestorefromBackup ofClientpaneandselectfiles,folders,andvolumestoadd.Toexpandavolume orfolder,clickthearrowtoitsleft.Filesandfolderscanbeviewedintheir defaultorshortformatbyselectingtheappropriateradiobuttonnexttoFile View. ClickShowAdvancedFileSelectiontoselectfilesbydraganddrop. ChangetheFileExclusionoptionsortheAdvancedExecutionoptionsas desired.Fordetails,seeRestorefileexclusionoptionsonpage 325and Advancedexecutionoptionsforrestoreonpage 325.
181

Backups

Tobrowsethecontentsofabackup 1 2 3 4 5 6 SelectaclientorapplicationintheNavigationpane. SelectReports>Backups. LocatethedesiredbackupontheBackupsReport.Ifnecessary,selectanewdate rangefromthedropdownatthebottomofthepagetodisplaymorebackups. Selectthedesiredbackupinthegridbyclickingthatrow. IntheReportEntrywindow,clickDetailsforalistofitemscontainedinthebackup. ClickClosetoexittheDetailswindow.

Monitoringrunningjobs
Toviewandmanagequeuedandrunningbackupjobs 1 SelectthebackupsystemorclientintheNavigationpaneandclickStatus. Selectingtheclientdisplaysonlyjobsrunforthatclient.Selectingthebackup systemdisplaysallqueuedandrunningjobs. 2 OnthesideoftheStatuspage,clickthePresentblind. OnthePresentpage,allqueuedandrunningbackupsfortheselectedsystemor clientdisplay.Thefollowinginformationisgivenforeachjob: Backupstatusesareclassifiedasfollows:
Field ID Client DB/VM Job Type Status Job Comment Description Backup ID The client for which the job is executing. Shows the virtual machine or application instance, if applicable. The type of job. The real-time status of a task is displayed in the Status column. Backup performance and progress can be monitored in the Job Comment column.

182

Chapter 4

Field Successful

Description This signifies that all the files have been backed up successfully.

Warning: This may signify an incomplete backup. Files open at the time of backup or ones that do not have the right permissions do not get backed up. All the other files back up successfully. If less than 0.01% of the total number of files fail to backup, the status is reported as success.
Failed This signifies that the backup failed for some reason. The failure can be viewed by clicking on Detail. If more than 0.01% of the total number of files fail to backup, the job fails. This signifies an unexpected abort of the backup process. The cause can be seen by clicking on Detail. This status is seen when a user terminates a backup process.

Proc Aborted

Cancelled

Whenarowisselectedinthetable,detailsconcerningthatjobdisplaynearthe bottomofthepage.Detailsincludethenameofthejob,thejobID,thejobtype, theclient,thedevice,thestatusofthejob,andthecomment. Atthebottomofthepageareasetofcontrols:

Control
Auto Refresh

Description
Check this box to refresh the page every n seconds, where n is the number entered. The number of seconds between automatic refreshes if the Auto Refresh box is checked. This button toggles starting and stopping the Tasker process, which manages jobs. If there are any modifications to the backup systems configuration settings, Tasker must be stopped and re-started for changes to take effect. To access Tasker, click the Advanced Options checkbox. Click to manually refresh the page.

Refresh Interval Advanced Options > Stop Tasker/Start Tasker

Refresh Now

Backups

183

Control
Suspend/ Resume Terminate Close Multi-job selection

Description
Select a job in the list and click this button to suspend an active job(s) or to resume a suspended job(s). Click this button to terminate a selected job(s). Click to close this view and return to the Past page. Use Shift+Click to select contiguous rows. Use Ctrl+Click to select non-contiguous row. For best results, disable auto-refresh before acting on multiple jobs. Once the action is complete, click Refresh Now or check AutoRefresh to see job statuses.

Standardrestoreprocedures
Toaccessthestandard,nontimebasedrestoreinterface,selectStatuslocatedon theMainmenuoftheadministratorinterface.TheStatusinterfacealsoprovides alistofallbackupsforaparticularsystem.Torestoreabackup,thebackupmust beselectedfromthelistofavailablebackupsundertheBackup:Last7Daystab.If aclientisselectedintheleftnavigationpane,tabsdisplayingbackupsfortheLast 7Daysandforthemonthwillbepresent.Whenviewingthestatusofaclient, scrollthecalendarbacktofindbackupscapturedinmonthspriortothecurrent month. Whenabackupisselected,aninformationpageispresentedwhichprovides detailsofthebackup.Fromthispage,therestoreoperationcanbeinitiated. Backupscanalsobedeletedfromthispage.Whenyoudeleteamasterbackup, anyassociateddifferentialandincrementalbackupsarealsodeleted. WhenanApplicationtypebackupisdeleted,allbackupsinthegroupassociated withtheapplicationbackupwillalsobedeleted. Onceallthesettingshavebeenmade,clickRestoreatthelowerrightcornerofthe windowtostarttherestoreprocess.Apopupdialogwilldisplaythestatusofthe restoreprocess.Tocancelthejob,clickCancelOperation.

184

Chapter 4

WorkingwiththeBackupBrowser
UsetheBackupBrowsertoviewandmanageastoragedevicesbackups. Toviewbackupsstoredonadevice 1 SelectSettings>StorageandRetention>BackupBrowser. Thesystemsbackupdevicesdisplayinthetoppane.Thedefaultstoragetargetis namedInternal,butifothertargetshavebeenadded,theyalsodisplay.See Aboutstorageconfigurationonpage 91. Note:Bydefault,theInternaltargetincludesthedefaultdevice,D2DBackups. DevicesmaybemodifiedinSettings>StorageandRetention>BackupDevices. 2 Selectabackupdeviceintheupperpane. Allbackupsstoredonthatdevicedisplayinthelowerpane.Ifdesired,clickRefresh toupdatethelist. 3 Toviewfinerdetailforaparticularbackup,selectitscheckbox,thenclickBackup Information. Todeletebackupsfromadevice Whenyoudeleteabackup,itislogicallydeletedandyoucannolongeraccessit. However,theamountofavailablestoragewillnotimmediatelyincreaseandmight notincreaseatall.Thebackupsphysicalblocksareremovedwhenthesystem performsaperiodicpurge.Fordeduplicatedsystems,agivenblockmightbe referencedbyseveralbackups,andunlessallofthesebackupsaredeleted,the blockisnotpurged,andyouravailablestoragespacedoesnotincrease. Caution:Thisprocedurepermanentlydeletesbackupsfromthesystem.Onceyou clickConfirm,youcannotstoptheprocess.Anyselectedbackupsanddependent backupsaredeletedfromthesystem.Forexample,deletingamasterdeletesany associatedincrementalanddifferentialbackupsinthatset.Ifanybackupsthatare settolegalholdareselectedfordeletion,awarningdisplaysaskingifyoureally wanttodeletethosebackups.Anentryintheauditlogiscreatedanytimea backupthatwassettolegalholdisdeleted. 1 2 SelectSettings>StorageandRetention>BackupBrowser. Selectabackupdeviceintheupperpane. Allbackupsstoredonthatdevicedisplayinthelowerpane.Ifdesired,click Refreshtoupdatethelist. 3 Chooseoneormorebackupsbycheckingthedesiredboxes.
Backups

185

Toselectall,checktheboxinthetitlebar.Clickagaintodeselectall. 4 SelectDeleteBackup,thenConfirm. Tosetalegalholdonabackup 1 2 SelectSettings>StorageandRetention>BackupBrowser. Selectabackupdeviceintheupperpane. Allbackupsstoredonthatdevicedisplayinthelowerpane.Ifdesired,click Refreshtoupdatethelist. 3 4 Chooseabackupbycheckingthedesiredbox.Onlyonebackupmaybeplacedon legalholdatatime. SelectLegalHoldSettings. Foraselectedbackup,allbackupsinitssetaredisplayed.Forexample,ifyou selectedanincremental,allincrementalsandtheirparentmasterareselected. 5 Dooneofthefollowing:

Tosetalegalholdononlythebackupslistedbelow,adjusttheLegalHold
SettingsForIndividualBackupsontheleft. Tosetoverallretentionandlegalholdsettingsforaclient,virtualmachine,or database,adjusttheRetentionSettingsforyourclientontheright.Theseare thesamesettingsyoucansetinSettings>StorageandRetention>Backup Retention. Thesettingsthatareineffectfortheselectedbackupsarehighlighted.Iflegalhold isconfiguredfortheclientandyousetdifferentlegalholdsettingsforabackupof thatclient,thelargerlegalholdsettingtakesprecedence. 6 ClickConfirm. Note:Informationaboutbackupsthathavebeenplacedonlegalholdcanbefound intheLegalHoldreport.SeeLegalHoldBackupsReportonpage 355fordetails.

186

Chapter 4

Chapter5 Archiving
TheUnitrendsarchivingfeatureenableslongtermstorageofdatatomany differenttypesofremovablemedia.Archivingtoexternalmediaprovidesdata protectionbyretainingolderbackupsandbyofferingthesafetyofoffsitestorage. Seethefollowingtopicsfordetails:

Archivingbasicsonpage 187 Aboutarchivemediaonpage 190 Managingarchivemediaonpage 195 Archivingbackupsonpage 200 Viewingandrestoringarchivesonpage 217 Removingandimportingarchivesetsonpage 230 Stoppingandstartingthearchiveprocessonpage 234 Archivetotapesetuponpage 234

Archivingbasics
Howdoesarchivingwork?
Archivingisdifferentthanbackingup
Backingupisnotthesameasarchiving.Backupstakeperiodicimagesofthedata, whichareretainedforashorteramountoftime.Asadditionaldataisbackedup, olderdataisremovedasneededtomakeroom.Thisprotectsdataasitchanges onaregularbasis.Theprimaryfunctionofarchivesislongtermretentionthatis takenoffsite.Archivesaretakenfrombackupsandarerestoredtobackups.You canarchiveonetimeorcreateanarchiveschedule.
187

Archiverestore
Ifanarchiveisrestored,itrestorestothebackupsystem.Thisiscalledanarchive restoreandisexplainedinthischapter.Youmustthenrestorethebackupusing thebackuprestore(SeetheRestorechapterfordetails.) Whenyouperformanarchive,youdonotselectspecific,individualfilesto archive;youspecifytheparametersofthebackupsthatyouwanttoarchive.

Purging,removing,andimportingarchivesets
Archivescanbepurgedfromthemediatomakeroomfornewones.Topurgeolder archives,usethepurgeandretentionsettingswhenyouscheduleorrunan archive.Theresultingarchivesarepurgedautomaticallybasedontheseattributes. Eachtimeanarchiveruns,thesystempurgesanyeligiblearchivesonthemedia. (SeethePurgeandRetentionsettingsinArchivesettingsonpage 203.)Howor whetheryousetuppurgingisdeterminedbyyourorganizationslegaland businessdataretentionrequirements.Oncearchiveshavebeenpurgedfromthe media,theycannolongerberetrieved.Thisisapermanentremoval. Anyexistingarchivesarealsopurgedwhenyoupreparearchivemedia.Themedia isformattedandthefilesaregone.(SeeTopreparearchivedrivesonpage 197.) Purgingisdifferentthanremovingarchivesetinformation.Whenanarchiveruns, anarchiveofeachbackupiswrittentothemedia,alongwithsetinformation describingthedata.Thissetinformationisalsostoredonthebackupsystemitself andisusedtolocatethedataduringanarchiverestore.Whenarchivedatais purged,itcannotberetrieved.Whenyouremoveanarchivesetbyselecting RemovesetintheArchiveSetInformationwindow,youremovetheset informationfromtheUnitrendssystem,butthedataremainsonthearchive media.

188

Chapter 5

Therefore,ifyouremovethearchiveset,youhavetheoptiontoimporttheset informationfromthemediaifnecessary.Youcanalsoimportanarchivesetfrom anothersystem,ifthearchivesetisnotencrypted.Ifthearchivesetisencrypted, youmustperformadisasterrecoverysinceeachsystemhasauniquesetof encryptionkeys.

Typesofarchives
Youcancreate:

AnOndemandarchiveonpage 211forperformingaonetimearchive
(usingtheArchiveNowselectiononthemainArchivescreen). Archiveschedulesonpage 213forperformingscheduledarchiveoperations (usingtheScheduleArchiveselectiononthemainArchivescreen).

OptionsonthemainArchivescreen
Archive Screen Option/Button Status Allows you to...

View the status of archives (at the archive set, client, and archived backup levels). Also gives you the option to perform an archive restore. Run an on-demand (one-time) archive. Set up schedules for archiving. You can also view, modify, delete, and enable/disable schedules. Manage archive media, such as preparing the media for archiving, viewing connected media (including tape location and barcode information for tape media), mounting/unmounting media, and preparing drives for off-site storage. Change archive settings, such as starting/stopping an archive, checking for legacy archive schedules, and viewing/modifying the settings for configurable media.

Archive Now Schedule Archive

Media

Settings

Archiving

189

Generalarchivingsteps
Thefollowingtableoutlinesthegeneralstepsforarchiving:
Step Managing archive media Description The archive process includes pre-archive and post-archive procedures for managing the media:

Confirming the media type by viewing the connected


Archiving

media. If using tapes with barcodes, this includes viewing the tape library to determine tape locations. Preparing the archive drives (purging existing data and formatting the drive). Mounting or unmounting the media (to prepare to write to it or to remove it). Removing archive drives for off-site storage and also adding a drive to a multi-drive system if you require more space. Viewing archives.

Archiving includes selecting your archive settings (including date range settings), and performing a one-time archive or setting up an archive schedule. You can also remove or import archive sets. (You can import an archive set from another system, as long as it has not been encrypted. If the archive set has been encrypted, you must perform a disaster recovery procedure.) Restoring the archives from the archive media to the system as backups. Stopping the archive process, if needed, and restarting it.

Restoring

Stopping/starting the archive process

Aboutarchivemedia
ThelistofsupportedarchivemediaincludesWesternDigitalandSeagatehard drives,eSATAandUSBdevices,andtapedrives.Itmaybepossibletouseother manufacturersmedia,butitsnotguaranteedtowork.Alldisksserialnumbers mustbeuniquewithinasetforarchivingtofunctionproperly.

190

Chapter 5

Determiningthetypeofmediatouseisoneofthefirststepsinpreparingto archivedata.Afterdecidingonthemediatype,makecertainithasbeenproperly installedandconfiguredaccordingtothemanufacturersinstallationinstructions. Inaddition,confirmthatthemediaisaccessibleandavailableforarchivingprior toinitiatingarchiveoperations.

Archivemediatypes
Thefollowingtypesofarchivemediaaresupported: Recoveryarchiveunit eSATAorUSBdevice Tapedrives&autoloadersystems(D2D2T) Externalstoragedevices Singlediskarchive(SDA)media Multidiskarchiveunit(MDA) NotallmediatypesaresupportedoneveryUnitrendssystem.Foralookatwhich mediatypesyoursystemsupports,seetheUnitrendsCompatibilityand InteroperabilityMatrix. Note:Youcannotarchivetoopticalmedia(CDorDVD),butyoucanarchivetoa harddiskandthenconvertittoopticalmedia.

Recoveryarchiveunit
TherecoveryarchiveunitisbasedonfoureSATAconnecteddrivesinasingle enclosure.Theunitmaybeattachedtoasinglebackupsystemortomultiple systemssimultaneously.Thisconfigurationallowsarchivingtooccurfromoneor moresystems.Therecoveryarchiveunitisattachedtoabackupsystemusingan eSATAcable. Benefitsoftherecoveryarchiveunitinclude:

Supportfor3.5SATAharddiskdrives,upto4TB HotswapcapabilityforrapidmultiHDDsaccessandexchange
Archiving

191

SupportforeSATAtransferspeedupto3Gbps
Whiletherecoveryarchivesolutionoffersmanybenefits,thefollowing restrictionsandlimitationsalsoapply:

Alldriveswithintherecoveryarchiveunitthatareattachedtoasinglesystem
musthaveequalcapacity.Drivesmaybeofvaryingcapacityiftheyareattached todifferentsystems. Alldriveswithintherecoveryarchiveunitthatareattachedtoasinglesystem aretreatedasonelogicalvolume.Dataiswrittenacrossalldrivesinthelogical volume.Onceyouarchivetoalogicalvolume,thesedrivesmustbetreatedas asingleentity.Removingadrivefromthelogicalvolumecorruptsarchived data. Datathathasbeenarchivedon3Warecannotberestoredviatherecovery archiveunit. Caution:Besuretounmounttherecoveryarchiveunitbeforedetachingitfromthe backupsystemorbeforepoweringitoffwhileattachedtothesystem.Failureto unmounttheunitproperlymayresultindatacorruption.

eSATAorUSBdevice
Externaldockingunitsmaybeusedtoprovidearchivingcapabilityforselect Unitrendssystems.Asinglediskdeviceisinsertedintothedockingunitandthe dockingunitisconnectedtothesystemusinganeSATAorUSBcable.Features include:

Supports3.5SATAharddiskdrives,upto4TB HotswapcapabilityforrapidmultiHDDsaccessandexchange SupportseSATAtransferspeedupto3Gbps Compactdockingstationdesignmaximizesheatdissipationandexhaust Thedockingunitusesa12VDCpoweradapter Note:YoucanuseUSBdrivesonVMwareUEBsystems(seeKB1443fordetails). YoucanuseeSATAonallothersystemsandVMwareUEBsystems.(Tapearchiving isnotsupportedonUEBsrunningonanESXiversion5.0orabove,dueto limitationsinVMware.) AdditionalconsiderationsforUSBdevices Unitrendssupportsavarietyof2.0compliantUSBdockingunits.Notethe followingwhenarchivingtoaUSBdevice:

Theusablesizeofagivendrivevariesbydisksizeanddocktype. Fordisksupto2TB,usablesizeisequaltoactualdisksizeregardlessofthedock
type.

192

Chapter 5

Fordiskslargerthan2TB,usablesizemaynotmatchtheactualdisksize.For
detailsbydocktype,seeKB1443.

Tapedrives&autoloadersystems(D2D2T)
InordertousetheD2D2Tsystem,itmustbeconfiguredforusewiththeUnitrends system.Becausevarioustapedrivesandautoloadersbehaveindifferentways,the Unitrendssystemisdesignedwithconfigurationoptionsthatmaintain compatibilityacrossarangeofproducts.Fordetailedinstructionsontheproper setupanduseoftapedevicesforarchiving,seeArchivetotapesetupon page 234. Priortorunningondemandorscheduledarchives,notetheseadditionaltape considerations:
Tape Consideration Purge option Description

The archive purge option is not supported because data cannot be changed on a tape without invalidating all later data on that tape. If the tape device is configured for hardware compression, it is recommended that you run archives without compression. Since the backup system doesnt have to compress the data, archives run more quickly. This may also extend the life of the tape device by allowing the system to stream data at a speed suitable for the drive. If the tape device is configured for encryption, archives are encrypted regardless of this setting. All tapes configured for the archive job are labeled as part of the archive and must be rotated as a set. All tapes must be available to restore data. See Managingtapeinventory onpage 200 for details. On tape devices that support barcodes, the system recognizes the barcode as soon as you insert the tape into the library. The system supports a mixed usage of tapes for barcodes.

Compression option

Encryption option

For multi-tape archives

Tape devices with barcodes

Archiving

193

Externalstoragedevices
Thefollowingexternaldevicesmaybeusedtoprovidearchivingcapabilityfor selectUnitrendssystems:

StorageAreaNetwork(SAN) NetworkAppliedStorage(NAS)
ExternalstoragedevicesmustbesetupintheStoragesubsystempriorto archiving.SeeAddingarchivestorageonpage 95. Notethefollowingarchivestoragelimitations:

ForarchivetoNAS,eachbackupsystemmustarchivetoaseparateNASshare.
HavingmorethanonebackupsystemarchivingtoagivenNASshareislikelyto causedatacorruption. ForarchivetoiSCSILUN,eachbackupsystemmustarchivetoaseparateLUN. HavingmorethanonebackupsystemarchivingtoagiveniSCSILUNislikelyto causedatacorruption. Archivalofencryptedbackupstodumbstorageisnotsupported.

Singlediskarchive(SDA)media
Thisoptionrequiresuseofasingleremovablediskforarchivingdata.Thediskis insertedintotheappropriateslotonthebackupsystem(slot5for2Uplatforms andintoslot11for3U/5Uplatforms).Oncethediskhasbeendetected,the archivingprocessautomaticallymountsandpreparesittoreceivedata.TheSDA mediaoptionisnotavailableforallsystems.Itiscompatibleonsystemswith supportforremovablediskdrives.

Multidiskarchiveunit(MDA)
The1Uexternalmultidrivearchiveunitallowsarchiveddataofupto16TB.There arefourslotsintheMDAsupportingSATAIIdrivesofupto4TBeach.Aseparate 3Warecontrollercard(9550SX4LP)isinstalledinthesystemforthesolepurpose ofattachingtheMDAtothesystem. WhentheMDAisattachedtoabackupsystemandisfullypopulated,thearchive processautomaticallyrendersittheprimaryarchivemedia.TheRAIDlevelis dependentuponthenumberofdrivesinsertedintotheunit:

1drive=RAIDsingle(jbod) 2to4drives=RAID0
ThestorageintheMDAcanonlybegrownduringsubsequentarchivejobs.Once thearchivedevicehasbeencreated(RAID)anddatahasbeenwrittentoit,the archivesetbecomesinclusive.Onlyduringthenextarchiveoperationwill
194

Chapter 5

additionaldrivesbeallowedtogrowthestorage.TheMDAandSDAarchivemedia typescannotbeusedinparallel.However,theMDAcanbeusedtorestorean archivefromaSDA.Thisfeatureisavailableonlyonsystemswithsupportfor removablediskdrives.

Managingarchivemedia
Theseproceduresassumethatthearchivedevicehasbeenproperlyinstalledand isattachedtothebackupsystemsothatthemediaisaccessibleforarchiving. Onceyouhaveconnectedthemedia,usethearchivemediasubsystem:

Toviewconnectedmedia(page 195) Toviewthetapelibraryandtapelocations(page 196) Topreparearchivedrives(page 197) Tomountorunmountmedia(page 198) Toremovearchivedrivesforoffsitestorage(page 199) Toaddadrivetoamultidrivesystem(page 212) Fordetailsonmanagingtapemedia,seeManagingtapeinventoryonpage 200.

Toviewconnectedmedia Beforeyouperformanarchive,confirmthetypeofmediathatisconnected.This isalsousefulifyouwanttodisconnectorreconnectarchivemedia. Note:Youcannotarchivetoopticalmedia(CDorDVD),butyoucanarchivetoa harddiskandthencovertittoopticalmedia. 1 2 LogintotheUnitrendssystemandselectArchive>Media. Thesystemchecksforconnectedmedia.Ifnecessary,clickrescanformedia. ConnectedmediadisplayintheArchiveMediaarea.Thesedetailsaregivenfor eachmediainstance:


Column Light bulb icon [media not prepared or already initialized] Description Gray indicates the media has not yet been prepared (see Topreparearchivedrivesonpage 197). Yellow indicates it is initialized and ready for use.

Archiving

195

Column Disk icon [mounted or not mounted]

Description Hover on the icon to see if this media is mounted or not mounted. For details, see Tomountor unmountmediaonpage 198. An indicator as to whether the media is idle (green check mark) or actively archiving or restoring (red X). The name of the archive media. The archive media label. An indicator as to whether the media is idle or active. The total size of the media in GB. The available space on the media in GB. Media serial number(s). For multi-drive units, e.g., the recovery archive, this may be a series of up to four serial numbers.

Media Idle indicator

Name Label Activity

Size (GB) Free (GB) Serials

Ifdesired,clickrescanformediabelowtorefreshthelist. Toviewthetapelibraryandtapelocations Thisprocedureallowsyoutoviewthecurrentstatusoftapesand,ifapplicable, thebarcodesassociatedwiththetapes.Whenarchiving,thisviewallowsyouto findtheslotlocationsforthetapesandalsoensuresthatyouhavespace.See Tapebarcodesonpage 235formoreinformation. Note:Ifyourtapedevicedoesnothaveabarcode,youcanlocatetapesmanually usingthesystemgeneratedserialnumber.SeeWhattodoifyourtapedevice doesnothaveabarcodeorastandardbarcodeformatonpage 236.

1 2

SelectArchive>Media.YouseetheconnectedmediaintheArchiveMediacenter stagearea. Ifnecessary,clickrescanformedia.

196

Chapter 5

ClickthetapemedialineintheArchiveMediacenterstagearea.Noticethatthe TapeLibrarybuttonatthebottomofthescreenisenabled. Note:Iftherearenotapelibrariesavailable,thisbuttonisdisabled. ClicktheTapeLibrarybutton.YouseetheTapeLibraryInformationscreen.


Field Status Slot Description Indicates if there is a tape in the drive (empty or full). The slot number associated with the tape. Scroll down to see additional slots, if applicable. A check-mark or X indicates if the slot is full (contains a tape) or not. Hover over the symbol for the description. The barcode number associated with the tape slot. If there is no number, the corresponding tape does not have a barcode or the system could not read the barcode. Barcodes can be up to 99 digits. For lengthier numbers, you can hover over the barcode number area to see the full number.

Tape Available?

Barcode

Clickonandoffthecolumnheadingstosortthetable,ifneeded.Clickthetriangle totherightofthecolumnheadingifyouwanttosortagain(inascendingor descendingorder). ClickClosewhenyouaredone. Topreparearchivedrives Fortherecoveryarchiveunit,eSATA,andUSBarchivedevices,itisrecommended thatyoupreparenewdrivesbeforetheyareusedforthefirsttime.Onceyouhave archivedwiththedrives,youcanpreparethemagainifdesiredtopurgeallexisting data.Theprepareoperationisonlypossibleifthemediaisunmounted. Thisprocedureassumesthatthearchivedevicehasbeenproperlyinstalledandis attachedtothebackupsystemsothatthemediaisaccessible. Note:Fortipsonsettinguptherecoveryarchive,seeRecoveryarchiveuniton page 191. Caution:Thisprocedurepurgesanyexistingdataandformatsthedrive.

Ifnecessary,insertanewdrive(s)intothearchivedevice.
197

Archiving

LogintotheUnitrendssystemandselectArchive>Media. Thesystemchecksforconnectedarchivemedia.Torefresh,clickrescanfor media. ConnectedmediadisplayintheArchiveMediaarea.Fordetails,seeToview connectedmediaonpage 195.

3 4

SelectthemediaintheArchiveMediaarea.AMediaLabelfielddisplaysatthe bottomofthescreen. Enteramedialabelforthisdriveorgroupofdrives. Labelsmaybeamaximumof12alphanumericcharactersandmayincludean underscore.Useadescriptivelabelingsystemsoyoucaneasilylocatethedrive(s) intheeventthatthisdataisrequiredforarestore. Formultidrivesystems,youmayloadoneormoredrives.Archivesarewritten acrossallavailabledrives.Onceyouarchivetomultipledrives,youmusthaveall drivestorestoredataasthesystemtreatsthesetasasinglelogicalvolume.See Toaddadrivetoamultidrivesystemonpage 199.

5 6

Ifthemediayouselectedistape,youseeanadditionalTargetSlotsfieldbelowthe MediaLabelfield.Enterthetargetslotsforthetapeortapesyouwanttoprepare. ClickPreparebelow. Caution:Thisoptionshouldbeusedwithextremecaution.Anyexistingdatais removedfromthemedia.

ClickYestoconfirmthatyouwishtopreparethemedia. Thesystempurgesanyexistingdataandformatsthedrive(s)withtheUnitrends filesystem.Thelightbulbiconchangesfromgraytoyellow,indicatingthatthe drive(s)isnowreadyforuse. Tomountorunmountmedia Thearchiveprocessautomaticallymounts,writesto,thenunmountsthetarget media,soitisnotnecessarytomountorunmountmanuallytorunanondemand orscheduledarchivejob.Ifyouneedtomountorunmountmanually,suchasto viewarchivesetscontainedonagivenmedia,usethisprocedure.Mediamustbe unmountedbeforeremovingdrives(seeToremovearchivedrivesforoffsite storageonpage 199fordetails).

LogintotheUnitrendssystemandselectArchive>Media. Thesystemchecksforconnectedmedia.Ifnecessary,clickrescanformedia.

198

Chapter 5

ConnectedmediadisplayintheArchiveMediaarea.SeeToviewconnected mediaonpage 195fordetails. Atthebottomofthepanethereareseveralbuttons.Thesebuttonsbecomeactive orinactivedependinguponthestateofthemedia.

3 4

Selectthedesiredmedia. ClickMountorUnmountbelow. Thediskiconchangesindicatingthatthemediaisnowmounted(green)orisno longermounted(red). Toremovearchivedrivesforoffsitestorage

Verifythatmediaisnotmounted.SeeTomountorunmountmediafordetails. Normallymediaisonlymountedwhilearchivejobsarerunning. Caution:Youshouldalwayschecktobesuredrivesarenotmountedsincepulling mounteddrivescanresultindatalossandcorruption.

Pullthedrive(s)andbesureitislabeledforeasyidentification. Formultidrivesystems,archivesarestripedacrossalldrivesintheset,sobesure tostorethemtogetherasalldrivesareneededtorestoreanyarchiveddata. Ifyoupulltapeswithbarcodes,thesystemautomaticallyreadsthebarcodeswhen youloadthetapebackintothedriveforarestore.Fortapeswithoutbarcodes,you musttrackthetapesusingthesystemgeneratedserialnumber. Toaddadrivetoamultidrivesystem Formultidrivesystems,archivesarewrittenacrossallavailabledrives.Itis importanttokeepthisinmindwhendefiningyourarchivestrategy.Ifyourarchive setgrowsandyouneedtouseadditionaldrives,dooneofthefollowing:

Addoneormorenewdrivestotheexistingsetandpreparethemasdescribed
inTopreparearchivedrivesonpage 197.Preparingthedrivescreatesanew logicalvolumebutpurgesalldatafromtheoriginaldrives.Forexample,you hadbeenarchivingtotwodrives.Youaddathirddriveandprepareit. Subsequentarchivesarewrittenacrossallthreedrives,butolderarchivesthat hadbeenstoredontheoriginaltwodriveswerepurgedduringtheprepare operation. Removeexistingdrivestoretainarchiveddata,theninsertanewsetofdrives andprepare.Fordetails,seeToremovearchivedrivesforoffsitestorageon page 199andTopreparearchivedrivesonpage 197.

Archiving

199

Managingtapeinventory
Considerthefollowingwhenmanagingtapeinventory:

Torestorefromtapeswithoutbarcodes,archivemediamustbeloadedintothe
sameslotpositionaswhenthearchivewaswritten.

Ifyourtapeshavebarcodes,therearenospecialprocedureswhenperforming
arestore.Thesystemautomaticallyusesthebarcodeduringtherestore process.Ifyouhavemovedtapeswithbarcodestodifferentslots,thesystem readsthebarcodesanddeterminesthecorrectlocationofthetapes. Youcanconnectmorethanonetapedrive;however,thesystemonlyusesone tapedriveatatimeforarchiving.Theothertapedriveordrivesmustbe disabled.Youcanswitchbetweenthem,aslongasonlyoneofthemisactive. Formultitapearchives,alltapesconfiguredforthearchivejobmustbepresent torestoredata.Thisisthecaseevenifagivenarchivewaswrittentoonlya subsetoftheseconfiguredtapes. Alltapesconfiguredforagivenarchivejobmustberotatedasaset. Priortopullingatapewithoutabarcode,gotoArchive>Mediaandnoteits systemgeneratedserialnumber.Whenyoupullasetoftapes,besureto physicallylabeleachtapewiththemedialabel(serialnumber)andslotnumber forspeedyrecovery. Priortopullingatapewithabarcode,gotoArchive>MediaandclickTape Libraryatthebottomofthescreen.(Thisbuttonisenabledifthemediais tape.)Youcanviewslotnumbers,barcodenumbers,andotherinformation. Whenyoupullasetoftapeswithbarcodes,thesystemautomatically recognizesthebarcodeswhenyouinsertthetapesbackintothelibrary.(See Toviewthetapelibraryandtapelocationsonpage 196.) TapearchivingisnotsupportedonUEBsrunningonESXiversion5.0orabove, duetolimitationsinVMware.

Archivingbackups
Archiveyourbackupstoremovablestorageusingtheseprocedures.Youcanrun archivesondemandandsetupanarchiveschedule.Besuretoreviewthe ArchiveconsiderationsandArchivesettingssectionscarefullybeforerunning archives. Note:Whenyouperformanarchive,youdonotselectspecific,individualfilesto archive;youspecifytheparametersofthebackupsthatyouwanttoarchive. Seethefollowingfordetailsaboutarchivinginformation:

Archiveconsiderationsonpage 201helpful,generalarchiveinformation Archivesettingsonpage 203fieldleveldescriptionswhenrunningarchives


200

Chapter 5

Recommendeddaterangestrategiesonpage 207descriptionsand
examplesofdaterangestrategies

Schedulingstrategiesfortapearchiveonpage 210specialarchiving
informationregardingtapes Ondemandarchiveonpage 211stepsforperformingaonetimearchive Archiveschedulesonpage 213stepsforperformingscheduledarchive operations

Archiveconsiderations
Considerthefollowingwhenarchivingbackups:
Archive Consideration Backup must be successful Details Only successful (green) backups are eligible for archiving. Failed (red) backups and those that ran with warnings (yellow) are not archived. You must select at least one client and backup type or one local directory to create an archive set. To archive backups successfully, the media must have adequate storage space. In addition to estimated archive size and free space on the media, the overwrite, purge, and retention settings are factors in determining space requirements for a given archive job. See the table below for descriptions of each. When archiving with the Overwrite or Purge option and adequate space is not available, the job fails immediately and no archive set is created. When archiving without the Overwrite or Purge option and adequate space is not available, archives are appended to any existing archive sets until the media is full. The resulting failed archive set contains a subset of the desired backups. Appending backups to the archive media allows a larger set of backups to be maintained on a single set of drives. However, plans should be made to rotate drives on a regular basis. This reduces the risk of data loss in the event of hardware or drive failure. An alert/trap is sent when the media is at least 70% full.

Archive set selection must be correct Adequate storage space is required

Using/not using the Overwrite or Purge option if adequate space is unavailable

Archiving

201

Archive Consideration What happens to subsequent sets if the backup is already archived on the media

Details If a given backup is already archived on the media, any subsequent sets do not include this backup. For example, Set1 includes Client1s newest master backup. To create Set2, an archive of last master backups is run for Client1, Client2, and Client3. Set2 contains two backups: the Client2 master and the Client3 master. The Client1 master is not included as it is already present on this media in Set1. Unitrends system metadata is archived in each set. In the event of a system failure, use this archive to restore the Unitrends system configuration, schedules, and other settings. (You will see System Metadata File listed under sets for backups and archives.) For each client in an archive schedule, incrementals are synthesized into a differential each day. This synthesis only occurs for clients that are in an archive schedule. Synthesis does not run for on-demand archives, although on-demand jobs do contain any synthetic differentials if the incremental/differential backup type is selected. On tapes devices that support barcodes, the system automatically recognizes the barcode when you insert the tape into the library. You can view the tape details and tape location. You can also designate the target slot location when performing an archive.

System metadata included in the archive

File-level incrementals are not archived directly

The barcode feature for tapes automates locating tapes and facilitates archive slot selection

Archivingreplicatedbackups
YoucanarchivereplicatedbackupstoarchivemediasuchastheRecoveryArchive Appliance,tape,NAS,oreSATAdrives.Theprocessissimilartoarchiveprocedures onasourceUnitrendssystem.Afterconnectingyourarchivemediatothe replicationtarget,clicktheGeariconatthebottomoftheNavigationpane,check ShowReplicationViewintheNavigationtree,andclickConfirm.Thenselectthe sourceintheNavigationpane.WheninReplicationView,followstandardarchive procedures.

202

Chapter 5

Archivesettings
Eachtimeanondemandorscheduledarchiveruns,anarchivesetiscreated containingbackupsthatfitthespecifiedcriteria.Thesettingsyouchoose determinewhichbackupsarearchived,theattributesofthearchivescreatedin thisrun,andhowanyexistingarchivesonthemediaarehandled. Thefollowingtablesprovidesarchivesettingdetailsthatyouenterwhenyou performaonetimearchiveorsetuparchiveschedules.

Ondemandarchiveonpage 211forperformingaonetimearchive Archiveschedulesonpage 213forperformingscheduledarchive


operations.
Setting Date Range Description Dates of the backups to be archived in this set. (This is a drop-down list.) By default, the last successful backups of the chosen types and clients are archived. (See Recommendeddaterangestrategieson page 207 and Schedulingstrategiesfortapearchive onpage 210, if applicable, for additional information.) The following options are available in the Date Range drop-down list:

Last Backups - Archives the last successful backup for

each type and client selected. Any associated dependent backups are also archived, as described in BackupTypestoArchive below. Custom Days - Archives backups that ran in the last X days for each type and client selected. Calculated as now minus X days. Last 7 Days - Archives backups that ran during the last 7 days. Calculated as now minus 7 days. Last 30 Days - Archives backups that ran during the last 30 days. Calculated as now minus 30 days. Last 12 Months - Archives backups that ran during the last 12 months. Calculated as now minus 12 months. Custom Date - Archives backups that ran during the custom date range. Includes backups run on the specified From and To dates.

Clients to Archive

Clients whose backups will be archived in this run.

Archiving

203

Setting Backup Types to Archive

Description Backup types included in this run.

Note: File-level incremental backups are not archived directly. Instead, they are synthesized into differentials. See KB980 for details.
For the Last Backups Date Range only, any dependent backup types in the chain are automatically selected to enable restore from archive. For example, selecting Incremental includes the associated master and any other required incrementals and differentials. For other Date Range selections (such as Custom Days or Last 7 Days), only backups that ran on those dates are included. Dependent backups that ran outside of the specified dates are not archived.

Target of Archive

Archive media to which this set will be written. Click to scan for connected media. Choose a single target from the list.

Note: If using a recovery archive unit with a single


drive, it will show as eSATA when scanning for a target device. Archive Options - Overwrite Select the appropriate options. Check this box to remove all existing archives from the media before creating the new archive set. Note the following when using Overwrite:

Upon successful completion, the media contains only


the archive set created in this run.

An archive sets retention setting determines if it is

eligible for deletion. For example, if a sets retention is 7 days, it is eligible for deletion 8 days after the archive set was created. All existing sets must be eligible for deletion to use the Overwrite option. If any archive set on the media is not eligible for deletion, overwrite is not allowed and the archive fails.

204

Chapter 5

Setting - Purge

Description Check this box to purge the archive sets that are eligible for deletion due to retention dates. When an archive runs, the system purges all eligible archives.

Note: The purge option is not supported for tape


archive. The system considers the retention setting of each existing set on this media and does not delete the ones that are still within the retention window. All eligible sets are deleted. For example:

Set 1 was created 5 days ago and has a retention


setting of 7 days.

Set 2 has no retention setting. Set 3 was created 10 days ago and has a retention
setting of 7 days.

Running an archive with purge creates Set 4 and the

media now contains Sets 1 and 4. Sets 2 and 3 were purged. You should also set the retention period when using this option. The recommended setting for retention is the interval between subsequent master/full backups. Once purged, the records are gone and cannot be retrieved.

- Email Report

Check this box to select an email report of the archive operations. If this is a schedule, the archive is included in the daily schedule report. Check this box to compress backups when written to the archive (if already compressed, they are not compressed again). Check this box to encrypt the backups when written to the archive (if already encrypted, they are not encrypted again). This option is not available if your system does not support encryption.

- Compress

- Encrypt

Archiving

205

Setting - Seed

Description Check this box to run an archive to use for seeding a replication target or legacy vault. Seed archives are not equivalent to regular archives. Use only for seeding purposes.

Note: The seed option is not supported for tape


archive. Consider the following when using the Seed option:

Selective file-level restore from seed archive is not


supported. You can only restore an entire backup.

Local directory archiving is not supported. Archive Test feature cannot be used to estimate the
size of a seeded archive set. For assistance with seeding, contact your Sales representative, or see these guides: RapidSeedfor

LegacyVaultingorRapidSeedforReplicatingSystems.
Target Slots [displays only for tape media] For tapes only. The number or numbers designating the slots for the archive target. Enter individual slot values such as 3 or 5, or multiple slot values such as 1-3. To view the slot locations and other information for tapes with barcodes, see Toviewthetapelibraryandtape locationsonpage 196. Retention Period The time period to retain this set (i.e., another archive job cannot write over these archives). By default, this is zero days, but you can set it to any period of days, weeks, months or years. For auto changers, enter the number of slots to be used in the Target Slots field.

206

Chapter 5

Setting Archive Local Directory Information

Description Check to archive files and/or folders on the local Unitrends system. You see new fields at the bottom of the screen. Enter the desired directory by typing the full pathname or browsing, then click Add to move the directory to the Local Directory List. (You can also Remove or Remove All to move the directory or directories back.) Use care when selecting local directories as the entire contents of these directories is copied to the archive media. Make sure to check Encrypt (in the options at the top of the screen) if you want to encrypt these files.

Recommendeddaterangestrategies
Thissectionoffersdetailsaboutthedaterangestrategiesyoucansetwhen archiving. Note:Fortapedevices,seeSchedulingstrategiesfortapearchiveonpage 210.

Daterangesarefixedormoveovertime
WhenspecifyingtheLastxDays,CustomDays,orLastBackupsinanarchive schedule,thedaterangemovesovertime.IfyouchooseCustomDateandpick startandenddatestobearchived,thedaterangeisfixed.Whileusingspecific startandenddatesisusefulforimmediatearchiveoperations,itisnot recommendedforanarchiveschedulesincethesamebackupswouldbearchived eachtimethescheduleruns.LastxDaysisaquickwayofpickingthelastnumber ofdaysinanarchive,whileCustomDaysgivesyoumoregranularityoverthe numberofdaysofbackupsarchived.

LastBackupsandOverwriteoptionsandexamples
WhenusingtheLastBackupsdaterange,thearchivecapturescompletelast backupgroups(e.g.,forfilebasedbackups,thelastmasterbackupandall subsequentincrementalsand/ordifferentials).Incrementalsarenotarchived directly;instead,theyaresynthesizedintodifferentials. Forexample,considerabackupstrategyinwhichamasterbackupisperformed onSundayandDifferentialbackupsonMondaythroughFriday.Ifyouschedule LastBackupsarchivingonTuesday,thisfirstarchivesetcontainsthemaster
207

Archiving

backupfromSundayandthedifferentialsfromMondayandTuesday(assuming theTuesdayDifferentialiscompletepriortothearchivesetbeingwritten).If Overwriteisnotsetandifthesamemediaisused,whenthenextarchiveschedule forthisclientrunsagainonFriday,onlytheWednesday,Thursday,andFriday, differentialbackupsareincludedinthesetandnotthemaster,sinceitwas archivedtheprecedingTuesdayonthesamemedia. Usingthissameexample,ifOverwriteissetorifyouchangethemedia,theFriday archiveincludesallofthemasteranddifferentialbackupsinthelastgroup,soit includestheSundaymasterandeachoftheMondaythroughFridaydifferentials. Ifyouswitchmediaduringtheweek,itisrecommendedthatyouuseaLastxDays orCustomDaysstrategyandselectthelastspecifiednumberofdaysofbackups. ThisisrecommendedoveraLastBackupsstrategy,asLastxDaysorCustomDays archivescaptureallbackupsfromthespecifiedtimerange.

LastBackupsandretention
Whenarchivinglastbackups,notethefollowinginregardtoretention:

Theretentiondateisthelatestdateonthemediafoundbyaddingthedateof
eacharchivejobwiththenumberofretentiondays. Archivingdoesnotoverwritemediauntiltheretentiondate,toavoid accidentalerasureofpriorarchives.(Toclearthemediamanually,seeTo preparearchivedrivesonpage 197.) TheLastBackupsoptionwillarchivethelatestgroupofbackupsforeachclient, application,andinstance(i.e.SQLdatabase,Exchangegroup,etc.).Forfile levelbackups,thelastmasterandalldependentincrementalsand/or differentialsarearchived.Onlythelatestbaremetalbackupsarearchived. IfLastBackupsareusedwithappendmode,onlybackupsnotalreadyonthe mediaareadded.

Backupstrategies
Therearetwostrategiesforarchivingallbackupswithinaweekonadaytoday basis:
Option Number Option 1 Two schedules: Steps

LastBackups, run after the weekend backup, in


overwrite mode append mode

LastBackups, run each successive day backup, in

208

Chapter 5

Option Number Option 2 Two schedules:

Steps

DateRange, run after the weekend, for the last x days


(covering the weekend), in overwrite mode

DateRange, run each successive day, for the last 1


day, in append mode

BackupscanbearchivedonceaweekusingasinglescheduleineitherLast
BackupsorDateRangemode. Toprotectfromaccidentaloverwritebythearchiveprogram(forexample,the wrongsetofdrivesisrotatedintoosoon),settheRetentionPeriodto: schedulefrequency*numberofdrives

Aspecificexample:ifyouhave4setsofdrivesandrecyclearchivemediaonce
every4weeks,setretentiondaysto4weeks(1*4).

UponcompletionofyourArchiveJob,anemailissentindicatingthestatusof
thearchivejob.Thefollowingisanexampleofanemail.
Archive job 97 final status Comment: Successfully wrote 6 archives System State: written successfully Backups: 6 of 6 written Local directories: 0 of 0 written Free space on media: 837 of 931 GB Backup 2 8 23 32 68 82 Client ubuntu ubuntu ubuntu ubuntu ubuntu ubuntu Type Master Incremental Master Incremental Selective Master Backup time 05-15-10 12:33 05-15-10 14:09 05-16-10 17:44 05-16-10 23:2 05-17-10 17:10 05-17-10 23:59 Size 1990 MB 36MB 1980MB 63MN 1MB 2269MB Status Successful Successful Successful Successful Successful Successful

Archiving

209

Schedulingstrategiesfortapearchive
Therearespecialschedulingconsiderationswhenarchivingwithtape.Seethe followingtopicsformoreinformation:

Overwriteoptiononpage 210 Testoptiononpage 210 Singletapearchivesonpage 210 Autoloaderonpage 211 Multipletapedrivesonpage 211 Tapeswithbarcodesonpage 211

Overwriteoption
Ingeneral,scheduleswithoverwriteonandoffcanbeusedinstaggeredformto createnewdatasetsandappendtothesesets.Forexample,thefollowing schedulewouldresultinanewdataseteachweek:

Weekly,Monday,LastBackups,Overwritetrue:copiesweekendmaster
backupstostartoftape(s). Weekly,otherdays,LastBackups,Overwritefalse:appendsweekday differentialstotape(s). Inthisscenario,thetape(s)shouldbeswitchedbetweencompletionoftheSunday jobandthestartoftheMondayjob.Theretentionperiodshouldbesettoprotect datathroughouttherotationperiod.Iffourrotatingsetsoftapesareused,a21 dayretentionsettingwouldprotectthemediafromtheendoftheSundayjob throughtheMondayjobthreeweekslater,whenthatmediaisreused.

Testoption
Whencreatingtheschedule,usethearchiveTestoptiontoestimatetheamount ofdatathatwillfitonatapeorsetoftapes.Keepinmindthatthisnumbermay notbeaccurateduetocompressiononthedriveand/orarchiveoptions,so determiningexactlyhowmuchfitscanbeamatteroftrialanderror.

Singletapearchives
Forsingletapearchives,usinganoverwriteschemeonthesametapeeachweek isnotrecommended.Atthestartofthearchivejobthathasoverwritesettotrue, nocurrentarchivedatawillexistasaresultoftheoverwrite.Therefore,the schedulesshouldbesetupusingeitheradaterangewithtapesswitchedoutdaily, orlastbackupswithtapesswitchedoutperiodicallyastheyfillup.

210

Chapter 5

Autoloader
Anautoloaderallowsbothlargerbackupsandarchiveddatasetsthroughtheuse oftapespanningwritingabackupacrossmultipletapesandmayhelp automaterotationaswell.Aslongastheautoloaderholdsenoughtapesto maintaintwosetsofdata,theycanbeusedinascheduled,rotatingmanner.Inthis scenario,fourormoreschedules(two+pairs)areused:

BiWeekly(1),Monday,LastBackups,Overwritetrue:copiesweekendmaster
backupstostartoftape(s) differentialstotape(s) BiWeekly(2),Monday,LastBackups,Overwritetrue:copiesweekendmaster backupstostartoftape(s) BiWeekly(2),otherdays,LastBackups,Overwritefalse:appendsweekday differentialstotape(s) Thissetofschedulesstartsonacertainweekandpointstoacertainsetofslots, withtheothersetstartingonanotherweekandpointingtoadifferentsetofslots. (Thiscanbeextendedtoasmanysetsthatfitintheautoloader.)Ifscheduledin thismanner,youneverhavetotouchthetapesunlesstheyaretobetakenoffsite orstoredsecurely.SeeToconfigureanautoloaderonpage 241formore information.

BiWeekly(1),otherdays,LastBackups,Overwritefalse:appendsweekday

Multipletapedrives
Youcanconnectmorethanonetapedrive;however,thesystemonlyusesone tapedriveatatimeforarchiving.Theothertapedriveordrivesmustbedisabled. Youcanswitchbetweenthem,aslongasonlyoneofthemisactive.

Tapeswithbarcodes
Thebarcodefeatureworkswithtapedevicesthathavebarcodereadersandtapes thathavevalidbarcodes.Thetapebarcodefeatureallowsyoutoviewtape locationsandbarcodeinformation,andtoselecttargetslotswhenarchiving.See Archivesettingsonpage 203formoreinformationabouttargetslots.

Ondemandarchive
Thefollowinginstructionsprovidethebasicstepsforperformingaonetime archive.Priortorunningarchives,seeArchivemediatypesonpage 191and Archivesettingsonpage 203forconsiderationsspecifictoyourarchive environment.

Archiving

211

Torunaonetimearchive Note1:LegacyarchiveschedulesDisablealllegacyarchiveschedulesbefore usingtheadministratorinterfacetoperformarchivingfunctionality.Allowing schedulestoexecutefrombothinterfacesmayresultinarchivingfailuresor failuresduringarchiverestore. Note2:TapedeviceconfigurationFortapearchive,besurethetapedevicehas beenconfiguredasdescribedinArchivetotapesetuponpage 234before runninganarchive.Thisisaonetimeprocess,unlessthetapedeviceischanged. Note3:ReplicationbackupsIfyouarearchivingreplicatedbackupsfromthe target,switchtoreplicationviewbeforeperformingthisprocedure.After
connecting your archive media to the replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. (See Viewingreplicated backupsonpage 282 for more information.)

Followthisproceduretorunaonetimearchive: 1 2 3 ClickArchive>Mediatocheckmediadevicespriortoarchiving,ifnecessary. Fromthebackupsystem,selectthesystemthatyouwanttoarchiveinthe Navigationpane. ClickArchive>ArchiveNow. Note:SeeArchivesettingsonpage 203fordetailsabouttheentriesonthis screenthatarelistedinthefollowingsteps. 4 SelectthedaterangeinthedropdownlistintheTimeRangetoArchivefield. Note:SeeRecommendeddaterangestrategiesonpage 207formore information. 5 ChecktheboxesfortheclientsforwhichbackupswillbearchivedintheClientsto Archivelist.Toarchiveindividualvirtualmachines,selecttheESXnodeorHyper VnodeintheleftNavigationPane.VMsforthatserverarelistedandselectable forarchiving. Note:IndividualVMscannotbearchivedwithadditionalclients. 6 7 ChecktheboxesforthebackuptypesintheBackupTypestoArchivelist. SelectthearchivemediatowhichthissetwillbewrittenintheTargetofArchive area.Selectasingletarget. Ifneeded,clickScanMediatogetalistofconnecteddevices.Alistloads containingallavailablearchivemediawithconfigurablesettings.Clickonanitem inthislisttoaccessthesettingsforthatdevice.
212

Chapter 5

Checktheboxesforthearchiveoptions(forOverwrite,Purge,EMailReport, Compress,Encrypt,orSeed)inArchiveOptions.(SeeArchivesettingson page 203foradescriptionoftheseoptions.) Fortapes,enterthenumberornumbersforthetargetslotsintheTargetSlots field.(SeeArchivesettingsonpage 203formoreinformation.)

10 EnterthetimeperiodtoretainthissetintheRetentionPeriodarea.(SeeArchive settingsonpage 203foradescriptionoftheseoptions.) 11 ChecktheArchiveLocalDirectoryInformationboxtoarchivefilesandfolderson thelocalUnitrendssystem.(SeeArchivesettingsonpage 203formore information.) 12 ClickTestinthebottomrightofthescreentoseeifthearchivewillfitonthe selectedmedia.Thiscalculatesthespacerequiredbasedonyourselectedsettings andthespaceontheselectedtarget,thenyouseeamessagewiththeresults. ClickClose. 13 ClickArchivetoexecutethejob.Whencomplete,youseeamessagewiththe results. Initially,thearchiveprocessperformsachecktodetermineifanylegacyarchive schedulesexistonthesystem.Iflegacyschedulesdoexist,theycontinuetorun. UponclickingArchive,oneofthefollowingactionsapply: nolegacyschedulesfound. IflegacyCEPschedulesexist,amessagedisplaysindicatingthatlegacyCEP archivescheduleswerefoundandinstructionsareprovidedwarningnottouse theadministratorinterfacearchivesubsystemtoarchiveCEPdata. IflegacyD2D2DschedulesexistbutnoneofthemisCEP,amessagedisplays indicatingthatlegacyarchivescheduleswerefoundalongwithawarningnot tomixlegacyandnewarchiveschedules. Iflegacytapeschedulesexist,amessagedisplaysindicatingthatthe administratorinterfacearchivesystemdoesnotsupportarchivetotape. 14 Toviewthejob,seeMonitoringrunningjobsonpage 182.

Ifnolegacyarchiveschedulesexist,amessagedisplaysindicatingthatthereare

Archiveschedules
TheScheduleArchivefeatureenablesyoutoperformscheduledarchive operations.Scheduledarchivesallowyoutoarchiveonaperiodicschedulethe backupsthatneedtobecopiedtoremovablemedia.Youcanmonitorandmanage schedulessothatascheduledarchivemayevolveasyourenvironmentchanges.

Archiving

213

Usetheseprocedurestoworkwitharchiveschedules:

Toviewandmanageexistingschedulesbelow Tocreateanarchivescheduleonpage 215 Todeleteanarchivescheduleonpage 216 Toenable/disableanarchivescheduleonpage 217

Toviewandmanageexistingschedules Note:Ifyouarearchivingreplicatedbackupsfromthetarget,switchtoreplication viewbeforeperformingthisprocedure.After connecting your archive media to the


replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. (See Viewingreplicatedbackupsonpage 282 for more information.)

SelectArchive>ScheduleArchive.OntheScheduleArchivescreen,existing schedulesdisplaywiththefollowingcolumns:
Column Light bulb icon [enabled/disabled] Description This icon displays in the first column. If the light bulb is yellow, the schedule is enabled. If the light bulb is gray, the schedule is disabled. The name of the archive schedule. A text description of the schedule.

Schedule Description

The following buttons are at the bottom of the screen: New View/Modify Used to create a new schedule. Used to view and/or modify a previously selected schedule (from the pane above these buttons). Used to delete a previously selected schedule. Causes the schedule to be enabled or disabled.

Delete Enable/Disable

214

Chapter 5

Tocreateanarchiveschedule Note1:PreparearchivedrivesIfyouareusingnewarchivedrives,itis recommendedthatyoupreparethembeforerunninganarchiveschedule.SeeTo preparearchivedrivesonpage 197fordetails. Note2:ConfiguretapedeviceFortapearchive,besurethetapedevicehasbeen configuredasdescribedinArchivetotapesetuponpage 234beforerunningan archive.Thisisaonetimeprocess,unlessthetapedeviceischanged. Note3:ReplicationbackupsIfyouarearchivingreplicatedbackupsfromthe target,switchtoreplicationviewbeforeperformingthisprocedure.After
connecting your archive media to the replication target, click the Gear icon at the bottom of the Navigation pane, check Show Replication View in the Navigation tree, and click Confirm. Then select the source in the Navigation pane. (See Viewingreplicated backupsonpage 282 for more information.)

Followthisproceduretocreateanarchiveschedule: Note:Fordetailsaboutfieldleveldescriptions,seeArchivesettingsonpage 203. 1 2 3 SelectArchive>ScheduleArchive. ClickNewatthebottomofthescreen. EnteraScheduleNameand,ifdesired,aScheduleDescription. Note:SeeArchivesettingsonpage 203fordetailsabouttheentriesonthis screen. 4 5 ChooseatimerangetoarchivebyselectingaDateRangefromthedropdownlist. SeeRecommendeddaterangestrategiesonpage 207formoreinformation. CheckboxestoselectclientsintheClientstoArchivelist.Toarchiveindividual virtualmachines,selecttheESXnodeorHyperVnodeintheleftNavigation Pane.VMsforthatserverarelistedandselectableforarchiving. Note:IndividualVMscannotbearchivedwithadditionalclients. 6 7 ChecktheboxesforthebackuptypesintheBackupTypestoArchivelist. SelectthearchivemediatowhichthissetwillbewrittenintheTargetofArchive area.Selectasingletarget. Ifneeded,clickScanMediatogetalistofmediadevices.Alistloadscontainingall availablearchivemediawithconfigurablesettings.Clickonaniteminthislistto accessthesettingsforthatdevice. Note:Ifusingarecoveryarchiveunitwithasingledrive,itdisplaysaseSATAwhen scanningforatargetdevice.
215

Archiving

Checktheboxesforthearchiveoptions(forOverwrite,Purge,EMailReport, Compress,Encrypt,orSeed)inArchiveOptions.(SeeArchivesettingson page 203foradescriptionoftheseoptions.) Fortapes,enterthenumberornumbersforthetargetslotsintheTargetSlots field.(SeeArchivesettingsonpage 203formoreinformation.)

10 EnterthetimeperiodtoretainthissetintheRetentionPeriodarea.(SeeArchive settingsonpage 203foradescriptionoftheseoptions.) 11 ChecktheArchiveLocalDirectoryInformationboxtoarchivefilesandfolderson thelocalUnitrendssystem.(SeeArchivesettingsonpage 203formore information.) 12 SelectShowArchivecalendar(inthebottomleftofthescreen)todefinethedates andtimestheschedulewillrun.

DraganddroptheArchiveoperationiconontheleftontothecalendaror
doubleclickonadayinthecalendar.Selecttodaysdateorlater.Youseethe AddArchivewindow. IntheAddArchivewindow,modifyStartDate,StartTime,andRecurrence settingsasdesired. Anarchiveschedulemustcontainatleastonecalendarevent. 13 ClickTestinthebottomrightofthescreentoseeifthearchivewillfitonthe selectedmedia. 14 ClickSavetosavetheschedule. Todeleteanarchiveschedule Ifanarchivescheduleisnolongerrequired,youcandeletetheschedule. 1 2 3 SelectArchive>ScheduleArchive.OntheScheduleArchivescreen,existing schedulesdisplay. Clickthescheduleyouwanttodelete. ClickDeleteatthebottomofthescreen. OR DragthescheduleanddropitontotheDeletebutton.Thescheduleisdeleted.

216

Chapter 5

Toenable/disableanarchiveschedule Youcanenableordisableanarchiveschedule.Thisisconvenientifyouwantto stopanarchiveschedulewithoutdeletingitsoyoucanenableitforuseinthe future. 1 2 3 SelectArchive>ScheduleArchive.OntheScheduleArchivescreen,existing schedulesdisplay. Clickthescheduleyouwanttoenableordisable. ClickEnable/Disableatthebottomofthescreen. OR DragthescheduleanddropitontotheEnable/Disablebutton.Thelightbulbicon nexttothescheduleisyellow(enabled)orgray(disabled).Youcanenableor disablethescheduleatanytime.

Legacyschedules
LegacyschedulesrunbytheUnitrendsagentontheclientcontinuetorununtil theyaredisabled.However,itisstronglyrecommendedthatlegacyschedulesbe disabledbeforeusingthesystemsadministratorinterfacetoarchivedata.Having schedulesrunningfrombothinterfaceswillresultininconsistenciesonthemedia.

Viewingandrestoringarchives
Seethefollowingtopicsforinformationaboutviewingandrestoringarchives:

Archivesearchoptionsandresultsonpage 217 Viewingarchivesonpage 221 Archiverestoreonpage 224 Restoringfromtapeonpage 230

Archivesearchoptionsandresults
Whenyouareviewingorrestoringarchives,youcansearchthearchivesetsby daterangeorusingsearchoptions.Theseoptionsaredescribedinthefollowing topics:

Daterangeoptionsonpage 218 Optionalsearchselectionsonpage 218 Archiverestorestatusandsearchresultsonpage 220


Note:SeeViewingarchivesonpage 221andArchiverestoreonpage 224.
Archiving

217

Daterangeoptions
Usethedaterangeoptionsinthetoppanetofilterthearchivesetsthatdisplayin thecenterstageareatovieworrestorearchiveinformation. Column DateRange Description
Use the drop-down to select a date range to display sets containing archives or backups that were created during the specified time range such as today or last week. Select DateArchived or BackupDate to choose whether the date range is applied by backup date or archive date.

Basedon

Optionalsearchselections
ClickShowSearchOptionsinthetoppaneandentersearchcriteriausinganyof thefollowingoptionsoracombinationofthem. SearchCriteria ClienttoSearch MaximumFilesto Display Description
Select the client from the Client to Search drop-down. Enter a number to limit the maximum search results. A maximum of 5,000 files can be displayed. Note: This field defaults to 10, so make sure you update this number if you want to view more files.

218

Chapter 5

SearchCriteria Name

Description
Check the Name box and enter a full path and file name for searching. You can use wildcards such as * and ? in the file name. (Using wildcards increases search time.)

An * represents any number of characters before or after

the entered names. For example, *.doc provides a list of all files ending with the .doc extension or auto* provides a list of all filenames starting with auto. A ? represents just one character. For example, if there are a number of files named file1, file2 through file12, file13 then a file? will display file1 through file9 and a file?? will display all the files up to file13.

Regular Expression

Check this box to use regular expressions to symbolically represent patterns that can occur in text. The syntax of regular expressions is more complex and powerful than wildcards. This technique only needs to be used if wildcards are too limited to construct a sufficiently precise search pattern. Some good references about the use of regular expressions can be found in the online encyclopedia, Wikipedia. Check this box to search for file names regardless of case. Check this box and specify a date range to search for files within a certain time frame. Calendar icons are provided to assist with date selection. Check this box and enter a size range in kilobytes to narrow the search by file size. Select to search for files meeting the specified search criteria. Select to search for files that do NOT meet the specified search criteria.

IgnoreCase Date

Size(KB) Include Exclude

Archiving

219

Archiverestorestatusandsearchresults
Afteryousearchforarchiveinformation,thecenterstageareacontainsthe followinginformationaboutthearchivedbackup: Column Statusicon Description
An icon representing the status of the archive operation. (If the operation is successful, the icon is a white check mark in a green circle. If the operation fails, the icon is a white X in a red circle). An icon representing whether the archive is compressed (a green check mark) or not compressed (a red X). An icon representing whether or not the archive was encrypted. The type of backup operation types might include Master, Differential, Bare Metal, or other types of backups. Date and time at which the backup operation executed. The elapsed time associated with the execution of the archive operation. The size, in megabytes, of the archived backup. The number of files associated with the archived backup. Shows the virtual machine or application instance, if applicable.

Compressedicon

Encryptionicon Type

Date/Time Elapsed Size(MB) Files DB/VM

220

Chapter 5

Viewingarchives
Whenanarchiveruns,backupsarewrittentoarchivesets.Usingdifferentsearch options,youcanviewasummaryofallofthearchivesetsormoredetails, includingindividualarchivedfiles. Note: Make sure the proper archive media is connected. (See Toview connectedmediaonpage 195 for more information.) Toviewallarchivessets YoucanviewallarchivesetsintheUnitrendssystem. 1 2 SelectthebackupsystemintheNavigationpane. ClickArchive>Status.Thearchivesetswiththeirassociatedclientsandarchived backupsdisplayinthecenterstageareaintheStatustab. Toviewarchiveinformation Youcanusefilterstosearchforspecificarchivesetsandinformation. 1 2 3 4 SelectthebackupsystemintheNavigationpane. ClickArchive>Status. Usethedaterangeoptionsinthetoppanetofilterthearchivesetsthatdisplayin thecenterstagearea.SeeDaterangeoptionsonpage 218. Onceyoufiltertheresults,theStatustabdisplaysallarchivedsetsmeetingthe criteriayouentered.(ClickontheStatustab,ifnecessary.) Theinformationisarrangedinthefollowingway:

ArchivesetThearchivesetdisplaysfirstinthehierarchy,withthemost

recentlycreatedarchivedsetshigherinthelist.Withineacharchiveset,the secondlevelnodesaretheclientscontainedinthearchive. BackupsforeachclientBeneaththat,thearchivedbackupsforeachclient display.Ifanysystemlocaldirectoriesareintheset,thesecondlevelnodeis thebackupsystemnamefollowedbythelocaldirectoriesincludedinthe archiveset. ArchivedbackupEachrowundertheclientorbackupsysteminthearchive statustablerepresentsanarchivedbackup. Note:Eacharchivesetcontainsthesystemmetadatafilewhichcanbeusedto restoretheUnitrendssystemintheeventofadisaster. Thecenterstageareacontainsinformationaboutthearchivedbackup.See Archiverestorestatusandsearchresultsonpage 220.
221

Archiving

Toviewmoredetailsabouteacharchivelevel,clickontheappropriaterow.You seethefollowing:

ArchivesetYouseetheArchiveSetInformationwindowwithgeneral
informationaboutthearchive.(SeeTorunaonetimearchiveonpage 212 forfieldlevelinformation.) ClientTherearenofurtherdetailsattheclientlevel.(Youseerestoreoptions onlywhenyouclickthisrow.) ArchivedbackupYouseetheArchiveBrose/Recoverywindowwithdetails suchasparentname,setnumber,size,andnumberoffiles.(Toseethe individualfilesinthisarchivedbackup,clickRestoretosystem.Clickonthe arrowstoopenthetreeandviewtheindividualfiles.ClickCancelwhenyouare finished.) Toviewspecificarchivedfilesusingsearchoptions Youcanviewindividualfileswithinthearchive.Usesearchoptionstoselectthe filesyouwanttoview.(ThisprocedureissimilartoviewingarchivedbackupsinTo viewarchiveinformationonpage 221,exceptthatthisprocedureallowsyouto viewindividualfilesbasedonsearchcriteriaforspecificfiletypesratherthanfiles underaclient.) 1 2 ClickArchive>Status. ClickShowSearchOptionsinthetoppaneandentersearchcriteriausinganyof theoptionsoracombinationofthem.SeeOptionalsearchselectionson page 218formoreinformation. ClickSearch.Detailsofthesearchresultsdisplayinthecenterstagearea(the summaryportionofthescreen)intheSearchResultstab.(ClickontheStatustab atanytimetoviewthearchivesetinformation.) Thesearchresultsreturnallfilesthatmeetthesearchcriteriaifyouselected Include,orreturnallfilesthatdoNOTmeetthesearchcriteriaifyouselected Exclude.(Ifyouselectedtoviewfilesonatapethathasabarcode,yoursearch resultsincludeacolumnwithbarcodeinformation.)

