Professional Documents
Culture Documents
Symantec Netbackup 7.5 For Unix: Manage and Administer (Lessons)
Symantec Netbackup 7.5 For Unix: Manage and Administer (Lessons)
Symantec Netbackup 7.5 For Unix: Manage and Administer (Lessons)
Symantec NetBackup
7.5 for UNIX:
Manage and
Administer (Lessons)
100-002743-C
COURSE DEVELOPER Copyright © 2012 Symantec Corporation. All rights reserved.
Cheryl Faulkner Symantec, the Symantec Logo, and VERITAS are trademarks or
Kris Faulkner registered trademarks of Symantec Corporation or its affiliates in
John Gerhardson the U.S. and other countries. Other names may be trademarks of
Lisa Goldring their respective owners.
Tomer Gurantz THIS PUBLICATION IS PROVIDED “AS IS” AND ALL
Steven Schwartze EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS
Sandy Tipper AND WARRANTIES, INCLUDING ANY IMPLIED
Robyn Winkler WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
LEAD SUBJECT MATTER
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
EXPERTS DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Christopher Amidei SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
Peter Farley INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
Bob Farnsworth CONNECTION WITH THE FURNISHING, PERFORMANCE,
Joseph Gallagher OR USE OF THIS PUBLICATION. THE INFORMATION
CONTAINED HEREIN IS SUBJECT TO CHANGE WITHOUT
Micke Ostrom
NOTICE.
Robert Owen
Kleber Saldanha No part of the contents of this book may be reproduced or
transmitted in any form or by any means without the written
Christopher Winter
permission of the publisher.
Symantec NetBackup 7.5: Manage and Administer
TECHNICAL Symantec Corporation
CONTRIBUTORS AND World Headquarters
REVIEWERS 350 Ellis Street
The NetBackup 7.5 Mountain View, CA 94043
Advisory Board United States
http://www.symantec.com
Copyright © 2012 Symantec Corporation. All rights reserved.
5
Course Introduction
Intro
Intro
Course Prerequisites
Students attending this course should be familiar with:
Copyright © 2012 Symantec Corporation. All rights reserved.
Intro
Intro
3 To change the order in which the columns appear, select the column head.
Then, click the Move Up or Move Down button to reorder the columns.
4 Click OK to apply the changes.
filtering criteria.
4 Click OK (Java) or Filter (Windows) to filter the Activity Monitor jobs.
Policy types MS-Windows (for Windows clients) and Standard (for UNIX clients)
support checkpoints for backup jobs.
Job types that do not support checkpoint restart are:
• Catalog backup
• Duplication
• Vault
• Imported
• Synthetic
• Database agents
files backed up since the resume, but not for the files backed up prior to the
resume.
This means that the files backed up prior to the resume are backed up again on
the next incremental backup.
Reporting methods
Reports can be run from any of the interfaces included with NetBackup.
• The Administration Console contains a selection of useful reports. These
reports are easy to run and can be printed or exported to other formats.
• NetBackup environments that have set up an OpsCenter server have access to a
suite of powerful, graphical reports. OpsCenter includes an assortment of
graphical, HTML-based reports that enable you to create more detailed reports
than what is available from the Administration Console.
• The command line interface (CLI) contains the most powerful set of reports.
Copyright © 2012 Symantec Corporation. All rights reserved.
All NetBackup reports are available from the CLI, including those found in the
Administration Console. In many cases, reports are more powerful or more
customizable from the CLI than they are from the Administration Console.
Administrators in many NetBackup environments write scripts to generate
custom reports.
• For UNIX servers, the bpadm menu-driven utility also produces reports from
the command line similar to those found in the Administration Console.
bperror –backstat -U
CAUTION Because the tape must be mounted in a tape drive and read, the
Tape Contents report takes a few minutes to run.
Copyright © 2012 Symantec Corporation. All rights reserved.
–dp disk_staging_STU_name
that are made in the NetBackup environment (for example, changes such as
creating a policy, deactivating a policy, or modifying a policy).
• Backups
The Backup reports show information related to backups, such as success rate,
job status, and protected bytes. This category also includes recovery reports.
• Catalog
These reports provide details about the catalogs.
• Client Name
• Number of Successful Jobs
• Number of Partially Successful Jobs
• Number of Failed Jobs
Licensed features
The licensed version of OpsCenter is called Symantec OpsCenter Analytics.
Symantec OpsCenter Analytics enables you to perform advanced business-level
reporting. The table on this slide lists the differences between licensed features in
Symantec OpsCenter and Symantec OpsCenter Analytics:
• In OpsCenter, you can only create reports using the existing templates. In
OpsCenter Analytics, custom reports are accessed from Reports > Report
Templates > Create a New Report > Create a Custom Report.
• Reporting using SQL queries is not available in OpsCenter. To create reports
using SQL queries in OpsCenter Analytics, use Reports > Report Templates
> Create a New Report > Create a report using SQL query.
• Chargeback reports and settings are not available in OpsCenter. To run or view
chargeback reports in OpsCenter Analytics, use Report > Report Templates
Copyright © 2012 Symantec Corporation. All rights reserved.
Labs and solutions for this lesson are located in the following appendixes:
• Appendix A provides step-by-step lab instructions.
• Appendix B provides complete lab instructions and solutions.
CONFIDENTIAL - NOT FOR DISTRIBUTION
48 1–34 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
Lesson 2
Managing and Optimizing Tape Storage
Copyright © 2012 Symantec Corporation. All rights reserved.
Topology icons
The following table describes some of the device-related topology icons you may
see within the topology view:
Topology connections
Connections in the topology view indicate physical and logical connections of the
devices, as follows:
• Media server (or SAN media server) to robotic library and drive relationships
are indicated. A line attaches a robot arm to the media server that has robot
control.
• Drives that are physically located in a robotic library are shown within the
robotic library. Stand-alone drives are represented as individual drive objects
below the library.
• A line attaches a drive to the servers that are configured to use it. Robot-to-
server connections and robot-to-EMM database connections are always shown.
• Media are represented as in a robotic library. A line attaches the media to the
EMM server performing media management.
3 Click OK or Apply.
You may find it useful to select Stop and click Apply, and then select Start
and click Apply. By using Apply, you can select device hosts and actions for
more than one device host before clicking OK to close the dialog box.
robtest Notes
• Do not leave robtest running in your production environment. Doing so can
lead to device errors and prevent any access to the library for backups, restores,
and inventory.
Copyright © 2012 Symantec Corporation. All rights reserved.
• If you use robtest to load a tape into a drive, you need to remove the tape
using robtest. NetBackup does not autoeject a tape that has been loaded by
any other utility.
Media states
All volumes have a media state. The media state can change based on a number of
factors, such as how much the volume is used or the type of backup written to it.
The most common media states are:
• AVAILABLE
An AVAILABLE media state indicates that no active backup images are
currently associated with this tape. This can happen if:
Copyright © 2012 Symantec Corporation. All rights reserved.
restore only. The volume cannot be used for backup or archive until the last
image expires. Imported images are retained for one full retention period (as
recorded in the image header) from the date of import.
When choosing an active or available tape, if multiple candidates exist, the tape
with the least recent mount time is chosen. If no volumes are available, the backup
job fails, and NetBackup flags an error 96 for the backup status. The NetBackup
administrator can disable or manually configure media ownership.
The example on the slide shows the default behavior and assumes the following:
• Volume pool = Win_Servers
• Storage unit = NBU1_LT03_Robot0
• Robot = Robot0
• Density = HCART3
• Media server = NBU1
slide.
• The text-menu interface (UNIX only): Use the bpadm command to access the
bpadm utility. Select the r option for reports, and then select the m option for
media. You can now choose from six different media-related reports.
Note: An * in the ret level column indicates the media has images written to it
with multiple retention periods. The default for NetBackup is one retention
period per media.
Copyright © 2012 Symantec Corporation. All rights reserved.
Tape reports
You can run various reports from the NetBackup Administration Console and
from the command line to gather information about the media used in your
NetBackup environment. These reports query one or more NetBackup media
catalogs to produce their respective summaries.
To access the media reports using the NetBackup Administration Console, expand
NetBackup Management and expand Reports > Tape Reports. Click the report
you want to generate.
The following list provides the name of the GUI report, an explanation of what the
report provides, and the command-line equivalent of the report. All commands
listed are typed on a single line. For full details about each command, see the
Symantec NetBackup Commands Reference Guide.
All of the commands in this list are located in the
Copyright © 2012 Symantec Corporation. All rights reserved.
CAUTION Use this command with caution because it deletes the backup
metadata from the images catalog, and it changes the media state to
AVAILABLE.
A backup on a volume that has been unassigned (or expired normally) is not usable
for restores unless it is imported.
If you encounter errors that suspend a volume, you can use the bpmedia
command with the -unsuspend option to unsuspend the volume for further
investigation.
The following example unfreeezes a volume with the A00001 media ID on the
hro7 media server. Running from the master server, enter:
bpmedia -unfreeze -m A00001 -h hro7
Copyright © 2012 Symantec Corporation. All rights reserved.
For more information on the bpmedia command, see the Symantec NetBackup
Commands Reference Guide.
new media ID that uses the media ID prefix that you set. A volume entry for
the old media ID remains in the EMM database. An error may occur if an
application attempts to use the new or old volume.
• After physically moving existing volumes that do not have readable bar codes
or if the volumes are in a robot that does not support bar codes
If you swap volumes between two different locations, Media Manager is
unable to automatically detect the change and does not update the EMM
database.
If you remove a volume from a slot and place it in an empty slot, Media
Manager assumes that it is a new volume. Media Manager then adds a new
logical volume entry with a generated media ID at its new robotic location. The
If you select several media types in the volumes list, you see a Move Volumes
dialog box for each media type. Use a similar procedure to move volume groups.
A group move operation leaves slot numbers unchanged. If a volume group is
moved back into a robot, every volume must be returned to its original slot, or the
EMM database must be updated using a robot inventory operation.
Options in the Move Volumes dialog box that are common to both Java and
Windows include:
• Volumes to move
This field displays the list of volumes to be moved (informational only).