222

Chapter 5

Thecenterstageareacontainsthefollowinginformationaboutthefiles.Youcan sortorresizethecolumns. Column Filename ModifiedDate ArchiveDate Size(KB) MediaSerial Barcode Description
The name of the file, including the directory path of the file. The date and time that the file was last modified. The date and time of the archive. The size of the file. The serial number of the archive media associated with the file. The barcode, if the archive media is a tape using the barcode feature.

Toviewfiledetails,clickonthefilefromthelistinthebottompane.TheArchive Browse/Recoveryscreendisplaysinformationaboutthefile,includingabarcode ifthisisatapearchiveusingthebarcodefeature. Toviewfailedarchivesets Whenviewingarchiveinformation,youseethearchivesetsintheStatustabon theArchive>Statusscreen.Iftherearefailedsets,youseeaFailedSetstab.Click theFailedSetstabtoseeinformationaboutthefailedarchives.Theresultsinthis tabarefiltereddependingonthesearchoptionsyouentered. YouseethesamecolumninformationthatdisplaysontheStatustab,exceptfor theStatus,Compressed,andEncryptionfields.

Archiving

223

Archiverestore
Whenyouperformanarchiverestore,thearchiveddataisrestoredtothebackup systemasaregularbackup.Afteryourestoreanarchivetothebackupsystem,you canrestoreittotheclientinthesamemannerusedtorestoreotherbackups.(For additionalinformationonrestoringabackupingeneral,seetheRestore chapter.) Note:Whenyouperformanarchive,youdonotselectspecific,individualfilesto archive;youspecifytheparametersofthebackupsthatyouwanttoarchive.When yourestoreanarchive,youhavetheoptiontorestoreindividualfiles. Archivesethierarchy Theinformationisarrangedinthefollowingway:
Hierarchy Item Archive set Description

The archive set displays first in the hierarchy, with the most recently created archived sets higher in the list. Within each archive set, the second-level nodes are the clients contained in the archive. Beneath that, the archived backups for each client display. If any system local directories are in the set, the second-level node is the backup system name followed by the local directories included in the archive set. Each row under the client or backup system in the archive status table represents an archived backup and the system metadata file (which contains system information about the archive).

Backups for each client

Archived backup

Note:Eacharchivesetcontainsthesystemmetadatafilewhichcanbeusedto restoretheUnitrendssystemintheeventofadisaster. Restoreoptions Therestoreoptionrestorestheyourselectionofthearchivesettothebackup system.TheyarequeuedandyoucanmonitortheprogressintheJobStatus window.Youcanrestore:

Theentirearchiveset Justtheclientarchive
224

Chapter 5

Anarchivedbackupwithinaclientarchive Individualfilesinthearchivedbackup Specific,individualfilesinthearchivedbackupbasedonsearchoptions


Restoreindividualfiles Ifyouselectindividualfilesordirectories,theyarerestoredinaSelectivebackup fortheclient.Ifyourestoretheentirebackupfromthearchive,thebackupis restoredastheoriginalbackuptype(full,differential,etc.),includingdetails indicatingthatithasbeenrestoredfromanarchive.Thearchivemediashouldbe mountedpriortostartingtherestore. Torestoreanarchiveset Youcanusefilterstosearchforspecificarchivesetsandinformation. 1 2 3 4 Make sure the proper archive media is connected. (See Toviewconnected mediaonpage 195 for more information.) SelectthebackupsystemintheNavigationpane. ClickArchive>Status. Usethedaterangeoptionsinthetoppanetofilterthearchivesetsthatdisplayin thecenterstagearea.SeeDaterangeoptionsonpage 218. Onceyoufiltertheresults,theStatustabdisplaysallarchivedsetsmeetingthe criteriayouentered.(ClickontheStatustab,ifnecessary.)Thecenterstagearea containsinformationaboutthearchivedbackup.Thearchivesetdisplaysfirstin thehierarchy,withthemostrecentlycreatedarchivedsetshigherinthelist. Withineacharchiveset,thesecondlevelnodesaretheclientscontainedinthe archive. SeeArchiverestorestatusandsearchresultsonpage 220forfielddescriptions. 5 Inthecenterstagearea,clickonthearchivesetthatyouwanttorestore. Note:Youcannotupdatethisinformationsincethisisadisplayofthearchive.(See Torunaonetimearchiveonpage 212forfieldlevelinformation.) 6 ClickRestoretosystemtoseetheRestoreArchivewindow.Youhavetheoptionto select:

Thedeviceonwhichtorestorethearchivefromtheselectionslisted. Tocheckandmountthemedia.

Archiving

225

ClickRestoretosystemtorestoreallarchivesinthisset.Onceyouselecttorestore thearchiveset,youseeamessageindicatingthestatusoftherestore(successfully queuedorunsuccessful). ClickOkay. GotoSettings(onthemaintab,notwithintheArchivetab)>SystemMonitoring >Jobstoviewthestatusoftherestore.

8 9

10 Oncethearchiveissuccessfullyrestoredtothebackupsystem,gotoStatusand clicktheBackuptab.Clicktherowwithyourarchiverestore(withthedateand timeoftherestore)toseedetailsabouttherestoreontheBackupInformation window.(Clicktherefreshbuttonifneeded.)Noticethisbackupislistedasan Archiverestore. Youcanselecttorestorethebackupordeletethebackup,asnecessary.(The archiveinformationremainsonthearchivemediaandisnotremovedafterthe restore.) 11 GotoReports>Backupstoseethelistofbackups,includingyoursuccessful archiverestoreswiththerestoredateandtimelisted.Clickontherowtoview moredetails,includinganentrythatthisisanarchiverestore. Torestoreaclientarchive Youcanusefilterstosearchforaspecificclientarchive. 1 2 3 4 Makesuretheproperarchivemediaisconnected.(SeeToviewconnected mediaonpage 195formoreinformation.) SelectthebackupsystemintheNavigationpane. ClickArchive>Status. Usethedaterangeoptionsinthetoppanetofilterthearchivesetsthatdisplayin thecenterstagearea.SeeDaterangeoptionsonpage 218. Onceyoufiltertheresults,theStatustabdisplaysallarchivedsetsmeetingthe criteriayouentered.(ClickontheStatustab,ifnecessary.)Beneaththearchive sets,thearchivedbackupsforeachclientdisplay.Ifanysystemlocaldirectoriesare intheset,thesecondlevelnodeisthebackupsystemnamefollowedbythelocal directoriesincludedinthearchiveset. SeeArchiverestorestatusandsearchresultsonpage 220forfielddescriptions. 5 6
226

Inthecenterstagearea,clickontheclientyouwanttorestore.Youseethe RestoreArchivewindow. Youcanselect:

Chapter 5

TheclientyouwanttorestoreintheRestoreClientdropdownbox. Thedeviceonwhichtorestorethearchivefromtheselectionslisted. Tocheckandmountthemedia.


7 ClickRestoretosystemtoseetheRestoreArchivewindow.Onceyouselectto restoretheclient,youseeamessageindicatingthestatusoftherestore (successfullyqueuedorunsuccessful). ClickOkay. GotoSettings(onthemaintab,notwithintheArchivetab)>SystemMonitoring >Jobstoviewthestatusoftherestore.

8 9

10 Oncetheclientarchiveissuccessfullyrestoredtothebackupsystem,gotoStatus andclicktheBackuptab.Clicktherowwithyourarchiverestore(withthedate andtimeoftherestore)toseedetailsabouttherestoreontheBackup Informationwindow.(Clicktherefreshbuttonifneeded.)Noticethisbackupis listedasanArchiverestore. Youcanselecttorestorethebackupordeletethebackup,asnecessary.(The archiveinformationremainsonthearchivemediaandisnotremovedafterthe restore.) 11 GotoReports>Backupstoseethelistofbackups,includingyoursuccessful archiverestoreswiththerestoredateandtimelisted.Clickontherowtoview moredetails,includinganentrythatthisisanarchiverestore. Torestoreanarchivedbackup Youcanusefilterstosearchforspecificarchivesetsandinformation. 1 2 3 4 Make sure the proper archive media is connected. (See Toviewconnected mediaonpage 195 for more information.) SelectthebackupsystemintheNavigationpane. ClickArchive>Status. Usethedaterangeoptionsinthetoppanetofilterthearchivesetsthatdisplayin thecenterstagearea.SeeDaterangeoptionsonpage 218. Onceyoufiltertheresults,theStatustabdisplaysallarchivedsetsmeetingthe criteriayouentered.(ClickontheStatustab,ifnecessary.)Thecenterstagearea containsinformationaboutthearchivedbackup.Eachrowundertheclientor backupsysteminthearchivestatustablerepresentsanarchivedbackup.

Archiving

227

SeeArchiverestorestatusandsearchresultsonpage 220forfielddescriptions. Note:Eacharchivesetcontainsthesystemmetadatafilewhichcanbeusedto restoretheUnitrendssystemintheeventofadisaster. 5 6 Inthecenterstagearea,clickonarchivedbackupyouwanttorestore.Youseethe RestoreArchivewindowwithdetailssuchassetnumber,size,andnumberoffiles. ClickRestoretoSystemtoseetherootofthebackupinthecenterstagearea.You canselecttheentirearchivedbackuporspecificfiles:

Clickontheboxnexttotheroottoselecttheentirearchivedbackup. Clickonthearrowstoopenthetreeandviewtheindividualfoldersandfiles.
7 Clickontheboxesnexttothefilesyouwanttorestore. ClickRestoretosystemandyouseeaRestoreProgressmessageindicatingthe restoreisinprogress,thenamessageindicatingthestatusoftherestore (successfulorunsuccessful). Clickonthexinthetoprighttoclosethewindow. GotoSettings(onthemaintab,notwithintheArchivetab)>SystemMonitoring >Jobstoviewthestatusoftherestore.

8 9

10 Oncethearchiveissuccessfullyrestoredtothebackupsystem,gotoStatusand clicktheBackuptab.Clicktherowwithyourarchiverestore(withthedateand timeoftherestore)toseedetailsabouttherestoreontheBackupInformation window.(Clicktherefreshbuttonifneeded.)Noticethisbackupislistedasan Archiverestore. Youcanselecttorestorethebackupordeletethebackup,asnecessary.(The archiveinformationremainsonthearchivemediaandisnotremovedafterthe restore.) 11 GotoReports>Backupstoseethelistofbackups,includingyoursuccessful archiverestoreswiththerestoredateandtimelisted.Clickontherowtoview moredetails,includinganentrythatthisisanarchiverestore. Torestorespecificarchivedfilesbasedonsearchoptions Youcanrestoreindividualfileswithinthearchive.Usesearchoptionstoselectthe filesyouwanttorestore.(Thisprocedureissimilartorestoringarchivedbackups inTorestoreanarchivesetonpage 225,exceptthatthisprocedureallowsyou restoreindividualfilesinsteadofallfilesunderagivenclient.) 1 Make sure the proper archive media is connected. (See Toviewconnected mediaonpage 195 for more information.)

228

Chapter 5

2 3

ClickArchive>Status. ClickShowSearchOptionsinthetoppaneandentersearchcriteriausinganyof theoptionsoracombinationofthem.SeeOptionalsearchselectionson page 218formoreinformation. ClickSearch.ResultsdisplayontheSearchResultstab. ThesearchresultsreturnallfilesthatmeetthesearchcriteriaifIncludewas selected,orreturnallfilesthatdoNOTmeetthesearchcriteriaifExcludewas selected.(Ifyouselectedtoviewfilesonatapethathasabarcode,yoursearch resultsincludeacolumnwithbarcodeinformation.) ClickontheStatustabatanytimetoviewthearchivesetinformation.

Toviewfiledetails,selectthefilefromthelistinthebottompane.TheArchive Browse/RecoverywindowdisplaysinformationaboutthefileintheCategoryand Entrycolumns,includingthebackupdateandthearchivedate.Youalsoseea barcodeifthisisatapearchiveusingthebarcodefeature. Toperformanarchiverestore,clickRestoretoSystemandyouseeanewwindow withthetreeforthearchivebackuppopulated.

Clickontheboxnexttotheroottoselecttheentirearchivedbackup. Clickonthearrowstoopenthetreeandviewtheindividualfoldersandfiles.
7 Clickontheboxesnexttothefilesyouwanttorestore. ClickRestoretosystemandyouseeaRestoreProgressmessagewindow indicatingthattherestoreisinprogress,thenamessageindicatingthestatusof therestore(successfulorunsuccessful).Clickonthexinthetoprighttoclosethe window. GotoSettings(onthemaintab,notwithintheArchivetab)>SystemMonitoring >Jobstoviewthestatusoftherestore. Oncethearchiveissuccessfullyrestoredtothebackup,gotoStatusandclickthe Backuptab.Clicktherowwithyourarchiverestore(withthedateandtimeofthe restore)toseedetailsabouttherestoreintheBackupInformationwindow.(Click therefreshbuttonifneeded.)NoticethisbackupislistedasanArchiverestore. Youcanselecttorestorethebackupordeletethebackup,asnecessary.(The archiveinformationremainsonthearchivemediaandisnotremovedafterthe restore.) 10 GotoReports>Backupstoseethelistofbackups,includingyoursuccessful archiverestoreswiththerestoredateandtimelisted.Clickontherowtoview moredetails,includinganentrythatthisisanarchiverestore.

8 9

Archiving

229

Restoringfromtape
Restoringfromtapearchiveissimilartorestoringfromdiskarchive.Thearchive catalogsarestoredinthebackupsystemdatabase. Tosuccessfullyrestoreanarchivefromtape,besurethetapedrives read_blocksizeandcompressionsettingsarethesameasthewrite_blocksizeand compressionsettingsusedwhenthetapewasoriginallyarchived.Ifthesesettings aredifferent,archivingmaynotbeabletoreadanydatafromthetape. Ifthetapesarefromanothersystemorthissystemhasbeenrecentlyrecovered fromdisaster,thecatalogscanbeimportedfromtape.Todothis,insertthetape intothedrive(ortapesintotheautoloader)andimport.Autoloadertapescanbe importedwithoutregardtoorder;thearchivingsystemdeterminesthecorrect orderautomatically.(Ifsometapesfromthearchivesettobeimported/restored aremissingorbad,datafromothertapesisstillavailable.)SeeToimportan archivesetonpage 232. Whenperformingarestorefortapeswithbarcodes,thesystemreadsthe barcodesanddeterminesthecorrectlocationofthetapes.Therearenospecial restoreproceduresfortapesthathavebarcodes. Torestorefromtape 1 2 3 SelectArchive>Status. Selectaclientorbackupandrestoreasyouwouldfordisk. Fortapeswithbarcodes,clickonTapeDetailstoseeinformationaboutvolume, mediaserialnumber,andbarcodenumber.(TheTapeDetailsbuttondoesnot displayformediathatisnottape.) Thesystemautomaticallyidentifiesthetape,loadsit(ifthetapeispresentinthe autoloader),andinformsyouifthecorrecttapecannotbefoundforthespecified archive. Oncethetapeisidentified,therestorestarts. Forrestoreofanarchivethatoriginallyspannedtapes,ensurethatallspanned tapesareintheautoloader.

5 6

Removingandimportingarchivesets
Seethefollowingtopicsforinformationaboutremovingandimportingarchive sets:
230

Chapter 5

Removingarchivesetsonpage 231 Importingarchivesetsonpage 232

Removingarchivesets
Thearchivesetisthetopofthearchivehierarchy,followedbyclientandthe archivedbackupswithinthatclient.Youhavetheoptiontoremoveanarchiveset thatisnolongerneededorhasbecomeobsolete.Forexample,ifyourestorean archiveanddeterminethatitisnolongerneeded,youcanremovethearchiveset. Removinganarchivesetremovesthearchivestatusinformationbutdoesnot removetheactualdatafromthearchivemedia.Therefore,youcanimportthis archivedataagainifnecessary.(SeeToimportanarchivesetonpage 232.) Purgingdataisnotthesameasremovingarchivesetinformation.Archivedatais purgedthroughretentionsettingsandwhenyouprepare(format)archivemedia. Thisdataisdeletedandcannotberetrieved.Archivesetsthathavebeenremoved canbeimported.(SeeTopreparearchivedrivesonpage 197andArchive settingsonpage 203.) Toremoveanarchiveset 1 2 3 GotoArchive>Status. Clickthearchivesetthatyouwanttoremove.YouseetheArchiveSetInformation window. ClicktheRemovesetbutton.Youseeamessageconfirmingtheremoval. Note:Thisactionremovesthearchivesetstatusinformationbutdoesnotremove anydatafromthearchivemedia. 4 ClickYestoremovethearchiveset. Thisremovesthearchivesetinformationbutnotthedatafromthearchivemedia. YoucannolongerseethearchivesetontheStatusscreen.

Archiving

231

Importingarchivesets
Ifanarchivesethasbeenremoved,thedatastillresidesonthearchivemediaand canbeimported.

Ifanarchivewasonlypartiallysuccessful,theimportprocessimportsonlythe successfularchives.Importingworkswithallmediatypes.Foradditional informationaboutimportingfromtapes,seeRestoringfromtapeonpage 230. SeeTapebarcodesonpage 235forinformationaboutimportingtapesthathave barcodes. Youcanimportanarchivesetthatwascreatedonadifferentsystem,aslongas thearchivesetisnotencrypted.Ifanarchivesetisencrypted,eachsystemhasits ownuniquesetofencryptionkeysandtheencryptedsetcanbeimportedtothe originalbackupsystemonly.Iftheoriginalsystemisnolongeravailable,youmust performadisasterrecoveryfromitssystemmetadatafiletocreateanequivalent newsystemtowhichthisarchivecanthenbeimportedandrestored.Seethe DisasterRecoverychapterfordetails. Toimportanarchiveset 1 2 3 4
Makesurethemediaismountedpriortoperformingtheimportprocess,ifnecessary. GotoArchive>Media. Clickonthemedia. ClicktheSetsbuttontoseetheArchiveMediaSetswindow.

Youseethefollowingfields:
Field Description Description Describes the type of archive. For tape media, you see the message Tape devices will be scanned upon import. Date
232

The date and time of the archive.

Chapter 5

Field Imported

Description A check-mark indicates that the archive sets are in the database. An X indicates that the archive sets have been removed and can be imported.

Force?

Tape only field. If a tape was prepared on this system, the system recognizes it through a system assigned asset tag. This is called a known tape. If you check this box, the system imports from all tapes (forces the import regardless of asset tag recognition). If you do NOT check this box, the system imports from known tapes only (tapes that the system recognizes). For example, if you enter 15, for slots 1, 2, 3, 4, and 5, but 3 is a new tape from another system, the system will not import tape 3 if it isnt known.

Target Slots

Tape only field. Enter the slot numbers to indicate the slots associated with the tapes you want to import. You can enter a single slot number (1), a range (1-5), or multiple slot numbers (3, 4, 6.) If you do not enter a target slot, the system attempts to import from all slots. The system uses the barcode if there is a valid one.

ClickImporttoimportthearchivesets. Note:ThesystemimportsalloftheremovedsetsthataremarkedwithanXinthe MediaSetswindow.(Ifitsdetectedthatanarchivesetwithacheckmarkisnotin thesystem,itisalsoimportedfromthearchivemedia.) Youseeawindowwithdetailsabouteacharchiveset(date,time,andhowitwas archived),andifitwasalreadyinthesystem(hadacheckmark)orwasimported.

6 7

ClickOkay. GotoArchive>StatustoseethearchivesetontheStatusscreen.Thearchiveset displaysbyoriginalarchivedateandtime.Performasearchbydaterangeor searchoptionstolocatethearchiveset,ifneeded.


Archiving

233

8 9

ClickonthearchivesettoseetheArchiveSetInformationwindow.IntheStatus field,youseeeitherImportSuccess,ImportinProgress,orImportFailed. OntheStatusscreen,clickonthearchiveddatatoseetheArchiveBrowse Recoverywindow.TheImportedfieldistrueiftheimportwassuccessful.There isamessageatthebottomofthewindowstatingRestorefromanimported archive.

Stoppingandstartingthearchiveprocess
SelectArchive>SettingstoviewandchangethestatusoftheArchiveprocess. Thisisaprocessthatshouldberunningatalltimestoensuretheproperoperation ofarchiving.IfyoustoptheArchiveprocess,yourarchiveoperationswillnotwork. However,ifforanyreasonyouseeproblemsinperformingarchiveoperationsand theerrormessageindicatesthattheArchiveprocessmaynotberunning,this featureallowsyoutoeasilyrestartit.

Archivetotapesetup
Releases6.0.1andabovesupportD2D2TarchivingtotapefromselectUnitrends backupsystems.Thissectiondescribesthestepsforsettingupatapebased archivingsystem.Onceconfigured,thesesettingsdonotneedtobemodified unlessthetapedeviceischanged. Note:TapearchivingisnotsupportedonUEBsrunningonESXiversion5.0or above,duetolimitationsinVMware.

Tapearchiveterminology
Thefollowingtermsareusedintapearchiving:
Term Autoloader Description A device that has an internal tape changing mechanism as well as one or more drives, which can read from and write to magnetic tape media on more than one tape. This term is also used in Unitrends documentation in reference to autoloaders and tape libraries, which are used in the same way in the Unitrends D2D2T system.

234

Chapter 5

Term Slot

Description A numbered storage bay for a tape inside a tape autoloader/library. Either a tape drive or tape autoloader. A device that reads from and writes to magnetic tape media. Only one tape is loaded into a drive at a time, and it takes several minutes to load each tape. Archive sets that might be contained within one tape or might span several tapes.

Tape device Tape drive

Volumes

Inthisexample,thetapeinslot8isloadedintotapedrive1.

Inthisexample,thevolume(archivesets)resideonthreetapes.

Tapebarcodes
Thetapebarcodefeaturesallowsyoutoviewtapeinformation,tape locations,andselecttargetslotswhenarchiving.Ontapedevicesthatsupport barcodes,thesystemrecognizesthebarcodeassoonasyouinsertthetapeinto thelibrary.Thisdecreasesyourtimetolocatetapes(eventapesstoredoffsite)and improvesarchivingperformance. Herearemoredetailsaboutthebarcodefeature:

Archiving

235

Thisfeatureonlyworkswithtapedevices(includingautoloaders)thathave
barcodereadersandtapesthathavevalidbarcodelabels.Ifyourtapedevice doesnothaveabarcodeorastandardbarcodeformat,youcanstilluseyour tapedevice. Youareabletoviewbarcodeand/ortapelocationinformationinseveral placeswithintheArchivesectionofthesystem(ifthetapeshavereadable barcodes).SeeToviewthetapelibraryandtapelocationsonpage 196. Youcandesignatethetargetslotlocationwhenperforminganarchive. BarcodelabelsfortapemediauseCode39(sometimescalledCode3of9), whichisawidelyusedindustrialstandard.Therearethreewideelementsand sixnarrowelementsforeverynineelements. Thesystemsupportsamixedusageoftapesforbarcodes,suchasLT05and LT06. Ifavailable,thesystemautomaticallyutilizesthebarcodeduringtherestore process.Therearenospecialproceduresduringtherestoreprocess. Whenperformingarestore,ifyouhavemovedtapeswithbarcodestodifferent slots,thesystemreadsthebarcodesanddeterminesthecorrectlocationofthe tapes. Whenyouinserttapesintothetapelibraryforimport,thesystemscansthe barcodesandidentifiestheslotsthatthetapesareinandcanalsoputtogether theunorderedsetoftapesintheslots.(Forexample,tapeswereinslots1,2, 3,and4duringthebackup,removed,theninsertedintoslots8,9,10,and11. Thesystemrecognizesthebarcodesregardlessoftheslotlocation.)

Whattodoifyourtapedevicedoesnothaveabarcodeorastandard barcodeformat
Thesystemgeneratesserialnumberstoidentifytapesandwritestheserial numberontothetapemedia.Ifyourtapedevicedoesnotsupportbarcode technology,youmustmanuallylocatetapesusingthesystemgeneratedserial numbersinsteadofbarcodes.Werecommendthatyoulabeltapesmanuallywith theseserialnumbersforeasyidentification. Ifyourtapedevicedoesnothaveabarcodeorastandardbarcodeformat, youcanstilluseyourtapedevice.Followthestandardproceduresforusing tapesandyourtapedevice.

Tapearchiveprerequisites
Thefollowingrequirementsmustbemetfortapearchiving:

Thebackupsystemmustbelicensedwiththeadvancedarchiving(ADX)
feature.CheckforADXinthelicensestringunderSettings>System,Updates, andLicensing>License.
236

Chapter 5

ThetapedevicemustbeeitherVHDLVDSCSI,SAS,orFiberChannel(physical
systemsonly).

Thetapedevicemustbeconfiguredasdescribedinthisdocument. Thetapeorsetoftapesmusthaveadequatespacetostorethedatabeing
archived.Ifthearchivedoesnotfit,thejobfails. Ifusingtapebarcodes,yourtapedevicemusthaveabarcodereaderandtapes musthavevalidbarcodelabels. NotethefollowingregardingUEBsystems: - UEBonVMwaresystemsmustberunningonanESX(i)versionearlierthan version5.0,duetolimitationsinVMware. - UEBonHyperVsystemscannotarchivetotape. ThestepsforsettinguptapedrivesandautoloadersforD2D2Tinclude: 1 2 3 Connectingthedevice(seebelow). ConfiguringthedeviceintheUnitrendssystemonpage 240. Settingupthetapearchivingprocessonpage 242.

Connectingthedevice
Connectthetapedriveorautoloaderdeviceusingoneoftheseprocedures:

ForUnitrendsEnterpriseBackupforVMwaresystems,seeToconnectto
UnitrendsEnterpriseBackupforVMwarebelow. Unitrendssystembelow. Note1:ArchivetotapeisnotsupportedonUnitrendsEnterpriseBackupforHyper Vsystems. Note2:Eventhoughyoucanconnectmultipletapedrives,thesystemonlyuses onetapedriveatatimeforarchiving. Seethefollowingtopicsformoreinformation:

ForUnitrendsRecoverySeriesphysicalsystems,seeToconnecttoaphysical

ToconnecttoaphysicalUnitrendssystemonpage 237 ToconnecttoUnitrendsEnterpriseBackupforVMwareonpage 238 SCSIcardisnotactiveonpage 239


ToconnecttoaphysicalUnitrendssystem 1 ConnectthetapedriveorautoloadertotheUnitrendssystemusingaSASorLVD SCSIcable.IfusingaLVDSCSIcable,ensurethataSCSIbusterminatorisinstalled onthetapedeviceaccordingtothevendorsdocumentation.
Archiving

237

2 3

Onceconnected,poweronthetapedevice. Onceinitialized,reboottheUnitrendssystem.Thisenablesthebackupsystemto discoverthetapedevice. ToconnecttoUnitrendsEnterpriseBackupforVMware ToconnectyourtapedevicetotheUEBsystem,configurethetapedeviceonboth theESX(i)serverandtheUEBVM. Note:TapearchivingisnotsupportedonUEBsrunningonESXiversion5.0or above,duetolimitationsinVMware.

1 2 3 4

LaunchvSphereandconnecttoyourESXiserver. SelecttheESXiserverintheleftpane,thenselecttheConfigurationtab. ClickStorageAdaptersandselectyourSCSIcard.Normallyitisassignedto vmhba1. Inthedetailsbelow,selectPathsandnotetheRuntimeName.Forexample, vmhba1:C0:T0:L0. Forautoloaders,therearetwoRuntimeNames,oneforthechangerandonefor thetape.Notebothnames.

ChecktheSCSIcardsstatusanddooneofthefollowing:

IfthestatusisgreenandActive,continuewiththenextstepinthisprocedure. IfthestatusisDead,performthestepsinSCSIcardisnotactiveonpage 239.


LeaveyourvSpheresessionopen,youwillcomebacktocontinuethis procedure. Forautoloaders,bothRuntimeNamesmustbeactive.Ifnot,dotheSCSIcard isnotactiveprocedureforeachinactiveRuntimeNamebeforecontinuing withthesesteps. IftheUEBVMisrunning,poweritdown(rightclick>Power>PowerOff). RightclicktheVMandselectEditSettings>Add>SCSIDevice>Next. SelectthetapedeviceintheSCSIDevicelist. FromtheVirtualDeviceNodelist,selectadevicefortheRuntimeNameyounoted inStep4above.Forexample,forRuntimeNamevmhba1:C0:T0:L0,select SCSI(0:6)orSCSI(1:6),SCSI(2:6),etc.

6 7 8 9

10 ClickNext,thenFinish. 11 Forautoloadersonly,repeatStep7Step10toconfigureaseparatedeviceforthe changer.Forexample,ifyouselectedSCSI(0:6)forthetapedevice,selecta differentdeviceforthechanger.


238

Chapter 5

12 PowerontheUEBVM. 13 ProceedtoConfiguringthedeviceintheUnitrendssystemonpage 240. SCSIcardisnotactive RunthisprocedureusingtheRuntimeNameyouobtainedinStep4ofToconnect toUnitrendsEnterpriseBackupforVMware.Thisexampleprocedureuses vmhba1:C0:T0:L0astheRuntimeName. 1 Usingaterminalemulator,suchasPuTTY,connecttotheESXiserverwiththe following:

ESXiserverIPaddress port22 SSHconnectiontype


2 3 Loginusingtheadministrativeaccount. Atthecommandprompt,typethefollowingcommandandpressEnter:
esxcfg-rescan <SCSIcard>

where<SCSIcard>isthenameoftheSCSIcard.Forexample,vmhba1. 4 Whenyouseeamessageindicatingthescanfailedandthecardisused by world,enterthefollowingcommandtoobtainthetapemodelandvendor informationfromthecommandoutput:


grep ScsiScan /var/log/messages

Notethatthemodelandvendorinformationmaycontaintrailingspaces.Youwill needtoincludeanyspaceswhenenteringinformationbelow.Forexample,LTO 3HH"isdifferentfrom""LTO3HH". 5 Enterthefollowingcommand,supplyingthevendorandmodelinformation obtainedabove.Inthisexample,thevendorisTANDBERGandmodelisLTO3HH.

esxcli nmp satp addrule --satp=VMW_SATP_LOCAL --vendor=TANDBERG --model=^LTO-3 HH*

EnterthiscommandsupplyingdatafromyourRuntimeName.Theexamplehere isforRuntimeNamevmhba1:C0:T0:L0:

esxcli corestorage claiming unclaim -t location -A vmhba1 -C 0 -T 6 -L 0

Enterthiscommand:
esxcfg-rescan <SCSIcard>

where<SCSIcard>isthenameoftheSCSIcard.Forexample,vmhba1.
239

Archiving

Iftherescanissuccessful,continuewiththisprocedure. Iftherescanfails,tryenteringdifferentvendorandmodelnames,supplying
8 wildcardandcontrolcharacters(forexample,^TANDBERG*). GobacktovSphere,andclickRefreshtogetthenewRuntimeName.Continue withStep5intheToconnecttoUnitrendsEnterpriseBackupforVMware procedureabove.

ConfiguringthedeviceintheUnitrendssystem
Configurethedeviceusingoneoftheseprocedures:

Fortapedrives,gotoToconfigureatapedrivebelow. Forautoloaders,gotoToconfigureanautoloaderonpage 241.


Toconfigureatapedrive 1 2 IntheUnitrendsbackupsystem,selectArchive>Settings>ArchiveMedia. UnderConfigurableArchiveMedia,clicktoscanformedia. ConnectedtapedrivesorautoloadersdisplayintheAvailableMediaarea. Ifthedevicedoesnotappearinthelist,makecertaintheconnectionsaresecure, powercyclethedevice,andthenrebootthebackupsystem(Settings>System, Updates,andLicensing>Shutdown). 3 Selectthetapedevice,modifysettings,andclickConfirmtosave. Whenupdatingsettings,besuretoclickConfirmaftereachselection.Onlyclick Closewhenyouarereadytoleavethecurrentsettingarea. ThedefaultD2D2Tsettingsarerecommendedinmostcases.Thesesettingsare appropriateformosttapedrives.Notethefollowing:

hw_compressionsettotrueorfalsetoenable/disablehardwarecompression
(recommendationistruetousehardwarecompression). use_unlabelled_tapesiftrue,archivingoverwritesnewtapesandtapeswith dataitdoesnotrecognize.Iffalse,archivingdoesnotwritetoatapethathas notbeenpreparedviatheUnitrendsarchivingsystem.Falseallowsforgreater protectionofnonarchivedataatacostofhavingtopreparetapesbeforefirst use(seeTopreparearchivetapesonpage 242).Alreadywrittenarchive tapesarenotprotectedbythissetting.Instead,thetaperetentionperiodused whenthearchivewasperformedprovidesprotectiontothisdata.Manytapes canbesetreadonlyviaaslidingtabonthetapeitself. Toenablethetapedriveforusebyarchiving,setis_availabletotrue.Thismustbe doneforthetapedevicetoshowupinthemedialistforarchiving.

240

Chapter 5

Toconfigureanautoloader Forautoloaders,tapedriveassociationsmustbemanuallysetsothatthe archivingsystemknowswhichdrive(s)belongtowhichautoloader(s). 1 IntheUnitrendssystem,selectArchive>Media. ConnectedmediadisplayintheArchiveMediaarea.Ifnecessary,clickrescanfor media. Ifthedevicedoesnotappearinthelist,makecertaintheconnectionsaresecure, powercyclethedevice,andthenrebootthebackupsystem(Settings>System, Updates,andLicensing>Shutdown). 2 3 4 Selecttheautoloaderinthelistofconfigurabledevices. EnterauniquelabelintheMediaLabelfield. Ifnecessary,settheparent_changerandtheparent_changer_driveno.Thedrive numberwillusuallybe0,exceptinthecaseofanautoloaderwithmultipletape drives.Occasionallytheremaybeadifferentnumberinasingledrivesystem.Ifthe tapedriveisinanautoloader,setparent_changertothenameofthechangerthat appearsinthedropdownlist. AssignaslotrangewithintheautoloaderfortheUnitrendssystemtoaccess.This definesthetapestowhichthearchiveiswritten.Formultipletapes,comma delimitednumbersand/orhyphendelimitedrangescanbespecified,suchas110 or13,58. Caution:Thiscautionpertainstoautoloadersthatdonothavebarcodereaders. Whenanautoloaderhasatapeinthedrive,itrecognizestheslotfromwhichthat tapewasloaded.Ifturnedoffwithatapestillinthedrive,orespeciallyifthereis anunexpectedlossofpower,someautoloaderswillforgetthisslotassignment.An unloadoperationmaythenfailtoreturnthedrivetoitsproperslot.Subsequently thismaycauseanincorrectassignmentofthetapeduringarchiving.Ifthiscould causeunexpecteddataloss(e.g.notallslotsbelongtoarchiving),thetapesetting use_unlabelled_tapesshouldbesettofalse.Ifsettofalse,youmustpreparetapes beforearchivingasdescribedinTopreparearchivetapesonpage 242. 6 Toenabletheautoloaderforusebyarchiving,ensurethatexactlyoneofitstape drivesisassociatedwiththechanger. Onceatapedriveisassociatedtothechanger,thetapedriveitselfnolonger displaysasaseparatedeviceontheArchiveNoworArchiveSchedulepage. 7 ClickConfirmtosavesettings.

Archiving

241

Topreparearchivetapes Ifuse_unlabelled_tapesissettofalseinArchive>Settings>ArchiveMedia,tapes mustbepreparedpriortoarchiving. 1 IntheUnitrendssystem,selectArchive>Settings>ArchiveMedia. Thesystemchecksforconnectedarchivemedia.Ifnecessary,clickrescanfor media. ConnectedmediadisplayintheArchiveMediaarea. 2 3 4 Selectthetapedevice.Ifthedeviceisanautoloader,entertheslotsinwhichthe tapesareinserted. Enteramedialabeltodescribethetapes. ClickPreparebelow. ThesystempurgesanyexistingdataandformatsthetapeswiththeUnitrendsfile system.Tapesarenowreadyforuse.

Settingupthetapearchivingprocess
Oncethetapedeviceisconfigured,itcanbeusedforarchiving.Forstandalone tapedrives,ensurethereisatapeinthedrive.Forautoloaders,loadtapesinthe desiredslotsaccordingtothemanufacturersdocumentation.Foradditional information,seethefollowing:

Torunanondemandarchive,seeTorunaonetimearchiveonpage 212. Tocreateanarchiveschedule,seeTocreateanarchivescheduleonpage 215. Forrecommendedschedulingstrategies,seeSchedulingstrategiesfortape


archiveonpage 210. Forinformationabouttapebarcodes,seeTapebarcodesonpage 235.

242

Chapter 5

Chapter6 Replication
ProceduresinthischapterareusedtoconfigureandmanageUnitrends replicationfeature.Seethefollowingtopicsfordetails:

Aboutreplicationonpage 243 ReplicationFeaturesonpage 245 Replicationrequirementsonpage 246 Replicationlimitationsonpage 247 Replicationandlegacyvaultingcomparisononpage 248 Installationtypesandreplicationonpage 250 Replicationsetuponpage 251 Configuringreplicationaftertheinitialsetuponpage 268 Upgradingfromlegacyvaultingtoreplicationonpage 275 Navigatingreplicatingsystemsonpage 280 Workingwiththereplicationdashboardonpage 283 Archivingreplicatedbackupsonpage 295 Restoringreplicatedbackupsonpage 295 Deletingreplicatedbackupsonpage 300

Aboutreplication
ReplicationisthelogicalsynchronizationofbackupdatafromoneUnitrends systemtoanother,inwhichthesystemsareconnectedbyLANorWAN.The originatingsystemisreferredtoasthesource,whiletheoffsitesystemonto whichthedataisreplicatedisthetarget.Replicationenablesoffsitestorageof missioncriticaldatatoprotectagainstdatalossintheeventofadisaster.The

243

sourcesystemisusedtoprotectagainstlossoffiles,folders,andindividual machines.Thetargetsystemprotectsagainstlossofclientdata,aswellas providingprotectionagainstthelossoftheentiresourcesystem. Replicatedbackupslookliketheircounterpartsonthesourcesystemandare restoredinthesameway.Thetargetsystemisconfiguredforretentionwhilein replicationview,usingthesameprocedureasanysourcesystem(seeTosetor viewretentiongoalsandlimitsonpage 108).Foragivenclient,youmayhave morethanonebackupgrouponthetarget,unlikelegacyvaultinginwhichonlythe mostrecentbackupisstored.Aswithsourcesystems,theamountofretentionon thetargetisdependentonspaceavailableandretentionsettings. Thetargetsystemcanbedeployedasaprivatecloudorasamultitenantcloud. Thereplicationarchitectureensuresthatthelocalsourcesystemsthatreplicateto asingletargetonlyhaveaccesstotheirdata.Thissecurearchitectureisthebasis ofamultitenantarchitecture. Thereplicationprocessisfullymanagedfromthetargetorsourcesystem.Using thereplicationdashboard,youcanimmediatelygaugethestatusofreplicationby viewingactive,previouslycompleted,andpendingreplicationjobs. UnitrendsreplicationleveragesasecuretunnelbasedontheUDPprotocolthat createsasecureVPNtunnelandalsoprovidesresiliencytointermittentnetwork failuresviaUDPknitting.Ifthereisanetworkdropduringreplication,theprocess utilizesadvancedcheckpointcontrolstoproceedwithreplicationatthetimeof failure.Fordetails,seeAboutsecuretunnelsforUnitrendssystemsbelow. Theinitialtransferofdatafromthesourcesystemtothetargetcanoccuroverthe WAN.However,forlargedatasetsitisrecommendedtouseadiskseeding mechanismtotransfertheinitialdataset.Evenwithdeduplicationminimizingthe amountofdatabeingtransferred,transferspeedisprimarilygovernedbythesize ofthenetworkpipebetweenthesourceandtargetsystems.Seedingisalso recommendedincaseswhereavailablebandwidthisusedforservicingendusers atspecifictimesduringthedayandcannotbeusedforreplication. WindowsInstantRecoveryissupportedonthereplicationtargetsystem.See WindowsInstantRecoveryonpage 436formoreinformation.

AboutsecuretunnelsforUnitrendssystems
ThesecuretunnelisusedbyUnitrendstocreateanoptimized,secure,encrypted tunnelformultipleUnitrendssystems.Thesecuretunneloffersascalablesolution forenablingmultipleclientstoconnecttoasingleserverprocessthroughasingle UDPport.
244

Chapter 6

TherearetwotypicalcasesforusingthesecuretunnelwithUnitrendssystems. Thefirstisareplicationscenariowherethereisatargetsystemandoneormore sourcebackupsystems.Inthiscase,thesecuretunnelisconfiguredbetweenthe targetandthesourcesystemsinordertofacilitateboththereplicationofdataand themanagementofthesystems.Thesecondisthecasewheretwoormore systemsaremanagedbyadesignatedmanagementsystem.Withthissetup,you canthenperformoperationsforallsystemsfromoneUnitrendssysteminterface. Theprimaryadvantagesofthesecuretunnelarethatitenablesradicallysimpler firewallmanagement(sinceonlyoneportisneededbetweenoffpremise Unitrendssystems)andthatitenablesmuchhighersessionavailabilitybecauseit canhandlelowerqualityWANlinesthatwouldtypicallyresultinsession termination(throughUDPlevelridethroughofshortlivedtransientlinefailures).

ReplicationFeatures
Replicationfeaturesinclude:

Totaldatarecoveryfromasitedisaster. Replicateddatastoredasregularbackupsonthetargetsystem. Hot/hotrestoreofbackupsdirectlyfromthetargetsystem. Retentionofolderbackupsonthetargetsystem. Multiplesourcesystemscanreplicatetoonetargetsystem. Replicationsystemcanbeusedasatargetforbothreplicationandlegacy vaultingoperations. Blockleveldeduplicationofdataonlychangedblocksaretransferredover theInternet. Encryptedandsecureconnectionbetweenthesourceandtargetsystems. Privatecloudormultitenantclouddeployment. Dataisencryptedusingthetargetsencryptionkey. Configurablepoliciesforreplication,suchastheabilitytoselectspecificclients, applications,anddatabasestoreplicate,andconfigurablebandwidththrottling betweensourceandtargetsystems,andtheabilitytoprioritizedataqueued forreplicationtoensurethatmorecriticalsystemsarereplicatedfirst. Detailedreplicationdashboardthatdisplaysactivereplicationtasks,previously replicatedtasks,andtasksinthequeueforreplication. Sourceuseraccounttoaccessthetargetsystemandperformadministration tasksspecifictothegivensourcesystemonly.Targetsystemviewisfilteredby sourceusertocontrolaccess,especiallyimportantinenvironmentswhere multiplesystemsarereplicatingtoonetarget.
245

Replication

WindowsInstantRecoveryissupportedonthereplicationtargetsystem.See
WindowsInstantRecoveryonpage 436formoreinformation.

Replicationrequirements
Thissectiondescribessystemrequirementsthatmustbeinplacetoutilizethe replicationfeature.

Supportedsystems
ReplicationissupportedonthefollowingsystemsrunningUnitrendsversion7.0.0 orlater. Note:Althoughreplicationissupportedon7.0.0and7.1.xsystems,itishighly recommendedthatthesesystemsbeupdatedtothelatestreleasetotake advantageofsignificantperformanceenhancements.Ifyoucannotupgrade,see KB1314fordetailsaboutrunningreplicationontheseolderversions.
Unitrends Systems that can be used for replication System name Fully licensed Unitrends Enterprise Backup (UEB) systems. The free version is not supported. Cross-replication is not supported on UEB systems. Recovery-212 (Source or target only, can not be used for cross-replication) Recovery-312 Recovery-313 Recovery-612 Recovery-712 Recovery-713 Recovery-722 System name Recovery-732 Recovery-812 Recovery-813

Recovery-822 Recovery-823 Recovery-824 Recovery-832 Recovery-833 Recovery-943

246

Chapter 6

Systemrequirements
Thefollowingarerequiredforreplication:

Thetargetsystemandanyreplicatingsourcesystemsmustberunning
Unitrendsversion7.0.0orlater.Upgradethesesystemsifnecessary.Notethat upgradingtothelatestversionishighlyrecommendedtotakeadvantageof significantperformanceenhancements.Ifyoursourceandtargetarerunning version7.0.0or7.1.xandyoucannotupgrade,replicationissupported.For 7.0.0/7.1.xsetupprocedures,seeKB1314. Thetargetsystemmustbeconfiguredwiththereplicationtargetorlocal backupsystemandreplicationtargetinstallationtype.Fordetails,see Installationtypesandreplicationonpage 250. Thetargetsystemmusthaveatleast128GBofavailablebackupstoragespace. UEBsystemsaredeployedwith138GBofbackupstoragespace. Ifconfiguringmultiplebackupdevices,allmustberoughlythesamesize. Havingdevicesofvaryingsizemayresultinreplicationfailures. ThefreeversionofUEBcannotbeusedforreplication.Youmustpurchasea UEBlicensetousethesystemasareplicationsourceorreplicationtarget. Crossreplicationcanbeperformedonlyonphysicalsystems.Itisnot supportedonUEBsystems.

Replicationlimitations
Notethefollowingrestrictionspriortoconfiguringreplication:

Automaticdisasterrecoveryfromvault(seepage 401)andGranularrestore
fromvault(seepage 318)arenotsupportedonthereplicationtargetsystem asreplicatedbackupscanberestoreddirectlytoclientsorarchivemedia. ReplicationisnotsupportedforlegacyExchangebackups.LegacyExchange backupsarerunbytheUnitrendsWindows2000agenttoprotectExchange 2000environments.Fordetails,seeLegacyExchangeagentonpage 830. ReplicationoffilelevelbackupsforlegacyExchangeclientsissupported. RestoreofreplicatedLegacySQLbackupsissupportedduringdisasterrecovery ofthesourcesystemonly.Restoreofthesebackupsisnotsupportedoutsideof wholesystemdisasterrecovery. Sourcesystemscanbeconfiguredforreplicationorlegacyvaulting.Asingle sourcesystemcannotsupportbothconfigurations.However,thereplication targetcanreceivebothreplicatedandvaulteddatafromseparatesources.

Replication

247

Replicationandlegacyvaultingcomparison
An overview of the primary differences between replication and legacy vaulting is given in the following table. Further details are provided in the sections that follow.

Feature Retention on target system Deduplication Encryption Disaster Recovery supported Granular Recovery supported

Replication Yes Yes Yes Yes Yes, with hot/hot restore

Vaulting No Yes Yes Yes Limited, backup must be present on both the source and the target No

Hot/hot restore (backups directly restorable without Disaster Recovery) Source user can log in on the target and browse backups Reporting

Yes

Yes

No

Yes

Yes

Retention
Withlegacyvaulting,themostrecentbackupsofaclientaresynchronizedtothe vault.Whenanewmasterorfullbackupiscreated,thisbackupisthenvaulted, andthepriorvaultedbackupremoved.Withreplication,previouslyreplicated backupsareretainedonthetarget,aslongasthereisroomonthesystemandthe backupsarewithintheretentionandlegalholdlimitssetonthetarget.SeeAbout retentioncontrolonpage 106fordetails.
248

Chapter 6

Asystemsinstallationtypegovernshowretentioncanbeconfiguredonagiven system.Foradescriptionofeachinstallationtype,seeInstallationtypesand replicationonpage 250.Retentionsettingscanbeconfiguredforthefollowing installationtypes:

Localbackupsystemtomanageretentionofbackupsrunonthesystem. Replicationtargettomanageretentionofbackupsreplicatedtothesystem. Localbackupsystemandreplicationtargettomanageretentionofboth


backupsrunonandreplicatedtothesystem. Retentionsettingscannotbeconfiguredforlegacyvaultsasvaulteddataisnot retained.

Deduplication
Oncetheinitialdatasethasbeenreplicatedtothetarget,onlychangeddata blocksaretransferred.Deduplicationworksdifferentlyinreplicatingandvaulting systems.

Inreplication,theprocessconnectstothetargetsystemandcomparesdatain
thebackuptodataonthetarget.Thiscomparisonrunsonthesourcesystem. Oncechangedblocksareidentified,theyarereplicatedtothetarget.Thiskeeps bandwidthutilizationtoaminimumasonlychangedblocksaresentthrough theencryptedconnection. Inlegacyvaulting,aprocessonthesourcecomparesbackupdataonthesource andtargettoidentifychanges.Changesarewrittentoadeltafilethatissentto thevault,sothatonlychangedblocksarereceived.

Encryptionhandling
Inreplicatingsystems,backupsthatareencryptedonthesourceareencryptedon thetargetusingthetargetsystemskey.Inflight,thebackupdataisfirstdecrypted viathetransmissionprotocol,thenbeforebeingsavedonthetarget,isre encryptedusingthetargetskey.Ifencryptionisnotconfiguredonthetarget, replicationofencryptedbackupsfails.Forthisreason,itisrecommendedthat encryptionbeconfiguredonthetargetsystem.Onceencryptionisconfigured,the targetcanreceivebothencryptedandnonencryptedbackupsfromsource systemsforreplication. Invaultingsystems,encryptedbackupsremainencryptedastheywereonthe sourcesystem.Torestoreencrypteddatafromthevault,thesourcesystems encryptionkeymustbeused.

Replication

249

Restore
Replicateddataisstoredonthetargetasabackup,equivalenttoitssourceside counterpart.Vaulteddataisnotbackupdata.Becauseofthisfundamental difference,themannerinwhichdataisrestoreddifferssignificantlyinreplication andvaultsystems. Torestorefromavault,youuseadisasterrecovery(DR)tool,throughwhichyou firstrestorethesystemstatetoanewlyimagedsystem,thenrestorevaultedclient backups,andfinallyrestorethesebackupsfromthenewsystemtotheclient.See Disasterrecoveryfromvaultonpage 400fordetails.Torestoreonlyavolume, directory,orfile,youusetheGranularrestorefromvaultprocedureon page 318. Replicationismoreflexible,enablinghot/hotrestoreofreplicateddata.With replication,youcanperformwholesystemDR,orrestorereplicatedbackups directlytoaclientwithoutfirstrestoringtheentiresystem.Fordetails,see Restoringreplicatedbackupsonpage 295.

Installationtypesandreplication
WhenaUnitrendssystemisdeployed,asdiscussedinSystemsetuponpage 45, itisconfiguredwithoneofthefollowinginstallationtypes:

LocalbackupsystemUsedtoprotectthephysicalandvirtualinfrastructure
onpremise.

ReplicationtargetUsedasareplicationtargetforoneormorebackup

systems. LocalbackupsystemandreplicationtargetUsedasabackupsystemforthe localphysicalandvirtualenvironment,andalsoservesasareplicationtarget foranotherbackupsystem(s). Supportedinstallationtypesbysystemaregiveninthefollowingtable.


System Backup system Installation type Replication target Yes Backup system & replication target No

Unitrends Enterprise Backup Recovery-212


250

Yes

Yes

Yes

No

Chapter 6

System Backup system

Installation type Replication target Yes Backup system & replication target Yes

All RecoverySeries models other -212

Yes

Oncethesystemsinstallationtypeissettoreplicationtargetorlocalbackup systemandreplicationtarget,itcanbeconfiguredtoreceivereplicateddata.The amountofdatathatcanbereplicatedfrombackupsystemstothetargetdepends onvariousfactors,namely:

Therateatwhichdatachangesontheclientsprotectedbythelocalbackup
systems. Thebandwidthavailablebetweenthesourceandtargetsystems.

Replicationsetup
Unitrendssystems7.2andabovefeatureaReplicationWizardforquickandeasy setup.Theproceduresdescribedinthissectionarerunusingthewizard.Manual setupisstillsupportedifyouarerunninganearliersystemorifyouarefamiliar withthesetupprocessandprefertoperformitfromtheWANSettingsorSecure TunnelSettingspage.Fordetailsonusingthesepages,seeKB1314. ReplicationbetweenUnitrendssystemscanbesetupintwoways,bothofwhich canbeperformedthroughthewizard:

Standardreplicationwhereonesystemisthesourcethatreplicatestoasecond
targetsystem.Inthiscase,thetargetsystemmustbeconfiguredwiththe replicationtargetorlocalbackupsystemandreplicationtargetinstallation typetoreceivereplicateddata. Crossreplicationwherethetwosystemsreplicatetoeachother.Inthiscase, bothsystemsmustbeconfiguredwiththereplicationtargetorlocalbackup systemandreplicationtargetinstallationtypetoreceivereplicateddata. Setupproceduresdifferfortheseconfigurations.Proceedtooneofthefollowing tosetupthedesiredconfiguration:

Standardreplicationsetupbelow Crossreplicationsetuponpage 260

Replication

251

Standardreplicationsetup
Thissectionprovidesahighleveloverviewofthestepsrequiredtosetup standardreplicationbetweenabackupsystemandreplicationsystem.These proceduresrefertothebackupsystemasthesourceandreplicationsystemasthe target.ReplicationsetuprequiresyoutoaccesstheReplicationWizardinboththe sourceandtargetsystems.TheAdministratorsGuidedividesthereplicationsetup intoseveralpartsthatminimizetheneedforswitchingbetweenthesourceand thetargetsystems. Beforebeginningthesetupprocess,performthefollowing: 1 2 SeeReplicationrequirementsonpage 246toverifythatallrequirementshave beenmetforthesourceandtargetsystems. MakesureyouknowthehostnameandIPaddressforboththesourceandtarget systems.Toviewasystemshostnameintheadministratorinterface,select Settings>Clients,Networking,andNotifications>Networks>Hostname. MakesuretheIPaddressesandportsinuseonyournetworkwillnotconflictwith thedefaultsettingsforthesecuretunnelthatyouwillcreateforoptimized,secure communicationbetweenthesourceandtargetsystems.Thesecuretunneluses thefollowingsettings:

SecureTunnelIP:172.17.3.0 Netmask:255.255.255.0 Port:1194


Ifthesesettingsconflictwithyourenvironment,youcanchangethemwhen creatingthesecuretunnelaspartofthesetupprocess. Important!Donotusethisprocedureforsystemsrunningversion7.0.0or7.1.x. Upgradeto7.2or,ifthisisnotpossible,configurereplicationasdescribedinKB 1314.Donotusethisprocedureforsourcesystemsthatareconfiguredforlegacy vaulting.Ifyoursystemisvaultingdata,seeUpgradingfromlegacyvaultingto replicationonpage 275. Tosetupstandardreplicationbetweenasourceandtarget Note:UsetheReplicationWizardforeasysetup.Ifyouarefamiliarwithsettingup replicationfromtheWANSettingsorSecureTunnelsettingspage,thisisstill supported.Fordetailsonusingthesepages,seeKB1314. 1
252

Configureencryptiononthereplicationtargetbelow

Chapter 6

2 3 4 5 6 7

(Optional)Addalogicaldevicetoassociatewithasourcesystemonpage 253 Configurethesourcesystemroleandgrantprivilegetothetargetforremote managementonpage 254 Configurethetargetsystemroleandcreateasecuretunnelonpage 255 Configurethesecuretunnelandaddthesourcesystemtothetargeton page 257 Tunereplicationattributesonthesourcesystemonpage 258 Configureclientsandapplicationsforreplicationonpage 259

Configureencryptiononthereplicationtarget
Inreplicatingsystems,backupsthatareencryptedonthesourceareencryptedon thetargetusingthetargetsystemskey.Ifencryptionisnotconfiguredonthe target,replicationofencryptedbackupsfails.Onceencryptionisconfigured,the targetcanreceivebothencryptedandnonencryptedbackupsfromsource systemsforreplication. FollowthestepsinToconfigureencryptiononpage 115toconfigureencryption onthereplicationtarget.Ifyouwouldliketoreplicatebackupstoalogicaldevice, seeAddalogicaldevicetoassociatewithasourcesystem.

Addalogicaldevicetoassociatewithasourcesystem
Whensettingupreplication,addingalogicaldeviceisoptional.Ifyoudonotadd alogicaldevice,replicatedbackupsarestoredonthedefaultbackupdevice.This worksjustfine,especiallyfortargetswithonereplicatingsourcesystem. Fortargetswithmultiplereplicatingsources,youcanopttoassociatesourceswith specificlogicaldevices.Youcanassociateeachsourcewithitsowndevice,or associatemultiplesourcestoagivendevice,groupingthemasdesired.Ifyoudo notdefineassociations,replicatedbackupsforallsourcesarestoredtogetheron thedefaultdevice. Logicaldeviceconsiderations Beforeaddingalogicaldevicethatwillbeassociatedtoasourcesystem,notethe followingrequirementsandconsiderations:

Thedevicemustsupportdeduplication.Unitrendsdevicessupport
deduplicationbydefault.Notethatifyouhavedisableddeduplication,logical deviceassociationtoasourceisnotsupported. Thedevicemustbeatleast128GBinsizetobeusedforreplicatedbackup storage.Whenassociatingadevicetothesourcesystem,onlydevicesthat meetthissizerequirementdisplayinthelist.
253

Replication

Onceadeviceisassociatedtoasource,youcanremoveormodifythe
associationatanytime.

Uponremovingtheassociation,subsequentjobsarewrittentothedefault
backupdevice.Jobsinprogressarenotimpacted,theyarewrittentothe originaldevice. Uponmodifyingtheassociation,subsequentjobsarewrittentothenewly specifieddevice.Jobsinprogressarenotimpacted,theyarewrittentothe originaldevice. Uponchangingthedefaultdevice(designatinganotherdeviceasthenew default),thenewdefaultisusedforallsourcesforwhichanassociationisNOT defined.Nochangeismadetosourcesthathavebeenexplicitlyassociatedwith adevice. Replicatedbackupsremainonthedevicetowhichtheywereoriginallywritten. Modifyingorremovinganassociationdoesnotmigrateexistingreplicated backups. Tocreatealogicaldeviceforareplicationsource AddalogicaldevicetothereplicationtargetasdescribedinToaddadeviceon page 123.Youwillassociatethesourcetothisdevicelaterinthereplicationsetup procedure.

Configurethesourcesystemroleandgrantprivilegetothetargetfor remotemanagement
Instandardreplication,onesystemactsasasource,andasecondsystemactsas atarget.Foratargetoramanagementsystemtoremotelymanagealocalbackup system,thebackupsystemhastoexplicitlygrantprivilegetothemanager.Thisis donetosecureatwowayhandshakebetweenthemanagerandthemanaged system.Aspartofthesetupprocess,youwillcreateasecuretunnelforoptimized, securecommunicationbetweenthesourceandtargetsystems.Formoredetails aboutremotemanagement,seeGrantingprivilegeforremotemanagementon page 84.Formoredetailsaboutsecuretunnels,seeAboutsecuretunnelsfor Unitrendssystemsonpage 244. Beginreplicationsetupbyconfiguringtheroleofthesourcesystemandgranting privilegetothetargetforremotemanagement. Tip!TousetheReplicationWizard,itisbesttoconnecttoboththesourceand targetsystemsinseparatetabsinthesamebrowser.Thesetupstepsrequirethat youswitchfromonesystemtotheotheratvariouspoints.

254

Chapter 6

Toconfigurethesystemroleforthesource 1 2 3 4 Verifythatallrequirementshavebeenmetforthesourceandtargetsystems.See Replicationrequirementsonpage 246. Openabrowserandconnecttothesourcesystem. SelectReplication>ReplicationWizard.Onthewelcomescreen,clickNextto beginreplicationsetup. Thewizardaskshowyouwouldliketoconfigurethesystem.ClickReplication Sourcesoitishighlighted.ClickNext. Togranttheremotemanagementprivilege 5 Thewizardasksyoutoselectatargetforthesourcesystemsreplicatedbackups. Performoneofthefollowing:

Ifthetargethasnotbeenaddedtothesourcesystemshostsfile,selectAdda
NewTargetinthedropdownmenu.EnterthehostnameandIPaddressofthe replicationtargetinthespecifiedfields.Besuretoenterthehostnameexactly asitdisplaysinthehostsfileonthereplicationtargetsystem.ClickNext. Ifthereplicationtargethasalreadybeenadded,selectitinthedropdown menu.ClickNext. ChecktheboxthatreadsIagreethattargetcanmanagemysystem.Thisallows thetargetsystemtomanagethesourcesystem.ClickNexttoproceedwith generatingasecuretunnelcertificaterequest. ClickGenerateRequest.Thisgeneratesacertificatesigningrequestfile.Click Okay,andsavethefile<source>.csrinaconvenientlocation. Tocontinuewithreplicationsetup,youmustconfigurethesystemroleforthe targetandacceptmanagementprivileges,asexplainedinConfigurethetarget systemroleandcreateasecuretunnelbelow.

Configurethetargetsystemroleandcreateasecuretunnel
Afterconfiguringthesystemroleforthesourceandgrantingmanagement privilegetothetarget,youmustconfigurethesystemroleforthetargetand createasecuretunnelbetweenthesourceandtargetsystems.Formore informationaboutsecuretunnels,seeAboutsecuretunnelsforUnitrends systemsonpage 244. Toconfigurethesystemroleforthetarget 1 Verifythatallrequirementshavebeenmetforthesourceandtargetsystems.See Replicationrequirementsonpage 246.
255

Replication

2 3 4 5

Openabrowserandconnecttothetargetsystem. SelectReplication>ReplicationWizard.Onthewelcomepage,clickNexttobegin replicationsetup. Thewizardaskshowyouwouldliketoconfigurethesystem.ClickReplication Targetsoitishighlighted.ClickNext. Ifyouhavenotconfiguredthesystemasareplicationtarget,thewizardprompts youtochangetheinstallationtype.SelectInstallasavault(areplicationtarget forsomeotherlocalbackupsystem).(Ifyouhavealreadyconfiguredthesystem asareplicationtarget,thewizardskipstothenextstep.)ClickNext. Tocreateasecuretunnel Thewizardasksyoutoselectasourcetoreplicatetothetarget.Performoneof thefollowing:

Ifthereplicationsourcehasnotbeenaddedtothetargetsystemshostsfile,
selectAddaNewSourcefromthedropdownmenu.Enterthehostnameand IPaddressofthereplicationsourceinthespecifiedfields.Besuretoenterthe hostnameexactlyasitdisplaysinthehostsfileonthereplicationtargetsystem. ClickNexttoviewtheCreateaSecureTunnelTargetstep. Ifthesourcehasalreadybeenadded,selectitinthedropdownmenu.Click NexttoviewtheCreateaSecureTunnelTargetstep. AtthetopoftheCreateaSecureTunneltargetpage,thenetworksettingsforthe connectiondisplay.Thesesettingsareusedtocreatethesecuretunnelinterface. UsethedefaultIP,subnet,andportunlessthesesettingscauseaconflictinyour environment.Ifnecessary,enteryourownvalues.ClickCreateaSecureTunnel Target. Amessagedisplaysaskingifyouaresureyouwanttoproceed.Onceyoucreatea securetunnel,thisprocedurecannotbeundone.Ifyouarereadytocreatea securetunnel,clickYestoproceedwithsigningthesecuretunnelcertificate request. Note:IfthereplicationsetupprocessisinterruptedafterStep7,thewizardskips thisstepwhenyoustartoverwiththesetupprocess.Thisisnotanerror,asa securetunnelcanonlybecreatedonce.Whenthewizardskipsthisstep,proceed toStep8. 9 ClickSignRequest.Youarepromptedtobrowseandopenthefilecalled <source>.csryousavedearlier.Byopeningthefile,yousignthecertificate.Click Okayandsavethesignedcertificatefilecalled<source>.<target>.crtina convenientlocation.

256

Chapter 6

10 YouarepromptedtosavetheCertificateAuthorityfile.ClickOkayandsavethefile called<target>ca.crtinaconvenientlocation. 11 Youarepromptedtosendthecertificatefilesandotherinformationtothesource systemforfinalconfiguration.ClickOkay. Tocontinuethereplicationsetup,youmustreturntothereplicationwizardonthe sourcesystemandproceedtoConfigurethesecuretunnelandaddthesource systemtothetargetbelow.

Configurethesecuretunnelandaddthesourcesystemtothetarget
Performthesestepstoconfigurethesecuretunnelandaddthesourcesystemto thetarget. Toconfigurethesecuretunnel 1 2 3 SwitchtothesourcesysteminyourbrowsertoviewtheConfiguretheSecure TunnelontheSourceSystemstep.ClickCompleteConfiguration. YouseeamessageaskingyoutocompletetheSecureTunnelconfigurationand signtheSourceSystemCertificate.ClickOkay. Youarepromptedtobrowseandopenthe<target>ca.crtfile.Whenyouopenthe file,amessagedisplaysstatingthatyouhavesuccessfullyloadedtheCA certificate. ClickOkaytoloadthesignedSecureTunnelcertificate.Youarepromptedto browseandopenthe<source>.<target>.crtfile.OpenthisfiletocompleteSecure Tunnelconfigurationonthesourcesystem.ClickOkaytoacknowledgethatthe configurationiscomplete. Note:Ifyouhavepreviouslycreatedasecuretunnelbetweenthesourceand target,amessagedisplaysstatingthatthesourcehasalreadybeenconfiguredas anOpenVPNclientofthetarget.ClickOkay,andproceedtothenextstep. 5 ClickNexttocontinue.Thereplicationwizardinstructsyoutoreturntothetarget systemtocontinuewiththesetup. Toaddthesourcesystemtothetarget 6 Switchtothetargetsysteminyourbrowser.ClickNexttoviewtheAddSource SystemtoTargetstep.Inthedropdownmenus,selectacustomerandlocation forthesourcesystemorusethedefaultvaluesprovided.Ifyouhavemultiple backupdevicesonthetargetsystem,selectthedevicewhereyouwouldlike backupstoreplicate.ClickNext.
257

Replication

Thewizardnowasksifyouwouldliketolikeconfigureattributesonthesource system.Youcantunethesourcesystemtoperformoptimallygiventhe bandwidthavailableforreplication.Youcanalsoconfigureclientsand applicationsforreplication.Thewizardallowsyoutoperformthese configurationsfromeithersystem,buttosimplifythesetupprocess,these instructionsaskyoutoconfigureattributesthroughthesource.Onthetarget, selectThereplicationattributesofsourcearealreadysetup,andIamdone.(You willstillbeabletoconfigureattributesonthesourcesystem.)ClickNext. Thewizardinformsyouthatreplicationiscomplete.ClickFinishtocompletethe ReplicationWizardsetupforthetargetsystem.Youmustnowreturntothesource systemtocompletethereplicationsetup.ProceedtoTunereplicationattributes onthesourcesystembelow.

Tunereplicationattributesonthesourcesystem
Fromthesourcesystem,configurereplicationattributesusingthestepsbelow. Tosetreplicationattributesonthesourcesystem 1 2 3 Switchtothesourcesysteminyourbrowser.YouseetheAddSourceSystemto targetstep.ClickNexttobeginconfiguringattributes. SelectIwouldliketoconfigurethereplicationattributesofthesourcesystem, clickNext. IntheReplicationReportOptionssection,enterthefollowingtoreceiveemail reports:

ThetimetoreceivethereportintheTimetoSendReportfield. TheemailaddressintheReportEmailAddressfield.
Note1:Ifyouwanttoreceiveanemailreport,youmustentervaluesineachof thesefields. Note2:YoureceiveaReplicationreportifyouareusingreplicationanda SecuresyncreportifyouareusingVaulting. 4 IntheBandwidthandThrottlingOptionssection,configurethefollowing:

ConnectionTypeTheconnectionstheoreticalphysicalbandwidth.Ifyour
specificconnectionisnotinthelist,picktheclosestupstreambandwidth match. ConnectionEffectiveBandwidthWhatyouexpecttheactualbandwidthof thephysicalconnectiontobe. ThrottlingSettingsUsethegridtoconfiguresettings.
258

Chapter 6

ThrottlingissimplytheactofresponsiblysharingthebandwidthoftheWANby whichtheUnitrendstargetprovidesreplicationanddisasterrecoveryservices. Settheweeklyreplicationscheduleusingthegraphicaltoolconsistingof7x24 smallboxesthatrepresenteachhouroftheweek. Multiplethrottlingscenarioscanbeconfigured.Selectthethrottlepercentage, thenclickanddragthemousepointertohighlightthedaysandtimestousethe selectedpercentage.Performthisstepasmanytimesasneededtofully configurethrottlingscenarios.ThepercentageyouselectusesXpercentofthe ConnectionEffectiveBandwidthyousetaboveforreplication. 5 ClickNexttoacceptthesettings.TheConfigureReplicationoftheSourcesClients stepdisplays.ProceedtoConfigureclientsandapplicationsforreplication below.

Configureclientsandapplicationsforreplication
Abackupforaclientisreplicatedifthefollowingconditionsaresatisfied:

Replicationisenabledfortheclientoritsapplicationbackups.SeeTo
configureclientsandapplicationsforreplicationbelowfordetails. Theclientbackupsarelocatedonabackupdiskdevice. Theclientbackupsaresuccessful. Toconfigureclientsandapplicationsforreplication 1 Usethecheckboxestoselectallclientswhosebackupsaretobereplicatedtothe targetsystem.Onceyouselectaclient,allsubsequentfilelevelandbaremetal backupswillreplicate.ClickNext. Note1:IfaclientishostinganapplicationsuchasExchange,Oracle,orSQL,you mustconfigurethisapplicationforreplicationinthenextstep.Itsbackupswillnot replicateifyouconfigureonlytheclientandnottheapplication. Note2:AfterclickingNext,thesystemmakeschangestoallclientswhose replicationsettingyoucheckedorunchecked.Thisprocesscantakeafewseconds toseveralminutesdependingonthenumberofclientschanged.

Replication

259

Selectapplicationswhosebackupsaretobereplicatedtothetargetsystem.Use theNavigationpaneonthelefttoselectanapplication,thenusethecheckboxes toselectthedatabasesandvirtualmachinestoreplicate.Aftermakingalldesired selections,clickNext. Note:Ifyouadddatabasesorvirtualmachinestoyourbackupsystemaftersetting upreplication,theirbackupswillnotautomaticallyreplicate.Youmustconfigure themforreplicationusingtheproceduredescribedinToreplicateapplication backupsonpage 271.

Thereplicationwizardinformsyouthatreplicationsetupiscomplete.ClickFinish tocompletetheReplicationWizardsetup. YouarefinishedwiththeReplicationWizardsetup.Allclientsandapplicationsthat youhaveconfiguredwillbeginreplicating.Thereplicationqueueschemeissetto Recency,sothemostrecentbackupsarereplicatedfirst.Thisistherecommended approach,butyoucanchangethesettingtoMaximumRetention,wherebackups areaddedtotheendofthereplicationqueueastheycomplete,orManual,which enablesyoutoaddbackupstothereplicationqueuemanually.Fordetails,see Configuringconnectionoptionsandprocesscontrolonpage 269. Itisalsorecommendedthatforlargedatasetsyouseedtheinitialdatasettothe targetusingremovablemedia.Thisgreatlyreducesthetimerequiredtoreplicate thefirstbackups.Fordetails,seeSeedingtheinitialdatasetonpage 270.

Crossreplicationsetup
Thissectionprovidesahighleveloverviewofthestepsrequiredtosetupcross replicationbetweentwosystems.Incrossreplication,eachsystemactsasbotha backupsourceandareplicationtarget.Aspartofthesetupprocess,youwill createasecuretunnelforoptimized,securecommunicationbetweenthetwo systems.Whencreatingthissecuretunnel,youwilldesignateonesystemasthe securetunnelsource(STsource)andtheotherasthesecuretunneltarget(ST target).Thelargerofthetwosystemsisthebetterchoiceforasecuretunnel target,butiftheyarethesamemodel,eitherwillworkfine.Beforebeginningthe setupprocess,decidewhichsystemyouwilldesignateastheSTsourceandwhich youwilldesignateastheSTtarget. TheproceduredescribedhereisperformedusingtheReplicationWizard. ReplicationsetuprequiresyoutoaccessthewizardfromboththeSTsourceand STtargetsystems.Thisproceduredividescrossreplicationsetupintoseveralparts thatminimizetheneedforswitchingbetweenthetwosystems. Beforebeginningthesetupprocess,performthefollowing:
260

Chapter 6

1 2

SeeReplicationrequirementsonpage 246toverifythatallrequirementshave beenmetforthesourceandtargetsystems. MakesureyouknowthehostnameandIPaddressforboththesourceandtarget systems.Toviewasystemshostnameintheadministratorinterface,select Settings>Clients,Networking,andNotifications>Networks>Hostname. MakesuretheIPaddressesandportsinuseonyournetworkwillnotconflictwith thedefaultsettingsforthesecuretunnelthatyouwillcreateforoptimized,secure communicationbetweenthesourceandtargetsystems.Thesecuretunneluses thefollowingsettings:

SecureTunnelIP:172.17.3.0 Netmask:255.255.255.0 Port:1194


Ifthesesettingsconflictwithyourenvironment,youcanchangethemwhen creatingthesecuretunnelaspartofthesetupprocess. Important!Donotusethisprocedureforsystemsrunningversion7.0.0or7.1.x. Upgradeto7.2or,ifthisisnotpossible,configurereplicationasdescribedinKB 1314.Donotusethisprocedureforsourcesystemsthatareconfiguredforlegacy vaulting.Ifyoursystemisvaultingdata,seeUpgradingfromlegacyvaultingto replicationonpage 275. Tosetupcrossreplicationbetweentwosystems Note:UsetheReplicationWizardforeasysetup.Ifyouarefamiliarwithsettingup replicationfromtheWANSettingsorSecureTunnelSettingspage,thisisstill supported.Fordetailsonusingthesepages,seeKB1314. 1 2 3 4 5 6 7 8 Configureencryptiononthereplicationtargetonpage 253 (Optional)Addalogicaldevicetoassociatewithasourcesystemonpage 253 ConfiguretheSTsourcesystemforcrossreplicationandgrantmanagement privilegetotheSTtargetbelow ConfiguretheSTtargetsystemandcreateasecuretunnelonpage 263 Configurethesecuretunnelforcrossreplicationonpage 264 Addeachsystemtotheothersystemgridonpage 265 Tunecrossreplicationattributesonpage 266 Configureclientsandapplicationsforcrossreplicationonpage 267

Replication

261

ConfiguretheSTsourcesystemforcrossreplicationandgrant managementprivilegetotheSTtarget
Incrossreplication,eachsystemactsasbothasourceandatarget.Eachsystem mustgrantmanagementpermissiontotheothertoallowvariousreplication operations.BegincrossreplicationsetupbyconfiguringtheSTsourcesystemand grantingremotemanagementprivilegetotheSTtargetsystem. ToconfiguretheSTsourcesystemforcrossreplication 1 2 3 4 5 Verifythatallrequirementshavebeenmet.SeeReplicationrequirementson page 246. OpenabrowserandconnecttotheSTsourcesystem. SelectReplication>ReplicationWizard.Onthewelcomepage,clickNexttobegin crossreplicationsetup. Thewizardaskshowyouwouldliketoconfigurethesystem.ClickCross Replicationsoitishighlighted.ClickNext. Ifyouhavenotconfiguredthesystemforcrossreplication,thewizardprompts youtochangetheinstallationtype.SelectInstallasalocalbackupsystemanda vault(CrossReplication).(Ifyouhavealreadyconfiguredthesystemforcross replication,thewizardskipstothenextstep.)ClickNext. ThewizardasksyoutoselectasourcetoreplicatetotheSTsource.Performone ofthefollowing:

IftheSTtargetsystemhasnotbeenaddedtotheSTsourcesystemshostsfile,
selectAddanewSourceinthedropdownmenu.EnterthehostnameandIP addressoftheSTtargetinthespecifiedfields.Besuretoenterthehostname exactlyasitdisplaysinthehostsfileontheSTtarget.ClickNext. IftheSTtargetsystemhasalreadybeenaddedtotheSTsourcesystemshosts file,selectitinthedropdownmenu.ClickNext. Tograntmanagementprivilege 7

ChecktheboxthatreadsIagreethatSTtargetcanmanagemysystem.This allowstheSTtargetsystemtomanagetheSTsource.ClickNexttobegincreating asecuretunnel. ThewizardasksifyouwouldliketheSTsourcetobethesecuretunneltarget. SelectNo,IwouldpreferSTtargettobetheSecureTunnelTargetandSTsource tobetheSecureTunnelSource.ClickNext.

262

Chapter 6

Thewizardpromptsyoutogenerateasecuretunnelcertificaterequest.Click GenerateRequest.Thisgeneratesasigningrequestfile.ClickOkay,andsavethe file<STsource>.csrinaconvenientlocation. ThewizardproceedstotheConfiguretheSecureTunnelontheSourceSystem step.Tocontinuewithcrossreplicationsetup,proceedtoConfiguretheSTtarget systemandcreateasecuretunnelbelow.

ConfiguretheSTtargetsystemandcreateasecuretunnel
AfterconfiguringthesystemrolefortheSTsourceandgrantingmanagement privilegetotheSTtarget,youmustconfiguretheSTtargetandcreatethesecure tunnel.Formoreinformationaboutsecuretunnels,seeAboutsecuretunnelsfor Unitrendssystemsonpage 244. ToconfiguretheSTtargetsystem 1 2 3 4 5 Verifythatallrequirementshavebeenmet.SeeReplicationrequirementson page 246. Openanewtabinyourbrowser,andconnecttotheSTtargetsystem. SelectReplication>ReplicationWizard.Onthewelcomepage,clickNexttobegin crossreplicationsetup. Thewizardaskshowyouwouldliketoconfigurethesystem.ClickCross Replicationsoitishighlighted.ClickNext. Ifyouhavenotconfiguredthesystemforcrossreplication,thewizardprompts youtochangetheinstallationtype.SelectInstallasalocalbackupsystemanda vault(CrossReplication).(Ifyouhavealreadyconfiguredthesystemforcross replication,thewizardskipstothenextstep.)ClickNext. ThewizardasksyoutoselectasourcetoreplicatetotheSTsource.Performone ofthefollowing:

IftheSTtargetsystemhasnotbeenaddedtotheSTsourcesystemshostsfile,
selectAddanewSourceinthedropdownmenu.EnterthehostnameandIP addressoftheSTsourcesysteminthespecifiedfields.Besuretoenterthe hostnameexactlyasitdisplaysinthehostsfileontheSTsource.ClickNext. IftheSTtargetsystemhasalreadybeenaddedtotheSTsourcesystemshosts file,selectitinthedropdownmenu.ClickNext. Tocreateasecuretunnel 7 ChecktheboxthatreadsIagreethatSTsourcecanmanagemysystem.This allowstheSTsourcesystemtomanagetheSTtarget.ClickNexttobegincreating asecuretunnel.
Replication

263

ThewizardasksifyouwouldliketheSTtargetsystemtobethesecuretunnel target.SelectYes,IwouldlikeSTtargettobetheSecureTunnelTargetand STsourcetobetheSecureTunnelSource.ClickNext. AtthetopoftheCreateSecureTunnelTargetpage,thenetworksettingsforthe connectiondisplay.Thesesettingsareusedtocreatethesecuretunnelinterface. UsethedefaultIP,subnet,andportunlessthesesettingscauseaconflictinyour environment.Ifnecessary,enteryourownvalues.ClickCreateaSecureTunnel Target.

10 Amessagedisplaysaskingifyouaresureyouwanttoproceed.Onceyoucreatea securetunnel,thisprocedurecannotbeundone.Ifyouarereadytocreatea securetunnel,clickYestoproceedwithsigningthesecuretunnelcertificate request. Note:IfthecrossreplicationsetupprocessisinterruptedafterStep10,thewizard willautomaticallyskipthisstepwhenyoustartoverwiththesetupprocess.Thisis notanerror,asasecuretunnelcanonlybecreatedonce.Whenthewizardskips thisstep,proceedtoStep11. 11 ClickSignRequest.Youarepromptedtobrowseandopenthefile<STsource>.csr yousavedearlier.Byopeningthefile,yousignthecertificate.ClickOkayandsave thesignedcertificatefilecalled<STsource>.<STtarget>.crtinaconvenient location. 12 YouarepromptedtosavetheCertificateAuthorityfile.ClickOkayandsavethefile called<STtarget>ca.crtinaconvenientlocation. 13 Youarepromptedtosendthecertificatefilesandotherinformationtothesecure tunnelsourcesystemforfinalconfiguration.ClickOkay. Tocontinuereplicationsetup,youmustreturntotheSTsourcesystemand configurethesecuretunnel.ProceedtoConfigurethesecuretunnelforcross replicationbelow.

Configurethesecuretunnelforcrossreplication
Performthesestepstoconfigurethesecuretunnel. Toconfigurethesecuretunnel 1 2 SwitchtotheSTsourcesysteminyourbrowsertoviewtheConfiguretheSecure TunnelontheSourceSystemstep.ClickCompleteConfiguration. YouseeamessageaskingyoutocompletetheSecureTunnelconfigurationand signtheSourceSystemCertificate.ClickOkay.

264

Chapter 6

Youarepromptedtobrowseandopenthe<STtarget>.ca.crtfile.Whenyouopen thefile,amessagedisplaysstatingthatyouhavesuccessfullyloadedtheCA certificate. ClickOkaytoloadthesignedSecureTunnelcertificatefile.Youarepromptedto browseandopenthe<STsource>.<STtarget>.crtfile.Openthisfiletocomplete SecureTunnelconfigurationontheSTsourcesystem. ClickOkaytoacknowledgethattheconfigurationiscomplete. ClickNexttocontinue.Crossreplicationsetupisalmostcomplete.Youarenow readytoaddthetwosystemstoeachothersgrids.Startbyswitchingbacktothe STTargetinyourbrowserandaddingtheSTSourcetoitsgrid,asexplainedbelow inAddeachsystemtotheothersystemgrid. Addeachsystemtotheothersystemgrid Oncethesecuretunnelhasbeencreatedandconfigured,youcanaddthetwo systemstoeachothersgirds.Thisprocedurerequiresyoutoswitchbetweenthe STsourceandSTtargetsystems. Toaddeachsystemtotheothersystemgrid

5 6

1 2

SwitchtotheSTtargetinyourbrowsertoviewtheConfiguringaSecureTunnel step.ClickNext. UsingthedropdownmenusintheAddSourcetoTargetstep,selectacustomer andlocationfortheSTsourceorusethedefaultvaluesprovided.Ifyouhave multiplebackupdevicesontheSTtargetsystem,selectthedevicewhereyou wouldlikebackupstoreplicate.ClickNext. ReturntotheSTsourceandviewtheAddSourcetoTargetstep.Inthedropdown menus,selectacustomerandlocationfortheSTtargetorusethedefaultvalues provided.IfyouhavemultiplebackupdevicesontheSTsourcesystem,selectthe devicewhereyouwouldlikebackupstoreplicate.ClickNext. ThewizarddisplaystheSelectaSystemtoconfigurestep.Youarenowreadyto tuneattributesandconfigureclientsforeachsystem.Tocontinue,chooseoneof thefollowingoptions:

Ifyouwouldliketodefinereplicationattributes,suchasreportingand
bandwidththrottling,proceedtoTunecrossreplicationattributesbelow.

Ifreplicationattributesarealreadyconfiguredforbothsystems,selectNeither,
Imdonewithconfiguringreplication.Thewizardinformsyouthatreplication setupiscompletefortheSTsource.ClickFinishtoexitthewizard.Returntothe
265

Replication

STtargettocompletethereplicationsetup.Youseethestepaskingwhich systemyouwouldliketoconfigureattributeson.SelectNeither,Imdonewith configuringreplication.ThenclickFinishtoexittheReplicationWizard.

Tunecrossreplicationattributes
Oncethesystemsareaddedtoeachothersgrids,replicationconfigurationis almostcomplete.Youcannowtuneeachsystemtoperformoptimallygiventhe bandwidthavailableforreplication. TheReplicationWizardallowsyoutoperformtheseconfigurationsfromeither system,buttosimplifythesetupprocess,theseinstructionsaskyoutoconfigure attributesfortheSTsourcefromtheSTsourcesystemandfortheSTtargetfrom theSTtargetsystem. Tosetcrossreplicationattributes 1 2 StayinthebrowserontheSTsourcesystemandviewtheSelectaSystemto configurestep.SelecttheSTsourcesystem,andclickNext. IntheReplicationReportOptionssection,enterthefollowingtoreceiveemail reports:

ThetimetoreceivethereportintheTimetoSendReportfield. TheemailaddressintheReportEmailAddressfield.
Note1:Ifyouwanttoreceiveanemailreport,youmustentervaluesineachof thesefields. Note2:YoureceiveaReplicationreportifyouareusingreplicationanda SecuresyncreportifyouareusingVaulting. 3 IntheBandwidthandThrottlingOptionssection,configurethefollowing:

ConnectionTypeTheconnectionstheoreticalphysicalbandwidth.Ifyour
specificconnectionisnotinthelist,picktheclosestupstreambandwidth match. ConnectionEffectiveBandwidthWhatyouexpecttheactualbandwidthof thephysicalconnectiontobe. ThrottlingSettingsUsethegridtoconfiguresettings. ThrottlingissimplytheactofresponsiblysharingthebandwidthoftheWANby whichtheUnitrendstargetprovidesreplicationanddisasterrecoveryservices. Settheweeklyreplicationscheduleusingthegraphicaltoolconsistingof7x24 smallboxesthatrepresenteachhouroftheweek.

266

Chapter 6

Multiplethrottlingscenarioscanbeconfigured.Selectthethrottlepercentage, thenclickanddragthemousepointertohighlightthedaysandtimestousethe selectedpercentage.Performthisstepasmanytimesasneededtofully configurethrottlingscenarios.ThepercentageyouselectusesXpercentofthe ConnectionEffectiveBandwidthyousetaboveforreplication. 4 ClickNexttoacceptthesettings.TheConfigureReplicationoftheSourcesClients stepdisplays.ProceedtoConfigureclientsandapplicationsforcross replicationbelow.

Configureclientsandapplicationsforcrossreplication
Abackupforaclientisreplicatedifthefollowingconditionsaresatisfied:

Replicationisenabledfortheclientoritsapplicationbackups.SeeTo
configureclientsandapplicationsforreplicationbelowfordetails. Theclientbackupsarelocatedonadiskdevice. Theclientbackupsaresuccessful. Toconfigureclientsandapplicationsforcrossreplication 1 Usethecheckboxestoselectallclientswhosebackupsaretobereplicatedtothe othersystem.Onceyouselectaclient,anysubsequentfilelevelandbaremetal backupswillreplicate.ClickNext. Note1:IfaclientishostinganapplicationsuchasExchange,Oracle,orSQL,you mustconfigurethisapplicationforreplicationinthenextstep.Itsbackupswillnot replicateifyouconfigureonlytheclientandnottheapplication. Note2:AfterclickingNext,thesystemmakeschangestoallclientswhose replicationsettingyoucheckedorunchecked.Thisprocesscantakeafewseconds toseveralminutesdependingonthenumberofclientschanged. 2 Selectapplicationswhosebackupsaretobereplicatedtotheothersystem.Use theNavigationpaneonthelefttoselectanapplication,thenusethecheckboxes toselectwhichdatabasesandvirtualmachinestoreplicate.Aftermakingall desiredselections,clickNext. Note:Ifyouadddatabasesorvirtualmachinestoyourbackupsystemaftersetting upreplication,theirbackupswillnotautomaticallyreplicate.Youmustconfigure themforreplicationusingtheproceduredescribedinToreplicateapplication backupsonpage 271.

Replication

267

Thereplicationwizardasksifyouwouldliketoconfigureattributesonanother system.SelectNeither,Imdonewithconfiguringreplication.ClickNext.The wizardinformsyouthatreplicationsetupiscomplete.ClickFinishtoexitthe wizardandcompletereplicationsetupfortheSTsourcesystem. SwitchtheSTTargetsysteminyourbrowser.ContinuefromStep2ofTosetcross replicationattributesonpage 266. Whenreplicationattributeshavebeenconfiguredforbothsystems,select Neither,ImdonewithconfiguringreplicationandclickNext.ClickFinishto completetheReplicationWizardsetup. YouarefinishedwiththeReplicationWizardsetup.Allclientsandapplicationsthat youhaveconfiguredwillbeginreplicating.Thereplicationqueueschemeissetto Recency,sothemostrecentbackupsarereplicatedfirst.Thisistherecommended approach,butyoucanchangethesettingtoMaximumRetention,wherebackups areaddedtotheendofthereplicationqueueastheycomplete,orManual,which enablesyoutoaddbackupstothereplicationqueuemanually.Fordetails,see Configuringconnectionoptionsandprocesscontrolbelow. Itisalsorecommendedthatforlargedatasetsyouseedtheinitialdatasettothe targetusingremovablemedia.Thisgreatlyreducesthetimerequiredtoreplicate thefirstbackups.Fordetails,seeSeedingtheinitialdatasetonpage 270.

4 5

Configuringreplicationaftertheinitialsetup
Onceyourbackupsarereplicating,dependinguponyourenvironmentanddata protectionneeds,youmightneedtoperformoneormoreofthefollowing:

Configuringconnectionoptionsandprocesscontrolonpage 269 Seedingtheinitialdatasetonpage 270 Configuringbackupsforreplicationonpage 271 Tuningbandwidthandthrottlingoptionsonpage 272 Settingreplicationreportoptionsonpage 272 Suspendingreplicationonpage 273 Movingasourcetoadifferentreplicationtargetonpage 273 Removingreplicationonpage 274

268

Chapter 6

Configuringconnectionoptionsandprocesscontrol
Connectionoptionsandprocesscontrolallowyoutofinetunehowreplication behaves,includingthereplicationjobqueueschemeandhowmanybackupscan bereplicatedatonce. NoteaboutPollFrequency:Inpreviousreleases,therewasaPollFrequencyfield tosethowoftenthesourcechecksfornewbackupstoreplicate.Beginningin release7.3,thissettinghasbeenremoved,andthesourcenowsetspollfrequency automaticallytooptimizesystemperformance. Toadjustconnectionoptionsandprocesscontrol 1 2 SelectthesourcesystemyouwishtoadjustsettingsforintheNavigationpaneand SelectReplication>ReplicationAttributes. SelectConnectionOptionsandProcessControlandconfigurethefollowing:

QueueSchemeSpecifiesthemannerinwhichreplicationjobsarequeued.
ThedefaultsettingisRecency,wherebackupsareaddedtothetopofthe replicationqueue,sothemostrecentbackupsarereplicatedfirst.Notethat uponreplicatingthemostrecentbackupofagivenclientandtype,older backupsareremovedfromthequeueandarenotreplicated.SelectMaximize Retentiontoaddbackupstotheendofthereplicationqueueastheycomplete. SelectManualtoaddreplicatedbackupstothequeuemanually(see Replicatingbackupsmanuallyonpage 270).WiththeManualscheme,the systemdoesnotaddbackupstothequeue. MaxConcurrentEnterthemaximumnumberofreplicationtasksthatcanrun simultaneously. Resume/SuspendReplicationSelecttoresumeorsuspendreplication operations.Forinitialconfiguration,clickResumeReplicationtoenablethe replicationprocess. Ifsuspendingreplication,anoptionispresentedtosuspendimmediatelyby selectingYes,orsuspendafteranyreplicationoperationsinprogresshave completedbyselectingNo.Ifyoususpendimmediately,replicationoperations inprogressarestopped.SelectingCanceltakesyoubacktothepreviousscreen andreplicationcontinueswithoutinterruption. Note:Suspendingpausesreplicationoperationstemporarily,untilyouclick ResumeReplication.Itdoesnotremovethereplicationconfiguration.

ResetReplicationSelecttostopallinprogressreplicationoperations
immediatelyandthenrestartreplication.

Replication

269

Replicatingbackupsmanually
IfyouhavechosentheManualqueuescheme(seeConfiguringconnection optionsandprocesscontrolonpage 269),youmustselecteachfullbackupyou wishtoreplicate. Note:Fullormasterbackupsaretheonlytypethatcanbereplicatedmanually. Thisincludesapplicationlevel(suchasSQLfullandExchangefull)andfilelevelfull backups.ThisfeatureisnotavailablewiththeMaximizeRetentionandRecency queueschemes. Toreplicateabackupmanually 1 2 3 SelectaclientintheNavigationpaneandclickStatus. SelectthePast(HistoricalStatus)blind. UndertheBackup:MonthorBackup:Last7Daystab,clickthedesiredfull backup. DetailsdisplayontheBackupInformationpage. 4 5 ClickReplicateBackuptoaddthisbackuptotheendofthereplicationqueue. UsetheReplicationDashboard(Replication>Dashboard)toviewthebackupin thequeue.SeeWorkingwiththereplicationdashboardonpage 283fordetails.

Seedingtheinitialdataset
Forlargedatasets,itisrecommendedthatyouseedtheinitialdatasettothe targetusingremovablemedia(diskorNAS).Thisisoptional,butgreatlyreduces thetimerequiredtotransferthefirstbackupstothesystem.Ratherthanletting thereplicationprocessdothisinitialtransfer,useaseedingmechanism. Toseedtheinitialdataset Performthesestepsonthesourcesystem. Note:Ifcrossreplicating,performthisprocedureoneachreplicatingsystem. 1 2 SuspendreplicationbyselectingReplication>ReplicationAttributes> ConnectionOptionsandprocessControl>SuspendReplication. Disablearchiveschedulesforthedurationoftheseedoperation.

SelectArchive>ScheduleArchive. SelectascheduleandclickEnable/Disablebelow.Repeattodisableeach
schedule.
270

Chapter 6

ProceedtotheRapidSeedforReplicatingSystemsdocumentforseedinstructions.

Configuringbackupsforreplication
Onceyoursystemisreplicating,ifyouneedtoconfigurefilelevelorapplication backupsforreplication,usethefollowingprocedures:

Toreplicatefilelevelbackupsbelow. Toreplicateapplicationbackupsonpage 271.


Toreplicatefilelevelbackups 1 2 3 LogintothesourcesystemandselectSettings>Clients,Networking,and Notifications>Clients. Selectaclienttobeconfiguredforreplication. ChecktheAllbackupsperformedonthiscomputeraretoreplicated...box. Note:ThisoptionisnotavailableforHyperVandVMwarebecauseonly applicationlevelbackupsaresupportedfortheseclients.ToreplicateHyperVand VMwareclients,seeToreplicateapplicationbackupsbelow. Allsubsequentfilelevelandbaremetalbackupsforthisclientwillbereplicated tothetargetsystem.Ifthisfieldisnotchecked,backupsarenotreplicatedforthis client. Note:Iftheclientishostinganapplication,suchasExchange,Oracle,orSQL,and youwanttoreplicatethisapplicationsbackups,youmustalsoconfigurethe applicationforreplication.Ifyouconfigureonlytheclient,andnottheapplication, applicationbackupswillnotreplicate. Toreplicatetheclientsapplicationbackups,seeToreplicateapplication backupsbelow. 4 Repeatthisprocesstoconfigurealldesiredclientsforreplication. Toreplicateapplicationbackups Usethisproceduretosetupapplicationlevelbackupsforreplication. 1 2 IntheNavigationpane,selecttheapplicationwhosedataorvirtualmachinesyou wouldliketoreplicate. SelectReplication>ReplicationAttributes. Alistoftheapplicationsdatabases,storagegroups,orvirtualmachinesdisplays. Ifyoudonotseethedesireditems,clickReloadtorefreshtheview.
271

Replication

Ifanitemismarkedunavailable,checkthatthedatabase,storagegroup,orVMis online. 3 4 Checkboxestoselecttheitemsyouwishtoreplicate. ClickConfirmtosaveyoursettings.

Tuningbandwidthandthrottlingoptions
Usethisproceduretoconfigurehowyourreplicatingsystemsusetheavailable bandwidth.Thisprocedurecanberunfromthesourceortargetsystem. Totunebandwidthandthrottlingoptions 1 2 3 Logintothesourceortargetsystem. SelectthesourcesystemintheNavigationPane,andthenselectReplication> ReplicationAttributes. IntheBandwidthandThrottlingOptionssection,configurethefollowing:

ConnectionTypeTheconnectionstheoreticalphysicalbandwidth.Ifyour
specificconnectionisnotinthelist,picktheclosestupstreambandwidth match. ConnectionEffectiveBandwidthWhatyouexpecttheactualbandwidthof thephysicalconnectiontobe. ThrottlingSettingsUsethegridtoconfiguresettings. ThrottlingissimplytheactofresponsiblysharingthebandwidthoftheWANby whichtheUnitrendstargetprovidesreplicationanddisasterrecoveryservices. Settheweeklyreplicationscheduleusingthegraphicaltoolconsistingof7x24 smallboxesthatrepresenteachhouroftheweek. Multiplethrottlingscenarioscanbeconfigured.Selectthethrottlepercentage, thenclickanddragthemousepointertohighlightthedaysandtimestousethe selectedpercentage.Performthisstepasmanytimesasneededtofully configurethrottlingscenarios.ThepercentageyouselectusesXpercentofthe ConnectionEffectiveBandwidthyousetaboveforreplication. 4 ClickConfirmtosavethesesettings.

Settingreplicationreportoptions
Aftersettingupreplication,youcanconfigurereplicationreportstobesentvia email.Thisprocedurecanberunfromthesourceortargetsystem.

272

Chapter 6

Tosetreplicationreportoptions 1 2 3 Logintothesourceortargetsystem. SelectthesourcesystemintheNavigationPane,andthenselectReplication> ReplicationAttributes. IntheReplicationReportOptionssection,enterthefollowingtoreceiveemail reports:

TheemailaddressintheReportEmailAddressfield. ThetimetoreceivethereportintheTimetoSendReportfield.
Note1:Ifyouwanttoreceiveanemailreport,youmustentervaluesineachof thesefields. Note2:YoureceiveaReplicationreportifyouareusingreplicationanda SecuresyncreportifyouareusingVaulting. 4 ClickConfirmtosavethesesettings.

Suspendingreplication
Youshouldtemporarilysuspendreplicationinthefollowinginstances: onpage 270. Whenperformingmaintenanceonyoursystems. Whenyournetworkwillbeoffline. Suspendingpausesreplicationoperationstemporarily,untilyouclickResume Replication.Itdoesnotremovethereplicationconfiguration.Forinstructionson suspendingreplication,seeToadjustconnectionoptionsandprocesscontrolon page 269.Toremovethereplicationconfiguration,seeRemovingreplicationon page 274.

Whenseedingtheinitialdataset.Fordetails,seeSeedingtheinitialdataset

Movingasourcetoadifferentreplicationtarget
Asourcecanreplicatetoonlyonetarget,soifyouneedtomoveasourcetoa differentreplicationtarget,youmustfirstremovereplicationbetweenthesource andthecurrenttarget,asdescribedbelowinRemovingreplication.Youcan thensetupreplicationtoanewtargetbyfollowingtheinstructionsfor Replicationsetuponpage 251.

Replication

273

Removingreplication
Youmightfinditnecessarytoremoveareplicatingsourceincertainsituations, suchasifyouneedtomovethesourcetoadifferentreplicationtarget.Ifyou removereplicationforasource,replicationstops,butthetargetretains managementprivilegeandoperationsdescribedinSupportedtargetoperations usingthesourcesystemuseraccountonpage 280canstillbeperformedthrough thetarget. Removingreplicationdeletesallofthesourcesreplicatedbackupsfromthe target.Nobackupsaredeletedfromthesource.Beforeremovingreplication,be sureyounolongerneedthisreplicateddata. Toremovereplication Caution:Removingreplicationforasourcedeletesallofthesourcesreplicated backupsfromthetarget. 1 2 3 4 Logintothetargetsystem. SelectReplication>SystemManagement.Thenselectthesourcesystem. UncheckConfiguredforReplication? ClickConfirm.Aboxdisplaysaskingifyouaresureyouwanttoremovereplication forthesource.Tocontinue,checkIunderstandthatIampermanentlydeleting thissystemsreplicatedbackups. ClickConfirm. RefreshthetargetsystembyclickingthearrowsatthebottomoftheNavigation pane. Ifdesired,seeTorevoketheremotemanagementprivilegeonpage 84to removethesourcefromthetargetsNavigationpane.Youcanleavethesourceif youwanttomanageitsoperationsfromthetarget. Problemremovingreplication Inrareinstances,afterperformingtheproceduredescribedaboveinRemoving replication,youmightreceiveamessagestatingthatthesourceiscurrently replicatingtotheprevioustargetwhenyoutrytosetupreplicationtoanew target.Ifyoureceivethismessage,followthesestepstoremovereplicationforthe source: 1 Logintothesourcesystem.

5 6 7

274

Chapter 6

2 3 4 5 6 7

SelectSettings>System,Updates,andLicensing>GeneralConfiguration (Advanced). ExpandtheReplicationfolderbyclickingthearrownexttoit. ClickEnabledinthelistofsectionnames. Changethevaluetono.ClickConfirm. ThenclickSyncTointhelistofsectionnames.CleartheValuefield.ClickConfirm. RefreshthesourcesystembyclickingthearrowsatthebottomoftheNavigation pane.

Upgradingfromlegacyvaultingtoreplication
Ahighleveloverviewofthestepsrequiredtoupgradefromlegacyvaultingto replicationisgivenhere.Proceedtothesectionsthatfollowfordetailed instructions. Theseproceduresassumethesource(backupsystem)andtarget(legacyvault) youwishtoupgradearecurrentlyvaulting.Vaultingmustberunningand configuredcorrectlytousetheseupgradeprocedures. Runtheseproceduresonthetargetforeachsourcesystemyouwishtoupgrade. Foratargetreceivingvaulteddatafrommultiplesources,youmustcomplete theseproceduresforeachsource.

Migrationlimitations
Thefollowingvaulteddatadoesnotmigrateduringtheupgradeprocess:

Exchangeagent). Beforemigrating,besuretoarchivethisdata. Runtheseprocedurestoupgradefromlegacyvaultingtoreplication 1 2 3 Preparesourceandtargetsystems. Migratelegacyvaulteddata. Upgradetoreplication.

SourcesystemdatavaultedwiththelegacyVaultLocalDirectoryoption. VaultedNASclientbackups. VaultedlegacyExchangebackups(backupsrunwiththeWindowslegacy

Replication

275

Preparesourceandtargetsystems 1 Logintothetargetandsuspendvaultingonallsourcesystemsinpreparationfor installingupdates.

SelectasourcesystemintheNavigationpane,thenselectSettings>
2 Replication>ReplicationAttributes>SuspendVaulting. Repeatforeachsourcethatisvaultingtothistarget. Updatethetargettoversion7.1.

Withthetarget(brownvaulticon)selectedintheNavigationpane,selectSettings >SystemUpdates,andLicensing>Updates>Install. 3 Updatethesourcetoversion7.1. Withthesource(blueservericon)selectedintheNavigationpane,selectSettings >SystemUpdates,andLicensing>Updates>Install. 4 Restartvaultingonallsourcesotherthantheoneyouareupgradingtoreplication.

SelectthesourcesystemintheNavigationpane,thenselectReplication>
ReplicationAttributes>ResumeVaulting. Besurethatvaultingremainssuspendedonthesourceyouareupgrading. Theupgradeonlyimpactstheselectedsourcesystem.Restartingvaultingon theothersourcesenableslegacyvaultingtoresumeandcontinuethroughout theupgradeprocedure. Configurethetargetasacrossvault.(Ifthetargetisalreadyconfiguredasbotha backupsystemandreplicationtarget,skipthisstep.) WiththetargetselectedintheNavigationpane,selectReplication>System Management>AddSystem,checkCreateCrossVault,andclickConfirm. Note:Thisconfigurationisrequiredforreplicationevenifthetargetwillnotbe usedasabackupsystem. 6 7 WiththetargetselectedintheNavigationpane,selectSettings>Storageand Retention>StorageAllocation. Adjuststoragetoaddreplicationspace,eitherbydraggingaborderinthecircleor enteringavalueintheBackup/Replicationfieldbelow.

Toincreasereplicationstorage,youmustdecreaseVaultingand/orInstant
Recoverystorage.

VaulteddataisstoredonthetargetintheVaultingstoragearea.Replicated
dataisstoredintheBackup/Replicationstoragearea.Increasethisstoragearea toaccommodatereplicateddata.WhenyoucompletetheUpgradeto replicationprocedurebelow,datawillbeginreplicating.Ifthereisnospacein theBackup/Replicationarea,replicationjobsfail.

276

Chapter 6

Ifyouarealsousingthetargetasalocalbackupsystem,regularbackupsare
storedintheBackup/Replicationarea.Besuretoallocateenoughspacefor bothreplicatedandbackupdata. Ifthetargetisreceivingvaultdatafrommultiplesources,besuretoleave enoughspaceintheVaultingarea.IfyourunoutofspaceintheVaultingarea, legacyvaultjobsfail. WhenyoucompletetheUpgradetoreplicationprocedurebelow,vaulted dataforthissourceisremovedfromthetarget.Thisfreesspace.Fortargets withmultiplesources,freeingspaceasyouupgradeonesourceatatimeworks wellfortightsystems. Migratelegacyvaulteddata Note:Westronglyrecommendmigratinglegacyvaultdatatoavoidtransferring theinitialreplicationdatasetoverthenetwork.Ifyouskipthismigration procedure,theinitialtransferrequiresatremendousamountoftimeand bandwidth.Afterthelegacyvaulteddataismigrated,onlychangedblocksare transferredoverthenetwork. 1 Verifythefollowingprerequisiteshavebeenmet:

AllstepsinthePreparesourceandtargetsystemsprocedureabovehave
beencompleted. Thebackupsdeviceonthetargethasasmuchormorefreespaceasthetotal sizeofthebackupstobemigrated.Tocheckfreespace,selectSettings> StorageandRetention>Storage. Ifanyencryptedbackupsonthesourcewillbereplicated,encryptionmustbe enabledonthetarget.SeeToconfigureencryptiononpage 115fordetails. Ifanyencryptedbackupsonthesourcewillbereplicated,thesource encryptionpassphrasemustbeavailable.Youwillbepromptedforthis passphrasewhenmigratingdata. Usingaterminalemulator,suchasPuTTY,connecttothetargetwiththefollowing:

targetsystemIPaddress port22 SSHconnectiontype


3 Loginasauserwithrootprivileges.
login as: root root@192.168.220.56's password:

4 5

Enterthiscommandtolaunchthemigrationutility: Preliminarychecksarerunandmessagesdisplay.Checkthelastparagraphonthe screenanddooneofthefollowing:


277

[root]# /usr/bp/bin/vaultMigration-scripts/mr71VaultMigration.php

Replication

IfyouseeSelectthesystemtomigrate...,continuetothenextstepinthis
procedure.

IfyouseeFoundsomeproblems...,checkforFailedresultsaboveinthe
6 PreliminaryChecklist,correctanyissues,thenrerunthemigrationutility. IntheSystem(s)list,findthesourcewhosevaulteddatayouwishtomigrate, typeitsnumberandpressEnter.Forexample,
Selection (q to quit): 0

Informationfortheselectedsystemdisplays.Checkthelastparagraphonthe screenanddooneofthefollowing:

IfyouseeInsufficientspace...,notetheavailablespaceandamountneeded.
AllocatemorespacetotheBackup/Retentionarea(Settings>Storageand Retention>StorageAllocation),thenrerunthemigrationprocedure. IfyouseeEntertostartmigrationprocess...,pressEntertobeginmigration(or typeqtoquit). Ifyouaremigratingencryptedbackups,youarepromptedforthesources encryptionpassphrase.TypeinthepassphraseandpressEnter. Whilemigrationisinprogress,statusmessagesdisplay. Note:Youcanrunupto5migrationsessionstomigratemultiplesourcesystems concurrently.Usecautionwhenrunningmultiplesessionsaseachconsumes systemresources,whichmayadverselyimpactperformance.Torunanother session,startwithStep6inPreparesourceandtargetsystemsabovetoprepare yournextsource. 10 Whenmigrationiscomplete,youseethemessageDone,Exiting...andtheLinux commandpromptreturns.Forexample,
Done, Exiting... [root]#

8 9

Ifyouseeanyerrors,simplyreruntheutilitytomigrateanyremainingdata.Once thescriptcompleteswithouterrors,continuetoUpgradetoreplicationbelow. Upgradetoreplication

Warning:Upgradingasourcesystemfromlegacyvaultingtoreplicationdeletes allvaulteddataforthissourceonthetargetsystem.Ifyouhavemultiplesources vaultingtothetarget,legacyvaultingforothersourcescontinuesandvaulted dataforthesesystemsispreserved. 1


278

Verifythefollowingprerequisiteshavebeenmet:

Chapter 6

AllstepsinPreparesourceandtargetsystemsonpage 276havebeen
completed.

AllstepsinMigratelegacyvaulteddataabovehavebeencompleted.
2 3 4 Logintothetargetsysteminterface(notthecommandline). SelectthesourcesystemintheNavigationpane,thenselectReplication>System Management. VerifythatthedesiredsourcesystemdisplaysintheSystemUsernamefield. Warning:BesurethedesiredsystemdisplaysintheSystemUsernamefield.Any vaulteddataassociatedwiththissystemonthetargetwillbedeletedupon upgradingtoreplication. 5 6 7 ChecktheConfiguredForReplicationboxandclickConfirm. Whenthewarningmessagedisplays,clickYestocontinue. Whentheupgradeiscomplete,restartreplication. WiththesourcesystemselectedintheNavigationpane,selectReplication> ReplicationAttributes>ResumeReplication. 8 VerifythatreplicationisrunningbyselectingReplication>Dashboard.Youshould seesystemmetadatareplicatingwithinminutes.Fordetails,seeWorkingwith thereplicationdashboardonpage 283. Allclientsandapplicationsthatwereconfiguredforlegacyvaultingbegin replicating.Nofurtherconfigurationisrequired. 9 Toupgradeanothersourceonthistarget,suspendvaultingonthesourceand repeatthisprocedurestartingwithStep6inPreparesourceandtargetsystems above.

Replication

279

Navigatingreplicatingsystems
Inreplicatingsystems,youcanviewinformationfromboththesourceandtarget systems.Oneithersystem,thetasksyoucanperformarebasedonthelogin credentialssupplied.SeeAboutuserconfigurationonpage 54fordetails.

Fromthesourcesystem
Fromthesourcesystemyoucanaccessthefollowing:

Backupsstoredonthesourcesystemitself. Active,pending,andcompletedreplicationtasksasdescribedinWorkingwith
thereplicationdashboardonpage 283.

CompletedreplicationtasksbyviewingtheReplicationreport(last24hours)or
ReplicationHistoryreport(olderhistory).

Fromthetargetsystem
Targetsystemscanhavemultiplereplicatingsources.Torestrictaccessbysource system,thereisauniquesystemuseraccountonthetargetsystemforeach source.Thesystemsourceusernameandpasswordarethehostnameofthe sourcesystem.Forexample,forasourcewhosehostnameisCompanyBackup,log inasuserCompanyBackupandpasswordCompanyBackup. Tochangethesourcesystemuserpassword 1 2 3 4 SelectSettings>Customers,Locations,andUsers>Users. Selectthedesiredsourcesystemuser. ChecktheChangePasswordbox. EnterthenewpasswordinthePasswordandVerifyPasswordfields.Passwords maycontainupperandlowercaseletters,numbers,andspecialcharacterswith theexceptionofaspaceandanequalssign(=). ClickConfirmtochangethepassword.

Supportedtargetoperationsusingthesourcesystemuseraccount
Whileloggedintothetargetusingthesourcesystemuseraccount,theviewis filteredtoshowonlyinformationforthatsource.Sourcesystemaccountprivileges alsolimittheoperationsthatcanbeperformed.Thesourcesystemusercannot performbackupandarchiveoperations.

280

Chapter 6

Usingthesourcesystemuseraccountyoucandothefollowing:

Viewbackupsstoredonthesourcesystemitself. Viewreplicatedbackupsstoredonthetargetsystembyswitchingto
ReplicationView.SeeViewingreplicatedbackupsonpage 282fordetails. Manageactive,pending,andcompletedreplicationtasksasdescribedin Workingwiththereplicationdashboardonpage 283. Performrestoreoperations. Managesystemsettings. Runreports.

Supportedtargetoperationsusingasuperuseraccount
Whileloggedintothetargetusingasuperuseraccount,theviewincludes informationforallreplicatingsources.Youcanperformalloperationsforthe targetsystemanditssources. Whenworkingfromthetarget,selectthedesiredsystemintheNavigationpane toviewandmanagethatsystem.Thetargetsystemhasabrownvaulticontoits left.Sourcesystemshaveablueservericon. Fromthetargetsystemyoucanaccessthefollowing:

Backupsstoredonthesourcesystemitself,byselectingthesourceinthe
Navigationpane.(Thesearesourceside,nonreplicatedbackups.) Onesourcesreplicatedbackupsstoredonthetargetsystem,byselectingthe sourcesystemandswitchingtoReplicationView.SeeViewingreplicated backupsonpage 282fordetails. Replicatedbackupsfromallsourcesstoredonthetarget,byselectingthe replicationtarget(brownvaulticon). Localbackupsrunonthetargetsystemifitisconfiguredasbothalocalbackup systemandreplicationtarget.(Fordetails,seeInstallationtypesand replicationonpage 250.)Inthisconfigurationtherearetwosystemiconsin theNavigationpaneforthetargetsystem.Selecttheblueservericontosee local,nonreplicatedbackups. Onesourcesactive,pending,andcompletedreplicationtasks,asdescribedin Workingwiththereplicationdashboardonpage 283,byselectingthesource system. Active,pending,andcompletedreplicationtasksforallsources,asdescribedin Workingwiththereplicationdashboardonpage 283,byselectingthe replicationtarget(brownvaulticon).

Replication

281

Replicatedclientsonthetargetsystem
Ifanewclientisconfiguredforreplicationonasourcesystem,thefirsttimeone ofitsbackupsreplicatesthetargetcreatesareplicatedclientwithwhichto associatethebackup.Thereplicatedclientisaddedtothetargetsystems Navigationpanewhenreplicationbegins.

Viewingreplicatedbackups
YoucanviewreplicatedbackupsfromthetargetsystemusingtheReplicationView feature.Inreplicatingsystems,thebackupsyouseeonthetargetsystemare governedbywhethertheReplicationViewhasbeenselected.Ifnotselected,the backupsdisplayedarethosestoredonthesourcesystem.IfReplicationViewis selected,thebackupsdisplayedarereplicatedbackupsstoredonthetarget system. Onceabackuphasbeenreplicated,itisassignedanewIDonthetargetsystem. ThebackupIDofareplicatedbackupdoesnotmatchthatofitssourcesidebackup counterpart. Toshowreplicationview 1 2 3 4 5 Logintothetargetsystem. SelecttheGeariconatthebottomoftheNavigationpane. ChecktheShowReplicationViewbox. ClickConfirm.Theviewchangestoshowthereplicatedbackupsstoredonthe targetsystem. Tobesureyouareseeingreplicatedbackups,checkfortheReplicationViewbar abovetheNavigationpaneandCenterStage.IfReplicationViewdoesnotdisplay, youareviewingregularbackupsonthesourcesystem.Youcanalsolookatdetails ofanybackupontheStatus>Backup:Last7Daystab.Clickabackuptoview details.Inreplicationview,youseeReplicatedTrueintheBackupInformation.

282

Chapter 6

Workingwiththereplicationdashboard
Usethedashboardtomonitorandmanagereplicationoperationsonabackup systemorreplicationtarget.Toaccessthedashboard,selectthetargetorbackup systemintheNavigationpaneandselectReplication>Dashboard.Notethatyou cannotaccessthedashboardinReplicationView.Ifthedashboardselectionisnot available,switchtonormalview. Thedashboardshowseachsystemthatisreplicatingasaseparatecollapsible folder.TheinformationdisplayedisbasedonthesystemselectedintheNavigation pane.Foradescriptionofinformationdisplayedbysystemselected,see Navigatingreplicatingsystemsonpage 280. Thedashboardisorganizedintothreepanes:CompletedReplicationOperations, ActiveReplicationOperations,andPendingReplicationOperations.Thesections thatfollowdescribeeachindetail.

CompletedReplicationOperationspane
TheCompletedReplicationOperationspanecontainsdetailsofeachreplication operationthatcompletedinthelast24hours. CompletedReplicationOperationshierarchy Theinformationisarrangedinthefollowingway:

ClientfolderReplicatedbackupsaregroupedbyclient.Clientfoldersdisplay
firstinthehierarchyandarenamedinthefollowingformat: SourceSystem:SourceClient:BackupInstance>TargetSystem.Fora descriptionofsource,client,instance,andtarget,seeViewingcompleted replicationsonpage 284.Clickthearrowtotheleftofthefoldertoexpandor collapsetheview. ReplicatedbackupsBeneaththeClientfolder,replicatedbackupsforthis clientdisplaywiththemostrecentlycreatedoneshigherinthelist. Thefollowinginformationdisplaysforeachbackupthatreplicatedinthelast24 hours:

IDIDofthesourcebackup. StatusIconindicatingwhetherthebackupwasreplicatedsuccessfully.Green
indicatessuccess,redindicatesfailure.

ClientClientname.Collapseorexpandtheclientfolder,called
SourceSystem:Client,toshoworhideeachreplicatedbackup. TypeThetypeofbackupreplicated. Date/TimeTimeatwhichtheoperationstarted.
283

Replication

Size(MB)Thesizeofthereplicatedbackup. ElapsedTheelapsedtimefortheoperation.

Viewingcompletedreplications
ItemsdisplayedintheCompletedReplicatedOperationspanearefilteredbyyour selectionintheNavigationpane:

Selectthereplicationtarget(brownvaulticon)toseecompletedreplications
fromallsourcesystems. Selectthesourcesystem(blueservericon)toseecompletedreplicationsfor theselectedsystemonly. Toviewcompletedreplicationdetails 1 2 SelectthedesiredbackupsystemintheNavigationpane. Clickonanyrowinthepanetoseeadditionalinformation,includingthemessages associatedwiththereplicationtask.NotethattheIDontheReplicationDetail pageisthatofthesourcebackup.Thecorrespondingreplicatedbackuphasanew ID,whichdisplayswhenviewingbackupdetailsinReplicationView.Items displayedonthispagearedescribedhere:
Completed Replication Details Category BytesPerMinute

Description Average replication speed, in bytes per minute. Source system client for which this backup was run. Indicates whether the replication job completed. Date and time the replication started. Duration of the replication job in hh:mm:ss format (hours, minutes, seconds). ID of the source backup on the source system.

Client

Complete

Date Elapsed Time

ID

284

Chapter 6

Completed Replication Details Category Instance

Description Displays the following, depending on backup type:

For file-level backups, instance is filelevel.

For VMware or Hyper-V, name of the


guest VM.

For SQL, Exchange, or Oracle, name For SharePoint, instance is Farm.


Last Indicates whether this is the most recent backup of this type for this client on the source system. Indicates whether this backup is eligible for purging on the source system. Status of the replication job: success or failure. For failed jobs, see KB1049 for more information. Size of the replicated backup on the target. This may not match source backup size due to deduplication and compression. Source backup system from which data was replicated. ID assigned to this source system. Name of the target to which the backup was replicated. of the database or storage group.

Purgeable

Result

Size

System

System ID TargetName

Replication

285

Completed Replication Details Category Type

Description Backup type. File-level backup types include full/master, differential, incremental, selective, and bare metal. Application backup types vary by application. Application name is included in the backup type name (for example, Exchange Full). Success or Failure with error message. For failures, see KB1049 for more information. Click to exit the Replication Detail page.

Replication Messages

Close

Removingfailedoperations
Ifareplicationjobhasfailed,selectitintheCompletedReplicationOperations panetoviewdetails.ChecktheerrorintheReplicationMessagesboxandseeKB 1049forhelpresolvingtheissue. Toremoveafailedjob 1 EachfailedjobintheCompletedReplicationOperationspanecontainsatrashcan icon.ClickthetrashcaniconinthedesiredrowtolaunchtheRemoveItemsfrom ReplicationQueuepage. Chooseoneofthefollowingcriteria:

RemoveQueueItemsbytheirbackupnumbertoremovetheselectedjoband
anypendingandactiveoperationswiththisbackupnumber.(Multiplejobs withthisnumbermayexistifthereplicationhasfailedandisbeingretried.) RemoveQueueItemsbytheirclienttoremoveallreplicationjobsforthis client. Ifdesired,checkAdddeleteditemstotheendofthequeue.

Ifthebackupnumbercriteriaisselected,thefailedjobisaddedtotheendof
thependingoperationsqueueunlessnewerbackupsarepresent.Ifnewer backupsarequeuedforthisclient/backuptype,thejobisnotadded.

286

Chapter 6

Iftheallclientitemscriteriaisselected,anyfailedjobsareaddedtotheendof
thependingoperationsqueueunlessnewerbackupsarepresent.Ifnewer backupsarequeuedforthisclient/backuptype,thejobisnotadded. Important!Jobsareonlymovedtotheendofthequeueifnewerbackupshavenot yetbeenqueued.Ifanewerbackuphasbeenqueuedforthisclientandtype(file levelorapplication),thebackupisdeleted. 4 ClickConfirmtoremovejobs.

ActiveReplicationOperationspane
TheActiveReplicationOperationspanecontainsdetailsofeachbackupthatis currentlybeingreplicatedtothetarget. ActiveReplicationOperationshierarchy Theinformationisarrangedinthefollowingway:

ClientfolderReplicatingbackupsaregroupedbyclient.Clientfoldersdisplay
firstinthehierarchyandarenamedinthefollowingformat: SourceSystem:SourceClient:BackupInstance>TargetSystem.Fora descriptionofsource,client,instance,andtarget,seeToviewactive replicationdetailsonpage 288.Clickthearrowtotheleftofthefolderto expandorcollapsetheview. ReplicatingbackupsBeneaththeClientfolder,replicatingbackupsforthis clientdisplaywiththemostrecentlycreatedjobshigherinthelist. TheActiveReplicationOperationspanecontainsthefollowinginformationfor eachactiveoperation:

IDIDofthesourcebackup. StatusIconindicatingthatthebackupisbeingreplicatedtothetarget. TypeThetypeofbackupbeingreplicated.Thisincludesthestandardbackup


types,e.g.,master,differential,baremetal,SQLfull,etc.Inaddition,youmay seeabackuptypecalledSystemMetadata,whichisasmallbackupofinternal stateinformationthatisperiodicallytransmittedfromthesourcesystemtothe target.Thisstateispreservedtobeusedduringasystemrestore,ifever needed. PhaseProcessingphase,indicatingthatthebackupisbeingreplicatedtothe target.Eachreplicationjobgoesthroughfourphases:prepare,replicate, processingandwait/targetprocessing.Fordetails,seeKB955. PhaseStartDate/TimeThetimeatwhichreplicationbegan. ProgressThecompletionpercentageforthisoperation.Inprogressdisplaysif apercentagecannotbecalculated. ElapsedTheelapsedtimeforthisoperation.
287

Replication

EstimatedPhaseCompletionTheestimateddateandtimereplicationshould
complete,basedonthecurrenttransferrate.Itisimportanttonotethatthis projectionisbasedonspeedsseenatthattimeinterval.Duringtheday,if throttlingisbeingusedtolimitthenetworkbandwidthusedforreplication, projectedcompletiontimesmaybedisplayedthatarelaterthananticipated.If thepercentageofbandwidthallowedishigher,theprojectedcompletiontime willbemoreaccurateforanenvironment. Notethattherearesomeinstancesinwhichthefinalsizecannotbe determinedupfront,sothepercentcompletecannotbederived.Inthiscase, inprogressdisplays.

ViewingbackupsintheActiveReplicationOperationspane
ItemsdisplayedarefilteredbyyourselectionintheNavigationpane:

Selectthereplicationtarget(brownvaulticon)toseereplicatingbackupsforall
sourcesystems.

Selectthesourcesystem(blueservericon)toseereplicatingbackupsforthe
selectedsystemonly. Toviewactivereplicationdetails 1 2 SelectthedesiredbackupsystemintheNavigationpane. Clickonanyrowinthepanetoseedetailsaboutanactivereplicationtask.Note thattheIDshownisthatofthesourcebackup.Itemsdisplayedonthispageare describedhere:
Active Replication Details Category Client

Description Source system client for which this backup was run. Indicates whether the replication job completed. Amount of data replicated so far for this backup. Once replication completes, Current Size equals FinalSize. Amount of data not yet replicated for this job.

Complete

Current Size

Data Remaining

288

Chapter 6

Active Replication Details Category Date ElapsedTimePhase

Description Date and time the replication started. Duration of this phase in hh:mm:ss format (hours, minutes, seconds). Duration of the overall replication job in hh:mm:ss format (hours, minutes, seconds). Final size of the replicated backup. Estimate of time remaining for this replication job. ID of the source backup on the source system. Displays the following, depending on backup type:

ElapsedTimeTotal

FinalSize FullTimeRemaining

ID

Instance

For file-level backups, instance is filelevel.

For VMware or Hyper-V, name of the


guest VM.

For SQL, Exchange, or Oracle, name


of the database or storage group.

For SharePoint, instance is Farm.


InstanceItem Last Instance item. Indicates whether this is the most recent backup of this type for this client. Processing phase, indicatingthatthe

Phase

backupisbeingreplicatedtothe target.Eachreplicationjobgoes throughfourphases:prepare, replicate,processingandwait/target processing.Fordetails,seeKB955.


289

Replication

Active Replication Details Category PhaseSource

Description Indicates whether this phase is being run on the source or target system. Indicates whether this backup is eligible for purging on the source system. Time at which this replication job started. Time at which this phase in the replication job started. Source backup system from which data is replicating. ID assigned to this source system on the replication target. Name of the target to which the backup is replicating. Estimate of the time needed to complete this replication job. Current transfer speed of the replication job. Backup type. File-level backup types include full/master, differential, incremental, selective, and bare metal. Application backup types vary by application. Application name is included in the backup type name (for example, Exchange Full). Click to exit the Replication Detail page.

Purgeable

ReplicationStart ReplicationPhaseStart

System

System ID

TargetName

TimeRemaining

TransactionRate

Type

Close

290

Chapter 6

Toterminateareplicationinprogress 1 EachjobintheActiveReplicationOperationspanecontainsatrashcanicon.Click thetrashcaniconinthedesiredrowtolaunchtheRemoveItemsfromReplication Queuepage. Chooseoneofthefollowingcriteria:

RemoveQueueItemsbytheirbackupnumbertoterminatetheselectedjob
only.

RemoveQueueItemsbytheirclienttoterminateallrunningreplicationjobs
3 andremoveallpendingreplicationjobsforthisclient. Ifdesired,checkAdddeleteditemstotheendofthequeue.

Ifthebackupnumbercriteriaisselected,theactivejobisterminatedand
addedtotheendofthependingoperationsqueue. Iftheallclientitemscriteriaisselected,anyterminatedactiveorpendingjobs areaddedtotheendofthependingoperationsqueue. ClickConfirmtoterminateand/orremovejobs.

PendingReplicationOperationspane
ThePendingReplicationOperationspaneisaqueuecontainingcompleted backupswaitingtobereplicated. PendingReplicationOperationshierarchy Theinformationisarrangedinthefollowingway:

ClientfolderBackupstobereplicatedaregroupedbyclient.Clientfolders

displayfirstinthehierarchyandarenamedinthefollowingformat: SourceSystem:SourceClient:BackupInstance>TargetSystem.Fora descriptionofsource,client,instance,andtarget,seeToviewpending replicationdetailsonpage 292.Clickthearrowtotheleftofthefolderto expandorcollapsetheview. BackupstoreplicateBeneaththeClientfolder,backupstobereplicatedforthis clientdisplaywiththemostrecentlycreatedjobshigherinthelist. Thefollowinginformationdisplaysforeachpendingoperation:

IDIDofthesourcebackup. StatusIconindicatingthatthebackupiswaitingtoreplicate. ClientClientname.Collapseorexpandtheclientfolder,called


SourceSystem:Client:Instance/filelevel>TargetSystem,toshoworhide pendingoperationsforthisclient.

Replication

291

TypeThetypeofbackupthatwillbereplicated.Thisincludesthestandard
backuptypes,e.g.,master,differential,baremetal,SQLfull,etc.Inaddition, youmayseeabackuptypecalledSystemMetadata,whichisasmallbackupof internalstateinformationthatisperiodicallytransmittedfromthesource systemtothetarget.Thisstateispreservedtobeusedduringasystemrestore, ifeverneeded. Date/TimeThetimeatwhichthebackupstartedonthesourcesystem. Size(MB)Thesizeofthebackup

Viewingbackupsinthependingqueue
Itemsdisplayedinthependingqueuearefilteredbyyourselectioninthe Navigationpane:

Selectthereplicationtarget(brownvaulticon)toseequeuedbackupsfromall
sourcesystems.Inthisview,thetotalnumberofbackupswaitingtoreplicate displayinthetitlebarandthefirstpageofpendingjobsdisplaybelow.If necessary,clickonadditionalpagestoseemorebackups. Selectthesourcesystem(blueservericon)toseequeuedbackupsforthe selectedsystemonly. Toviewpendingreplicationdetails 1 2 SelectthedesiredbackupsystemintheNavigationpane. Clickonanyrowinthepanetoseedetailsaboutapendingreplicationtask.Note thattheIDshownisthatofthesourcebackup.Itemsdisplayedonthispageare describedhere:
Pending Replication Details Category Client

Description Source system client for which this backup was run. Command indicating the type of backup to replicate. Indicates whether the replication job completed. Device where this backup resides on the source system.

Command

Complete

Device

292

Chapter 6

Pending Replication Details Category DeviceID ID Instance

Description ID of the source backup device. ID of the backup on the source system. Displays the following, depending on backup type:

For file-level backups, instance is file For VMware or Hyper-V, name of the
guest VM. level.

For SQL, Exchange, or Oracle, name


of the database or storage group. For SharePoint, instance is Farm.

InstanceItem Last

Instance item. Indicates whether this is the most recent backup of this type for this client on the source system. Processing phase, indicatingthatthe

Phase

backupisbeingreplicatedtothe target.Eachreplicationjobgoes throughfourphases:prepare, replicate,processingandwait/target processing.Fordetails,seeKB955.


PhaseSource Indicates whether this phase is being run on the source or target system. Indicates whether this backup is eligible for purging on the source system. Size of the backup on the source. Source backup system from which data is replicating.

Purgeable

Size System

Replication

293

Pending Replication Details Category System ID

Description ID assigned to this source system on the replication target. Name of the target to which the backup is replicating. Backup type. File-level backup types include full/master, differential, incremental, selective, and bare metal. Application backup types vary by application. Application name is included in the backup type name (for example, Exchange Full). Contains additional information about the source backup, including logfile path on the source. Click to exit the Replication Detail page.

TargetName

Type

Output

Close

Toremoveapendingjobfromthequeue 1 EachjobinthePendingReplicationOperationspanecontainsatrashcanicon. ClickthetrashcaniconinthedesiredrowtolaunchtheRemoveItemsfrom ReplicationQueuepage. Chooseoneofthefollowingcriteria:

RemoveQueueItemsbytheirbackupnumbertoremovetheselectedjob

only. RemoveQueueItemsbytheirclienttoremoveallpendingreplicationjobsfor thisclient. Ifdesired,checkAdddeleteditemstotheendofthequeue.

Ifthebackupnumbercriteriaisselected,thependingjobismovedtotheend
ofthependingoperationsqueueunlessnewerbackupsarepresent.Ifnewer backupsarequeuedforthisclient/backuptype,thejobisnotadded.

294

Chapter 6

Iftheallclientitemscriteriaisselected,anypendingjobsareaddedtotheend
ofthependingoperationsqueueunlessnewerbackupsarepresent.Ifnewer backupsarequeuedforthisclient/backuptype,thejobisnotadded. Important!Jobsareonlymovedtotheendofthequeueifnewerbackupshavenot yetbeenqueued.Ifanewerbackuphasbeenqueuedforthisclientandtype(file levelorapplication),thebackupisdeleted. 4 ClickConfirmtoremovejobs.

Dashboardcontrols
Atthebottomofthedashboardisasetofcontrols,whichincludethefollowing:

RefreshNowClicktomanuallyrefreshthescreen. AutoRefreshChecktoautomaticallyrefreshthescreenatthespecified
interval.Thisallowsyoutoeasilymonitortheongoingprogressofreplication operations. RefreshIntervalEnterthenumberofsecondsbetweenautomaticrefreshes iftheAutoRefreshboxischecked. CloseClicktoexitthedashboardandreturntotheReplicationsubsystem.