Generally, after the pre-checks for the eject are complete, the Media tab displays
the volumes that you selected to eject, and the Errors tab is empty. The eject may
not be possible because of an error or a hardware limitation. If an error occurs, the
dialog box is displayed with the Errors tab opened.
The following two classes of errors can occur:
• For more serious errors, Eject is not available, and the cause of the error must
be corrected.
• For other errors, the Errors tab shows an explanation of the error. You can
continue the eject action (select Eject) or exit (select Close), depending on the
type of error.
Click Eject to execute the eject.
CONFIDENTIAL - NOT FOR DISTRIBUTION
82 2–34 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
2
Select this option and select a volume pool from the pull-down list to
specify the volume pool to which you want to assign the volumes.
• Number of cleanings remaining
Use this option to increase or decrease the number of cleanings remaining for
the volume.
– Do not change
Select this option to keep the current setting.
– New count
Select this option and type a number to define the number of cleanings
remaining for the volumes.
CONFIDENTIAL - NOT FOR DISTRIBUTION
84 2–36 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
2
Deleting volumes
You may want to delete a volume if it is:
• Unusable because of repeated media errors
• Past its expiration date or has too many mounts, and you want to replace it with
a new volume
• Lost and you want to clean up the EMM database
After a volume is deleted, you can discard it or add it back under the same or a
different media ID.
Before deleting a volume, ensure that it does not contain any important data.
NetBackup volumes have an extra safeguard against accidental deletion. If there is
data on the volumes, the volumes cannot be deleted.
If you want to completely unassign a tape from NetBackup and delete all records
Copyright © 2012 Symantec Corporation. All rights reserved.
of any backup images currently held on that tape, enter the following command:
bpexpdate -m media_id -d 0
The bpexpdate command changes the expiration date of backup images on a
volume, not the volume itself.
Erasing volumes
You can perform a quick (short) or long erase of used media. The media must be
currently unassigned by NetBackup and must have no valid NetBackup images on
it. The erase function removes the content index from the tape header.
Media erase functions are not supported on NDMP drives.
CAUTION When you erase a volume, any data previously written on the media
is no longer available for a restore or for an import.
Quick erase
If you select a quick (or short) erase, Media Manager performs a SCSI Quick
Copyright © 2012 Symantec Corporation. All rights reserved.
Erase. For a SCSI Quick Erase, the piece of media is rewound, and an erase gap is
recorded on the media. The format of this gap is drive-dependent, and this gap can
be an end-of-data (EOD) mark or a recorded pattern that is recognized by the drive
as not being data.
Some drives do not support a quick erase (for example, QUANTUM DLT7000).
For drives that do not support a quick erase, the new tape header that is written acts
as an application-specific quick erase.
To perform a quick erase:
1 Select the media you want to erase.
2 Select Actions > Quick Erase ( ).
CAUTION Ensure that the piece of media does not contain needed backups.
After the piece of media is labeled, any backups that were on it
cannot be restored.
Copyright © 2012 Symantec Corporation. All rights reserved.
• Increased storage capacity when there are fewer partially full tapes taking up
slots in a tape library, and reduced administrative overhead because scratch
media is injected less often
• No unintentional sharing of media among media servers and NDMP tape
servers because NetBackup formally allows media to be shared among
NetBackup and NDMP servers
named Drive type, you are actually specifying the media density.
• When you configure the storage unit, ensure that the Density field in the
Change Storage Unit dialog box matches the selected drive type. Notice that
the density value is already specified, and you cannot manually select the
density for a storage unit.
• When you configure volumes (media), select DLT cartridge tape 2 as the
Media type in the New Volumes dialog box. Media type is the same as media
density.
Improper volume configuration is a common cause for errors. If improperly
configured, a backup job may queue indefinitely or fail with a status code 96.
number of cleanings at any time in Media Manager. Each time the tape is used, that
number decreases by one. When the number of cleanings reaches zero, Media
Manager stops using the cleaning tape.
TapeAlert
Another method of automatic cleaning uses the TapeAlert feature, which allows
Copyright © 2012 Symantec Corporation. All rights reserved.
reactive cleaning for some drive types that support the TapeAlert capability. This
method is also called reactive cleaning.
Note: Without TapeAlert, hardware-based cleaning is not coordinated with
NetBackup, and problems can result.
Because TapeAlert provides the same type of cleaning as library-based cleaning, it
is recommended that you disable library-based cleaning when using TapeAlert.
on the front of the device to instruct the robot to load a cleaning tape and perform
drive cleaning. Check the details for your specific robot.
To perform drive cleaning functions:
1 In the NetBackup Administration Console, select Media and Device
Management > Device Monitor.
2 In the Drive status pane, select a drive.
3 Select Actions > Drive Cleaning.
The Drive Cleaning submenu choices enable you to perform the following
functions:
The table on this slide summarizes how media can be managed using the
NetBackup Administration Console (GUI), NetBackup commands (CLI), bpadm
(MUI) (UNIX only), and the OpsCenter Web console.
Copyright © 2012 Symantec Corporation. All rights reserved.