Archivingreplicatedbackups
ReplicatedbackupscanbearchivedtoarchivemediasuchastheRecoveryArchive appliance,tape,NAS,oreSATAdrives.Theprocessissimilartoarchiveprocedures onasourceUnitrendssystem.Afterconnectingyourarchivemediatothe replicationtarget,clicktheGeariconatthebottomoftheNavigationpane,check ShowReplicationView,andclickConfirm. ThenselectthesourceintheNavigation pane.WheninReplicationView,followstandardarchiveproceduresasdescribed inArchivingbackupsonpage 200.

Restoringreplicatedbackups
Replicatedbackupscanberestoredtoaclientthatisdirectlyattachedtothe target.Onceyouhaveregisteredtheclienttothereplicationsystem,itcanbeused forrestoringreplicatedbackupsstoredonthetargetsystem. Torestoreareplicatedbackup 1 Onthereplicationtargetsystem,addtheclienttowhichyouwillrestorethe replicatedbackup.SeeAboutaddingclientsonpage 61fordetails.
Replication

295

2 3

SwitchtoreplicationviewbyselectingtheGeariconatthebottomofthe Navigationpane,checkingShowReplicationview,andclickingConfirm. Proceedtooneofthefollowingsectionsfordetailsonrestoringthedesired replicatedbackup:

Torestoreabaremetalbackup,seeBaremetalrestorefromthereplication
targetonpage 296. TorestoreaLinuxornonx86compatibleclientusingabaremetalISOand masterbackup,seeRestoreaLinuxornonx86clientfromthereplication targetonpage 299. Torestoreafilelevelbackup,seetheprocedureBasicstepsforrestoring backupsonpage 323. TorestoreaSQLbackup,seeSQLrestorefromthereplicationtargeton page 476. TorestoreanExchangebackup,usetheprocedureRestoringtoanalternate locationonpage 497. TorestoreitemsfromaSharePointbackup,seeTorestoreSharePointitems frombackuponpage 516.Sincecatastrophicfarmrecoverymustbe performedtotheoriginalfarm,youcannotrunfullfarmrestoresfromthe replicationtarget.Instead,restorefromthesourcebackupsystemasdescribed inTorestoretheentirefarmfrombackuponpage 518. TorestoreitemsfromanOraclebackup,seeTorestoreareplicatedWindows Oracledatabaseatthetargetsiteonpage 536.SincefullOraclebackupsmust berestoredtotheoriginaldatabase,youcannotrestorethemfromthe replicationtarget.Instead,restorefromthesourcebackupsystemasdescribed inOraclerestorefromthebackupsystemonpage 532. TorestoreaHyperVvirtualmachine,usetheprocedureRestoreVMto AlternateHyperVServeronpage 551.TorestorefilesfromaHyperVbackup, seeRestoringfilesfromHyperVbackupsonpage 553. TorestoreaVMwarevirtualmachine,usetheprocedureRestoringtheentire virtualmachineonpage 586.TorestorefilesfromaVMwarebackup,see RestoringfilesfromVMwarebackupsonpage 588.

Baremetalrestorefromthereplicationtarget
Usethisproceduretorestoreabaremetalbackuptoaclientthatisdirectly attachedtothetargetsystem.Youwillcreateanewdirectlyattachedclientand temporarilyreassignthereplicatedbaremetalbackuptoperformtherestore.

296

Chapter 6

Toperformthisprocedure,youwillneedareplicatedbaremetalbackupofthe originalsourceclientyouwishtorestore.Notethatyouwillneedtocreateanew baremetalISOtorestorefromthetarget.AnyexistingbaremetalISOyouhad createdonthesourcesystemcannotbeusedforthisprocedure. Note1:Thisprocedureisusedforthebaremetalbackuptypeonly.Forclients runningLinuxornonx86compatibleplatforms(suchasMacOSXandAIX),youdo nottypicallyhavebaremetalbackupsastherecommendedstrategyistocreatea baremetalbootCDandrunmasters.Torestoretheseclients,bootfromthebare metalCDandrestorethemasterbackupasdescribedinRestoreaLinuxornon x86clientfromthereplicationtargetonpage 299. Note2:WindowsInstantRecoveryissupportedonthereplicationtargetsystem, whichmightbenecessaryasatemporarysolutionuntilyoucanperformabare metalrestore.SeeWindowsInstantRecoveryonpage 436formoreinformation. Torestoreabaremetalbackupfromthereplicationtarget 1 2 Directlyattachtothetargetsystemtheclienttowhichyouwillrestore. Thiscanbeeitheraphysicalorvirtualclient. Registerthedirectlyattachedclienttothetargetsystem.Besurethatboththe UnitrendsWindowsandbaremetalagentsareinstalled. Toaddtheclienttothetarget,besureyouarenotinReplicationViewandselect thetargetsbluebackupsystemiconintheNavigationpane.Formoreonadding clients,seeAboutaddingclientsonpage 61. 3 Onthedirectlyattachedclient,createabaremetalISO.Fordetails,seeCreating theWindowsbaremetalbootmediaonpage 713. selectingOptions>ChooseServer/Device>AddServertoHostFileintheBare MetalAgentinterface. ForServerNameandServerIP,enterthehostnameandIPofthetargetsystem. ClientSettingscontaininformationaboutthedirectlyattachedclient.This informationdoesnotneedtobemodified. Note:YoumustcreateanewISOfromthedirectlyattachedclient.AnISOcreated onthesourcesystemcannotbeusedtorestorefromthetarget. 4 5 6 Onthereplicationtarget,switchtoReplicationViewbyselectingtheGeariconat thebottomoftheNavigationpaneandcheckingtheShowReplicationViewbox. SelectthetargetsystemintheNavigationpane(brownvaulticon). SelectReplication>ClientAssociations.
297

BeforecreatingtheISO,addthetargetsystemtotheclientshostfileby

Replication

Currentassociationsfortheselectedsourcesystemandclientdisplayinthegrid. Ifanassociationexistsforthedesiredbaremetalbackupandreplicationclient, skiptoStep12. 7 8 9 IntheClientlist,selectthedirectlyattachedclienttowhichyouwillrestore. IntheSourceSystemlist,selectthesourcesystemwheretheprotectedclient resides. IntheReplicatedClientlist,selectthereplicatedclientassociatedwiththebare metalbackupyouwishtorestore.

10 ClickFindBackupstodisplaythelistofreplicatedbaremetalbackupsforthe selectedclient. 11 OntheSelectaBackuppage,associateabaremetalbackupwiththedirectly attachedclientbyselectingabackupandclickingConfirm.

Ifdesired,repeatthissteptoassociateadditionalbackups. AssociationsdisplayontheCurrentAssociationspage.
12 StartthebaremetalrestorebybootingthedirectlyattachedclientfromtheISO. 13 Restorethebackupusingthebaremetalinterfaceonthedirectlyattachedclient. Seeoneofthefollowingsectionsfordetails:

ForWindowsclients,seeBaremetalrestoreproceduresonpage 717. Forotherx86compatibleplatforms,seeUsingthebaremetalcrashrecovery


bootCDonpage 744. Ifyouhavecreatedacoldbaremetalforotherclientplatforms,seethe applicablesectionintheBareMetalforLinuxorBareMetalforx86 Platformschapters. 14 Oncetherestoreiscomplete,removetheassociationtoreassignthebaremetal backuptothereplicatedclientonthetargetsystem.

InReplicationView,selectReplication>ClientAssociations. SelectarowintheCurrentAssociationsgrid. SelectYestoconfirmthatyouwishtoremovethisassociation.


Important!Ifyoudonotremovetheassociation,thebaremetalremains associatedwiththedirectlyattachedclient.Ifyouremovethedirectlyattached clientfromthetargetsystem,thisbackupisalsodeleted.

298

Chapter 6

RestoreaLinuxornonx86clientfromthereplication target
UsethisproceduretorestoreaclientrunningLinuxoranonx86compatible platform,usingabaremetalISOandmasterbackup.Ifyouhaveperformedacold baremetalfortheclientandhaveabaremetalbackup,usetheTorestoreabare metalbackupfromthereplicationtargetprocedureaboveinstead. Thefollowingprerequisitesareneededforthisprocedure:

AbaremetalISOimagecreatedonthesourcesystem. Areplicatedmasterbackuponthetargetsystem.
TorestoreaLinuxornonx86compatibleclientfromthereplicationtarget 1 2 Preparethereplacementclient(installwiththesameconfigurationasoriginal). Bootthebaremetalmedia(whichwascreatedonthesource).Therecommended practiceistobackuptheISOaspartofthemasterbackup,thenselectivelyrestore theISOonlyfromthereplicatedmastertotheSambasharetomakeitavailableat thetarget.BurntheISOtoaCD. Bootthereplacementclientwiththebaremetalmedia. Whileinthebootmedia,assignanewIPaddressandgatewayappropriatetothe targetenvironment. RegisterthenewclienttothebackupsystemusingthisIP.Theagentsoftwareon thebootmediawillrespondtotheregistrationprotocolrequest. SelecttheSmartRestoreoptioninthebootmedia. Choosethereplicatedmasterbackupthatyouwanttorestore,andrestoreitasan alternaterestoretothenewclient.Thefollowingtargetdirectorymustbe specified:/tmp/root.mnt DirectlyattachtothetargetsystemtheLinuxclienttowhichyouwillrestore.

3 4 5 6 7

Thiscanbeeitheraphysicalorvirtualclient. TheconfigurationandhardwaremustmatchthatoftheoriginalLinuxclient.
9 Dissimilarrestoreisnotsupportedfromthetarget. InstalltheUnitrendsLinuxagent,thenregisterthedirectlyattachedclienttothe targetsystem.Fordetails,seeAboutaddingclientsonpage 61.

10 Fromthereplicatedmaster,restoretheISOtothetargetsSambashare: 11 Onthedirectlyattachedclient,createabaremetalISO.Fordetails,seeCreating Linuxhotbaremetalbootmediaonpage 731.


299

Replication

BeforecreatingtheISO,addthetargetsystemtotheclientshostfileby
selectingOptions>ChooseServer/Device>AddServertoHostFileintheBare MetalAgentinterface.

Deletingreplicatedbackups
Todeletereplicatedbackupsfromatarget,youmustfirstenablereplicationview onthetargetasdescribedinViewingreplicatedbackupsonpage 282.This procedurepermanentlydeletesbackupsfromthetarget.Itdoesnot,however, affectbackupsonthesource. Whenyoudeleteabackup,itislogicallydeletedandyoucannolongeraccessit. However,theamountofavailablestoragewillnotimmediatelyincreaseandmight notincreaseatall.Thebackupsphysicalblocksareremovedwhenthesystem performsaperiodicpurge.Fordeduplicatedsystems,agivenblockmightbe referencedbyseveralbackups,andunlessallofthesebackupsaredeleted,the blockisnotpurged,andyouravailablestoragespacedoesnotincrease. Todeletereplicatedbackups 1 2 3 Inreplicationviewonthetarget,selectthesourcewhosreplicatedbackupsyou wouldliketodeleteintheNavigationpane. SelectSettings>StorageandRetention>BackupBrowser. Clickthearrownexttothesourceicontoexpandthelistofclientsand applications.Highlighttheclientorapplicationforwhichyouwouldliketodelete replicatedbackups. Caution:Ifyouhavenotenabledreplicationview,youareviewingthebackups storedonthesourcesystem,andifyoudeletethem,theyaredeletedfromthe backupsystemratherthanfromthereplicationtarget. 4 5 6 7 Selectabackupdeviceintheupperpane.Allbackupsonthatdevicedisplayinthe lowerpane.ClickRefreshtoensurethatthelistiscurrent. Chooseoneormorebackupsbycheckingthecorrespondingboxes.Toselectall, checktheboxinthetitlebar. ClickDeleteBackup,thenConfirm. Thebackupisdeletedonlyfromthereplicationtarget.Todeleteitfromthe source,disablereplicationviewandfollowthesameprocedure.

300

Chapter 6

Replicationreports
Ifconfigured,replicationgeneratesasynchronizationreportwhichprovidesthe detailsofeachvaultingevent.Areportisgeneratedandsenteachdayatthetime specifiedduringvaultingconfiguration.SeeTosetreplicationattributesonthe sourcesystemonpage 258fordetails. Thereportindicatesthesyncactivityforthelast24hourperiod.TheSyncengine upforvalueindicatestheamountoftimethesyncenginecouldconnecttothe vault.Thereportlistseachclientthatsyncstothevault,andforeachclient, recordsanddisplaysthebackupnumber,backuptype,timecompleted,status, effectivespeed,andbytessynced. Allbackupslistedinthebacklogshowthetimeofthebackup.Thevaulting operationsinprogressdisplaybackupswiththetimethevaultingoperation started. YoucanrunondemandvaultingreportsintheReportssubsystem.Theseinclude theInFlightVaultingDeduplicationReport,theVaultCapacityReport,andthe VaultingReport.SeetheReports,Alerts,andMonitoringchapterfordetails.

Replication

301

302

Chapter 6

Chapter7 LegacyVaulting
ThischapterprovidesproceduresusedtoconfigureandmanageUnitrendslegacy vaultingfeature.ForbackupsystemsrunningUnitrendsversion7.0andlater,you canopttouselegacyvaultingorthenewerreplicationfeature.Forbackupsystems runningversion6.4.1orolder,onlythelegacyvaultingfeatureissupported. Seethefollowingtopicsformoredetails:

Vaultingoverviewonpage 303 Vaultingsetuponpage 306 Dataprotectionvaultrestoreonpage 314 Workingwiththevaultingdashboardonpage 314 Vaultingreportsonpage 317 Granularrestorefromvaultonpage 318 Exportvaulteddatatoanarchivedeviceonpage 318

Formoreinformationonthereplicationfeature,seeChapter 6.Toupgradeto replication,seeUpgradingfromlegacyvaultingtoreplicationonpage 275.

Vaultingoverview
Vaultingisafeaturethatenablesdatasynchronizationbetweenoneormore systemstoasingleoffpremisesystemcalledavault.Vaultingpermitsthestorage ofmissioncriticaldatatoanoffsitelocationtoprotectagainstdatalossinthe eventofadisaster.Theonpremisebackupsystemisusedtoprotectagainstloss offiles,folders,andindividualmachines.Theonpremisesystemreplicatesdata

303

tothevault,protectingagainstthelossofanentiresite.Thereplicateddatafrom thevaultisusedtorecovertheonpremisebackupsystemandalltheserversit protects. Vaultingfeaturesinclude:

Totaldatarecoveryfromasitedisaster. DeduplicationofdataforoptimaltransferovertheInternet. Encryptedandsecureconnectionbetweenthebackupsystemandvault. Dataencryptedonthebackupsystemisencryptedinflightandatrestonthe vaultsystem. Configurablepoliciesforvaulting,suchastheabilitytoselectspecificclients, applications,anddatabasestoreplicate,configurablebandwidththrottling betweenthebackupsystemandthevault,andtheabilitytoprioritizequeued datatoensurethatmorecriticalsystemsarevaultedfirst. Detailedvaultingdashboardthatdisplaysactivevaultingtasks,previously vaultedtasks,andtasksinthevaultingqueue. ThefollowingfigureshowsahighleveltopologyoftheUnitrendsvaulting solution.

WhenaUnitrendssystemisdeployed,asdiscussedinSystemsetuponpage 45, itisconfiguredwithoneofthefollowinginstallationtypes:

LocalbackupsystemUsedtoprotectthephysicalandvirtualinfrastructure
onpremise. VaultUsedasatargetforoneormorebackupsystems.

304

Chapter 7

LocalbackupsystemandvaultThisconfigurationisalsoknownasacross
vaultinwhichthesystemisthelocalbackupsystemforthelocalphysicaland virtualenvironment,andalsoservesasavaultforanotherlocalbackup system(s). Oncethesystemissetupasavaultoracrossvault,itcanbeconfiguredasa target.Theamountofdatathatcanbevaultedfromabackupsystemtothe targetdependsonvariousfactors,namely: Therateatwhichdatachangesontheclientsprotectedbythelocalbackup systems. Thebandwidthavailablebetweenthebackupsystemsandthevault. Oncetheinitialdatathatismarkedforvaultinghasbeentransferredtothevault, allsubsequentdatatransfersonlysendthechangeddatablocks,deduplicating thedatainflight.Theinitialtransferofdatafromthelocalsystemtothevaultcan occurovertheWAN.However,forlargedatasetsitisrecommendedtouseadisk seedingmechanismtotransfertheinitialdataset.Evenwithinflight deduplicationminimizingtheamountofdatabeingtransferred,thespeedof transferisprimarilygovernedbythesizeofthenetworkpipebetweenthebackup systemandthevault.Inaddition,theremaybespecifictimesduringthedaywhen bandwidthavailableisusedforservicingendusersandcannotbeusedfor vaulting.Anotherfactoraffectingvaultingistheresiliencyoftheline.Unitrends leveragesOpenVPN,anopensourcetechnologybasedontheUDPprotocolthat createsasecureVPNtunnelandalsoprovidesresiliencytointermittentnetwork failuresviaUDPknitting.Ifthereisanetworkdropduringvaulting,theprocess utilizesadvancedcheckpointcontrolstoproceedwiththejobatthetimeof failure. Thevaultsystemcanbedeployedasaprivatecloudorasamultitenantcloud. Vaultingarchitectureensuresthatthelocalbackupsystemsthatvaulttoasingle targetonlyhaveaccesstotheirdata.Thissecurearchitectureisthebasisofa multitenantarchitecture. Thevaultingprocessisfullymanagedfromthevaultorbackupsystem.Usingthe vaultingdashboard,youcanimmediatelygaugevaultingstatusbyviewingactive, previouslycompleted,andpendingvaultjobs. Intheeventofadisaster,vaulteddatafromthetargetsystemisloadedonanew backupsystemwhichisthenshippedonpremisetothedisastersite(ortoan alternatelocation).Thisbackupsystemisthenusedtorecovertheenvironment toaconsistentstatebeforethedisaster.Fordetails,seetheLegacyDisaster Recoverychapter.

Legacy Vaulting

305

Vaultingsetup
Ahighleveloverviewofthestepsrequiredtosetupvaultingbetweenabackup systemandvaultaregivenhere.Proceedtothesectionsthatfollowfordetailed instructions. Tosetupvaultingbetweenabackupsystemandvault I Configureasecure,encryptedcommunicationchannelbetweenthevaultandthe backupsystemusingOpenVPN.SeeConfiguringOpenVPNwithlegacyvaultson page 306. Grantprivilegetothevaulttomanagethelocalbackupsystem.SeeGranting privilegeforlegacyvaultremotemanagementonpage 308.

II

III Addthelocalbackupsystemtothevault.SeeAddingthebackupsystemtothe vaultonpage 309. IV Tunethevaultingattributesonthelocalbackupsystemasdesired.SeeTuning vaultingattributesonthebackupsystemonpage 310. V Enablevaultingofdesiredclients.SeeConfiguringclientsforvaultingon page 313.

Step I: ConfiguringOpenVPNwithlegacyvaults
Tip:Thestepsdescribedherecanberunasastandaloneprocedureoraspartofa largerprocess.Foranoverviewoftheprocess,seeTosetupvaultingbetweena backupsystemandvaultabove. ThissectiondescribeshowOpenVPNtunnelsareused,prerequisitesneeded,and thestepsforconfiguringOpenVPN.

AboutOpenVPNtunnelsforUnitrendslegacyvaultingsystems
OpenVPNisanopensourcevirtualprivatenetworkprogramusedbyUnitrendsto createanoptimized,secure,encryptedtunnelformultipleUnitrendssystems. OpenVPNoffersascalablesolutionforenablingmultipleclientstoconnecttoa singleOpenVPNserverprocessthroughasingleUDPport. TherearetwotypicalusecasesassociatedwithusingOpenVPNwithUnitrends systems.Thefirstisavaultingscenariowherethereisavaultandoneormore backupsystems.Inthiscase,OpenVPNisconfiguredbetweenthevaultandthe backupsystemsinordertofacilitateboththevaultingofdata,aswellasthe

306

Chapter 7

managementofthesystems.Thesecondisthecasewheretwoormoresystems aremanagedbyadesignatedmanagementsystem.Withthissetup,youcanthen performoperationsforallsystemsfromoneUnitrendssysteminterface. TheprimaryadvantagesofOpenVPNarethatitenablesradicallysimplerfirewall management(sinceonlyoneportisneededbetweenoffpremiseUnitrends systems)andthatitenablesmuchhighersessionavailabilitybecauseitcanhandle lowerqualityWANlinesthatwouldtypicallyresultinsessiontermination(through UDPlevelridethroughofshortlivedtransientlinefailures.)

PrerequisitestoconfiguringOpenVPNforlegacyvaults
VerifythefollowingbeforeconfiguringOpenVPN:

Ensurethatthebackupsystemcancontactthevault,andverifythatthevault
IPaddresshasbeenaddedtothebackupsystemshoststable.Toconfigurethe hoststable,selectSettings>Clients,Networking,Notifications>Networks> Hosts. Ensurethatthehostnameofthebackupsystemisnotthesameasthe hostnameofthevault.Tochangethebackupsystemshostname,select Settings>Clients,Networking,Notifications>Networks>Hostname. ToconfigureOpenVPNforlegacyvaults 1 2 Connecttothevaultandbackupsystems.Foreasiestconfiguration,connectto eachfromonebrowserusingtwotabs. Onthevault,selectReplication>Vaulting>WANSettings,checktheShow ServerStepsbox,thenperformStep1:ConfigureOpenVPNServer. AcceptthedefaultIP,subnet,andport1194settings.ThisIPandsubnetareused tocreatethevirtualVPNinterface.Pleaseensurethatthereisnoconflictinyour environmentwiththedefaultsubnetselectedbyOpenVPN. 3 4 ClickConfirmtoproceedtothenextstep,whichisperformedonthelocalbackup system. Onthebackupsystem,selectReplication>Vaulting>WANSettings,checkthe ShowClientStepsbox,thenperformStep2:GenerateCertificateRequest. AcertificaterequestfileisgenerateduponclickingGenerateRequest.Youare promptedtodownloadandsavethecertificaterequestfile.Ithasa.csrextension. Proceedtothenextsteponthevault.

Legacy Vaulting

307

Onthevault,performStep3:SignCertificateRequest.Providethehostnameof thebackupsystemandclickSignRequest.Youarepromptedforthecertificate request(.csr)filesavedinStep4.Uponsigningthecertificate,thevaultsystem promptsyoutosavetwofiles:

Acertificatefilewitha.crtextension.Thefileisnamed:<backupsystem
hostname>.<vaulthostname>.crt. Acertificateauthorityfilewithaca.crtextension.Thefileisnamed:<vault hostname>ca.crt. InformationaboutthevaulthostnameandconfiguredOpenVPNportare provided.Notethisinformation,asitisrequiredtocompletethefinalstepfrom thebackupsystem. 6 Onthebackupsystem,performStep4:ConfigureOpenVPNClient.

EnterthevaultsystemshostnameandtheOpenVPNportyoureceivedinStep
5aboveandclickCompleteConfiguration. Whenpromptedforafile,selectthecertificateauthorityfile(<vault hostname>ca.crt)andclickOpen. Whenpromptedforthecertificatefile(<backupsystemhostname>.<vault hostname>.crt),selectitandclickOpen. AmessagedisplaysconfirmingsuccessfulOpenVPNconfiguration.ClickOkay toexit.Ifconfigurationwasnotsuccessful,clickCompleteConfigurationand tryagainbeingsureyouselectthecertificateauthorityfilefirst.

Step II: Grantingprivilegeforlegacyvaultremote management


Tip:Thestepsdescribedherecanberunasastandaloneprocedureoraspartofa largerprocess.Foranoverviewoftheprocess,seeTosetupvaultingbetweena backupsystemandvaultonpage 306. Foravaultoramanagementsystemtoremotelymanagealocalbackupsystem, thebackupsystemhastoexplicitlygrantprivilegetothemanager.Thisisdoneto secureatwowayhandshakebetweenthemanagerandthemanagedsystem. Aftergrantingremotemanagementprivilegetoasystem,youcanadminister nearlyallactionsonthemanagedsystemthroughasinglepaneofglass.Thereare afewexceptions.Logonlocallytoasystemtoperformthefollowingfunctions:

Manageandcreatecustomers,locations,andusers. Changethelocalsystempassword.

308

Chapter 7

Certainotheroperationsarerestrictediftheremotesystemisnotthesame versionasthemanager.ItisabestpracticetoalwayshaveallUnitrendssystemon thelatestversion. Togranttheremotemanagementprivilegetothelegacyvault 1 2 3 Onthelocalbackupsystem,selectSettings>System,UpdateandLicensing>Grid Management. SelectAllowRemoteManagementatthebottomleft. Enterthehostnameofthevaultormanagersystem. Besuretoenterthehostnameexactlyasitappearsinthehostsfileonthevault ormanagersystem.Toviewasystemshostname,selectSettings>Clients, Networking,andNotifications>Networks>Hostname. 4 ClickConfirmtogranttheprivilege.

Step III: Addingthebackupsystemtothevault


Tip:Thesestepscanberunasastandaloneprocedureoraspartofalarger process.Foranoverviewoftheprocess,seeTosetupvaultingbetweenabackup systemandvaultonpage 306. Oncethelocalbackupsystemhasgrantedmanagementprivilege,youcanadd thebackupsystemtothevaultsgrid. PrerequisitesforUEBvaults IfyouhavedeployedaUEBvault,youwillneedtoaddstoragetothevaultbefore addingthebackupsystem.UEBisdeployedwith138GBofbackupstorage.Ifyou donotaddvaultstorage,vaultswillbestoredonthebackupdevicewhichcan causeissuesifthedevicebecomesfull.SeeToaddvaultstorageonpage 96for details.Onceyouhaveaddedvaultstorage,besuretoselectthisdeviceasthe storagetargetwhenaddingthebackupsystem,asdescribedbelow. Toaddthebackupsystemtothevault 1 2 3 4 Onthevault,selectReplication>Vaulting>VaultManagement. ClickAddSystem. Enterthebackupsystemhostname. Ifyouareaddingasystemthatisconfiguredasbothabackupandvaultsystem, checkCreateCrossVault.
309

Legacy Vaulting

Tostorethesystemsvaulteddataonanaddeddiskdevice,checkSelectStorage andselectthetargetfromthelist. ThisoptionisforUEBsystemsonly.Ifyouhavenotaddedvaultstoragetoyour UEBsystem,donotaddthebackupsystemuntilstorageisavailable.Onceyouadd thebackupsystem,youcannotchangeitsvaultingstoragetarget.Vaultingtothe defaultbackupdeviceisnotrecommended.

Ifdesired,chooseaCustomerandLocationtoassociatewiththelocalbackup system.Thisisoptional. TodisplaycustomerandlocationinformationintheNavigationpane,clickthered iconatthebottomofthepane.

ClickConfirm. Uponsuccessfullyaddingthebackupsystem,thescreenrefreshesandthebackup systemislistedintheNavigationpane.Youcannowmonitorandmanagethis systemfromthevaultormanagersystem.

Step IV: Tuningvaultingattributesonthebackupsystem


Tip:Thesestepscanberunasastandaloneprocedureoraspartofalarger process.Foranoverviewoftheprocess,seeTosetupvaultingbetweenabackup systemandvaultonpage 306. Oncethelocalbackupsystemisaddedtothevault,vaultingconfigurationis almostcomplete.Youcannowtunethebackupsystemtoperformoptimally giventheavailablebandwidth.Youcanalsoconfiguretheamountofdatathat canbevaultedandotherattributes. Tosetthevaultingattributesonthebackupsystem Thisprocedurecanberunfromthebackupsystemorvault. 1 2 SelectthebackupsystemintheNavigationpaneandclickReplication>Vaulting >VaultingAttributes. SelectBandwidthandThrottlingOptionsandconfigurethefollowing:

ConnectionTypeTheconnectionstheoreticalphysicalbandwidth.Ifyour
specificconnectionisnotinthelist,picktheclosestupstreambandwidth match. ConnectionEffectiveBandwidthWhatyouexpecttheactualbandwidthof thephysicalconnectiontobe. ThrottlingSettingsUsethegridtoconfiguresettings.
310

Chapter 7

ThrottlingissimplytheactofresponsiblysharingthebandwidthoftheWANby whichtheUnitrendsvaultprovidesdisasterrecoveryservices.Settheweekly vaultingscheduleusingthegraphicaltoolconsistingof7x24smallboxesthat representeachhouroftheweek. Multiplethrottlingscenarioscanbeconfigured.Selectthethrottlepercentage, thenclickanddragthemousepointertohighlightthedaysandtimestousethe selectedpercentage.Performthisstepasmanytimesasneededtofully configurethrottlingscenarios.ThepercentageyouselectusesXpercentofthe ConnectionEffectiveBandwidthyousetaboveforvaulting. 3 SelectBaremetalandApplicationOptionsandconfigurethefollowingoptional settingsasdesired:

CheckVaultBareMetalBackupstovaultbaremetals. CheckVaultLegacySQLServerBackupstovaultbackupsofSQLServer2000
databases. CheckVaultLegacyExchangeBackupstovaultbackupsofExchangeServer 2000stores. IflegacyExchangebackups(pre4.2)aretobevaulted,youmustspecifythe directoriesassociatedwithExchange.LegacyExchangebackupsarestoredinthe followingdirectory: /backups/samba/<name_supplied_during_configuration> Forinformationonthegranularselectionofitemsassociatedwiththevaultingof specificapplicationsorvirtualmachines,seeTovaultapplicationbackupson page 314. 4 SelectLocalDirectoryOptionstoconfigurevaultingofthebackupsystemslocal directories,ifdesired. Vaultingcanbeusedtoprovidedisasterrecoveryforanysetoflocaldirectorieson theonpremisebackupsystem.ChecktheVaultLocalDirectoryInformationbox andadddirectoriestoprotectviathevault.ClickOpenFileBrowsertobrowsefor directories. 5 SelectConnectionOptionsandVaultingControlandconfigurethefollowing:

TransportTypeSpecifiesthetransporttypethatshouldbeusedtosyncdata.

Selectsshorsocket.Thetransporttypeshouldonlybesettosocketwhenthe connectionbetweenthesystemandthevaultissecuredbysomeothermeans, suchasaVPN. PollFrequencySetsthenumberofminutesbetweensynchronizations.Select theintervalatwhichthesystemchecksfornewbackupstovault,inminutes. Forexample,whensetto30,theapplicationscansfordatatobevaultedevery 30minutes.


311

Legacy Vaulting

RetriesSelectthenumberoftimesavaultjobwillberetriedbeforedeclaring
afailureandmovingtothenextoneinthequeue.Ajobthatcannotvaultis movedtothebottomofthequeueafternretries,wherenisthenumberyou specify.Ifretriesissettozero,eachfailedattemptwilllogafailure.Ifretriesis settoanonzeronumber,vaultingofabackupwouldneedtofailthatnumber oftimesplusone,beforeavaultingfailureislogged.Forexample,ifretriesis settothree,vaultingoperationshavetofailfourtimesbeforethefailureis logged. MaximumSpaceLimitstheamountofdiskspaceconsumedbydeltafileson thesystem.Whenvaultingisinitiated,asumofallthedeltafilesthatexiston thesystemisdeterminedandroundeduptothenearestGB.Ifthatsumequals orexceedsthemaximumspace,vaultingthenskipsanysyncoperationthat involvescreatinganotherdeltafile. VaultingDeduplicationOnCheckthisboxtoenablededuplication.When deduplicationisnotenabled,backupsarecopiedtothevaultinfull.Thisshould onlybedonewhenthebackupsystemandthevaultareonthesamenetwork wherethereisalargeamountofbandwidthoverwhichdatacanbe transferred. Resume/SuspendVaultingSelecttoresumeorsuspendvaultingoperations. Forinitialconfiguration,clickResumeVaultingtoenablethevaultingprocess. Ifsuspendingvaulting,anoptionispresentedtosuspendvaultingimmediately byselectingYes,orsuspenditafteranyvaultingoperationsinprogresshave completedbyselectingNo.Ifyoususpendimmediately,vaultingoperationsin progressarestopped.SelectingCanceltakesyoubacktothepreviousscreen andvaultingcontinueswithoutinterruption. Note:Suspendingpausesvaultoperationstemporarily,untilyouclickResume Vaulting.Itdoesnotremovethevaultingconfiguration.

ResetVaultingSelecttostopallinprogressvaultingoperationsimmediately
6 7 andthenrestartvaulting. SelectReportOptionsandconfigurethereportemailaddressandthetimeat whichvaultingreportswillbesent. Oncevaultingprocessconfigurationiscomplete,selectConfirmtosaveall changes.

VaultingcontinuousExchangeprotectiondata
ForinformationonhowtoconfigurevaultingforCEPdata,pleaseseethetechnical resourcedocumententitled,ContinuousExchangeProtectionat http://www.unitrends.com/documents/continuousexchangeprotection.pdf.

312

Chapter 7

Step V: Configuringclientsforvaulting
Tip:Thesestepscanberunasastandaloneprocedureoraspartofalarger process.Foranoverviewoftheprocess,seeTosetupvaultingbetweenabackup systemandvaultonpage 306. Abackupforaclientissynchronizedifthefollowingaresatisfied:

TheSyncableoptionisenabledfortheclientand/orapplicationsforthatclient. Theclientbackupsarelocatedonadiskdevice. Theclientbackupsaresuccessful.


Thedataonthevaultiscurrentatalltimes.Hence,thereexistsonlyone successfulreplicatedmaster,differential,andbaremetalbackup,andthemost currentapplicationdata,foragivenclient. Tovaultfilelevelbackups 1 2 3 Fromthemainmenu,selectSettings>Clients,Networking,andNotifications> Clients. Selectaclienttobeconfiguredforvaulting. ChecktheAllbackupsperformedonthiscomputeraretobereplicatedtoavault box. Allsubsequentfilelevelbackupsforthisclientwillbevaulted.Tovaultthisclients applicationbackups,seeTovaultapplicationbackupsbelow.Ifthisfieldisnot checked,backupdatafortheclientisnotvaulted(thisappliestobothfileand applicationlevelbackups). Note:Whenusingacrossvaultconfiguration,checkthisboxforthebackup systemitselftovaultsystemdata.Ifyoudonotseethesystemclient,clicktheGear iconatthebottomoftheNavigationpaneandcheckShowSystemClient. 4 ChecktheAdvancedoptionsboxandassigntheclientabackupandvaulting prioritybyselectingthedesiredoption. Thevaultingprocessprioritizesthedatatransferorderbasedontheselectionsyou choose.Jobsforhigherpriorityclientsarerunbeforejobsofnormalorlower priorityclients. 5 Repeatthisprocesstoconfigurealldesiredclientsforvaulting.

Legacy Vaulting

313

Tovaultapplicationbackups Usethisproceduretosetupapplicationlevelbackupsforvaulting.Notethatthe clientmustalsobeconfiguredforvaulting,asdescribedinTovaultfilelevel backupsabove,foritsapplicationbackupstovault. 1 2 IntheNavigationpane,selecttheapplicationwhosedataorvirtualmachinesyou wouldliketovault. SelectReplication>Vaulting>VaultingAttributes. Alistoftheapplicationsdatabases,storagegroups,orvirtualmachinesdisplays. Ifyoudonotseethedesireditems,clickReloadtorefreshtheview. 3 4 Checkboxestoselecttheitemsyouwishtovault,andsetapriorityvaluebetween 0and1000.Thehigherthenumber,thehigherthevaultingpriority. ClickConfirmtosaveyoursettings.

Dataprotectionvaultrestore
TheDisasterRecoveryfeatureisusedtorestoredatafromthevaulttothebackup system.Formoreinformation,seetheLegacyDisasterRecoverychapter.

Workingwiththevaultingdashboard
Usethevaultingdashboardtomonitorvaultingoperationsonabackupsystemor vault.Toaccessthedashboard,selectthevaultorbackupsystemintheNavigation paneandselectReplication>Vaulting>Dashboard.Thedashboardshowseach systemthatisvaultingasaseparatecollapsiblefolder. Thescreenisorganizedintothreeprimarysections:previous24hourhistoryofall completedvaultingoperations,activevaultingoperations,andpendingvaulting operations,whicharebackupswaitingtobevaulted.

CompletedVaultingOperationspane
TheCompletedVaultingOperationspanecontainsthefollowinginformationfor eachvaultingoperationthatcompletedinthelast24hours:

StatusAgraphicalstatusindicatingwhetherornotthebackupwas
successfullyvaulted.

ClientClientname. VaultedDate/TimeThetimethevaultingoperationstarted.
314
Chapter 7

TypeThetypeofbackupvaulted. ElapsedTheelapsedtimeforthevaultingoperation. Size(MB)Thesizeofthevaultedbackup.

Viewingcompletedvaultdetails
Clickonanyrowinthepanetoseeadditionalinformation,includingthemessages associatedwiththevaultingoperation.Iftheselectedoperationisonethathas failedandiseligibletobereset,aresetbuttondisplaysinthedetailswindow.Only thosebackupsassociatedwithrepeatedlyfailingpatchoperationsareeligiblefor reset.ClickResettoremovethesignaturefile,thedelta,andsyncInfofilessothe entireprocesscanbeginanew.

ActiveVaultingOperationspane
TheActiveVaultingOperationspanecontainsthefollowinginformationforeach activevaultingoperation:

PhaseAniconthatdenotesthevaultingphase.Whenabackupisvaulted,it
goesthroughseveralphases.Ifdeduplicationisenabledforthebackupsystem (enabledbydefault),avaultingjobgoesthroughthesephases: 1 Creatingdeltafile.Thevaultoperationgeneratesadeltafileonthebackup systemthatcontainsjustthedatathathaschangedsincethisbackuptype forthisclientlastvaulted. 2 3 Copyingdeltafile.Copyingthedeltafilefromthebackupsystemtothe vault. Patchingdeltafile.Patchingchangedblocksintothebackuponthevault.

Note:IfyouhaveselectedthebackupsystemintheNavigationpane,thepatch operationdisplaysasacopywhilechangedblocksarebeingpatched.Youonly seetheoperationasapatchinthedashboardifyouhaveselectedthevaultinthe Navigationpane.Youmayalsoseeacreatingsignatureoperationifviewingthe dashboardfromthevault.Signaturesareonlycreatedthefirsttimeaclientvaults, orafterareset,toestablishatrustrelationship.

ClientClientname. Date/TimeThetimeatwhichthisvaultoperationstarted. TypeThetypeofbackupbeingvaulted.Thisincludesthestandardbackup


types,e.g.,master,incremental,baremetal,etc.Inaddition,youmayseea backuptypecalledSystemStatewhichisasmallbackupofinternalstate informationthatisperiodicallytransmittedfromthebackupsystemtothe vault.Thisstateispreservedtobeusedduringasystemrestore,ifeverneeded.
315

Legacy Vaulting

ElapsedTheelapsedtimeforthevaultingoperation. %Thecompletionpercentageforthisoperation. EstimatedCompletionTheestimateddateandtimethisvaultoperation


shouldcomplete,basedonthecurrenttransferrate.

Viewingactivevaultdetails
Clickonanyrowinthepanetoseeadditionalinformation,includingthecurrent sizeandfinalsizeassociatedwiththisoperation,therateatwhichthephaseis progressinginMBpersecond,andanestimatedcompletiontimeforthisphase.It isimportanttonotethatthisprojectionisbasedonspeedsseenatthattime interval.Duringtheday,ifthrottlingisbeingusedtolimitthenetworkbandwidth usedforvaulting,projectedcompletiontimesmaybedisplayedthatarelaterthan anticipated.Thisisbecausewiththrottling,theamountofbandwidthavailablefor thevaultingoperationislimited.Ifthepercentageofbandwidthallowedishigher, theprojectedcompletiontimewillbemoreaccurateforanenvironment. Notethattherearesomeinstancesinwhichthefinalsizecannotbedetermined upfront,sothepercentcompletecannotbederived.

Terminatingavaultinprogress
Youmayopttoterminateavaultingjobbyselectingitinthelistandclicking Terminate.Thisoptionisavailableforeveryactivevaultingoperation,allowing youtostopthejob,modifybackupandvaultingoptions,theneasilyrestartthe vaultingprocess.Forfilelevelbackups,anadditionalTerminate/Clearoptionis available.Selectingthisclearsthesyncneededstatusofthebackup,removingit fromthependingvaultingoperationsqueue.Ifapatchoperationisinprogress,all patchinformationisremovedsoafreshvaultprocesswillrunforthisbackup (Securesyncwillnotthinkitshouldresumepatchingthatbackuponthenext pass).

PendingVaultingOperationspane
ThePendingVaultingOperationspanecontainsthefollowinginformationforeach pendingoperation:


316

StatusAstatusindicatingwhetherthevaultingoperationisactiveorwaiting. ClientClientname. BackupDate/TimeThetimeatwhichthebackupstarted. TypeThetypeofbackup. ElapsedTheelapsedtimeforthebackupoperation.

Chapter 7

Size(MB)Thesizeofthebackup

Vaultingdashboardcontrols
Atthebottomofthescreenisasetofcontrols,whichincludethefollowing:

RefreshcheckboxCheckthisboxtoautomaticallyrefreshthescreenatthe
specifiedinterval.Thisallowsyoutoeasilymonitortheongoingprogressof vaultingoperations. RefreshIntervalEnterthenumberofsecondsbetweenautomaticrefreshes iftheRefreshboxischecked. RefreshClicktomanuallyrefreshthescreen. ClockClicktoseewhenvaultingranlastandwhenanynewpendingvaulting operationswillbeconsideredforvaulting.Theprimaryvaultingcontrolling process,Securesync,checksperiodicallytoseeifnewbackupsarereadytobe vaulted.ClickingClockshowsthelasttimeandnexttimechecked,andif vaultingissuspended,italsoletsyouknow,asnewbackupswillnotbe consideredforvaultingwhenvaultingissuspended.Theintervaltimemaybe modifiedasnecessary. CloseClosesthissubsystemandreturnsyoutotheVaultingsystem.

Vaultingreports
Ifconfigured,vaultinggeneratesasynchronizationreportwhichprovidesthe detailsofeachvaultingevent.Areportisgeneratedandsenteachdayatthetime specifiedduringvaultingconfiguration.SeeTosetthevaultingattributesonthe backupsystemonpage 310fordetails. Thereportindicatesthesyncactivityforthelast24hourperiod.Thereportlists eachclientthatsyncstothevault,andforeachclient,recordsanddisplaysthe backupnumber,backuptype,timecompleted,status,effectivespeed,andbytes synced. Allbackupslistedinthebacklogshowthetimeofthebackup.Thevaulting operationsinprogressdisplaybackupswiththetimethevaultingoperation started. YoucanrunondemandvaultingreportsintheReportssubsystem.Theseinclude theInFlightVaultingDeduplicationReport,theVaultCapacityReport,andthe VaultingReport.SeetheReports,Alerts,andMonitoringchapterfordetails.

Legacy Vaulting

317

Granularrestorefromvault
Granularrestoreenablesyoutorestoreavolume,directory,orfilethathasbeen vaulted.Granularrestoreisatwophaseprocessinwhichyoufirstspecifythe volume,directory,orfile,whichisthenencapsulatedintheformofaselective backupandtransferredfromthevaulttothebackupsystem.Oncetheselective backuphasbeencompleted,usethestandardrecoveryprocesstorestoreorverify thedata.SeeBasicstepsforrestoringbackupsonpage 323fordetails. Toperformagranularrestorefromvault 1 2 SelectthebackupsystemintheNavigationpaneandchooseSettings>Vaulting> GranularRestore. SelectthedesiredbackupintheAvailableVaultedBackupspane. AvailableVaultedBackupscontainsalistofthemostrecentlyvaultedmasterand incrementalbackupsforeachclientregisteredtotheselectedbackupsystem.Ifa clientoravaultisselectedintheNavigationpane,anerroroccurssincethe restoremusthaveanassociatedbackupsystemspecified. Uponselectingabackup,itscontentsdisplayaboveintheFilesAvailablepane. 3 Selectthevolume,directory,orfiletorestorebybrowsingtheFilesAvailable pane. Onlyasinglevolume,directory,orfilecanbeselected.Multipleselectionsarenot allowed. 4 Withthedesireditemselected,clickTransferData. Thisbuttonisenabled(highlighted)onceaselectionismadeintheFilesAvailable section.Ifclicked,theselecteditemistransferredtothebackupsystemand encapsulatedintheformofaselectivebackup. 5 Restoreorverifyoneormorefilesfromtheselectivebackup.SeeBasicstepsfor restoringbackupsonpage 323fordetails.

Exportvaulteddatatoanarchivedevice
Thissectiondescribestheproceduresusedtoexportvaulteddatatoanarchive device.Youmaywanttoexportfromvaulttoarchiveinthesesituations:

318

Chapter 7

Youwishtoretainoldercopiesofclientdataoffsiteatthevaultlocation.
Ratherthanarchivingfromthebackupsystemandtakingthedataoffsiteafter, youcanexportdirectlyfromthevaulttoarchiveformatattheoffsitelocation itself. YouneedtorestoreaUnitrendsvirtualsystemusingvaulteddata.Torestoreto avirtualsystem,youmustcreateaNASarchivedeviceonthevirtualsystem andrestorethevaulteddatathere.Fromthearchivedeviceyoucanthen restorethesystemstateandarchivedbackupdata. Toexportvaulteddatatoanarchivedevice 1 Ifnecessary,createthearchivedeviceonthevaultsystem. Ifyouwillberestoringtheexportedarchivedatatoavirtualsystem,createarchive storageoftypeNAS.Fordetails,seeToaddarchivestorageonpage 96. 2 Onthevaultsystem,notethepathmappedtothearchivedevice.Youwillneed thisinformationinStep5below. Toseethepath,selectSettings>System,Updates,andLicensing>Support Toolbox>Mountpoints.Thepathwilllooksimilarto/dev/sdd. 3 Usingaterminalemulator,suchasPuTTY,connecttothevaultsystemwiththe following:

vaultsystemIPaddress port22 SSHconnectiontype


4 5 6 Loginasuserroot.Thedefaultpasswordisunitrends1. Atthecommandprompt,typethefollowingcommandandpressEnter:
/usr/bp/bin/transferVaultDataUI.php 2>/dev/null

AttheSelection:prompt,entertheIDofthebackupsystemwhosevaulteddata youwouldliketoexport,thenpressEnter.Inthefollowingexample,thereisone systemcalledHyperV_UEB_100onthevault.Ifmultiplesystemsarevaulting,you seethemallinthelist.


Beginning selection process for transferring off-premise data to archive drive 0 [Hyper-V_UEB_100] Select the appliance you want to pick clients from. Enter number corresponding to the system name. Selection: 0

AttheSelection (Enter 'a' or 'i'):prompt,dooneofthefollowing:


319

Legacy Vaulting

Toexportallvaulteddataforthisbackupsystem,typeathenpressEnter. Toexportvaulteddatabyclient,typeiandEnter,thentypetheclientIDand
Enter.Repeatforeachclientyouwishtoexport.Typeqandentertoquit. Inthefollowingexample,allvaulteddataisexported.

Selected appliance:Hyper-V_UEB_100 Number of clients available 1 Client List: 0 [hv-stress] 1 [SBS11] Select clients to transform. [Enter 'a' for selecting all clients or 'i' to select individual clients'] Selection (Enter 'a' or 'i'): a

AttheSelection:prompt,typetheIDofthearchivemediatargetandpress Enter.Inthisexample,onearchivedeviceisavailable.Ifmultipledevicesare mounted,youseethemallinthelist.


Select the media by entering the number corresponding to the name .Or, enter 'q' to exit. 0 [dom_arch] Selection: 0 Archive jobs are queued. See Job Queue for details Exiting...

ConnecttothevaultusingtheUnitrendsadministratorinterface,thenselect Status>Presenttoseethearchivejobrunning.ThejobtypeisArchiveandthe clientisthevaultsystem.Whentheexportcompletes,statuschangesto SuccessfulandyouseethejobcommentSuccessfullywrotexarchives.

10 Oncethearchivejobcompletes,archivedataisstoredonthedevice.Ifyouneed torestoreabackupsystemfromthearchiveddata,dooneofthefollowing:

TorestorefromanexternaleSATAorUSBdockingunitorfromatape
device/library,attachthedevicetothebackupsystemandrestoreasdescribed inDisasterrecoveryfromarchiveonpage 403.

320

Chapter 7

TorestorefromaSANorNASdevice,createarchivestorageonthetarget
backupsystemasdescribedinAddingarchivestorageonpage 95,then restorefromthearchiveddataasdescribedinDisasterrecoveryfromarchive onpage 403.

Legacy Vaulting

321

322

Chapter 7

Chapter8 Restore
Theadministratorinterfaceprovidesacentralizedlocationwhereadministrators canfullyrestoreabackuporselectivelyrestorefilesinabackup.Restoresbased onspecifictimesmaybeappliedtobothfilelevelandapplicationlevelbackups. Seethefollowingtopicsfordetails:

Basicstepsforrestoringbackupsonpage 323 Restoringbackupsfromaclientwithaliasesonpage 324 Restorefileexclusionoptionsonpage 325 Fullrestorewithexclusionsonpage 325 Advancedexecutionoptionsforrestoreonpage 325 AIXrestoreconsiderationsonpage 326 Linuxrestoreconsiderationsonpage 327

Basicstepsforrestoringbackups
TheRestoreinterfaceiswhereallrestoresbegin.TheRestorepaneismadeupof aRecoveryPointDaycalendar,aRecoveryPointTimestable,andagraphical representationofa24hourday.Thetableoftimesandthecircleofhoursare interchangeableoptionsforthesamefunction.Bothspecifytheintervalsoftime fromwhichtorestorebackups. Torestorefrombackup Note:Torestorereplicatedbackups,youneedtorestoretoadirectlyattached client(onethathasbeenaddedasaclienttothereplicationtargetsystem).Before restoringfromthetargetsystem,changetoReplicationViewbyselectingtheGear

323

iconatthebottomoftheNavigationpane,checkingShowReplicationview,and clickingConfirm.Fordetailsonviewingreplicateddata,seeNavigatingreplicating systemsonpage 280. 1 2 3 SelectthedesiredclientintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SelectarestoretimeandclickNext. SelectfromavailabletimesintheRecoveryPointTimestableorbyclickinga wedgeoftimeonthe24hourcircle. Thecommandbuttonforthisoperationchangesdependingonthetypeofrestore. Forfilelevelrestores,clickRestoretoinitiatetherestoreprocess.ForVM backups,clickonRestoreFiles,andforExchangebackups,clickRestoreItems. 4 5 IntheRestorefromBackupofClientpane,selectindividualfilesandapplications toberestored,orplaceacheckmarkbytheclientitselftoperformafullrestore. ChangetheFileExclusionoptionsortheAdvancedExecutionoptionsasdesired. Note:Ifrestoringareplicatedbackupfromthetargetsystem,youmustselecta directlyattachedclientastherestoretarget.ClickShowAdvancedExecution Options,selectaClientToWhichToRestorefromthelist,andspecifyaTarget Directory. 6 ClickRestore. TheRestoreProgressbarshowsthestatusoftherestoreandindicateswhenitis complete.BackupscanbeverifiedbyclickingVerify.

Restoringbackupsfromaclientwithaliases
Whenyouperformafilelevelrestorefromaclientwithaliases,itsimportantto restoretheminaparticularorder. Note:Whenyouarebackingupanaliasedclient,youmustdecidewhetherto includeorexcludethesystemstate.YouMUSTincludethesystemstateonthe clientthatcontainstheoperatingsystemvolumes(thisistypicallytheC:volume). ForallotherclientaliasesthatdonotincludetheOSvolume,youshouldNOT includethesystemstate.Onlyoneclientaliascanincludethesystemstate.The restorefailsifthesystemstateisnotincludedintheOSvolumeandifthesystem stateisincludedintheclientaliasesthatdonotincludetheOSvolume.Formore information,seeWorkingwithclientaliasesonpage 172.

324

Chapter 8

Torestorebackupsfromaclientwithaliases 1 First,restoretheclientthatcontainstheoperatingsystemvolume.YouMUSTdo thisbeforeyourestoreanyadditionalaliasedclients.FollowthestepsinTo restorefrombackuponpage 323. Restoreeachaliasedclient.FollowthestepsinTorestorefrombackupon page 323.

Restorefileexclusionoptions
Thisoptionprovidestheabilitytoexcludefilesandfolders,basedonafilepattern, fromtherestoreoperation.Entriescanbemadebysimplydragginganddropping fromthefiletreeorbyaddingthemmanuallyintothefieldprovided.Filesor folderscanalsoberemovedfromtheexclusionlistbyhighlightingtheiteminthe listandclickingRemove. Note:RemoveAllremovesalltheexclusionselectionsfromthelist.

Fullrestorewithexclusions
Whenperformingafullrestorewithexclusions,donotselectthevolumeanddrill downtouncheckafewfoldersand/orfiles.Theproperwaytoexcludefolders and/orfilesfromafullrestoreistocheckthevolume(s)thatwillberestored,open theFileExclusionOptionsdialogandclickanddragthefoldersand/orfilestobe excludedintotheExclusionPatternbox,addingthemtotheExclusionList.After addingexclusionstotheExclusionList,clickRestoretolaunchfilerecovery.

Advancedexecutionoptionsforrestore
AdvancedExecutionOptionsprovidefinercontroloftherestoreprocess. Onesuchoptionistorestoredatatoadifferentclient. Torestoredatatoaclientotherthantheoneoriginallybackedup,selectthe appropriateclientfromthedropdownmenu.

Restore

325

SettingtheTargetDirectoryallowsanadministratortorestoredatatodirectory otherthantheonefromwhichthefileswerecaptured.Ifthetargetdirectorydoes notexist,itwillbecreatedwhentherestoreprocessbegins.Theuseofspacesin TargetDirectorynamesshouldbeavoided.However,ifspacesareused,the pathnamemustbespecifiedinquotes,e.g.,'/TestFolder' IftheTargetDirectoryexistsonadriveseparatefromtherootdrive,thepathname shouldappearinquotes,butnotthedriveletter. ThefollowingtwoexamplesillustratetheproperuseofquotesintheTarget Directory.Notethatthedriveletterinbothexamplesdonotappearinquotes:


C:/'Path/to/Test Folder' C:'/Path/to/Test Folder'

TheStripLeadingSlashoptionmayalsobeset.Bydefault,backupsuseastarting directoryofroot(/).Forbackupsthatcontainvolumes,suchasMSDOSand Novell,prefixthestartdirectorywiththevolumename;forexample,D:\tmp. CheckthePreserveDirectoryStructureboxifthedirectoryhierarchyinformation inthebackupmustberestored.Forexample,ifyouspecifytheTargetDirectoryas /tmp,allfilesrestoredfromthebackupwillbeplacedintothatsingledirectory. IftheoptionOverwriteexistingFilesisselected,existingfileswillbeoverwritten duringtherestore. RestoreNewerFilesOnlyrestoresafileonlyifitsdateisnewerthantheexisting fileontheclient.Ifthefiledoesnotexistontheclient,thefileisrestored. SetFileDatestoTodaysetsthelastmodificationdateofthefiletothedateand timeoftherestore. TheoptionUnixTextConversionwillnotconvertnewlinestoCRLFwhenrestoring UNIXtextfilestoMSDOSsystems.

AIXrestoreconsiderations
WhenrestoringanAIXmasterbackup,theremustbefreespaceoneachtarget logicalvolumeequivalenttotheamountofspaceinuse.Foradefaultinstallation, roughly350MBoffreespaceisrequired.Therestorewillfailifadequatefree spaceinnotavailable.Alsonotethatanypointintimerestorerequiresthis amountoffreespaceasthesystemmustsynthesizedatatocreateamasterfor theselectedrestorepoint.

326

Chapter 8

Linuxrestoreconsiderations
WhenperformingaLinuxpointintimerestoreorrestoringaLinuxmasterbackup, itisrecommendedtoexcludethe/bootdirectory.Ifyoudonotexclude/boot,this directoryisoverwrittenduringtherestoreprocessandtheclientmaynolonger boot.Fordetailsonrestoringwithexclusions,seeFullrestorewithexclusionson page 325.

Restore

327

328

Chapter 8

Chapter9 Reports,Alerts,andMonitoring
Usethefollowingtoolstosupportthemanagementofbackupsandsystems:

ReportsYouorthesystemcangeneratereportsfordistributionoranalysis. AlertsThesystemgeneratesalertstoprovideimmediatenotificationofan
outofnormalrangeevent. MonitoringMonitoringtoolsallowyoutomonitorbackupandrestore activitiesonarealtimebasis.

Reports
Twotypesofreportsareavailable:

Standardsystemreports(systemgenerated),describedbelow. Usergeneratedreports,describedonpage 333.


Standardsystemreportsaregeneratedbythesystemandcanbedeliveredby emailwiththeoptiontoincludeaPDFversionasanattachment.Usergenerated reportsarecustomizableandcanbegeneratedfromtheReportsmenuasneeded.

Standardsystemreports(systemgenerated)
Youcanconfiguresystemstoautomaticallygeneratereportsthataredeliveredby emailwiththeoptiontoincludeaPDFversionofthereportasanattachment. Reportsaresentatpredeterminedtimesofthedaytoprovidesystem,backup, replicationorvaulting,andarchivestatus.Noticesoffailedscheduledbackupscan bedeliveredwithinanhouroftheiroccurrence.Archivejobscanbeconfiguredto sendanemailsummaryuponcompletion.Fordetails,seeConfiguringemailfor reportingonpage 330.

329

SeeStandardsystemreportdescriptionsonpage 330fordetailsabouteach report.

Configuringemailforreporting
Note:Thisoptionisavailableonlyforstandardsystemreports.Thesystemcannot beconfiguredtoautomaticallysendusergeneratedreports. Youcansetupyoursystemtopushnotificationsandreportsthroughemailto certainrecipients.YoucanalsoselecttoincludeaPDFversionofthereportasan emailattachment.SeeAboutconfiguringnotificationsonpage 50for instructionsonconfiguringemailnotificationsandemailreportrecipients. Schedulednotificationsaregeneratedandsentat8:00AMbydefault,butyoucan changethetimereportsaresent.Otherreportsaresentuponcompletionofa givenjob. Tomodifythetimethatscheduledreportsaregenerated 1 2 3 SelectSettings>System,Updates,andLicensing>GeneralConfiguration [Advanced]. ExpandtheAlertmansection. SelecttherowcontainingReportHourMinintheNamecolumnandmodifythe valuebelowtothedesiredreporttime.Thisisina24hourformat,where00:00is midnight,and12:00isnoon. ClickConfirm.

Standardsystemreportdescriptions
ThesestandardsystemreportsaregeneratedbytheUnitrendssystemand deliveredviaemail:

SystemStatusReport FailureReport SecureSyncReport ArchiveStatusReport ReplicationReport CapacityWarningEmailAlertReport

330

Chapter 9

Youcanupdateyourpreferencesforreceivingthesereports.Reportsaresent eitheruponcompletionofagivenjoboratasettimeeachday.Forexample, failurereportsaresentwithinthehour,whereastheDailyBackupStatusreportis sentatascheduledtimeeachday.Tomodifythissetting,seeConfiguringemail forreportingonpage 330. SystemStatusReport Thisisadailyreportthatshowsasummarystatusofallbackupsthathave occurredonthesystemwithinthelast24hours.Thisinformationdisplaysina viewthatissimilartothestatuspageintheUnitrendsinterface.Thefirstsection ofthereportdisplaysfilelevelandbaremetalbackups.Theremainingsections showapplicationspecificbackupsforMicrosoftSQLServer,MicrosoftExchange Server,SharePoint,Oracle,UCSserviceprofiles,HyperV,andVMwareservers. Thecolorcodedcolumnsshowthebackupstatusandreplication/vaultingstatus forsevendays.Thecolumnforthecurrentdayoftheweekishighlighted.Days followingthecurrentdayrefertothepreviousweek(forexample,iftodayis Wednesday,theThursdaythroughSaturdaycolumnsrefertolastweek).Agreen statusmeansthatnofailuresorwarningsoccurred.Warningsareindicatedby yellow.Foreachday,ifanybackuporreplicationoperationfailedfortheclientor applicationobjectrepresentedbyarow,thatdayismarkedred.Atthebottomof thereport,thereisalistofalertsfromthesystemfortheprevioussevendays. FailureReport Aprocessperiodicallycheckstoseeifanyscheduledbackupshavefailedinthelast hour.Ifso,thesystemsendsanemailreporttotherecipientsonthefailurereport mailinglist(unlesstheclientsschedulewasmodifiedtonotsendthisreport).The reportidentifiesthenameoftheschedule,theclientand/orapplicationobject, andstatusinformationtoidentifythefailure.Moredetailsaboutthefailurecan beobtainedbyloggingintothesystem. SecureSyncReport Thisreportshowslegacyvaultingactivityduringtheprevious24hours.Thisreport displaystheamountoftimetheSyncenginewasup,theaveragecopytransfer speed,theaveragepatchtransferspeed,andthespaceusedonthevault. Vaultingcanoccurinoneoftwomodes:

CopyAcopytransfercopiestheentirefiletobevaultedtothesystem.Thisis
theaveragecopytransferspeed.

PatchApatchtransfersendsonlythechangedportionsofthefiletothevault.
Theaveragepatchtransferspeediscalculatedasifitwereacopyandthe wholefilewastransferred.Thisgeneratesanaveragepatchtransferspeed whichismuchhigherthantheaveragecopytransferspeed.

Reports, Alerts, and Monitoring

331

Allclientsthatcompletedavaultingprocessduringtheprevious24hourswillbe displayedwiththebackupnumberandtypevaulted,thetimevaultingcompleted, thestatusofthevaultingprocess(successorfailed),theeffectivespeedofthe vaultingprocess,andtheamountofdatasyncedtothevault.Backupswaitingto bevaultedandvaultingoperationsinprogressarelisted.Vaultingoperationsin progresswillshowapercentagecompleteandaprojectedcompletiontime. ArchiveStatusReport Ifanarchivejobisscheduled,runs,andcompletes,areportgeneratesthatliststhe clientsandtheirassociatedbackupsthatwerecopiedtothearchivetarget. Additionally,areportiscreatedifanarchivedriveisnotlargeenoughtohandle thedatarequestedbythearchiveprofile. ReplicationReport Thereplicationreportissentdailyatatimeyoudesignatewhenconfiguring replication.Allsuccessful,active,andqueuedreplicationjobsfromthelast24 hoursacrossallreplicationsourcesystemsarelisted.Informationpresentedinthe reportincludesbackuptype,completeddateandtime,totalelapsedreplication time,sizeofthereplicatedbackupinmegabytes,thenumberoffilesassociated withthereplicatedbackup,andwhetherornotthebackupwasencrypted. AccessthisreportfromtheUnitrendsinterfacefromReports>Replication. CapacityWarningEmailAlertReport Aswithmostdevicesthathaveharddrives,therearelimitsonthepercentageof spacethatthedevicemayuse.ForacompletelistofUnitrendssystems,theirraw usablecapacityandtheirmaximumrecommendedbackupcapacity,seethe ApplianceFamilyDataSheet. Inordertoprovideenhancedsystemcapacitymanagement,yoursystemis designedtoexaminetheamountofdiskspaceuseddaily.Ifthesystemdetermines thatitisapproaching,orhasexceeded,itsmaximumrecommendedbackup capacity,thesystemdoesthefollowing:

reportyouwillreceiveamessagethatdeduplicationissupportedbutcurrently disabled). Providesanalert. Thesemessagesproactivelyinformyouofyoursystemcapacityandreportyour RawUsableCapacityandthecurrentamountofspaceused(whichisalsotheTotal UsedamountatthebottomofyourCapacityReport). Theemailissenteveryday,aslongasthecapacityconditionexists.Thealertis updatedwithanychangeinthevalueofcriticaldata.


332

Automaticallysuspendsdeduplication. MakestheDataReductionReportunavailable.(Ifyouattempttoaccessthis

Chapter 9

Afteryoursystemdetectsthatthecapacityissuenolongerexistsandthecurrent amountofspaceusedislessthanthemaximumrecommendedbackup,the followingactionsoccur:

Thealertisclosed. Anotheralertiscreatedanddisplayedstatingthatdeduplicationhasbeenre
enabled.

TheDataReductionReportisreenabled. Youstopreceivingdailycapacitywarningemailalerts.

Usergeneratedreports
Youcancreate,save,run,andexportreportsthroughtheReportsmenu.These customizablereportsprovideinformationonsystemalerts,backups,replication orlegacyvaulting,backupdevices,schedules,andsystemcapacity.Youcan determinewhatinformationpopulateseachreportbyselectingreportfieldsfor inclusion.Youcanthensaveyourcustomizedsettingstodefinenewdefaults,or youcanusethemtocreatecustomreportsthatyoucanexecuteasneeded.You canprintorexportusergeneratedreportsascommadelimitedfiles. SelectaniconontheReportscreentogeneratethechosenreport.Somereports, suchastheCapacityreport,displaydifferentinformationdependingonwhatyou selectintheNavigationpane.Foralistofreportsthatyoucangenerate,seeUser generatedreportsdescriptionsonpage 340. Seethefollowingtopicsfordetailsaboutusergeneratedreports:

Reportbuttonsonpage 334 Customizingreportsonpage 335 Savingcustomreportsettingsonpage 338 Otherreportoptionsonpage 339,includescreatingachart/graphicalview, specifyingadaterange,exportingareport,andprintingareport.

Reports, Alerts, and Monitoring

333

Reportbuttons
Thereareaseriesofbuttonsinthelowerrightcornerofeachreport.Seethe followingformoreinformation:: Allows you to enable (make visible) or disable (make invisible) the columns that constitute the report. See Toenable/disable reportcolumnsonpage 335.
Allows you to define new default settings for reports. See To

savedefaultreportoptionsonpage 338.

Allows you to create a custom report based on the changes made to the current report. See Tosaveacustomreporton

page 338 Allowsyou to print the report. See Toprintareporton page 339.

Allows you to save all of the columns available (not just visible) for the report in the comma-separated value (CSV) format. See Toexportareportonpage 339. Allows you to close the current report and return to the front page of the report subsystem.

Graphicalanddaterangebuttonsdisplayintheleftcornerofthereport,if theseoptionsareavailableforthereportyouselect.Seethefollowingformore information:


Allows you to view the report in chart form. See Tocreatea chart/graphicalviewonpage 339.

Allows you to specify the date range for thereport. See To specifyadaterangeforthereportonpage 339.

334

Chapter 9

Customizingreports
Youcancustomizereports,suchaschangingtheorderofthecolumns.Youcan thenexitwithoutsavingyourchangesand,therefore,preservethesystem defaults.Youcanalsosaveyourchangesusingoneofthefollowingtwooptions:
Option Defining new default settings Description You can define your own defaults for each type of user-generated report. Each user of the system can save his or her own default settings. Define new defaults if you want to change the settings for reports that you run regularly. For example, if you set new defaults for backup reports, the new settings apply to all subsequent backup reports. Creating custom reports Settings saved as a custom report apply only when you execute that particular report. You can create and save multiple custom reports. Create custom reports for reports that you execute less frequently. For example, for backup reports, you can choose to enable a column that states whether a backup was synthesized, but you might not want this column enabled for all of your backup reports. In this case, you could create a custom report that you run only when you want to see whether a backup was synthesized.

Tocustomizeareport,configureeachofthedesiredoptionsandthensavethe settingsasthedefaultorasacustomreport.(SeeTosavedefaultreportoptions onpage 338andTosaveacustomreportonpage 338.) Seethefollowingoptionsforcustomizingreports:

Toenable/disablereportcolumnsonpage 335 Tosortreportsbyacolumnorbymultiplecolumnsonpage 336 Tochangetheorderofcolumnsonpage 337 Tomodifythewidthofcolumnsonpage 337

Toenable/disablereportcolumns Youcanenableanddisablereportcolumnstocustomizetheinformationthat displaysinreports.

Reports, Alerts, and Monitoring

335

1 2 3 4 5

Accessthereportyouwanttoview. Clicktheenable/disablecolumnbuttoninthelowerrightcornertodisplaythe ColumnChooserbox. Checkoruncheckthedesiredoptions. ClickConfirmtoapplythenewsettings. Ifyouarefinishedcustomizing,skiptothenextstep. Tocontinuecustomizingthereport,seeTosortreportsbyacolumnorby multiplecolumnsonpage 336,Tochangetheorderofcolumnsonpage 337,or Tomodifythewidthofcolumnsonpage 337.(Youcansaveallofyourchanges afteryouhavefinishedcustomizingthereport.)

Ifdesired,savethesettingsusingoneofthefollowingprocedures:

Tosavedefaultreportoptionsonpage 338. Tosaveacustomreportonpage 338.


Tosortreportsbyacolumnorbymultiplecolumns Youcansortthecolumnsonareporttoprovideamoreinformativeviewofthe reportsdata.Managemultiplecolumnsortingusingthecolumnheading(thetop rowofeachcolumn)andthecolumnsortarea(theboxtotherightofthe columnheading).Youcanalsosortinascendingordescendingorder. 1 Accessthereportyouwanttoview.Noticethateachcolumnheadingisdivided intotwosectionsbyaverticalwhiteline,calledthecolumnsortarea.Thisforms aboxtotherightofthecolumnname. Clickonthecolumnheadingtosortthecolumn(alphabeticallyornumerically, dependingonthecolumninformation).Youseeanumberandtriangleinthe columnsortarea(totherightoftheheading). Clickonthetriangletoresortthecolumn,ifnecessary. Tosortusingmultiplecolumns,clickonthefirstcolumnheadingyouwanttouse forsorting. Note:Youcanclickthetriangleinthecolumnsortareatochangetheascendingor descendingorder. 5 6
336

3 4

Clickinthesecondcolumnsortarea(therightsideofthecolumnheader)forany subsequentcolumnsyouwanttouseforsorting. Repeatforasmanycolumnsasyouwanttouseforsorting.Columnsaresortedin theorderyouselectthem.

Chapter 9

Ifyouarefinishedcustomizing,skiptothenextstep. Tocontinuecustomizingthereport,seeToenable/disablereportcolumnson page 335,Tochangetheorderofcolumnsonpage 337,orTomodifythewidth ofcolumnsonpage 337.(Youcansaveallofyourchangesafteryouhavefinished customizingthereport.)

Ifdesired,savethesettingsusingoneofthefollowingprocedures:

Tosavedefaultreportoptionsonpage 338. Tosaveacustomreportonpage 338.


Tochangetheorderofcolumns Youcanchangethedisplayorderofcolumnsinareport. 1 2 3 Accessthereportyouwanttoview. Clicktheheadingofthecolumnyouwanttomoveanddragittothedesired location.Repeatasnecessarytoreorderthecolumns. Ifyouarefinishedcustomizing,skiptothenextstep. Tocontinuecustomizingthereport,seeToenable/disablereportcolumnson page 335,Tosortreportsbyacolumnorbymultiplecolumnsonpage 336,or Tomodifythewidthofcolumnsonpage 337.(Youcansaveallofyourchanges afteryouhavefinishedcustomizingthereport.) 4 Ifdesired,savethesettingsusingoneofthefollowingprocedures:

Tosavedefaultreportoptionsonpage 338. Tosaveacustomreportonpage 338.


Tomodifythewidthofcolumns 1 2 3 4 Accessthereportyouwanttoview. Hoverovertheborderofthecolumnyouwanttomodify. Dragthecursortotherighttowidenthecolumnortothelefttonarrowit. Ifyouarefinishedcustomizing,skiptothenextstep. Tocontinuecustomizingthereport,seeToenable/disablereportcolumnson page 335,Tosortreportsbyacolumnorbymultiplecolumnsonpage 336,or Tochangetheorderofcolumnsonpage 337.(Youcansaveallofyourchanges afteryouhavefinishedcustomizingthereport.) 5 Ifdesired,savethesettingsusingoneofthefollowingprocedures:

Tosavedefaultreportoptionsonpage 338.
337

Reports, Alerts, and Monitoring

Tosaveacustomreportonpage 338.

Savingcustomreportsettings
AftercustomizingareportusingtheprocedureslistedunderCustomizing reportsonpage 335,youcaneithersavethesettingsasnewdefaultsorusethem tocreateacustomreport.Foranexplanationofthedifferencesbetweendefining newdefaultsettingsandcreatingcustomreports,seeCustomizingreportson page 335. Fordetails,seethefollowing:

Tosavedefaultreportoptionsonpage 338 Torestoresystemdefaultsettingsforareportonpage 338 Tosaveacustomreportonpage 338 Toaccessacustomreportonpage 339

Tosavedefaultreportoptions 1 2 3 Accessanyreportandconfigurethedesiredreportoptionslistedunder Customizingreportsonpage 335. ClicktheSaveDefaultReportOptionsinthelowerrightcornerofthereport screen. ClickConfirmtosavetheoptions. Thenewsettingsareappliedeachtimethereportruns. Torestoresystemdefaultsettingsforareport 1 2 3 Selectthereportforwhichyouwouldliketorestoresystemdefaults. ClicktheSaveDefaultReportOptionsinthelowerrightcornerofthereport screen. ClickResetPreferencestorestoresystemdefaultsforthereport. Tosaveacustomreport 1 2 3 4
338

Openthereportyouwanttocustomize. ConfigurethedesiredreportoptionslistedunderCustomizingreportson page 335. ClickSaveCustomReportinthebottomrightcorner. Giveyourcustomreportanameanddescription,thenclickConfirm.

Chapter 9

Toaccessacustomreport 1 2 Toaccessyourcustomreportatalaterdate,navigatetoReports>Custom. SelectyourreportfromthemenuandclickExecute.

Otherreportoptions
Seethefollowingtopicsforadditionalreportoptions:

Tocreateachart/graphicalviewonpage 339 Tospecifyadaterangeforthereportonpage 339 Toexportareportonpage 339 Toprintareportonpage 339

Tocreateachart/graphicalview Somereportshaveagraphicalbutton(whichlookslikeachart)inthelowerleft cornerofthereportpane.Clickthisbuttontoviewthereportinchartformand clickthisbuttonagaintoreturntoacolumnview. Tospecifyadaterangeforthereport Somereportshaveadaterangeselectionboxinthelowerleftcornerofthereport pane.Clickthisbuttontospecifythedaterangeforthereport. Toexportareport Toexportareport,clickthearrowbuttoninthelowerrightcornerofthereport screen.Thisallowsyoutosavethereportinacommaseparatedvalue(CSV) format.Youcanspecifythefilenameandlocation.Thisfeatureallowsyoutouse athirdpartytooltohavecompletecontroloftherawreportdata.Whensavinga report,apopupallowsyoutosavethereporttoalocaldirectory.Tousethis feature,MacromediaFlashPlayerversion10orhighermustbeinstalled.IfFlash Playerversion10orhigherisnotbeingused,thereportissavedtothesystemin the/usr/bp/reports.dirdirectory. Toprintareport Toprintareport,clicktheprintbuttoninthelowerrightcornerofthescreen(see Reportbuttonsonpage 334).Toensurethatthereportprintscorrectlyandis nottruncated,youmightwanttohidesomecolumnsorchangethepage

Reports, Alerts, and Monitoring

339

orientationtolandscapeorportrait.Themosteffectivemethodofprintingthefull reportistoexportthereportandthenprintit.SeeToexportareporton page 339formoreinformation.

Usergeneratedreportsdescriptions
Foranexplanationofusergeneratedreports,seeUsergeneratedreportson page 333.AccesstheReportssectionoftheUnitrendsinterfacetoseethestatus ofanyandalloperationsthathaveoccurredontheUnitrendssystem.Youcanrun thesereportstogatherinformationonanythingfromelapsedtimeofbackupsto aUnitrendssystemslicensedcapacity. Togenerateareport,selectSystem>Reports,andthenselectthedesiredreport optionfromthemenu.Thefollowingtopicsprovidedetailsaboutthesereports:

Alertsreportonpage 341 AuditHistoryReportonpage 342 BackupsReportonpage 343 CapacityReportonpage 345 ClientInformationReportonpage 349 DataReductionReportonpage 349 DevicesReportonpage 351 FailuresReportonpage 353 LastBackupsReportonpage 354 LegalHoldBackupsReportonpage 355 ReplicationReportonpage 357 ReplicationCapacityReportonpage 357 ReplicationHistoryReportonpage 359 RestoresReportonpage 362 SQLServerReportonpage 363 ScheduleHistoryReportonpage 365 SecuresyncReportonpage 366 StorageReportonpage 366 VaultCapacityReportonpage 367 VaultingReportonpage 368 VaultingDeduplicationReportonpage 370 WindowsVirtualRestoresReportonpage 371

340

Chapter 9

Alertsreport
TheAlertsreportisalistofsystemevents.Examplesofalertsareupdate notifications,licensingcapacitynotifications,softwarefailures,orhardware failures.Pleasenotethatanalertdoesnotnecessarilymeanthatafailurehas occurred;insteaditsimplymeansthataneventhasoccurredthatmayrequire someaction(seeSeveritybelowformoreinformation). Eachrowofthereportmaycontainthefollowinginformation:
Row Name Severity Description The name of the system issuing the alert. The severity of the alert. A green flag indicates non-critical information, yellow indicates a potentially critical issue, while red indicates a severe issue. Whether or not the alert has been resolved. A check mark indicates the alert has been resolved. This field will be blank if the alert has not been resolved. The date the alert was issued. The time the alert was issued. The subsystem issuing the alert. This varies depending on the system. For example, a replication system may issue an alert from a subsystem such as its disk subsystem or its core software subsystem. The descriptive text that is associated with the alert.

Resolved

Date Time Source

Description

Alerts Report Summary Total Alerts The total number of alerts for the system(s).

Reports, Alerts, and Monitoring

341

AuditHistoryReport
Thisreportconsistsofsystemaudithistoryinformation.Eachrowofthereport maycontainthefollowinginformation:
Row Date Time User Description The date the event occurred. The time the event occurred. If the event was logged from a Unitrends interface operation, this is the user who generated the event. If an internal subsystem generated the event (e.g. tasker or the purger), the user is System. Area of the event. This is the text of the notification, describing which action was performed.

Category Message

Additional available columns System Notification ID The system where the event occurred. The ID of the event.

Audit History Report Summary Total The total number of audits for the specified time period.

342

Chapter 9

BackupsReport
Thisreportdepictsthebackupoperationsthathaveoccurredoverthespecified timeperiod.
Each row of the report may contain the following information: Row Client ID Status Description The name of the client which the backup operation protects. The backup operations unique numeric identification. The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass. The date of the backup operation. The time that the backup operation started. The time that the backup operation ended. The amount of time that the backup operation took to process. The type of backup operation. The type may include Master, Differential, Incremental, Bare Metal, etc. Whether or not the backup operation was the last one of that type for the client being protected. The size of the backup operation in megabytes. The number of files associated with the backup operation.

Date Start Time End Time Elapsed

Type

Last

Size (MB) Files

Additional available columns System The name of the system on which the backup operation resides.

Reports, Alerts, and Monitoring

343

Row Complete Encrypted Synthesized

Description Whether or not the backup operation has completed. Whether or not the backup operation was encrypted. If this backup was synthesized on the Unitrends system or if it ran on a client. Whether or not the backup operation is currently eligible for purging. Purging is the process by which space is made available on the system for additional backups. All backups that are not the last of any given type for a client or affected by legal hold are purgeable. The vaulting/replication status of the backup operation.

Purgeable

Sync/Replication Status Application Database Elapsed Comment Command

What application was backed up (SQL, VMware, etc.). The database or VM name that was backed up. The elapsed time of the backup operation. The comment associated with the backup operation. The command associated with the backup operation. This is the actual command that was executed on the client to perform the backup operation. The low level detail associated with the backup operation.

Output

Backups Report Summary Total Backups Total Files The total number of backups for the given date range. The total number of files across all backups for the given date range.

344

Chapter 9

CapacityReport
Thisreportdepictsthemaximumcapacitythesystemcanusetostorethelast successfulfullandbaremetalbackuptypesfromeachofitsprotectedclientsand applications.Thecapacitylimitensuresthesystemhasenoughavailablespaceto storenewbackupsbeforepurgingolderones. TheinformationyouseechangesbasedonyourselectionintheNavigationpane. Seethefollowingfordetails:
Row Description

Replication target or vault information The following information displays when a replication target or legacy vault is selected in the Navigation pane: System Available (GB) The name of all backup systems replicating to this target. The maximum amount of space the backup system can use to store the last successful backups. The amount of capacity used for storage for last successful backups of all protected clients and applications, full and bare metal and older full and bare metals. Incrementals and differentials are not included in the calculation for amount used. A general comment concerning the amount of space available. This field displays in the bottom portion of the screen and includes the sums of the values in each column.

Used (GB)

Comment

System Capacity Totals

Reports, Alerts, and Monitoring

345

Row System Capacity Report Summary

Description The following fields display in the bottom portion of the screen:

Total Systems - Number of backup systems replicating to


the target.

Capacity - Total maximum last backup capacity of all


replicating systems combined.

Instant Recovery Space Used - Instant recovery spaced Total Used Including IR Space - Total space used for all
used on all replicating systems combined. replicating systems combined, including instant recovery space.

Backup system information Each row of the report may contain the following information if a backup system is selected in the navigation pane. Note that you only see backup types that you use. You can select a client in the Navigation pane to filter these results at the clientlevel. (If you select to view at the client-level, the System Capacity Report Summary section at the bottom of the screen displays information for the backup system.) Client Name Master (GB) The name of the client being protected. The amount of data protected for the clients last successful master backup. The amount of data protected for the clients last successful bare metal backup. The amount of space protected for the clients last successful Exchange backup. The amount of space protected for the clients last successful Microsoft SQL Server backup.

BareMetal (GB)

Exchange (GB)

SQL (GB)

346

Chapter 9

Row VMware (GB)

Description (Displays if you are using VMware.) The amount of space protected for the clients last successful full VMware backups for all VMware guests. (Displays if you are using HyperV.) The amount of space protected for the clients last successful full HyperV backups for all HyperV guests. (Displays if you are using Oracle.) The amount of space protected for the clients last successful Oracle backup. (Displays if you are using SharePoint.) The amount of space protected for the clients last successful SharePoint backup. (Displays if you are using UCS service profiles) The amount of space protected for the clients last successful UCS service profile backup. This field displays in the bottom portion of the screen and includes the sums of the values in each column. The following fields display in the bottom portion of the screen:

HyperV (GB)

Oracle (GB)

SharePoint (GB)

Service Profile

System Capacity Totals System Capacity Report Summary

Total Systems - The value in this field is 1, indicating that


you are viewing capacity information for one backup system. Capacity - Total maximum last backup capacity. Instant Recovery Space Used - Instant recovery space used. Total Used Including IR Space - Total last backup space used for the system, including IR space.

Reports, Alerts, and Monitoring

347

Row [Additional Columns]

Description Click the Enable and disable report columns icon in the bottom right of the screen to see the Column Chooser window. Click the check-boxes to see these columns on the main screen. This information allows you to view the number of retained backups at a glance, making it easier to determine your capacity requirements. Only the last successful master in included in the capacity used calculation.

# Masters - The number of master backups currently held # Differentials - The number of differential backups
by the system for a client. currently held by the system for a client. # BareMetals - The number of bare metal backups currently held by the system for a client. You can uncheck these or any other columns to remove them from view.

348

Chapter 9

ClientInformationReport
TheClientInformationreportgeneratesasummaryofthesystemsclient information.Itdisplaystheattributesandsoftwareversionforeachclient configuredonthesystem. Eachrowofthereportmaycontainthefollowinginformation:
Row Client Syncable Priority Description The client name. Indicates whether or not the client is set to vault/replicate. Displays the priority assigned to the backup of a particular client (i.e., Normal, Lower, Higher). Indicates whether or not a client scheduled for backup is encrypted. The machine/processor type on which a client resides. The operating system or platform associated with the client machine. The current version of the Unitrends agent installed on the client.

Encrypted

Machine Type OS

Version

Client Information Report Summary Total Clients The total number of clients added to the system.

DataReductionReport
Thisreportdisplaysdeduplicationanddatareductiononplatformsthatsupport deduplication.Youcanviewthisinformationinachartbyselectingthegraphical button.(SeeTocreateachart/graphicalviewonpage 339.) Datareduction,whetheritiscompressionordeduplication,isthesubstitutionof processor,memory,anddiskI/Ofordiskstoragespace.Forsystemsthatsupport deduplication,thedatareductionratioismeasuredbycombiningthespace savingsachievedthroughcompressionanddeduplication.

Reports, Alerts, and Monitoring

349

Thedatareductionratioisrepresentedasfollows,where: x=thesizeofdatareceivedbythesystemfromallitsclientbackups and y=thespaceusedonthesystembythesebackups then DATAREDUCTIONRatio=x/y Forexample,ifyourdatareductionratiois2.5,thenforevery2.5GBofrawdata beingbackedupfromyourclients,theUnitrendssystemisusingonly1GBofdata. PriortoUnitrendsRelease5,alldatareductionwasaccomplishedusing compression.StartingwithRelease5andtheintroductionofUnitrendsadaptive deduplication,forplatformsthatsupportdeduplication,datareductionis accomplishedusingbothcompressionanddeduplication.Thededuplicationratio isameasureofthespacesavedbydeduplication,andisrepresentedwhere: a=thesizeofdatareceivedbythesystemfromallofitsclientsbackupsthat arededuplicated and b=thespaceusedonthesystembythesededuplicatedbackups then DEDUPLICATIONRatio=a/b Ifusingthegraphicalview,thechartdepictsboththesystemsdatareductionand deduplicationratiosinagraphicalmanner.Thedatethattheratiosweregathered isshownalongthexaxis,whilethedatareduction(theorangebars)and deduplication(thegreenline)ratiosareshownontheyaxis. Thedatareductionanddeduplicationratiosvarywidelybasedonthefollowing environmentalvariables:

Thetypeandamountofdatabeingbackedup,includinghowmuchdatais

beingbackedupwithfilebasedbackupsandhowmuchwithapplication backups. Thebackuptypesandschedulesforclientsbeingprotected(frequencyof masteranddifferentialbackups). Thelevelofcommonalityamongclientsoperatingsystems. Thefrequencyanddegreeofdatathatischanged(lowerchangerateswillsee higherdatareductionratios).

350

Chapter 9

Theretentionofthedata(longerretentionperiodswillseehigherdata
reductionratios.)

Thespecificsofthedatareductionalgorithmsbeingused.
Onadaytodaybasis,youshouldexpecttoseevariationsinyoursystemsdata reductionanddeduplicationratios,dependingontheclientsoperatingsystems andfilesystemsizes,aswellasthebackuptypesandschedulesandamountof availablesystemdevicespace.Atypicalscheduleofweekendmasterbackups followedbydailydifferentialbackupsduringtheweekwillcausethesystemto exhibithigherlevelsofdeduplicationafterthemasterscomplete.Thisisbecause theclientslatestmasterbackupanditslatestdifferentialarenotconsideredfor deduplicationuntilanothersuccessfulmasterbackuphascompleted.Youwillsee thisinthechartasdeduplicationanddatareductionratiosriseafteramaster backup,thentrenddownwardasthedifferentialsarecompleted,thenriseagain afterthenextmasterbackuphascompletedbecausethepriormasterand differentialsarethendeduplicated.Overtime,youseehigherlevelsofretention (i.e.,increasednumbersofmasterbackupsonthesystemforeachclient),which isalsoreflectedbyahigherdeduplicationratio.

DevicesReport
Thisreportdepictsthebackupsthathaveoccurredoverthespecifiedtimeperiod astheyareassociatedwithasystemdevice. Eachrowofthereportmaycontainthefollowinginformation:
Row Client Device Description The name of the client associated with the backup operation. The name of the system device associated with the backup operation and upon which the backup resides. The backup operation unique numeric identification. The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass. The date of the backup operation. The time of the backup operation.
351

ID Status

Date Time

Reports, Alerts, and Monitoring

Row Type Last

Description The type of backup operation. Whether the backup operation was the last one of that type for the client being protected. The size of the backup operation as it exists on the system device.

Size (MB)

Additional available columns System The name of the system on which the backup operation occurred. Whether the backup operation has completed or not. Whether the backup operation was encrypted or not. Whether the backup operation is compressed on the system device or not. The elapsed time of the backup operation. The number of files associated with the backup operation. The name of the backup as it exists on the system device.

Complete Encrypted Compressed

Elapsed Files Backup Filename

Devices Report Summary Total Backups The total number of backups across all backup devices for the specified date range. The average size of the backups in megabytes. The total size of all backups in megabytes.

Average Size (MB) Total Size (MB)

352

Chapter 9

FailuresReport
Thisreportdepictsthebackup,restore,andverifyfailuresthathaveoccurredover thespecifiedtimeperiod. Eachrowofthereportmaycontainthefollowinginformation:
Row Client ID Status Description The name of the client associated with the operation. The operations unique numeric identification. The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass. All backups in the Failures report will have a failed status. Whether or not the operation is currently eligible for purging. Purging is the process by which space is made available on the system for additional operations. The date of the operation. The time of the operation. The type of operation. The elapsed time of the operation. The command associated with the operation. This is the actual command that was executed on the client to perform the operation.

Purgeable

Date Time Type Elapsed Command

Additional available columns System Complete Encrypted The name of the system upon which the operation occurred. Whether the operation has completed or not. Whether the operation was encrypted or not.

Reports, Alerts, and Monitoring

353

Row Replication/Sync Status Application Database Size (MB) Files Comment Output

Description The replication/vaulting status of the operation.

What application was backed up (SQL, VMware, etc.). The database or VM name that was backed up. The size of the backup. The number of files associated with the operation. The comment associated with the operation. The low level detail associated with the operation.

Failures Report Summary Total Backup Failures The total number of failed backups during the given date range.

LastBackupsReport
Thisreportshowsthesystemsmostrecentbackupinformationforfilelevel backups. Eachrowofthereportmaycontainthefollowinginformation:
Row Client Master Date Differential Date Incremental Date Selective Date Description The name of the client associated with the operation. The date and time of the last successful master backup. The date and time of the last successful differential backup. The date and time of the last successful incremental backup. The date and time of the last successful selective backup.

354

Chapter 9

Row BareMetal Date

Description The date and time of the last successful bare metal backup.

Additional available columns System Master ID Differential ID Incremental ID Selective ID Bare Metal ID The name of the system upon which the operation occurred. The master backups unique numeric identification. The differential backups unique numeric identification. The incremental backups unique numeric identification. The selective backups unique numeric identification. The bare metal backups unique numeric identification.

Last Backups Report Summary Total Clients The total number of clients capable of file-level backups registered to the system.

LegalHoldBackupsReport
Thisreportshowsallbackupsthatareundertheeffectsofalegalhold. Eachrowofthereportmaycontainthefollowinginformation:
Row Client ID Legal Hold Expiration Date Legal Hold (Days) Description The name of the client which the backup operation protects. The backup operation unique numeric identification. The date legal hold settings expire and the backup follows standard retention policies. The number of days a backup is under legal hold. If legal hold is set per backup and per client, this column displays the higher of the two values.
355

Reports, Alerts, and Monitoring

Row Date Type

Description The date of the backup operation. The type of backup operation. The type may include Master, Differential, Incremental, Bare Metal, etc. The size of the backup operation in megabytes.

Size (MB)

Additional available columns Setting for Individual Backup (Days) Setting for Client/App (Days) System The number of days a backup is under legal hold. Only applicable when legal hold is set at the individual backup level. The number of days all of a clients backups are under legal hold. Only applicable when legal hold is set at the client level. The name of the system on which the backup operation resides. The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass. Whether or not the backup operation has completed. Whether or not the backup operation was encrypted. Whether or not the backup operation is currently eligible for purging. No backups listed in the Legal Hold Backups report are eligible. The replication status of the backup operation. What application was backed up (SQL, VMware, etc.). The database or VM name that was backed up. The time of the backup operation.

Status

Complete Encrypted Purgeable

Replication status Application Database Time


356

Chapter 9

Row Elapsed Files Comment Command

Description The elapsed time of the backup operation. The number of files associated with the backup operation. The comment associated with the backup operation. The command associated with the backup operation. This is the actual command that was executed on the client to perform the backup operation. The low level detail associated with the backup operation.

Output

Legal Hold Backups Report Summary Total backups currently on legal hold Total protected size (MB) The number of backups currently affected by legal hold settings.

The total size of all backups currently affected by legal hold in megabytes. This total does not take into account that the backups may have been deduplicated and actually taking less space on the system.

ReplicationReport
Clicking on the Replication report icon in the list of reports opens a pop-up identical to the Replication email report sent daily. See ReplicationReportonpage 357 for more information.

ReplicationCapacityReport
Thisreportdepictshowmuchspaceeachofyoursourcesystemsandtheirclients areusingonareplicationtarget,aswellasgivinganoverallamountingigabytes ofdatareplicated.

Reports, Alerts, and Monitoring

357

Eachrowofthereportmaycontainthefollowinginformation:
Row Description

Replication target information displayed The following information displays when a replication target is selected in the Navigation pane: System The name of the source backup system that is replicating to the replication target. The amount of data in gigabytes that a particular system has replicated to the target. A general comment concerning the status of the replication report.

Replicated (GB)

Comment

Backup system information displayed Each row of the report may contain the following information if a backup system is selected in the Navigation pane: Client Name Master (GB) The name of the client being replicated. The total number of GBs of master backups replicated to the replication target. The total number of GBs of bare metal backups replicated to the replication target. The total number of GBs of Exchange backups replicated to the replication target. The total number of GBs of SQL backups replicated to the replication target. The total number of GBs of VMware backups replicated to the replication target.

BareMetal (GB)

Exchange (GB)

SQL (GB)

VMware (GB)

358

Chapter 9

Row Hyper-V (GB)

Description The total number of GBs of Hyper-V backups replicated to the replication target. The total number of GBs of Oracle backups replicated to the replication target. The total number of GBs of Sharepoint backups replicated to the replication target. The minimum number of days to attempt to retain backups on the replication target.

Oracle (GB)

Sharepoint (GB)

Minimum Retention Goal (Days) Maximum retention Limit (Days) Actual Retention (Days)

The maximum number of days to retain backups before they are purged from the replication target.

The actual number of days for which the replication target is storing backups.

Note: Retention on the replication target can be different than that on the source backup system. Retention settings are set individually on each system.
System Capacity Report Summary Total Systems Indicates how many source systems are replicating to this replication target. Total amount of data in gigabytes replicated to the replication target from either all source systems if you have the replication target selected in Navigation, or a single backup system if you have a backup system selected in Navigation.

Replicated (GB)

ReplicationHistoryReport
TheReplicationHistoryreportlistsallthebackupsthathavebeenreplicatedtothe targetduringtheselectedtimeperiod.Whenareplicationtargetisselectedinthe Navigationpane,allreplicationjobsacrossallbackupsourcesystemsare displayed.Selectasinglebackupsystemorclienttoviewonlyitsreplication history.
359

Reports, Alerts, and Monitoring

Eachrowofthereportmaycontainthefollowinginformation:
Row Client Description The name of the client that has replicated data. If the system is offline, you see a (system offline) message in this field. The ID of the backup that was replicated. The status of the backup job that was replicated. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Whether the backup was encrypted or not. The date the backup replicated. The time of day the backup replicated. The type of backup that was replicated (Full, Differential, etc.). The logical size in megabytes of the backup that was replicated. This will be larger than the amount of data actual replicated as duplicate blocks of data are not sent across the wire. The physical size in megabytes of the backup that was replicated. The number of files associated with the replication operation.

ID Status

Encrypted Date Time Type

Size (MB)

Replication Size (MB) Files

Additional available columns System Complete Synthesized The name of the system upon which the operation occurred. Whether the operation has completed or not. Indicates if this backup was synthesized on the Unitrends system or if it ran on a client.

360

Chapter 9

Row Purgeable

Description Whether or not the backup operation is currently eligible for purging. Purging is the process by which space is made available on the system for additional backups. All backups that are not the last of any given type for a client or affected by legal hold are purgeable. What application was backed up (SQL, VMware, etc.). The database or VM name that was backed up. The elapsed time of the operation. The comment associated with the operation. The command associated with the backup operation. This is the actual command that was executed on the client to perform the backup operation. The low level detail associated with the operation.

Application Database Elapsed Comment Command

Output

Replication History Report Summary Total Replications The total number of replication jobs found within the specified date range. A sum of all the physical backup sizes in megabytes.

Total Backup Size on Source (MB) Total Replicated (MB)

A sum of all the logical replication sizes in megabytes.

Reports, Alerts, and Monitoring

361

RestoresReport
Thisreportdepictsallrestoreoperationsthathaveoccurredoverthespecified timeperiod. Eachrowofthereportmaycontainthefollowinginformation:
Row Client Description The name of the client for which the restore operation occurred. If the system is offline, you see a (system offline) message in this field. The restore operation unique numeric identification. The status of the restore operation. Green indicates a successful restore, yellow indicates a restore completed with warnings, and red indicates a failed restore. Currently active restore operations are represented with an hourglass. The date of the restore operation. The time of the restore operation. This is always Restore in the Restores report. The elapsed time of the restore operation. The number of files associated with the restore operation.

ID Status

Date Time Type Elapsed Files

Additional available columns System The name of the system on which the restore operation occurred. Whether the operation has completed or not. What application was restored (SQL, VMware, etc.). The database or VM name that was restored. The size of the restore operation in megabytes.

Complete Application Database Size (MB)

362

Chapter 9

Row Comment Command

Description The comment associated with the restore operation. The command associated with the restore operation. This is the actual command that was executed on the client to perform the restore operation. The low level detail associated with the restore operation.

Output

Restores Report Summary Total Restores The total number of restores found within the specified date range. The total number of files restored for all jobs. The average number of files restored across all restore jobs.

Total Files Average Files/Restore

SQLServerReport
ThisreportdepictstheSQLServerbackupsthathaveoccurredoverthe specifiedtimeperiod. Eachrowofthereportmaycontainthefollowinginformation:
Row ID Client Instance Database Type Description The backup operation unique numeric identification. The name of the client which the backup operation protects. The instance of the SQL Server database being protected. The name of the SQL Server database being protected. The type of the backup operation. The type may be SQL Full, SQL differential, or SQL transaction. The date of the backup operation.
363

Date

Reports, Alerts, and Monitoring

Row Time Last

Description The time of the backup operation. Whether the backup operation was the last one of that type for the client being protected.

Additional available columns System The name of the system upon which the backup operation resides. The status of the backup operation. Green indicates a successful backup, yellow indicates a backup completed with warnings, and red indicates a failed backup. Currently active backup operations are represented with an hourglass. Whether the backup operation has completed or not. Whether the backup operation was encrypted or not. Whether the backup operation is currently eligible for purging. Purging is the process by which space is made available on the system for additional backups. The vaulting/replication status of the backup operation.

Status

Complete Encrypted Purgeable

Sync/Replication Status Elapsed Size (MB) Group Order

The elapsed time of the backup operation. The size of the backup operation. The group of the SQL Server database being protected. The order within the group of the SQL Server database being protected. The comment associated with the backup operation.

Comment

364

Chapter 9

Row Command

Description The command associated with the backup operation. This is the actual command that was executed on the client to perform the backup operation. The low level detail associated with the backup operation.

Output

SQL Report Summary Total Backups The total number of backups found within the specified date range. The total size of all available backups in megabytes. The average size of all backups in megabytes.

Total Size (MB) Average Size (MB)

ScheduleHistoryReport
Thisreportdisplaysinformationonbackupandarchiveschedules.Eachrowofthe reportmaycontainthefollowinginformation:
Row Schedule Name Status Description The name of the schedule. The status of the schedule. Green indicates all jobs have been successful and red indicates at least one failure has occurred. The application for which the schedule was created. The client for which the schedule was created. The number of backups that exist for the specified date range. The number of failures that exist for the specified date range. The description of the schedule.

Application Client # Backups

# Failures Description

Reports, Alerts, and Monitoring

365

Row

Description

Additional available columns System # Instances Output The system on which the schedule is located. The number of times the schedule has been run. The raw output of the schedule history.

Schedule History Report Summary Total Schedules Total Backups Total schedules available in the specified time period. The total number of backups that exist within the specified time period. The total number of failures that exist within the specified time period.

Total Failures

SecuresyncReport
Clicking on the Securesync report icon in the list of reports will open a pop-up identical to the Securesync email report sent daily. See SecuresyncReporton page 366 for details.

StorageReport
Thisreportdisplaysallstorageandprotectiondevicesassociatedwithasystem. Eachrowofthereportmaycontainthefollowinginformation:
Row Storage Type Description Internal by default, or a user-defined storage name. The type of storage device. For example, NAS, iSCSI, or internal. The user-defined purpose of the storage, such as Backups, Archiving, Vaulting, or Protect.

Usage

366

Chapter 9

Row Device

Description Devices associated with the storage. D2DBackups is the default, with anything else being user-defined. The appearance of (Storage) indicates the storage itself. The amount of allocated storage in gigabytes. Whether or not the storage is connected and operational.

Size (GB) Online

Additional available columns System Hostname Port Share Protocol The system to which the storage is allocated. The host where the storage resides if it is not internal. The port the storage uses for network communication. The name of the network share used for storage. The protocol the storage uses for network communication.

Storage Report Summary Total The total number of storage devices.

VaultCapacityReport
Thisreportdepictsthelicensedcapacityassociatedwithavault.Selectthevault intheNavigationpanetoseealistofvaultingsystems.Eachrowofthereportmay containthefollowinginformation:
Row System Description The name of the on-premise backup system whose data replicates to the vault. Whether the system was accessible at the time the report was run. If not accessible, the amount of space used may be reported as zero.

Backup System Accessible?

Reports, Alerts, and Monitoring

367

Row Used (GB)

Description The amount of storage space used, in gigabytes, on behalf of the system.

Additional available columns Number of Clients The number of clients associated with the system.

To view details about a system, select a row in the report. The Report Entry window displays details about the systems vaulting clients, including client name and amount of capacity used on the vault (GB Used). Vault Capacity Report Summary Total Systems The total number of source backup systems vaulting to the target vault. The total capacity of the vault in gigabytes.

Total Capacity (GB) Total Used (GB)

The capacity used across all DPUs on the vault in gigabytes.

VaultingReport
Thisreportdepictsthevaultingoperationsthathaveoccurredoverthespecified timeperiod.Eachrowofthereportmaycontainthefollowinginformation:
Row Client Description The name of the client that backup operation protects and is also the candidate for vault-based protection. The vaulting operation unique numeric identification. The status of the vaulting operation. Green refers to a successful vaulting operation, red refers to a failed vaulting operation, and an hourglass refers to a vaulting operation currently in progress. Whether the vaulting operation was encrypted or not.

ID Status

Encrypted
368

Chapter 9

Row Date Time Type

Description The date of the vaulting operation. The time of the vaulting operation. The type of the backup operation that is the candidate for vault-based protection (Master, Differential, etc.). The size of the backup operation that is the candidate for vaulting in megabytes. The number of files associated with the backup operation that is the candidate for vaulting.

Size (MB)

Files

Additional available columns System The name of the on-premise backup system that is the candidate for vault-based protection. Whether the vaulting operation has completed or not. Indicates if the vaulted backup is synthesized (true) or not (false). Whether the backup being protected by the vaulting operation is currently eligible for purging. Purging is the process by which space is made available on the system for additional backups. The application data being vaulted. The SQL or Exchange database being vaulted. The elapsed time of the vaulting operation. The amount of unique blocks of data transferred to the vault in megabytes. The comment associated with the backup operation that is the candidate for vaulting.
369

Complete Synthesized

Purgeable

Application Database Elapsed Sync Size (MB)

Comment

Reports, Alerts, and Monitoring

Row Command

Description The command associated with the backup operation that is the candidate for vaulting. This is the actual command that was executed on the client to perform the backup operation. The low level detail associated with the backup operation that is the candidate for vaulting.

Output

VaultingDeduplicationReport
Thisreportdepictsthestatusanddeduplicationratioofvaultingoperations. WhenavaultisselectedintheNavigationpane,allvaultingjobsacrossallbackup sourcesystemsaredisplayed.Selectasinglebackupsystemorclienttoviewonly itsvaultingdeduplicationinformation. Eachrowofthereportmaycontainthefollowinginformation:
Row System Client Status Description The source backup system. The client vaulting data. The status of the vaulting operation. Green refers to a successful vaulting operation, red refers to a failed vaulting operation, and an hourglass refers to a vaulting operation currently in progress. The date the vaulting operation took place. The time of day the vaulting operation took place. The type of backup vaulted (Master, Differential, etc.). The size of the backup that vaulted in megabytes. The ratio of the size of a backup on the source backup system to the size of the data on the vault.

Date Time Type Size (MB) Deduplication Ratio

Additional available columns


370

Chapter 9

Row ID Complete Application Database Elapsed Deduplication Factor

Description The backup ID of the vaulted job. Indicates whether or not a job has finished vaulting. The application data being vaulted. The SQL or Exchange database being vaulted. The time taken to complete the vaulting operation. The antecedent of the deduplication ratio.

Vaulting Deduplication Report Summary Total Vaulting Operations Total Size on Vault (MB) The total number of vaulting operations found on the vault.

The size that is currently being used by source backup systems on the vault in megabytes.

WindowsVirtualRestoresReport
ThisreportdepictsthehistoryandstatusofallWindowsInstantRecovery(WIR) restoreoperations.
Each row of the report may contain the following information: Row Client ID Status Description The client on which the WIR restore took place. The ID of the WIR restore operation. The status of the WIR restore operation. Green refers to a successful operation, red refers to a failed operation, and an hourglass refers to an operation currently in progress. Indicates the date of the WIR restore took place.
371

Date

Reports, Alerts, and Monitoring

Row Time Type Elapsed Files

Description Indicates the time of day of the WIR restore. The type of backup that was restored to the WIR partition. The time it took to complete the WIR restore. How many files were part of the WIR restore.

Additional available reports System Complete Application Database Size (MB) Comment Command Output The system on which the WIR restore process took place. Whether or not the restore is complete. The application being restored. The SQL or Exchange database being restored. The size of the restore in megabytes. The comment associated with the restore operation. The command associated with the restore operation. The low level detail associated with the restore operation.

Windows Virtual Restores Report Summary Total Restores How many WIR restore operations occurred in the specified date range. How many files have been restored across all WIR restore operations within the specified date range. How many files are restored on average for each WIR restore operation for the specified date range.

Total files

Average Files/Restore

372

Chapter 9

Alerts
Thealertsfeatureisapowerfulcommunicationtoolthatallowsyoutomonitor softwareandhardwarefailures.Thestatusofthesystemisupdatedevery15 minutestothevault.Areportconsistingofsystemalertsandthestatusofbackups isissueddaily. Oncethesystemsoftwarehasbeeninstalled,itcontinuouslymonitorsthesystem andcapturesthefollowingalerts:
Alert RAID conditions and failures Description RAID device status of: degraded, verifying, rebuilding, or OK. Communication errors between system and registered and enabled clients. Removal or addition of PCI devices such as an RX9 card. Notifies when the license has expired. Alerts when tasker is not running. Notifies if there are any Workspace errors or errors in the Global Exchange log. Notifies the user if CryptoDaemon is running. Notifies the user if a software update has been made available. Notifies the user if the support contract has expired or is about to expire. The system is near its capacity limit (alerts raised at 70%, 80%, and 90%).

Client connections

PCI card modifications

System Licensing Tasker Continuous Exchange Protection (CEP) CryptoDaemon Software Availability

Support Contract

Licensed Capacity Warnings

Reports, Alerts, and Monitoring

373

Monitoring
Thissectionexplainssystemtoolsthathelpyoumonitorsystemperformance. Seethefollowingfordetails:

Failuresandwarningsonpage 374 Systemloadonpage 374 Supporttoolboxonpage 375

Failuresandwarnings
Whenviewingbackuphistory,youmightseebackupfailuresorwarnings.Backup failuresindicatethebackupdidnotrun,orthatitranbutfailedtobackupmore thanoneinonethousandfiles.Abackupwarningindicatesthebackupranand completed,backingupmorethan99.9%ofallfiles,butlessthan100%. Whenyouseeabackupfailureorwarning,youshouldinvestigatethereasonfor thebackupstatus.ViewtheBackupsReportfordetailsofafailureorwarning. ClickonabackupintheBackupsReporttoviewinformationregardingthat backup.Thiswindowshowstherawoutputofanyfailureorwarningmessages thatthesystemgenerated.Thesemessagesprovideagoodindicationofwhya backupfailed,orcompletedbuthadwarnings.ViewtheFailuresReportfordetails ofthebackupfailure.

Systemload
Systemloadisusedtomonitorthesystemsloadstatisticsovera24hour,7day, or30dayperiod.SelectSettings>SystemMonitoring>Loadtoviewthesystem load.TheSystemLoadscreendisplaystheloadlevelsinthefollowingthreeareas:
Load Level Ideal Area Description If the system load is primarily in this area, the system load is within guidelines and will result in optimal backup performance. There are times when the load level remains in the ideal area, but occasionally spikes into the warning area. This is normal depending on scheduled backups or other daily operations that take place on the system. However, if the load level remains in the Warning Area for extended periods of time, this is indicative of a high load that could lead to longer backup or vaulting times.

Warning Area

374

Chapter 9

Load Level Alarm Area

Description The system load can occasionally spike into the alarm area. If this occurs, backup times must be monitored periodically to determine if the load level decreases out of the Alarm Area. If the load remains in the Alarm Area and does not decrease over a period of days or weeks, consider adding an additional system. If a backup system, register some of the clients to a different system and assign their backups to the new system to lessen the load. If a vault, reassign some of the systems to another vault for vaulting. If using the Unitrends Enterprise Backup virtual machine, consider giving the VM additional processors and memory.

Supporttoolbox
Usethesetoolstocheckthesystem.Thisisrecommendedformoreadvanced users.ManyofthesetoolsareusefulwhentroubleshootingwiththeUnitrends Supportteam.SelectSettings>System,Update,andLicensing>SupportToolbox toaccessthesetools.
Tools Active Ports Asset Tag Date and Time Disaster Recovery Log Description All active or listening network ports on the system. The Asset Tag number assigned to the system. The systems display of the current date and time. Details from the latest recovery operation for each system recovered from this vault. This tool will not produce results on a backup system. Information regarding the IDE hard drive, including the hard drives overall health assessment (pass/fail), logged errors, and self-test results.

Disk Alerts for /dev/hda

Reports, Alerts, and Monitoring

375

Tools Disk Alerts for /dev/sda

Description Information regarding the SATA hard drives, including the brand and model number of the controller.

Note: Additional Disk Alert icons may be


displayed depending on the number of SATA drives present in the system. Disk Alerts for RAID Drives Alerts present for all drives on the RAID controller. This tool is only available on 2U or greater systems. Information regarding disk free space, including file system name, size, space used, space remaining, percent of allocated space used, and name of the mount point. General information about each file system on the system. Information associated with all hardware installed on the system. A history of hosts statistics. The contents contained in the systems host file. To update the hosts file, see Aboutaddingclients onpage 61. The systems Kernel revision, build date, and system architecture. Information regarding the status of the LVM subsystem, including the physical volumes, logical volumes, and volume groups. The maximum amount of client data supported on this platform (if defined).

Disk Free Space

Filesystem Information

Hardware Detected

Host Statistics Hosts File

Kernel Information

LVM Status

Maximum Backup

376

Chapter 9

Tools Memory Usage

Description Information regarding the status of system memory, including the amount of the memory installed, used, and free. Information regarding the status of modules loaded into the Linux kernel. All current file system mount points on the system. Interface where on-demand iSeries backups are launched using the default profile. For more information, see GettingstartedwithiSeries protectiononpage 641. All open ports on the system. Processes running on the system. A snapshot of the resources being used by each process and details on the number of tasks running, CPU usage, memory usage, and swap space usage. Information regarding details of the systems processors. The controller, date, severity level, and alarm message for RAID alerts on the system. Information about the systems software RAID arrays. A button to enable or disable Samba as needed. The date and time of the last and next Securesync iteration. This option is only useful on systems configured for vaulting.

Modules Loaded

Mountpoints On-Demand iSeries Backup

Open Ports Process Listing Process Resource Usage

Processor Information

RAID Alerts

RAID Software Information

Samba On/Off Securesync Date for Vaulting Systems

Reports, Alerts, and Monitoring

377

Tools Securesync Report for Vaulting Systems

Description A local system report of Securesync activities. This option is only useful on systems configured for vaulting. The system type, generation, kernel version, system software version, and the date the software was installed. The backup system log. The system services and their status. Uploads system information to Unitrends for use in support cases.

System Information

System Log System Services Upload System Information

378

Chapter 9

Chapter10 DisasterRecovery
Important!ProceduresinthischapterareforUnitrendssystemsrunningversion 7.0.0andlater.Ifreplicating,boththesourceandtargetsystemsmustberunning 7.0.0orlater.Forsystemsrunningolderversions,seetheLegacyDisaster Recoverychapter. ProtectinganorganizationsdataandITinfrastructurehasneverbeenmore important.ThisdocumentdescribesthestepstheUnitrendscustomerneedsto takewhenplanningandimplementingadisasterrecovery(DR)strategy.This strategyincludesdecisionsthatarebestmadelongbeforeafailureoccurs. Aneffectivedisasterrecoverystrategyconsistsoffouraspects:

Thedecisiontoarchiveorreplicate Preparation Restoringtoaphysicalorvirtualsystem Restoringbackupdatatoclients

Seethefollowingtopicsfordetails:

Archiveorreplicateonpage 380 Preparationonpage 380 Restoringthesystemonpage 382 Scenario1:Restoringabackupsystemonpage 382 Scenario2:Recoveringfromacorruptbackupdeviceonpage 388 Scenario3:RecoveringfromacorruptRAIDonpage 389 Scenario4:Recoveringacorruptinternaldriveonpage 390 Postrecoveryconsiderationsonpage 390 Restoringbackupdatatotheclientsonpage 391
379

Archiveorreplicate
Unitrendsoffersdisasterrecoverywithbothonpremisearchivingandoffpremise replication. Choosingwhichtousewillbebasedonyourparticularneeds,butthemost effectivedisasterrecoverystrategywillbeoneinwhichthesechoiceshavebeen madewellinadvance. Archivingisaccomplishedbystoringbackupsonremovablemedia,while replicationinvolvesblockleveldeduplicationofbackupstoanoffsitelocation (alsoreferredtoasthedisasterrecoverysite)inwhichareplicationtargetsystem hasbeenconfigured.Replicationmaybeusedalonefordisasterrecoveryorin conjunctionwitharchiving. SuccessfulrecoveryfromadisasterusingtheUnitrendssolutionrequiresthat replicationand/orarchivinghasbeenpreviouslyconfiguredandimplemented. AUnitrendssystemsmetadata(itssystemstate)isautomaticallybackedupwhen archivingorreplicating.Thismetadataholdsinformationsuchasclientsaddedto thesystem,clientschedules,storageconfiguration,andsystemsettings.Restoring thismetadatarebuildsaUnitrendssystemintheeventofadisaster. Warning:Asystemautomaticallyprotectsitselfbysendingmetadatatoarchive mediaorareplicationtargeteachtimeyourarchiveorreplicate.Youshouldnever manuallybackupaUnitrendssystemitself.

Preparation
Inthecaseofadisasterrecoveryevent,theadministratorwillneedafreshsystem towhichdatamayberestored.Dependingonthebusinessimpactsofbeingdown intheeventofatruedisaster,endusersmaychooseto:

RelyontheirPlatinummaintenancecontracttodeliverareplacementsystem
totheirdisasterrecoverysite(shippednextbusinessday)

PurchaseareplacementchassisatthetimeofthedisasterunderSilverand
Goldmaintenancecontractsandwait2weeks(Silver)or35businessdays (Gold)fordeliveryofanewsystemtotheirdisasterrecoverysite Purchaseastandby,sparesystemchassisfromUnitrendstohaveonsiteintheir disasterrecoverycenterfortheultimaterecoveryscenario. ForUEBsystemsonly,performDRtoaNAS. Forreplicatingsystems,performhot/hotrestorefromthereplicationtargetto anew,directlyattachedsystem.ThenewsystemcanthenbeshippedtotheDR site.
380

Chapter 10

Next,toprepareyourdisasterrecoverystrategy,keepthefollowinginmind:

Archivedataatregularintervalsandstoredisksinasafelocation.(Archiveto
diskisnotavailableforSFFRecoveryOS). Replicatedatadirectlytoanoffsitesystematregularintervals. Step1:Acompletedisasterrecoverystrategymustincludearecordofcertain information.Youwillneedthisinformationtorestoreprotectedsystemsinthe eventofdisaster.OncetheUnitrendssystemhasbeenconfiguredandthe appropriateclientsregistered,thefollowinginformationshouldberecordedsoit canbeaccessedintheeventofasystemfailure. Asset#:__________________________________________ SoftwareSerial#:__________________________________ UserString:_______________________________________ FeatureString_____________________________________ LicenseKey:_______________________________________ Note:LicenseinformationcanbefoundbyaccessingSettings>System,Updates, andLicensing>Licensethroughtheadministratorinterface. Step2:Decidewhetherbackupswillbearchivedorreplicated. Step3:SetuptheUnitrendssystemforreplication,archiving,orboth.Depending onthetypeofprotectionyousettleon,seetheArchivingorReplication chaptersformoreinformation. Step4:Determinewhichclientswillbeprotected.Thestepsforregisteringclients arecoveredinAboutaddingclientsonpage 61. Step5:Createbaremetalmediaforeachoftheregisteredclients.Itistypically recommendedthateveryclienthaveacrashrecoverymediacreatedassoonasit issetup,andthenbaremetalbackupsshouldbeperformedonamonthlybasis, or,whenevermajorhardwareorsoftwarechangesaremadetotheclient.For detailedinformationonthisprocedure,seetheBareMetalProtectionOverview chapter. Step6:Createschedulesforrunningyourdesiredbackups.GototheBackups chapterforinstructionsonsettingupbackupschedules.

Disaster Recovery

381

Restoringthesystem
Weallhopeitneverhappens,butifitdoes,theabovepreparationwillleaveyou inthebestpossibleposition.ThisnextpartoftheDisasterRecoverystrategy involvestheactualrecovery.Thisistheinformationyouwillneedtokeepinmind ifyoufindyourselfhavingtorestoreyourprotectedsystems. Thefollowingsectionsprovidedisasterrecoveryinstructionsforspecific scenarios: Scenario1:Restoringabackupsystem Scenario2:Recoveringfromacorruptbackupdevice Scenario3:RecoveringfromacorruptRAID Scenario4:Recoveringacorruptinternaldrive

Scenario1:Restoringabackupsystem
Thefollowingarerequiredwhenrestoringabackupsystem: Unitrendsversion7.0.0orlater. Afreshsystemtorestoretomustbeavailable.Thiscaneitherbeaneworare imagedsystem.Ifyouneedtoreimageasystemforthisprocess,contactyour authorizedUnitrendspartnerorUnitrendsSupportforadditionaldetails beforeproceeding. ThenewsystemmustbeconfiguredasdescribedinConfiguringthenewly imagedsystemonpage 383beforeyoustarttheDRprocedure. Thenewbackupsystemmusthaveaminimumof128GBofstoragespace availableandatleastasmuchstoragespaceastheoriginalsystem.Ifrestoring toaUEBsystem,youllneedtoaddstoragebeforeperformingDR. Youmusthaveareplicatedbackuporarchivefromwhichtorestore. AdditionalDRconsiderationsarelistedhere.Youwillbeaskedtomakechoices duringtheDRprocess.ItisbesttoconsideryouroptionsbeforeyoustarttheDR procedure.

Boththeoriginalsystembeingrestoredandthenewsystemmustberunning

Thenewbackupsystemcanbesetupwithadditionalstoragedevicesthatwill
houserestoredbackups.Thishastobedonepriortotherestoreprocess. DuringDRyouwillchoosewhethertoretainthestoragedevicesonthenew systemorrestoredevicesfromtheoriginalsystem.SeeSelectingstorage devicesduringDRbelowfordetails.

382

Chapter 10

Ifencryptionisconfiguredontheoriginalsystem,youwillresetencryptionon
thenewsystemaftersystemmetadatahasbeenrestored.Todothis,youmust knowtheoriginalsystemsencryptionpassphrase.

SelectingstoragedevicesduringDR
DuringtheDRsetup,youwillbeaskedwhethertoretainstoragedevicesonthe newsystemorrestorestoragedevicesfromtheoriginalsystem.Differencesare describedhere.

Restoreusingstoragedevicesonthenewsystem
Storageconfigurationofthenewsystemisretainedaftersystemmetadatarestore completes.Schedulesfromtheoriginalsystemareupdatedtousethedefault deviceonthenewsystem. Example: Originalsystem:2backupdevices,D2DBackupsandNewBackups.Backupsfor Client1gotoNewBackups. Newsystem:2backupdevices,D2DBackupsandMoreBackups. AfterrestorethenewsystemstillcontainsdevicesD2DBackupsandMoreBackups. SincetheoriginalNewBackupsdevicedoesnotexist,thescheduleforClient1is updatedsothatitsbackupsgotothedefaultdevice,D2DBackups.

Restoreusingstoragedevicesfromtheoriginalsystem
Storageconfigurationoftheoriginalsystemisrestored.Schedulesfromthe originalsystemusetheoriginalconfiguration. Inourexampleabove,backupsforClient1continuetogototheNewBackups device.

Configuringthenewlyimagedsystem
Preparethenewsystemasdescribedhere. Toconfigurethenewsystem 1 ConfigureafreshlyimagedsystemontothenetworkwithanIPthatdoesnot matchthatofthesystemtorestore.

Forphysicalsystems,followtheprocedureInitialconfigurationofUnitrends
systemsonpage 43.
Disaster Recovery

383

ForUEBsystems,followtheproceduresinoneofthefollowing:
http://www.unitrends.com/documents/unitrendsenterprisebackup vmware.pdf http://www.unitrends.com/documents/unitrendsenterprisebackup hyperv.pdf 2 Verifythatatleast128GBofstoragespaceisavailableonthenewlyimagedsystem andthatspaceonthenewsystemisequaltoorgreaterthanthatofthesystemto restore. IfrestoringtoUEB,youneedtoaddstoragetothenewsystemasdescribedin Aboutexpandingstorageonpage 57. 3 ConfigurethefollowingUnitrendssystemsettingsasdescribedinCompletethe configurationonpage 46:

Systemdateandtime. HostnameEnterauniquehostnameforthenewsystem.Donotusethe
hostnameoftheoriginalsystem.Thishostnamewillbeoverwrittenwiththat oftheoriginalsystemduringtheDRprocess. InstallationtypeSelecttheinstallationtypethatmatchesthatofthesystem youwillrestore. ExpandStorageClickonlyifyouarerestoringtoaUEBsystemandhaveadded storagetotheVM.SkipthisstepifrestoringtoaphysicalRecoverySeries system. RetentionSelectthedesiredbalanceretention/backupperformancesetting. YoudonotneedtoconfigureotherSetupWizarditems(suchasaddingclients andusers)sincethesewillbesettomatchtheoriginalsystemduringtheDR process. Continuetooneofthefollowingprocedurestorestorethesystem:

Systemrestorefromthereplicationtargetbelow Systemrestorefromarchiveonpage 386

Systemrestorefromthereplicationtarget
OnceyouhaveconfiguredthenewsystemasdescribedinConfiguringthenewly imagedsystemabove,usethisproceduretorestorethebackupsystemfroma replicatedbackup.

Onthereplicationtarget
1 SelectthetargetintheNavigationpane(brownvaulticon)andclickRestore.

384

Chapter 10

2 3

OntheVaultRestorepage,selectthesourcefromtheRestoreaSystem(Perform DR)list. ClickAddNewTargetandenterthefollowingforthefreshlyimagedsystem:


4 5 6

Hostname IPAddress QualifiedName AliasNameifdesired(thisisoptional) ClickConfirmintheTargetSystemnamearea.Anentryisaddedtothetargets hostfileforthenewlyimagedsystem. OntheVaultRestorepage,selectthenewsystemfromtheTargetSystemName list. ClickPrepareTargetSystem.Thesystemmetadatabackupissenttothenew systemandalistofclientsdisplaysbelow. Note:ChecktheReplicationDashboardtobesurethesystemmetadatabackupis replicating.IftherearejobsaheadofitinthePendingOperationsqueue,remove themwiththeAdditemstotheendofthequeueoptionasdescribedinTo removeapendingjobfromthequeueonpage 294.

Onthenewlyimagedsystem
7 8 9 ClicktheGeariconbelowtheNavigationpane,checkShowSystemClient,and clickConfirm. SelectthesystemclientintheNavigationpane(belowthebluesystemicon)and clickStatus. OntheBackup:Last7Daystab,clicktheSystemMetadatabackupthatwasjust senttothesystem.

10 OntheBackupInformationpage,clickRestoreSystemMetadata. 11 Selectthestorageconfigurationtousefortherestore.

ClickYestousestoragedevicesconfiguredonthenewsystem. ClickNotousestoragedevicesconfiguredontheoldsystem. Formoreinformation,seeSelectingstoragedevicesduringDRonpage 383.


12 Whentheconfirmationmessagedisplays,checktheIunderstand...boxandclick ConfirmtocontinuewiththeDRandrestoresystemmetadata. 13 Amessagedisplaysindicatingsystemmetadatahasbeenrestored.

Disaster Recovery

385

14 Ifencryptionwasconfiguredontheoriginalsystem,resettheencryptionstateon thenewsystem: Note:Thisresetmustbeperformedaftersystemmetadatahasbeenrestored.

SelectSettings>SystemMonitoring>Encryption. TurnencryptionoffandConfirm. Turnencryptionbackon,entertheencryptionpassphrase,andclickConfirm.


15 ReturntothereplicationtargettocontinuetheDRprocedure.

Onthereplicationtarget
16 ClickOkaytoclosetherestoremetadatamessage. 17 ClickSelectTargetDevice. 18 Inthegridbelow,checkboxestoselectclientstorestore. alreadybeenrestored. Ifyouchosetorestorestoragefromthenewsystem,specifythedeviceto whichbackupswillberestoredforeachclientselected. Note:Thedeviceselectedhereisforthisrestoreonly.DuringDR,schedulesare updatedsothatthedefaultD2DBackupsdeviceisused.Scheduledbackupsforthe clientwillbestoredontheD2DBackups.Tochangethis,applyanoptiontothe scheduleonceDRiscomplete. 19 ClickConfirm. 20 Amessagedisplaysindicatingthatbackupshavebeenaddedtothereplication queue.ClickOkay. 21 MonitorreplicationbyselectingReplication>Dashboard.Fordetails,see Workingwiththereplicationdashboardonpage 283 22 Oncebackupshavereplicated,restoreclients.SeeRestoringbackupdatatothe clientsonpage 391 23 Afterallsystemshavebeenrestored,configurethenewsystemforreplicationas describedinReplicationsetuponpage 251.Foradditionalconsiderations,see Postrecoveryconsiderationsonpage 390.

YoudonotneedtoselecttheoriginalUnitrendssystemasitsmetadatahas

Systemrestorefromarchive
OnceyouhaveconfiguredthenewsystemasdescribedinConfiguringthenewly imagedsystemonpage 383,usethisproceduretorestorethebackupsystem fromarchive.
386

Chapter 10

Attacharchivemediatothenewsystem.

Ifrestoringfromadiskortapedevice,attachthedevicetothenewsystem.For
UEBsystems,attachtotheESXorHyperVhostmachineandconfigurethe deviceforaccessbytheUEBVMwithinthehypervisorinterface. Ifrestoringfromexternalarchivestorage(NASorSAN),configurethisstorage onthenewsystem.SeeToaddarchivestorageonpage 96. IfrestoringaUEBarchivefromvirtualdisk,configurethisstorageonthenew system.SeeToaddarchivestorageonpage 96andfollowinstructionsfor AddedDisk. Onthenewsystem,selectthebluesystemiconintheNavigationpaneandclick Restore. OntheSystemRestorepage,selectthenewsystemfromtheRestoreaSystem (PerformDR)list. ClickthearrowstoScanforArchiveMedia. SelectthearchivemediaintheSelectMedialist. Selectthestorageconfigurationtousefortherestore.

2 3 4 5 6

ClickYestousestoragedevicesconfiguredonthenewsystem. ClickNotousestoragedevicesconfiguredontheoldsystem. Formoreinformation,seeSelectingstoragedevicesduringDRonpage 383.


7 8 Whentheconfirmationmessagedisplays,checktheIunderstand...boxandclick ConfirmtocontinuewiththeDRandrestoresystemmetadata. Amessagedisplaysindicatingsystemmetadatahasbeenrestored.Clickoneofthe following:

ClickYestocontinuerestoringarchivesforprotectedclients. ClickNotoexitDRandunmountthearchivemedia.
9 Anencryptionmessagedisplays.Ifencryptionwasconfiguredontheoriginal system,resettheencryptionstateinanewbrowserwindow: Note:Thisresetmustbeperformedaftersystemmetadataisrestored. Logintothenewsystemusingadifferentbrowserwindow. SelectSettings>SystemMonitoring>Encryption. TurnencryptionoffandConfirm. Turnencryptionbackon,entertheencryptionpassphrase,andclickConfirm. ReturntotheDRprocedureintheoriginalbrowserwindow. 10 ClickOkaytoclosetheencryptionmessageandcontinue. 11 ClickSelectTargetDevice.

Disaster Recovery

387

12 Inthegridbelow,checkboxestoselectclientstorestore. Ifyouchosetorestorestoragefromthenewsystem,specifythedevicetowhich backupswillberestoredforeachclientselected. Note:Thedeviceselectedhereisforthisrestoreonly.DuringDR,schedulesare updatedsothatthedefaultD2DBackupsdeviceisused.Scheduledbackupsforthe clientwillbestoredonD2DBackups.Tochangethis,applyanoptiontothe scheduleonceDRiscomplete. 13 ClickConfirm,thenYestoindicatethatyouwishtooverwritetheselectedclients backups. 14 AmessagedisplaysindicatingthatDRhasstarted.ClickOkay. 15 MonitortheDRjob.ClickStatus,thenclickthePresentblindonthesideofthe Statuspage.TheDRjobdisplaysinthegridasanArchiveRestore. 16 WhentheArchiveRestorejobcompletes,itsstatuschangestosuccessful.Clickthe refresharrowsbelowtheNavigationpanetoreloadthesystem.Restoredclients anddatadisplayinthesystem. 17 Restoreclientsasnecessary.SeeRestoringbackupdatatotheclientson page 391 18 Afterallsystemshavebeenrestored,seePostrecoveryconsiderationson page 390foradditionaltasksyoumayneedtoperforminyourenvironment.

Scenario2:Recoveringfromacorruptbackupdevice
Thefollowingstepsdescribetherecommendedapproachforrecoveringasystem fromacorruptedbackupdevice.Examiningthesystemlogstodeterminedisk failure:
/var/log/messages

or
/var/log/syslog

Intheeventofasinglediskfailure: 1 Determinethefaileddiskdrivebyexecutingtheappropriatediskcontroller commandorbylaunchingthediskcontrollertools(thiscanalsobeperformedin BIOS):


tw_cli info <controller> [3ware-based systems]

388

Chapter 10

or
cat /proc/mdstat [for desktops and 1U systems]

Insertthenewdiskdrive.Ideally,thenewdriveshouldbethesamesize,type,and modelastheoriginaldrive. Oncethenewdriveisinserted,therebuildprocessshouldbeginautomatically.If itdoesnot,usethe3wareutility(forrackmountunits),ortherebuild_diskscript (desktopsand1Usystems)toaddthedriveandlaunchtherebuildprocess. Whenthenewdevicehasbeenrebuiltsuccessfully,itisreadyforuse.

Scenario3:RecoveringfromacorruptRAID
Thefollowingstepsdescribetherecommendedapproachforrecoveringasystem fromacorruptedRAID.Examinethesystemlogs(/var/log/messagesor /var/log/syslog)todetermineifthedisksonthediskcontrollerarefailing.Ifthe failingdisksarelocatedonacontrollerthatisfailing,installingnewdisksonthe failingcontrollerwillnotsolvetheproblem. ThisscenarioassumesthatthecorruptedRAIDisaresultofmultiplefaileddisks: 1 Determinethefaileddisksbyexecutingtheappropriatediskcontrollercommands orbylaunchingthe3Wareutility(thiscanalsobeperformedinBIOS):
tw_cli info <controller>[for3warebasedsystems]

or
cat /proc/mdstat[desktopsand1Usystems]

Insertthenewdiskdrives.Ideally,thenewdisksshouldbethesamesize,typeand modelastheoriginaldisks. Oncethenewdiskshavebeeninserted,therebuildprocessshouldbegin automatically.Ifitdoesnot,usethe3Wareutility(forrackmountunits),orthe rebuild_diskscript(desktopsand1Usystems)toaddthedrivesandlaunchthe rebuildprocess.