Changing media
The table on this slide summarizes the methods for changing media using the
NetBackup Administration Console (GUI), NetBackup commands (CLI), and the
OpsCenter Web console.
Copyright © 2012 Symantec Corporation. All rights reserved.
Labs and solutions for this lesson are located in the following appendixes:
• Appendix A provides step-by-step lab instructions.
• Appendix B provides complete lab instructions and solutions.
CONFIDENTIAL - NOT FOR DISTRIBUTION
102 2–54 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
Lesson 3
Managing and Optimizing Disk Storage
Copyright © 2012 Symantec Corporation. All rights reserved.
deduplication.
high and low water marks are used. When the data sent by a backup job to a DSSU
causes the high water mark to be reached, NetBackup starts to delete all images
that have already been duplicated until it reaches the low water mark. If there are
no duplicated images available for deletion and the high water has been reached,
the backup job fails with a disk full condition.
When configuring a DSSU, Symantec recommends that you keep the low water
mark set relatively high. This allows duplicated images to remain on disk for a
longer period of time and they can be used for faster restores.
• The multiplexing level on spanning storage units should be the same. If there
are any differences, the level on the target unit can be higher.
• A disk staging storage unit cannot span to another storage unit. Also, a disk
staging storage unit is not eligible as a target for disk spanning.
• Disk spanning is not supported on NFS.
> License Keys. Select the Summary of active capacity-based licensed features
radio button to determine the current usage and compliance.
Capacity-based licensing applies only to the used capacity (active backup images),
rather than the total capacity of the storage units or disk pools.
In the example on the slide, four disk volumes are available for use within a disk
pool. Based on the estimated job size, NetBackup selects the disk volume most
likely to fit the entire image. NetBackup does not use job size criteria to fail a
backup job. If no backup disk volume has the predicted space, the largest volume
is chosen, and spanning occurs as needed. Likewise, if NetBackup runs a job for
the first time, and, therefore, cannot determine an estimated size, the largest
volume in the pool is chosen.
When a disk volume contains staged backup images, the images are considered
potential free space if they have already been duplicated. Images that are staged,
but not yet duplicated, are considered used space.
In addition, before you remove a disk pool, you must remove all associated storage
units. If the disk pool is to be re-created under a different disk volume
configuration, note the current storage unit settings (high water mark, low water
mark, and fragment size) before removing the disk pool.
For additional information about modifying disk pools, see the Symantec
NetBackup Commands Reference Guide.
Deduplication overview
Deduplication is the process of using a hash to provide a set of data with a unique
identifier. This hash enables you to prevent the data from being stored multiple
times, while still allowing the data to be restored when necessary. The term single
instance storage, or SIS, is also used to describe similar behavior that applications
use to reduce storage use.
Backups are an ideal candidate for deduplication due to the redundant nature of
backup data. For example, in many environments, most of the data that is backed
up by full backups to tape or disk is identical to that of the previous backups.
Copyright © 2012 Symantec Corporation. All rights reserved.
In addition to the significant storage savings that come with only storing unique
data, time and other resources are also saved. Many vendors and solutions provide
the ability to deduplicate at the target, usually at the backup storage location or
appliance. Performing deduplication at the source (clients) significantly reduces
bandwidth use and speeds up the entire backup process. This is especially true
when backing up clients over a WAN or slow connection.
deduplication.
• Appliances supporting OpenStorage Technology (OST)
Third-party deduplication appliance vendors that support Symantec’s
OpenStorage Technology (OST) can also be managed as a NetBackup storage
location.
• NetBackup clients
Because all of the NetBackup technologies use the PureDisk technology,
deduplicating at the source, also known as client-side deduplication, is
supported.
NetBackup appliances
The NetBackup appliance is a solution that simplifies the initial configuration and
daily management of your backup environment. The goal is to provide a solution
that eliminates the need to provide dedicated individuals to manage the backup
environment.
NetBackup appliance deployment consists of the complete installation and
configuration of all appliance components to create a backup environment that is
ready to use. NetBackup appliances can be easily integrated into an existing
NetBackup environment.
NetBackup appliances that can be used as a NetBackup master or media server are
the NetBackup 5200 series models.
The NetBackup 5000 series models support 8, 16, or 32 TB of deduplication
capacity per appliance.
Copyright © 2012 Symantec Corporation. All rights reserved.
From the NetBackup master server, an AdvancedDisk pool is created that points to
the disk appliance. It is through this process that the vendor's disk storage is now
known as a storage server. NetBackup determines when backup images are
created, copied, or deleted. Images cannot be moved, expired, or deleted on the
storage unless NetBackup instructs the appliance to do so through the API.
Optimized duplication
Optimized duplication is the process of copying backup images from one Media
Server Deduplication Pool (MSDP), PureDisk Deduplication Option (PDDO) Pool
or NetBackup Appliance to an MSDP, PDDO, or NetBackup appliance. The
source and the destination must use the same NetBackup master server and media
server. The optimized duplication operation is more efficient than normal
duplication because only unique, deduplicated data segments are transferred.
Optimized duplication reduces the amount of data that is transmitted over your
network.