Whenthenewdevicehasbeenrebuiltsuccessfully,createanewUnitrends Postgresdatabasewiththefollowingcommand:
/usr/bp/bin/setup_postgresql.sh create

Performdisasterrecoveryfromreplicationtargetorarchive.(SeeSystemrestore fromthereplicationtargetonpage 384andSystemrestorefromarchiveon page 386forinstructions).


389

Disaster Recovery

Ifapplicable,applythemanualstepsfollowingDisasterRecovery(seePost recoveryconsiderationsonpage 390fordetails).

Scenario4:Recoveringacorruptinternaldrive
Thefollowingstepsdescribetherecommendedapproachforrecoveringthe systemrootdriveonaRecovery720orRecovery730. 1 2 3 Todeterminewhichinternaldrivefailed,viewthealertsonthestatuswindowof theAdministratorinterface.Youmayalsoviewthecontentsof/proc/mdstat. Ifthedriveisoffline,bringthedriveonlineandrunthescript
/usr/bp/bin/rebuild_disk

Ifthedriveiscorrupt,insertanewdiskdrive.Thenewdiskdrivemustbethesame sizeastheoriginaldiskdrive. Oncethenewdiskdrivehasbeeninserted,therebuildprocessshouldbegin automatically.Ifitdoesnot,usethe/usr/bp/bin/rebuild_diskscripttoformatthe newdrive.

Postrecoveryconsiderations
Thesystemsconfigurationinformationwillberecoveredwhenthesystemstate datahasbeenrestored.However,dependingonthesetup,youmayneedto performthefollowinginordertocompletethedisasterrecoveryoperation.

Ifrequired,reconfigurethenetworkwiththenewIPaddress.Onthe
administratorinterfacegotoSettings>Clients,Networking,andNotifications >Networks>Ethernet(eth0).EnterthenewIPaddressandgatewayas required.SelectConfirm. Ifrequired,changethehostnameviatheadministratorinterface. Makesurereplicationisturnedoffifchangingthehostname. Reconfigurethesystemforsynchronizationviatheadministratorinterface. Becausesynchronizationisdisabledduringtherestoreprocess,ensurethatthe systemissettoreplicate.OntheadministratorinterfacegotoReplication> ReplicationAttributes>ConnectionOptionsandProcessControl>Resume Replication. IfMicrosoftExchangeCEPbackupshavebeenrestored,changethelogin informationfortheworkspace.Modificationstotheworkspacecanbe performedviatheExchangeWebAdminapplication.

390

Chapter 10

ChangeownerandgroupofExchangeworkspaceonsambasharetonobody.
Usethefollowingcommandforthis: chownR<owner>:<group><workspace_path> Example:chownRnobody:nobody<workspace_path> Alsochangethepermissionsto777.

Ifbondingwasinuseitwillneedtobereconfiguredaftertherestoreprocessis
completedbecauseitdoesNOTgetrestored. Oncethesystemhasbeenrestored,individualclientscanberestoredusingthe administratorinterface.Seethenextsectionfordetailsonrestoringindividual clients.

Restoringbackupdatatotheclients
Nowthatthebackupsystemhasbeenrestored,restoringtheclientscanbegin. Backupsshouldberestoredinthefollowingorder: 1 2 3 Baremetalbackups Filelevelbackups(masters,differentialsorincrementals) Applicationbackups

Baremetalbasicsteps
1 2 3 4 Boottheclientfromthebaremetalmedia. Restorethebaremetalbackuptotheclient.SeetheBareMetalProtection Overviewchapterfordetailedinstructions. Reboottheclient. Restoretothelatestavailablerestorepoint(seeTorestorefrombackupon page 323).Thisrestoresthelastmasterandanysubsequentincrementalor differentialbackups.

Filelevelandapplicationrestorebasicsteps
Tobegintherestoreprocess,logintothesystemsadministratorinterfaceand selecttheappropriateclientfromtheNavigationpane: 1 2 WiththeclientselectedintheNavigationpane,clickRestore. IntheRestorepane,selectthedatefromwhichthebackupwillberestoredby clickingontheappropriatedateintheRecoveryPointDaycalendar.
Disaster Recovery

391

Selecttheappropriatetimeofdayfromwhichtorestoreabackup.Theselection ofthistimecanbemadefromeithertheavailablelistoftimesintheRecovery PointTimestableorbysimplyclickingonavailablewedgesoftimethatappearon the24hourcircle. Thecommandbuttonforthisoperationchangesdependingonthetypeofrestore. Forfilelevelrestores(asdepictedintheaboveexample)theuserwillclickthe Restoretoinitiatetherestoreprocess.ForVMbackupstheuserwillclickRestore Files,andRestoreItemsforExchangebackups. IntheRestorefromBackupofClientpane,selectindividualfilesandapplications toberestored,orplaceacheckmarkbytheclientitselftoperformafullrestore. Ifdesired,changetheFileExclusionoptionsortheAdvancedExecutionbyclicking onthelinksatthebottomofthepane.Otherwise,clickonRestore. Note:Formoreinformationonconfiguringtheseoptions,seetheRestorefile exclusionoptionsonpage 325andAdvancedexecutionoptionsforrestoreon page 325. TheRestoreProgressbarwilldisplaythestatusoftherestoreandwillindicate whenitiscomplete.

5 6

392

Chapter 10

Chapter11 LegacyDisasterRecovery
Important!ProceduresinthischapterareforUnitrendssystemsrunningpre7.0.0 versions.Forsystemsrunningversion7.0.0andlater,seetheDisasterRecovery chapter. ProtectinganorganizationsdataandITinfrastructurehasneverbeenmore important.ThisdocumentdescribesthestepstheUnitrendscustomerneedsto takewhenplanningandimplementingadisasterrecoverystrategy.Thisstrategy includesdecisionsthatarebestmadelongbeforeafailureoccurs. Aneffectivedisasterrecoverystrategyconsistsoffouraspects:

1 2 3 4

Thedecisiontoarchiveorvault Preparation Restoringtoaphysicalorvirtualsystem Restoringbackupdatatoclients Seethefollowingtopicsfordetails:

Archiveorvaultonpage 394 Preparationonpage 394 Restoringthesystemonpage 396 Scenario1:Restoringabackupsystemonpage 396 Scenario2:Recoveringfromacorruptbackupdeviceonpage 397 Scenario3:RecoveringfromacorruptRAIDonpage 398 Scenario4:Recoveringacorruptinternaldriveonpage 399 Additionalrequirementsforrestoringtoavirtualsystemonpage 399 Storagesetuponpage 399 Disasterrecoveryfromvaultonpage 400
393

Automaticdisasterrecoveryfromvaultonpage 401 Disasterrecoveryfromarchiveonpage 403 Postrecoveryconsiderationsonpage 404 Restoringbackupdatatotheclientsonpage 405

Archiveorvault
Unitrendsoffersdisasterrecoverywithbothonpremisearchivingandoffpremise electronicvaulting. Choosingwhichtousewillbebasedonyourparticularneeds,butthemost effectivedisasterrecoverystrategywillbeoneinwhichthesechoiceshavebeen madewellinadvance. Archivingisaccomplishedbystoringbackupsonremovablemedia,whilevaulting involvesblocklevel,inflightdeduplicationofbackupstoanoffsitelocation(also referredtoasthedisasterrecoverysite)inwhichavaulthasbeenconfigured. Vaultingmaybeusedalonefordisasterrecoveryorinconjunctionwitharchiving. ArchivingonsitetoaUnitrendssystemoffersafullerlevelofretention,while vaultingmayprovideahigherlevelofreliability,sincethedataistransmittedtoa locationthatisgeographicallydistanttothedisaster. SuccessfulrecoveryfromadisasterusingUnitrendssystemsolutionrequiresthat vaultingand/orarchivinghasbeenpreviouslyconfiguredandimplemented. AUnitrendssystemssystemstateisautomaticallybackedupwhenarchivingor vaulting.Thesystemstateholdsinformationsuchasclientsaddedtothesystem, clientschedules,storageconfiguration,andsystemsettings.Restoringthesystem staterebuildsaUnitrendssystemintheeventofadisaster. Warning:Asystemautomaticallyprotectsitselfbysendingitssystemstateto archivemediaoravaulteachtimeyourarchiveorvault.Youshouldnever manuallybackupaUnitrendssystemitself.

Preparation
Inthecaseofadisasterrecoveryevent,theadministratorwillneedafreshsystem towhichdatamayberestored.Dependingonthebusinessimpactsofbeingdown intheeventofatruedisaster,endusersmaychooseto:

RelyontheirPlatinummaintenancecontracttodeliverareplacementsystem
totheirdisasterrecoverysite(shippednextbusinessday)
394

Chapter 11

PurchaseareplacementchassisatthetimeofthedisasterunderSilverand
Goldmaintenancecontractsandwait2weeks(Silver)or35businessdays (Gold)fordeliveryofanewsystemtotheirdisasterrecoverysite Purchaseastandby,sparesystemchassisfromUnitrendstohaveonsiteintheir disasterrecoverycenterfortheultimaterecoveryscenario. Next,toprepareyourdisasterrecoverystrategy,keepthefollowinginmind:

Archivedataatregularintervalsandstoredisksinasafelocation.(Archiveto
diskisnotavailableforSFFRecoveryOS). Vaultdatadirectlytoanoffsitesystematregularintervals. Step1:Acompletedisasterrecoverystrategymustincludearecordofcertain information.Youwillneedthisinformationtorestoreprotectedsystemsinthe eventofdisaster.OncetheUnitrendssystemhasbeenconfiguredandthe appropriateclientsregistered,thefollowinginformationshouldberecordedand insuchawayitcanbeaccessedintheeventofasystemfailure. Asset#:__________________________________________ SoftwareSerial#:__________________________________ UserString:_______________________________________ FeatureString_____________________________________ LicenseKey:_______________________________________ Note:LicenseinformationcanbefoundbyaccessingSettings>System,Updates, andLicensing>Licensethroughtheadministratorinterface. Step2:Decidewhetherbackupswillbearchivedorvaulted. Step3:SettinguptheUnitrendssystemforeithervaultingorarchiving.Depending onthetypeofprotectionyousettleon,seetheArchivingorLegacyVaulting chaptersformoreinformation. Step4:Determinewhichclientswillbeprotected.Thestepsforregisteringclients arecoveredintheAboutaddingclientsonpage 61. Step5:Thecreationofbaremetalmediaforeachoftheregisteredclients.Itis typicallyrecommendedthateveryclienthaveacrashrecoverymediacreatedas soonasitissetup,andthenbaremetalbackupsshouldbeperformonamonthly basis,or,whenevermajorhardwareorsoftwarechangesaremadetotheclient. Fordetailedinformationonthisprocedure,seetheBareMetalProtection Overviewchapter. Step6:Createschedulesforrunningyourdesiredbackups.GototheBackups chapterforinstructionsonsettingupbackupschedules.
395

Legacy Disaster Recovery

Restoringthesystem
Weallhopeitneverhappens,butifitdoes,theabovepreparationwillleaveyou inthebestpossibleposition.ThisnextpartoftheDisasterRecoverystrategy involvestheactualrecovery.Thisistheinformationyouwillneedtokeepinmind ifyoufindyourselfhavingtorestoreyourprotectedsystems. Thefollowingsectionsprovidedisasterrecoveryinstructionsforspecific scenarios: Scenario1:Restoringabackupsystem Scenario2:Recoveringfromacorruptbackupdevice Scenario3:RecoveringfromacorruptRAID Scenario4:Recoveringacorruptinternaldrive

Scenario1:Restoringabackupsystem
Thefollowingrequirementsareapplicablewhetheryouarerestoringtoaphysical orvirtualsystem.Additionalrequirementsforrestoringtoavirtualsystemfollow thissection. Theoriginalsystembeingrestoredcanberunninganypreviousversionof Unitrendssoftware.Itispossibletorestoretoasystemolderthanversion6.0.0 fromav6.0.0Vault.However,theversionofthenewbackupsystemhastobeof asameornewerversionthantheoriginalsystem. Afreshsystemtorestoreto.Thiscaneitherbeaneworareimagedsystem.Ifyou needtoreimageasystemforthisprocess,contactyourauthorizedUnitrends partnerorUnitrendsSupportforadditionaldetailsbeforeproceeding. Itisrecommendedthatthenewsystemisassignedthesamehostnameasthe originalsystem. Whenperformingdisasterrecoveryfromanexternalstorage,likeSAN/NASoran internaldatastorethatwaspreviouslyconfiguredasanarchivedevice,thesame storageshouldbeaddedtothesystembyusingtheStorageConfiguration(by navigatingtoSettings>StorageandRetention>Storage).Thepurposeofthe storageshouldbesetasArchive. Important!Ifastoragedevicewillbesetuponthenewsystem,itmustbedone priortotherestoreprocess.

396

Chapter 11

Disasterrecovery(Settings>Vaulting>SystemRestore)shouldbestartedby:

Selectingthevaultinthenavigationpaneifrestoringfromavault Selectingthesysteminthenavigationpaneifrestoringfromanarchivemedia
Thetargetsystemcanbesetupwithadditionalstoragedevicesthatwillhouse restoredbackups.Thishastobedonepriortotherestoreprocess.SeeStorage setuponpage 399fordetails. Whenusingexternalstorageoralternatestorage,thetargetsystemmustgrant managementprivilegestothevaultby: 1 2 3 Loggingintotheadministratorinterfaceofthetargetsystem NavigatingtoSettings>Vaulting>VaultManagement ClickingonAllowRemoteManagementonlowerleftsideofthewindow. Whenrestoringfromavault,itisrecommendedthatthetargetsystemandthe vaultbeplacedonanisolatednetwork.Thiswillhelptoensuretheintegrityofthe systemduringtherestoreprocess.Foroptimalresults,itisrecommendedtouse acrossovercabletoconnectthetargetsystemtothevault.

Scenario2:Recoveringfromacorruptbackupdevice
Thefollowingstepsdescribetherecommendedapproachforrecoveringasystem fromacorruptedbackupdevice.Examiningthesystemlogstodeterminedisk failure:
/var/log/messages

or
/var/log/syslog

Intheeventofasinglediskfailure: 1 Determinethefaileddiskdrivebyexecutingtheappropriatediskcontroller commandorbylaunchingthediskcontrollertools(thiscanalsobeperformedin BIOS):


tw_cli info <controller> [3ware-based systems]

or
cat /proc/mdstat [for desktops and 1U systems]

Legacy Disaster Recovery

397

Insertthenewdiskdrive.Ideally,thenewdriveshouldbethesamesize,typeand modelastheoriginaldrive. Oncethenewdriveisinserted,therebuildprocessshouldbeginautomatically.If itdoesnot,usethe3wareutility(forrackmountunits),ortherebuild_diskscript (desktopsand1Usystems)toaddthedriveandlaunchtherebuildprocess. Whenthenewdevicehasbeenrebuiltsuccessfully,itisreadyforuse.

Scenario3:RecoveringfromacorruptRAID
Thefollowingstepsdescribetherecommendedapproachforrecoveringasystem fromacorruptedRAID.Examinethesystemlogs(/var/log/messagesor /var/log/syslog)todetermineifthedisksonthediskcontrollerarefailing.Ifthe failingdisksarelocatedonacontrollerthatisfailing,installingnewdisksonthe failingcontrollerwillnotsolvetheproblem. ThisscenarioassumesthatthecorruptedRAIDisaresultofmultiplefaileddisks: 1 Determinethefaileddisksbyexecutingtheappropriatediskcontrollercommands orbylaunchingthe3Wareutility(thiscanalsobeperformedinBIOS):
tw_cli info <controller>[for3warebasedsystems]

or
cat /proc/mdstat[desktopsand1Usystems]

Insertthenewdiskdrives.Ideally,thenewdisksshouldbethesamesize,typeand modelastheoriginaldisks. Oncethenewdiskshavebeeninserted,therebuildprocessshouldbegin automatically.Ifitdoesnot,usethe3Wareutility(forrackmountunits),orthe rebuild_diskscript(desktopsand1Usystems)toaddthedrivesandlaunchthe rebuildprocess.

Whenthenewdevicehasbeenrebuiltsuccessfully,createanewUnitrends Postgresdatabasewiththefollowingcommand:
/usr/bp/bin/setup_postgresql.sh create

4 5

Performdisasterrecoveryfromvaultorarchive.(Seepage 400and page 403Disasterrecoveryfromarchiveforinstructions). Ifapplicable,applythemanualstepsfollowingDisasterRecovery(seePost recoveryconsiderationsonpage 404fordetails).

398

Chapter 11

Scenario4:Recoveringacorruptinternaldrive
Thefollowingstepsdescribetherecommendedapproachforrecoveringthe systemrootdriveonaRecovery720orRecovery730. 1 2 3 Todeterminewhichinternaldrivefailed,viewthealertsonthestatuswindowof theAdministratorinterface.Youmayalsoviewthecontentsof/proc/mdstat. Ifthedriveisoffline,bringthedriveonlineandrunthescript
/usr/bp/bin/rebuild_disk

Ifthedriveiscorrupt,insertanewdiskdrive.Thenewdiskdrivemustbethesame sizeastheoriginaldiskdrive. Oncethenewdiskdrivehasbeeninserted,therebuildprocessshouldbegin automatically.Ifitdoesnot,usethe/usr/bp/bin/rebuild_diskscripttoformatthe newdrive.

Additionalrequirementsforrestoringtoavirtualsystem
Disasterrecoverytoavirtualsystemfromavaultorarchivemediarequiresall systemstoberunningversion6.0.0(orhigher)ofUnitrendssoftware. Whenrestoringtoavirtualsystemortoanewstoragedeviceonthetarget,the storagedevicemustbesetuppriortotherestorationprocess. Whenrestoringfromavault,thetargetsystemshouldgrantmanagement privilegestothevault.Todoso,logintotheadministratorinterfaceofthetarget system,navigatetoSettings>Vaulting>VaultManagement.ClickonAllow RemoteManagementattheleftbottom.

Storagesetup
Whenrestoringtoavirtualsystem,suchasUnitrendsEnterpriseBackup,itis requiredtobeconfiguredwithstoragedevicestowhichdatawouldberestored. Backupdevicesshouldbecreatedonthetargetsystempriortotherestore. StoragecanbeinternaldatastoresorexternalstorageslikeSAN(connectedvia ISCSIorfiberchannel)orNAS. Therecoveryprocesswillnotattempttoconnecttoanystorage,therefore,make theconnectionpriortobeginningtherestore.Dependingontheamountofdata thathastoberestoredtothesystem,thesetupcouldvary.Inallcases,ifstorage
399

Legacy Disaster Recovery

isdirectlyaddedtothevirtualsystemitcannotbepackagedintoanOpen VirtualizationFormat(OVF),thereforeexternalstorageneedstobeaddedasa datastoretotheESXserverhostingthevirtualsystem. Next,avirtualdiskmustbeaddedtothevirtualsystemusingthedesignationof AddedInternal.SetthepurposetoBackupsbyclickingonSettings>Storageand Retention>Storage. Thefollowingscenariosarepossible,dependingonthesizeofvaulteddata:


Scenario Data less than 2TB Description One virtual disk needs to be created on the data store housing the external storage. Appropriate number of virtual disks need to be created with none greater than 2TB. The recovered system cannot be directly packaged into an Open Virtualization Format (OVF). A floating storage device needs to be used to house client data greater than 2TB. This is required because the recovered system cannot be directly packaged into an Open Virtualization Format (OVF). This device is directly connected to the target system and backup devices are added on this storage. This device has to be NAS only.

Data greater than 2TB, no client greater than 2TB

Data greater than 2TB, at least one client greater than 2TB

Afterstoragedevicesareaddedtothetargetsystem,managementprivilegesneed tobegrantedtothevault,bynavigatingtoSettings>Vaulting>Vault Management.

Disasterrecoveryfromvault
1 2 3 4 Logintothesystemwherethebackupsarevaulted.(Bydefault,usernameisroot andpasswordisunitrends1) SelecttheappropriatevaultintheNavigationpane. ClickSettings>Vaulting>SystemRestore. Selectthebackupsystemfromthedropdownlist.Thisisthenameofthesystem beingrestored.

400

Chapter 11

EntertheIPaddressofthetargetsystem.Thisisthelocationtowhichthevaulted backupswillberestored.Ifthisistheoriginalsystem,thedefaultIPaddressthat appearsinthisfieldshouldbeused.Ifrestoringtoanalternatesystem,enterthe newIPaddress. Note:Ifalternatestorageisconfiguredonthetarget,managementprivileges shouldbegrantedtothevault.

Ifrestoringtoavirtualsystemoralternatestorage,clickSelectTargetStorage. AnswerYestothequestionDoyouwishtogetthelistofdevicesdefinedonthe newsystem?Theoptiontoselectthedeviceforeachclientwillbeshownadjacent totheclient. IntheSelectClientstable,selecttheclient(s)andthedevicestowhichthose clientswillberestored. OncetheDisasterRecoveryconfirmationwindowopens,confirmtheoperationby placingacheckmarkbythestatement,Iunderstandthedatabaseandhostsfile willbeoverwritten,andallexistingbackupsonalldeviceswillbedeleted,andclick Confirm. Ifencryptionwasenabledontheoriginalsystemyouwillbepromptedtoturnon encryptiononthetargetsystem.Forthis,opentheadministratorinterfaceofthe targetsysteminanewbrowserwindow.ClickSettings>SystemMonitoring> Encryption.Turnoffencryptionandrestartit.Youarerequiredtoenteryour masterpasskeytoenableencryption.

7 8

10 Tocheckthestatusoftherestore,selectthevaultagainintheNavigationpane clickSettings>SystemMonitoring>Jobs. 11 Detailsfromthelatestrecoveryoperationforeachsystemrecoveredfromthe vaultcanbeviewedintheDisasterRecoverylogfoundintheGeneralSupport Toolbox.

Automaticdisasterrecoveryfromvault
Anautomateddisasterrecoveryfromvaultoperationmaybeperformedona regularbasis.Akeycomponentofconfiguringthisautomatedprocessinvolvesthe creationofauniqueprofile.Aprofileconsistsofinformationidentifyingthe systembeingrestored,thetargetIPaddress,clientsanddevicestoberecovered, thestartdateandtime,andthefrequencywithwhichtherecoverywillbe performed.

Legacy Disaster Recovery

401

Createanautomaticdisasterrecoveryprofile
Tosetuptheprofile,performthefollowingstepsonthevault. 1 2 3 4 5 6 7 IntheDisasterRecoverypane,selectthetargetsystem. EntertheIPaddress. ClickCheckforAutomaticDisasterRecoveryProfile. Assumingaprofiledoesnotalreadyexist,checktheboxlabeled,SaveAuto DisasterRecoveryProfilewhenitappearsundertheclienttable. Selecttheclientsanddevicestoberecovered. ClickConfirm. OncetheDisasterRecoveryProfileOptionsscreenappears,selectthestartdate andtimeandwhetherornotthesystemshouldcheckforencryption. Note:itisrecommendedthisoptionbesettoYES.Ifanybackupsonthevaulted systemareencrypted,skippingthisprocesswillcausetheAutoDisasterRecovery tofail.Additionally,itisrecommendedthatapersistentpassphrasebesetfor encryption. 8 9 Oncetheprofileoptionsareset,clickConfirm. WhentheDisasterRecoveryProfileSelectionsdetailscreenopens,confirmthe settingsarecorrect.Tomakechangestotheprofile,clickCancel.Otherwise,click Savetoproceed.

Viewanautomaticdisasterrecoveryprofile
Toviewanautomaticdisasterrecoveryprofile: 1 2 3 4 5 Selectthesystemfromthedropdownbox. IftheIPaddressofthetargetsystemisknown,changethedefaultIPaddress shown. ClickCheckForAutomaticDisasterProfile. IfaprofileexistsforthegivenIPaddress,aViewProfileoptionisshown. ClickonViewProfiletoseetheprofileselections. Savedprofilesmaybecheckedanytimebyselectingasystemfromthedropdown box,andthenenteringtheIPaddress.ClickingCheckforProfilewilldisplay profilesifprofilesexist.ClickingonViewProfilewilldisplaytheprofilesettings, whereprofilesmayberemoved.Existingprofilescannotbemodified.Tochangea profile,youmustremovetheprofileandcreateanewprofilewithyourchanges.
402

Chapter 11

Removeanautomaticdisasterrecoveryprofile
Inordertoremoveanautomaticdisasterrecoveryprofile,firstViewtheexisting automaticdisasterrecoveryprofile(asdiscussedinpreviousparagraph)andclick RemoveProfile.

Change,stop,orsuspendanautomaticdisasterrecovery profile
Anautomaticdisasterrecoveryprofilecannotbechangedorupdated,butanew onecanbecreatedinitsplace.Youwillneedtoremoveanexistingautomatic disasterrecoveryprofileandthencreateandsaveanewone. Oncecreated,aprofilecannotbestoppedorsuspendedforatemporaryperiodof time.Itmustberemovedandrecreatedwhenrequired.

Disasterrecoveryfromarchive
1 2 3 4 5 Logintothesystemsadministratorinterface. SelectthebackupsystemintheNavigationpaneselectSettings>Vaulting> SystemRestore. ClickScanforArchiveMedia.Externalarchivedevicesshouldbeconnectedprior toattemptingtherestore. IntheSelectMediadropdownlist,selectthedesiredtypeofmediadevice. Ifrestoringtoavirtualsystemorexternalstorage,youmaychoosetoreplace storagebyansweringYEStothequestionMediahasbeenmounted.Wouldyou liketousethestorage(D2D)devicesconfiguredonthenewsystem? IfYESisselected,theSelectTargetStorageoptionwillappear. Ifencryptionwasenabledontheoriginalsystemyouwillbepromptedtoturnon encryptiononthetargetsystem.Forthis,opentheadministratorinterfaceofthe targetsysteminanewbrowserwindow.ClickSettings>SystemMonitoring> Encryption.Turnoffencryptionandrestartit.Youarerequiredtoenteryour masterpasskeytoenableencryption. Alistofclientswillbepopulated.Thelistofclientsispopulatedonlyafterthestate restoreiscomplete.Selectthedesiredclient(s)torestoreandthedevicestowhich theclientbackupswillberestored.

6 7

Legacy Disaster Recovery

403

OncetheDisasterRecoveryconfirmationwindowopens,confirmtheoperationby placingacheckmarkbythestatement,Iunderstandthedatabaseandhostsfile willbeoverwritten,andallexistingbackupsonalldeviceswillbedeleted,andclick Confirm. Note:Ifrestoringtoanalternatesystem,itmightbenecessarytochangethe hostnameofthenewlyrestoredsystem.Thehostnamewillbethatoftheoriginal whiletheIPaddresswillbethatofthenewtargetsystem.Theycanbechanged appropriatelyusingtheSettings>Clients,Networking,andNotifications> Networks>Hostsinterfaceaftertherestoreiscomplete.

Postrecoveryconsiderations
Thesystemsconfigurationinformationwillberecoveredwhenthesystemstate datahasbeenrestored.However,dependingonthesetup,youmayneedto performthefollowinginordertocompletethedisasterrecoveryoperation.

Ifrequired,reconfigurethenetworkwiththenewIPaddress.Onthe
administratorinterfacegotoSettings>Clients,Networking,andNotifications >Networks>Ethernet(eth0).EnterthenewIPaddressandgatewayas required.SelectConfirm. Ifrequired,changethehostnameviatheadministratorinterface. Makesurevaultingisturnedoffifchangingthehostname. Reconfigurethesystemforsynchronizationviatheadministratorinterface. Becausesynchronizationisdisabledduringtherestoreprocess,ensurethatthe systemissettovault.OntheadministratorinterfacegotoSettings>Vaulting >VaultingAttributes>ConnectionOptionsandVaultingControl>Resume Vaulting. IfMicrosoftExchangeCEPbackupshavebeenrestored,changethelogin informationfortheworkspace.Modificationstotheworkspacecanbe performedviatheExchangeWebAdminapplication. ChangeownerandgroupofExchangeworkspaceonsambasharetonobody. Usethefollowingcommandforthis:

chown -R <owner>:<group><workspace_path>

Example:chown -R nobody:nobody <workspace_path> Alsochangethepermissionsto777.

Ifbondingwasinuseitwillneedtobereconfiguredaftertherestoreprocessis
completedbecauseitdoesNOTgetrestored. Oncethesystemhasbeenrestored,individualclientscanberestoredusingthe administratorinterface.Seethenextsectionfordetailsonrestoringindividual clients.
404

Chapter 11

Restoringbackupdatatotheclients
Nowthatthebackupsystemhasbeenrestored,restoringtheclientscanbegin. Backupsshouldberestoredinthefollowingorder: 1 2 3 Baremetalbackups Filelevelbackups(masters,differentialsorincrementals) Applicationbackups

Baremetalbasicsteps
1 2 3 4 Boottheclientfromthebaremetalmedia. Restorethebaremetalbackuptotheclient.SeetheBareMetalProtection Overviewchapterfordetailedinstructions. Reboottheclient. Restoretothelatestavailablerestorepoint(seeTorestorefrombackupon page 323).Thisrestoresthelastmasterandanysubsequentincrementalor differentialbackups.

Filelevelandapplicationrestorebasicsteps
Tobegintherestoreprocess,logintothesystemsadministratorinterfaceand selecttheappropriateclientfromtheNavigationpane: 1 2 3 WiththeclientselectedintheNavigationpane,clickRestore. IntheRestorepane,selectthedatefromwhichthebackupwillberestoredby clickingontheappropriatedateintheRecoveryPointDaycalendar. Selecttheappropriatetimeofdayfromwhichtorestoreabackup.Theselection ofthistimecanbemadefromeithertheavailablelistoftimesintheRecovery PointTimestableorbysimplyclickingonavailablewedgesoftimethatappearon the24hourcircle. Thecommandbuttonforthisoperationchangesdependingonthetypeofrestore. Forfilelevelrestores(asdepictedintheaboveexample)theuserwillclickthe Restoretoinitiatetherestoreprocess.ForVMbackupstheuserwillclickRestore Files,andRestoreItemsforExchangebackups. IntheRestorefromBackupofClientpane,selectindividualfilesandapplications toberestored,orplaceacheckmarkbytheclientitselftoperformafullrestore.

Legacy Disaster Recovery

405

Ifdesired,changetheFileExclusionoptionsortheAdvancedExecutionbyclicking onthelinksatthebottomofthepane.Otherwise,clickonRestore. Note:Formoreinformationonconfiguringtheseoptions,seetheRestorefile exclusionoptionsonpage 325andAdvancedexecutionoptionsforrestoreon page 325. TheRestoreProgressbarwilldisplaythestatusoftherestoreandwillindicate whenitiscomplete.

406

Chapter 11

Chapter12 ProtectingWindowsEnvironments
ThischaptercontainsproceduresforpreparingandworkingwithWindowsclients. ToprotectWindowsclients,lightweightcoreandbaremetalagentsareinstalled ontheclientmachine.Theseagentsareeitherinstalledautomaticallyusingthe agentpushfeature,ormanuallyincaseswherethepushfeatureisnotsupported. Thischapterdescribespushandmanualagentinstallationprocedures,agent upgradeprocedures,agentuninstallprocedures,andadditionalWindowssetup andprotectionconsiderations. Seethefollowingtopicsfordetails:

Windowsagentversionsonpage 407 Windowsagentrequirementsonpage 409 PushinstallingtheWindowsagentsonpage 410 ManuallyinstallingtheWindowsagentsonpage 412 RemovingorrepairingWindowsagentsonpage 421 UpdatingtheWindowsagentsonpage 422 AboutWindowsprotectiononpage 425 WindowsInstantRecoveryonpage 436

Windowsagentversions
FilelevelbackupsareperformedusingthecoreWindowsagent.Thecoreagent neededdependsontheclientsoperatingsystem.Seethefollowingtablesforalist ofsupportedMicrosoftoperatingsystemsandthecoreagentsoftwareforeach. ForWindowsXP,2003andup,anadditionalagentcalled Unitrends_BareMetal.msimustalsobeinstalledtoperformhotbaremetal backups.ThebaremetalagentisnotusedforWindows2000andNTclients.
407

Beforeinstallingtheagent,seeWindowsagentrequirementsonpage 409.For agentinstallationandupdateprocedures,seethefollowing:

PushinstallingtheWindowsagentsonpage 410 ManuallyinstallingtheWindowsagentsonpage 412 UpdatingtheWindowsagentsonpage 422


WindowsclientoperatingsystemsandappropriateUnitrendscoreagentaregiven here:
Windows server OS Windows Server 200332 Bit Windows Server 200364 Bit Windows Server 2003 R2 32 Bit Windows Server 2003 R2 64 Bit Windows Server 200832 Bit Windows Server 200864 Bit Windows Server 2008R264 Bit Windows Server 201264 Bit Unitrends Windows core agent Unitrends_Agentx86.msi Unitrends_Agentx64.msi Unitrends_Agentx86.msi Unitrends_Agentx64.msi Unitrends_Agentx86.msi Unitrends_Agentx64.msi Unitrends_Agentx64.msi Unitrends_Agentx64.msi (agent push not supported) Unitrends_Agentx64.msi (agent push not supported) Backup_professional.msi BP_NT.EXE

Windows Server 2012 R2 64 Bit

Windows Server 2000 - 32 Bit Windows Server NT

408

Chapter 12

WindowsclientoperatingsystemsandappropriateUnitrendscoreagentaregiven here:
Windows client OS Windows XP - 32 Bit Windows XP - 64 Bit Windows Vista32 Bit Windows Vista64 Bit Windows 732 Bit Windows 764 Bit Windows 8 32 Bit Windows 8 64 Bit Windows 8.1 32 Bit Unitrends Windows core agent Unitrends_Agentx86.msi Unitrends_Agentx64.msi Unitrends_Agentx86.msi Unitrends_Agentx64.msi Unitrends_Agentx86.msi Unitrends_Agent.64msi Unitrends_Agentx86.msi Unitrends_Agent.64msi Unitrends_Agentx86.msi (agent push not supported) Unitrends_Agent.64msi (agent push not supported)

Windows 8.1 64 Bit

Windowsagentrequirements
Thefollowingrequirementsmustbemetbeforeinstallation:

Administrativeprivilegesarerequiredfortheuserexecutingtheclient
installation. VSSExchangeWriterrequiredforExchangeagent. VSSSQLWriterrequiredforSQLServeragent. VSSHyperVWriterrequiredforHyperVagent. .NET2.0FrameworkorhigherrequiredforlegacyExchangeagent. MicrosoftSQLServerBrowserrequiredforlegacySQLServeragent.

Protecting Windows Environments

409

Approximately1100MBoffreespaceisrequiredonthesystemdrive(usually
volumeC:).Thisrequirementappliesevenwheninstallingonavolumeother thanC:. SingleInstanceStorage(SIS)onWindowsStorageServer2008isnotsupported. Itmustbedisabledfortheagenttoproperlyperformbackups. NotethatVSSwritersarenotrequiredforWindows2000andNTclientsasthese olderenvironmentsdonotuseMicrosoftVSStechnology.BackupofExchangeand SQLdataintheseenvironmentsusethelegacySQLandExchangeagents.

PushinstallingtheWindowsagents
TheagentpushfeatureinstallstheUnitrendsprotectionsoftwareonWindows clientsautomatically,greatlyreducingsetuptime.WhenyouaddaWindowsclient tothebackupsystem,lightweightcoreandbaremetalagentsareautomatically installedandyoucanimmediatelybeginprotectingtheclient.Thepushfeature canalsobeusedtoupdateagentsonexistingWindowsclients.SeeUpdatingthe Windowsagentsonpage 422fordetails. Note:AgentpushisnotsupportedforWindowsNT,2000,8.1andWindowsServer 2012R2clients. ApushinstallisinitiatedwhenyouaddanewWindowsclienttothebackup system,asdescribedinAboutaddingclientsonpage 61.Iftherequirements describedbelowhavenotbeenmetandyouattempttopushinstall,youreceive themessagePlease download and install the latest agent release
on your Windows server from the Unitrends website. After installation, uncheck 'Establish Trust' when setting up your client.ProceedtoManuallyinstallingtheWindowsagentsonpage 412and

manuallyinstallboththeWindowscoreandbaremetalagents. TheagentisinstalledtotheC:\PCBPdirectory.Ifyouwishtoinstalltoanother volumeorlocation,youwillneedtoinstalltheagentmanually.

410

Chapter 12

Agentpushinstallrequirements
InadditiontotheitemsdescribedinWindowsagentrequirementsonpage 409, thefollowingprerequisitesmustbemetbeforepushinstallingtheWindows agent:
Item Windows versions supported Description Windows XP Professional, 2003, and up are supported (32and 64-bit), with the exceptions of Windows 8.1 and Windows Server 2012 R2. Windows NT and 2000 are not supported. For these versions, install the agent manually. See ManuallyinstallingtheWindowsagentsonpage 412 for details. Release 7.0.0 and newer.

Unitrends system version Backup system installation type

Push installations are only supported on systems configured with the local backup system, replication target, and local backup system and replication target installation types (see Abouttheinstallationtypeonpage 56). Legacy vault and cross-vault configurations do not support agent push installations. Trust credentials must be defined for the client on the backup system. See Clienttrustcredentialsonpage 77 for details. The Windows client must be configured as described in Windowsconfigurationrequirements below.

Credentials

Windows environment

Windowsconfigurationrequirements
ThefollowingWindowsconfigurationsettingsarerequiredfortheagentpush feature:

WorkstationandServerservicesmustberunningandsettoautomaticrestart. ForWindowsVistaandlater,NetworkdiscoveryandPrinterandFileSharing
mustbeenabledforthecurrentnetworkprofile(inControlPanel>Network andSharingCenter).

Protecting Windows Environments

411

ForWindowsXPProfessionaland2003,FileandPrinterSharingforWindows
Networksmustbeenabledforthenetworkadapteritself.SelectControlPanel >NetworkandSharingCenter>ChangeAdapterSettings,rightclickthe adapter,selectPropertiesandcheckFileandPrinterSharingforMicrosoft Networks. ForWindowsXPProfessional,turnoffSimplesharinginControlPanel>Folder Options>View>Usesimplefilesharing. TrustcredentialsenteredontheUnitrendsClientsetuppagemusthave administrativeprivileges.OnsystemswithUACenabled,atleastoneofthe followingmustalsoapply: Thetrustcredentialsenteredareforadomainadministratoraccount. Thetrustcredentialsenteredareforasystemsadministratoraccount.Being adifferentmemberoftheAdministratorsgroupisinsufficient.Ifthe administratoraccountisdisabled,enableitbyexecutingthefollowinginan elevatedcommandprompt:net user administrator /active:yes RegistrykeyLocalAccountTokenFilterPolicymustexistandbesetto1.

Firewallrulesmustallowinboundandoutboundtrafficbetweenboth
machines.DefaultWindowsfirewallruleslimitmanyservicestothesubnet.If thebackupsystemisoutsidetheclientsubnet,modifyfirewallPrinterandFile Sharingsettings(TCPports139and445)toallowcommunicationbetweenthe systems.

ManuallyinstallingtheWindowsagents
Inmostcases,theWindowsagentsareautomaticallyinstalledwhenyouregister theclienttothebackupsystem.Ifyouneedtoinstallthemmanually,usethe proceduresinthissection. ToinstalltheWindowscoreandbaremetalagents,downloadthedesired.msifiles fromtheunitrends.comwebsitetotheWindowsmachine.Todeterminewhich agentstodownload,seeWindowsagentversionsonpage 407.Download agentsfrom: http://www.unitrends.com/support/customercarecenter/latestagent releases.html Youcantheninstalleachagentbylaunchingtheinstallerorfromthecommand line.Inmostcases,youwillusetheinstaller.Youwillneedtousethecommand lineoptionifyouhavedeployedaWindows2008serverwiththeservercore option,orareusingGroupPolicytodeploytomultipleWindowsmachines.See thefollowingprocedures:
412

Chapter 12

AgentinstallerforWindowsXP,2003,andupbelow AgentinstallerforWindows2000clientonpage 416 CommandlineinstallerforWindowsclientsonpage 417


ForVistaandWindowsServer,seetheseadditionalconsiderationsbefore installingtheagent:SpecialinstallationinstructionsforMicrosoftVistaclients onpage 415andSpecialinstallationinstructionsforWindowsServeron page 415.

AgentinstallerforWindowsXP,2003,andup
ThecoreagentinstallerforMicrosoftWindows8.1,8,7,XP,2003,2008,2012,and VistaclientsloadsallcomponentsinUnitrends_Agentx86.msior Unitrends_Agentx64.msiontothesystemduringinstallation. MicrosoftSQLServerandExchangeServersoftwareisrequiredtoenable executionofUnitrendsSQLServerandExchangeagents.Theseagentsare installedevenifthesupportingsoftwarehasnotbeeninstalled,buttheywillnot functionwithouttherequiredunderlyingsoftware.InstallationofMicrosoftSQL ServerandMicrosoftExchangeServersoftwaremayoccurafterinstallationofthe protectionsoftwarewithoutconsequence.Formoreinformation,seethe MicrosoftExchangeServerProtectionandMicrosoftSQLServerProtection chapters. ToinstallUnitrends_Agentx86.msi,Unitrends_Agentx64.msi,or Unitrends_BareMetal.msi Note:ToinstallUnitrends_BareMetal.msionVistaorServer2012/2008systems thatarerunningUserAccountControl,specialinstallationisrequired.Usethe procedureToinstallUnitrends_BareMetal.msionVistaorWindowsServer 2012/2008runningUserAccountControlonpage 414.Forcommandline instructions,seeCommandlineinstallerforWindowsclientsonpage 417. 1 2 LogintotheWindowssystemasauserthathasfullaccesstoallfilesandfolders onthesystem(i.e.localadministrator). DownloadthedesiredcoreAgent.msiorBareMetal.msifilefromtheUnitrends CustomerCareCenterat http://www.unitrends.com/support/customercarecenter/latestagent releases.html. Launchthedownloadedfileandfollowtheinstructionsonthescreentocomplete theinstallation.

Protecting Windows Environments

413

4 5

ReviewthelicenseagreementandselectIAgreetoacceptthetermsand conditions. Selectaninstallationdirectory.ThedefaultdirectoryisC:\PCBP.Toinstallin anotherlocation(folderorvolume),clickBrowseormanuallyenterthedirectory path. ClickBacktoreviewormodifydataorclickNexttobegintheinstallationprocess. TheinstallationcanbeinterruptedatanytimebyclickingCancel. Iftheclienthasafirewallenabled,theinstalleropensport1743andcreates firewallexceptionsforthenecessaryprocesses. ToinstallUnitrends_BareMetal.msionVistaorWindowsServer2012/2008 runningUserAccountControl UserAccountControl(UAC)isenabledbydefaultonWindowsVista,Windows Server2008,andWindowsServer2012.ToinstallUnitrends_BareMetal.msion systemswhereUACisenabled,youmustinvoketheinstallationwithelevated privileges.

DownloadUnitrends_BareMetal.msifilefromtheUnitrendsCustomerCare CenterandsaveittotheVistaorServer2008machine. http://www.unitrends.com/support/customercarecenter/latestagent releases.html. FromtheVistaor2008server,selectStart>AllPrograms>Accessories. RightclickCommandPromptandselectRunasadministrator. SelectYesintheUACwindowtocontinue. Issuethiscommandtoinstalltheagent:


Msiexec /package C:\FullInstallPath\Unitrends_BareMetal.msi

2 3 4 5

whereFullInstallPathisthefullpathofthelocationwhereyousaved Unitrends_BareMetal.msi. Fordirectorieswithspacesinthename,addquotestothecommand. ExamplewhereUnitrends_BareMetal.msiisdownloadedtoC:\ProgramFiles:


Msiexec /package "C:\Program Files\Unitrends_BareMetal.msi"

ExamplewhereUnitrends_BareMetal.msiisdownloadedtoC:\temp
Msiexec /package C:\temp\Unitrends_BareMetal.msi

6 7
414

ExittheCommandPromptwindowandrestartyoursystemtoapplythechanges. Proceedtooneofthefollowingproceduresbelowtoperformadditionalbare metalsetupsteps:

Chapter 12

SpecialinstallationinstructionsforMicrosoftVistaclients SpecialinstallationinstructionsforWindowsServer

SpecialinstallationinstructionsforMicrosoftVistaclients
Administratorprivilegesarerequiredtoinstallthesystemprotectionsoftwareon theVistaoperatingsystem.Pleasemakecertainthattheuserapplyingthesystem protectionsoftwarehasadministratorprivilegesontheclient.Membersofthe Administratorgroupwhohavenotbeenassignedadministratorprivilegeswillnot beabletoinstalltheproductsuccessfully. AdditionalconfigurationisrequiredforbaremetalprotectionofVistaclients. WorkwithUnitrendssupporttosetupthisconfiguration.SeeContacting UnitrendsSupportonpage 25fordetails.

SpecialinstallationinstructionsforWindowsServer
ThecoreagentforWindowsServerperformsbackupandrecoveryofthesystem state,includingsupportforISS,COM+,ClusterDatabase,andActiveDirectory. ThesystemprotectionsoftwaremustbeinstalledontheMicrosoftWindows ServerclientwhileloggedinusingthelocalsystemAdministratoraccount.Ifthe localsystemAdministratoraccountcannotbeusedfortheinstallation,the WindowsUserAccountControlfacilitymustbedisabled.Whentheinstallationof thesystemprotectionsoftwarecompletes,UserAccountControlcanbere enabled. TodisableUserAccountControl(UAC) 1 2 3 4 LaunchMSCONFIGfromtheRunmenu. SelecttheToolstab. SelectDisableUAC. PressLaunch(waitforthissteptocomplete). Afterhavingsuccessfullyinstalledthesystemprotectionsoftware,locatethe UnitrendsAgententryontheWindowsStartmenu,rightclickontheUnitrends AgentMenu,andselectRunasadministrator.Thisprocessisrequiredfollowing theinitialinstallationofthesoftware.Subsequentinvocationsoftheapplication canbelaunchedusingtheusualmethod. AdditionalconfigurationisrequiredforbaremetalprotectionofWindowsServer clients.WorkwithUnitrendssupporttosetupthisconfiguration.SeeContacting UnitrendsSupportonpage 25fordetails.
415

Protecting Windows Environments

AgentinstallerforWindows2000client
TheagentinstallerforMicrosoftWindowssupportsagraphicaladministrator interfaceaswellasacommandlineinstallationoption.Windows2000clientscan useeitherthecompleteinstallationorthecustominstallation. Toinstalltheagentusingtheinstaller 1 Tobegintheinstallationprocess,logintothesystemasauserthathasfullaccess toallfilesandfolders(i.e.localadministrator)andlaunchtheinstallerfilethatis locatedontheinstallationmediaorthathasbeendownloadedfromtheUnitrends CustomerCareCenteronline. Oncetheinstallerhasbeenlaunched,amessageindicatingtherequiredaccess andpermissionswillbedisplayed;simplyacknowledgethismessagetocontinue. Reviewthelicenseagreementandselecttheradiobuttonthatcorrespondsto acceptanceoftermsandconditionsoftheagreement.Printacopyofthelicense agreementbyclickingPrintbeforecontinuing. SelecttheCompleteorCustomoptionandclickNext. Note:IftheWindowsOSisupgradedtoanewerreleaseorservicepackthenthe Unitrendsagentmustbeuninstalledandreinstalled. 5 Proceedtooneofthefollowingbelow:

2 3

CompleteinstallationforWindows2000client CustominstallationforWindows2000client

CompleteinstallationforWindows2000client
Thecompleteinstallationmethodinstallsthecorecomponent,whichincludes Windowsbaremetal,remoteadministration,andtheODMdriver.Bydefault,the USNAPSdriverisinstalledonlyonMicrosoftWindowsServer2000operating systems.InstallationoftheUSNAPSdriveralwaysrequiresarebootoftheclient followinginstallation. IftheinstallerdetectsthatMicrosoftExchangeServerisinstalledonthesystem, thenthelegacyExchangeagentisinstalled.Likewise,ifMicrosoftSQLServeris detectedonthesystem,thelegacySQLServeragentisinstalled.Theinstallation directoryforthecompleteinstallisC:\PCBP. Theinstallationtakesonlyafewminutestoconfigurethesystemandtocopy necessaryfiles.Whentheprocessiscomplete,amessagedisplaysindicatingthe statusoftheinstallation.

416

Chapter 12

CustominstallationforWindows2000client
Thecustominstallationmethodallowsyoutoselectwhichcomponentstoinstall onthesystem.Anycombinationofcomponentsmaybeselectedforinstallation. Theinstallerdoesnotprohibittheinstallationofacomponentwhenthe underlyingsoftwareisnotinstalledonthesystem.Forexample,thelegacySQL Serveragentmaybeselectedforinstallationontheclientevenwhenthe MicrosoftSQLServersoftwareisnotinstalled.Inthiscase,theapplicationagent willnotfunctionasdesigned.Therefore,itisrecommendedthatallappropriate softwarebeinstalledorplannedforinstallation,priortoinstallingthe correspondingagent. Theinstallationtakesonlyafewminutestoconfigurethesystemandtocopy necessaryfilesontothesystem.Whentheprocessiscomplete,amessagedisplays indicatingthestatusoftheinstall.

CommandlineinstallerforWindowsclients
Theprotectionsoftwarecommandlineoptionallowstheinstallation,removal, andmaintenanceofthesystemprotectionsoftwarefromthecommandline.In addition,thesecommandlineoptionsmaybeusedinconjunctionwith MicrosoftsGroupPolicymethodologytodeploymassinstallationsofclients. Theagentinstallerutilizesthemsiexeccommandtomanagethesystem protectionsoftwarefromthecommandline.However,notallofthemsiexec defaultparametersaresupportedwiththeinstaller.Thefollowingmsiexec parametersareavailable: /IInstallsandmodifiesthesoftware. /fRepairsthesoftware. /uninstallRemovesthesoftware. /quietInstallssoftwareinquietmodewithnouserinteraction. /l*Enableslogging. Theoptionbelowisusedtomanagetherestartofaclientaftertheinstallationis complete: FORCE_BOOTIfsettoTrue,willrestartthesystemafterinstallation.IfsettoFalse, willsuppressrestartafterinstallation.

Protecting Windows Environments

417

Thefollowingtabledepictstheoptionalparametersavailableforspecificationon thecommandline.Pleasenotethattheseparametersarecasesensitiveandmust beenteredinuppercaseonthecommandline.Thevaluesspecifiedforthe parameterarenotcasesensitive.

Parameter name (upper case) USNAPS BARE_METAL

Parameter value

Default value

True | False True | False

False True if SQL Server is installed on the client, otherwise false. True if Microsoft Exchange server is installed on the client, otherwise false. "C:\PCBP"

REMOTE_ADMIN

True | False

ODM

True | False

Note:Directorynamemustnot containspacesandmustbe includedindoublequotes.


SQL_AGENT EXCHANGE_AGENT INSTALLDIR IP FIREWALL True | False True | False True | False False True True True False

Windowsagentinstallercommandlineexamples
Example1:Installssoftwareusingdefaultvalues.
msiexec /i "C:\<Deploy>\Unitrends_Agent.msi"

where<Deploy>isthepathofthedownloadedagent
418

Chapter 12

Example2:Installssoftwarewithdefaultvaluesandturnsonlogging.
msiexec /quiet /l* "C:\temp\Unitrends.log" /i "C:\<Deploy>\_Agent.msi"

Where"C:\temp\Unitrends.log"isthefullpathlocationofthelogfile namedUnitrends.log.

Example3:Uninstallsoftwarefromthesystem.
msiexec /quiet /uninstall "C:\<Deploy>\_Agent.msi"

WindowsprotectionsoftwaredeploymentusingGroup Policy
Deployingsoftwareistypicallyasimpletask.However,thisisnotnecessarilythe casewhenthesoftwarebeingdeployedmustbeinstalledondozens,oreven hundredsofcomputers.Physicallyinstallingsoftwareoneverysinglemachinecan beaburdensometask.Fortunately,Microsoftprovidesamucheasiermethod throughgrouppolicybasedsoftwareinstallation. Withtheinstallerandcommandlineoptions,theabilitytomassdeploy installationsisreadilyavailable.SeethespecificMicrosoftGroupPolicyliterature fordetailsregardingthedownloadanduseofGroupPolicysoftware. Whilethegrouppolicybasedtechnologymayprovideanumberofwaystodeploy software,thissectiondescribesuseofthemsiinstallerfiletodeployandinstall software. TodeploysoftwareviaGroupPolicy 1 2 3 AnActiveDirectorydomainisneeded.BeginbycreatinganewGroupPolicy Object(seeMicrosoftdocumentationfordetails). Whentheobjecthasbeencreated,selectandeditit.IfusingtheGroupPolicy ManagementConsole,thisactionwillinvoketheGroupPolicyObjectEditor. DeterminewhethertheGroupPolicyObjectwillbeacomputerconfigurationora userconfiguration.Dependingontheconfigurationselected,expandtheSoftware SettingsfolderandselecttheSoftwareInstallationoption. RightclickSoftwareInstallation,pointtoNew,andthenclickPackage. IntheOpendialogbox,typethefullUniversalNamingConvention(UNC)pathof thesharedinstallerpackage.Forexample:

4 5

Protecting Windows Environments

419

\\fileserver\share\file name.msi.

IMPORTANT NOTE:DonotusetheBrowsebuttontoaccessthelocation.Make suretousetheUNCpathtothesharedinstallerpackage. 6 7 8 9 ClickOpen. ClickAssigned,andthenclickOK.Thepackageislistedintherightpaneofthe GroupPolicywindow. ClosetheGroupPolicysnapin,clickOK,andthenquittheActiveDirectoryUsers andComputerssnapin. LinktheGroupPolicyObjecttothedomainbydraggingtheobjecttothedomain name.

10 Finally,doubleclicktheGroupPolicyObjectnametoaddcomputersorusersto theobject. Ifthecomputerconfigurationwasselected,theprotectionsoftwarewillbe installedontheelectedcomputer(s)wheneveritisrestarted.Iftheuser configurationwasselected,theprotectionsoftwarewillbeinstalledonany computerinthedomainwheretheelecteduser(s)logsintothedomain. Onceinstalled,anentryfortheapplicationdisplaysintheAdd/RemovePrograms interfaceoftheMicrosoftWindowsoperatingsystem.


Windows version USNAPS driver installation (default) MICROSOFT driver used? REBOOT required after installation?

Windows 2000 Windows XP Windows 2003/2003 R2 (32 & 64 bit) Windows Vista (32 & 64 bit) Windows 2008/2008 R2 (32 & 64 bit)

YES NO NO

NO YES YES

YES NO NO

NO

YES

NO

NO

YES

NO

420

Chapter 12

Windows version

USNAPS driver installation (default)

MICROSOFT driver used?

REBOOT required after installation?

Windows 2012 (64-bit) Windows 7 (32 & 64 bit) Windows 8 (32 & 64 bit) Windows 8.1 (32 & 64 bit)

NO

YES

NO

NO

YES

NO

NO

YES

NO

NO

YES

NO

RemovingorrepairingWindowsagents
Thesystemprotectionsoftwarecanberemovedorrepairedusingmaintenance mode.Seethefollowingprocedures:

MaintenancemodeforWindowsXP,2003,andupbelow MaintenancemodeforWindows2000clientbelow
Ifinstallationisdoneviagrouppolicy,removalofUnitrendssoftwareshouldbe performedusingthecommandlineaswell.SeeCommandlineinstallerfor Windowsclientsonpage 417fordetails. Note:IftheUSNAPSdriverisinstalled,arebootisalwaysrequiredregardlessof theoperatingsystem.

MaintenancemodeforWindowsXP,2003,andup
TheUnitrendsapplicationmayberepairedorremovedviatheAdd/Remove Programsinterface.Repairandremovefeaturescanalsobeaccessedbyexecuting theUnitrendsAgent.msifileagain. SelecttheRepairoptiontorestoreanexistinginstallationtooperatingformor chooseRemovetodeletethesystemprotectionsoftwarefromtheclient.

Protecting Windows Environments

421

MaintenancemodeforWindows2000client
Whentheprotectionsoftwarehasbeeninstalled,executetheinstallerfileagain toinitiatemaintenancemode. SelecttheModifyoptiontomakechangestothecurrentlyinstalledoptionsand addorremovecomponentsasdesired.SelecttheRepairoptiontorestorean existinginstallationtooperatingformandchooseRemovetodeletethesystem protectionsoftwarefromtheclient.

UpdatingtheWindowsagents
WindowsagentupdatescanbepushedtoclientsusingtheAgentUpdatespage, ormanuallyforenvironmentsthatdonotsupportpushinstallation.

Pushinstallingagentupdates
PushingupdatestoWindowsclientsgreatlyreducesadministrationtimeand ensuresthatthelatestprotectionsoftwareisrunningonyourclients.

Pushinstallupdatenotifications
InUnitrendsrelease7.0.0andlater,analertdisplaysonthefrontStatuspageany timeanagentupdateisavailableforyourpushinstallclients.Onceyouinstallthe update,thealertmessagemovestothePreviouslyResolvedfolder.Notethat alertsdisplayonlyforclientsthatmeetthepushupdaterequirementsdescribed inthenextsection.

Requirementsforpushingagentupdates
InadditiontothegeneralWindowsagentrequirementsdescribedinWindows agentrequirementsonpage 409,thefollowingprerequisitesmustbemetbefore pushingWindowsagentupdates:
Item Windows versions supported Description Windows XP, 2003, and up are supported (32- and 64-bit), with the exceptions of Windows 8.1 and Windows Server 2012 R2. Windows NT and 2000 are not supported. For these versions, install the agent manually. See Manually installingtheWindowsagentsonpage 412 for details.

422

Chapter 12

Item Unitrends system version Unitrends Windows agent version Backup system installation type

Description Release 7.0.0 and newer

Release 5.0.2 and newer. You must manually uninstall and reinstall agents for clients running releases prior to 5.0.2.

Push installations are only supported on systems configured with the local backup system, replication target, and local backup system and replication target installation types (see Abouttheinstallationtypeonpage 56). Legacy vault and cross-vault configurations do not support agent push installations. Trust credentials must be defined for the client on the backup system. See Clienttrustcredentialsonpage 77 for details.

Credentials

Topushinstallagentupdates Note:YoucanalsopushupdatesfromtheClientspageasdescribedinTopush agentupdatestooneclientonpage 76. 1 2 3 4 5 SelectSettings>System,Updates,andLicensing>Updates. Beforeinstallingagentupdates,checkforandinstallanysystemupdates.For details,seeAboutsystemupdatesonpage 79. OntheDetailedUpdateManagementpage,selecttheAgentUpdatestab. Windowsclientsforwhichpushupdatesaresupporteddisplayinthelist. Checkboxestoselecttheclientstoupdate,thenclickConfirm. UponclickingConfirm,agentupdatesarepushedtotheclientiftheseconditions aremet:

Trustcredentialsarevalid. Nobackuporrestorejobiscurrentlyinprogressorscheduledtorunsoonfor
theclient.

Pushupdaterequirementshavebeenmet(seepage 422). Updatesareavailablefortheclient(clientisnotrunningthelatestagent


release).
423

Protecting Windows Environments

Uponcompletion,theAgentPushResultspagedisplaysindicatingwhether updateswereinstalledsuccessfully.

ManuallyupdatingWindowsagents
Ifpushinstallationisnotsupportedinyourenvironment,manuallyinstallupdates asdescribedhere. TomanuallyupdateWindowsagentversions5.0.2andlater InstallthelatestagentversionasdescribedinManuallyinstallingtheWindows agentsonpage 412.Itisnotnecessarytouninstallexistingagentsoftware. TomanuallyupdateWindowsagentversionsearlierthan5.0.2 1 Uninstalltheagentsoftwareusingoneoftheseprocedures:

MaintenancemodeforWindowsXP,2003,anduponpage 421 MaintenancemodeforWindows2000clientonpage 422 CommandlineinstallerforWindowsclientsonpage 417,useifyouhave


2 3 4 deployedfromthecommandlineusingGroupPolicy ReboottheWindowsclient. InstallthelatestagentversionasdescribedinManuallyinstallingtheWindows agentsonpage 412. ReboottheWindowsclient. Tomovetheagenttoanotherlocation IfyouarerunningoutofspaceonC:orneedtomovetheagentforsomeother reason: 1 Uninstallboththecoreandbaremetalagents.SeeRemovingorrepairing Windowsagentsonpage 421fordetails. LogfilesremainintheC:\PCBPdirectory. 2 3 MoveordeletetheC:\PCBPdirectoryasdesired. ManuallyInstallboththecoreandbaremetalagentstothedesiredlocation.See ManuallyinstallingtheWindowsagentsonpage 412fordetails. Notethat1100MBoffreespaceisrequiredonthesystemdrive(usuallyvolume C:),evenifyouareinstallingtoadifferentvolume.Thisspaceisneededforthe installerprogramtorun.
424

Chapter 12

AboutWindowsprotection
TheWindowsagentsenablefilelevel,application,andbaremetalprotectionof Windowsclients.ThefollowingtopicsdescribeWindowsprotectionandspecial considerationsforvariousWindowsenvironments.

VolumeShadowCopyServiceonWindowsServer BackingupaWindowsServer BackingupWindowsapplications SystemstatebackupandrestoreonWindowsServer ActiveDirectorybackupandrestoreonWindowsServer BaremetalrestoreofActiveDirectoryServeronWindowsServer MicrosoftIISmetadirectorybackupandrestore CertificateServicesdatabasebackupandrestore ClusterdatabasebackupandrestoreonWindowsServer Protectingfileclusters Windowsbaremetal FeaturesoftheWindowsagent

VolumeShadowCopyServiceonWindowsServer
TheVolumeShadowCopyService(VSS)enablesthebackupoflockedoropenfiles allowingvolumebackupstobeperformedwhileapplicationsonasystem continuetowritetothevolumes. UnitrendssystemprotectionsoftwareusesVSStocapturetheserverssystem stateandopenfilesduringafilelevelbackupandtoobtainavolumeimageduring abaremetalbackup. NoconfigurationstepsarenecessarytoenableVSStoworkwiththesystem protectionsoftware.ToconfirmthatthesystemagentisusingVSS,fromtheagent menuontheWindowsServersystem,selectOptions>SnapshotProperties.You willseeamessagethatreads:SnapshotsareenabledusingMicrosoftsVSS snapshotdriver.

BackingupaWindowsServer
SeetheBackupschapterforadditionaldetailsonemployingbackupstrategies toprotecttheWindowsserversandworkstationstomeettheRecoveryPointand RecoveryTimeobjectivesoftheorganization.

Protecting Windows Environments

425

BackingupWindowsapplications
Thebackupsystemallowsyoutoscheduleandexecutebackupoperationsfor applications,suchasMicrosoftExchangeorMicrosoftSQLServer,thatare installedonregisteredclients(whereaclientisaworkstation,PC,notebook,etc). ThefollowingapplicationsaresupportedbytheUnitrendsWindowsagent:

MicrosoftExchangeServer2003,2007,2010,2013.Fordetails,seethe
MicrosoftExchangeServerProtectionchapter.

MicrosoftSQLServer2000,2005,2008,and2012.Fordetails,seethe
MicrosoftSQLServerProtectionchapter. MicrosoftSharepoint2013,2010,and2007.Fordetails,seetheMicrosoft SharePointProtectionchapter. OracleonWindowsforOracle11g.Fordetails,seetheOracleProtection chapter. HyperVvirtualmachines.Fordetails,seetheProtectingHyperV Environmentschapter.

ProtectingdeduplicationenabledWindows2012Servers
ForWindows2012serversthathaveWindowsdeduplicationenabled,youmust runanewmasterbackupuponupgradingtheUnitrendsagent.Foradditional considerationsandbestpracticeswhenusingWindowsdeduplication,seethe MicroSoftTechNetarticlePlantoDeployDataDeduplication.

SystemstatebackupandrestoreonWindowsServer
InWindowsServer,thecomponentswhichmakeupthesystemstatedependon theconfigurationoftheserver.Systemstatedata,ataminimum,includes:

Registry COM+classregistrationdatabase Bootfiles,includingsystemfiles DFSnamespaces/replications Adomaincontrollersystemstateincludesatleastthefollowing:

ActiveDirectoryDomainServices Registry COM+classregistrationdatabase Bootfiles,includingsystemfiles SYSVOLdirectory Wheninstalled,thefollowingcomponentsareincludedinthesystemstate:


426

Chapter 12

MicrosoftInternetInformationServices(IIS)metadirectory CertificateServicesdatabase ClusterServiceinformation


WhenafilelevelbackupofaWindowsServersystemisperformed,theservers systemstateiscapturedinafilethatisplacedontheCdriveofthesystem.This fileispresentduringthefilelevelbackupandisdeletedwhenthebackupends. Thefileisbackeduptothesystemduringthefilelevelbackupprocess. ThefilecreatedduringthebackupoftheWindowsServersystemwillusespace ontheC:driveoftheserver,possiblyasmuchasonegigabyte. IftheC:driveofaWindowsmachineisexcludedfrombackup,thesystemstateis notcaptured,resultinginthebackupcompletingwithwarnings.Instead,exclude allsubdirectoriesandfilesbutleaveC:itselftobebackedup. Torecoverthesystemstate,restorethelastincrementalormasterbackuptothe WindowsServersystem. Afterrestoringthesystemstate,rebootingisrequiredbeforecontinuingtothe nextrestorestep. Note:ThefirstbootafterdoingafullOSrestoreofWindows2012,2012R2,2008, or2008R2maytake510minutesorlonger.Itmayshowablankscreenduringthis time.Themachineisnothung.Donotrebootforcefullyduringthistime,asitmay corrupttheOScausingitnottobootup.Theslowbootisduetoabulkfilerename forfileswhichwererestoredwithtemporaryfilenamesbecausetheirproduction counterpartswereactiveandlockedatthetimeoftherestore.Thisalsohappens withWindows2003,butthefilesetismuchsmallerandthebootlagistherefore muchshorterinduration.

ProtectingWindowsDFSServers
WhenperformingfilelevelbackupsofaWindowsserverthatusesadistributed filesystem(DFS),thesystemstatecangrowverylargeovertime.Ifyourbackups aregrowingandtakinglongertocomplete,youcanexcludetheDFSwriterfrom thesystemstatebackup.SeeKB253fordetails.

ActiveDirectorybackupandrestoreonWindowsServer
ActiveDirectorydatabaseandSYSVOLbackupsarepartofsystemstatebackup duringamasterorincrementalbackup.

Protecting Windows Environments

427

TorestoreDomainControllerandActiveDirectorydatabase,theservermustbe bootedintoDirectoryServiceRestoreModebeforeamasterorincremental restore. TorecovertheActiveDirectoryinformation,restorethelastincrementalormaster backuptotheWindowsServersystem. Bydefault,UnitrendsagentperformsnonauthoritativerestoreofActiveDirectory database.Youcanproceedwithauthoritativerestoreusingntdsutil.execommand followingamasterorincrementalrestore.FollowthebestpracticesaroundActive DirectoryAuthoritativerestoresdescribedintheActiveDirectoryDomainServices OperationsGuideat:http://www.microsoft.com/en us/download/details.aspx?id=16849 Incertaincircumstances,youmaywishtorestoreNTDSorSYSVOLfilesfora domaincontrollertoanalternatelocation,andthenMicrosoftUtilitiestorecover fromtheserestoredfiles.Unitrendsagentallowsrestoringsystemfilesintoan alternateSystemState.dirlocationwhenActiveDirectoryisrunningwithouta completerestore.

BaremetalrestoreofActiveDirectoryServeronWindows Server
AnActiveDirectoryservercanberecoveredfromabaremetalbackup,butbe awarethatthisisanolderimageofthedomaincontroller.Therearespecificsteps thatmustbecompletedbeforestartingtherecoveredserverinnormalmode.If theserverisbootedintonormalmodebeforecompletingthesesteps,replication willproceedwithinappropriatetrackingnumbers,resultinginaninconsistent databaseamongdomaincontrollerreplicas. Afterabaremetalimageisrestored,whentheserverisbootedforthefirsttime, anditisamemberofanActiveDirectoryforest,itmustbestartedinDirectory ServicesRestoreMode(DSRM).Youthenmustcompletearestoreofthelast masterandincrementalfilebackupsoftheserver.

428

Chapter 12

Ifafilebackupoftheserverisnotavailable,theservermustbestartedin DirectoryServicesRestoreModeandthedatabaserestoredfrombackupregistry valuemustbesetto1.Forinstructionsonhowtoeditthisregistryvalue,please reviewtheMicrosoftTechNetarticle,BackupandRestoreConsiderationsfor VirtualizedDomainControllers. Note:Toeliminatethepossibilityofstartinginnormalmode,whenbootingan ActiveDirectoryserverthefirsttimeafterabaremetalrecovery,dosowiththe serverdisconnectedfromthenetwork.Afterconfirmingtheserverisrunningin DSRM,thenetworkcanbereconnectedtoproceedwiththefilebackup. Oncethefilebackupshavebeenrestoredorthedatabaserestoredfrombackup registryvaluehasbeensetto1,restartthedomaincontrollerinnormalmode.

MicrosoftIISmetadirectorybackupandrestore
OnWindowsServersystemswheretheInternetInformationServices(IIS)roleis installed,thesystemstatebackup(describedinthesystemstatebackupand restoresection)capturestheISSmetadirectoryinformation. TorecovertheIISmetadirectoryinformation,restorethelastincrementalor masterbackuptotheWindowsServersystem. TheWindowsServersystemagentsupportsIIS7.0andIIS7.0withIIS6.0 compatibilityroleinstalled.

CertificateServicesdatabasebackupandrestore
OnWindowsServersystemswherethecertificateserviceroleisinstalled,usethe certificationauthorityMMCsnapintoperformabackupoftheCertSvcsite.This canbefoundunderAdministrativeTools. IntheMMC,rightclickonthesitenameandchooseViewTasks>Backup.Choose tobackupalloptionsandplacethebackupinanewdirectoryunder c:/windows/system32.TheUnitrendsbackupwillcapturethecertificateservices backupinformation. Torestorecertificateservicesdata,restorethefilescapturedbytheUnitrends backuptotheiroriginallocationandusethecertificationauthorityMMCsnapin toperformarestoreoftheCertSvcsite. Fromthesamemenuwithwhichyoubackedupthecertificateservices information,chooseAllTasks>Restore.

Protecting Windows Environments

429

ClusterdatabasebackupandrestoreonWindowsServer
OnWindowsServersystemswheretheclusterserviceisactive,thecluster databasewillbecapturedduringthesystemstatebackup.Thesystemstate backupwillskiptheclusterdatabaseandlogawarningiftheclusterserviceisnot active. Aclusterdatabaseonlyneedberestoredifallnodesinaclusterlosetheircopyof thedatabase.Ifjustonenodelosesthedatabase,thelostdatabasewillbe restoredfromanothernodeinthecluster. Ifthedatabasemustberecovered,duringarestoreofthesystemstate,thecluster database(CLUSDB)willberestoredtotheC:/PCBP/SystemState.dir/(theexact pathmaydifferifthesystemagentwasinstalledtoadirectoryotherthanthe default).FromthePCBPdirectory,runtheutilitycdrestore.battorecoverythe clusterdatabase.IfaclusterdatabasefileexistsinC:/PCBP/SystemState.dir,the utilitywillshowthedatethatthedatabasewasrestoredandpromptyouto ensurethattheClusterService(ClusSvc)isstoppedonallnodesofthecluster beforecontinuing.Pressytocontinueandthedatabaseisrestored.Ifthefirst attempttorestorethedatabasefails,theutilitywilldisplaythestepsrequiredto cleartheexistingclusteringhivefromtheregistryhivesothatthedatabasefile mayberestored.Aftertherestorecompletes,theclusterservicewillneedtobe startedtoaccessthestoragecluster.

Protectingfileclusters
TheUnitrendsagentcanprotectclusteredvolumesnomatterwhichphysical serverwithintheclusterhoststhem.InaWindowsfailovercluster,eachprotected volumeisassignedaclusterhostname,clusterIPaddress,andavolumenameor letterviathefailoverclustermanagementinterface.Thisresourcegroup,whenin service,isaccessibleononeoftheclusternodesatanyparticulartime.Inthe eventofahardwareorsoftwarefailureononeclusternode,theresourceis movedtoanothernodeandcanbeaccessedusingthesameIPaddress. Toprotectfileclusters,installtheWindowsagentonallphysicalclusternodesand addthefileclusterasaseparateclienttotheUnitrendssystem.Forphysical nodes,donotincludeanyfileclusterdatainanybackupschedules.Foranyfile clusters,donotincludeanylocaldata(suchasthesystemvolume)inanybackup schedules.

430

Chapter 12

Windowsbaremetal
WindowsbaremetalisabootabletoolfromUnitrends,intendedforsystem recoveryinthecaseofsoftwareorhardwarefaults.TheWindowsbaremetal featurereliesonthecreationofabootableCDROMwhichcontainssystemagent programs,utilities,andsystemspecificinformation.Thebaremetalprocessisable tocreatebackupcopiesofanormallyworkingsystemandrestorethesystemto itsoriginalstateortoapreviouslyworkingstate.Inaddition,Windowsbaremetal eliminatestheneedforoperatingsystemmasterCDsandfloppydisksinorderto restoreaMicrosoftWindowsclient.

FeaturesoftheWindowsagent
FeaturesoftheWindowsagentarelistedinthefollowingtables.
Feature Sparse files OS version Windows 2000 and above During backup A sparse file is a large file which is not made up of a great deal of data. When the sparse file facilities are used, the system does not allocate hard drive space to a file except in regions where it contains something other than zeros. Sparse files are backed up in a way that only valid data blocks of the files are stored on the backup media, thus saving space that would otherwise be taken up by zero filled blocks During restore The data blocks are reconstructed to restore the sparse file in its original form.

Protecting Windows Environments

431

Feature Encrypted files

OS version Windows 2000 systems and above (NTFS volumes only).

During backup Windows 2000 and above support encryption of files and folders. Encrypted folders are backed up and restored encrypted. When backing up encrypted files, the file data is not decrypted; instead, raw encrypted data is read and backed up. A hard link is a file systemlevel shortcut for a given file. When a hard link is created to an existing file, information is added to its directory entry at the NTFS level. The original file now has two or more names that can be used to access the same content. When backing up such files, the backup engine saves the contents of a hard linked file only once. When it encounters a different name of the linked file that has already been backed up, it simply saves the link between the names instead of saving the contents of the file again.

During restore For encrypted files the raw encrypted data that was stored to the backup media is restored back into a file. Recovery agents may be required in order to access the file if it is restored to a different system.

Hard links

Windows 2000 systems and above (NTFS volumes only).

Since the backup engine saves the information about the links between files, hard links are restored seamlessly, so that the same file contents can be accessed using many names. Restore of a hard link succeeds only if the original file containing the contents already exists on the system. In case that the file referenced by the hard link is not already present in the system, the user is notified that he/she needs to restore the original file first.

432

Chapter 12

Feature Offline files

OS version Windows 2000 systems and above (NTFS volumes only).

During backup Offline files are files whose data is not immediately available. The file data may have been physically moved to offline storage. Remote storage and the hierarchical storage management software support these types of files. When such a file is backed up, the engine indicates to the system that the file data is requested, but it should continue to reside in remote storage. It should not be transported back to local storage. Volume mount points are based on reparse points; they allow administrators to graft access to the root of one local volume. Similarly, junctions are used to graft a target folder onto another NTFS folder or mount a volume onto an NTFS junction point. The engine follows the reparse point to backup the files/folders of the Volume Mount point.

During restore Offline files are restored like normal files.

Junctions and volume mount points

Windows 2000 systems and above (NTFS volumes only).

The engine restores the reparse data that was backed up for a junction or volume mount point. For the restore process to be valid the target directory/volume should also exist in the system.

Protecting Windows Environments

433

Feature Compressed files

OS version Windows NT4 systems and above (NTFS volumes only).

During backup On the NTFS volume each file and directory has a compression bit. If this bit is set, all data in the file is compressed. The backup engine backs up uncompressed data on a file.

During restore During restore, the engine marks a file/folder as compressed before data is written to the file. Therefore, when data is restored, the system automatically compresses it and the file/folders are restored in their original compressed state. The registry aliases are restored as links. The target of the link has to present in order for the link to work correctly.

Registry aliases

Windows NT4 systems and above.

Registry aliases are links in the registry from one key to another. When a registry link is traversed, the path searching continues at the target of the link. The backup engine detects these links in the registry and saves these links instead of copying the target key to which they point. Thus, a lot of duplicate data is eliminated from the registry backup and restore process. The engine provides a mechanism to save the security information related to a registry key. The user can turn this mechanism on or off using the BackupRegSec flag in the master.ini file. The unmounted volumes like Microsoft System Reserved partitions are backed up by the engine

Registry security information

Windows 2000 systems and above.

If the security information of the registry keys was backed up then it is reapplied to the keys during a restore process.

Unmounted volumes

Windows XP and above

The unmounted and reserved volumes are recovered on the restore operation

434

Chapter 12

AdditionalfeaturesoftheWindowsagentarelistedbelow:
Feature OS version During backup

Temporary files

Windows NT4 systems and above (NTFS volumes only)

The engine provides a mechanism to allow the user to exclude temporary files during a backup process. This option can be chosen from the client GUI by selecting the Exclude Temporary Files option in the backup menus. Once selected, this option will exclude the following: All files in the Internet cache and the temporary folder of all users in the system. All files marked with the flag FILE_ATTRIBUTE_TEMPORARY. All files of the form ~xxx.tmp.

Wild card exclusion

All systems

It is possible for the client side GUI user to specify a path containing wild cards to be excluded. The following steps describe the process: Select Backup > Master/Selective > Exclude Files. Specify the wildcard path in the Filter edit box. No other file in the list box can be selected. Click ADD.

Exclusion of files

Windows 2000 systems and above. All systems.

The engine maintains a list of files and folders that are excluded from a backup or a restore process. This list contains files such as the page file, temporary files, etc.

Controlling automatic shutdown for reboot

A flag in the windows local master.ini file called EnableAutomaticRestart can be specified to control automatic restart behavior. This flag can be set to either Yes or No. At the end of a restore process, if a reboot is required, a dialog box is presented to query whether the engine should reboot the system. If the dialog box times out without a response, then the status of the flag is used to resolve if the system should be automatically restarted.

Protecting Windows Environments

435

WindowsInstantRecovery
Overview
Twofactorsthatdriveaneffectivedataprotectionstrategyintheeventofa disasteraretheRecoveryTimeObjective(RTO),theamountoftimeittakesto recovertheclient,andtheRecoveryPointObjective(RPO),thethresholdforthe amountofdatathatmaynotberecovered.UsingWindowsInstantRecovery(WIR) drasticallyreducesbothyourRTOandRPO. WIRprovidesatemporarysolutiontorestoringyoursystemintheeventofa disaster.WIRallowsyoutocreateavirtualclientforinstantrecoveryon:

AUnitrendsbackupsystem AUnitrendsreplicationtargetsystem
Note:WIRissupportedonUnitrendsphysicalsystemsandisnotavailableona virtualbackupsystem. Whenamissioncriticalclientfails,youcanrestoreaclientimagethatiscreated fromthevirtualclient,andthisclientimageassumestheroleoftheoriginalclient forashortperiodoftimeuntilyoucanperformabaremetalrestore.(Formore details,seeHowWindowsInstantRecoveryworksonpage 437.)

WindowsInstantRecoveryandbaremetalrecovery
YoucanthinkofWindowsInstantRecovery(WIR)asastopgapuntilyoucan performabaremetalrestore.Baremetalrestoreseliminatethestepsofre installingtheoperatingsystemandapplications,providetheflexibilityofrestoring theclienttodissimilarhardwareortoavirtualenvironment,andsignificantly reducetherecoverytimebyrestoringtheclienttoitsoriginalstate.Notall businesseshavesparehardwareavailableatthedropofahat.Precioustimecan belostinprocuringhardwaretoperformtherestore. WIR,usedinconjunctionwithbaremetalrecovery,bridgesthebusiness continuitygapanddramaticallyreducesdowntimeduetoWindowssystem failures. SeethefollowingtopicstosetupandperformWIR:


436
Chapter 12

HowWindowsInstantRecoveryworksonpage 437 Recommendedbackupstrategyonpage 438 Supportedconfigurationsonpage 439 WindowsInstantRecoverytipsonpage 442

WindowsInstantRecoverystepsonpage 443 Modesofoperationonpage 444 Systemresourceconsiderationsandprerequisitesonpage 445 Storageallocationonpage 446 Virtualnetworksetuponpage 447 Settingupavirtualclientonpage 449 Modifyingavirtualclientonpage 453 Virtualclientrestorestatusonpage 454 Viewingthestatusofvirtualclientsonpage 456 Changingthemodeofoperationonpage 458 AccessingthevirtualclientwhileinAuditorLivemodeonpage 459 Whendisasterstrikesonpage 460 Reportsandnotificationsonpage 461 Troubleshootingonpage 462

HowWindowsInstantRecoveryworks
YoucanperformWindowsInstantRecovery(WIR)onthefollowing:
WIR method A backup system Description A virtual client of the protected client is created and executed on the system. As of release 7.3 or higher, a virtual client of a replicated protected client is created and executed on the replication target system. (Backups must replicate from the source system and a backup schedule must exist.)

A replication target system

Thevirtualclientiscontinuallyupdatedwiththelatesteligiblebackupdata,soan uptodatevirtualimageoftheclientbackupisavailableontheUnitrendsbackup systemortheUnitrendsreplicationtargetsystem.Intheeventofadisaster,this bootablevirtualclientimagecanbebroughtonlineinmoments.Thisclientimage assumestheroleoftheoriginalclientforashortperiodoftimeuntilyoucan performabaremetalrestore. Note:Becausethevirtualclientisexecutedonthephysicalsystem,resourcessuch asmemory,processors,andstoragearereservedfortheinstance.

Protecting Windows Environments

437

Theprocessis: 1 2 3 TheUnitrendsbackupsystembacksupaWindowsclientand(ifused)backups replicatetoaUnitrendsreplicationtargetsystem. AvirtualclientissetuponthesourceORthereplicationtarget. Filescontinuallyrestoretoabootablevirtualclientimage.

4 5 6

Ifdisasterstrikes,youcanbootthevirtualclientontheUnitrendsbackupsystem ortheUnitrendsreplicationtargetsystem. Thevirtualclientofthebackuporthereplicationtargetassumestheroleofthe originalclientforashorttime. NewWindowssystemsareprovisionedandavirtualtodissimilarbaremetal recoveryisperformed,replacingthetemporaryWindowsInstantRecoveryfix.

Note:EveniftheclientwasneverconfiguredforWIRbuthasaneligiblelastmaster backup(onthesourceorthereplicationtarget),youcancreateavirtualclient image,restorefromthelastmasterbackup,andbootthevirtualclient.

Recommendedbackupstrategy
Tokeepthevirtualclientuptodateasbackupsareperformed,theyare immediatelyappliedtothevirtualimage.Toadequatelyprotectthedatausing WIR,youshoulduseanincrementalforeverbackupstrategy.
438
Chapter 12

Supportedconfigurations
WIRissupportedonallrackmountedsystemssoldsinceMay2011andalldesktop systemssoldsinceJanuary2012.WIRisnotsupportedonvirtualUEBsystems. ThefollowingWindowsconfigurationsaresupportedforinstantrecovery:
Item Client Operating Systems Description

Windows XP, 32-bit and 64-bit (SP2 and later) Windows Vista, 32-bit and 64-bit (SP2) Windows 7, 32-bit and 64-bit Windows 8, 32-bit and 64-bit Windows 8.1, 32-bit and 64-bit * Windows 2003, 32-bit and 64-bit (SP3) Windows 2003 R2, 32-bit and 64-bit (SP3) Windows 2008, 32-bit and 64-bit Windows 2008 R2 Windows 2012, 64-bit, all versions Windows 2012 R2, 64-bit * Windows Small Business Server 2003 and later, 32-bit and 64bit

Server Operating Systems

Applications

SQL Server 2005, SQL Server 2008, SQL Server 2012, Exchange 2003, Exchange 2007, Exchange 2010, and Exchange 2013. Windows Instant Recovery is not supported for Oracle and SharePoint environments.

* Note about Windows 8.1 and Windows 2012 R2: The data from all disks for Windows 8.1 and Windows 2012 R2 are protected by WIR, but a maximum of four disks is accessible when booting.

Protecting Windows Environments

439

ToleverageWindowsInstantRecovery,thefollowingprerequisitesmustbemet:
Prerequisite Unitrends Windows agent version Description For source: The Windows agent must have release 6.2 or higher installed. For target: The Windows agent must have release 7.3 or higher installed. Note: Backups of the server or workstation performed with an older agent are not eligible for Windows Instant Recovery. Instead, the system obtains configuration data directly from the original client and you must set up the WIR virtual client when the original client is still online. After installing a new release, you should run a new master backup to activate this feature for that server. This enables you to perform WIR from any successful backup, even if the Windows client is no longer operational. Unitrends system version For source: WIR is available on 64-bit Unitrends systems running release 6.2.0 or higher. For replication target: WIR is available on 64-bit Unitrends systems running release 7.3 or higher.

Dependingontheapplicationandstoragerequirements,Windowssystemscanbe setupinvariouswaystoensureoptimalperformance.Foreveryoperatingsystem mentionedabove,thefollowingdisks/volumeconfigurationsaresupported:


Item Disk Configuration Description WIR is supported on Windows systems configured with basic disks as well as dynamic disks. (The boot disk cannot be dynamic.) WIR is supported on disks configured with a Master Boot Record style disk as well as a GUID-based Partition Table. Windows systems running on hardware with a UEFI are not supported for WIR.

Master Boot Record (MBR) and GUID-based Partition Table (GPT)

440

Chapter 12

Item Dynamic Volumes

Description Dynamic volumes are supported only for those volumes that are not configured as boot or system volumes. Dynamic volumes configured as data volumes are supported for the following types:


File System Configuration

RAID 5 Spanned Striped Mirrored Simple

The following file systems are supported for WIR:

NTFS FAT/FAT32 ReFS (Windows 2012 and later)


Virtualization Hyper-V servers cannot leverage instant recovery to launch virtual machines under a virtual client setup. Since nested hardware assisted virtualization is not supported, this mode is not supported with WIR.

ThefollowingconfigurationsarenotsupportedwithWindowsInstantRecovery.
Limitation Limitation 1 Description If the Active Directory database (NTDS) is not located on the boot volume, the configuration is not supported and you see an error message when the virtual client is added. If the servers Boot and System partitions are on different disks and the System partition is not located on first disk (Disk 0), the configuration is not supported and an error message will be displayed when the virtual client is added.

Limitation 2

Protecting Windows Environments

441

WindowsInstantRecoverytips
SeethefollowingtablefortipsonusingWIRonthebackupsystemandonthe replicationtarget.
WIR Method Both Tip

WIR is not supported for Windows clients if the boot disk is dynamic or GPT. Additional disks can be dynamic or GPT. The WIR virtual client is created from the last successful backup or from the client itself if no backup is present. When you set up the WIR virtual client, the system scans the last master backup available for that client and uses system/disk configuration data to create the virtual client. If no backup is present, the system scans the client itself to obtain configuration data. Windows virtual clients are kept current by restoring the files from client backups on the backup system or from replicated backups on the replication target. The WIR virtual client is created from the last successful backup. If no backups for the chosen client have been replicated to the target, then the client cannot be added. For optimal results, create a backup schedule. Once you create the WIR virtual client, the client is continually updated as new backups run or replicate for the original client. The virtual client is not updated with synthetic backups because synthetic backups have already been updated to the client. In release 7.3 or higher, you can spin up the new virtual client from a successful backup even after the client has failed. To set up WIR on the replication target, you must log in with administrative privileges or above. When you first perform the WIR using the replication target, the system takes the last successful backup and continues updating the client as backups continue to replicate.

Backup System Backup System

Replication Target Both Both

Both

Both

Replication Target Replication Target

442

Chapter 12

WIR Method Replication Target

Tip

When you perform WIR procedures using the replication target, make sure you select the target and not the source in the Navigation pane.

Replication Target

On the replication target, you can perform WIR using a source that is replicating to the replication target. If you set up a client on the replication target and back up directly from the target, you can use WIR on that client using the target as the source. When you add a virtual client on the replication target for WIR, you do not see the client icon under the Target icon like you do when you add a client to the Source. Backup and restore procedures are the same on the source and target system. The user interface is the same for both. When you set up the WIR client, you have the option to receive a failure report through email. You can update this preference at any time. Incremental forever is the recommended backup strategy, but a strategy that consists of periodic masters and differentials or masters and incrementals also works. If you delete a virtual client while a virtual restore of that client is in progress, the removal may not be instantaneous. The clean up may take time since the restore is halted before the client can be removed.

Replication Target Both

Both

Both

Both

WindowsInstantRecoverysteps
ToperformaWindowsInstantRecovery,followthesebasicsteps: 1 2 Determinethesystemload(optional).Systemresourceconsiderationsand prerequisitesonpage 445. Allocatesystemstoragetotheinstance.Storageallocationonpage 446.

Protecting Windows Environments

443

SetupavirtualnetworkbridgeandnetworktoaccesstheLANduringinstant recovery,ifneeded.(Thisisnotclientspecific,soifabridgeandnetworkare alreadysetupforthesourceortargetwhicheveroneyouareusingyoucanskip thisstep.)Virtualnetworksetuponpage 447. Setupavirtualclient.Settingupavirtualclientonpage 449. Performtheauditprocesstoensurethatthevirtualclientdoesnotconflictwith theoriginalclient.Changingthemodeofoperationonpage 458. PerformtheliveWIRprocedure,ifnecessary.Whendisasterstrikeson page 460. Youcanalsoperformtheseoptionalsteps:

4 5 6

AddorremovedatabasesfromthevirtualclientModifyingavirtualclient
onpage 453. ViewrestoresforthevirtualclientsVirtualclientrestorestatusonpage 454. ViewthestatusofvirtualclientsViewingthestatusofvirtualclientson page 456. Accessthevirtualclient(inauditmodeandlivemode)Accessingthevirtual clientwhileinAuditorLivemodeonpage 459. ChangethemodeChangingthemodeofoperationonpage 458.

Modesofoperation
Therearethreemodesofoperationforthevirtualclient:
Mode Restore Description This is the default mode of the virtual client. In this mode, the backups of the original Windows client are constantly applied (restored) to ensure that the virtual client is up-to-date. Disabling this state does not delete the virtual client, but frees up the resources associated with the virtual client so they can be used for other system functions. Do not disable this state unless the system resource loading warrants the action.

444

Chapter 12

Mode Audit

Description This mode tests to ensure that the client is bootable and provides recoverability verification of the client. As backups are applied to the virtualized replica, the Audit mode provides a means to audit and verify that the virtual instance is available when executed in Live mode. Running the virtual client in Audit mode does not impact the production Windows system because Audit mode is performed in a sand-boxed virtual environment. An optional daily audit mode verification report is issued with Windows screenshots of the audited system. (You have the option to receive this email report when you set up your virtual client for WIR and you can update this preference at any time.) Any backups of the original Windows system that occur during the Audit mode are applied to the virtual client, once Audit mode is exited.

Live

This mode is used to restore volumes and applications when the original Windows system fails. The failover virtual instance is then executed in Live mode to recover the failed Windows system so that interruption is minimized. Once the failover virtualized instance is executed in Live mode, existing backup, archiving, and replication schedules for the original clients are in effect for the virtual instance. It is important to understand that executing the virtual instance in Live mode with the original Windows client available on the network causes a network (IP) conflict.

Note:SeeChangingthemodeofoperationonpage 458forthestepson changingthemodeofoperation.

Systemresourceconsiderationsandprerequisites
Youmustconfigurethevirtualclient(whetheronthebackupsystemorreplication target)forthedesirednumberofprocessorsandmemoryforoptimum performanceoftheclientwhenitisexecutedinLivemode.Inaddition,asufficient amountofstoragemustbeallocatedforthevirtualclienttoexecute. Itisimportanttoconsiderresourceutilizationonthesystemwhenallocating clientsforWIR.Asprocessor,memory,andstorageareallocatedforthevirtual clients,thereisadepletionofresourcesforotherfunctionsofthesystem,suchas deduplication,backups,archiving,andreplication.Allocationofstorageforvirtual clientssharesthesamestoragepoolasbackupsandhasanassociatedimpacton theretentionofprotecteddataonthesystem.

Protecting Windows Environments

445

Todeterminethesystemloadandutilization Makesurethesystemloadandutilizationareatacceptablelevelspriortoadding anewvirtualclient. 1 SelectthedesiredsystemintheNavigationpane. Note:Ifyouaremanagingmorethanonebackupsysteminasinglepaneofglass, youseemorethanonesystemintheNavigationpane. 2 ClickonSettings>SystemMonitoring>Load. Note:IfthesystemisconsistentlyintheAlarmAreaforprolongedperiodsoftime orifbackupsarenotcompletedinthedesiredbackupwindow,youshould reconsiderthenumberofvirtualclients. 3 SelectSettings>InstantRecovery>Windowstoseeresourceutilization snapshotsforprocessor,memory,andstorageforvirtualclients.

Storageallocation
Dependingontheidentityofthesystem,thestorageallocationcanbedistributed betweenbackups/replication,vaulting,andinstantrecovery.Asyouallocate resourcesforthevirtualclient,theseresourcescannolongerbeusedforother featuressuchasbackups,archives,ordeduplication. Storageisallocated,thenassignedwhenyougotoLivemode. Toallocatestorageforthevirtualclient 1 Priortoallocatingstorage,youmaywanttonote:

Thesystemloadandutilization(seeTodeterminethesystemloadand
utilizationonpage 446). Thestoragebeingusedontheclientbygoingtothecomputerwindowand viewingthestorageondrivesCandD.

446

Chapter 12

ClickonSettings>StorageandRetention>StorageAllocation.Youseethe storageallocationchartwhichliststhestorageusedonthesystem.

SlidethestoragedistributionforWIRorenterthesizeinthefield. Note:Theamountofstorageallocationforinstantrecoveryshouldbegreaterthan thesumoftheusedspaceontheoriginalWindowsclients. Ifthestorageallocatedforinstantrecoveryisinsufficient,analertandSNMPtrap isissuedtohelpquicklydetectandresolvethespaceallocationissue. Forexample:IfClient1hadadiskofsize100GBwithtwovolumesC:andD:of 50GBeach,andtheusedcapacityonC:andD:were10GBand20GBrespectively, thenthestorageallocationforWindowsInstantRecoveryshouldbegreaterthan 30GB.

4 5

ClickConfirm.Youseeasummarywindowwiththenewallocation. ClickYestoconfirmthenewsettings.

Virtualnetworksetup
Beforesettingupavirtualclient(seeSettingupavirtualclientonpage 449),you mustsetupavirtualnetworkbridgeandconfirmorupdatethevirtualnetwork. Note:Thisisasystemspecificsetupandnotclientspecific,soifaclientonthe sourceorreplicationtargethasalreadybeensetupforWIR,youdonotneedto repeatthisstepforyournewvirtualclient.
447

Protecting Windows Environments

Thisnetworkbridgeallowsyoutoaccessthevirtualclientandthelocalarea networkofthesystemwhenexecutedinLivemode.Withthevirtualnetwork bridge,thevirtualclient(inLivemode),cancommunicatewithotherclientsonthe networkandallowuserstoconnecttothevirtualclient,justastheywouldwith theproductionWindowsclient. Tosetupthevirtualnetworkbridgeandthevirtualnetwork Thevirtualclientcommunicateswithothernetworkelementsviathebridge, whichhastobeassociatedwithaphysicalEthernetadapter(eth0,eth1,etc)on theUnitrendssystem. Settingupthenetworkbridge 1 GotoSettings>InstantRecovery>NetworkBridge.Intheupperleftpartofthe screen,youseetheEthernetadapters(andassociatedsubnets)thatthevirtual clientusestocommunicatewiththeotherclientsonthenetwork. ClicktoselectanEthernetadapter.

networkbridge(theonethatisNOTbeingusedforbackupsorreplication). AfteryouclickontheEthernetadapter,youseeoneofthefollowingintheupper rightpartofthescreen: ATTACHEDdisplays. Ifabridgehasalreadybeensetupforthisadapter,amessagedisplaysinthe rightupperportionofthescreenindicatingthatthisadapterisattachedtothe bridge(suchasNetworkBridgeattachedtoPhysicalAdapter:eth0).Skipto Step8below. ClickAddtoaddthenetworkbridgetotheadapter.Youseeamessageconfirming thatyouareaddingthebridge. ClicktheIunderstandthatIamaddingabridgeto...checkbox. ClickConfirm.Intheupperrightpartofthescreen,youseeamessagethatthe networkbridgeisattachedtothephysicaladapterandthephysicalEthernet adapteryouselected. Note:YoualsoseeaRemovebuttonyoucanusetoremovethisadapter,if necessary.

Thismaybeeth0,eth1,etc.,oryoumayseeonlyone. IfyouhavemorethanoneEthernetadapter,usethesecondaryadapterforthe

Ifabridgehasnotbeensetupforthisadapter,themessageNOBRIDGE

4 5 6

ClickClose.

448

Chapter 12

Settingupthevirtualnetwork 8 GotoSettings>InstantRecovery>VirtualNetwork.Intheupperleftpartofthe screen,youseethedefaultvalueofthevirtualnetwork.Itmaytakeamomentto load. IftheVirtualNetworkaddressconflictswithasubnetusedinyourenvironment, youcanchangethisaddressasneeded. Note:TheDHCPRangeisapoolofIPaddressesfromwhichIPsareassignedtothe virtualclientsyoucreate.Forexample,withaDHCPRangeof 192.168.53.2.192.168.53.25,theaddressforthevirtualnetworkcanbefrom 192.168.53.2to192.168.53.25,andyoucanchangethelastnumbertoanumber between2and25(aslongasthenumberisnotbeingusedalready). 10 ClickConfirmtoestablishthevirtualnetwork.Youseeamessagethatthenetwork addressissuccessfullyset. 11 ClickOkay.

Settingupavirtualclient
Afteryouallocatestorageandsetupthevirtualnetwork,youarereadytosetup thevirtualclient. Tosetupavirtualclient 1 2 3 Allocatestorage.SeeToallocatestorageforthevirtualclientonpage 446. Assignthevirtualnetworkbridgeandsetupthevirtualnetwork.SeeTosetup thevirtualnetworkbridgeandthevirtualnetworkonpage 448. Ifyouaresettingupavirtualclientonthereplicationtarget,youmustselectthe TargeticonintheNavigationpane,nottheSourceiconortheclientsunderthe Sourceicon. Ifyouaresettingupavirtualclientinthebackupsystem,yourselectioninthe Navigationpanedoesnotmatter. 4 GotoSettings>InstantRecovery>Windows.Youseethevirtualclientsthatare alreadysetup,ifthereareany,andgraphsoftheallocationforprocessors, memory,andstoragefortheexistingvirtualclientsonthesystem.

Protecting Windows Environments

449

ClickAddinthebottomrightofthescreentocreateavirtualclient.Youseealist ofalleligibleclientsthatmeettheprerequisites. Note:Prerequisitesincludetherightagentversion,operatingsystem,anddisk configuration.ToperformWIRonareplicationtarget,asuccessfulmasterbackup isalsorequired.Iftheclientyouwanttoaddisnotonthislist,verifythatthese prerequisiteshavenotbeenmet.

Clickonthenameofthedesiredclient. Note:Youseeamessagethattheclientconfigurationisbeingretrieved.Thismight takeamomentasthesystemscansthelatestmasterbackupavailableforthat clientforsystem/diskconfiguration,andthenusesthisconfigurationtocreatethe virtualclient. Oncetheconfigurationisretrieved,youseetheAddVirtualClientwindow,which displaystheclientconfigurationdetails(processor,memory,anddisk configurationoftheoriginalWindowssystem).

IntheFailoverClientConfigurationsectionofthescreen,settheprocessorand memoryoptions.ValuesdefaulttothesettingsfortheoriginalWindowssystem. Note:Youcannotexceedtheoriginalsystemconfiguration.RememberthatWIRis atemporaryfix,andyoudonotneedtomatchtheoriginalconfiguration.Youmay wanttoenterfewerprocessorsandlessmemorythanisrequiredontheoriginal Windowssystem.Whenyouconfirmthesettingsonthiswindow,youmayseea messagethatyouroptionsaresettoohighandyoucanchangethemaccordingly.

Field Processor

Description
Allocate the number of processors for the virtual client in the Processors field under the Failover Client Configuration section. The number of processors allocated for this client cannot exceed the original system configuration. Allocate the amount of memory for the virtual client in the Memory field under the Failover Client Configuration section. The amount of memory allocated for the virtual client cannot exceed the original system configuration.

Memory

ChecktheEmailthefailovervirtualclientrecoveryverificationreporttoreceive adailyemailreportofascreenshotoftheloginscreenoftheclientinAudit mode.Thisisagoodtesttoseeifthevirtualclientisready,justincaseyouneed torestore.(SeeModesofoperationonpage 444formoreinformation.)

450

Chapter 12

InthelowerpartofthescreenintheVolumestab,clickonthevolumesand applicationsyouwanttoinclude.Thevolumesandapplicationsthatareprotected ontheoriginalclientareavailable.AnycriticalvolumesarealreadyintheVolumes toRestorecolumn. Note1:SystemReservedPartitionsorUtilityPartitionsarenamedas UnmountedVol:/{ID}. Note2:YoumayseeadditionaltabsbesidestheVolumestab,suchasanExchange tabifyourclientbackupincludesExchangedatabases.

10 ClickAddafteryouselectthevolumesandapplicationsyouwanttoinclude.Your selectionisaddedtotheVolumestoRestorecolumn.YoucanalsoclickAddAllto movealloftheavailablevolumesandapplicationstotheVolumestoRestore column. 11 ToremovevolumesfromtheVolumestoRestorecolumn,clickonthevolumesor applicationsandclickRemove,orclickRemoveAlltomoveallvolumesand applicationstotheVolumesAvailablecolumn.

Protecting Windows Environments

451

ThefollowingtableprovidesspecialnotesaboutremovingMicrosoftvolumesand applications. Note1:Thecriticalvolumesarealreadyselectedandcannotberemovedfromthe selection. Note2:Pleaseusecautionwhendeselectinganyvolumes.IfaSANLUN(s)was attachedtotheoriginalWindowssystem,itisrecommendedthattheSANvolume beexcludedfromthevirtualsystemandreattachedafterthevirtualinstanceis executedinLivemode.


MS Clients and Applications Microsoft Exchange or Microsoft SQL Client Notes

If the client being protected for WIR has Microsoft Exchange and/or Microsoft SQL Client installed on it, you see additional tabs in the bottom area of the virtual client configuration screen, one per application. Click on these tabs to select the storage groups or databases that you want to restore to the virtual client. Note: If no backups exist for these databases or storage groups, they can be selected but are not protected by instant recovery until successfully backed-up. Along with the file-based backups, application backups for the selected items are automatically restored to the virtual client so that the applications go live much more rapidly than if these applications had to be restored after the virtual client had gone live.

Microsoft Exchange or Microsoft SQL application

If you are protecting a Microsoft Exchange or Microsoft SQL application, a list of the Exchange or SQL databases for the client displays when you select the appropriate application tab. Just like the available Volumes, select the Exchange or SQL database(s) to protect and add them to the Volumes to Restore queue.

Note:System databases, such as master, model, and msdb do not


display in the available list as they are automatically restored to the virtual client.

12 IfthereareadditionaltabsbesidestheVolumetab(suchasanExchangetab), repeatthestepstoaddstoragegroupsordatabasestothevirtualclient.

452

Chapter 12

13 ClickConfirm.YouseetheWindowsInstantRecoveryClientsscreen.Noticethat informationaboutthevirtualclientyouaddeddisplaysinthetopportionofthe screen(withastateofNew)andalsointheresourceallocationgraphs.Younow haveavirtualclientyoucanuse,ifneeded. Note:FordetailsaboutthefieldsontheWindowsInstantRecoveryClientsscreen, seeViewingthestatusofvirtualclientsonpage 456. NoteaboutthereplicationtargetWIR:Whenyouaddavirtualclienttothe replicationtargetforWIR,theclienticondoesnotdisplayundertheTargeticonin theNavigationpanethewaythatitdoeswhenyouaddaclienttotheSource.To seethevirtualclientssetupforWIRonthereplicationtarget,youmustclickonthe TargeticonintheNavigationpane,thengotoSettings>InstantRecovery> Windows.YouseethelistofWIRclientsonthereplicationtargetontheModify VirtualClientwindow. 14 Hoveroverthegraphstoseethepercentagesandvaluesforthevirtualclientyou added,othervirtualclients,andthesystem. Note:YoucanclickontheclientontheWindowsInstantRecoveryClientsscreen atanytimetoupdatetheinformationortodeletethevirtualclient.

Modifyingavirtualclient
Afteryousetupthevirtualclient,youcanmodifycertaininformation. Tomodifyvirtualclientinformation 1 Ifyouaremodifyinginformationforavirtualclientonthereplicationtarget,you mustselecttheTargeticonintheNavigationpane,nottheSourceiconorthe clientsundertheSourceicon. GotoSettings>InstantRecovery>Windows. Clickthelineoftheclientyouwanttomodify.YouseetheModifyVirtualClient window. Followthesestepstomodifythevirtualclient.
Description Once created, the volumes protected by the virtual client cannot be changed. You must delete and then re-create the virtual client and select different volumes to protect.

2 3 4
Action

Changing volumes for a virtual client

Protecting Windows Environments

453

Action Adding or removing databases

Description You can add or remove Microsoft Exchange or Microsoft SQL databases to the lists of the ones being protected. If added, backups of these databases or storage groups are restored to the virtual client, and if removed, they are no longer restored to the virtual client.

Note: When removing databases or storage groups from the list of selected items, files that were previously restored are not deleted from the virtual client, but subsequent backups are not restored to the virtual client.
Changing the amount of virtual memory You can change the amount of virtual memory or the number of virtual processors assigned to the virtual client after initial creation. You should be careful not to over allocate resources to the virtual clients, or the overall system performance (backups, deduplication, etc.) is adversely affected. To stop the restores from being automatically performed on the virtual clients, you can temporarily disable this process by selecting the client and unchecking the Enable virtual restores to the instant recovery client checkbox. If you want to periodically check on the virtual clients viability, select the Emailthefailovervirtualclientrecovery verificationreport checkbox to receive automatic boot to audit mode and screen shot emails. When this is selected, the client is in the verify state.

Stopping automatic restores on virtual clients

ClickConfirmafteryoucompletethemodifications.

Virtualclientrestorestatus
Toviewrestoresforvirtualclients Thevirtualclientsarecontinuallyupdatedwiththelatestbackupdata,orrestored, soanuptodatereplicaisalwaysavailable.Youcanseeacurrentsnapshotor pointintimeviewoftherestoresthathavebeenappliedtothevirtualclientsand restoresthatarepending. Note:SeeReportsandnotificationsonpage 461forinformationaboutthe WindowsVirtualRestoresReport.

454

Chapter 12

Ifyouareviewingrestoresforvirtualclientsonthereplicationtarget,youmust selecttheTargeticonintheNavigationpane,nottheSourceiconortheclients undertheSourceicon. GotoSettings>InstantRecovery>Windows. ClickRestores(totheleftoftheAddbutton)toseetheVirtualClientRestore Statuswindow: finishedbeingrestoredorappliedtothevirtualclient). ThebottomportiondisplaysthePendingRestores(thecompletedbackupsthat areinthequeuetoberestoredfortheselectedvirtualclient). Thefollowingtableliststhedetailsaboutthefields.Thesefieldsarethesamefor thelastbackupsorthependingrestores.

2 3

ThetopportiondisplaystheLastBackups(theonesthathavemostrecently

Field Source System Client ID Complete

Description The source system where the data was originally protected. The name of the protected and virtual client. An identification number of the restore process. An indication (checkmark or x) that the restore process was successful or not successful. The restore instance that was performed, such as file-level. The date of the WIR restore. The time of the WIR restore. The type of restore that was performed, such as master or incremental. The amount of time of the restore. The size of the restore in megabytes. The number of files that were restored.

Instance Date Time Type

Elapse Size (MB) Files

Protecting Windows Environments

455

Viewingthestatusofvirtualclients
Toviewthestatusofconfiguredvirtualclients 1 Ifyouareviewingthestatusofconfiguredvirtualclientsonthereplicationtarget, youmustselecttheTargeticonintheNavigationpane,nottheSourceiconorthe clientsundertheSourceicon. GotoSettings>InstantRecovery>WindowstoseetheWindowsInstant RecoveryClientscreen. Thisscreendisplaysallthecurrentlyconfiguredvirtualclientsandtheirassociated states.Youseethefollowinginformation:
Field Status System Client Name Enabled Live Description An icon that indicates the state of the virtual client. The WIR system name. The WIR client name. Indicates if the Restore mode of the client is enabled or disabled. Indicates whether or not (Yes or No) the Live mode was used when the original system failed. Verifies whether or not (Yes or No) the virtual instance is available when executed in Live mode. The state of the virtual client. For values, see Virtualclientstatus Statevaluesonpage 457. Use the port to access the virtual client in Audit and Restore mode using a VNC (Virtual Network Computing) client.

Audit

State

VNC Port

456

Chapter 12

VirtualclientstatusStatevalues
ThefollowingtableliststhevaluesfortheStatecolumnontheWindowsInstant RecoveryClientscreen.
Column New Description The virtual client is newly created and is awaiting the initial restore of backup data to complete. A backup of the original system is currently being restored to the virtual client. The instant recovery system cannot be launched into Audit mode or Live mode if the virtual client is in restore state. The virtual client is not performing any restore operations at this time and has completed at least one restore. The virtual client is booted into Audit mode. This is a method for verifying the client in terms of ensuring that it is bootable. In this state, there is no network configured for the client so it is only accessible through the VNC port, as displayed in the client status grid. The virtual client is booted into Live mode. The virtual client has been configured to periodically go into verify mode and create verification emails to be sent to the user, and the virtual client is in the verification process at this time. The virtual client is powered off after it has been executed in Live mode. The virtual client is temporarily unavailable for restore, audit, or live mode due to insufficient space. An alert and a SNMP trap is issued when the virtual client is halted due to insufficient space. When disk space becomes available a corresponding alert and trap is issued. The user has initiated a deletion of the virtual client. The virtual client is in an invalid state if it has been executed in Live mode and is transitioned into Restore mode again. An alert and SNMP trap is triggered when the virtual client becomes invalid. View it by selecting Reports > Alerts Report. If the virtual client is invalidated, it must be deleted and re-created to continue operation.

Restore

Idle

Audit

Live Verify

Off Halted

Destroy Invalid

Protecting Windows Environments

457

Changingthemodeofoperation
Therearetimeswhenyouwanttochangethemodeofoperation,suchaswanting totestthattheclientisbootable.Thefollowingtableliststhemodesofoperation.
Mode Restore Audit Description This is the default mode of the virtual client. This mode tests to ensure that the client is bootable and provides recoverability verification of the virtual client. This mode is used to restore volumes and applications when the original Windows system fails.

Live

Note:SeeModesofoperationonpage 444fordescriptionsandmore informationaboutthemodesofoperation. Tochangethemodeofoperation Followthesestepstochangethemodeofoperation. 1 2 3 ClickonSettings>InstantRecovery>Windows. Clickonthevirtualclient. Followthesesteps,dependingonthemodeofoperationyouwanttochange.


Mode Restore Description To disable the Restore mode, uncheck the Enablevirtualrestoresto thefailovervirtualclient checkbox. To put the virtual instance in Audit mode, check the Setthefailover virtualclienttogointoauditmode checkbox. To put the virtual instance in Live mode, check the Setthefailover virtualclienttogointolivemode checkbox.

Audit

Live

Onceyouchangethemodeofoperation,youcanseetheupdatedstateonthe WindowsInstantRecoveryClientscreen.Thevirtualclientisnowinhalted,audit, orlivemode.

458

Chapter 12

AccessingthevirtualclientwhileinAuditorLivemode
ThefollowingproceduresdescribeaccessingthevirtualclientwhileinAuditmode (networkaccessisnotavailable)orLivemode. ToaccessthevirtualclientwhileinAuditmode InAuditmode,thenetworkisdisconnectedtoensurethatthevirtualclientdoes notconflictwiththeoriginalclient.Auditmodeisusefultoverifythatthevirtual clientisbootableandcanbeusediftheclientcrashes.Sincethenetworkis disconnected,applicationsthatrequirenetworkaccess(ActiveDirectory, Exchange,SQL)arenotavailable. VirtualclientsinAuditmodehavenonetworkconfigured,sotheyareonly accessiblethroughaVNCport. 1 2 LaunchyourVNCviewer. SpecifytheIPaddressofthesystemfollowedbyacolonandtheVNCPortseenin theFailoverClientManagerslistofvirtualclients. Example:IftheVNCPortspecifiedintheFailoverClientManageris5905andthe IPaddressoftheUnitrendssystemis192.168.111.120,thevirtualclientcanbe accessedas192.168.111.120:5905. ToaccessthevirtualclientwhileinLivemode InLivemode,thevirtualclientconsolecanbeaccessedusingVNCviewerora nativeWindowstool.

UsingaVNCviewer,specifytheIPaddressofthesystemfollowedbyacolon
andtheVNCPortseenontheWindowsInstantRecoveryClientsscreen (Settings>InstantRecovery>Windows). OR

AccessthevirtualclientusingnativeWindowstools,likeRemoteDesktop
Connection. Note:Itishighlyrecommendedtorecovertheoriginalclient(usingbaremetal restore)assoonaspossible.AnalertandSNMPtrapistriggeredifthevirtualclient isexecutinginLivemodeformorethan14days.

Protecting Windows Environments

459

Whendisasterstrikes
WhenaWindowssystemfails,followthesestepstomakethevirtualclient availableandtoensureminimaldowntime. 1 2 3 4 SelectSettings>InstantRecovery>Windows. Selecttheclientthatfailedfromthelistofvirtualclients.YouseetheModify VirtualClientwindow. ChecktheSetthefailovervirtualclienttogointolivemodecheckbox. ClickConfirmtoinitiatetheoperation. Note:Ifarestoreoperationisinprogress,theLivemodeoperationisnotinitiated untilthecurrentrestoreoperationcompletes. 5 ConnecttothevirtualclientusingVNC,thenlogin. ToconnectusingaVNCviewer,specifytheIPaddressofthebackupsystem followedbyacolonandtheVNCPortseenintheFailoverClientManagerslistof virtualclients.Fordetails,seeToaccessthevirtualclientwhileinAuditmodeon page 459. 6 Ifyouseeamessageaboutneedingtoreactivate,youmustactivateWindows usingyourproductkey.ClickActivateNowandregistertheclient. Performthenextfewstepsinthisproceduretoensurethatthehardware,disks, volumes,andnetworkaccessareavailable. 7 8 9 Onfirstboot,Windowsautomaticallyperformssomedriverupdates.Whenthisis complete,thesystempromptsyoutoreboot. Rebootthevirtualclient. CheckthediskconfigurationusingWindowsDiskManagement: PresstheStartbutton. RightclicktheComputeritem. ChooseManage. ChooseStorage>DiskManagement.Thisapplicationshowsagraphicalview ofalldisksandvolumes. IfthediskmanagershowsanydisksintheOfflinestate,thenrightclickthedisk iconandchooseOnline. IfitshowsanydynamicdisksasForeign,rightclickthediskiconandclick Import. Note:Afterthisiscomplete,allvolumesshouldappearastheydidontheoriginal client.

460

Chapter 12

10 Setthesystemclock.Theclientmayberunningwiththesystemclocktimethat existedduringthelatestbackup.Thismaycausetheclienttobootwitha date/timeinthepast. 11 FromtheWindowsControlPanel,updatethenetworkpropertiesfortheadapter (theTCP/IPv4address).Setthepermanentnetworkaddressasfollows:

IftheIPoftheoriginalclientisonthesamesubnetasthebackupsystem,set
theIPtomatchthatoftheoriginalclient. useanIPaddressthatisonthesamesubnetasthebackupsystem.Next,login tothebackupsystemandmodifytheclientsIPaddresstomatchthenewone yousupplied(seeTomodifyaclientonpage 74).Thisensuresthatscheduled backup,archive,and/orreplicationjobscontinuefortheclient. 12 Savetheoriginalclienttothesystemtoensurethatthevirtualclientcan communicatewiththesystem.Thisstepisrequiredtofinishthepreparationofthe virtualclientandmaketheapplicationslikeSQLonthevirtualclientsavailableon thenetwork.Tosavetheclient,performthefollowingsteps: SelectSettings>Clients,Networking,andNotifications>Clients. SelecttheoriginalWindowsclient. ClickConfirm. Oncetheclientissavedfromtheadministratorinterface,SQLdatabasesand otherapplicationsmayrequireafewminutestobecomeavailable. Thevirtualclientisnowavailabletoperformtheroleoftheoriginalfailed Windowsclient. Thebackup,archiving,andreplicationschedulesfortheoriginalWindowsclient continuetoprotectthevirtualclient. 13 TheoriginalWindowsclientcannowberestoredusingbaremetalrecovery. Note:SeeBaremetalrestoreproceduresonpage 717formoreinformation.

IftheIPoftheoriginalclientisonadifferentsubnetthanthebackupsystem,

Reportsandnotifications
WhenthevirtualclientisinRestoremode,everybackupthatisperformedto protecttheoriginalWindowssystemisappliedandrestoredtothevirtualclient. GotoReports>WindowsVirtualRestoresReporttoseeareportaboutthestatus oftherestorejobsperformedtothevirtualclient. IfthevirtualclientisrunninginAuditmodeorLivemodeformorethan14days, anemailissentdailytoemphasizetheimportanceofrecoveringtheoriginal Windowssystemattheearliestpossibletime.Thevirtualclientisameansof providingbusinesscontinuityuntiltheoriginalclientcanberecovered.
461

Protecting Windows Environments

IftheoriginalWindowsclientdiskconfigurationchanges,thevirtualclientis disabledandanalertisgenerated.Atthispoint,youshoulddeleteandreaddthe virtualclientsothatitisrecreatedwiththeupdateddiskconfiguration. Ifatanypointtheamountofstoragespaceallocatedtoinstantrecoveryis exhausted,thevirtualclientthatunsuccessfullyrequestedtheadditionalspaceis placedintoahaltedstateandanalertisgenerated.Atthatpoint,gobacktothe StorageAllocationinterfaceandincreasetheamountofspaceallocatedtoinstant recovery.

Troubleshooting
ConflictwithvolumeusingD:\andtheCDdeviceonthevirtualclient
IftheoriginalclienthasmultiplevolumesandoneistheD:drive,inAuditmode andLivemode,theCDdeviceconflictswiththevolumedriveletterD:.Duetothe volumeconflict,theD:volumeoftheoriginalclientismountedasadifferentdrive letterorwithoutadriveletterwhenthevirtualclientisbootedinAuditmodeor Livemode.Torectifytheconflict,performthefollowingsteps: 1 2 3 4 5 ConnecttothevirtualclientusingVNCviewer. OpenDiskManagementbyclickingStart,rightclickonComputer,andselect Manage. SelecttheCD/DVDdeviceshown,rightclickandselectChangeDriveLettersand Path. ChangethedrivelettertoanunusedvolumeletterbyclickingtheChangebutton. Repeatthevolumerenamingprocessofthepreviousstepforthedatavolume formerlyknownasD:.

462

Chapter 12

Chapter13 MicrosoftSQLServerProtection
ThischapterdescribesproceduresusedtoprotectMicrosoftSQLServer2005and laterenvironments.Seethefollowingtopicsfordetails:

AboutSQLServerprotectiononpage 463 ExecutingSQLbackupsonpage 466 SQLServerbackupsstatusonpage 470 RestoringSQLbackupsonpage 471 SQLrestorefromthereplicationtargetonpage 476 Note:ThischaptercoversprotectingMicrosoftSQL2005andlaterwithagent basedbackups.IfyourSQLserverisaVMwarevirtualmachine,youcaneitherrun vProtectapplicationawarebackupsasdescribedintheProtectingVMware Infrastructurechapter,orinstalltheWindowsagentandimplementprotectionas describedhere.Foracomparisonofeachstrategy,seeBestpracticesfor protectingVMwarevirtualmachinesonpage 563.IfyoureusingSQL2000,see LegacySQLServeragentonpage 821.

AboutSQLServerprotection
TheWindowsagentextendstheUnitrendssolutionfortheprotectionofMicrosoft SQLServerdatabasesanddatabaseobjectsbyenablingaSQLawaresystem.This meansthattheWindowsagentcandetectthepresenceofSQLonaserverand displaysaniconrepresentingtheSQLapplicationintheNavigationpanewhen addingaclient. TheUnitrendsWindowsagentsSQLprotectioncapabilitiesarebasedon MicrosoftWindowsVolumeShadowCopyService(VSS)andVirtualDevice Interface(VDI)technologies.

463

AfterinstallingtheagentonaSQLserver,allconfigurationandmanagementtasks areperformedonthebackupsystem. WhenperformingSQLbackups,onlytheSQLdatabasesarebackedup.No operatingsystemorfileleveldataisprotected.ToprotecttheWindowsoperating systemandfilesystem,seeChapter 32,WindowsHotBareMetalProtectionand Chapter 12,ProtectingWindowsEnvironments. UnitrendssupportsallsupportedMicrosoftconfigurationsofSQLServer:

SQL2005systemrequirements SQL2008systemrequirements SQL2008R2systemrequirements SQL2012systemrequirements Note:ThelegacySQLServeragentisstillusedtoprotectSQLServer2000 databases.Thelegacyagentisautomaticallyinstalledalongwiththestandard Windowsagentanddoesnotsupportbackupandrestoreoperationsforanyother SQLServerversions.SeeLegacySQLServeragentonpage 821formore information.

AgentprerequisitesforMicrosoftSQL
Thefollowingservicesmustbeinstalledontheclientpriortoinstallationofthe agent:

VolumeShadowCopyCanbemanualorautomaticstartuptype. SQLServerVSSWriterShouldbestartedandsettoautomaticstartuptype. SQLServerBrowserShouldbestartedandsettoautomaticstartuptype.


IftheSQLServerVSSWriterorSQLServerBrowserservicesarenotstartedwhen youinstalltheWindowsagent,theagentwillnotpickupontheSQLinstance. InstallingtheagentinstallstheBPAgentservice.TheSQLServerVSSWriter,SQL ServerBrowser,andBPAgentservicesmustberunningtoperformbackupand restoreoperations.

Systemrequirements
MicrosoftSQLprotectionissupportedonthefollowingoperatingsystems:

WindowsServer2012and2012R2(Standard,Datacenter,andEssentials
versions) Windows8.1 Windows8
464

Chapter 13

Windows7 WindowsServer2008and2008R2(both32bitand64bitversions) WindowsVista WindowsServer2003and2003R2(both32bitand64bitversions) Unitrendsrelease6.0.0orhigherisrequiredtoenabletheVSSbasedagent.

SQLServeragentbackups
TheWindowsagentsupportsfull,differential,andtransactionlogbackupsfor MicrosoftSQL.FullanddifferentialbackupsareperformedusingVolumeShadow CopyService(VSS)snapshots.Transactionlogbackupsareperformedusingthe VirtualDeviceInterface(VDI). TherecoverymodelofyourSQLdatabasesdetermineswhattypeofbackupsare supported.

Simplerecoverymodeldatabasessupportfullanddifferentialbackups.
Transactionlogbackupsarenotpossibleonsimplerecoverymodeldatabases.

Fullrecoverymodeldatabasessupportfull,differential,andtransactionlog
backups.Transactionlogbackupstruncatelogfileswhilefullsanddifferentials donot. Themasterdatabaseonlysupportsfullbackupsregardlessofrecoverymodel. Differentialsandtransactionlogbackupsarenotsupported.

DisplayofSQLServerinthebackupsystem
OnceyouregistertheSQLServertothebackupsystem,theSQLicondisplaysin theNavigationpanebeneaththeclientnamewithwhichitisassociated.Ifyoudo notseetheSQLicon,clickthereloadarrowsatthebottomtorefreshtheview.For detailsonregisteringtheSQLServer,seeAboutaddingclientsonpage 61. IfyouhaveaddedSQLtoaWindowsserveraftertheserverhasbeenregisteredto thebackupsystem,theagentsoftwaremustrescantodetectanddisplaythe newlyaddedSQLapplication.Torescan,highlighttheSQLServerintheNavigation paneandselectSettings>Clients,Networking,andNotifications>Clients.On theClientspage,clickSave.

Microsoft SQL Server Protection

465

ExecutingSQLbackups
SQLbackupscaneitherbeexecutedimmediatelyorscheduledatadesired frequency.Scheduledbackupsaremoretypicalyoucreateacalendarbased schedulewhichspecifieswhenSQLbackupswilloccur.Scheduledbackupsform thefoundationofcontinuousdataprotection.1timebackupsarebackupsthat occuronlyonetimeandareexecutedassoonaspossible.Thisfeatureisusefulfor creatingaonetimebackup,andisnotrecommendedasthebasisforcontinuous SQLprotection. Thefollowingbackupproceduresareavailable:

Toexecutea1timeSQLbackup TocreateaSQLbackupschedule ToviewormodifyaSQLbackupschedule TodeleteaSQLbackupschedule ToenableordisableaSQLbackupschedule

Toexecutea1timeSQLbackup 1 2 SelectaSQLiconintheNavigationpaneandclickBackup. Selectthe1TimeBackuptab. Thisretrievesalistofdatabasesavailableforbackup.Ifthereisnothinginthelist, clickthereloadarrowsatthebottomtorefreshthelistofdatabasesdiscoveredin theenvironment.Ifthereisstillnothinginthelist,verifythattheAgent prerequisitesforMicrosoftSQLonpage 464aremet. 3 IntheDatabasestoProtectarea,checkboxestoselectthedatabasestobackup. Databasesthatareofflinecannotbeselectedforbackup. Hoveroverthedatabasenametoseetoseethedatabaserecoverymodel. Aseparatebackupiscreatedforeachdatabaseselected.Backupsintheschedule executesimultaneously,uptothenumberofconcurrentoperationsconfiguredfor thesystem. 4 ChoosethetypeofbackupbyselectingFull,Differential,orTransaction. Ifarestoreoperationwasperformedsincethelastbackup,orifafullbackuphas notbeenperformedfortheselecteddatabase(s),besuretoselecttheFullbackup option.IfeitherconditionistrueandtheDifferentialorTransactionLogbackup optionischosen,thesystemwillnotqueuetherequest. 5 Bydefault,backupsarestoredonthedefaultdevice.Tobackuptoadifferent device,selectoneintheAvailableDevicesarea.

466

Chapter 13

Ifdesired,checktheVerifyBackupboxtoperformadatatransferintegritycheck foreachbackup. ForSQL,inlineverifiesaredoneduringthebackup.Thismethoddecreasesthe amountoftimerequiredforverification.Whenthebackupcompletes,theagent comparesitschecksumwiththesystemschecksum.Iftheydiffer,thebackupfails.

ClickBackupatthebottomofthescreentoinitiatethebackupprocess. Aseparatebackupiscreatedforeachdatabaseselected. Toviewthestatusoftheactivebackupoperations,selectSettings>System Monitoring>Jobs.SeeMonitoringrunningjobsonpage 182fordetails.Tosee thestatusofcompletedbackupjobs,seeViewingbackupsonpage 175. TocreateaSQLbackupschedule

1 2

SelectaSQLiconintheNavigationpane,andclickBackup. SelecttheScheduleBackuptab. Thisretrievesalistofdatabasesavailableforbackup.Ifthereisnothinginthelist, clickthereloadarrowsatthebottomtorefreshthelistofdatabasesdiscoveredin theenvironment.Ifthereisstillnothinginthelist,verifythattheAgent prerequisitesforMicrosoftSQLonpage 464aremet.

3 4 5

EnterauniqueScheduleName. Ifdesired,enteraScheduleDescription. IntheDatabasestoProtectarea,checkboxestoselectthedatabasestobackupin theschedule. Databasesthatareofflinecannotbeselectedforbackup. Adatabasemayexistinonlyonescheduleatatime.Attemptingtoaddasingle databasetomultipleschedulesresultsinfailuretosavethesubsequentschedules. Hoveroverthedatabasenametoseethedatabaserecoverymodel. Aseparatebackupiscreatedforeachdatabaseselected.Backupsintheschedule executesimultaneously,uptothenumberofconcurrentoperationsconfiguredfor thesystem.

Ifyouwouldliketoaddnewdatabasestothisscheduleautomatically,checkthe AutoincludenewDatabasesbox. ThisoptioncanbeenabledinonlyonescheduleforeachSQLserverthatthe systemisprotecting.

Microsoft SQL Server Protection

467

Ifselected,aprocessisenabledthatdetectsmodificationstothelistofavailable databasesontheMicrosoftSQLServer.Newlydetecteddatabasesareaddedto thescheduleautomatically. 7 IntheSchedulearea,selectabackupstrategyfromthelist.

ChooseFullwithDifferentials,FullwithTransactionLogs,orCustom. Theschedulefortheselectedstrategydisplaysbelow.
Note:Selectabackupstrategyappropriatefortherecoverymodelsofyour databases.Itmaybenecessarytocreatemorethanonebackupscheduleto accountfordifferentdatabaseshavingdifferentrecoverymodels. 8 Dooneofthefollowing: Foranoncustomstrategy,definethefrequencyatwhichbackupsofeachtype willrunusingthefieldsbeloweachbackup. Foracustomstrategy,clicktheCalendaricontodefinethefrequencyatwhich backupsofeachtypewillrun.Dothefollowingforeachbackupinstance:

recurrence,anddescription(optional),thenclickConfirm. Ifdesired,modifytheminimumandmaximumretentionandlegalholdsettings. Thesesettingsapplytoallselecteddatabases.Tosetdifferentvaluesforeach database,donotentersettingshere.Instead,finishcreatingyourbackup schedule,thengotoSettings>StorageandRetention>BackupRetention.For detailsseeAboutretentioncontrolonpage 106.

Dragabackupiconontothecalendar.Dragontotodaysdateorlater. IntheAddBackupwindow,definethebackuptype,startdate,starttime,

10 ClickAdvancedSettingsandspecifyoptionalsettingsasdesired.

ChecktheVerifyBackupoptiontoperformadatatransferintegritycheckfor

eachbackup.Fordetails,seeStep6onpage 467. Selectthebackupdevicetowhichbackupswillbewritten. UnchecktheEmailScheduleReportoptionifyoudonotwanttoreceive informationaboutthisscheduleinthedailysystemandschedulesummary reports.Thisischeckedbydefault. UnchecktheEmailFailureReportoptiontodisablesendinganemail notificationuponfailureofanybackupjobontheschedule.Thisischeckedby default.

468

Chapter 13

ClickConfirmtosaveAdvancedSettings.
Note:Reportsaredeliveredtoemailrecipientsspecifiedinthereportfieldin Settings>Clients,Networking,andNotifications>EmailRecipients.Thesystem andschedulesummaryreportsaresentat8AMbydefault.Tochangethetimeof daythereportissent,seeTomodifythetimethatscheduledreportsare generatedonpage 330. 11 ClickSavetocreatetheschedule. ToviewormodifyaSQLbackupschedule 1 2 3 4 SelectaSQLiconintheNavigationpaneandclickBackup. SelecttheScheduleBackuptab. IntheScheduleNamefield,selectthedesiredschedulefromthedropdown menu. ModifysettingsasdesiredandclickSave. Foradescriptionofeachsetting,seeTocreateaSQLbackupscheduleabove. Wheneditingaschedule,onlytheitemsbeingprotectedaremarkedinthe Databasestoprotectarea.TheobjectsdisplayedaredependentupontheSQL Serverinstancesanddatabasesthatareinstalledandrunning.Ifaninstanceisnot available,alldatabasesincludedinschedulearemarkedasunavailable. TodeleteaSQLbackupschedule 1 2 3 4 SelectaSQLiconintheNavigationpaneandclickBackup. SelecttheScheduleBackuptab. IntheScheduleNamefield,selectthedesiredschedulefromthedropdown menu. ClickDeleteSchedule. Note:YoucanalsodeleteSQLschedulesfromtheEnterpriseBackupsubsystem. SeeTodeleteanEnterprisebackupscheduleonpage 171fordetails.Youwill needtousethismethodiftheSQLiconisnotavailableintheNavigationpane. ToenableordisableaSQLbackupschedule 1 2 3 SelectaSQLiconintheNavigationpaneandclickBackup. SelecttheScheduleBackuptab. IntheScheduleNamefield,selectthedesiredschedulefromthedropdown menu.
Microsoft SQL Server Protection

469

Dooneofthefollowing:

Toenabletheschedule,checktheScheduleEnabledbox. Todisabletheschedule,unchecktheScheduleEnabledbox.
5 ClickSave. Note:YoucanalsoenableanddisableSQLschedulesfromtheEnterpriseBackup subsystem.SeeToenableordisableanEnterprisebackupscheduleonpage 171 fordetails.