For more information about optimized duplication, see HOWTO Article 70634:
About MSDP optimized duplication and replication at:
http://www.symantec.com/docs/HOWTO70634.
Copyright © 2012 Symantec Corporation. All rights reserved.
tape drives. This enables high-speed backup without slowing network throughput.
Disk-related tips
After completing this topic, you will be able to diagnose common disk-related
issues.
If backups using the storage unit in question have never worked, the problem
may be due to an error in the storage unit configuration.
Common errors related to storage units are:
• NetBackup Status Code 129: Disk storage unit is full.
• NetBackup Status Code 213: No storage units are available for use.
• NetBackup Status Code 219: The required storage unit is unavailable.
• NetBackup Status Code 800: A resource request failed.
The nbjm process was unable to obtain the required resources for a job. An EMM
reason string is displayed in the Activity Monitor job details and in the nbjm
debug log. This EMM reason string identifies the reason for the failed resource
request.
Copyright © 2012 Symantec Corporation. All rights reserved.
Reporting on disks
The table on this slide summarizes how disk information can be displayed using
the NetBackup Administration Console (GUI), NetBackup commands (CLI), and
OpsCenter.
Copyright © 2012 Symantec Corporation. All rights reserved.
Labs and solutions for this lesson are located in the following appendixes:
• Appendix A provides step-by-step lab instructions.
• Appendix B provides complete lab instructions and solutions.
CONFIDENTIAL - NOT FOR DISTRIBUTION
136 3–34 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
Lesson 4
Optimizing File System Backups
Copyright © 2012 Symantec Corporation. All rights reserved.
based on the date of an incremental backup includes all files backed up since the
last full backup, including those that were deleted during that period.
To enable TIR, mark the Collect true image restore information check box
under the Attributes tab of a policy. If the TIR attribute is set, NetBackup records
a list of all files and directories that are present on the system at the time of an
incremental backup; that is, it records a similar amount of catalog information to
that of a full backup.
example) and the next incremental backup (on Monday night), a synthetic full
backup is run.
The synthetic full backup operation occurs on the media server, leaving the
client free for the users. Because the synthetic full backup operations are
executed on the media server without accessing the client machine, they can be
performed outside of the time-critical backup window, reducing the overall
backup window and associated network bandwidth requirements.
The newly created synthetic full backup replaces the baseline full backup and
becomes the baseline full backup for subsequent synthetic full backup operations.
marked
The synthetic backup is the combination and synthesis of the original full
backup with the incremental backups.
monitored with virus scanning software. When some virus scanning software
programs open, scan, and close the file, the access time is reset. This results in the
creation of a change entry in the change journal.
the new changed client data combined with the previous backup image data.
The total number of streams and how many can run concurrently are determined
by the number of available storage units, multiplexing settings, and the maximum
jobs parameters.
stream for a specific client, as well as a parent job that manages the streams for that
client.
in backup speed is also possible, for example, when the jobs are both running
concurrently and accessing the same source disks. In these cases, disk thrashing
may occur and actually slow down the backup jobs.
multiple data sets that reside on a single disk. This results in the disk “thrashing” as
the backups are performed. Overall performance in this case is often worse than if
the systems on the disk were backed up sequentially.
Enabling multiple data streams produces more concurrent backup jobs, which in
turn use additional network bandwidth and require more tape drives (or a higher
level of multiplexing). Use caution you do not overwhelm your network
environment.
The last stream in the list is terminated by the end of the Backup selections
list.
• ALL_LOCAL_DRIVES
This directive is used to create a new stream for each file system.
For this directive to work, the NEW_STREAM directive must not be included in
the Backup selections list.
Choose a value based on the ability of your CPU to handle parallel jobs. Because
extra buffers are required, memory is also important. If the server cannot perform
other tasks or runs out of memory or processes, reduce the Maximum
multiplexing per drive setting for the storage unit. Consider the following when
estimating the load that multiplexing can potentially put on your CPU:
• The maximum number of concurrent-backup jobs that NetBackup is allowed
to attempt equals the sum of the concurrent-backup jobs that can run on the
storage units.
• The maximum potential concurrent-backup jobs that can run on a single
storage unit equals:
Maximum multiplexing per drive setting multiplied by the number of drives
This causes NetBackup to wait the specified amount of time before initiating a
restore from a multiplexed image. The wait allows time for additional restore
jobs to be submitted, and it potentially enables NetBackup to read the data
from tape in one pass.
The MPX_RESTORE_DELAY parameter in the bp.conf file (UNIX) or the
Registry (Windows) can be configured to give you more time to initiate concurrent
restore jobs:
MPX_RESTORE_DELAY = delay_in_seconds
What are point-in-time copies and how are they used during
backups?
Point-in-time copies, also known as snapshots, are used to provide a static copy of
data, even when the application is running and making modifications. Snapshots
provide the ability to achieve consistent backups, even while an application is
online. Point-in-time copies also provide the ability to work around the problem of
busy files.
mirror that has been broken off from the primary data set.