SQLServerbackupsstatus
UsingtheUnitrendsinterface,youcanviewyourbackuphistoryforagivenperiod oftime.ViewthestatusofcompletedMicrosoftSQLbackupjobsusingoneofthe followingprocedures:

Toviewbackupscompletedinthelast7daysorcurrentmonth ToviewtheBackupsreportforaSQLServer
Toviewbackupscompletedinthelast7daysorcurrentmonth 1 2 3 SelectaSQLiconintheNavigationpaneandclickStatus. SelectthePast(HistoricalStatus)blind. TheSystemStatuspagedisplaysasnapshotofbackupsoverthelast7days. Failuresarered,warningsyellow,andsuccessgreen. HoveroveranysquareintheBackup:7DaySnapshotcalendarforabackup summaryofagivenday. 4 5 6 SelecttheBackup:Last7Daystabbelowforalistofbackupjobsfromthe previoussevendays.Clickanycolumnheadtochangethesortorder. SelecttheBackup:Monthtabbelowforalistofbackupjobsfromthecurrent month.Clickanycolumnheadtochangethesortorder. ClickabackuptoviewadditionaldetailsontheBackupInformationpage.See BackupInformationpageonpage 177formoreinformation. ToviewtheBackupsreportforaSQLServer 1 2 SelectaSQLiconintheNavigationpaneandclickReports. SelecttheBackupsreport.

470

Chapter 13

3 4 5 6

IntheDateRangedropdownmenuatthebottomofthescreen,selecta preferreddaterange.ThedefaultdaterangeisToday. Clickanycolumnheadtochangethesortorder. AddorremovecolumnsbyclickingtheEnableanddisablereportcolumns button. PrintorexportthereportwiththePrintthisreportandSaveallavailabledata buttons. Formoreinformationonthecolumnheadings,seeBackupsReportonpage 343. Formoreinformationonworkingwithreports,seeUsergeneratedreportson page 333.

RestoringSQLbackups
TheWindowsagentsupportsrestoreoffull,differential,andtransactionlog backupsofSQLdatabases.Whenperformingarestore,allpreviousbackupsinthe grouparealsorestored.Thismeansthatwhenrestoringatransactionlogbackup, themaster,thelatestdifferential(ifany),andallpriortransactionlogbackupsare restoredaswell.Eachbackupbeingrestoredwillbeitsownrestorejob,andall restorejobsforagrouparequeuedautomatically. Theentiredatabaseisrestoredinalivestatewitheachrestoreoperation. UnitrendsdoesnotsupportgranularrestoreofMicrosoftSQLServerdatabase records. UserdatabasesmustberestoredtothesameversionsofMicrosoftSQLorlater. DatabasescannotberestoredtoapriorversionofSQL. Restoreproceduresvarydependingonwhattypeofbackupanddatabaseisbeing restored.Thefollowingrestoreproceduresareavailable:

Restoringthemasterdatabase Restoringthemodelandmsdbdatabases RestoringSQLFullbackups RestoringSQLdifferentialandtransactionbackups

Restoringthemasterdatabase
Therearetwoimportantthingstokeepinmindwhenrestoringthemaster database:

Microsoft SQL Server Protection

471

ThemasterdatabasecanonlyberestoredtoitsoriginalserverandSQL
instance,thusoverwritingthedatabase.

TheSQLinstancemustbestoppedbeforeyouattempttherestore.
Torestorethemasterdatabase 1 2 3 4 5 StoptheSQLserverinstancethatthemasterdatabaseyourerestoringbelongsto. SeetheMicrosoftTechNetarticleHowtoStopanInstanceofSQLServer. SelecttheSQLiconintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SelectabackupofthemasterdatabasefromtheRecoveryPointTimeslistand clickNext(SelectOptions). Ifyouwouldliketorestoretoanalternatefilepath,checktheSpecifyTarget Pathname?checkboxandsupplyanalternatepath.Bydefault,databasesare restoredtotheiroriginallocation. Ifyouwouldliketospecifypreandpostbackupcommands,clicktheShow AdvancedExecutionOptionsicon.FordetailsseeBackupOptionstabon page 162. ClickRestore.TheRestoreConfirmationdialogboxdisplaysinformingyouthat restoringthedatabasewithoutchangingthenamewilloverwritetheexisting database.Itisnotpossibletochangethenameofthemasterdatabase.Checkthe checkboxandclickConfirm. ClickOkayontheRestoreStatusdialogbox.Youcanviewthestatusofyour restorebynavigatingtoSettings>SystemMonitoring>Jobs.

Restoringthemodelandmsdbdatabases
Restoringthemodelandmsdbdatabasesissimilartorestoringthemaster databaseinthattheycanonlyberestoredbacktotheiroriginalserverandSQL instance.However,unlikerestoringthemasterdatabase,theSQLinstancecanbe runningatthetimeoftherestore. Torestorethemodelormsdbdatabase 1 2 SelectaSQLiconintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold.

472

Chapter 13

3 4

SelectabackupofthemodelormsdbdatabasefromtheRecoveryPointTimeslist andclickNext(SelectOptions). Ifyouwouldliketorestoretoanalternatefilepath,checktheSpecifyTarget Pathname?checkboxandsupplyanalternatepath.Bydefault,databasesare restoredtotheiroriginallocation. Ifyouwouldliketospecifypreandpostbackupcommands,clicktheShow AdvancedExecutionOptionsicon.FordetailsseeBackupOptionstabon page 162. ClickRestore.TheRestoreConfirmationdialogboxdisplaysinformingyouthat restoringthedatabasewithoutchangingthenamewilloverwritetheexisting database.Itisnotpossibletochangethenameofthemodelormsdbdatabase. CheckthecheckboxandclickConfirm. ClickOkayontheRestoreStatusdialogbox.Youcanviewthestatusofyour restorebynavigatingtoSettings>SystemMonitoring>Jobs.

RestoringSQLFullbackups
ASQLFullbackupofauserdatabasemayberestoredtoanyavailableSQLserver thathasbeenaddedasaclienttotheUnitrendssystem.Thedatabasemayalsobe renamedandrestoredtoaspecifiedalternatepathifdesired. Note:Thisprocedureisforfullbackupsofuserdatabasesonly.Ifyouwouldliketo restoreasystemdatabase,seeRestoringthemasterdatabaseorRestoringthe modelandmsdbdatabasesabove. TorestoreaSQLFullbackup 1 2 3 SelectaSQLiconintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SelectafullbackupofauserdatabasefromtheRecoveryPointTimeslist.Hover yourmouseoverthenamesofthedatabasestoseethebackuptype.ClickNext (SelectOptions). FromAvailableSQLServers,selecttheSQLserveryouwanttorestoreto. FromSelectSQLInstance,selectanavailableSQLinstance.AvailableSQLinstances aredenotedwithagreencheckmark.

4 5

Microsoft SQL Server Protection

473

Ifdesired,typeanewnameforthedatabaseunderDatabaseName.Ifyouleave thedatabasenamethesame,therestoreoperationwilloverwritetheexisting data.ChangingthedatabasenamewillcreateanewdatabaseontheSQL instance. Ifyouwouldliketorestoretoanalternatefilepath,checktheSpecifyTarget Pathname?checkboxandsupplyanalternatepath.Bydefault,databasesare restoredtotheiroriginallocation.IfrestoringtoanalternateSQLserver,youmust specifyapathname. Ifyouwouldliketospecifypreandpostbackupcommands,clicktheShow AdvancedExecutionOptionsicon.FordetailsseeBackupOptionstabon page 162. ClickRestore.IfyourerestoringtotheoriginalSQLserveranddidnotspecifya newdatabasename,theRestoreConfirmationdialogboxdisplaysinformingyou thatrestoringthedatabasewithoutchangingthenamewilloverwritetheexisting database.CheckthecheckboxandclickConfirm.

10 ClickOkayontheRestoreStatusdialogbox.Youcanviewthestatusofyour restorebynavigatingtoSettings>SystemMonitoring>Jobs.

RestoringSQLdifferentialandtransactionbackups
SQLdifferentialandtransactionbackupsmustberestoredtotheoriginalserver andinstance.WhenrestoringaSQLdifferentialortransactionbackup,allprevious backupsinthegrouparerestoredsequentially.Thismeansthatwhenrestoringa transactionbackup,allprevioustransactionbackups,thelatestdifferential(if any),andtheparentmasterarealsorestored.Eachbackupwillberestored separately,andthesebackupjobsarequeuedautomatically. Note:Thisprocedureisforfullbackupsofuserdatabasesonly.Ifyouwouldliketo restoreasystemdatabase,seeRestoringthemasterdatabaseorRestoringthe modelandmsdbdatabasesabove. TorestoreaSQLdifferentialortransactionbackup 1 2 3 SelectaSQLiconintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SelectadifferentialortransactionbackupofauserdatabasefromtheRecovery PointTimeslist.Hoveryourmouseoverthenamesofthedatabasestoseethe backuptype.ClickNext(SelectOptions).

474

Chapter 13

Ifrestoringatransactionbackupandyouwishtorestoretoapointintimeshortly beforethetimeofthebackup,checktheRestoreToPointInTimecheckbox. Readthealert,andclickOkay.Clickthearrowontheslideranddragittothe desiredtime.Thisfeatureisnotavailablefordifferentialbackups. Ifdesired,typeanewnameforthedatabaseunderDatabaseName.Ifyouleave thedatabasenamethesame,therestoreoperationwilloverwritetheexisting data.ChangingthedatabasenamewillcreateanewdatabaseontheSQL instance. Ifyouwouldliketorestoretoanalternatefilepath,checktheSpecifyTarget Pathname?checkboxandsupplyanalternatepath.Bydefault,databasesare restoredtotheiroriginallocation.IfrestoringtoanalternateSQLserver,youmust specifyapathname. Ifyouwouldliketospecifypreandpostbackupcommands,clicktheShow AdvancedExecutionOptionsicon.FordetailsseeBackupOptionstabon page 162. ClickRestore.Ifyoudidnotspecifyanewdatabasename,theRestore Confirmationdialogboxdisplaysinformingyouthatrestoringthedatabase withoutchangingthenamewilloverwritetheexistingdatabase.Checkthecheck boxandclickConfirm. ClickOkayontheRestoreStatusdialogbox.Youcanviewthestatusofyour restorebynavigatingtoSettings>SystemMonitoring>Jobs.

RestoringabackupwhentheSQLicondoesnotdisplay
IfyouaddaclientwithSQLinstalled,runbackupsontheSQLdatabases,andlater uninstalltheSQLinstancefromtheclient,theSQLiconmaynotdisplayinthe NavigationpaneoftheUnitrendsinterface.ThebackupstakenoftheSQL databasesarestillontheUnitrendssystemandarestillavailableforrestore,but withouttheoptiontofirstselecttheSQLiconwhenperformingarestore,another methodofselectingabackupforrestoremustbeused. Torestoreanapplicationbackupwhenitsicondoesnotdisplay 1 2 IntheNavigationpane,selecttheclientthatonceheldtheapplication. SelectStatusfromthetopmenu.

Microsoft SQL Server Protection

475

FromtheCalendarizedBackupInformationpaneinthemiddleofthescreen, navigatethroughbackupsbyclickingtheleftandrightarrowstobrowseamonths worthofbackupsatatime.Youcanhoveryourmouseoveradateonthecalendar toreceiveinformationonwhattypesofbackupswerecompletedonthatdate. Clickonadateyouwanttorestoreabackupfrom. Anybackupscompletedontheselecteddatearehighlightedbelow.Clickona backupyouwanttorestore. ClicktheRestorebutton. Followstandardproceduresforrestoringthetypeofbackupyouselected.

4 5 6

SQLrestorefromthereplicationtarget
Usethisprocedureifyouareunabletorestorefromthebackupsystem.This procedurerequiresthatyouperformabaremetalrestoreoftheSQLclienttoa newclientthatisdirectlyattachedtothereplicationtarget.Oncetheclienthas beenrestored,yourestoretheSQLdatabase.

ReplicatedSQLrestorerequirementsandconsiderations
Considerthefollowingbeforerestoringfromthereplicationtarget:

Areplicatedbaremetalbackupofthesourceclientisrequired. AreplicatedSQLdatabasebackupisrequired. TheSQLclientonthetargetmustberunninganMSSQLversionequaltoor


higherthanthatoftheoriginalSQLclient.

ThenameoftheSQLinstanceonthenew,targetsideSQLclientmustmatch
thatoftheoriginal. ToperformareplicatedSQLdatabaserestoreatthetargetsite Inthisprocedure,werestorereplicatedSQLbackupsfromtheoffsitetarget system.Theexampleprocedureusesthefollowingnames:

SourceBKsourcebackupsystemthatprotectedtheoriginalSQLclient(SQLBK
inthisexample).Itsbackupshavebeenreplicatedtothetargetsystem. RepTargettargetthathasreceivedreplicatedSQLbackupsfromSourceBK. SQLBKoriginalSQLclient.WasregisteredandbackedupbySourceBK. SQLRepnewSQLclientregisteredtoRepTarget.Clienttowhichreplicated backupswillberestored. PerformabaremetalrestoreoftheSQLclientfromthereplicationtargetas describedinBaremetalrestorefromthereplicationtargetonpage 296.

1
476

Chapter 13

Onthereplicationtarget,enterReplicationView.SeeToshowreplicationview onpage 282fordetails. TheNavigationpanecontainsthefollowing:


3 4 5 6

BrownRepTargetvaulticon BlueRepTarget.dpubackupsystemicon BlueSourceBKbackupsystemicon BluebackupiconsforanyothersystemsthatarereplicatingtoRepTarget ClicktheblueSourceBKbackupicon,thenselecttheSQLdatabaseunderSQLRep. ClickRestore. SelectaRecoveryPointDayfromwhichthereplicatedbackupwillberestoredby clickingonthecalendar.Availabledaysdisplayinbold. SelectarestoretimeandclickNext(SelectOptions). SelectfromavailabletimesintheRecoveryPointTimestableorbyclickinga wedgeoftimeonthe24hourcircle.Thedatabaseinstancetorestoredisplaysin theDatabasecolumn.

7 8 9

IntheAvailableSQLServerslist,selectthenewSQLclient(SQLRep). IntheSelectSQLInstancelist,selecttheinstancetorestore.Thisinstancename mustexactlymatchtheoneontheoriginalSQLclient(SQLBK). Ifdesired,modifytheDatabaseName.AnydatabasewiththisnameonSQLRepis overwrittenduringtherestore.

10 Ifdesired,specifyapathwherethedatabasewillberestored.ClickOpenFile BrowsertobrowsedirectoriesontheSQLclient(SQLRep). 11 Ifdesired,specifycommandstorunbeforeand/oraftertherestorebyclicking ShowAdvancedExecutionOptions.Fordetails,seeAboutbackupoptionson page 159. 12 ClickRestore. 13 Tomonitortherestorejob,exitReplicationView,selectthereplicationsystem (RepTarget)intheNavigationpane,clickStatusandselectthePresent(Currently ExecutingBackups)blind.

Microsoft SQL Server Protection

477

478

Chapter 13

Chapter14 MicrosoftExchangeServerProtection
ThischapterdescribesproceduresusedtoprotectMicrosoftExchangeServer environmentswiththeUnitrendsWindowsagent. Note:IfyourExchangeserverisaVMwarevirtualmachine,youcaneitherrun vProtectapplicationawarebackupsasdescribedintheProtectingVMware Infrastructurechapter,orinstalltheWindowsagentandimplementprotectionas describedhere.Foracomparisonofeachstrategy,seeBestpracticesfor protectingVMwarevirtualmachinesonpage 563. Seethefollowingtopicsfordetails:

AboutExchangeprotectiononpage 479 ExecutingExchangebackupsonpage 484 MicrosoftExchangerecoveryonpage 493

AboutExchangeprotection
Unitrendsoffersallinonebackup,archiving,anddisasterrecoveryforMicrosoft ExchangeServerinanintegratedfashionfromouradministratorinterface. TheUnitrendsWindowsagentincludesanExchangeagentcomponentthat providesthefollowingprotectionfeatures:

ProtectionforExchange2013,2010,2007,and2003usingsnapshot

technology. ProtectionforExchange2000usingstreamingtechnology. OnpremisenetworkbasedbackupsofExchange. ArchivingExchangebackupsviaD2D2D(DisktoDisktoDisk)orD2D2T(Disk toDisktoTape)

479

ElectronicreplicationofExchangeviaD2D2C(DisktoDisktoCloud),using
eithersingletenantprivatecloudreplicationormultipletenantpubliccloud replication. Theabilitytoselectindividualormultiplestoragegroupsforbackupand restore. TheabilitytoprotectExchangeclustersandDAGs(DatabaseAvailability Groups.) TheabilitytorestoreindividualitemsfrombackupswiththirdpartyKrolland Lucid8granularrestoretechnology. Note:ProceduresinthischapterareforthelaterWindowsagentsthatutilize snapshottechnology.Thetermstreamingorlegacyreferstotheolderversionof ExchangeprotectionusedwiththeWindows2000agent.ThelegacyExchange agentmustbeusedforExchange2000.Forprotectionoflegacysystems,see LegacyExchangeagentonpage 830.ForlaterExchangereleases,besureto installthelatestWindowsagent.

RequirementsforusingExchangeServerprotection
TheExchangeservermustberunningthelatestservicepackspriortoinstallingthe Unitrendsprotectionsoftware.Thefollowingcomponentsmustalsobeinstalled andrunningontheExchangeserver.IftheExchangeVSSWriterisnotinstalledor isnotrunning,anerrormessagedisplays.TheExchangeVSSWritermustbe runningtocontinuethebackupoperation.

MicrosoftExchangeVSSWriter MicrosoftVSSService
UnitrendssupportsallsupportedMicrosoftconfigurationsofExchange.

Exchange2003systemrequirements Exchange2007systemrequirements Exchange2010systemrequirements Exchange2013systemrequirements Note:ThelegacyExchangeServeragentisstillusedtoprotectExchangeServer 2000.Thelegacyagentisautomaticallyinstalledalongwiththestandard Windowsagentanddoesnotsupportbackupandrestoreoperationsforanyother ExchangeServerversions.SeeLegacyExchangeagentonpage 830formore information.

480

Chapter 14

InstallingExchangeprotection
Unitrendsusesalightweightagentthatisinstalledonthesystemhostingthe Exchangeservertoenablehighlyefficientcommunicationwiththedata protectionsystem.TheExchangeagentmustbeinstalledforthebackupsystemto recognizeandprotecttheExchangeserver. Forconvenience,theExchangeagentisbundledwiththeWindowsagentsothat aseparateinstallationisnotneeded.ToinstalltheExchangeagent,simplyinstall theappropriateWindowsagentandyoureallset.FordetailsseeManually installingtheWindowsagentsonpage 412. AfterinstallingtheExchangeagentandrefreshingtheadministratorinterface,the MicrosoftExchangeServerclientdisplaysintheNavigationpane.TheExchange agentdisplaysbeneaththeExchangeServerclientwithwhichitisassociated. Expandorcollapsetheclientviewtodisplayorhidedata. Uponupgradingtheprotectionsoftware,ExchangeServerclientsthatare currentlyregisteredonthesystemmustbereconfirmedtodisplayinthe Navigationpane.Todothis,highlightthesystemintheNavigationpane,then selectSettings>Clients,Networking,andNotifications>Clients.Choosethe desiredclienttomodifyandselectConfirm.

RecommendedconfigurationsforExchange
ThefollowingarerecommendationsforconfiguringExchangeforoptimal protectionandrecovery:

Recommendation Disable circular logging

Description This allows you to run differential backups of Exchange. If you do not disable circular logging, only full backups are supported. See Aboutthecircular loggingsettingforExchangeonpage 483 for more information. This allows much simpler and faster Exchange restores since you will not first have to restore Active Directory on the same server.

Do not allow the physical or virtual machine hosting the Exchange server to be a domain controller

Microsoft Exchange Server Protection

481

Recommendation Make sure that the physical or virtual machine hosting the Exchange server is a member of a domain that has at least two domain controllers Separate transaction log files from the Exchange server database

Description This allows faster recovery. Active Directory information is replicated if there is more than one domain controller, which means that if one domain controller fails the other can be used to recover missing transactions after the failed domain controller is restored. Exchange performs much more efficiently if the Exchange database and transaction logs are placed on different physical storage devices. In addition, by separating these two important components, recovery of failed storage is eased. This prevents data corruption by ensuring that any Exchange write operation is committed to secondary storage (i.e., disk) correctly.

Disable the write cache on any hard drive or RAID adapters being used in the system that is hosting the Exchange server

DataprotectionstrategiesforExchange
UnitrendsallowsawidevarietyofdataprotectionstrategiesforExchange.Oneof themostimportantdecisionsanExchangeadministratorhastomakeisdeciding thespecificdataprotectionstrategytobeemployed. UnitrendsusestechnologythatenablesExchangeprotectionwithoutrequiring thatExchangebetakenoffline.WeprotectallExchangedata,includingindividual databases,storagegroups,mailboxes,andthepublicfolder,withfulland differentialbackups. Inordertomakethedecisionconcerningtheoptimaldataprotectionstrategyfor yourenvironment,youshouldconsider:
Primary factor Your tolerance of data loss is measured in a day or more Strategy Use a weekly Exchange full backup with daily differential backups.

482

Chapter 14

Primary factor Your tolerance of data loss is measured in minutes or hours

Strategy If your tolerance for data loss is 8 hours or more, then use a weekly Exchange full backup with several differential backups each day. If your tolerance for data loss is 8 hours or less, then use a weekly Exchange full backup with more frequent differential backups.

AutomaticexclusionofExchangedataduringfilelevel backups
WhenperformingfilelevelprotectionoftheWindowssystemwhichhoststhe Exchangeserver,certainExchangerelatedfilesareautomaticallyexcluded.For example,alltransactionlogfiles(i.e.,.LOGfiles),theExchangedatabase(i.e.,.EDB files),andstreamingcontentfiles(i.e.,.STMfiles)areexcluded.

AboutthecircularloggingsettingforExchange
CircularloggingisanExchangefeaturethatallowstheoverwritingoftransaction logfiles.Unitrendsrecommendsdisablingcircularlogging. Ifcircularloggingisdisabled,thetransactionlogsareusedtoperformdifferential backups.Thesetransactionlogsaccumulateuntilafullbackupisperformed afterthefullbackupoccursthetransactionlogfilesaredeleted.Thisistypically termedtransactionlogtruncationandmustoccurforabackupstrategythat includesdifferentialbackups. Note:Thefullbackuptruncatestransactionlogsbutdoesnotreclaimspace. Reclaimingspaceisaseparateoperationthatmustbeperformedperiodicallyby theExchangesystemadministrator. Ifyouenablecircularlogging,thentheonlytypeofbackupthatyoumayperform isafull.

SnapshotandstreamingbackupsforExchange
UnitrendsprotectsExchangeServerusingasnapshotfeatureofMicrosoftthatis availableonlyonWindowsServer2003andlaterandExchangeServer2003and later.

Microsoft Exchange Server Protection

483

UnitrendsalsosupportslegacyExchangeServerprotectionusinganagentthat supportsstreaming(formoreinformation,seeLegacyExchangeagenton page 830.) OurprotectionofExchangewiththesnapshotsdoesnotsupportthefollowing:

AnytypeofNASconfiguration(SANconfigurationsaresupported). TheExchange2003RecoveryStorageGroupfeature. Anycombinationofsnapshotandnonsnapshot(streaming)backups.

ExecutingExchangebackups
Exchangebackupsmayeitherbeexecutedimmediatelyorscheduled.Scheduled backupsaremoretypicalyoucreateacalendarbasedschedulewhichspecifies whenExchangebackupswilloccur.Scheduledbackupsformthefoundationofon goingprotectionforyourExchangeServerdata.Immediatebackupsarebasically justscheduledbackupsthatoccuronlyonetimeandareexecutedassoonas possible.Thisfeatureisusefulforcreatingasingleonetimebackup,andisnotthe recommendedapproachforcontinuedprotectionofapplications. ForadditionalconsiderationsaboutyourExchangeenvironment,seeAbout Exchange2013and2010backuponpage 489,AboutExchange2007/2003 backuponpage 489,AboutprotectingclusteredExchangeenvironmentson page 489,orAboutExchange2000backuponpage 492beforerunning Exchangebackups. ThefollowingproceduresareusedtoprotectExchangeenvironments:

ToexecuteanimmediateExchangebackuponpage 484 TocreateanExchangebackupscheduleonpage 486 ToviewormodifyanExchangebackupscheduleonpage 487 TodeleteanExchangebackupscheduleonpage 488 ToenableordisableanExchangebackupscheduleonpage 488

ToexecuteanimmediateExchangebackup 1 2 IntheleftNavigationpane,expandthedesiredExchangeserverbyclickingthe arrowtoitsleft. SelecttheExchangeinstancemailicon,thenclickBackup.

484

Chapter 14

Selectthe1TimeBackuptab. Thisretrievesalistofstoragegroupsordatabasesavailableforbackup.Ifthereis nothinginthelist,verifythattheExchangeserverhasbeenstartedandthatthe ExchangeServerdatabaseisonline.Alsoverifythatgroupsordatabasesare mountedproperlyontheExchangesever. Clickthereloadarrowsatthebottomtorefreshthelistofdatabasesdiscoveredin theenvironment.

InthedatabasestoProtectarea,checkboxestoselectthedatabasesorstorage groupstobackup. ForExchange2003or2007,selectstoragegroups.ForExchange2013or2010, selectdatabases. Hoveroverthedatabasenameformoreinformation.

ChoosethetypeofbackupbyselectingFullorDifferential. Ifdifferentialbackupischosenandasuccessfulfullbackuphasneverrun,youare promptedtoperformafullbackupfirst. Ifarestoreoperationhasbeenperformedsincethelastbackup,orifafullbackup hasnotbeenperformedfortheselectedstoragegroupsordatabases,besureto selecttheFullBackupoption.Ifeitherconditionistrueandadifferentialbackup ischosen,thebackupoperationdoesnotoccurandyoureceiveanerror.

6 7

Bydefault,backupsarestoredonthedefaultdevice.Tobackuptoadifferent device,selectoneintheAvailableDevicesarea. Ifdesired,checktheVerifyBackupboxtoperformadatatransferintegritycheck foreachbackup. ForExchange,inlineverifiesaredoneduringthebackup.Thismethoddecreases theamountoftimerequiredforverification.Whenthebackupcompletes,the agentcomparesitschecksumwiththesystemschecksum.Iftheydiffer,the backupfails.Thisinformationcanbeseenbyviewingthebackupdetailsonthe Statusscreenwhencompleted.

ClickBackupatthebottomofthescreentoinitiatethebackupprocess. Aseparatebackupiscreatedforeachdatabaseorstoragegroupselected. Toviewthestatusoftheactivebackupoperations,selectSettings>System Monitoring>Jobs.Toseethestatusofcompletedbackupjobs,selectReports> Backups.

Microsoft Exchange Server Protection

485

TocreateanExchangebackupschedule 1 2 3 IntheleftNavigationpane,expandthedesiredExchangeserverbyclickingthe arrowtoitsleft. SelecttheExchangeinstancemailicon,thenclickBackup. SelecttheScheduleBackuptab. Thisretrievesalistofstoragegroupsordatabasesavailableforbackup.Ifthereis nothinginthelist,verifythattheExchangeserverhasbeenstartedandthatthe Exchangedatabaseisonline.Alsoverifythatgroupsordatabasesaremounted properlyontheExchangesever. Clickthereloadarrowsatthebottomtorefreshthelistofdatabasesdiscoveredin theenvironment. 4 5 6 EnterauniqueScheduleName. Ifdesired,enteraScheduleDescription. InthedatabasestoProtectarea,checkboxestoselectthedatabasesorstorage groupstoincludeintheschedule. Aseparatebackupisrunsequentiallyforeachstoragegroupordatabaseselected. ForExchange2003or2007,selectstoragegroups.ForExchange2013or2010, selectdatabases.Hoveroveranameformoreinformation. Astoragegroupordatabasemaybeincludedinonlyoneschedule.Addinga storagegrouporadatabasetomultiplescheduleswillresultinanerrorupon attemptingtosavethesubsequentschedule. 7 IntheSchedulearea,selectabackupstrategyfromthelist.

ChooseFullwithDifferentialsorCustom. Backupsfortheselectedstrategydisplaybelow.
8 Dooneofthefollowing: Foranoncustomstrategy,definethefrequencyatwhichbackupsofeachtype willrunusingthefieldsbeloweachbackup. Foracustomstrategy,clicktheCalendaricontodefinethefrequencyatwhich backupsofeachtypewillrun.Dothefollowingforeachbackupinstance:

Dragabackupiconontothecalendar.Dragontotodaysdateorlater. IntheAddBackupwindow,definethebackuptype,startdate,starttime,
recurrence,anddescription(optional),thenclickConfirm.

486

Chapter 14

Ifdesired,modifytheminimumandmaximumretentionsettings.Thesesettings applytoallselecteddatabasesorstoragegroups.Tosetdifferentvaluesforeach, donotentersettingshere.Instead,gotoSettings>StorageandRetention> BackupRetention.FordetailsseeAboutretentioncontrolonpage 106.

10 Ifyouwouldliketoaddnewdatabasestothisscheduleautomatically,checkthe Autoincludenewdatabasebox. ThisoptioncanbeenabledinonlyonescheduleforeachExchangeinstancethat thesystemisprotecting. Automaticinclusionofnewdatabasesintoanexistingscheduleisachieved throughanightlyprocessthatdetectsapplicationserverchanges.Alternatively, thefollowingmanualprocesscanbeperformedtoadddatabasestotheschedule immediately.Performthefollowingstepsafterthedatabasehasbeenadded:

Click1TimeBackupandwaittoseethatthenewdatabaseshowsupinthe
databasestoProtectlist(itmustbemounted). server,thenselecttheExchangeservernode.Thisforcestheschedulestobe updated. ViewtheschedulethathastheAutoincludenewdatabaseoptionset.The newdatabaseshoulddisplay.Thenewdatabaseshouldalsobecheckedto indicatethatitisincludedintheschedule. 11 ClickAdvancedSettingsandspecifyoptionalsettingsasdesired.

IntheNavigationpane,selecttheclientnodeassociatedwiththisExchange

ChecktheVerifyBackupoptiontoperformadatatransferintegritycheckfor
eachbackup. Selectthebackupdevicetowhichbackupswillbewritten. ChecktheEmailScheduleReportoptiontoreceiveemailnotificationupon completionofthescheduledbackupjobs.Youalsohavetheoptiontoreceive aPDFattachmentofthereportintheemail. ChecktheEmailFailureReportoptiontoreceiveemailnotificationupon failureofanybackupjobontheschedule.Youalsohavetheoptiontoreceive aPDFattachmentofthereportintheemail. ClickConfirmtosaveAdvancedSettings. 12 ClickSavetocreatetheschedule. ToviewormodifyanExchangebackupschedule 1 2 3 IntheleftNavigationpane,expandthedesiredExchangeserverbyclickingthe arrowtoitsleft. SelecttheExchangeinstancemailicon,thenclickBackup. SelecttheScheduleBackuptab.
487

Microsoft Exchange Server Protection

4 5

IntheScheduleNamefield,selectthedesiredschedulefromthelist. ModifysettingsasdesiredandclickSave. Foradescriptionofeachsetting,seeTocreateanExchangebackupschedule above. TodeleteanExchangebackupschedule

1 2 3 4 5

IntheleftNavigationpane,expandthedesiredExchangeserverbyclickingthe arrowtoitsleft. SelecttheExchangeinstancemailicon,thenclickBackup. SelecttheScheduleBackuptab. IntheScheduleNamefield,selectthedesiredschedulefromthelist. ClickDeleteSchedule. Note:YoucanalsodeleteExchangeschedulesfromtheEnterpriseBackup subsystem.SeeTodeleteanEnterprisebackupscheduleonpage 171fordetails. YouwillneedtousethismethodiftheExchangeiconisnotavailableinthe Navigationpane. ToenableordisableanExchangebackupschedule

1 2 3 4 5

IntheleftNavigationpane,expandthedesiredExchangeserverbyclickingthe arrowtoitsleft. SelecttheExchangeinstancemailicon,thenclickBackup. SelecttheScheduleBackuptab. IntheScheduleNamefield,selectthedesiredschedulefromthelist. Dooneofthefollowing:

Toenabletheschedule,checktheScheduleEnabledbox. Todisabletheschedule,unchecktheScheduleEnabledbox.
6 ClickSave. Note:YoucanalsoenableanddisableExchangeschedulesfromtheEnterprise Backupsubsystem.SeeToenableordisableanEnterprisebackupscheduleon page 171fordetails.

488

Chapter 14

AboutExchange2013and2010backup
UnitrendsdataprotectionforExchange2013and2010enablesyoutobackup multipledatabasesorasingledatabase.TherearenostoragegroupsinExchange 2013or2010,soofcoursethereisnoconceptofstoragegroupprotection.

AboutExchange2007/2003backup
UnitrendsdataprotectionforExchange2007and2003enablesyoutobackup multiplestoragegroupsoranindividualstoragegroup. Unitrendsdoesnotallowtheselectionforprotectionofindividualdatabases withinastoragegroup.Thereasonforthisisthetransactionlogsfortheentire storagegrouparebackedupforeachdatabaseselected.Thusafullbackupmust berunoneverydatabaseinastoragegroupinorderforthetransactionlogstobe properlyhandledforfull/differentialbackups.

AboutprotectingclusteredExchangeenvironments
UnitrendsWindowsagentversions6.4.1andlaterincludeprotectionforthe followingclusteredExchangeenvironments:

Exchange2007CCRorSCRconfigurations Exchange2013and2010DAGconfigurations
Note:Pre6.4.1Windowsagentversionsdonotsupportbackupofpassivecluster nodesorpassivedatabases.ToprotectaclusteredExchangeenvironment, upgradetoagentversion6.4.1orlater.

Exchange2007CCRorSCRconfigurations
Exchange2007serversinaCCRorSCRconfigurationareprotectedfromdataloss bymailboxreplication.Selectedstoragegroupshavetheirmailboxdatabases continuouslyreplicatedontoanotheridenticallyconfiguredExchange2007server. Thestoragegroupsontheoriginatingserverareactiveandareinusebythe Exchangeuserpopulation.Thestoragegroupsonthereplicatedserverarepassive andnotuseduntilactivatedeithermanuallyorautomaticallybecauseofan unexpectedfailureoftheactiveserver.ExchangeCCRorSCRallowstwoExchange serverstobeclusteredtogethertocreatetheactiveandpassivenodes. AnexampleofhowthedatabasesmaybeprotectedinaCCRconfigurationis shownbelow.Thedatabasenamesshowninredaretheactivecopies.Here, Exchange_Southhostsallthepassivedatabasecopies.

Microsoft Exchange Server Protection

489

Exchange2013and2010DAGconfigurations
Exchange2013and2010serversparticipatinginaDatabaseAvailabilityGroup (DAG)alsousemailboxreplicationtopreventdataloss.Theactiveandpassive nodeconceptisthesameasforExchange2007CCRconfigurations,butDAG configurationspermittwoormoreExchangeserverstobeclusteredtogether.In DAGconfigurations,anExchangeserversactivemailboxesarecontinuously replicatedtopassivemailboxesononeormoreExchangeservers.DAG configurationsallowasingleExchangeservertohosttheentiresetofactive mailboxesandallotherExchangeserversintheDAGhostacopyofthepassive mailboxes.Or,eachserverintheDAGcanhostactiveandpassivemailboxes simultaneously.Asanexample,assumeaDAGhasthreeExchangeserver members:

Exchange_North Exchange_South Exchange_East


TheDAGalsohasthefollowingExchangedatabasesinoperation:

DB_North DB_South DB_East


AnexampleofhowthedatabasesmaybeprotectedbytheDAGisshownbelow. Thedatabasenamesshowninredaretheactivecopies.Allothersarethepassive copiesthatarethereplicationtargets.EachdatabaseisactiveononeExchange serverandreplicatedtoallotherExchangeservers.

490

Chapter 14

Microsoftrecommendsbackingupthepassivecopiesofdatabasestoreducethe workloadontheserverhostingtheactivecopies.Onewaytofacilitatethisbackup strategyistohostallactivecopiesonasingleserverandreplicatethemtooneor moreDAGmembers,asshowninthefigurebelow.Allactivedatabasesare locatedontheserverExchange_North,whileExchange_SouthandExchange_East hostmultiplepassivecopies.TheUnitrendsagentisthenusedtobackupthe databasesonExchange_SouthandExchange_Eastatregularintervals.

Exchange2013,2010,and2007providetwoVSSwritersthatareusedforbackup. TheExchangeInfoStorewritermanagesthebackupofactivedatabases.The ExchangeReplicationwritermanagesthebackupofpassive(orreplicated) databases.TheUnitrendsagentcanbackupusingeitherwriter.Whenadatabase backupstarts,theagentdeterminesifitistheactiveorpassivecopy,thenuses theappropriateExchangewriterfortheoperation.Inreplicatedconfigurations, youcanschedulebackupsofalldatabasesonanyoftheservers.Adatabase failoverconditionwontaffectthenextbackupsincetheagentwillbackup databasesineitherstate.


491

Microsoft Exchange Server Protection

BestpracticesforprotectingExchangeclusters
UsethefollowingguidelineswhenprotectingclusteredExchangeenvironments:

AddeachExchangeservernodeyouwishtoprotecttotheUnitrendssystem
usingitsnativeserverIPaddress.Donotusetheclusterhostname/IPaddress usedtoaccesstheactiveExchangeserver.Fordetails,seeAboutadding clientsonpage 61. Donotaddtheclusterhostname/IPasaseparateclient. Donotbackupmultiplecopiesofthesamedatabasesimultaneously.Eachfull backupofanactiveorpassivedatabaseresultsindatabaselogtruncation.The truncationoflogsisreplicatedtotheothermembersoftheclusterwherethat databaseexists.Ifthesamedatabaseisundergoingafullbackupontwonodes, thelogtruncationofeachcouldinterferewiththeother.Toavoidthis,schedule backupofreplicateddatabasesatstaggeredtimesacrossthecluster. Backuponlypassivecopiestoreduceworkloadontheactiveserver(s). OnceanExchangenodeisadded,youcanalsorunfilelevelbackupsas describedintheBackupschapter.

RestoreconsiderationsforExchangeclusters
TheUnitrendsagentsupportstherestoreofbackupsfromactiveandpassive databases.Inbothcases,thedatabasecanonlyberestoredtotheservercurrently hostingtheactivecopyofthatdatabase.Forexample,ifthedatabasetorestoreis currentlyactiveonserverExchange_North,thenthatistheonlylocationtowhich itcanberestored.Foralternaterestore,thepassivecopycanberestoredtoany nonExchangelocationasdescribedinRestoringtoanalternatelocationon page 497.

AboutExchange2000backup
ExchangeServer2000issupportedonlyviathelegacyExchange(streaming) agent.Formoreinformationconcerningthis,seeLegacyExchangeagenton page 830.

Exchangearchiving
ArchivingofExchangeServerbackupsissupportedviaUnitrendsdiskandtape basedarchivingsystem.Formoreinformation,seetheArchivingchapter.

492

Chapter 14

Exchangereplication
Electronicreplication,ofExchangeServerbackupsissupportedviaUnitrends replicationorlegacyvaultingfeatures.Formoreinformation,seethe ReplicationandLegacyVaultingchapters. Note:LegacyExchangebackupsarerunbytheWindows2000agenttoprotect Exchange2000environments.(Fordetails,seeLegacyExchangeagenton page 830.)ReplicationisnotsupportedforlegacyExchangebackups.Replication offilelevelbackupsforlegacyExchangeclientsissupported.Legacyvaultingis supportedforlegacyExchangebackups.

MicrosoftExchangerecovery
Usetherestorefeaturetorecoveranentiredatabase,storagegroup,orselected itemsfromExchangebackups.Theseprocedurescanberunfromthelocalbackup systemorfromatargettowhichExchangebackupshavereplicated.

RestoringanExchangedatabaseorstoragegroup
UsetheproceduresinthissectiontorestoreanExchangedatabaseorstorage grouptothedesiredtarget.Priortorestoring,verifytherestoretargetissetupas requiredandthatanyrestrictionshavebeenmet.Choosefromthefollowing restoretargets:

RestoringtotheoriginalExchangeserver Restoringtoarecoveryarea Restoringtoanalternatelocation

RestoringtotheoriginalExchangeserver
RestoretoExchangeServeristhedefaultrestoretype.Alldatabaseand transactionlogfilesarerestoreddirectlytotheoriginallocation.Thefollowing conditionsmustbemetinordertoperformasuccessfulrestoretotheoriginal Exchangeserver:

Microsoft Exchange Server Protection

493

Condition Database name and file name must remain unchanged from the time the backup was performed

Explanation The database name is the symbolic or displayable name of the database. For example, Mailbox Database or Mailbox1. The actual database file name, for example Mailbox1.edb, must also be unchanged since the backup was run. Note that the location of the database files and transaction log files may be changed after the backup has been performed, if needed. If the log files or database files must be moved to another volume or disk, the actual names of the database files must be preserved.

Databases must be dismounted

For Exchange 2003 and 2007, this includes all databases contained in the storage group. For Exchange 2013 and 2010, only the database being restored must be dismounted. All databases must have the overwrite allowed on restore flag set. This task can be performed using the Exchange Server administrative console or the appropriate Exchange Server command line utility. If this is not the case then the restore will fail. It is recommended that all database and transaction log files be removed from the restore location. Restoring a differential or a full backup restores the server to a specific point-in-time state. To ensure that the storage group or database can be remounted without integrity errors, any existing database and transaction log files should be removed before performing the restore.

Databases must be marked as overwrite allowed on restore

Remove all existing database and transaction log files

TorestoreadatabaseorstoragegrouptotheoriginalExchangeserver 1 2
494

Verifyallprerequisiteshavebeenmet,asdescribedinRestoringtotheoriginal Exchangeserveronpage 493. SelecttheExchangeclientintheNavigationpaneandclickRestore.

Chapter 14

3 4

SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SpecifyaRecoveryPointTimebyselectingabackupinthelist,thenclickNext (SelectOptions).

Tolocatethedesireddatabaseorstoragegroup,hoveroverthebackupsinthe
list.Whenyouhover,thedatabaseorstoragegroupdisplays. Restoringabackuprestoresthedatabaseorstoragegrouptoaspecificpoint intimestate.Soselectingadifferentialbackupalsorestorestheassociatedfull backup. Note:RestoreItemsperformsanindividualitemrestoredirectlyfromthe ExchangebackupandnotacompleteExchangerestore.Formoreinformation concerningrestoringindividualitems,seeRestoringExchangeitemson page 499. 5 OntheRestorefromBackupofClientpage,verifythebackupand database/storagegroupdisplayedaretheonesyouwishtorestore.Ifnot,click Cancelandchooseanotherbackup. SelectRestoretoExchangeServerandthedesiredExchangeserverfromthe AvailableExchangeServerslist. ForExchange2013,2010,and2007,youmayselectanyserverrunningthesame Exchangeversionastheoriginal.ForExchange2003,onlyrestorestotheoriginal serveraresupported. 7 Ifdesired,runpreorpostrestorecommandsbyselectingShowAdvanced ExecutionOptions.Specifytheclientsidecommandstorunbyenteringany systemcommandoruserscriptintheClientPreRestoreCommandsorClient PostRestoreCommandsfields.Fordetails,seeAboutbackupoptionson page 159. ClickRestore. Alldatabaseandtransactionlogfilesarerestoreddirectlytotheoriginallocation. 9 Remountanydatabasesyoudismountedfortherestore.

Restoringtoarecoveryarea
RestoretoRecoveryAreaisrestrictedonlytoExchange2013/2010(arecovery database)andExchange2007(anRSG,orrecoverystoragegroup).Itisnot supportedforExchange2003orearlierversions.Inaddition,itisonlyavailableif thereisarecoverydatabaseorrecoverystoragegroupavailableinthebackup.

Microsoft Exchange Server Protection

495

Thefollowingconditionsmustbemetinordertoperformasuccessfulrestoreto recoverydatabaseorrecoverystoragegroup:
Condition Exchange 2013/2010 recovery database or Exchange 2007 RSG Databases must be dismounted Explanation Exchange 2003 or earlier versions are not supported. Backup must contain a recovery database or recovery storage group. For Exchange 2007, this includes all databases contained in the storage group. For Exchange 2013 and 2010, the recovery databases must be dismounted. All databases must have the overwrite allowed on restore flag set. This task can be performed using the Exchange Server administrative console or the appropriate Exchange Server command line utility. If this is not the case, the restore will fail. It is recommended that all database and transaction log files be removed from the restore location. Restoring a differential or a full backup restores the server to a specific point-in-time state. To ensure that the storage group or database can be remounted without integrity errors, any existing database and transaction log files should be removed before performing the restore. Each database filename (e.g., mailbox1.edb, publicfolder.edb) created in the recovery storage group must match the corresponding database file name in the original storage group that is being restored. Creating recovery storage groups using the Exchange 2007 Administrative Console enforces this rule.

Databases must be marked as overwrite allowed on restore

Remove all existing database and transaction log files

[Exchange 2007 only] The RSG must contain the same number of mailbox databases and public folder databases as the original storage group

Torestoreadatabaseorstoragegrouptoarecoveryarea 1 2
496

Verifyallprerequisiteshavebeenmet,asdescribedinRestoringtoarecovery areaonpage 495. SelecttheExchangeclientintheNavigationpaneandclickRestore.

Chapter 14

3 4

SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SpecifyaRecoveryPointTimebyselectingabackupinthelist,thenclickNext (SelectOptions).

Tolocatethedesireddatabaseorstoragegroup,hoveroverthebackupsinthe
list.Whenyouhover,thedatabaseorstoragegroupdisplays. Restoringabackuprestoresthedatabaseorstoragegrouptoaspecificpoint intimestate.Soselectingadifferentialbackupalsorestorestheassociatedfull backup. Note:RestoreItemsperformsanindividualitemrestoredirectlyfromthe ExchangebackupandnotacompleteExchangerestore.Formoreinformation concerningrestoringindividualitems,seeRestoringExchangeitemson page 499. 5 OntheRestorefromBackupofClientpage,verifythebackupand database/storagegroupdisplayedaretheonesyouwishtorestore.Ifnot,click Cancelandchooseanotherbackup. SelectRestoretoRecoveryAreaandthedesiredExchangeserverfromthe AvailableExchangeServerslist. Ifdesired,runpreorpostrestorecommandsbyselectingShowAdvanced ExecutionOptions.Specifytheclientsidecommandstorunbyenteringany systemcommandoruserscriptintheClientPreRestoreCommandsorClient PostRestoreCommandsfields.Fordetails,seeAboutbackupoptionson page 159. ClickRestore. Alldatabaseandtransactionlogfilesarerestoredtotherecoveryarea. 9 Remountanydatabasesyoudismountedfortherestore.

6 7

Restoringtoanalternatelocation
RestoretoAlternateLocationallowstheExchangeinformationstoretobe restoredtoalocationotherthantheoriginallocationwhereitresidedwhenthe backupoccurred.ThealternatelocationcanbeeithertothesameExchange Serverhost,adifferentWindowsprotectedclient,thenetworkshareofyour Unitrendsbackupsystem,oranyothernetworkstorage.Torestoretonetwork storage,youmustfirstaddthestoragetothebackupsystem.Fordetails,see ProtectingNASstorageonpage 97. Thefollowingspecifiesthedifferencebetweenafullandadifferentialrestoreto analternatelocation:
Microsoft Exchange Server Protection

497

Backup type Full Restore

Explanation All of data associated with the Exchange information store is restored to the specified location. Only the data contained in the differential backup is restored to the named location; the associated full backup is not restored. A differential restore should be used only if certain files within the backup are required or a third-party tool is used for individual mailbox or item restore, e.g. Kroll On-Track. This type of restore can be performed to any Windows-based protected client and the server is not required to have Microsoft Exchange Server installed. This type of restore may also be done to the backup system itself.

Differential Restore

Torestoreadatabaseorstoragegrouptoanalternatelocation 1 2 3 4 Verifyallprerequisiteshavebeenmet,asdescribedinRestoringtoanalternate locationonpage 497. SelecttheExchangeclientintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SpecifyaRecoveryPointTimebyselectingabackupinthelist,thenclickNext (SelectOptions).

Tolocatethedesireddatabaseorstoragegroup,hoveroverthebackupsinthe
list.Whenyouhover,thedatabaseorstoragegroupdisplays. Restoringabackuprestoresthedatabaseorstoragegrouptoaspecificpoint intimestate.Soselectingadifferentialbackupalsorestorestheassociatedfull backup. Note:RestoreItemsperformsanindividualitemrestoredirectlyfromthe ExchangebackupandnotacompleteExchangerestore.Formoreinformation concerningrestoringindividualitems,seeRestoringExchangeitemson page 499. 5 OntheRestorefromBackupofClientpage,verifythebackupand database/storagegroupdisplayedaretheonesyouwishtorestore.Ifnot,click Cancelandchooseanotherbackup. SelectRestoretoAlternateLocation.

6
498

Chapter 14

SelectarestoretargetfromtheClientToWhichToRestorelist.

Thelistcontainsallprotectedclientsandthebackupsystemitself. Torestoretonetworkstorage,youmustaddthestoragetothebackupsystem.
ThebackupsystemtreatstheNASasaregularprotectedclient.Onceadded, thestorageappearsintheClientToWhichToRestorelist.Fordetails,see ProtectingNASstorageonpage 97. Enteratargetdirectory. ThisisthedirectoryonthetargetclienttowhichExchangedatawillberestored. Ifyouhaveselectedthebackupsystemastherestoretarget,dataisrestoredto thesystemsnetworkshare:/backups/samba. 9 Ifdesired,modifytheseoptions:

informationinthebackupmustberestored.Forexample,ifyouspecifythe TargetDirectoryas/tmp,allfilesrestoredfromthebackupwillbeplacedinto thatsingledirectory. IftheoptionOverwriteexistingFilesisselected,existingfileswillbe overwrittenduringtherestore. RestoreNewerFilesOnlyrestoresafileonlyifitsdateisnewerthanthe existingfileontheclient.Ifthefiledoesnotexistontheclient,thefileis restored. SetFileDatestoTodaysetsthelastmodificationdateofthefiletothedate andtimeoftherestore. TheoptionUnixTextConversionwillnotconvertnewlinestoCRLFwhen restoringUNIXtextfilestoMSDOSsystems. 10 Ifdesired,runpreorpostrestorecommandsbyselectingShowAdvanced ExecutionOptions.Specifytheclientsidecommandstorunbyenteringany systemcommandoruserscriptintheClientPreRestoreCommandsorClient PostRestoreCommandsfields.Fordetails,seeAboutbackupoptionson page 159. 11 ClickRestore. Alldatabaseandtransactionlogfilesarerestoredtothetargetdirectory.

CheckthePreserveDirectoryStructureboxifthedirectoryhierarchy

RestoringExchangeitems
InadditiontogivingyoutheabilitytorestoreanentireExchangedatabaseor selectedExchangestoragegroups,UnitrendsprovidesEQR(ExchangeQuantum Recovery)whichallowsgranularitems,downtotheindividualmailitem,tobe restored.

Microsoft Exchange Server Protection

499

UnitrendsoffersandsupportsKrollOntrackPowercontrolstorestoreindividual itemsfromanExchangebackup.NotethatKrollcanbeusedwith32bitversions ofOutlookonly.64bitOutlookversionsarenotsupported.Therearetwo fundamentalwaysthatthistoolmaybeused:


Restore from Directly from the Exchange backup Explanation Unitrends allows its customers to perform all of the functions associated with KOP directly from the Exchange backup without having to first perform the restore of an Exchange backup. After an Exchange backup has been restored (see

A previously restored Exchange backup

RestoringanExchangedatabaseorstoragegroupon page 493), KOP or a third-party tool (e.g., Lucid8) may be


used to search and recover individual Exchange items. Note that unlike KOP, third-party tools are certified and supported by third parties and not Unitrends.

RestoringExchangeitemsdirectlyfromabackup
UnitrendsoffersanoptionalfeaturethatallowsindividualExchangeitemstobe restoreddirectlyfromtheExchangebackup.Thismeansthatyoumayrecover individualExchangeitemswithoutfirsthavingtoperformtherestoreofan Exchangebackup.Thisoptionallowsthefastestrecoverytimepossible. TorestoreindividualExchangeitemsdirectlyfromtheExchangebackup 1 2 3 4 LogintotheUnitrendssystem. SelecttheExchangeapplicationintheNavigationpaneandclickRestore. SelectaRecoveryPointDayfromwhichthebackupwillberestoredbyclickingon thecalendar.Availabledaysdisplayinbold. SelectarestoretimeandclickNext. SelectfromavailabletimesintheRecoveryPointTimestableorbyclickinga wedgeoftimeonthe24hourcircle. 5 ClickRestoreItemsbelow.

500

Chapter 14

Ifamountedbackupimagedoesnotexist,youneedtocreateonebyclicking Create. Youwillseeascreenofinstructions.YouaredirectedtogotoyourWindows basedsystemonwhichKOP(KrollOntrackPowercontrols)isinstalled,login,map thenetworksharedrivepresentedbytheUnitrendssystem,andthenstartKOP.

7 8 9

UseKOPtorecoverExchangeitems. DisconnectthenetworkdrivethatyoumappedonyourKOPsystem. Onthebackupsystem,teardowntheimageofthemountedbackupusingoneof thefollowingprocedures: imageintheImagesavailableforrecoveryarea,andclickTearDown.ClickYes toconfirmthatyouwouldliketoproceed.Theimageisremovedfromthe share. IfyouhaveclosedtheRestorefromtheBackupscreen,followtheinstructions describedbelowinTovieworteardownExchangerestoreimages. ThereasonthatyouperformtheteardownistoallowyourUnitrendssystemto reclaimthestoragespaceforuseformorebackupsandotheroperations.

IftheRestorefromBackupScreenisstillopeninthebackupsystem,selectthe

AbouttheExchangerestoresession
Afterfileshavebeenrestored,thesessionremainsuntilyoutearitdown.Because systemresourcesareusedtomaintainthesession,itisimportanttotearitdown toensureoptimalperformance. TovieworteardownExchangerestoreimages 1 2 3 4 5 SelecttheExchangeapplicationintheNavigationpane. SelectSettings>SystemMonitoring>RestoreDiskimages. SelectRestoreImages.Alistofrestoreimagesdisplays. ClickRefreshtoensurethatthelistiscurrent. Ifdesired,teardownarestoreimage.

Makesureyouhavedisconnectedfromthenetworkdrivethatyoumountedon
yourKOPsystem. SelectanimageintheImagesavailableforrecoveryarea,andclickTearDown. ClickYestoconfirmthatyouwouldliketoproceed.Theimageisremovedfrom theshare.

Microsoft Exchange Server Protection

501

RestoringExchangeitemsfromapreviouslyrestoredbackup
IftheoptionofrestoringanindividualExchangeitemdirectlyfromtheExchange backupisnotavailable,thentherestoremaybeperformedfromapreviously restoredExchangebackup.AfteranExchangebackuphasbeenrestored,KOPora thirdpartytool(e.g.,Lucid8)maybeusedtosearchandrecoverindividual Exchangeitems.NotethatunlikeKOP,thirdpartytoolsarecertifiedand supportedbythirdpartiesandnotUnitrends. Therearetwoclassesofrestoretargetsinthissituation:therestoreofthe ExchangebackupmaybeperformedtotheUnitrendssystemortherestoreofthe ExchangebackupmaybeperformedtoacustomersWindowssystem.The advantagetorestoringtheExchangebackuptotheUnitrendssystemisthat typicallytherestorewillbefasterbecausethereisnonetworkbandwidth overheadthatmustbeincurred.

RestoringitemswithKrollOntrackPowerControlsforExchange
AftercompletingstepsonethroughsixinTorestoreindividualExchangeitems directlyfromtheExchangebackupabove,usethefollowingproceduretorestore individualitems. TorestoreitemsusingKrollOntrackPowerControlsforExchange 1 2 3 LogintoyourWindowsmachinewithKrollinstalled.RunKrollOntrack PowerControlsforExchange. OntheWelcomescreen,clickNext. NexttotheSourceFilefield,clickBrowse.Browsetotheexchange_restoreshare onyourUnitrendssystemanddoubleclickyourExchange.edbfile. Ifrestoringfromafullbackup,the.edbfileshouldbelocatedinthebackup0 folder.Ifrestoringfromadifferentialbackup,the.edbfileshouldbeinthemerged folder. BackontheSourcePathSelectionscreen,clickNext. 4 ChoosetorestoretoaPSTfileordirectlybacktoaliveExchangeenvironment. IfrestoringbacktoaliveExchangeenvironment,supplyadministrativecredentials toanymailboxyouwanttorestoreto.ClickNext. IfcreatingaPSTfile,clickNextandmakeaselectiononthecompatibilityofthe file. 5 Torestoreitems,dooneofthefollowing:

502

Chapter 14

TorestoreitemstoaPSTfileorliveExchangeenvironment,navigatetothe
itemsyouwanttorestoreintheSourcepaneontop,selectthem,anddragand dropthemtothenodeyouwanttorestorethemtointheTargetpaneon bottom. Torestoreitemstoanetworklocation,navigatetotheitemsyouwantto restoreintheSourcepaneontop,selectthem,rightclickandselectExport, selectamessageformatandrestorelocation,andclickExport. Afterrestoringalltheitemsyouwanttorestore,closeKrollOntrackPowerControls forExchange. ContinuewithStep8inTorestoreindividualExchangeitemsdirectlyfromthe Exchangebackuponpage 500.

6 7

AboutrestoringExchange2013and2010fromabackup
Exchange2013and2010userecoverydatabases.Eachserverhasarecovery databaseandtherecantbemorethanonemountedrecoverydatabaseatatime. Oncetherecoverydatabasehasbeencreated,youfirstrestorethebackuptoit andthenusetheMicrosoftExchangeManagementShelltoextractmailboxdata fromtheinformationstoreintothelocalmail.pstfile.Youmayalsoopttomerge theextracteddatabackintothecurrentlyactiveinformationstore. RecoverydatabasesarefundamentallydifferentthantheRSG(RecoveryStorage Group)mechanismusedinExchange2007and2003.

AboutrestoringExchange2007fromabackup
Exchange2007usestheRSG(RecoveryStorageGroup)mechanism.RSGallows theusertomountasecondcopyofanExchangeinformationstoreonany ExchangeServerthatisamemberofthesameExchangeAdministrativeGroupas theoriginalwhileconcurrentlytheoriginalinformationstoreisstillactive.This allowstheusertorecoverdatafromthebackupcopyoftheinformationstore withoutinterferingwiththeongoingoperationoftheExchangeServer. OncetheRSGhasbeencreatedtheuserfirstrestoresthebackuptoitandthen usestheMicrosoftExchangeManagementShellinExchange2007toextract mailboxdatafromtheinformationstoreintothelocalmail.pstfile.Theusermay alsooptionallymergetheextracteddatabackintothecurrentlyactive informationstoreaswell. RSGisfundamentallydifferentthantherecoverydatabasemechanismusedin Exchange2013and2010.

Microsoft Exchange Server Protection

503

AboutrestoringExchange2003fromabackup
DirectrestorestotheRSGisnotpermittedforExchange2003backups.Instead onlyrestorestotheoriginallocationoranalternativelocationaresupported.

AboutrestoringExchange2000fromabackup
ExchangeServer2000issupportedonlyviathelegacyExchange(streaming) agent.Formoreinformationconcerningthis,pleaseseeLegacyExchangeagent onpage 830.

RestoringExchangefromarchives
PleaseseetheArchivingchapter.

RestoringExchangefromalegacyvault
PleaseseetheLegacyVaultingchapter.

RestoringabackupwhentheExchangeicondoesnot display
IfyouaddaclientwithExchangeinstalled,runbackupsontheExchange databases,andlateruninstalltheExchangeinstancefromtheclient,theExchange iconmaynotdisplayintheNavigationpaneoftheUnitrendsinterface.The backupstakenoftheExchangedatabasesarestillontheUnitrendssystemandare stillavailableforrestore,butwithouttheoptiontofirstselecttheExchangeicon whenperformingarestore,anothermethodofselectingabackupforrestore mustbeused. Torestoreanapplicationbackupwhenitsicondoesnotdisplay 1 2 3 IntheNavigationpane,selecttheclientthatonceheldtheapplication. SelectStatusfromthetopmenu. FromtheCalendarizedBackupInformationpaneinthemiddleofthescreen, navigatethroughbackupsbyclickingtheleftandrightarrowstobrowseamonths worthofbackupsatatime.Youcanhoveryourmouseoveradateonthecalendar toreceiveinformationonwhattypesofbackupswerecompletedonthatdate. Clickonadateyouwanttorestoreabackupfrom.

504

Chapter 14

4 5 6

Anybackupscompletedontheselecteddatearehighlightedbelow.Clickona backupyouwanttorestore. ClicktheRestorebutton. Followstandardproceduresforrestoringthetypeofbackupyouselected.

Microsoft Exchange Server Protection

505

506

Chapter 14

Chapter15 MicrosoftSharePointProtection
ThischapterdescribesproceduresusedtoprotectMicrosoftSharePoint environments.UnitrendsleveragesnativeSharePointdataprotectiontoprovide allinonebackup,archiving,replication,andrecoveryofSharePointfarms. Note:IfyourSharePointfarmisasingleserverdeploymentandtheSharePoint serverisaVMwarevirtualmachine,youcaneitherrunvProtectapplicationaware backupsasdescribedintheProtectingVMwareInfrastructurechapter,orinstall theWindowsagentandimplementprotectionasdescribedhere.Foracomparison ofeachstrategy,seeBestpracticesforprotectingVMwarevirtualmachineson page 563.Formultinodefarms,youmustinstalltheWindowsagent.vProtect backupisnotsupportedformultinodefarms. Seethefollowingtopicsfordetails:

AboutSharePointprotectiononpage 507 ExecutingSharePointbackupsonpage 512 ViewingSharePointbackupsonpage 515 RestoringSharePointbackupsonpage 516

AboutSharePointprotection
TheSharePointagentprovidesprotectionofservicesandresourcesinaMicrosoft SharePointfarm.TheSharePointagentisacomponentoftheWindowscore agent.Itisfullyintegratedintothebackupsystem,fromwhichallconfiguration andmanagementtasksareperformed. InaSharePointdeployment,theprimarynodeinstallsSharePointserviceson othermemberserversandinitiatesadministrativecommandstomanagethe farm.TheCentralAdministrationservicerunsontheprimarynodetoperform farmmanagement.AllnodesdirectlyaccesstheSharePointcentralconfiguration
507

databaseforconfigurationofservices,features,databaseconnections,andthe like.Thecentralconfigurationdatabaseresideseitherontheprimarynodeoron astandaloneSQLserver.Unitrendsprotectsthefarmfromtheprimarynode, whereadministrativecommandsareruntocoordinatethebackupofdataacross othernodesinthefarm. TheagentleveragesSharePointsSTSADMtooltoperformbackupandrecovery operationstoensureapplicationconsistency.Theagentinvokescommandsonthe SharePointprimarynodeandsuppliesSTSADMalocalsharetarget (/backups/rae/<client_name>/<instance>)sothatjobsrunonthebackupsystem itself. TheagentworkswithSTSADMtobackuptheSharePointspecificdataandfileson eachnodeinthefarm.STSADMdiscoverstheonlinenodesandperformsbackup operationstothelocalbackupsystemshare.Ifanodeisnotavailable,thebackup continueswithouterror.Theresultingbackupdoesnotincludeanynodesthat wereunavailablewhenthebackupran. Note:SharePointprotectionincludesSharePointdataonly.Toprotectanentire nodeinthefarm,registerthenodetothebackupsystemasaseparateclientand runfilelevelbackups.

SharePointagentrequirements
ThefollowingrequirementsmustbemettoenableUnitrendsSharePoint protection:

TheUnitrendssystemmustberunningversion7.0.0orlater. UnitrendsWindowsagentversion7.0.0orlatermustbeinstalledonthe
primarynode.

ToprotectSharePoint2013,boththeUnitrendssystemandWindowsagent
mustberunningversion7.1orlater. ToprotectSharePoint2007or2010,theUnitrendssystemandWindowsagent canberunning7.0.0or7.1.0.However,upgradingto7.1.0isrecommended. SharePointversionmustbeSharePoint2013(forrelease7.1only),2010,or 2007. TheprimarynodemayrunonanyWindowsplatformthatsupportsSharePoint 2013(forrelease7.1only),2010,or2007. TheSharePointfarmconfigurationmustadheretoMicrosoftbestpractice standards.AnSPFarmBackupdomainaccountthatisamemberofthelocal administratorsgroupmustbeconfiguredoneachnodeinthefarm. SharePointadministrationandtimerservicesmustberunningontheprimary node.

508

Chapter 15

TheSharePointadministrationandtimerservicesmusthavelocal
administratorprivileges.Besuretheserviceisamemberofthenecessary WindowssecuritygroupsorSharePointgroups. Prerequisiteconfigurationstepsmustbeperformedontheprimarynode,as describedinSharePointconfigurationprerequisitesbelow. TrustcredentialsareneededfortheUnitrendssystemtobackupthe SharePointfarmdatabase.Thesecredentialsmustbesetatthedatabase instancelevelasdescribedinTocreateanewcredentialforaSharePoint databasebelow.Toensuresufficientprivilege,itisrecommendedthatthe credentialuserbeamemberoftheadministratorsgrouponthelocalcomputer foreachmemberofthefarm,andamemberofthefarmadministrators SharePointgroup.Inaddition,youmayalsowishtodefineclientleveltrust credentialstoenablepushinstalloftheUnitrendsagent.Theseclientlevel trustcredentialsarenotusedtobackuptheSharePointinstance.Youmust defineinstancelevelcredentialsforbackupstorunsuccessfully.Formoreon trustcredentials,seeClienttrustcredentialsonpage 77. Ifyouexperiencebackuperrorsusingnewcredentials,seethefollowing KnowledgeBasearticlesformoreinformation:KB1181,KB1183,KB1184, KB1185,KB1186,andKB1187. TocreateanewcredentialforaSharePointdatabase 1 2 3 4 SelecttheSharePointfarminstanceintheNavigationpaneandclickBackup. Onthe1TimeBackuporScheduleBackuptab,databasesdisplayintheSelect Itemslist.Torefreshthelist,clicktheReloadiconinthebottomright. Clickt