The advantage of physical copies is that they are a completely separate copy of the
data from the original, and therefore have less performance impact when they are
being used. The disadvantage is they take just as much space as the original data,
which effectively means you need twice the storage of the primary data set for a
single snapshot. Examples of physical snapshots are hardware and software
mirroring, which allow break-off mirrors.
When processing busy files, NetBackup creates several files and directories:
• Initially, NetBackup creates the following working directory:
/usr/openv/netbackup/busy_files
• NetBackup then creates the following directory to store action files:
/usr/openv/netbackup/busy_files/actions
– An action file has the information that NetBackup uses to control the
processing of busy files.
– By default, the contents of the action file are derived from the
BUSY_FILE_ACTION option in bp.conf.
– A user can also create an action file to control a specific backup policy and
schedule.
• NetBackup also creates a directory for storing busy-file status and diagnostic
information:
/usr/openv/netbackup/busy_files/actions/logs
Copyright © 2012 Symantec Corporation. All rights reserved.
versions, such as Windows 2008. Either of these utilities can be used from the
command line to configure VSS.
It is not possible to make general recommendations for the configuration and use
of VSS, but the following are useful general tips:
• Create the shadow copy for a particular volume on a separate volume. This is
so that a shadow copy does not fill up its own volume.
• Do not set a Maximum size limit for the shadow copy volume. After a volume
fills up, VSS automatically deletes expired shadow copy images.
Additional information on configuring and using VSS can be found on Microsoft’s
support Web site, or in support documentation for Windows operating systems.
providing improved RPO. Because of the ability to recover data quickly from a
snapshot, this technology provides improved RTO and disaster recovery
capabilities. Drawbacks of primary storage replication are that storage vendor
software is not optimized for scheduling, cataloging, and maintenance of
snapshots and replicas, making administration more difficult. Snapshot contents
are not cataloged, making the restore of individual files tedious and time-
consuming.
Supported features
FlashBackup supports the I/O system components shown on the slide. In addition,
FlashBackup on Linux supports only the VxFS file system on VxVM volumes.
For Linux clients, no other file system is supported, and VxFS file systems are not
supported without VxVM volumes.
FlashBackup-Windows supports the backup and restore of NTFS files that are
compressed. FlashBackup-Windows supports Windows NTFS encryption and
compression, but it does not support NetBackup’s compression or encryption.
Note: The compressed NTFS files are backed up and restored as compressed files
(they are not uncompressed).
Copyright © 2012 Symantec Corporation. All rights reserved.
Restrictions
FlashBackup-Windows policies do not support the backup of Windows system-
protected files (the System State), such as the Registry and Active Directory.
FlashBackup-Windows policies do not support the backup of Windows OS
partitions that contain the Windows system files (usually C:\).
FlashBackup (UNIX) does not support any type of compression or encryption,
regardless of whether the encryption or compression is set in the NetBackup policy
or in the operating system.
For UNIX, under the Backup Selections tab, specify the raw (character) device
corresponding to the block device over which the file system is mounted. For
example, to back up /usr, mounted on /dev/dsk/c1t0d0s6, enter raw
device /dev/rdsk/c1t0d0s6. Note the r in /rdsk.
Note: Wildcards, such as /dev/rdsk/c0*, are not permitted. The following
device file name specification is not supported:
/devices/pci@1f,0/pci@1/scsi@3/sd@1,0:d,raw
Labs and solutions for this lesson are located in the following appendixes:
• Appendix A provides step-by-step lab instructions.
• Appendix B provides complete lab instructions and solutions.
CONFIDENTIAL - NOT FOR DISTRIBUTION
189 Lesson 4 Optimizing File System Backups
Copyright © 2012 Symantec Corporation. All rights reserved.
4–53
Copyright © 2012 Symantec Corporation. All rights reserved.
• Application or user schedules, including user backups and archives, are client-
requested backups that enable the end-user or application on the NetBackup
client to control when a backup runs and which information is contained in the
backup. By default, users and applications on the client do not have permission
to request backups: the NetBackup administrator must create specific
schedules to allow this, and may choose to limit client requested backups to
specific hosts or at specific times of the day. Client requested backups do not
use the policy’s Backup Selections list; the user or application always chooses
what is to be protected at the time the backup runs. Some application backups
may be initiated by special automatic schedules by the NetBackup scheduler.
Note: Prior to NetBackup 7.5, the FlashBackup-Windows policy type was used
for VMware and Hyper-V backups; however, starting in NetBackup 7.5,
Symantec recommends using the new VMware and Hyper-V policy types.
scripting.
2 Within the Oracle database, the Oracle Recovery Manager (RMAN) is used to
automate the process of dumping the database to files in the file system.
NetBackup is scheduled to systematically archive these files with a normal file
system backup policy.
3 The NetBackup Agent for Oracle contains everything that is needed to
successfully back up and restore an Oracle database by using APIs to control
RMAN and back up the database on NetBackup’s schedule, without affecting
database downtime. This method requires additional NetBackup licensing.
Database overview
Definitions for a database, database system, and database management system
(DBMS) are provided on the slide.
Some well-known DBMSs are also listed.
Some basic database backup and restore concepts are discussed on the following
slides.
Copyright © 2012 Symantec Corporation. All rights reserved.
database must be shut down (offline) while the backup is performed. With a
cold backup, recovery actions are not needed to restart the database after a
restore.
• Hot (online) backups
An inconsistent backup is commonly referred to as a hot backup because the
database is open and operational (online) while the backup is performed. The
database must maintain an updated record of transactions that occur while the
backup is performed. With a hot backup, recovery actions are necessary before
you can restart the database after a restore, which usually involve using the
previously recorded set of transactions to assist in recovering the data to a
consistent state.
CONFIDENTIAL - NOT FOR DISTRIBUTION
200 5–10 Symantec NetBackup 7.5: Manage and Administer
Copyright © 2012 Symantec Corporation. All rights reserved.
• Databases and partial backups
Other factors to consider when performing physical backups are database size
and tablespace traffic. Complete database backups take longer and require
large amounts of storage space. If you structure your database so that only
certain data files or tablespaces are modified regularly, you can save time and
storage space by backing up only the elements that change.
When you perform a database backup, all constituent files of the database are
backed up as a coherent whole.
An individual tablespace can be backed up independent of the remainder of the
database. Because tablespaces can consist of multiple data files, backing up
tablespaces is more common than backing up individual data files. Backing up
a tablespace is generally an online backup.
As with a tablespace backup, individual data files can be backed up
independent of the remainder of the database. If a tablespace consists of only
one file, this is identical to a tablespace backup. Otherwise, the effect is to back
up only a portion of a tablespace. Backing up a data file is generally an online
backup.
• Full and incremental backups
Running full backups can be prohibitive when the data set is very large. Use
incremental backups that take advantage of database transaction logs to
shorten the backup window and automate database log maintenance.
Additionally, Oracle supports block level incremental (BLI) backups to
provide increased performance and reduced resource usage.
• Backup storage destination
One of the key advantages of having NetBackup manage the database backups
is that they can be sent to any of the storage methods supported by NetBackup, 5
including tape-based, disk-based, or deduplication-based storage.
• Physical destination
Another advantage of using NetBackup is the range of physical destinations
and strategies that are supported, including automated duplication to any
supported storage destination, automation and management of offsite media
storage, and various replication features and technologies.
NetBackup agents optimize the performance of critical databases and applications
Copyright © 2012 Symantec Corporation. All rights reserved.
by providing the ability to use all of these backup strategies and technologies.
5
Copyright © 2012 Symantec Corporation. All rights reserved.
• Auto discovery is used where the topology is read from the SharePoint front-
end Web server and the backup selections list is automatically built.
• A user can perform backups of SharePoint Server resources through the
Backup, Archive, and Restore client interface on the front-end Web server.
• VMware backups that protect SharePoint Server provide granular recovery,
complete protection of the farm, and protection of the SharePoint components
in the Windows files system.
For additional details, see the Symantec NetBackup for Microsoft SharePoint
Server Administrator’s Guide.
systems:
• Windows 2003 R2 SP2
• Windows 2008
• Windows 2008 R2
7.5 agent supports Enterprise Vault 7.5, 8.0, 9.0, and 10 configurations.
The Enterprise Vault agent enables you to back up and restore the Enterprise Vault
file system data and the Enterprise Vault SQL data. These types of data can reside
on different systems or devices, such as NTFS or NAS devices.
The Enterprise Vault agent also serves as a disaster recovery solution for data that
is archived using Enterprise Vault. Recovery of the archived data is not dependent
on the archive source, such as Exchange Server or a specific file system.
For additional details, see the Symantec NetBackup for Enterprise Vault Agent
Administrator’s Guide. Some Enterprise Vault databases may not be automatically
backed up with the agent; see the documentation for details.
Note: The VMware backup host was referred to as the VMware backup proxy
server in some prior releases.
Copyright © 2012 Symantec Corporation. All rights reserved.
To perform backups that enable full VM and file-level recovery, the NetBackup
client does not need to be installed in the VM.
The NetBackup client needs to be installed in the following circumstances:
• Performing individual file restores directly to the virtual machine
The NetBackup client is required to perform a restore to a host. Without the
NetBackup client installed in the VM, an alternate client restores is necessary,
for example, to a shared folder that is mapped to the VM. Alternatively, the
NetBackup client can be installed in the virtual machine to enable restores
directly to the VM.
Note: The VCB method is not supported by NetBackup 7.5, and requires
earlier versions of NetBackup. See the Symantec NetBackup for
VMware Administrator’s Guide for more details on VCB backups and
requirements.
Copyright © 2012 Symantec Corporation. All rights reserved.
NetBackup media server and the VMware backup host on the same host.
The slide shows two possibilities for NetBackup for VMware environments:
• Local area network (LAN) access to datastore
In this environment, because the backup host accesses the VMware datastore
using the ESX servers, the data in the datastore travels over the TCP/IP
network.
• Storage area network (SAN) access to datastore
The backup host in these environments access the VMware datastore directly over
the SAN, which usually has better performance, is more efficient, and has less
impact on the ESX servers.
CONFIDENTIAL - NOT FOR DISTRIBUTION
215 Lesson 5 Introduction to Enterprise Backups
Copyright © 2012 Symantec Corporation. All rights reserved.
5–25
Configuring VMware backups
Configuring VMware backups is covered in detail in the Symantec NetBackup for
VMware Administrator’s Guide. See the documentation for detailed steps, notes,
and limitations.
The general VMware configuration steps include:
1 Setting up the VMware disk storage
2 Installing the ESX servers and virtual machines
3 Installing VMware tools on the virtual machines
4 Optionally installing a vCenter server
The vCenter server is required to use vStorage integration. However, some
environments may require a VMware Converter server on the VMware restore
host for recovering VCB backups. See the documentation for details.
Copyright © 2012 Symantec Corporation. All rights reserved.
Note: Starting in NetBackup 7.5, this procedure is not required for any backup
host that is also a media server. In the policy’s VMware backup host
drop-down list, select the Windows media server or Backup Media Server
to use any available media server.
Copyright © 2012 Symantec Corporation. All rights reserved.
Resource limits
Optionally, set limits on the use of VMware resources:
1 In the Properties screen, scroll down in the left pane and click Resource
Limit.
2 Click in the Resource Limit column to set the maximum NetBackup usage for
the resource type. The settings apply to all policies.
The default for all resource limits is unlimited. The screen shot shows a
maximum of four simultaneous backup jobs to any ESX server at a given time.
For details on resource limit types and behavior, see the Symantec NetBackup for
VMware Administrator’s Guide.
Note: Symantec does not recommend using this policy type to back up
virtual machines unless it is required, because this policy type does
not support newer backup functionality and features.
queries and VMware backups, see the NetBackup for VMWare Administrator’s
Guide.
5
Copyright © 2012 Symantec Corporation. All rights reserved.
Note: In most cases, the NetBackup client does not need to be installed on any
virtual machine. For exceptions, see the Symantec NetBackup for Hyper-V
Administrator’s Guide.
Copyright © 2012 Symantec Corporation. All rights reserved.
This enables the VMDK (VMware) or VHD files (Hyper-V) that represent the
complete virtual machine to be restored.
• Software alerts for critical issues that may affect your product
• Compatibility lists for peripherals, platforms, and software
• Release details for version-specific release type, date, and end-of-support-life
information
• Support forums, including Symantec Technology Network forums and peer-to-
peer news groups
• E-mail support for noncritical technical questions
• Information on how to contact Technical Support and manage any outstanding
case through MySupport Online Case Management
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
by boxes with a dashed outline, only start running when a backup job occurs:
bpbrm, bptm, and bpbkar. In addition, the dashed lines represent the flow of
data, the dotted lines represent the flow of metadata, and the solid lines represent
the flow of communication to complete a backup job.
For additional information, see the Symantec NetBackup Troubleshooting Guide,
attend the Symantec NetBackup: Maintain and Troubleshoot course, and contact
Symantec Technical Support.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
Java Windows 6
Click the specific daemon you want to Click the specific service you want to
Copyright © 2012 Symantec Corporation. All rights reserved.
control and select Actions > Stop control and select Actions > Stop
Daemon (or Start Daemon). Service (or Start Service).
Right-click the specific daemon you want Right-click the specific service you want
to control and select Stop Daemon (or to control and select Stop Service (or
Start Daemon). Start Service).
Click the specific daemon you want to Click the specific service you want to
control and click the Stop Daemon control and click the Stop Service button
button ( ) or the ( ) or the Start Service button ( ) in
Start Daemon button ( ) in the the toolbar.
toolbar.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
• UNIX:
./output/nbsu/server29_master_20070516_010521
• Windows:
.\output\nbsu\pc5_media_20070512_132004
Switch Description
-l List the diagnostic commands that are selected to run.
-d name Run the specified diagnostic commands or procedures. Use
nbsu -l to obtain a list of commands and procedures.
Note: Multiple -d options can be listed, for example:
-d OS_general -d OS_env
-nozip Do not compress the output files.
Copyright © 2012 Symantec Corporation. All rights reserved.
See the online help provided by nbsu –H for details on usage and nbsu –L for
the complete list of diagnostics and commands.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
6
Copyright © 2012 Symantec Corporation. All rights reserved.
file for UNIX and a ZIP file for Windows. Hash marks (#) are displayed on the
screen as the upload progresses. If the upload is successful, the compressed file is
deleted and a completion message is displayed.
If the upload is not successful, the compressed file is not deleted and you are asked
to manually upload the file.
For additional information about NBCPLOGS, see TechNote 126223, How to use
Symantec’s NetBackup Copy Logs Tool at:
http://www.symantec.com/docs/TECH126223.
Labs and solutions for this lesson are located in the following appendixes:
• Appendix A provides step-by-step lab instructions.
• Appendix B provides complete lab instructions and solutions.
CONFIDENTIAL - NOT FOR DISTRIBUTION
267 Lesson 6 Working with Support Copyright © 2012 Symantec Corporation. All rights reserved.
6–37
Copyright © 2012 Symantec Corporation. All rights reserved.